diff --git a/ObjectivePGP.xcodeproj/project.pbxproj b/ObjectivePGP.xcodeproj/project.pbxproj index 6ae2318a..8b334b24 100644 --- a/ObjectivePGP.xcodeproj/project.pbxproj +++ b/ObjectivePGP.xcodeproj/project.pbxproj @@ -7,186 +7,45 @@ objects = { /* Begin PBXBuildFile section */ - 38AF05C782074E1E9B286C11 /* libPods-ObjectivePGPOSX.a in Frameworks */ = {isa = PBXBuildFile; fileRef = 074C42D0AFAD4DC7AD76CF21 /* libPods-ObjectivePGPOSX.a */; }; - 713B6813B2DD45E5B30B5EA1 /* libPods-ObjectivePGP.a in Frameworks */ = {isa = PBXBuildFile; fileRef = 059B85547F6245229D167817 /* libPods-ObjectivePGP.a */; }; - 750016A919C22E7100EAF308 /* secring-test-plaintext-encrypted-message.asc in Resources */ = {isa = PBXBuildFile; fileRef = 750016A819C22E7100EAF308 /* secring-test-plaintext-encrypted-message.asc */; }; - 7502CEFF1916DCE9001B32D7 /* PGPSignatureSubpacket.m in Sources */ = {isa = PBXBuildFile; fileRef = 7502CEFE1916DCE9001B32D7 /* PGPSignatureSubpacket.m */; }; - 75040AB21926BB35000CEA93 /* ObjectivePGPTestArmor.m in Sources */ = {isa = PBXBuildFile; fileRef = 75040AB11926BB35000CEA93 /* ObjectivePGPTestArmor.m */; }; - 7507B72819170FE3003A2DC7 /* PGPUserIDPacket.m in Sources */ = {isa = PBXBuildFile; fileRef = 7507B72719170FE3003A2DC7 /* PGPUserIDPacket.m */; }; - 750BD0D9193F5AC3005B9840 /* libz.dylib in Frameworks */ = {isa = PBXBuildFile; fileRef = 750BD0D7193F5AAD005B9840 /* libz.dylib */; }; - 750EE3C41922C185009E818E /* PGPKey.m in Sources */ = {isa = PBXBuildFile; fileRef = 750EE3C31922C185009E818E /* PGPKey.m */; }; - 751056131940A76F00653C0B /* PGPCryptoCFB.m in Sources */ = {isa = PBXBuildFile; fileRef = 751056121940A76F00653C0B /* PGPCryptoCFB.m */; }; - 751E07361937D53900CA7946 /* PGPOnePassSignaturePacket.m in Sources */ = {isa = PBXBuildFile; fileRef = 751E07351937D53900CA7946 /* PGPOnePassSignaturePacket.m */; }; - 753A65EF19487E3D0011A729 /* PGPSymmetricallyEncryptedDataPacket.m in Sources */ = {isa = PBXBuildFile; fileRef = 753A65EE19487E3D0011A729 /* PGPSymmetricallyEncryptedDataPacket.m */; }; - 755456C0192843E700E5526B /* PGPArmor.m in Sources */ = {isa = PBXBuildFile; fileRef = 755456BF192843E700E5526B /* PGPArmor.m */; }; - 7556464B1958FF6F00BFA34C /* libbz2.dylib in Frameworks */ = {isa = PBXBuildFile; fileRef = 7556464A1958FF6F00BFA34C /* libbz2.dylib */; }; - 7562858E19239F1B00127E24 /* PGPFingerprint.m in Sources */ = {isa = PBXBuildFile; fileRef = 7562858D19239F1B00127E24 /* PGPFingerprint.m */; }; + 752CB2BD1A6FA3EB007292F2 /* PGPFunctions.m in Sources */ = {isa = PBXBuildFile; fileRef = 752CB2BC1A6FA3EB007292F2 /* PGPFunctions.m */; }; + 75321D741A6F056C00F8FE95 /* PGPSignatureSubpacket.m in Sources */ = {isa = PBXBuildFile; fileRef = 75321D731A6F056C00F8FE95 /* PGPSignatureSubpacket.m */; }; + 75321D771A6F135000F8FE95 /* PGPKeyID.m in Sources */ = {isa = PBXBuildFile; fileRef = 75321D761A6F135000F8FE95 /* PGPKeyID.m */; }; + 75321D7C1A6F16EB00F8FE95 /* PGPSignaturePacketTests.m in Sources */ = {isa = PBXBuildFile; fileRef = 75321D7B1A6F16EB00F8FE95 /* PGPSignaturePacketTests.m */; }; + 75413BE11A6AD386004C8807 /* PGPPacketHeaderOldTests.m in Sources */ = {isa = PBXBuildFile; fileRef = 75413BE01A6AD386004C8807 /* PGPPacketHeaderOldTests.m */; }; + 75413BE21A6AD386004C8807 /* libObjectivePGP.a in Frameworks */ = {isa = PBXBuildFile; fileRef = 756299B51914DE1A00C5AD3B /* libObjectivePGP.a */; }; + 7550466A1A6BEC78008E5203 /* PGPPacketHeader.m in Sources */ = {isa = PBXBuildFile; fileRef = 755046691A6BEC78008E5203 /* PGPPacketHeader.m */; }; + 755046731A6C11F1008E5203 /* NSInputStream+PGP.m in Sources */ = {isa = PBXBuildFile; fileRef = 755046721A6C11F1008E5203 /* NSInputStream+PGP.m */; }; + 755046771A6C1CD0008E5203 /* NSInputStream+PGPTests.m in Sources */ = {isa = PBXBuildFile; fileRef = 755046761A6C1CD0008E5203 /* NSInputStream+PGPTests.m */; }; + 7550467A1A6C625C008E5203 /* PGPPublicKeyPacket.m in Sources */ = {isa = PBXBuildFile; fileRef = 755046791A6C625C008E5203 /* PGPPublicKeyPacket.m */; }; + 7550467E1A6C6861008E5203 /* PGPMPI.m in Sources */ = {isa = PBXBuildFile; fileRef = 7550467D1A6C6861008E5203 /* PGPMPI.m */; }; + 755046801A6C6D15008E5203 /* PGPPublicKeyPacketTests.m in Sources */ = {isa = PBXBuildFile; fileRef = 7550467F1A6C6D15008E5203 /* PGPPublicKeyPacketTests.m */; }; + 755046821A6C6F3C008E5203 /* PGPInputStreamCategoryTests.m in Sources */ = {isa = PBXBuildFile; fileRef = 755046811A6C6F3C008E5203 /* PGPInputStreamCategoryTests.m */; }; + 755046841A6C76AA008E5203 /* PGPParserTests.m in Sources */ = {isa = PBXBuildFile; fileRef = 755046831A6C76AA008E5203 /* PGPParserTests.m */; }; + 755046871A6C7970008E5203 /* PGPSignaturePacket.m in Sources */ = {isa = PBXBuildFile; fileRef = 755046861A6C7970008E5203 /* PGPSignaturePacket.m */; }; + 7550468D1A6C799A008E5203 /* PGPUserIDPacket.m in Sources */ = {isa = PBXBuildFile; fileRef = 7550468C1A6C799A008E5203 /* PGPUserIDPacket.m */; }; + 755046901A6C873B008E5203 /* PGPKey.m in Sources */ = {isa = PBXBuildFile; fileRef = 7550468F1A6C873B008E5203 /* PGPKey.m */; }; + 755046931A6C891B008E5203 /* PGPSubKey.m in Sources */ = {isa = PBXBuildFile; fileRef = 755046921A6C891B008E5203 /* PGPSubKey.m */; }; 756299B91914DE1A00C5AD3B /* Foundation.framework in Frameworks */ = {isa = PBXBuildFile; fileRef = 756299B81914DE1A00C5AD3B /* Foundation.framework */; }; - 756299BE1914DE1A00C5AD3B /* ObjectivePGP.h in CopyFiles */ = {isa = PBXBuildFile; fileRef = 756299BD1914DE1A00C5AD3B /* ObjectivePGP.h */; }; - 756299C01914DE1A00C5AD3B /* ObjectivePGP.m in Sources */ = {isa = PBXBuildFile; fileRef = 756299BF1914DE1A00C5AD3B /* ObjectivePGP.m */; }; - 756299C71914DE1A00C5AD3B /* XCTest.framework in Frameworks */ = {isa = PBXBuildFile; fileRef = 756299C61914DE1A00C5AD3B /* XCTest.framework */; }; - 756299C81914DE1A00C5AD3B /* Foundation.framework in Frameworks */ = {isa = PBXBuildFile; fileRef = 756299B81914DE1A00C5AD3B /* Foundation.framework */; }; - 756299CA1914DE1A00C5AD3B /* UIKit.framework in Frameworks */ = {isa = PBXBuildFile; fileRef = 756299C91914DE1A00C5AD3B /* UIKit.framework */; }; - 756299D31914DE1A00C5AD3B /* InfoPlist.strings in Resources */ = {isa = PBXBuildFile; fileRef = 756299D11914DE1A00C5AD3B /* InfoPlist.strings */; }; - 756299D51914DE1A00C5AD3B /* ObjectivePGPTests.m in Sources */ = {isa = PBXBuildFile; fileRef = 756299D41914DE1A00C5AD3B /* ObjectivePGPTests.m */; }; - 756299E71915AF0700C5AD3B /* PGPPublicKeyPacket.m in Sources */ = {isa = PBXBuildFile; fileRef = 756299E61915AF0700C5AD3B /* PGPPublicKeyPacket.m */; }; - 7563356D19255C1A00414CCC /* PGPUser.m in Sources */ = {isa = PBXBuildFile; fileRef = 7563356C19255C1A00414CCC /* PGPUser.m */; }; - 75633570192582CD00414CCC /* PGPSubKey.m in Sources */ = {isa = PBXBuildFile; fileRef = 7563356F192582CD00414CCC /* PGPSubKey.m */; }; - 7563357619258F1700414CCC /* pubring-test-encrypted.gpg in Resources */ = {isa = PBXBuildFile; fileRef = 7563357219258F1700414CCC /* pubring-test-encrypted.gpg */; }; - 7563357719258F1700414CCC /* pubring-test-plaintext.gpg in Resources */ = {isa = PBXBuildFile; fileRef = 7563357319258F1700414CCC /* pubring-test-plaintext.gpg */; }; - 7563357819258F1700414CCC /* secring-test-encrypted.gpg in Resources */ = {isa = PBXBuildFile; fileRef = 7563357419258F1700414CCC /* secring-test-encrypted.gpg */; }; - 7563357919258F1700414CCC /* secring-test-plaintext.gpg in Resources */ = {isa = PBXBuildFile; fileRef = 7563357519258F1700414CCC /* secring-test-plaintext.gpg */; }; - 7563357B19258F7100414CCC /* ObjectivePGPTestKeyringSecurePlaintext.m in Sources */ = {isa = PBXBuildFile; fileRef = 7563357A19258F7100414CCC /* ObjectivePGPTestKeyringSecurePlaintext.m */; }; - 7563357D1925936900414CCC /* ObjectivePGPTestKeyringSecureEncrypted.m in Sources */ = {isa = PBXBuildFile; fileRef = 7563357C1925936900414CCC /* ObjectivePGPTestKeyringSecureEncrypted.m */; }; - 75734BD119181E5500A54D6E /* PGPPacketFactory.m in Sources */ = {isa = PBXBuildFile; fileRef = 75734BD019181E5500A54D6E /* PGPPacketFactory.m */; }; - 75734BD81918462900A54D6E /* PGPTrustPacket.m in Sources */ = {isa = PBXBuildFile; fileRef = 75734BD71918462900A54D6E /* PGPTrustPacket.m */; }; - 75734BDB191853DF00A54D6E /* PGPKeyID.m in Sources */ = {isa = PBXBuildFile; fileRef = 75734BDA191853DF00A54D6E /* PGPKeyID.m */; }; - 757DDE7C1919371600A30F84 /* PGPPacket.m in Sources */ = {isa = PBXBuildFile; fileRef = 757DDE7B1919371600A30F84 /* PGPPacket.m */; }; - 7580828A1986AFA200348D0D /* libObjectivePGP.a in Frameworks */ = {isa = PBXBuildFile; fileRef = 756299B51914DE1A00C5AD3B /* libObjectivePGP.a */; }; - 758F3A1A192935C7009307AD /* NSValue+PGPUtils.m in Sources */ = {isa = PBXBuildFile; fileRef = 758F3A19192935C7009307AD /* NSValue+PGPUtils.m */; }; - 7597B79C192E9C7F003ABC65 /* PGPPKCSEmsa.m in Sources */ = {isa = PBXBuildFile; fileRef = 7597B79B192E9C7F003ABC65 /* PGPPKCSEmsa.m */; }; - 759DBA141915B5BD00305549 /* NSData+PGPUtils.m in Sources */ = {isa = PBXBuildFile; fileRef = 759DBA131915B5BD00305549 /* NSData+PGPUtils.m */; }; - 759DBA181915CBDF00305549 /* PGPMPI.m in Sources */ = {isa = PBXBuildFile; fileRef = 759DBA171915CBDF00305549 /* PGPMPI.m */; }; - 759FF46919598227005B240C /* main.m in Sources */ = {isa = PBXBuildFile; fileRef = 759FF46819598227005B240C /* main.m */; }; - 759FF46F19598248005B240C /* libz.dylib in Frameworks */ = {isa = PBXBuildFile; fileRef = 759FF46E19598248005B240C /* libz.dylib */; }; - 759FF4711959824E005B240C /* libbz2.dylib in Frameworks */ = {isa = PBXBuildFile; fileRef = 759FF4701959824E005B240C /* libbz2.dylib */; }; - 759FF475195982A6005B240C /* PGPCryptoCFB.m in Sources */ = {isa = PBXBuildFile; fileRef = 751056121940A76F00653C0B /* PGPCryptoCFB.m */; }; - 759FF476195982A6005B240C /* PGPKey.m in Sources */ = {isa = PBXBuildFile; fileRef = 750EE3C31922C185009E818E /* PGPKey.m */; }; - 759FF477195982A6005B240C /* PGPSubKey.m in Sources */ = {isa = PBXBuildFile; fileRef = 7563356F192582CD00414CCC /* PGPSubKey.m */; }; - 759FF478195982A6005B240C /* PGPPublicKeyEncryptedSessionKeyPacket.m in Sources */ = {isa = PBXBuildFile; fileRef = 75AE7E251941C567004DD6A5 /* PGPPublicKeyEncryptedSessionKeyPacket.m */; }; - 759FF479195982A6005B240C /* PGPUserIDPacket.m in Sources */ = {isa = PBXBuildFile; fileRef = 7507B72719170FE3003A2DC7 /* PGPUserIDPacket.m */; }; - 759FF47A195982A6005B240C /* PGPSignaturePacket.m in Sources */ = {isa = PBXBuildFile; fileRef = 75E7B6BA19167EFF00C96BAB /* PGPSignaturePacket.m */; }; - 759FF47B195982A6005B240C /* PGPPublicKeyPacket.m in Sources */ = {isa = PBXBuildFile; fileRef = 756299E61915AF0700C5AD3B /* PGPPublicKeyPacket.m */; }; - 759FF47C195982A6005B240C /* PGPSecretKeyPacket.m in Sources */ = {isa = PBXBuildFile; fileRef = 75DA1357191A4E65004C9C76 /* PGPSecretKeyPacket.m */; }; - 759FF47D195982A6005B240C /* PGPOnePassSignaturePacket.m in Sources */ = {isa = PBXBuildFile; fileRef = 751E07351937D53900CA7946 /* PGPOnePassSignaturePacket.m */; }; - 759FF47E195982A6005B240C /* PGPPublicSubKeyPacket.m in Sources */ = {isa = PBXBuildFile; fileRef = 75E7B6B71916493600C96BAB /* PGPPublicSubKeyPacket.m */; }; - 759FF47F195982A6005B240C /* PGPSymmetricallyEncryptedIntegrityProtectedDataPacket.m in Sources */ = {isa = PBXBuildFile; fileRef = 75FE9807193FB46200613549 /* PGPSymmetricallyEncryptedIntegrityProtectedDataPacket.m */; }; - 759FF480195982A6005B240C /* PGPSecretSubKeyPacket.m in Sources */ = {isa = PBXBuildFile; fileRef = 75DA135A191A4EA6004C9C76 /* PGPSecretSubKeyPacket.m */; }; - 759FF481195982A6005B240C /* ObjectivePGP.m in Sources */ = {isa = PBXBuildFile; fileRef = 756299BF1914DE1A00C5AD3B /* ObjectivePGP.m */; }; - 759FF482195982A6005B240C /* PGPMPI.m in Sources */ = {isa = PBXBuildFile; fileRef = 759DBA171915CBDF00305549 /* PGPMPI.m */; }; - 759FF483195982A6005B240C /* PGPKeyID.m in Sources */ = {isa = PBXBuildFile; fileRef = 75734BDA191853DF00A54D6E /* PGPKeyID.m */; }; - 759FF484195982A6005B240C /* PGPUserAttributePacket.m in Sources */ = {isa = PBXBuildFile; fileRef = 75AEC4671930FC0B00974CBE /* PGPUserAttributePacket.m */; }; - 759FF485195982A6005B240C /* PGPUser.m in Sources */ = {isa = PBXBuildFile; fileRef = 7563356C19255C1A00414CCC /* PGPUser.m */; }; - 759FF486195982A6005B240C /* PGPPublicKeyRSA.m in Sources */ = {isa = PBXBuildFile; fileRef = 75B2450E1933DB89003F24A0 /* PGPPublicKeyRSA.m */; }; - 759FF487195982A6005B240C /* NSData+PGPUtils.m in Sources */ = {isa = PBXBuildFile; fileRef = 759DBA131915B5BD00305549 /* NSData+PGPUtils.m */; }; - 759FF488195982A6005B240C /* PGPUserAttributeSubpacket.m in Sources */ = {isa = PBXBuildFile; fileRef = 75AEC46A1930FD3000974CBE /* PGPUserAttributeSubpacket.m */; }; - 759FF489195982A6005B240C /* PGPArmor.m in Sources */ = {isa = PBXBuildFile; fileRef = 755456BF192843E700E5526B /* PGPArmor.m */; }; - 759FF48A195982A6005B240C /* NSValue+PGPUtils.m in Sources */ = {isa = PBXBuildFile; fileRef = 758F3A19192935C7009307AD /* NSValue+PGPUtils.m */; }; - 759FF48B195982A6005B240C /* NSData+compression.m in Sources */ = {isa = PBXBuildFile; fileRef = 75A5C153193CE3F6008A2543 /* NSData+compression.m */; }; - 759FF48C195982A6005B240C /* PGPS2K.m in Sources */ = {isa = PBXBuildFile; fileRef = 75DA135D191AE1D6004C9C76 /* PGPS2K.m */; }; - 759FF48D195982A6005B240C /* PGPTrustPacket.m in Sources */ = {isa = PBXBuildFile; fileRef = 75734BD71918462900A54D6E /* PGPTrustPacket.m */; }; - 759FF48E195982A6005B240C /* PGPLiteralPacket.m in Sources */ = {isa = PBXBuildFile; fileRef = 75AEC4641930B5E400974CBE /* PGPLiteralPacket.m */; }; - 759FF48F195982A6005B240C /* PGPPacketFactory.m in Sources */ = {isa = PBXBuildFile; fileRef = 75734BD019181E5500A54D6E /* PGPPacketFactory.m */; }; - 759FF490195982A6005B240C /* PGPPacket.m in Sources */ = {isa = PBXBuildFile; fileRef = 757DDE7B1919371600A30F84 /* PGPPacket.m */; }; - 759FF491195982A6005B240C /* PGPSignatureSubpacket.m in Sources */ = {isa = PBXBuildFile; fileRef = 7502CEFE1916DCE9001B32D7 /* PGPSignatureSubpacket.m */; }; - 759FF492195982A6005B240C /* PGPCompressedPacket.m in Sources */ = {isa = PBXBuildFile; fileRef = 75B39529193C6FA100297C8D /* PGPCompressedPacket.m */; }; - 759FF493195982A6005B240C /* PGPCryptoUtils.m in Sources */ = {isa = PBXBuildFile; fileRef = 75C4F0E21920FF5F005401A4 /* PGPCryptoUtils.m */; }; - 759FF494195982A6005B240C /* PGPModificationDetectionCodePacket.m in Sources */ = {isa = PBXBuildFile; fileRef = 75C4F0E5192163A3005401A4 /* PGPModificationDetectionCodePacket.m */; }; - 759FF496195982A6005B240C /* PGPPKCSEmsa.m in Sources */ = {isa = PBXBuildFile; fileRef = 7597B79B192E9C7F003ABC65 /* PGPPKCSEmsa.m */; }; - 759FF497195982A6005B240C /* PGPSymmetricallyEncryptedDataPacket.m in Sources */ = {isa = PBXBuildFile; fileRef = 753A65EE19487E3D0011A729 /* PGPSymmetricallyEncryptedDataPacket.m */; }; - 759FF498195982A6005B240C /* PGPFingerprint.m in Sources */ = {isa = PBXBuildFile; fileRef = 7562858D19239F1B00127E24 /* PGPFingerprint.m */; }; - 759FF499195982A6005B240C /* PGPPKCSEme.m in Sources */ = {isa = PBXBuildFile; fileRef = 75AE7E28194224CD004DD6A5 /* PGPPKCSEme.m */; }; - 759FF49B195982A6005B240C /* Foundation.framework in Frameworks */ = {isa = PBXBuildFile; fileRef = 756299B81914DE1A00C5AD3B /* Foundation.framework */; }; - 75A5C154193CE3F6008A2543 /* NSData+compression.m in Sources */ = {isa = PBXBuildFile; fileRef = 75A5C153193CE3F6008A2543 /* NSData+compression.m */; }; - 75A5D20F195983430074A124 /* libObjectivePGP.a in Frameworks */ = {isa = PBXBuildFile; fileRef = 759FF4A3195982A6005B240C /* libObjectivePGP.a */; }; - 75AE7E261941C567004DD6A5 /* PGPPublicKeyEncryptedSessionKeyPacket.m in Sources */ = {isa = PBXBuildFile; fileRef = 75AE7E251941C567004DD6A5 /* PGPPublicKeyEncryptedSessionKeyPacket.m */; }; - 75AE7E29194224CD004DD6A5 /* PGPPKCSEme.m in Sources */ = {isa = PBXBuildFile; fileRef = 75AE7E28194224CD004DD6A5 /* PGPPKCSEme.m */; }; - 75AEC4651930B5E400974CBE /* PGPLiteralPacket.m in Sources */ = {isa = PBXBuildFile; fileRef = 75AEC4641930B5E400974CBE /* PGPLiteralPacket.m */; }; - 75AEC4681930FC0B00974CBE /* PGPUserAttributePacket.m in Sources */ = {isa = PBXBuildFile; fileRef = 75AEC4671930FC0B00974CBE /* PGPUserAttributePacket.m */; }; - 75AEC46B1930FD3000974CBE /* PGPUserAttributeSubpacket.m in Sources */ = {isa = PBXBuildFile; fileRef = 75AEC46A1930FD3000974CBE /* PGPUserAttributeSubpacket.m */; }; - 75B2450F1933DB89003F24A0 /* PGPPublicKeyRSA.m in Sources */ = {isa = PBXBuildFile; fileRef = 75B2450E1933DB89003F24A0 /* PGPPublicKeyRSA.m */; }; - 75B3952A193C6FA100297C8D /* PGPCompressedPacket.m in Sources */ = {isa = PBXBuildFile; fileRef = 75B39529193C6FA100297C8D /* PGPCompressedPacket.m */; }; - 75C4F0E31920FF5F005401A4 /* PGPCryptoUtils.m in Sources */ = {isa = PBXBuildFile; fileRef = 75C4F0E21920FF5F005401A4 /* PGPCryptoUtils.m */; }; - 75C4F0E6192163A3005401A4 /* PGPModificationDetectionCodePacket.m in Sources */ = {isa = PBXBuildFile; fileRef = 75C4F0E5192163A3005401A4 /* PGPModificationDetectionCodePacket.m */; }; - 75D53ADF1A2FCDEE00ED9707 /* multiple-keys.asc in Resources */ = {isa = PBXBuildFile; fileRef = 75D53ADE1A2FCDEE00ED9707 /* multiple-keys.asc */; }; - 75DA1358191A4E65004C9C76 /* PGPSecretKeyPacket.m in Sources */ = {isa = PBXBuildFile; fileRef = 75DA1357191A4E65004C9C76 /* PGPSecretKeyPacket.m */; }; - 75DA135B191A4EA6004C9C76 /* PGPSecretSubKeyPacket.m in Sources */ = {isa = PBXBuildFile; fileRef = 75DA135A191A4EA6004C9C76 /* PGPSecretSubKeyPacket.m */; }; - 75DA135E191AE1D6004C9C76 /* PGPS2K.m in Sources */ = {isa = PBXBuildFile; fileRef = 75DA135D191AE1D6004C9C76 /* PGPS2K.m */; }; - 75E7B6B81916493600C96BAB /* PGPPublicSubKeyPacket.m in Sources */ = {isa = PBXBuildFile; fileRef = 75E7B6B71916493600C96BAB /* PGPPublicSubKeyPacket.m */; }; - 75E7B6BB19167EFF00C96BAB /* PGPSignaturePacket.m in Sources */ = {isa = PBXBuildFile; fileRef = 75E7B6BA19167EFF00C96BAB /* PGPSignaturePacket.m */; }; - 75F81A9E195B834600704164 /* PGPTypes.h in CopyFiles */ = {isa = PBXBuildFile; fileRef = 759DBA151915BC0400305549 /* PGPTypes.h */; }; - 75F81A9F195B834600704164 /* PGPPacket.h in CopyFiles */ = {isa = PBXBuildFile; fileRef = 757DDE7A1919338700A30F84 /* PGPPacket.h */; }; - 75F81AA0195B834600704164 /* PGPSignaturePacket.h in CopyFiles */ = {isa = PBXBuildFile; fileRef = 75E7B6B919167EFF00C96BAB /* PGPSignaturePacket.h */; }; - 75F81AA1195B834600704164 /* PGPSignatureSubpacket.h in CopyFiles */ = {isa = PBXBuildFile; fileRef = 7502CEFD1916DCE9001B32D7 /* PGPSignatureSubpacket.h */; }; - 75F81AA2195B834600704164 /* PGPOnePassSignaturePacket.h in CopyFiles */ = {isa = PBXBuildFile; fileRef = 751E07341937D53900CA7946 /* PGPOnePassSignaturePacket.h */; }; - 75F81AA3195B834600704164 /* PGPPacketFactory.h in CopyFiles */ = {isa = PBXBuildFile; fileRef = 75E7B6BC19167F1700C96BAB /* PGPPacketFactory.h */; }; - 75F81AA4195B834600704164 /* PGPPublicKeyPacket.h in CopyFiles */ = {isa = PBXBuildFile; fileRef = 756299E51915AF0700C5AD3B /* PGPPublicKeyPacket.h */; }; - 75F81AA5195B834600704164 /* PGPPublicSubKeyPacket.h in CopyFiles */ = {isa = PBXBuildFile; fileRef = 75E7B6B61916493600C96BAB /* PGPPublicSubKeyPacket.h */; }; - 75F81AA6195B834600704164 /* PGPSecretKeyPacket.h in CopyFiles */ = {isa = PBXBuildFile; fileRef = 75DA1356191A4E65004C9C76 /* PGPSecretKeyPacket.h */; }; - 75F81AA7195B834600704164 /* PGPSecretSubKeyPacket.h in CopyFiles */ = {isa = PBXBuildFile; fileRef = 75DA1359191A4EA6004C9C76 /* PGPSecretSubKeyPacket.h */; }; - 75F81AA8195B834600704164 /* PGPUserIDPacket.h in CopyFiles */ = {isa = PBXBuildFile; fileRef = 7507B72619170FE3003A2DC7 /* PGPUserIDPacket.h */; }; - 75F81AA9195B834600704164 /* PGPTrustPacket.h in CopyFiles */ = {isa = PBXBuildFile; fileRef = 75734BD61918462900A54D6E /* PGPTrustPacket.h */; }; - 75F81AAA195B834600704164 /* PGPModificationDetectionCodePacket.h in CopyFiles */ = {isa = PBXBuildFile; fileRef = 75C4F0E4192163A3005401A4 /* PGPModificationDetectionCodePacket.h */; }; - 75F81AAB195B834600704164 /* PGPLiteralPacket.h in CopyFiles */ = {isa = PBXBuildFile; fileRef = 75AEC4631930B5E400974CBE /* PGPLiteralPacket.h */; }; - 75F81AAC195B834600704164 /* PGPUserAttributePacket.h in CopyFiles */ = {isa = PBXBuildFile; fileRef = 75AEC4661930FC0B00974CBE /* PGPUserAttributePacket.h */; }; - 75F81AAD195B834600704164 /* PGPUserAttributeSubpacket.h in CopyFiles */ = {isa = PBXBuildFile; fileRef = 75AEC4691930FD3000974CBE /* PGPUserAttributeSubpacket.h */; }; - 75F81AAE195B834600704164 /* PGPCompressedPacket.h in CopyFiles */ = {isa = PBXBuildFile; fileRef = 75B39528193C6FA100297C8D /* PGPCompressedPacket.h */; }; - 75F81AAF195B834600704164 /* PGPSymmetricallyEncryptedIntegrityProtectedDataPacket.h in CopyFiles */ = {isa = PBXBuildFile; fileRef = 75FE9806193FB46200613549 /* PGPSymmetricallyEncryptedIntegrityProtectedDataPacket.h */; }; - 75F81AB0195B834600704164 /* PGPSymmetricallyEncryptedDataPacket.h in CopyFiles */ = {isa = PBXBuildFile; fileRef = 753A65ED19487E3D0011A729 /* PGPSymmetricallyEncryptedDataPacket.h */; }; - 75F81AB1195B834600704164 /* PGPPublicKeyEncryptedSessionKeyPacket.h in CopyFiles */ = {isa = PBXBuildFile; fileRef = 75AE7E241941C567004DD6A5 /* PGPPublicKeyEncryptedSessionKeyPacket.h */; }; - 75F81AB2195B834600704164 /* PGPMPI.h in CopyFiles */ = {isa = PBXBuildFile; fileRef = 759DBA161915CBDF00305549 /* PGPMPI.h */; }; - 75F81AB3195B834600704164 /* PGPFingerprint.h in CopyFiles */ = {isa = PBXBuildFile; fileRef = 7562858C19239F1B00127E24 /* PGPFingerprint.h */; }; - 75F81AB4195B834600704164 /* PGPS2K.h in CopyFiles */ = {isa = PBXBuildFile; fileRef = 75DA135C191AE1D6004C9C76 /* PGPS2K.h */; }; - 75F81AB5195B834600704164 /* PGPKeyID.h in CopyFiles */ = {isa = PBXBuildFile; fileRef = 75734BD9191853DF00A54D6E /* PGPKeyID.h */; }; - 75F81AB6195B834600704164 /* PGPUser.h in CopyFiles */ = {isa = PBXBuildFile; fileRef = 7563356B19255C1A00414CCC /* PGPUser.h */; }; - 75F81AB7195B834600704164 /* PGPSubKey.h in CopyFiles */ = {isa = PBXBuildFile; fileRef = 7563356E192582CD00414CCC /* PGPSubKey.h */; }; - 75F81AB8195B834600704164 /* PGPKey.h in CopyFiles */ = {isa = PBXBuildFile; fileRef = 750EE3C21922C185009E818E /* PGPKey.h */; }; - 75F81AB9195B834600704164 /* PGPArmor.h in CopyFiles */ = {isa = PBXBuildFile; fileRef = 755456BE192843E700E5526B /* PGPArmor.h */; }; - 75F81ABA195B834600704164 /* PGPPKCSEmsa.h in CopyFiles */ = {isa = PBXBuildFile; fileRef = 7597B79A192E9C7F003ABC65 /* PGPPKCSEmsa.h */; }; - 75F81ABB195B834600704164 /* PGPPKCSEme.h in CopyFiles */ = {isa = PBXBuildFile; fileRef = 75AE7E27194224CD004DD6A5 /* PGPPKCSEme.h */; }; - 75F81ABC195B834600704164 /* PGPPublicKeyRSA.h in CopyFiles */ = {isa = PBXBuildFile; fileRef = 75B2450D1933DB89003F24A0 /* PGPPublicKeyRSA.h */; }; - 75F81ABD195B834600704164 /* PGPCryptoCFB.h in CopyFiles */ = {isa = PBXBuildFile; fileRef = 751056111940A76F00653C0B /* PGPCryptoCFB.h */; }; - 75F81ABE195B835300704164 /* ObjectivePGP.h in CopyFiles */ = {isa = PBXBuildFile; fileRef = 756299BD1914DE1A00C5AD3B /* ObjectivePGP.h */; }; - 75F81ABF195B835300704164 /* PGPTypes.h in CopyFiles */ = {isa = PBXBuildFile; fileRef = 759DBA151915BC0400305549 /* PGPTypes.h */; }; - 75F81AC0195B835300704164 /* PGPPacket.h in CopyFiles */ = {isa = PBXBuildFile; fileRef = 757DDE7A1919338700A30F84 /* PGPPacket.h */; }; - 75F81AC1195B835300704164 /* PGPSignaturePacket.h in CopyFiles */ = {isa = PBXBuildFile; fileRef = 75E7B6B919167EFF00C96BAB /* PGPSignaturePacket.h */; }; - 75F81AC2195B835300704164 /* PGPSignatureSubpacket.h in CopyFiles */ = {isa = PBXBuildFile; fileRef = 7502CEFD1916DCE9001B32D7 /* PGPSignatureSubpacket.h */; }; - 75F81AC3195B835300704164 /* PGPOnePassSignaturePacket.h in CopyFiles */ = {isa = PBXBuildFile; fileRef = 751E07341937D53900CA7946 /* PGPOnePassSignaturePacket.h */; }; - 75F81AC4195B835300704164 /* PGPPacketFactory.h in CopyFiles */ = {isa = PBXBuildFile; fileRef = 75E7B6BC19167F1700C96BAB /* PGPPacketFactory.h */; }; - 75F81AC5195B835300704164 /* PGPPublicKeyPacket.h in CopyFiles */ = {isa = PBXBuildFile; fileRef = 756299E51915AF0700C5AD3B /* PGPPublicKeyPacket.h */; }; - 75F81AC6195B835300704164 /* PGPPublicSubKeyPacket.h in CopyFiles */ = {isa = PBXBuildFile; fileRef = 75E7B6B61916493600C96BAB /* PGPPublicSubKeyPacket.h */; }; - 75F81AC7195B835300704164 /* PGPSecretKeyPacket.h in CopyFiles */ = {isa = PBXBuildFile; fileRef = 75DA1356191A4E65004C9C76 /* PGPSecretKeyPacket.h */; }; - 75F81AC8195B835300704164 /* PGPSecretSubKeyPacket.h in CopyFiles */ = {isa = PBXBuildFile; fileRef = 75DA1359191A4EA6004C9C76 /* PGPSecretSubKeyPacket.h */; }; - 75F81AC9195B835300704164 /* PGPUserIDPacket.h in CopyFiles */ = {isa = PBXBuildFile; fileRef = 7507B72619170FE3003A2DC7 /* PGPUserIDPacket.h */; }; - 75F81ACA195B835300704164 /* PGPTrustPacket.h in CopyFiles */ = {isa = PBXBuildFile; fileRef = 75734BD61918462900A54D6E /* PGPTrustPacket.h */; }; - 75F81ACB195B835300704164 /* PGPModificationDetectionCodePacket.h in CopyFiles */ = {isa = PBXBuildFile; fileRef = 75C4F0E4192163A3005401A4 /* PGPModificationDetectionCodePacket.h */; }; - 75F81ACC195B835300704164 /* PGPLiteralPacket.h in CopyFiles */ = {isa = PBXBuildFile; fileRef = 75AEC4631930B5E400974CBE /* PGPLiteralPacket.h */; }; - 75F81ACD195B835300704164 /* PGPUserAttributePacket.h in CopyFiles */ = {isa = PBXBuildFile; fileRef = 75AEC4661930FC0B00974CBE /* PGPUserAttributePacket.h */; }; - 75F81ACE195B835300704164 /* PGPUserAttributeSubpacket.h in CopyFiles */ = {isa = PBXBuildFile; fileRef = 75AEC4691930FD3000974CBE /* PGPUserAttributeSubpacket.h */; }; - 75F81ACF195B835300704164 /* PGPCompressedPacket.h in CopyFiles */ = {isa = PBXBuildFile; fileRef = 75B39528193C6FA100297C8D /* PGPCompressedPacket.h */; }; - 75F81AD0195B835300704164 /* PGPSymmetricallyEncryptedIntegrityProtectedDataPacket.h in CopyFiles */ = {isa = PBXBuildFile; fileRef = 75FE9806193FB46200613549 /* PGPSymmetricallyEncryptedIntegrityProtectedDataPacket.h */; }; - 75F81AD1195B835300704164 /* PGPSymmetricallyEncryptedDataPacket.h in CopyFiles */ = {isa = PBXBuildFile; fileRef = 753A65ED19487E3D0011A729 /* PGPSymmetricallyEncryptedDataPacket.h */; }; - 75F81AD2195B835300704164 /* PGPPublicKeyEncryptedSessionKeyPacket.h in CopyFiles */ = {isa = PBXBuildFile; fileRef = 75AE7E241941C567004DD6A5 /* PGPPublicKeyEncryptedSessionKeyPacket.h */; }; - 75F81AD3195B835300704164 /* PGPMPI.h in CopyFiles */ = {isa = PBXBuildFile; fileRef = 759DBA161915CBDF00305549 /* PGPMPI.h */; }; - 75F81AD4195B835300704164 /* PGPFingerprint.h in CopyFiles */ = {isa = PBXBuildFile; fileRef = 7562858C19239F1B00127E24 /* PGPFingerprint.h */; }; - 75F81AD5195B835300704164 /* PGPS2K.h in CopyFiles */ = {isa = PBXBuildFile; fileRef = 75DA135C191AE1D6004C9C76 /* PGPS2K.h */; }; - 75F81AD6195B835300704164 /* PGPKeyID.h in CopyFiles */ = {isa = PBXBuildFile; fileRef = 75734BD9191853DF00A54D6E /* PGPKeyID.h */; }; - 75F81AD7195B835300704164 /* PGPUser.h in CopyFiles */ = {isa = PBXBuildFile; fileRef = 7563356B19255C1A00414CCC /* PGPUser.h */; }; - 75F81AD8195B835300704164 /* PGPSubKey.h in CopyFiles */ = {isa = PBXBuildFile; fileRef = 7563356E192582CD00414CCC /* PGPSubKey.h */; }; - 75F81AD9195B835300704164 /* PGPKey.h in CopyFiles */ = {isa = PBXBuildFile; fileRef = 750EE3C21922C185009E818E /* PGPKey.h */; }; - 75F81ADA195B835300704164 /* PGPArmor.h in CopyFiles */ = {isa = PBXBuildFile; fileRef = 755456BE192843E700E5526B /* PGPArmor.h */; }; - 75F81ADB195B835300704164 /* PGPPKCSEmsa.h in CopyFiles */ = {isa = PBXBuildFile; fileRef = 7597B79A192E9C7F003ABC65 /* PGPPKCSEmsa.h */; }; - 75F81ADC195B835300704164 /* PGPPKCSEme.h in CopyFiles */ = {isa = PBXBuildFile; fileRef = 75AE7E27194224CD004DD6A5 /* PGPPKCSEme.h */; }; - 75F81ADD195B835300704164 /* PGPPublicKeyRSA.h in CopyFiles */ = {isa = PBXBuildFile; fileRef = 75B2450D1933DB89003F24A0 /* PGPPublicKeyRSA.h */; }; - 75F81ADE195B835300704164 /* PGPCryptoCFB.h in CopyFiles */ = {isa = PBXBuildFile; fileRef = 751056111940A76F00653C0B /* PGPCryptoCFB.h */; }; - 75FE9808193FB46200613549 /* PGPSymmetricallyEncryptedIntegrityProtectedDataPacket.m in Sources */ = {isa = PBXBuildFile; fileRef = 75FE9807193FB46200613549 /* PGPSymmetricallyEncryptedIntegrityProtectedDataPacket.m */; }; + 7565467C1A93452A0070F6B0 /* NSMutableData+PGP.m in Sources */ = {isa = PBXBuildFile; fileRef = 7565467B1A93452A0070F6B0 /* NSMutableData+PGP.m */; }; + 757D26D81A6AB937005CE2E3 /* PGPParser.m in Sources */ = {isa = PBXBuildFile; fileRef = 757D26D71A6AB937005CE2E3 /* PGPParser.m */; }; + 759A08161A7BAD3300C9DCE6 /* PGPSignature.m in Sources */ = {isa = PBXBuildFile; fileRef = 759A08151A7BAD3300C9DCE6 /* PGPSignature.m */; }; + 759A08191A7BB02200C9DCE6 /* PGPUser.m in Sources */ = {isa = PBXBuildFile; fileRef = 759A08181A7BB02200C9DCE6 /* PGPUser.m */; }; + 75AE759C1A93E46F003B255C /* NSData+PGP.m in Sources */ = {isa = PBXBuildFile; fileRef = 75AE759B1A93E46F003B255C /* NSData+PGP.m */; }; + 75B764B31A83BB79001E0A5B /* NSOutputStream+PGP.m in Sources */ = {isa = PBXBuildFile; fileRef = 75B764B21A83BB79001E0A5B /* NSOutputStream+PGP.m */; }; + 75C1D2B61A7E990D0035441C /* PGPMPITests.m in Sources */ = {isa = PBXBuildFile; fileRef = 75C1D2B51A7E990D0035441C /* PGPMPITests.m */; }; + 75C257DB1A6AB1870095E1A2 /* PGPMessage.m in Sources */ = {isa = PBXBuildFile; fileRef = 75C257DA1A6AB1870095E1A2 /* PGPMessage.m */; }; + 75F2DE6D1A6ADBB60084A3AE /* PGPPacketHeaderNewTests.m in Sources */ = {isa = PBXBuildFile; fileRef = 75F2DE6C1A6ADBB60084A3AE /* PGPPacketHeaderNewTests.m */; }; + 7F1FCE46C5FA594A1CD2AEAE /* libPods-ObjectivePGP.a in Frameworks */ = {isa = PBXBuildFile; fileRef = 501A20B5B542FB6B199B28C2 /* libPods-ObjectivePGP.a */; }; /* End PBXBuildFile section */ /* Begin PBXContainerItemProxy section */ - 756299CB1914DE1A00C5AD3B /* PBXContainerItemProxy */ = { + 75413BE31A6AD386004C8807 /* PBXContainerItemProxy */ = { isa = PBXContainerItemProxy; containerPortal = 756299AD1914DE1A00C5AD3B /* Project object */; proxyType = 1; remoteGlobalIDString = 756299B41914DE1A00C5AD3B; remoteInfo = ObjectivePGP; }; - 75A5D2101959834E0074A124 /* PBXContainerItemProxy */ = { - isa = PBXContainerItemProxy; - containerPortal = 756299AD1914DE1A00C5AD3B /* Project object */; - proxyType = 1; - remoteGlobalIDString = 759FF472195982A6005B240C; - remoteInfo = ObjectivePGPOSX; - }; /* End PBXContainerItemProxy section */ /* Begin PBXCopyFilesBuildPhase section */ @@ -196,258 +55,156 @@ dstPath = "include/$(PRODUCT_NAME)"; dstSubfolderSpec = 16; files = ( - 75F81A9E195B834600704164 /* PGPTypes.h in CopyFiles */, - 75F81A9F195B834600704164 /* PGPPacket.h in CopyFiles */, - 75F81AA0195B834600704164 /* PGPSignaturePacket.h in CopyFiles */, - 75F81AA1195B834600704164 /* PGPSignatureSubpacket.h in CopyFiles */, - 75F81AA2195B834600704164 /* PGPOnePassSignaturePacket.h in CopyFiles */, - 75F81AA3195B834600704164 /* PGPPacketFactory.h in CopyFiles */, - 75F81AA4195B834600704164 /* PGPPublicKeyPacket.h in CopyFiles */, - 75F81AA5195B834600704164 /* PGPPublicSubKeyPacket.h in CopyFiles */, - 75F81AA6195B834600704164 /* PGPSecretKeyPacket.h in CopyFiles */, - 75F81AA7195B834600704164 /* PGPSecretSubKeyPacket.h in CopyFiles */, - 75F81AA8195B834600704164 /* PGPUserIDPacket.h in CopyFiles */, - 75F81AA9195B834600704164 /* PGPTrustPacket.h in CopyFiles */, - 75F81AAA195B834600704164 /* PGPModificationDetectionCodePacket.h in CopyFiles */, - 75F81AAB195B834600704164 /* PGPLiteralPacket.h in CopyFiles */, - 75F81AAC195B834600704164 /* PGPUserAttributePacket.h in CopyFiles */, - 75F81AAD195B834600704164 /* PGPUserAttributeSubpacket.h in CopyFiles */, - 75F81AAE195B834600704164 /* PGPCompressedPacket.h in CopyFiles */, - 75F81AAF195B834600704164 /* PGPSymmetricallyEncryptedIntegrityProtectedDataPacket.h in CopyFiles */, - 75F81AB0195B834600704164 /* PGPSymmetricallyEncryptedDataPacket.h in CopyFiles */, - 75F81AB1195B834600704164 /* PGPPublicKeyEncryptedSessionKeyPacket.h in CopyFiles */, - 75F81AB2195B834600704164 /* PGPMPI.h in CopyFiles */, - 75F81AB3195B834600704164 /* PGPFingerprint.h in CopyFiles */, - 75F81AB4195B834600704164 /* PGPS2K.h in CopyFiles */, - 75F81AB5195B834600704164 /* PGPKeyID.h in CopyFiles */, - 75F81AB6195B834600704164 /* PGPUser.h in CopyFiles */, - 75F81AB7195B834600704164 /* PGPSubKey.h in CopyFiles */, - 75F81AB8195B834600704164 /* PGPKey.h in CopyFiles */, - 75F81AB9195B834600704164 /* PGPArmor.h in CopyFiles */, - 75F81ABA195B834600704164 /* PGPPKCSEmsa.h in CopyFiles */, - 75F81ABB195B834600704164 /* PGPPKCSEme.h in CopyFiles */, - 75F81ABC195B834600704164 /* PGPPublicKeyRSA.h in CopyFiles */, - 75F81ABD195B834600704164 /* PGPCryptoCFB.h in CopyFiles */, - 756299BE1914DE1A00C5AD3B /* ObjectivePGP.h in CopyFiles */, - ); - runOnlyForDeploymentPostprocessing = 0; - }; - 759FF46419598227005B240C /* CopyFiles */ = { - isa = PBXCopyFilesBuildPhase; - buildActionMask = 2147483647; - dstPath = /usr/share/man/man1/; - dstSubfolderSpec = 0; - files = ( - ); - runOnlyForDeploymentPostprocessing = 1; - }; - 759FF49D195982A6005B240C /* CopyFiles */ = { - isa = PBXCopyFilesBuildPhase; - buildActionMask = 2147483647; - dstPath = "include/$(PRODUCT_NAME)"; - dstSubfolderSpec = 16; - files = ( - 75F81ABE195B835300704164 /* ObjectivePGP.h in CopyFiles */, - 75F81ABF195B835300704164 /* PGPTypes.h in CopyFiles */, - 75F81AC0195B835300704164 /* PGPPacket.h in CopyFiles */, - 75F81AC1195B835300704164 /* PGPSignaturePacket.h in CopyFiles */, - 75F81AC2195B835300704164 /* PGPSignatureSubpacket.h in CopyFiles */, - 75F81AC3195B835300704164 /* PGPOnePassSignaturePacket.h in CopyFiles */, - 75F81AC4195B835300704164 /* PGPPacketFactory.h in CopyFiles */, - 75F81AC5195B835300704164 /* PGPPublicKeyPacket.h in CopyFiles */, - 75F81AC6195B835300704164 /* PGPPublicSubKeyPacket.h in CopyFiles */, - 75F81AC7195B835300704164 /* PGPSecretKeyPacket.h in CopyFiles */, - 75F81AC8195B835300704164 /* PGPSecretSubKeyPacket.h in CopyFiles */, - 75F81AC9195B835300704164 /* PGPUserIDPacket.h in CopyFiles */, - 75F81ACA195B835300704164 /* PGPTrustPacket.h in CopyFiles */, - 75F81ACB195B835300704164 /* PGPModificationDetectionCodePacket.h in CopyFiles */, - 75F81ACC195B835300704164 /* PGPLiteralPacket.h in CopyFiles */, - 75F81ACD195B835300704164 /* PGPUserAttributePacket.h in CopyFiles */, - 75F81ACE195B835300704164 /* PGPUserAttributeSubpacket.h in CopyFiles */, - 75F81ACF195B835300704164 /* PGPCompressedPacket.h in CopyFiles */, - 75F81AD0195B835300704164 /* PGPSymmetricallyEncryptedIntegrityProtectedDataPacket.h in CopyFiles */, - 75F81AD1195B835300704164 /* PGPSymmetricallyEncryptedDataPacket.h in CopyFiles */, - 75F81AD2195B835300704164 /* PGPPublicKeyEncryptedSessionKeyPacket.h in CopyFiles */, - 75F81AD3195B835300704164 /* PGPMPI.h in CopyFiles */, - 75F81AD4195B835300704164 /* PGPFingerprint.h in CopyFiles */, - 75F81AD5195B835300704164 /* PGPS2K.h in CopyFiles */, - 75F81AD6195B835300704164 /* PGPKeyID.h in CopyFiles */, - 75F81AD7195B835300704164 /* PGPUser.h in CopyFiles */, - 75F81AD8195B835300704164 /* PGPSubKey.h in CopyFiles */, - 75F81AD9195B835300704164 /* PGPKey.h in CopyFiles */, - 75F81ADA195B835300704164 /* PGPArmor.h in CopyFiles */, - 75F81ADB195B835300704164 /* PGPPKCSEmsa.h in CopyFiles */, - 75F81ADC195B835300704164 /* PGPPKCSEme.h in CopyFiles */, - 75F81ADD195B835300704164 /* PGPPublicKeyRSA.h in CopyFiles */, - 75F81ADE195B835300704164 /* PGPCryptoCFB.h in CopyFiles */, ); runOnlyForDeploymentPostprocessing = 0; }; /* End PBXCopyFilesBuildPhase section */ /* Begin PBXFileReference section */ - 059B85547F6245229D167817 /* libPods-ObjectivePGP.a */ = {isa = PBXFileReference; explicitFileType = archive.ar; includeInIndex = 0; path = "libPods-ObjectivePGP.a"; sourceTree = BUILT_PRODUCTS_DIR; }; - 074C42D0AFAD4DC7AD76CF21 /* libPods-ObjectivePGPOSX.a */ = {isa = PBXFileReference; explicitFileType = archive.ar; includeInIndex = 0; path = "libPods-ObjectivePGPOSX.a"; sourceTree = BUILT_PRODUCTS_DIR; }; - 4AFC8E128B0F4211888984C0 /* libPods.a */ = {isa = PBXFileReference; explicitFileType = archive.ar; includeInIndex = 0; path = libPods.a; sourceTree = BUILT_PRODUCTS_DIR; }; - 5A0AFDB5EA2347299F403C04 /* Pods-ObjectivePGP.xcconfig */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = text.xcconfig; name = "Pods-ObjectivePGP.xcconfig"; path = "Pods/Pods-ObjectivePGP.xcconfig"; sourceTree = ""; }; - 750016A819C22E7100EAF308 /* secring-test-plaintext-encrypted-message.asc */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = text; path = "secring-test-plaintext-encrypted-message.asc"; sourceTree = ""; }; - 7502CEFD1916DCE9001B32D7 /* PGPSignatureSubpacket.h */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.h; path = PGPSignatureSubpacket.h; sourceTree = ""; }; - 7502CEFE1916DCE9001B32D7 /* PGPSignatureSubpacket.m */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.objc; path = PGPSignatureSubpacket.m; sourceTree = ""; }; - 75040AB11926BB35000CEA93 /* ObjectivePGPTestArmor.m */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.objc; path = ObjectivePGPTestArmor.m; sourceTree = ""; }; - 7507B72619170FE3003A2DC7 /* PGPUserIDPacket.h */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.h; path = PGPUserIDPacket.h; sourceTree = ""; }; - 7507B72719170FE3003A2DC7 /* PGPUserIDPacket.m */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.objc; path = PGPUserIDPacket.m; sourceTree = ""; }; + 342510E82279C69DE5EEF7FD /* Pods-ObjectivePGP.release.xcconfig */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = text.xcconfig; name = "Pods-ObjectivePGP.release.xcconfig"; path = "Pods/Target Support Files/Pods-ObjectivePGP/Pods-ObjectivePGP.release.xcconfig"; sourceTree = ""; }; + 501A20B5B542FB6B199B28C2 /* libPods-ObjectivePGP.a */ = {isa = PBXFileReference; explicitFileType = archive.ar; includeInIndex = 0; path = "libPods-ObjectivePGP.a"; sourceTree = BUILT_PRODUCTS_DIR; }; 750BD0D7193F5AAD005B9840 /* libz.dylib */ = {isa = PBXFileReference; lastKnownFileType = "compiled.mach-o.dylib"; name = libz.dylib; path = usr/lib/libz.dylib; sourceTree = SDKROOT; }; - 750EE3C21922C185009E818E /* PGPKey.h */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.h; path = PGPKey.h; sourceTree = ""; }; - 750EE3C31922C185009E818E /* PGPKey.m */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.objc; path = PGPKey.m; sourceTree = ""; }; - 751056111940A76F00653C0B /* PGPCryptoCFB.h */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.h; path = PGPCryptoCFB.h; sourceTree = ""; }; - 751056121940A76F00653C0B /* PGPCryptoCFB.m */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.objc; path = PGPCryptoCFB.m; sourceTree = ""; }; - 751E07341937D53900CA7946 /* PGPOnePassSignaturePacket.h */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.h; path = PGPOnePassSignaturePacket.h; sourceTree = ""; }; - 751E07351937D53900CA7946 /* PGPOnePassSignaturePacket.m */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.objc; path = PGPOnePassSignaturePacket.m; sourceTree = ""; }; - 753A65ED19487E3D0011A729 /* PGPSymmetricallyEncryptedDataPacket.h */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.h; path = PGPSymmetricallyEncryptedDataPacket.h; sourceTree = ""; }; - 753A65EE19487E3D0011A729 /* PGPSymmetricallyEncryptedDataPacket.m */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.objc; path = PGPSymmetricallyEncryptedDataPacket.m; sourceTree = ""; }; - 755456BE192843E700E5526B /* PGPArmor.h */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.h; path = PGPArmor.h; sourceTree = ""; }; - 755456BF192843E700E5526B /* PGPArmor.m */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.objc; path = PGPArmor.m; sourceTree = ""; }; + 752CB2BB1A6FA3EB007292F2 /* PGPFunctions.h */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.h; name = PGPFunctions.h; path = Helpers/PGPFunctions.h; sourceTree = ""; }; + 752CB2BC1A6FA3EB007292F2 /* PGPFunctions.m */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.objc; name = PGPFunctions.m; path = Helpers/PGPFunctions.m; sourceTree = ""; }; + 75321D721A6F056C00F8FE95 /* PGPSignatureSubpacket.h */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.h; path = PGPSignatureSubpacket.h; sourceTree = ""; }; + 75321D731A6F056C00F8FE95 /* PGPSignatureSubpacket.m */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.objc; path = PGPSignatureSubpacket.m; sourceTree = ""; }; + 75321D751A6F135000F8FE95 /* PGPKeyID.h */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.h; path = PGPKeyID.h; sourceTree = ""; }; + 75321D761A6F135000F8FE95 /* PGPKeyID.m */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.objc; path = PGPKeyID.m; sourceTree = ""; }; + 75321D7B1A6F16EB00F8FE95 /* PGPSignaturePacketTests.m */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.objc; path = PGPSignaturePacketTests.m; sourceTree = ""; }; + 75413BDC1A6AD386004C8807 /* ObjectivePGPTests.xctest */ = {isa = PBXFileReference; explicitFileType = wrapper.cfbundle; includeInIndex = 0; path = ObjectivePGPTests.xctest; sourceTree = BUILT_PRODUCTS_DIR; }; + 75413BDF1A6AD386004C8807 /* Info.plist */ = {isa = PBXFileReference; lastKnownFileType = text.plist.xml; path = Info.plist; sourceTree = ""; }; + 75413BE01A6AD386004C8807 /* PGPPacketHeaderOldTests.m */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.c.objc; path = PGPPacketHeaderOldTests.m; sourceTree = ""; }; + 755046681A6BEC78008E5203 /* PGPPacketHeader.h */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.h; path = PGPPacketHeader.h; sourceTree = ""; }; + 755046691A6BEC78008E5203 /* PGPPacketHeader.m */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.objc; path = PGPPacketHeader.m; sourceTree = ""; }; + 755046711A6C11F1008E5203 /* NSInputStream+PGP.h */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.h; name = "NSInputStream+PGP.h"; path = "Categories/NSInputStream+PGP.h"; sourceTree = ""; }; + 755046721A6C11F1008E5203 /* NSInputStream+PGP.m */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.objc; name = "NSInputStream+PGP.m"; path = "Categories/NSInputStream+PGP.m"; sourceTree = ""; }; + 755046751A6C1CD0008E5203 /* NSInputStream+PGPTests.h */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.h; path = "NSInputStream+PGPTests.h"; sourceTree = ""; }; + 755046761A6C1CD0008E5203 /* NSInputStream+PGPTests.m */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.objc; path = "NSInputStream+PGPTests.m"; sourceTree = ""; }; + 755046781A6C625C008E5203 /* PGPPublicKeyPacket.h */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.h; name = PGPPublicKeyPacket.h; path = Packets/PGPPublicKeyPacket.h; sourceTree = ""; }; + 755046791A6C625C008E5203 /* PGPPublicKeyPacket.m */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.objc; name = PGPPublicKeyPacket.m; path = Packets/PGPPublicKeyPacket.m; sourceTree = ""; }; + 7550467C1A6C6861008E5203 /* PGPMPI.h */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.h; path = PGPMPI.h; sourceTree = ""; }; + 7550467D1A6C6861008E5203 /* PGPMPI.m */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.objc; path = PGPMPI.m; sourceTree = ""; }; + 7550467F1A6C6D15008E5203 /* PGPPublicKeyPacketTests.m */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.objc; path = PGPPublicKeyPacketTests.m; sourceTree = ""; }; + 755046811A6C6F3C008E5203 /* PGPInputStreamCategoryTests.m */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.objc; path = PGPInputStreamCategoryTests.m; sourceTree = ""; }; + 755046831A6C76AA008E5203 /* PGPParserTests.m */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.objc; path = PGPParserTests.m; sourceTree = ""; }; + 755046851A6C7970008E5203 /* PGPSignaturePacket.h */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.h; name = PGPSignaturePacket.h; path = Packets/PGPSignaturePacket.h; sourceTree = ""; }; + 755046861A6C7970008E5203 /* PGPSignaturePacket.m */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.objc; name = PGPSignaturePacket.m; path = Packets/PGPSignaturePacket.m; sourceTree = ""; }; + 7550468B1A6C799A008E5203 /* PGPUserIDPacket.h */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.h; name = PGPUserIDPacket.h; path = Packets/PGPUserIDPacket.h; sourceTree = ""; }; + 7550468C1A6C799A008E5203 /* PGPUserIDPacket.m */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.objc; name = PGPUserIDPacket.m; path = Packets/PGPUserIDPacket.m; sourceTree = ""; }; + 7550468E1A6C873B008E5203 /* PGPKey.h */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.h; path = PGPKey.h; sourceTree = ""; }; + 7550468F1A6C873B008E5203 /* PGPKey.m */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.objc; path = PGPKey.m; sourceTree = ""; }; + 755046911A6C891B008E5203 /* PGPSubKey.h */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.h; path = PGPSubKey.h; sourceTree = ""; }; + 755046921A6C891B008E5203 /* PGPSubKey.m */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.objc; path = PGPSubKey.m; sourceTree = ""; }; 7556464A1958FF6F00BFA34C /* libbz2.dylib */ = {isa = PBXFileReference; lastKnownFileType = "compiled.mach-o.dylib"; name = libbz2.dylib; path = usr/lib/libbz2.dylib; sourceTree = SDKROOT; }; - 7562858C19239F1B00127E24 /* PGPFingerprint.h */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.h; path = PGPFingerprint.h; sourceTree = ""; }; - 7562858D19239F1B00127E24 /* PGPFingerprint.m */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.objc; path = PGPFingerprint.m; sourceTree = ""; }; 756299B51914DE1A00C5AD3B /* libObjectivePGP.a */ = {isa = PBXFileReference; explicitFileType = archive.ar; includeInIndex = 0; path = libObjectivePGP.a; sourceTree = BUILT_PRODUCTS_DIR; }; 756299B81914DE1A00C5AD3B /* Foundation.framework */ = {isa = PBXFileReference; lastKnownFileType = wrapper.framework; name = Foundation.framework; path = System/Library/Frameworks/Foundation.framework; sourceTree = SDKROOT; }; 756299BC1914DE1A00C5AD3B /* ObjectivePGP-Prefix.pch */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.c.h; path = "ObjectivePGP-Prefix.pch"; sourceTree = ""; }; - 756299BD1914DE1A00C5AD3B /* ObjectivePGP.h */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.c.h; lineEnding = 0; path = ObjectivePGP.h; sourceTree = ""; xcLanguageSpecificationIdentifier = xcode.lang.objcpp; }; - 756299BF1914DE1A00C5AD3B /* ObjectivePGP.m */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.c.objc; lineEnding = 0; path = ObjectivePGP.m; sourceTree = ""; xcLanguageSpecificationIdentifier = xcode.lang.objc; }; - 756299C51914DE1A00C5AD3B /* ObjectivePGPTests.xctest */ = {isa = PBXFileReference; explicitFileType = wrapper.cfbundle; includeInIndex = 0; path = ObjectivePGPTests.xctest; sourceTree = BUILT_PRODUCTS_DIR; }; - 756299C61914DE1A00C5AD3B /* XCTest.framework */ = {isa = PBXFileReference; lastKnownFileType = wrapper.framework; name = XCTest.framework; path = Library/Frameworks/XCTest.framework; sourceTree = DEVELOPER_DIR; }; - 756299C91914DE1A00C5AD3B /* UIKit.framework */ = {isa = PBXFileReference; lastKnownFileType = wrapper.framework; name = UIKit.framework; path = Library/Frameworks/UIKit.framework; sourceTree = DEVELOPER_DIR; }; - 756299D01914DE1A00C5AD3B /* ObjectivePGPTests-Info.plist */ = {isa = PBXFileReference; lastKnownFileType = text.plist.xml; path = "ObjectivePGPTests-Info.plist"; sourceTree = ""; }; - 756299D21914DE1A00C5AD3B /* en */ = {isa = PBXFileReference; lastKnownFileType = text.plist.strings; name = en; path = en.lproj/InfoPlist.strings; sourceTree = ""; }; - 756299D41914DE1A00C5AD3B /* ObjectivePGPTests.m */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.c.objc; lineEnding = 0; path = ObjectivePGPTests.m; sourceTree = ""; xcLanguageSpecificationIdentifier = xcode.lang.objc; }; - 756299E51915AF0700C5AD3B /* PGPPublicKeyPacket.h */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.h; path = PGPPublicKeyPacket.h; sourceTree = ""; }; - 756299E61915AF0700C5AD3B /* PGPPublicKeyPacket.m */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.objc; path = PGPPublicKeyPacket.m; sourceTree = ""; }; - 7563356B19255C1A00414CCC /* PGPUser.h */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.h; path = PGPUser.h; sourceTree = ""; }; - 7563356C19255C1A00414CCC /* PGPUser.m */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.objc; path = PGPUser.m; sourceTree = ""; }; - 7563356E192582CD00414CCC /* PGPSubKey.h */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.h; path = PGPSubKey.h; sourceTree = ""; }; - 7563356F192582CD00414CCC /* PGPSubKey.m */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.objc; path = PGPSubKey.m; sourceTree = ""; }; - 7563357219258F1700414CCC /* pubring-test-encrypted.gpg */ = {isa = PBXFileReference; lastKnownFileType = file; path = "pubring-test-encrypted.gpg"; sourceTree = ""; }; - 7563357319258F1700414CCC /* pubring-test-plaintext.gpg */ = {isa = PBXFileReference; lastKnownFileType = file; path = "pubring-test-plaintext.gpg"; sourceTree = ""; }; - 7563357419258F1700414CCC /* secring-test-encrypted.gpg */ = {isa = PBXFileReference; lastKnownFileType = file; path = "secring-test-encrypted.gpg"; sourceTree = ""; }; - 7563357519258F1700414CCC /* secring-test-plaintext.gpg */ = {isa = PBXFileReference; lastKnownFileType = file; path = "secring-test-plaintext.gpg"; sourceTree = ""; }; - 7563357A19258F7100414CCC /* ObjectivePGPTestKeyringSecurePlaintext.m */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.objc; path = ObjectivePGPTestKeyringSecurePlaintext.m; sourceTree = ""; }; - 7563357C1925936900414CCC /* ObjectivePGPTestKeyringSecureEncrypted.m */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.objc; path = ObjectivePGPTestKeyringSecureEncrypted.m; sourceTree = ""; }; - 75734BD019181E5500A54D6E /* PGPPacketFactory.m */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.objc; path = PGPPacketFactory.m; sourceTree = ""; }; - 75734BD61918462900A54D6E /* PGPTrustPacket.h */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.h; path = PGPTrustPacket.h; sourceTree = ""; }; - 75734BD71918462900A54D6E /* PGPTrustPacket.m */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.objc; path = PGPTrustPacket.m; sourceTree = ""; }; - 75734BD9191853DF00A54D6E /* PGPKeyID.h */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.h; path = PGPKeyID.h; sourceTree = ""; }; - 75734BDA191853DF00A54D6E /* PGPKeyID.m */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.objc; path = PGPKeyID.m; sourceTree = ""; }; - 757DDE7A1919338700A30F84 /* PGPPacket.h */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.h; path = PGPPacket.h; sourceTree = ""; }; - 757DDE7B1919371600A30F84 /* PGPPacket.m */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.objc; path = PGPPacket.m; sourceTree = ""; }; + 7565467A1A93452A0070F6B0 /* NSMutableData+PGP.h */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.h; path = "NSMutableData+PGP.h"; sourceTree = ""; }; + 7565467B1A93452A0070F6B0 /* NSMutableData+PGP.m */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.objc; path = "NSMutableData+PGP.m"; sourceTree = ""; }; + 757D26D61A6AB937005CE2E3 /* PGPParser.h */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.h; path = PGPParser.h; sourceTree = ""; }; + 757D26D71A6AB937005CE2E3 /* PGPParser.m */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.objc; path = PGPParser.m; sourceTree = ""; }; + 757D26E51A6AC605005CE2E3 /* PGPCommon.h */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.h; path = PGPCommon.h; sourceTree = ""; }; 758475E1195AF866003953B2 /* README.md */ = {isa = PBXFileReference; lastKnownFileType = text; path = README.md; sourceTree = ""; }; - 758F3A18192935C7009307AD /* NSValue+PGPUtils.h */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.h; path = "NSValue+PGPUtils.h"; sourceTree = ""; }; - 758F3A19192935C7009307AD /* NSValue+PGPUtils.m */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.objc; path = "NSValue+PGPUtils.m"; sourceTree = ""; }; - 7597B79A192E9C7F003ABC65 /* PGPPKCSEmsa.h */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.h; path = PGPPKCSEmsa.h; sourceTree = ""; }; - 7597B79B192E9C7F003ABC65 /* PGPPKCSEmsa.m */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.objc; path = PGPPKCSEmsa.m; sourceTree = ""; }; - 759DBA121915B5BD00305549 /* NSData+PGPUtils.h */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.h; lineEnding = 0; path = "NSData+PGPUtils.h"; sourceTree = ""; xcLanguageSpecificationIdentifier = xcode.lang.objcpp; }; - 759DBA131915B5BD00305549 /* NSData+PGPUtils.m */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.objc; lineEnding = 0; path = "NSData+PGPUtils.m"; sourceTree = ""; xcLanguageSpecificationIdentifier = xcode.lang.objc; }; - 759DBA151915BC0400305549 /* PGPTypes.h */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.h; path = PGPTypes.h; sourceTree = ""; }; - 759DBA161915CBDF00305549 /* PGPMPI.h */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.h; path = PGPMPI.h; sourceTree = ""; }; - 759DBA171915CBDF00305549 /* PGPMPI.m */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.objc; path = PGPMPI.m; sourceTree = ""; }; - 759FF46619598227005B240C /* opgp */ = {isa = PBXFileReference; explicitFileType = "compiled.mach-o.executable"; includeInIndex = 0; path = opgp; sourceTree = BUILT_PRODUCTS_DIR; }; - 759FF46819598227005B240C /* main.m */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.c.objc; path = main.m; sourceTree = ""; }; + 759A08141A7BAD3300C9DCE6 /* PGPSignature.h */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.h; path = PGPSignature.h; sourceTree = ""; }; + 759A08151A7BAD3300C9DCE6 /* PGPSignature.m */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.objc; path = PGPSignature.m; sourceTree = ""; }; + 759A08171A7BB02200C9DCE6 /* PGPUser.h */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.h; path = PGPUser.h; sourceTree = ""; }; + 759A08181A7BB02200C9DCE6 /* PGPUser.m */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.objc; path = PGPUser.m; sourceTree = ""; }; 759FF46E19598248005B240C /* libz.dylib */ = {isa = PBXFileReference; lastKnownFileType = "compiled.mach-o.dylib"; name = libz.dylib; path = Platforms/MacOSX.platform/Developer/SDKs/MacOSX10.10.sdk/usr/lib/libz.dylib; sourceTree = DEVELOPER_DIR; }; 759FF4701959824E005B240C /* libbz2.dylib */ = {isa = PBXFileReference; lastKnownFileType = "compiled.mach-o.dylib"; name = libbz2.dylib; path = Platforms/MacOSX.platform/Developer/SDKs/MacOSX10.10.sdk/usr/lib/libbz2.dylib; sourceTree = DEVELOPER_DIR; }; - 759FF4A3195982A6005B240C /* libObjectivePGP.a */ = {isa = PBXFileReference; explicitFileType = archive.ar; includeInIndex = 0; path = libObjectivePGP.a; sourceTree = BUILT_PRODUCTS_DIR; }; - 75A5C152193CE3F6008A2543 /* NSData+compression.h */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.h; path = "NSData+compression.h"; sourceTree = ""; }; - 75A5C153193CE3F6008A2543 /* NSData+compression.m */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.objc; path = "NSData+compression.m"; sourceTree = ""; }; - 75AE7E241941C567004DD6A5 /* PGPPublicKeyEncryptedSessionKeyPacket.h */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.h; path = PGPPublicKeyEncryptedSessionKeyPacket.h; sourceTree = ""; }; - 75AE7E251941C567004DD6A5 /* PGPPublicKeyEncryptedSessionKeyPacket.m */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.objc; path = PGPPublicKeyEncryptedSessionKeyPacket.m; sourceTree = ""; }; - 75AE7E27194224CD004DD6A5 /* PGPPKCSEme.h */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.h; path = PGPPKCSEme.h; sourceTree = ""; }; - 75AE7E28194224CD004DD6A5 /* PGPPKCSEme.m */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.objc; path = PGPPKCSEme.m; sourceTree = ""; }; - 75AEC4631930B5E400974CBE /* PGPLiteralPacket.h */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.h; path = PGPLiteralPacket.h; sourceTree = ""; }; - 75AEC4641930B5E400974CBE /* PGPLiteralPacket.m */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.objc; path = PGPLiteralPacket.m; sourceTree = ""; }; - 75AEC4661930FC0B00974CBE /* PGPUserAttributePacket.h */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.h; path = PGPUserAttributePacket.h; sourceTree = ""; }; - 75AEC4671930FC0B00974CBE /* PGPUserAttributePacket.m */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.objc; path = PGPUserAttributePacket.m; sourceTree = ""; }; - 75AEC4691930FD3000974CBE /* PGPUserAttributeSubpacket.h */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.h; path = PGPUserAttributeSubpacket.h; sourceTree = ""; }; - 75AEC46A1930FD3000974CBE /* PGPUserAttributeSubpacket.m */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.objc; path = PGPUserAttributeSubpacket.m; sourceTree = ""; }; - 75B2450D1933DB89003F24A0 /* PGPPublicKeyRSA.h */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.h; path = PGPPublicKeyRSA.h; sourceTree = ""; }; - 75B2450E1933DB89003F24A0 /* PGPPublicKeyRSA.m */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.objc; path = PGPPublicKeyRSA.m; sourceTree = ""; }; - 75B39528193C6FA100297C8D /* PGPCompressedPacket.h */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.h; path = PGPCompressedPacket.h; sourceTree = ""; }; - 75B39529193C6FA100297C8D /* PGPCompressedPacket.m */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.objc; path = PGPCompressedPacket.m; sourceTree = ""; }; - 75C4F0E11920FF5F005401A4 /* PGPCryptoUtils.h */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.h; lineEnding = 0; path = PGPCryptoUtils.h; sourceTree = ""; xcLanguageSpecificationIdentifier = xcode.lang.objcpp; }; - 75C4F0E21920FF5F005401A4 /* PGPCryptoUtils.m */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.objc; path = PGPCryptoUtils.m; sourceTree = ""; }; - 75C4F0E4192163A3005401A4 /* PGPModificationDetectionCodePacket.h */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.h; path = PGPModificationDetectionCodePacket.h; sourceTree = ""; }; - 75C4F0E5192163A3005401A4 /* PGPModificationDetectionCodePacket.m */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.objc; path = PGPModificationDetectionCodePacket.m; sourceTree = ""; }; - 75D53ADE1A2FCDEE00ED9707 /* multiple-keys.asc */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = text; path = "multiple-keys.asc"; sourceTree = ""; }; - 75DA1356191A4E65004C9C76 /* PGPSecretKeyPacket.h */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.h; path = PGPSecretKeyPacket.h; sourceTree = ""; }; - 75DA1357191A4E65004C9C76 /* PGPSecretKeyPacket.m */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.objc; path = PGPSecretKeyPacket.m; sourceTree = ""; }; - 75DA1359191A4EA6004C9C76 /* PGPSecretSubKeyPacket.h */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.h; path = PGPSecretSubKeyPacket.h; sourceTree = ""; }; - 75DA135A191A4EA6004C9C76 /* PGPSecretSubKeyPacket.m */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.objc; path = PGPSecretSubKeyPacket.m; sourceTree = ""; }; - 75DA135C191AE1D6004C9C76 /* PGPS2K.h */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.h; path = PGPS2K.h; sourceTree = ""; }; - 75DA135D191AE1D6004C9C76 /* PGPS2K.m */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.objc; path = PGPS2K.m; sourceTree = ""; }; - 75E7B6B61916493600C96BAB /* PGPPublicSubKeyPacket.h */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.h; path = PGPPublicSubKeyPacket.h; sourceTree = ""; }; - 75E7B6B71916493600C96BAB /* PGPPublicSubKeyPacket.m */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.objc; path = PGPPublicSubKeyPacket.m; sourceTree = ""; }; - 75E7B6B919167EFF00C96BAB /* PGPSignaturePacket.h */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.h; path = PGPSignaturePacket.h; sourceTree = ""; }; - 75E7B6BA19167EFF00C96BAB /* PGPSignaturePacket.m */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.objc; path = PGPSignaturePacket.m; sourceTree = ""; }; - 75E7B6BC19167F1700C96BAB /* PGPPacketFactory.h */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.h; path = PGPPacketFactory.h; sourceTree = ""; }; - 75FE9806193FB46200613549 /* PGPSymmetricallyEncryptedIntegrityProtectedDataPacket.h */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.h; path = PGPSymmetricallyEncryptedIntegrityProtectedDataPacket.h; sourceTree = ""; }; - 75FE9807193FB46200613549 /* PGPSymmetricallyEncryptedIntegrityProtectedDataPacket.m */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.objc; path = PGPSymmetricallyEncryptedIntegrityProtectedDataPacket.m; sourceTree = ""; }; - D75D077981B34151BBB42CF2 /* Pods-ObjectivePGPOSX.xcconfig */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = text.xcconfig; name = "Pods-ObjectivePGPOSX.xcconfig"; path = "Pods/Pods-ObjectivePGPOSX.xcconfig"; sourceTree = ""; }; + 75AE759A1A93E46F003B255C /* NSData+PGP.h */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.h; name = "NSData+PGP.h"; path = "Categories/NSData+PGP.h"; sourceTree = ""; }; + 75AE759B1A93E46F003B255C /* NSData+PGP.m */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.objc; name = "NSData+PGP.m"; path = "Categories/NSData+PGP.m"; sourceTree = ""; }; + 75B764B11A83BB79001E0A5B /* NSOutputStream+PGP.h */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.h; name = "NSOutputStream+PGP.h"; path = "Categories/NSOutputStream+PGP.h"; sourceTree = ""; }; + 75B764B21A83BB79001E0A5B /* NSOutputStream+PGP.m */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.objc; name = "NSOutputStream+PGP.m"; path = "Categories/NSOutputStream+PGP.m"; sourceTree = ""; }; + 75C1D2B51A7E990D0035441C /* PGPMPITests.m */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.objc; path = PGPMPITests.m; sourceTree = ""; }; + 75C257D91A6AB1870095E1A2 /* PGPMessage.h */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.h; path = PGPMessage.h; sourceTree = ""; }; + 75C257DA1A6AB1870095E1A2 /* PGPMessage.m */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.objc; path = PGPMessage.m; sourceTree = ""; }; + 75F2DE6C1A6ADBB60084A3AE /* PGPPacketHeaderNewTests.m */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.objc; path = PGPPacketHeaderNewTests.m; sourceTree = ""; }; + 92AB78D2428FF47CA4E3EEE9 /* Pods-ObjectivePGP.debug.xcconfig */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = text.xcconfig; name = "Pods-ObjectivePGP.debug.xcconfig"; path = "Pods/Target Support Files/Pods-ObjectivePGP/Pods-ObjectivePGP.debug.xcconfig"; sourceTree = ""; }; /* End PBXFileReference section */ /* Begin PBXFrameworksBuildPhase section */ - 756299B21914DE1A00C5AD3B /* Frameworks */ = { + 75413BD91A6AD386004C8807 /* Frameworks */ = { isa = PBXFrameworksBuildPhase; buildActionMask = 2147483647; files = ( - 756299B91914DE1A00C5AD3B /* Foundation.framework in Frameworks */, + 75413BE21A6AD386004C8807 /* libObjectivePGP.a in Frameworks */, + 7F1FCE46C5FA594A1CD2AEAE /* libPods-ObjectivePGP.a in Frameworks */, ); runOnlyForDeploymentPostprocessing = 0; }; - 756299C21914DE1A00C5AD3B /* Frameworks */ = { + 756299B21914DE1A00C5AD3B /* Frameworks */ = { isa = PBXFrameworksBuildPhase; buildActionMask = 2147483647; files = ( - 756299C71914DE1A00C5AD3B /* XCTest.framework in Frameworks */, - 756299CA1914DE1A00C5AD3B /* UIKit.framework in Frameworks */, - 756299C81914DE1A00C5AD3B /* Foundation.framework in Frameworks */, - 750BD0D9193F5AC3005B9840 /* libz.dylib in Frameworks */, - 7556464B1958FF6F00BFA34C /* libbz2.dylib in Frameworks */, - 7580828A1986AFA200348D0D /* libObjectivePGP.a in Frameworks */, - 713B6813B2DD45E5B30B5EA1 /* libPods-ObjectivePGP.a in Frameworks */, + 756299B91914DE1A00C5AD3B /* Foundation.framework in Frameworks */, ); runOnlyForDeploymentPostprocessing = 0; }; - 759FF46319598227005B240C /* Frameworks */ = { - isa = PBXFrameworksBuildPhase; - buildActionMask = 2147483647; - files = ( - 75A5D20F195983430074A124 /* libObjectivePGP.a in Frameworks */, - 759FF4711959824E005B240C /* libbz2.dylib in Frameworks */, - 759FF46F19598248005B240C /* libz.dylib in Frameworks */, - 38AF05C782074E1E9B286C11 /* libPods-ObjectivePGPOSX.a in Frameworks */, +/* End PBXFrameworksBuildPhase section */ + +/* Begin PBXGroup section */ + 752CB2BE1A6FA3F0007292F2 /* Helpers */ = { + isa = PBXGroup; + children = ( + 752CB2BB1A6FA3EB007292F2 /* PGPFunctions.h */, + 752CB2BC1A6FA3EB007292F2 /* PGPFunctions.m */, ); - runOnlyForDeploymentPostprocessing = 0; + name = Helpers; + sourceTree = ""; }; - 759FF49A195982A6005B240C /* Frameworks */ = { - isa = PBXFrameworksBuildPhase; - buildActionMask = 2147483647; - files = ( - 759FF49B195982A6005B240C /* Foundation.framework in Frameworks */, + 75413BDD1A6AD386004C8807 /* ObjectivePGPTests */ = { + isa = PBXGroup; + children = ( + 75C1D2B51A7E990D0035441C /* PGPMPITests.m */, + 755046751A6C1CD0008E5203 /* NSInputStream+PGPTests.h */, + 755046761A6C1CD0008E5203 /* NSInputStream+PGPTests.m */, + 755046811A6C6F3C008E5203 /* PGPInputStreamCategoryTests.m */, + 75413BE01A6AD386004C8807 /* PGPPacketHeaderOldTests.m */, + 75F2DE6C1A6ADBB60084A3AE /* PGPPacketHeaderNewTests.m */, + 7550467F1A6C6D15008E5203 /* PGPPublicKeyPacketTests.m */, + 75321D7B1A6F16EB00F8FE95 /* PGPSignaturePacketTests.m */, + 755046831A6C76AA008E5203 /* PGPParserTests.m */, + 75413BDE1A6AD386004C8807 /* Supporting Files */, ); - runOnlyForDeploymentPostprocessing = 0; + path = ObjectivePGPTests; + sourceTree = ""; }; -/* End PBXFrameworksBuildPhase section */ - -/* Begin PBXGroup section */ - 7507B72519170E6D003A2DC7 /* PGPSignature */ = { + 75413BDE1A6AD386004C8807 /* Supporting Files */ = { + isa = PBXGroup; + children = ( + 75413BDF1A6AD386004C8807 /* Info.plist */, + ); + name = "Supporting Files"; + sourceTree = ""; + }; + 755046741A6C11F6008E5203 /* Categories */ = { + isa = PBXGroup; + children = ( + 755046711A6C11F1008E5203 /* NSInputStream+PGP.h */, + 755046721A6C11F1008E5203 /* NSInputStream+PGP.m */, + 75B764B11A83BB79001E0A5B /* NSOutputStream+PGP.h */, + 75B764B21A83BB79001E0A5B /* NSOutputStream+PGP.m */, + 7565467A1A93452A0070F6B0 /* NSMutableData+PGP.h */, + 7565467B1A93452A0070F6B0 /* NSMutableData+PGP.m */, + 75AE759A1A93E46F003B255C /* NSData+PGP.h */, + 75AE759B1A93E46F003B255C /* NSData+PGP.m */, + ); + name = Categories; + sourceTree = ""; + }; + 7550467B1A6C6260008E5203 /* Packets */ = { isa = PBXGroup; children = ( - 75E7B6B919167EFF00C96BAB /* PGPSignaturePacket.h */, - 75E7B6BA19167EFF00C96BAB /* PGPSignaturePacket.m */, - 7502CEFD1916DCE9001B32D7 /* PGPSignatureSubpacket.h */, - 7502CEFE1916DCE9001B32D7 /* PGPSignatureSubpacket.m */, - 751E07341937D53900CA7946 /* PGPOnePassSignaturePacket.h */, - 751E07351937D53900CA7946 /* PGPOnePassSignaturePacket.m */, + 755046781A6C625C008E5203 /* PGPPublicKeyPacket.h */, + 755046791A6C625C008E5203 /* PGPPublicKeyPacket.m */, + 7550468B1A6C799A008E5203 /* PGPUserIDPacket.h */, + 7550468C1A6C799A008E5203 /* PGPUserIDPacket.m */, + 755046851A6C7970008E5203 /* PGPSignaturePacket.h */, + 755046861A6C7970008E5203 /* PGPSignaturePacket.m */, + 75321D721A6F056C00F8FE95 /* PGPSignatureSubpacket.h */, + 75321D731A6F056C00F8FE95 /* PGPSignatureSubpacket.m */, ); - name = PGPSignature; + name = Packets; sourceTree = ""; }; 756299AC1914DE1A00C5AD3B = { @@ -455,12 +212,10 @@ children = ( 758475E1195AF866003953B2 /* README.md */, 756299BA1914DE1A00C5AD3B /* ObjectivePGP */, - 756299CE1914DE1A00C5AD3B /* ObjectivePGPTests */, - 759FF46719598227005B240C /* opgp */, + 75413BDD1A6AD386004C8807 /* ObjectivePGPTests */, 756299B71914DE1A00C5AD3B /* Frameworks */, 756299B61914DE1A00C5AD3B /* Products */, - 5A0AFDB5EA2347299F403C04 /* Pods-ObjectivePGP.xcconfig */, - D75D077981B34151BBB42CF2 /* Pods-ObjectivePGPOSX.xcconfig */, + 93BEB2532C682A75D6CE6DD2 /* Pods */, ); sourceTree = ""; }; @@ -468,9 +223,7 @@ isa = PBXGroup; children = ( 756299B51914DE1A00C5AD3B /* libObjectivePGP.a */, - 756299C51914DE1A00C5AD3B /* ObjectivePGPTests.xctest */, - 759FF46619598227005B240C /* opgp */, - 759FF4A3195982A6005B240C /* libObjectivePGP.a */, + 75413BDC1A6AD386004C8807 /* ObjectivePGPTests.xctest */, ); name = Products; sourceTree = ""; @@ -483,11 +236,7 @@ 7556464A1958FF6F00BFA34C /* libbz2.dylib */, 750BD0D7193F5AAD005B9840 /* libz.dylib */, 756299B81914DE1A00C5AD3B /* Foundation.framework */, - 756299C61914DE1A00C5AD3B /* XCTest.framework */, - 756299C91914DE1A00C5AD3B /* UIKit.framework */, - 4AFC8E128B0F4211888984C0 /* libPods.a */, - 059B85547F6245229D167817 /* libPods-ObjectivePGP.a */, - 074C42D0AFAD4DC7AD76CF21 /* libPods-ObjectivePGPOSX.a */, + 501A20B5B542FB6B199B28C2 /* libPods-ObjectivePGP.a */, ); name = Frameworks; sourceTree = ""; @@ -495,35 +244,28 @@ 756299BA1914DE1A00C5AD3B /* ObjectivePGP */ = { isa = PBXGroup; children = ( - 75E7B6B41916478000C96BAB /* Utility */, - 756299BD1914DE1A00C5AD3B /* ObjectivePGP.h */, - 756299BF1914DE1A00C5AD3B /* ObjectivePGP.m */, - 759DBA151915BC0400305549 /* PGPTypes.h */, - 75E7B6B51916478D00C96BAB /* Packets */, - 759DBA161915CBDF00305549 /* PGPMPI.h */, - 759DBA171915CBDF00305549 /* PGPMPI.m */, - 7562858C19239F1B00127E24 /* PGPFingerprint.h */, - 7562858D19239F1B00127E24 /* PGPFingerprint.m */, - 75DA135C191AE1D6004C9C76 /* PGPS2K.h */, - 75DA135D191AE1D6004C9C76 /* PGPS2K.m */, - 75734BD9191853DF00A54D6E /* PGPKeyID.h */, - 75734BDA191853DF00A54D6E /* PGPKeyID.m */, - 7563356B19255C1A00414CCC /* PGPUser.h */, - 7563356C19255C1A00414CCC /* PGPUser.m */, - 7563356E192582CD00414CCC /* PGPSubKey.h */, - 7563356F192582CD00414CCC /* PGPSubKey.m */, - 750EE3C21922C185009E818E /* PGPKey.h */, - 750EE3C31922C185009E818E /* PGPKey.m */, - 755456BE192843E700E5526B /* PGPArmor.h */, - 755456BF192843E700E5526B /* PGPArmor.m */, - 7597B79A192E9C7F003ABC65 /* PGPPKCSEmsa.h */, - 7597B79B192E9C7F003ABC65 /* PGPPKCSEmsa.m */, - 75AE7E27194224CD004DD6A5 /* PGPPKCSEme.h */, - 75AE7E28194224CD004DD6A5 /* PGPPKCSEme.m */, - 75B2450D1933DB89003F24A0 /* PGPPublicKeyRSA.h */, - 75B2450E1933DB89003F24A0 /* PGPPublicKeyRSA.m */, - 751056111940A76F00653C0B /* PGPCryptoCFB.h */, - 751056121940A76F00653C0B /* PGPCryptoCFB.m */, + 757D26E51A6AC605005CE2E3 /* PGPCommon.h */, + 752CB2BE1A6FA3F0007292F2 /* Helpers */, + 755046741A6C11F6008E5203 /* Categories */, + 7550467B1A6C6260008E5203 /* Packets */, + 75C257D91A6AB1870095E1A2 /* PGPMessage.h */, + 75C257DA1A6AB1870095E1A2 /* PGPMessage.m */, + 757D26D61A6AB937005CE2E3 /* PGPParser.h */, + 757D26D71A6AB937005CE2E3 /* PGPParser.m */, + 7550468E1A6C873B008E5203 /* PGPKey.h */, + 7550468F1A6C873B008E5203 /* PGPKey.m */, + 759A08171A7BB02200C9DCE6 /* PGPUser.h */, + 759A08181A7BB02200C9DCE6 /* PGPUser.m */, + 759A08141A7BAD3300C9DCE6 /* PGPSignature.h */, + 759A08151A7BAD3300C9DCE6 /* PGPSignature.m */, + 75321D751A6F135000F8FE95 /* PGPKeyID.h */, + 75321D761A6F135000F8FE95 /* PGPKeyID.m */, + 755046911A6C891B008E5203 /* PGPSubKey.h */, + 755046921A6C891B008E5203 /* PGPSubKey.m */, + 755046681A6BEC78008E5203 /* PGPPacketHeader.h */, + 755046691A6BEC78008E5203 /* PGPPacketHeader.m */, + 7550467C1A6C6861008E5203 /* PGPMPI.h */, + 7550467D1A6C6861008E5203 /* PGPMPI.m */, 756299BB1914DE1A00C5AD3B /* Supporting Files */, ); path = ObjectivePGP; @@ -537,179 +279,53 @@ name = "Supporting Files"; sourceTree = ""; }; - 756299CE1914DE1A00C5AD3B /* ObjectivePGPTests */ = { - isa = PBXGroup; - children = ( - 7563357119258F1700414CCC /* TestingFiles */, - 756299D41914DE1A00C5AD3B /* ObjectivePGPTests.m */, - 7563357A19258F7100414CCC /* ObjectivePGPTestKeyringSecurePlaintext.m */, - 7563357C1925936900414CCC /* ObjectivePGPTestKeyringSecureEncrypted.m */, - 75040AB11926BB35000CEA93 /* ObjectivePGPTestArmor.m */, - 756299CF1914DE1A00C5AD3B /* Supporting Files */, - ); - path = ObjectivePGPTests; - sourceTree = ""; - }; - 756299CF1914DE1A00C5AD3B /* Supporting Files */ = { - isa = PBXGroup; - children = ( - 756299D01914DE1A00C5AD3B /* ObjectivePGPTests-Info.plist */, - 756299D11914DE1A00C5AD3B /* InfoPlist.strings */, - ); - name = "Supporting Files"; - sourceTree = ""; - }; - 7563357119258F1700414CCC /* TestingFiles */ = { - isa = PBXGroup; - children = ( - 75D53ADE1A2FCDEE00ED9707 /* multiple-keys.asc */, - 750016A819C22E7100EAF308 /* secring-test-plaintext-encrypted-message.asc */, - 7563357219258F1700414CCC /* pubring-test-encrypted.gpg */, - 7563357319258F1700414CCC /* pubring-test-plaintext.gpg */, - 7563357419258F1700414CCC /* secring-test-encrypted.gpg */, - 7563357519258F1700414CCC /* secring-test-plaintext.gpg */, - ); - path = TestingFiles; - sourceTree = ""; - }; - 759FF46719598227005B240C /* opgp */ = { - isa = PBXGroup; - children = ( - 759FF46819598227005B240C /* main.m */, - ); - path = opgp; - sourceTree = ""; - }; - 75E7B6B41916478000C96BAB /* Utility */ = { - isa = PBXGroup; - children = ( - 75A5C152193CE3F6008A2543 /* NSData+compression.h */, - 75A5C153193CE3F6008A2543 /* NSData+compression.m */, - 759DBA121915B5BD00305549 /* NSData+PGPUtils.h */, - 759DBA131915B5BD00305549 /* NSData+PGPUtils.m */, - 75C4F0E11920FF5F005401A4 /* PGPCryptoUtils.h */, - 75C4F0E21920FF5F005401A4 /* PGPCryptoUtils.m */, - 758F3A18192935C7009307AD /* NSValue+PGPUtils.h */, - 758F3A19192935C7009307AD /* NSValue+PGPUtils.m */, - ); - name = Utility; - sourceTree = ""; - }; - 75E7B6B51916478D00C96BAB /* Packets */ = { + 93BEB2532C682A75D6CE6DD2 /* Pods */ = { isa = PBXGroup; children = ( - 757DDE7A1919338700A30F84 /* PGPPacket.h */, - 757DDE7B1919371600A30F84 /* PGPPacket.m */, - 7507B72519170E6D003A2DC7 /* PGPSignature */, - 75E7B6BC19167F1700C96BAB /* PGPPacketFactory.h */, - 75734BD019181E5500A54D6E /* PGPPacketFactory.m */, - 756299E51915AF0700C5AD3B /* PGPPublicKeyPacket.h */, - 756299E61915AF0700C5AD3B /* PGPPublicKeyPacket.m */, - 75E7B6B61916493600C96BAB /* PGPPublicSubKeyPacket.h */, - 75E7B6B71916493600C96BAB /* PGPPublicSubKeyPacket.m */, - 75DA1356191A4E65004C9C76 /* PGPSecretKeyPacket.h */, - 75DA1357191A4E65004C9C76 /* PGPSecretKeyPacket.m */, - 75DA1359191A4EA6004C9C76 /* PGPSecretSubKeyPacket.h */, - 75DA135A191A4EA6004C9C76 /* PGPSecretSubKeyPacket.m */, - 7507B72619170FE3003A2DC7 /* PGPUserIDPacket.h */, - 7507B72719170FE3003A2DC7 /* PGPUserIDPacket.m */, - 75734BD61918462900A54D6E /* PGPTrustPacket.h */, - 75734BD71918462900A54D6E /* PGPTrustPacket.m */, - 75C4F0E4192163A3005401A4 /* PGPModificationDetectionCodePacket.h */, - 75C4F0E5192163A3005401A4 /* PGPModificationDetectionCodePacket.m */, - 75AEC4631930B5E400974CBE /* PGPLiteralPacket.h */, - 75AEC4641930B5E400974CBE /* PGPLiteralPacket.m */, - 75AEC4661930FC0B00974CBE /* PGPUserAttributePacket.h */, - 75AEC4671930FC0B00974CBE /* PGPUserAttributePacket.m */, - 75AEC4691930FD3000974CBE /* PGPUserAttributeSubpacket.h */, - 75AEC46A1930FD3000974CBE /* PGPUserAttributeSubpacket.m */, - 75B39528193C6FA100297C8D /* PGPCompressedPacket.h */, - 75B39529193C6FA100297C8D /* PGPCompressedPacket.m */, - 75FE9806193FB46200613549 /* PGPSymmetricallyEncryptedIntegrityProtectedDataPacket.h */, - 75FE9807193FB46200613549 /* PGPSymmetricallyEncryptedIntegrityProtectedDataPacket.m */, - 753A65ED19487E3D0011A729 /* PGPSymmetricallyEncryptedDataPacket.h */, - 753A65EE19487E3D0011A729 /* PGPSymmetricallyEncryptedDataPacket.m */, - 75AE7E241941C567004DD6A5 /* PGPPublicKeyEncryptedSessionKeyPacket.h */, - 75AE7E251941C567004DD6A5 /* PGPPublicKeyEncryptedSessionKeyPacket.m */, + 92AB78D2428FF47CA4E3EEE9 /* Pods-ObjectivePGP.debug.xcconfig */, + 342510E82279C69DE5EEF7FD /* Pods-ObjectivePGP.release.xcconfig */, ); - name = Packets; + name = Pods; sourceTree = ""; }; /* End PBXGroup section */ /* Begin PBXNativeTarget section */ - 756299B41914DE1A00C5AD3B /* ObjectivePGP */ = { - isa = PBXNativeTarget; - buildConfigurationList = 756299D81914DE1A00C5AD3B /* Build configuration list for PBXNativeTarget "ObjectivePGP" */; - buildPhases = ( - 756299B11914DE1A00C5AD3B /* Sources */, - 756299B21914DE1A00C5AD3B /* Frameworks */, - 756299B31914DE1A00C5AD3B /* CopyFiles */, - ); - buildRules = ( - ); - dependencies = ( - ); - name = ObjectivePGP; - productName = ObjectivePGP; - productReference = 756299B51914DE1A00C5AD3B /* libObjectivePGP.a */; - productType = "com.apple.product-type.library.static"; - }; - 756299C41914DE1A00C5AD3B /* ObjectivePGPTests */ = { + 75413BDB1A6AD386004C8807 /* ObjectivePGPTests */ = { isa = PBXNativeTarget; - buildConfigurationList = 756299DB1914DE1A00C5AD3B /* Build configuration list for PBXNativeTarget "ObjectivePGPTests" */; + buildConfigurationList = 75413BE71A6AD386004C8807 /* Build configuration list for PBXNativeTarget "ObjectivePGPTests" */; buildPhases = ( - 87E9879AEC5E43CFBC81570E /* Check Pods Manifest.lock */, - 756299C11914DE1A00C5AD3B /* Sources */, - 756299C21914DE1A00C5AD3B /* Frameworks */, - 756299C31914DE1A00C5AD3B /* Resources */, - 97BBFE57986D4AC4BAE98D62 /* Copy Pods Resources */, + F8A2ACB2F3C0CC40A7592B79 /* Check Pods Manifest.lock */, + 75413BD81A6AD386004C8807 /* Sources */, + 75413BD91A6AD386004C8807 /* Frameworks */, + 75413BDA1A6AD386004C8807 /* Resources */, + 31AD50CE6BA7096D4F820156 /* Copy Pods Resources */, ); buildRules = ( ); dependencies = ( - 756299CC1914DE1A00C5AD3B /* PBXTargetDependency */, + 75413BE41A6AD386004C8807 /* PBXTargetDependency */, ); name = ObjectivePGPTests; productName = ObjectivePGPTests; - productReference = 756299C51914DE1A00C5AD3B /* ObjectivePGPTests.xctest */; + productReference = 75413BDC1A6AD386004C8807 /* ObjectivePGPTests.xctest */; productType = "com.apple.product-type.bundle.unit-test"; }; - 759FF46519598227005B240C /* opgp */ = { - isa = PBXNativeTarget; - buildConfigurationList = 759FF46A19598227005B240C /* Build configuration list for PBXNativeTarget "opgp" */; - buildPhases = ( - 3682BA07B85E42CF9A5FDDE3 /* Check Pods Manifest.lock */, - 759FF46219598227005B240C /* Sources */, - 759FF46319598227005B240C /* Frameworks */, - 759FF46419598227005B240C /* CopyFiles */, - B334A9D9043846FA92E990EF /* Copy Pods Resources */, - ); - buildRules = ( - ); - dependencies = ( - 75A5D2111959834E0074A124 /* PBXTargetDependency */, - ); - name = opgp; - productName = opgp; - productReference = 759FF46619598227005B240C /* opgp */; - productType = "com.apple.product-type.tool"; - }; - 759FF472195982A6005B240C /* ObjectivePGPOSX */ = { + 756299B41914DE1A00C5AD3B /* ObjectivePGP */ = { isa = PBXNativeTarget; - buildConfigurationList = 759FF4A0195982A6005B240C /* Build configuration list for PBXNativeTarget "ObjectivePGPOSX" */; + buildConfigurationList = 756299D81914DE1A00C5AD3B /* Build configuration list for PBXNativeTarget "ObjectivePGP" */; buildPhases = ( - 759FF474195982A6005B240C /* Sources */, - 759FF49A195982A6005B240C /* Frameworks */, - 759FF49D195982A6005B240C /* CopyFiles */, + 756299B11914DE1A00C5AD3B /* Sources */, + 756299B21914DE1A00C5AD3B /* Frameworks */, + 756299B31914DE1A00C5AD3B /* CopyFiles */, ); buildRules = ( ); dependencies = ( ); - name = ObjectivePGPOSX; + name = ObjectivePGP; productName = ObjectivePGP; - productReference = 759FF4A3195982A6005B240C /* libObjectivePGP.a */; + productReference = 756299B51914DE1A00C5AD3B /* libObjectivePGP.a */; productType = "com.apple.product-type.library.static"; }; /* End PBXNativeTarget section */ @@ -722,8 +338,8 @@ LastUpgradeCheck = 0510; ORGANIZATIONNAME = "Marcin Krzyżanowski"; TargetAttributes = { - 759FF46519598227005B240C = { - CreatedOnToolsVersion = 6.0; + 75413BDB1A6AD386004C8807 = { + CreatedOnToolsVersion = 6.1.1; }; }; }; @@ -740,47 +356,38 @@ projectRoot = ""; targets = ( 756299B41914DE1A00C5AD3B /* ObjectivePGP */, - 759FF472195982A6005B240C /* ObjectivePGPOSX */, - 756299C41914DE1A00C5AD3B /* ObjectivePGPTests */, - 759FF46519598227005B240C /* opgp */, + 75413BDB1A6AD386004C8807 /* ObjectivePGPTests */, ); }; /* End PBXProject section */ /* Begin PBXResourcesBuildPhase section */ - 756299C31914DE1A00C5AD3B /* Resources */ = { + 75413BDA1A6AD386004C8807 /* Resources */ = { isa = PBXResourcesBuildPhase; buildActionMask = 2147483647; files = ( - 756299D31914DE1A00C5AD3B /* InfoPlist.strings in Resources */, - 7563357819258F1700414CCC /* secring-test-encrypted.gpg in Resources */, - 750016A919C22E7100EAF308 /* secring-test-plaintext-encrypted-message.asc in Resources */, - 7563357619258F1700414CCC /* pubring-test-encrypted.gpg in Resources */, - 7563357919258F1700414CCC /* secring-test-plaintext.gpg in Resources */, - 7563357719258F1700414CCC /* pubring-test-plaintext.gpg in Resources */, - 75D53ADF1A2FCDEE00ED9707 /* multiple-keys.asc in Resources */, ); runOnlyForDeploymentPostprocessing = 0; }; /* End PBXResourcesBuildPhase section */ /* Begin PBXShellScriptBuildPhase section */ - 3682BA07B85E42CF9A5FDDE3 /* Check Pods Manifest.lock */ = { + 31AD50CE6BA7096D4F820156 /* Copy Pods Resources */ = { isa = PBXShellScriptBuildPhase; buildActionMask = 2147483647; files = ( ); inputPaths = ( ); - name = "Check Pods Manifest.lock"; + name = "Copy Pods Resources"; outputPaths = ( ); runOnlyForDeploymentPostprocessing = 0; shellPath = /bin/sh; - shellScript = "diff \"${PODS_ROOT}/../Podfile.lock\" \"${PODS_ROOT}/Manifest.lock\" > /dev/null\nif [[ $? != 0 ]] ; then\n cat << EOM\nerror: The sandbox is not in sync with the Podfile.lock. Run 'pod install' or update your CocoaPods installation.\nEOM\n exit 1\nfi\n"; + shellScript = "\"${SRCROOT}/Pods/Target Support Files/Pods-ObjectivePGP/Pods-ObjectivePGP-resources.sh\"\n"; showEnvVarsInLog = 0; }; - 87E9879AEC5E43CFBC81570E /* Check Pods Manifest.lock */ = { + F8A2ACB2F3C0CC40A7592B79 /* Check Pods Manifest.lock */ = { isa = PBXShellScriptBuildPhase; buildActionMask = 2147483647; files = ( @@ -795,171 +402,102 @@ shellScript = "diff \"${PODS_ROOT}/../Podfile.lock\" \"${PODS_ROOT}/Manifest.lock\" > /dev/null\nif [[ $? != 0 ]] ; then\n cat << EOM\nerror: The sandbox is not in sync with the Podfile.lock. Run 'pod install' or update your CocoaPods installation.\nEOM\n exit 1\nfi\n"; showEnvVarsInLog = 0; }; - 97BBFE57986D4AC4BAE98D62 /* Copy Pods Resources */ = { - isa = PBXShellScriptBuildPhase; - buildActionMask = 2147483647; - files = ( - ); - inputPaths = ( - ); - name = "Copy Pods Resources"; - outputPaths = ( - ); - runOnlyForDeploymentPostprocessing = 0; - shellPath = /bin/sh; - shellScript = "\"${SRCROOT}/Pods/Pods-ObjectivePGP-resources.sh\"\n"; - showEnvVarsInLog = 0; - }; - B334A9D9043846FA92E990EF /* Copy Pods Resources */ = { - isa = PBXShellScriptBuildPhase; - buildActionMask = 2147483647; - files = ( - ); - inputPaths = ( - ); - name = "Copy Pods Resources"; - outputPaths = ( - ); - runOnlyForDeploymentPostprocessing = 0; - shellPath = /bin/sh; - shellScript = "\"${SRCROOT}/Pods/Pods-ObjectivePGPOSX-resources.sh\"\n"; - showEnvVarsInLog = 0; - }; /* End PBXShellScriptBuildPhase section */ /* Begin PBXSourcesBuildPhase section */ - 756299B11914DE1A00C5AD3B /* Sources */ = { + 75413BD81A6AD386004C8807 /* Sources */ = { isa = PBXSourcesBuildPhase; buildActionMask = 2147483647; files = ( - 751056131940A76F00653C0B /* PGPCryptoCFB.m in Sources */, - 750EE3C41922C185009E818E /* PGPKey.m in Sources */, - 75633570192582CD00414CCC /* PGPSubKey.m in Sources */, - 75AE7E261941C567004DD6A5 /* PGPPublicKeyEncryptedSessionKeyPacket.m in Sources */, - 7507B72819170FE3003A2DC7 /* PGPUserIDPacket.m in Sources */, - 75E7B6BB19167EFF00C96BAB /* PGPSignaturePacket.m in Sources */, - 756299E71915AF0700C5AD3B /* PGPPublicKeyPacket.m in Sources */, - 75DA1358191A4E65004C9C76 /* PGPSecretKeyPacket.m in Sources */, - 751E07361937D53900CA7946 /* PGPOnePassSignaturePacket.m in Sources */, - 75E7B6B81916493600C96BAB /* PGPPublicSubKeyPacket.m in Sources */, - 75FE9808193FB46200613549 /* PGPSymmetricallyEncryptedIntegrityProtectedDataPacket.m in Sources */, - 75DA135B191A4EA6004C9C76 /* PGPSecretSubKeyPacket.m in Sources */, - 756299C01914DE1A00C5AD3B /* ObjectivePGP.m in Sources */, - 759DBA181915CBDF00305549 /* PGPMPI.m in Sources */, - 75734BDB191853DF00A54D6E /* PGPKeyID.m in Sources */, - 75AEC4681930FC0B00974CBE /* PGPUserAttributePacket.m in Sources */, - 7563356D19255C1A00414CCC /* PGPUser.m in Sources */, - 75B2450F1933DB89003F24A0 /* PGPPublicKeyRSA.m in Sources */, - 759DBA141915B5BD00305549 /* NSData+PGPUtils.m in Sources */, - 75AEC46B1930FD3000974CBE /* PGPUserAttributeSubpacket.m in Sources */, - 755456C0192843E700E5526B /* PGPArmor.m in Sources */, - 758F3A1A192935C7009307AD /* NSValue+PGPUtils.m in Sources */, - 75A5C154193CE3F6008A2543 /* NSData+compression.m in Sources */, - 75DA135E191AE1D6004C9C76 /* PGPS2K.m in Sources */, - 75734BD81918462900A54D6E /* PGPTrustPacket.m in Sources */, - 75AEC4651930B5E400974CBE /* PGPLiteralPacket.m in Sources */, - 75734BD119181E5500A54D6E /* PGPPacketFactory.m in Sources */, - 757DDE7C1919371600A30F84 /* PGPPacket.m in Sources */, - 7502CEFF1916DCE9001B32D7 /* PGPSignatureSubpacket.m in Sources */, - 75B3952A193C6FA100297C8D /* PGPCompressedPacket.m in Sources */, - 75C4F0E31920FF5F005401A4 /* PGPCryptoUtils.m in Sources */, - 75C4F0E6192163A3005401A4 /* PGPModificationDetectionCodePacket.m in Sources */, - 7597B79C192E9C7F003ABC65 /* PGPPKCSEmsa.m in Sources */, - 753A65EF19487E3D0011A729 /* PGPSymmetricallyEncryptedDataPacket.m in Sources */, - 7562858E19239F1B00127E24 /* PGPFingerprint.m in Sources */, - 75AE7E29194224CD004DD6A5 /* PGPPKCSEme.m in Sources */, + 75C1D2B61A7E990D0035441C /* PGPMPITests.m in Sources */, + 755046771A6C1CD0008E5203 /* NSInputStream+PGPTests.m in Sources */, + 75413BE11A6AD386004C8807 /* PGPPacketHeaderOldTests.m in Sources */, + 75321D7C1A6F16EB00F8FE95 /* PGPSignaturePacketTests.m in Sources */, + 755046841A6C76AA008E5203 /* PGPParserTests.m in Sources */, + 755046801A6C6D15008E5203 /* PGPPublicKeyPacketTests.m in Sources */, + 755046821A6C6F3C008E5203 /* PGPInputStreamCategoryTests.m in Sources */, + 75F2DE6D1A6ADBB60084A3AE /* PGPPacketHeaderNewTests.m in Sources */, ); runOnlyForDeploymentPostprocessing = 0; }; - 756299C11914DE1A00C5AD3B /* Sources */ = { - isa = PBXSourcesBuildPhase; - buildActionMask = 2147483647; - files = ( - 7563357B19258F7100414CCC /* ObjectivePGPTestKeyringSecurePlaintext.m in Sources */, - 75040AB21926BB35000CEA93 /* ObjectivePGPTestArmor.m in Sources */, - 756299D51914DE1A00C5AD3B /* ObjectivePGPTests.m in Sources */, - 7563357D1925936900414CCC /* ObjectivePGPTestKeyringSecureEncrypted.m in Sources */, - ); - runOnlyForDeploymentPostprocessing = 0; - }; - 759FF46219598227005B240C /* Sources */ = { - isa = PBXSourcesBuildPhase; - buildActionMask = 2147483647; - files = ( - 759FF46919598227005B240C /* main.m in Sources */, - ); - runOnlyForDeploymentPostprocessing = 0; - }; - 759FF474195982A6005B240C /* Sources */ = { + 756299B11914DE1A00C5AD3B /* Sources */ = { isa = PBXSourcesBuildPhase; buildActionMask = 2147483647; files = ( - 759FF475195982A6005B240C /* PGPCryptoCFB.m in Sources */, - 759FF476195982A6005B240C /* PGPKey.m in Sources */, - 759FF477195982A6005B240C /* PGPSubKey.m in Sources */, - 759FF478195982A6005B240C /* PGPPublicKeyEncryptedSessionKeyPacket.m in Sources */, - 759FF479195982A6005B240C /* PGPUserIDPacket.m in Sources */, - 759FF47A195982A6005B240C /* PGPSignaturePacket.m in Sources */, - 759FF47B195982A6005B240C /* PGPPublicKeyPacket.m in Sources */, - 759FF47C195982A6005B240C /* PGPSecretKeyPacket.m in Sources */, - 759FF47D195982A6005B240C /* PGPOnePassSignaturePacket.m in Sources */, - 759FF47E195982A6005B240C /* PGPPublicSubKeyPacket.m in Sources */, - 759FF47F195982A6005B240C /* PGPSymmetricallyEncryptedIntegrityProtectedDataPacket.m in Sources */, - 759FF480195982A6005B240C /* PGPSecretSubKeyPacket.m in Sources */, - 759FF481195982A6005B240C /* ObjectivePGP.m in Sources */, - 759FF482195982A6005B240C /* PGPMPI.m in Sources */, - 759FF483195982A6005B240C /* PGPKeyID.m in Sources */, - 759FF484195982A6005B240C /* PGPUserAttributePacket.m in Sources */, - 759FF485195982A6005B240C /* PGPUser.m in Sources */, - 759FF486195982A6005B240C /* PGPPublicKeyRSA.m in Sources */, - 759FF487195982A6005B240C /* NSData+PGPUtils.m in Sources */, - 759FF488195982A6005B240C /* PGPUserAttributeSubpacket.m in Sources */, - 759FF489195982A6005B240C /* PGPArmor.m in Sources */, - 759FF48A195982A6005B240C /* NSValue+PGPUtils.m in Sources */, - 759FF48B195982A6005B240C /* NSData+compression.m in Sources */, - 759FF48C195982A6005B240C /* PGPS2K.m in Sources */, - 759FF48D195982A6005B240C /* PGPTrustPacket.m in Sources */, - 759FF48E195982A6005B240C /* PGPLiteralPacket.m in Sources */, - 759FF48F195982A6005B240C /* PGPPacketFactory.m in Sources */, - 759FF490195982A6005B240C /* PGPPacket.m in Sources */, - 759FF491195982A6005B240C /* PGPSignatureSubpacket.m in Sources */, - 759FF492195982A6005B240C /* PGPCompressedPacket.m in Sources */, - 759FF493195982A6005B240C /* PGPCryptoUtils.m in Sources */, - 759FF494195982A6005B240C /* PGPModificationDetectionCodePacket.m in Sources */, - 759FF496195982A6005B240C /* PGPPKCSEmsa.m in Sources */, - 759FF497195982A6005B240C /* PGPSymmetricallyEncryptedDataPacket.m in Sources */, - 759FF498195982A6005B240C /* PGPFingerprint.m in Sources */, - 759FF499195982A6005B240C /* PGPPKCSEme.m in Sources */, + 755046931A6C891B008E5203 /* PGPSubKey.m in Sources */, + 755046901A6C873B008E5203 /* PGPKey.m in Sources */, + 759A08161A7BAD3300C9DCE6 /* PGPSignature.m in Sources */, + 752CB2BD1A6FA3EB007292F2 /* PGPFunctions.m in Sources */, + 75AE759C1A93E46F003B255C /* NSData+PGP.m in Sources */, + 7550467E1A6C6861008E5203 /* PGPMPI.m in Sources */, + 7550468D1A6C799A008E5203 /* PGPUserIDPacket.m in Sources */, + 755046731A6C11F1008E5203 /* NSInputStream+PGP.m in Sources */, + 75321D741A6F056C00F8FE95 /* PGPSignatureSubpacket.m in Sources */, + 755046871A6C7970008E5203 /* PGPSignaturePacket.m in Sources */, + 757D26D81A6AB937005CE2E3 /* PGPParser.m in Sources */, + 75C257DB1A6AB1870095E1A2 /* PGPMessage.m in Sources */, + 7550467A1A6C625C008E5203 /* PGPPublicKeyPacket.m in Sources */, + 7565467C1A93452A0070F6B0 /* NSMutableData+PGP.m in Sources */, + 75321D771A6F135000F8FE95 /* PGPKeyID.m in Sources */, + 759A08191A7BB02200C9DCE6 /* PGPUser.m in Sources */, + 7550466A1A6BEC78008E5203 /* PGPPacketHeader.m in Sources */, + 75B764B31A83BB79001E0A5B /* NSOutputStream+PGP.m in Sources */, ); runOnlyForDeploymentPostprocessing = 0; }; /* End PBXSourcesBuildPhase section */ /* Begin PBXTargetDependency section */ - 756299CC1914DE1A00C5AD3B /* PBXTargetDependency */ = { + 75413BE41A6AD386004C8807 /* PBXTargetDependency */ = { isa = PBXTargetDependency; target = 756299B41914DE1A00C5AD3B /* ObjectivePGP */; - targetProxy = 756299CB1914DE1A00C5AD3B /* PBXContainerItemProxy */; - }; - 75A5D2111959834E0074A124 /* PBXTargetDependency */ = { - isa = PBXTargetDependency; - target = 759FF472195982A6005B240C /* ObjectivePGPOSX */; - targetProxy = 75A5D2101959834E0074A124 /* PBXContainerItemProxy */; + targetProxy = 75413BE31A6AD386004C8807 /* PBXContainerItemProxy */; }; /* End PBXTargetDependency section */ -/* Begin PBXVariantGroup section */ - 756299D11914DE1A00C5AD3B /* InfoPlist.strings */ = { - isa = PBXVariantGroup; - children = ( - 756299D21914DE1A00C5AD3B /* en */, - ); - name = InfoPlist.strings; - sourceTree = ""; - }; -/* End PBXVariantGroup section */ - /* Begin XCBuildConfiguration section */ + 75413BE51A6AD386004C8807 /* Debug */ = { + isa = XCBuildConfiguration; + baseConfigurationReference = 92AB78D2428FF47CA4E3EEE9 /* Pods-ObjectivePGP.debug.xcconfig */; + buildSettings = { + CLANG_WARN_UNREACHABLE_CODE = YES; + CODE_SIGN_IDENTITY = "iPhone Developer"; + ENABLE_STRICT_OBJC_MSGSEND = YES; + FRAMEWORK_SEARCH_PATHS = ( + "$(SDKROOT)/Developer/Library/Frameworks", + "$(inherited)", + ); + GCC_PREPROCESSOR_DEFINITIONS = ( + "DEBUG=1", + "$(inherited)", + ); + INFOPLIST_FILE = ObjectivePGPTests/Info.plist; + IPHONEOS_DEPLOYMENT_TARGET = 8.1; + LD_RUNPATH_SEARCH_PATHS = "$(inherited) @executable_path/Frameworks @loader_path/Frameworks"; + MTL_ENABLE_DEBUG_INFO = YES; + PRODUCT_NAME = "$(TARGET_NAME)"; + }; + name = Debug; + }; + 75413BE61A6AD386004C8807 /* Release */ = { + isa = XCBuildConfiguration; + baseConfigurationReference = 342510E82279C69DE5EEF7FD /* Pods-ObjectivePGP.release.xcconfig */; + buildSettings = { + CLANG_WARN_UNREACHABLE_CODE = YES; + CODE_SIGN_IDENTITY = "iPhone Distribution"; + ENABLE_STRICT_OBJC_MSGSEND = YES; + FRAMEWORK_SEARCH_PATHS = ( + "$(SDKROOT)/Developer/Library/Frameworks", + "$(inherited)", + ); + INFOPLIST_FILE = ObjectivePGPTests/Info.plist; + IPHONEOS_DEPLOYMENT_TARGET = 8.1; + LD_RUNPATH_SEARCH_PATHS = "$(inherited) @executable_path/Frameworks @loader_path/Frameworks"; + MTL_ENABLE_DEBUG_INFO = NO; + PRODUCT_NAME = "$(TARGET_NAME)"; + }; + name = Release; + }; 756299D61914DE1A00C5AD3B /* Debug */ = { isa = XCBuildConfiguration; buildSettings = { @@ -1033,7 +571,6 @@ }; 756299D91914DE1A00C5AD3B /* Debug */ = { isa = XCBuildConfiguration; - baseConfigurationReference = 5A0AFDB5EA2347299F403C04 /* Pods-ObjectivePGP.xcconfig */; buildSettings = { ARCHS = ( "$(ARCHS_STANDARD)", @@ -1054,7 +591,6 @@ GCC_WARN_MULTIPLE_DEFINITION_TYPES_FOR_SELECTOR = YES; GCC_WARN_SHADOW = YES; GCC_WARN_STRICT_SELECTOR_MATCH = YES; - OTHER_LIBTOOLFLAGS = "-lssl -lcrypto"; PRODUCT_NAME = ObjectivePGP; SKIP_INSTALL = YES; }; @@ -1062,7 +598,6 @@ }; 756299DA1914DE1A00C5AD3B /* Release */ = { isa = XCBuildConfiguration; - baseConfigurationReference = 5A0AFDB5EA2347299F403C04 /* Pods-ObjectivePGP.xcconfig */; buildSettings = { ARCHS = ( "$(ARCHS_STANDARD)", @@ -1083,195 +618,37 @@ GCC_WARN_MULTIPLE_DEFINITION_TYPES_FOR_SELECTOR = YES; GCC_WARN_SHADOW = YES; GCC_WARN_STRICT_SELECTOR_MATCH = YES; - OTHER_LIBTOOLFLAGS = "-lssl -lcrypto"; PRODUCT_NAME = ObjectivePGP; SKIP_INSTALL = YES; }; name = Release; }; - 756299DC1914DE1A00C5AD3B /* Debug */ = { - isa = XCBuildConfiguration; - baseConfigurationReference = 5A0AFDB5EA2347299F403C04 /* Pods-ObjectivePGP.xcconfig */; - buildSettings = { - FRAMEWORK_SEARCH_PATHS = ( - "$(SDKROOT)/Developer/Library/Frameworks", - "$(inherited)", - "$(DEVELOPER_FRAMEWORKS_DIR)", - ); - GCC_PRECOMPILE_PREFIX_HEADER = YES; - GCC_PREFIX_HEADER = "ObjectivePGP/ObjectivePGP-Prefix.pch"; - GCC_PREPROCESSOR_DEFINITIONS = ( - "DEBUG=1", - "$(inherited)", - ); - INFOPLIST_FILE = "ObjectivePGPTests/ObjectivePGPTests-Info.plist"; - OTHER_LDFLAGS = ( - "$(inherited)", - "-framework", - XCTest, - ); - PRODUCT_NAME = ObjectivePGPTests; - WRAPPER_EXTENSION = xctest; - }; - name = Debug; - }; - 756299DD1914DE1A00C5AD3B /* Release */ = { - isa = XCBuildConfiguration; - baseConfigurationReference = 5A0AFDB5EA2347299F403C04 /* Pods-ObjectivePGP.xcconfig */; - buildSettings = { - FRAMEWORK_SEARCH_PATHS = ( - "$(SDKROOT)/Developer/Library/Frameworks", - "$(inherited)", - "$(DEVELOPER_FRAMEWORKS_DIR)", - ); - GCC_PRECOMPILE_PREFIX_HEADER = YES; - GCC_PREFIX_HEADER = "ObjectivePGP/ObjectivePGP-Prefix.pch"; - INFOPLIST_FILE = "ObjectivePGPTests/ObjectivePGPTests-Info.plist"; - OTHER_LDFLAGS = ( - "$(inherited)", - "-framework", - XCTest, - ); - PRODUCT_NAME = ObjectivePGPTests; - WRAPPER_EXTENSION = xctest; - }; - name = Release; - }; - 759FF46B19598227005B240C /* Debug */ = { - isa = XCBuildConfiguration; - baseConfigurationReference = D75D077981B34151BBB42CF2 /* Pods-ObjectivePGPOSX.xcconfig */; - buildSettings = { - CLANG_WARN_UNREACHABLE_CODE = YES; - ENABLE_STRICT_OBJC_MSGSEND = YES; - GCC_PREPROCESSOR_DEFINITIONS = ( - "DEBUG=1", - "$(inherited)", - ); - METAL_ENABLE_DEBUG_INFO = YES; - OTHER_LDFLAGS = ( - "-ObjC", - "-lcrypto", - "-lssl", - ); - PRODUCT_NAME = "$(TARGET_NAME)"; - SDKROOT = macosx; - }; - name = Debug; - }; - 759FF46C19598227005B240C /* Release */ = { - isa = XCBuildConfiguration; - baseConfigurationReference = D75D077981B34151BBB42CF2 /* Pods-ObjectivePGPOSX.xcconfig */; - buildSettings = { - CLANG_WARN_UNREACHABLE_CODE = YES; - DEBUG_INFORMATION_FORMAT = "dwarf-with-dsym"; - ENABLE_STRICT_OBJC_MSGSEND = YES; - METAL_ENABLE_DEBUG_INFO = NO; - OTHER_LDFLAGS = ( - "-ObjC", - "-lcrypto", - "-lssl", - ); - PRODUCT_NAME = "$(TARGET_NAME)"; - SDKROOT = macosx; - }; - name = Release; - }; - 759FF4A1195982A6005B240C /* Debug */ = { - isa = XCBuildConfiguration; - baseConfigurationReference = D75D077981B34151BBB42CF2 /* Pods-ObjectivePGPOSX.xcconfig */; - buildSettings = { - CLANG_WARN_DEPRECATED_OBJC_IMPLEMENTATIONS = YES; - CLANG_WARN_OBJC_EXPLICIT_OWNERSHIP_TYPE = YES; - CLANG_WARN_OBJC_IMPLICIT_RETAIN_SELF = YES; - CLANG_WARN_OBJC_REPEATED_USE_OF_WEAK = YES; - CLANG_WARN_UNREACHABLE_CODE = YES; - DEFINES_MODULE = YES; - DSTROOT = /tmp/ObjectivePGP.dst; - GCC_PRECOMPILE_PREFIX_HEADER = YES; - GCC_PREFIX_HEADER = "ObjectivePGP/ObjectivePGP-Prefix.pch"; - GCC_TREAT_IMPLICIT_FUNCTION_DECLARATIONS_AS_ERRORS = YES; - GCC_TREAT_INCOMPATIBLE_POINTER_TYPE_WARNINGS_AS_ERRORS = YES; - GCC_WARN_INITIALIZER_NOT_FULLY_BRACKETED = YES; - GCC_WARN_MULTIPLE_DEFINITION_TYPES_FOR_SELECTOR = YES; - GCC_WARN_SHADOW = YES; - GCC_WARN_STRICT_SELECTOR_MATCH = YES; - OTHER_LIBTOOLFLAGS = "-lssl -lcrypto"; - PRODUCT_NAME = ObjectivePGP; - SDKROOT = macosx10.9; - SKIP_INSTALL = YES; - }; - name = Debug; - }; - 759FF4A2195982A6005B240C /* Release */ = { - isa = XCBuildConfiguration; - baseConfigurationReference = D75D077981B34151BBB42CF2 /* Pods-ObjectivePGPOSX.xcconfig */; - buildSettings = { - CLANG_WARN_DEPRECATED_OBJC_IMPLEMENTATIONS = YES; - CLANG_WARN_OBJC_EXPLICIT_OWNERSHIP_TYPE = YES; - CLANG_WARN_OBJC_IMPLICIT_RETAIN_SELF = YES; - CLANG_WARN_OBJC_REPEATED_USE_OF_WEAK = YES; - CLANG_WARN_UNREACHABLE_CODE = YES; - DEFINES_MODULE = YES; - DSTROOT = /tmp/ObjectivePGP.dst; - GCC_PRECOMPILE_PREFIX_HEADER = YES; - GCC_PREFIX_HEADER = "ObjectivePGP/ObjectivePGP-Prefix.pch"; - GCC_TREAT_IMPLICIT_FUNCTION_DECLARATIONS_AS_ERRORS = YES; - GCC_TREAT_INCOMPATIBLE_POINTER_TYPE_WARNINGS_AS_ERRORS = YES; - GCC_WARN_INITIALIZER_NOT_FULLY_BRACKETED = YES; - GCC_WARN_MULTIPLE_DEFINITION_TYPES_FOR_SELECTOR = YES; - GCC_WARN_SHADOW = YES; - GCC_WARN_STRICT_SELECTOR_MATCH = YES; - OTHER_LIBTOOLFLAGS = "-lssl -lcrypto"; - PRODUCT_NAME = ObjectivePGP; - SDKROOT = macosx10.9; - SKIP_INSTALL = YES; - }; - name = Release; - }; /* End XCBuildConfiguration section */ /* Begin XCConfigurationList section */ - 756299B01914DE1A00C5AD3B /* Build configuration list for PBXProject "ObjectivePGP" */ = { - isa = XCConfigurationList; - buildConfigurations = ( - 756299D61914DE1A00C5AD3B /* Debug */, - 756299D71914DE1A00C5AD3B /* Release */, - ); - defaultConfigurationIsVisible = 0; - defaultConfigurationName = Release; - }; - 756299D81914DE1A00C5AD3B /* Build configuration list for PBXNativeTarget "ObjectivePGP" */ = { + 75413BE71A6AD386004C8807 /* Build configuration list for PBXNativeTarget "ObjectivePGPTests" */ = { isa = XCConfigurationList; buildConfigurations = ( - 756299D91914DE1A00C5AD3B /* Debug */, - 756299DA1914DE1A00C5AD3B /* Release */, + 75413BE51A6AD386004C8807 /* Debug */, + 75413BE61A6AD386004C8807 /* Release */, ); defaultConfigurationIsVisible = 0; defaultConfigurationName = Release; }; - 756299DB1914DE1A00C5AD3B /* Build configuration list for PBXNativeTarget "ObjectivePGPTests" */ = { - isa = XCConfigurationList; - buildConfigurations = ( - 756299DC1914DE1A00C5AD3B /* Debug */, - 756299DD1914DE1A00C5AD3B /* Release */, - ); - defaultConfigurationIsVisible = 0; - defaultConfigurationName = Release; - }; - 759FF46A19598227005B240C /* Build configuration list for PBXNativeTarget "opgp" */ = { + 756299B01914DE1A00C5AD3B /* Build configuration list for PBXProject "ObjectivePGP" */ = { isa = XCConfigurationList; buildConfigurations = ( - 759FF46B19598227005B240C /* Debug */, - 759FF46C19598227005B240C /* Release */, + 756299D61914DE1A00C5AD3B /* Debug */, + 756299D71914DE1A00C5AD3B /* Release */, ); defaultConfigurationIsVisible = 0; defaultConfigurationName = Release; }; - 759FF4A0195982A6005B240C /* Build configuration list for PBXNativeTarget "ObjectivePGPOSX" */ = { + 756299D81914DE1A00C5AD3B /* Build configuration list for PBXNativeTarget "ObjectivePGP" */ = { isa = XCConfigurationList; buildConfigurations = ( - 759FF4A1195982A6005B240C /* Debug */, - 759FF4A2195982A6005B240C /* Release */, + 756299D91914DE1A00C5AD3B /* Debug */, + 756299DA1914DE1A00C5AD3B /* Release */, ); defaultConfigurationIsVisible = 0; defaultConfigurationName = Release; diff --git a/ObjectivePGP.xcodeproj/project.xcworkspace/xcshareddata/ObjectivePGP.xccheckout b/ObjectivePGP.xcodeproj/project.xcworkspace/xcshareddata/ObjectivePGP.xccheckout index 98700566..b64e2a07 100644 --- a/ObjectivePGP.xcodeproj/project.xcworkspace/xcshareddata/ObjectivePGP.xccheckout +++ b/ObjectivePGP.xcodeproj/project.xcworkspace/xcshareddata/ObjectivePGP.xccheckout @@ -10,31 +10,31 @@ ObjectivePGP IDESourceControlProjectOriginsDictionary - E87A640A-257A-4EA9-8911-A3A876F28D8B - ssh://bitbucket.org/krzyzanowskim/objectivepgp.git + 4858D38B24AED68A4237F0D24D6AD46EA9025A89 + bitbucket.org:krzyzanowskim/objectivepgp.git IDESourceControlProjectPath - ObjectivePGP.xcodeproj/project.xcworkspace + ObjectivePGP.xcodeproj IDESourceControlProjectRelativeInstallPathDictionary - E87A640A-257A-4EA9-8911-A3A876F28D8B + 4858D38B24AED68A4237F0D24D6AD46EA9025A89 ../.. IDESourceControlProjectURL - ssh://bitbucket.org/krzyzanowskim/objectivepgp.git + bitbucket.org:krzyzanowskim/objectivepgp.git IDESourceControlProjectVersion - 110 + 111 IDESourceControlProjectWCCIdentifier - E87A640A-257A-4EA9-8911-A3A876F28D8B + 4858D38B24AED68A4237F0D24D6AD46EA9025A89 IDESourceControlProjectWCConfigurations IDESourceControlRepositoryExtensionIdentifierKey public.vcs.git IDESourceControlWCCIdentifierKey - E87A640A-257A-4EA9-8911-A3A876F28D8B + 4858D38B24AED68A4237F0D24D6AD46EA9025A89 IDESourceControlWCCName - OpenPGPKeyring + objectivepgp diff --git a/ObjectivePGP.xcworkspace/contents.xcworkspacedata b/ObjectivePGP.xcworkspace/contents.xcworkspacedata index 9933068d..a3af068b 100644 --- a/ObjectivePGP.xcworkspace/contents.xcworkspacedata +++ b/ObjectivePGP.xcworkspace/contents.xcworkspacedata @@ -1 +1,10 @@ - \ No newline at end of file + + + + + + + diff --git a/ObjectivePGP.xcworkspace/xcshareddata/ObjectivePGP.xccheckout b/ObjectivePGP.xcworkspace/xcshareddata/ObjectivePGP.xccheckout deleted file mode 100644 index 628146fd..00000000 --- a/ObjectivePGP.xcworkspace/xcshareddata/ObjectivePGP.xccheckout +++ /dev/null @@ -1,41 +0,0 @@ - - - - - IDESourceControlProjectFavoriteDictionaryKey - - IDESourceControlProjectIdentifier - AD9D0321-9523-4D95-B31C-F77220A4C8F8 - IDESourceControlProjectName - ObjectivePGP - IDESourceControlProjectOriginsDictionary - - 4858D38B24AED68A4237F0D24D6AD46EA9025A89 - ssh://bitbucket.org/krzyzanowskim/objectivepgp.git - - IDESourceControlProjectPath - ObjectivePGP.xcworkspace - IDESourceControlProjectRelativeInstallPathDictionary - - 4858D38B24AED68A4237F0D24D6AD46EA9025A89 - .. - - IDESourceControlProjectURL - ssh://bitbucket.org/krzyzanowskim/objectivepgp.git - IDESourceControlProjectVersion - 111 - IDESourceControlProjectWCCIdentifier - 4858D38B24AED68A4237F0D24D6AD46EA9025A89 - IDESourceControlProjectWCConfigurations - - - IDESourceControlRepositoryExtensionIdentifierKey - public.vcs.git - IDESourceControlWCCIdentifierKey - 4858D38B24AED68A4237F0D24D6AD46EA9025A89 - IDESourceControlWCCName - objectivepgp - - - - diff --git a/ObjectivePGP/Categories/NSData+PGP.h b/ObjectivePGP/Categories/NSData+PGP.h new file mode 100644 index 00000000..c9798206 --- /dev/null +++ b/ObjectivePGP/Categories/NSData+PGP.h @@ -0,0 +1,14 @@ +// +// NSData+PGP.h +// ObjectivePGP +// +// Created by Marcin Krzyzanowski on 17/02/15. +// Copyright (c) 2015 Marcin Krzyżanowski. All rights reserved. +// + +#import + +@interface NSData (PGP) +- (UInt16) readUInt16BE:(NSRange)range; +- (UInt32) readUInt32BE:(NSRange)range; +@end diff --git a/ObjectivePGP/Categories/NSData+PGP.m b/ObjectivePGP/Categories/NSData+PGP.m new file mode 100644 index 00000000..f183a864 --- /dev/null +++ b/ObjectivePGP/Categories/NSData+PGP.m @@ -0,0 +1,27 @@ +// +// NSData+PGP.m +// ObjectivePGP +// +// Created by Marcin Krzyzanowski on 17/02/15. +// Copyright (c) 2015 Marcin Krzyżanowski. All rights reserved. +// + +#import "NSData+PGP.h" + +@implementation NSData (PGP) +- (UInt16) readUInt16BE:(NSRange)range +{ + NSAssert(range.length == 2, @"Invalid length"); + UInt16 value = 0; + [self getBytes:&value range:range]; + return CFSwapInt16BigToHost(value); +} + +- (UInt32) readUInt32BE:(NSRange)range +{ + NSAssert(range.length == 4, @"Invalid length"); + UInt32 value = 0; + [self getBytes:&value range:range]; + return CFSwapInt32BigToHost(value); +} +@end diff --git a/ObjectivePGP/Categories/NSInputStream+PGP.h b/ObjectivePGP/Categories/NSInputStream+PGP.h new file mode 100644 index 00000000..0ff4f292 --- /dev/null +++ b/ObjectivePGP/Categories/NSInputStream+PGP.h @@ -0,0 +1,22 @@ +// +// NSInputStream+PGP.h +// ObjectivePGP +// +// Created by Marcin Krzyzanowski on 18/01/15. +// Copyright (c) 2015 Marcin Krzyżanowski. All rights reserved. +// + +#import + +@interface NSInputStream (PGP) +- (UInt8) readUInt8; // BE->LE +- (UInt8) readUInt8:(UInt8 *)bytes; +- (UInt8) readUInt8BytesAppendTo:(NSMutableData *)data; +- (UInt16) readUInt16BE; // BE->LE +- (UInt16) readUInt16BE:(UInt8 *)readBytes; +- (UInt16) readUInt16BEBytesAppendTo:(NSMutableData *)data; +- (UInt32) readUInt32BE; // BE->LE +- (UInt32) readUInt32BE:(UInt8 *)readBytes; +- (UInt32) readUInt32BytesAppendTo:(NSMutableData *)data; +- (NSData *) readDataLength:(NSUInteger)length; +@end diff --git a/ObjectivePGP/Categories/NSInputStream+PGP.m b/ObjectivePGP/Categories/NSInputStream+PGP.m new file mode 100644 index 00000000..6b27d62c --- /dev/null +++ b/ObjectivePGP/Categories/NSInputStream+PGP.m @@ -0,0 +1,115 @@ +// +// NSInputStream+PGP.m +// ObjectivePGP +// +// Created by Marcin Krzyzanowski on 18/01/15. +// Copyright (c) 2015 Marcin Krzyżanowski. All rights reserved. +// + +#import "NSInputStream+PGP.h" + +@implementation NSInputStream (PGP) + +- (UInt8) readUInt8 +{ + return [self readUInt8:nil]; +} + +- (UInt8) readUInt8BytesAppendTo:(NSMutableData *)data +{ + NSParameterAssert(data); + + UInt8 result; + UInt8 byte; + result = [self readUInt8:&byte]; + [data appendBytes:&byte length:1]; + return result; +} + +- (UInt8) readUInt8:(UInt8 *)readBytes +{ + UInt8 result = 0; + [self read:&result maxLength:1]; + + if (readBytes) { + *readBytes = result; + } + return result; +} + +- (UInt16) readUInt16BE +{ + return [self readUInt16BE:nil]; +} + +- (UInt16) readUInt16BEBytesAppendTo:(NSMutableData *)data +{ + NSParameterAssert(data); + + UInt16 result; + UInt8 bytes[2]; + result = [self readUInt16BE:bytes]; + [data appendBytes:bytes length:sizeof(bytes)]; + return result; +} + +- (UInt16) readUInt16BE:(UInt8 *)readBytes +{ + UInt8 bytes[2]; + if ([self read:bytes maxLength:sizeof(bytes)] > 0) { + if (readBytes) { + bcopy(bytes, readBytes, sizeof(bytes)); + } + UInt16 value = 0; + bcopy(bytes, &value, sizeof(bytes)); + return CFSwapInt16BigToHost(value); + } + NSAssert(false,@"readUInt16 failed"); + return 0; +} + +- (UInt32) readUInt32BE +{ + return [self readUInt32BE:nil]; +} + +- (UInt32) readUInt32BytesAppendTo:(NSMutableData *)data +{ + NSParameterAssert(data); + + UInt32 result; + UInt8 bytes[4]; + result = [self readUInt32BE:bytes]; + [data appendBytes:bytes length:sizeof(bytes)]; + return result; +} + + +- (UInt32) readUInt32BE:(UInt8 *)readBytes +{ + UInt8 bytes[4]; + if ([self read:bytes maxLength:sizeof(bytes)] > 0) { + if (readBytes) { + bcopy(bytes, readBytes, sizeof(bytes)); + } + UInt32 value; + bcopy(bytes, &value, sizeof(bytes)); + return CFSwapInt32BigToHost(value); + } + NSAssert(false,@"readUInt32 failed"); + return 0; +} + +- (NSData *) readDataLength:(NSUInteger)length +{ + NSData *output = nil; + UInt8 buffer[length]; + NSInteger readResult = [self read:buffer maxLength:length]; + if (readResult > 0) { + output = [NSData dataWithBytes:buffer length:readResult]; // 8 bytes long + } + free(buffer); + return output; +} + +@end diff --git a/ObjectivePGP/Categories/NSOutputStream+PGP.h b/ObjectivePGP/Categories/NSOutputStream+PGP.h new file mode 100644 index 00000000..5a5ad40f --- /dev/null +++ b/ObjectivePGP/Categories/NSOutputStream+PGP.h @@ -0,0 +1,16 @@ +// +// NSOutputStream+PGP.h +// ObjectivePGP +// +// Created by Marcin Krzyzanowski on 05/02/15. +// Copyright (c) 2015 Marcin Krzyżanowski. All rights reserved. +// + +#import + +@interface NSOutputStream (PGP) +- (BOOL) writeUInt8:(UInt8)value; +- (BOOL) writeUInt16BE:(UInt16)value; +- (BOOL) writeUInt32BE:(UInt32)value; +- (BOOL) writeData:(NSData *)data; +@end diff --git a/ObjectivePGP/Categories/NSOutputStream+PGP.m b/ObjectivePGP/Categories/NSOutputStream+PGP.m new file mode 100644 index 00000000..fb4f5608 --- /dev/null +++ b/ObjectivePGP/Categories/NSOutputStream+PGP.m @@ -0,0 +1,55 @@ +// +// NSOutputStream+PGP.m +// ObjectivePGP +// +// Created by Marcin Krzyzanowski on 05/02/15. +// Copyright (c) 2015 Marcin Krzyżanowski. All rights reserved. +// + +#import "NSOutputStream+PGP.h" + +@implementation NSOutputStream (PGP) + +- (BOOL) writeUInt8:(UInt8)value +{ + UInt8 bytes[1]; + bcopy(&value, bytes, sizeof(bytes)); + if ([self write:bytes maxLength:sizeof(bytes)] == -1) { + return NO; + } + return YES; + +} + +- (BOOL) writeUInt16BE:(UInt16)value +{ + UInt16 valueBE = CFSwapInt16HostToBig(value); + UInt8 bytes[2]; + bcopy(&valueBE, bytes, sizeof(bytes)); + if ([self write:bytes maxLength:sizeof(bytes)] == -1) { + return NO; + } + return YES; +} + + +- (BOOL) writeUInt32BE:(UInt32)value +{ + UInt32 valueBE = CFSwapInt32BigToHost(value); + UInt8 bytes[4]; + bcopy(&valueBE, bytes, sizeof(bytes)); + if ([self write:bytes maxLength:sizeof(bytes)] == -1) { + return NO; + } + return YES; +} + +- (BOOL) writeData:(NSData *)data +{ + if ([self write:data.bytes maxLength:data.length] == -1) { + return NO; + } + return YES; +} + +@end diff --git a/ObjectivePGP/Helpers/PGPFunctions.h b/ObjectivePGP/Helpers/PGPFunctions.h new file mode 100644 index 00000000..d445f263 --- /dev/null +++ b/ObjectivePGP/Helpers/PGPFunctions.h @@ -0,0 +1,24 @@ +// +// PGPFunctions.h +// ObjectivePGP +// +// Created by Marcin Krzyzanowski on 21/01/15. +// Copyright (c) 2015 Marcin Krzyżanowski. All rights reserved. +// + +#import + +#pragma once + +NSData *pgpCalculateSHA512(const void *bytes, unsigned int length); +UInt8 *pgpCalculateSHA384(const void *bytes, unsigned int length); +UInt8 *pgpCalculateSHA256(const void *bytes, unsigned int length); +UInt8 *pgpCalculateSHA224(const void *bytes, unsigned int length); +NSData *pgpCalculateSHA1(const void *bytes, unsigned int length); +NSData *pgpCalculateMD5(const void *bytes, unsigned int length); +NSUInteger pgpNumBits(Byte *bytes, NSUInteger maxLength); +NSInteger isPowerOfTwo (NSUInteger x); +NSData *buildNewFormatLengthBytesForData(NSData *bodyData); +NSData *buildOldFormatLengthBytesForData(NSData *bodyData); + + diff --git a/ObjectivePGP/Helpers/PGPFunctions.m b/ObjectivePGP/Helpers/PGPFunctions.m new file mode 100644 index 00000000..ec0bd9e5 --- /dev/null +++ b/ObjectivePGP/Helpers/PGPFunctions.m @@ -0,0 +1,122 @@ +// +// PGPFunctions.m +// ObjectivePGP +// +// Created by Marcin Krzyzanowski on 21/01/15. +// Copyright (c) 2015 Marcin Krzyżanowski. All rights reserved. +// + +#import "PGPFunctions.h" +#import + +NSData *pgpCalculateSHA512(const void *bytes, unsigned int length) +{ + unsigned char hash[CC_SHA512_DIGEST_LENGTH]; + unsigned char *output = CC_SHA512(bytes, length, hash); + return [NSData dataWithBytes:output length:CC_SHA512_DIGEST_LENGTH]; +} + +UInt8 *pgpCalculateSHA384(const void *bytes, unsigned int length) +{ + unsigned char hash[CC_SHA384_DIGEST_LENGTH]; + return CC_SHA384(bytes, length, hash); +} + +UInt8 *pgpCalculateSHA256(const void *bytes, unsigned int length) +{ + unsigned char hash[CC_SHA256_DIGEST_LENGTH]; + return CC_SHA256(bytes, length, hash); +} + +UInt8 *pgpCalculateSHA224(const void *bytes, unsigned int length) +{ + unsigned char hash[CC_SHA224_DIGEST_LENGTH]; + return CC_SHA224(bytes, length, hash); +} + +NSData *pgpCalculateSHA1(const void *bytes, unsigned int length) +{ + unsigned char hash[CC_SHA1_DIGEST_LENGTH]; + unsigned char *output = CC_SHA1(bytes, length, hash); + return [NSData dataWithBytes:output length:CC_SHA1_DIGEST_LENGTH]; +} + +NSData *pgpCalculateMD5(const void *bytes, unsigned int length) +{ + unsigned char hash[CC_MD5_DIGEST_LENGTH]; + unsigned char *output = CC_MD5(bytes, length, hash); + return [NSData dataWithBytes:output length:CC_MD5_DIGEST_LENGTH]; +} + +NSUInteger pgpNumBits(Byte *bytes, NSUInteger maxLength) +{ + if (maxLength == 0 || bytes[0] == 0x00) { + return 0; + } + + // remove zeros + int i = 0; + for (i = 0; i < maxLength; i++) { + if (bytes[i] != 0x00) { + break; + } + } + + // first byte + Byte first = bytes[0 + i]; + int idxFirst = 0; + while (first != 0) { + idxFirst++; + first = first >> 1; + } + + return idxFirst + ((maxLength - 1 - i) * 8); +} + +NSInteger isPowerOfTwo (NSUInteger x) +{ + return ((x != 0) && !(x & (x - 1))); +} + +// never partial data +NSData *buildNewFormatLengthBytesForData(NSData *bodyData) +{ + NSMutableData *data = [NSMutableData data]; + // write length octets + UInt64 bodyLength = bodyData.length; + if (bodyLength < 192) { + // 1 octet + [data appendBytes:&bodyLength length:1]; + } else if (bodyLength >= 192 && bodyLength <= 8383) { + // 2 octet + UInt8 buf[2] = {0,0}; + UInt16 twoOctets = bodyLength; + buf[0] = (UInt8)((twoOctets - 192) >> 8) + 192; + buf[1] = (UInt8)(twoOctets - 192); + [data appendBytes:buf length:2]; + } else { + // 5 octet + UInt8 buf[5] = {0,0,0,0,0}; + + UInt64 fiveOctets = bodyLength; + UInt8 marker = 255; + [data appendBytes:&marker length:1]; + + buf[0] = 0xff; + buf[1] = (UInt8)(fiveOctets >> 24); + buf[2] = (UInt8)(fiveOctets >> 16); + buf[3] = (UInt8)(fiveOctets >> 8); + buf[4] = (UInt8)(fiveOctets); + [data appendBytes:buf length:5]; + } + return [data copy]; +} + +NSData *buildOldFormatLengthBytesForData(NSData *bodyData) +{ + NSUInteger length = bodyData.length; + UInt8 upper = length >> 8; + UInt8 lower = length & 0xff; + UInt8 headWithLength[3] = {0x99, upper, lower}; + return [NSData dataWithBytes:&headWithLength length:3]; +} diff --git a/ObjectivePGP/NSData+PGPUtils.h b/ObjectivePGP/NSData+PGPUtils.h deleted file mode 100644 index 124cd231..00000000 --- a/ObjectivePGP/NSData+PGPUtils.h +++ /dev/null @@ -1,27 +0,0 @@ -// -// NSData+Bytes.h -// ObjectivePGP -// -// Created by Marcin Krzyzanowski on 04/05/14. -// Copyright (c) 2014 Marcin Krzyżanowski. All rights reserved. -// - -#import -#import "PGPTypes.h" - -@interface NSData (PGPUtils) - -- (UInt16) pgp_Checksum; -- (UInt32) pgp_CRC24; -- (NSData*) pgp_MD5; -- (NSData*) pgp_SHA1; -- (NSData*) pgp_SHA224; -- (NSData*) pgp_SHA256; -- (NSData*) pgp_SHA384; -- (NSData*) pgp_SHA512; -- (NSData*) pgp_RIPEMD160; - -- (NSData *) pgp_HashedWithAlgorithm:(PGPHashAlgorithm)hashAlgorithm; -- (NSData *) pgp_encryptBlockWithSymmetricAlgorithm:(PGPSymmetricAlgorithm)symmetricAlgorithm sessionKeyData:(NSData *)sessionKeyData; - -@end diff --git a/ObjectivePGP/NSData+PGPUtils.m b/ObjectivePGP/NSData+PGPUtils.m deleted file mode 100644 index 3d56dca0..00000000 --- a/ObjectivePGP/NSData+PGPUtils.m +++ /dev/null @@ -1,354 +0,0 @@ -// -// NSData+PGPUtils.m -// ObjectivePGP -// -// Created by Marcin Krzyzanowski on 04/05/14. -// Copyright (c) 2014 Marcin Krzyżanowski. All rights reserved. -// - -#import "NSData+PGPUtils.h" -#import "PGPCryptoUtils.h" - -#import - -#include -#include -#include -#include -#include -#include -#include -#include - - -@implementation NSData (PGPUtils) - -/** - * Calculates a 16bit sum of a string by adding each character * codes modulus 65535 - * - * @return checksum - */ -- (UInt16) pgp_Checksum -{ - UInt32 s = 0; - const UInt8 *bytes = self.bytes; - for (NSUInteger i = 0; i < self.length; i++) { - s = (s + (UInt8)bytes[i]); - } - s = s % 65536; - return (UInt16)s; -} - -#define CRC24_POLY 0x1864cfbL -#define CRC24_INIT 0xB704CEL - -- (UInt32) pgp_CRC24 -{ - UInt32 crc = CRC24_INIT; - NSUInteger len = self.length; - const UInt8 *octets = self.bytes; - int i; - while (len--) { - crc ^= (*octets++) << 16; - for (i = 0; i < 8; i++) { - crc <<= 1; - if (crc & 0x1000000) - crc ^= CRC24_POLY; - } - } - return crc & 0xFFFFFFL; -} - -- (NSData*) pgp_MD5 -{ - if (!self) - return self; - - CC_MD5_CTX *ctx = calloc(1, sizeof(CC_MD5_CTX)); - - CC_MD5_Init(ctx); - CC_MD5_Update(ctx, self.bytes, (CC_LONG)self.length); - UInt8 *out = calloc(CC_MD5_DIGEST_LENGTH, sizeof(UInt8)); - if (!out) { - free(ctx); - return nil; - } - CC_MD5_Final(out, ctx); - - NSData *outData = [NSData dataWithBytes:out length:CC_MD5_DIGEST_LENGTH]; - - free(out); - free(ctx); - return outData; -} - -- (NSData *) pgp_SHA1 -{ - if (!self) - return self; - -// unsigned char digest[CC_SHA1_DIGEST_LENGTH]; -// CC_SHA1(self.bytes, self.length, digest); -// NSData *outData = [NSData dataWithBytes:digest length:CC_SHA1_DIGEST_LENGTH]; - - CC_SHA1_CTX *ctx = calloc(1, sizeof(CC_SHA1_CTX)); - if (!ctx) { - return nil; - } - - UInt8 *outBuf = calloc(CC_SHA1_DIGEST_LENGTH, 1); - if (!outBuf) { - free(ctx); - return nil; - } - CC_SHA1_Init(ctx); - CC_SHA1_Update(ctx, self.bytes, (CC_LONG)self.length); - CC_SHA1_Final(outBuf, ctx); - - NSData *outData = [NSData dataWithBytes:outBuf length:CC_SHA1_DIGEST_LENGTH]; - - free(outBuf); - free(ctx); - return outData; -} - -- (NSData*) pgp_SHA224 -{ - if (!self) - return self; - - CC_SHA256_CTX *ctx = calloc(1, sizeof(CC_SHA256_CTX)); - if (!ctx) { - return nil; - } - - CC_SHA224_Init(ctx); - CC_SHA224_Update(ctx, self.bytes, (CC_LONG)self.length); - UInt8 *out = calloc(CC_SHA224_DIGEST_LENGTH, sizeof(UInt8)); - if (!out) { - return nil; - } - CC_SHA224_Final(out, ctx); - - NSData *outData = [NSData dataWithBytes:out length:CC_SHA224_DIGEST_LENGTH]; - - free(out); - free(ctx); - return outData; -} - -- (NSData*) pgp_SHA256 -{ - if (!self) - return self; - - CC_SHA256_CTX *ctx = calloc(1, sizeof(CC_SHA256_CTX)); - if (!ctx) { - return nil; - } - - CC_SHA256_Init(ctx); - CC_SHA256_Update(ctx, self.bytes, (CC_LONG)self.length); - UInt8 *out = calloc(CC_SHA256_DIGEST_LENGTH, sizeof(UInt8)); - if (!out) { - return nil; - } - CC_SHA256_Final(out, ctx); - - NSData *outData = [NSData dataWithBytes:out length:CC_SHA256_DIGEST_LENGTH]; - - free(out); - free(ctx); - return outData; -} - -- (NSData*) pgp_SHA384 -{ - if (!self) - return self; - - CC_SHA512_CTX *ctx = calloc(1, sizeof(CC_SHA512_CTX)); - if (!ctx) { - return nil; - } - - CC_SHA384_Init(ctx); - CC_SHA384_Update(ctx, self.bytes, (CC_LONG)self.length); - UInt8 *out = calloc(CC_SHA384_DIGEST_LENGTH, sizeof(UInt8)); - if (!out) { - return nil; - } - CC_SHA384_Final(out, ctx); - - NSData *outData = [NSData dataWithBytes:out length:CC_SHA384_DIGEST_LENGTH]; - - free(out); - free(ctx); - return outData; -} - -- (NSData*) pgp_SHA512 -{ - if (!self) - return self; - - CC_SHA512_CTX *ctx = calloc(1, sizeof(CC_SHA512_CTX)); - if (!ctx) { - return nil; - } - - CC_SHA512_Init(ctx); - CC_SHA512_Update(ctx, self.bytes, (CC_LONG)self.length); - UInt8 *outBuf = calloc(CC_SHA512_DIGEST_LENGTH, sizeof(UInt8)); - if (!outBuf) { - return nil; - } - CC_SHA512_Final(outBuf, ctx); - - NSData *outData = [NSData dataWithBytes:outBuf length:CC_SHA512_DIGEST_LENGTH]; - - free(outBuf); - free(ctx); - return outData; -} - -- (NSData*) pgp_RIPEMD160 -{ - if (!self) - return self; - - RIPEMD160_CTX *ctx = calloc(1, sizeof(RIPEMD160_CTX)); - if (!ctx) { - return nil; - } - - RIPEMD160_Init(ctx); - RIPEMD160_Update(ctx, self.bytes, self.length); - UInt8 *out = calloc(RIPEMD160_DIGEST_LENGTH, sizeof(UInt8)); - if (!out) { - return nil; - } - RIPEMD160_Final(out, ctx); - - NSData *outData = [NSData dataWithBytes:out length:RIPEMD160_DIGEST_LENGTH]; - - free(out); - free(ctx); - return outData; -} - -- (NSData *) pgp_HashedWithAlgorithm:(PGPHashAlgorithm)hashAlgorithm -{ - NSData *hashData = nil; - switch (hashAlgorithm) { - case PGPHashMD5: - hashData = [self pgp_MD5]; - break; - case PGPHashSHA1: - hashData = [self pgp_SHA1]; - break; - case PGPHashSHA224: - hashData = [self pgp_SHA224]; - break; - case PGPHashSHA256: - hashData = [self pgp_SHA256]; - break; - case PGPHashSHA384: - hashData = [self pgp_SHA384]; - break; - case PGPHashSHA512: - hashData = [self pgp_SHA512]; - break; - case PGPHashRIPEMD160: - hashData = [self pgp_RIPEMD160]; - break; - - default: - NSAssert(false, @"hash algorithm not supported"); - break; - } - return hashData; -} - -#pragma mark - Encryption - -- (NSData *) pgp_encryptBlockWithSymmetricAlgorithm:(PGPSymmetricAlgorithm)symmetricAlgorithm sessionKeyData:(NSData *)sessionKeyData -{ - NSAssert(sessionKeyData,@"Missing key data"); - - if (!sessionKeyData) { - return nil; - } - - NSUInteger keySize = [PGPCryptoUtils keySizeOfSymmetricAlhorithm:symmetricAlgorithm]; - - NSData *ret = nil; - - switch (symmetricAlgorithm) { - case PGPSymmetricCAST5: - { - CAST_KEY *encrypt_key = calloc(1, sizeof(CAST_KEY)); - CAST_set_key(encrypt_key, (unsigned int)keySize, sessionKeyData.bytes); - UInt8 *outBuf = calloc(self.length, sizeof(UInt8)); - CAST_ecb_encrypt(self.bytes, outBuf, encrypt_key, CAST_ENCRYPT); - ret = [NSData dataWithBytes:&outBuf length:self.length]; - - free(outBuf); - free(encrypt_key); - } - break; - case PGPSymmetricAES256: - case PGPSymmetricAES128: - case PGPSymmetricAES192: - { - AES_KEY *encrypt_key = calloc(1, sizeof(AES_KEY)); - AES_set_encrypt_key(sessionKeyData.bytes, keySize * 8.0, encrypt_key); - - UInt8 *outBuf = calloc(self.length, sizeof(UInt8)); - AES_encrypt(self.bytes, outBuf, encrypt_key); - ret = [NSData dataWithBytes:&outBuf length:self.length]; - - free(outBuf); - free(encrypt_key); - } - break; - case PGPSymmetricIDEA: - { - IDEA_KEY_SCHEDULE *encrypt_key = calloc(1, sizeof(IDEA_KEY_SCHEDULE)); - idea_set_encrypt_key(sessionKeyData.bytes, encrypt_key); - - UInt8 *outBuf = calloc(self.length, sizeof(UInt8)); - idea_ecb_encrypt(self.bytes, outBuf, encrypt_key); - ret = [NSData dataWithBytes:&outBuf length:self.length]; - - free(outBuf); - free(encrypt_key); - } - break; - case PGPSymmetricTripleDES: - { - // Very unsure if this is working, need some tests later - const void *key = sessionKeyData.bytes; - - DES_key_schedule *keys3 = calloc(3, sizeof(DES_key_schedule)); - for (int n = 0; n < 3; ++n) { - DES_set_key((DES_cblock *)(void *)(key + n * 8), &keys3[n]); - } - - DES_cblock *outBuf = calloc(self.length, sizeof(DES_cblock)); - DES_ecb3_encrypt((void *)(unsigned long)(const void *)(self.bytes), outBuf, &keys3[0], &keys3[1], &keys3[2], DES_ENCRYPT); - ret = [NSData dataWithBytes:&outBuf length:self.length]; - - free(outBuf); - free(keys3); - } - break; - default: - [NSException raise:@"PGPNotSupported" format:@"Encryption unsupported, cant encrypt data"]; - break; - } - return ret; -} - - -@end diff --git a/ObjectivePGP/NSData+compression.h b/ObjectivePGP/NSData+compression.h deleted file mode 100755 index eaea9c2b..00000000 --- a/ObjectivePGP/NSData+compression.h +++ /dev/null @@ -1,19 +0,0 @@ -// -// NSData+zlib.h -// -// rfc1950 (zlib format) - -#import -#import - -extern NSString* const ZlibErrorDomain; - -@interface NSData (compression) - -- (NSData *)zlibCompressed:(NSError * __autoreleasing *)error; -- (NSData *)zlibDecompressed:(NSError * __autoreleasing *)error; - -- (NSData *)bzip2Decompressed:(NSError * __autoreleasing *)error; -- (NSData *)bzip2Compressed:(NSError * __autoreleasing *)error; - -@end diff --git a/ObjectivePGP/NSData+compression.m b/ObjectivePGP/NSData+compression.m deleted file mode 100755 index cbedabaf..00000000 --- a/ObjectivePGP/NSData+compression.m +++ /dev/null @@ -1,179 +0,0 @@ -// -// NSData+zlib.m -// -// rfc1950 (zlib format) - -#import "NSData+compression.h" -#import -#import - -@implementation NSData (compression) - -- (NSData *)zlibCompressed:(NSError * __autoreleasing *)error -{ - if ([self length] == 0) - { - return [NSData data]; - } - - z_stream strm; - strm.zalloc = Z_NULL; - strm.zfree = Z_NULL; - strm.opaque = Z_NULL; - if (Z_OK != deflateInit(&strm, Z_DEFAULT_COMPRESSION)) //FIXME -13 for PGP 2.x - { - if (error) { - NSString *errorMsg = [NSString stringWithCString:strm.msg encoding:NSASCIIStringEncoding]; - *error = [NSError errorWithDomain:@"ZLIB" code:0 userInfo:@{NSLocalizedDescriptionKey: errorMsg}]; - } - return nil; - } - - NSMutableData *compressed = [NSMutableData dataWithLength: deflateBound(&strm, [self length])]; - strm.next_out = [compressed mutableBytes]; - strm.avail_out = (uInt)compressed.length; - strm.next_in = (void *)[self bytes]; - strm.avail_in = (uInt)[self length]; - - while (deflate(&strm, Z_FINISH) != Z_STREAM_END) - { - // deflate should return Z_STREAM_END on the first call - [compressed setLength: [compressed length] * 1.5]; - strm.next_out = [compressed mutableBytes] + strm.total_out; - strm.avail_out = (uInt)(compressed.length - strm.total_out); - } - - [compressed setLength: strm.total_out]; - - int status = deflateEnd(&strm); - if (status != Z_OK) { - if (error) { - NSString *errorMsg = [NSString stringWithCString:strm.msg encoding:NSASCIIStringEncoding]; - *error = [NSError errorWithDomain:@"ZLIB" code:0 userInfo:@{NSLocalizedDescriptionKey: errorMsg}]; - } - return nil; - } - - return compressed; -} - -- (NSData *)zlibDecompressed:(NSError * __autoreleasing *)error -{ - if ([self length] == 0) - { - return [NSData data]; - } - - z_stream strm; - strm.zalloc = Z_NULL; - strm.zfree = Z_NULL; - strm.opaque = Z_NULL; - if (Z_OK != inflateInit(&strm)) - { - if (error) { - NSString *errorMsg = [NSString stringWithCString:strm.msg encoding:NSASCIIStringEncoding]; - *error = [NSError errorWithDomain:@"ZLIB" code:0 userInfo:@{NSLocalizedDescriptionKey: errorMsg}]; - } - return nil; - } - - NSMutableData *decompressed = [NSMutableData dataWithLength: [self length]*2.5]; - strm.next_out = [decompressed mutableBytes]; - strm.avail_out = [decompressed length]; - strm.next_in = (void *)[self bytes]; - strm.avail_in = [self length]; - - while (inflate(&strm, Z_FINISH) != Z_STREAM_END) - { - // inflate should return Z_STREAM_END on the first call - [decompressed setLength: [decompressed length] * 1.5]; - strm.next_out = [decompressed mutableBytes] + strm.total_out; - strm.avail_out = [decompressed length] - strm.total_out; - } - - [decompressed setLength: strm.total_out]; - - int status = inflateEnd(&strm); - if (status != Z_OK) { - if (error) { - NSString *errorMsg = [NSString stringWithCString:strm.msg encoding:NSASCIIStringEncoding]; - *error = [NSError errorWithDomain:@"ZLIB" code:0 userInfo:@{NSLocalizedDescriptionKey: errorMsg}]; - } - return nil; - } - - return decompressed; -} - -- (NSData *)bzip2Decompressed:(NSError * __autoreleasing *)error -{ - int bzret = 0; - bz_stream stream = {0x00}; - stream.next_in = (void *)[self bytes]; - stream.avail_in = self.length; - - const int buffer_size = 10000; - NSMutableData *buffer = [NSMutableData dataWithLength:buffer_size]; - stream.next_out = [buffer mutableBytes]; - stream.avail_out = buffer_size; - - NSMutableData * decompressed = [NSMutableData data]; - - BZ2_bzDecompressInit(&stream, 0, NO); - do { - bzret = BZ2_bzDecompress(&stream); - if (bzret != BZ_OK && bzret != BZ_STREAM_END) { - if (error) { - *error = [NSError errorWithDomain:@"BZIP2" code:0 userInfo:@{NSLocalizedDescriptionKey: @"BZ2_bzDecompress failed"}]; - } - BZ2_bzCompressEnd(&stream); - return nil; - } - - [decompressed appendBytes:[buffer bytes] length:(buffer_size - stream.avail_out)]; - stream.next_out = [buffer mutableBytes]; - stream.avail_out = buffer_size; - } while(bzret != BZ_STREAM_END); - - BZ2_bzDecompressEnd(&stream); - return decompressed; -} - -- (NSData *)bzip2Compressed:(NSError * __autoreleasing *)error -{ - int bzret = 0; - bz_stream stream = {0x00}; - stream.next_in = (void *)[self bytes]; - stream.avail_in = self.length; - unsigned int compression = 9; // should be a value between 1 and 9 inclusive - - const int buffer_size = 10000; - NSMutableData *buffer = [NSMutableData dataWithLength:buffer_size]; - stream.next_out = [buffer mutableBytes]; - stream.avail_out = buffer_size; - - NSMutableData * decompressed = [NSMutableData data]; - - BZ2_bzCompressInit(&stream, compression, 0, 0); - do { - bzret = BZ2_bzCompress(&stream, (stream.avail_in) ? BZ_RUN : BZ_FINISH); - if (bzret != BZ_RUN_OK && bzret != BZ_STREAM_END) { - if (error) { - *error = [NSError errorWithDomain:@"BZIP2" code:0 userInfo:@{NSLocalizedDescriptionKey: @"BZ2_bzCompress failed"}]; - } - BZ2_bzCompressEnd(&stream); - return nil; - } - - [decompressed appendBytes:[buffer bytes] length:(buffer_size - stream.avail_out)]; - stream.next_out = [buffer mutableBytes]; - stream.avail_out = buffer_size; - } while(bzret != BZ_STREAM_END); - - BZ2_bzCompressEnd(&stream); - return decompressed; -} - - - -@end diff --git a/ObjectivePGP/NSMutableData+PGP.h b/ObjectivePGP/NSMutableData+PGP.h new file mode 100644 index 00000000..07723942 --- /dev/null +++ b/ObjectivePGP/NSMutableData+PGP.h @@ -0,0 +1,17 @@ +// +// NSMutableData+PGP.h +// ObjectivePGP +// +// Created by Marcin Krzyzanowski on 17/02/15. +// Copyright (c) 2015 Marcin Krzyżanowski. All rights reserved. +// + +#import + +@interface NSMutableData (PGP) + +- (void) appendUInt8:(UInt8)value; +- (void) appendUInt16BE:(UInt16)value; +- (void) appendUInt32BE:(UInt32)value; + +@end diff --git a/ObjectivePGP/NSMutableData+PGP.m b/ObjectivePGP/NSMutableData+PGP.m new file mode 100644 index 00000000..d45375d3 --- /dev/null +++ b/ObjectivePGP/NSMutableData+PGP.m @@ -0,0 +1,30 @@ +// +// NSMutableData+PGP.m +// ObjectivePGP +// +// Created by Marcin Krzyzanowski on 17/02/15. +// Copyright (c) 2015 Marcin Krzyżanowski. All rights reserved. +// + +#import "NSMutableData+PGP.h" + +@implementation NSMutableData (PGP) + +- (void) appendUInt8:(UInt8)value +{ + [self appendBytes:&value length:1]; +} + +- (void) appendUInt16BE:(UInt16)value +{ + UInt16 valueBE = CFSwapInt16HostToBig(value); + [self appendBytes:&valueBE length:2]; +} + +- (void) appendUInt32BE:(UInt32)value +{ + UInt32 valueBE = CFSwapInt32HostToBig(value); + [self appendBytes:&valueBE length:4]; +} + +@end diff --git a/ObjectivePGP/NSValue+PGPUtils.h b/ObjectivePGP/NSValue+PGPUtils.h deleted file mode 100644 index 7c72db0e..00000000 --- a/ObjectivePGP/NSValue+PGPUtils.h +++ /dev/null @@ -1,15 +0,0 @@ -// -// NSValue+PGPUtils.h -// ObjectivePGP -// -// Created by Marcin Krzyzanowski on 18/05/14. -// Copyright (c) 2014 Marcin Krzyżanowski. All rights reserved. -// - -#import - -@interface NSValue (PGPUtils) - -- (BOOL) pgp_objCTypeIsEqualTo:(const char *)type; - -@end diff --git a/ObjectivePGP/NSValue+PGPUtils.m b/ObjectivePGP/NSValue+PGPUtils.m deleted file mode 100644 index 643c324d..00000000 --- a/ObjectivePGP/NSValue+PGPUtils.m +++ /dev/null @@ -1,24 +0,0 @@ -// -// NSValue+PGPUtils.m -// ObjectivePGP -// -// Created by Marcin Krzyzanowski on 18/05/14. -// Copyright (c) 2014 Marcin Krzyżanowski. All rights reserved. -// - -#import "NSValue+PGPUtils.h" - -@implementation NSValue (PGPUtils) - -- (BOOL) pgp_objCTypeIsEqualTo:(const char *)type -{ - if (!type || strlen(type) == 0) - return NO; - - if (strcmp([self objCType], type) == 0) { - return YES; - } - return NO; -} - -@end diff --git a/ObjectivePGP/ObjectivePGP.h b/ObjectivePGP/ObjectivePGP.h deleted file mode 100644 index 9fa9490b..00000000 --- a/ObjectivePGP/ObjectivePGP.h +++ /dev/null @@ -1,53 +0,0 @@ -// -// ObjectivePGP.h -// ObjectivePGP -// -// Created by Marcin Krzyzanowski on 03/05/14. -// Copyright (c) 2014 Marcin Krzyżanowski. All rights reserved. -// - -#import -#import "PGPTypes.h" -#import "PGPKey.h" -#import "PGPUser.h" - -@interface ObjectivePGP : NSObject - -/** - * Array of PGPKey - */ -@property (strong, nonatomic) NSArray *keys; - -// Import keys -- (NSArray *) importKeysFromFile:(NSString *)path allowDuplicates:(BOOL)duplicates; -- (NSArray *) importKeysFromData:(NSData *)data allowDuplicates:(BOOL)duplicates; -- (BOOL) importKey:(NSString *)shortKeyStringIdentifier fromFile:(NSString *)path; - -// Read keys -- (NSArray *) keysFromData:(NSData *)fileData; -- (NSArray *) keysFromFile:(NSString *)path; - -// Export keys -- (BOOL) exportKeysOfType:(PGPKeyType)type toFile:(NSString *)path error:(NSError * __autoreleasing *)error; -- (BOOL) exportKeys:(NSArray *)keys toFile:(NSString *)path error:(NSError * __autoreleasing *)error; -- (NSData *) exportKey:(PGPKey *)key armored:(BOOL)armored; - -- (PGPKey *) getKeyForIdentifier:(NSString *)keyIdentifier type:(PGPKeyType)keyType; -- (PGPKey *) getKeyForKeyID:(PGPKeyID *)searchKeyID type:(PGPKeyType)keyType; -- (NSArray *) getKeysForUserID:(NSString *)userID; -- (NSArray *) getKeysOfType:(PGPKeyType)keyType; - -- (NSData *) signData:(NSData *)dataToSign usingSecretKey:(PGPKey *)secretKey passphrase:(NSString *)passphrase error:(NSError * __autoreleasing *)error; -- (NSData *) signData:(NSData *)dataToSign usingSecretKey:(PGPKey *)secretKey passphrase:(NSString *)passphrase detached:(BOOL)detached error:(NSError * __autoreleasing *)error; -- (NSData *) signData:(NSData *)dataToSign withKeyForUserID:(NSString *)userID passphrase:(NSString *)passphrase error:(NSError * __autoreleasing *)error; -- (NSData *) signData:(NSData *)dataToSign withKeyForUserID:(NSString *)userID passphrase:(NSString *)passphrase detached:(BOOL)detached error:(NSError * __autoreleasing *)error; - -- (BOOL) verifyData:(NSData *)signedDataPackets error:(NSError * __autoreleasing *)error; -- (BOOL) verifyData:(NSData *)signedData withSignature:(NSData *)signatureData error:(NSError * __autoreleasing *)error; -- (BOOL) verifyData:(NSData *)signedData withSignature:(NSData *)signatureData usingKey:(PGPKey *)publicKey error:(NSError * __autoreleasing *)error; - -- (NSData *) encryptData:(NSData *)dataToEncrypt usingPublicKey:(PGPKey *)publicKey armored:(BOOL)armored error:(NSError * __autoreleasing *)error; -- (NSData *) encryptData:(NSData *)dataToEncrypt usingPublicKeys:(NSArray *)publicKeys armored:(BOOL)armored error:(NSError * __autoreleasing *)error; -- (NSData *) decryptData:(NSData *)messageDataToDecrypt passphrase:(NSString *)passphrase error:(NSError * __autoreleasing *)error; - -@end diff --git a/ObjectivePGP/ObjectivePGP.m b/ObjectivePGP/ObjectivePGP.m deleted file mode 100644 index c0f79691..00000000 --- a/ObjectivePGP/ObjectivePGP.m +++ /dev/null @@ -1,806 +0,0 @@ -// -// ObjectivePGP.m -// ObjectivePGP -// -// Created by Marcin Krzyzanowski on 03/05/14. -// Copyright (c) 2014 Marcin Krzyżanowski. All rights reserved. -// - -#import "ObjectivePGP.h" -#import "PGPPacketFactory.h" -#import "PGPKey.h" -#import "PGPSubKey.h" -#import "PGPSignaturePacket.h" -#import "PGPPacketFactory.h" -#import "PGPUserIDPacket.h" -#import "PGPPublicKeyPacket.h" -#import "PGPSecretKeyPacket.h" -#import "PGPLiteralPacket.h" -#import "PGPUser.h" -#import "PGPOnePassSignaturePacket.h" -#import "PGPLiteralPacket.h" -#import "PGPCompressedPacket.h" -#import "PGPArmor.h" -#import "PGPCryptoUtils.h" -#import "PGPPublicKeyEncryptedSessionKeyPacket.h" -#import "PGPSymmetricallyEncryptedIntegrityProtectedDataPacket.h" -#import "PGPMPI.h" - -@implementation ObjectivePGP - -- (NSArray *)keys -{ - if (!_keys) { - _keys = [NSArray array]; - } - return _keys; -} - -#pragma mark - Search - -// full user identifier -- (NSArray *) getKeysForUserID:(NSString *)userID -{ - NSMutableArray *foundKeysArray = [NSMutableArray array]; - [self.keys enumerateObjectsUsingBlock:^(id obj, NSUInteger idx, BOOL *stop) { - PGPKey *key = obj; - for (PGPUser *user in key.users) { - if ([user.userID isEqualToString:userID]) { - [foundKeysArray addObject:key]; - } - } - }]; - return foundKeysArray.count > 0 ? [foundKeysArray copy] : nil; -} - -- (PGPKey *) getKeyForKeyID:(PGPKeyID *)searchKeyID type:(PGPKeyType)keyType -{ - if (!searchKeyID) { - return nil; - } - - __block PGPKey *foundKey = nil; - [[self getKeysOfType:keyType] enumerateObjectsUsingBlock:^(id obj, NSUInteger idx, BOOL *stop) { - PGPKey *key = obj; - if ([key.keyID isEqualToKeyID:searchKeyID]) { - foundKey = key; - *stop = YES; - } - - [key.subKeys enumerateObjectsUsingBlock:^(id objsub, NSUInteger idxsub, BOOL *stopsub) { - PGPSubKey *subKey = objsub; - if ([subKey.keyID isEqualToKeyID:searchKeyID]) { - foundKey = key; - *stopsub = YES; - *stop = YES; - } - - }]; - }]; - return foundKey; -} - -// 16 or 8 chars identifier -//TODO: rename to getKeyForFingerprint or something -- (PGPKey *) getKeyForIdentifier:(NSString *)keyIdentifier type:(PGPKeyType)keyType -{ - if (keyIdentifier.length < 8 && keyIdentifier.length > 16) - return nil; - - __block PGPKey *foundKey = nil; - [[self getKeysOfType:keyType] enumerateObjectsUsingBlock:^(id obj, NSUInteger idx, BOOL *stop) { - PGPKey *key = obj; - PGPPublicKeyPacket *primaryPacket = (PGPPublicKeyPacket *)key.primaryKeyPacket; - if (keyIdentifier.length == 16 && [[primaryPacket.keyID.longKeyString uppercaseString] isEqualToString:[keyIdentifier uppercaseString]]) { - foundKey = key; - *stop = YES; - return; - } else if (keyIdentifier.length == 8 && [[primaryPacket.keyID.shortKeyString uppercaseString] isEqualToString:[keyIdentifier uppercaseString]]) { - foundKey = key; - *stop = YES; - return; - } - - [[key subKeys] enumerateObjectsUsingBlock:^(id subobj, NSUInteger subidx, BOOL *substop) { - PGPSubKey *subKey = subobj; - PGPPublicKeyPacket *subprimaryPacket = (PGPPublicKeyPacket *)subKey.primaryKeyPacket; - if (keyIdentifier.length == 16 && [[subprimaryPacket.keyID.longKeyString uppercaseString] isEqualToString:[keyIdentifier uppercaseString]]) { - foundKey = key; - *substop = YES; - *stop = YES; - } else if (keyIdentifier.length == 8 && [[subprimaryPacket.keyID.shortKeyString uppercaseString] isEqualToString:[keyIdentifier uppercaseString]]) { - foundKey = key; - *substop = YES; - *stop = YES; - } - }]; - }]; - return foundKey; -} - -- (NSArray *) getKeysOfType:(PGPKeyType)keyType -{ - NSMutableArray *keysArray = [NSMutableArray array]; - for (PGPKey *key in self.keys) { - if (key.type == keyType) - [keysArray addObject:key]; - } - return [keysArray copy]; -} - -#pragma mark - Save - -- (BOOL) exportKeysOfType:(PGPKeyType)type toFile:(NSString *)path error:(NSError * __autoreleasing *)error -{ - return [self exportKeys:[self getKeysOfType:type] toFile:path error:error]; -} - -- (BOOL) exportKeys:(NSArray *)keys toFile:(NSString *)path error:(NSError * __autoreleasing *)error -{ - BOOL result = YES; - for (PGPKey *key in keys) { - result = result && [self appendKey:key toKeyring:path error:error]; - } - return result; -} - - -- (BOOL) appendKey:(PGPKey *)key toKeyring:(NSString *)path error:(NSError * __autoreleasing *)error -{ - NSFileManager *fm = [NSFileManager defaultManager]; - - if (!path) { - return NO; - } - - NSData *keyData = [key export:error]; - if (*error) { - return NO; - } - - BOOL result = NO; - if (![fm fileExistsAtPath:path]) { - NSDictionary *attributes = nil; -#ifdef __IPHONE_OS_VERSION_MAX_ALLOWED - attributes = @{NSFileProtectionKey: NSFileProtectionComplete, NSFilePosixPermissions: @(0600)}; -#else - attributes = @{NSFilePosixPermissions: @(0600)}; -#endif - result = [fm createFileAtPath:path contents:keyData attributes:attributes]; - } else { - @try { - NSFileHandle *fileHandle = [NSFileHandle fileHandleForUpdatingAtPath:path]; - [fileHandle seekToEndOfFile]; - [fileHandle writeData:keyData]; - [fileHandle closeFile]; - result = YES; - } - @catch (NSException *exception) { - result = NO; - } - } - return result; -} - -- (NSData *) exportKey:(PGPKey *)key armored:(BOOL)armored -{ - NSAssert(key, @"Missing parameter"); - if (!key) { - return nil; - } - - NSError *exportError = nil; - NSData *keyData = [key export:&exportError]; - if (!keyData || exportError) { - NSLog(@"%@",exportError); - return nil; - } - - if (armored) { - return [PGPArmor armoredData:keyData as:PGPArmorTypePublicKey]; - } else { - return keyData; - } - return nil; -} - -#pragma mark - Encrypt & Decrypt - -- (NSData *) decryptData:(NSData *)messageDataToDecrypt passphrase:(NSString *)passphrase error:(NSError * __autoreleasing *)error -{ - NSData *binaryMessageToDecrypt = [self convertArmoredMessage2BinaryWhenNecessary:messageDataToDecrypt]; - NSAssert(binaryMessageToDecrypt != nil, @"Invalid input data"); - if (!binaryMessageToDecrypt) { - if (error) { - *error = [NSError errorWithDomain:PGPErrorDomain code:0 userInfo:@{NSLocalizedDescriptionKey: @"Invalid input data"}]; - } - return nil; - } - - // parse packets - NSArray *packets = [self readPacketsFromData:binaryMessageToDecrypt]; - - PGPSymmetricAlgorithm sessionKeyAlgorithm = 0; - PGPSecretKeyPacket *decryptionSecretKeyPacket = nil; // found secret key to used to decrypt - NSData *decryptedData = nil; - - // 1. search for valid and known (do I have specified key?) ESK - PGPPublicKeyEncryptedSessionKeyPacket *eskPacket = nil; - for (PGPPacket *packet in packets) { - if (packet.tag == PGPPublicKeyEncryptedSessionKeyPacketTag) { - PGPPublicKeyEncryptedSessionKeyPacket *pkESKPacket = (PGPPublicKeyEncryptedSessionKeyPacket *)packet; - PGPKey *decryptionSecretKey = [self getKeyForKeyID:pkESKPacket.keyID type:PGPKeySecret]; - if (!decryptionSecretKey) { - continue; - } - - decryptionSecretKeyPacket = (PGPSecretKeyPacket *)[decryptionSecretKey decryptionKeyPacket:error]; - - // decrypt key with passphrase if encrypted - if (decryptionSecretKeyPacket.isEncryptedWithPassword) { - - if (!passphrase) { - if (error) { - *error = [NSError errorWithDomain:PGPErrorDomain code:PGPErrorPassphraseRequired userInfo:@{NSLocalizedDescriptionKey: @"Password is required for key"}]; - } - return nil; - } - - decryptionSecretKeyPacket = [decryptionSecretKeyPacket decryptedKeyPacket:passphrase error:error]; - if (error && *error) { - return nil; - } - } - eskPacket = pkESKPacket; - } - } - - if (error && *error) { - return nil; - } - - NSAssert(eskPacket, @"Valid PublicKeyEncryptedSessionKeyPacket not found"); - if (!eskPacket) { - if (error) { - *error = [NSError errorWithDomain:PGPErrorDomain code:0 userInfo:@{NSLocalizedDescriptionKey: @"Valid PublicKeyEncryptedSessionKeyPacket not found"}]; - } - return nil; - } - - NSAssert(decryptionSecretKeyPacket, @"Decryption secret key packet not found"); - if (!decryptionSecretKeyPacket) { - if (error) { - *error = [NSError errorWithDomain:PGPErrorDomain code:0 userInfo:@{NSLocalizedDescriptionKey: @"Unable to find secret key"}]; - } - return nil; - } - - - NSData *sessionKeyData = [eskPacket decryptSessionKeyData:decryptionSecretKeyPacket sessionKeyAlgorithm:&sessionKeyAlgorithm error:error]; - NSAssert(sessionKeyAlgorithm > 0, @"Invalid session key algorithm"); - - NSAssert(sessionKeyData, @"Missing session key data"); - if (!sessionKeyData) { - if (error) { - *error = [NSError errorWithDomain:PGPErrorDomain code:0 userInfo:@{NSLocalizedDescriptionKey: @"Missing session key data"}]; - } - return nil; - } - - // 2 - for (PGPPacket *packet in packets) { - switch (packet.tag) { - case PGPSymmetricallyEncryptedIntegrityProtectedDataPacketTag: - { - // decrypt PGPSymmetricallyEncryptedIntegrityProtectedDataPacket - PGPSymmetricallyEncryptedIntegrityProtectedDataPacket *symEncryptedDataPacket = (PGPSymmetricallyEncryptedIntegrityProtectedDataPacket *)packet; - decryptedData = [symEncryptedDataPacket decryptWithSecretKeyPacket:decryptionSecretKeyPacket sessionKeyAlgorithm:sessionKeyAlgorithm sessionKeyData:sessionKeyData error:error]; - if (!decryptedData) { - return nil; - } - } - break; - default: - - break; - } - } - return decryptedData; -} - -- (NSData *) encryptData:(NSData *)dataToEncrypt usingPublicKey:(PGPKey *)publicKey armored:(BOOL)armored error:(NSError * __autoreleasing *)error -{ - return [self encryptData:dataToEncrypt usingPublicKeys:@[publicKey] armored:armored error:error]; -} - -- (NSData *) encryptData:(NSData *)dataToEncrypt usingPublicKeys:(NSArray *)publicKeys armored:(BOOL)armored error:(NSError * __autoreleasing *)error -{ - // Message.prototype.encrypt = function(keys) { - NSMutableData *encryptedMessage = [NSMutableData data]; - - // Prepare literal packet - PGPLiteralPacket *literalPacket = [PGPLiteralPacket literalPacket:PGPLiteralPacketBinary withData:dataToEncrypt]; - literalPacket.filename = nil; - literalPacket.timestamp = [NSDate date]; - NSAssert(!(*error), @"Missing literal data"); - if (*error) { - return nil; - } - NSData *literalPacketData = [literalPacket exportPacket:error]; - if (*error) { - return nil; - } - - PGPCompressedPacket *compressedPacket = [[PGPCompressedPacket alloc] initWithData:literalPacketData type:PGPCompressionBZIP2]; - NSData *compressedPacketData = [compressedPacket exportPacket:error]; - if (*error) { - return nil; - } - - //PGPPublicKeyEncryptedSessionKeyPacket goes here - PGPSymmetricAlgorithm preferredSymmeticAlgorithm = [PGPKey preferredSymmetricAlgorithmForKeys:publicKeys]; - - // Random bytes as a string to be used as a key - NSUInteger keySize = [PGPCryptoUtils keySizeOfSymmetricAlhorithm:preferredSymmeticAlgorithm]; - NSMutableData *sessionKeyData = [NSMutableData data]; - for (int i = 0; i < (keySize); i++) { - UInt8 byte = arc4random_uniform(255); - [sessionKeyData appendBytes:&byte length:1]; - } - - for (PGPKey *publicKey in publicKeys) { - // Encrypted Message :- Encrypted Data | ESK Sequence, Encrypted Data. - // Encrypted Data :- Symmetrically Encrypted Data Packet | Symmetrically Encrypted Integrity Protected Data Packet - // ESK :- Public-Key Encrypted Session Key Packet | Symmetric-Key Encrypted Session Key Packet. - - // ESK - PGPPublicKeyPacket *encryptionKeyPacket = (PGPPublicKeyPacket *)[publicKey encryptionKeyPacket:error]; - if (encryptionKeyPacket) { - // var pkESKeyPacket = new packet.PublicKeyEncryptedSessionKey(); - PGPPublicKeyEncryptedSessionKeyPacket *eskKeyPacket = [[PGPPublicKeyEncryptedSessionKeyPacket alloc] init]; - eskKeyPacket.keyID = encryptionKeyPacket.keyID; - eskKeyPacket.publicKeyAlgorithm = encryptionKeyPacket.publicKeyAlgorithm; - [eskKeyPacket encrypt:encryptionKeyPacket sessionKeyData:sessionKeyData sessionKeyAlgorithm:preferredSymmeticAlgorithm error:error]; - NSAssert(!(*error), @"Missing literal data"); - if (*error) { - return nil; - } - [encryptedMessage appendData:[eskKeyPacket exportPacket:error]]; - if (*error) { - return nil; - } - } - } - - if (*error) { - return nil; - } - - PGPSymmetricallyEncryptedIntegrityProtectedDataPacket *symEncryptedDataPacket = [[PGPSymmetricallyEncryptedIntegrityProtectedDataPacket alloc] init]; - [symEncryptedDataPacket encrypt:compressedPacketData - symmetricAlgorithm:preferredSymmeticAlgorithm - sessionKeyData:sessionKeyData - error: error]; - - if (*error) { - return nil; - } - - [encryptedMessage appendData:[symEncryptedDataPacket exportPacket:error]]; - if (*error) { - return nil; - } - - if (armored) { - return [PGPArmor armoredData:encryptedMessage as:PGPArmorTypeMessage]; - } - - return [encryptedMessage copy]; -} - -#pragma mark - Sign & Verify - -- (NSData *) signData:(NSData *)dataToSign withKeyForUserID:(NSString *)userID passphrase:(NSString *)passphrase error:(NSError * __autoreleasing *)error -{ - return [self signData:dataToSign withKeyForUserID:userID passphrase:passphrase detached:YES error:error]; -} - -- (NSData *) signData:(NSData *)dataToSign withKeyForUserID:(NSString *)userID passphrase:(NSString *)passphrase detached:(BOOL)detached error:(NSError * __autoreleasing *)error -{ - PGPKey *key = [[self getKeysForUserID:userID] lastObject]; - NSAssert(key, @"Key is missing"); - - if (!key) { - if (error) { - *error = [NSError errorWithDomain:PGPErrorDomain code:PGPErrorGeneral userInfo:@{NSLocalizedDescriptionKey: @"Key is missing"}]; - } - return nil; - } - - return [self signData:dataToSign usingSecretKey:key passphrase:passphrase error:error]; -} - -- (NSData *) signData:(NSData *)dataToSign usingSecretKey:(PGPKey *)secretKey passphrase:(NSString *)passphrase error:(NSError * __autoreleasing *)error -{ - return [self signData:dataToSign usingSecretKey:secretKey passphrase:passphrase detached:YES error:error]; -} - -- (NSData *) signData:(NSData *)dataToSign usingSecretKey:(PGPKey *)secretKey passphrase:(NSString *)passphrase detached:(BOOL)detached error:(NSError * __autoreleasing *)error -{ - //TODO: configurable defaults for prefered hash - return [self signData:dataToSign usingSecretKey:secretKey passphrase:passphrase hashAlgorithm:PGPHashSHA512 detached:detached error:error]; -} - -- (NSData *) signData:(NSData *)dataToSign usingSecretKey:(PGPKey *)secretKey passphrase:(NSString *)passphrase hashAlgorithm:(PGPHashAlgorithm)preferedHashAlgorithm detached:(BOOL)detached error:(NSError * __autoreleasing *)error -{ - PGPSignaturePacket *signaturePacket = [PGPSignaturePacket signaturePacket:PGPSignatureBinaryDocument - hashAlgorithm:preferedHashAlgorithm]; - - [signaturePacket signData:dataToSign secretKey:secretKey passphrase:passphrase userID:nil error:error]; - NSError *exportError = nil; - NSData *signaturePacketData = [signaturePacket exportPacket:&exportError]; - NSAssert(!exportError,@"Error on export packet"); - if (exportError) { - if (error) { - *error = [NSError errorWithDomain:PGPErrorDomain code:PGPErrorGeneral userInfo:@{NSLocalizedDescriptionKey: @"Error on export packet"}]; - } - return nil; - } - - // Signed Message :- Signature Packet, Literal Message - NSMutableData *signedMessage = [NSMutableData data]; - if (!detached) { - // OnePass - PGPOnePassSignaturePacket *onePassPacket = [[PGPOnePassSignaturePacket alloc] init]; - onePassPacket.signatureType = signaturePacket.type; - onePassPacket.publicKeyAlgorithm = signaturePacket.publicKeyAlgorithm; - onePassPacket.hashAlgorith = signaturePacket.hashAlgoritm; - - onePassPacket.keyID = [signaturePacket issuerKeyID]; - - onePassPacket.notNested = YES; - NSError *onePassExportError = nil; - [signedMessage appendData:[onePassPacket exportPacket:&onePassExportError]]; - NSAssert(!onePassExportError, @"Missing one password data"); - if (onePassExportError) { - if (error) { - *error = [NSError errorWithDomain:PGPErrorDomain code:PGPErrorGeneral userInfo:@{NSLocalizedDescriptionKey: @"Missing one password data"}]; - } - return nil; - } - - // Literal - PGPLiteralPacket *literalPacket = [PGPLiteralPacket literalPacket:PGPLiteralPacketBinary withData:dataToSign]; - literalPacket.filename = nil; - literalPacket.timestamp = [NSDate date]; - NSError *literalExportError = nil; - [signedMessage appendData:[literalPacket exportPacket:&literalExportError]]; - NSAssert(!literalExportError, @"Missing literal data"); - if (literalExportError) { - if (error) { - *error = [NSError errorWithDomain:PGPErrorDomain code:PGPErrorGeneral userInfo:@{NSLocalizedDescriptionKey: @"Missing literal data"}]; - } - return nil; - } - } - [signedMessage appendData:signaturePacketData]; - return [signedMessage copy]; -} - -- (BOOL) verifyData:(NSData *)signedData withSignature:(NSData *)signatureData error:(NSError * __autoreleasing *)error -{ - if (!signedData || !signatureData) { - if (error) { - *error = [NSError errorWithDomain:PGPErrorDomain code:PGPErrorGeneral userInfo:@{NSLocalizedDescriptionKey: @"Missing input data"}]; - } - return NO; - } - - // search for key in keys - id packet = [PGPPacketFactory packetWithData:signatureData offset:0]; - if (![packet isKindOfClass:[PGPSignaturePacket class]]) { - NSAssert(false, @"need signature"); - if (error) { - *error = [NSError errorWithDomain:PGPErrorDomain code:PGPErrorGeneral userInfo:@{NSLocalizedDescriptionKey: @"Missing signature packet"}]; - } - return NO; - } - - PGPSignaturePacket *signaturePacket = packet; - PGPKeyID *issuerKeyID = [signaturePacket issuerKeyID]; - - PGPKey *issuerKey = [self findKeyForKeyID:issuerKeyID]; - if (!issuerKey) { - if (error) { - *error = [NSError errorWithDomain:PGPErrorDomain code:PGPErrorGeneral userInfo:@{NSLocalizedDescriptionKey: @"Missing issuer"}]; - } - return NO; - } - - return [self verifyData:signedData withSignature:signatureData usingKey:issuerKey error:error]; -} - -- (BOOL) verifyData:(NSData *)signedData withSignature:(NSData *)signatureData usingKey:(PGPKey *)publicKey error:(NSError * __autoreleasing *)error -{ - if (!publicKey || !signatureData || !signatureData) { - if (error) { - *error = [NSError errorWithDomain:PGPErrorDomain code:PGPErrorGeneral userInfo:@{NSLocalizedDescriptionKey: @"Invalid input data"}]; - } - return NO; - } - - id packet = [PGPPacketFactory packetWithData:signatureData offset:0]; - if (![packet isKindOfClass:[PGPSignaturePacket class]]) { - NSAssert(false, @"need signature"); - if (error) { - *error = [NSError errorWithDomain:PGPErrorDomain code:PGPErrorGeneral userInfo:@{NSLocalizedDescriptionKey: @"Missing signature"}]; - } - return NO; - } - - PGPSignaturePacket *signaturePacket = packet; - BOOL verified = [signaturePacket verifyData:signedData withKey:publicKey userID:nil error:error]; - - return verified; -} - -- (BOOL) verifyData:(NSData *)signedDataPackets error:(NSError * __autoreleasing *)error -{ - // this is propably not the best solution when it comes to memory consumption - // because literal data is copied more than once (first at parse phase, then when is come to build signature packet data - // I belive this is unecessary but require more work. Schedule to v2.0 - @autoreleasepool { - // search for signature packet - NSMutableArray *accumulatedPackets = [NSMutableArray array]; - NSUInteger offset = 0; - - //TODO: dont parse data here, get raw data and pass to verifyData:withsignature: - while (offset < signedDataPackets.length) { - - PGPPacket *packet = [PGPPacketFactory packetWithData:signedDataPackets offset:offset]; - if (packet) { - [accumulatedPackets addObject:packet]; - } - - offset = offset + packet.headerData.length + packet.bodyData.length; - } - - //NSLog(@"%@",accumulatedPackets); - - PGPSignaturePacket *signaturePacket = nil; - PGPLiteralPacket *literalDataPacket = nil; - - for (PGPPacket *packet in accumulatedPackets) { - if (packet.tag == PGPSignaturePacketTag) { - signaturePacket = (PGPSignaturePacket *)packet; - } - if (packet.tag == PGPLiteralDataPacketTag) { - literalDataPacket = (PGPLiteralPacket *)packet; - } - } - - NSAssert(signaturePacket && literalDataPacket, @"Missing signature packet or literal data packet"); - if (!signaturePacket || !literalDataPacket) { - if (error) { - *error = [NSError errorWithDomain:PGPErrorDomain code:PGPErrorGeneral userInfo:@{NSLocalizedDescriptionKey: @"Missing signature packet or literal data packet"}]; - } - return NO; - } - - // do not build signature, use data that was readed from signedDataPackets - // to build final data and avoid unecesarry copying data dataWithBytesNoCopy:length:freeWhenDone: is used - // signaturePacket and literalDataPacket is strong in this scope so will not be released - // before verification process end. - NSMutableData *signaturePacketData = [NSMutableData data]; - [signaturePacketData appendData:[NSData dataWithBytesNoCopy:(void *)signaturePacket.headerData.bytes length:signaturePacket.headerData.length freeWhenDone:NO]]; - [signaturePacketData appendData:[NSData dataWithBytesNoCopy:(void *)signaturePacket.bodyData.bytes length:signaturePacket.bodyData.length freeWhenDone:NO]]; - - return [self verifyData:literalDataPacket.literalRawData withSignature:signaturePacketData error:error]; - } -} - -#pragma mark - Parse keyring - -/** - * Load keyring file (secring or pubring) - * - * @param path Path to file - * - * @return YES on success - */ -- (NSArray *) importKeysFromFile:(NSString *)path allowDuplicates:(BOOL)allowDuplicates -{ - if (![[NSFileManager defaultManager] fileExistsAtPath:path]) { - return nil; - } - - return [self importKeysFromData:[NSData dataWithContentsOfFile:path] allowDuplicates:allowDuplicates]; -} - -- (NSArray *) importKeysFromData:(NSData *)data allowDuplicates:(BOOL)allowDuplicates -{ - if (!data) { - return nil; - } - - NSArray *loadedKeys = [self keysFromData:data]; - if (!allowDuplicates) { - NSMutableSet *keysSet = [NSMutableSet setWithArray:self.keys]; - [keysSet addObjectsFromArray:loadedKeys]; - self.keys = [keysSet allObjects]; - } else { - self.keys = [self.keys arrayByAddingObjectsFromArray:loadedKeys]; - } - return loadedKeys; -} - -- (BOOL) importKey:(NSString *)shortKeyStringIdentifier fromFile:(NSString *)path -{ - NSString *fullPath = [path stringByExpandingTildeInPath]; - - NSArray *loadedKeys = [self keysFromFile:fullPath]; - if (loadedKeys.count == 0) { - return NO; - } - - __block BOOL foundKey = NO; - [loadedKeys enumerateObjectsUsingBlock:^(id obj, NSUInteger idx, BOOL *stop) { - PGPKey *key = obj; - - if ([key.primaryKeyPacket isKindOfClass:[PGPPublicKeyPacket class]]) { - PGPPublicKeyPacket *keyPacket = (PGPPublicKeyPacket *)key.primaryKeyPacket; - if ([[keyPacket.keyID.shortKeyString uppercaseString] isEqualToString:[shortKeyStringIdentifier uppercaseString]]) - { - self.keys = [self.keys arrayByAddingObject:key]; - foundKey = YES; - *stop = YES; - } - } - }]; - - return foundKey; -} - -- (NSArray *) keysFromFile:(NSString *)path -{ - NSString *fullPath = [path stringByExpandingTildeInPath]; - - BOOL isDirectory = NO; - if (![[NSFileManager defaultManager] fileExistsAtPath:fullPath isDirectory:&isDirectory]) { - return nil; - } - - if (isDirectory) { - return nil; - } - - NSError *error = nil; - NSData *fileData = [NSData dataWithContentsOfFile:fullPath options:NSDataReadingMappedIfSafe | NSDataReadingUncached error:&error]; - if (!fileData || error) { - return nil; - } - - return [self keysFromData:fileData]; -} - -- (NSArray *) keysFromData:(NSData *)fileData -{ - NSAssert(fileData, @"Missing data"); - if (!fileData) { - return nil; - } - - NSData *binRingData = [self convertArmoredMessage2BinaryWhenNecessary:fileData]; - NSAssert(binRingData != nil, @"Invalid input data"); - if (!binRingData) { - return nil; - } - - NSArray *parsedKeys = [self readKeysFromData:binRingData]; - if (parsedKeys.count == 0) { - return nil; - } - - return parsedKeys; -} - -#pragma mark - Private - -- (NSArray *) readPacketsFromData:(NSData *)keyringData -{ - NSMutableArray *accumulatedPackets = [NSMutableArray array]; - NSUInteger offset = 0; - - while (offset < keyringData.length) { - - PGPPacket *packet = [PGPPacketFactory packetWithData:keyringData offset:offset]; - if (packet) { - [accumulatedPackets addObject:packet]; - } - - offset = offset + packet.headerData.length + packet.bodyData.length; - } - - return [accumulatedPackets copy]; -} - -/** - * Parse PGP packets data - * - * @param messageData PGP Message data with packets - * - * @return Array of PGPKey - */ -- (NSArray *) readKeysFromData:(NSData *)messageData -{ - NSMutableArray *keys = [NSMutableArray array]; - NSMutableArray *accumulatedPackets = [NSMutableArray array]; - NSUInteger offset = 0; - - while (offset < messageData.length) { - - PGPPacket *packet = [PGPPacketFactory packetWithData:messageData offset:offset]; - if (packet) { - if ((accumulatedPackets.count > 1) && ((packet.tag == PGPPublicKeyPacketTag) || (packet.tag == PGPSecretKeyPacketTag))) { - PGPKey *key = [[PGPKey alloc] initWithPackets:accumulatedPackets]; - [keys addObject:key]; - [accumulatedPackets removeAllObjects]; - } - [accumulatedPackets addObject:packet]; - } - - offset = offset + packet.headerData.length + packet.bodyData.length; - } - - if (accumulatedPackets.count > 1) { - PGPKey *key = [[PGPKey alloc] initWithPackets:accumulatedPackets]; - [keys addObject:key]; - [accumulatedPackets removeAllObjects]; - } - - return [keys copy]; -} - -- (PGPKey *) findKeyForKeyID:(PGPKeyID *)keyID -{ - PGPKey *foundKey = nil; - for (PGPKey *key in self.keys) { - for (PGPPublicKeyPacket *keyPacket in key.allKeyPackets) { - if (![keyPacket isKindOfClass:[PGPPublicKeyPacket class]]) { - continue; - } - - if ([keyPacket.keyID isEqualToKeyID:keyID]) { - foundKey = key; - goto found_key_label; - } - } - } - -found_key_label: - return foundKey; -} - -- (NSData *) convertArmoredMessage2BinaryWhenNecessary:(NSData *)binOrArmorData -{ - NSData *binRingData = binOrArmorData; - // detect if armored, check for strin -----BEGIN PGP - if ([PGPArmor isArmoredData:binRingData]) { - NSError *deadmorError = nil; - NSString *armoredString = [[NSString alloc] initWithData:binRingData encoding:NSUTF8StringEncoding]; - - // replace \n to \r\n - // propably unecessary since armore code care about \r\n or \n as newline sentence - armoredString = [armoredString stringByReplacingOccurrencesOfString:@"\r\n" withString:@"\n"]; - armoredString = [armoredString stringByReplacingOccurrencesOfString:@"\n" withString:@"\r\n"]; - - binRingData = [PGPArmor readArmoredData:armoredString error:&deadmorError]; - if (deadmorError) { - return nil; - } - } - return binRingData; -} - - -@end diff --git a/ObjectivePGP/PGPArmor.h b/ObjectivePGP/PGPArmor.h deleted file mode 100644 index 10dab176..00000000 --- a/ObjectivePGP/PGPArmor.h +++ /dev/null @@ -1,31 +0,0 @@ -// -// PGPArmor.h -// ObjectivePGP -// -// Created by Marcin Krzyzanowski on 18/05/14. -// Copyright (c) 2014 Marcin Krzyżanowski. All rights reserved. -// - -#import - -typedef NS_ENUM(NSUInteger, PGPArmorType) -{ - PGPArmorTypeMessage = 1, - PGPArmorTypePublicKey = 2, - PGPArmorTypeSecretKey = 3, - PGPArmorTypeMultipartMessagePartXOfY = 4, - PGPArmorTypeMultipartMessagePartX = 5, - PGPArmorTypeSignature = 6, - PGPArmorCleartextSignedMessage = 7, //TODO: -----BEGIN PGP SIGNED MESSAGE----- -}; - -@interface PGPArmor : NSObject - -+ (NSData *) armoredData:(NSData *)dataToArmor as:(PGPArmorType)armorType part:(NSUInteger)part of:(NSUInteger)ofParts; -+ (NSData *) armoredData:(NSData *)dataToArmor as:(PGPArmorType)armorType; - -+ (NSData *) readArmoredData:(NSString *)armoredString error:(NSError * __autoreleasing *)error; - -+ (BOOL) isArmoredData:(NSData *)data; - -@end diff --git a/ObjectivePGP/PGPArmor.m b/ObjectivePGP/PGPArmor.m deleted file mode 100644 index 6dff0336..00000000 --- a/ObjectivePGP/PGPArmor.m +++ /dev/null @@ -1,227 +0,0 @@ -// -// PGPArmor.m -// ObjectivePGP -// -// Created by Marcin Krzyzanowski on 18/05/14. -// Copyright (c) 2014 Marcin Krzyżanowski. All rights reserved. -// - -#import "PGPArmor.h" -#import "PGPPacket.h" -#import "NSData+PGPUtils.h" - - -@implementation PGPArmor - -+ (BOOL) isArmoredData:(NSData *)data -{ - // detect if armored, check for string -----BEGIN PGP - NSString *str = [[NSString alloc] initWithData:data encoding:NSUTF8StringEncoding]; - if (str && [str hasPrefix:@"-----BEGIN PGP"]) { - return YES; - } - return NO; -} - -+ (NSData *) armoredData:(NSData *)dataToArmor as:(PGPArmorType)armorType -{ - return [[self class] armoredData:dataToArmor as:armorType part:NSUIntegerMax of:NSUIntegerMax]; -} - -+ (NSData *) armoredData:(NSData *)dataToArmor as:(PGPArmorType)armorType part:(NSUInteger)part of:(NSUInteger)ofParts -{ - NSMutableDictionary *headers = [@{@"Comment": @"Created with ObjectivePGP", - @"Charset": @"UTF-8"} mutableCopy]; - - NSMutableString *headerString = [NSMutableString stringWithString:@"-----"]; - NSMutableString *footerString = [NSMutableString stringWithString:@"-----"]; - switch (armorType) { - case PGPArmorTypePublicKey: - [headerString appendString:@"BEGIN PGP PUBLIC KEY BLOCK"]; - [footerString appendString:@"END PGP PUBLIC KEY BLOCK"]; - break; - case PGPArmorTypeSecretKey: - [headerString appendString:@"BEGIN PGP PRIVATE KEY BLOCK"]; - [footerString appendString:@"END PGP PRIVATE KEY BLOCK"]; - break; - case PGPArmorTypeSignature: - [headerString appendString:@"BEGIN PGP SIGNATURE"]; - [footerString appendString:@"END PGP SIGNATURE"]; - break; - case PGPArmorTypeMessage: - [headerString appendString:@"BEGIN PGP MESSAGE"]; - [footerString appendString:@"END PGP MESSAGE"]; - break; - case PGPArmorTypeMultipartMessagePartX: - [headerString appendFormat:@"BEGIN PGP MESSAGE, PART %@", @(part)]; - [footerString appendFormat:@"END PGP MESSAGE, PART %@", @(part)]; - break; - case PGPArmorTypeMultipartMessagePartXOfY: - [headerString appendFormat:@"BEGIN PGP MESSAGE, PART %@/%@", @(part), @(ofParts)]; - [footerString appendFormat:@"END PGP MESSAGE, PART %@/%@", @(part), @(ofParts)]; - break; - default: - NSAssert(true, @"Message type not supported"); - break; - } - - [headerString appendString:@"-----\n"]; - [footerString appendString:@"-----\n"]; - - NSMutableString *armoredMessage = [NSMutableString string]; - // - An Armor Header Line, appropriate for the type of data - [armoredMessage appendString:headerString]; - - // - Armor Headers - for (NSString *key in headers.allKeys) { - [armoredMessage appendFormat:@"%@: %@\n", key, headers[key]]; - } - - // - A blank (zero-length, or containing only whitespace) line - [armoredMessage appendString:@"\n"]; - - // - The ASCII-Armored data - NSString *radix64 = [dataToArmor base64EncodedStringWithOptions:(NSDataBase64Encoding76CharacterLineLength | NSDataBase64EncodingEndLineWithLineFeed)]; - [armoredMessage appendString:radix64]; - [armoredMessage appendString:@"\n"]; - - // - An Armor Checksum - UInt32 checksum = [dataToArmor pgp_CRC24]; - UInt8 c[3]; // 24 bit - c[0] = checksum >> 16; - c[1] = checksum >> 8; - c[2] = checksum; - - NSData *checksumData = [NSData dataWithBytes:&c length:sizeof(c)]; - [armoredMessage appendString:@"="]; - [armoredMessage appendString:[checksumData base64EncodedStringWithOptions:(NSDataBase64Encoding76CharacterLineLength | NSDataBase64EncodingEndLineWithLineFeed)]]; - [armoredMessage appendString:@"\n"]; - - // - The Armor Tail, which depends on the Armor Header Line - [armoredMessage appendString:footerString]; - - return [armoredMessage dataUsingEncoding:NSASCIIStringEncoding]; -}; - -+ (NSData *) readArmoredData:(NSString *)armoredString error:(NSError * __autoreleasing *)error -{ - NSScanner *scanner = [[NSScanner alloc] initWithString:armoredString]; - scanner.charactersToBeSkipped = nil; - - // check header line - NSString *headerLine = nil; - [scanner scanUpToCharactersFromSet:[NSCharacterSet newlineCharacterSet] intoString:&headerLine]; - if (![headerLine isEqualToString:@"-----BEGIN PGP MESSAGE-----"] && - ![headerLine isEqualToString:@"-----BEGIN PGP PUBLIC KEY BLOCK-----"] && - ![headerLine isEqualToString:@"-----BEGIN PGP PRIVATE KEY BLOCK-----"] && - ![headerLine isEqualToString:@"-----BEGIN PGP SECRET KEY BLOCK-----"] && // PGP 2.x generates the header "BEGIN PGP SECRET KEY BLOCK" instead of "BEGIN PGP PRIVATE KEY BLOCK" - ![headerLine isEqualToString:@"-----BEGIN PGP SIGNATURE-----"] && - ![headerLine hasPrefix:@"-----BEGIN PGP MESSAGE, PART"]) - { - if (error) { - *error = [NSError errorWithDomain:PGPErrorDomain code:0 userInfo:@{NSLocalizedDescriptionKey: @"Invalid header"}]; - } - return nil; - } - - // consume newline - [scanner scanString:@"\r" intoString:nil]; - [scanner scanString:@"\n" intoString:nil]; - - NSString *line = nil; - - if (![scanner scanCharactersFromSet:[NSCharacterSet newlineCharacterSet] intoString:nil]) { - // Scan headers (Optional) - [scanner scanUpToCharactersFromSet:[[NSCharacterSet newlineCharacterSet] invertedSet] intoString:nil]; - - while ([scanner scanCharactersFromSet:[[NSCharacterSet newlineCharacterSet] invertedSet] intoString:&line]) - { - // consume newline - [scanner scanString:@"\r" intoString:nil]; - [scanner scanString:@"\n" intoString:nil]; - #ifdef DEBUG - NSLog(@"%@",line); - #endif - } - } - - // skip blank line - [scanner scanCharactersFromSet:[NSCharacterSet newlineCharacterSet] intoString:nil]; - - // read base64 data - BOOL base64Section = YES; - NSMutableString *base64String = [NSMutableString string]; - while (base64Section && [scanner scanCharactersFromSet:[[NSCharacterSet newlineCharacterSet] invertedSet] intoString:&line]) { - // consume newline - [scanner scanString:@"\r" intoString:nil]; - [scanner scanString:@"\n" intoString:nil]; - - if ([line hasPrefix:@"="]) { - scanner.scanLocation = scanner.scanLocation - (line.length + 2); - base64Section = NO; - } else { - [base64String appendFormat:@"%@\n", line]; - } - } - - // read checksum - NSString *checksumString = nil; - [scanner scanUpToCharactersFromSet:[[NSCharacterSet newlineCharacterSet] invertedSet] intoString:&line]; - // consume newline - [scanner scanString:@"\r" intoString:nil]; - [scanner scanString:@"\n" intoString:nil]; - - if ([scanner scanString:@"=" intoString:nil]) { - [scanner scanUpToCharactersFromSet:[NSCharacterSet newlineCharacterSet] intoString:&checksumString]; - // consume newline - [scanner scanString:@"\r" intoString:nil]; - [scanner scanString:@"\n" intoString:nil]; - } - - if (!checksumString) { - if (error) { - *error = [NSError errorWithDomain:PGPErrorDomain code:0 userInfo:@{NSLocalizedDescriptionKey: @"Missing checksum"}]; - } - return nil; - } - - //read footer - BOOL footerMatchHeader = NO; - [scanner scanUpToCharactersFromSet:[NSCharacterSet newlineCharacterSet] intoString:&line]; - // consume newline - [scanner scanString:@"\r" intoString:nil]; - [scanner scanString:@"\n" intoString:nil]; - - if ([line hasSuffix:[headerLine substringFromIndex:12]]) { - footerMatchHeader = YES; - } - - if (!footerMatchHeader) { - if (error) { - *error = [NSError errorWithDomain:PGPErrorDomain code:0 userInfo:@{NSLocalizedDescriptionKey: @"Footer don't match to header"}]; - } - return nil; - } - - - // binary data from base64 part - NSData *binaryData = [[NSData alloc] initWithBase64EncodedString:base64String options:NSDataBase64DecodingIgnoreUnknownCharacters]; - - // validate checksum - NSData *readChecksumData = [[NSData alloc] initWithBase64EncodedString:checksumString options:NSDataBase64DecodingIgnoreUnknownCharacters]; - - UInt32 calculatedCRC24 = [binaryData pgp_CRC24]; - calculatedCRC24 = CFSwapInt32HostToBig(calculatedCRC24); - calculatedCRC24 = calculatedCRC24 >> 8; - NSData *calculatedCRC24Data = [NSData dataWithBytes:&calculatedCRC24 length:3]; - if (![calculatedCRC24Data isEqualToData:readChecksumData]) { - if (error) { - *error = [NSError errorWithDomain:PGPErrorDomain code:0 userInfo:@{NSLocalizedDescriptionKey: @"Checksum mismatch"}]; - } - return nil; - } - - return binaryData; -} - -@end diff --git a/ObjectivePGP/PGPCommon.h b/ObjectivePGP/PGPCommon.h new file mode 100644 index 00000000..f178ac19 --- /dev/null +++ b/ObjectivePGP/PGPCommon.h @@ -0,0 +1,46 @@ +// +// PGPCommon.h +// ObjectivePGP +// +// Created by Marcin Krzyzanowski on 17/01/15. +// Copyright (c) 2015 Marcin Krzyżanowski. All rights reserved. +// + +#pragma mark once + +static NSString * PGPErrorDomain = @"ObjectivePGP"; +static const UInt32 PGPIndeterminateLength = UINT32_MAX; + + +typedef NS_ENUM(UInt8, PGPPacketTag) { + PGPInvalidPacketTag = 0, + PGPPublicKeyEncryptedSessionKeyPacketTag = 1, + PGPSignaturePacketTag = 2, + PGPSymetricKeyEncryptedSessionKeyPacketTag = 3, //TODO + PGPOnePassSignaturePacketTag = 4, + PGPSecretKeyPacketTag = 5, + PGPPublicKeyPacketTag = 6, + PGPSecretSubkeyPacketTag = 7, + PGPCompressedDataPacketTag = 8, + PGPSymmetricallyEncryptedDataPacketTag = 9, //TODO + PGPMarkerPacketTag = 10, //Ignored (Obsolete Literal Packet) + PGPLiteralDataPacketTag = 11, + PGPTrustPacketTag = 12, + PGPUserIDPacketTag = 13, + PGPPublicSubkeyPacketTag = 14, + PGPUserAttributePacketTag = 17, + PGPSymmetricallyEncryptedIntegrityProtectedDataPacketTag = 18, + PGPModificationDetectionCodePacketTag = 19, +}; + +// 9.4. Hash Algorithms +typedef NS_ENUM(UInt8, PGPHashAlgorithm) { + PGPHashMD5 = 1, //MD5 - deprecated + PGPHashSHA1 = 2, //SHA1 - required + PGPHashRIPEMD160 = 3, //RIPEMD160 + PGPHashSHA256 = 8, //SHA256 + PGPHashSHA384 = 9, //SHA384 + PGPHashSHA512 = 10,//SHA512 + PGPHashSHA224 = 11 //SHA224 +}; + diff --git a/ObjectivePGP/PGPCompressedPacket.h b/ObjectivePGP/PGPCompressedPacket.h deleted file mode 100644 index de05a34f..00000000 --- a/ObjectivePGP/PGPCompressedPacket.h +++ /dev/null @@ -1,25 +0,0 @@ -// -// PGPCompressedPacket.h -// ObjectivePGP -// -// Created by Marcin Krzyzanowski on 02/06/14. -// Copyright (c) 2014 Marcin Krzyżanowski. All rights reserved. -// - -#import "PGPPacket.h" - -// 9.3. Compression Algorithms -typedef NS_ENUM(UInt8, PGPCompressionAlgorithm) { - PGPCompressionUncompressed = 0, - PGPCompressionZIP = 1, //TODO: Unsupported - PGPCompressionZLIB = 2, - PGPCompressionBZIP2 = 3 -}; - -@interface PGPCompressedPacket : PGPPacket -@property (assign, readonly) PGPCompressionAlgorithm compressionType; -@property (strong) NSData *decompressedData; - -- (instancetype)initWithData:(NSData *)dataToCompress type:(PGPCompressionAlgorithm)type; - -@end diff --git a/ObjectivePGP/PGPCompressedPacket.m b/ObjectivePGP/PGPCompressedPacket.m deleted file mode 100644 index 3c9ae52a..00000000 --- a/ObjectivePGP/PGPCompressedPacket.m +++ /dev/null @@ -1,98 +0,0 @@ -// -// PGPCompressedPacket.m -// ObjectivePGP -// -// Created by Marcin Krzyzanowski on 02/06/14. -// Copyright (c) 2014 Marcin Krzyżanowski. All rights reserved. -// -// TODO: add support for ZIP and BZIP2 - -#import "PGPCompressedPacket.h" -#import "NSData+compression.h" - -@implementation PGPCompressedPacket - -- (instancetype)initWithData:(NSData *)dataToCompress type:(PGPCompressionAlgorithm)type -{ - if (self = [self init]) { - self->_decompressedData = dataToCompress; - self->_compressionType = type; - } - return self; -} - -- (PGPPacketTag)tag -{ - return PGPCompressedDataPacketTag; -} - -- (NSUInteger)parsePacketBody:(NSData *)packetBody error:(NSError *__autoreleasing *)error -{ - NSUInteger position = [super parsePacketBody:packetBody error:error]; - - // - One octet that gives the algorithm used to compress the packet. - [packetBody getBytes:&_compressionType length:sizeof(_compressionType)]; - position = position + 1; - - // - Compressed data, which makes up the remainder of the packet. - NSData *compressedData = [packetBody subdataWithRange:(NSRange){position, packetBody.length - position}]; - - //TODO: for ZIP use AgileBits/objective-zip - switch (self.compressionType) { - case PGPCompressionZLIB: - self.decompressedData = [compressedData zlibDecompressed:error]; - break; - case PGPCompressionBZIP2: - self.decompressedData = [compressedData bzip2Decompressed:error]; - break; - - default: - if (error) { - *error = [NSError errorWithDomain:PGPErrorDomain code:0 userInfo:@{NSLocalizedDescriptionKey: @"This type of compression is not supported"}]; - } - @throw [NSException exceptionWithName:@"Unsupported Compression" reason:@"Compression type is not supported" userInfo:nil]; - break; - } - - compressedData = nil; - return position; -} - -- (NSData *)exportPacket:(NSError *__autoreleasing *)error -{ - NSMutableData *bodyData = [NSMutableData data]; - - // - One octet that gives the algorithm used to compress the packet. - [bodyData appendBytes:&_compressionType length:sizeof(_compressionType)]; - - // - Compressed data, which makes up the remainder of the packet. - NSData *compressedData = nil; - switch (self.compressionType) { - case PGPCompressionZLIB: - compressedData = [self.decompressedData zlibCompressed:error]; - break; - case PGPCompressionBZIP2: - compressedData =[self.decompressedData bzip2Compressed:error]; - break; - - default: - if (error) { - *error = [NSError errorWithDomain:PGPErrorDomain code:0 userInfo:@{NSLocalizedDescriptionKey: @"This type of compression is not supported"}]; - } - return nil; - break; - } - NSAssert(compressedData, @"Compression failed"); - [bodyData appendData:compressedData]; - - NSMutableData *data = [NSMutableData data]; - NSData *headerData = [self buildHeaderData:bodyData]; - [data appendData: headerData]; - [data appendData: bodyData]; - - return [data copy]; -} - -@end - -//ret = (int)inflateInit2(&z.zstream, -15) diff --git a/ObjectivePGP/PGPCryptoCFB.h b/ObjectivePGP/PGPCryptoCFB.h deleted file mode 100644 index d9461acc..00000000 --- a/ObjectivePGP/PGPCryptoCFB.h +++ /dev/null @@ -1,25 +0,0 @@ -// -// PGPCryptoCFB.h -// ObjectivePGP -// -// Created by Marcin Krzyzanowski on 05/06/14. -// Copyright (c) 2014 Marcin Krzyżanowski. All rights reserved. -// - -#import -#import "PGPTypes.h" -#import "PGPS2K.h" - -@interface PGPCryptoCFB : NSObject - -+ (NSData *) decryptData:(NSData *)encryptedData - sessionKeyData:(NSData *)sessionKeyData // s2k produceSessionKeyWithPassphrase - symmetricAlgorithm:(PGPSymmetricAlgorithm)symmetricAlgorithm - iv:(NSData *)ivData; - -+ (NSData *) encryptData:(NSData *)encryptedData - sessionKeyData:(NSData *)sessionKeyData // s2k produceSessionKeyWithPassphrase - symmetricAlgorithm:(PGPSymmetricAlgorithm)symmetricAlgorithm - iv:(NSData *)ivData; - -@end diff --git a/ObjectivePGP/PGPCryptoCFB.m b/ObjectivePGP/PGPCryptoCFB.m deleted file mode 100644 index 2c297b13..00000000 --- a/ObjectivePGP/PGPCryptoCFB.m +++ /dev/null @@ -1,165 +0,0 @@ -// -// PGPCryptoCFB.m -// ObjectivePGP -// -// Created by Marcin Krzyzanowski on 05/06/14. -// Copyright (c) 2014 Marcin Krzyżanowski. All rights reserved. -// - -#import "PGPCryptoCFB.h" -#import "PGPTypes.h" -#import "PGPS2K.h" -#import "PGPCryptoUtils.h" -#import "NSData+PGPUtils.h" - -#import -#import -#import - -#include -#include -#include -#include -#include -#include -#include - -@implementation PGPCryptoCFB - -+ (NSData *) decryptData:(NSData *)encryptedData - sessionKeyData:(NSData *)sessionKeyData // s2k produceSessionKeyWithPassphrase - symmetricAlgorithm:(PGPSymmetricAlgorithm)symmetricAlgorithm - iv:(NSData *)ivData -{ - return [[self class] manipulateData:encryptedData sessionKeyData:sessionKeyData symmetricAlgorithm:symmetricAlgorithm iv:ivData decrypt:YES]; -} - -+ (NSData *) encryptData:(NSData *)encryptedData - sessionKeyData:(NSData *)sessionKeyData // s2k produceSessionKeyWithPassphrase - symmetricAlgorithm:(PGPSymmetricAlgorithm)symmetricAlgorithm - iv:(NSData *)ivData -{ - return [[self class] manipulateData:encryptedData sessionKeyData:sessionKeyData symmetricAlgorithm:symmetricAlgorithm iv:ivData decrypt:NO]; -} - -#pragma mark - Private - -// key binary string representation of key to be used to decrypt the ciphertext. -+ (NSData *) manipulateData:(NSData *)encryptedData - sessionKeyData:(NSData *)sessionKeyData // s2k produceSessionKeyWithPassphrase - symmetricAlgorithm:(PGPSymmetricAlgorithm)symmetricAlgorithm - iv:(NSData *)ivData - decrypt:(BOOL)decrypt -{ - NSAssert(ivData.length > 0, @"Missing IV"); - NSAssert(sessionKeyData.length > 0, @"Missing session key"); - NSAssert(encryptedData.length > 0, @"Missing data"); - - if (ivData.length == 0 || sessionKeyData.length == 0 || encryptedData.length == 0) { - return nil; - } - - NSUInteger keySize = [PGPCryptoUtils keySizeOfSymmetricAlhorithm:symmetricAlgorithm]; - NSAssert(keySize <= 32, @"invalid keySize"); - - unsigned char *iv = calloc(1, ivData.length); - if (!iv) { - return nil; - } - memcpy(iv, ivData.bytes, ivData.length); - - const void *encryptedBytes = encryptedData.bytes; - NSUInteger outBufferLength = encryptedData.length; - UInt8 *outBuffer = calloc(outBufferLength, sizeof(UInt8)); - - NSData *decryptedData = nil; - - // decrypt with CFB - switch (symmetricAlgorithm) { - case PGPSymmetricAES128: - case PGPSymmetricAES192: - case PGPSymmetricAES256: - { - AES_KEY aes_key; - AES_set_encrypt_key(sessionKeyData.bytes, (unsigned int)keySize * 8, &aes_key); - - int num = 0; - AES_cfb128_encrypt(encryptedBytes, outBuffer, outBufferLength, &aes_key, iv, &num, decrypt ? AES_DECRYPT : AES_ENCRYPT); - decryptedData = [NSData dataWithBytes:outBuffer length:outBufferLength]; - - memset(&aes_key, 0, sizeof(AES_KEY)); - } - break; - case PGPSymmetricIDEA: - { - IDEA_KEY_SCHEDULE encrypt_key; - idea_set_encrypt_key(sessionKeyData.bytes, &encrypt_key); - - IDEA_KEY_SCHEDULE decrypt_key; - idea_set_decrypt_key(&encrypt_key, &decrypt_key); - - int num = 0; - idea_cfb64_encrypt(encryptedBytes, outBuffer, outBufferLength, decrypt ? &decrypt_key : &encrypt_key, iv, &num, decrypt ? CAST_DECRYPT : CAST_ENCRYPT); - decryptedData = [NSData dataWithBytes:outBuffer length:outBufferLength]; - - memset(&encrypt_key, 0, sizeof(IDEA_KEY_SCHEDULE)); - memset(&decrypt_key, 0, sizeof(IDEA_KEY_SCHEDULE)); - } - break; - case PGPSymmetricTripleDES: - { - DES_key_schedule *keys = calloc(3, sizeof(DES_key_schedule)); - - for (NSUInteger n = 0; n < 3; ++n) { - DES_set_key((DES_cblock *)(void *)(ivData.bytes + n * 8),&keys[n]); - } - - int num = 0; - DES_ede3_cfb64_encrypt(encryptedBytes, outBuffer, outBufferLength, &keys[0], &keys[1], &keys[2], (DES_cblock *)(void *)iv, &num, decrypt ? DES_DECRYPT : DES_ENCRYPT); - decryptedData = [NSData dataWithBytes:outBuffer length:outBufferLength]; - - if (keys) { - memset(keys, 0, 3 * sizeof(DES_key_schedule)); - free(keys); - } - } - break; - case PGPSymmetricCAST5: - { - // initialize - CAST_KEY encrypt_key; - CAST_set_key(&encrypt_key, (unsigned int)keySize, sessionKeyData.bytes); - - // see __ops_decrypt_init block_encrypt siv,civ,iv comments. siv is needed for weird v3 resync, - // wtf civ ??? - // CAST_ecb_encrypt(in, out, encrypt_key, CAST_ENCRYPT); - int num = 0; // how much of the 64bit block we have used - CAST_cfb64_encrypt(encryptedBytes, outBuffer, outBufferLength, &encrypt_key, iv, &num, decrypt ? CAST_DECRYPT : CAST_ENCRYPT); - decryptedData = [NSData dataWithBytes:outBuffer length:outBufferLength]; - - memset(&encrypt_key, 0, sizeof(CAST_KEY)); - } - break; - case PGPSymmetricBlowfish: - case PGPSymmetricTwofish256: - //TODO: implement blowfish and twofish - [NSException raise:@"PGPNotSupported" format:@"Twofish not supported"]; - break; - case PGPSymmetricPlaintext: - [NSException raise:@"PGPInconsistency" format:@"Can't decrypt plaintext"]; - break; - default: - break; - } - - if (outBuffer) { - memset(outBuffer, 0, outBufferLength); - free(outBuffer); - } - - free(iv); - - return [decryptedData copy]; -} - -@end diff --git a/ObjectivePGP/PGPCryptoUtils.h b/ObjectivePGP/PGPCryptoUtils.h deleted file mode 100644 index 331131bc..00000000 --- a/ObjectivePGP/PGPCryptoUtils.h +++ /dev/null @@ -1,18 +0,0 @@ -// -// PGPCryptoUtils.h -// ObjectivePGP -// -// Created by Marcin Krzyzanowski on 12/05/14. -// Copyright (c) 2014 Marcin Krzyżanowski. All rights reserved. -// - -#import -#import "PGPTypes.h" - -@interface PGPCryptoUtils : NSObject - -+ (NSUInteger) blockSizeOfSymmetricAlhorithm:(PGPSymmetricAlgorithm)symmetricAlgorithm; -+ (NSUInteger) keySizeOfSymmetricAlhorithm:(PGPSymmetricAlgorithm)symmetricAlgorithm; -+ (NSUInteger) hashSizeOfHashAlhorithm:(PGPHashAlgorithm)hashAlgorithm; - -@end diff --git a/ObjectivePGP/PGPCryptoUtils.m b/ObjectivePGP/PGPCryptoUtils.m deleted file mode 100644 index 4cbda9bb..00000000 --- a/ObjectivePGP/PGPCryptoUtils.m +++ /dev/null @@ -1,94 +0,0 @@ -// -// PGPCryptoUtils.m -// ObjectivePGP -// -// Created by Marcin Krzyzanowski on 12/05/14. -// Copyright (c) 2014 Marcin Krzyżanowski. All rights reserved. -// - -#import "PGPCryptoUtils.h" - -#import - -#include -#include -#include -#include -#include -#include -#include - -@implementation PGPCryptoUtils - -+ (NSUInteger) blockSizeOfSymmetricAlhorithm:(PGPSymmetricAlgorithm)symmetricAlgorithm -{ - switch (symmetricAlgorithm) { - case PGPSymmetricIDEA: - return IDEA_BLOCK; - case PGPSymmetricTripleDES: - return kCCBlockSize3DES; - case PGPSymmetricCAST5: - return kCCBlockSizeCAST; - case PGPSymmetricBlowfish: - return kCCBlockSizeBlowfish; // 64bit - case PGPSymmetricAES128: - case PGPSymmetricAES192: - case PGPSymmetricAES256: - return kCCBlockSizeAES128; - case PGPSymmetricTwofish256: - return 16; // 128bit - default: - break; - } - return NSNotFound; -} - -+ (NSUInteger) keySizeOfSymmetricAlhorithm:(PGPSymmetricAlgorithm)symmetricAlgorithm -{ - switch (symmetricAlgorithm) { - case PGPSymmetricIDEA: - return IDEA_KEY_LENGTH; - case PGPSymmetricTripleDES: - return kCCKeySize3DES; //24 or 8 ? - case PGPSymmetricCAST5: - return kCCKeySizeMaxCAST; - case PGPSymmetricBlowfish: - return kCCKeySizeMaxBlowfish; // 16 bit (?) - case PGPSymmetricAES128: - return kCCKeySizeAES128; - case PGPSymmetricAES192: - return kCCKeySizeAES192; - case PGPSymmetricAES256: - return kCCKeySizeAES256; - case PGPSymmetricTwofish256: - return 16; // 128bit (??or 32) - default: - break; - } - return NSNotFound; -} - -+ (NSUInteger) hashSizeOfHashAlhorithm:(PGPHashAlgorithm)hashAlgorithm -{ - switch (hashAlgorithm) { - case PGPHashMD5: - return CC_MD5_DIGEST_LENGTH; - case PGPHashSHA1: - return CC_SHA1_DIGEST_LENGTH; - case PGPHashSHA224: - return CC_SHA224_DIGEST_LENGTH; - case PGPHashSHA256: - return CC_SHA256_DIGEST_LENGTH; - case PGPHashSHA384: - return CC_SHA384_DIGEST_LENGTH; - case PGPHashSHA512: - return CC_SHA512_DIGEST_LENGTH; - case PGPHashRIPEMD160: - return RIPEMD160_DIGEST_LENGTH; // confirm RIPE/MD 160 value - default: - break; - } - return NSNotFound; -} - -@end diff --git a/ObjectivePGP/PGPFingerprint.h b/ObjectivePGP/PGPFingerprint.h deleted file mode 100644 index d4460bb7..00000000 --- a/ObjectivePGP/PGPFingerprint.h +++ /dev/null @@ -1,21 +0,0 @@ -// -// PGPFingerprint.h -// ObjectivePGP -// -// Created by Marcin Krzyzanowski on 14/05/14. -// Copyright (c) 2014 Marcin Krzyżanowski. All rights reserved. -// - -#import - -@interface PGPFingerprint : NSObject -@property (copy) NSData *hashedData; -@property (copy) NSData *keyData; - -- (instancetype) initWithData:(NSData *)data; -- (NSString *) description; -- (NSUInteger) hashLength; - -- (BOOL) isEqualToFingerprint:(PGPFingerprint *)fingerprint; - -@end diff --git a/ObjectivePGP/PGPFingerprint.m b/ObjectivePGP/PGPFingerprint.m deleted file mode 100644 index f2c46bf3..00000000 --- a/ObjectivePGP/PGPFingerprint.m +++ /dev/null @@ -1,66 +0,0 @@ -// -// PGPFingerprint.m -// ObjectivePGP -// -// Created by Marcin Krzyzanowski on 14/05/14. -// Copyright (c) 2014 Marcin Krzyżanowski. All rights reserved. -// - -#import "PGPFingerprint.h" -#import "NSData+PGPUtils.h" - -@implementation PGPFingerprint - -- (instancetype) initWithData:(NSData *)keyData -{ - if (self = [self init]) { - _keyData = keyData; - _hashedData = [keyData pgp_SHA1]; - } - return self; -} - -- (NSString *)description -{ - NSMutableString *sbuf = [NSMutableString stringWithCapacity:self.hashedData.length * 2]; - const unsigned char *buf = self.hashedData.bytes; - for (NSUInteger i = 0; i < self.hashedData.length; ++i) { - [sbuf appendFormat:@"%02X", (unsigned int)buf[i]]; - } - return [sbuf copy]; -} - -- (NSUInteger) hashLength -{ - return self.hashedData.length; -} - -- (NSUInteger)hash -{ - const NSUInteger prime = 31; - NSUInteger result = 1; - result = prime * result + [_hashedData hash]; - result = prime * result + [_keyData hash]; - return result; -} - -- (BOOL)isEqual:(id)object -{ - if (self == object) { - return YES; - } - - if ([self class] != [object class]) { - return NO; - } - - PGPFingerprint *other = object; - return [self.keyData isEqualToData:other.keyData] && [self.hashedData isEqualToData:other.hashedData]; -} - -- (BOOL) isEqualToFingerprint:(PGPFingerprint *)fingerprint -{ - return [self isEqual:fingerprint]; -} - -@end diff --git a/ObjectivePGP/PGPKey.h b/ObjectivePGP/PGPKey.h index 34698ab4..764d4089 100644 --- a/ObjectivePGP/PGPKey.h +++ b/ObjectivePGP/PGPKey.h @@ -1,70 +1,27 @@ // -// PGPTransferableKey.h +// PGPKey.h // ObjectivePGP // -// Created by Marcin Krzyzanowski on 13/05/14. -// Copyright (c) 2014 Marcin Krzyżanowski. All rights reserved. +// Created by Marcin Krzyzanowski on 19/01/15. +// Copyright (c) 2015 Marcin Krzyżanowski. All rights reserved. // #import -#import "PGPTypes.h" -#import "PGPPacket.h" +#import "PGPPublicKeyPacket.h" #import "PGPKeyID.h" -#import "PGPSignaturePacket.h" - -typedef NS_ENUM(NSUInteger, PGPKeyType) { - PGPKeyUnknown = 0, - PGPKeySecret = 1, - PGPKeyPublic = 2 -}; - -@class PGPSecretKeyPacket; @interface PGPKey : NSObject - -@property (assign, readonly ) PGPKeyType type; -@property (strong, nonatomic) PGPPacket *primaryKeyPacket; -@property (assign, readonly ) BOOL isEncrypted; -@property (strong, nonatomic) NSMutableArray *users; // PGPUser -@property (strong, nonatomic) NSMutableArray *subKeys; -@property (strong, nonatomic) NSMutableArray *directSignatures; -@property (strong, nonatomic) PGPPacket *revocationSignature; - -@property (nonatomic, readonly) PGPKeyID *keyID; - -- (instancetype) initWithPackets:(NSArray *)packets; - -/** - * Decrypts all secret key and subkey packets - * Note: After decryption encrypted packets are replaced with new decrypted instances on key. - * Warning: It is not good idea to keep decrypted key around - * - * @param passphrase Password - * @param error error - * - * @return YES on success. - */ -- (BOOL) decrypt:(NSString *)passphrase error:(NSError *__autoreleasing *)error; - -/** - * Signing key packet - * - * @return PGPSecureKeyPacket that can be used to signing - */ -- (PGPPacket *) signingKeyPacket; -- (PGPPacket *) encryptionKeyPacket:(NSError * __autoreleasing *)error; -- (PGPSecretKeyPacket *) decryptionKeyPacket:(NSError * __autoreleasing *)error; - - -- (NSArray *) allKeyPackets; -- (PGPSymmetricAlgorithm) preferredSymmetricAlgorithm; -+ (PGPSymmetricAlgorithm) preferredSymmetricAlgorithmForKeys:(NSArray *)keys; - -/** - * Export to transferable key packets sequence - * - * @return Data - */ -- (NSData *) export:(NSError *__autoreleasing *)error; +@property (strong, readonly) PGPPublicKeyPacket *packet; +@property (strong) NSArray *revocationSignatures; //Zero or more revocation PGPSignaturePacket +@property (strong) NSArray *users; //One or more User ID +//After each User ID packet, zero or more Signature packets (certifications) +//Zero or more User Attribute packets +//After each User Attribute packet, zero or more Signature packets (certifications) +@property (strong) NSArray *subkeys; //Zero or more PGPSubKey +//After each Subkey packet, one Signature packet, plus optionally a revocation + +- (instancetype)initWithPacket:(PGPPublicKeyPacket *)packet NS_DESIGNATED_INITIALIZER; +- (PGPKeyID *)keyID; +- (NSData *)fingerprint; @end diff --git a/ObjectivePGP/PGPKey.m b/ObjectivePGP/PGPKey.m index ebb1e42e..4f002364 100644 --- a/ObjectivePGP/PGPKey.m +++ b/ObjectivePGP/PGPKey.m @@ -1,476 +1,107 @@ // -// PGPTransferableKey.m +// PGPKey.m // ObjectivePGP // -// Created by Marcin Krzyzanowski on 13/05/14. -// Copyright (c) 2014 Marcin Krzyżanowski. All rights reserved. +// Created by Marcin Krzyzanowski on 19/01/15. +// Copyright (c) 2015 Marcin Krzyżanowski. All rights reserved. +// +// see 11.1.Transferable Public Keys, 11.2.Transferable Secret Keys // #import "PGPKey.h" +#import "PGPFunctions.h" #import "PGPPublicKeyPacket.h" -#import "PGPSecretKeyPacket.h" -#import "PGPUser.h" -#import "PGPSignaturePacket.h" -#import "PGPSignatureSubpacket.h" -#import "PGPPublicSubKeyPacket.h" -#import "PGPSecretSubKeyPacket.m" -#import "PGPUserAttributePacket.h" -#import "PGPUserAttributeSubpacket.h" -#import "PGPSubKey.h" -#import "NSValue+PGPUtils.h" +#import "PGPMPI.h" @implementation PGPKey -- (instancetype) initWithPackets:(NSArray *)packets +- (instancetype)initWithPacket:(PGPPublicKeyPacket *)packet { - if (self = [self init]) { - [self loadPackets:packets]; + if (self = [super init]) { + NSAssert([packet isKindOfClass:[PGPPublicKeyPacket class]], @"Invalid class"); + _packet = packet; } return self; } -- (NSString *)description -{ - return [NSString stringWithFormat:@"Type %@, %@ primary key: %@",self.type == PGPKeyPublic ? @"public" : @"secret", [super description], self.primaryKeyPacket]; -} - -- (BOOL)isEqual:(id)object -{ - if (self == object) - return YES; - - if (![object isKindOfClass:[PGPKey class]]) { - return NO; - } - - //TODO: check all properties - PGPKey *objectKey = (PGPKey *)object; - return [self.keyID isEqual:objectKey.keyID] && (self.type == objectKey.type); -} - -- (NSUInteger)hash -{ -#ifndef NSUINTROTATE -#define NSUINT_BIT (CHAR_BIT * sizeof(NSUInteger)) -#define NSUINTROTATE(val, howmuch) ((((NSUInteger)val) << howmuch) | (((NSUInteger)val) >> (NSUINT_BIT - howmuch))) -#endif - - NSUInteger hash = [self.primaryKeyPacket hash]; - hash = NSUINTROTATE(hash, NSUINT_BIT / 2) ^ self.type; - hash = NSUINTROTATE(hash, NSUINT_BIT / 2) ^ [self.users hash]; - hash = NSUINTROTATE(hash, NSUINT_BIT / 2) ^ [self.subKeys hash]; - hash = NSUINTROTATE(hash, NSUINT_BIT / 2) ^ [self.directSignatures hash]; - hash = NSUINTROTATE(hash, NSUINT_BIT / 2) ^ [self.revocationSignature hash]; - hash = NSUINTROTATE(hash, NSUINT_BIT / 2) ^ [self.keyID hash]; - - return hash; -} - -- (NSMutableArray *)users -{ - if (!_users) { - _users = [NSMutableArray array]; - } - return _users; -} - -- (NSMutableArray *)subKeys -{ - if (!_subKeys) { - _subKeys = [NSMutableArray array]; - } - return _subKeys; -} - -- (NSMutableArray *)directSignatures -{ - if (!_directSignatures) { - _directSignatures = [NSMutableArray array]; - } - return _directSignatures; -} - -- (BOOL)isEncrypted -{ - if (self.type == PGPKeySecret) { - PGPSecretKeyPacket *secretPacket = (PGPSecretKeyPacket *)self.primaryKeyPacket; - return secretPacket.isEncryptedWithPassword; - } - return NO; -} - -- (PGPKeyType)type -{ - PGPKeyType t = PGPKeyUnknown; - - switch (self.primaryKeyPacket.tag) { - case PGPPublicKeyPacketTag: - case PGPPublicSubkeyPacketTag: - t = PGPKeyPublic; - break; - case PGPSecretKeyPacketTag: - case PGPSecretSubkeyPacketTag: - t = PGPKeySecret; - default: - break; - } - - return t; -} - -- (PGPKeyID *)keyID +- (NSData *)fingerprint { - PGPPublicKeyPacket *primaryKeyPacket = (PGPPublicKeyPacket *)self.primaryKeyPacket; - PGPKeyID *keyID = [[PGPKeyID alloc] initWithFingerprint:primaryKeyPacket.fingerprint]; - return keyID; -} - -- (void) loadPackets:(NSArray *)packets -{ - // based on packetlist2structure - PGPKeyID *primaryKeyID = nil; - PGPSubKey *subKey = nil; - PGPUser *user = nil; - - for (PGPPacket *packet in packets) { - switch (packet.tag) { - case PGPPublicKeyPacketTag: - primaryKeyID = [(PGPPublicKeyPacket *)packet keyID]; - self.primaryKeyPacket = packet; - break; - case PGPSecretKeyPacketTag: - primaryKeyID = [(PGPSecretKeyPacket *)packet keyID]; - self.primaryKeyPacket = packet; - break; - case PGPUserAttributePacketTag: - if (!user) { - continue; - } - user.userAttribute = (PGPUserAttributePacket *)packet; - break; - case PGPUserIDPacketTag: - { - PGPUser *parsedUser = [[PGPUser alloc] initWithUserIDPacket:(PGPUserIDPacket *)packet]; - if (!user) { - user = parsedUser; - } - [self.users addObject:parsedUser]; - } - break; - case PGPPublicSubkeyPacketTag: - case PGPSecretSubkeyPacketTag: - user = nil; - subKey = [[PGPSubKey alloc] initWithPacket:packet]; - [self.subKeys addObject:subKey]; - break; - case PGPSignaturePacketTag: - { - PGPSignaturePacket *signaturePacket = (PGPSignaturePacket *)packet; - switch (signaturePacket.type) { - case PGPSignatureGenericCertificationUserIDandPublicKey: - case PGPSignatureCasualCertificationUserIDandPublicKey: - case PGPSignaturePositiveCertificationUserIDandPublicKey: - case PGPSignaturePersonalCertificationUserIDandPublicKey: - if (!user) { - continue; - } - if ([signaturePacket.issuerKeyID isEqual:primaryKeyID]) { - user.selfCertifications = [user.selfCertifications arrayByAddingObject:packet]; - } else { - user.otherSignatures = [user.otherSignatures arrayByAddingObject:packet]; - } - break; - case PGPSignatureCertificationRevocation: - if (user) { - user.revocationSignatures = [user.revocationSignatures arrayByAddingObject:packet]; - } else { - [self.directSignatures addObject:packet]; - } - break; - case PGPSignatureDirectlyOnKey: - [self.directSignatures addObject:packet]; - break; - case PGPSignatureSubkeyBinding: - if (!subKey) { - continue; - } - subKey.bindingSignature = (PGPSignaturePacket *)packet; - break; - case PGPSignatureKeyRevocation: - self.revocationSignature = (PGPSignaturePacket *)packet; - break; - case PGPSignatureSubkeyRevocation: - if (!subKey) { - continue; - } - subKey.revocationSignature = (PGPSignaturePacket *)packet; - break; - default: - break; - } + switch (self.packet.version) { + case 0x04: + { + // A V4 fingerprint is the 160-bit SHA-1 hash + NSError *error = nil; + NSData *keyBody = [self.packet buildData:&error]; + if (!keyBody || error) { + NSAssert(false, @"Missing key body"); + return nil; } - break; - default: - break; - } - } -} - -// signature packet that is available for signing data -- (PGPPacket *) signingKeyPacket -{ -// It's private key for sign and public for verify as so thi can't be checked here - -// NSAssert(self.type == PGPKeySecret, @"Need secret key to sign"); -// if (self.type == PGPKeyPublic) { -// NSLog(@"Need secret key to sign\n %@",[NSThread callStackSymbols]); -// return nil; -// } - - // check primary user self certificates - PGPSignaturePacket *primaryUserSelfCertificate = nil; - [self primaryUserAndSelfCertificate:&primaryUserSelfCertificate]; - if (primaryUserSelfCertificate) - { - if (primaryUserSelfCertificate.canBeUsedToSign) { - return self.primaryKeyPacket; - } - } - - for (PGPSubKey *subKey in self.subKeys) { - PGPSignaturePacket *signaturePacket = subKey.bindingSignature; - if (signaturePacket.canBeUsedToSign) { - return subKey.primaryKeyPacket; - } - } - - return nil; -} - -// signature packet that is available for signing data -- (PGPPacket *) encryptionKeyPacket:(NSError * __autoreleasing *)error -{ - NSAssert(self.type == PGPKeyPublic, @"Need public key to encrypt"); - if (self.type == PGPKeySecret) { - if (error) { - *error = [NSError errorWithDomain:PGPErrorDomain code:0 userInfo:@{NSLocalizedDescriptionKey: @"Wrong key type, require public key"}]; - } - NSLog(@"Need public key to encrypt"); - return nil; - } - - for (PGPSubKey *subKey in self.subKeys) { - PGPSignaturePacket *signaturePacket = subKey.bindingSignature; - if (signaturePacket.canBeUsedToEncrypt) { - return subKey.primaryKeyPacket; - } - } - - // check primary user self certificates - PGPSignaturePacket *primaryUserSelfCertificate = nil; - [self primaryUserAndSelfCertificate:&primaryUserSelfCertificate]; - if (primaryUserSelfCertificate) - { - if (primaryUserSelfCertificate.canBeUsedToEncrypt) { - return self.primaryKeyPacket; - } - } - - if (error) { - *error = [NSError errorWithDomain:PGPErrorDomain code:0 userInfo:@{NSLocalizedDescriptionKey: @"Encryption key not found"}]; - } - - return nil; -} - -- (PGPSecretKeyPacket *) decryptionKeyPacket:(NSError * __autoreleasing *)error -{ - NSAssert(self.type == PGPKeySecret, @"Need secret key to encrypt"); - if (self.type == PGPKeyPublic) { - if (error) { - *error = [NSError errorWithDomain:PGPErrorDomain code:0 userInfo:@{NSLocalizedDescriptionKey: @"Wrong key type, require secret key"}]; - } - NSLog(@"Need public key to encrypt"); - return nil; - } - - for (PGPSubKey *subKey in self.subKeys) { - PGPSignaturePacket *signaturePacket = subKey.bindingSignature; - if (signaturePacket.canBeUsedToEncrypt) { - return (PGPSecretKeyPacket *)subKey.primaryKeyPacket; - } - } - - // check primary user self certificates - PGPSignaturePacket *primaryUserSelfCertificate = nil; - [self primaryUserAndSelfCertificate:&primaryUserSelfCertificate]; - if (primaryUserSelfCertificate) - { - if (primaryUserSelfCertificate.canBeUsedToEncrypt) { - return (PGPSecretKeyPacket *)self.primaryKeyPacket; - } - } - - if (error) { - *error = [NSError errorWithDomain:PGPErrorDomain code:0 userInfo:@{NSLocalizedDescriptionKey: @"Decryption key not found"}]; - } - - return nil; -} - -// Note: After decryption encrypted packets are replaced with new decrypted instances on key. -- (BOOL) decrypt:(NSString *)passphrase error:(NSError *__autoreleasing *)error -{ - if ([self.primaryKeyPacket isKindOfClass:[PGPSecretKeyPacket class]]) { - PGPSecretKeyPacket *secretPacket = (PGPSecretKeyPacket *)self.primaryKeyPacket; - self.primaryKeyPacket = [secretPacket decryptedKeyPacket:passphrase error:error]; - if (*error) { - return NO; - } - } - - for (PGPSubKey *subKey in self.subKeys) { - if ([subKey.primaryKeyPacket isKindOfClass:[PGPSecretKeyPacket class]]) { - PGPSecretKeyPacket *secretPacket = (PGPSecretKeyPacket *)subKey.primaryKeyPacket; - self.primaryKeyPacket = [secretPacket decryptedKeyPacket:passphrase error:error]; - if (*error) { - return NO; + NSData *keyData = [self.packet buildData:&error]; + NSData *lengthData = buildOldFormatLengthBytesForData(keyData); + NSMutableData *toHash = [NSMutableData dataWithCapacity:keyData.length + lengthData.length]; + if (self.packet.version == 0x04) { + [toHash appendData:lengthData]; } + [toHash appendData:keyData]; + + return pgpCalculateSHA1(toHash.bytes, (unsigned int)toHash.length); } - } - return YES; -} - -- (NSData *) export:(NSError *__autoreleasing *)error -{ - NSMutableData *result = [NSMutableData data]; - - for (PGPPacket * packet in [self allPacketsArray]) { - [result appendData:[packet exportPacket:error]]; //TODO: decode secret key first - if (error) { - NSAssert(*error == nil,@"Error while export public key"); - if (*error) { - return nil; + break; + case 0x03: + { + // TODO: untested + // The fingerprint of a V3 key is formed by hashing the body of the MPIs that form the key material + NSError *error = nil; + NSMutableData *toHash = [NSMutableData data]; + for (PGPMPI *mpi in self.packet.MPIs) { + [toHash appendData:[mpi buildData:&error]]; } - } - } - return [result copy]; -} - -#pragma mark - Verification - -// Returns primary user with self certificate -- (PGPUser *) primaryUserAndSelfCertificate:(PGPSignaturePacket * __autoreleasing *)selfCertificateOut -{ - PGPUser *foundUser = nil; - - for (PGPUser *user in self.users) { - if (!user.userID || user.userID.length == 0) { - continue; - } - - PGPSignaturePacket *selfCertificate = [user validSelfCertificate:self]; - if (!selfCertificate) { - continue; - } - - if (selfCertificate.isPrimaryUserID) { - foundUser = user; - } else if (!foundUser) { - foundUser = user; - } - *selfCertificateOut = selfCertificate; - } - return foundUser; -} -#pragma mark - Preferences - -- (PGPSymmetricAlgorithm) preferredSymmetricAlgorithm -{ - return [[self class] preferredSymmetricAlgorithmForKeys:@[self]]; -} - -+ (PGPSymmetricAlgorithm) preferredSymmetricAlgorithmForKeys:(NSArray *)keys -{ - // 13.2. Symmetric Algorithm Preferences - // Since TripleDES is the MUST-implement algorithm, if it is not explicitly in the list, it is tacitly at the end. - - NSMutableArray *preferecesArray = [NSMutableArray array]; - for (PGPKey *key in keys) { - NSMutableArray *keyAlgorithms = [NSMutableArray array]; - - PGPSignaturePacket *selfCertificate = nil; - PGPUser *primaryUser = [key primaryUserAndSelfCertificate:&selfCertificate]; - if (primaryUser && selfCertificate) { - PGPSignatureSubpacket *subpacket = [[selfCertificate subpacketsOfType:PGPSignatureSubpacketTypePreferredSymetricAlgorithm] firstObject]; - NSArray *preferencesArray = subpacket.value; - for (NSValue *preferedValue in preferencesArray) { - if ([preferedValue pgp_objCTypeIsEqualTo:@encode(PGPSymmetricAlgorithm)]) { - PGPSymmetricAlgorithm algorithm = PGPSymmetricPlaintext; - [preferedValue getValue:&algorithm]; - [keyAlgorithms addObject:@(algorithm)]; - } - } - } - - if (keyAlgorithms.count > 0) { - [preferecesArray addObject:keyAlgorithms]; - } - } - - // intersect - if (preferecesArray.count > 0) { - NSMutableOrderedSet *set = [NSMutableOrderedSet orderedSetWithArray:preferecesArray[0]]; - for (NSArray *prefArray in preferecesArray) { - [set intersectSet:[NSSet setWithArray:prefArray]]; + // Finally, the Key ID and fingerprint of a subkey are calculated in the + // same way as for a primary key, including the 0x99 as the first octet + // (even though this is not a valid packet ID for a public subkey). + return pgpCalculateMD5(toHash.bytes, (unsigned int)toHash.length); } - return [set[0] unsignedIntValue]; + break; + default: + NSAssert(false, @"Shouldn't happend"); + break; } - - return PGPSymmetricTripleDES; + return nil; } -#pragma mark - Private - /** - * Ordered list of packets. Trust Packet is not exported. + * Note that if V3 and V4 format keys share the same RSA key + * material, they will have different Key IDs as well as different + * fingerprints. * - * @return array + * @return key id */ -- (NSArray *)allPacketsArray -{ - //TODO: handle trust packet somehow. The Trust packet is used only within keyrings and is not normally exported. - NSMutableArray *arr = [NSMutableArray array]; - - [arr addObject:self.primaryKeyPacket]; - - if (self.revocationSignature) { - [arr addObject:self.revocationSignature]; - } - - for (id packet in self.directSignatures) { - [arr addObject:packet]; - } - - for (PGPUser *user in self.users) { - [arr addObjectsFromArray:[user allPackets]]; - } - - for (PGPSubKey *subKey in self.subKeys) { - [arr addObjectsFromArray:[subKey allPackets]]; - } - - return [arr copy]; -} - -- (NSArray *)allKeyPackets +- (PGPKeyID *)keyID { - NSMutableArray *arr = [NSMutableArray arrayWithObject:self.primaryKeyPacket]; - for (PGPSubKey *subKey in self.subKeys) { - [arr addObject:subKey.primaryKeyPacket]; + switch (self.packet.version) { + case 0x04: + { + // For a V4 The Key ID is the low-order 64 bits of the fingerprint. + NSData *fingerprint = [self fingerprint]; + NSAssert(fingerprint.length == 160 / 8, @"Invalid fingerprint"); + NSData *keyIDBytes = [fingerprint subdataWithRange:(NSRange){fingerprint.length - 8,8}]; + return [[PGPKeyID alloc] initWithBytes:keyIDBytes.bytes length:keyIDBytes.length]; + } + break; + case 0x03: + { + //TODO: untested + // For a V3 key, the eight-octet Key ID consists of the low 64 bits of the public modulus of the RSA key. + NSData *modulus = [self.packet mpiForIdentifier:@"N"]; + NSData *keyIDBytes = [modulus subdataWithRange:(NSRange){modulus.length - 8,8}]; + return [[PGPKeyID alloc] initWithBytes:keyIDBytes.bytes length:keyIDBytes.length]; + } + break; + default: + break; } - return [arr copy]; + return nil; } @end diff --git a/ObjectivePGP/PGPKeyID.h b/ObjectivePGP/PGPKeyID.h index a546c690..c46a6258 100644 --- a/ObjectivePGP/PGPKeyID.h +++ b/ObjectivePGP/PGPKeyID.h @@ -2,25 +2,22 @@ // PGPKeyID.h // ObjectivePGP // -// Created by Marcin Krzyzanowski on 06/05/14. -// Copyright (c) 2014 Marcin Krzyżanowski. All rights reserved. +// Created by Marcin Krzyzanowski on 20/01/15. +// Copyright (c) 2015 Marcin Krzyżanowski. All rights reserved. // +// 3.3. Key IDs +// +// A Key ID is an eight-octet scalar that identifies a key. +// Implementations SHOULD NOT assume that Key IDs are unique. The +// section "Enhanced Key Formats" below describes how Key IDs are +// formed. #import -#import "PGPFingerprint.h" - -@interface PGPKeyID : NSObject -@property (readonly, nonatomic) NSData *longKey; -@property (readonly, nonatomic) NSString *longKeyString; -@property (readonly, nonatomic) NSData *shortKey; -@property (readonly, nonatomic) NSString *shortKeyString; - -- (instancetype) initWithFingerprint:(PGPFingerprint *)fingerprint; -- (instancetype) initWithLongKey:(NSData *)longKeyData; +@interface PGPKeyID : NSObject +@property (copy, readonly) NSData *octetsData; +- (instancetype) initWithBytes:(const void *)bytes length:(NSUInteger)length; - (BOOL) isEqualToKeyID:(PGPKeyID *)keyID; -- (NSData *)exportKeyData; - @end diff --git a/ObjectivePGP/PGPKeyID.m b/ObjectivePGP/PGPKeyID.m index e0fc0e08..2f2dd804 100644 --- a/ObjectivePGP/PGPKeyID.m +++ b/ObjectivePGP/PGPKeyID.m @@ -2,49 +2,46 @@ // PGPKeyID.m // ObjectivePGP // -// Created by Marcin Krzyzanowski on 06/05/14. -// Copyright (c) 2014 Marcin Krzyżanowski. All rights reserved. +// Created by Marcin Krzyzanowski on 20/01/15. +// Copyright (c) 2015 Marcin Krzyżanowski. All rights reserved. // -// Fingerprint: 4772 3A3C EE12 760F 7DC8 4AE0 1B63 BCB7 E810 38C6 -// Long Key ID: 1B63 BCB7 E810 38C6 <- this -// Short Key ID: E810 38C6 #import "PGPKeyID.h" +#import "PGPKey.h" +#import "PGPFunctions.h" + +@interface PGPKeyID () +@property (copy, readwrite) NSData *octetsData; +@end @implementation PGPKeyID -- (instancetype) initWithFingerprint:(PGPFingerprint *)fingerprint +- (instancetype) initWithBytes:(const void *)bytes length:(NSUInteger)length { - if (!fingerprint) - return nil; - - if (self = [self initWithLongKey:[fingerprint.hashedData subdataWithRange:(NSRange){fingerprint.hashLength - 8,8}]]) { - + if (self = [super init]) { + _octetsData = [NSData dataWithBytes:bytes length:length]; } - return self; } -- (instancetype) initWithLongKey:(NSData *)longKeyData -{ - if (longKeyData.length != 8) { - return nil; - } - if (self = [self init]) { - _longKey = longKeyData; - } - return self; -} - -- (NSString *)description +- (NSString *) description { - return [self longKeyString]; + NSData *lKey = self.octetsData; + NSMutableString *sbuf = [NSMutableString stringWithCapacity:lKey.length * 2]; + const unsigned char *buf = lKey.bytes; + for (NSUInteger i = 0; i < lKey.length; ++i) { + [sbuf appendFormat:@"%02X", (unsigned int)buf[i]]; + } + return [sbuf copy]; } -- (NSData *)exportKeyData +- (NSUInteger)hash { - return [_longKey copy]; + const NSUInteger prime = 31; + NSUInteger result = 1; + result = prime * result + [_octetsData hash]; + return result; } - (BOOL)isEqual:(id)object @@ -52,13 +49,13 @@ - (BOOL)isEqual:(id)object if (self == object) { return YES; } - + if ([self class] != [object class]) { return NO; } - + PGPKeyID *other = object; - return [self.longKey isEqualToData:other.longKey]; + return [self.octetsData isEqualToData:other.octetsData]; } - (BOOL) isEqualToKeyID:(PGPKeyID *)keyID @@ -66,39 +63,12 @@ - (BOOL) isEqualToKeyID:(PGPKeyID *)keyID return [self isEqual:keyID]; } -- (NSUInteger)hash -{ - const NSUInteger prime = 31; - NSUInteger result = 1; - result = prime * result + [_longKey hash]; - return result; -} - -- (NSData *)shortKey -{ - return [self.longKey subdataWithRange:(NSRange){4,4}]; -} - -- (NSString *)shortKeyString -{ - NSData *sKey = self.shortKey; - NSMutableString *sbuf = [NSMutableString stringWithCapacity:sKey.length * 2]; - const unsigned char *buf = sKey.bytes; - for (NSUInteger i = 0; i < sKey.length; ++i) { - [sbuf appendFormat:@"%02X", (unsigned int)buf[i]]; - } - return [sbuf copy]; -} +#pragma mark - NSCopying -- (NSString *)longKeyString +- (instancetype)copyWithZone:(NSZone *)zone { - NSData *lKey = self.longKey; - NSMutableString *sbuf = [NSMutableString stringWithCapacity:lKey.length * 2]; - const unsigned char *buf = lKey.bytes; - for (NSUInteger i = 0; i < lKey.length; ++i) { - [sbuf appendFormat:@"%02X", (unsigned int)buf[i]]; - } - return [sbuf copy]; + PGPKeyID *copy = [[PGPKeyID alloc] init]; + copy.octetsData = self.octetsData; + return copy; } - @end diff --git a/ObjectivePGP/PGPLiteralPacket.h b/ObjectivePGP/PGPLiteralPacket.h deleted file mode 100644 index d5bffdd7..00000000 --- a/ObjectivePGP/PGPLiteralPacket.h +++ /dev/null @@ -1,28 +0,0 @@ -// -// PGPLiteralPacket.h -// ObjectivePGP -// -// Created by Marcin Krzyzanowski on 24/05/14. -// Copyright (c) 2014 Marcin Krzyżanowski. All rights reserved. -// - -#import "PGPPacket.h" - -typedef NS_ENUM(UInt8, PGPLiteralPacketFormat) { - PGPLiteralPacketBinary = 'b', - PGPLiteralPacketText = 't', - PGPLiteralPacketTextUTF8 = 'u' -}; - -@interface PGPLiteralPacket : PGPPacket - -@property (assign) PGPLiteralPacketFormat format; -@property (strong) NSDate *timestamp; -@property (strong) NSString *filename; - -@property (strong) NSData *literalRawData; - -- (instancetype) initWithData:(NSData *)rawData; -+ (PGPLiteralPacket *) literalPacket:(PGPLiteralPacketFormat)format withData:(NSData *)rawData; - -@end diff --git a/ObjectivePGP/PGPLiteralPacket.m b/ObjectivePGP/PGPLiteralPacket.m deleted file mode 100644 index b6e05f4b..00000000 --- a/ObjectivePGP/PGPLiteralPacket.m +++ /dev/null @@ -1,160 +0,0 @@ -// -// PGPLiteralPacket.m -// ObjectivePGP -// -// Created by Marcin Krzyzanowski on 24/05/14. -// Copyright (c) 2014 Marcin Krzyżanowski. All rights reserved. -// - -#import "PGPLiteralPacket.h" -#import "PGPTypes.h" - -@interface PGPLiteralPacket () -@end - -@implementation PGPLiteralPacket - -- (id)init -{ - if (self = [super init]) { - _format = PGPLiteralPacketBinary; - } - return self; -} - -- (instancetype) initWithData:(NSData *)rawData -{ - if (self = [self init]) { - _literalRawData = rawData; - } - return self; -} - -+ (PGPLiteralPacket *) literalPacket:(PGPLiteralPacketFormat)format withData:(NSData *)rawData -{ - PGPLiteralPacket *literalPacket = [[PGPLiteralPacket alloc] init]; - literalPacket.format = format; - literalPacket.literalRawData = rawData; - return literalPacket; -} - -- (PGPPacketTag)tag -{ - return PGPLiteralDataPacketTag; -} - -- (NSUInteger)parsePacketBody:(NSData *)packetBody error:(NSError *__autoreleasing *)error -{ - NSUInteger position = [super parsePacketBody:packetBody error:error]; - - // A one-octet field that describes how the data is formatted. - [packetBody getBytes:&_format range:(NSRange){position, 1}]; - position = position + 1; - - NSAssert(self.format == PGPLiteralPacketBinary || self.format == PGPLiteralPacketText || self.format == PGPLiteralPacketTextUTF8, @"Unkown data format"); - if (self.format != PGPLiteralPacketBinary && self.format != PGPLiteralPacketText && self.format != PGPLiteralPacketTextUTF8) - { - // skip - return 1 + packetBody.length; - } - - UInt8 filenameLength = 0; - [packetBody getBytes:&filenameLength range:(NSRange){position, 1}]; - position = position + 1; - - // filename - if (filenameLength > 0) { - self.filename = [[NSString alloc] initWithData:[packetBody subdataWithRange:(NSRange){position, filenameLength}] encoding:NSUTF8StringEncoding]; - position = position + filenameLength; - } - - // If the special name "_CONSOLE" is used, the message is considered to be "for your eyes only". - - // data date - UInt32 creationTimestamp = 0; - [packetBody getBytes:&creationTimestamp range:(NSRange){position, 4}]; - creationTimestamp = CFSwapInt32BigToHost(creationTimestamp); - self.timestamp = [NSDate dateWithTimeIntervalSince1970:creationTimestamp]; - position = position + 4; - - switch (self.format) { - case PGPLiteralPacketBinary: - { - self.literalRawData = [packetBody subdataWithRange:(NSRange){position, packetBody.length - position}]; - } - break; - case PGPLiteralPacketText: - case PGPLiteralPacketTextUTF8: - { - NSString *literalString = [[NSString alloc] initWithData:self.literalRawData encoding:NSUTF8StringEncoding]; - // Text data is stored with - // These should be converted to native line endings by the receiving software. - NSString *literalStringWithHostNewLine = [[literalString componentsSeparatedByString:@"\r\n"] componentsJoinedByString:@"\n"]; - self.literalRawData = [literalStringWithHostNewLine dataUsingEncoding:NSUTF8StringEncoding]; - } - break; - default: - break; - } - - return position; -} - -- (NSData *) exportPacket:(NSError *__autoreleasing *)error -{ - NSAssert(self.literalRawData, @"Missing literal data"); - if (!self.literalRawData) { - if (error) { - *error = [NSError errorWithDomain:PGPErrorDomain code:0 userInfo:@{NSLocalizedDescriptionKey: @"Missing literal data"}]; - } - return nil; - } - - NSMutableData *bodyData = [NSMutableData data]; - [bodyData appendBytes:&_format length:1]; - - if (self.filename) { - UInt8 filenameLength = [self.filename lengthOfBytesUsingEncoding:NSUTF8StringEncoding]; - [bodyData appendBytes:&filenameLength length:1]; - [bodyData appendBytes:[self.filename cStringUsingEncoding:NSUTF8StringEncoding] length:filenameLength]; - } else { - UInt8 zero[] = {0x00}; - [bodyData appendBytes:&zero length:sizeof(zero)]; - } - - if (self.timestamp) { - UInt32 timestampBytes = (UInt32)[self.timestamp timeIntervalSince1970]; - timestampBytes = CFSwapInt32HostToBig(timestampBytes); - [bodyData appendBytes:×tampBytes length:4]; - } else { - UInt8 zero4[] = {0,0,0,0}; - [bodyData appendBytes:&zero4 length:4]; - } - - switch (self.format) { - case PGPLiteralPacketBinary: - [bodyData appendData:self.literalRawData]; - break; - case PGPLiteralPacketText: - case PGPLiteralPacketTextUTF8: - { - // Convert to - NSString *literalStringWithHostNewLine = [[NSString alloc] initWithData:self.literalRawData encoding:NSUTF8StringEncoding]; - NSString *literalStringWithCRLF = [[literalStringWithHostNewLine componentsSeparatedByString:@"\n"] componentsJoinedByString:@"\r\n"]; - [bodyData appendData:[literalStringWithCRLF dataUsingEncoding:NSUTF8StringEncoding]]; - } - break; - default: - break; - } - - NSMutableData *data = [NSMutableData data]; - NSData *headerData = [self buildHeaderData:bodyData]; - [data appendData: headerData]; - [data appendData: bodyData]; - - return [data copy]; -} - - -@end diff --git a/ObjectivePGP/PGPMPI.h b/ObjectivePGP/PGPMPI.h index 7f1a84f5..54be61e4 100644 --- a/ObjectivePGP/PGPMPI.h +++ b/ObjectivePGP/PGPMPI.h @@ -1,26 +1,19 @@ // -// OpenPGPMPI.h +// PGPMPI.h // ObjectivePGP // -// Created by Marcin Krzyzanowski on 04/05/14. -// Copyright (c) 2014 Marcin Krzyżanowski. All rights reserved. +// Created by Marcin Krzyzanowski on 18/01/15. +// Copyright (c) 2015 Marcin Krzyżanowski. All rights reserved. // #import -#import @interface PGPMPI : NSObject +@property (copy) NSString *identifier; // descriptive identifier like P, G, Y, etc... +@property (copy) NSData *data; -@property (strong) NSString *identifier; -@property (assign, readonly) BIGNUM *bignumRef; -/** - * Total bytes, header + body - */ -@property (assign, readonly) NSUInteger packetLength; - -- (instancetype) initWithMPIData:(NSData *)mpiData atPosition:(NSUInteger)position; -- (instancetype) initWithData:(NSData *)dataToMPI; -- (NSData *) exportMPI; -- (NSData *) bodyData; ++ (instancetype) readFromStream:(NSInputStream *)inputStream error:(NSError * __autoreleasing *)error; +- (BOOL) writeToStream:(NSOutputStream *)outputStream error:(NSError * __autoreleasing *)error; +- (NSData *) buildData:(NSError * __autoreleasing *)error; @end diff --git a/ObjectivePGP/PGPMPI.m b/ObjectivePGP/PGPMPI.m index 0ad2b5a6..813b94c8 100644 --- a/ObjectivePGP/PGPMPI.m +++ b/ObjectivePGP/PGPMPI.m @@ -1,101 +1,117 @@ // -// OpenPGPMPI.m +// PGPMPI.m // ObjectivePGP // -// Created by Marcin Krzyzanowski on 04/05/14. -// Copyright (c) 2014 Marcin Krzyżanowski. All rights reserved. +// Created by Marcin Krzyzanowski on 18/01/15. +// Copyright (c) 2015 Marcin Krzyżanowski. All rights reserved. // +// 3.2. Multiprecision Integers // Multiprecision integers (also called MPIs) are unsigned integers used // to hold large integers such as the ones used in cryptographic // calculations. #import "PGPMPI.h" - -@interface PGPMPI () -@property (assign, readwrite) BIGNUM *bignumRef; -@property (assign, readwrite) NSUInteger packetLength; -@end +#import "PGPCommon.h" +#import "PGPFunctions.h" +#import "NSInputStream+PGP.h" +#import "NSOutputStream+PGP.h" +#import "NSMutableData+PGP.h" +#import @implementation PGPMPI -- (instancetype) initWithData:(NSData *)dataToMPI ++ (instancetype) readFromStream:(NSInputStream *)inputStream error:(NSError * __autoreleasing *)error { - if (self = [self init]) { - _bignumRef = BN_bin2bn(dataToMPI.bytes, (int)dataToMPI.length, NULL); - _packetLength = dataToMPI.length + 2; + NSParameterAssert(inputStream); + + PGPMPI *mpi = [[PGPMPI alloc] init]; + + UInt16 bits = [inputStream readUInt16BE]; + NSUInteger bytesCount = (bits + 7) / 8; + + UInt8 *mpiBuffer = calloc(1, bytesCount); + NSInteger readResult = [inputStream read:mpiBuffer maxLength:bytesCount]; + if (readResult < 0 || readResult != bytesCount) { + if (error) { + *error = [NSError errorWithDomain:PGPErrorDomain code:0 userInfo:@{NSLocalizedDescriptionKey: @"Error while reading MPI data."}]; + } + return nil; } - return self; + + mpi.data = [NSData dataWithBytes:mpiBuffer length:bytesCount]; + + // forget buffer + memset(mpiBuffer, arc4random(), bytesCount); + free(mpiBuffer); + + return mpi; } -// parse mpi "packet" -- (instancetype) initWithMPIData:(NSData *)mpiData atPosition:(NSUInteger)position +- (BOOL) writeToStream:(NSOutputStream *)outputStream error:(NSError * __autoreleasing *)error { - if (self = [self init]) { - UInt16 bitsBE = 0; - [mpiData getBytes:&bitsBE range:(NSRange){position,2}]; - UInt16 bits = CFSwapInt16BigToHost(bitsBE); - NSUInteger mpiBytesLength = (bits + 7) / 8; - - NSData *intdata = [mpiData subdataWithRange:(NSRange){position + 2, mpiBytesLength}]; - _bignumRef = BN_bin2bn(intdata.bytes, (int)intdata.length, NULL); - // Additinal rule: The size of an MPI is ((MPI.length + 7) / 8) + 2 octets. - _packetLength = intdata.length + 2; + NSParameterAssert(outputStream); + + if (!outputStream.hasSpaceAvailable) { + if (error) { + *error = [NSError errorWithDomain:PGPErrorDomain code:0 userInfo:@{NSLocalizedDescriptionKey: @"No space on stream"}]; + } + return NO; + } + + NSData *mpiData = [self buildData:error]; + if (!mpiData || *error) { + return NO; } - return self; + + return [outputStream writeData:mpiData]; } -- (NSData *)bodyData +- (NSData *) buildData:(NSError * __autoreleasing *)error { - NSAssert(self.bignumRef, @"Missing bignumRef"); - - if (!self.bignumRef) + NSData *data = [PGPMPI buildMPIForData:self.data error:error]; + if (!data || *error) { return nil; - - BIGNUM *mpi_BN = BN_dup(self.bignumRef); - NSInteger mpi_BN_length = (BN_num_bits(mpi_BN) + 7) / 8; - UInt8 *bn_bin = calloc(mpi_BN_length, sizeof(UInt8)); - NSUInteger len = BN_bn2bin(mpi_BN, bn_bin); - BN_free(mpi_BN); - - NSData *data = [NSData dataWithBytes:bn_bin length:len]; - free(bn_bin); + } return data; } -- (NSData *) exportMPI +#pragma mark - Private + ++ (NSData *) buildMPIForData:(NSData *)data error:(NSError * __autoreleasing *)error { - if (!self.bignumRef) { + NSParameterAssert(data); + + if (!data) { + if (error) { + *error = [NSError errorWithDomain:PGPErrorDomain code:0 userInfo:@{NSLocalizedDescriptionKey: @"Missing MPI data"}]; + } return nil; } - + NSMutableData *outData = [NSMutableData data]; - // length - UInt16 bits = BN_num_bits(self.bignumRef); - UInt16 bitsBE = CFSwapInt16HostToBig(bits); - [outData appendBytes:&bitsBE length:2]; + // length in bits + UInt16 bits = pgpNumBits((Byte *)data.bytes, data.length); + [outData appendUInt16BE:bits]; +// UInt16 bitsBE = CFSwapInt16HostToBig(bits); +// [outData appendBytes:&bitsBE length:2]; // mpi - UInt8 *buf = calloc(BN_num_bytes(self.bignumRef), sizeof(UInt8)); - UInt16 bytes = (bits + 7) / 8; - BN_bn2bin(self.bignumRef, buf); - [outData appendBytes:buf length:bytes]; - free(buf); - + [outData appendData:data]; + +// // length +// UInt16 bits = BN_num_bits(self.bignumRef); +// UInt16 bitsBE = CFSwapInt16HostToBig(bits); +// [outData appendBytes:&bitsBE length:2]; +// +// // mpi +// UInt8 *buf = calloc(BN_num_bytes(self.bignumRef), sizeof(UInt8)); +// UInt16 bytes = (bits + 7) / 8; +// BN_bn2bin(self.bignumRef, buf); +// [outData appendBytes:buf length:bytes]; +// free(buf); + return [outData copy]; } -- (NSString *)description -{ - return [NSString stringWithFormat:@"%@, \"%@\", %@ bytes, total: %@ bytes", [super description], self.identifier, @(BN_num_bytes(self.bignumRef)), @(_packetLength)]; -} - -- (void)dealloc -{ - if (self.bignumRef != NULL) { - BN_clear_free(self.bignumRef); - _bignumRef = nil; - } -} - @end diff --git a/ObjectivePGP/PGPMessage.h b/ObjectivePGP/PGPMessage.h new file mode 100644 index 00000000..6079c171 --- /dev/null +++ b/ObjectivePGP/PGPMessage.h @@ -0,0 +1,13 @@ +// +// PGPMessage.h +// ObjectivePGP +// +// Created by Marcin Krzyzanowski on 17/01/15. +// Copyright (c) 2015 Marcin Krzyżanowski. All rights reserved. +// + +#import + +@interface PGPMessage : NSObject + +@end diff --git a/ObjectivePGP/PGPMessage.m b/ObjectivePGP/PGPMessage.m new file mode 100644 index 00000000..10ab544c --- /dev/null +++ b/ObjectivePGP/PGPMessage.m @@ -0,0 +1,42 @@ +// +// PGPMessage.m +// ObjectivePGP +// +// Created by Marcin Krzyzanowski on 17/01/15. +// Copyright (c) 2015 Marcin Krzyżanowski. All rights reserved. +// +// 11.3. OpenPGP Messages +// +// An OpenPGP message is a packet or sequence of packets that +// corresponds to the following grammatical rules (comma represents sequential composition, +// and vertical bar separates alternatives): +// +// OpenPGP Message :- Encrypted Message | Signed Message | Compressed Message | Literal Message. +// +// Compressed Message :- Compressed Data Packet. +// +// Literal Message :- Literal Data Packet. +// +// ESK :- Public-Key Encrypted Session Key Packet | Symmetric-Key Encrypted Session Key Packet. +// +// ESK Sequence :- ESK | ESK Sequence, ESK. +// +// Encrypted Data :- Symmetrically Encrypted Data Packet | Symmetrically Encrypted Integrity Protected Data Packet +// +// Encrypted Message :- Encrypted Data | ESK Sequence, Encrypted Data. +// +// One-Pass Signed Message :- One-Pass Signature Packet, OpenPGP Message, Corresponding Signature Packet. +// +// Signed Message :- Signature Packet, OpenPGP Message | One-Pass Signed Message. +// +// In addition, decrypting a Symmetrically Encrypted Data packet or a +// Symmetrically Encrypted Integrity Protected Data packet as well as +// decompressing a Compressed Data packet must yield a valid OpenPGP +// Message. +// + +#import "PGPMessage.h" + +@implementation PGPMessage + +@end diff --git a/ObjectivePGP/PGPModificationDetectionCodePacket.h b/ObjectivePGP/PGPModificationDetectionCodePacket.h deleted file mode 100644 index 99bcf5c4..00000000 --- a/ObjectivePGP/PGPModificationDetectionCodePacket.h +++ /dev/null @@ -1,16 +0,0 @@ -// -// PGPModificationDetectionCodePacket.h -// ObjectivePGP -// -// Created by Marcin Krzyzanowski on 12/05/14. -// Copyright (c) 2014 Marcin Krzyżanowski. All rights reserved. -// - -#import "PGPPacket.h" - -@interface PGPModificationDetectionCodePacket : PGPPacket -@property (strong, readonly) NSData *hashData; - -- (instancetype)initWithData:(NSData *)data; - -@end diff --git a/ObjectivePGP/PGPModificationDetectionCodePacket.m b/ObjectivePGP/PGPModificationDetectionCodePacket.m deleted file mode 100644 index a5a71e4d..00000000 --- a/ObjectivePGP/PGPModificationDetectionCodePacket.m +++ /dev/null @@ -1,55 +0,0 @@ -// -// PGPModificationDetectionCodePacket.m -// ObjectivePGP -// -// Created by Marcin Krzyzanowski on 12/05/14. -// Copyright (c) 2014 Marcin Krzyżanowski. All rights reserved. -// -// MDC - -#import "PGPModificationDetectionCodePacket.h" -#import "NSData+PGPUtils.h" - -#import - -@implementation PGPModificationDetectionCodePacket - -- (instancetype)initWithData:(NSData *)data -{ - if (self = [self init]) { - self->_hashData = [data pgp_SHA1]; - } - return self; -} - -- (PGPPacketTag)tag -{ - return PGPModificationDetectionCodePacketTag; // 19 -} - -- (NSUInteger)parsePacketBody:(NSData *)packetBody error:(NSError *__autoreleasing *)error -{ - NSUInteger position = [super parsePacketBody:packetBody error:error]; - - // 5.14. Modification Detection Code Packet (Tag 19) - NSAssert(self.bodyData.length == CC_SHA1_DIGEST_LENGTH, @"A Modification Detection Code packet MUST have a length of 20 octets"); - - self->_hashData = [packetBody subdataWithRange:(NSRange){position,CC_SHA1_DIGEST_LENGTH}]; - position = position + self.hashData.length; - - return position; -} - -- (NSData *)exportPacket:(NSError *__autoreleasing *)error -{ - NSData *bodyData = [self.hashData subdataWithRange:(NSRange) {0,CC_SHA1_DIGEST_LENGTH}]; // force limit to 20 octets - - NSMutableData *data = [NSMutableData data]; - NSData *headerData = [self buildHeaderData:bodyData]; - [data appendData: headerData]; - [data appendData: bodyData]; - - return [data copy]; -} - -@end diff --git a/ObjectivePGP/PGPOnePassSignaturePacket.h b/ObjectivePGP/PGPOnePassSignaturePacket.h deleted file mode 100644 index 73ec8950..00000000 --- a/ObjectivePGP/PGPOnePassSignaturePacket.h +++ /dev/null @@ -1,20 +0,0 @@ -// -// PGPOnePassSignaturePacket.h -// ObjectivePGP -// -// Created by Marcin Krzyzanowski on 29/05/14. -// Copyright (c) 2014 Marcin Krzyżanowski. All rights reserved. -// - -#import "PGPPacket.h" - -@class PGPKeyID; - -@interface PGPOnePassSignaturePacket : PGPPacket -@property (assign) UInt8 version; // The current version is 3. -@property (assign) PGPSignatureType signatureType; -@property (assign) PGPHashAlgorithm hashAlgorith; -@property (assign) PGPPublicKeyAlgorithm publicKeyAlgorithm; -@property (assign) PGPKeyID *keyID; // 8 -@property (assign) BOOL notNested; -@end diff --git a/ObjectivePGP/PGPOnePassSignaturePacket.m b/ObjectivePGP/PGPOnePassSignaturePacket.m deleted file mode 100644 index a1bed836..00000000 --- a/ObjectivePGP/PGPOnePassSignaturePacket.m +++ /dev/null @@ -1,75 +0,0 @@ -// -// PGPOnePassSignaturePacket.m -// ObjectivePGP -// -// Created by Marcin Krzyzanowski on 29/05/14. -// Copyright (c) 2014 Marcin Krzyżanowski. All rights reserved. -// - -#import "PGPOnePassSignaturePacket.h" -#import "PGPKeyID.h" - -@implementation PGPOnePassSignaturePacket - -- (id)init -{ - if (self = [super init]) { - _version = 0x03; - } - return self; -} - -- (PGPPacketTag)tag -{ - return PGPOnePassSignaturePacketTag; -} - -- (NSUInteger)parsePacketBody:(NSData *)packetBody error:(NSError *__autoreleasing *)error -{ - NSUInteger position = [super parsePacketBody:packetBody error:error]; - - [packetBody getBytes:&_version range:(NSRange){position, 1}]; - position = position + 1; - - [packetBody getBytes:&_signatureType range:(NSRange){position, 1}]; - position = position + 1; - - [packetBody getBytes:&_hashAlgorith range:(NSRange){position, 1}]; - position = position + 1; - - [packetBody getBytes:&_publicKeyAlgorithm range:(NSRange){position, 1}]; - position = position + 1; - - PGPKeyID *keyID = [[PGPKeyID alloc] initWithLongKey:[packetBody subdataWithRange:(NSRange){position, 8}]]; - self.keyID = keyID; - position = position + 8; - - [packetBody getBytes:&_notNested range:(NSRange){position, 1}]; - position = position + 1; - - return position; -} - -- (NSData *)exportPacket:(NSError *__autoreleasing *)error -{ - NSAssert(self.keyID, @"Missing keyID"); - - NSMutableData *bodyData = [NSMutableData data]; - - [bodyData appendBytes:&_version length:1]; - [bodyData appendBytes:&_signatureType length:1]; - [bodyData appendBytes:&_hashAlgorith length:1]; - [bodyData appendBytes:&_publicKeyAlgorithm length:1]; - [bodyData appendData:[self.keyID exportKeyData]]; - - [bodyData appendBytes:&_notNested length:1]; - - NSMutableData *data = [NSMutableData data]; - NSData *headerData = [self buildHeaderData:bodyData]; - [data appendData: headerData]; - [data appendData: bodyData]; - - return [data copy]; -} - -@end diff --git a/ObjectivePGP/PGPPKCSEme.h b/ObjectivePGP/PGPPKCSEme.h deleted file mode 100644 index 02d1dc42..00000000 --- a/ObjectivePGP/PGPPKCSEme.h +++ /dev/null @@ -1,16 +0,0 @@ -// -// PGPPKCSEme.h -// ObjectivePGP -// -// Created by Marcin Krzyzanowski on 06/06/14. -// Copyright (c) 2014 Marcin Krzyżanowski. All rights reserved. -// - -#import - -@interface PGPPKCSEme : NSObject - -+ (NSData *) encodeMessage:(NSData *)m keyModulusLength:(NSUInteger)k error:(NSError * __autoreleasing *)error; -+ (NSData *) decodeMessage:(NSData *)m error:(NSError * __autoreleasing *)error; - -@end diff --git a/ObjectivePGP/PGPPKCSEme.m b/ObjectivePGP/PGPPKCSEme.m deleted file mode 100644 index 24902243..00000000 --- a/ObjectivePGP/PGPPKCSEme.m +++ /dev/null @@ -1,65 +0,0 @@ -// -// PGPPKCSEme.m -// ObjectivePGP -// -// Created by Marcin Krzyzanowski on 06/06/14. -// Copyright (c) 2014 Marcin Krzyżanowski. All rights reserved. -// - -#import "PGPPKCSEme.h" -#import "PGPTypes.h" -#import "NSData+PGPUtils.h" -#import "PGPCryptoUtils.h" - -@implementation PGPPKCSEme - -+ (NSData *) encodeMessage:(NSData *)m keyModulusLength:(NSUInteger)k error:(NSError * __autoreleasing *)error -{ - if (m.length > k - 11) { - if (error) { - *error = [NSError errorWithDomain:PGPErrorDomain code:0 userInfo:@{NSLocalizedDescriptionKey: @"Message to long"}]; - } - return nil; - } - - // Generate an octet string PS of length k - mLen - 3 consisting of - // pseudo-randomly generated nonzero octets. The length of PS will - // be at least eight octets. - NSMutableData *psData = [NSMutableData data]; - for (NSUInteger i = 0; i < (k - m.length) - 3; i++) { - UInt8 b = arc4random_uniform(254) + 1; - [psData appendBytes:&b length:1]; - } - - NSMutableData *emData = [NSMutableData data]; - UInt8 emPrefix[] = {0x00, 0x02}; - UInt8 emSuffix[] = {0x00}; - [emData appendBytes:emPrefix length:sizeof(emPrefix)]; - [emData appendData:psData]; - [emData appendBytes:emSuffix length:sizeof(emSuffix)]; - [emData appendData:m]; - return [emData copy]; -} - -+ (NSData *)decodeMessage:(NSData *)m error:(NSError * __autoreleasing *)error -{ - NSUInteger position = 0; - UInt8 emPrefix[2]; - [m getBytes:&emPrefix range:(NSRange){position, sizeof(emPrefix)}]; - position = position + sizeof(emPrefix); - - // read until 0x00 - NSUInteger *psLength = 0; - Byte b = 0; - do { - [m getBytes:&b range:(NSRange){position, 1}]; - position = position + 1; - psLength = psLength + 1; - } while (b != 0x00 && position < (m.length - 1)); - - // last read is separator 0x00, so current position at start of M - NSData *emData = [m subdataWithRange:(NSRange){position, m.length - position}]; - return emData; -} - -@end diff --git a/ObjectivePGP/PGPPKCSEmsa.h b/ObjectivePGP/PGPPKCSEmsa.h deleted file mode 100644 index c3481344..00000000 --- a/ObjectivePGP/PGPPKCSEmsa.h +++ /dev/null @@ -1,16 +0,0 @@ -// -// PGPPKCS.h -// ObjectivePGP -// -// Created by Marcin Krzyzanowski on 22/05/14. -// Copyright (c) 2014 Marcin Krzyżanowski. All rights reserved. -// - -#import -#import "PGPTypes.h" - -@interface PGPPKCSEmsa : NSObject - -+ (NSData *) encode:(PGPHashAlgorithm)hashAlgorithm message:(NSData *)m encodedMessageLength:(NSUInteger)emLen error:(NSError * __autoreleasing *)error; - -@end diff --git a/ObjectivePGP/PGPPKCSEmsa.m b/ObjectivePGP/PGPPKCSEmsa.m deleted file mode 100644 index 2ea4668e..00000000 --- a/ObjectivePGP/PGPPKCSEmsa.m +++ /dev/null @@ -1,151 +0,0 @@ -// -// PGPPKCS.m -// ObjectivePGP -// -// Created by Marcin Krzyzanowski on 22/05/14. -// Copyright (c) 2014 Marcin Krzyżanowski. All rights reserved. -// - -#import "PGPPKCSEmsa.h" -#import "PGPTypes.h" -#import "NSData+PGPUtils.h" -#import "PGPCryptoUtils.h" - -static UInt8 prefix_md5[] = { - 0x30, 0x20, 0x30, 0x0C, 0x06, 0x08, 0x2A, 0x86, - 0x48, 0x86, 0xF7, 0x0D, 0x02, 0x05, 0x05, 0x00, - 0x04, 0x10 -}; - -static UInt8 prefix_sha1[] = { - 0x30, 0x21, 0x30, 0x09, 0x06, 0x05, 0x2b, 0x0E, - 0x03, 0x02, 0x1A, 0x05, 0x00, 0x04, 0x14 -}; - -static UInt8 prefix_sha224[] = { - 0x30, 0x31, 0x30, 0x0d, 0x06, 0x09, 0x60, 0x86, - 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x04, 0x05, - 0x00, 0x04, 0x1C -}; - -static UInt8 prefix_sha256[] = { - 0x30, 0x31, 0x30, 0x0d, 0x06, 0x09, 0x60, 0x86, - 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x01, 0x05, - 0x00, 0x04, 0x20 -}; - -static UInt8 prefix_sha384[] = { - 0x30, 0x41, 0x30, 0x0d, 0x06, 0x09, 0x60, 0x86, - 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x02, 0x05, - 0x00, 0x04, 0x30 -}; - -static UInt8 prefix_sha512[] = { - 0x30, 0x51, 0x30, 0x0d, 0x06, 0x09, 0x60, 0x86, - 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x03, 0x05, - 0x00, 0x04, 0x40 -}; - -static UInt8 prefix_ripemd160[] = { - 0x30, 0x21, 0x30, 0x09, 0x06, 0x05, 0x2B, 0x24, - 0x03, 0x02, 0x01, 0x05, 0x00, 0x04, 0x14 -}; - - -@implementation PGPPKCSEmsa - -/** - * create a EMSA-PKCS1-v1_5 padding (See {@link http://tools.ietf.org/html/rfc4880#section-13.1.3|RFC 4880 13.1.3}) - * - * @param hashAlgorithm Hash algoritm - * @param m message to be encoded - * @param emLen intended length in octets of the encoded message - * - * @return encoded message - */ -+ (NSData *) encode:(PGPHashAlgorithm)hashAlgorithm message:(NSData *)m encodedMessageLength:(NSUInteger)emLength error:(NSError * __autoreleasing *)error -{ - NSMutableData *tData = [NSMutableData data]; // prefix + hash - switch (hashAlgorithm) { - case PGPHashMD5: - { - NSData *hashPrefixData = [NSData dataWithBytes:prefix_md5 length:sizeof(prefix_md5)]; - [tData appendData:hashPrefixData]; - [tData appendData:[m pgp_MD5]]; - } - break; - case PGPHashSHA1: - { - NSData *hashPrefixData = [NSData dataWithBytes:prefix_sha1 length:sizeof(prefix_sha1)]; - [tData appendData:hashPrefixData]; - [tData appendData:[m pgp_SHA1]]; - } - break; - case PGPHashSHA224: - { - NSData *hashPrefixData = [NSData dataWithBytes:prefix_sha224 length:sizeof(prefix_sha224)]; - [tData appendData:hashPrefixData]; - [tData appendData:[m pgp_SHA224]]; - } - break; - case PGPHashSHA256: - { - NSData *hashPrefixData = [NSData dataWithBytes:prefix_sha256 length:sizeof(prefix_sha256)]; - [tData appendData:hashPrefixData]; - [tData appendData:[m pgp_SHA256]]; - } - break; - case PGPHashSHA384: - { - NSData *hashPrefixData = [NSData dataWithBytes:prefix_sha384 length:sizeof(prefix_sha384)]; - [tData appendData:hashPrefixData]; - [tData appendData:[m pgp_SHA384]]; - } - break; - case PGPHashSHA512: - { - NSData *hashPrefixData = [NSData dataWithBytes:prefix_sha512 length:sizeof(prefix_sha512)]; - [tData appendData:hashPrefixData]; - [tData appendData:[m pgp_SHA512]]; - } - break; - case PGPHashRIPEMD160: - { - NSData *hashPrefixData = [NSData dataWithBytes:prefix_ripemd160 length:sizeof(prefix_ripemd160)]; - [tData appendData:hashPrefixData]; - [tData appendData:[m pgp_RIPEMD160]]; - } - break; - default: - NSAssert(false,@"Missing implementation"); - break; - } - - if (emLength < tData.length + 11) { - if (error) { - *error = [NSError errorWithDomain:PGPErrorDomain code:0 userInfo:@{NSLocalizedDescriptionKey: @"intended encoded message length too short"}]; - } - return nil; - } - - // Generate an octet string PS consisting of emLen - tLen - 3 - // octets with hexadecimal value 0xFF. The length of PS will be at - // least 8 octets. - NSMutableData *psData = [NSMutableData data]; - UInt8 ff = 0xff; - for (NSUInteger i = 0; i < emLength - tData.length - 3; i++) { - [psData appendBytes:&ff length:1]; - } - - NSMutableData *emData = [NSMutableData data]; - UInt8 emPrefix[] = {0x00, 0x01}; - UInt8 emSuffix[] = {0x00}; - [emData appendBytes:emPrefix length:sizeof(emPrefix)]; - [emData appendData:psData]; - [emData appendBytes:emSuffix length:sizeof(emSuffix)]; - [emData appendData:tData]; - - return [emData copy]; -} - -@end diff --git a/ObjectivePGP/PGPPacket.h b/ObjectivePGP/PGPPacket.h deleted file mode 100644 index aa622049..00000000 --- a/ObjectivePGP/PGPPacket.h +++ /dev/null @@ -1,33 +0,0 @@ -// -// PGPPacket.h -// ObjectivePGP -// -// Created by Marcin Krzyzanowski on 06/05/14. -// Copyright (c) 2014 Marcin Krzyżanowski. All rights reserved. -// - -#import -#import "PGPTypes.h" - -extern const UInt32 UnknownLength; - -@interface PGPPacket : NSObject - -@property (copy, readonly) NSData *headerData; -@property (copy, readonly) NSData *bodyData; -@property (assign) BOOL indeterminateLength; // should not be used, but gpg use it - -@property (assign, readonly) PGPPacketTag tag; - -- (instancetype) init NS_DESIGNATED_INITIALIZER; -- (instancetype) initWithHeader:(NSData *)headerData body:(NSData *)bodyData; - -+ (NSData *) parsePacketHeader:(NSData *)headerData bodyLength:(UInt32 *)bodyLength packetTag:(PGPPacketTag *)tag; -- (NSUInteger)parsePacketBody:(NSData *)packetBody error:(NSError *__autoreleasing *)error; - -- (NSData *) exportPacket:(NSError *__autoreleasing *)error; - -- (NSData *) buildHeaderData:(NSData *)bodyData; -+ (NSData *) buildNewFormatLengthDataForData:(NSData *)bodyData; - -@end \ No newline at end of file diff --git a/ObjectivePGP/PGPPacket.m b/ObjectivePGP/PGPPacket.m deleted file mode 100644 index 2f4c2e19..00000000 --- a/ObjectivePGP/PGPPacket.m +++ /dev/null @@ -1,287 +0,0 @@ -// -// PGPPacket.m -// ObjectivePGP -// -// Created by Marcin Krzyzanowski on 06/05/14. -// Copyright (c) 2014 Marcin Krzyżanowski. All rights reserved. -// - -#import "PGPPacket.h" -#import "NSData+PGPUtils.h" - -const UInt32 UnknownLength = UINT32_MAX; - -@interface PGPPacket () -@property (copy, readwrite) NSData *headerData; -@property (copy, readwrite) NSData *bodyData; -@end - -@implementation PGPPacket - -- (instancetype)init -{ - if (self = [super init]) { - - } - return self; -} - -- (instancetype)initWithHeader:(NSData *)headerData body:(NSData *)bodyData -{ - if (self = [self init]) { - NSError *error = nil; - _headerData = headerData; - _bodyData = bodyData; - [self parsePacketBody:self.bodyData error:&error]; - if (error) { - return nil; - } - } - return self; -} - - -- (NSUInteger)hash -{ -#ifndef NSUINTROTATE - #define NSUINT_BIT (CHAR_BIT * sizeof(NSUInteger)) - #define NSUINTROTATE(val, howmuch) ((((NSUInteger)val) << howmuch) | (((NSUInteger)val) >> (NSUINT_BIT - howmuch))) -#endif - - NSUInteger hash = [self.headerData hash]; - hash = NSUINTROTATE(hash, NSUINT_BIT / 2) ^ [self.bodyData hash]; - return hash; -} - - -- (NSUInteger) parsePacketBody:(NSData *)packetBody error:(NSError *__autoreleasing *)error -{ - NSAssert(packetBody.length == self.bodyData.length, @"length mismach"); - return 0; -} - -- (NSData *) exportPacket:(NSError *__autoreleasing *)error -{ - [NSException raise:@"MissingExportMethod" format:@"export: selector not overriden"]; - return nil; -} - -#pragma mark - Packet header - -// 4.2. Packet Headers -/** - * Parse header - * - * @param headerData header data - * - * @return Actual header data - */ -+ (NSData *) parsePacketHeader:(NSData *)headerData bodyLength:(UInt32 *)bodyLength packetTag:(PGPPacketTag *)tag -{ - UInt8 headerByte = 0; - [headerData getBytes:&headerByte range:(NSRange){0,1}]; - - BOOL isPGPHeader = !!(headerByte & PGPHeaderPacketTagAllwaysSet); - BOOL isNewFormat = !!(headerByte & PGPHeaderPacketTagNewFormat); - - - if (!isPGPHeader) { - return nil; - } - - NSUInteger headerLength = 0; - if (isNewFormat) { - headerLength = [self parseNewFormatHeaderPacket:headerData bodyLength:bodyLength packetTag:tag]; - } else { - headerLength = [self parseOldFormatHeaderPacket:headerData bodyLength:bodyLength packetTag:tag]; - } - - return [headerData subdataWithRange:(NSRange){0,headerLength}]; -} - -/** - * 4.2. Packet Headers - * - * @param packetData Packet header - * - * @return Header length - */ -+ (NSUInteger) parseNewFormatHeaderPacket:(NSData *)headerData bodyLength:(UInt32 *)length packetTag:(PGPPacketTag *)tag -{ - NSParameterAssert(headerData); - - UInt8 headerByte = 0; - [headerData getBytes:&headerByte length:1]; - // Bits 5-0 -- packet tag - UInt8 packetTag = (headerByte << 2); - packetTag = (packetTag >> 2); - *tag = packetTag; - - // body length - BOOL isPartialBodyLength = NO; - UInt32 bodyLength = 0; - NSInteger headerLength = 2; - - UInt8 *lengthOctets = (UInt8 *)[headerData subdataWithRange:NSMakeRange(1, MIN(5, headerData.length))].bytes; - UInt8 firstOctet = lengthOctets[0]; - - if (lengthOctets[0] < 192) { - // 4.2.2.1. One-Octet Length - // bodyLen = 1st_octet; - bodyLength = lengthOctets[0]; - headerLength = 1 + 1; - } else if (lengthOctets[0] >= 192 && lengthOctets[0] <= 223) { - // 4.2.2.2. Two-Octet Lengths - // bodyLen = ((1st_octet - 192) << 8) + (2nd_octet) + 192 - bodyLength = ((lengthOctets[0] - 192) << 8) + (lengthOctets[1]) + 192; - headerLength = 1 + 2; - } else if (lengthOctets[0] >= 223 && lengthOctets[0] < 255) { - // 4.2.2.4. Partial Body Length - // partialBodyLen = 1 << (1st_octet & 0x1F); - UInt32 partianBodyLength = lengthOctets[0] << (lengthOctets[0] & 0x1F); - bodyLength = partianBodyLength; - headerLength = 1 + 1; - isPartialBodyLength = YES; - } else if (firstOctet == 255) { - // 4.2.2.3. Five-Octet Length - // bodyLen = (2nd_octet << 24) | (3rd_octet << 16) | - // (4th_octet << 8) | 5th_octet - bodyLength = (lengthOctets[1] << 24) | (lengthOctets[2] << 16) | (lengthOctets[3] << 8) | lengthOctets[4]; - headerLength = 1 + 5; - } - *length = bodyLength; - - NSAssert(!isPartialBodyLength, @"Partial body length is not fully supported"); - NSAssert(bodyLength > 0, @"The packet is of indeterminate length"); - - return headerLength; -} - -// 4.2. Packet Headers -+ (NSUInteger) parseOldFormatHeaderPacket:(NSData *)headerData bodyLength:(UInt32 *)length packetTag:(PGPPacketTag *)tag -{ - NSParameterAssert(headerData); - - UInt8 headerByte = 0; - [headerData getBytes:&headerByte length:1]; - // Bits 5-2 -- packet tag - UInt8 packetTag = (headerByte << 2); - packetTag = (packetTag >> 4); - *tag = packetTag; - // Bits 1-0 -- length-type - UInt8 bodyLengthType = (headerByte << 6); - bodyLengthType = bodyLengthType >> 6; - - NSUInteger headerLength = 1; - UInt32 bodyLength = 0; - switch (bodyLengthType) { - case 0: - { - NSRange range = (NSRange) {1,1}; - [headerData getBytes:&bodyLength range:range]; - headerLength = 1 + range.length; - } - break; - case 1: - { - UInt16 bLen = 0; - NSRange range = (NSRange) {1,2}; - [headerData getBytes:&bLen range:range]; - // value of a two-octet scalar is ((n[0] << 8) + n[1]). - bodyLength = CFSwapInt16BigToHost(bLen); - headerLength = 1 + range.length; - } - break; - case 2: - { - NSRange range = (NSRange) {1,4}; - [headerData getBytes:&bodyLength range:range]; - bodyLength = CFSwapInt32BigToHost(bodyLength); - headerLength = 1 + range.length; - } - break; - case 3: - { -#ifdef DEBUG - NSLog(@"(Old) The packet is of indeterminate length - partially supported"); -#endif - bodyLength = UnknownLength; - headerLength = 1; - } - break; - - default: - break; - } - - NSAssert(bodyLength > 0, @"Invalid packet length"); - *length = bodyLength; - - return headerLength; -} - -- (NSData *) buildHeaderData:(NSData *)bodyData -{ - //TODO: check all formats, untested - //4.2.2. New Format Packet Lengths - NSMutableData *data = [NSMutableData data]; - - // Bit 7 -- Always one - // Bit 6 -- New packet format if set - UInt8 packetTag = PGPHeaderPacketTagAllwaysSet | PGPHeaderPacketTagNewFormat; - - // Bits 5-0 -- packet tag - packetTag |= self.tag; - - // write ptag - [data appendBytes:&packetTag length:1]; - [data appendData:[PGPPacket buildNewFormatLengthDataForData:bodyData]]; - - return [data copy]; -} - -+ (NSData *)buildNewFormatLengthDataForData:(NSData *)bodyData -{ - NSMutableData *data = [NSMutableData data]; - // write length octets - UInt64 bodyLength = bodyData.length; - if (bodyLength < 192) { - // 1 octet - [data appendBytes:&bodyLength length:1]; - } else if (bodyLength >= 192 && bodyLength <= 8383) { - // 2 octet - UInt8 buf[2] = {0,0}; - UInt16 twoOctets = bodyLength; - buf[0] = (UInt8)((twoOctets - 192) >> 8) + 192; - buf[1] = (UInt8)(twoOctets - 192); - [data appendBytes:buf length:2]; - } else { - // 5 octet - UInt8 buf[5] = {0,0,0,0,0}; - - UInt64 fiveOctets = bodyLength; - UInt8 marker = 255; - [data appendBytes:&marker length:1]; - - buf[0] = 0xff; - buf[1] = (UInt8)(fiveOctets >> 24); - buf[2] = (UInt8)(fiveOctets >> 16); - buf[3] = (UInt8)(fiveOctets >> 8); - buf[4] = (UInt8)(fiveOctets); - [data appendBytes:buf length:5]; - } - return [data copy]; - -} - -#pragma mark - NSCopying - -- (id)copyWithZone:(NSZone *)zone -{ - PGPPacket *copy = [[[self class] allocWithZone:zone] init]; - copy->_bodyData = self.bodyData; - copy->_headerData = self.headerData; - return copy; -} - -@end diff --git a/ObjectivePGP/PGPPacketFactory.h b/ObjectivePGP/PGPPacketFactory.h deleted file mode 100644 index 46d5b5a8..00000000 --- a/ObjectivePGP/PGPPacketFactory.h +++ /dev/null @@ -1,17 +0,0 @@ -// -// PGPPacket.h -// ObjectivePGP -// -// Created by Marcin Krzyzanowski on 04/05/14. -// Copyright (c) 2014 Marcin Krzyżanowski. All rights reserved. -// - -#import -#import "PGPTypes.h" -#import "PGPPacket.h" - -@interface PGPPacketFactory : NSObject - -+ (PGPPacket *) packetWithData:(NSData *)packetsData offset:(NSUInteger)offset; - -@end diff --git a/ObjectivePGP/PGPPacketFactory.m b/ObjectivePGP/PGPPacketFactory.m deleted file mode 100644 index a69640b2..00000000 --- a/ObjectivePGP/PGPPacketFactory.m +++ /dev/null @@ -1,121 +0,0 @@ -// -// PGPPacket.m -// ObjectivePGP -// -// Created by Marcin Krzyzanowski on 05/05/14. -// Copyright (c) 2014 Marcin Krzyżanowski. All rights reserved. -// - -#import "PGPPacketFactory.h" -#import "PGPPublicKeyPacket.h" -#import "PGPPublicSubKeyPacket.h" -#import "PGPSignaturePacket.h" -#import "PGPUserIDPacket.h" -#import "PGPTrustPacket.h" -#import "PGPSecretKeyPacket.h" -#import "PGPSecretSubKeyPacket.h" -#import "PGPLiteralPacket.h" -#import "PGPModificationDetectionCodePacket.h" -#import "PGPUserAttributePacket.h" -#import "PGPOnePassSignaturePacket.h" -#import "PGPCompressedPacket.h" -#import "PGPSymmetricallyEncryptedDataPacket.h" -#import "PGPSymmetricallyEncryptedIntegrityProtectedDataPacket.h" -#import "PGPPublicKeyEncryptedSessionKeyPacket.h" - -@implementation PGPPacketFactory - -/** - * Parse packet data and return packet object instance - * - * @param packetsData Data with all packets. Packet sequence data. Keyring. - * @param offset offset of current packet - * - * @return Packet instance object - */ -+ (PGPPacket * ) packetWithData:(NSData *)packetData offset:(NSUInteger)offset -{ - NSData *guessPacketHeaderData = [packetData subdataWithRange:(NSRange) {offset + 0, MIN(6,packetData.length - offset)}]; // up to 6 octets for complete header - - // parse header and get actual header data - UInt32 definedBodyLength = 0; - UInt32 finalBodyLength = 0; - PGPPacketTag packetTag = 0; - NSData *packetHeaderData = [PGPPacket parsePacketHeader:guessPacketHeaderData bodyLength:&definedBodyLength packetTag:&packetTag]; - - if (packetHeaderData.length > 0) { - finalBodyLength = definedBodyLength; - if (definedBodyLength == UnknownLength) { - // well.. if length is unknown then get all data as packet body - // which is not true because sometimes at the very end there is MDC packet - // this is handled in PGPSymmetricallyEncryptedIntegrityProtectedDataPacket - finalBodyLength = MAX(0.0,packetData.length - offset - packetHeaderData.length); - } - NSData *packetBodyData = [packetData subdataWithRange:(NSRange) {offset + packetHeaderData.length, finalBodyLength}]; - - // Analyze body0 - PGPPacket * packet = nil; - switch (packetTag) { - case PGPPublicKeyPacketTag: - packet = [[PGPPublicKeyPacket alloc] initWithHeader:packetHeaderData body:packetBodyData]; - break; - case PGPPublicSubkeyPacketTag: - packet = [[PGPPublicSubKeyPacket alloc] initWithHeader:packetHeaderData body:packetBodyData]; - break; - case PGPSignaturePacketTag: - packet = [[PGPSignaturePacket alloc] initWithHeader:packetHeaderData body:packetBodyData]; - break; - case PGPUserAttributePacketTag: - packet = [[PGPUserAttributePacket alloc] initWithHeader:packetHeaderData body:packetBodyData]; - break; - case PGPUserIDPacketTag: - packet = [[PGPUserIDPacket alloc] initWithHeader:packetHeaderData body:packetBodyData]; - break; - case PGPTrustPacketTag: - packet = [[PGPTrustPacket alloc] initWithHeader:packetHeaderData body:packetBodyData]; - break; - case PGPLiteralDataPacketTag: - packet = [[PGPLiteralPacket alloc] initWithHeader:packetHeaderData body:packetBodyData]; - break; - case PGPSecretKeyPacketTag: - packet = [[PGPSecretKeyPacket alloc] initWithHeader:packetHeaderData body:packetBodyData]; - break; - case PGPSecretSubkeyPacketTag: - packet = [[PGPSecretSubKeyPacket alloc] initWithHeader:packetHeaderData body:packetBodyData]; - break; - case PGPModificationDetectionCodePacketTag: - packet = [[PGPModificationDetectionCodePacket alloc] initWithHeader:packetHeaderData body:packetBodyData]; - break; - case PGPOnePassSignaturePacketTag: - packet = [[PGPOnePassSignaturePacket alloc] initWithHeader:packetHeaderData body:packetBodyData]; - break; - case PGPCompressedDataPacketTag: - packet = [[PGPCompressedPacket alloc] initWithHeader:packetHeaderData body:packetBodyData]; - break; -// case PGPSymmetricallyEncryptedDataPacketTag: -// packet = [[PGPSymmetricallyEncryptedDataPacket alloc] initWithHeader:packetHeaderData body:packetBodyData]; -// break; - case PGPSymmetricallyEncryptedIntegrityProtectedDataPacketTag: - packet = [[PGPSymmetricallyEncryptedIntegrityProtectedDataPacket alloc] initWithHeader:packetHeaderData body:packetBodyData]; - break; - case PGPPublicKeyEncryptedSessionKeyPacketTag: - packet = [[PGPPublicKeyEncryptedSessionKeyPacket alloc] initWithHeader:packetHeaderData body:packetBodyData]; - break; - default: - #ifdef DEBUG - NSLog(@"Warning %s Packet tag %d is not supported", __PRETTY_FUNCTION__, packetTag); - #endif - - packet = [[PGPPacket alloc] initWithHeader:packetHeaderData body:packetBodyData]; - break; - } - - if (definedBodyLength == UnknownLength) { - packet.indeterminateLength = YES; - } - return packet; - } - return nil; -} - -@end diff --git a/ObjectivePGP/PGPPacketHeader.h b/ObjectivePGP/PGPPacketHeader.h new file mode 100644 index 00000000..9b26b2ad --- /dev/null +++ b/ObjectivePGP/PGPPacketHeader.h @@ -0,0 +1,23 @@ +// +// PGPHeader.h +// ObjectivePGP +// +// Created by Marcin Krzyzanowski on 18/01/15. +// Copyright (c) 2015 Marcin Krzyżanowski. All rights reserved. +// + +#import +#import "PGPCommon.h" + +@interface PGPPacketHeader : NSObject +@property (assign) BOOL isNew; +@property (assign) PGPPacketTag packetTag; +@property (assign) UInt32 bodyLength; +@property (assign, getter=isPartial) BOOL partial; + ++ (instancetype) readFromStream:(NSInputStream *)inputStream error:(NSError * __autoreleasing *)error; +- (BOOL) writeToStream:(NSOutputStream *)outputStream error:(NSError * __autoreleasing *)error; + ++ (NSData *) buildNewFormatLengthBytesForData:(NSData *)bodyData; + +@end diff --git a/ObjectivePGP/PGPPacketHeader.m b/ObjectivePGP/PGPPacketHeader.m new file mode 100644 index 00000000..7dc6c5e4 --- /dev/null +++ b/ObjectivePGP/PGPPacketHeader.m @@ -0,0 +1,253 @@ +// +// PGPHeader.m +// ObjectivePGP +// +// Created by Marcin Krzyzanowski on 18/01/15. +// Copyright (c) 2015 Marcin Krzyżanowski. All rights reserved. +// + +#import "PGPPacketHeader.h" +#import "PGPCommon.h" +#import "NSInputStream+PGP.h" +#import "PGPFunctions.h" + +typedef NS_ENUM(NSUInteger, PGPHeaderPacketTag) { + PGPHeaderPacketTagNewFormat = 0x40, + PGPHeaderPacketTagAllwaysSet = 0x80 +}; + +@interface PGPPacketHeader () +@end + +@implementation PGPPacketHeader + ++ (instancetype) readFromStream:(NSInputStream *)inputStream error:(NSError * __autoreleasing *)error +{ + NSParameterAssert(inputStream); + + UInt8 headerByte; + PGPPacketHeader *header = nil; + if ([inputStream read:&headerByte maxLength:sizeof(headerByte)] > 0) { + header = [[PGPPacketHeader alloc] init]; + if (![header parseHeaderByte:headerByte error:error]) { + return nil; + } + + if (header.isNew) { + [header readNewLengthFromStream:inputStream error:error]; + } else { + // Bits 1-0 -- length-type + UInt8 oldLengthType = (UInt8)(headerByte << 6) >> 6; + [header readOldLengthFromStream:inputStream lengthType:oldLengthType error:error]; + } + } + + return header; +} + +- (BOOL) writeToStream:(NSOutputStream *)outputStream error:(NSError * __autoreleasing *)error +{ + NSParameterAssert(outputStream); + if (!outputStream.hasSpaceAvailable) { + return NO; + } + + NSMutableData *data = [NSMutableData data]; + NSMutableData *lengthData = [NSMutableData data]; + + UInt8 packetTag = PGPHeaderPacketTagAllwaysSet; + if (self.isNew) { + // New + packetTag |= PGPHeaderPacketTagNewFormat; + packetTag |= self.packetTag; + if (self.isPartial) { + int shift = (int)log2(self.bodyLength); + UInt8 partialOctet = shift | 224; + if (!isPowerOfTwo(self.bodyLength)) { + if (error) { + *error = [NSError errorWithDomain:PGPErrorDomain code:0 userInfo:@{NSLocalizedDescriptionKey: @"Partial length have to be power of two"}]; + } + return NO; + } + [lengthData appendBytes:&partialOctet length:1]; + } else if (self.bodyLength < 192) { + [lengthData appendBytes:&_bodyLength length:1]; + } else if (self.bodyLength >= 192 && self.bodyLength <= 8383) { + UInt8 buf[2] = {0,0}; + UInt16 twoOctets = self.bodyLength; + buf[0] = (UInt8)((twoOctets - 192) >> 8) + 192; + buf[1] = (UInt8)(twoOctets - 192); + [lengthData appendBytes:buf length:2]; + } else { + // 5 octet + UInt8 buf[5] = {0,0,0,0,0}; + + UInt64 fiveOctets = self.bodyLength; + UInt8 marker = 255; + [lengthData appendBytes:&marker length:1]; + + buf[0] = 0xff; + buf[1] = (UInt8)(fiveOctets >> 24); + buf[2] = (UInt8)(fiveOctets >> 16); + buf[3] = (UInt8)(fiveOctets >> 8); + buf[4] = (UInt8)(fiveOctets); + [lengthData appendBytes:buf length:5]; + } + } else { + // Old + packetTag |= self.packetTag << 2; + // determine length type 0-1 bit + UInt8 lengthType = 0; + if (self.isPartial || self.bodyLength == PGPIndeterminateLength) { + // The packet is of indeterminate length. The header is 1 octet + // long, and the implementation must determine how long the packet + // is. + lengthType = 3; + } else if (self.bodyLength <= UINT8_MAX) { + lengthType = 0; + [lengthData appendBytes:&_bodyLength length:1]; + } else if (self.bodyLength <= UINT16_MAX) { + lengthType = 1; + UInt16 bodyLengthBE = CFSwapInt16HostToBig(_bodyLength); + [lengthData appendBytes:&bodyLengthBE length:2]; + } else if (self.bodyLength <= UINT32_MAX) { + lengthType = 2; + NSUInteger bodyLengthBE = CFSwapInt32HostToBig(_bodyLength); + [lengthData appendBytes:&bodyLengthBE length:4]; + } else { + if (error) { + *error = [NSError errorWithDomain:PGPErrorDomain code:0 userInfo:@{NSLocalizedDescriptionKey: @"Unsupported length type"}]; + } + return NO; + } + packetTag |= lengthType; + } + [data appendBytes:&packetTag length:1]; + [data appendData:lengthData]; + + if ([outputStream write:data.bytes maxLength:data.length] == -1) { + return NO; + } + return YES; +} + +#pragma mark - Length + +- (BOOL) readNewLengthFromStream:(NSInputStream *)inputStream error:(NSError * __autoreleasing *)error +{ + NSParameterAssert(inputStream.streamStatus == NSStreamStatusOpen); + NSParameterAssert(error); + self.isNew = YES; + + UInt8 firstOctet = [inputStream readUInt8]; + if (firstOctet < 192) { + // 4.2.2.1. One-Octet Length + // bodyLen = 1st_octet; + self.bodyLength = firstOctet; + } else if (firstOctet >= 192 && firstOctet < 224) { + // 4.2.2.2. Two-Octet Lengths + UInt8 secondOctet = [inputStream readUInt8]; + self.bodyLength = ((firstOctet - 192) << 8) + (secondOctet) + 192; + } else if (firstOctet == 255) { + // 4.2.2.3. Five-Octet Length + // bodyLen = (2nd_octet << 24) | (3rd_octet << 16) | + // (4th_octet << 8) | 5th_octet + self.bodyLength = [inputStream readUInt32BE]; + //self.bodyLength = (secondOctet << 24) | (thirdOctet << 16) | (fourthOctet << 8) | fifthOctet; + } else if (firstOctet >= 224 && firstOctet < 255) { + // 4.2.2.4. Partial Body Length + // A Partial Body Length header is one octet long and encodes the length of only part of the data packet. + // partialBodyLen = 1 << (1st_octet & 0x1F); + self.partial = YES; + self.bodyLength = 1 << (firstOctet & 0x1F); + + if (self.bodyLength % 2 != 0) { + if (error) { + *error = [NSError errorWithDomain:PGPErrorDomain code:0 userInfo:@{NSLocalizedDescriptionKey: @"Partial length is not a power of 2"}]; + } + return NO; + } + } + + return YES; +} + + +- (BOOL) readOldLengthFromStream:(NSInputStream *)inputStream lengthType:(UInt8)lengthType error:(NSError * __autoreleasing *)error +{ + switch (lengthType) { + case 0: + self.bodyLength = [inputStream readUInt8]; + break; + case 1: + { + // value of a two-octet scalar is ((n[0] << 8) + n[1]). + self.bodyLength = [inputStream readUInt16BE]; + } + break; + case 2: + { + self.bodyLength = [inputStream readUInt32BE]; + } + break; + case 3: + { +#ifdef DEBUG + NSLog(@"The packet is of indeterminate length."); +#endif + // The packet is of indeterminate length. The header is 1 octet + // long, and the implementation must determine how long the packet + // is. + self.bodyLength = PGPIndeterminateLength; + self.partial = YES; + } + break; + default: + NSAssert(false, @"Invalid packet header"); + if (error) { + *error = [NSError errorWithDomain:PGPErrorDomain code:0 userInfo:@{NSLocalizedDescriptionKey: @"Invalid packet header"}]; + } + return NO; + } + + return YES; +} + +#pragma mark - NSCopying + +- (instancetype)copyWithZone:(NSZone *)zone +{ + PGPPacketHeader *copy = [[PGPPacketHeader alloc] init]; + copy.isNew = _isNew; + copy.packetTag = _packetTag; + copy.bodyLength = _bodyLength; + copy.partial = _partial; + return copy; +} + +#pragma mark - private + +- (BOOL) parseHeaderByte:(Byte)headerByte error:(NSError * __autoreleasing *)error +{ + BOOL isPGPHeader = !!(headerByte & PGPHeaderPacketTagAllwaysSet); + if (!isPGPHeader) { + if (error) { + *error = [NSError errorWithDomain:PGPErrorDomain code:0 userInfo:@{NSLocalizedDescriptionKey: @"Invalid sequence of packet header bytes"}]; + } + return NO; + } + + self.isNew = !!(headerByte & PGPHeaderPacketTagNewFormat); + + if (self.isNew) { + // Bits 5-0 -- packet tag + self.packetTag = ((UInt8)(headerByte << 2) >> 2); + } else { + // Bits 5-2 -- packet tag + self.packetTag = ((UInt8)(headerByte << 2) >> 4); + } + + return YES; +} + +@end diff --git a/ObjectivePGP/PGPParser.h b/ObjectivePGP/PGPParser.h new file mode 100644 index 00000000..aa1e877c --- /dev/null +++ b/ObjectivePGP/PGPParser.h @@ -0,0 +1,13 @@ +// +// PGPParser.h +// ObjectivePGP +// +// Created by Marcin Krzyzanowski on 17/01/15. +// Copyright (c) 2015 Marcin Krzyżanowski. All rights reserved. +// + +#import + +@interface PGPParser : NSObject +- (BOOL) readFromStream:(NSInputStream *)inputStream error:(NSError * __autoreleasing *)error; +@end diff --git a/ObjectivePGP/PGPParser.m b/ObjectivePGP/PGPParser.m new file mode 100644 index 00000000..e6b0b6b0 --- /dev/null +++ b/ObjectivePGP/PGPParser.m @@ -0,0 +1,176 @@ +// +// PGPParser.m +// ObjectivePGP +// +// Created by Marcin Krzyzanowski on 17/01/15. +// Copyright (c) 2015 Marcin Krzyżanowski. All rights reserved. +// + +#import "PGPParser.h" +#import "PGPCommon.h" +#import "NSInputStream+PGP.h" +#import "PGPPacketHeader.h" +#import "PGPPublicKeyPacket.h" +#import "PGPUserIDPacket.h" +#import "PGPUser.h" +#import "PGPKey.h" +#import "PGPSubKey.h" +#import "PGPSignature.h" + +@implementation PGPParser + +- (BOOL) readFromStream:(NSInputStream *)inputStream error:(NSError * __autoreleasing *)error +{ + switch (inputStream.streamStatus) { + case NSStreamStatusAtEnd: + case NSStreamStatusError: + case NSStreamStatusWriting: + case NSStreamStatusOpening: + return NO; + break; + case NSStreamStatusClosed: + case NSStreamStatusNotOpen: + [inputStream open]; + default: + break; + } + + // read stream + PGPKey *contextKey = nil; + PGPUser *contextUserID = nil; + + while (inputStream.hasBytesAvailable && inputStream.streamStatus != NSStreamStatusAtEnd) { + id parsedPacket = nil; + // parse packet header + PGPPacketHeader *header = [PGPPacketHeader readFromStream:inputStream error:error]; + NSAssert(error, @"Header expected, but not found!"); + if (!header) { + NSAssert(*error != nil, @"Error expected"); + return NO; + } + + // read packet data + if (header.isPartial == NO) { + switch (header.packetTag) { + case PGPPublicKeyPacketTag: + case PGPPublicSubkeyPacketTag: + { + // - One Public-Key packet + // The Public-Key packet occurs first. + // Each of the following User ID packets provides the identity of the owner of this public key. + PGPPublicKeyPacket *packet = [PGPPublicKeyPacket readFromStream:inputStream maxLength:header.bodyLength error:error]; + NSAssert(packet, @"Missing or invalid packet %@", *error); + if (!packet) { + NSAssert(*error != nil, @"Error expected"); + return NO; + } + + //TODO: flow is not finished! + // re-start key context + contextKey = nil; + contextUserID = nil; + + if (header.packetTag == PGPPublicKeyPacketTag) { + PGPKey *key = [[PGPKey alloc] initWithPacket:packet]; + contextKey = key; + } else if (header.packetTag == PGPPublicSubkeyPacketTag) { + // add subkey + PGPSubKey *subKey = [[PGPSubKey alloc] initWithPacket:packet]; + if (!contextKey.subkeys) { + contextKey.subkeys = [NSArray array]; + } + contextKey.subkeys = [contextKey.subkeys arrayByAddingObject:subKey]; + } + + parsedPacket = packet; + } + break; + case PGPSignaturePacketTag: + { + // - After each User ID packet, zero or more Signature packets (certifications) + // Immediately following each User ID packet, there are zero or more Signature packets. + // Each Signature packet is calculated on the + // immediately preceding User ID packet and the initial Public-Key + // packet. + + // The signature serves to certify the corresponding public key + // and User ID. In effect, the signer is testifying to his or her + // belief that this public key belongs to the user identified by this + // User ID. + + if (contextKey && contextUserID) { + PGPSignaturePacket *packet = [PGPSignaturePacket readFromStream:inputStream error:error]; + NSAssert(packet, @"Missing or invalid packet %@", *error); + if (!packet) { + return NO; + } + PGPSignature *signature = [[PGPSignature alloc] initWithPacket:packet]; + switch (signature.type) { + case PGPSignatureGenericCertificationUserIDandPublicKey: // 0x10 + case PGPSignaturePersonalCertificationUserIDandPublicKey: // 0x11 + case PGPSignatureCasualCertificationUserIDandPublicKey: // 0x12 + case PGPSignaturePositiveCertificationUserIDandPublicKey: // 0x13 + if (!contextUserID) { + continue; + } + + break; + + default: + break; + } + NSLog(@"Signature for UserID %@",contextUserID.userID); + } + } + break; + case PGPUserIDPacketTag: + { + // - One or more User ID packets. One at a time. + PGPUserIDPacket *packet = [PGPUserIDPacket readFromStream:inputStream maxLength:header.bodyLength error:error]; + NSAssert(packet, @"Missing or invalid packet %@", *error); + if (!packet) { + return NO; + } + + PGPUser *user = [[PGPUser alloc] initWithPacket:packet]; + // key context + if (contextKey) { + // Each of the following User ID packets provides the identity of the owner of this public key. + if (!contextKey.users) { + contextKey.users = [NSArray array]; + } + contextKey.users = [contextKey.users arrayByAddingObject:user]; + } + + contextUserID = [[PGPUser alloc] initWithPacket:packet]; + parsedPacket = packet; + } + break; + default: + break; + } + + } else { + //TODO: partial body length + NSAssert(false, @"not supported"); + return NO; + } + + if (parsedPacket) { + #ifdef DEBUG + NSLog(@"%@ Parsed %@", self, parsedPacket); + #endif + } else { + // read unknown packets here + UInt8 *bodyBuffer = calloc(1, header.bodyLength); + [inputStream read:bodyBuffer maxLength:header.bodyLength]; + memset(bodyBuffer, arc4random(), header.bodyLength); + free(bodyBuffer); + } + + } + + return YES; +} + +@end diff --git a/ObjectivePGP/PGPPublicKeyEncryptedSessionKeyPacket.h b/ObjectivePGP/PGPPublicKeyEncryptedSessionKeyPacket.h deleted file mode 100644 index 0a7ba42d..00000000 --- a/ObjectivePGP/PGPPublicKeyEncryptedSessionKeyPacket.h +++ /dev/null @@ -1,22 +0,0 @@ -// -// PGPPublicKeyEncryptedSessionKeyPacket.h -// ObjectivePGP -// -// Created by Marcin Krzyzanowski on 06/06/14. -// Copyright (c) 2014 Marcin Krzyżanowski. All rights reserved. -// - -#import "PGPPacket.h" - -@class PGPKeyID, PGPPublicKeyPacket, PGPSecretKeyPacket; - -@interface PGPPublicKeyEncryptedSessionKeyPacket : PGPPacket -@property (assign) UInt8 version; -@property (strong) PGPKeyID *keyID; -@property (assign) PGPPublicKeyAlgorithm publicKeyAlgorithm; -@property (assign, getter = isEncrypted) BOOL encrypted; - -- (void) encrypt:(PGPPublicKeyPacket *)publicKeyPacket sessionKeyData:(NSData *)sessionKeyData sessionKeyAlgorithm:(PGPSymmetricAlgorithm)sessionKeyAlgorithm error:(NSError * __autoreleasing *)error; -- (NSData *) decryptSessionKeyData:(PGPSecretKeyPacket *)secretKeyPacket sessionKeyAlgorithm:(PGPSymmetricAlgorithm *)sessionKeyAlgorithm error:(NSError * __autoreleasing *)error; - -@end diff --git a/ObjectivePGP/PGPPublicKeyEncryptedSessionKeyPacket.m b/ObjectivePGP/PGPPublicKeyEncryptedSessionKeyPacket.m deleted file mode 100644 index 5b7782e5..00000000 --- a/ObjectivePGP/PGPPublicKeyEncryptedSessionKeyPacket.m +++ /dev/null @@ -1,198 +0,0 @@ -// -// PGPPublicKeyEncryptedSessionKeyPacket.m -// ObjectivePGP -// -// Created by Marcin Krzyzanowski on 06/06/14. -// Copyright (c) 2014 Marcin Krzyżanowski. All rencryptedMPIsPartDataights reserved. -// -// 5.1. Public-Key Encrypted Session Key Packets (Tag 1) - -#import "PGPPublicKeyEncryptedSessionKeyPacket.h" -#import "PGPKeyID.h" -#import "PGPMPI.h" -#import "NSData+PGPUtils.h" -#import "PGPPKCSEme.h" -#import "PGPPublicKeyPacket.h" -#import "PGPSecretKeyPacket.h" -#import "PGPMPI.h" -#import "PGPPublicKeyRSA.h" -#import "PGPFingerprint.h" -#import "PGPCryptoUtils.h" - -@interface PGPPublicKeyEncryptedSessionKeyPacket () -@property (strong) PGPMPI *encryptedMPI_M; -@end - -@implementation PGPPublicKeyEncryptedSessionKeyPacket - -- (instancetype)init -{ - if (self = [super init]) { - _version = 3; - _encrypted = NO; - _publicKeyAlgorithm = PGPPublicKeyAlgorithmRSA; - } - return self; -} - -- (PGPPacketTag)tag -{ - return PGPPublicKeyEncryptedSessionKeyPacketTag; // 1 -} - -- (NSUInteger)parsePacketBody:(NSData *)packetBody error:(NSError *__autoreleasing *)error -{ - NSUInteger position = [super parsePacketBody:packetBody error:error]; - - // - A one-octet number giving the version number of the packet type. The currently defined value for packet version is 3. - [packetBody getBytes:&_version range:(NSRange){position, 1}]; - NSAssert(self.version == 3, @"The currently defined value for packet version is 3"); - position = position + 1; - - // - An eight-octet number that gives the Key ID of the public key - self.keyID = [[PGPKeyID alloc] initWithLongKey:[packetBody subdataWithRange:(NSRange){position, 8}]]; - NSAssert(self.keyID, @"Missing KeyID"); - position = position + 8; - - // - A one-octet number giving the public-key algorithm used. - [packetBody getBytes:&_publicKeyAlgorithm range:(NSRange){position, 1}]; - position = position + 1; - - // - A string of octets that is the encrypted session key. This - // string takes up the remainder of the packet, and its contents are - // dependent on the public-key algorithm used. - // RSA 1 MPI - // Elgamal 2 MPI - - NSData *encryptedMPI_MData = [packetBody subdataWithRange:(NSRange) {position, packetBody.length - position}]; - self.encryptedMPI_M = [[PGPMPI alloc] initWithMPIData:encryptedMPI_MData atPosition:0]; - position = position + encryptedMPI_MData.length; - - self.encrypted = YES; - - return position; -} - -- (NSData *)exportPacket:(NSError *__autoreleasing *)error -{ - NSAssert(self.encryptedMPI_M, @"Missing encrypted mpi m"); - if (!self.encryptedMPI_M) { - return nil; - } - - NSMutableData *bodyData = [NSMutableData data]; - - [bodyData appendBytes:&_version length:1]; //1 - [bodyData appendData:[self.keyID exportKeyData]]; //8 - [bodyData appendBytes:&_publicKeyAlgorithm length:1]; //1 - [bodyData appendData:[self.encryptedMPI_M exportMPI]]; // m - - NSMutableData *data = [NSMutableData data]; - NSData *headerData = [self buildHeaderData:bodyData]; - [data appendData: headerData]; - [data appendData: bodyData]; - - return [data copy]; -} - -- (NSData *) decryptSessionKeyData:(PGPSecretKeyPacket *)secretKeyPacket sessionKeyAlgorithm:(PGPSymmetricAlgorithm *)sessionKeyAlgorithm error:(NSError * __autoreleasing *)error -{ - NSAssert(!secretKeyPacket.isEncryptedWithPassword, @"Secret key can't be encrypted"); - - //FIXME: Key is read from the packet, so it shouldn't be passed as parameter to the method because - // key is unknown earlier - PGPKeyID *secretKeyKeyID = [[PGPKeyID alloc] initWithFingerprint:secretKeyPacket.fingerprint]; - if (![self.keyID isEqualToKeyID:secretKeyKeyID]) { - if (error) { - *error = [NSError errorWithDomain:PGPErrorDomain code:0 userInfo:@{NSLocalizedDescriptionKey: [NSString stringWithFormat:@"Invalid secret key used to decrypt session key, expected %@, got %@",self.keyID, secretKeyKeyID] }]; - } - return nil; - } - - // encrypted m value - NSData *encryptedM = [self.encryptedMPI_M bodyData]; - - // decrypted m value - NSData *mEMEEncoded = [secretKeyPacket decryptData:encryptedM withPublicKeyAlgorithm:self.publicKeyAlgorithm]; - NSData *mData = [PGPPKCSEme decodeMessage:mEMEEncoded error:error]; - if (error && *error) { - return nil; - } - - NSUInteger position = 0; - PGPSymmetricAlgorithm sessionKeyAlgorithmRead; - [mData getBytes:&sessionKeyAlgorithmRead range:(NSRange){position, 1}]; - *sessionKeyAlgorithm = sessionKeyAlgorithmRead; - position = position + 1; - - NSUInteger sessionKeySize = [PGPCryptoUtils keySizeOfSymmetricAlhorithm:sessionKeyAlgorithmRead]; - NSData *sessionKeyData = [mData subdataWithRange:(NSRange){position, sessionKeySize}]; - position = position + sessionKeySize; - - UInt16 checksum = 0; - [mData getBytes:&checksum range:(NSRange){position,2}]; - checksum = CFSwapInt16BigToHost(checksum); - - // validate checksum - UInt16 calculatedChecksum = [sessionKeyData pgp_Checksum]; - if (calculatedChecksum != checksum) { - if (error) { - *error = [NSError errorWithDomain:PGPErrorDomain code:0 userInfo:@{NSLocalizedDescriptionKey: @"Invalid session key, checksum mismatch"}]; - } - return nil; - } - - return sessionKeyData; -} - -// encryption update self.encryptedMPIsPartData -- (void) encrypt:(PGPPublicKeyPacket *)publicKeyPacket sessionKeyData:(NSData *)sessionKeyData sessionKeyAlgorithm:(PGPSymmetricAlgorithm)sessionKeyAlgorithm error:(NSError * __autoreleasing *)error -{ - NSMutableData *mData = [NSMutableData data]; - - // The value "m" in the above formulas is derived from the session key - // as follows. First, the session key is prefixed with a one-octet - // algorithm identifier that specifies the symmetric encryption - // algorithm used to encrypt the following Symmetrically Encrypted Data - // Packet. Then a two-octet checksum is appended, which is equal to the - // sum of the preceding session key octets, not including the algorithm - // identifier, modulo 65536. This value is then encoded as described in - // PKCS#1 block encoding EME-PKCS1-v1_5 in Section 7.2.1 of [RFC3447] to - // form the "m" value used in the formulas above. See Section 13.1 of - // this document for notes on OpenPGP's use of PKCS#1. - - [mData appendBytes:&sessionKeyAlgorithm length:1]; - - [mData appendData:sessionKeyData]; // keySize - - UInt16 checksum = [sessionKeyData pgp_Checksum]; - checksum = CFSwapInt16HostToBig(checksum); - [mData appendBytes:&checksum length:2]; - - PGPMPI *modulusMPI = [publicKeyPacket publicMPI:@"N"]; - if (!modulusMPI) - return; - - BIGNUM *nBigNumRef = modulusMPI.bignumRef; - unsigned int k = (unsigned)BN_num_bytes(nBigNumRef); - - NSData *mEMEEncoded = [PGPPKCSEme encodeMessage:mData keyModulusLength:k error:error]; - NSData *encryptedData = [publicKeyPacket encryptData:mEMEEncoded withPublicKeyAlgorithm:self.publicKeyAlgorithm]; - PGPMPI *mpiEncoded = [[PGPMPI alloc] initWithData:encryptedData]; - self.encryptedMPI_M = mpiEncoded; -} - - -#pragma mark - NSCopying - -- (instancetype)copyWithZone:(NSZone *)zone -{ - PGPPublicKeyEncryptedSessionKeyPacket *copy = [super copyWithZone:zone]; - copy->_version = self.version; - copy->_keyID = self.keyID; - copy->_publicKeyAlgorithm = self.publicKeyAlgorithm; - copy->_encryptedMPI_M = self.encryptedMPI_M; - return copy; -} - -@end diff --git a/ObjectivePGP/PGPPublicKeyPacket.h b/ObjectivePGP/PGPPublicKeyPacket.h deleted file mode 100644 index 14079872..00000000 --- a/ObjectivePGP/PGPPublicKeyPacket.h +++ /dev/null @@ -1,39 +0,0 @@ -// -// OpenPGPPublicKey.h -// ObjectivePGP -// -// Created by Marcin Krzyzanowski on 04/05/14. -// Copyright (c) 2014 Marcin Krzyżanowski. All rights reserved. -// -// Tag 6 - -#import -#import "PGPTypes.h" -#import "PGPPacketFactory.h" -#import "PGPKeyID.h" -#import "PGPFingerprint.h" - -@class PGPMPI; - -@interface PGPPublicKeyPacket : PGPPacket - -@property (assign, readonly) UInt8 version; -@property (strong, readonly) NSDate* createDate; -@property (assign, readonly) UInt16 V3validityPeriod; // obsolete -@property (assign, readonly) PGPPublicKeyAlgorithm publicKeyAlgorithm; -@property (strong, readwrite) NSArray* publicMPIArray; - -@property (assign, readonly) NSUInteger keySize; - -@property (strong, nonatomic, readonly) PGPFingerprint* fingerprint; -@property (strong, nonatomic, readonly) PGPKeyID* keyID; - -- (NSData*)exportPacket:(NSError* __autoreleasing*)error; -- (NSData*)exportPublicPacketOldStyle; - -- (NSData*)buildPublicKeyBodyData:(BOOL)forceV4; - -- (PGPMPI*)publicMPI:(NSString*)identifier; -- (NSData*)encryptData:(NSData*)data withPublicKeyAlgorithm:(PGPPublicKeyAlgorithm)publicKeyAlgorithm; - -@end diff --git a/ObjectivePGP/PGPPublicKeyPacket.m b/ObjectivePGP/PGPPublicKeyPacket.m deleted file mode 100644 index cbc6929d..00000000 --- a/ObjectivePGP/PGPPublicKeyPacket.m +++ /dev/null @@ -1,324 +0,0 @@ -// -// OpenPGPPublicKey.m -// ObjectivePGP -// -// Created by Marcin Krzyzanowski on 04/05/14. -// Copyright (c) 2014 Marcin Krzyżanowski. All rights reserved. -// - -#import "PGPPublicKeyPacket.h" -#import "PGPTypes.h" -#import "PGPMPI.h" -#import "NSData+PGPUtils.h" -#import "PGPPublicKeyRSA.h" - -#import -#import -#import - -#import - -@interface PGPPacket () -@property (copy, readwrite) NSData *headerData; -@property (copy, readwrite) NSData *bodyData; -@end - -@interface PGPPublicKeyPacket () -@property (strong, nonatomic, readwrite) PGPFingerprint *fingerprint; -@property (strong, nonatomic, readwrite) PGPKeyID *keyID; -@property (assign, readwrite) UInt16 V3validityPeriod; -@end - -@implementation PGPPublicKeyPacket - -- (PGPPacketTag)tag -{ - return PGPPublicKeyPacketTag; -} - -- (NSString *)description -{ - return [NSString stringWithFormat:@"%@ %@", [super description], self.keyID]; -} - -- (NSUInteger) keySize -{ - __block NSUInteger ks = 0; - [self.publicMPIArray enumerateObjectsUsingBlock:^(id obj, NSUInteger idx, BOOL *stop) { - PGPMPI *mpi = obj; - if ([mpi.identifier isEqualToString:@"N"]) { - ks = (BN_num_bits(mpi.bignumRef) + 7) / 8; - // BN_num_bytes(rsa->n) - *stop = YES; - } - }]; - return ks; -} - -- (PGPMPI *) publicMPI:(NSString *)identifier -{ - __block PGPMPI *returnMPI = nil; - [self.publicMPIArray enumerateObjectsUsingBlock:^(id obj, NSUInteger idx, BOOL *stop) { - PGPMPI *mpi = obj; - if ([mpi.identifier isEqualToString:identifier]) { - returnMPI = mpi; - *stop = YES; - } - }]; - - return returnMPI; -} - -#pragma mark - KeyID and Fingerprint - -/** - * 12.2. Key IDs and Fingerprints - * - * @return keyID - */ -- (PGPKeyID *)keyID -{ - if (!_keyID) { - _keyID = [[PGPKeyID alloc] initWithFingerprint:self.fingerprint]; - } - - return _keyID; -} - -/** - * 12.2. Key IDs and Fingerprints - * Calculate fingerprint - * - * @return Fingerprint data - */ -- (PGPFingerprint *)fingerprint -{ - if (!_fingerprint) { - _fingerprint = [[PGPFingerprint alloc] initWithData:[self exportPublicPacketOldStyle]]; - } - return _fingerprint; -} - -#pragma mark - Parse data - -/** - * 5.5.2. Public-Key Packet Formats - * - * @param packetBody Packet body - */ -- (NSUInteger) parsePacketBody:(NSData *)packetBody error:(NSError *__autoreleasing *)error -{ - NSUInteger position = [super parsePacketBody:packetBody error:error]; - - // A one-octet version number (2,3,4). - [packetBody getBytes:&_version range:(NSRange){position,1}]; - position = position + 1; - - NSAssert(self.version >= 3, @"To old packet version"); - - // A four-octet number denoting the time that the key was created. - UInt32 timestamp = 0; - [packetBody getBytes:×tamp range:(NSRange){position,4}]; - timestamp = CFSwapInt32BigToHost(timestamp); - _createDate = [NSDate dateWithTimeIntervalSince1970:timestamp]; - position = position + 4; - - //V3 keys are deprecated; an implementation MUST NOT generate a V3 key, but MAY accept it. - if (_version == 0x03) { - // A two-octet number denoting the time in days that this key is - // valid. If this number is zero, then it does not expire. - [packetBody getBytes:&_V3validityPeriod range:(NSRange){position,2}]; - _V3validityPeriod = CFSwapInt16BigToHost(_V3validityPeriod); - position = position + 2; - } - - // A one-octet number denoting the public-key algorithm of this key. - [packetBody getBytes:&_publicKeyAlgorithm range:(NSRange){position,1}]; - position = position + 1; - - // A series of multiprecision integers comprising the key material. - switch (self.publicKeyAlgorithm) { - case PGPPublicKeyAlgorithmRSA: - case PGPPublicKeyAlgorithmRSAEncryptOnly: - case PGPPublicKeyAlgorithmRSASignOnly: - { - // Algorithm-Specific Fields for RSA public keys: - // MPI of RSA public modulus n; - PGPMPI *mpiN = [[PGPMPI alloc] initWithMPIData:packetBody atPosition:position]; - mpiN.identifier = @"N"; - position = position + mpiN.packetLength; - - // MPI of RSA public encryption exponent e. - PGPMPI *mpiE = [[PGPMPI alloc] initWithMPIData:packetBody atPosition:position]; - mpiE.identifier = @"E"; - position = position + mpiE.packetLength; - - self.publicMPIArray = @[mpiN, mpiE]; - } - break; - case PGPPublicKeyAlgorithmDSA: - case PGPPublicKeyAlgorithmECDSA: - { - // - MPI of DSA prime p; - PGPMPI *mpiP = [[PGPMPI alloc] initWithMPIData:packetBody atPosition:position]; - mpiP.identifier = @"P"; - position = position + mpiP.packetLength; - - // - MPI of DSA group order q (q is a prime divisor of p-1); - PGPMPI *mpiQ = [[PGPMPI alloc] initWithMPIData:packetBody atPosition:position]; - mpiQ.identifier = @"Q"; - position = position + mpiQ.packetLength; - - // - MPI of DSA group generator g; - PGPMPI *mpiG = [[PGPMPI alloc] initWithMPIData:packetBody atPosition:position]; - mpiG.identifier = @"G"; - position = position + mpiG.packetLength; - - // - MPI of DSA public-key value y (= g**x mod p where x is secret). - PGPMPI *mpiY = [[PGPMPI alloc] initWithMPIData:packetBody atPosition:position]; - mpiY.identifier = @"Y"; - position = position + mpiY.packetLength; - - self.publicMPIArray = @[mpiP, mpiQ, mpiG, mpiY]; - } - break; - case PGPPublicKeyAlgorithmElgamal: - case PGPPublicKeyAlgorithmElgamalEncryptorSign: - { - // - MPI of Elgamal prime p; - PGPMPI *mpiP = [[PGPMPI alloc] initWithMPIData:packetBody atPosition:position]; - mpiP.identifier = @"P"; - position = position + mpiP.packetLength; - - // - MPI of Elgamal group generator g; - PGPMPI *mpiG = [[PGPMPI alloc] initWithMPIData:packetBody atPosition:position]; - mpiG.identifier = @"G"; - position = position + mpiG.packetLength; - - // - MPI of Elgamal public key value y (= g**x mod p where x is secret). - PGPMPI *mpiY = [[PGPMPI alloc] initWithMPIData:packetBody atPosition:position]; - mpiY.identifier = @"Y"; - position = position + mpiY.packetLength; - - self.publicMPIArray = @[mpiP, mpiG, mpiY]; - } - break; - default: - @throw [NSException exceptionWithName:@"Unknown Algorithm" reason:@"Given algorithm is not supported" userInfo:nil]; - break; - } - - return position; -} - -#pragma mark - Export data - -/** - * Packet data. Header with body data. - * - * @param error error - * - * @return data - */ -- (NSData *) exportPacket:(NSError *__autoreleasing *)error -{ - NSMutableData *data = [NSMutableData data]; - - NSData *bodyData = [self buildPublicKeyBodyData:NO]; - NSData *headerData = [self buildHeaderData:bodyData]; - [data appendData: headerData]; - [data appendData: bodyData]; - - // it wont match, because input data is OLD world, and we export in NEW world format - // NSAssert([headerData isEqualToData:self.headerData], @"Header not match"); - if ([self class] == [PGPPublicKeyPacket class]) { - NSAssert([bodyData isEqualToData:self.bodyData], @"Body not match"); - } - - return [data copy]; -} - -/** - * Build new style public key data - * - * @return public key data starting with version octet - */ -- (NSData *) buildPublicKeyBodyData:(BOOL)forceV4 -{ - NSMutableData *data = [NSMutableData dataWithCapacity:128]; - [data appendBytes:&_version length:1]; - - UInt32 timestamp = [self.createDate timeIntervalSince1970]; - UInt32 timestampBE = CFSwapInt32HostToBig(timestamp); - [data appendBytes:×tampBE length:4]; - - if (!forceV4 && _version == 0x03) { - // implementation MUST NOT generate a V3 key, but MAY accept it. - // however it have to be generated here to calculate the very same fingerprint - UInt16 V3ValidityPeriodBE = CFSwapInt16HostToBig(_V3validityPeriod); - [data appendBytes:&V3ValidityPeriodBE length:2]; - } - - [data appendBytes:&_publicKeyAlgorithm length:1]; - - // publicMPI is allways available, no need to decrypt - for (PGPMPI *mpi in self.publicMPIArray) { - [data appendData:[mpi exportMPI]]; - } - return [data copy]; -} - -// Old-style packet header for a key packet with two-octet length. -// Old but used by fingerprint and with signing -- (NSData *) exportPublicPacketOldStyle -{ - NSMutableData *data = [NSMutableData data]; - - NSData *publicKeyData = [self buildPublicKeyBodyData:NO]; - - NSUInteger length = publicKeyData.length; - UInt8 upper = length >> 8; - UInt8 lower = length & 0xff; - UInt8 headWithLength[3] = {0x99, upper, lower}; - [data appendBytes:&headWithLength length:3]; - [data appendData:publicKeyData]; - return [data copy]; -} - -#pragma mark - Encrypt & Decrypt - -- (NSData *) encryptData:(NSData *)data withPublicKeyAlgorithm:(PGPPublicKeyAlgorithm)publicKeyAlgorithm -{ - switch (publicKeyAlgorithm) { - case PGPPublicKeyAlgorithmRSA: - case PGPPublicKeyAlgorithmRSAEncryptOnly: - case PGPPublicKeyAlgorithmRSASignOnly: - { - // return ecnrypted m - return [PGPPublicKeyRSA publicEncrypt:data withPublicKeyPacket:self]; - } - break; - default: - //TODO: add algorithms - [NSException raise:@"PGPNotSupported" format:@"Algorith not supported"]; - break; - } - return nil; -} - -#pragma mark - NSCopying - -- (id)copyWithZone:(NSZone *)zone -{ - PGPPublicKeyPacket *copy = (PGPPublicKeyPacket *)[super copyWithZone:zone]; - copy->_version = self.version; - copy->_createDate = self.createDate; - copy->_V3validityPeriod = self.V3validityPeriod; - copy->_publicKeyAlgorithm = self.publicKeyAlgorithm; - copy->_fingerprint = self.fingerprint; - copy->_keyID = self.keyID; - copy->_publicMPIArray = self.publicMPIArray; - return copy; -} - -@end diff --git a/ObjectivePGP/PGPPublicKeyRSA.h b/ObjectivePGP/PGPPublicKeyRSA.h deleted file mode 100644 index f2f13c6b..00000000 --- a/ObjectivePGP/PGPPublicKeyRSA.h +++ /dev/null @@ -1,24 +0,0 @@ -// -// PGPPublicKeyAlgorithmRSA.h -// ObjectivePGP -// -// Created by Marcin Krzyzanowski on 26/05/14. -// Copyright (c) 2014 Marcin Krzyżanowski. All rights reserved. -// - -#import - -@class PGPSecretKeyPacket, PGPPublicKeyPacket; - -@interface PGPPublicKeyRSA : NSObject - -// encryption -+ (NSData *) publicEncrypt:(NSData *)toEncrypt withPublicKeyPacket:(PGPPublicKeyPacket *)publicKeyPacket; -+ (NSData *) privateDecrypt:(NSData *)toDecrypt withSecretKeyPacket:(PGPSecretKeyPacket *)secretKeyPacket; - - -// signature -+ (NSData *) publicDecrypt:(NSData *)toDecrypt withPublicKeyPacket:(PGPPublicKeyPacket *)publicKeyPacket; -+ (NSData *) privateEncrypt:(NSData *)toEncrypt withSecretKeyPacket:(PGPSecretKeyPacket *)secretKeyPacket; - -@end diff --git a/ObjectivePGP/PGPPublicKeyRSA.m b/ObjectivePGP/PGPPublicKeyRSA.m deleted file mode 100644 index 6fb4a382..00000000 --- a/ObjectivePGP/PGPPublicKeyRSA.m +++ /dev/null @@ -1,248 +0,0 @@ -// -// PGPPublicKeyAlgorithmRSA.m -// ObjectivePGP -// -// Created by Marcin Krzyzanowski on 26/05/14. -// Copyright (c) 2014 Marcin Krzyżanowski. All rights reserved. -// - -#import "PGPPublicKeyRSA.h" -#import "PGPPublicKeyPacket.h" -#import "PGPSecretKeyPacket.h" -#import "PGPKey.h" -#import "PGPMPI.h" -#import "PGPPKCSEmsa.h" - -#import -#import - -#import -#import - -@implementation PGPPublicKeyRSA - -// encrypts the bytes -+ (NSData *) publicEncrypt:(NSData *)toEncrypt withPublicKeyPacket:(PGPPublicKeyPacket *)publicKeyPacket -{ - RSA *rsa = RSA_new(); - if (!rsa) { - return nil; - } - - rsa->n = BN_dup([[publicKeyPacket publicMPI:@"N"] bignumRef]); - rsa->e = BN_dup([[publicKeyPacket publicMPI:@"E"] bignumRef]); - - NSAssert(rsa->n && rsa->e, @"Missing N or E"); - if (!rsa->n || !rsa->e) { - return nil; - } - - uint8_t *encrypted_em = calloc((size_t)BN_num_bytes(rsa->n), sizeof(UInt8)); - int em_len = RSA_public_encrypt((int)toEncrypt.length, toEncrypt.bytes, encrypted_em, rsa, RSA_NO_PADDING); - - if (em_len != publicKeyPacket.keySize) { - ERR_load_crypto_strings(); - SSL_load_error_strings(); - - unsigned long err_code = ERR_get_error(); - char *errBuf = calloc(512, sizeof(UInt8)); - ERR_error_string(err_code, errBuf); -#ifdef DEBUG - NSLog(@"%@",[NSString stringWithCString:errBuf encoding:NSASCIIStringEncoding]); -#endif - free(errBuf); - - free(encrypted_em); - RSA_free(rsa); - return nil; - } - - // decrypted encoded EME - NSData *encryptedEm = [NSData dataWithBytes:encrypted_em length:em_len]; - - RSA_free(rsa); - rsa->n = rsa->e = NULL; - free(encrypted_em); - - return encryptedEm; -} - -// decrypt bytes -+ (NSData *) privateDecrypt:(NSData *)toDecrypt withSecretKeyPacket:(PGPSecretKeyPacket *)secretKeyPacket -{ - RSA *rsa = RSA_new(); - if (!rsa) { - return nil; - } - - rsa->n = BN_dup([[secretKeyPacket publicMPI:@"N"] bignumRef]); - rsa->e = BN_dup([[secretKeyPacket publicMPI:@"E"] bignumRef]); - - rsa->d = BN_dup([[secretKeyPacket secretMPI:@"D"] bignumRef]); - rsa->p = BN_dup([[secretKeyPacket secretMPI:@"Q"] bignumRef]); /* p and q are round the other way in openssl */ - rsa->q = BN_dup([[secretKeyPacket secretMPI:@"P"] bignumRef]); - - if (rsa->d == NULL) { - return nil; - } - - if (RSA_check_key(rsa) != 1) { - ERR_load_crypto_strings(); - SSL_load_error_strings(); - - unsigned long err_code = ERR_get_error(); - char *errBuf = calloc(512, sizeof(UInt8)); - ERR_error_string(err_code, errBuf); -#ifdef DEBUG - NSLog(@"%@",[NSString stringWithCString:errBuf encoding:NSASCIIStringEncoding]); -#endif - free(errBuf); - - ERR_free_strings(); - return nil; - } - - UInt8 *outbuf = calloc(RSA_size(rsa), sizeof(UInt8)); - int t = RSA_private_decrypt((int)secretKeyPacket.keySize, toDecrypt.bytes, outbuf, rsa, RSA_NO_PADDING); - if (t < 0) { - ERR_load_crypto_strings(); - SSL_load_error_strings(); - - unsigned long err_code = ERR_get_error(); - char *errBuf = calloc(512, sizeof(char)); - ERR_error_string(err_code, errBuf); -#ifdef DEBUG - NSLog(@"%@",[NSString stringWithCString:errBuf encoding:NSASCIIStringEncoding]); -#endif - free(errBuf); - - ERR_free_strings(); - free(outbuf); - return nil; - } - - NSData *decryptedData = [NSData dataWithBytes:outbuf length:t]; - NSAssert(decryptedData, @"Missing data"); - - - free(outbuf); - RSA_free(rsa); - rsa->n = rsa->d = rsa->p = rsa->q = rsa->e = NULL; - - return decryptedData; -} - -// sign -+ (NSData *) privateEncrypt:(NSData *)toEncrypt withSecretKeyPacket:(PGPSecretKeyPacket *)secretKeyPacket -{ - RSA *rsa = RSA_new(); - if (!rsa) { - return nil; - } - - rsa->n = BN_dup([[secretKeyPacket publicMPI:@"N"] bignumRef]); - rsa->d = BN_dup([[secretKeyPacket secretMPI:@"D"] bignumRef]); - rsa->p = BN_dup([[secretKeyPacket secretMPI:@"Q"] bignumRef]); /* p and q are round the other way in openssl */ - rsa->q = BN_dup([[secretKeyPacket secretMPI:@"P"] bignumRef]); - rsa->e = BN_dup([[secretKeyPacket publicMPI:@"E"] bignumRef]); - - if (toEncrypt.length > secretKeyPacket.keySize) { - return nil; - } - - - /* If this isn't set, it's very likely that the programmer hasn't */ - /* decrypted the secret key. RSA_check_key segfaults in that case. */ - if (rsa->d == NULL) { - return nil; - } - - if (RSA_check_key(rsa) != 1) { - ERR_load_crypto_strings(); - SSL_load_error_strings(); - - unsigned long err_code = ERR_get_error(); - char *errBuf = calloc(512, sizeof(UInt8)); - ERR_error_string(err_code, errBuf); - NSLog(@"%@",[NSString stringWithCString:errBuf encoding:NSASCIIStringEncoding]); - free(errBuf); - - ERR_free_strings(); - return nil; - } - - - UInt8 *outbuf = calloc(RSA_size(rsa), sizeof(UInt8)); - int t = RSA_private_encrypt((int)secretKeyPacket.keySize, (UInt8 *)toEncrypt.bytes, outbuf, rsa, RSA_NO_PADDING); - if (t < 0) { - ERR_load_crypto_strings(); - SSL_load_error_strings(); - - unsigned long err_code = ERR_get_error(); - char *errBuf = calloc(512, sizeof(UInt8)); - ERR_error_string(err_code, errBuf); - NSLog(@"%@",[NSString stringWithCString:errBuf encoding:NSASCIIStringEncoding]); - free(errBuf); - - ERR_free_strings(); - free(outbuf); - return nil; - } - - NSData *encryptedData = [NSData dataWithBytes:outbuf length:t]; - NSAssert(encryptedData, @"Missing calculated data"); - - - free(outbuf); - RSA_free(rsa); - rsa->n = rsa->d = rsa->p = rsa->q = rsa->e = NULL; - - return encryptedData; -} - -// recovers the message digest -+ (NSData *) publicDecrypt:(NSData *)toDecrypt withPublicKeyPacket:(PGPPublicKeyPacket *)publicKeyPacket -{ - RSA *rsa = RSA_new(); - if (!rsa) { - return nil; - } - - rsa->n = BN_dup([[publicKeyPacket publicMPI:@"N"] bignumRef]); - rsa->e = BN_dup([[publicKeyPacket publicMPI:@"E"] bignumRef]); - - NSAssert(rsa->n && rsa->e, @"Missing N or E"); - if (!rsa->n || !rsa->e) { - return nil; - } - - UInt8 *decrypted_em = calloc(RSA_size(rsa) - 11, sizeof(UInt8)); - int em_len = RSA_public_decrypt((int)toDecrypt.length, toDecrypt.bytes, decrypted_em, rsa, RSA_NO_PADDING); - - if (em_len != publicKeyPacket.keySize) { - free(decrypted_em); - RSA_free(rsa); - - ERR_load_crypto_strings(); - SSL_load_error_strings(); - - unsigned long err_code = ERR_get_error(); - char *errBuf = calloc(512, sizeof(UInt8)); - ERR_error_string(err_code, errBuf); - NSLog(@"%@",[NSString stringWithCString:errBuf encoding:NSASCIIStringEncoding]); - free(errBuf); - - return nil; - } - - // decrypted PKCS emsa - NSData *decryptedEm = [NSData dataWithBytes:decrypted_em length:em_len]; - - RSA_free(rsa); - rsa->n = rsa->e = NULL; - free(decrypted_em); - - return decryptedEm; -} - -@end diff --git a/ObjectivePGP/PGPPublicSubKeyPacket.h b/ObjectivePGP/PGPPublicSubKeyPacket.h deleted file mode 100644 index 54e487e5..00000000 --- a/ObjectivePGP/PGPPublicSubKeyPacket.h +++ /dev/null @@ -1,16 +0,0 @@ -// -// PGPPublicSubKey.h -// ObjectivePGP -// -// Created by Marcin Krzyzanowski on 04/05/14. -// Copyright (c) 2014 Marcin Krzyżanowski. All rights reserved. -// -// Tag 14 - -#import -#import "PGPPublicKeyPacket.h" -#import "PGPPacketFactory.h" - -@interface PGPPublicSubKeyPacket : PGPPublicKeyPacket - -@end diff --git a/ObjectivePGP/PGPPublicSubKeyPacket.m b/ObjectivePGP/PGPPublicSubKeyPacket.m deleted file mode 100644 index 6fa8b727..00000000 --- a/ObjectivePGP/PGPPublicSubKeyPacket.m +++ /dev/null @@ -1,18 +0,0 @@ -// -// PGPPublicSubKey.m -// ObjectivePGP -// -// Created by Marcin Krzyzanowski on 04/05/14. -// Copyright (c) 2014 Marcin Krzyżanowski. All rights reserved. -// - -#import "PGPPublicSubKeyPacket.h" - -@implementation PGPPublicSubKeyPacket - -- (PGPPacketTag)tag -{ - return PGPPublicSubkeyPacketTag; -} - -@end diff --git a/ObjectivePGP/PGPS2K.h b/ObjectivePGP/PGPS2K.h deleted file mode 100644 index 8c98e76c..00000000 --- a/ObjectivePGP/PGPS2K.h +++ /dev/null @@ -1,28 +0,0 @@ -// -// PGPS2K.h -// ObjectivePGP -// -// Created by Marcin Krzyzanowski on 07/05/14. -// Copyright (c) 2014 Marcin Krzyżanowski. All rights reserved. -// - -#import -#import "PGPTypes.h" - -@interface PGPS2K : NSObject - -@property (assign) PGPS2KSpecifier specifier; -@property (assign) PGPHashAlgorithm hashAlgorithm; -@property (retain, nonatomic) NSData *salt; // 8 bytes -@property (assign) UInt32 uncodedCount; -@property (assign, readonly) UInt32 codedCount; - -@property (assign) NSUInteger length; - -+ (PGPS2K *) string2KeyFromData:(NSData *)data atPosition:(NSUInteger)position; -- (NSUInteger) parseS2K:(NSData *)data atPosition:(NSUInteger)position; - -- (NSData *) produceSessionKeyWithPassphrase:(NSString *)passphrase keySize:(NSUInteger)keySize; -- (NSData *) export:(NSError *__autoreleasing*)error; - -@end diff --git a/ObjectivePGP/PGPS2K.m b/ObjectivePGP/PGPS2K.m deleted file mode 100644 index a19e770e..00000000 --- a/ObjectivePGP/PGPS2K.m +++ /dev/null @@ -1,182 +0,0 @@ -// -// PGPS2K.m -// ObjectivePGP -// -// Created by Marcin Krzyzanowski on 07/05/14. -// Copyright (c) 2014 Marcin Krzyżanowski. All rights reserved. -// -// A string to key (S2K) specifier encodes a mechanism for producing a key to be used with a symmetric block cipher from a string of octets. -// - -#import "PGPS2K.h" -#import -#import - -#import "PGPCryptoUtils.h" -#import "NSData+PGPUtils.h" - -static const unsigned int PGP_SALT_SIZE = 8; - -@implementation PGPS2K - -+ (PGPS2K *) string2KeyFromData:(NSData *)data atPosition:(NSUInteger)position -{ - PGPS2K *s2k = [[PGPS2K alloc] init]; - NSUInteger positionAfter = [s2k parseS2K:data atPosition:position]; - s2k.length = (positionAfter - position); - return s2k; -} - -- (NSData *)salt -{ - if (!_salt) { - NSMutableData *s = [NSMutableData data]; - for (int i = 0; i < 8; i++) { - Byte b = arc4random_uniform(255); - [s appendBytes:&b length:sizeof(b)]; - } - _salt = [s copy]; - } - return _salt; -} - -- (NSUInteger) parseS2K:(NSData *)data atPosition:(NSUInteger)startingPosition -{ - // S2K - - // string-to-key specifier is being given - NSUInteger position = startingPosition; - [data getBytes:&_specifier range:(NSRange) {position, 1}]; - position = position + 1; - - NSAssert(_specifier == PGPS2KSpecifierIteratedAndSalted || _specifier == PGPS2KSpecifierSalted || _specifier == PGPS2KSpecifierSimple, @"Bad s2k specifier"); - - // this is not documented, but now I need to read S2K key specified by s2kSpecifier - // 3.7.1.1. Simple S2K - - // Octet 1: hash algorithm - [data getBytes:&_hashAlgorithm range:(NSRange) {position,1}]; - position = position + 1; - - // Octets 2-9: 8-octet salt value - if (_specifier != PGPS2KSpecifierSimple) { - // read salt 8 bytes - _salt = [data subdataWithRange:(NSRange) {position, PGP_SALT_SIZE}]; - position = position + _salt.length; - } - - // Octet 10: count, a one-octet, coded value - if (_specifier == PGPS2KSpecifierIteratedAndSalted) { - [data getBytes:&_uncodedCount range:(NSRange) {position, 1}]; - position = position + 1; - } - - return position; -} - -- (UInt32) codedCount -{ - UInt32 expbias = 6; - return ((UInt32)16 + (_uncodedCount & 15)) << ((_uncodedCount >> 4) + expbias); -} - -- (NSData *) export:(NSError *__autoreleasing*)error -{ - NSMutableData *data = [NSMutableData data]; - [data appendBytes:&_specifier length:1]; - [data appendBytes:&_hashAlgorithm length:1]; - - if (_specifier != PGPS2KSpecifierSimple) { - [data appendData:self.salt]; - } - - if (_specifier == PGPS2KSpecifierIteratedAndSalted) { - NSAssert(self.uncodedCount == 0, @"Count value is 0"); - [data appendBytes:&_uncodedCount length:1]; - } - - return [data copy]; -} - - -/** - * Calculate key for given password - * An S2K specifier can be stored in the secret keyring to specify how - * to convert the passphrase to a key that unlocks the secret data. - * Simple S2K hashes the passphrase to produce the session key. - * - * @param passphrase Password - * @param keySize Packet key size - * - * @return NSData with key - */ -- (NSData *) produceSessionKeyWithPassphrase:(NSString *)passphrase keySize:(NSUInteger)keySize -{ - NSMutableData *result = [NSMutableData data]; - NSMutableData *toHashData = [NSMutableData data]; - NSData *passphraseData = [passphrase dataUsingEncoding:NSUTF8StringEncoding]; - NSUInteger hashSize = [PGPCryptoUtils hashSizeOfHashAlhorithm:self.hashAlgorithm]; // SHA hash size - - switch (self.specifier) { - case PGPS2KSpecifierSimple: - { - // passphrase - [toHashData appendData:passphraseData]; - } - break; - case PGPS2KSpecifierSalted: - { - // salt + passphrase - // This includes a "salt" value in the S2K specifier -- some arbitrary - // data -- that gets hashed along with the passphrase string, to help - // prevent dictionary attacks. - - [toHashData appendData:self.salt]; - [toHashData appendData:passphraseData]; - } - break; - case PGPS2KSpecifierIteratedAndSalted: - { - // iterated (salt + passphrase) - @autoreleasepool { - // memory overhead with subdataWithRange is significant, this is why it's not used here - for (NSUInteger n = 0; n * hashSize < keySize; ++n) - { - for (NSUInteger i = 0; i < self.codedCount; i += self.salt.length + passphraseData.length) - { - NSUInteger j = self.salt.length + passphraseData.length; - if (i + j > self.codedCount && i != 0) { - j = self.codedCount - i; - } - - // add salt - NSUInteger saltlen = j > self.salt.length ? self.salt.length : j; - UInt8 *saltbytes = calloc(saltlen, sizeof(UInt8)); - [self.salt getBytes:saltbytes range:(NSRange){0,saltlen}]; - [toHashData appendBytes:saltbytes length:saltlen]; - free(saltbytes); - // add passphrase - if (j > self.salt.length) { - NSUInteger passlen = j - self.salt.length; - UInt8 *passbytes = calloc(passlen, sizeof(UInt8)); - [passphraseData getBytes:passbytes range:(NSRange){0,passlen}]; - [toHashData appendBytes:passbytes length:passlen]; - free(passbytes); - } - } - } - } - } - break; - default: - break; - } - - NSData *hash = [toHashData pgp_HashedWithAlgorithm:self.hashAlgorithm]; - [result appendData:hash]; - - return [result copy]; -} - - -@end diff --git a/ObjectivePGP/PGPSecretKeyPacket.h b/ObjectivePGP/PGPSecretKeyPacket.h deleted file mode 100644 index c8fe07b9..00000000 --- a/ObjectivePGP/PGPSecretKeyPacket.h +++ /dev/null @@ -1,33 +0,0 @@ -// -// PGPSecretKeyPacket.h -// ObjectivePGP -// -// Created by Marcin Krzyzanowski on 07/05/14. -// Copyright (c) 2014 Marcin Krzyżanowski. All rights reserved. -// - -#import "PGPPublicKeyPacket.h" -#import "PGPS2K.h" - -@interface PGPSecretKeyPacket : PGPPublicKeyPacket - -@property (assign, readonly, nonatomic) BOOL isEncryptedWithPassword; -@property (assign) PGPS2KUsage s2kUsage; -@property (strong) PGPS2K *s2k; -@property (assign) PGPSymmetricAlgorithm symmetricAlgorithm; -@property (strong, readonly) NSData *ivData; - -/** - * Decrypt packet - * - * @param passphrase Password - * @param error error - * - * @return Decrypted key on success - */ -- (PGPSecretKeyPacket *) decryptedKeyPacket:(NSString *)passphrase error:(NSError * __autoreleasing *)error; - -- (PGPMPI *) secretMPI:(NSString *)identifier; -- (NSData *) decryptData:(NSData *)data withPublicKeyAlgorithm:(PGPPublicKeyAlgorithm)publicKeyAlgorithm; - -@end diff --git a/ObjectivePGP/PGPSecretKeyPacket.m b/ObjectivePGP/PGPSecretKeyPacket.m deleted file mode 100644 index 541c259e..00000000 --- a/ObjectivePGP/PGPSecretKeyPacket.m +++ /dev/null @@ -1,438 +0,0 @@ -// -// PGPSecretKeyPacket.m -// ObjectivePGP -// -// Created by Marcin Krzyzanowski on 07/05/14. -// Copyright (c) 2014 Marcin Krzyżanowski. All rights reserved. -// -// A Secret-Key packet contains all the information that is found in a -// Public-Key packet, including the public-key material, but also -// includes the secret-key material after all the public-key fields. - -#import "PGPSecretKeyPacket.h" -#import "PGPS2K.h" -#import "PGPMPI.h" -#import "PGPTypes.h" - -#import "PGPCryptoUtils.h" -#import "NSData+PGPUtils.h" -#import "PGPCryptoCFB.h" -#import "PGPPublicKeyRSA.h" - -#import -#import -#import - -#include -#include -#include -#include -#include -#include -#include - -@interface PGPPacket () -@property (copy, readwrite) NSData *headerData; -@property (copy, readwrite) NSData *bodyData; -@end - -@interface PGPSecretKeyPacket () -@property (strong, readwrite) NSData *encryptedMPIsPartData; // after decrypt -> secretMPIArray -@property (strong, readwrite) NSData *ivData; -@property (strong, readwrite) NSArray *secretMPIArray; // decrypted MPI - -@property (assign, readwrite) BOOL wasDecrypted; // is decrypted -@end - -@implementation PGPSecretKeyPacket - -- (PGPPacketTag)tag -{ - return PGPSecretKeyPacketTag; -} - -- (NSString *)description -{ - return [NSString stringWithFormat:@"%@ isEncrypted: %@", [super description], @(self.isEncryptedWithPassword)]; -} - -- (BOOL)isEncryptedWithPassword -{ - if (self.wasDecrypted) { - return NO; - } - - return (self.s2kUsage == PGPS2KUsageEncrypted || self.s2kUsage == PGPS2KUsageEncryptedAndHashed); -} - -- (PGPMPI *) secretMPI:(NSString *)identifier -{ - __block PGPMPI *returnMPI = nil; - [self.secretMPIArray enumerateObjectsUsingBlock:^(id obj, NSUInteger idx, BOOL *stop) { - PGPMPI *mpi = obj; - if ([mpi.identifier isEqualToString:identifier]) { - returnMPI = mpi; - *stop = YES; - } - }]; - - return returnMPI; -} - -- (PGPFingerprint *)fingerprint -{ - return [super fingerprint]; -} - -- (NSData *) exportPacket:(NSError *__autoreleasing *)error -{ - NSMutableData *data = [NSMutableData data]; - NSData *publicKeyData = [super buildPublicKeyBodyData:YES]; - - NSMutableData *secretKeyPacketData = [NSMutableData data]; - [secretKeyPacketData appendData:publicKeyData]; - [secretKeyPacketData appendData:[self buildSecretKeyDataAndForceV4:YES]]; - - NSData *headerData = [self buildHeaderData:secretKeyPacketData]; - [data appendData: headerData]; - [data appendData: secretKeyPacketData]; - - // header not allways match because export new format while input can be old format - NSAssert([secretKeyPacketData isEqualToData:self.bodyData], @"Secret key not match"); - return [data copy]; -} - -- (NSUInteger)parsePacketBody:(NSData *)packetBody error:(NSError *__autoreleasing *)error -{ - NSUInteger position = [super parsePacketBody:packetBody error:error]; - // 5.5.3. Secret-Key Packet Formats - - NSAssert(self.version == 0x04,@"Only Secret Key version 4 is supported. Found version %@", @(self.version)); - - // One octet indicating string-to-key usage conventions - [packetBody getBytes:&_s2kUsage range:(NSRange){position, 1}]; - position = position + 1; - - if (self.s2kUsage == PGPS2KUsageEncrypted || self.s2kUsage == PGPS2KUsageEncryptedAndHashed) { - // moved to readEncrypted:astartingAtPosition - } else if (self.s2kUsage != PGPS2KUsageNone) { - // this is version 3, looks just like a V4 simple hash - self.symmetricAlgorithm = (PGPSymmetricAlgorithm)self.s2kUsage; // this is tricky, but this is right. V3 algorithm is in place of s2kUsage of V4 - self.s2kUsage = PGPS2KUsageEncrypted; - - self.s2k = [[PGPS2K alloc] init]; // not really parsed s2k - self.s2k.specifier = PGPS2KSpecifierSimple; - self.s2k.hashAlgorithm = PGPHashMD5; - } - - NSData *encryptedData = [packetBody subdataWithRange:(NSRange){position, packetBody.length - position}]; - if (self.isEncryptedWithPassword) { - position = position + [self parseEncryptedPart:encryptedData error:error]; - } else { - position = position + [self parseUnencryptedPart:encryptedData error:error]; - } - - return position; -} - -/** - * Encrypted algorithm-specific fields for secret keys - * - * @param packetBody packet data - * @param position position offset - * - * @return length - */ -- (NSUInteger) parseEncryptedPart:(NSData *)data error:(NSError * __autoreleasing *)error -{ - NSUInteger position = 0; - - // If string-to-key usage octet was 255 or 254, a one-octet symmetric encryption algorithm - [data getBytes:&_symmetricAlgorithm range:(NSRange){position, 1}]; - position = position + 1; - - // S2K - self.s2k = [PGPS2K string2KeyFromData:data atPosition:position]; - position = position + self.s2k.length; - - // Initial Vector (IV) of the same length as the cipher's block size - NSUInteger blockSize = [PGPCryptoUtils blockSizeOfSymmetricAlhorithm:self.symmetricAlgorithm]; - NSAssert(blockSize <= 16, @"invalid blockSize"); - - self.ivData = [data subdataWithRange:(NSRange) {position, blockSize}]; - position = position + blockSize; - - - // encrypted MPIs - // checksum or hash is encrypted together with the algorithm-specific fields (mpis) (if string-to-key usage octet is not zero). - self.encryptedMPIsPartData = [data subdataWithRange:(NSRange) {position, data.length - position}]; - position = position + self.encryptedMPIsPartData.length; - -#ifdef DEBUG - //[self decrypt:@"1234"]; - //[self decrypt:@"1234" error:error]; // invalid password -#endif - return data.length; -} - -/** - * Cleartext part, parse cleartext or unencrypted data - * Store decrypted values in secretMPI array - * - * @param packetBody packet data - * @param position position offset - * - * @return length - */ -- (NSUInteger) parseUnencryptedPart:(NSData *)data error:(NSError * __autoreleasing *)error -{ - NSUInteger position = 0; - - // check hash before read actual data - // hash is physically located at the end of dataBody - switch (self.s2kUsage) { - case PGPS2KUsageEncryptedAndHashed: - { - // a 20-octet SHA-1 hash of the plaintext of the algorithm-specific portion. - NSUInteger hashSize = [PGPCryptoUtils hashSizeOfHashAlhorithm:PGPHashSHA1]; - NSAssert(hashSize <= 20, @"invalid hashSize"); - - NSData *clearTextData = [data subdataWithRange:(NSRange) {0, data.length - hashSize}]; - NSData *hashData = [data subdataWithRange:(NSRange){data.length - hashSize, hashSize}]; - NSData *calculatedHashData = [clearTextData pgp_SHA1]; - - if (![hashData isEqualToData:calculatedHashData]) { - if (error) { - *error = [NSError errorWithDomain:PGPErrorDomain code:PGPErrorPassphraseInvalid userInfo:@{NSLocalizedDescriptionKey: @"Decrypted hash mismatch, invalid password."}]; - return data.length; - } - } - - } - break; - default: - { - // a two-octet checksum of the plaintext of the algorithm-specific portion - NSUInteger checksumLength = 2; - NSData *clearTextData = [data subdataWithRange:(NSRange) {0, data.length - checksumLength}]; - NSData *checksumData = [data subdataWithRange:(NSRange){data.length - checksumLength, checksumLength}]; - NSUInteger calculatedChecksum = [clearTextData pgp_Checksum]; - - UInt16 checksum = 0; - [checksumData getBytes:&checksum length:checksumLength]; - checksum = CFSwapInt16BigToHost(checksum); - - if (checksum != calculatedChecksum) { - if (error) { - *error = [NSError errorWithDomain:PGPErrorDomain code:-1 userInfo:@{NSLocalizedDescriptionKey: @"Decrypted hash mismatch, check password."}]; - return data.length; - } - } - } - break; - } - - // now read the actual data - switch (self.publicKeyAlgorithm) { - case PGPPublicKeyAlgorithmRSA: - case PGPPublicKeyAlgorithmRSAEncryptOnly: - case PGPPublicKeyAlgorithmRSASignOnly: - { - // multiprecision integer (MPI) of RSA secret exponent d. - PGPMPI *mpiD = [[PGPMPI alloc] initWithMPIData:data atPosition:position]; - mpiD.identifier = @"D"; - position = position + mpiD.packetLength; - - // MPI of RSA secret prime value p. - PGPMPI *mpiP = [[PGPMPI alloc] initWithMPIData:data atPosition:position]; - mpiP.identifier = @"P"; - position = position + mpiP.packetLength; - - // MPI of RSA secret prime value q (p < q). - PGPMPI *mpiQ = [[PGPMPI alloc] initWithMPIData:data atPosition:position]; - mpiQ.identifier = @"Q"; - position = position + mpiQ.packetLength; - - // MPI of u, the multiplicative inverse of p, mod q. - PGPMPI *mpiU = [[PGPMPI alloc] initWithMPIData:data atPosition:position]; - mpiU.identifier = @"U"; - position = position + mpiU.packetLength; - - self.secretMPIArray = @[mpiD, mpiP, mpiQ, mpiU]; - } - break; - case PGPPublicKeyAlgorithmDSA: - { - // MPI of DSA secret exponent x. - PGPMPI *mpiX = [[PGPMPI alloc] initWithMPIData:data atPosition:position]; - mpiX.identifier = @"X"; - position = position + mpiX.packetLength; - - self.secretMPIArray = @[mpiX]; - } - break; - case PGPPublicKeyAlgorithmElgamal: - case PGPPublicKeyAlgorithmElgamalEncryptorSign: - { - // MPI of Elgamal secret exponent x. - PGPMPI *mpiX = [[PGPMPI alloc] initWithMPIData:data atPosition:position]; - mpiX.identifier = @"X"; - position = position + mpiX.packetLength; - - self.secretMPIArray = @[mpiX]; - } - break; - default: - break; - } - - return data.length; -} - -/** - * Decrypt parsed encrypted packet - * Decrypt packet and store decrypted data on instance - * TODO: V3 support - partially supported, need testing. - * NOTE: Decrypted packet data should be released/forget after use - */ -- (PGPSecretKeyPacket *) decryptedKeyPacket:(NSString *)passphrase error:(NSError *__autoreleasing *)error -{ - if (!self.isEncryptedWithPassword) { - return self; - } - - if (!self.ivData) { - return nil; - } - - PGPSecretKeyPacket *encryptedKey = [self copy]; - - // Keysize - NSUInteger keySize = [PGPCryptoUtils keySizeOfSymmetricAlhorithm:encryptedKey.symmetricAlgorithm]; - NSAssert(keySize <= 32, @"invalid keySize"); - - // Session key for password - // producing a key to be used with a symmetric block cipher from a string of octets - NSData *sessionKeyData = [encryptedKey.s2k produceSessionKeyWithPassphrase:passphrase keySize:keySize]; - - // Decrypted MPIs - NSData *decryptedData = [PGPCryptoCFB decryptData:encryptedKey.encryptedMPIsPartData - sessionKeyData:sessionKeyData - symmetricAlgorithm:self.symmetricAlgorithm - iv:encryptedKey.ivData]; - - - // now read mpis - if (decryptedData) { - [encryptedKey parseUnencryptedPart:decryptedData error:error]; - if (*error) { - return nil; - } - } - encryptedKey.wasDecrypted = YES; - return encryptedKey; -} - -#pragma mark - Decrypt - -- (NSData *) decryptData:(NSData *)data withPublicKeyAlgorithm:(PGPPublicKeyAlgorithm)publicKeyAlgorithm -{ - switch (publicKeyAlgorithm) { - case PGPPublicKeyAlgorithmRSA: - case PGPPublicKeyAlgorithmRSAEncryptOnly: - case PGPPublicKeyAlgorithmRSASignOnly: - { - // return ecnrypted m - return [PGPPublicKeyRSA privateDecrypt:data withSecretKeyPacket:self]; - } - break; - default: - //TODO: add algorithms - [NSException raise:@"PGPNotSupported" format:@"Algorith not supported"]; - break; - } - return nil; -} - -#pragma mark - Private - -/** - * Build public key data for fingerprint - * - * @return public key data starting with version octet - */ -- (NSData *) buildSecretKeyDataAndForceV4:(BOOL)forceV4 -{ - NSAssert(forceV4 == YES,@"Only V4 is supported"); - - - NSMutableData *data = [NSMutableData data]; - [data appendBytes:&_s2kUsage length:1]; - - switch (self.s2kUsage) { - case PGPS2KUsageEncrypted: - case PGPS2KUsageEncryptedAndHashed: - { - // If string-to-key usage octet was 255 or 254, a one-octet symmetric encryption algorithm - [data appendBytes:&_symmetricAlgorithm length:1]; - - // S2K - NSError *exportError = nil; - [data appendData:[self.s2k export:&exportError]]; - NSAssert(exportError, @"export failed"); - if (exportError) { - return nil; - } - - // Initial Vector (IV) of the same length as the cipher's block size - [data appendBytes:self.ivData.bytes length:self.ivData.length]; - - // encrypted MPIs - [data appendData:self.encryptedMPIsPartData]; - - // Hash - [data appendData:[data pgp_SHA1]]; - } - break; - case PGPS2KUsageNone: - for (PGPMPI *mpi in self.secretMPIArray) { - [data appendData:[mpi exportMPI]]; - } - - // Checksum - UInt16 checksum = CFSwapInt16HostToBig([data pgp_Checksum]); - [data appendBytes:&checksum length:2]; - break; - default: - break; - } - -// } else if (self.s2kUsage != PGPS2KUsageNone) { -// // this is version 3, looks just like a V4 simple hash -// self.symmetricAlgorithm = (PGPSymmetricAlgorithm)self.s2kUsage; // this is tricky, but this is right. V3 algorithm is in place of s2kUsage of V4 -// self.s2kUsage = PGPS2KUsageEncrypted; -// -// self.s2k = [[PGPS2K alloc] init]; // not really parsed s2k -// self.s2k.specifier = PGPS2KSpecifierSimple; -// self.s2k.algorithm = PGPHashMD5; - - - - return [data copy]; -} - -#pragma mark - NSCopying - -- (id)copyWithZone:(NSZone *)zone -{ - PGPSecretKeyPacket *copy = [super copyWithZone:zone]; - copy->_s2kUsage = self.s2kUsage; - copy->_s2k = self.s2k; - copy->_symmetricAlgorithm = self.symmetricAlgorithm; - copy->_ivData = self.ivData; - copy->_secretMPIArray = self.secretMPIArray; - copy->_encryptedMPIsPartData = self.encryptedMPIsPartData; - return copy; -} - -@end diff --git a/ObjectivePGP/PGPSecretSubKeyPacket.h b/ObjectivePGP/PGPSecretSubKeyPacket.h deleted file mode 100644 index 7e41b00e..00000000 --- a/ObjectivePGP/PGPSecretSubKeyPacket.h +++ /dev/null @@ -1,13 +0,0 @@ -// -// PGPSecretSubKeyPacket.h -// ObjectivePGP -// -// Created by Marcin Krzyzanowski on 07/05/14. -// Copyright (c) 2014 Marcin Krzyżanowski. All rights reserved. -// - -#import "PGPSecretKeyPacket.h" - -@interface PGPSecretSubKeyPacket : PGPSecretKeyPacket - -@end diff --git a/ObjectivePGP/PGPSecretSubKeyPacket.m b/ObjectivePGP/PGPSecretSubKeyPacket.m deleted file mode 100644 index 03bddb14..00000000 --- a/ObjectivePGP/PGPSecretSubKeyPacket.m +++ /dev/null @@ -1,26 +0,0 @@ -// -// PGPSecretSubKeyPacket.m -// ObjectivePGP -// -// Created by Marcin Krzyzanowski on 07/05/14. -// Copyright (c) 2014 Marcin Krzyżanowski. All rights reserved. -// -// A Secret-Subkey packet (tag 7) is the subkey analog of the Secret -// Key packet and has exactly the same format. - - -#import "PGPSecretSubKeyPacket.h" - -@implementation PGPSecretSubKeyPacket - -- (PGPPacketTag)tag -{ - return PGPSecretSubkeyPacketTag; -} - -- (NSUInteger)parsePacketBody:(NSData *)packetBody error:(NSError *__autoreleasing *)error -{ - return [super parsePacketBody:packetBody error:error]; -} - -@end diff --git a/ObjectivePGP/PGPSignature.h b/ObjectivePGP/PGPSignature.h new file mode 100644 index 00000000..09c648c8 --- /dev/null +++ b/ObjectivePGP/PGPSignature.h @@ -0,0 +1,26 @@ +// +// PGPSignature.h +// ObjectivePGP +// +// Created by Marcin Krzyzanowski on 30/01/15. +// Copyright (c) 2015 Marcin Krzyżanowski. All rights reserved. +// + +#import +#import "PGPSignatureSubpacket.h" +#import "PGPSignaturePacket.h" +#import "PGPKeyID.h" +#import "PGPKey.h" +#import "PGPUser.h" + +@interface PGPSignature : NSObject +@property (assign) PGPSignatureType type; +@property (copy) NSDate *creationDate; +@property (copy) PGPKeyID *issuerKeyID; +@property (strong, readonly) PGPSignaturePacket *packet; + +- (instancetype)initWithPacket:(PGPSignaturePacket *)packet NS_DESIGNATED_INITIALIZER; +- (UInt16) computeSignatureHashOverKey:(PGPKey *)key user:(PGPUser *)user error:(NSError * __autoreleasing *)error; +@end + +NSData *buildDataToSign(PGPSignatureType type, NSUInteger version, PGPKey *key, PGPUser *user, NSData *userAttribute, NSData *standaloneData, NSError * __autoreleasing *error); diff --git a/ObjectivePGP/PGPSignature.m b/ObjectivePGP/PGPSignature.m new file mode 100644 index 00000000..6359bd4b --- /dev/null +++ b/ObjectivePGP/PGPSignature.m @@ -0,0 +1,131 @@ +// +// PGPSignature.m +// ObjectivePGP +// +// Created by Marcin Krzyzanowski on 30/01/15. +// Copyright (c) 2015 Marcin Krzyżanowski. All rights reserved. +// + +#import "PGPSignature.h" +#import "PGPKey.h" +#import "PGPFunctions.h" +#import "NSMutableData+PGP.h" +#import "NSData+PGP.h" + +@implementation PGPSignature + +- (instancetype)initWithPacket:(PGPSignaturePacket *)packet +{ + if (self = [super init]) { + NSAssert([packet isKindOfClass:[PGPSignaturePacket class]], @"Invalid class"); + _packet = packet; + _type = packet.signatureType; + _creationDate = packet.creationDate; + _issuerKeyID = [packet valueOfSubacketOfType:PGPSignatureSubpacketTypeIssuerKeyID found:nil]; + } + return self; +} + +- (UInt16) computeSignatureHashOverKey:(PGPKey *)key user:(PGPUser *)user error:(NSError * __autoreleasing *)error +{ + // 5.2.4. Computing Signatures + NSData *toSignData = buildDataToSign(self.packet.signatureType, self.packet.version, key, user, nil, nil, error); + NSData *signedPart = [self.packet buildData:error onlySignedPart:YES]; + if (!signedPart || *error) { + return 0; + } + NSData *trailer = [self calculateTrailerFor:signedPart]; + + NSMutableData *toHash = [NSMutableData data]; + [toHash appendData:toSignData]; + [toHash appendData:signedPart]; + [toHash appendData:trailer]; + + NSData *hash = pgpCalculateSHA512(toHash.bytes, (unsigned int)toHash.length); + UInt16 hashValue = [hash readUInt16BE:(NSRange){0,2}]; // leftmost 16 bits + + self.packet.hashValue = hashValue; + self.issuerKeyID = [key keyID]; + + return hashValue; +} + +- (NSData *) calculateTrailerFor:(NSData *)signedPartData +{ + NSAssert(self.packet.version == 4, @"Not supported signature version"); + if (self.packet.version < 4) { + NSAssert(false, @"Invalid"); + return nil; + } + + NSMutableData *trailerData = [NSMutableData data]; + UInt8 prefix[2] = {self.packet.version, 0xFF}; + [trailerData appendBytes:&prefix length:2]; + + [trailerData appendUInt32BE:(UInt32)signedPartData.length]; + return [trailerData copy]; +} + +@end + +// data to produce signature on +NSData *buildDataToSign(PGPSignatureType type, NSUInteger version, PGPKey *key, PGPUser *user, NSData *userAttribute, NSData *standaloneData, NSError * __autoreleasing *error) +{ + switch (type) { + case PGPSignatureBinaryDocument: + case PGPSignatureCanonicalTextDocument: + return standaloneData; + case PGPSignatureTimestamp: + case PGPSignatureStandalone: + return [NSData data]; // empty + case PGPSignatureGenericCertificationUserIDandPublicKey: + case PGPSignaturePersonalCertificationUserIDandPublicKey: + case PGPSignatureCasualCertificationUserIDandPublicKey: + case PGPSignaturePositiveCertificationUserIDandPublicKey: + case PGPSignatureCertificationRevocation: + { + NSMutableData *outputData = [NSMutableData data]; + // key + [outputData appendData:buildDataToSign(PGPSignatureDirectlyOnKey, version, key, user, userAttribute, standaloneData, error)]; + + // user + if (user) { + NSData *userData = [user.packet buildData:error]; + if (!userData || *error) { + return nil; + } + if (version == 0x04) { + [outputData appendUInt8:0xB4]; + [outputData appendUInt32BE:(UInt32)userData.length]; + } + [outputData appendData:userData]; + } else if (userAttribute) { + if (version == 0x04) { + [outputData appendUInt8:0xD1]; + } + [outputData appendData:userAttribute]; + } + return [outputData copy]; + } + break; + case PGPSignatureKeyRevocation: + case PGPSignatureDirectlyOnKey: + { + NSData *keyData = [key.packet buildData:error]; + NSData *lengthBytes = buildOldFormatLengthBytesForData(keyData); + + NSMutableData *finalData = [NSMutableData dataWithCapacity:keyData.length + lengthBytes.length]; + [finalData appendData:lengthBytes]; + [finalData appendData:keyData]; + NSData *copy = [finalData copy]; + return copy; + + } + default: + if (error) { + *error = [NSError errorWithDomain:PGPErrorDomain code:0 userInfo:@{NSLocalizedDescriptionKey: @"Not implemented, or unknown signature"}]; + } + break; + } + return nil; +} \ No newline at end of file diff --git a/ObjectivePGP/PGPSignaturePacket.h b/ObjectivePGP/PGPSignaturePacket.h deleted file mode 100644 index d926c1fc..00000000 --- a/ObjectivePGP/PGPSignaturePacket.h +++ /dev/null @@ -1,68 +0,0 @@ -// -// PGPSignature.h -// ObjectivePGP -// -// Created by Marcin Krzyzanowski on 04/05/14. -// Copyright (c) 2014 Marcin Krzyżanowski. All rights reserved. -// -// Tag 2 - -#import -#import "PGPPacketFactory.h" -#import "PGPKeyID.h" - -@class PGPKey, PGPUser, PGPUserIDPacket, PGPPublicKeyPacket; - -@interface PGPSignaturePacket : PGPPacket - -@property (assign) UInt8 version; -@property (assign) PGPSignatureType type; -@property (assign) PGPPublicKeyAlgorithm publicKeyAlgorithm; -@property (assign) PGPHashAlgorithm hashAlgoritm; -@property (strong, readonly, nonatomic) NSArray *hashedSubpackets; -@property (strong, readonly, nonatomic) NSArray *unhashedSubpackets; -@property (strong) NSData *signedHashValueData; -@property (strong) NSArray *signatureMPIs; - -@property (assign, nonatomic, readonly) BOOL canBeUsedToSign; -@property (assign, nonatomic, readonly) BOOL canBeUsedToEncrypt; - -/** - * Create signature packet for signing. This is convienience constructor. - * - * @param type example: PGPSignatureBinaryDocument - * @param publicKeyAlgorithm public key algorith to be used for signature - * @param hashAlgorithm hash algorithm to be used for signature - * - * @return Packet instance ready to call signData:secretKey - */ -+ (PGPSignaturePacket *) signaturePacket:(PGPSignatureType)type hashAlgorithm:(PGPHashAlgorithm)hashAlgorithm; - -- (PGPKeyID *) issuerKeyID; -- (NSArray *) subpackets; -- (NSArray *) subpacketsOfType:(PGPSignatureSubpacketType)type; -- (NSDate *) expirationDate; -- (BOOL) isExpired; -- (NSDate *) creationDate; -- (BOOL) isPrimaryUserID; - - -/** - * Build signature data (signature packet with subpackets). - * - * @param secretKey Secret key used to create signature - * @param inputData Data to sign - * @param userID Optional. User ID - * - * @return Signature packet data - */ -- (void) signData:(NSData *)inputData secretKey:(PGPKey *)secretKey error:(NSError * __autoreleasing *)error; -- (void) signData:(NSData *)inputData secretKey:(PGPKey *)secretKey passphrase:(NSString *)passphrase userID:(NSString *)userID error:(NSError * __autoreleasing *)error; - - -- (BOOL) verifyData:(NSData *)inputData withKey:(PGPKey *)publicKey error:(NSError * __autoreleasing *)error; -- (BOOL) verifyData:(NSData *)inputData withKey:(PGPKey *)publicKey userID:(NSString *)userID error:(NSError * __autoreleasing *)error; -- (BOOL) verifyData:(NSData *)inputData withKey:(PGPKey *)publicKey signingKeyPacket:(PGPPublicKeyPacket *)signingKeyPacket userID:(NSString *)userID error:(NSError * __autoreleasing *)error; - - -@end diff --git a/ObjectivePGP/PGPSignaturePacket.m b/ObjectivePGP/PGPSignaturePacket.m deleted file mode 100644 index 55175db9..00000000 --- a/ObjectivePGP/PGPSignaturePacket.m +++ /dev/null @@ -1,788 +0,0 @@ -// -// PGPSignature.m -// ObjectivePGP -// -// Created by Marcin Krzyzanowski on 04/05/14. -// Copyright (c) 2014 Marcin Krzyżanowski. All rights reserved. -// - -#import "PGPSignaturePacket.h" -#import "PGPMPI.h" -#import "PGPSignatureSubpacket.h" -#import "PGPUserIDPacket.h" -#import "PGPKey.h" -#import "PGPUser.h" -#import "PGPSecretKeyPacket.h" -#import "PGPPKCSEmsa.h" -#import "PGPLiteralPacket.h" -#import "PGPPublicKeyRSA.h" -#import "NSData+PGPUtils.h" - -#import -#import -#import -#import -#import - -@interface PGPSignatureSubpacket () -@property (strong, readwrite) id value; -@end - -@interface PGPSignaturePacket () -@property (strong, readwrite, nonatomic) NSArray *hashedSubpackets; -@property (strong, readwrite, nonatomic) NSArray *unhashedSubpackets; - -// A V4 signature hashes the packet body -// starting from its first field, the version number, through the end -// of the hashed subpacket data. Thus, the fields hashed are the -// signature version, the signature type, the public-key algorithm, the -// hash algorithm, the hashed subpacket length, and the hashed -// subpacket body. -@property (strong) NSData *rawReadedSignedPartData; - -@end - -@implementation PGPSignaturePacket - -- (instancetype)init -{ - if (self = [super init]) { - _version = 4; - } - return self; -} - -+ (PGPSignaturePacket *) signaturePacket:(PGPSignatureType)type hashAlgorithm:(PGPHashAlgorithm)hashAlgorithm -{ - PGPSignaturePacket *signaturePacket = [[PGPSignaturePacket alloc] init]; - - signaturePacket.hashAlgoritm = hashAlgorithm; - return signaturePacket; -} - -- (NSArray *)hashedSubpackets -{ - if (!_hashedSubpackets) { - _hashedSubpackets = [NSArray array]; - } - return _hashedSubpackets; -} - -- (NSArray *)unhashedSubpackets -{ - if (!_unhashedSubpackets) { - _unhashedSubpackets = [NSArray array]; - } - return _unhashedSubpackets; - -} - -- (PGPPacketTag)tag -{ - return PGPSignaturePacketTag; -} - -#pragma mark - Helper properties - -- (PGPKeyID *)issuerKeyID -{ - PGPSignatureSubpacket *subpacket = [[self subpacketsOfType:PGPSignatureSubpacketTypeIssuerKeyID] firstObject]; - return subpacket.value; -} - -- (NSArray *)subpackets -{ - return [self.hashedSubpackets arrayByAddingObjectsFromArray:self.unhashedSubpackets]; -} - -- (NSArray *)subpacketsOfType:(PGPSignatureSubpacketType)type -{ - NSMutableArray *arr = [NSMutableArray array]; - for (PGPSignatureSubpacket *subPacket in self.subpackets) { - if (subPacket.type == type) { - [arr addObject:subPacket]; - } - } - return [arr copy]; -} - -- (NSDate *)expirationDate -{ - PGPSignatureSubpacket *creationDateSubpacket = [[self subpacketsOfType:PGPSignatureSubpacketTypeSignatureCreationTime] firstObject]; - PGPSignatureSubpacket *validityPeriodSubpacket = [[self subpacketsOfType:PGPSignatureSubpacketTypeSignatureExpirationTime] firstObject]; - - NSDate *creationDate = creationDateSubpacket.value; - NSNumber *validityPeriod = validityPeriodSubpacket.value; - if (!validityPeriod || validityPeriod.unsignedIntegerValue == 0) { - return nil; - } - - NSDate *expirationDate = [creationDate dateByAddingTimeInterval:validityPeriod.unsignedIntegerValue]; - return expirationDate; -} - -- (BOOL) isExpired -{ - // is no expiration date then signature never expires - NSDate *expirationDate = [self expirationDate]; - if (!expirationDate) { - return NO; - } - - if ([expirationDate compare:[NSDate date]] == NSOrderedDescending) { - return YES; - } - return NO; -} - -- (NSDate *) creationDate -{ - PGPSignatureSubpacket *creationDateSubpacket = [[self subpacketsOfType:PGPSignatureSubpacketTypeSignatureCreationTime] lastObject]; - return creationDateSubpacket.value; -} - -- (BOOL) isPrimaryUserID -{ - PGPSignatureSubpacket *primaryUserIDSubpacket = [[self subpacketsOfType:PGPSignatureSubpacketTypePrimaryUserID] firstObject]; - return [(NSNumber *)primaryUserIDSubpacket.value boolValue]; -} - -- (BOOL)canBeUsedToSign -{ - BOOL result = self.publicKeyAlgorithm == PGPPublicKeyAlgorithmDSA || self.publicKeyAlgorithm == PGPPublicKeyAlgorithmRSA || self.publicKeyAlgorithm == PGPPublicKeyAlgorithmRSASignOnly; - - if (result) { - PGPSignatureSubpacket *subpacket = [[self subpacketsOfType:PGPSignatureSubpacketTypeKeyFlags] firstObject]; - NSArray *flags = subpacket.value; - if ([flags containsObject:@(PGPSignatureFlagAllowSignData)]) { - return YES; - } - } - return NO; -} - -- (BOOL)canBeUsedToEncrypt -{ - BOOL result = NO; - PGPSignatureSubpacket *subpacket = [[self subpacketsOfType:PGPSignatureSubpacketTypeKeyFlags] firstObject]; - NSArray *flags = subpacket.value; - if ([flags containsObject:@(PGPSignatureFlagAllowEncryptStorage)] || [flags containsObject:@(PGPSignatureFlagAllowEncryptCommunications)]) { - result = YES; - } - - // I'm not convinced if DSA is allowed here self.publicKeyAlgorithm != PGPPublicKeyAlgorithmDSA - result = result && self.publicKeyAlgorithm != PGPPublicKeyAlgorithmRSASignOnly && self.publicKeyAlgorithm != PGPPublicKeyAlgorithmElgamalEncryptorSign; - - return result; -} - -#pragma mark - Build packet - -- (NSData *) exportPacket:(NSError *__autoreleasing *)error -{ - NSMutableData *data = [NSMutableData data]; - - NSData *bodyData = [self buildFullSignatureBodyData:error]; - NSData *headerData = [self buildHeaderData:bodyData]; - [data appendData: headerData]; - [data appendData: bodyData]; - - return [data copy]; -} - -- (NSData *) buildSignedPart:(NSArray *)hashedSubpackets -{ - NSMutableData *data = [NSMutableData data]; - - // One-octet version number (4). - UInt8 exportVersion = 4; - [data appendBytes:&exportVersion length:1]; - - // One-octet signature type. - [data appendBytes:&_type length:1]; - - // One-octet public-key algorithm. - [data appendBytes:&_publicKeyAlgorithm length:1]; - - // One-octet hash algorithm. - [data appendBytes:&_hashAlgoritm length:1]; - - // hashed Subpackets - [data appendData:[self buildSubpacketsCollectionData:hashedSubpackets]]; - - return [data copy]; -} - -- (NSData *) buildFullSignatureBodyData:(NSError *__autoreleasing *)error -{ - NSMutableData *data = [NSMutableData data]; - - NSData *signedPartData = [self buildSignedPart:self.hashedSubpackets]; - [data appendData:signedPartData]; - - // unhashed Subpackets - [data appendData:[self buildSubpacketsCollectionData:self.unhashedSubpackets]]; - - // signed hash value - [data appendData:self.signedHashValueData]; - - for (PGPMPI *mpi in self.signatureMPIs) { - [data appendData:[mpi exportMPI]]; - } - - return [data copy]; -} - -#pragma mark - Verify - -- (BOOL) verifyData:(NSData *)inputData withKey:(PGPKey *)publicKey error:(NSError * __autoreleasing *)error; -{ - return [self verifyData:inputData withKey:publicKey signingKeyPacket:(PGPPublicKeyPacket *)publicKey.signingKeyPacket userID:nil error:error]; -} - -- (BOOL) verifyData:(NSData *)inputData withKey:(PGPKey *)publicKey userID:(NSString *)userID error:(NSError * __autoreleasing *)error; -{ - return [self verifyData:inputData withKey:publicKey signingKeyPacket:(PGPPublicKeyPacket *)publicKey.signingKeyPacket userID:userID error:error]; -} - -// Opposite to sign, with readed data (not produced) -- (BOOL) verifyData:(NSData *)inputData withKey:(PGPKey *)publicKey signingKeyPacket:(PGPPublicKeyPacket *)signingKeyPacket userID:(NSString *)userID error:(NSError * __autoreleasing *)error -{ - //FIXME: publicKey is actually secret key sometimes? - - if (self.type == PGPSignatureBinaryDocument && inputData.length == 0) { - if (error) { - *error = [NSError errorWithDomain:PGPErrorDomain code:PGPErrorGeneral userInfo:@{NSLocalizedDescriptionKey: @"Invalid signature packet type"}]; - } - return NO; - } - - // 5.2.4. Computing Signatures - - // build toSignData, toSign - NSData *toSignData = [self toSignDataForType:self.type inputData:inputData key:publicKey keyPacket:signingKeyPacket userID:userID error:error]; - - // signedPartData - NSData *signedPartData = [self buildSignedPart:self.hashedSubpackets]; - // calculate trailer - NSData *trailerData = [self calculateTrailerFor:signedPartData]; - - //toHash = toSignData + signedPartData + trailerData; - NSMutableData *toHashData = [NSMutableData data]; - [toHashData appendData:toSignData]; - [toHashData appendData:self.rawReadedSignedPartData ?: signedPartData]; - [toHashData appendData:trailerData]; - - // Calculate hash value - NSData *hashData = [toHashData pgp_HashedWithAlgorithm:self.hashAlgoritm]; - - // check signed hash value, should match - // FIXME: propably will fail on V3 signature, need investigate how to handle V3 scenario here - if (![self.signedHashValueData isEqualToData:[hashData subdataWithRange:(NSRange){0,2}]]) { - if (error) { - *error = [NSError errorWithDomain:PGPErrorDomain code:PGPErrorGeneral userInfo:@{NSLocalizedDescriptionKey: @"signed hash dont match"}]; - } - return NO; - } - - switch (signingKeyPacket.publicKeyAlgorithm) { - case PGPPublicKeyAlgorithmRSA: - case PGPPublicKeyAlgorithmRSASignOnly: - case PGPPublicKeyAlgorithmRSAEncryptOnly: - { - // convert mpi data to binary signature_bn_bin - PGPMPI *signatureMPI = self.signatureMPIs[0]; - - // encoded m value - NSData *encryptedEmData = [signatureMPI bodyData]; - - // decrypted encoded m value - NSData *decryptedEmData = [PGPPublicKeyRSA publicDecrypt:encryptedEmData withPublicKeyPacket:signingKeyPacket]; - - // calculate EM and compare with decrypted EM. PKCS-emsa Encoded M. - NSData *emData = [PGPPKCSEmsa encode:self.hashAlgoritm message:toHashData encodedMessageLength:signingKeyPacket.keySize error:error]; - if (![emData isEqualToData:decryptedEmData]) { - if (error) { - *error = [NSError errorWithDomain:PGPErrorDomain code:PGPErrorGeneral userInfo:@{NSLocalizedDescriptionKey: @"em hash dont match"}]; - } - return NO; - } - } - break; - default: - break; - } - return YES; -} - -#pragma mark - Sign - -// 5.2.4. Computing Signatures -// http://tools.ietf.org/html/rfc4880#section-5.2.4 -// @see https://github.com/singpolyma/openpgp-spec/blob/master/key-signatures -- (void) signData:(NSData *)inputData secretKey:(PGPKey *)secretKey error:(NSError * __autoreleasing *)error -{ - return [self signData:inputData secretKey:secretKey passphrase:nil userID:nil error:error]; -} - -- (void) signData:(NSData *)inputData secretKey:(PGPKey *)secretKey passphrase:(NSString *)passphrase userID:(NSString *)userID error:(NSError * __autoreleasing *)error -{ - NSAssert(secretKey.type == PGPKeySecret,@"Need secret key"); - NSAssert([secretKey.primaryKeyPacket isKindOfClass:[PGPSecretKeyPacket class]], @"Signing key packet not found"); - - PGPSecretKeyPacket *signingKeyPacket = (PGPSecretKeyPacket *)secretKey.signingKeyPacket; - NSAssert(signingKeyPacket, @"No signing signature found"); - if (!signingKeyPacket) { - if (error) { - *error = [NSError errorWithDomain:PGPErrorDomain code:PGPErrorGeneral userInfo:@{NSLocalizedDescriptionKey: @"No signing signature found"}]; - } - return; - } - - //TODO: check it this is right ? setup public key algorithm from secret key packet - self.publicKeyAlgorithm = signingKeyPacket.publicKeyAlgorithm; - - if (signingKeyPacket.isEncryptedWithPassword && passphrase.length > 0) { - NSError *decryptError; - //Copy secret key instance, then decrypt on copy, not on the original (do not leave unencrypted instance around) - signingKeyPacket = [signingKeyPacket decryptedKeyPacket:passphrase error:&decryptError]; - NSAssert(signingKeyPacket && !decryptError, @"decrypt error %@", decryptError); - } - - // signed part data - // timestamp subpacket is required - PGPSignatureSubpacket *creationTimeSubpacket = [PGPSignatureSubpacket subpacketWithType:PGPSignatureSubpacketTypeSignatureCreationTime andValue:[NSDate date]]; - self.hashedSubpackets = @[creationTimeSubpacket]; - NSData *signedPartData = [self buildSignedPart:self.hashedSubpackets]; - // calculate trailer - NSData *trailerData = [self calculateTrailerFor:signedPartData]; - - // build toSignData, toSign - NSData *toSignData = [self toSignDataForType:self.type inputData:inputData key:secretKey keyPacket:signingKeyPacket userID:userID error:error]; - //toHash = toSignData + signedPartData + trailerData; - NSMutableData *toHashData = [NSMutableData dataWithData:toSignData]; - [toHashData appendData:signedPartData]; - [toHashData appendData:trailerData]; - - // Calculate hash value - NSData *hashData = [toHashData pgp_HashedWithAlgorithm:self.hashAlgoritm]; - - // == Computing Signatures == - // Encrypt hash data Packet signature MPIs - // Encrypted m value (PKCS emsa encrypted) - NSData *em = [PGPPKCSEmsa encode:self.hashAlgoritm message:toHashData encodedMessageLength:signingKeyPacket.keySize error:nil]; - NSData *encryptedEmData = nil; - - switch (self.publicKeyAlgorithm) { - case PGPPublicKeyAlgorithmRSA: - case PGPPublicKeyAlgorithmRSAEncryptOnly: - case PGPPublicKeyAlgorithmRSASignOnly: - { - encryptedEmData = [PGPPublicKeyRSA privateEncrypt:em withSecretKeyPacket:signingKeyPacket]; - } - break; - - default: - [NSException raise:@"PGPNotSupported" format:@"Algorith not supported"]; - break; - } - - - NSAssert(encryptedEmData, @"Encryption failed"); - if (!encryptedEmData) { - if (error) { - *error = [NSError errorWithDomain:PGPErrorDomain code:PGPErrorGeneral userInfo:@{NSLocalizedDescriptionKey: @"Sign Encryption failed"}]; - } - return; - } - // store signature data as MPI - self.signatureMPIs = @[[[PGPMPI alloc] initWithData:encryptedEmData]]; - - // add unhashed PGPSignatureSubpacketTypeIssuer subpacket - REQUIRED - PGPKeyID *keyid = [[PGPKeyID alloc] initWithFingerprint:signingKeyPacket.fingerprint]; - PGPSignatureSubpacket *issuerSubpacket = [PGPSignatureSubpacket subpacketWithType:PGPSignatureSubpacketTypeIssuerKeyID andValue:keyid]; - self.unhashedSubpackets = @[issuerSubpacket]; - - // Checksum - // Two-octet field holding the left 16 bits of the signed hash value. - NSData *signedHashValue = [hashData subdataWithRange:(NSRange){0,2}]; - self.signedHashValueData = signedHashValue; -} - -- (NSData *) toSignDataForType:(PGPSignatureType)type inputData:(NSData *)inputData key:(PGPKey *)key keyPacket:(PGPPublicKeyPacket *)keyPacket userID:(NSString *)userID error:(NSError * __autoreleasing *)error -{ - NSMutableData *toSignData = [NSMutableData data]; - switch (type) { - case PGPSignatureBinaryDocument: - case PGPSignatureCanonicalTextDocument: - { - [toSignData appendData:inputData]; - } - break; - case PGPSignatureGenericCertificationUserIDandPublicKey: // 0x10 - case PGPSignaturePersonalCertificationUserIDandPublicKey:// 0x11 - case PGPSignatureCasualCertificationUserIDandPublicKey: // 0x12 - case PGPSignaturePositiveCertificationUserIDandPublicKey:// 0x13 - case PGPSignatureCertificationRevocation: // 0x28 - { - // A certification signature (type 0x10 through 0x13) - - // When a signature is made over a key, the hash data starts with the - // octet 0x99, followed by a two-octet length of the key, and then body - // of the key packet. (Note that this is an old-style packet header for - // a key packet with two-octet length.) - - NSData *keyData = [keyPacket exportPublicPacketOldStyle]; - [toSignData appendData:keyData]; - - NSAssert(key.users > 0, @"Key need at least one user"); - - BOOL userIsValid = NO; - for (PGPUser *user in key.users) { - if ([user.userID isEqualToString:userID]) { - userIsValid = YES; - } - } - - if (!userIsValid) { - return nil; - } - - if (userID.length > 0) { - NSData *userIDData = [userID dataUsingEncoding:NSUTF8StringEncoding]; - if (self.version == 4) { - // constant tag (1) - UInt8 userIDConstant = 0xB4; - [toSignData appendBytes:&userIDConstant length:1]; - - // length (4) - UInt32 userIDLength = (UInt32)userIDData.length; - userIDLength = CFSwapInt32HostToBig(userIDLength); - [toSignData appendBytes:&userIDLength length:4]; - } - // data - [toSignData appendData:userIDData]; - } - //TODO user attributes alternative - //UInt8 userAttributeConstant = 0xD1; - //[data appendBytes:&userAttributeConstant length:sizeof(userAttributeConstant)]; - - } - break; - - default: - [toSignData appendData:inputData]; - break; - } - return [toSignData copy]; -} - -- (NSData *) calculateTrailerFor:(NSData *)signedPartData -{ - NSAssert(self.version == 4, @"Not supported signature version"); - if (self.version < 4) - return nil; - - NSMutableData *trailerData = [NSMutableData data]; - UInt8 prefix[2] = {self.version, 0xFF}; - [trailerData appendBytes:&prefix length:2]; - - UInt32 signatureLength = (UInt32)signedPartData.length; // + 6; // ??? (note that this number does not include these final six octets) - signatureLength = CFSwapInt32HostToBig(signatureLength); - [trailerData appendBytes:&signatureLength length:4]; - - return [trailerData copy]; -} - -#pragma mark - Parse - -/** - * 5.2. Signature Packet (Tag 2) - * - * @param packetBody Packet body - */ - -- (NSUInteger)parsePacketBody:(NSData *)packetBody error:(NSError *__autoreleasing *)error -{ - NSUInteger position = [super parsePacketBody:packetBody error:error]; - NSUInteger startPosition = position; - - UInt8 parsedVersion = 0; - // One-octet version number. - [packetBody getBytes:&parsedVersion range:(NSRange){position,1}]; - position = position + 1; - - switch (parsedVersion) { - case 0x04: - position = [self parseV4PacketBody:packetBody error:error]; - break; - case 0x03: - position = [self parseV3PacketBody:packetBody error:error]; - break; - default: - NSAssert(true, @"Unsupported signature packet version"); - *error = [NSError errorWithDomain:PGPErrorDomain code:PGPErrorGeneral userInfo:@{NSLocalizedDescriptionKey: [NSString stringWithFormat:@"Signature version %@ is supported at the moment", @(parsedVersion)]}]; - return startPosition + packetBody.length; - break; - } - return position; -} - -// FIXME: V3 signatures fail somewehere (I don't know where yet) because everything is designed -// for V4 and uses V4 specific data to (for example) validate signature -- (NSUInteger)parseV3PacketBody:(NSData *)packetBody error:(NSError *__autoreleasing *)error -{ - NSUInteger position = [super parsePacketBody:packetBody error:error]; - - // V3 - // One-octet version number (3). - UInt8 parsedVersion = 0; - [packetBody getBytes:&parsedVersion range:(NSRange){position,1}]; - position = position + 1; - - // One-octet length of following hashed material. MUST be 5. - UInt8 parsedLength = 0; - [packetBody getBytes:&parsedLength range:(NSRange){position,1}]; - position = position + 1; - NSAssert(parsedLength == 5, @"Invalid signature data"); - - // One-octet signature type. - [packetBody getBytes:&_type range:(NSRange){position,1}]; - position = position + 1; - - // Four-octet creation time - UInt32 parsedCreationTimestamp = 0; - [packetBody getBytes:&parsedCreationTimestamp range:(NSRange){position,4}]; - parsedCreationTimestamp = CFSwapInt32BigToHost(parsedCreationTimestamp); - position = position + 4; - - // Eight-octet Key ID of signer - PGPKeyID *parsedkeyID = [[PGPKeyID alloc] initWithLongKey:[packetBody subdataWithRange:(NSRange){position, 8}]]; - position = position + 8; - - // One-octet public-key algorithm. - [packetBody getBytes:&_publicKeyAlgorithm range:(NSRange){position,1}]; - position = position + 1; - - // One-octet hash algorithm. - [packetBody getBytes:&_hashAlgoritm range:(NSRange){position,1}]; - position = position + 1; - - // Two-octet field holding the left 16 bits of the signed hash value. - self.signedHashValueData = [packetBody subdataWithRange:(NSRange){position, 2}]; - position = position + 2; - - // 5.2.2. One or more multiprecision integers comprising the signature. This portion is algorithm specific - // Signature - switch (_publicKeyAlgorithm) { - case PGPPublicKeyAlgorithmRSA: - case PGPPublicKeyAlgorithmRSAEncryptOnly: - case PGPPublicKeyAlgorithmRSASignOnly: - { - // multiprecision integer (MPI) of RSA signature value m**d mod n. - // MPI of RSA public modulus n; - PGPMPI *mpiN = [[PGPMPI alloc] initWithMPIData:packetBody atPosition:position]; - mpiN.identifier = @"N"; - position = position + mpiN.packetLength; - - self.signatureMPIs = @[mpiN]; - } - break; - case PGPPublicKeyAlgorithmDSA: - case PGPPublicKeyAlgorithmECDSA: - { - // MPI of DSA value r. - PGPMPI *mpiR = [[PGPMPI alloc] initWithMPIData:packetBody atPosition:position]; - mpiR.identifier = @"R"; - position = position + mpiR.packetLength; - - // MPI of DSA value s. - PGPMPI *mpiS = [[PGPMPI alloc] initWithMPIData:packetBody atPosition:position]; - mpiS.identifier = @"S"; - position = position + mpiS.packetLength; - - self.signatureMPIs = @[mpiR, mpiS]; - } - break; - default: - break; - } - - // convert V3 values to V4 subpackets - PGPSignatureSubpacket *keyIDSubpacket = [[PGPSignatureSubpacket alloc] init]; - keyIDSubpacket.type = PGPSignatureSubpacketTypeIssuerKeyID; - keyIDSubpacket.value = parsedkeyID; - self.unhashedSubpackets = [self.unhashedSubpackets arrayByAddingObject:keyIDSubpacket]; - - PGPSignatureSubpacket *creationTimeSubpacket = [[PGPSignatureSubpacket alloc] init]; - creationTimeSubpacket.type = PGPSignatureSubpacketTypeSignatureCreationTime; - creationTimeSubpacket.value = [NSDate dateWithTimeIntervalSince1970:parsedCreationTimestamp]; - self.hashedSubpackets = [self.hashedSubpackets arrayByAddingObject:creationTimeSubpacket]; - - return position; -} - -- (NSUInteger)parseV4PacketBody:(NSData *)packetBody error:(NSError *__autoreleasing *)error -{ - NSUInteger position = [super parsePacketBody:packetBody error:error]; - NSUInteger startPosition = position; - - UInt8 parsedVersion = 0; - // V4 - // One-octet version number (4). - [packetBody getBytes:&parsedVersion range:(NSRange){position,1}]; - position = position + 1; - - // One-octet signature type. - [packetBody getBytes:&_type range:(NSRange){position,1}]; - position = position + 1; - - // One-octet public-key algorithm. - [packetBody getBytes:&_publicKeyAlgorithm range:(NSRange){position,1}]; - position = position + 1; - - // One-octet hash algorithm. - [packetBody getBytes:&_hashAlgoritm range:(NSRange){position,1}]; - position = position + 1; - - // Two-octet scalar octet count for following hashed subpacket data. - UInt16 hashedOctetCount = 0; - [packetBody getBytes:&hashedOctetCount range:(NSRange){position, 2}]; - hashedOctetCount = CFSwapInt16BigToHost(hashedOctetCount); - position = position + 2; - - // Hashed subpacket data set (zero or more subpackets) - NSData *hashedSubpacketsData = nil; - if (hashedOctetCount > 0) { - hashedSubpacketsData = [packetBody subdataWithRange:(NSRange){position,hashedOctetCount}]; - position = position + hashedOctetCount; - - NSMutableArray *hashedSubpackets = [NSMutableArray arrayWithCapacity:hashedOctetCount]; - - NSUInteger positionSubpacket = 0; - while (positionSubpacket < hashedSubpacketsData.length) { - PGPSignatureSubpacket *subpacket = [self getSubpacketStartingAtPosition:positionSubpacket fromData:hashedSubpacketsData]; - [hashedSubpackets addObject:subpacket]; - positionSubpacket = subpacket.bodyRange.location + subpacket.bodyRange.length; - } - - self.hashedSubpackets = [hashedSubpackets copy]; - } - - // Raw, signed data - self.rawReadedSignedPartData = [packetBody subdataWithRange:(NSRange){startPosition, position}]; - - // Two-octet scalar octet count for the following unhashed subpacket - UInt16 unhashedOctetCount = 0; - [packetBody getBytes:&unhashedOctetCount range:(NSRange){position, 2}]; - unhashedOctetCount = CFSwapInt16BigToHost(unhashedOctetCount); - position = position + 2; - - // Unhashed subpacket data set (zero or more subpackets) - NSData *unhashedSubpacketsData = nil; - if (unhashedOctetCount > 0) { - unhashedSubpacketsData = [packetBody subdataWithRange:(NSRange){position,unhashedOctetCount}]; - position = position + unhashedOctetCount; - - NSMutableArray *unhashedSubpackets = [NSMutableArray arrayWithCapacity:unhashedOctetCount]; - - // Loop subpackets - NSUInteger positionSubpacket = 0; - while (positionSubpacket < unhashedSubpacketsData.length) { - PGPSignatureSubpacket *subpacket = [self getSubpacketStartingAtPosition:positionSubpacket fromData:unhashedSubpacketsData]; - [unhashedSubpackets addObject:subpacket]; - positionSubpacket = subpacket.bodyRange.location + subpacket.bodyRange.length; - } - - self.unhashedSubpackets = [unhashedSubpackets copy]; - } - - // Two-octet field holding the left 16 bits of the signed hash value. - self.signedHashValueData = [packetBody subdataWithRange:(NSRange){position, 2}]; - position = position + 2; - - // 5.2.2. One or more multiprecision integers comprising the signature. This portion is algorithm specific - // Signature - switch (_publicKeyAlgorithm) { - case PGPPublicKeyAlgorithmRSA: - case PGPPublicKeyAlgorithmRSAEncryptOnly: - case PGPPublicKeyAlgorithmRSASignOnly: - { - // multiprecision integer (MPI) of RSA signature value m**d mod n. - // MPI of RSA public modulus n; - PGPMPI *mpiN = [[PGPMPI alloc] initWithMPIData:packetBody atPosition:position]; - mpiN.identifier = @"N"; - position = position + mpiN.packetLength; - - self.signatureMPIs = @[mpiN]; - } - break; - case PGPPublicKeyAlgorithmDSA: - case PGPPublicKeyAlgorithmECDSA: - { - // MPI of DSA value r. - PGPMPI *mpiR = [[PGPMPI alloc] initWithMPIData:packetBody atPosition:position]; - mpiR.identifier = @"R"; - position = position + mpiR.packetLength; - - // MPI of DSA value s. - PGPMPI *mpiS = [[PGPMPI alloc] initWithMPIData:packetBody atPosition:position]; - mpiS.identifier = @"S"; - position = position + mpiS.packetLength; - - self.signatureMPIs = @[mpiR, mpiS]; - } - break; - default: - break; - } - - return position; -} - -#pragma mark - Private - -// I don't like this part, really ugly -// This is because subpacket length is unknow and header need to be found first -// then subpacket can be parsed -- (PGPSignatureSubpacket *) getSubpacketStartingAtPosition:(NSUInteger)subpacketsPosition fromData:(NSData *)subpacketsData -{ - NSRange headerRange = (NSRange) {subpacketsPosition, MIN(6,subpacketsData.length - subpacketsPosition) }; // up to 5+1 octets - NSData *guessHeaderData = [subpacketsData subdataWithRange:headerRange]; // this is "may be" header to be parsed - PGPSignatureSubpacketHeader *subpacketHeader = [PGPSignatureSubpacket subpacketHeaderFromData:guessHeaderData]; - - NSRange subPacketBodyRange = (NSRange){subpacketsPosition + subpacketHeader.headerLength,subpacketHeader.bodyLength}; - NSData *subPacketBody = [subpacketsData subdataWithRange:subPacketBodyRange]; - PGPSignatureSubpacket *subpacket = [[PGPSignatureSubpacket alloc] initWithHeader:subpacketHeader body:subPacketBody bodyRange:subPacketBodyRange]; - - return subpacket; -} - -- (NSData *) buildSubpacketsCollectionData:(NSArray *)subpacketsCollection -{ - NSMutableData *data = [NSMutableData data]; - if (subpacketsCollection.count > 0) { - NSMutableData *subpackets = [NSMutableData data]; - // Hashed subpacket data set (zero or more subpackets) - for (PGPSignatureSubpacket *subpacket in subpacketsCollection) { - NSError *error = nil; - NSData *subpacketData = [subpacket exportSubpacket:&error]; - if (subpacketData && !error) { - [subpackets appendData:subpacketData]; - } - } - // Two-octet scalar octet count for following hashed subpacket data. - UInt16 countBE = CFSwapInt16HostToBig(subpackets.length); - [data appendBytes:&countBE length:2]; - // subackets data - [data appendData:subpackets]; - } else { - // 0x00 0x00 - UInt16 zeroZero = 0; - [data appendBytes:&zeroZero length:2]; - } - return [data copy]; -} - - -@end diff --git a/ObjectivePGP/PGPSignatureSubpacket.h b/ObjectivePGP/PGPSignatureSubpacket.h index 9e795db8..6e04e68f 100644 --- a/ObjectivePGP/PGPSignatureSubpacket.h +++ b/ObjectivePGP/PGPSignatureSubpacket.h @@ -1,33 +1,51 @@ // -// PGPSignatureSubPacket.h +// PGPSignatureSubpacket.h // ObjectivePGP // -// Created by Marcin Krzyzanowski on 04/05/14. -// Copyright (c) 2014 Marcin Krzyżanowski. All rights reserved. +// Created by Marcin Krzyzanowski on 20/01/15. +// Copyright (c) 2015 Marcin Krzyżanowski. All rights reserved. // #import -#import "PGPTypes.h" - -@interface PGPSignatureSubpacketHeader : NSObject -@property (assign) PGPSignatureSubpacketType type; -@property (assign) NSUInteger headerLength; -@property (assign) NSUInteger bodyLength; -@end +typedef NS_ENUM(UInt8, PGPSignatureSubpacketType) { + PGPSignatureSubpacketTypeSignatureCreationTime = 2, // OK + PGPSignatureSubpacketTypeSignatureExpirationTime = 3, // OK + PGPSignatureSubpacketTypeExportableCertification = 4, // + PGPSignatureSubpacketTypeTrustSignature = 5, + PGPSignatureSubpacketTypeRegularExpression = 6, // TODO + PGPSignatureSubpacketTypeRevocable = 7, + PGPSignatureSubpacketTypeKeyExpirationTime = 9, + PGPSignatureSubpacketTypePreferredSymetricAlgorithm = 11, + PGPSignatureSubpacketTypeRevocationKey = 12, // TODO + PGPSignatureSubpacketTypeIssuerKeyID = 16, + PGPSignatureSubpacketTypeNotationData = 20, // TODO + PGPSignatureSubpacketTypePreferredHashAlgorithm = 21, + PGPSignatureSubpacketTypePreferredCompressionAlgorithm = 22, + PGPSignatureSubpacketTypeKeyServerPreference = 23, + PGPSignatureSubpacketTypePreferredKeyServer = 24, + PGPSignatureSubpacketTypePrimaryUserID = 25, + PGPSignatureSubpacketTypePolicyURI = 26, + PGPSignatureSubpacketTypeKeyFlags = 27, + PGPSignatureSubpacketTypeSignerUserID = 28, + PGPSignatureSubpacketTypeReasonForRevocation = 29, // TODO + PGPSignatureSubpacketTypeFeatures = 30, + PGPSignatureSubpacketTypeSignatureTarget = 31, // TODO + PGPSignatureSubpacketTypeEmbeddedSignature = 32 // TODO +}; + +// 5.2.3.17. Key Server Preferences +typedef NS_ENUM(UInt8, PGPKeyServerPreferenceFlags) { + PGPKeyServerPreferenceNoModify = 0x80 // No-modify +}; @interface PGPSignatureSubpacket : NSObject - -@property (assign, readonly) NSRange bodyRange; // subrange range within parent packet - @property (assign) PGPSignatureSubpacketType type; -@property (strong, readonly) id value; - -- (instancetype) initWithHeader:(PGPSignatureSubpacketHeader *)header body:(NSData *)subPacketBodyData bodyRange:(NSRange)bodyRange; -+ (PGPSignatureSubpacketHeader *) subpacketHeaderFromData:(NSData *)headerData; -+ (PGPSignatureSubpacket *) subpacketWithType:(PGPSignatureSubpacketType)type andValue:(id)value; - -- (void) parseSubpacketBody:(NSData *)packetBody; -- (NSData *) exportSubpacket:(NSError *__autoreleasing *)error; +@property (assign) NSUInteger totalLength; +@property (assign, getter=isCritical) BOOL critical; +@property (strong) id value; ++ (instancetype) readFromStream:(NSInputStream *)inputStream data:(NSData * __autoreleasing *)readData error:(NSError * __autoreleasing *)error; +- (BOOL) writeToStream:(NSOutputStream *)outputStream error:(NSError *__autoreleasing *)error; +- (NSData *) buildData:(NSError *__autoreleasing *)error; @end diff --git a/ObjectivePGP/PGPSignatureSubpacket.m b/ObjectivePGP/PGPSignatureSubpacket.m index 2d852cab..aba3ddf7 100644 --- a/ObjectivePGP/PGPSignatureSubpacket.m +++ b/ObjectivePGP/PGPSignatureSubpacket.m @@ -1,444 +1,370 @@ // -// PGPSignatureSubPacket.m +// PGPSignatureSubpacket.m // ObjectivePGP // -// Created by Marcin Krzyzanowski on 04/05/14. -// Copyright (c) 2014 Marcin Krzyżanowski. All rights reserved. +// Created by Marcin Krzyzanowski on 20/01/15. +// Copyright (c) 2015 Marcin Krzyżanowski. All rights reserved. // #import "PGPSignatureSubpacket.h" +#import "PGPCommon.h" +#import "NSInputStream+PGP.h" +#import "NSOutputStream+PGP.h" #import "PGPKeyID.h" -#import "PGPPacket.h" -#import "PGPCompressedPacket.h" -#import "NSValue+PGPUtils.h" - -@implementation PGPSignatureSubpacketHeader -@end +#import "PGPSignaturePacket.h" +#import "PGPPacketHeader.h" +#import "PGPFunctions.h" +#import "NSMutableData+PGP.h" @interface PGPSignatureSubpacket () -@property (strong, readwrite) id value; @end @implementation PGPSignatureSubpacket -- (instancetype) initWithHeader:(PGPSignatureSubpacketHeader *)header body:(NSData *)subPacketBodyData bodyRange:(NSRange)bodyRange -{ - if (self = [self init]) { - _type = header.type; - _bodyRange = bodyRange; - [self parseSubpacketBody:subPacketBodyData]; - } - return self; -} - -+ (PGPSignatureSubpacket *) subpacketWithType:(PGPSignatureSubpacketType)type andValue:(id)value -{ - PGPSignatureSubpacket *subpacket = [[PGPSignatureSubpacket alloc] init]; - subpacket.type = type; - subpacket.value = value; - return subpacket; -} - - (NSString *)description { - return [NSString stringWithFormat:@"%@ %d %@", [super description], self.type, self.value]; + return [NSString stringWithFormat:@"%@ type %@", [super description], @(self.type)]; } -/** - * 5.2.3.1. Signature Subpacket Specification - * - * @param packetBody A single subpacket body data. - */ -- (void) parseSubpacketBody:(NSData *)packetBody ++ (instancetype) readFromStream:(NSInputStream *)inputStream data:(NSData * __autoreleasing *)readData error:(NSError * __autoreleasing *)error { - // NSLog(@"parseSubpacket %@, body %@",@(self.type), packetBody); - switch (self.type) { - case PGPSignatureSubpacketTypeSignatureCreationTime: // NSDate - { - // 5.2.3.4. Signature Creation Time - // Signature Creation Time MUST be present in the hashed area. - - UInt32 signatureCreationTimestamp = 0; - [packetBody getBytes:&signatureCreationTimestamp length:4]; - signatureCreationTimestamp = CFSwapInt32BigToHost(signatureCreationTimestamp); - self.value = [NSDate dateWithTimeIntervalSince1970:signatureCreationTimestamp]; - } - break; - case PGPSignatureSubpacketTypeSignatureExpirationTime: // NSNumber + PGPSignatureSubpacket *subpacket = [[PGPSignatureSubpacket alloc] init]; + NSMutableData *rawData = [NSMutableData data]; + + // the subpacket length (1, 2, or 5 octets) + // Note: "The length includes the type octet but not this length" + // Example: 02 19 01 + // length 0x02 = 2 + // type 0x19 = 25 + // body: 0x01 = 1 + // so... given body length is = 2 but body length is in fact = 1 + // this is because given body length include type octet which is from header namespace, not body really. + // I'm drunk, or person who defined it this way was drunk. + + UInt8 firstOctet = [inputStream readUInt8BytesAppendTo:rawData]; + NSUInteger length = 0; + NSUInteger lengthOfLength = 0; + if (firstOctet < 192) { + length = firstOctet; + lengthOfLength = 1; + } else if (firstOctet >= 192 && firstOctet < 255) { + UInt8 secondOctet = [inputStream readUInt8BytesAppendTo:rawData]; + length = ((firstOctet - 192) << 8) + (secondOctet) + 192; + lengthOfLength = 2; + } else if (firstOctet == 255) { + length = [inputStream readUInt32BytesAppendTo:rawData]; + lengthOfLength = 5; + } + subpacket.totalLength = length + lengthOfLength; + NSUInteger lengthLeft = length; + + // the subpacket type (1 octet), + subpacket.type = [inputStream readUInt8BytesAppendTo:rawData]; + lengthLeft -= 1; + + // Bit 7 of the subpacket type is the "critical" bit. + subpacket.critical = (subpacket.type & 0x80) == 0x80; + if (subpacket.critical) { + // unset critical bit + subpacket.type = subpacket.type & ~0x80; + } + + // Implementations SHOULD implement the three preferred algorithm subpackets (11, 21, and 22) + // as well as the "Reason for Revocation" subpacket. + switch (subpacket.type) { + case PGPSignatureSubpacketTypeSignatureCreationTime: + case PGPSignatureSubpacketTypeSignatureExpirationTime: case PGPSignatureSubpacketTypeKeyExpirationTime: { - // 5.2.3.10. Signature Expiration Time - // 5.2.3.6. Key Expiration Time - // The validity period of the signature - UInt32 validityPeriodTime = 0; - [packetBody getBytes:&validityPeriodTime length:4]; - validityPeriodTime = CFSwapInt32BigToHost(validityPeriodTime); - self.value = @(validityPeriodTime); - - } - break; - case PGPSignatureSubpacketTypeTrustSignature: - { - // (1 octet "level" (depth), 1 octet of trust amount) - // TODO trust subpacket + // (4 octets) The time the signature was made. + UInt32 timestamp = [inputStream readUInt32BE]; + [rawData appendUInt32BE:timestamp]; + subpacket.value = [NSDate dateWithTimeIntervalSince1970:timestamp];; + lengthLeft -= 4; } break; - case PGPSignatureSubpacketTypeIssuerKeyID: // PGPKeyID + case PGPSignatureSubpacketTypePreferredSymetricAlgorithm: + case PGPSignatureSubpacketTypePreferredHashAlgorithm: + case PGPSignatureSubpacketTypePreferredCompressionAlgorithm: + case PGPSignatureSubpacketTypeFeatures: { - // 5.2.3.5. Issuer - - PGPKeyID *keyID = [[PGPKeyID alloc] initWithLongKey:packetBody]; - self.value = keyID; //[packetBody subdataWithRange:(NSRange){0,8}]; + NSMutableArray *elements = [NSMutableArray array]; + while (lengthLeft) { + UInt8 value = [inputStream readUInt8]; + [rawData appendUInt8:value]; + [elements addObject:@(value)]; + lengthLeft -= 1; + } + subpacket.value = [elements copy]; } break; - case PGPSignatureSubpacketTypeExportableCertification: // NSNumber BOOL +// case PGPSignatureSubpacketTypeRegularExpression: +// { +// //TODO: this feature is not supported +// // (null-terminated regular expression) +// UInt8 buffer[lengthLeft]; +// NSUInteger result = [inputStream read:buffer maxLength:sizeof(buffer)]; +// if (result < lengthLeft) { +// if (error) { +// *error = [NSError errorWithDomain:PGPErrorDomain code:0 userInfo:@{NSLocalizedDescriptionKey: @"Problem occur with signature subpacket."}]; +// } +// return nil; +// } +// lengthLeft -= result; +// subpacket.value = [[NSString alloc] initWithBytes:buffer length:sizeof(buffer) encoding:NSUTF8StringEncoding]; +// [rawData appendBytes:buffer length:sizeof(buffer)]; +// NSAssert(subpacket.value, @"Invalid value"); +// } +// break; + case PGPSignatureSubpacketTypeIssuerKeyID: { - // 5.2.3.11. Exportable Certification - UInt8 exportableValue = 0; - [packetBody getBytes:&exportableValue length:1]; - self.value = @(exportableValue); + UInt8 buffer[lengthLeft]; + NSUInteger result = [inputStream read:buffer maxLength:sizeof(buffer)]; + if (result < lengthLeft) { + if (error) { + *error = [NSError errorWithDomain:PGPErrorDomain code:0 userInfo:@{NSLocalizedDescriptionKey: @"Problem occur with signature subpacket."}]; + } + return nil; + } + lengthLeft -= result; + subpacket.value = [[PGPKeyID alloc] initWithBytes:buffer length:sizeof(buffer)]; + [rawData appendBytes:buffer length:sizeof(buffer)]; + NSAssert(subpacket.value, @"Invalid value"); } break; - case PGPSignatureSubpacketTypePrimaryUserID: // NSNumber BOOL + case PGPSignatureSubpacketTypeTrustSignature: { - // 5.2.3.19. Primary User ID - UInt8 primaryUserIDValue = 0; - [packetBody getBytes:&primaryUserIDValue length:1]; - self.value = @(primaryUserIDValue); + // (1 octet of revocability, 0 for not, 1 for revocable) + UInt8 value = [inputStream readUInt8]; + [rawData appendUInt8:value]; + subpacket.value = @(value); + lengthLeft -= 1; } break; - case PGPSignatureSubpacketTypeSignerUserID: // NSString - // side note: This subpacket is not appropriate to use to refer to a User Attribute packet. - case PGPSignatureSubpacketTypePreferredKeyServer: // NSString - case PGPSignatureSubpacketTypePolicyURI: // NSString + case PGPSignatureSubpacketTypeRevocable: + case PGPSignatureSubpacketTypeExportableCertification: + case PGPSignatureSubpacketTypePrimaryUserID: { - self.value = [[NSString alloc] initWithData:packetBody encoding:NSUTF8StringEncoding]; + UInt8 value = [inputStream readUInt8]; + NSAssert(value < 2, @"Invalid bool value"); + [rawData appendUInt8:value]; + lengthLeft -= 1; + subpacket.value = @((BOOL)value); } break; - case PGPSignatureSubpacketTypeReasonForRevocation: // NSNumber + case PGPSignatureSubpacketTypeSignerUserID: + case PGPSignatureSubpacketTypePreferredKeyServer: + case PGPSignatureSubpacketTypePolicyURI: { - UInt8 revocationCode = 0; - [packetBody getBytes:&revocationCode length:1]; - self.value = @(revocationCode); + UInt8 buffer[lengthLeft]; + NSUInteger result = [inputStream read:buffer maxLength:sizeof(buffer)]; + if (result != lengthLeft) { + if (error) { + *error = [NSError errorWithDomain:PGPErrorDomain code:0 userInfo:@{NSLocalizedDescriptionKey: @"Problem occur with signature subpacket."}]; + } + return nil; + } + lengthLeft -= result; + subpacket.value = [[NSString alloc] initWithBytes:buffer length:sizeof(buffer) encoding:NSUTF8StringEncoding]; + [rawData appendBytes:buffer length:sizeof(buffer)]; + NSAssert(subpacket.value, @"Invalid value"); } break; - case PGPSignatureSubpacketTypeKeyFlags: // NSArray of NSNumber + case PGPSignatureSubpacketTypeKeyFlags: { - // 5.2.3.21. Key Flags - // (N octets of flags) ??? - // This implementation supports max 8 octets (64bit) - UInt64 flagByte = 0; - [packetBody getBytes:&flagByte length:MIN(8,packetBody.length)]; - NSMutableArray *flagsArray = [NSMutableArray array]; - - if (flagByte & PGPSignatureFlagAllowCertifyOtherKeys) { - [flagsArray addObject:@(PGPSignatureFlagAllowCertifyOtherKeys)]; + // (1 octet) + UInt8 flags = [inputStream readUInt8]; + lengthLeft -= 1; + + NSMutableArray *elements = [NSMutableArray array]; + + if (flags & PGPSignatureFlagAllowCertifyOtherKeys) { + [elements addObject:@(PGPSignatureFlagAllowCertifyOtherKeys)]; } - if (flagByte & PGPSignatureFlagAllowSignData) { - [flagsArray addObject:@(PGPSignatureFlagAllowSignData)]; + if (flags & PGPSignatureFlagAllowSignData) { + [elements addObject:@(PGPSignatureFlagAllowSignData)]; } - if (flagByte & PGPSignatureFlagAllowEncryptCommunications) { - [flagsArray addObject:@(PGPSignatureFlagAllowEncryptCommunications)]; + if (flags & PGPSignatureFlagAllowEncryptCommunications) { + [elements addObject:@(PGPSignatureFlagAllowEncryptCommunications)]; } - if (flagByte & PGPSignatureFlagAllowEncryptStorage) { - [flagsArray addObject:@(PGPSignatureFlagAllowEncryptStorage)]; + if (flags & PGPSignatureFlagAllowEncryptStorage) { + [elements addObject:@(PGPSignatureFlagAllowEncryptStorage)]; } - if (flagByte & PGPSignatureFlagSecretComponentMayBeSplit) { - [flagsArray addObject:@(PGPSignatureFlagSecretComponentMayBeSplit)]; + if (flags & PGPSignatureFlagSecretComponentMayBeSplit) { + [elements addObject:@(PGPSignatureFlagSecretComponentMayBeSplit)]; } - if (flagByte & PGPSignatureFlagAllowAuthentication) { - [flagsArray addObject:@(PGPSignatureFlagAllowAuthentication)]; + if (flags & PGPSignatureFlagAllowAuthentication) { + [elements addObject:@(PGPSignatureFlagAllowAuthentication)]; } - if (flagByte & PGPSignatureFlagPrivateKeyMayBeInThePossesionOfManyPersons) { - [flagsArray addObject:@(PGPSignatureFlagPrivateKeyMayBeInThePossesionOfManyPersons)]; + if (flags & PGPSignatureFlagPrivateKeyMayBeInThePossesionOfManyPersons) { + [elements addObject:@(PGPSignatureFlagPrivateKeyMayBeInThePossesionOfManyPersons)]; } - - self.value = [flagsArray copy]; + [rawData appendUInt8:flags]; + subpacket.value = [elements copy]; + NSAssert(elements.count > 0, @"At least one flag is expected"); } break; - case PGPSignatureSubpacketTypePreferredSymetricAlgorithm: // NSArray of NSValue @encode(PGPSymmetricAlgorithm) + case PGPSignatureSubpacketTypeKeyServerPreference: { - // 5.2.3.7. Preferred Symmetric Algorithms - NSMutableArray *algorithmsArray = [NSMutableArray array]; - - for (NSUInteger i = 0; i < packetBody.length; i++) { - PGPSymmetricAlgorithm algorithm = 0; - [packetBody getBytes:&algorithm range:(NSRange){i,1}]; - - NSValue *val = [NSValue valueWithBytes:&algorithm objCType:@encode(PGPSymmetricAlgorithm)]; - [algorithmsArray addObject:val]; + UInt8 flags = [inputStream readUInt8]; + lengthLeft -= 1; + NSMutableArray *elements = [NSMutableArray array]; + if (flags & PGPKeyServerPreferenceNoModify) { + [elements addObject:@(PGPKeyServerPreferenceNoModify)]; } - - self.value = [algorithmsArray copy]; + [rawData appendUInt8:flags]; + subpacket.value = [elements copy]; } break; - case PGPSignatureSubpacketTypePreferredHashAlgorithm: // NSArray of NSValue @encode(PGPHashAlgorithm) + case PGPSignatureSubpacketTypeRegularExpression: //TODO: This feature is not supported + case PGPSignatureSubpacketTypeReasonForRevocation: + case PGPSignatureSubpacketTypeRevocationKey: //TODO: (1 octet of class, 1 octet of public-key algorithm ID, 20 octets of fingerprint) + case PGPSignatureSubpacketTypeSignatureTarget: //TODO + case PGPSignatureSubpacketTypeNotationData: { - // 5.2.3.8. Preferred Hash Algorithms - NSMutableArray *algorithmsArray = [NSMutableArray array]; - - for (NSUInteger i = 0; i < packetBody.length; i++) { - PGPHashAlgorithm algorithm = 0; - [packetBody getBytes:&algorithm range:(NSRange){i,1}]; - - NSValue *val = [NSValue valueWithBytes:&algorithm objCType:@encode(PGPHashAlgorithm)]; - [algorithmsArray addObject:val]; + UInt8 buffer[lengthLeft]; + NSUInteger result = [inputStream read:buffer maxLength:sizeof(buffer)]; + if (result != lengthLeft) { + if (error) { + *error = [NSError errorWithDomain:PGPErrorDomain code:0 userInfo:@{NSLocalizedDescriptionKey: @"Problem occur with signature subpacket."}]; + } + return nil; } - - self.value = [algorithmsArray copy]; + lengthLeft -= result; + [rawData appendBytes:buffer length:result]; + subpacket.value = [NSData dataWithBytes:buffer length:result]; } break; - case PGPSignatureSubpacketTypePreferredCompressionAlgorithm: // NSArray of NSValue @encode(PGPCompressionAlgorithm) - { - // 5.2.3.9. Preferred Compression Algorithms - // If this subpacket is not included, ZIP is preferred. - NSMutableArray *algorithmsArray = [NSMutableArray array]; - - for (UInt8 i = 0; i < packetBody.length; i++) { - PGPCompressionAlgorithm algorithm = 0; - [packetBody getBytes:&algorithm range:(NSRange){i,1}]; - - NSValue *val = [NSValue valueWithBytes:&algorithm objCType:@encode(PGPCompressionAlgorithm)]; - [algorithmsArray addObject:val]; - } - - self.value = [algorithmsArray copy]; - } + default: + NSAssert(false, @"Not handled"); break; - case PGPSignatureSubpacketTypeKeyServerPreference: // NSArray of NSNumber PGPKeyServerPreferenceFlags - { - // 5.2.3.17. Key Server Preferences - PGPKeyServerPreferenceFlags flag = 0; - [packetBody getBytes:&flag length:MIN(8,packetBody.length)]; + } - NSMutableArray *flagsArray = [NSMutableArray array]; - if (flag & PGPKeyServerPreferenceNoModify) { - [flagsArray addObject:@(PGPKeyServerPreferenceNoModify)]; - } - self.value = [flagsArray copy]; + NSAssert(lengthLeft == 0,@"Invalid signature subpacket"); + if (lengthLeft != 0) { + if (error) { + *error = [NSError errorWithDomain:PGPErrorDomain code:0 userInfo:@{NSLocalizedDescriptionKey: @"Invalid signature subpacket."}]; } - break; - case PGPSignatureSubpacketTypeFeatures: // NSArray of NSNumber PGPFeature - { - // 5.2.3.24. Features - NSMutableArray *featuresArray = [NSMutableArray array]; - - for (NSUInteger i = 0; i < packetBody.length; i++) { - PGPFeature feature = 0; - [packetBody getBytes:&feature range:(NSRange){i,1}]; - [featuresArray addObject:@(feature)]; - } + return nil; + } - self.value = [featuresArray copy]; - } - break; - default: -#ifdef DEBUG - NSLog(@"Unsuported subpacket type %d", self.type); -#endif - break; + if (readData) { + *readData = [rawData copy]; } + + return subpacket; } -- (NSData *) exportSubpacket:(NSError *__autoreleasing *)error +- (BOOL) writeToStream:(NSOutputStream *)outputStream error:(NSError *__autoreleasing *)error { - NSMutableData *data = [NSMutableData data]; - - // subpacket type - PGPSignatureSubpacketType type = self.type; - [data appendBytes:&type length:1]; + NSData *subpacketData = [self buildData:error]; + if (!subpacketData || *error) { + return NO; + } + return [outputStream writeData:subpacketData]; +} +- (NSData *) buildData:(NSError *__autoreleasing *)error +{ + NSMutableData *bodyData = [NSMutableData data]; + if (self.critical) { + //TODO: remove critical bit and update type + } + [bodyData appendUInt8:self.type]; + + // new format length switch (self.type) { - case PGPSignatureSubpacketTypeSignatureCreationTime: // NSDate - { - NSDate *date = (NSDate *)self.value; - UInt32 signatureCreationTimestamp = CFSwapInt32HostToBig((UInt32)[date timeIntervalSince1970]); - [data appendBytes:&signatureCreationTimestamp length:4]; - } - break; - case PGPSignatureSubpacketTypeSignatureExpirationTime: // NSNumber + case PGPSignatureSubpacketTypeSignatureCreationTime: + case PGPSignatureSubpacketTypeSignatureExpirationTime: case PGPSignatureSubpacketTypeKeyExpirationTime: { - NSNumber *validityPeriod = (NSNumber *)self.value; - UInt32 validityPeriodInt = CFSwapInt32HostToBig((UInt32)validityPeriod.unsignedIntegerValue); - [data appendBytes:&validityPeriodInt length:4]; - } - break; - case PGPSignatureSubpacketTypeIssuerKeyID: // PGPKeyID - { - PGPKeyID *keyID = self.value; - [data appendData:[keyID exportKeyData]]; - } - break; - case PGPSignatureSubpacketTypeExportableCertification: // NSNumber BOOL - case PGPSignatureSubpacketTypePrimaryUserID: // NSNumber BOOL - { - NSNumber *boolNumber = self.value; - BOOL boolValue = [boolNumber boolValue]; - [data appendBytes:&boolValue length:1]; - } - break; - case PGPSignatureSubpacketTypeSignerUserID: // NSString - case PGPSignatureSubpacketTypePreferredKeyServer: // NSString - case PGPSignatureSubpacketTypePolicyURI: // NSString - { - NSString *stringValue = self.value; - [data appendData:[stringValue dataUsingEncoding:NSUTF8StringEncoding]]; + NSAssert([self.value isKindOfClass:[NSDate class]], @"Invalid value"); + NSDate *date = (NSDate *)self.value; + [bodyData appendUInt32BE:[date timeIntervalSince1970]]; } - break; - case PGPSignatureSubpacketTypeReasonForRevocation: + break; + case PGPSignatureSubpacketTypePreferredSymetricAlgorithm: + case PGPSignatureSubpacketTypePreferredHashAlgorithm: + case PGPSignatureSubpacketTypePreferredCompressionAlgorithm: + case PGPSignatureSubpacketTypeFeatures: { - // 5.2.3.23. Reason for Revocation - NSNumber *revocationCode = self.value; - UInt8 revocationCodeByte = [revocationCode unsignedIntValue]; - [data appendBytes:&revocationCodeByte length:1]; + NSAssert([self.value isKindOfClass:[NSArray class]], @"Invalid value"); + NSArray *elements = (NSArray *)self.value; + for (NSNumber *number in elements) { + [bodyData appendUInt8:number.unsignedShortValue]; + } } - break; - case PGPSignatureSubpacketTypeKeyFlags: // NSArray of NSNumber PGPSignatureFlags + break; + case PGPSignatureSubpacketTypeSignerUserID: + case PGPSignatureSubpacketTypePreferredKeyServer: + case PGPSignatureSubpacketTypePolicyURI: { - //TODO: actually it can be more than one byte (documented) - // so I should calculate how many bytes do I need here - NSArray *flagsArray = self.value; - PGPSignatureFlags flagByte = 0; - for (NSNumber *flagByteNumber in flagsArray) { - flagByte = flagByte | ((UInt8)[flagByteNumber unsignedIntValue]); - } - [data appendBytes:&flagByte length:sizeof(PGPSignatureFlags)]; + NSAssert([self.value isKindOfClass:[NSString class]], @"Invalid value"); + NSString *value = (NSString *)self.value; + [bodyData appendData:[value dataUsingEncoding:NSUTF8StringEncoding]]; } - break; - case PGPSignatureSubpacketTypePreferredSymetricAlgorithm: // NSArray of NSValue @encode(PGPSymmetricAlgorithm) + break; + case PGPSignatureSubpacketTypeIssuerKeyID: { - NSArray *algorithmsArray = self.value; - for (NSValue *val in algorithmsArray) { - if (![val pgp_objCTypeIsEqualTo:@encode(PGPSymmetricAlgorithm)]) { - continue; - } - - PGPSymmetricAlgorithm symmetricAlgorithm = 0; - [val getValue:&symmetricAlgorithm]; - - [data appendBytes:&symmetricAlgorithm length:sizeof(PGPSymmetricAlgorithm)]; - } + NSAssert([self.value isKindOfClass:[PGPKeyID class]], @"Invalid value"); + PGPKeyID *keyID = self.value; + [bodyData appendData:[keyID octetsData]]; } - break; - case PGPSignatureSubpacketTypePreferredHashAlgorithm: // NSArray of of NSValue @encode(PGPHashAlgorithm) + break; + case PGPSignatureSubpacketTypeTrustSignature: { - NSArray *algorithmsArray = self.value; - for (NSValue *val in algorithmsArray) { - if (![val pgp_objCTypeIsEqualTo:@encode(PGPHashAlgorithm)]) { - continue; - } - - PGPHashAlgorithm hashAlgorithm = 0; - [val getValue:&hashAlgorithm]; - [data appendBytes:&hashAlgorithm length:sizeof(PGPHashAlgorithm)]; - } + // 1 octet + NSAssert([self.value isKindOfClass:[NSNumber class]], @"Invalid value"); + NSNumber *number = (NSNumber *)self.value; + [bodyData appendUInt8:number.unsignedShortValue]; } break; - case PGPSignatureSubpacketTypePreferredCompressionAlgorithm: // NSArray of NSValue @encode(PGPCompressionAlgorithm) + case PGPSignatureSubpacketTypeRevocable: + case PGPSignatureSubpacketTypeExportableCertification: + case PGPSignatureSubpacketTypePrimaryUserID: { - NSArray *algorithmsArray = self.value; - for (NSValue *val in algorithmsArray) { - if (![val pgp_objCTypeIsEqualTo:@encode(PGPCompressionAlgorithm)]) { - continue; - } - - PGPCompressionAlgorithm hashAlgorithm = 0; - [val getValue:&hashAlgorithm]; - [data appendBytes:&hashAlgorithm length:sizeof(PGPCompressionAlgorithm)]; - } + NSAssert([self.value isKindOfClass:[NSNumber class]], @"Invalid value"); + NSNumber *value = (NSNumber *)self.value; + NSAssert(value.unsignedShortValue > 1, @"Invalid value"); + [bodyData appendUInt8:(UInt8)value.unsignedShortValue]; } - break; - case PGPSignatureSubpacketTypeKeyServerPreference: // NSArray of NSNumber PGPKeyServerPreferenceFlags + break; + case PGPSignatureSubpacketTypeKeyFlags: + case PGPSignatureSubpacketTypeKeyServerPreference: { - //TODO: actually it can be more than one byte (documented) - // so I should calculate how many bytes do I need here - PGPKeyServerPreferenceFlags allFlags = 0; - NSArray *flagsArray = (NSArray *)self.value; - for (NSNumber *flagNumber in flagsArray) { - PGPKeyServerPreferenceFlags flag = (PGPKeyServerPreferenceFlags)flagNumber.unsignedIntValue; - allFlags = allFlags | flag; + NSAssert([self.value isKindOfClass:[NSArray class]], @"Invalid value"); + NSArray *elements = (NSArray *)self.value; + UInt8 flags = 0; + for (NSNumber *flag in elements) { + flags = flags | (UInt8)flag.unsignedShortValue; } - [data appendBytes:&allFlags length:sizeof(PGPKeyServerPreferenceFlags)]; + [bodyData appendUInt8:flags]; } - break; - case PGPSignatureSubpacketTypeFeatures: // NSArray of NSNumber PGPFeature + break; + case PGPSignatureSubpacketTypeRegularExpression: //TODO: this feature is not supported + case PGPSignatureSubpacketTypeReasonForRevocation: + case PGPSignatureSubpacketTypeRevocationKey: + case PGPSignatureSubpacketTypeSignatureTarget: + case PGPSignatureSubpacketTypeNotationData: { - //TODO: actually it can be more than one byte (documented) - // so I should calculate how many bytes do I need here - NSArray *flagsArray = self.value; - PGPFeature flagByte = 0; - for (NSNumber *flagByteNumber in flagsArray) { - flagByte = flagByte | ((UInt8)[flagByteNumber unsignedIntValue]); - } - [data appendBytes:&flagByte length:sizeof(PGPSignatureFlags)]; + //NSData raw data + NSAssert([self.value isKindOfClass:[NSData class]], @"Invalid raw data"); + NSData *value = (NSData *)self.value; + [bodyData appendData:value]; } break; default: -#ifdef DEBUG - NSLog(@"Unsuported subpacket type %d", self.type); -#endif + NSAssert(false, @"Not handled"); break; } - - //subpacket = length + tag + body - NSMutableData *subpacketData = [NSMutableData data]; - // the subpacket length (1, 2, or 5 octets), - NSData *subpacketLengthData = [PGPPacket buildNewFormatLengthDataForData:data]; - [subpacketData appendData:subpacketLengthData]; // data with tag - [subpacketData appendData:data]; - - // NSLog(@"exportSubpacket %@, header %@",@(self.type), [subpacketData subdataWithRange:(NSRange){0, subpacketLengthData.length + 1}]); - // NSLog(@"exportSubpacket %@, body %@",@(self.type), [data subdataWithRange:(NSRange){1,data.length - 1}]); - - return [subpacketData copy]; -} - -+ (PGPSignatureSubpacketHeader *) subpacketHeaderFromData:(NSData *)headerData -{ - NSUInteger position = 0; - - UInt8 *lengthOctets = (UInt8 *)[headerData subdataWithRange:NSMakeRange(position, MIN(5,headerData.length))].bytes; - UInt32 headerLength = 0; - UInt32 subpacketLength = 0; - - if (lengthOctets[0] < 192) { - // subpacketLen = 1st_octet; - subpacketLength = lengthOctets[0]; - headerLength = 1 ; - } else if (lengthOctets[0] >= 192 && lengthOctets[0] < 255) { - // subpacketLen = ((1st_octet - 192) << 8) + (2nd_octet) + 192 - subpacketLength = ((lengthOctets[0] - 192) << 8) + (lengthOctets[1]) + 192; - headerLength = 2; - } else if (lengthOctets[0] == 255) { - // subpacketLen = (2nd_octet << 24) | (3rd_octet << 16) | - // (4th_octet << 8) | 5th_octet - subpacketLength = (lengthOctets[1] << 24) | (lengthOctets[2] << 16) | (lengthOctets[3] << 8) | lengthOctets[4]; - headerLength = 5; - } - position = position + headerLength; - - //TODO: Bit 7 of the subpacket type is the "critical" bit. - PGPSignatureSubpacketType subpacketType = 0; - [headerData getBytes:&subpacketType range:(NSRange){position, 1}]; - headerLength = headerLength + 1; - - // Note: "The length includes the type octet but not this length" - // Example: 02 19 01 - // length 0x02 = 2 - // type 0x19 = 25 - // body: 0x01 = 1 - // so... given body length is = 2 but body length is in fact = 1 - // this is because given body length include type octet which is from header namespace, not body really. - // I'm drunk, or person who defined it this way was drunk. - subpacketLength = subpacketLength - 1; - - PGPSignatureSubpacketHeader *subpacketHeader = [[PGPSignatureSubpacketHeader alloc] init]; - subpacketHeader.type = subpacketType; - subpacketHeader.headerLength = headerLength; - subpacketHeader.bodyLength = subpacketLength; - - return subpacketHeader; + + NSData *lengthData = buildNewFormatLengthBytesForData(bodyData); + + // build final data + NSMutableData *outputData = [NSMutableData data]; + [outputData appendData:lengthData]; + [outputData appendData:bodyData]; + return [outputData copy]; } diff --git a/ObjectivePGP/PGPSubKey.h b/ObjectivePGP/PGPSubKey.h index 56929010..99ecc846 100644 --- a/ObjectivePGP/PGPSubKey.h +++ b/ObjectivePGP/PGPSubKey.h @@ -2,24 +2,12 @@ // PGPSubKey.h // ObjectivePGP // -// Created by Marcin Krzyzanowski on 16/05/14. -// Copyright (c) 2014 Marcin Krzyżanowski. All rights reserved. +// Created by Marcin Krzyzanowski on 19/01/15. +// Copyright (c) 2015 Marcin Krzyżanowski. All rights reserved. // -#import #import "PGPKey.h" -#import "PGPPacket.h" -#import "PGPSignaturePacket.h" -#import "PGPKeyID.h" @interface PGPSubKey : PGPKey -@property (strong, nonatomic) PGPPacket * primaryKeyPacket; -@property (strong) PGPSignaturePacket *bindingSignature; -@property (strong, nonatomic) PGPSignaturePacket *revocationSignature; -@property (nonatomic, readonly) PGPKeyID *keyID; - -- (instancetype) initWithPacket:(PGPPacket *)packet; -- (NSArray *) allPackets; - @end diff --git a/ObjectivePGP/PGPSubKey.m b/ObjectivePGP/PGPSubKey.m index 9ac14343..139e79eb 100644 --- a/ObjectivePGP/PGPSubKey.m +++ b/ObjectivePGP/PGPSubKey.m @@ -2,50 +2,12 @@ // PGPSubKey.m // ObjectivePGP // -// Created by Marcin Krzyzanowski on 16/05/14. -// Copyright (c) 2014 Marcin Krzyżanowski. All rights reserved. +// Created by Marcin Krzyzanowski on 19/01/15. +// Copyright (c) 2015 Marcin Krzyżanowski. All rights reserved. // #import "PGPSubKey.h" -#import "PGPPublicKeyPacket.h" @implementation PGPSubKey -- (instancetype) initWithPacket:(PGPPacket *)packet -{ - if (self = [self init]) { - self.primaryKeyPacket = packet; - } - return self; -} - -- (NSString *)description -{ - return [NSString stringWithFormat:@"%@ %@",[super description], [self.primaryKeyPacket description]]; -} - -- (PGPKeyID *)keyID -{ - //note: public key packet because this is main class for public and secret class - PGPPublicKeyPacket *primaryKeyPacket = (PGPPublicKeyPacket *)self.primaryKeyPacket; - PGPKeyID *keyID = [[PGPKeyID alloc] initWithFingerprint:primaryKeyPacket.fingerprint]; - return keyID; -} - -- (NSArray *) allPackets -{ - NSMutableArray *arr = [NSMutableArray array]; - - [arr addObject:self.primaryKeyPacket]; - - if (self.revocationSignature) { - [arr addObject:self.revocationSignature]; - } - - if (self.bindingSignature) { - [arr addObject:self.bindingSignature]; - } - - return [arr copy]; -} @end diff --git a/ObjectivePGP/PGPSymmetricallyEncryptedDataPacket.h b/ObjectivePGP/PGPSymmetricallyEncryptedDataPacket.h deleted file mode 100644 index f5e08c8d..00000000 --- a/ObjectivePGP/PGPSymmetricallyEncryptedDataPacket.h +++ /dev/null @@ -1,14 +0,0 @@ -// -// PGPSymmetricallyEncryptedDataPacket.h -// ObjectivePGP -// -// Created by Marcin Krzyzanowski on 11/06/14. -// Copyright (c) 2014 Marcin Krzyżanowski. All rights reserved. -// - -#import "PGPPacket.h" - -@interface PGPSymmetricallyEncryptedDataPacket : PGPPacket -@property (strong) NSData *encryptedData; - -@end diff --git a/ObjectivePGP/PGPSymmetricallyEncryptedDataPacket.m b/ObjectivePGP/PGPSymmetricallyEncryptedDataPacket.m deleted file mode 100644 index c8edc380..00000000 --- a/ObjectivePGP/PGPSymmetricallyEncryptedDataPacket.m +++ /dev/null @@ -1,47 +0,0 @@ -// -// PGPSymmetricallyEncryptedDataPacket.m -// ObjectivePGP -// -// Created by Marcin Krzyzanowski on 11/06/14. -// Copyright (c) 2014 Marcin Krzyżanowski. All rights reserved. -// -// Parse only - -#import "PGPSymmetricallyEncryptedDataPacket.h" -#import "PGPPublicKeyPacket.h" -#import "PGPCryptoUtils.h" -#import "PGPCryptoCFB.h" - -#import -#import -#import - -#include -#include -#include -#include -#include -#include -#include - -@implementation PGPSymmetricallyEncryptedDataPacket - -- (NSUInteger)parsePacketBody:(NSData *)packetBody error:(NSError *__autoreleasing *)error -{ - NSUInteger position = [super parsePacketBody:packetBody error:error]; - - self.encryptedData = [packetBody copy]; - - return position; -} - -- (NSData *)exportPacket:(NSError *__autoreleasing *)error -{ - NSAssert(self.encryptedData, @"Need encrypted data, use PGPSymmetricallyEncryptedIntegrityProtectedDataPacket instead"); - if (!self.encryptedData) - return nil; - - return self.encryptedData; -} - -@end diff --git a/ObjectivePGP/PGPSymmetricallyEncryptedIntegrityProtectedDataPacket.h b/ObjectivePGP/PGPSymmetricallyEncryptedIntegrityProtectedDataPacket.h deleted file mode 100644 index 29cd92a3..00000000 --- a/ObjectivePGP/PGPSymmetricallyEncryptedIntegrityProtectedDataPacket.h +++ /dev/null @@ -1,20 +0,0 @@ -// -// PGPSymmetricallyEncryptedDataPacket.h -// ObjectivePGP -// -// Created by Marcin Krzyzanowski on 04/06/14. -// Copyright (c) 2014 Marcin Krzyżanowski. All rights reserved. -// - -#import "PGPPacket.h" -#import "PGPSymmetricallyEncryptedDataPacket.h" - -@class PGPSecretKeyPacket, PGPPublicKeyPacket; - -@interface PGPSymmetricallyEncryptedIntegrityProtectedDataPacket : PGPSymmetricallyEncryptedDataPacket -@property (assign) NSUInteger version; - -- (void) encrypt:(NSData *)literalPacketData symmetricAlgorithm:(PGPSymmetricAlgorithm)sessionKeyAlgorithm sessionKeyData:(NSData *)sessionKeyData error:(NSError * __autoreleasing *)error; -- (NSData *) decryptWithSecretKeyPacket:(PGPSecretKeyPacket *)secretKeyPacket sessionKeyAlgorithm:(PGPSymmetricAlgorithm)sessionKeyAlgorithm sessionKeyData:(NSData *)sessionKeyData error:(NSError * __autoreleasing *)error; - -@end diff --git a/ObjectivePGP/PGPSymmetricallyEncryptedIntegrityProtectedDataPacket.m b/ObjectivePGP/PGPSymmetricallyEncryptedIntegrityProtectedDataPacket.m deleted file mode 100644 index 505aa389..00000000 --- a/ObjectivePGP/PGPSymmetricallyEncryptedIntegrityProtectedDataPacket.m +++ /dev/null @@ -1,242 +0,0 @@ -// -// PGPSymmetricallyEncryptedDataPacket.m -// ObjectivePGP -// -// Created by Marcin Krzyzanowski on 04/06/14. -// Copyright (c) 2014 Marcin Krzyżanowski. All rights reserved. -// - -#import "PGPSymmetricallyEncryptedIntegrityProtectedDataPacket.h" -#import "PGPSecretKeyPacket.h" -#import "PGPKey.h" -#import "PGPPublicKeyRSA.h" -#import "PGPCryptoCFB.h" -#import "PGPCryptoUtils.h" -#import "NSData+PGPUtils.h" -#import "PGPModificationDetectionCodePacket.h" -#import "PGPLiteralPacket.h" -#import "PGPCompressedPacket.h" -#import "PGPModificationDetectionCodePacket.h" - -#import -#import -#import - -#include -#include -#include -#include -#include -#include -#include - -@implementation PGPSymmetricallyEncryptedIntegrityProtectedDataPacket - -- (instancetype)init -{ - if (self = [super init]) { - _version = 1; - } - return self; -} - -- (PGPPacketTag)tag -{ - return PGPSymmetricallyEncryptedIntegrityProtectedDataPacketTag; // 18 -} - -- (NSUInteger)parsePacketBody:(NSData *)packetBody error:(NSError *__autoreleasing *)error -{ - NSUInteger position = 0; - - // The content of an encrypted data packet is more OpenPGP packets - // once decrypted, so recursively handle them - [packetBody getBytes:&_version range:(NSRange){position, 1}]; - position = position + 1; - - // - Encrypted data, the output of the selected symmetric-key cipher - // operating in OpenPGP's variant of Cipher Feedback (CFB) mode. - self.encryptedData = [packetBody subdataWithRange:(NSRange){position, packetBody.length - position}]; - position = position + self.encryptedData.length; - return position; -} - -- (NSData *)exportPacket:(NSError *__autoreleasing *)error -{ - NSAssert(self.encryptedData, @"No encrypted data?"); - NSAssert(self.version == 1, @"Require version == 1"); - - if (!self.encryptedData) - { - if (error) { - *error = [NSError errorWithDomain:PGPErrorDomain code:0 userInfo:@{NSLocalizedDescriptionKey: @"No encrypted data? try encrypt first"}]; - } - return nil; - } - - NSMutableData *bodyData = [NSMutableData data]; - // A one-octet version number. - [bodyData appendBytes:&_version length:1]; - // Encrypted data - [bodyData appendData:self.encryptedData]; - - NSMutableData *data = [NSMutableData data]; - NSData *headerData = [self buildHeaderData:bodyData]; - [data appendData: headerData]; - [data appendData: bodyData]; - return [data copy]; -} - -- (NSData *) decryptWithSecretKeyPacket:(PGPSecretKeyPacket *)secretKeyPacket sessionKeyAlgorithm:(PGPSymmetricAlgorithm)sessionKeyAlgorithm sessionKeyData:(NSData *)sessionKeyData error:(NSError * __autoreleasing *)error -{ - NSAssert(self.encryptedData, @"Missing encrypted data to decrypt"); - NSAssert(secretKeyPacket, @"Missing secret key"); - NSAssert(!secretKeyPacket.isEncryptedWithPassword, @"Decrypt secret key first"); - - if (!self.encryptedData) { - if (error) { - *error = [NSError errorWithDomain:PGPErrorDomain code:0 userInfo:@{NSLocalizedDescriptionKey: @"Missing encrypted data"}]; - } - return nil; - } - - if (secretKeyPacket.isEncryptedWithPassword) { - if (error) { - *error = [NSError errorWithDomain:PGPErrorDomain code:0 userInfo:@{NSLocalizedDescriptionKey: @"Encrypted secret key used to decryption. Decrypt key first"}]; - } - return nil; - } - - NSUInteger blockSize = [PGPCryptoUtils blockSizeOfSymmetricAlhorithm:sessionKeyAlgorithm]; - - // The Initial Vector (IV) is specified as all zeros. - NSMutableData *ivData = [NSMutableData dataWithLength:blockSize]; - - NSUInteger position = 0; - // preamble + data + mdc - NSData *decryptedData = [PGPCryptoCFB decryptData:self.encryptedData sessionKeyData:sessionKeyData symmetricAlgorithm:sessionKeyAlgorithm iv:ivData]; - // full prefix blockSize + 2 - NSData *prefixRandomFullData = [decryptedData subdataWithRange:(NSRange){position, blockSize + 2}]; - position = position + blockSize + 2; - - // check if suffix match - if (![[prefixRandomFullData subdataWithRange:(NSRange){blockSize + 2 - 4, 2}] isEqualToData:[prefixRandomFullData subdataWithRange:(NSRange){blockSize + 2 - 2, 2}]]) { - if (error) { - *error = [NSError errorWithDomain:PGPErrorDomain code:0 userInfo:@{NSLocalizedDescriptionKey: @"Random suffix mismatch"}]; - } - return nil; - } - - // read literal (or compressed) packet data - PGPPacket* plaintextPacket = [PGPPacketFactory packetWithData:decryptedData offset:position]; - - NSUInteger plaintextPacketLength = plaintextPacket.headerData.length + plaintextPacket.bodyData.length; - if (plaintextPacket.indeterminateLength) { - // adjust packet length required if packet length is not exactly set in header - int MDCLength = 22; - plaintextPacketLength = plaintextPacketLength - MDCLength; - } - - NSData *plaintextPacketData = [decryptedData subdataWithRange:(NSRange){position, plaintextPacketLength}]; - position = position + plaintextPacketLength; - - NSData *plaintextData = nil; - switch (plaintextPacket.tag) { - case PGPLiteralDataPacketTag: - { - PGPLiteralPacket *literalPacket = (PGPLiteralPacket *)plaintextPacket; - plaintextData = literalPacket.literalRawData; - } - break; - case PGPCompressedDataPacketTag: - { - PGPCompressedPacket *compressedPacket = (PGPCompressedPacket *)plaintextPacket; - NSData *literalPacketData = compressedPacket.decompressedData; - PGPLiteralPacket *literalPacket = (PGPLiteralPacket *)[PGPPacketFactory packetWithData:literalPacketData offset:0]; - plaintextData = literalPacket.literalRawData; - } - break; - default: - if (error) { - *error = [NSError errorWithDomain:PGPErrorDomain code:0 userInfo:@{NSLocalizedDescriptionKey: @"Unknown packet (expected literal or compressed)"}]; - } - return nil; - break; - } - - // mdc packet - NSAssert(position < decryptedData.length, @"Invalid packet length. Missing MDC?"); - - PGPModificationDetectionCodePacket *mdcPacket = (PGPModificationDetectionCodePacket *)[PGPPacketFactory packetWithData:decryptedData offset:position]; - NSAssert([mdcPacket isKindOfClass:[PGPModificationDetectionCodePacket class]], @"Invalid packet, expected MDC"); - - // validation: calculate MDC hash to check if literal data is modified - NSMutableData *toMDCData = [[NSMutableData alloc] init]; - // preamble - [toMDCData appendData:prefixRandomFullData]; - // plaintext - [toMDCData appendData:plaintextPacketData]; - // and then also includes two octets of values 0xD3, 0x14 (sha length) - UInt8 mdc_suffix[2] = {0xD3, 0x14}; - [toMDCData appendBytes:&mdc_suffix length:2]; - - NSData *mdcHash = [toMDCData pgp_SHA1]; - if (![mdcHash isEqualToData:mdcPacket.hashData]) { - if (error) { - *error = [NSError errorWithDomain:PGPErrorDomain code:0 userInfo:@{NSLocalizedDescriptionKey: @"MDC validation failed"}]; - } - return nil; - } - return plaintextData; -} - -- (void) encrypt:(NSData *)literalPacketData symmetricAlgorithm:(PGPSymmetricAlgorithm)sessionKeyAlgorithm sessionKeyData:(NSData *)sessionKeyData error:(NSError * __autoreleasing *)error -{ - // OpenPGP does symmetric encryption using a variant of Cipher Feedback mode (CFB mode). - NSUInteger blockSize = [PGPCryptoUtils blockSizeOfSymmetricAlhorithm:sessionKeyAlgorithm]; - - // The Initial Vector (IV) is specified as all zeros. - NSMutableData *ivData = [NSMutableData dataWithLength:blockSize]; - - // Prepare preamble - // Instead of using an IV, OpenPGP prefixes a string of length equal to the block size of the cipher plus two to the data before it is encrypted. - // The first block-size octets (for example, 8 octets for a 64-bit block length) are random, - NSMutableData *prefixRandomData = [NSMutableData dataWithCapacity:blockSize]; - - for (int i = 0; i < blockSize; i++) { - UInt8 byte = arc4random_uniform(255); - [prefixRandomData appendBytes:&byte length:1]; - } - - // and the following two octets are copies of the last two octets of the IV. - NSMutableData *prefixRandomFullData = [NSMutableData dataWithData:prefixRandomData]; - [prefixRandomFullData appendData:[prefixRandomData subdataWithRange:(NSRange){prefixRandomData.length - 2, 2}]]; - - // Prepare MDC Packet - NSMutableData *toMDCData = [[NSMutableData alloc] init]; - // preamble - [toMDCData appendData:prefixRandomFullData]; - // plaintext - [toMDCData appendData:literalPacketData]; - // and then also includes two octets of values 0xD3, 0x14 (sha length) - UInt8 mdc_suffix[2] = {0xD3, 0x14}; - [toMDCData appendBytes:&mdc_suffix length:2]; - - PGPModificationDetectionCodePacket *mdcPacket = [[PGPModificationDetectionCodePacket alloc] initWithData:toMDCData]; - NSData *mdcPacketData = [mdcPacket exportPacket:error]; - if (*error) { - return; - } - - // Finally build encrypted packet data - // Encrypt at once (the same encrypt key) preamble + data + mdc - NSMutableData *toEncrypt = [NSMutableData data]; - [toEncrypt appendData:prefixRandomFullData]; - [toEncrypt appendData:literalPacketData]; - [toEncrypt appendData:mdcPacketData]; - NSData *encrypted = [PGPCryptoCFB encryptData:toEncrypt sessionKeyData:sessionKeyData symmetricAlgorithm:sessionKeyAlgorithm iv:ivData]; - - self.encryptedData = encrypted; -} - -@end diff --git a/ObjectivePGP/PGPTrustPacket.h b/ObjectivePGP/PGPTrustPacket.h deleted file mode 100644 index db467268..00000000 --- a/ObjectivePGP/PGPTrustPacket.h +++ /dev/null @@ -1,18 +0,0 @@ -// -// PGPTrustPacket.h -// ObjectivePGP -// -// Created by Marcin Krzyzanowski on 06/05/14. -// Copyright (c) 2014 Marcin Krzyżanowski. All rights reserved. -// -// Tag 12 - -#import -#import "PGPPacketFactory.h" - -@interface PGPTrustPacket : PGPPacket - -@property (strong, readonly) NSData *data; - - -@end diff --git a/ObjectivePGP/PGPTrustPacket.m b/ObjectivePGP/PGPTrustPacket.m deleted file mode 100644 index c974ce0b..00000000 --- a/ObjectivePGP/PGPTrustPacket.m +++ /dev/null @@ -1,41 +0,0 @@ -// -// PGPTrustPacket.m -// ObjectivePGP -// -// Created by Marcin Krzyzanowski on 06/05/14. -// Copyright (c) 2014 Marcin Krzyżanowski. All rights reserved. -// - -#import "PGPTrustPacket.h" - -@interface PGPTrustPacket () -@property (strong, readwrite) NSData *data; -@end - -@implementation PGPTrustPacket - -- (PGPPacketTag)tag -{ - return PGPTrustPacketTag; -} - -- (NSUInteger) parsePacketBody:(NSData *)packetBody error:(NSError *__autoreleasing *)error -{ - NSUInteger position = [super parsePacketBody:packetBody error:error]; - - // 5.10. Trust Packet (Tag 12) - // The format of Trust packets is defined by a given implementation. - self.data = packetBody; - position = position + self.data.length; - return position; -} - - -- (NSData *) exportPacket:(NSError *__autoreleasing *)error -{ - //TODO: export trust packet - // (1 octet "level" (depth), 1 octet of trust amount) - return [self.data copy]; -} - -@end diff --git a/ObjectivePGP/PGPTypes.h b/ObjectivePGP/PGPTypes.h deleted file mode 100644 index 3c108bfd..00000000 --- a/ObjectivePGP/PGPTypes.h +++ /dev/null @@ -1,179 +0,0 @@ -// -// PGPTypes.h -// PGPKeyring -// -// Created by Marcin Krzyzanowski on 04/05/14. -// Copyright (c) 2014 Marcin Krzyżanowski. All rights reserved. -// - -#pragma once - -#ifndef NS_DESIGNATED_INITIALIZER -#define NS_DESIGNATED_INITIALIZER -#endif - -static NSString * const PGPErrorDomain = @"ObjectivePGP"; - -typedef NS_ENUM(NSInteger, PGPErrorCode) { - PGPErrorGeneral = -1, - PGPErrorPassphraseRequired = 5, - PGPErrorPassphraseInvalid = 6 -}; - -typedef NS_ENUM(NSInteger, PGPFormatType) { - PGPFormatUnknown = 0, - PGPFormatOld = 1, - PGPFormatNew = 2 -}; - -typedef NS_ENUM(NSUInteger, PGPHeaderPacketTag) { - PGPHeaderPacketTagNewFormat = 0x40, - PGPHeaderPacketTagAllwaysSet = 0x80 -}; - -typedef NS_ENUM(UInt8, PGPPacketTag) { - PGPInvalidPacketTag = 0, - PGPPublicKeyEncryptedSessionKeyPacketTag = 1, - PGPSignaturePacketTag = 2, - PGPSymetricKeyEncryptedSessionKeyPacketTag = 3, //TODO - PGPOnePassSignaturePacketTag = 4, - PGPSecretKeyPacketTag = 5, - PGPPublicKeyPacketTag = 6, - PGPSecretSubkeyPacketTag = 7, - PGPCompressedDataPacketTag = 8, - PGPSymmetricallyEncryptedDataPacketTag = 9, //TODO - PGPMarkerPacketTag = 10, //Ignored (Obsolete Literal Packet) - PGPLiteralDataPacketTag = 11, - PGPTrustPacketTag = 12, - PGPUserIDPacketTag = 13, - PGPPublicSubkeyPacketTag = 14, - PGPUserAttributePacketTag = 17, - PGPSymmetricallyEncryptedIntegrityProtectedDataPacketTag = 18, - PGPModificationDetectionCodePacketTag = 19, -}; - -// 9.1. Public-Key Algorithms -typedef NS_ENUM(UInt8, PGPPublicKeyAlgorithm) { - PGPPublicKeyAlgorithmRSA = 1, - PGPPublicKeyAlgorithmRSAEncryptOnly = 2, - PGPPublicKeyAlgorithmRSASignOnly = 3, - PGPPublicKeyAlgorithmElgamal = 16,// Elgamal (Encrypt-Only) - PGPPublicKeyAlgorithmDSA = 17, - PGPPublicKeyAlgorithmElliptic = 18, - PGPPublicKeyAlgorithmECDSA = 19, - PGPPublicKeyAlgorithmElgamalEncryptorSign = 20,// Deprecated ? - PGPPublicKeyAlgorithmDiffieHellman = 21, - PGPPublicKeyAlgorithmPrivate1 = 100, - PGPPublicKeyAlgorithmPrivate2 = 101, - PGPPublicKeyAlgorithmPrivate3 = 102, - PGPPublicKeyAlgorithmPrivate4 = 103, - PGPPublicKeyAlgorithmPrivate5 = 104, - PGPPublicKeyAlgorithmPrivate6 = 105, - PGPPublicKeyAlgorithmPrivate7 = 106, - PGPPublicKeyAlgorithmPrivate8 = 107, - PGPPublicKeyAlgorithmPrivate9 = 108, - PGPPublicKeyAlgorithmPrivate10 = 109, - PGPPublicKeyAlgorithmPrivate11 = 110 -}; - -// 9.2. Symmetric-Key Algorithms -typedef NS_ENUM(UInt8, PGPSymmetricAlgorithm) { - PGPSymmetricPlaintext = 0, - PGPSymmetricIDEA = 1, // 8 bytes (64-bit) block size, key length: 2 bytes (16 bit) - PGPSymmetricTripleDES = 2, // 8 bytes (64-bit) block size - PGPSymmetricCAST5 = 3, // aka CAST-128 is a symmetric block cipher with a block-size of 8 bytes (64bit) and a variable key-size of up to 16 bytes (128 bits). - PGPSymmetricBlowfish = 4, // 8 bytes (64 bit) block size, key length: 16 bits (4-56 bits) - PGPSymmetricAES128 = 7, // 16 bytes (128 bit), key length 128 bit - PGPSymmetricAES192 = 8, // 16 bytes (128 bit), key length 192 bit - PGPSymmetricAES256 = 9, // 16 bytes (128 bit), key length 256 bit - PGPSymmetricTwofish256 = 10 // 16 bytes (128 bit) -}; - -// 9.4. Hash Algorithms -typedef NS_ENUM(UInt8, PGPHashAlgorithm) { - PGPHashMD5 = 1, //MD5 - deprecated - PGPHashSHA1 = 2, //SHA1 - required - PGPHashRIPEMD160 = 3, //RIPEMD160 - PGPHashSHA256 = 8, //SHA256 - PGPHashSHA384 = 9, //SHA384 - PGPHashSHA512 = 10,//SHA512 - PGPHashSHA224 = 11 //SHA224 -}; - -typedef NS_ENUM(UInt8, PGPSignatureType) { - PGPSignatureBinaryDocument = 0x00, - PGPSignatureCanonicalTextDocument = 0x01, - PGPSignatureStandalone = 0x02, - PGPSignatureGenericCertificationUserIDandPublicKey = 0x10, // Self-Signature - PGPSignaturePersonalCertificationUserIDandPublicKey = 0x11, // Self-Signature - PGPSignatureCasualCertificationUserIDandPublicKey = 0x12, // Self-Signature - PGPSignaturePositiveCertificationUserIDandPublicKey = 0x13, // Self-Signature - PGPSignatureSubkeyBinding = 0x18, // Self-Signature - PGPSignaturePrimaryKeyBinding = 0x19, - PGPSignatureDirectlyOnKey = 0x1F, // 0x1F: Signature directly on a key (key) - Self-Signature - PGPSignatureKeyRevocation = 0x20, // 0x20: Key revocation signature (key_revocation) - PGPSignatureSubkeyRevocation = 0x28, // 0x28: Subkey revocation signature (subkey_revocation) - PGPSignatureCertificationRevocation = 0x30, // 0x30: Certification revocation signature (cert_revocation) - PGPSignatureTimestamp = 0x40, - PGPSignature3PartyConfirmation = 0x50 -}; - -typedef NS_ENUM(UInt8, PGPSignatureSubpacketType) { - PGPSignatureSubpacketTypeSignatureCreationTime = 2, - PGPSignatureSubpacketTypeSignatureExpirationTime = 3, - PGPSignatureSubpacketTypeExportableCertification = 4, - PGPSignatureSubpacketTypeTrustSignature = 5, //TODO - PGPSignatureSubpacketTypeRegularExpression = 6, //TODO - PGPSignatureSubpacketTypeRevocable = 7, //TODO - PGPSignatureSubpacketTypeKeyExpirationTime = 9, - PGPSignatureSubpacketTypePreferredSymetricAlgorithm = 11, - PGPSignatureSubpacketTypeRevocationKey = 12,//TODO - PGPSignatureSubpacketTypeIssuerKeyID = 16, - PGPSignatureSubpacketTypeNotationData = 20,//TODO - PGPSignatureSubpacketTypePreferredHashAlgorithm = 21, - PGPSignatureSubpacketTypePreferredCompressionAlgorithm = 22, - PGPSignatureSubpacketTypeKeyServerPreference = 23, - PGPSignatureSubpacketTypePreferredKeyServer = 24, - PGPSignatureSubpacketTypePrimaryUserID = 25, - PGPSignatureSubpacketTypePolicyURI = 26, - PGPSignatureSubpacketTypeKeyFlags = 27, - PGPSignatureSubpacketTypeSignerUserID = 28, - PGPSignatureSubpacketTypeReasonForRevocation = 29, - PGPSignatureSubpacketTypeFeatures = 30, - PGPSignatureSubpacketTypeSignatureTarget = 31,//TODO - PGPSignatureSubpacketTypeEmbeddedSignature = 32 //TODO -}; - -// 5.2.3.21. Key Flags -typedef NS_ENUM(UInt8, PGPSignatureFlags) { - PGPSignatureFlagAllowCertifyOtherKeys = 0x01,// indicates that this key may be used to certify other keys - PGPSignatureFlagAllowSignData = 0x02,// indicates that this key may be used to sign data. - PGPSignatureFlagAllowEncryptCommunications = 0x04,// indicates that this key may be used to encrypt communication. - PGPSignatureFlagAllowEncryptStorage = 0x08,// indicates that this key may be used to encrypt storage. - PGPSignatureFlagSecretComponentMayBeSplit = 0x10,// indicates that the secret components of this key may have been split using a secret-sharing mechanism. - PGPSignatureFlagAllowAuthentication = 0x20,// indicates that this key may be used for authentication. - PGPSignatureFlagPrivateKeyMayBeInThePossesionOfManyPersons = 0x80 // indicates that the secret components of this key may be in the possession of more than one person. -}; - -// 5.2.3.17. Key Server Preferences -typedef NS_ENUM(UInt8, PGPKeyServerPreferenceFlags) { - PGPKeyServerPreferenceNoModify = 0x80 // No-modify -}; - -// 5.2.3.24. Features -typedef NS_ENUM(UInt8, PGPFeature) { - PGPFeatureModificationDetection = 0x01 // Modification Detection (packets 18 and 19) -}; - -// 3.7.1. String-to-Key (S2K) Specifier Types -typedef NS_ENUM(UInt8, PGPS2KSpecifier) { - PGPS2KSpecifierSimple = 0, - PGPS2KSpecifierSalted = 1, - PGPS2KSpecifierIteratedAndSalted = 3 -}; - -typedef NS_ENUM(UInt8, PGPS2KUsage) { - PGPS2KUsageNone = 0, - PGPS2KUsageEncryptedAndHashed = 254, - PGPS2KUsageEncrypted = 255 -}; diff --git a/ObjectivePGP/PGPUser.h b/ObjectivePGP/PGPUser.h index cb777552..107d6f61 100644 --- a/ObjectivePGP/PGPUser.h +++ b/ObjectivePGP/PGPUser.h @@ -2,27 +2,19 @@ // PGPUser.h // ObjectivePGP // -// Created by Marcin Krzyzanowski on 15/05/14. -// Copyright (c) 2014 Marcin Krzyżanowski. All rights reserved. +// Created by Marcin Krzyzanowski on 30/01/15. +// Copyright (c) 2015 Marcin Krzyżanowski. All rights reserved. // #import -#import "PGPPacket.h" - -@class PGPUserIDPacket, PGPUserAttributePacket, PGPSignaturePacket, PGPKey; +#import "PGPUserIDPacket.h" @interface PGPUser : NSObject -@property (strong, nonatomic) NSString *userID; -@property (strong, nonatomic) PGPUserAttributePacket *userAttribute; -@property (strong, nonatomic) NSArray *selfCertifications; -@property (strong, nonatomic) NSArray *otherSignatures; -@property (strong, nonatomic) NSArray *revocationSignatures; - -@property (strong, nonatomic) PGPUserIDPacket *userIDPacket; - -- (instancetype) initWithUserIDPacket:(PGPUserIDPacket *)userPacket; -- (NSArray *) allPackets; -- (PGPSignaturePacket *) validSelfCertificate:(PGPKey *)key; +@property (strong, readonly) PGPUserIDPacket *packet; +@property (copy) NSString *userID; +//@property (copy) NSArray *selfCertifications; // me +//@property (copy) NSArray *otherCertifications; // others +- (instancetype)initWithPacket:(PGPUserIDPacket *)packet NS_DESIGNATED_INITIALIZER; @end diff --git a/ObjectivePGP/PGPUser.m b/ObjectivePGP/PGPUser.m index b42484cc..13da735d 100644 --- a/ObjectivePGP/PGPUser.m +++ b/ObjectivePGP/PGPUser.m @@ -2,168 +2,22 @@ // PGPUser.m // ObjectivePGP // -// Created by Marcin Krzyzanowski on 15/05/14. -// Copyright (c) 2014 Marcin Krzyżanowski. All rights reserved. +// Created by Marcin Krzyzanowski on 30/01/15. +// Copyright (c) 2015 Marcin Krzyżanowski. All rights reserved. // #import "PGPUser.h" -#import "PGPSignaturePacket.h" -#import "PGPPublicKeyPacket.h" -#import "PGPUserIDPacket.h" -#import "PGPKey.h" -#import "PGPUserAttributePacket.h" @implementation PGPUser -- (instancetype) initWithUserIDPacket:(PGPUserIDPacket *)userPacket +- (instancetype)initWithPacket:(PGPUserIDPacket *)packet { - if (self = [self init]) { - _userIDPacket = userPacket; + if (self = [super init]) { + NSAssert([packet isKindOfClass:[PGPUserIDPacket class]], @"Invalid class"); + _packet = packet; + _userID = packet.userID; } return self; } -- (NSString *)userID -{ - return self.userIDPacket.userID; -} - -- (NSUInteger)hash -{ - NSUInteger prime = 31; - NSUInteger result = 1; - - result = prime * result + [_userID hash]; - result = prime * result + [_userAttribute hash]; - result = prime * result + [_selfCertifications hash]; - result = prime * result + [_otherSignatures hash]; - result = prime * result + [_revocationSignatures hash]; - result = prime * result + [_userIDPacket hash]; - - return result; -} - -- (NSArray *)otherSignatures -{ - if (!_otherSignatures) { - _otherSignatures = [NSArray array]; - } - return _otherSignatures; -} - -- (NSArray *)revocationSignatures -{ - if (!_revocationSignatures) { - _revocationSignatures = [NSArray array]; - } - return _revocationSignatures; -} - -- (NSArray *)selfCertifications -{ - if (!_selfCertifications) { - _selfCertifications = [NSArray array]; - } - return _selfCertifications; -} - -- (PGPUserIDPacket *)userIDPacket -{ - if (!_userIDPacket) { - NSAssert(false, @"wat?"); - // build userIDPacket - } - return _userIDPacket; -} - -- (NSString *)description -{ - return [NSString stringWithFormat:@"%@ %@",[super description], self.userID]; -} - -- (NSArray *) allPackets -{ - NSMutableArray *arr = [NSMutableArray array]; - - if (self.userIDPacket) { - [arr addObject:self.userIDPacket]; //TODO: || [arr addObject:self.userAttribute] - } - - for (id packet in self.revocationSignatures) { - [arr addObject:packet]; - } - - for (id packet in self.selfCertifications) { - [arr addObject:packet]; - } - - for (id packet in self.otherSignatures) { - [arr addObject:packet]; - } - - return [arr copy]; -} - -//TODO: -//User.prototype.getValidSelfCertificate = function(primaryKey) { -// if (!this.selfCertifications) { -// return null; -// } -// var validCert = []; -// for (var i = 0; i < this.selfCertifications.length; i++) { -// if (this.isRevoked(this.selfCertifications[i], primaryKey)) { -// continue; -// } -// if (!this.selfCertifications[i].isExpired() && -// (this.selfCertifications[i].verified || -// this.selfCertifications[i].verify(primaryKey, {userid: this.userId || this.userAttribute, key: primaryKey}))) { -// validCert.push(this.selfCertifications[i]); -// } -// } -// // most recent first -// validCert = validCert.sort(function(a, b) { -// a = a.created; -// b = b.created; -// return a>b ? -1 : a= 192 && lengthOctets[0] <= 223) { -// // 4.2.2.2. Two-Octet Lengths -// // bodyLen = ((1st_octet - 192) << 8) + (2nd_octet) + 192 -// subpacketLength = ((lengthOctets[0] - 192) << 8) + (lengthOctets[1]) + 192; -// lengthLength = 2; -// } else { -// // 4.2.2.3. Five-Octet Length -// // bodyLen = (2nd_octet << 24) | (3rd_octet << 16) | -// // (4th_octet << 8) | 5th_octet -// subpacketLength = (lengthOctets[1] << 24) | (lengthOctets[2] << 16) | (lengthOctets[3] << 8) | lengthOctets[4]; -// lengthLength = 5; -// } -// NSLog(@"PGPUserAttributePacket subpacketLength %@ (%@)",@(subpacketLength), @(lengthLength)); -// position = position + lengthLength; -// -// UInt8 subpacketType = 0; -// [packetBody getBytes:&subpacketType range:(NSRange){position, 1}]; -// position = position + 1; -// -//// PGPUserAttributeSubpacket *subpacket = [[PGPUserAttributeSubpacket alloc] init]; -//// subpacket.type = subpacketType; -//// subpacket.valueData = [packetBody subdataWithRange:(NSRange){position, subpacketLength}]; -//// position = position + subpacketLength; -//// -//// self.subpackets = [self.subpackets arrayByAddingObject:subpacket]; -// } - - return position; -} - -- (NSData *)exportPacket:(NSError *__autoreleasing *)error -{ - //TODO: export - return nil; -} - -- (NSUInteger)hash -{ - NSUInteger prime = 31; - NSUInteger result = 1; - - result = prime * result + self.tag; - result = prime * result + [_subpackets hash]; - - return result; -} - -@end diff --git a/ObjectivePGP/PGPUserAttributeSubpacket.h b/ObjectivePGP/PGPUserAttributeSubpacket.h deleted file mode 100644 index 46f94673..00000000 --- a/ObjectivePGP/PGPUserAttributeSubpacket.h +++ /dev/null @@ -1,19 +0,0 @@ -// -// PGPUserAttributeSubpacket.h -// ObjectivePGP -// -// Created by Marcin Krzyzanowski on 24/05/14. -// Copyright (c) 2014 Marcin Krzyżanowski. All rights reserved. -// - -#import - - -@interface PGPUserAttributeSubpacket : NSObject - -// Subpacket types 100 through 110 are reserved for private or experimental use. -@property (assign) UInt8 type; -// Value -@property (strong) NSData *valueData; - -@end diff --git a/ObjectivePGP/PGPUserAttributeSubpacket.m b/ObjectivePGP/PGPUserAttributeSubpacket.m deleted file mode 100644 index fdfcf2b7..00000000 --- a/ObjectivePGP/PGPUserAttributeSubpacket.m +++ /dev/null @@ -1,13 +0,0 @@ -// -// PGPUserAttributeSubpacket.m -// ObjectivePGP -// -// Created by Marcin Krzyzanowski on 24/05/14. -// Copyright (c) 2014 Marcin Krzyżanowski. All rights reserved. -// - -#import "PGPUserAttributeSubpacket.h" - -@implementation PGPUserAttributeSubpacket - -@end diff --git a/ObjectivePGP/PGPUserIDPacket.h b/ObjectivePGP/PGPUserIDPacket.h deleted file mode 100644 index b3fbdd0e..00000000 --- a/ObjectivePGP/PGPUserIDPacket.h +++ /dev/null @@ -1,17 +0,0 @@ -// -// PGPUserID.h -// ObjectivePGP -// -// Created by Marcin Krzyzanowski on 05/05/14. -// Copyright (c) 2014 Marcin Krzyżanowski. All rights reserved. -// -// Tag 13 - -#import -#import "PGPPacketFactory.h" - -@interface PGPUserIDPacket : PGPPacket - -@property (retain, readonly) NSString *userID; - -@end diff --git a/ObjectivePGP/PGPUserIDPacket.m b/ObjectivePGP/PGPUserIDPacket.m deleted file mode 100644 index 66d4be78..00000000 --- a/ObjectivePGP/PGPUserIDPacket.m +++ /dev/null @@ -1,49 +0,0 @@ -// -// PGPUserID.m -// ObjectivePGP -// -// Created by Marcin Krzyzanowski on 05/05/14. -// Copyright (c) 2014 Marcin Krzyżanowski. All rights reserved. -// - -#import "PGPUserIDPacket.h" - -@interface PGPPacket () -@property (copy, readwrite) NSData *headerData; -@property (copy, readwrite) NSData *bodyData; -@end - -@implementation PGPUserIDPacket - -- (PGPPacketTag)tag -{ - return PGPUserIDPacketTag; -} - -- (NSString *)description -{ - return [NSString stringWithFormat:@"%@ %@",[super description], self.userID]; -} - -- (NSUInteger) parsePacketBody:(NSData *)packetBody error:(NSError *__autoreleasing *)error -{ - NSUInteger position = [super parsePacketBody:packetBody error:error]; - - _userID = [[NSString alloc] initWithData:packetBody encoding:NSUTF8StringEncoding]; - position = position + packetBody.length; - - return position; -} - -- (NSData *) exportPacket:(NSError *__autoreleasing *)error -{ - NSMutableData *data = [NSMutableData data]; - NSData *bodyData = [self.userID dataUsingEncoding:NSUTF8StringEncoding]; - NSData *headerData = [self buildHeaderData:bodyData]; - [data appendData: headerData]; - [data appendData: bodyData]; - return [data copy]; -} - - -@end diff --git a/ObjectivePGP/Packets/PGPPublicKeyPacket.h b/ObjectivePGP/Packets/PGPPublicKeyPacket.h new file mode 100644 index 00000000..714b9de0 --- /dev/null +++ b/ObjectivePGP/Packets/PGPPublicKeyPacket.h @@ -0,0 +1,47 @@ +// +// PGPPublicKeyPacket.h +// ObjectivePGP +// +// Created by Marcin Krzyzanowski on 18/01/15. +// Copyright (c) 2015 Marcin Krzyżanowski. All rights reserved. +// + +#import + +// 9.1. Public-Key Algorithms +typedef NS_ENUM(UInt8, PGPPublicKeyAlgorithm) { + PGPPublicKeyAlgorithmRSA = 1, + PGPPublicKeyAlgorithmRSAEncryptOnly = 2, + PGPPublicKeyAlgorithmRSASignOnly = 3, + PGPPublicKeyAlgorithmElgamal = 16,// Elgamal (Encrypt-Only) + PGPPublicKeyAlgorithmDSA = 17, + PGPPublicKeyAlgorithmElliptic = 18, + PGPPublicKeyAlgorithmECDSA = 19, + PGPPublicKeyAlgorithmElgamalEncryptorSign = 20,// Deprecated ? + PGPPublicKeyAlgorithmDiffieHellman = 21, + PGPPublicKeyAlgorithmPrivate1 = 100, + PGPPublicKeyAlgorithmPrivate2 = 101, + PGPPublicKeyAlgorithmPrivate3 = 102, + PGPPublicKeyAlgorithmPrivate4 = 103, + PGPPublicKeyAlgorithmPrivate5 = 104, + PGPPublicKeyAlgorithmPrivate6 = 105, + PGPPublicKeyAlgorithmPrivate7 = 106, + PGPPublicKeyAlgorithmPrivate8 = 107, + PGPPublicKeyAlgorithmPrivate9 = 108, + PGPPublicKeyAlgorithmPrivate10 = 109, + PGPPublicKeyAlgorithmPrivate11 = 110, +}; + +@interface PGPPublicKeyPacket : NSObject +@property (assign) NSUInteger version; // 0x03 or 0x04 +@property (copy) NSDate *createDate; +@property (assign) PGPPublicKeyAlgorithm keyAlgorithm; +@property (assign) NSUInteger validityPeriod; // v3 only +@property (strong) NSOrderedSet *MPIs; // key algorithm specific MPIs + ++ (instancetype) readFromStream:(NSInputStream *)inputStream maxLength:(NSUInteger)maxLength error:(NSError * __autoreleasing *)error; +- (BOOL) writeToStream:(NSOutputStream *)outputStream error:(NSError * __autoreleasing *)error; +- (NSData *) buildData:(NSError * __autoreleasing *)error; +- (NSData *) mpiForIdentifier:(NSString *)key; + +@end diff --git a/ObjectivePGP/Packets/PGPPublicKeyPacket.m b/ObjectivePGP/Packets/PGPPublicKeyPacket.m new file mode 100644 index 00000000..b0cb5e98 --- /dev/null +++ b/ObjectivePGP/Packets/PGPPublicKeyPacket.m @@ -0,0 +1,158 @@ +// +// PGPPublicKeyPacket.m +// ObjectivePGP +// +// Created by Marcin Krzyzanowski on 18/01/15. +// Copyright (c) 2015 Marcin Krzyżanowski. All rights reserved. +// +// 5.5.1.1. Public-Key Packet (Tag 6) +// A Public-Key packet starts a series of packets that forms an OpenPGP +// key (sometimes called an OpenPGP certificate). + + +#import "PGPPublicKeyPacket.h" +#import "PGPCommon.h" +#import "NSInputStream+PGP.h" +#import "NSOutputStream+PGP.h" +#import "PGPMPI.h" +#import "NSMutableData+PGP.h" + +@implementation PGPPublicKeyPacket + ++ (instancetype) readFromStream:(NSInputStream *)inputStream maxLength:(NSUInteger)maxLength error:(NSError * __autoreleasing *)error +{ + PGPPublicKeyPacket *packet = [[PGPPublicKeyPacket alloc] init]; + + // A one-octet version number + UInt8 version = [inputStream readUInt8]; + packet.version = version; + NSAssert(version >= 0x03 && version <= 0x04, @"Version not supported"); + if (version < 0x03 && version > 0x04) { + if (error) { + *error = [NSError errorWithDomain:PGPErrorDomain code:0 userInfo:@{NSLocalizedDescriptionKey: [NSString stringWithFormat:@"Version %@ not supported", @(version)]}]; + } + return nil; + } + + // A four-octet number denoting the time that the key was created. + UInt32 timestamp = [inputStream readUInt32BE]; + if (timestamp) { + packet.createDate = [NSDate dateWithTimeIntervalSince1970:timestamp]; + } + + if (version == 0x03) { + // A two-octet number denoting the time in days that this key is + // valid. If this number is zero, then it does not expire. + UInt16 validityPeriod = [inputStream readUInt16BE]; + packet.validityPeriod = validityPeriod; + } + + // A one-octet number denoting the public-key algorithm of this key. + packet.keyAlgorithm = [inputStream readUInt8]; + + // A series of multiprecision integers comprising the key material. + NSMutableOrderedSet *mpis = [NSMutableOrderedSet orderedSet]; + switch (packet.keyAlgorithm) { + case PGPPublicKeyAlgorithmRSA: + case PGPPublicKeyAlgorithmRSAEncryptOnly: + case PGPPublicKeyAlgorithmRSASignOnly: + { + // MPI of RSA public modulus n; + PGPMPI *mpiN = [PGPMPI readFromStream:inputStream error:error]; + mpiN.identifier = @"N"; + [mpis addObject:mpiN]; + // MPI of RSA public encryption exponent e. + PGPMPI *mpiE = [PGPMPI readFromStream:inputStream error:error]; + mpiE.identifier = @"E"; + [mpis addObject:mpiE]; + } + break; + case PGPPublicKeyAlgorithmDSA: + case PGPPublicKeyAlgorithmECDSA: + { + // MPI of DSA prime p; + PGPMPI *mpiP = [PGPMPI readFromStream:inputStream error:error]; + mpiP.identifier = @"P"; + [mpis addObject:mpiP]; + + //MPI of DSA group order q (q is a prime divisor of p-1); + PGPMPI *mpiQ = [PGPMPI readFromStream:inputStream error:error]; + mpiQ.identifier = @"Q"; + [mpis addObject:mpiQ]; + + //MPI of DSA group generator g; + PGPMPI *mpiG = [PGPMPI readFromStream:inputStream error:error]; + mpiG.identifier = @"G"; + [mpis addObject:mpiG]; + + //MPI of DSA public-key value y (= g**x mod p where x is secret). + PGPMPI *mpiY = [PGPMPI readFromStream:inputStream error:error]; + mpiY.identifier = @"Y"; + [mpis addObject:mpiY]; + } + break; + case PGPPublicKeyAlgorithmElgamal: + case PGPPublicKeyAlgorithmElgamalEncryptorSign: + { + //MPI of Elgamal prime p; + PGPMPI *mpiP = [PGPMPI readFromStream:inputStream error:error]; + mpiP.identifier = @"P"; + [mpis addObject:mpiP]; + + //MPI of Elgamal group generator g; + PGPMPI *mpiG = [PGPMPI readFromStream:inputStream error:error]; + mpiG.identifier = @"G"; + [mpis addObject:mpiG]; + + //MPI of Elgamal public key value y (= g**x mod p where x is secret). + PGPMPI *mpiY = [PGPMPI readFromStream:inputStream error:error]; + mpiY.identifier = @"Y"; + [mpis addObject:mpiY]; + } + break; + default: + if (error) { + *error = [NSError errorWithDomain:PGPErrorDomain code:0 userInfo:@{NSLocalizedDescriptionKey: [NSString stringWithFormat:@"Public key algorithm %@ is not supported", @(packet.keyAlgorithm)]}]; + } + return nil; + } + + packet.MPIs = [mpis copy]; + return packet; +} + +- (BOOL) writeToStream:(NSOutputStream *)outputStream error:(NSError * __autoreleasing *)error +{ + NSParameterAssert(outputStream); + NSData *packetData = [self buildData:error]; + if (!packetData || *error) { + return NO; + } + return [outputStream writeData:packetData]; +} + +- (NSData *) buildData:(NSError * __autoreleasing *)error +{ + NSMutableData *outputData = [NSMutableData data]; + + [outputData appendUInt8:self.version]; + [outputData appendUInt32BE:[self.createDate timeIntervalSince1970]]; + if (self.version == 0x03) { + [outputData appendUInt16BE:self.validityPeriod]; + } + [outputData appendUInt8:self.keyAlgorithm]; + + for (PGPMPI *mpi in self.MPIs) { + [outputData appendData:[mpi buildData:error]]; + } + + return [outputData copy]; +} + +- (NSData *) mpiForIdentifier:(NSString *)key +{ + NSParameterAssert(key); + return [[self.MPIs filteredOrderedSetUsingPredicate:[NSPredicate predicateWithFormat:@"SELF.identifier == %@", key]] firstObject]; +} + +@end diff --git a/ObjectivePGP/Packets/PGPSignaturePacket.h b/ObjectivePGP/Packets/PGPSignaturePacket.h new file mode 100644 index 00000000..a0bfc28b --- /dev/null +++ b/ObjectivePGP/Packets/PGPSignaturePacket.h @@ -0,0 +1,63 @@ +// +// PGPSignaturePacket.h +// ObjectivePGP +// +// Created by Marcin Krzyzanowski on 17/01/15. +// Copyright (c) 2015 Marcin Krzyżanowski. All rights reserved. +// + +#import +#import "PGPPublicKeyPacket.h" +#import "PGPSignatureSubpacket.h" +#import "PGPCommon.h" +#import "PGPKeyID.h" +#import "PGPUser.h" +#import "PGPKey.h" + +// 5.2.3.21. Key Flags +typedef NS_ENUM(UInt8, PGPSignatureFlags) { + PGPSignatureFlagAllowCertifyOtherKeys = 0x01,// indicates that this key may be used to certify other keys + PGPSignatureFlagAllowSignData = 0x02,// indicates that this key may be used to sign data. + PGPSignatureFlagAllowEncryptCommunications = 0x04,// indicates that this key may be used to encrypt communication. + PGPSignatureFlagAllowEncryptStorage = 0x08,// indicates that this key may be used to encrypt storage. + PGPSignatureFlagSecretComponentMayBeSplit = 0x10,// indicates that the secret components of this key may have been split using a secret-sharing mechanism. + PGPSignatureFlagAllowAuthentication = 0x20,// indicates that this key may be used for authentication. + PGPSignatureFlagPrivateKeyMayBeInThePossesionOfManyPersons = 0x80 // indicates that the secret components of this key may be in the possession of more than one person. +}; + + +typedef NS_ENUM(UInt8, PGPSignatureType) { + PGPSignatureBinaryDocument = 0x00, + PGPSignatureCanonicalTextDocument = 0x01, + PGPSignatureStandalone = 0x02, + PGPSignatureGenericCertificationUserIDandPublicKey = 0x10, // Self-Signature + PGPSignaturePersonalCertificationUserIDandPublicKey = 0x11, // Self-Signature + PGPSignatureCasualCertificationUserIDandPublicKey = 0x12, // Self-Signature + PGPSignaturePositiveCertificationUserIDandPublicKey = 0x13, // Self-Signature + PGPSignatureSubkeyBinding = 0x18, // Self-Signature + PGPSignaturePrimaryKeyBinding = 0x19, + PGPSignatureDirectlyOnKey = 0x1F, // 0x1F: Signature directly on a key (key) - Self-Signature + PGPSignatureKeyRevocation = 0x20, // 0x20: Key revocation signature (key_revocation) + PGPSignatureSubkeyRevocation = 0x28, // 0x28: Subkey revocation signature (subkey_revocation) + PGPSignatureCertificationRevocation = 0x30, // 0x30: Certification revocation signature (cert_revocation) + PGPSignatureTimestamp = 0x40, + PGPSignature3PartyConfirmation = 0x50 +}; + +@interface PGPSignaturePacket : NSObject +@property (assign) UInt8 version; +@property (assign) PGPSignatureType signatureType; +@property (copy) NSDate *creationDate; +@property (assign) PGPPublicKeyAlgorithm publicKeyAlgorithm; +@property (assign) PGPHashAlgorithm hashAlgoritm; +@property (copy) NSOrderedSet *MPIs; // key algorithm specific MPIs + +@property (assign) UInt16 hashValue; +@property (strong) PGPKeyID *issuerKeyID; + ++ (instancetype) readFromStream:(NSInputStream *)inputStream error:(NSError * __autoreleasing *)error; +- (BOOL) writeToStream:(NSOutputStream *)outputStream error:(NSError * __autoreleasing *)error; +- (NSData *) buildData:(NSError * __autoreleasing *)error; +- (NSData *) buildData:(NSError * __autoreleasing *)error onlySignedPart:(BOOL)onlySigned; +- (id) valueOfSubacketOfType:(PGPSignatureSubpacketType)type found:(BOOL *)isFound; +@end diff --git a/ObjectivePGP/Packets/PGPSignaturePacket.m b/ObjectivePGP/Packets/PGPSignaturePacket.m new file mode 100644 index 00000000..a67cfb1e --- /dev/null +++ b/ObjectivePGP/Packets/PGPSignaturePacket.m @@ -0,0 +1,356 @@ +// +// PGPSignaturePacket.m +// ObjectivePGP +// +// Created by Marcin Krzyzanowski on 17/01/15. +// Copyright (c) 2015 Marcin Krzyżanowski. All rights reserved. +// +// 5.2. Signature Packet (Tag 2) +// A Signature packet describes a binding between some public key and +// some data. The most common signatures are a signature of a file or a +// block of text, and a signature that is a certification of a User ID. + +#import "PGPSignaturePacket.h" +#import "NSInputStream+PGP.h" +#import "NSOutputStream+PGP.h" +#import "PGPCommon.h" +#import "PGPMPI.h" +#import "PGPSignatureSubpacket.h" +#import "NSMutableData+PGP.h" + +@interface PGPSignaturePacket () +@property (copy, nonatomic) NSArray *hashedSubpackets; +@property (copy, nonatomic) NSArray *unhashedSubpackets; +@end + +@implementation PGPSignaturePacket + ++ (instancetype) readFromStream:(NSInputStream *)inputStream error:(NSError * __autoreleasing *)error +{ + PGPSignaturePacket *packet = [[PGPSignaturePacket alloc] init]; + + // One-octet version number + packet.version = [inputStream readUInt8]; + + NSAssert(packet.version == 3 || packet.version == 4, @"Invalid version of signature packet"); + if (packet.version < 3 && packet.version > 4) { + if (error) { + *error = [NSError errorWithDomain:PGPErrorDomain code:0 userInfo:@{NSLocalizedDescriptionKey: @"Invalid version of signature packet"}]; + } + return nil; + } + + switch (packet.version) { + case 0x03: + [packet readV3FromStream:inputStream error:error]; + break; + case 0x04: + [packet readV4FromStream:inputStream error:error]; + break; + default: + NSAssert(false, @"Should never happened."); + return nil; + } + + return packet; +} + +- (BOOL) readV3FromStream:(NSInputStream *)inputStream error:(NSError * __autoreleasing *)error +{ + // One-octet length of following hashed material. MUST be 5. + UInt8 hashedLength = [inputStream readUInt8]; + NSAssert(hashedLength == 5, @"MUST be 5"); + if (hashedLength != 5) { + if (error) { + *error = [NSError errorWithDomain:PGPErrorDomain code:0 userInfo:@{NSLocalizedDescriptionKey: @"Invalid version of signature packet. Expected length equal 5."}]; + } + return NO; + } + + // - One-octet signature type. + self.signatureType = [inputStream readUInt8]; + + // - Four-octet creation time + UInt32 timestamp = [inputStream readUInt32BE]; + self.creationDate = [NSDate dateWithTimeIntervalSince1970:timestamp]; + + //Eight-octet Key ID of signer + NSData *issuerKeyIDData = [inputStream readDataLength:8]; + self.issuerKeyID = [[PGPKeyID alloc] initWithBytes:issuerKeyIDData.bytes length:issuerKeyIDData.length]; + + // One-octet public-key algorithm. + self.publicKeyAlgorithm = [inputStream readUInt8]; + + // One-octet hash algorithm. + self.hashAlgoritm = [inputStream readUInt8]; + + // Two-octet field holding the left 16 bits of the signed hash value. + UInt16 signedHashValue = [inputStream readUInt16BE]; + self.hashValue = signedHashValue; + + // 5.2.2. One or more multiprecision integers comprising the signature. This portion is algorithm specific Signature + NSMutableOrderedSet *mpis = [NSMutableOrderedSet orderedSet]; + switch (self.publicKeyAlgorithm) { + case PGPPublicKeyAlgorithmRSA: + case PGPPublicKeyAlgorithmRSAEncryptOnly: + case PGPPublicKeyAlgorithmRSASignOnly: + { + // multiprecision integer (MPI) of RSA signature value m**d mod n. + // MPI of RSA public modulus n; + PGPMPI *mpiN = [PGPMPI readFromStream:inputStream error:error]; + mpiN.identifier = @"N"; + [mpis addObject:mpiN]; + } + break; + case PGPPublicKeyAlgorithmDSA: + case PGPPublicKeyAlgorithmECDSA: + { + // MPI of DSA value r. + PGPMPI *mpiR = [PGPMPI readFromStream:inputStream error:error]; + mpiR.identifier = @"R"; + [mpis addObject:mpiR]; + + // MPI of DSA value s. + PGPMPI *mpiS = [PGPMPI readFromStream:inputStream error:error]; + mpiS.identifier = @"S"; + [mpis addObject:mpiS]; + } + break; + default: + NSAssert(false, @"Invalid public key algorithm. RSA or DSA expected."); + if (error) { + *error = [NSError errorWithDomain:PGPErrorDomain code:0 userInfo:@{NSLocalizedDescriptionKey: @"Invalid public key algorithm. RSA or DSA expected."}]; + } + return NO; + } + + self.MPIs = [mpis copy]; + + //TODO: verify hash with hashed packets + NSAssert(false, @"to be done... need V3 key for testing"); + return YES; +} + +- (BOOL) readV4FromStream:(NSInputStream *)inputStream error:(NSError * __autoreleasing *)error +{ + NSMutableData *toHashData = [NSMutableData dataWithBytes:(UInt8[]){0x04} length:1]; // data to hash + + //-->HASHED + // One-octet signature type. + self.signatureType = [inputStream readUInt8BytesAppendTo:toHashData]; + + // One-octet public-key algorithm. + self.publicKeyAlgorithm = [inputStream readUInt8BytesAppendTo:toHashData]; + + // One-octet hash algorithm. + self.hashAlgoritm = [inputStream readUInt8BytesAppendTo:toHashData]; + + // Two-octet scalar octet count for following hashed subpacket data. + UInt16 hashedSubpacketsBytes = [inputStream readUInt16BEBytesAppendTo:toHashData]; + UInt16 consumedBytes = 0; + if (hashedSubpacketsBytes) { + while (consumedBytes < hashedSubpacketsBytes) { + NSData *rawData; + PGPSignatureSubpacket *subpacket = [PGPSignatureSubpacket readFromStream:inputStream data:&rawData error:error]; + if (*error) { + return NO; + } + consumedBytes += subpacket.totalLength; + self.hashedSubpackets = [self.hashedSubpackets arrayByAddingObject:subpacket]; + [toHashData appendData:rawData]; + } + } + //-->HASHED + + // Two-octet scalar octet count for following unhashed subpacket data. + UInt16 unhashedSubpacketsBytes = [inputStream readUInt16BE]; + consumedBytes = 0; + if (unhashedSubpacketsBytes) { + while (consumedBytes < unhashedSubpacketsBytes) { + PGPSignatureSubpacket *subpacket = [PGPSignatureSubpacket readFromStream:inputStream data:nil error:error]; + if (*error) { + return NO; + } + consumedBytes += subpacket.totalLength; + self.unhashedSubpackets = [self.unhashedSubpackets arrayByAddingObject:subpacket]; + } + } + + // Two-octet field holding the left 16 bits of the signed hash value. + UInt16 signedHashValue = [inputStream readUInt16BE]; + self.hashValue = signedHashValue; + + // One or more multiprecision integers comprising the signature. + NSMutableOrderedSet *mpis = [NSMutableOrderedSet orderedSet]; + switch (self.publicKeyAlgorithm) { + case PGPPublicKeyAlgorithmRSA: + case PGPPublicKeyAlgorithmRSAEncryptOnly: + case PGPPublicKeyAlgorithmRSASignOnly: + { + // multiprecision integer (MPI) of RSA signature value m**d mod n. + // MPI of RSA public modulus n; + PGPMPI *mpiN = [PGPMPI readFromStream:inputStream error:error]; + if (*error) { + return NO; + } + mpiN.identifier = @"N"; + [mpis addObject:mpiN]; + } + break; + case PGPPublicKeyAlgorithmDSA: + case PGPPublicKeyAlgorithmECDSA: + { + // MPI of DSA value r. + PGPMPI *mpiR = [PGPMPI readFromStream:inputStream error:error]; + if (*error) { + return NO; + } + mpiR.identifier = @"R"; + [mpis addObject:mpiR]; + + // MPI of DSA value s. + PGPMPI *mpiS = [PGPMPI readFromStream:inputStream error:error]; + if (*error) { + return NO; + } + mpiS.identifier = @"S"; + [mpis addObject:mpiS]; + + } + break; + default: + NSAssert(false, @"Invalid public key algorithm. RSA or DSA expected."); + if (error) { + *error = [NSError errorWithDomain:PGPErrorDomain code:0 userInfo:@{NSLocalizedDescriptionKey: @"Invalid public key algorithm. RSA or DSA expected."}]; + } + return NO; + } + + self.MPIs = [mpis copy]; + self.creationDate = [self valueOfSubacketOfType:PGPSignatureSubpacketTypeSignatureCreationTime found:nil]; + + //TODO: verify hash with hashed packets + // Validate hash by computing hash against toHashData and compare with signedHashValue + return YES; +} + +- (id) valueOfSubacketOfType:(PGPSignatureSubpacketType)type found:(BOOL *)isFound +{ + for (PGPSignatureSubpacket *subpacket in [self.hashedSubpackets arrayByAddingObjectsFromArray:self.unhashedSubpackets]) { + if (subpacket.type == type) { + if (isFound) { + *isFound = YES; + } + return subpacket.value; + } + } + if (isFound) { + *isFound = NO; + } + return nil; +} + +#pragma write - Output + +- (BOOL) writeToStream:(NSOutputStream *)outputStream error:(NSError * __autoreleasing *)error +{ + NSParameterAssert(outputStream); + NSData *packetData = [self buildData:error]; + if (!packetData || *error) { + return NO; + } + + return [outputStream writeData:packetData]; +} + +- (NSData *) buildData:(NSError * __autoreleasing *)error +{ + return [self buildData:error onlySignedPart:NO]; +} + +- (NSData *) buildData:(NSError * __autoreleasing *)error onlySignedPart:(BOOL)onlySigned +{ + if (self.version == 0x03 && error) { + *error = [NSError errorWithDomain:PGPErrorDomain code:0 userInfo:@{NSLocalizedDescriptionKey: @"Can't export signature with version 0x03"}]; + return nil; + } + + NSMutableData *outputData = [NSMutableData data]; + + [outputData appendUInt8:self.version]; + switch (self.version) { + case 0x04: + { + [outputData appendUInt8:self.signatureType]; + [outputData appendUInt8:self.publicKeyAlgorithm]; + [outputData appendUInt8:self.hashAlgoritm]; + + // hashed subpackets + if (self.hashedSubpackets.count > 0) { + NSMutableData *subpacketsData = [NSMutableData data]; + for (PGPSignatureSubpacket *subpacket in self.hashedSubpackets) { + [subpacketsData appendData:[subpacket buildData:error]]; + } + [outputData appendUInt16BE:subpacketsData.length]; + [outputData appendData:subpacketsData]; + } + + if (onlySigned) { + return [outputData copy]; + } + + // unhashed subpackets + if (self.unhashedSubpackets.count > 0) { + NSMutableData *subpacketsData = [NSMutableData data]; + for (PGPSignatureSubpacket *subpacket in self.unhashedSubpackets) { + [subpacketsData appendData:[subpacket buildData:error]]; + } + [outputData appendUInt16BE:subpacketsData.length]; + [outputData appendData:subpacketsData]; + } else { + [outputData appendUInt16BE:0x0000]; + } + + NSAssert(self.hashValue != 0, @"Calculate hash"); + [outputData appendUInt16BE:self.hashValue]; //Two-octet field holding the left 16 bits of the signed hash value. + + + // MPI + for (PGPMPI *mpi in self.MPIs) { + [outputData appendData:[mpi buildData:error]]; + } + } + break; + case 0x03: + { + //TODO: Export V3 Signature + NSAssert(false, @"Can't export version 0x03"); + return nil; + } + default: + break; + } + + return [outputData copy]; +} + + +#pragma mark - Properties + +- (NSArray *)hashedSubpackets +{ + if (!_hashedSubpackets) { + _hashedSubpackets = [NSArray array]; + } + return _hashedSubpackets; +} + +- (NSArray *)unhashedSubpackets +{ + if (!_unhashedSubpackets) { + _unhashedSubpackets = [NSArray array]; + } + return _unhashedSubpackets; +} + +@end diff --git a/ObjectivePGP/Packets/PGPUserIDPacket.h b/ObjectivePGP/Packets/PGPUserIDPacket.h new file mode 100644 index 00000000..232de717 --- /dev/null +++ b/ObjectivePGP/Packets/PGPUserIDPacket.h @@ -0,0 +1,18 @@ +// +// PGPUserIDPacket.h +// ObjectivePGP +// +// Created by Marcin Krzyzanowski on 19/01/15. +// Copyright (c) 2015 Marcin Krzyżanowski. All rights reserved. +// + +#import + +@interface PGPUserIDPacket : NSObject +@property (copy) NSString *userID; + ++ (instancetype) readFromStream:(NSInputStream *)inputStream maxLength:(NSUInteger)length error:(NSError * __autoreleasing *)error; +- (BOOL) writeToStream:(NSOutputStream *)outputStream error:(NSError * __autoreleasing *)error; +- (NSData *) buildData:(NSError * __autoreleasing *)error; + +@end diff --git a/ObjectivePGP/Packets/PGPUserIDPacket.m b/ObjectivePGP/Packets/PGPUserIDPacket.m new file mode 100644 index 00000000..d5a456cb --- /dev/null +++ b/ObjectivePGP/Packets/PGPUserIDPacket.m @@ -0,0 +1,82 @@ +// +// PGPUserIDPacket.m +// ObjectivePGP +// +// Created by Marcin Krzyzanowski on 19/01/15. +// Copyright (c) 2015 Marcin Krzyżanowski. All rights reserved. +// + +#import "PGPUserIDPacket.h" +#import "NSInputStream+PGP.h" +#import "NSOutputStream+PGP.h" +#import "PGPCommon.h" + +@implementation PGPUserIDPacket + ++ (instancetype) readFromStream:(NSInputStream *)inputStream maxLength:(NSUInteger)length error:(NSError * __autoreleasing *)error +{ + PGPUserIDPacket *packet = [[PGPUserIDPacket alloc] init]; + + UInt8 buffer[length]; + NSInteger result = [inputStream read:buffer maxLength:length]; + if (result < 0 || result < length) { + if (error) { + *error = [NSError errorWithDomain:PGPErrorDomain code:0 userInfo:@{NSLocalizedDescriptionKey: @"Can't read User ID packet."}]; + } + return nil; + } + + NSLog(@"%@",[NSData dataWithBytes:buffer length:sizeof(buffer)]); + packet.userID = [[NSString alloc] initWithBytes:buffer length:length encoding:NSUTF8StringEncoding]; + + // forget buffer + memset(buffer, arc4random(), length); + + return packet; +} + +- (BOOL) writeToStream:(NSOutputStream *)outputStream error:(NSError * __autoreleasing *)error +{ + NSParameterAssert(outputStream); + + NSUInteger maxLength = [self.userID lengthOfBytesUsingEncoding:NSUTF8StringEncoding]; + void *buffer = calloc(1, maxLength); + [self.userID getBytes:buffer + maxLength:maxLength + usedLength:nil + encoding:NSUTF8StringEncoding + options:NSStringEncodingConversionAllowLossy + range:NSMakeRange(0, self.userID.length) + remainingRange:nil]; + + [outputStream write:buffer maxLength:maxLength]; + + memset(buffer, arc4random(), maxLength); + free(buffer); + + return YES; +} + +- (NSData *) buildData:(NSError * __autoreleasing *)error +{ + NSUInteger maxLength = [self.userID lengthOfBytesUsingEncoding:NSUTF8StringEncoding]; + NSMutableData *outputData = [NSMutableData data]; + + void *buffer = calloc(1, maxLength); + [self.userID getBytes:buffer + maxLength:maxLength + usedLength:nil + encoding:NSUTF8StringEncoding + options:NSStringEncodingConversionAllowLossy + range:NSMakeRange(0, self.userID.length) + remainingRange:nil]; + + + [outputData appendBytes:buffer length:maxLength]; + + memset(buffer, arc4random(), maxLength); + free(buffer); + return [outputData copy]; +} + +@end diff --git a/ObjectivePGPTests/ObjectivePGPTests-Info.plist b/ObjectivePGPTests/Info.plist similarity index 78% rename from ObjectivePGPTests/ObjectivePGPTests-Info.plist rename to ObjectivePGPTests/Info.plist index 5da7720f..e1831b60 100644 --- a/ObjectivePGPTests/ObjectivePGPTests-Info.plist +++ b/ObjectivePGPTests/Info.plist @@ -5,11 +5,13 @@ CFBundleDevelopmentRegion en CFBundleExecutable - ${EXECUTABLE_NAME} + $(EXECUTABLE_NAME) CFBundleIdentifier - com.hakore.${PRODUCT_NAME:rfc1034identifier} + com.hakore.$(PRODUCT_NAME:rfc1034identifier) CFBundleInfoDictionaryVersion 6.0 + CFBundleName + $(PRODUCT_NAME) CFBundlePackageType BNDL CFBundleShortVersionString diff --git a/ObjectivePGPTests/NSInputStream+PGPTests.h b/ObjectivePGPTests/NSInputStream+PGPTests.h new file mode 100644 index 00000000..ea37d79d --- /dev/null +++ b/ObjectivePGPTests/NSInputStream+PGPTests.h @@ -0,0 +1,15 @@ +// +// NSInputStream+PGPTests.h +// ObjectivePGP +// +// Created by Marcin Krzyzanowski on 18/01/15. +// Copyright (c) 2015 Marcin Krzyżanowski. All rights reserved. +// + +#import + +@interface NSInputStream (PGPTests) + ++ (NSInputStream *) inputStreamWithBytes:(UInt8[])bytes length:(int)length; + +@end diff --git a/ObjectivePGPTests/NSInputStream+PGPTests.m b/ObjectivePGPTests/NSInputStream+PGPTests.m new file mode 100644 index 00000000..eff2d185 --- /dev/null +++ b/ObjectivePGPTests/NSInputStream+PGPTests.m @@ -0,0 +1,22 @@ +// +// NSInputStream+PGPTests.m +// ObjectivePGP +// +// Created by Marcin Krzyzanowski on 18/01/15. +// Copyright (c) 2015 Marcin Krzyżanowski. All rights reserved. +// + +#import "NSInputStream+PGPTests.h" +#import + +@implementation NSInputStream (PGPTests) + ++ (NSInputStream *) inputStreamWithBytes:(UInt8[])bytes length:(int)length +{ + NSData *data = [NSData dataWithBytes:bytes length:length]; + NSInputStream *stream = [NSInputStream inputStreamWithData:data]; + NSAssert(stream, @"Can't to create stream with data %@", data); + return stream; +} + +@end diff --git a/ObjectivePGPTests/ObjectivePGPTestArmor.m b/ObjectivePGPTests/ObjectivePGPTestArmor.m deleted file mode 100644 index 3dce49df..00000000 --- a/ObjectivePGPTests/ObjectivePGPTestArmor.m +++ /dev/null @@ -1,124 +0,0 @@ -// -// ObjectivePGPTestArmor.m -// ObjectivePGP -// -// Created by Marcin Krzyzanowski on 16/05/14. -// Copyright (c) 2014 Marcin Krzyżanowski. All rights reserved. -// - -#import -#import "ObjectivePGP.h" -#import "PGPSecretKeyPacket.h" -#import "PGPPublicKeyPacket.h" -#import "PGPArmor.h" - - -@interface ObjectivePGPTestArmor : XCTestCase -@property (strong) NSString *secKeyringPath; -@property (strong) NSString *pubKeyringPath; -@property (strong) NSString *workingDirectory; -@property (strong) ObjectivePGP *oPGP; -@end - -@implementation ObjectivePGPTestArmor - -- (void)setUp -{ - [super setUp]; - NSLog(@"%s", __PRETTY_FUNCTION__); - - self.oPGP = [[ObjectivePGP alloc] init]; - - NSBundle *bundle = [NSBundle bundleForClass:[self class]]; - self.secKeyringPath = [bundle pathForResource:@"secring-test-plaintext" ofType:@"gpg"]; - self.pubKeyringPath = [bundle pathForResource:@"pubring-test-plaintext" ofType:@"gpg"]; - - NSString *newDir = [@"ObjectivePGPTests" stringByAppendingPathComponent:[[NSUUID UUID] UUIDString]]; - NSString *tmpDirectoryPath = [NSTemporaryDirectory() stringByAppendingPathComponent:newDir]; - [[NSFileManager defaultManager] createDirectoryAtPath:tmpDirectoryPath withIntermediateDirectories:YES attributes:nil error:nil]; - if (![[NSFileManager defaultManager] fileExistsAtPath:tmpDirectoryPath]) { - XCTFail(@"couldn't create tmpDirectoryPath"); - } - self.workingDirectory = tmpDirectoryPath; -} - -- (void)tearDown -{ - NSLog(@"%s", __PRETTY_FUNCTION__); - [super tearDown]; - [[NSFileManager defaultManager] removeItemAtPath:self.workingDirectory error:nil]; - self.oPGP = nil; -} - -- (void) testMultipleKeys -{ - NSBundle *bundle = [NSBundle bundleForClass:[self class]]; - NSString *path = [bundle pathForResource:@"multiple-keys" ofType:@"asc"]; - NSArray *keys = [self.oPGP importKeysFromFile:path allowDuplicates:NO]; - NSAssert(keys.count == 3, @"Keys not imported properly"); -} - - -- (void) testArmorPublicKey -{ - [self.oPGP importKeysFromFile:self.pubKeyringPath allowDuplicates:NO]; - - PGPKey *key = self.oPGP.keys[0]; - - NSError *exportError = nil; - NSData *keyData = [key export:&exportError]; - XCTAssertNil(exportError); - XCTAssertNotNil(keyData); - - NSData *armoredData = [PGPArmor armoredData:keyData as:PGPArmorTypePublicKey]; - XCTAssertNotNil(armoredData); - - BOOL status = [armoredData writeToFile:[self.workingDirectory stringByAppendingPathComponent:@"pubkey.asc"] atomically:YES]; - XCTAssertTrue(status); - - NSError *loadError = nil; - NSString *armoredString = [NSString stringWithContentsOfFile:[self.workingDirectory stringByAppendingPathComponent:@"pubkey.asc"] encoding:NSASCIIStringEncoding error:&loadError]; - XCTAssertNil(loadError); - XCTAssertNotNil(armoredString); - - NSError *readArmoredError = nil; - NSData *decodedData = [PGPArmor readArmoredData:armoredString error:&readArmoredError]; - XCTAssertNil(readArmoredError); - XCTAssertNotNil(decodedData); - - XCTAssertEqualObjects(decodedData, keyData); -} - -//- (void) testEmbededArmoredData -//{ -// [self.oPGP importKeysFromFile:self.pubKeyringPath]; -// -// PGPKey *key = self.oPGP.keys[0]; -// -// NSError *exportError = nil; -// NSData *keyData = [key export:&exportError]; -// XCTAssertNil(exportError); -// XCTAssertNotNil(keyData); -// -// NSData *armoredData = [PGPArmor armoredData:keyData as:PGPArmorTypePublicKey]; -// XCTAssertNotNil(armoredData); -// -// NSFileHandle *fileHandle = [NSFileHandle fileHandleForWritingAtPath:[self.workingDirectory stringByAppendingPathComponent:@"pubkey.asc"]]; -// [fileHandle seekToEndOfFile]; -// [fileHandle writeData:[@"some buzzzzzzzz\n" dataUsingEncoding:NSUTF8StringEncoding]]; -// [fileHandle writeData:armoredData]; -// [fileHandle writeData:[@"\nmore buzzz\n" dataUsingEncoding:NSUTF8StringEncoding]]; -// [fileHandle closeFile]; -// -// NSError *loadError = nil; -// NSString *armoredString = [NSString stringWithContentsOfFile:[self.workingDirectory stringByAppendingPathComponent:@"pubkey.asc"] encoding:NSASCIIStringEncoding error:&loadError]; -// XCTAssertNil(loadError); -// XCTAssertNotNil(armoredString); -// -// NSError *readArmoredError = nil; -// NSData *decodedData = [PGPArmor readArmoredData:armoredString error:&readArmoredError]; -// XCTAssertNil(readArmoredError); -// XCTAssertNotNil(decodedData); -//} - -@end diff --git a/ObjectivePGPTests/ObjectivePGPTestKeyringSecureEncrypted.m b/ObjectivePGPTests/ObjectivePGPTestKeyringSecureEncrypted.m deleted file mode 100644 index f320645c..00000000 --- a/ObjectivePGPTests/ObjectivePGPTestKeyringSecureEncrypted.m +++ /dev/null @@ -1,138 +0,0 @@ -// -// ObjectivePGPTestKeyringSecureEncrypted.m -// ObjectivePGP -// -// Created by Marcin Krzyzanowski on 16/05/14. -// Copyright (c) 2014 Marcin Krzyżanowski. All rights reserved. -// - -#import -#import "ObjectivePGP.h" -#import "PGPSecretKeyPacket.h" - -@interface ObjectivePGPTestKeyringSecureEncrypted : XCTestCase -@property (strong) NSString *secKeyringPath; -@property (strong) NSString *pubKeyringPath; -@property (strong) NSString *workingDirectory; -@property (strong) ObjectivePGP *oPGP; -@end - -@implementation ObjectivePGPTestKeyringSecureEncrypted - -- (void)setUp -{ - [super setUp]; - NSLog(@"%s", __PRETTY_FUNCTION__); - - self.oPGP = [[ObjectivePGP alloc] init]; - - NSBundle *bundle = [NSBundle bundleForClass:[self class]]; - self.secKeyringPath = [bundle pathForResource:@"secring-test-encrypted" ofType:@"gpg"]; - self.pubKeyringPath = [bundle pathForResource:@"pubring-test-encrypted" ofType:@"gpg"]; - - NSString *newDir = [@"ObjectivePGPTests" stringByAppendingPathComponent:[[NSUUID UUID] UUIDString]]; - NSString *tmpDirectoryPath = [NSTemporaryDirectory() stringByAppendingPathComponent:newDir]; - [[NSFileManager defaultManager] createDirectoryAtPath:tmpDirectoryPath withIntermediateDirectories:YES attributes:nil error:nil]; - if (![[NSFileManager defaultManager] fileExistsAtPath:tmpDirectoryPath]) { - XCTFail(@"couldn't create tmpDirectoryPath"); - } - self.workingDirectory = tmpDirectoryPath; -} - -- (void)tearDown -{ - NSLog(@"%s", __PRETTY_FUNCTION__); - [super tearDown]; - [[NSFileManager defaultManager] removeItemAtPath:self.workingDirectory error:nil]; - self.oPGP = nil; -} - -- (void)testLoadKeyring -{ - XCTAssertNotNil([self.oPGP importKeysFromFile:self.secKeyringPath allowDuplicates:NO]); - XCTAssert(self.oPGP.keys.count == 1, @"Should load 1 key"); -} - -- (void) testUsers -{ - [self.oPGP importKeysFromFile:self.secKeyringPath allowDuplicates:NO]; - - PGPKey *key = self.oPGP.keys[0]; - XCTAssert(key.users.count == 1, @"Invalid users count"); -} - -- (void) testPrimaryKey -{ - [self.oPGP importKeysFromFile:self.secKeyringPath allowDuplicates:NO]; - - PGPKey *key = self.oPGP.keys[0]; - - PGPSecretKeyPacket *secretKey = (PGPSecretKeyPacket *)key.primaryKeyPacket; - XCTAssert([key.primaryKeyPacket class] == [PGPSecretKeyPacket class],@"Key Should be PGPSecretKeyPacket"); - XCTAssertTrue(key.isEncrypted, @"Should be encrypted"); - XCTAssertEqualObjects([secretKey.keyID longKeyString], @"9528AAA17A9BC007", @"Invalid key identifier"); -} - -- (void)testKeyDecryption -{ - [self.oPGP importKeysFromFile:self.secKeyringPath allowDuplicates:NO]; - - PGPKey *key = self.oPGP.keys[0]; - - NSError *decryptError = nil; - BOOL status = [key decrypt:@"1234" error:&decryptError]; - XCTAssertTrue(status, @"Decryption failed"); - XCTAssertNil(decryptError, @"Decryption failed"); -} - -- (void)testDataDecryption -{ - [self.oPGP importKeysFromFile:self.secKeyringPath allowDuplicates:NO]; - [self.oPGP importKeysFromFile:self.pubKeyringPath allowDuplicates:NO]; - - - PGPKey *encKey = [self.oPGP getKeyForIdentifier:@"9528AAA17A9BC007" type:PGPKeyPublic]; - // encrypt - NSData *tmpdata = [@"this is test" dataUsingEncoding:NSUTF8StringEncoding]; - NSError *encError; - NSData *encData = [self.oPGP encryptData:tmpdata usingPublicKey:encKey armored:NO error:&encError]; - XCTAssertNil(encError, @"Encryption failed"); - - NSError *decError; - NSData *decData = [self.oPGP decryptData:encData passphrase:@"1234" error:&decError]; - XCTAssertNil(decError, @"Decryption failed"); - -// PGPKey *key = self.oPGP.keys[0]; -// -// NSError *decryptError = nil; -// BOOL status = [key decrypt:@"1234" error:&decryptError]; -// XCTAssertTrue(status, @"Decryption failed"); -// XCTAssertNil(decryptError, @"Decryption failed"); -} - -- (void) testEncryptedSignature -{ - BOOL status; - - [self.oPGP importKeysFromFile:self.secKeyringPath allowDuplicates:NO]; - - // file to sign - NSString *fileToSignPath = [self.workingDirectory stringByAppendingPathComponent:@"signed_file.bin"]; - status = [[NSFileManager defaultManager] copyItemAtPath:self.secKeyringPath toPath:fileToSignPath error:nil]; - XCTAssertTrue(status); - - PGPKey *keyToSign = [self.oPGP getKeyForIdentifier:@"9528AAA17A9BC007" type:PGPKeySecret]; - XCTAssertNotNil(keyToSign); - - // detached signature - NSError *signatureError = nil; - NSData *signatureData = [self.oPGP signData:[NSData dataWithContentsOfFile:fileToSignPath] usingSecretKey:keyToSign passphrase:@"1234" detached:YES error:&signatureError]; - XCTAssertNotNil(signatureData); - XCTAssertNil(signatureError); - - NSString *signaturePath = [self.workingDirectory stringByAppendingPathComponent:@"signature.sig"]; - status = [signatureData writeToFile:signaturePath atomically:YES]; - XCTAssertTrue(status); -} - -@end diff --git a/ObjectivePGPTests/ObjectivePGPTestKeyringSecurePlaintext.m b/ObjectivePGPTests/ObjectivePGPTestKeyringSecurePlaintext.m deleted file mode 100644 index da7f75e0..00000000 --- a/ObjectivePGPTests/ObjectivePGPTestKeyringSecurePlaintext.m +++ /dev/null @@ -1,275 +0,0 @@ -// -// ObjectivePGPTestSecurePlaintext.m -// ObjectivePGP -// -// Created by Marcin Krzyzanowski on 16/05/14. -// Copyright (c) 2014 Marcin Krzyżanowski. All rights reserved. -// - -#import -#import "ObjectivePGP.h" -#import "PGPSecretKeyPacket.h" -#import "PGPUser.h" -#import "PGPSignaturePacket.h" - -@interface ObjectivePGPTestKeyringSecurePlaintext : XCTestCase -@property (strong) NSString *secKeyringPath; -@property (strong) NSString *pubKeyringPath; -@property (strong) NSString *workingDirectory; -@property (strong) ObjectivePGP *oPGP; -@end - -@implementation ObjectivePGPTestKeyringSecurePlaintext - -- (void)setUp -{ - [super setUp]; - NSLog(@"%s", __PRETTY_FUNCTION__); - - self.oPGP = [[ObjectivePGP alloc] init]; - - NSBundle *bundle = [NSBundle bundleForClass:[self class]]; - self.secKeyringPath = [bundle pathForResource:@"secring-test-plaintext" ofType:@"gpg"]; - self.pubKeyringPath = [bundle pathForResource:@"pubring-test-plaintext" ofType:@"gpg"]; - - NSString *newDir = [@"ObjectivePGPTests" stringByAppendingPathComponent:[[NSUUID UUID] UUIDString]]; - NSString *tmpDirectoryPath = [NSTemporaryDirectory() stringByAppendingPathComponent:newDir]; - [[NSFileManager defaultManager] createDirectoryAtPath:tmpDirectoryPath withIntermediateDirectories:YES attributes:nil error:nil]; - if (![[NSFileManager defaultManager] fileExistsAtPath:tmpDirectoryPath]) { - XCTFail(@"couldn't create tmpDirectoryPath"); - } - self.workingDirectory = tmpDirectoryPath; - - // copy keyring to verify - [[NSFileManager defaultManager] copyItemAtPath:self.secKeyringPath toPath:[self.workingDirectory stringByAppendingPathComponent:[self.secKeyringPath lastPathComponent]] error:nil]; - [[NSFileManager defaultManager] copyItemAtPath:self.pubKeyringPath toPath:[self.workingDirectory stringByAppendingPathComponent:[self.pubKeyringPath lastPathComponent]] error:nil]; -} - -- (void)tearDown -{ - NSLog(@"%s", __PRETTY_FUNCTION__); - [super tearDown]; - [[NSFileManager defaultManager] removeItemAtPath:self.workingDirectory error:nil]; - self.oPGP = nil; -} - -- (void)testLoadKeys -{ - NSLog(@"%s doing work...", __PRETTY_FUNCTION__); - - XCTAssertNotNil([self.oPGP importKeysFromFile:self.secKeyringPath allowDuplicates:NO], @"Unable to load keyring"); - XCTAssert(self.oPGP.keys.count == 1, @"Should load 1 key"); - - NSArray *foundKeys = [self.oPGP getKeysForUserID:@"Marcin (test) "]; - XCTAssertNotNil(foundKeys, @"key not found"); - - foundKeys = [self.oPGP getKeysForUserID:@"ERR Marcin (test) "]; - XCTAssertNil(foundKeys, @"found key, should not"); - - PGPKey *key = [self.oPGP getKeyForIdentifier:@"952E4E8B" type:PGPKeySecret]; - XCTAssertNotNil(key, @"Key 952E4E8B not found"); -} - -- (void) testSaveSecretKeys -{ - NSLog(@"%s doing work...", __PRETTY_FUNCTION__); - - XCTAssertNotNil([self.oPGP importKeysFromFile:self.secKeyringPath allowDuplicates:NO]); - - NSString *exportSecretKeyringPath = [self.workingDirectory stringByAppendingPathComponent:@"export-secring-test-plaintext.gpg"]; - - NSArray *secretKeys = [self.oPGP getKeysOfType:PGPKeySecret]; - NSError *ssaveError = nil; - BOOL sstatus = [self.oPGP exportKeys:secretKeys toFile:exportSecretKeyringPath error:&ssaveError]; - XCTAssertNil(ssaveError, @""); - XCTAssertTrue(sstatus, @""); - - NSLog(@"Created file %@", exportSecretKeyringPath); - - // Check if can be load - ObjectivePGP *checkPGP = [[ObjectivePGP alloc] init]; - XCTAssertNotNil([checkPGP importKeysFromFile:exportSecretKeyringPath allowDuplicates:NO]); - XCTAssert(self.oPGP.keys.count > 0, @"Keys not loaded"); - - PGPKey *key = checkPGP.keys[0]; - PGPSecretKeyPacket *secretKey = (PGPSecretKeyPacket *)key.primaryKeyPacket; - XCTAssert([key.primaryKeyPacket class] == [PGPSecretKeyPacket class],@"Key Should be PGPSecretKeyPacket"); - XCTAssertFalse(key.isEncrypted, @"Should not be encrypted"); - XCTAssertEqualObjects([secretKey.keyID longKeyString], @"25A233C2952E4E8B", @"Invalid key identifier"); -} - -- (void) testSavePublicKeys -{ - NSLog(@"%s doing work...", __PRETTY_FUNCTION__); - - XCTAssertNotNil([self.oPGP importKeysFromFile:self.pubKeyringPath allowDuplicates:NO]); - - NSString *exportPublicKeyringPath = [self.workingDirectory stringByAppendingPathComponent:@"export-pubring-test-plaintext.gpg"]; - - NSArray *publicKeys = [self.oPGP getKeysOfType:PGPKeyPublic]; - NSError *psaveError = nil; - BOOL pstatus = [self.oPGP exportKeys:publicKeys toFile:exportPublicKeyringPath error:&psaveError]; - XCTAssertNil(psaveError); - XCTAssertTrue(pstatus); - - NSLog(@"Created file %@", exportPublicKeyringPath); -} - - -- (void) testPrimaryKey -{ - NSLog(@"%s doing work...", __PRETTY_FUNCTION__); - - XCTAssertNotNil([self.oPGP importKeysFromFile:self.secKeyringPath allowDuplicates:NO]); - XCTAssert(self.oPGP.keys.count > 0, @"Keys not loaded"); - - PGPKey *key = self.oPGP.keys[0]; - - PGPSecretKeyPacket *secretKey = (PGPSecretKeyPacket *)key.primaryKeyPacket; - XCTAssert([key.primaryKeyPacket class] == [PGPSecretKeyPacket class],@"Key Should be PGPSecretKeyPacket"); - XCTAssertFalse(key.isEncrypted, @"Should not be encrypted"); - XCTAssertEqualObjects([secretKey.keyID longKeyString], @"25A233C2952E4E8B", @"Invalid key identifier"); -} - -- (void) testSigning -{ - XCTAssertNotNil([self.oPGP importKeysFromFile:self.secKeyringPath allowDuplicates:NO]); - - // file to sign - NSString *fileToSignPath = [self.workingDirectory stringByAppendingPathComponent:@"signed_file.bin"]; - BOOL status = [[NSFileManager defaultManager] copyItemAtPath:self.secKeyringPath toPath:fileToSignPath error:nil]; - XCTAssertTrue(status); - - PGPKey *keyToSign = [self.oPGP getKeyForIdentifier:@"25A233C2952E4E8B" type:PGPKeySecret]; - XCTAssertNotNil(keyToSign); - - // detached signature - NSError *signatureError = nil; - NSData *signatureData = [self.oPGP signData:[NSData dataWithContentsOfFile:fileToSignPath] usingSecretKey:keyToSign passphrase:nil detached:YES error:&signatureError]; - XCTAssertNotNil(signatureData); - XCTAssertNil(signatureError); - - NSString *signaturePath = [self.workingDirectory stringByAppendingPathComponent:@"signature.sig"]; - status = [signatureData writeToFile:signaturePath atomically:YES]; - XCTAssertTrue(status); - - NSLog(@"Signature %@", signaturePath); - - // Verify - PGPKey *keyToValidateSign = [self.oPGP getKeyForIdentifier:@"25A233C2952E4E8B" type:PGPKeySecret]; - NSError *verifyError = nil; - status = [self.oPGP verifyData:[NSData dataWithContentsOfFile:fileToSignPath] withSignature:signatureData usingKey:keyToValidateSign error:&verifyError]; - XCTAssertTrue(status); - XCTAssertNil(verifyError); - - // Signed data - NSData *signedData = [self.oPGP signData:[NSData dataWithContentsOfFile:fileToSignPath] usingSecretKey:keyToSign passphrase:nil detached:NO error:&signatureError]; - XCTAssertNotNil(signedData); - XCTAssertNil(signatureError); - - NSString *signedPath = [self.workingDirectory stringByAppendingPathComponent:@"signed_file.bin.sig"]; - status = [signedData writeToFile:signedPath atomically:YES]; - XCTAssertTrue(status); - - NSLog(@"Signed file %@", signedPath); - - // Verify - keyToValidateSign = [self.oPGP getKeyForIdentifier:@"25A233C2952E4E8B" type:PGPKeySecret]; - status = [self.oPGP verifyData:signedData error:&verifyError]; - XCTAssertTrue(status); - XCTAssertNil(verifyError); -} - -#define PLAINTEXT @"Plaintext: Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse blandit justo eros.\n" - -- (void) testEncryption -{ - XCTAssertNotNil([self.oPGP importKeysFromFile:self.pubKeyringPath allowDuplicates:NO]); - XCTAssertNotNil([self.oPGP importKeysFromFile:self.secKeyringPath allowDuplicates:NO]); - - // Public key - PGPKey *keyToEncrypt = [self.oPGP getKeyForIdentifier:@"25A233C2952E4E8B" type:PGPKeyPublic]; - - XCTAssertNotNil(keyToEncrypt); - - NSData* plainData = [PLAINTEXT dataUsingEncoding:NSUTF8StringEncoding]; - [plainData writeToFile:[self.workingDirectory stringByAppendingPathComponent:@"plaintext.txt"] atomically:YES]; - - // encrypt PLAINTEXT - NSError *encryptError = nil; - NSData *encryptedData = [self.oPGP encryptData:plainData usingPublicKey:keyToEncrypt armored:NO error:&encryptError]; - XCTAssertNil(encryptError); - XCTAssertNotNil(encryptedData); - - // file encrypted - NSString *fileEncrypted = [self.workingDirectory stringByAppendingPathComponent:@"plaintext.encrypted"]; - NSLog(@"%@",fileEncrypted); - BOOL status = [encryptedData writeToFile:fileEncrypted atomically:YES]; - XCTAssertTrue(status); - - // decrypt + validate decrypted message - NSData *decryptedData = [self.oPGP decryptData:encryptedData passphrase:@"1234" error:nil]; - XCTAssertNotNil(decryptedData); - NSString *decryptedString = [[NSString alloc] initWithData:decryptedData encoding:NSASCIIStringEncoding]; - XCTAssertNotNil(decryptedString); - XCTAssertEqualObjects(decryptedString, PLAINTEXT, @"Decrypted data mismatch"); - - // ARMORED - NSData *encryptedDataArmored = [self.oPGP encryptData:plainData usingPublicKey:keyToEncrypt armored:YES error:&encryptError]; - XCTAssertNil(encryptError); - XCTAssertNotNil(encryptedDataArmored); - - NSString *fileEncryptedArmored = [self.workingDirectory stringByAppendingPathComponent:@"plaintext.encrypted.armored"]; - NSLog(@"%@",fileEncryptedArmored); - status = [encryptedDataArmored writeToFile:fileEncryptedArmored atomically:YES]; - XCTAssertTrue(status); -} - -- (void) testGPGEncryptedMessage -{ - XCTAssertNotNil([self.oPGP importKeysFromFile:self.pubKeyringPath allowDuplicates:NO]); - XCTAssertNotNil([self.oPGP importKeysFromFile:self.secKeyringPath allowDuplicates:NO]); - - NSBundle *bundle = [NSBundle bundleForClass:[self class]]; - NSString *encryptedPath = [bundle pathForResource:@"secring-test-plaintext-encrypted-message" ofType:@"asc"]; - - NSError *error = nil; - [self.oPGP decryptData:[NSData dataWithContentsOfFile:encryptedPath] passphrase:nil error:&error]; -} - -- (void) testEcnryptWithMultipleRecipients -{ - XCTAssertNotNil([self.oPGP importKeysFromFile:self.pubKeyringPath allowDuplicates:NO]); - XCTAssertNotNil([self.oPGP importKeysFromFile:self.secKeyringPath allowDuplicates:NO]); - - // Public key - PGPKey *keyToEncrypt1 = [self.oPGP getKeyForIdentifier:@"952E4E8B" type:PGPKeyPublic]; - PGPKey *keyToEncrypt2 = [self.oPGP getKeyForIdentifier:@"66753341" type:PGPKeyPublic]; - - XCTAssertNotNil(keyToEncrypt1); - XCTAssertNotNil(keyToEncrypt2); - - NSData* plainData = [PLAINTEXT dataUsingEncoding:NSUTF8StringEncoding]; - [plainData writeToFile:[self.workingDirectory stringByAppendingPathComponent:@"plaintext.txt"] atomically:YES]; - - // encrypt PLAINTEXT - NSError *encryptError = nil; - NSData *encryptedData = [self.oPGP encryptData:plainData usingPublicKeys:@[keyToEncrypt1, keyToEncrypt2] armored:NO error:&encryptError]; - XCTAssertNil(encryptError); - XCTAssertNotNil(encryptedData); - - // file encrypted - NSString *fileEncrypted = [self.workingDirectory stringByAppendingPathComponent:@"plaintext.multiple.encrypted"]; - NSLog(@"%@",fileEncrypted); - BOOL status = [encryptedData writeToFile:fileEncrypted atomically:YES]; - XCTAssertTrue(status); - - // decrypt + validate decrypted message - NSData *decryptedData = [self.oPGP decryptData:encryptedData passphrase:@"1234" error:&encryptError]; - XCTAssertNil(encryptError); - XCTAssertNotNil(decryptedData); - NSString *decryptedString = [[NSString alloc] initWithData:decryptedData encoding:NSASCIIStringEncoding]; - XCTAssertNotNil(decryptedString); - XCTAssertEqualObjects(decryptedString, PLAINTEXT, @"Decrypted data mismatch"); -} -@end diff --git a/ObjectivePGPTests/ObjectivePGPTests.m b/ObjectivePGPTests/ObjectivePGPTests.m deleted file mode 100644 index 5a4d18be..00000000 --- a/ObjectivePGPTests/ObjectivePGPTests.m +++ /dev/null @@ -1,95 +0,0 @@ -// -// ObjectivePGPTests.m -// ObjectivePGPTests -// -// Created by Marcin Krzyzanowski on 03/05/14. -// Copyright (c) 2014 Marcin Krzyżanowski. All rights reserved. -// - -#import -#import "ObjectivePGP.h" - - -//sec 2048R/AEEF64C8 2014-05-03 -//uid Marcin Krzyzanowski (Test keys) -//ssb 2048R/7D4FCA45 2014-05-03 - -//pub 2048R/AEEF64C8 2014-05-03 -//Key fingerprint = 816E 6A80 8067 D41E 4CB0 3FCC 9469 0093 AEEF 64C8 -//uid Marcin Krzyzanowski (Test keys) -//sub 2048R/7D4FCA45 2014-05-03 - -//pass ObjectivePGP - - -@interface ObjectivePGPTests : XCTestCase -@property (strong) ObjectivePGP *oPGP; -@property (strong) NSString *secringPathPlaintext, *secringPathEncrypted; -@property (strong) NSString *pubringPlaintext, *pubringEncrypted; -@end - -@implementation ObjectivePGPTests - -- (void)setUp -{ - [super setUp]; - - NSBundle *bundle = [NSBundle bundleForClass:[self class]]; - self.secringPathPlaintext = [bundle pathForResource:@"secring-test-plaintext" ofType:@"gpg"]; - self.secringPathEncrypted = [bundle pathForResource:@"secring-test-encrypted" ofType:@"gpg"]; - self.pubringPlaintext = [bundle pathForResource:@"pubring-test-plaintext" ofType:@"gpg"]; - self.pubringEncrypted = [bundle pathForResource:@"pubring-test-encrypted" ofType:@"gpg"]; - - self.oPGP = [[ObjectivePGP alloc] init]; -} - -- (void)tearDown -{ - [super tearDown]; - self.oPGP = nil; -} - -- (void) testDuplicates -{ - [self.oPGP importKeysFromFile:self.pubringPlaintext allowDuplicates:YES]; - NSUInteger count1 = self.oPGP.keys.count; - [self.oPGP importKeysFromFile:self.pubringPlaintext allowDuplicates:YES]; - NSUInteger count2 = self.oPGP.keys.count; - - NSAssert((count1 * 2) == count2, @"Loaded keys should be duplicated in count"); -} - -- (void) testNotDuplicates -{ - [self.oPGP importKeysFromFile:self.pubringPlaintext allowDuplicates:NO]; - NSUInteger count1 = self.oPGP.keys.count; - [self.oPGP importKeysFromFile:self.pubringPlaintext allowDuplicates:NO]; - NSUInteger count2 = self.oPGP.keys.count; - - NSAssert(count1 == count2, @"Loaded keys should be equal"); -} - -//- (void) testNewOpenKeyring -//{ -// BOOL openedPubKeyringNewFormat = [self.keyring open:self.pubringNewFormatPath]; -// XCTAssert(openedPubKeyringNewFormat, @"Unable to read file"); -//} - -//- (void) testOldOpenKeyring -//{ -// BOOL openedPubKeyringOldFormat = [self.keyring open:self.pubringOldFormatPath]; -// XCTAssert(openedPubKeyringOldFormat, @"Unable to read file"); -//} - -- (void) testSecretKeyring -{ -// BOOL openedSecring = [self.keyring open:self.secringPathPlaintext]; -// XCTAssert(openedSecring, @"Unable to read file"); -} - -//- (void)testExample -//{ -// XCTFail(@"No implementation for \"%s\"", __PRETTY_FUNCTION__); -//} - -@end diff --git a/ObjectivePGPTests/PGPInputStreamCategoryTests.m b/ObjectivePGPTests/PGPInputStreamCategoryTests.m new file mode 100644 index 00000000..73533c19 --- /dev/null +++ b/ObjectivePGPTests/PGPInputStreamCategoryTests.m @@ -0,0 +1,70 @@ +// +// PGPInputStreamCategoryTests.m +// ObjectivePGP +// +// Created by Marcin Krzyzanowski on 18/01/15. +// Copyright (c) 2015 Marcin Krzyżanowski. All rights reserved. +// + +#import +#import +#import "NSInputStream+PGP.h" +#import "NSInputStream+PGPTests.h" + +@interface PGPInputStreamCategoryTests : XCTestCase + +@end + +@implementation PGPInputStreamCategoryTests + +- (void)setUp { + [super setUp]; +} + +- (void)tearDown { + [super tearDown]; +} + +- (void) testReadUInt8 +{ + Byte bytes[] = {0x01}; + NSInputStream *stream = [NSInputStream inputStreamWithBytes:bytes length:sizeof(bytes)]; + [stream open]; + XCTAssertNotNil(stream); + UInt8 readByte; + UInt8 result = [stream readUInt8:&readByte]; + XCTAssertEqual(result, 0x01); + XCTAssertEqual(readByte, 0x01); + [stream close]; +} + +- (void) testReadUInt16 +{ + Byte bytes[] = {0x01, 0x02}; + NSInputStream *stream = [NSInputStream inputStreamWithBytes:bytes length:sizeof(bytes)]; + [stream open]; + XCTAssertNotNil(stream); + UInt8 readBytes[2]; + UInt16 result = [stream readUInt16BE:readBytes]; + XCTAssertEqual(result, 0x0102); + for (int i = 0; i < sizeof(bytes); i++) { + XCTAssertEqual(readBytes[i], bytes[i]); + } + [stream close]; +} + +- (void) testReadUInt32 +{ + Byte bytes[] = {0x01, 0x02, 0x03, 0x04}; + NSInputStream *stream = [NSInputStream inputStreamWithBytes:bytes length:sizeof(bytes)]; + [stream open]; + XCTAssertNotNil(stream); + UInt8 readBytes[4]; + UInt32 result = [stream readUInt32BE:readBytes]; + XCTAssertEqual(result, 0x01020304); + for (int i = 0; i < sizeof(bytes); i++) { + XCTAssertEqual(readBytes[i], bytes[i]); + } + [stream close]; +} +@end diff --git a/ObjectivePGPTests/PGPMPITests.m b/ObjectivePGPTests/PGPMPITests.m new file mode 100644 index 00000000..35317159 --- /dev/null +++ b/ObjectivePGPTests/PGPMPITests.m @@ -0,0 +1,49 @@ +// +// PGPMPITests.m +// ObjectivePGP +// +// Created by Marcin Krzyzanowski on 01/02/15. +// Copyright (c) 2015 Marcin Krzyżanowski. All rights reserved. +// + +#import +#import +#import "PGPMPI.h" + +@interface PGPMPITests : XCTestCase + +@end + +@implementation PGPMPITests + +- (void)setUp { + [super setUp]; +} + +- (void)tearDown { + [super tearDown]; +} + +- (void) testReadWrite +{ + Byte mpiBytes[] = {0x08, 0x00, 0xD0,0xB3,0x0C,0xDE,0xA4,0xD3,0x28,0x87,0x5F,0xEB,0x60,0x6B,0x92,0xF8,0x93,0xF3,0x11,0xA2,0x22,0x6F,0xC5,0xF4,0xF5,0x67,0x64,0x2C,0xA6,0x36,0x62,0xC0,0x14,0xF0,0x4C,0x25,0xFB,0x4E,0x05,0x6E,0x39,0x42,0xC8,0xA9,0x6B,0xCD,0xC9,0x0C,0x4D,0xFC,0x6D,0x68,0xAB,0x75,0x73,0x08,0x2C,0xFD,0x69,0xA2,0x57,0x06,0xE1,0xF6,0xDF,0x2C,0x86,0xE6,0x07,0xDA,0xAD,0x21,0x89,0x5F,0xD7,0xB4,0x18,0xB0,0xC5,0x6B,0x39,0xDE,0x5F,0xA7,0x88,0x99,0x0F,0x5F,0x9D,0xAF,0x6F,0xAB,0x13,0x51,0x69,0xBA,0x52,0xCB,0x7E,0xE9,0x1A,0x49,0x79,0x55,0xBD,0x5D,0x90,0xCE,0x59,0xDF,0x1C,0xBB,0xDD,0x6E,0xE4,0xB9,0x04,0xDA,0x05,0x85,0x30,0x56,0xB1,0x8E,0x35,0xD5,0x46,0xFE,0xD8,0x55,0x07,0x48,0x1E,0x26,0x42,0x85,0x37,0x81,0xA8,0xE8,0xE6,0x99,0x7D,0x4B,0x3D,0x6B,0xEE,0xAD,0x15,0x01,0xB5,0x31,0xA6,0xB8,0xF0,0x36,0x93,0x59,0x0A,0xE2,0xAC,0x5C,0x32,0xF0,0xB4,0xF5,0x1A,0xD6,0xF4,0x7D,0x6B,0xA5,0x62,0x9C,0x8B,0x2D,0x8D,0x1D,0xC5,0x77,0x23,0x3F,0xB6,0x77,0x43,0xFC,0x0E,0x80,0x6A,0x1F,0xB9,0xF0,0x69,0x18,0x8B,0x71,0x94,0xD2,0xA6,0x8E,0x1A,0xEF,0x7F,0xC7,0x96,0x35,0xCC,0xC0,0x1C,0x43,0x52,0x4C,0xF9,0x54,0xD4,0xA7,0x48,0xA5,0x1E,0xC2,0xD8,0x31,0x6A,0xFB,0x35,0xAC,0x05,0x20,0x66,0x7A,0xFC,0xFD,0x20,0x8A,0xAC,0xA9,0x8E,0x05,0xA2,0xA9,0xE0,0xF4,0x1B,0xFD,0xF5,0xD1,0x01,0x6A,0x34,0x13,0x0E,0x69,0xDE,0xD2,0x82,0x73,0x7F,0xDB}; + NSInputStream *inputStream = [NSInputStream inputStreamWithData:[NSData dataWithBytes:mpiBytes length:sizeof(mpiBytes)]]; + [inputStream open]; + NSError *error = nil; + PGPMPI *mpi = [PGPMPI readFromStream:inputStream error:&error]; + XCTAssertNil(error); + XCTAssertNotNil(mpi); + XCTAssertNotNil(mpi.data); + XCTAssertEqual(mpi.data.length, sizeof(mpiBytes) - 2); + [inputStream close]; + + NSOutputStream *outputStream = [NSOutputStream outputStreamToMemory]; + [outputStream open]; + NSError *writeError = nil; + [mpi writeToStream:outputStream error:&writeError]; + XCTAssertNil(writeError); + NSData *writtenData = [outputStream propertyForKey:NSStreamDataWrittenToMemoryStreamKey]; + XCTAssertNotNil(writtenData); + [outputStream close]; +} +@end diff --git a/ObjectivePGPTests/PGPPacketHeaderNewTests.m b/ObjectivePGPTests/PGPPacketHeaderNewTests.m new file mode 100644 index 00000000..64a47442 --- /dev/null +++ b/ObjectivePGPTests/PGPPacketHeaderNewTests.m @@ -0,0 +1,94 @@ +// +// PGPPacketHeaderNewTests.m +// ObjectivePGP +// +// Created by Marcin Krzyzanowski on 17/01/15. +// Copyright (c) 2015 Marcin Krzyżanowski. All rights reserved. +// + +#import +#import +#import "NSInputStream+PGPTests.h" +#import "PGPPacketHeader.h" + +@interface PGPPacketHeaderNewTests : XCTestCase + +@end + +@implementation PGPPacketHeaderNewTests + +- (void)setUp { + [super setUp]; +} + +- (void)tearDown { + [super tearDown]; +} + +- (void)testNewHeader0 { + UInt8 headerBytes[] = {0xC2, 0x64}; + NSError *error; + + NSInputStream *stream = [NSInputStream inputStreamWithBytes:headerBytes length:sizeof(headerBytes)]; + [stream open]; + PGPPacketHeader *header = [PGPPacketHeader readFromStream:stream error:&error]; + [stream close]; + + XCTAssertNil(error); + XCTAssertNotNil(header); + XCTAssertEqual(header.packetTag, PGPSignaturePacketTag); + XCTAssertEqual(header.bodyLength, 0x64); +} + +- (void)testNewHeader1 { + + UInt8 headerBytes[] = {0xC2, 0xC5, 0xFB}; + NSError *error; + + NSInputStream *stream = [NSInputStream inputStreamWithBytes:headerBytes length:sizeof(headerBytes)]; + [stream open]; + PGPPacketHeader *header = [PGPPacketHeader readFromStream:stream error:&error]; + [stream close]; + + XCTAssertNil(error); + XCTAssertNotNil(header); + XCTAssertEqual(header.packetTag, PGPSignaturePacketTag); + XCTAssertEqual(header.bodyLength, 1723); +} + +- (void)testNewHeader2 { + + UInt8 headerBytes[] = {0xC2, 0xFF, 0x00, 0x01, 0x86, 0xA0}; + NSError *error; + + NSInputStream *stream = [NSInputStream inputStreamWithBytes:headerBytes length:sizeof(headerBytes)]; + [stream open]; + PGPPacketHeader *header = [PGPPacketHeader readFromStream:stream error:&error]; + [stream close]; + + XCTAssertNil(error); + XCTAssertNotNil(header); + XCTAssertEqual(header.packetTag, PGPSignaturePacketTag); + XCTAssertEqual(header.bodyLength, 100000); + XCTAssertEqual(header.isPartial, NO); +} + +- (void)testNewHeader3 { + + UInt8 headerBytes[] = {0xC2, 0xEF}; + NSError *error; + + NSInputStream *stream = [NSInputStream inputStreamWithBytes:headerBytes length:sizeof(headerBytes)]; + [stream open]; + PGPPacketHeader *header = [PGPPacketHeader readFromStream:stream error:&error]; + [stream close]; + + XCTAssertNil(error); + XCTAssertNotNil(header); + XCTAssertEqual(header.packetTag, PGPSignaturePacketTag); + XCTAssertEqual(header.isNew, YES); + XCTAssertEqual(header.bodyLength, 32768); + XCTAssertEqual(header.isPartial, YES); +} + +@end diff --git a/ObjectivePGPTests/PGPPacketHeaderOldTests.m b/ObjectivePGPTests/PGPPacketHeaderOldTests.m new file mode 100644 index 00000000..77eacbda --- /dev/null +++ b/ObjectivePGPTests/PGPPacketHeaderOldTests.m @@ -0,0 +1,112 @@ +// +// ObjectivePGPTests.m +// ObjectivePGPTests +// +// Created by Marcin Krzyzanowski on 17/01/15. +// Copyright (c) 2015 Marcin Krzyżanowski. All rights reserved. +// + +#import +#import +#import "NSInputStream+PGPTests.h" +#import "PGPPacketHeader.h" +#import "PGPCommon.h" + +@interface PGPPacketHeaderOldTests : XCTestCase + +@end + +@implementation PGPPacketHeaderOldTests + +- (void)setUp { + [super setUp]; +} + +- (void)tearDown { + [super tearDown]; +} + +- (NSData *) checkOutput:(PGPPacketHeader *)header expectedBytes:(const UInt8 *)expectedBytes length:(NSUInteger)length +{ + NSError *error; + NSOutputStream *outputStream = [NSOutputStream outputStreamToMemory]; + [outputStream open]; + XCTAssertTrue([header writeToStream:outputStream error:&error]); + XCTAssertNil(error); + NSData *data = [outputStream propertyForKey:NSStreamDataWrittenToMemoryStreamKey]; + XCTAssertNotNil(data); + XCTAssertEqualObjects([NSData dataWithBytes:expectedBytes length:length], data); + [outputStream close]; + return data; +} + +- (void)testOldHeader0 { + UInt8 headerBytes[] = {0x88, 0x10}; + NSError *error; + + NSInputStream *stream = [NSInputStream inputStreamWithBytes:headerBytes length:sizeof(headerBytes)]; + [stream open]; + PGPPacketHeader *header = [PGPPacketHeader readFromStream:stream error:&error]; + [stream close]; + + XCTAssertNil(error); + XCTAssertNotNil(header); + XCTAssertEqual(header.packetTag, PGPSignaturePacketTag); + XCTAssertEqual(header.bodyLength, 0x10); + + [self checkOutput:header expectedBytes:headerBytes length:sizeof(headerBytes)]; +} + +- (void)testOldHeader1 { + UInt8 headerBytes[] = {0x89, 0x10, 0x10}; + NSError *error; + + NSInputStream *stream = [NSInputStream inputStreamWithBytes:headerBytes length:sizeof(headerBytes)]; + [stream open]; + PGPPacketHeader *header = [PGPPacketHeader readFromStream:stream error:&error]; + [stream close]; + + XCTAssertNil(error); + XCTAssertNotNil(header); + XCTAssertEqual(header.packetTag, PGPSignaturePacketTag); + XCTAssertEqual(header.bodyLength, 0x1010); + + [self checkOutput:header expectedBytes:headerBytes length:sizeof(headerBytes)]; +} + +- (void)testOldHeader2 { + UInt8 headerBytes[] = {0x8A, 0x10, 0x10, 0x10, 0x10}; + NSError *error; + + NSInputStream *stream = [NSInputStream inputStreamWithBytes:headerBytes length:sizeof(headerBytes)]; + [stream open]; + PGPPacketHeader *header = [PGPPacketHeader readFromStream:stream error:&error]; + [stream close]; + + XCTAssertNil(error); + XCTAssertNotNil(header); + XCTAssertEqual(header.packetTag, PGPSignaturePacketTag); + XCTAssertEqual(header.bodyLength, 0x10101010); + + [self checkOutput:header expectedBytes:headerBytes length:sizeof(headerBytes)]; +} + +- (void)testOldHeaderIndeterminateLength { + UInt8 headerBytes[] = {0x8B, 0x10, 0x10, 0x10, 0x10}; + NSError *error; + + NSInputStream *stream = [NSInputStream inputStreamWithBytes:headerBytes length:sizeof(headerBytes)]; + [stream open]; + PGPPacketHeader *header = [PGPPacketHeader readFromStream:stream error:&error]; + [stream close]; + + XCTAssertNil(error); + XCTAssertNotNil(header); + XCTAssertEqual(header.packetTag, PGPSignaturePacketTag); + XCTAssertEqual(header.bodyLength, PGPIndeterminateLength); + XCTAssertTrue(header.isPartial); + + [self checkOutput:header expectedBytes:headerBytes length:1]; +} + +@end diff --git a/ObjectivePGPTests/PGPParserTests.m b/ObjectivePGPTests/PGPParserTests.m new file mode 100644 index 00000000..f8f77d6f --- /dev/null +++ b/ObjectivePGPTests/PGPParserTests.m @@ -0,0 +1,123 @@ +// +// PGPParserTests.m +// ObjectivePGP +// +// Created by Marcin Krzyzanowski on 19/01/15. +// Copyright (c) 2015 Marcin Krzyżanowski. All rights reserved. +// + +#import +#import +#import "NSInputStream+PGPTests.h" +#import "PGPParser.h" + +@interface PGPParserTests : XCTestCase + +@end + +@implementation PGPParserTests + +- (void)setUp { + [super setUp]; +} + +- (void)tearDown { + [super tearDown]; +} + +- (void)testParseKeyring +{ + Byte keyring[] = {0x99,0x01,0x0D,0x04,0x53,0x8E,0x9E,0xBC,0x01,0x08,0x00,0xD0,0xB3,0x0C,0xDE, + 0xA4,0xD3,0x28,0x87,0x5F,0xEB,0x60,0x6B,0x92,0xF8,0x93,0xF3,0x11,0xA2,0x22, + 0x6F,0xC5,0xF4,0xF5,0x67,0x64,0x2C,0xA6,0x36,0x62,0xC0,0x14,0xF0,0x4C,0x25, + 0xFB,0x4E,0x05,0x6E,0x39,0x42,0xC8,0xA9,0x6B,0xCD,0xC9,0x0C,0x4D,0xFC,0x6D, + 0x68,0xAB,0x75,0x73,0x08,0x2C,0xFD,0x69,0xA2,0x57,0x06,0xE1,0xF6,0xDF,0x2C, + 0x86,0xE6,0x07,0xDA,0xAD,0x21,0x89,0x5F,0xD7,0xB4,0x18,0xB0,0xC5,0x6B,0x39, + 0xDE,0x5F,0xA7,0x88,0x99,0x0F,0x5F,0x9D,0xAF,0x6F,0xAB,0x13,0x51,0x69,0xBA, + 0x52,0xCB,0x7E,0xE9,0x1A,0x49,0x79,0x55,0xBD,0x5D,0x90,0xCE,0x59,0xDF,0x1C, + 0xBB,0xDD,0x6E,0xE4,0xB9,0x04,0xDA,0x05,0x85,0x30,0x56,0xB1,0x8E,0x35,0xD5, + 0x46,0xFE,0xD8,0x55,0x07,0x48,0x1E,0x26,0x42,0x85,0x37,0x81,0xA8,0xE8,0xE6, + 0x99,0x7D,0x4B,0x3D,0x6B,0xEE,0xAD,0x15,0x01,0xB5,0x31,0xA6,0xB8,0xF0,0x36, + 0x93,0x59,0x0A,0xE2,0xAC,0x5C,0x32,0xF0,0xB4,0xF5,0x1A,0xD6,0xF4,0x7D,0x6B, + 0xA5,0x62,0x9C,0x8B,0x2D,0x8D,0x1D,0xC5,0x77,0x23,0x3F,0xB6,0x77,0x43,0xFC, + 0x0E,0x80,0x6A,0x1F,0xB9,0xF0,0x69,0x18,0x8B,0x71,0x94,0xD2,0xA6,0x8E,0x1A, + 0xEF,0x7F,0xC7,0x96,0x35,0xCC,0xC0,0x1C,0x43,0x52,0x4C,0xF9,0x54,0xD4,0xA7, + 0x48,0xA5,0x1E,0xC2,0xD8,0x31,0x6A,0xFB,0x35,0xAC,0x05,0x20,0x66,0x7A,0xFC, + 0xFD,0x20,0x8A,0xAC,0xA9,0x8E,0x05,0xA2,0xA9,0xE0,0xF4,0x1B,0xFD,0xF5,0xD1, + 0x01,0x6A,0x34,0x13,0x0E,0x69,0xDE,0xD2,0x82,0x73,0x7F,0xDB,0x00,0x11,0x01, + 0x00,0x01,0xB4,0x26,0x50,0x61,0x74,0x72,0x79,0x6B,0x20,0x44,0x77,0xC3,0xB3, + 0x72,0x7A,0x6E,0x69,0x6B,0x20,0x3C,0x70,0x61,0x74,0x72,0x79,0x6B,0x40,0x64, + 0x77,0x6F,0x72,0x7A,0x6E,0x69,0x6B,0x2E,0x63,0x6F,0x6D,0x3E,0x89,0x01,0x3D, + 0x04,0x13,0x01,0x0A,0x00,0x27,0x05,0x02,0x53,0x8E,0x9E,0xBC,0x02,0x1B,0x03, + 0x05,0x09,0x07,0x86,0x1F,0x80,0x05,0x0B,0x09,0x08,0x07,0x03,0x05,0x15,0x0A, + 0x09,0x08,0x0B,0x05,0x16,0x02,0x03,0x01,0x00,0x02,0x1E,0x01,0x02,0x17,0x80, + 0x00,0x0A,0x09,0x10,0x91,0xE0,0xE6,0xEF,0xF7,0x96,0x54,0x96,0x1E,0x99,0x07, + 0xFF,0x57,0x78,0x9C,0xF4,0x2C,0x1B,0xA6,0x71,0x0B,0x6E,0x0A,0xF5,0xC0,0xED, + 0xFA,0x7A,0xDF,0x13,0xE7,0xAD,0x7E,0x1E,0x2A,0x76,0x38,0x2D,0xFF,0x53,0x4B, + 0x92,0x4C,0x8E,0x7F,0x88,0x9B,0x8B,0x6E,0xE7,0x42,0xDC,0x73,0x1B,0x65,0xBF, + 0x0C,0x59,0xE1,0x7D,0xEC,0x0D,0xA3,0x5C,0x35,0x3E,0x90,0xCA,0x46,0xE7,0x71, + 0x5A,0xC6,0x1D,0x29,0xD8,0x8F,0x8E,0xCE,0x5A,0x77,0x3D,0xF5,0x5E,0xEF,0x58, + 0x98,0x31,0xFE,0x34,0x46,0x49,0xB1,0xBC,0x12,0x83,0xF7,0x6A,0x1A,0x6C,0x2B, + 0x15,0x3A,0x9C,0xB3,0x14,0x4D,0xD2,0x6B,0xD2,0xC1,0x7F,0xBB,0x4C,0x67,0x0C, + 0x36,0x9F,0x52,0x87,0x3B,0x5D,0x6D,0x1F,0xBC,0xCA,0xA4,0x9F,0xD6,0x6A,0x66, + 0xF4,0x14,0xD4,0xF0,0x20,0x20,0x36,0x72,0x8A,0x2A,0x98,0x5F,0xD2,0x08,0x19, + 0xA6,0x07,0x6D,0x05,0x3B,0x0A,0xCE,0xAD,0xED,0xB2,0xFF,0x82,0x37,0x88,0x55, + 0xC2,0xA9,0x5A,0xFC,0xC7,0xE1,0xBF,0x3E,0xA7,0xA4,0x60,0x33,0x5D,0xA4,0x04, + 0xD5,0x78,0xF1,0x6D,0x4F,0x20,0xCB,0x0E,0x44,0x24,0x2B,0xDD,0xFC,0x98,0x92, + 0xF5,0x73,0x1B,0xDA,0x7D,0xEE,0x56,0x34,0xB2,0x13,0x2D,0xE7,0xE8,0x78,0x60, + 0x82,0xBB,0x24,0x12,0x4A,0xDB,0x6C,0xC1,0x56,0x27,0xB0,0x91,0x35,0x95,0x28, + 0xAA,0x55,0xEC,0x9F,0xDC,0xF5,0xA7,0xB8,0xC0,0x7A,0xB6,0xDB,0x2E,0xAC,0xD5, + 0xDB,0x9B,0x9E,0x88,0x4B,0x05,0x5A,0x90,0x5C,0x87,0xB2,0x12,0x6D,0x2C,0xC5, + 0x60,0x67,0x55,0x9E,0x09,0xA6,0xF9,0x99,0x85,0xD9,0x53,0xA5,0x05,0xA0,0x3F, + 0xA9,0x89,0xB0,0x02,0x00,0x03,0xB9,0x01,0x0D,0x04,0x53,0x8E,0x9E,0xBC,0x01, + 0x08,0x00,0xD2,0x83,0x0F,0x69,0x8C,0xE4,0xCB,0x3C,0xCD,0x9E,0x36,0xC6,0xFF, + 0x8C,0xF6,0xF9,0xB0,0x7E,0x8D,0xFC,0x67,0x87,0xC8,0xAF,0xA6,0xEE,0x64,0x53, + 0x27,0x03,0x85,0xFB,0x96,0x3D,0x76,0xE0,0x9B,0x4E,0x64,0xD0,0x2E,0xDF,0xAF, + 0xEC,0xA9,0xD4,0x5F,0x8E,0x7A,0x91,0xE5,0xED,0x44,0x44,0x27,0x28,0x9A,0x28, + 0x28,0xFE,0x4E,0x03,0xF6,0x80,0x57,0x7B,0xF6,0xD4,0xF3,0x14,0xF9,0xA6,0x14, + 0xC1,0xFC,0x25,0x9F,0x90,0x9C,0x37,0x78,0x43,0xBD,0xF7,0x60,0xBF,0x20,0x1F, + 0xFC,0xA7,0x2C,0x79,0xE8,0x4B,0xCF,0xDA,0x37,0x01,0xB5,0x7B,0xA8,0xC8,0xE4, + 0x70,0xB8,0x40,0x44,0x8B,0x3E,0x11,0x7A,0xCF,0xD9,0xBC,0xC8,0x6C,0x90,0x7A, + 0x41,0x23,0x92,0x24,0x69,0x17,0x54,0xEF,0x66,0x69,0x2D,0x21,0x05,0x81,0x5C, + 0xF4,0xF1,0x34,0x12,0x2C,0x17,0x08,0x07,0x09,0x57,0x17,0x66,0xD5,0x80,0xC0, + 0x35,0xFB,0xE0,0x22,0xBC,0xA7,0x1E,0x69,0x3C,0xCE,0x56,0x5D,0x0E,0xC3,0xC9, + 0x7B,0xAF,0x8D,0x44,0x4D,0x04,0x6C,0xB5,0x59,0x19,0xCA,0x69,0x38,0xD2,0x86, + 0xCB,0xD3,0x16,0x8D,0x95,0x92,0xC6,0x58,0x5C,0xB2,0x29,0x31,0x2E,0x57,0x55, + 0xE4,0x0D,0x21,0xFD,0x71,0x3F,0x07,0x85,0xF8,0x22,0xF2,0xA5,0x30,0xC1,0xE0, + 0x64,0xF7,0xF0,0x26,0xFE,0x2A,0x67,0x39,0x02,0x51,0x83,0xAD,0xB3,0xFF,0x43, + 0x73,0x68,0xA7,0x3B,0x24,0xE9,0x02,0x03,0x97,0xDE,0x90,0x9C,0x04,0x94,0xCD, + 0x2B,0xD7,0x79,0xBF,0x64,0x51,0xD0,0xC6,0x8E,0x38,0x76,0x4C,0xA7,0x96,0x4C, + 0x23,0xE0,0x8F,0x00,0x11,0x01,0x00,0x01,0x89,0x01,0x25,0x04,0x18,0x01,0x0A, + 0x00,0x0F,0x05,0x02,0x53,0x8E,0x9E,0xBC,0x02,0x1B,0x0C,0x05,0x09,0x07,0x86, + 0x1F,0x80,0x00,0x0A,0x09,0x10,0x91,0xE0,0xE6,0xEF,0xF7,0x96,0x54,0x96,0xD1, + 0x6D,0x07,0xFE,0x30,0xA9,0x50,0x49,0x99,0x9D,0x7C,0xDD,0x40,0x53,0x9D,0x9C, + 0x3D,0x27,0xB2,0x83,0x2A,0xE2,0x79,0x2D,0x5E,0xFA,0x41,0xA3,0xA5,0xCB,0xF2, + 0x08,0xF3,0x9F,0xB8,0x3A,0xC9,0x32,0xFC,0x23,0xA3,0xBA,0xE6,0xD6,0x68,0xDE, + 0x68,0x44,0x5E,0xD6,0xC1,0x5C,0x4B,0x09,0xFE,0xC0,0x21,0x5E,0xFD,0xDE,0x25, + 0xCD,0x61,0xBE,0xC5,0xFD,0x7A,0x01,0x06,0x38,0xB7,0xAB,0xA3,0xF3,0x88,0x94, + 0x0C,0x63,0xC4,0x01,0x22,0xF3,0x6E,0xA7,0xB1,0xE9,0x25,0xB8,0x88,0x1F,0x79, + 0x48,0x72,0x92,0x32,0xD7,0x9E,0x28,0xA5,0xDC,0x1B,0xE7,0x3F,0x28,0xD8,0x01, + 0x15,0xBF,0x06,0x8C,0x81,0xE0,0x7E,0xD8,0x75,0x7E,0xA9,0x34,0xBD,0x3E,0xA4, + 0x82,0xA0,0xA5,0x6B,0xDF,0xB6,0xD5,0x31,0x26,0xA1,0xAA,0x78,0x45,0xD1,0x48, + 0xFA,0x5E,0x2A,0xD1,0x55,0x74,0xBF,0xD7,0x8B,0x6F,0xB3,0x00,0x98,0x46,0xB6, + 0x4F,0xAC,0xDB,0x03,0x75,0xAB,0xA2,0x22,0x32,0x5F,0xEE,0x8C,0x96,0xCB,0x7C, + 0x68,0x51,0x65,0x38,0x04,0xBC,0xAC,0xCD,0x57,0x2B,0x9A,0x39,0xC3,0x7C,0x96, + 0x0A,0xD8,0x6D,0x05,0x31,0x92,0x11,0x0E,0xA1,0x07,0xBE,0x1F,0xD3,0xAB,0x09, + 0x74,0x51,0x74,0x74,0x55,0x16,0xA1,0xA7,0x50,0x15,0x97,0xF7,0x2F,0x5B,0xDC, + 0xD1,0x66,0x4C,0xD2,0x5D,0xEC,0xB0,0x70,0x3F,0x1F,0xA5,0x7A,0x6F,0xB4,0xB3, + 0xCA,0xA9,0x41,0x49,0x46,0x97,0x1F,0xF8,0xEE,0xB5,0x86,0xDD,0xE0,0x51,0x2D, + 0xCB,0x5F,0x18,0x61,0x9C,0x78,0x39,0x61,0x06,0xCD,0x53,0x44,0xB0,0x03,0x2B, + 0xBA,0x66,0xE7,0x23,0xB0,0x02,0x00,0x03}; + + NSInputStream *stream = [NSInputStream inputStreamWithBytes:keyring length:sizeof(keyring)]; + [stream open]; + + PGPParser *parser = [[PGPParser alloc] init]; + NSError *error = nil; + XCTAssertTrue([parser readFromStream:stream error:&error]); + XCTAssertNil(error); + + [stream close]; +} + +@end diff --git a/ObjectivePGPTests/PGPPublicKeyPacketTests.m b/ObjectivePGPTests/PGPPublicKeyPacketTests.m new file mode 100644 index 00000000..869885e5 --- /dev/null +++ b/ObjectivePGPTests/PGPPublicKeyPacketTests.m @@ -0,0 +1,59 @@ +// +// PGPPublicKeyPacketTests.m +// ObjectivePGP +// +// Created by Marcin Krzyzanowski on 18/01/15. +// Copyright (c) 2015 Marcin Krzyżanowski. All rights reserved. +// + +#import +#import +#import "NSInputStream+PGPTests.h" +#import "PGPPublicKeyPacket.h" +#import "PGPPacketHeader.h" + +@interface PGPPublicKeyPacketTests : XCTestCase +@end + +@implementation PGPPublicKeyPacketTests + +- (void)setUp { + [super setUp]; +} + +- (void)tearDown { + [super tearDown]; +} + +- (void) testReadPublicKeyPacket +{ +// Old: Public Key Packet(tag 6)(269 bytes) +// Ver 4 - new +// Public key creation time - Wed Jun 4 06:21:16 CEST 2014 +// Pub alg - RSA Encrypt or Sign(pub 1) +// RSA n(2048 bits) - ... +// RSA e(17 bits) - ... + + Byte publicKey[] = {0x99,0x01,0x0D,0x04,0x53,0x8E,0x9E,0xBC,0x01,0x08,0x00,0xD0,0xB3,0x0C,0xDE,0xA4,0xD3,0x28,0x87,0x5F,0xEB,0x60,0x6B,0x92,0xF8,0x93,0xF3,0x11,0xA2,0x22,0x6F,0xC5,0xF4,0xF5,0x67,0x64,0x2C,0xA6,0x36,0x62,0xC0,0x14,0xF0,0x4C,0x25,0xFB,0x4E,0x05,0x6E,0x39,0x42,0xC8,0xA9,0x6B,0xCD,0xC9,0x0C,0x4D,0xFC,0x6D,0x68,0xAB,0x75,0x73,0x08,0x2C,0xFD,0x69,0xA2,0x57,0x06,0xE1,0xF6,0xDF,0x2C,0x86,0xE6,0x07,0xDA,0xAD,0x21,0x89,0x5F,0xD7,0xB4,0x18,0xB0,0xC5,0x6B,0x39,0xDE,0x5F,0xA7,0x88,0x99,0x0F,0x5F,0x9D,0xAF,0x6F,0xAB,0x13,0x51,0x69,0xBA,0x52,0xCB,0x7E,0xE9,0x1A,0x49,0x79,0x55,0xBD,0x5D,0x90,0xCE,0x59,0xDF,0x1C,0xBB,0xDD,0x6E,0xE4,0xB9,0x04,0xDA,0x05,0x85,0x30,0x56,0xB1,0x8E,0x35,0xD5,0x46,0xFE,0xD8,0x55,0x07,0x48,0x1E,0x26,0x42,0x85,0x37,0x81,0xA8,0xE8,0xE6,0x99,0x7D,0x4B,0x3D,0x6B,0xEE,0xAD,0x15,0x01,0xB5,0x31,0xA6,0xB8,0xF0,0x36,0x93,0x59,0x0A,0xE2,0xAC,0x5C,0x32,0xF0,0xB4,0xF5,0x1A,0xD6,0xF4,0x7D,0x6B,0xA5,0x62,0x9C,0x8B,0x2D,0x8D,0x1D,0xC5,0x77,0x23,0x3F,0xB6,0x77,0x43,0xFC,0x0E,0x80,0x6A,0x1F,0xB9,0xF0,0x69,0x18,0x8B,0x71,0x94,0xD2,0xA6,0x8E,0x1A,0xEF,0x7F,0xC7,0x96,0x35,0xCC,0xC0,0x1C,0x43,0x52,0x4C,0xF9,0x54,0xD4,0xA7,0x48,0xA5,0x1E,0xC2,0xD8,0x31,0x6A,0xFB,0x35,0xAC,0x05,0x20,0x66,0x7A,0xFC,0xFD,0x20,0x8A,0xAC,0xA9,0x8E,0x05,0xA2,0xA9,0xE0,0xF4,0x1B,0xFD,0xF5,0xD1,0x01,0x6A,0x34,0x13,0x0E,0x69,0xDE,0xD2,0x82,0x73,0x7F,0xDB,0x00,0x11,0x01,0x00,0x01}; + + NSInputStream *stream = [NSInputStream inputStreamWithBytes:publicKey length:sizeof(publicKey)]; + [stream open]; + + NSError *error = nil; + PGPPacketHeader *header = [PGPPacketHeader readFromStream:stream error:&error]; + XCTAssertNotNil(header); + XCTAssertNil(error); + XCTAssertEqual(header.packetTag, PGPPublicKeyPacketTag); + + PGPPublicKeyPacket *packet = [PGPPublicKeyPacket readFromStream:stream maxLength:header.bodyLength error:&error]; + XCTAssertNotNil(packet); + XCTAssertNil(error); + XCTAssertEqualObjects(packet.createDate, [NSDate dateWithTimeIntervalSince1970:1401855676]); + XCTAssertEqual(packet.MPIs.count, 2); + XCTAssertEqual(packet.keyAlgorithm, PGPPublicKeyAlgorithmRSA); + + [stream close]; +} + + +@end diff --git a/ObjectivePGPTests/PGPSignaturePacketTests.m b/ObjectivePGPTests/PGPSignaturePacketTests.m new file mode 100644 index 00000000..1dc8e831 --- /dev/null +++ b/ObjectivePGPTests/PGPSignaturePacketTests.m @@ -0,0 +1,116 @@ +// +// PGPSignaturePacketTests.m +// ObjectivePGP +// +// Created by Marcin Krzyzanowski on 21/01/15. +// Copyright (c) 2015 Marcin Krzyżanowski. All rights reserved. +// + +#import +#import +#import "NSInputStream+PGPTests.h" +#import "PGPPublicKeyPacket.h" +#import "PGPSignaturePacket.h" +#import "PGPSignatureSubpacket.h" +#import "PGPPacketHeader.h" +#import "PGPSignature.h" + +@interface PGPSignaturePacketTests : XCTestCase +@end + +@implementation PGPSignaturePacketTests + +- (void)setUp { + [super setUp]; +} + +- (void)tearDown { + [super tearDown]; +} + +- (void) testSignature1 { + +// Old: Signature Packet(tag 2)(317 bytes) +// Ver 4 - new +// Sig type - Positive certification of a User ID and Public Key packet(0x13). +// Pub alg - RSA Encrypt or Sign(pub 1) +// Hash alg - SHA512(hash 10) +// Hashed Sub: signature creation time(sub 2)(4 bytes) +// Time - Wed Jun 4 06:21:16 CEST 2014 +// Hashed Sub: key flags(sub 27)(1 bytes) +// Flag - This key may be used to certify other keys +// Flag - This key may be used to sign data +// Hashed Sub: key expiration time(sub 9)(4 bytes) +// Time - Mon Jun 4 06:21:16 CEST 2018 +// Hashed Sub: preferred symmetric algorithms(sub 11)(4 bytes) +// Sym alg - AES with 256-bit key(sym 9) +// Sym alg - AES with 192-bit key(sym 8) +// Sym alg - AES with 128-bit key(sym 7) +// Sym alg - CAST5(sym 3) +// Hashed Sub: preferred hash algorithms(sub 21)(4 bytes) +// Hash alg - SHA512(hash 10) +// Hash alg - SHA384(hash 9) +// Hash alg - SHA256(hash 8) +// Hash alg - SHA224(hash 11) +// Hashed Sub: preferred compression algorithms(sub 22)(4 bytes) +// Comp alg - ZLIB (comp 2) +// Comp alg - BZip2(comp 3) +// Comp alg - ZIP (comp 1) +// Comp alg - Uncompressed(comp 0) +// Hashed Sub: features(sub 30)(1 bytes) +// Flag - Modification detection (packets 18 and 19) +// Hashed Sub: key server preferences(sub 23)(1 bytes) +// Flag - No-modify +// Sub: issuer key ID(sub 16)(8 bytes) +// Key ID - 0x91E0E6EFF7965496 +// Hash left 2 bytes - 1e 99 +// RSA m^d mod n(2047 bits) - ... +// -> PKCS-1 + + Byte signatureBytes[] = {0x89,0x01,0x3D,0x04,0x13,0x01,0x0A,0x00,0x27,0x05,0x02,0x53,0x8E,0x9E,0xBC,0x02,0x1B,0x03,0x05,0x09,0x07,0x86,0x1F,0x80,0x05,0x0B,0x09,0x08,0x07,0x03,0x05,0x15,0x0A,0x09,0x08,0x0B,0x05,0x16,0x02,0x03,0x01,0x00,0x02,0x1E,0x01,0x02,0x17,0x80,0x00,0x0A,0x09,0x10,0x91,0xE0,0xE6,0xEF,0xF7,0x96,0x54,0x96,0x1E,0x99,0x07,0xFF,0x57,0x78,0x9C,0xF4,0x2C,0x1B,0xA6,0x71,0x0B,0x6E,0x0A,0xF5,0xC0,0xED,0xFA,0x7A,0xDF,0x13,0xE7,0xAD,0x7E,0x1E,0x2A,0x76,0x38,0x2D,0xFF,0x53,0x4B,0x92,0x4C,0x8E,0x7F,0x88,0x9B,0x8B,0x6E,0xE7,0x42,0xDC,0x73,0x1B,0x65,0xBF,0x0C,0x59,0xE1,0x7D,0xEC,0x0D,0xA3,0x5C,0x35,0x3E,0x90,0xCA,0x46,0xE7,0x71,0x5A,0xC6,0x1D,0x29,0xD8,0x8F,0x8E,0xCE,0x5A,0x77,0x3D,0xF5,0x5E,0xEF,0x58,0x98,0x31,0xFE,0x34,0x46,0x49,0xB1,0xBC,0x12,0x83,0xF7,0x6A,0x1A,0x6C,0x2B,0x15,0x3A,0x9C,0xB3,0x14,0x4D,0xD2,0x6B,0xD2,0xC1,0x7F,0xBB,0x4C,0x67,0x0C,0x36,0x9F,0x52,0x87,0x3B,0x5D,0x6D,0x1F,0xBC,0xCA,0xA4,0x9F,0xD6,0x6A,0x66,0xF4,0x14,0xD4,0xF0,0x20,0x20,0x36,0x72,0x8A,0x2A,0x98,0x5F,0xD2,0x08,0x19,0xA6,0x07,0x6D,0x05,0x3B,0x0A,0xCE,0xAD,0xED,0xB2,0xFF,0x82,0x37,0x88,0x55,0xC2,0xA9,0x5A,0xFC,0xC7,0xE1,0xBF,0x3E,0xA7,0xA4,0x60,0x33,0x5D,0xA4,0x04,0xD5,0x78,0xF1,0x6D,0x4F,0x20,0xCB,0x0E,0x44,0x24,0x2B,0xDD,0xFC,0x98,0x92,0xF5,0x73,0x1B,0xDA,0x7D,0xEE,0x56,0x34,0xB2,0x13,0x2D,0xE7,0xE8,0x78,0x60,0x82,0xBB,0x24,0x12,0x4A,0xDB,0x6C,0xC1,0x56,0x27,0xB0,0x91,0x35,0x95,0x28,0xAA,0x55,0xEC,0x9F,0xDC,0xF5,0xA7,0xB8,0xC0,0x7A,0xB6,0xDB,0x2E,0xAC,0xD5,0xDB,0x9B,0x9E,0x88,0x4B,0x05,0x5A,0x90,0x5C,0x87,0xB2,0x12,0x6D,0x2C,0xC5,0x60,0x67,0x55,0x9E,0x09,0xA6,0xF9,0x99,0x85,0xD9,0x53,0xA5,0x05,0xA0,0x3F,0xA9, 0x89}; + NSInputStream *stream = [NSInputStream inputStreamWithBytes:signatureBytes length:sizeof(signatureBytes)]; + [stream open]; + + NSError *error; + PGPPacketHeader *header = [PGPPacketHeader readFromStream:stream error:&error]; + XCTAssertNil(error); + XCTAssertEqual(header.bodyLength, 317); + PGPSignaturePacket *packet = [PGPSignaturePacket readFromStream:stream error:&error]; + XCTAssertEqual(packet.signatureType, PGPSignaturePositiveCertificationUserIDandPublicKey); + XCTAssertEqual(packet.publicKeyAlgorithm, PGPPublicKeyAlgorithmRSA); + XCTAssertEqual(packet.hashAlgoritm, PGPHashSHA512); + XCTAssertEqual(packet.hashValue, 7833); + XCTAssertEqualObjects(packet.creationDate, [NSDate dateWithTimeIntervalSince1970:1401855676]); + [stream close]; + + // check output + NSOutputStream *outputStream = [NSOutputStream outputStreamToMemory]; + [outputStream open]; + XCTAssertTrue([packet writeToStream:outputStream error:&error]); + XCTAssertNil(error); + [outputStream close]; + NSData *outputData = [outputStream propertyForKey:NSStreamDataWrittenToMemoryStreamKey]; + XCTAssertEqualObjects(outputData, [NSData dataWithBytes:signatureBytes+3 length:sizeof(signatureBytes)-3]); + + + Byte publicKey[] = {/*0x99,0x01,0x0D, */0x04,0x53,0x8E,0x9E,0xBC,0x01,0x08,0x00,0xD0,0xB3,0x0C,0xDE,0xA4,0xD3,0x28,0x87,0x5F,0xEB,0x60,0x6B,0x92,0xF8,0x93,0xF3,0x11,0xA2,0x22,0x6F,0xC5,0xF4,0xF5,0x67,0x64,0x2C,0xA6,0x36,0x62,0xC0,0x14,0xF0,0x4C,0x25,0xFB,0x4E,0x05,0x6E,0x39,0x42,0xC8,0xA9,0x6B,0xCD,0xC9,0x0C,0x4D,0xFC,0x6D,0x68,0xAB,0x75,0x73,0x08,0x2C,0xFD,0x69,0xA2,0x57,0x06,0xE1,0xF6,0xDF,0x2C,0x86,0xE6,0x07,0xDA,0xAD,0x21,0x89,0x5F,0xD7,0xB4,0x18,0xB0,0xC5,0x6B,0x39,0xDE,0x5F,0xA7,0x88,0x99,0x0F,0x5F,0x9D,0xAF,0x6F,0xAB,0x13,0x51,0x69,0xBA,0x52,0xCB,0x7E,0xE9,0x1A,0x49,0x79,0x55,0xBD,0x5D,0x90,0xCE,0x59,0xDF,0x1C,0xBB,0xDD,0x6E,0xE4,0xB9,0x04,0xDA,0x05,0x85,0x30,0x56,0xB1,0x8E,0x35,0xD5,0x46,0xFE,0xD8,0x55,0x07,0x48,0x1E,0x26,0x42,0x85,0x37,0x81,0xA8,0xE8,0xE6,0x99,0x7D,0x4B,0x3D,0x6B,0xEE,0xAD,0x15,0x01,0xB5,0x31,0xA6,0xB8,0xF0,0x36,0x93,0x59,0x0A,0xE2,0xAC,0x5C,0x32,0xF0,0xB4,0xF5,0x1A,0xD6,0xF4,0x7D,0x6B,0xA5,0x62,0x9C,0x8B,0x2D,0x8D,0x1D,0xC5,0x77,0x23,0x3F,0xB6,0x77,0x43,0xFC,0x0E,0x80,0x6A,0x1F,0xB9,0xF0,0x69,0x18,0x8B,0x71,0x94,0xD2,0xA6,0x8E,0x1A,0xEF,0x7F,0xC7,0x96,0x35,0xCC,0xC0,0x1C,0x43,0x52,0x4C,0xF9,0x54,0xD4,0xA7,0x48,0xA5,0x1E,0xC2,0xD8,0x31,0x6A,0xFB,0x35,0xAC,0x05,0x20,0x66,0x7A,0xFC,0xFD,0x20,0x8A,0xAC,0xA9,0x8E,0x05,0xA2,0xA9,0xE0,0xF4,0x1B,0xFD,0xF5,0xD1,0x01,0x6A,0x34,0x13,0x0E,0x69,0xDE,0xD2,0x82,0x73,0x7F,0xDB,0x00,0x11,0x01,0x00,0x01}; + NSInputStream *keyStream = [NSInputStream inputStreamWithBytes:publicKey length:sizeof(publicKey)]; + [keyStream open]; + PGPPublicKeyPacket *keyPacket = [PGPPublicKeyPacket readFromStream:keyStream maxLength:sizeof(publicKey) error:nil]; + [keyStream close]; + PGPKey *key = [[PGPKey alloc] initWithPacket:keyPacket]; + + Byte userIDBytes[] = {/*0xB4,0x26,*/0x50,0x61,0x74,0x72,0x79,0x6B,0x20,0x44,0x77,0xC3,0xB3,0x72,0x7A,0x6E,0x69,0x6B,0x20,0x3C,0x70,0x61,0x74,0x72,0x79,0x6B,0x40,0x64,0x77,0x6F,0x72,0x7A,0x6E,0x69,0x6B,0x2E,0x63,0x6F,0x6D,0x3E}; + NSInputStream *userStream = [NSInputStream inputStreamWithBytes:userIDBytes length:sizeof(userIDBytes)]; + [userStream open]; + PGPUserIDPacket *userIDPacket = [PGPUserIDPacket readFromStream:userStream maxLength:sizeof(userIDBytes) error:nil]; + [userStream close]; + PGPUser *userID = [[PGPUser alloc] initWithPacket:userIDPacket]; + + PGPSignature *signature = [[PGPSignature alloc] initWithPacket:packet]; + UInt16 hashValue = [signature computeSignatureHashOverKey:key user:userID error:&error]; + XCTAssertEqual(hashValue, 0x1E99); + +} + +@end diff --git a/ObjectivePGPTests/TestingFiles/multiple-keys.asc b/ObjectivePGPTests/TestingFiles/multiple-keys.asc deleted file mode 100644 index 48d16054..00000000 --- a/ObjectivePGPTests/TestingFiles/multiple-keys.asc +++ /dev/null @@ -1,4559 +0,0 @@ ------BEGIN PGP PUBLIC KEY BLOCK----- - -mQINBFNhRJMBEADS4LsO+CjErHidNxcBTDjGqRmlP7k0UDHLTuQPpb0M4tM5YR7I -YyQmkG5lEiFuo7IK8Xrt5CeKtQAlC7oe0qsZi4d8nZE05Aoc9jr8u+j35qve/KWV -RpGlh/7uw/I4qkpQYFiLETkNvFH3lEb/TwJefqzGi9CgRz+hNp8sUTEJDLn7ZQWq -xJoCnY+4It77Hz6uafTmV4q7hZr+GF2w5ooXIeIYGf/IOzcsJMmfrDhIh7VN5i+Z -EiePOUsszfWxWJaUaJ4/SApJHrQwPI1ula8pAS9ZyD7kBeMUiWmyJ9cA7LmYmHn+ -/IauzHOT3mwLZEHwKMZpei8IXgYn8HyudQCuG3/sUFz9VSy9y4q/cnxQNeQPurc5 -e/InPm/K0oXxSbEdkqGEi3Cw2OALeWV/75K3sg+/zniy9Q1aYvrFE4xh0FykAbdR -Zj44jV4OovLAWR0GxPLGG7f0vSnkUlyw2IO5wa0A67xPO2/md+BLXkF/AW3OkRcS -A1UBIBLEEXJUT20AyOB/WJnonuu39x6t+1J2j0IL7zZYrsmw324H3GEyStCqpBEZ -IWdjiMoergM5SLanvd6G6lMMWzZH7Meu6EImK6sa7459wYYn9XgzdlyUfTWtGY6n -gO8RY98SfHSxsF7JBEcMnDZIyYD+pRM7awsmKkceOqN/mc7/2MFW4+57awARAQAB -tDNrZXliYXNlLmlvL2tyenl6YW5vd3NraW0gPGtyenl6YW5vd3NraW1Aa2V5YmFz -ZS5pbz6JAi0EEwEKABcFAlNhRJMCGy8DCwkHAxUKCAIeAQIXgAAKCRCXnksD3/4w -xjhJD/0dh+Pfw5y88LIJGiJL4QsXWupMM4eSYidIw33HZDggJe/txSRr3fCinzRX -9M/M9N3BoMfs/zKYgc3gpB/G3alrqm5MZtTIBDQZdVhQdJ/tTWuFhrLrtLeiyX9I -/LbqfoA1amYX8cRVyyszYyK2GLxOHQNlwFC+4V1dFoNrTlYp9zdeCQTaY3HX4QNI -mZmzes4Kc9DpDmcE9ehc8giSsWMDHsMWTy0seUTbeJmk4iMk8U8HMdAUg6ffbN3W -upmvKMXmxOKtvrc48Gjbt2uK06RAfFHXRxv/nMplDAq1g2yZJd6AOvrImia25fnQ -lP6XApF9spEuYLrW+FvH1Msv0UTjsGDLjvxi/9rKegKWZHvWPBeZZ7a9TnqICrKP -1ImrcNQuH8SSVqmULaiAS2qgskYOQeB5BTZy41BNzYawMxK0MlepcS1qIyJe7pJi -M4utK2EpBqMBFpvvKZjlr0WWP6dEadY5pa7d3ObqhqLR6yaaFzvKTsGIrdSeOhkP -C6E2lqVL8wUhWjEC1qrt34IlgZUY3+SWyKR8maEu8qQL4a6Wd1mBuszB/VW1Cg/B -OiuPm1oIKUANfNRFMfgnzJSZEge9dNw0FyroJFkUtO35UGM5Qkv7CAqGFmR730hf -Sherk1Ug3tQSDr6dN9JKBB0TyxBNhWWm3atvl3l2Bar8A2uyCbkBDQRTYUSTAQgA -y6jQMaGyj2UyTufxd+xs7kODskDTAubTOKNVgg0IkbFQ83d6ewwiW8tn8gJDx2tS -lUC7lnf2pYxrE5AsFguS/vCF2dlNKrgjmTU/O5fMwFgkAUuXadGMYw7OPgLSWRMO -Y2xzVT9/wACF/2z/PYEwxuLeMfQQ5O1+jTJ42QRUTjTWliR2sxW6BajKSLgR19P5 -WcMQ/Q6fI/Nw73CHElNkXjgPkVsdEFwD//EWO2+GV4PGCiZ6diGbz+gCY31RwAhx -xwcmuzR+AHNErWB0UQFfxOkcO8jQl7xoz1h91PfWkiR+udFMplQpt9/WzSKy3rKE -5s+Wt3464RIJA0oi/YMISQARAQABiQNEBBgBCgAPBQJTYUSTBQkPCZwAAhsCASkJ -EJeeSwPf/jDGwF0gBBkBCgAGBQJTYUSTAAoJEFBm9AMg5JzstxAIAMGvIk6rGuEx -HVdzwtnQ+3UzOEGjfHMaXuC2DcIwBuniLGhNNRiKXdxStNAeoS1168X/t266XWZE -ojrtJtSjH1quUCsHpgNPIrcuMOmSXzBPLrMb2qP4lBqzDdsROXmfMCgl7x5QzRHp -DN24V8TJrWuggqkm+IxlNG0xjg8ppc35JOvqilUr2XTMOUNsoI3VPdFhIDFXU8QU -PUS9Gc7DQjDdaQbytrVwg/0F16AoJ7/xOsFwZ/VZqUyVaEHfqLnWze/rRRB1pp7J -F/DYJRCOGBLHKWmS42GE0h+LQsUj/csNfcA47McwoY4trroIywddj8yVCmEVkegS -9aspxTYsAh0vSA//cQPJ+QNTNec+b3MspE2Hc40Ivu7i5kYy7RtldgDyVfzEI5bM -TqaKQudQ9jZHZGVO9wESCqvXaEBVApXVxUOJ2ZGapgJURqnnof5ymTV8Gxfl/hGU -PmwP/gpS6q/F32PLU4A9M1jeh4WP3eYYporb3TB14AwnVfXcSGJbJL2NpfOYrraf -yBDzNukfR15XjKySJfPQFF8LsMMqGBvw82Oz7fJaLaBE6Sc2sP21p377kh0wAZfp -wjw5f3eFMwOOaB6CK44Eie3DhXxPjKGYZyj75ZpznRUoDr5cFUFoi0hq8JyVfKNe -lQi5tsCC5RI24FWhKAmfRt1RP2bEg4c4cugyxhCJXD1gujyMep9p6fsTFdNi7+cY -ghH/SoO6rvd9wkgUpRs/vE0TdQXgCWOUxW7DnShq4a3iw5e1pppZAPzgF6rO+8cX -HlJr+t2VQEeiehATlS31/G3inAidWVB2VbownfAX0jlshwqa5hW07gSZkDLqA0Hd -ocAAlXRlCeN7I6IrIFcgH3twDkcgpWfimCPcf+hbsBIXyzRV3Y2c5WZIsZ6c5fKN -zp8XoI74CG+Nkx//wWCU3oSBRi/aQY5xOWfJw/yurs5n1l7jKQmNdoJRn//zAOJk -SmJ9T2KhxqcNjmKr16YlTClPPzDUUGITjutAvDjNwm1hjOddRyZGiL8Ip8S5AQ0E -U2FEkwEIANNfX91zbROimJ/Oo1cuyQ5ey9VMxTuh1sDN1d5EMwM7qBMBw+wIzrMl -hPzHZ/NrUb+GQsJ5fFkkx7Lzx6tWO5nsAtgG5bV+C1UAqCUNugK9QokpfkmxWVl4 -QFmk3WkHLMDoUN/1nOmLITJqbv6bCooGtFOCnndAO7xFlW05tpV8YvOlfxoG1uGV -Tx4Cpl2EAfqAaA6V5Z+omLz18p3kkLaNiugdL/NKGDWwIEsQh07KODuzHro6nl8/ -Bbk/eY0IW0ggaGXoMVpLJFYc2oMU5pYiXy1U3WkLGfY5m3Y3BPUXNe0i7QsqL57Y -cRH17HH5fHyFy8jnMZrhvnLsGNsC0dkAEQEAAYkDRAQYAQoADwUCU2FEkwUJDwmc -AAIbDAEpCRCXnksD3/4wxsBdIAQZAQoABgUCU2FEkwAKCRDwkBHrZn3x+EZJB/99 -Wo4ZIldYDwmwrdQrxKXM8VmIEH81uPlRCeXsB/31ffmHTrI3B/Sze7YgpRpRj6+o -bfceGP+qu+SWFI3jZq/fl3c9P4dKf+fLwhrOEjtCxgSpZcfuA2jTMQVZjVvC7NF1 -ehZtdFFprcdtKQRdUN5ddHrxhUpmGMhVPnruJoUvRYwRlH2s6+EzQwDpeFvKDdrx -ysfIVswhAATR2edAOkUncza8v7gVVrpJEpqhjnWUTcCUApFk/RpEf+K9qGVwcLc1 -LG/ssmmQ/SrGU34C3NGx5qKx8qvOkAcfHyrpn5ii/VWv2Dr5JUl+SI5Rlusx1DT4 -60OBr6aVKa3JoBhG/CAZJs8P/jNZzUsX+sjuwofafwlJtSbZq1pKiJNgI7KNFcQa -H9Zu8IcasmGWX/cuSi9IVAb0xiYESOpExcS50P97Ei/+9NjqH8Y9p9pvuKwde/VM -P8nbZnyT8IGE16japMCD6WbiLVxyP/XOjiXliqG7LKu+yBBCIE+9Oo123axXH7XO -WicXvZx+wqBIxNT4MNJzdOKSHCQhBZ9a0c4z6YEPM3aFFYc1iU4GHdxUySMdZRRB -NazkDcYw4WONUa5DGQ5udY+kXqsKzcMb9kfju+uMCEFytmkyVc2HKw5U0ylcEdXC -NI3NaNJ/UYCk+aL0jl6srcGI08d9J9M6ih/9/BZEnK6tB0YVhyXxyzT9NnQ3AapJ -AhJHqKIadXy8EIB2/N+GJtVjSzVmY9zoldy9RpWrRGZALt8n6fzeU67Jnk919VND -EeHEDsSSFTZvylNvd3mjGYIN+gG/bRsN5/ARLEkQvAft0p75JfRwUWLraV8BVCdP -TYgwqVN8RorRcJa6Y6d5FUVLn/KgXGAee4Lp8kKKeleDSPYR2XOSPVAMUebnsjzm -A3gYG3TQp2W6tCQifiEfkQJoAFUi4PLNqd3lIdO+JtKHw+69c7z59tZpTZynudup -oRfFvdhsAk7iue3SE15K/WymhxwxXmi20xygl40ScqjXRcXyHf5MjoLvGyWLHB76 -d23hmQMuBExtIfMRCACe8xHPWBciPfCkdN+4TNUPW04ahDdlSJk5fmzaFcx8GnJI -Lvzt+0Vbs4HPLUj0yJQz0ZXz+8EPqzs/sqBYZjh5doyGFqXG/Q3oD4Yxru9+msvT -QSd4yWQUl+2C/wYcomhHp3pRRbbLPn4/UYxOQtOeoOP5inr9DIPzQ4Ejz744DSSR -5SANAuYhFqN6XxOqQ04RxdlvxMQG3KIVsFGZ5IUBaY3ZplO/ul65nYgyE9jujaBB -F1O6OvEIUIHE0CwHReCsNSDZgS89lWfMDKFBcmfCP7hGfHE2sOWcTGVC38aaPjFQ -e76cWIXp191xySc71qVUeuKMWBLWLwSX+jZCFxWDAQDzDYJSwjdDvtGvF1X2ddcs -ylki/pK7uz5E4AuVzxoaSQf/WfSpc6VfWPIXkbPvstGq8sxx4cClylur11bpQ8Zs -qzSLEBOK2v+f2wnRGJAXy+Jq3Ur+mQhfZJiq+sM4gCCcVl9/uKnQrGWYKnZ8E9v3 -q0otO9i0/23HX9oFK8A11q6eJpXF89Y1cUwHVmAGaDoqMEc00vHYSZc+TMfzDR1P -W9ADO8wzkL1FYzSX8/5iV73PPpy1K4QCecKt6ejXg85WpEbl4HCBXotcQLL9J0+N -FbaXbypy0fvVTYQyHSbY5m5UhHXd7VHFo86UvUP6mym+UjfULMvScKf9DpjWqNEc -jdoGD1tMCguMV9bgM/vG6K35U5DOeA8JdTIy7jPNHDsVywf6A+pawnU/rDhUvlUI -ea6UmbW08vZ9DyUAtCtb2/BnZ20FDBCqp3OdIfjg9XLnQrI8GdQlfVDDoEQxy+9Q -hjM3JFB0apZIjvrMfdALq5+ywH9I/4xn7GPiIg2LDkFMtFCVA1ON6HNJz1flrjEL -t1cft3z8aevkAdBctsppzSZjdGigJcBoQunhE2E/JHG7hcun6LAIYyZXec5KbJjH -UJq+2YcM6u2T2gsE3FR/fIIh4JJ/Q2zI41R3m4Ao64XU0DtIYwHUo+6JcKi4d7aI -iObA8mmdLQesyamdA/E0taUu1htRY64yeWicgrBtKbY40/GKiW+4h5HIUjyl6rJW -9mvCLrRNR1BHTWFpbCBQcm9qZWN0IFRlYW0gKE9mZmljaWFsIE9wZW5QR1AgS2V5 -KSA8Z3BnbWFpbC1kZXZlbEBsaXN0cy5ncGdtYWlsLm9yZz6IgAQTEQgAKAUCTG0h -8wIbAwUJCWYBgAYLCQgHAwIGFQgCCQoLBBYCAwECHgECF4AACgkQdtePBQDQJsRU -3AEAvFkGuZWss09WEOzgE3CdoURSTTgevd26vkRlJg/GYioBAOB3Dm3ZeDcQhsz8 -MwP/YgYvzLLKmkVl2VX/y9WK9vbaiEYEExECAAYFAkxtIrUACgkQ3RyQelD+nTI0 -xgCggSIUHv5TjEOGyxptCqwvA/SXtZoAoNVlvx7HgKHbLJi6+G8kNvmB6dSOiGQE -ExEIAAwFAkzbnyEFgwj3hFIACgkQ1nmLjHgqz5CzRQD/QaMAoY/13mcxqIddEv9P -Zy/XmVbqzUR1WIJGoMOfyggA/A4hfhDgWqIW5O8bEWH4pCwyesNYwxCGEXBO6BqH -Vlf6iQIiBBMBAgAMBQJNBJQ8BYMIzo83AAoJENqHDBNGqVewTJsQALe+NvsBS6q3 -gXa6vKpHHyF3GvvWNhoMRo1Vm18JErGjoCcOZk0CYJqAeS4jzwGCUQVo905WP0sO -u8dJXHaa46MqFa3xE9quAdbpTLeXWED2HGbM2lz5Ff8ryoa7KvT5QWfIUSoc2nKt -mzSt/VHEbtRsLHDEy8YXPHCSsxS2Zs1RETUeETKj/TkjdiAyJ1vL/Fnr17JKxpDs -AKnCV94S3NrOT+3sNO/5XPWQgvfhtS3dhdGRN31TUrXw6R6TEv30BKJu2jvgK+L+ -Dqm6B9bp73VEElnKpBfMS7EzdV5hsPGJVuii8U0aZNPKgjiq4QZ5M9aFePbBrl/8 -5S0TGYT6gRK6c1pjjYZlGDdyxZW/gJmlQFASyStwTbE0Fi6/n0vjYxo1cWvlfEDO -QKotshR/6BfZdYFIAx39/TD5m4I2r2E70kcE44hs3Tb+TAB2EStTZN6UvnJLRAqC -zf4irmf4jlMbr7qQG2xz7ML8jwPRB12iPGMOG2nCFjhMORCeqWmMjrwcd5zims8w -ko99G5L2U10eHYjkaXNmbArFJ2EnITUuzUbxtJDVhmDk0yy2c7XjOhgdLctprD9U -Ca9ZXvCzEd94l+mTj8CrhJiRz9pSJPa5bSUrStM9ZcoeMt4yhgUEwBKldRTKrRcB -iVMYEizGQ84ibh986/x63FnAjZbTGM+ZiEwEExECAAwFAk1wNIsFgwhi7ugACgkQ -KjggYk6OPIWr0gCg5BkbQezK5qpO/Sr+neaV/H6kncUAn1c4Xc2gBCte6Lfp9G60 -Pwscp94jiEYEEBECAAYFAk1wfXgACgkQNu3+0KV6jvpDQwCfdqoMsEUGdwISXIZK -DpcYVuPceg8Aniywf6kIsMLQ3WclYihbRTVX4NU0iEsEEhECAAwFAk1wocAFgwhi -gbMACgkQpuQ7zoNd4fUlNACWMySpYkExmFMZp1JaR7uPDAzVtwCgng1qfRDisPnl -p3AUC8Un1jS4V2KITAQSEQIADAUCTXChAAWDCGKCcwAKCRDqwMLceZHIdRPYAKCe -m3cB/mvri3ENTD93CMHw4VfU8wCgxSUymzQ2rM4DCwP0ho0frWtzYoOJAiIEEgEC -AAwFAk1wtlUFgwhibR4ACgkQZPcqpDSeIwODNg//caMbnHFVKitU4ldRWjn7ZRla -y8f/d8sepl03YeQN62HHL74iQ65ugLCrYdIoftdCcmRs2x12jHRtTGQFtyxhQfF3 -9Du4MHlnn6tsXbPsl8shsT9hAW2kijMcOVcRkoZIl10eH6PZ7vZLueytlao+H1Bi -q6yNLXQh9Ki3RN/shXqvOTjmFSw6l97fiXq1kSI6tsPL69uryajv4c/Y4yb8e2iq -RyH1PQOjLuBQfssBPiMF9/biZxAfNaWOg5rujueP6Ir3igNdrTZ6Y2791uTk36uL -cCrWuEPIE2kdfggXdYJv8Od9srJrQ3sOSSewQfDAMsNG2L5DHAvVjjBJ6M5CLY4L -h0nOZmePwMqBi2YmjJkfAj23pI+w877PHVIp1OAjpzzoZJOmvY1opMsLbb/Xtrys -pHwfADk6ZZqUujEdl9erwnrMi63gDAylihwIibp6Oato268BeM9ObJrRpdEgsPcC -WDN7ScHBISDrX/GakAabOYrrIsE5TMsgZUo3MsNpnWY1QmlNb2F872bm91ayzU8O -Q3LhrR4dDjab9mCxw2ZoFwwvkpg7NO2PrC4/NFBRqNIIY/2FjeLbICMCqiNRZ2Tr -o856pehue7sLRZ6fEAuT3iCdZATA3qEw/Qxj5T9eI/BvZe2Hw1gI57t2zQLetPqd -r1DA63t5ASMzmS/DBzWJAiIEEwECAAwFAk1xR8EFgwhh27IACgkQWlS7uHgiXghf -OBAArDlrNEVxwSdC+ipQa1Hh5mRDmNUzo7oGb3rQuMeuQl6xl/hbPFaqlSeXFLvZ -SkEDbG4OqS7MNeoqqoGqlLV8pwOiTqGWtFrwf/E+CIIR10iYa2RphA4wvkvU9SGo -XYxMe7WGg7ShUV2GrorlivBh4ibpBJaBuUkXRr32GUDSk8D6Ix6MP6W4n/QfCJOd -xaR0ouMt4+Xw5c+4XgeF5QiVgct09dYuvp+98wBMxIvP1x3zpCLzzqmGSr/0zbsL -iTxv68A+tbAl7AvrKq22ljtc/QUX7xDxjdx/ZUfMapLLaZXPaO1/XpPMO0VpaQLX -FuoF54YzG6r/p2un4tmqjyeeSf15CQZ25uwPNW4/2ZoxoJ/bXovk5oZ7exB8POzT -8AXKqDShAEstGmNKD9MFmeLNHE/P0rbg1SOi6WlzpxySh2Z5e4hZ68P7evVPPmrH -QqXFFGOigTKD7+0hC5oJI4+ckRIjKNFoZcq08dKMMUubdJHIHiWG4uax+ZNIflp3 -DsmHK0X6azsECdwjyxoORFK1jouhDiLc1n4SJF5RZ+VQ4ilFe2hjxYnVzD7HwAeR -IwlDxCCzqasYop5W1MFFy8FhytZ2n+BumZcybWOow1FA+PkrrOfl9UmO1jbZIBMr -0B2dTmeia3kzmdDtxDk3Q47r4a/QXBDGUcZS8gTZpFhIrzmJAiIEEgEIAAwFAk1w -l4EFgwhii/IACgkQMuZ62qzk7dY2KA/9HCIFPgwDFa9/2zpNvKyBrOrbgtOCMz2J -prsOw+f3KjyGB858BO3+NmtJQ/D1H9aRfy1PW8KwCc/a9PlT6f89FuwTv1hfCSve -eOUHEP0u3UIJwJMB1aQc3YXNAlTfVoEAOtusL7AbXwSj52UtuAEvqdaM5FF5Erog -+VUyVnUlVWU2kUzQn0ib9KVC28izKzjGEiCr0EtR3B927nvniWIh/FvqjIAYWVKG -k300jzStf1FJcYOfJhAqBKZ6t1nJE6smtd8ZTA+86FTe4Cij+52LsKRFAxDFBBMp -Tr5Ne6Z9QpVt+ItIE0ahLD0rcYFuRKfo1g7IL3r/i+JuDIOjV++ixMY39iBYot4O -5AOswuAaixvqPrBkF6sOtMCxNLr3p4BlXaerpiVYQENgodnFcUKI0nE0g/FSO8US -boxFVWH66YR0DMyWFFldSgRRcvY5bdyFUpax5gTGVYhMQV94g3qje77TzirvBQyP -8vqzlLdOaMu5FSWNsXwwYQiJSufcI6b/1wP7+PMkEfvsOO66e9v1C0264k09Fzld -NET29D8WEh+ffBpoJCOzU513ZHpy6vvGdfKzs5E0DCkD+gFvnkiLm9kHrsPVYAn9 -n5Ts+WlfdUAx5pfwhwmFn9pSCK+Ti03EjRL5kC6mEoGfWA4rhVtqyvzEVgGyj8zT -dYqDfSDvSS2ITAQTEQIADAUCTXCiEQWDCGKBYgAKCRDQWrByDaQEGMjzAJ0QqT8l -JknxrAqKQ5wmNbpA5++1nQCeM0LGE+lL7b6AMAJDageVXLll6XyIZAQQEQgADAUC -T3h54wWDB4YfgAAKCRDPwUoQyPhdUaWCAPwMq38HemVSR3WCL5HNxUlxNaEqcSoo -3mJIUX4FniQ5WwD+J8bP+DPEKfv/tv+4ZU2AXYUrgC0SLcEhUhzpQxypY5iIZAQS -EQgADAUCTwMRjgWDB4YfgAAKCRDlgnEyb59JN7AfAQCTGR2QHJXHlJF4VEC6Mvq2 -usA3tRw2Uicod5+rWm0eywEAklchb/Ir3fUTqErew49OhscYBvS06oSeqiCYctyU -cAaIZAQTEQgADAUCTXg/BQWDCFrkbgAKCRCpQsVmE5wJxo65AP42Sl+zkTE7TrDu -op7Q7oJiFQQmuaGNNnnzXmx0yc1UTQD/ei/8P+AeBWp5FrSGKE01fEKRebUmAtMr -WFyveOboefmJARwEEAECAAYFAk7CVqgACgkQgUIt4LWAaE5MdAgAkQwioTR6axYA -kdwYDrbCVWkOUWEpOdBqnGn5u+paCFA7FinCJmixWHLubNG61AMfOpwiWf28Grbr -j6ihilycKpOXWeoNNi2YoSn/JTUnHgv7ayvL/l1/TU+nukn8iVJ5FO2kqXLONT2L -4IfP1D4gTXrEX01hmzLq2vHxTPtMk1imi49iSNUOBg2fP0ppXcxQekj664vhLHiM -oGiH+R4DKIF+8KVnMOjGDuq64NjKfUyz1lzMB4lt92D06aB5SxWCCJcHakmy9noh -ZagYG6VrSPz7xdG1RQeSsAsOn/7M4mnpqoonSiUtqsRre1SMXS8uALs/HwgBvky4 -gOdq0aIXCYkBHAQQAQIABgUCTxvD5gAKCRDOH+rCOScOhxa3B/4+1IfF9o1lb8ol -yhWK3KnTMepFMbzRJbAsL2qtSKmyaN7XW7rOlmq89uBmIb1Gnb2xZ0/qmOXj6Tiq -i4UkBy/4Q4LDe6gR/KNQ5z4xXAYLokZfnR35QRhrlp8f+PHWceRxVMHFd4lEs2/j -dZVcX2AtXCMAHm+4OjAVhupgwDEs2V0l77d5d6nShjcrGIIN5SHkXuMly+A2ITeU -9EGZhYbSB0qyC5CBdVocJNO9cIDznZXsrTnPHz2ibEWHJSN3ZEy2U2olSiBIiAOK -5L20urjyQKM+xFlruWnAjZdtW92V/TdVyjQ08uOVvaWXveMIq18tI2mCwjMERz0u -m3SmJL6WiQEcBBABAgAGBQJPcvliAAoJEHWir3Fa8De9KLwH/iUjfC8S1oKq1dpb -aacKMcpEk1mEkdPxROhx53GJIFOL1vPpGPhi4synHWEuRBD1NNGBjzlOUF4MM3ZD -4a/AB5IoLtykvpio7GwtjrKGRyIMyce41Jl85U0hCxbvqez85vcj1Iedp/v7sAS1 -sWOdPLlWnwvyX18PTtkWs5KGRLOrgdYjPvUdjcXT/lD3wBOk3nhGmflj6/k/qhy2 -cbOnDj0t6fjLRmjpywGsDoSCrlgIvzfdzVenUHzzkJJt92IcwtytaJh7YzNQWy0N -DAR2YnYuZZpmH4V8HsrNMx1beyDDZ5LeJJcPI4kod8ftsLyLXb+gpje5MVnxgRXK -Hlt8h4iJARwEEAECAAYFAk/MtZoACgkQi9GocOhXnV7HdQf+P7TMiO+EtBtqkTsr -9hmO/UHI96ZR7zIVHweA2LmufRsakTVpdpteQlOfpNxuOVIhSomWBYZ7ny8iVqs9 -b6DH8UUASF/xseYsiypjfkZdJWHcEbIOpEaY+hUwlF/IkmOlD+YH/lFHMADTY4Tn -olRu7cWxSutTDnbj/usU5fGyhRr5yCFEXWmFvxzQur2Ds6w2LNSW6j6aJHZnYhWN -4zQfWt4mKT0UPP6KoQGqLAQZPC1BqGe2E8KWRooma2CfCwV8lxh1lbpk1yiARzM5 -KutG05YmCmj6DTgIp43eYiXiS/lH4des5sU/gQU+jtCyMlXny0kKM6KATaMdwwK7 -U4K4E4kBHAQQAQIABgUCUJThkwAKCRBH6hpFrSGdOhl+B/9vEeaLq6pPR794F8nZ -KeP5zE2s+8Wq8VfRSbvkXwCpdhgK/PG3CI+QSiebmYTe8LauUq5m4sHKdSuuwKeb -UjcC/HHuKErnbOm/GHrthQZbX8DYfH/jsuFaS6J1Y3VUD/fGnkcOoRp0JFJ4/yCd -ep1T/kSRaYnG5IcKiAFNtjS2Eb9W8S/DsaKg2NhwlpmeV8DGa8D0jI8TmTqX9dOm -cl5yipRQq/qaXvVJcmVpA7UYYav3AzTPJT5Tz1EaqGu8ZReqwp1LzC2RDwPdh4O7 -xhRcXQa9PWV3/yArYIWAqw3zKascKmcu4m0Ep0lsgopFW8ypg8kZ171uXOzsXUqg -9uwciQEcBBMBAgAGBQJO416wAAoJEEkBWOU7kgfnyNYH/2W12ZLgPi1HsY/y4x/O -8DrYwN4x+MHcAX1CIW9jDdy8w5oO/HcufaOUCq1mds8QQmttnJUIUol15YIO8+EA -hZ6abR4edOn6x530TcdDvgdU27Pj3xravnXeyEva9jxdufUt3dbfba0OjndGtoTi -MGptDUNPByS4j9eROopsJzwj5HCAkRPXV9rD9iuumzkbd0w5QHj661bWgGUtELlC -6hAwCu+rtQw3a4Li32uwSDIiosd/t8R3hDxTreSN1cS1F0rjcg/QH1a+Sq9OSuBT -D/u3i9VRASCSzWutu0MEOSdMEA1hz4+q7YaR2angC8LaBVakWF6+O8EY50/vbVda -5haJARwEEwECAAYFAk9JgTgACgkQMZwhNNgqrJEthAf+JzffAAIiI3PmEnj6gF6T -oz0E1OKPDzibXbeJzWrHlkc0wITlL8Jm8+KoZIaWNt/xO3YO+/W16cGulv4sM+G4 -t+o19FOIhQx/tZhSTwj87ORNdcgyUZXJzDmSt8oel8AJHUj7zdZkrXjn5sm/uumC -7sWjYyVBSMdlTYJkxv+1PgaN6lNicCR48vXDKwD+aQRfwmBtK4mVkUr8ngof9C7n -yNApHpyjeaZVIorvh9RNny2hUFIF1kT7Fc/1qsJLQFGHi7YQ/6TyBOBHLfNj5fpb -LAYGqeYT24RldznXtXy7o8ECX8y9LT3ALnziLKknJmnmVExacErO7jBF4CNEL8Du -eokBHAQTAQIABgUCT3M9vgAKCRD8+//H5ao+rfGwB/0WzOo6/SFKRP9HzldgBV/G -/blPR02ClGibY7F+ygBEBWTgXwIUrptX0HXZMJyMgYxuxSenu02OfOb5orMa86pf -wU/L+/d5icftj7qHSjBUAxLBpTURESf3iuZe4a4ZeZvjM1U3lDCGZIdWPOhG1hSQ -mjWbznC8Lv7bkCOJf8goLYYNsBhluxe4sKEhdAZRrtZ1m0COaVrEKKndh+l2/67c -L7tY/tWq8saA1vdat1XrltDHnPoQA6IeXoZ1XfD02i1VaGKKbypApoLy+9FI/nUB -LjD50scMDgf9BVQ1ndH+FkH9qD/wujWyxnmrVqeZjObzw++1fiDKcUf5wTOoz0v9 -iQEiBBABAgAMBQJO3cWDBYMHhh+AAAoJEDsCYm2euUkYtyYIAKBnCHw88lQQMlhd -gY6XviIa28vMSKNn4sinBAlyl+1j5Pyb9auXXgX/1/j3KqD7w7OWuVbC+aw93qpX -yjf0gzl/xEpCX6GUd6yK/7tT6gsIsNuCoHFmBaEXUvATe/vji8c3sOugDmdSombn -TvHRVukb6O3m/gsuRTsGbXnYdWi7DvqhHbr6qVS2a9hIJ5AWYy+ToFuCjR2KS1fu -2qKpOPvX4tR74jFVDpC/on8vAs5h9BuQKcBwNSNNf/1KOA/DaV2mJ4GxTi8n1lFa -rv+YtgkCoa+IaoLX9RQo6Ibu4ZdbO2adhSdiXISNCDZuND3Q8vJij1HeL4MZYubW -a8lo5+eJASIEEAECAAwFAk7iSXEFgweGH4AACgkQYTzNtOb9oHWLaQgAjL2QldYx -ip4X+TnqzMEAhTEkmm8zeafFXpB+ABKV7wKblBtCELyul44ye1U467QQyOArm/zv -5ziwxLmnYs84XDUvEMF9VuoZtqEs2vf9uot9YhzGieHORxhUcf/h7bHmwr/4i3Sp -I2JcqW1VMg28C6fZGtvQPr3t282H5ips6o3h94z0KxcqXE+me9Qi60wD8Di84Uy1 -Hp+7JA7iYGd8AYjoTsB4bs0/gpxZHGDw8g8uNeIoeAC0WVjQKwVoO2f6bBkCvTdE -ZchOMAlsFsuVY9whQ+ot0k0eMB32qzBYZY2kHbOnSTi0HOzopeVps322FsSvmL5g -5ytmNBzYKEOG4IkBIgQQAQIADAUCTvMAvAWDB4YfgAAKCRAkU1D2AYeO+UvLB/9L -D002MMMb5X++rZMBdaShFh37YFrvYKKd6Nw9EYeVupHL1SEPjG8VtcXmsIatXs2g -LG5ZGN7vmrLqEuxKf8Z1RtXua1VwahLofd83M4zfFxK+12U7nFY6zBc0dwB8s+aA -gASfUQCNTCW0whw/MgYUbLFrGK0qj0IsGVomWD1aj2An1Hux/XUZtEcA/OrhpXyY -+UX1UeEATsqBdMjjoUsNc6YP5XSV5HsUFcwMw44Yt0sR6d9WhQ59eFesKwglccOz -23J4Cs/GGZZxdH2Vaw97zHHBchtK0gQMxPDgEJbfMwjF6FheUO3bNgNR5nF2F3Sq -JNsuCoJeoYmElJANK0rgiQEiBBABAgAMBQJPL3IVBYMHhh+AAAoJECyW8uhQXaIr -ttsIALm1HyI7G+/DAgTxP46cDfjXCq32s/+l7/hq0uaMdMwqNm4tSqJGBmd3Uwso -c/A8uqjfGwR3I9HYjw7zzorrM7uvQAo/2JzOxX9JE/oP3lcvB85k10oLGOCen2vG -45G4MPNgmd2itHxcVKwGu2+A5c6FBXHr7DMfJUxasoqAJeMIMuBOfM0QtP8xKdr3 -DVRiEnZNmIKHai92PQ32MUIrSa91tkkWfxuVOmTI0v//XjS+77d1YRicYIXV6XCf -AOzvzhN3FLN1AUBVtJZiAoTaoQiYoWQE8FW6pjPixRP0Ds8jTKCjMSImRnuriB2b -XK57xOEef3eZabCgHmYBJreoG0OJASIEEAECAAwFAk9Vn2EFgweGH4AACgkQGS6/ -3iZjG/dXcwgA225T/F9bkzwHaTcT0d1gpJFCiLZ/phH/oPQ3kcTeKnji97EN6/ti -5zQYE1eElHmx194WbTgvbWUDBu05/Lv8n6Pxdo9d1R7a1WnMIPIOPo9URwecHQC4 -MNjkgk1rhMry/WIRB2x+fpmzFdIHGh3dFuoLQiIkM/VVA2E+AQ5GqIiYkzjBd6h8 -nxLS73zCmjeFj5FI2O1GkV+YSU3N1D7JcMFLz6JwEbY0rGc51sFs/IJut8cijrn+ -OXOX8IsJcZK1YAwlJgwAz/zWmnXCgX1Xt9VmEil62zR2lpjjef46d7K5hmXcn273 -cGCv3SxLXdTeg+EAH5MWKxAUOgC44FA/b4kBIgQQAQIADAUCT3omigWDB4YfgAAK -CRBc1o//FnJEAa7EB/sHoybEX95OVw+8+juFA+C9YPEr/pwi+rpviEgvtB4SV3xc -93Ge8/tC/pVlwHteCQCED6dbBoT4k0phq3B4s8+1zwFV+A+NGTn9yhSfMHTv1ftq -tHEv/NlBpEG0zs0tNEac2+1q/0hGl+X/XU9YhIeeNl3V/zSkEI4GDdRq8Q3RN+R6 -0BpradcMoudumqEP4MIrf9BtgzklhSmClwlw8HUclzGbMA0VstzzhQ6q6LfT11T1 -k02eU1660jFVfpOqJ1NJbA7OFPc8xYvH15XJFK9OhH4dq1Qj6X6HQhK6XIDaB39O -evYOlrsYkNuHgtXgOSbxZWccoNV07iT+epRRu12AiQEiBBABAgAMBQJPfDCaBYMH -hh+AAAoJEC7xrouD4N7pi9MH+wRXV5swwaMagY8gJGQnbF162Z772AhTKIdCwXwZ -szxQEC93+y81GFbIn3NcHkd9GhNGjqjj9wOqT/pI7/U1VoVqLkJjV+mBdUswGibV -kHniP17F3GseSmS8RIb0G+4Oeo1J88TjDC0KyAlxZ+G5PgP+rZ5jJFgt/TBkDhLv -SCS9fIRWbWGKTaGbbWXs4QtfkChgy0m7c2RDE0t4Avn4zz16hh2isKz9828IT0dv -y2POid03/052QNeVzGHZEKuaYdFID/xTfz1N/oEJvIFOhaZMqNroZFLjIFa8u/5+ -koh5MpNiNjxO9LzG2MygR1J3p7Q7zu53W0zslhu3uieKZaeJASIEEAECAAwFAk+F -PfQFgweGH4AACgkQmSoarFeoOojK0AgAgdN0nU4NYO6dDBT4o6L+MSG8g7thAJy1 -ROER4tD33R1nAO3iKNZM8Oaorvd8RqBLbeJvtgFKGncUtCKdgxxQr7rtq6hrk5Qd -oS4wywMTLoKkibjswQO2nDQx2NbOefXVebDibJSFsfOGtEcd1mTPVmH0GXLgzPjW -cVMX6DfRHkg4S9O11m4MllllX5cpwjKO7z5qBJpvOMp7H4D5ZPhd5LSyHufETQRz -ropN/xkS0zt9coxL2fPDwbzL+18eJf9uImQtgqdwsaTQxqVoil7sGpoNJlBYk3pd -uTR/c72K/IhCmlA+hiyVz62Ok8ioyOUlJ1c37jvxG69RC2hVwovaSYkBIgQQAQIA -DAUCT5xfDgWDB4YfgAAKCRByZ4oZdKGDOKgTB/oCujDg1BPLbI5rHLd+0vJwI9Bz -1gMOaGSDelV6EkQRIq11dUX0epxq6C+nzJJ66dW8BEuciJmhGy1OaVASIX/KrWRG -3B2CHVHNQCbOm/fOhShkUQfQR6VeI3JR6q5O6NuNlLvYBxmAYWTeYC50biIfVAhM -YV9E7kIedh5HaF8eszXwa3loxD5P8CYQSDvRBsRNN/gqEObxYZo0nnLVcdbnydOm -MDUqPRAKLrYLCdrFQ8Tc+lNNWQVAeONNGCA5eEhS6ctZwyADZLZwQawV72xhb9wH -0G2PuwJk31FOjBQkzvDdoNljjJV9zyFyifha/c+7aQObp98EpHyYiiBabDDNiQEi -BBABAgAMBQJPnwtUBYMHhh+AAAoJEJwyJptJrSjMCogH/3s3O3du9lcbaAuNX+0m -K6MkbOGn/yJ8oJQNjzFTxaqJFuduRLNDZFUKTiVBkaXHBWuhiga5g9AFhoOtwouV -xCtOiAl2v1UkyuOqpMwBSHBSrs9fAfC1wMe4PqHmSZI0+dqxvl5mio89vaYnDqju -F8fleMeJD3Yrf9L9lqtGJsxsXvUhR+Q4PXmYcQCb9+qgYiZPeWQk1dNQoWOnRX2r -7w5YDuq6R4I8bjK/0mFO9PzVMdeFC+8bMpUqOtlSWfQ4qzKbkGH6sYxOo0Ni4cpU -8kuqr4J+Pu//PrjNx3APkPNbKhH+cDhBdku4e4KYOYRUW7Gb7gvcdk1RyL0D9wrG -zqGJASIEEAECAAwFAk+rqS4FgweGH4AACgkQ9RLabOvb5gvtpwf/Vl9B3u0mi+R8 -cDUYIQUmsngZQ3a1cetzr4BNhdD2gHMjs8obXxulcUTpYhia7FXzn1sUoUMIFL+P -2osCwrIopWEh+18Oa5Ib0sZhbu6dU49h3tM0X+wWbnA5qYvouN+6sIBdbHCuJCU9 -EWdtONcWJUA5+BuHqWCAJn73z+d6Q0UI3YW9ppd69hA0PDt+gKGQJPeA+3zEeqTm -1kikf2lHqe19Z3i8p0GzWqwIlEtUc5dR2HErFBxiZNjUMJCSsWM1gLHIMfbMZ6iM -V0ZHGq/rsSCcs1W8alax9SgwHiBhe8IVlvJTmrLPyGceWHHgjb+ETyLaXodNHXYp -as367PP6vokBIgQQAQIADAUCT8hJ2wWDB4YfgAAKCRAS9/cykjEpGC8tCACFhZNS -4ptLhJOhfYm8AyB5DbNMxSwPrVMIe1n6L9AAc+DTpPxHmUDPk8lY7CFfNPrc0BiU -nowLR31pC2aRhSneTbmc7qkUmhVdlOFFHmkhPSKURxZaPQcwKKfzIh7gmO+W8xJm -kGlq//ki3VfvFhldnnDY20T/cWbHnAtbUqOnmCrcEyX7cxHwYFsgDEg5sTzbqVkp -eweEmH0wwHE2Ii1NLmSzqsUNAdabp6W2jQ0o//C5/Nhu3Wbac8su/2XG4YL+9D2t -p4l38IJKHZR3lzqsjYuKl/2qSvnzsFFLfPeFZO+cp8s1M8cTv27KtIaYxm0KTJsR -FvzXhpz+oCfemAA5iQEiBBABAgAMBQJP/thIBYMHhh+AAAoJENl9A18TBIuKzhQI -ALtAWr2RaF/cZfB6FmZDs1rA+k5v45/AJjxKRX/8nueZZPhyeSYJqI6r6Uf/qqL6 -VaAExHnTVvEsGUtPBYOeLF+EoaY68oJl9+RvDOXx18SCEWY6SD5dgMLsm+iEzDow -ro+Kpitg28joP6+XQl39Axjd+RzKvkLnJW6gWQrUhIMmKcS9/PT49ezKRtDdU7L6 -E1LNcAur6mEPB8I85YUu5sAbN76h8zZDmy1VId6PPUexonpgtE93GyjVNkxPZKdm -hTrZh4YFaR87ErgOhzhtuw66AfRBWdW5r1SN5qXgk6fG2eggm+25LzJHyzfpa/9z -iwmFLXzrQhn9NG2XOUc8f3uJASIEEAECAAwFAlAxi4MFgweGH4AACgkQOSr/o1B+ -/PP1xQf+Pvvz6YXkzJqrqX7X8mQMaxS61aDVgiZFzo+aQ23EQTJ2OqOZY8cmjySw -RQ2a/1MeXfVwJW/RuwNEJEfOh1F8iA0YI1eH0nTy/tsZehhinCtaz+sJnPBILssT -VMhUfYp113xdmc3d4+2l8p9pNcHL3WnWX2Ywi6ssHiUQCQFvYaIrs3pBVYHwibMH -f52ULTd7dsZn42hqrYzzw9IcPos5B04yk99VNZ2Er0SCZEx3v3qHvBUtCC4jyMU4 -8mSQHEgDf7gSrJRF35XOWZQp2CJ4hGhdxmworhOu3u0MqYOU0L7IPnb3U4abh7eG -9yxvC6XrF2NHskpARMEgL9mjvxh+sIkBIgQQAQIADAUCUHsoPwWDB4YfgAAKCRBk -uIKR847pBpS8B/0dhLF5OQ3SVIvxFQoDCqI2pXfPUB4RzGTjKGUl/q4opQrhIv/X -6mlrK9OFUogSIvhUoZPKmyYsrA/r58SXtchm5MCkYQk7hrjzvVB+V0O+VTdoMc6R -CizaOayP6hVFxGZyw24u0LlYJqKr09ROPHWp0cIvZymsauaF2wCVSISLt1HFtXNK -5Pi81kfOqXMBDmBSOpQpykoI57iyMrYvHk0EpnamTQuO2jCMICNDO4k10ZLTHs2+ -QHPvqxFUQdPmqtCQePkQQDC5jnML8cxaA/CVHOf0aQQK6XW8xMo91XqJ9Lj7uK6B -FuFStSzRcC0NY2uIhoSW76cno4YycMssNAcSiQEiBBABAgAMBQJQmRGWBYMHhh+A -AAoJEPy/JN1ZQCFs6CUIAImf5KMC0MniTMUMaZN8lAhZvuvvWdI/IKvwKUP3w0pF -9gkeEyLO8fcjBOX6jBCL5J6HE/vO78LPp7icep1L6yE0BzHxMzVdvwlzVg6q4OIY -s7vGBfnOf7pPjP5UtFbyEMz6i+EQm9jeQNi8aUJYpqq81kW/Qi/f58/tENwGWUh8 -M4RD+dARIWbWnZ4m7uK/SM7MJ560b04BGxyzanwzJhzRZH9vRgqz4jMwLwQkUY1X -N9mkZNmzBqMWoF4s0Vz6al4DJtPlbVQw2SI3qC96dph8wYrnHvXbT09bmT8kXMB9 -+336c7XDEgdCloNPDXqcKPOoX9G//Cn97tkWganH6iSJASIEEgECAAwFAk8Jn0IF -gwlopIAACgkQevafMsBBCqe1YQgAlzdVPUomEsCWuKPPflAOR33AsFIA97iJpins -P6CwV0bSoHl8Jx4DLUiwCVgiitmsApJKWq8m9mqTbzybUqJhfaWkmEMipJtK3YRZ -tJ+sJh7QkFiCC4xh8m9ACd+KgRA9xJD2EoNU8NA5kL+2oFYhbh3UaO6HwQj1A6Ar -36aF8P98249LwAP7dtE0vCgwHo9CBHQAA+fElzttWaefpfdCLOSVnK0mXev5soMC -0Vu0gpPq8QkNB0PLn9+Jz6hz7uxaVZLYFbXga72fv9aJqK5LPgolWuFRWxuSAVuk -MpNo1kFwAdFzpny+ZMG0Dz2zkWQcjOkHByCeSb2D5Rl9mP/ylYkBIgQSAQIADAUC -T0d93gWDB4YfgAAKCRBWsLlsct17XUoLB/9RHbTyDA6pLBn5kAvhc30WR/Xicw6K -xqLLN/eXCq2yzwwmbsktutyE9F6RwFxM+NZ4i0wNlzvNAPnyYTvbQEs0Og3XA4nm -5N9GY3Ms83HB/I4GxMjY1gd30tG5aN3DwhrmDR+5kYEQU26U+gNMdIBGcLz+m+2m -xXXm4UkCRvTPalpueW7VntuEExobq1bkoCOERIGgXd2zpIA3oR5jyWRretlzeBzq -N712829VG7ZJo3qqETL++CMCQdIIe9gD9t/VbwbNyLh5G9PVqXsexViCqgcWnP+g -SRk9xDcMUSSkp+LispNP0Rqo6cLDgWgmxqNeBHSU8t+BDdrEakzUpZUniQEiBBIB -AgAMBQJP/A5JBYMHhh+AAAoJEEJHVeHIH6MaoxAH/AtY7B2KVLbQpfYo4kestvJQ -/N5c0mRdoOrxG7/GBBcAAHctNFJ+dnjN6vqDRUgh7tAbEyfj3I4burRhW02IaS8h -APZYJ0bhCC8WC6AP0W4/f2sUemdph5eTOGlJQLyStwNeK/v48Y0wI2kTOHxW4Xf+ -sWRBf3xHeCxW9+XNZIMMe/vK0xdyHWcx91Mfw0HuuPMf8E5wHL5P2hJEVwfpYubK -vm1wGaMSYujnSULVIVaUWoEI/7EKWUdrc1kWw5YaUdLibmXcPWrx04dPFwhnWLY4 -806cr+40299X6FLnbA8LXSYCQEaR/dsEo4eAAHzdRNP/mP59hNHGZG0x3UtitoOJ -ASIEEgECAAwFAlAlxLIFgweGH4AACgkQI5OU/n9qcEFMnQf/dLzQyZ314VXZ6YmH -v2SHKO8DhPiFAlnLA6y06cjmVrCVxLFemeOOx/zIMh7ps2jGOcPCICrMlecjpjo7 -5X3+t6rSii5xtF53rqf/qzNkoL0o46fJdZSChMABEj9Eibgcz9uHWx80ZKh8Adjc -lKc8fXfNbD2YinQJ2fV/DkOtyZelxb5oP0DA59bPjUy8DBatnamDrQbgRUi8wswc -PJ8PtCulWnQxevXIlkuKFjzSPK03FUnv4n6vmb31bIakEdalRgsn0cQfxVh3iybo -3xvc3c/ex9Tag3ozDTmfjCVWSRyG4SbYML1SNiE+Th/458x3UqRzxutaX8D8uvV9 -KSLTFIkBIgQTAQIADAUCTtZ3tgWDB4YfgAAKCRCFNfr9JPHx00WoCAC0i3Gpj1sN -Nj2uLCyA9oJWO+30cLATNMCKPcdj27xfK/qaS90Ws8ysJhBPxZHgxFp+6Oqypg2S -lXLHLd6YQSKEq0snIwnwt/JY86uGvF7Ceo14L+tfOJHd4Q0OjHM+TAsO5BL3KTJ1 -iDRWFJqcJcgHWhWIOeJLQc1oT4wTzTVLun3hgXlmypugMfqZ/Ok5kdGKXoMtABl4 -Y977QiwoqAuZhAs9u5J5fOAtTr37/3h2a8jJFyEUVCUt9ngnxrad26CmT/g9e4bG -gBTBreM+vlm2TN95gL+aHH+D3/36mGrx8C+NcUZEp5SYalfIc7GhBW/Rx6lzh5z7 -3AsCpDK7SnKyiQEiBBMBAgAMBQJO/KtjBYMHhh+AAAoJEDMh6WsBpRI6ALQH/RvL -wFWLUCT1BPrnTbc5Yo0WSio/ySogZEStGApbuKzbvJ83+9nL6H0nspGD4/ZMZBDQ -Gbt14Ar3rdeH5n2Bk5oX3k+iQm0v1pFBjY6W4I5jgmLbEglN16QJ6ThlwxUwwK6l -6+XObn4t97mHXoVngHPXLKvU9tm2OON5Vf2XIrfpV92uYxG52HDNn5B6njdz8uEz -pNKrezWHQwdoglgFhjl6dh1ElnIxjTKxrvaWUhVBWTnkYvrrj+NH/Tz5j9QyTeqX -d7fg33FqIx2dF72sqQwAGVHPp1kQdyecZpfJqGwQi0W0q84Z8eQJUkNZNEkJXjIG -NnODWuElnEVL8D+lRwmJASIEEwECAAwFAk8Ii+UFgweGH4AACgkQSC5x2ryNj9sv -vAf/bCBY4uUxuPQifl3jgeqvVyJjbmvcszb2rUpFo9U0DMX6miafGH/+hmqri5A8 -QNLsG7+GPpjSJQnAtZJEg8IPjpyP/RwuqXWmv4PlOO17g1mSrfDawL8Nm7QGwLlW -EKoDSISTG76/m5wzCy3mq9sn+NEWvs5TKrGPwmgu46Z4G33NL/XOomr5FIyOGAIe -9UPDauEw/VKPWWTQIqknXnOVYxMDmXdqeNf2DM80HEUyQQRojI0uM/nV8TW+oGoM -a91gVlj1McYsDYag8HyAHj7KpTlarZKItzhw048O3WIYWG2RamvZcTc5EumZwlZT -twPd9GNl9v2ZdIt5qVfrLuTPZokBIgQTAQIADAUCTxMGjAWDB4YfgAAKCRCgLigB -XwG6GSO9B/4q2DmxzmHvFPbDwZSDo3ZIX/DiNMniwPdh/qtn2ssDaA+PTlWyMPv5 -Qaf9ivHKU/rK3jR/9hcFGIdw08zo5TPGh94f10wdjWFlHslmq3FCEgw37zYb8gsB -bHtmHfFv9pmNbCCc0VYAa7HzQp/RGtlmzcz+G+lokP/a90BPFHztoIMunzWsm1uu -cSnwMd3scp9wyC66ymKJnIPus96t9tL4hWCFHnk4hcEmuSD2PDt0lzixnEbT2EJj -AgS7+IqrGOWQWqLnKQHaCSCWLpAe42QAS4eMuASN/Qi6viicNxt60tBqoDphdlql -HV8y7i7c77/YD76NobtRieAlPQHmBV4viQEiBBMBAgAMBQJPRU+MBYMHhh+AAAoJ -ELh8xrGHRvjniFEH/ighvbKayZJe2GrF1ADIJcKsUDs1ZklWMjzkNcRpbGNQj6XY -qvwCg3+p4DbG8D9OVzTGZoKijl3dh4eLX5Xip3pAfFd2UWzeSb6ykZm9G1i8D+4L -j2m+GDtVDOYfZzPNXMHT3i1OZ3PCu2ZQHXC21Nb7HJXezhSb0vrxz7XW1SjrS73l -snFHgGZAFryxMSbi7nayWhtcDPp72i9++/N5FW717CruPuwQVOz57SET0Vw7jWFN -lBslmNNBjkY1E66rc/yEPaOL8R9udPI0vddAfBa0Jf6mA/NuXHcuty/6/4wD6rPw -yzoj37OhdMgdwAzdb6og8UDl07b4GboylzFDS4+JASIEEwECAAwFAk9LF6cFgweG -H4AACgkQ+JfkTKzpC7v8dQgAhVau8MyYuZJcJcd0myllfioHhzcIdUpmqciBxlq9 -4VO93bF44XckSL40JksTJ+btIcl6ddd673vwEOGOJFrL0wCpPkt/pbCAe7iIkJ7o -RZbTgI1yDvJN0bOoJjxiAX57GeKR7G9d3Stmp/sgqYafA0pf0X4kpfc+ZG5yF71U -e/1OPfuSueydb95ZF/MMqpVaEiXwS/zieZLK6Ban6jXNm/5Q8xPp+39ukGB+ihhS -zpBVQdxx82OkpcMGGjf3v6HlAq/JEMsOYiGLN+I+vAu+jxEwqhQDklDPf8GIrcLT -YqyyMJqk4MIXZz8C239BjYjZj/0CZgMSN6OC+OD3LOpEUIkBIgQTAQIADAUCT1V1 -zwWDB4YfgAAKCRC/myMhHuGdKWbcB/9fVneNSU6xwuXXCPhCjyqRSIl0TYVJzt++ -X+rDUb4bCaBoPAuhvrr7u3oiC/LBtAMRWvspoQkW/Ritph+LoJqAqnLhSJRzNH3F -9q+HWdh0mKh8dfM+LaqoT5/QxySFZOsGGj1krOhYVsH65g0JwPB/VTM1bx9kJd0I -ytEkrcSEYel5Id37M5jUExE7aqBM1K7ISNyr31Shi5ClwNVX2ejH/fGenKnJfLWo -b+QipUu3RMQuGdKRPcakvWtqi/tP4nDvJwMUryATGEs88DbE5UIyaCq2Rlx5p7jE -Wnbru+rx93rkYOlQFLQ0jpUMZliO8VSDTrw8VC5tH96AnJiwflqWiQEiBBMBAgAM -BQJPWkrRBYMHhh+AAAoJEG+Hv0uViH6PwwUH/jG+k9sbw4CmPbuPVkkT4XJIwzzc -tKGHqbf4Zo2Hv531q0PX9NPXe4GVvn21CuK21684ggfQHT+RmJm1fvHBTKlzCpfJ -CHXeVkoBkZoNlXZzsHKGa8iLE5OXz/gZr6iLuLTKLUGj4b/QX2XEd6czy5WbRIFL -Hm1YNncS1rwLD56OEUuLY4pKKbo4yyS2ubQ8OVKbB15vfTYLDWWnhq2SXMRFO4TP -9bSpHE7S9kc/ISSvI8kA3rbmY8miENd0PkvveqmbVMbYNNSLBALcYa1tNAblB40p -CTe5bUz1JUdtmVcknTDpwG6681FweAYeHRP/56TscJ/GE6dcDfAMSF8HDkCJASIE -EwECAAwFAk9iaiQFgweGH4AACgkQ1+c/OVSlhojMeQgA6I8da9hF/VdOyph9nE/Y -TbXU3RHhjxTmZ2BOSRY79QL1cFmYnyG73r4Vjlns87oNuzh6uA1JeZcxaxpgSGjg -e1+tFp7H7UJ8Y399uE+SGTyKQct3HfRXQjc/uPckGhh//h+lk9RTGs6qw4fK/UeX -/oNhZL1Zw3Ee7S3B6rN9czrnfKa4hVL0ztWpeosFFTe43jtsgjfj/egij7SDbjy0 -2KjTmMMSxAJvN7lFKt+/nbin3pULQBy+jibLfpqkqdN/5cUo1jeD8H46w8EleHHk -PIexx7DxhkGQEWTJ/lYIYkZnwKJaONv04VUxq0qhMLYJh8ekNFfW9yLno5/vyqOk -24kBIgQTAQIADAUCT2ObSwWDB4YfgAAKCRBO/jaKX+9tIFg2CACgR7QwvLaAe/Y3 -ShkzvasdSpm/wMUM8S4KQYbpKz6eEGTfqNvPtqMPvD7G7fexSgYTWCdkGmKju5m/ -nZj9Sc85oVOd0fvaqkatYFMNjxp0s7DxjPqRvIPLw28MjfKyRZy3dP4b1xE+4NCO -/r0Z+rFp0369FCZH7ms66tphqrC2tgokJoIn24NbcgFQLoKMbHQ4hec2fJa7oIbC -nJhDzbIKFef1k3tDsPNntg4I+hud37oeMoX9DIxEHlHkj8r3Fi9gGQ1ajeddYvME -uJQ/4/lJMGvTpt7Kjt8yA7zrPOqlL9fuNP2v85OvYfvrNea7Ttc0J9E7h5I1PFeT -zQlUa+P7iQEiBBMBAgAMBQJPa6ddBYMHhh+AAAoJEDDzn45QD+3ULQoIAIGjiLC6 -lQQVsfSIT3ep31XNSjAQTn16Lf2DZ1KUNjjT+wMP0owQoz/Ygd5EuncfU9jX4uLt -w3579j9H9wozJhPhthX2Kcc7G3RWap1vWo4gqAL9sR13/TvmUykeaXM+DCZGOcwP -iK2EawDRqtlzaZdiXIwT+nUty3dlu/0EhaLolfFQ9ytZiVMumhjpTbo80QcI41Sb -Yl3kxciGic6VT33eWT1PMeMZlUKpYyqpRcABD6/Ey45y550ATz5fhqsjZAhZmwRz -DEXHuHsemvmOxxW/X7s9O2/y47+ASPkl5DBBwA15Ykm/ukN/SlfP5TGHQ5OFvPJ0 -Um7rqG2Ai5rxhhyJASIEEwECAAwFAk9+DxAFgweGH4AACgkQmf0vmSJ6AKLbGggA -otEuX8tnGPH4uS2rXP4T7WHlWLI5SixQBk5NJ7t6gqfvpSgdpakq4z2w9gIXuXHS -4ftnDsdeA7P9FIWNJh06dackpd18G6W34wz/BRokoaoYwpPW3vEBquPggCpROAfz -mCr18ZJU1Y5/eDkLDnO+k47Mn4amX9L102XBl2dIyrbkCV8j5dIf84zjbGdL1EFt -UBYihKh+8MfpSc4vtb69e6FsiUMaHrOuKGsp6O9W2bfZ58pqEazi/ghSVz+UGyeU -xy/ildbdfWXKWmqLaaCC0Z+ig5wQFnL01wnzrGpYPlEtA88kJ+9dvjjaSJFk11Re -TJo7ENWdsril1EaGH2uLQokBIgQTAQIADAUCT38QzwWDB4YfgAAKCRBXLCe6W0fb -ApbgB/9xsDwGIyrXvRTOQd3HqS1005dpbiiBQzf82K8coPT2Cc5LmFhdXa5aVGr/ -kA06ptAv0L+ctmlUS6ZmePYJu4rO8v9D3XnVYOlXWnTFNj1EnPDJ/C9c8EMdkK1O -CS4kTM1lVE+QOG7CfOQqIyAsOHbh4xSk5/Ze2BRjt01bM6tECzLf/dZ5umACdt3C -5fH5SiI4CigNtLEacAQbfB+JAPXK1aRoInzlGyEe2Dku8YoQ5OxYglcpWfpmemoJ -58GAXSyE3YmfhU8upfg7KVfB0riAE7svIMFJKXS39P5jpmkVUwfXx99TI0St+eKT -HpgUr6lNAWROAK2Fe97pD8EhvkMjiQEiBBMBAgAMBQJPxONLBYMQJ7GAAAoJEPQm -riXQl1eTexgH/39RseqUIRpOX7P5bXWhf630fQGLnAupfPGrrd8b5uokOXhd1Hzy -eKSMhNe+vn72zz1ar98O3ugFIyxWJLCLxDgY7n4VHaWGoO5J8UTozIcnFDEIQK7a -qGOix2wAlIfyMaqBhWXoZbKg79xNvTNdKur1OqouaHD/nFJany60eYVulI2iBNyQ -yTH5vPkBW7phsCbchP0npRCM9WM69jNnliV1tylEjeWIlVRdKUKo4YvroYZmf69G -Oac+cxCORvw9Rz4IWTP86SmhFzqQdea7zgHq/ag9VfILjPNEuGB0ZhoXn7bTxA+O -9vdDG3DFRTsvC6FrPPrFUHgF2q2ly7/wKP6JASIEEwECAAwFAk/p2aIFgweGH4AA -CgkQ4dagWVovKHEQVQf/e7U4P8hes0diSGIuGxVIO91yYeD/fX+5bxLWjCXKsTV5 -ZtSDO3e/EKDzqKbXWtEtLeDgRuuRXekMeBsGc77vI5stMpR4c9I0uZQKKMNXG1IG -ll9uXeZq03lfr6nre4ynvjTxGUC+mRALtIJ8767A/u6FEWU9JVCU53DsKRVT18uG -/Zm0LSAFU8+h3bCx7q0pPb4j2GTI0kFpFy1pmm9EQq507fsEZJVXAKz0dFCIE+/O -/KtSYbxFOge0jqQ+NlIsvTLzETlIALps1oPE6SEN6Q1x/e7HNuzYbXoV3Nu8mKYp -m2du9uNIEbbSuBfOyCGPqasKJml+fqnt8kzzBa3G3okBIgQTAQIADAUCUBk/JAWD -B4YfgAAKCRBwzAmBbwm0tQOuB/4+uKvmsYQW+lbKtjIO8v8wv76LaDaB57kA1d8z -Y/fg/9S9gykr36zl8gplEnuMptSqo7GbrVq2nRRpOzr3i6i9wyhQyuLv9HQ0vjj1 -Os4jgB38+YXHLllaLAROzg724ufK/doeBw3eOXeoWDg62eKeamb4TjKKIwrCwKFe -nWxUKVMLIiEtyF8FCN66aXjSAfhHBr5O2DmrEM0hiws/RM7oL0CFyXvqK8wfZdOt -fn19QndUa7EEshjvtTwKyhlnQ+vODgssm+lpYRDUVkEPNIc2QPmPwz+pF+NZhda9 -5OkiWMQgspfGhyz3mlo74yyuIno3MKarAAg4jv9DHyR4u0fqiQEiBBMBAgAMBQJQ -fUksBYMHhh+AAAoJEFZVJXuLIrlQidUH/0cziZgjjPDuEO4AQKm/L8ZnLjSmpoGE -Ra9tsz2JqhdcEqO4ikG0LlKbdEpiFwQ/NMgEa/yFcFFaZBXlMOH0PkeOrus/WGLZ -q+i0YpzpTknm1R0QWcBoAgFkpwrhsL8UyzUlo7YD2oSXAQ6O8V1kc5v7oderG/34 -HViwozRj8+grKjbsH3hU37CHY8EYcG8j7znjCvrzfPD3UXbV6Qp3S+aIv53iY+MH -w4+W+ymLk+OMVsPtpU4zNvoJbnnQFuYHzbQxV8DPICmyfQc0Vy0IhHyx0VBfdPkC -aO2wEzjiHs/OyMr9pvr35SKvWjFPFCWp4leuVXcOWArYiQkW7uGwd2eJASIEEwEC -AAwFAlCVXSMFgweGH4AACgkQDCogFRUSnqSqHgf8Dp6D8qEJPvaHrK4iNDF+hqZi -SZH14rmAnkAdFXmLLr3A7RbQMvb3shF88bqT7c7urvHF568AlToqQRjNYBUdx1/z -NYl99ZhWnNuUGp6BrVcFs72sp0uIUzf/hO9GhQ2xc6NttaYkI81GUxliTeKwNVOz -fZ0c32jLkOkIM1r1sJ29R3AfCS2Hx/0bjOE/t44l+8cl1Olp/WySK4Di14BkHo8M -hYQGg0omYpg9ddpJIcp/RoJPX7KePKJHpSW+2HyS48zzYkVItQcr2isEEHNq/etg -Kj1GNf057zvOPzRQkQbf0g5SO2I+9yYDPMyqm8eSMCm9fY6EVZeDAAVosnnucYkC -HAQRAQIABgUCUIkOdQAKCRDVCJnqGd8IQOJdEACFV/rnJW4QnXHwB6p2x38cXQQL -5tLRioOBnt44bKvbidlz3Rua+0Ai78XMjAZC5lwe6Y9IRGhPKe3Lju5fjUpncmgf -xD25cySdAuH5Y5+o86Oi6/CSlySF41LV8wD9/KiWwLAoeV80S/nCQEiDHVROXFsJ -iTxMAiuOHHpHQmq9kJ7TAO7b3s5U8TdTaE0T2AnUyPfjoQFsY0ExIsX8xVsX+grV -bnB2neG6gMqt7Ze7POWjWPd59tf29efkYvpVwI5QtdcXmZiARkxQnaAORTo1k8Ia -KPbPlsP35vuoPlYjsaBthU0jeVcdC3bIkFErWv45kDXJnnJ5s3GbxipzGV8wxAps -1Tyt6r9V6YmNj/FtL4cnTjMVgOfv4fJ0vQqYA6Mt9jYMApEkHyUNqeciwNoDVaC8 -/BbWe4TE56Ss8o9eECl24xC+aDtYt+k611TlADmHreuCguBnYYQonlfUcF4ND9M+ -96Dk/7PvpqJIYYAuWM93rUO4bJfO+KmVsCSUQBFsuRkwky/gjAEihDUzOA/r+HEx -80b9CnWEWkwQq36Q39clU0lfJqiMfD82eiq4YJ9ucx45NXP5bM/On7tK8M8EkjUI -t1GkmYWim0eHbVIj1xCT0iaC9M+X6EtffwhVVWDd94ZNW8WGnDdCIwEJK5HVL0Cm -5gG5W1BSLD1O7Th88YkCHAQSAQIABgUCT1whQgAKCRBiudz/ZiTBoiNYEAC06VuI -ajgctpthCTGz71noWDO31CYOeQ1HnDLKUskz9gHbB85TYUdQqu39VB/OJuCvghNP -5LzW6/Dn87D8r32D+NZVRg3FdUAV5Hd7z6fIU/I2FH6HZyMfK2T2qITURwn7uvME -UFRuGE8QkKHZ6gn1caP/b8c/Fj9pXTXu0payupxPBCmpFF/X15hiuzZQIQjasZiY -6gjGGRhMiNzicmHtus3PuY4eCd/xXYCRDGvpSHonAyi3MgOQCDBXuy7pOOhoK5fJ -7gfxlb+V2DeInpb+SfkHbqEyNncHTnh7Wqk9Jn0e3HxIgqVhYYOAzMmwOxYyM6/E -ETSkEYnatL0ze1qu24lHuuknFPxusPgORx+2xV4hTWkhT30u+RdDDklphPB/jvuj -5osBnsohHy4LZlKJ0D1qbbLIwufnlJ2Lm3SCdwIulymuZO48kVv5MYU0Qknrps5e -ycdHFlYsPpDu2f6FKgt6DhhD4jBk+iNB1PkRwpDs2MP8aXluFvDQwdLUcjS9oxFv -BT3rt0uPVgAYUq7oeQ7aR+Z+ryZz8vRCt1d9TD5xX+hxroI/0bY/Uu5DFZn+ulr3 -5gevJgnDgxdCS8zJSKwrCleSK7Cfnr9kcYIjVJcG04RbdcYsjj2KbbIJbNSMJ4MO -WwIpMtdrnXzMMUnOaonrKHyp+L3bMlWUpDflzokCHAQTAQIABgUCT1DEagAKCRDg -/SkGbQwUsSkND/0c43BKfRjXswS5BvUYajE2/ruQLqDBW5xM27cHqePHCg1lyjp2 -5yFGy9pBpj890klwegH+vnHMw4g2xg4UtAWBg3MBLOVUsadX1k/2aDQXjYcSjeeZ -XeWBU0ZMYDyN4UNXOSnZ/480y2dV1voQYGZto99dAMpwFCisoTKI/SAqolqoPQXX -3C2dxu+fle9Svfuz3R+jCqwA9igyWY8z6zy65AJh+xSIdJNd6tbrxQbfkrFl+hLK -QqTcjiGQ91YPY+bn3wYbfc9wvdsY1Y3tKIt5kY6RhDa4QfmEFOetzXEsplhifB4V -cg7BtAj6Xqv+XS8h8LvBS2zWJv9i7jbmlZuNogblPixAiNq9KQfDi/U9yo/bOHoK -GMOUoY2zOj8x0auRs8Xf72jGTCBUhmIUUQzZPKA4Hki95atS7CFYOV5EBSFJrNLA -bweQuH/dGan+mh8rvBxPJPEeJ3dFGqgKnLIZIh4TjxT8fkppXw+oW3iOhrCTeyRH -1v+iOZZv/IMI7Wi12DMAC5ghfzpl7pZfscEyoa7DSagRXSoI4Lk9Eul6vVzq8FJS -61XmemwsbO00ucOr/D8i22hk3yMRnE0Jp76XjxDJ6aovENHyE0bVppBifMdd6Y6G -bBuTrRizT4jW50ax+gemTqva4cG/rY8EMkizGHw4TxvGvEIOwVyWZ2Msd4kCHAQT -AQIABgUCT6C1RQAKCRBvMIBJ1bC+w2Y1D/9H5yM3viNuo87L/3umK1LwfYmAbJrA -UWZ+1IW8mGylgTC0HvgoVd/WMldRwMo0jfkhrl58rkyERsS/wFtrDF7ft3L6oRIh -IM3wIvbMiWicXcVwd/UuXBpOwYguC1O3T04ZB4YS3KtYC6xxviIoZ3DD4utmKtkR -oNFZqYFNpt368r3+7lIy/I8r425C134A0QD2YQwC7L6e3ciQUfxOlJgA9ejl84f0 -pKkrYn8dmsUFKdrOCymYbvAZBd9UjkeKYf9I3eboMeYW9tSP+9r64EjZFCp+l2Ck -8TWy52VuLh/NXDxXF6f7e1YTCnj+yXALKns+RtPMa60rGAnqMEiludywv8Ww5jO1 -Miq3LNoPTSURxdNlS2aJ4ua2vsmXDHnXz3IFEp3B9xQvjqMfgRnqG0c5+odVVmcF -0uL6ej5sujqRqTh/3jQEmxVvXChD3eYldVX1t+JKnOEp+qPCmhS7nvtlqzevm8v/ -7LlxDSUaqIl+b39B6dP56GsPG+UtOFLl/NT4JJmeWttFB9f5D9p5z9W+FQni6KZI -ke2Mw+jpQsi2Ek5Livsfuqzl32Gt6AQFQzdtzdd0pv2cqFd92FH10P8M1Tw5mkHZ -quFlu3kyZyltowZUHcV7F+EWWPaZy/jlh5fJavqYs6p/G6bJCaiWuvfFUy0o+fS1 -edkF5YcmiCX98okCIgQSAQIADAUCTtKQvQWDB4YfgAAKCRBwMEMzwuQ8UoX0EAC9 -IzbV8ccDFyQV2NjToz0yraUhgApuokVA+EqJnxmZU7zHa72Tej83ujo0iL194Mhi -9O1xpQapQUI+ShcrtrzsNv8mEGqhWZdZf0Juuy34LWuZJ1GWjLNlKMhAKTQ1/iKr -pUlx7k4keqBSTS+idGnpiTDkwg4I7Ct3pg7KSBT4rbc5/OUhAgF/4EYdPJmOhlKC -F/qahsVP1zujh811tIHTEZcjAA+mPAzfgj36f2IB00AGxZ0CxK5AzWGkhRqgg0Qs -yCoR6z6irS1853aoXGtfW01Q550QyC5CGqb8ZrUavIvdxhJWBroVX/4LsKlw0uZk -FdmKdTccOzhgltqQkjLQ1XATay9lXDy9oVron0g5JonfHcZauSp3/ylLzxsitjBS -6DWrh05yFe9y57pPJkQBF6tNJ8v+1fRMSgc0o8rtN3x/ZmYPcSVPNpflwTCjidMB -ntZcesT0Zq0KEcVBgmUkip74JwrgriqOUbjvLilN/Q5MErPAzZGi3jEKV+fhycn9 -XvJSQVsTslytPXe3IpN+s/lIrNhPx3YHyDQ9VxaLjCti9bx/WhLf88bHY4aUObbU -Lc1AMXj8TcTBW9NGIT3om+kwTZWcqPO5aQeO0tpystUBzHqX1kyG9GjsNFCzYDBV -5jSrTf1awWytzz5p+rKkQqPhAFOpXY7R91GZGZqWuYkCIgQSAQIADAUCTwkFqQWD -BaTsAAAKCRBm/aB/RZ9xQ0/eD/wPb2HcALPScKgAFUi3EZZ3YV3t/owCxTuT7EJ1 -f7sjRWognx8w2JEsk3Pcs/haT3D4J80B0mwLvfNUFe0/sjNaTQAyRAxWRCnIUvOP -+zFqajc4URVZ/nL7RIeLN0B+4PVrRwgmR0XxJk/kLHW3xB/zz0RMROLMA0vV3yv8 -DC8q2t7gGX1EiqLVfaLtdnfNJox4lZYzNid4aLmzY3Di5qPSYdqqnInnWUWTCn0C -mc2JsjkBq9JqDOggLCUiLgXUJPqVN9dVnGqVeH1+3EU0TtTobDSvmC1TCba233wV -3VUk29qSnYXsYGd7ilW82roEzkwJDu+4aeeixzAlwA0+hVANoB8shh6DiWusLkjt -ltQoB96WUMLLCvzVoj/MFRLntnYS3p+2OhRtSmAIfx1vMQiu4TvWn/w6YXI+hRGl -cne606n0ZWN5ezMJ/h33ahZ+zDxAl2JIJT+YjdOzlm45/jX1farjiIOKRbdXuEUK -/8umG8LiYi3znaSJa1JW/gv0FD8VWgnAfHCueH/n2b/Kbkn33o3cph9rXoufLeCa -7JL4TpGoO3gDKKtnFSjLkOI+v95zmf4v62W8tQaCL1pUsn2D6RrUaxZK2ipHDJGN -HvS9cik7vvvqejafTVPXhER7hR1iw6W4bHXGLrJ7f4+3+Cs//N7M2yCnY9tgxcnU -Wjp2ookCIgQTAQIADAUCTt7JRQWDB4YfgAAKCRDGwMBXdMF4cfzWEACGWEo7YTYl -OUgAyPTu9GVt3Z+wV8ZM0PraZMwIGBxN5u2NRsf5d3Q75OStj6cYEsaJLIHZEBBN -vEP55MuOXm7s30l519dmNHLL0+CEF8QTitaN9Gh1GvgpywisqALeLsfwWxo5+bc8 -AoPFsl3ONZCjt9M62Z6o/sYUP62wfQl2PEVCqCWBabMlkrviO88r9nQNfJpJTBsQ -8/vsY4v8AbG8t+q+U9vEI2quZslKxB1sFErNm2nApVZUm88Seh9EpnImMfzy3Y6g -B0iLU2zgmEgGFU7WpO2DYMQEXHngKGacWJIYBiL2FBfVQno1mkwMGoeX/C31aHTJ -9BLDcSUUNd+/EZs0DVD1lHHXNFt2KCLVFgnigMY5TAk5BvAhdmWA4/xGeAeeo9W5 -mLJo7ipMnfC1HUlZrH6BWCLh4hIK7O7siPCJI4qHpneZo6rJp6vUyWghw/e87EdC -52J1ywG+PimTpM+XT11D0x0NjIDCnJbIiSwgkXrd6hZlnMY+9VL8ftvqFkg21aA9 -UFhIobXS2HQ0FyDUBSECqLqNYJnNlCmdJRgcasi69QRy+CP6lpdU48QP0/Sn/Upz -OELpWkYzqWb80sC3yiQGbWDG+HpIY3acNeVCtRCmzsEhvQVwWYqDypxJ51ot+Fe8 -ey4bTO+hW6E9lqDLQSN0XZZOO5XbFAJgNYkCIgQTAQIADAUCTt7JRQWDB4YfgAAK -CRDGwMBXdMF4cfzWEACGWEo7fY3dXv2pWDzVsH+FyHFG1kDHUJPitKKZxCgDJBh7 -BCX5d3Q75OStj6cYEsaJLIHZEBBNvEP55MuOXm7s30l519dmNHLL0+CEF8QTitaN -9Gh1GvgpywisqALeLsfwWxo5+bc8AoPFsl3ONZCjt9M62Z6o/sYUP62wfQl2PEVC -qCWBabMlkrviO88r9nQNfJpJTBsQ8/vsY4v8AbG8t+q+U9vEI2quZslKxB1sFErN -m2nApVZUm88Seh9EpnImMfzy3Y6gB0iLU2zgmEgGFU7WpO2DYMQEXHngKGacWJIY -BiL2FBfVQno1mkwMGoeX/C31aHTJ9BLDcSUUNd+/EZs0DVD1lHHXNFt2KCLVFgni -gMY5TAk5BvAhdmWA4/xGeAeeo9W5mLJo7ipMnfC1HUlZrH6BWCLh4hIK7O7siPCJ -I4qHpneZo6rJp6vUyWghw/e87EdC52J1ywG+PimTpM+XT11D0x0NjIDCnJbIiSwg -kXrd6hZlnMY+9VL8ftvqFkg21aA9UFhIobXS2HQ0FyDUBSECqLqNYJnNlCmdJRgc -asi69QRy+CP6lpdU48QP0/Sn/UpzOELpWkYzqWb80sC3yiQGbWDG+HpIY3acNeVC -tRCmzsEhvQVwWYqDypxJ51ot+Fe8ey4bTO+hW6E9lqDLQSN0XZZOO5XbFAJgNYkC -IgQTAQIADAUCTyoaZQWDB4YfgAAKCRCgIktTS06TFCL7D/4ss20QKKPQ/RmBu46C -6NQ51ol6znxoVJOzJp+XNhys/ebULRNTTaJosXhtkJYBTg0e3gd+V2P+Runyd8Nq -5vS2aGiSmGVK89typOTMjU76IPaKyRejLQ5mI5UeilYJQwRUM8/XyPXILDFe3DZx -+0G8wyPMTCFNh4OCqZz5Tja3cvkCWOJ+LYN35LdtqhpgWXrH/pmQ6MGNPM1r2m20 -GCSWRkLHqJI+z2xf8psRVwjcj8GagAppxMNyQbZJLqXShnEqJL0/FRYpjG2je+2V -tlwd++ep9Z8KOc18cYDwr90JPD9O3KHHwCzU2VYBsJNm+7Z08//RlLbPoks1gWdF -ZGd+pRWT6nYNgP5zL4Pl1//ckjeQhKJo2MG2g/fx70ShxqoYbbpoICE45H8+eKhL -j2wuO2GHYf96L298k1wz+y31+kCxcvVANcy5CY9Z4aMVscUAE6mJeWnMcBLnZ/vM -dNZNkvrn7E8BydB1HCxTzEhv8yxu+2FJjQkJVeCmtNFTGM5/xOMqgOWKln/IsLW1 -Sh2ONKow9qzqpz26fFkekzIMus0QNvB/+o/S9ZNHsoOq88uVUrrvX7s1o8LEc4aB -/Zosol5LL5PQUkJatRmYGC9p06QmiG0tCFTRmojnLhmaEVniVxx+AU69iPoc2TZB -MYwkIUUfN6uvNc8gjtcNoIYxJIkCIgQTAQIADAUCT1AKNQWDB4YfgAAKCRC+YYhQ -IuibAuQtD/4yX9xtFaqih3hGCEBDAmo1gj4QdJ7kbuIzwwxFzfUU309hjHfQPWfL -oKPb26ObMq3t+entwqDPB9sXv5YnyvicZE7wDG6AyXBfPXXQFVFWIOUwkf3i0Y7h -iAQiiJ99ydmcvMRqNxLlscpId3eiDBJpGQa7idY0HoMR0XuGYDtUTEZu+oToupPd -atNNBkCbio8EgNeezaFHpyqXSFzCc4S0bZ9xq/GZtSmUYKJWlDlxfmrkS4MR+6te -axMJXvPKzoKIM+VH5KVVA6rQq884hDwdUS93fs5wBUyDL8Bhvysy5vdzytOpKiqT -A+Xdx6U0CsAWY6eo0WMUSw2086k2kWsH76zFPpnzQc5Km4DsNEcdaL3j5KOFnXFn -geQ/EO3bFBSsf+bC5OR6HC2q0xKfKvzsJ3m6zTVfEdkZf7ViB0Nj6J5kmczTTZVU -ogUx5LsmYSFCtLyuCNMgq5jEHeKRjiRabLrdZwl1G33cPZUEJzmVCx9IHL3UrJoY -LwDjAJS21nn6AMD/7omluU6MQvUJ++zg9N6wVYucD5f3q9nwkdiGpMICOUOeeHZb -zIIpcAB83KJFfxgZ8lJFeHA3gTSCjLpdudh6U9Kttju26YXCb05TvJjEYF49SEjz -qtsbsFzWgWYbf1LRHoZEurxrrqgySdHVKHxBMZ1baIkJrFLZcXGseYhGBBIRCgAG -BQJTLklTAAoJEE0sDPzVimehdWgAn3U6YNhMVHKNjBiXhlrXjnzVF33gAKCLU4W7 -eWpkQfX+ST+gt7H93ot7fohGBBMRAgAGBQJRI35pAAoJEMMPQmgp3FsH20MAn2J9 -9pEbRQxl26YwSq3s6yUKx0C3AJ0S+7mx9TcvCi0GNnExo+HdWoMGE4hMBBARCgAM -BQJSZlqEBYMDbLWAAAoJEHmmJ9x9XsIZAC8An2lV2pxW5PpYQUES7I68JSy2VnmZ -AKCCJGEfWSFgcEUF3lUDTjcSkCccmIhMBBIRAgAMBQJRDtT5BYMHhh+AAAoJEH6I -NGpehdIDAZAAnRjj+MxpUr4zPoCGQ8vnY3jetckTAJ9qzs1KnpTPzjc58PMMDJLr -6YnmiIhMBBIRAgAMBQJRG7sGBYMHhh+AAAoJECgTg/r7ElTddmAAoLA5WTTnCUzR -KHRZVfGDTUtS4GpLAJ0dRx7K1JDqLOpB7v1YDLLj1iJ3eoiiBBMBCgAMBQJTV1zS -BYMHhh+AAAoJEGRUNwAyuUMc/qsD/j/gcWbYurlum6YoGRwKBhXxvb1s+mdFG8bE -F3Lu8KB4dQa+zigYeeGCHqwIUD9WQSaQWaabhI6ZCIzx5lVGhQmdS8cRXzlvANyn -GrQFHp/av1tgDpSU0nCDON7qKFTJMRCuje+Ea5ilXh1TKR/a7bcUtyjgjTuVNbQA -DLLq+DsliQEcBBABAgAGBQJSoPO/AAoJEFo9IpD+1SpPwEQH/2HYNn2C6l4L/Pf+ -FEjkR+CZ0HaFwVq6a5Bb4JNsoVfflWg7E95aAIdMwKe+vPolckrA1v8ISLl0J2zh -BiVOAvbl0ewAvrWRia9kKiVrkDCRl/XZ2eOAJrS8yg9JdCu1GO9fv0qv2FoTt2xn -fUmeSTReD3TE6wFSRxxlF9WWfVMCmAJJ74H6QioeKJ9bzYMIQNOIomTSHe4T/38M -4EtET9ESuzLp73/5jZdu5IRpbMGUxnjH+d4zXXTNPYQ1krQCJbvpZqekW4pXXah/ -NFs6DFZczmwii+sqPfUSBKA4H5mZbMFRdtNw89a3xVURZHEX9S72HgIgo/LkGWuD -7mIwj16JARwEEAEKAAYFAlF1P7wACgkQDArUpXpti4ep4gf/XvzF6BZWCaG50+6I -x6vTiy/6o0k7IJ0GCL2reGJqhwu9WAjszGM+HQlkh/TjkUtqql8AMOsbJ/dN9YAc -qJQh7pv5J+lzbCx996TY58HFUmvMf0Fcl7ZSplgBe6gff6ho1F3w38gmlu24u75u -xujzKZs5YfNs5hE0gv/pCTKqUq3y5G/f5/tsZ8Q0V985N9wzTGSSW9QJmGovsFgF -VCJdW26vPyEI8UBDBMcKQdhyWKGqHVv/br8qFSNSvsYUYqYRgx/gUKwcEIbi6iV8 -AJq42opZMvgFcudkI62w/jW1jTYLlC/oaM6N42v0hUIFrI69V9QmJHeSxoS8rFEL -Yu6QsYkBHAQSAQoABgUCUu/M1QAKCRCGdw8soqV2hgfGCACP4kWlONMGWs2u0lgu -z8B84rlZZ0AAgocn6nw2PoKdngZ/gVWdmWvHizZKQz4Wo1fHNtTNd99EitrQWZ6i -lo3a+0/Yc6vRvatdX5J/IxQ6es3oqDxe/WlBouj5NKtB+qyglF6yqZM2oBO8ga91 -ZIUIcO64LcJ5Xu/0GeWJ3UbZWXtQ8T442CcWb6qcpruSDPDtufiK6p6hJcURg0zQ -kCn6s3aYsuEmMrgBOoT9f1X8siGMyy441iM/0W76xet1ty009Egc7mYKG/ZKp9tK -cxXczoeFJgzXjiq2fawtAY+Ao/rjjw0a1p8+7MXA7B4meF1ZovlYJIIIkzASwn9Q -Iqj1iQEcBBMBCgAGBQJT/wgQAAoJEDrnYq/7na4ad44H/1heB32CmatPSBP5KVPu -6/bUqWGVd44yiMZD/9/7WU9HsLqjYWuPk3otLE5GKPBX5Ch7ky1NyR5uxsAAqdHo -hj0/ECk3o2/0cWHbD1dlvsETa/3qUJk89Xc0L+HJjGZ001O2cg3m874uZ6bJsjA5 -TMYs07HNF32aQP/I7rDe/UFTY3fp2ZQ3K2UImruKkMLNyjdES6y2UmDJe114WFXH -J5sXPetwAGyEp8sNi65sGWLHGwnUV93HUj9h0Cp347Q4XqG2QaCcxsMKQm0QCBKs -rWjLsQ2BWuZi7m05HMa47IdeQcsUMuuw1yXQXCzmDgIwAubQFP/93q3FcMDHWjox -30WJARwEEwEKAAYFAlQLse4ACgkQscZvZNBEy7hkVwgApDaF/PJ2mEoW/ij0nkPq -EBJhI5ZBIuz5ecH6o4GfQNP3bN5Uy0QoaMRakscZjnDpS8zZLpXzMRhlY4m2KJH3 -9cYx83Etg2rjmiC3/v+QC4RFGJvdFZF6khgkbDo8hMnMxrWCxjA4cndB9xKYac81 -0EzfjPC+bmjTmOfkQ4AbzLHMmVpioic62nMv/Ct10butVLhZbCc0W8w9pN1Kr/tr -U8JV2C+5VM7Anq5VlW/pVhwp801JQmbmZEqpmpWyH5EUZwbdpMebQY7GQMWhlgle -btymBS1WQvjsVOccD1R0/Asn+o+5cM8oFIPSrVDQvywpMxPgbC/fNSewO+8Nawrv -iokBIgQQAQIADAUCUM+7zgWDB4YfgAAKCRDeda+ctcD0PR0oB/49+2MTtGiOHGm+ -usXeXUQ+sApk3MdMN/XSVzP+t2Ozkk/5ncWW+ujhPllqu7RZE75TVJLFS1R2e5VU -ZKnaytjsN5s/cX8qCWijnM7LOauwh1a7/cjDjm5Qt4RN0SxlMZf7DBYADQKGzpCC -YICnzymqNKp3tavTYeFNyOg22b1mCiftXI2jQUNy+GjcOa+HJRi54I1FikKalDhZ -gGLoEvQ68DMOL/tO/NbJKsEI+3aBRKryv4rwzMzNrVhWl+oaMnaG3sgGRQIdb8Dl -v3k4OOII7QsHlQIE6/mFFde4iQ9dYvGKIvd38WjQE+f8LLSgoP7ld29oG0Y2f30z -i32eyiWuiQEiBBABAgAMBQJQ0kCfBYMHhh+AAAoJEGzbhbFD93r93rIIAL6hKm4v -+wcBU5AoeoioFWEeWxs6v7Ksl4LNtO6T05CqmFlZqk+CjnterFExY74SIXQe4faE -ajLqckE5urAfeEF8OPPWdQOZc8C5qK1VcgperQLB62dhkKDM22zDJBRmlW+WPqti -RB9yy8QN11NwKzLyreVWhURijxdP/LgwCnKZKyl/JHghkMDTZuvSJLWnwf4uyH6y -Edoudf9b4hrnbo5YJXV3I4kczNIg1poZSr6xVkt+2fsksQVnQ7SLnHVz75AsbUOq -uKBcn4v+qTr8cGbCaEuCkFNS8cTNeaRLSzsbKVA7THsvhTiLpb7B9/AcXWo/ZPAv -lWPKjfenktdy7jyJASIEEAECAAwFAlDgM94FgweGH4AACgkQnKN2ZlJEL3P9dAf/ -WFrQB4JywWL4ZXo1x2BB7fkGsUnkW/tLC98htQmICEAO3PY4QTmsj7A+R0DQcNpA -fe0rvGmKrH5tXBlH3L+n9d9/NJvjZpV2F1G4Qip143JKqnIGzREwJs117aWSLTKN -Fim2jUmx3dOMG07A76E7zvTRmikx1rRDrU667WovOHgnFBaOASYXTmbHp4ZBfjiK -2lAyUHHWa5xAlqSNCyI89V6AYnA7dWIyKyTslewfqBVvuIcKcAAzNJEEZwh4Qf38 -EXgUl7yVCPcot5RVMrlW/2ksxj6TtP3ZXiKqQHSdENp0QifXjr9CwfRuUMZXwF0y -DZYt01Sxoq4DX04LSGWqdIkBIgQQAQIADAUCUQnLbAWDB4YfgAAKCRBuDa0i6HSD -3J30B/48fSugiRdEy5HUIWt6qJHgOy1q5qB2ZcM8hIDdPIMc5bKVWy2t34SsHJbk -NQTNUdE0EOAP/RQteBE72i4inbSzsdr6VZjbvLvWMbNsXQeEei+Kj3g3rotQg5qV -tMFhTNrHOYuwMlwrzt1sM6egQoVSunQoq5CbKIXzDgwRNH0dOKxnF8Vy35o6H033 -p4NnIRA64IyiE05URfQT8HRrgc4cSqAD33Tdb9a0Rz0xuptIgLTzCosB+srO680m -dSh1Hf4+t7K6x912NkVN0OJh+NtINc2ITkiP0EkhV97BiYYll+9BW+dpRcfb4dMi -FM3iZgxzD1vum08rl+G1rGLO1rqKiQEiBBABAgAMBQJRGog4BYMHhh+AAAoJEDMO -SFLz4SGzViMH/36Vq/zm6MBUrsi6BIApaAXkAWNGPJln0L/Vv6p9PKKiOtVIk4Yo -ufhtGGWGytZFFjh4xKnUXeWwp+Pcy14RRmcKBD0FVT2IDSsZZdZJ3IMvn+qP+wpG -0buIfmzoG4TxkjLkt4gA5+XNQxlwvyuAt7qGvBlaxVtD27jtN5bIWHrIUvjpcrYs -1CUYJr8V1NqjaWw6h48u4/oIAXDZ3ljV3R0+3gWEBYcB/u2l+7I1e4EhqsGnT4aa -QTmlg8vGl/XlTJfMRW4oiBy/ztTGCUej2BOC9hAkCQWG+uwj14UoP6GVznFFv3sf -9L/NYIQzxyzpzE77j3UQ8r6GH7OS8iVRFGmJASIEEAECAAwFAlEwkNUFgweGH4AA -CgkQfxTbOcIH8ip9ewf+PSlIah3Htv/G0HySv1U1XP/0QgiWSBHfOxNt5P1Nyfc6 -f9vqSA6ib1QSUolFzY5zJO3NvwMUuaMTQHTmRA8Ub1T9pMs0AJRnxwZ5727QRfls -MUDGZ2HjMYfC53oHpZCKdCXRh8G+9MiFqAXJKwLBxEeqHSpvgWhggZH3n9EETnU0 -tzyPNqsDmHAE6pr1dE8cVhL5XnUbGiLjV2PWcy0ARdTTBnAyZSMwYfbZebpJ690Q -jA0+decCq/Afo1rsJaEt4rnZNW7dmFmqTBk/4b1q36PkANxBP+QiOQ9OArGRv9Di -dqp5oAcWqUWFcD7jGsUL7zO8m7yX6xzqJvJq1shtFokBIgQQAQIADAUCUUftkgWD -B4YfgAAKCRAitRPwCAuGD/jdB/9DTlO5vvDnJU8y7VmY2A57F3RNyxuS3xTogcsu -S15ja0Y7hrK+alNyJgEY5Pboy70EN5F4hXtHh7ZsXmQ++SiCtjimA494E74EnX4w -M2e4G5AkTaoH7KT00tXAeVwIJeX/QDwyQGo9PR1vN59i0HsskiUq/mEL0sr8xRs2 -UKXBv6SVcPv1DooNf2mjddHTLgs8NMATs6euReNPMSodazRCdq3rdGpmfgYcgPGe -CfLigz+Yb/h9mgpTzSumx2pYHTr8NDAT3MDF6fHjYaqUHKIcf3hE33zGfI/lf1kW -mdo6tD44zk2+aWCABQqlI8F9nJOosbCvE5HZLY9aMu3ttoBFiQEiBBABAgAMBQJR -Svc2BYMHhh+AAAoJEEYSKwmysNs2ELIIAIocA6YXHpkuJhZ+ws+tlDHBVNvwBjUK -j5d5tVNAnr+CAolcKlgcgomZYrGr9yQVK95+zjBkGUYoYqL2EXG2MyTOMkbXoV07 -Bt/FS8iUvrJNkvCLhlnNA6k8+Ty/jn14hWJPpfnrsDDb9pMtB3AFqDBES+NaNMi+ -K/hD/Zz4517ky+MrSJw/BiWkKF6vn/zAYzk3cyaMlctXhVsOHH7K73mUEuBT17HG -cYO812jqXVxBDCmcnuVMku28lStL8T73QDLErK28Jz08b/qDBhjsF9QX+xetAhZ2 -7/TaV0ZmQsJUZJOf2/t5tRPYG4OoSNxqxx1hUlL7uPIYx1nJwEU6wUyJASIEEAEC -AAwFAlIfs6AFgweGH4AACgkQ/BrZt6MzujyjAwf/aBz2OmnZbRcW1N2veQ+XPt0r -49aHhPWGObU/WLq+c3tLuOqffrr65Avs8rt1SYYgwa7s0rDsXSqI5EXjJ9u85Msa -NBaKM7MHhDXvUw3+g/TZoYqTzSBWjtH+rHHNoBWx/rSAnqHKkJLqhpTXcZ7ZlYe4 -JBDzA7IaRHwMRHtqcM4K63RSvZGGBD3ZZr3P9QqmgrkK+bwyY3yHyeQTtcXQURtj -WUd4qUs8mHnqfRBBxYqsNjBfEpe41sPuaAFf+6M/GqNqaO8B25yW+5xgREqm5wV+ -tAS+/mD5Sf3P/Rk/P9+mbwczSDe2xJtUXBDD5zyPuO/YaCC2si/QN1O+66wfi4kB -IgQQAQIADAUCUnPmyAWDAAFRgAAKCRAn16X0iQpDawjbB/48GfAazIeB1ifWTNPP -Meqr57IzO6Jebjd6eKYRMfpPfhRlk3k+UjCgeK5TTCJojG5pzRwdmA0Aq0P2/eiy -dTvB3y8BClNCeEP3pgyBWjJclQICxoF/Lf+pPsTtMZzaE96IrAhuImeszZROmIps -caL0iQyH2xyL3gEzQXlm4UgPPcKnzxnKkp/qxggvIbkCX0a1vDiAKx8vYqub90Xn -DuKFZ6qtkJqGtIMCgDWWUCVdbXwNOnxzuFY0uCQ6GcjmgrlHT9hi/6IbsEYF9LNZ -w7xy07iKYrPTsl3yUuhNyD5g+b84kCyXzF5NHfZekyMaWCgM5sPLIYqTV8fLObUn -NZI6iQEiBBABAgAMBQJTRVILBYMHhh+AAAoJENNhn2pHBol0yqUIAM7+TIlB0AK8 -fm7EPf+NIJBf6lO2WLHy2zNXTScVOnroltPBMJcYZqLYK22uSkBqXKeLcY6h5mYj -+2ZscKf0Jx4bz1MAyq94JF9aYwVJZSJu5+zF8q+PAPFCibnGZQmaU2gZ8hEPI3wL -cxjiuyGgS1zLIaRO+t93rzqQqhTmfjtfqhxs/O8eXnLtzBNaLsi8ieDk/knqrvmU -92dQ4Xi22WPRikg9Rma2PK6OVqnBiQhDQY8k8EUV25agxDkQEKjq3ZmUEDpCB/69 -Vd5+0XJyHSrta8T5w/roNgn7eljcFNS2UuMRuWRzgboBhCDPejjBSJqNypraA0Bk -TYiZM791Tr+JASIEEAEKAAwFAlGUYPAFgweGH4AACgkQYdWGFjqIJCL9CAgAoxwC -fG/XPAKArm5l0uqTaILB4d0pVSo0B7sMrVt3iLmKKw9WbgwBwTaqturTaKHDMa17 -67Yu87T4RUdh9hic59eiVE4hdkvdbiK2QKHS3VCQ+rK/9C031oroq5CGbEsFCWR+ -BFaLEo3vNarOeGe4HFqj2XD+oH6Uw2anKYESfvbTzcw9F5TDhzDAlrMraIRLFbPI -Q3q0S3pdzxzIRUtewOZvaiD82xZyIpv6Me9xRaUnhvRpdtwvOKn5Q7hjxzpRT5RE -v2COoT01SETt3WLZUcm2nNtZodRfgg6/rNnoSFwDmz0uB1MhodAIrINsElo6moab -owHKbj8/3Jx6Q64NP4kBIgQQAQoADAUCUb977QWDF44tAAAKCRB1MuSkR3cVvcCP -B/41iBYhGggTNL0pdct4/TgqLeKtJPFVGzaXMcP42clq24ZN1IUYbcgKtvcKufUf -qirgE8lHap13yhFmvAVjQjbZF++XP3PbLO/UPbMR88M+0b2gGxR2Xr1uw/ssxg5A -E8IVixkdoimyJXeMCq6ICrEW7SYpCVF3nN5fRA4HsZdYOg39zvmwILmfurLB0jxj -bsgLPep/nAtXp+76aenDMZ8Ty3BWl1Ij5VZgu1rZGHl9fIrxx/z2w3bTcLgWk2Qt -I6mO3/IwzgvSJTj3NaRx2kRetuGwtq76yltPqlnjMSDWgwA+2YUVr1Y4TQKxc83x -o1zalZ0PXYiDj5fiLAEQrz84iQEiBBABCgAMBQJR6uYoBYMHhh+AAAoJEIJBMThV -oyVFKQoH/1ToT4S+LTRZ/1H+N/QPNSe31ccl36TDo0/kayuu1bwE4jhhpoMeOgeM -05UtoRv4IdyBYw/wVe4rC2wmrgnHpurtEV+HvqwDldscefnCoiN8XKoTRXEMhRMy -ySc2fjJ1YW7xMiUhK3Q6c3NhPBYgxiBlfIXwnoM3eFKxXBRz2csDsUELpsuuNasy -B1wbe/pP7hX8nWNzYohz3FPgw2BR30YHAK0DKdh0O0QQ5+mWd3qHNnKtIOE1tKI5 -4CKKx764Vy62rv2hDCiJAOggbmnlEcG/0kktMhjmLzxn9KegXX/6Itzh5UpxAAgD -9d+jCNA2z4UiQ54gmF5eUDgddTPkSzKJASIEEAEKAAwFAlIHhBIFgweGH4AACgkQ -TDNTQpMrT7qdsQgAga0BWUN3bb1dGYZu4LpgcE0a6i2I06NqfRFWUOMv7cFswg/Q -bMHsIuAxuKPnBr43IF2XMBs8wRXC1eebbPi+El8amEq7UBegvGtsGLg5riCK8rY1 -szZGLolg7+2ZYnl1hd2g2OMgZBgkibMieeaAazbC2kflPusdlAmaXXOpa/99FJ9F -jHrNqLxBV8g2EIQv6F6SMI5qrbSdYwRinqFNkqRYdugngWl/HVnwV9o7Df4vO0DC -F/UR4jVdYGY2bCwTlJDfuj0wWOZPd/ae+EWec7Bu6urnq6tqT7xWnyW4p32kuo6C -YCJwGvTMLyew43h8bIhvmfXt5V9qP2bC9rWFOYkBIgQQAQoADAUCUmPmegWDB4Yf -gAAKCRBMQ88jc7PZADCTB/9x38hhzOo/SogXrhyw8A3wZrbKx1yPegFnRqzYCpBO -Y0VA9uEeUgqy9P5eroTfZ6jHlxKG4JPZgVTg9/GYYWD2MrVO9VS5z5eg7j/Mh1IH -VBNsSy5ayKWVAP2IVAHoNQyRNCOK1Sz8q8MYShpKGDjUp836zJWOCK4/Te7vP2Zf -pz31d17Bsta02ybVz4Oaqr/zAs5Lt8FXGQmw80jQDTHVHI/WHnmGYzD86OwaJ1kO -ZQEdK38qHuT2OdHG8TAZP6vIapi9MH81lOSM0Ei3YHl8RekuvCkXpRwoeFDIeoJY -VhgSUkaFzqx5eE91NSBErsway4lPaJh3B0jnjqMDRL7EiQEiBBABCgAMBQJSZsWy -BYMHhh+AAAoJEM83lMtT4wT25s4H/jZ2sxbB/z+UPrwrBYpyMIbls59PjXjridzI -f0GslW5uScXx6Xz8+WFMXE/Fg3CTz3EkZxJMN/jzojnJyaPeHfC0v0ccCSpxRBwE -GpRYUhTD/L6DTryIuYKtLwX/eWtXdnhwDMGsHNdSO81jdexHwFKD/V2T2tvBicke -Fzi5J9RQt1JNv+9TazkmJ+nIrh/7RjqxW+Fn7/6mxyQ2lnczOUKWNY/o5n4tdeMI -GzSXYqnimDcIsv4gC0ZjbDx3a4YNmzpAHnPvNSvaUGuCvkhYBh0W6Zgn3IE11ZhC -1BGQysg9s2aonQOC5jTs18Kruh6g0lVKkeqTo6f4dxbSgjdZNzuJASIEEAEKAAwF -AlKsrVUFgweGH4AACgkQLSTbR9bIKBFNnAf6AgLckONba2fWgNBY8JGceuQ/e9Py -Qgdo60JiP6ep09VyVJ9eA3SVLVz4ToVD2JQpmNZjgY0Y2SwuNbrtoeaiorvH2AS1 -djzJSSN8XfrEuogjR20h6EhDokKf+VsCn0FbvqKGHMlxOm8tkFN2+bSqssErwuuM -lj4MjehqOk+o8tRVhJ//+V//AtRIWH3DHRs3Zk73fg0NNmX2c2DokbLXh2209NIB -HpIP6s3YUQAAj7N6bbP8HDZTQkN5eEdtqSXhir8lGs+gyKSr6QZ77ggumOMZpS7e -M+HZjAoGVpn/QXoZoI5sfkpJ1DAnqcsSoJZga8lBeUGKcgHEQoOEaIU/TIkBIgQQ -AQoADAUCUrXvgQWDB4YfgAAKCRBisPkHLMDzjkqJB/49IZ1r0S/owBaHIBNQp+ky -PEOfTV6gnrHyyVps6XfFAGEP9OHnQLuLwCTgQA2StWRNJcDNRQ5zRgwGwRyREUyG -He9Fg0RIFHJMOsMyfoJxYxLEiLPVZmOdEku73V0wxndNTIQ6PVbvkbXkYPdiT+ji -+ieEb8mPyRcxpgLaccDUTi+hcaOW2Jp2Cfo5zJlZUC+em0t4pn7pBk3XAl3bb11y -FgNetH5IarZgA9tZqooxVcViQB7Q4SJbWpCEhy2oyM1fz86BNiiwkAHj46kautM4 -jMgIjZyJFt1yM4Kxq/2wvMBcI7/pOPGFm/uN17eYpjfDOtxoVlCAB/Qnh2oRoo9S -iQEiBBABCgAMBQJS2zFfBYMHhh+AAAoJED0UmbU+d/RwSPAIALesZHB+36doovM/ -SoytkrpBqb2rfoTdCQXC7EtkS+w3blL+5K8NP8btPzIEEtDhz4o9uV9mpcEt/6DV -6MHITJjmjTh1aLWOWi7+ZRDP06QNJBpJOJuDwz0Xb0PUrI8YJh9ncdYh71H3esuQ -q3iLTpaDuKuZZbKioNkY0rH5dkm1D/jtM7pN2uirIcludbwb7hvsjV1IUEgUM433 -dwynzD/AeZPodwl83I8lSa6kn7rXJuPP0ZKB8NZ0l9sGVXu+ld7bTCHQTYxoc5M+ -gI5ocfnEiGjxMBCIDuBAI2SqiHuHO0rwtzjQdSdyxYaMfQQydXrnSrU6O62zpAZP -TzApweyJASIEEAEKAAwFAlL1/vgFgweGH4AACgkQccwzbbwK5tcBFwf+JdkNIfCW -J4gGjY0QP/D26PYiPKXrRosFF2n6qQSuUlxbUFamR4m42xzB5WnmPdBsgqeYitDt -qNdUVR585pl1q1O9sQDzBYb59UbQ/23+T8Sbq7DUjWN+IYIHjJioDexTS8Lrm+mm -RG2J8AfyLucpfPa46OrC5rQ25UJ5JmOARpBOZZJGtzPwR35y5WqtYfQj54x1BQSl -tH8NR/5sDiMVIkIsaekxTkydWwWe6kjqMQrsA2H1i30S/ZttPvFqL1Atm915P493 -NOwtRqjgvYlq5VUORtppQGMXnlF20SpZZ3cx4RwCUDWQCPpKHxttX/xLp0yNl2pv -YwVfaak3jCeaQokBIgQQAQoADAUCUwqO0AWDB4YfgAAKCRA8BRXBQSHWr1TIB/47 -3NYtszhHbvZhe2qV2dfuTEYFKqayA5l7MJCOTUDglwJbtxi/Fq//566+j6Wu8jSn -LDEaBAx09XqosXf1V6tbhG0wZYWQVm4dNfBA3vYJCF+O+3CRmcP/QQuj1eePaRe+ -GKgOiZ21DZssyTj0pr1KsgcY5XFaxHnfZbNp5zQMYeC7kF+TZbpR34aLndpdNyf0 -h2Aw9OAdO8RC7KRh95JpaWt+Ql+zGbqRXT5qd0nx/3ZsXx6mp2CJC6IkUPByneQk -sGEl011ZysmRefeDwoNGnPCtb4BY7f5OY7mgohpn8GQLh/E10M5RY4r1DP1phImf -RWVabzju9FDKa/lajFOZiQEiBBABCgAMBQJTHCyyBYMHhh+AAAoJEAk6Th1CCFXB -rp8H+wasiYdN9ylrDRB4UgJB1O5/XZxP3omfZqLkZS6RIqoFYalvzOeqnH86vwny -704OIXsISseVba4NYskkekBanEjW212APIgLkaRbTwhmQMcVkeoVz6OVOXhXTxsT -AK/4o767XkTAIZVzaRrOkgvaZlYl38nj7uboGoSpzA6dWhhXb9Tq+gIk3R3FpExC -VhKrX1LB3EYDjg34phXcXthU1SNd/+Mo913jZBlEteNhAP7TEuZzhD6MMV977Am8 -uWS2g/7ZkAbtcWPOefeCRtIq/M2Tpeirw+Tsd+akuHvxNl8dF8kOqfUoKccBlRa/ -596IL5vbK7L2OhY1xMEbR3KmTdaJASIEEAEKAAwFAlMco20FgweGH4AACgkQCKvn -rqWs3WWk9gf/ZImsMESxczpmygyvTz3SAzsdSH11/SvRjYgoXro6gFbUvGFGZO1E -THH+2X2svfdXL+hBi6k0gNyu4eHEQ96isRGwkLd70E1U9sE6c/HWrn3pfgVPKXc5 -cXlZ+rNiOovb8kLn6oXex1PSE9gmbpQIxeyYDWyWkoWUdOgpS7Y0fPdrdu+B2b4v -BVoq+T46RRhn/QaS22ssdyIYuJiQgiPf22LD48Z8tBVLRfWIlA1VoqoZHQlvKGhH -GQAC21Xfsm8rZsP+0jwnmyOpbFrunqGwR0fVYghlxbD/E3ezsrWGunexI9PWHozt -vMRwFoTKV+50WOWr78ecCiemo8blPteNSokBIgQQAQoADAUCUzg2TwWDB4YfgAAK -CRCxPHNnetHkg0D6B/9BbODll7re5MyCgc7fHLIkMd+HUQsKRwfkqdhK9opqvF0J -hgATf52KDKlKNzY3jBN+gIFahDDP3TiErTuNU4OW8Pm6oNMwnGrOS39vJMx3Eha6 -TzvaAGq2Z35cIo3R9fEJaiS/cJtmKGWtOX9K9ra69p/HGW9UeKgXUyLANc3RN4pM -smuFusvYppH6bxYg7EJPp5nI7gL2bs/S7qFZRwBk5flscAt5l3HtQroFUy61otDu -izwdOlmeG4WxDhCUBd+APpA2PhF7XcCG1V3WaPCN8klHYTdfSrLfQYjm4zGVchNe -HymQRo8EVgwyCJHbnh+vNyTXDe0X3Ii6hyqAAqstiQEiBBABCgAMBQJTSXopBYML -SdgAAAoJECmaL6WqPkzaq/IH/3pXfTyfJ9vmXWjLsr2SxtucFpG1p4L0mYV8vDRV -6vO7k2ecz+odO89HHdr8jBJhUhcp7VeOmP5deHNyvU6LEKTA55E/rZwnj2pIIZVr -hc8vF/tw4tI3GxeYSfHr4IHT62nYPW42BdUfu2ve9U5pqJiCJUmbpD4s0uLdpWpS -jtxHt+kcNrAXLeNwtU56kWnzTWQilAZH9hj41Fyt7Sja4MpK5B/Q6A1/1A5J8OLR -15Bor46E9ThZrJWCb3p1pMT5dCUbnU+AwqukFt58kOTMVew/B3zhYfTscllHJB7k -v4UcJkp3+s9hjkw0DiOiBB62iPBPD9/q38IWsgz593JM74iJASIEEAEKAAwFAlN+ -cCYFgweu/gAACgkQOfMatCp2gg6RQQf/Rxjh1VPck+mH2bZeTOYMq091pEFg9HvH -vkgj/H7y5eR5hZnR4nMZFYNEX1kddiRBprVq8EF8coytNX8zdo1NuCTsaVXI1pxW -pGjD3bLLYuIdA1S6WKbpsMnlH1EwO9tiWO4r4OWHQ+Vx2EI+oIQc8I2vIHaYNRmu -ipW2WebtXjiJGsJHAFrghMoq2UZf5H8LnC7LxzHx6b9IXV4UxM+enBnyceS7L5ue -4Vyn3UYydEjZQ2T+VpqOqjd/p7wG5crhbx9Cu9v7BNBYzIJnswihds4Q85uad6Gk -e+oTSydLt7SmHwLzIMqBzkoe3IExdJM9UsUbXczk7FUWE+pmYvCQ6okBIgQQAQoA -DAUCU7uA2gWDB4YfgAAKCRBSPavG1pZc99DbB/43Z44QF4T1D9vMvP0fPXiWy9eT -xuTzTdJVQzUq5NMxucxI9OwwQMC9TBxSW1FZS1yyzh9uar5YSAU/JT++x/aPNku8 -Ekuofjqgyl0YZhC+KhRou5YI9u+SeBaBGnUM9gljHQctKvAXdGrOH4mQufddjVKW -X8N4VtsKrf2VNZ8bvP7azb0TWkUCURo0jUD3/m4LwucDdAODvXWFXabnx+bBeie1 -zLq3sqP+5GQQG6EiOCgPoUzoaZ/qyjJLS+girO9/j429i7kml5kBtax9tGIE12/I -RMN/lMk3nf1hvOvGxkE+N5CTK5qOJ3IJOUKyq6ib8Mnlc/Dk8LdMx5Yy6ce4iQEi -BBABCgAMBQJT42qqBYMAAVGAAAoJED/DMBzdCZ3wRH0H/AnGETMO++ijxEap/6Ox -WlKQ3gM0PjlOUDpdQp9Io5ZzikK86n+m5h+COYdQyImvJnGbn9mAwZA2gKvPv5tE -dKlwyjFV1ykn9oazzqK9EejAhQcdrETFAGJYeI0r0Qm3tbM85KAecxaqnSEa/9Wv -hHx6hIvwvaEAp8w1XRcXwII/zcLY1DJyEEJx1EtPYJEE2hET8Mb/My+/APOYWnm2 -mqKac+s+FB738//DqGCASbsKfYXH7IDUIl1S9gxnwTu0Cf+9f3XC3EIpGDyvtEZT -2owREpP1G+AFuket3vgLPB0xgmJDSdtnbLsHXnL7DU5PQknzuw45AK7AAyjajiAp -OsKJASIEEAEKAAwFAlP0bS0FgweGH4AACgkQbWOhA8uLztSNggf+IEBXjp+sjXZ4 -TzpT9YEyoijTox0MOYEXDm/1Ledr7rNb/jxSzjBAWlXh+rPibrLkAAHPRvN3X0m9 -QV19l30Zbq+uEkV+pTtjNFSuJTnDu5hYBzK12dWf5SShl+zupfhQURJx58w8yfcs -SNZn4mSEhhF9ryMKCWVQxQ5543mNHZj9gsK1+LjWgt2zCSQ6RYtGNWuLF4O2WkCm -UjQtlPsgL/o5cEdErh5YhZ8IinBs08NRRXkKoMftVKNuoBAt25fwvNYusegkSXBn -QgFnRUFzWpmypIfBph6VHM8YEbmTExDMs+e36OiCnLLNQfhznmsvm3ZyAFRNkRCw -26xwWFYtOokBIgQQAQoADAUCU/VIIgWDB4YfgAAKCRBGOuulu8lN4IYJB/4k9FoV -6JLtrD26OMAW4+pIWK/30csj+s8f0F6MfuD3tDH4UCU42teqKnGQwxXjDNO+gues -+kCBAyC0Nenv8HXUktfS/eHcTSGtHbFPKRrIaX33gXvLNaHXYK2Q2bKEPyZWfNL5 -BsFdE2TH/kbdQ6ER07FVV1Kr3RgN5DCxpCmgGYPRsXnaKKY8xEo+p0rwYHtn7qaU -VBc575J3hv4t6LKAvF9pMxluZcue8CP2jU9wlS/tOOzPDCav9Mlp3CXPSb57nRNf -IT2FrV7TSAC8EfKjpU5cXrTIpeo9pws3keHz6EoTsiwyIgNMYsy/6YM5EeR7/qX2 -k+GKue7AXoCC5/s5iQEiBBABCgAMBQJT++5iBYMHhh+AAAoJEKc0AnaAMznB4XMI -AM6DnhgSoQBGNLdwKTfm/t04ArsP5zL/h5JngS1EpTFVOji0Gallb+oAc565WNTQ -LeEuy18b+U5ZQUs5jC8IpX2bCRF38A/V2/NvgYOsE3YYReA2ggmCKKQNht+9f9Mk -ndGjQK9eIrbMeZLXsxnz//Y0gilw9pp41CCXaZUbqxktmZT6CqX8613IXjfZO6FG -SkgTRkvIIoQxp4BvKJVX7+DF6WpTucygn/DnmwiPLyPs/Ii/eGJzqarREkvhV/Nm -wAkB+YsNpsUH1dyOe9638OnqCsPNAMiDScvlbrGNGgu8PZWdSLRDjrfg9GE8oPl9 -bAYul3jA3vRh3t/2c0/wa7aJASIEEQECAAwFAlDX+DAFgweGH4AACgkQv21pUW1p -oerO8Af+MnscWknRbHj1jRdakp9j9u0fTIB4OE8d2l1tRkGtBIeSsEghRl6ICcnv -Wcf6t2QlWhmNh2bQH0SHmxjtk8G4lI/IUSrWRp1Ny/PkQKoi7TLII0OR20JeYNJ4 -4Er2jkQY2GQJjhiljbMFylRVoghl5Z15MvGMnGmXslOs8FQrZzMYK9tYilqm11re -O40zq196W91PJo1O4pkSRiXlDAXFlSYOUBsSojVV2g7Rm2mWs7npaQDaS5gjudwq -vP8mxQGVkqttSCRQ4BX2+q4EQkFo9QQxw0mcvgIOZ2PUuIR0BHAq0mxwyHjeFme5 -SPLevCPxDkJcP6YGD7QwUb/9cKwsqokBIgQRAQIADAUCUo7HewWDB4YfgAAKCRAW -b8I8HS0d2DSPB/4uHlHMNK4iWBT+4kbB6jaUXdeqtnOJ7Zy0qFRIInqpPbHye2CN -1i4DAGoVhImPLAP381927G+FNC2ULBQ8KnhHAoYT00uCuQkaWSA9tg3xu7UWwqYj -HUAoVS+Pe81gCrP9tpBFPv/ns1n0MvN/4UqDHzQr3KkegCwo2RUZkaaZ/oqsTa9f -hWipLJNEKy8KTcCRzxtaMawGq7r6tkTlb/nxpVi0o2UDg8zRbDqoyyQHjBGtlH2j -rJ2+jU+wnHequuhZaeDuxi3Hbdf75WJ/fGNWm4j7OR23bUjHqVvqze93Vv6n0GHO -7+3ZNYC06sT4uuJrV2hkhjYZI66uEs9OUJF1iQEiBBEBCgAMBQJSf76FBYMHhh+A -AAoJEK91U4pAcj62OqsH/jwkDIXIzNcLj5CR01QzA8vrxmUjn2zx6pfmYkHo1v9o -HhQh1fr2kJ7WEpSXSPUkgNYyASVjtAh9lMxdnSMrC8Fv5psdKglryzFPEKVRXCtw -w+FbFJqtvuoZuTokyoe/Ct/A7S5LmqCGTig0d4YuBBLY9NBudDjopx/yvNKuXF+Z -k9dAGgkJIvYEnY0t5ixoHddvn5iSOWPJJIiSsZnqXQMBxallgKQqzCqbY9/1fT3x -PkX3F6T2awfOeSVPfAMvypzk8HERv8rhG6s09XP6utcjnm3l4/OTcMWPtO5h75yI -JaOqKKhTtc6Fp5CbO7Nu8Avp9Zme3GnJW81BuNZP/S+JASIEEQEKAAwFAlKJYsQF -gweGH4AACgkQgS9J8+BQPWPlMgf7BaSSj75iflPA3V477qkjDIsrYXd9d//niLj3 -auM7yyZA3saSpiCqnMVMkbecVk+1yTakACUz4iUAIJGhQgI9Q+MGsyyPBIbdHOhC -j09ScLixkHJQZHWyGDtCf9gsF12sWnBi6qgw+ZsxBlNePdCQbYmh+QJutYuLSKWW -zALZKu1IXnWJfgDMM5zdl4rLB7w2zQn+wojASpmDZFLf3AuAE7jqvoQMLTo+Nllb -/gxG4wvCnoZdSUXf1oUvCzNxhf1PQPdz0ZbqKyhQs8jBQpfrNSDdALWvWbAGQEoc -855cwHyJlBq7gkAkKqTd1bzi5YeyqrDx/VRB8ZkcOcTlTJJVUokBIgQRAQoADAUC -UvZofAWDB4YfgAAKCRCni7iTB/69aO2aB/96ltE/WkPy0O06BQ4a4DULUa4zHVg+ -osudVyuUcpCNtYR96Ct9wLf1qzJaJoEL4FXPR8CCx+UUoIeOwXqk68gJ9zgZh0gE -Rw2FyIoKV/tQeRbVFVB8LMX/xRzhu2t889ibRZZ10GCzZK1TIDQeq9xUsKBbNkUZ -Zy4r1MAVKIjA41n+vKtA+6QL+4GC1uBkKuWI46iOlVTiPBPf6E9oLPtYznbp8SOE -jMZZL8alkFyREvbI2qPlj1FCOd/tFce9M8VXHT/zxO1XU5NqwUSl11otp3TaIfqD -DQOZiPfRtV/dkVzaw/3XC09u72aMgNCqu3CqsSXOiCKpGPj5Xx5Kat75iQEiBBIB -AgAMBQJRXJ7QBYMHhh+AAAoJEF+VGQSajQw2W1EH/jnllq1ZQOGagoO1S2psVc6D -+OdvMSsiLh0eAx1InQunEmfBmaWQfZcWhejlRnXpccBNMztPfE79r3auJbr7MBTJ -sIsh7r66IETeAupOKdcc8ND9F8+s03kYwVOuwvv6YPB6vFB6wGziiY7/vx2epkcI -IhF9a21IZXfDZJv9yASKj+CgXZuEodVKm876f5givJ1Rbrlu7NLxKL6fXMJLNHx7 -DU0vp4jQpTEtWwvitR1tFJoC3ilmJ2/O+fUcjGIJ7E/xdiN/ObCZUsDjNK8Ibf4s -XqGdK9XkNWNcPcjjMgx1v+yksQ9ww1STdVsLgQtoAPMa6PQTcjlHkIVOJO04kZeJ -ASIEEgECAAwFAlHubrgFgweGH4AACgkQEBWAXNPRC4PNqgf+K97Sl8B/VPKpU30L -PQ/nlSqL4SijmOz3zQqA62yR/kKUsf8E2rtqR4N8WnxYkX58zzkeT+j3BlY+fKIv -1MxuZnC3w69JTPHKqkBkF5AGHUlHPmuRl+YV1S6j5hLgVUsmdxKZURWFkBpUgAOc -aPq/NVhm6aZDHGPNA0qxhrS0n5HVyWROF/kodEqKAYvLDukeSLwNZTytqGdwBW51 -2Ds7NcnCDyzOFklZycYt26JUHwnw+B0av7p4QCw1uQ95EDXOTFQeQmv+VYYPQElS -TiZI4Fx/JNrc+djDDsRgMnqCTLuwcjrKulqL2zCAyZdwW6BexMAdzppb0fG7bVgn -wJidR4kBIgQSAQoADAUCUasZ4wWDB4YfgAAKCRCF4lKFPPZ9VbmAB/9MCezdMPOi -sRCIRW/hA7QogAlaMZYpezlrMmYDlfiFwpIVK/XWbZKsrm6I/oDuIZnp+YcT7UB5 -xf+hi+e7PNwINUs7k4w8gi7FbdOSa0bedp4so+leUqrWqGZdg6fZ6Bre54EdC54m -WtKBwg0NBu+Eyq06redq5RHC/mlE/VpAAslpQSjlNHqidMFHTxY4Orwi2jADNt9M -6/SIG/6VzBrVqTwCqLUgR0GRoK3Cv2w+6Z3zfMO9AFWDmlOTqKmKrS60Kju1voTk -I+L8zOibDdzx/XfYlZK5i0PscPPyE8335cJOJ9FB0m/o35yvW9TopaLrX18+BM4q -IYW+b9asgVKDiQEiBBMBAgAMBQJPTPxuBYMHhh+AAAoJEBTp1cP55yO7FLwIAJpk -o6GN2E7zKGF12h+xpAw+xj6dkIVEYZsLk2u67IOWLJogf9RFZpC7HPiISID1mcvb -OmE2Tb0z2uUQ4EAI83CJAe5qKJed7cYxrbHa4Yc+GBnYFUeuqWx24o3mTQP8ltJn -iiqWFRLO+KtBt0UiB67rUA+3euPSLpdwgHVHVgKaYL8geFE5Ug7JAkM0EcvWck3f -MQaw6Sih1F8Suh1C2x9V/BXDPNVvbyx64qpCowCwoXqsihcyvMpZzYNAFI4BzXTG -GPBZ/ZU/RU6dNEicGLHYMhD2YzTzYNGBnrBCzQWsMtJ5ZWG5IOlfivI36RM/T+pK -a4T1bvsA7QVgA1XrY8iJASIEEwECAAwFAlEaI14FgweGH4AACgkQ3BohCKQfmySU -HAgAwyG6xtyswumcFJUCypVEo2zwyuXp9X4WEADJmePdqER3IYuHEjVfHKENUOvE -yMjPYgaY43TUXN032DO9rgCe3AyECv+Oz/Vtgh2u0oONSXCzq6iSov6xZJ7gLMYO -ax/YIol8LBX5B6S784aKLrc32FtoiZfFKb3ENoYwN5FzIdU+tSx5tfTXGVJc4qdl -Xf4GJn7mqSeowKhWwwh/XghsHa5pQ7zIF4lQywD2GiGvr37zW7KZXa3Xaf9sINf8 -42GS4HIHwIxcuVGzzxa04qYXBW2LHfaKO9qBRwsHaHytPpZ9iP/fW20+7NCEVDh4 -Ri5L3fNGmYD0PLi4LTsCxbAPEokBIgQTAQIADAUCUZzOXgWDB4YfgAAKCRBYbwRa -JQ4pkHdsB/4pYNnmgRS4Wd1ocDgLyuEcfGoDlJGNajwtGyfu27jV1B9GHjsBdz73 -2ha0J/R4SrioKoLHhVlUHqLyFbLTyD3LR6K7+adl56GvJg76Cm0o0Nw3U/8WW9b6 -JsKtzHyR530O4b/uSzfOcMlD0bfrk6xVNudPrLyYvzCML6dMJleWyYPyQPN4cOAp -dUf3L+tNt+0ohXptrsiXYessblzegojVrslK7l5A7r3vZjykiGWQsQKWE06TrQR6 -8AI4+urw7DYnpCdi5X8LnAPpwEXNHTyYDvl5z7dsJ6UAUXA/+Ao5GQpJgy+pkrHW -WODRbNSlacg1FezBw3RjrXAJuSzRJ4yziQEiBBMBAgAMBQJR5Z83BYMHhh+AAAoJ -EMboul64jWnQXRwH/jsT5nN6sruv85wAZw9plMpzDniycQBMeCmMXm6nAmTnh8Aa -20Qb/zGpO7drxTL19OXyxwkgyp93w8Fx7TKa0IliW/a5IfaU7QaBvWaPJuBuv0Xw -XyssanLWAmCWzejuOZRuWlaRQfHhsi4XmyE8fltFyEzgI8QcP3mt/+Cox9JfcYl1 -Szne4SmAW0R1uwDRWyqrXgLHzxmbGcxSU3tWpkmCdAI/843cp/fPo6Pc1QBJk3FA -dUhCtuWJDCR2C+wJQ3bFVAybbBFHbwVnLxFNEkqBL0kEJUEz1OpcBsGMU6hZEM+/ -EPVshCOlvmiTM2t7OkLu+oII25tls/JCDFPUWECJASIEEwEKAAwFAlFZ41sFgweG -H4AACgkQFYcNtUd+S2DU6AgAk+NAAQcUvDGKHSJ0+AvCl2+ri4eGsj6h2DlEf2d1 -92P6nff4NBVfCXt+2RI8s7O7IP4qbxCOpSyVT1MM9fMjHXkV29MjFMY/cPFoyuBl -upghUly2Afy8lnJAWSb++qADbR144fvCwzAoqE2Y1/+FTUXjb+Ts5HgP9pXN6F9A -PDT+Jtmc7pL5jxFjfBBCUsxQ1TTwQ/MRkcSmabbq1/Xb3WunIfa+ZL73IryHyBab -He1kUIJeWvF5tRtG8kZlWeZtnqS4ExPVQOChly1wrspGxBnYBAb7lZHRzbXNHY7j -9dUb2EgzHbGLtyAZOnxDUoADaCI1iZb+Q/XFUV28AHFtEIkBIgQTAQoADAUCUYGW -SQWDB4YfgAAKCRCj2Rh7pR0Rg1e9CACjOeEM3354kFXPjqgh44zqM2my16LiuMUP -Y+2oIrvB56vPqzVIanx+Ad7bTfHYDurTf6IVhMjL5yHTzTCZW5o1g8SnR3KcXEqA -agv2CwpyJ23e9reAPNjGZhWoslnwJ4VM9cdfhZVn5BL3tzU/l37TrMS3YYPsFSkL -AnpgOHQw38KmRxkkpkqzRI+d4OAez3OjPO5DkqacWo+2JYn+p6thael8dxvSM/2r -X+N2efbXVZx3YqiRtbn8WRwzQZZpnATJZWAch4nTskSy+dyPznfbhTMcJa0eTvYK -KteZGD2B5MxN6Otu4g1IFzQiVGpmh4lSiByniVxT1noeKf80bIVriQEiBBMBCgAM -BQJR0AorBYMHhh+AAAoJEPfme/mihxfEFuAH/Amqj0xVWyXM3/DtDZMve4p7bU3k -TEkPCfdDGdndSaZOeuMjT4VKCGOGf0nSaEoJH11Dt369REtpEow14MT2h20MzisU -f48CrsQew41FJcIYKnB5Zbjw0vhHtS2CAUDSoWaXfBfgKwiNnTTKOYG7ErxjLXs7 -g99f2pQd32qJNASFFudWqVC1rYRcmp8ZpnAcH4h0xkU5O/6DwpgnZELhGtLtbSLE -5iKi/WAmyp/MOncM6fzZXsskiw1mIqUoVPqj7ZXpkSYPNresptLZLZQMMOWtGPSw -PrFcjmijhkyqezrbPsAZVy4FYU22mgUEGnsQ8HTkY7Xs4Bg1+93DJ6SY3+uJASIE -EwEKAAwFAlHUXE4FgweGH4AACgkQiQn6grMjQ/3T7wgAjw1HyUQ6wNT4lwG7VXDW -PadoRh+Qr8zlrUgfmYA+DEURGUx4H+KuR2WFrRPVKd16Fqbgha8XvF24HEIW3Z5k -BOnbnUAbc0BniNMDde0HFydPtiw1huukRgGRnlU5dUAHT+UeS6MyLIr6qis75B7q -QpCk7DFmHwcYPWJcthiGK26W8gEyPnfqrSCQQh4FUBzk4ZEDjMaNdaqeX7TJlONv -7kfZyKXEAImJ0qZ+XLZKbaf7T7ftTz8mmRqc5+QMc7UQ6Ntjr421kKu8t3w7LpQz -9Gw5dsLLnZgf+Cav+HHSMdP2K1VWYbKk51vxsTCmxjexb30BdmXzgVFZRuSZ/gLT -DYkBIgQTAQoADAUCUe+LjgWDB4YfgAAKCRAbeigxaxsfm+2JCACSzbXlVdgwkld8 -xhMRUYtEYEwWRMzGJzGnFy/Qx+Ne2vHuT8CstC3Fn1JnQtE2SvG2eLATd624X8Mb -Kjz/e8l2gAETQDI41rfVA9wry16Maqh/Nxznk+F1uz31Ekk14HmzkCc7xHHOECPz -wHwfi0mPa6uhkSfsikCifKh7idaJ1a/NTIVO2cNGHHPfP4adBF2p3ug1OQZhMnIJ -eNhCKCmqh2J0eBqFLd1RSEC2J4cNpZXlWL71RF3esTONA5GGS6fjg71hOkz9/npz -qOZQw7m9PyKA3cjt3Nv2zS9WWrwblsBTTk7gdmcblxKc+aF5EDYwiTdknyoQlZTU -2x8crCQgiQEiBBMBCgAMBQJSBA5fBYMHhh+AAAoJEA5N/LcPdWczfDcIAJZDZT/W -4djfAEJjzyYjik7+xnvsWawAlxa7MifCsvQ4UOylgZY6qfZld87F9J2lqXyyWcfa -3eOxWICmPR0Ok9zTZBPvIdOXOonaIzslA3OgFLOPaZNc5mcK4dj6WCVx1BVmO+ft -Oxq0L7UYJuV3ebU7cox2bEPxO3dYWd8QCb9r5OXatWjcj8yNVVt6X3q9MzZd1TPy -jRtuH8g52UCtddJTJ8NJPaWx8mfTo/DUHETnHozX+tdN3vGWzkjZ1cgO2jndN9AG -gkRXQ6MZYW0PqwzuRIfp6tPvnAS0r2E4efzbDKBm5GLaOP8eIKVueu5epCO4Fb30 -71jKhzhcqmRt6J2JASIEEwEKAAwFAlIzPikFgweGH4AACgkQcGH4+jTqhieL7Af+ -Nb0VlGZ1nxhcMUJE1yPoPLPxDud7uy3W30NkaEZVNuoBwnG/28KAcRqYrGsPRczH -YcvOZw9oYhKeSDNHNOv+XjrTnyITtnQfvr2wAuZkbtmGTM52jMuY895P1PCJqZ9j -tZm6e68aXD6jgsYsepXpXB86Xby0oelpICcigKyW+ekx+zdpIKi2xcSCIEdaOasb -py16Q0iysuyC3mNSuLYecXZHaP2jTyZ4XCtCN2Ah7M6wIpxii9ffn1rBNramZ0Ra -9trDvktb9u1OxHSLVceIMrNQTmPCNzADPSJTPmD1VafiOe4RpQPnn4eTHcqVkleO -Qz79vif346Shq8QCuCrQ/okBIgQTAQoADAUCUtU/lAWDB4YfgAAKCRA8N7aArJAS -ELRjCACDtwJ2bxPBakRuMy2U2XEP2WSoXt9SKAjTXKkcs+pcqKOvbXHYOOp3hReo -DSx08oT1TcHDZMiyinjLyv2YUNRVVlP4MnUPB2cV1DNyN/Mdyn2KbbVfjPpc5G/O -4+rKNr3yg4psS+XN6l1qNM7l3tHks0FkbLqiMbGYaMPc5PIuv4mCqUCf1kFcmnmJ -JzEpay0G77LKfL8gk2p5tht+7Jh+22fUQGk69cLpk4bb1Eh/cCNVyanwDQmwow2w -WWNRkwHM5Qu5PH2GRDhkWvPwu4tZaY/4cm+fuFuBVMn42KlAQ+pJUd/AoIqVszFi -/jLf6WptrxM24UlcLHdkhyPpj/NXiQEiBBMBCgAMBQJS1bDCBYMHhh+AAAoJEJBf -/MtIbMMHO7oH+wYO3j+CZjCErnwpgf21ygGIpUsb+mHYOBRhOzb97cQs8Tm3RIQ0 -36xaSzTgo7FS/3dWTmraHg4km5B2KS7CkaV3RaKpfBpKWSw2sSUufUxEahMvCtd9 -SZSaSbKY5dtHrG5C66egQsnkAD2f0zONBsSNXrkKlTRwAr7BsL0WxbjoeuxBQQ+9 -vcBq+vnRwR5B+G38pEaaTYu/5V7771mBf78/SouvDfel3u1a03Ce4N/enFAVVt7j -Axv7lnhW6K0hUD8+ycDAi+KPn71A+ayxbgj7pbdAUYpjQnstlcn4Q51JNzKkHuq0 -OCdVY79CI+elOG3vGPLzXtGi9un3QV1tMOSJASIEEwEKAAwFAlL/wYkFgweGH4AA -CgkQHmcZuQrmEtO74Af8DSWsGH2xEFVy9L0DMcmEFmtN5+XEGykOEViIvtdptKbi -ON766DkXNxhYHBrXH4A4ZE7Q4h1C9daPD3OTLTUH+4ATfO6OgHjPTRF9gE1TJfC2 -Nzp90lrrIa2L/KvNUq6dvg/SEV0wvNJRFbfNynqnn+sYmTpK5qk0sG+2UUlb/i7f -B4SH3Tx4biw/l5jorbjPoVzsEEeSSdcHS3CRZ9fRXA1qpNbPRBYFyMLBiv+s287I -yMcqdMFGjB7J+uXHZbgOxGZl/dBnWPQOCIVdzsueLWrbxVGv1D7oootsSCfNKJcA -54s+vitbAivtuILyqFClqERFXs8lXg3hW88o9NySdokBIgQTAQoADAUCUwcmbgWD -B4YfgAAKCRBXfSTwYmJKlS8rB/9N+IUDTDXZoNeEXSB9/y+9bxgTJym2KNS+SqUr -TkJ7faA9th/OGrB4Lr1sLxLPmfH6zNI1r4pb1uaYiKR2F2/wHUs6Iudm37+oATBr -FOiFw45uJFhYq3X6q2/k7qe5kAs63ge4S/5B/w8Ui3cnGOIkhvP7S1I2jPLOk8wP -/tY0efV0dG0BT/wrumI7Yip7EDJFjrcPpoNXL1qRuWLRWxJrgVW9f9qwjlzFZN4U -v0YGvYyvCW3hyS9NqHDSeicgYSCo6P60srJiX3Y+ytNN8zynHguaog383xmso1Qu -829A3F3DXBWv1aPrtSmyigVE+4azyvcohZWgcrwyAmErcDAziQEiBBMBCgAMBQJT -G0F/BYMHhh+AAAoJEHf/xRiITjZMLnoH/R9Xxtd6oSbnQXWBfVX88oFZSyExw2jB -3yMvrdzVaVxtq9z6sNWpvIdfB/2xq9Ihb4M8Rn9EBiNbunB9xiEdRmoWyUMWaDwH -RbYBCWXpQgpMl+nlv3bwsa7a9BZqM2tDqUCuxAduzRl0W7wsnHjUVyhxZwiVkymC -Ar4XX/V/HtUqjNWuf2fYBP9Dp979woOd3kwSaMFjXoy252tCEKYS8urOeF7WLUG5 -5yl3LI8iPTz/ci6BU7wPuUkeyE8NKc82pkRdTvT2eMNC/n+mRBiw4sFRcJYiB8tR -L7+ai7VlcyCfilWkkZSbXVcOjGXh+rXv6b11qfuKkBPV66iIBjdAy1SJASIEEwEK -AAwFAlM5awkFgweGH4AACgkQ7KWHS9E3dEyabQgAy44Z2jHrvhHm0OhYP6jYUTme -t+CBqfKwwnNF41R3v8y71Gc7DHqyzK7l8waJOArnfRKmI9Ol8nSIWtr78xs8Z66y -5hy4Tn6boF10cuOnfF3k3h6j2XcXWPaPGA2f1FtezXI9bsP3KS5vwhmRlx8CN5qd -bB5QuY5ouwhIS7ODboRnJLEpKssmrhRh8g1Pj449Zx+B472QBXgZvgS2VZEs+kJQ -FQvO33Afm9NrCfy8kxBH6+Q76hiWxZXupMfg4xOKHh9Ene4bqT4yJYg0iz8cPUw9 -rTzRJNs9TwwxTs9b8n4f5yNasjGG4ZNdXHpp2wMOFzLWtXsb2pxn6YskpbjteYkB -IgQTAQoADAUCU9WXZQWDB4YfgAAKCRCBgV/Yyi/yUFKHB/9DxEFxvVBxlCz7oM6P -fFTrZbPW+WSYXyefAVOZRxefPnadO3xRJRgLrLq8yd41JLW9cVqlPuW0aLwJVd9V -Lw7OvdinjBWEKj8w8TixVoN3+oPgFC7/gdL21SvXhB8Oufeb3RRnG9zgB6gFPIVG -xPixkBCRn03wn+dArKEZs7V4ZS5i1Z11mxeyRedHvMHj3lMVwqKRAkZ2stqvVZnK -yDVf4BmoCi5C8y0cWyLV1Zh2f3gAy+nDY/CMt9KvdzvQJspVTbcwsab1zXef8q+B -/5O1KpWtbBl8sooWMv+F4wMwbr9pm1Q6JF5Ny/LiCRDC5HhWLm3UprxIZqfrst5p -bZmmiQEiBBMBCgAMBQJT9CbXBYMHhh+AAAoJEGJ0m95SYIkrJUYIAJKb4hwfZ7zD -VnTCJsm1dJ7fwjgjoJMeoDGGXVEhVi/iy9ISW7eiPVnY4Wx13ToWfYAUotYssXCD -EG1cLT7UIC0snYjYy7J1EVATbO3/NqroQWGlMv0Dq2qrBljRAiNXgYeEDFW1e4iH -Pwv24luDXaEno5Pp83hsNSDFvGLb0TeOFO0u9MLIKAbe980uvL34TxzPymj5O5k3 -eg69bLh46zRTDeIB+x5pIyFLyl0QXT6StZX3kaG4Q6cpgNa7+rUiqIMM2F8J1joe -vRARzNStvA8zSQ9GkAyVO6GQruGt543W0doz3KAW/SUOvjDbFBU5z0svSwT2IiYs -C7Aboge+xz6JASIEEwEKAAwFAlQO2kYFgweGH4AACgkQ6D0r9ploP6ywcAf9H2yC -aoFRTPHE9LWvHjsRAYoqF3QiltFdfJsdbHDE9PpCVFx+Sx3Iei3wbxAzLaJKs9qz -q1id5iFnylk8ixq4HZYd0P2jYMp/gNZb2H8YbTPBFrUaeDj94qt9UBXs/U5luh8i -OgvdMt4pnuquuEzKMB9FBO+TlfH0tqZKXJYh/9DruNUH1wIn5G46fdqVqned3iKW -mA6uoQ8DA3D80KDRpaqDfO9LvmERRu4YCKSfnxMjSqfvhL9bwH5Rm0p6z8ZAkcZn -O2bt7tDvr58LoESSte/CZO0IflCPDFBZsEuVZPX7ZrrF0i8OjYYrAsL44fTQpuPw -L9zu29DbmyP6I4ZcPYkCHAQQAQIABgUCUUtf8QAKCRChmZ0ne0n576jCD/4pvbQz -J6DjNkoo6YWbINvWRqQmDM69xKnsRIZ3hPtHeQb9xchSdtF3I5XYa0TCWy+yVdws -XO+zW3m+60TfOiB3tosk667mQKqKOoCLuugnTtx6gMIdnhUJuSIMGzCO7tEhmV7d -WoUSGiYSaUm6+BcACHAiNZRhhryMrOD2/gf4UYAYnd9nqk2Ri4T3ldvK1+9I4Fuf -h0WxRCa64TwXKcKS6jPDDUjY6l6T5G+NhxMwpYzys1VyP7svWYZlcne4K4BvLons -6EHNbyUuztZcnekz7/8vMuFf07lji2eq+9Zpl7Aj3K81ZjmLA+W4IdEqLElMhCQ/ -aVM+6CB4E3Ep2EU9qLb4eTIREreCpqrLjpbMbNMLkCCvIzDZvlDkcbLDup7sks0q -57OvVTcaiObTbw3CQOoXyy9mQHzNs5yYCdj3gjvfSm04UJY28FD3Ek89GtRNo1y+ -2+RdUepWM5xY/N7aHGN7xHS9gvNwkN85z1K4G5k88hbMgrspcBg22+brkt3XaHpz -mxIAJRly663kvcz3Pc+tc3wRKY0lzmHUQ3PSzs6PVRLDJmohAmhZb0akFbYdJPhI -kMr9LtxMCkYlToULlnvTSRtx+NOi+9k1sa1dvWuyJgoo0/2M7cGwiz5gUCk0snUy -iH2FCWm6QVVSscaC2rPY9D1xaD/NCqjXrGlbk4kCHAQQAQIABgUCU92O5QAKCRDl -H7CRw7OHRRseD/47QvxMNM7aRGNcFb/4U84e+jWtZP4wAZcUmMEdRI9RUqozMCiZ -Y1XXdMHtu5zffeffNoyRaZZainVnvVFS/IYa2ESAYlbFNpHU/7qDyUIHRi1Tr5u6 -TD5kpm0wNCtOMrJdX4NC/PZOa0GuWdK2XsKiE/sD5rFVtw95bWaoJlRADrn8j6fv -tw5AaTW23SiRYfyNYJznZXvn6t4XYMBZCHJV/JIDbjIGKVUGSs/WU9DrRnDVpH2P -cfd+LjYDLrJbv+2mIFJa9dCSlUJCi4HevWcMN9lMMZ2E2b45ZbZcCzBHHMHOiPJs -cVOjSzXOCOuEjBln9gDjUBVsiNdVwVaQk5TWb0fTrG5bf7ogIM9S7lWXOYQlPoON -kMRpXp5rGGfpaBunZ+/JFuC63SwAArAC/RKmsKsAuh4CNC/QxE/pZBLVFajEBmtt -2Yv+lGxBwAjWRX60w1EYwBXCoB19e0LHMASkuE7mruDhwOPj4PUG50d1WGdTJYEX -ImdijHbadhyMw6OyLJqzILedb/m5+5cpuFAYTs99nz5e73ZPr939A8wIsQrf3Xv2 -YN1mY08FunR2277JDIiLD7Gym61MXODfWJE73y6YhPjiXzccu/CxZqvvygsZl5Ei -wfr/cdkR7iU1IF/Eex8pMSRe5wuafBbgQQYdoqL59qcG2C3V5DvFXlwsLYkCHAQQ -AQoABgUCUpQ02QAKCRDhgRSUecBAxn7MEACYSXa8EiMiGK4/rF5MRJ79bSK5oSBK -iLlOnuiMOw6MFhuZazGXylWEyt48Gc35WURcrlaR70TRlSxdqlzkdu4xRYK5nCv+ -qiSHvlG2r3OGGTy5bTChXuJWcQvZz14zNJNR6lq151Qo0LSusBkSwm3dqU+Sq558 -MjkCnJq/pduS6IXwWjMJGXmfP9DmbwKTinbquDjwDuIxz2Jp/fFBxqbZmJ2+aDlX -TZ6rmCu2cTs1dKh4XOpH2nJn/IgV9ixA2Di8Cvq2tMzQa5ekA6BoZPgAgZ+CR7ag -7Ts1ezjgSYlD+eqj4ATOh0+iJ0ZlVC4JD02S9hWwtj5oqrlOJZ7rz5znmDJ4DO67 -TpXea5CIqNLUt5B7liPUp8w886sVZE2vdwUHcDFf04yFt8qXWdnnB1bnewwaRCbt -k43jdLW/LiTAkl5q3LYmbWvKhy/0XGdXgYFIyuB3Quic8RrtlM0hwG24ms3C6t+1 -/Xp+thtdqBFnu65b3JIh6PH8zTvs5J+uI85GExZzMzdBqkgwXy4VPy3dWqlE+Xm1 -cQ93MzWZUZG69ZAsAaTDFGCSuv0K79T+XEXeOs1pTaGsOWmlKuJgw7NjXijWSFim -7wcKIB4rvnQ8Q2EbuAv1cD473dyN1mv+RS0zlii2FuLMN4Oq3hZT7lguVe4JXHo+ -dXN5UMyeDWPFBYkCHAQQAQoABgUCUuRVLwAKCRCM7ugs3b6ETV7kD/44iq40+i7j -wXZSX4fMIg526Gha33o8yIj8A8GY83TAaJhbDmLjvoxYyicSa1UpcZUhEnFURczk -zjX2JLvWuELru44P6Vwue6FvYpZq+SWNsXYc9nIn2TU1fD0JkUEU9Z3BFWsHnCTd -4COheYzy9xvE7S9DPOkacB2HtFtGtOE+1JbzDLIMxkfRGR2PPyYJulZLdBHhDpSk -FsAtIRb0ZTLgM3vxi6un/+cSrgdpbklsbR1wSlkUxogql++kw8GHAvJt4n1JQzxq -u2OF1Dcuc+4FHDlGt+EMJhSqRLjcd4N9FUfhRrYU9+TfERTM+ITEux8mriyeftVn -jWay7zb0QoH1MEaQ5F8v/GWASXRtxyRpI5ynnFcNqPT68TS3M3z07GkjWjwF4tHL -NXmxB1BXaFWylFDSfXw27ri7vL769l4wIXLceW7kwP0zcrIYC//fF5kJ91Z6CNHD -dGc06hXjsbbDdLqeq5eiiDbAg5XE00Lkrvv1+XstY0QepvNZ7UtZvYJv1A/4w0jW -Syay4As1ZZLxUU/cqN+d5OOdPExMS8H9KTjL/pWfBPlzpsOJzLXiO1RGAS3qI2QF -iZ2HW3sSxpBbcVq+BjaWSQgZNvftuWyBnmYxEbAJquterXGxnm11KCq2GmEyClIK -vbRDj9xdgzaSJJgBP91he/1FeihJSjtEnYkCHAQSAQIABgUCUat65gAKCRB7JOVT -Gpf3z7RQD/4wZBJn5OwPZyY3bsH1bwufMXjIUkA+HyabddcIkoBA5cYlEDZGuz/V -JtamgxhXVq97XNrZz1LFIPK51SLkXjZ1ejoElnCMZUPr/wXUv5LhgVnP20o9mg0a -9EvBOAoMkgQoPOQfKtoHQVeiwxJGv2qUx1dVKet8aaROxJ7LfGOrqU6O5dZmj665 -w4K3SAr3j17NTiG5JWo+IIKfUZNkoyBbZ/UfDNMgkwEET63rrJVgwsryy4XE9ZS/ -3A5c/Utz/2v/kyJZ0uFEHSRCayJ/K4HQSACtQPf+7Nh4md5BXPi7udEPUHTHrI+O -jK1NT6tLUrnV7hQNnhk76MtDj46ssGRbWRPEa542TjwqJtQXbsllutkkCBVbWElD -jIOrBVzgADSAlBwm2zGNOkx7FRyp1+Su7/mP2f4EfFYXrcgCqvpnIJh7GgzhNKAu -45JCl30YdxD14PGEW+hVpxVB4aaVYI9MgZIwM9lV2F3wapnExGzXbXNe4ZNhC6IX -7zmJ2yzsdJqoLbo9lpd7ssY25CWGol3ZBpV+nw2+Y6qAOU3F+l1u6hj4KFAQrze3 -u6kvcRL/Sl4Xz/78OQe3/rrM+biT8EU3ak6FiTYDPz43gpX1DqnA493ciPFj0GbD -10GQsynSwx2vSGg0wjaVNVR37jj3BPhmPOw31oXgaRkXJ6by0ACqsYkCHAQSAQoA -BgUCUzT8pAAKCRAvY7+KBBTH4kHTD/43b0NixaAd0vwGopEHvv7wvvxonNEYOMBU -r4uJzZ+tvs2DD1O9UXur93IldCaAeYv4CatBrB4Rmwon5Jelm7QI+2eSA5lYZf6d -RY8SsHEXYb/hYJTtwCx9bQ6fH51u123lOAu+Mm6FkSaxuVmlw9d35HITeMf14wGg -H9umV2OjA1OnY0aFBJdH2CU/45IoJ0VttEZeDkXRr9vt6+c3Zt18Xd8skGt2EqAH -WAw+TRsrAgPMcVYatB3vIOSUsjvNV9RLHJnX9GHgtUk4ZH6OqzdkPKxOGhNiRyj+ -qV3iWN3RLLTjDjc9KxaegFH75NicjKnfNuPi9GLCUmUXQjGqwIBts90RJbCNWImP -aCYR1DRk2Mx+vCGXu0DGmB4pcZCU3LunI0Jg0qWI3A7F9wtBORrvN+TOXYGmzYVp -NRx/NuD2DeAtDbtog/rwJYNmIhvfbEdvCSBX2FpmkuiPpnAOYmxdc4lNqLN6zYJH -MtbpinnHjzQASsHn7V/Rt1ZwdZR6jwWSw8ty6wvEy2eFOvba5BnhnbFuHi7Z+uuo -EKMk8oKYtoyy2p4alsvo/YCkzG1zmmyvCWzA/o3/FHOqfyaNOI/b2thToVJ2ltca -eU1C1GE8k2NBgYgosFx6lKSCzeLFU6IK/9Meodxa4/lLMOaMZsI62c79sGQNRrUg -1kWa3QjzUIkCHAQTAQoABgUCUoQHeAAKCRAq3dYsexywYvchEAC6LyGuTLTW7kH1 -xOQ3P+XMtJJ2ZYuNBcykTFb5arVRdwvwO7mc0Yjrd/jYMOexRFnXWwuaRpShew24 -L0b78q3okP7b8bk/lZyT/dgDqr/NuuOj12Y/+B7KQXBDROQk+rfUpk1HylTbVoB4 -ARzo5vnv79jx3f8Kgh3aS6E7g/xhShom7O6EErNqNFAJ5GC9btkPFVyjM6VDplvB -e1RRiQdfjQTnLNlwW7eXnkuhyJwwuv6hJj/QSfHytVgwr5FCPT8alWqzRvm66rie -8FVVS7l/EraYKpkoARqotsIR1dkx4QcaxR2bA0g75kPS5sZPtATHwTqLaR/fa+Pj -xCeY86ShOG7pEnke2OeoWwMyxL+ge+yVMK9hOIRq4HrwQ3nVMxhqd8HLXzW9ZJjO -W5ulNKy54gih0fmUHVH5ZKtrglHCE9quobt1Rwx5OHHLB4dKn3t/QeQ8NDse9Wi/ -nQsQivVsRZyzw05FDKUnXFR03MXJj7JY0XSb75iwti5qXWwwWWyu5iuf0A+voDy7 -fUKp1GYHAiNEzNBZyo1uIfAmKcdLS7xrrVUIYJgP9gT/eoZw/6LD9qxJZSCx9yPA -0lUrn3UqpCft8xC+YwVckQoJRecc0ERlggrXBo6rw9d2m5eQoMbPbaYui+1WTY4o -cJcD3Ko60QOGK8f6aCPvFESsdXqfxYkCHAQTAQoABgUCU1RUfwAKCRBC6om0YAiW -zKyLD/91UQodSHhM+S/rqpkEKSQFSr+Uec5OFWaz/BaukMnuJ/g5I1nXZsRDV0r6 -LlDxjNIakkY7LFZKQjfwOYou0XRRwRndy2F6YhLWNIifK6rKvJeTrYQpbmonobTA -m227UjzkEkgmdgbQuZg5MqtCjaGVkBOfX7QWDbxmy4TpNYVt5GQ1ZGNW6CA+yOBW -Vlh4zixb7RH2zf0yQUvxYadbQRldTu7bUggdLiKLeHHkzdE8sMmmZhTzYsfYSgMM -nQkE3qz9uBikU94kfDHccwkDM3Ck5liXDpax6DetpTLvN7O2DVNID7TSZqz8RY82 -arReba/C+SimixHVIQU48RvkHCFGY7M2KZk6579/uLeIOZ3USNPQeqvt9eYkAhqM -00bAAkL2JdcEca8/MX+HxOElQRhAHGHOmz4taQD171hVxFxMEWTRKbvGI+rJ81E1 -cOJyZp1/AUkQXzDHrYRSoRwVcld0rw1ojHGLm5COJe5aDMMUiPYdXC0h4GxmvXGa -pszujanXmodNObYGe2PPa8khH2+xBqYN87VXL81SceJoqt0wuTB1YgPtUSjFstXH -aUAPZB6Om3SxX+8s7DkNK8T6TDkGYiDpLec5jRmWNORnNk+saG8nSM6LF7iPNwM0 -co2Z0EN/yKkpb38rqAgKDhp+b0EDT3ORDf5z/SomJwOsUkMuWYkCHAQTAQoABgUC -U2U26QAKCRDAyu28Ms0urGnkEACG4xE795Pf05E4AvUke+3fHymjxycM3r+sg6xD -hCdWrscsN+xcfl+vCmqEnR7RImHdtdHhpqJoVYQgFKK6JzHnTcJJUkFrw6e8eWze -q8PyFcKv8BPLk3u1+euRWrdpiVO31qGA8gv8zrlP0sTwNbyzpN3l/WVJ2Qf+jpgI -hOn3k7tcVvsh02YbvP8BZI6rxSwWV5mkeUfNMgKXhlRh1EHdbE+Tob3FphdPfuyd -KDvoCsrHy4B+mrXg/buzZnGvn0M73zsUmHTIFopWx7LAx+5Zz/AX4qGUZj90mNrs -24kJL/SoWBPmvmokGTm06ERjhvuSXxiuC3uBKxXdVSvCEAkdKmbUM/CSt7Dg4lcy -fbGFY56iXIE2Q52H7HDNmCXcFOoYbhTBAV/rzdKqV9XCm0nUpyVpz/NP88hVkzVd -9MbFzY2GIQMHVbDOS/7UdS7oIsZ2f4ogphM7oYCjRPVqnRMY9QvJrbOzLJetTX9l -AW0qYRcXwNUseZH/uMIVp8BjAUXV5GNWRaKQxsgO7ZQGGDJ0+RxjIjT3cCWwBsHz -oyO//uzubMUCQV9kkrcCpLmKQrHoSenDMXKVbnma7t9c2NeV6dsByVaVO6rmNFKE -GqJ4Tl7j5sGK19a/tn0dVS0JmRuj2S3a+VIDr4bgATaZ5cfr/D4kXWs3E+XtBluJ -v7qwb4kCIQQRAQoADAUCU5WvRgWDB4YfgAAKCRBrc4K+QY9jMDeDD/jwpcYoe/97 -Vns9IWTN1q2nXZXf84SdMRKjbPZfD+16I3+7/tuPv07nKIrbmrvym9KmhGb/UwSL -LQVua7AV5BsHPE3/nYb9GumxqzrDuRugsuLzoScVZPfed+1rKf1x+5AGv0nmoo8v -G3wf7E4s2no5CdPfs1ro+Yw0k3XERjtGyKSM7tkPiVFJMVh6fmC9N49inWDqAIgi -m4y0Akhg5+ydhwkRIlXH3Tdl7ll6bQTNqnC0yLD6NRwCASHhgnNZFq87Hss5Q9uG -WF5Vg+GVomN9tDkqcvwlZoSNSc/t2M29hlHwyGnS7zrCK6akZPbARdE1AxzTH8Tz -G/ufikplYCdLt9RE5RQSbmESV3PQkxmRkr+5axAsE52Yp1VTjrEBeuC7VFcBGWrJ -p+bhDaG4OEujyBst1k3uPPHtDlxKFpHDP/n58X9mcqlxV3UTbitINV2kz64tjgxn -EATT9i2+z/FIi5GcjNrVS/PqoctGKQwNNZhiJ8pzEYieXKsfamsJ0OJd6WmNFgQI -bFbZXeNT3ZyuJQt5yU2JqaeF7ZtCGnLqcxat8xdz0rpVEARmm+LfVkY00vJtHJdQ -9utV4vXS0otvee5hV/TGBAlrcY3WWLdZjg8F600rcQDVuKZbsWY/zFx93Om1f31C -xZASIsirj4JTr2T2SRueclQQXkQqVFqFiQIiBBABAgAMBQJRE97WBYMHhh+AAAoJ -ELRzT4w+KloJoyEP/13MqNWwkRF51KPGxR49leJb3zKG43kXpYh9SR2AvAIEHdsF -YYm11r072iGNWvvARxPbABp4wKabs9w1EwNjz6sLk4T1dlLz0CvfF2HYgGUOaevI -CejK+2fMJwziYpv+6md3i6N/DZ7VMPDjbhDt9Qk0jmsuMGHTBtYV4QcLBV7tQkMK -7zUZ9/e9tCWAyGOgcbWqgHQdPFiMwOUgRkqTAyUYyu07U4GY8LS18VXFN6GkUTZe -nJDBlp/fIpoBQ567vwpHAtOJhEBDqepqK6w6b7bH64YexxfnYP3LZMveXX+CSy7S -EMMwVxQtEh3TXgs3C5mHbBNI3hYy/rc95uhxHhZecBWUsSB8qmDXQlCP5qNi2T6O -ZvmK/jx2VlCe7PKOCzA3hH78QXCP8sokIwR0yJcZt9gv/GRysqn1F7gNLUXZy0SA -Kgr0mXL0bSZV/r5jFo2mfLAAGf5o+xNgLTcBRUaN79pNlVLO4cElU8OiZiVsV9MT -57uqb/o1jpqEmaTs+Uh1xuyx69P5tKhsz2qibw2MCHHU/yBC4UMA+O4ikcJGyRop -wm9KPn5AOha/wgRGj4YOaysbdo9RyxCl+gcRBZcmJV4OEcY2klUBq81rWj2QeJ0I -9bAKq1q8AEE4gL2lD8/GlLI6fr7o2s72WXJu5TPH+xFQBWH+V8sGEO96Mt54iQIi -BBABAgAMBQJRqqvJBYMHhh+AAAoJEOv/JQuLnk5/YcUQAM3toPdf7O3BUT2HCjA6 -uo1uwvHid3aKwzVQyXBm6DkMyJC8LA40OC/dJ9KN4suUPVsmg57+3ggIEGfmCYiq -EH6u2WydnZQpXcgLhK0GtpHj/pJVPneiKbcx2bUVyMiVjI9ttD/dpZgrNAPSv5Df -h+KM1rqXSfykdBfaIdnePSYpJTQ9+s8fc6axeuhatctcFWMu9AVz/3YJlVPGBq/h -E5YT1L0g19HWuTyp4EJgbRY+4Q+62xtQg49KxJd+MqktguJwEQVyHc4FX1QxFtQf -RatNKrFHNzOe1HFEVM7OZwqzvnAYYWkY0tSAOZyzCMFYiqb+zP9bxxi7fK3FI4my -+Vs17k+06PhdPJdNg8NNtffgL2CTyOdlyWeG25L0SqYzezikjYyBBni70pet3s6N -GIv9M3VPUcs7KqV6epr/itzg+pOpJLlf6Wq1r9STGD79JUTCrTceoN3UiJUfqSSW -wZDILZ+V4ORFceSbkWf+GwUKNLcPqMA2R4MPmnNlZtVnDlKFduGOkbcF5+QIoWwH -V5iHAfLuMh8Ynu0ZrI9ElYODFp5l9GoD4Ote9gJc3mUSe/ErzIc+9zdKd1y0Y3Qk -8TXLqBgwMDMXWvvNfTWsjxhCx3aycv7ahhfOrBCZKkzDbNno+bAKwbkf6jdY36bK -xGcRphwsLioTq3SmDlB1m2INiQIiBBABCgAMBQJRyTEdBYMHhh+AAAoJEHrt5Knm -oUZRdgEP/joIFKifMnvo3iZAgcjGOU1COkN0iovgdYWRN753EH5utH7FdNkHj/sg -DCRnUJY5KpcMiTdo7POXEGn3CG6mt+reP2CcaBO6QHY6lLVzQeq+JKMcusT7QNq3 -dXpbMACXhzf45vaAHE2Y523wDdb2lhlwotb0nhmExvU0YRnhOZNUFfoyLHGR07AN -Z1uog0TKrqq1UlYtk/uLIA8Bg/1ctDPLz3JQWiBexXOd2io3pUM17XLqW6rxcCUJ -MIQmLZ31untfyhiocmJT6peLQsO8+Dcl3f0qHy0qjyOjFGeXG6BoVju+JCgdOsfo -DEi542Xj2AAJtM+eRiAIqN/q7sthjmNtafWH7u6DYAcaMtLRzqQkXvBrFxRQUGxA -WdMjolnq7JVDXCs11yis0m3qjPYs9FBjh8pNsn80ncpYbCwqA2rzeDBOjaXhQCed -apZn1ySwEZKh0p9LMcDhY6eHjZBWia/roxFRe4G9shPXsrjffdW9EAM73mShgW6Z -Y2RpPH1cfEkDJ5MOQMVZAUidsnTC76ZB5KW5K1EvNHF0gF3YVehpxLsS7exTSGa0 -hFEhz22qSv908NMunPuvLHRAnZpD+EKQI1Q5O9UqQb0ZcV5DCVlbEWFbsTjSyn2p -5Ajb5hQG0Xxs2xkon1jjWWCqsipa5tT6UUS1392Mye91JgIjthxgiQIiBBABCgAM -BQJSY73EBYMHhh+AAAoJEJozpoIuMuRSdsoP/3oSfNDmQOnLp6Z8MO9pZB/545sg -ABrbLVI5s9ak945ZS1dc7wkRcBcLJQIFC31CCzLqZjsW3Odqkru0Pscao4LXrc0R -MRlS3WoMUh5wnZ2CkrBdNyt7UTjGDqUZYdKOUWMw4pOA38sD5pPqdb7xCrMuW5BJ -pX/JLlzr0a0dOEh1qVtyHDx5GUQf+MofMiGbRTAjMRQLCA47Uy12icLuID41t1cZ -0FCAp2sI7nyST6jASzRV/k/Q+7ysunP+vEBGs8QRvMkTtI8frR7Wo+l/AbpZXaWX -kAhGi4hqaOC0q8DuVToxdUPaNko67cNmoh5Fnk6oqNPZ6mNFtgehINkknxGwiKnk -lawRX/W4rjHm5ZGzExtivtFavNPPsvFsSIQI9XgbQsiUfOXIVqJfZZ/9JvBBkmNN -2MnTF85y76J6R7yjjIYWGix9h4BkhW2SYQzV6TrF425kM1TruvPtbPiWYBeGB9Dv -ZSKtbrW8aDsAzVyvSmLUK5G7+aJ9h8r3/YinSIl1rzrEsw+cBNb6a9B43gbGkMV6 -7TEUtbMyQTUAg/MOD06q1R2KUeJZvtCXNCdEmq0p5CSHRmxcHwOX6toqnT72Qz/J -0/3VRishWkBhkNKMY1yu6r+3je+H9ayow7cclYjQyTn46UCC5c7vzYWkfSzgl5lm -qj2s1r6TrOwvw/c5iQIiBBABCgAMBQJTKTSBBYMHhh+AAAoJECzWFRwWJRGtesAQ -ALewPJ+kETQ9hID7UfJkMUEeQu1vNrFwv4x6vKNYCdlWqh4PEjoziLs0iJugBVJA -4oVudn9Hscc1RLE+qmrzcOS0g/7NaDseY1Gm+JX/T/DRUj9OMKtyfXZWciGQN1z/ -2U3ukeIM+ryFrrE6862HVNJKdr6qMQiL4reIG/OeLCCtvA7QS0+BLiRNvCF/02p5 -FCqlH09AU2JhtQVxGVisPuTfjbyGtBpYaX32kg8D8n7QdQ/gMsi8Mtzpoykm+kGR -jZa9RjEwToF9hapssZbO1P/UkKSOYWbh3Otintxja6EQlxbXkEVQzPrNg4v72g8L -l/qtEZ62S8MovanRrVUKFKlwM6LwYBCZQ9Ry+dakFTLJRu6/Xv6Zdy9sM1paTNuf -vmbonjLFo9gbhbv2pUdcyHRdCyjTnCBltftE8qlLV4zjtlztzHeBOHhvy6uTI/Xh -QbFh/SYQlgL/nlcof8NHUCKZvToL2os/u/r8hLlnDncWJ+8UWunMGLp66CIueU2r -d9iu9IC0DaYwTZOAkwWb6z17rKnWT0jcn5do/hgv7OiCzj76b67Wyqr7cGqAC0QW -b1i9pua+W3lMpxmafJccsr3Zocvf2/8GRgVzIjqyrPFsueTqNRDYsALpzbc9ZGgm -lVnnJcgPNg7UpvSCB6dC0B2oofEMEczRwDtiOnVXgiOgiQIiBBABCgAMBQJTkITb -BYMHhh+AAAoJEDaTNM5Q7YcSsCcQALvWBIdrimKX3qT/NbSvqTOkil7mxktAIOoE -67zrWbenPCvoWw2rbi59YbQncUs69Uo0XsmhByDdfNfq/rMsEJdMhTl4pJHPs+2V -IldYWH5XbO/SFMlTku42pJ5ZBkzT/cpEdw6yf5iKLnhrXtccnXzGODhfGvBI6+J6 -yF2kYIRwAVfVcbmcKrcIRvxhM4WI+vBS8X4WEzsC7DQmpPwkriq1YUzHKZz3j0k0 -9uXIhs/12h0y9YMsbMhm2aEbGRngJybLtwiWHINbRJGe+32sage7bSOgks2RA9Mz -UYJCIS1CzFYJper1EPyu2MSbQWjAGQ4qHWMbqqXze3pV26WE+GdJdNc9yBaLAKNv -/ivoNo9ktxFEK3nq3ABz8WRdz3qKtsfRBVOVvopxemqD7HDRDkcs+zMtGdMMBkEh -u/R0FjpeFQ2VT1RCpi/xnIcvqw4yhdTRLG0rhNqXNWVbHHKLWEhxG+w1YG20OBrH -bFJ7opcGw7x24FOHW7GMvM4pOihVt+ku94l/2lUUgnH0brlcDByhS2pxvoJ2KtYc -G0fgyQgr+fllkUlHDYTtxat/toW7QwedGnZTJiR44iHcBoQ2B8PVN6AQ8TNQfjo3 -PwPYaT8/p1XOqYXC1gXoaYO3VJ2JCUt+L5btXWIJhkrZVfa09dXEhEeqttE0iMQP -gng5OxNXiQIiBBABCgAMBQJT/RKjBYMHhh+AAAoJEHm0AQLeK1Al5TwQAJruzcUV -KOYgeDudmB4EDed7Gd5zO16qjt6h31Ydd6XuW4vSdDuUFkuqvqA6yhSxepryVW9O -WRxy5ZtFHitMoqdyz4GnCEfd3yyVB8rAXb017SL71PjUr+jdWxM/+mhpPmLSldBu -SW1lZv+Qw3LXlNHyATWyfvJZcNdXacdXsZWr3qtNfPgJWsi5X2AyIbf6oJS+lt8L -+SIXpUZEls2HKTOIpkyx/IOqmKW6uxNtkmHsTJ8nDlwjR1UxOczNTR6f0r2PKCmO -WIrIE0AXT7gd4791YdF+w7ZqYifC/WzVsWg+PJVGuAB3a9s9Ov3QCPhPQ0Z/wi59 -LzppYnBAwP5lt5v1LkO54vqn24HxUVtbOAhQhE4EICQRlPCreT2BTqS8ypcgXb/8 -qOJYKnaavShHUBbrfeK/cz27YLZRuaL+azpiZYm6m5fGEKe/Ecsldv5NFc5L1kBb -bfjeuEH+b2lNGS60kzEWq5gmVW2KH2/ZFOLDZDk9RMeGIOCfila+zXj4gG5DBoAo -z44O9vlMERcRSQgsx438kfm7laKPHq/3KiTebZ37dFJ/yshy9mNg8wF+kun0q0bi -5KKodm/x6mGDSmsGPEyeDW0kYAIkbCTQTgHDmW24rx7nvl7z/n75bcQqFjVOfEaV -Pf8CvUTra7nifYOYW7PMgGcNT17GXc4UkvEfiQIiBBABCgAMBQJUDt8nBYMHhh+A -AAoJEIj0WE2CYEilp+4QAIxMBKj8A2oV8c/I97DaZ9aiq5QpyunqWK3rW8rG6EYM -gWwx8hrk+f/5h7osSTMYrUw8vSP/RGqc0jKxWmV3zuOakvz4EjJ0NFL0rONjpNc9 -X6P9nEc/V0jJzPGsrrQWfUQzyyGVKr9IGtWZajZxVRru+BwGZibiDDniNucV8xfE -BJquEjNz1SWBzHFUuPExHiq4oG95+nXOQgSWizsar9ePaheMdfugY00Lpdx8ZQJK -l6rxsfr8+fcCmUKcSY1VwfLivSmfacC9GblqPtgJ70PuUlB5WE/gViOUh0WOeoBr -EiqlWKelyWHxTjmkZpEisMD06hTPPYYO0+wIejOmIJyh0AlUjEd/7dvalKgHe2No -W5HKrApMKifmCr6o00U0+pVH6GIexlNdEtFfPSwtHl3OlvhCMcbi+fhJX9CUmS7E -LKqrwCH2MfRMN1PKgqeTTEdall9BZcmWcB73IadXT32f8/CFEj2QI9ot9N1+C0D8 -4V8NomCe8wmgVSCSK3srnm2ttACNKIs3Udxe/G+bPulVeszKdBEZe9d2puDmRbTW -3CPR5lV5cbmKIvvbtsn4vdvfodrBTnF17MWbVAoPXvSp/CccHRhaQx6cvQgiwuXT -KLiNgmQwLCINTDwt4DtH3O99jOl6XEv6c721zK0ZeroaJIq1AFUybRMR3ho2wjdu -iQIiBBEBAgAMBQJRcCp1BYMHhh+AAAoJEJt1BuNybCC94JEP/RhWhKCsWRpg6Gdn -PqQMrdc8OFXk6YFrI16pnN5cRpyWeOjP5TxwDv1THNITESwYdeDXCxaTwoUrhyal -pu+3qBsvF3qMAoX6ZEug0MNDTGSF3EUhxwnHChzQX/H+86Y27YmDLV6+V84zqnfO -1+WJl6QBUd8QegQfxiETszlRnujl//2G1gtt8YzEgbELct/lD7x12a1hpDC/7wnu -v3ql5lcdqkZnqnqr8N4YsA5HyPnjXXwxhGbgdva8badZNhQmzZEqroY4p6PgUeth -0YiN0Vs6rvZbBu6DuDMSAx8rWRoBtqtt1P3vmLJO+0GKUWrRsVaAodgGLCbjCljt -HckvL6RUPyK4UkZdmBo6sBXz6K7wUH581vxAgaFBORBYIB7+4uU51/PHdeB9lQMF -wO9V2efMz4SHWgssrEwVpSpJnOJG7iyWx+oNRLCeQo/Y+MJvGOOdyJVk9dY67Vpf -OMxQ2q/oUfmgLNlkZcMhckp84ctUml7JPKSrEQEGH+ij2p8fr7XVsbX5BtyaUvfc -J2pF+NF2/Rj7Qx24K2ErsR2VRvaMA6CGv52W4INhfs80eEs9/RD43PFXtX4pCGPk -B1LqL31Sa+2HLYvfrCicKKHA0HzC4/4M0ArV57Rzn1yoIwsr510/LIIRZ2RPvmpK -qsCmdIqa09KjKa8vwXHGE+XAhCmYiQIiBBEBCgAMBQJSo1MNBYMHhh+AAAoJEL3I -IfZuz8B4u6YQALP9B5Wydy87y89u2NqsFpDBlU8PpQWQBZ3acmXU6Rd4y9ozQy1X -qGwpNPvs89UUidJPA+z9R/HctIByBajAhY73QW+OLt/uUGlFrCHfv7Gw5TwzvocF -0IE9J9TCpOE2XYLV6LKH9dFvmD413Ic0+Od05WubTG5wBUqtWnaYRmBygasual4o -8m0jZcVzBVDbR59J5cQUDrniuO1mZXeaDyBWm4SMyhyo5LIyAbwgxWhsl17pvh07 -zt67YwbWXVtxCXvRlsJ6kkYws9bSYN8H01/6rNSD7/nvr9Yr2w58xurzsGIFlY6N -gFosssJbNTjHmDENwxsO+bB0Hg6HuKsS586pYl0SpVa5r8JZ6vQvs8v1Fg5kZ64G -EQ1/QdcIZURw66JoY+pi6I2+yzuuRPeb1Yj0pgA5mOIbYzcBFlt2KtPu84oduIYe -QWcJ4CDt4f3+19rkwPY2uO6ZlBm52H032Tubd0llt8biBEihl60qUtZOhMw0anoa -dq2OYiepT+2K0qvxvdyYkxlAdwEEdQPoEURKZ581KR3c2s6UiCX4beNB2+g1j+2J -TGYCHgBJz+w/uyMeT4CBi2nC0JeifPNyZx7/AvhA7ice2POzGO6Fr0fEy8AsSexw -THyyJUF6l8szRsInvP4tBAKsZFxR3q38zqDGyEs1Exu7c7utt3nR3KyuiQIiBBEB -CgAMBQJT4r1uBYMCYRUAAAoJEOj9iB8+PIAUgvkP/2XuAHQDRM2+y78S9e0494YW -tZo9SwMESKwx0TXOfxGQCmNzOi9UZIMF9ZAk2/MfJjE5evrHSb1XbivPVEqPQUGa -OwrDapCDGvpky+r8xtWrtFvm4olH9sFpdzHJbz3GADjoSeL9sGOPOcZPb8nTE/M0 -3bqncOOaJDuouoF+YOrE7+Ky355JSCL1fDgyEeMzKuQzX+NWitMmWjZVEZfAExmI -NgD2HGMwUuJzegFjiJPACGqBvfgXVib4QX+FculWa/GqlzSyrlAI58jiJgQ0Ki0N -PhXymPq9pywAEvZVuGDFM2kDX9tbpenWdVLLjwWQFPltPEnw/ElzKXOhxmkyY8ek -RlB4Tdm89HOVqCc6psvDbgelY2pbhjaqn9yjVUKlHldwPArb5GjkVvRrQJwU5DwB -J8D2Dhgj43h0ZWEd492shrK8wp+9zbXTmlmB+y4TOZkNhAUjZMpkkym22Q3Uhp5n -tVrBBlgQ5ffwzPP3oK9PWoehbCqBrPrxNHUlzbunv1+KxZ7Rf0/tS39HHvlCEjIa -6SjLoOebNSx8hLb6RXO64EWdhUZQxrd8RMYWYzompIYqpEYOnsJKLzZHlkLQ86Hr -KpyDM4U7SdtkAxm2pFU+2ddALWHMdhkrWpzoUKXe8dDI3pHjG9tkvUtVTVaU6z1N -/A8kQc1tjyrBr2gzEW+8iQIiBBIBAgAMBQJNcLZVBYMIYm0eAAoJEGT3KqQ0niMD -gzYP/3GjG5xyhGNMfORN/BevdOOgeOAtRAvRQdOwe+g+/BdOdNA9NuguBQCCxA// -//////////////////////////////////////////////////////////////// -//////////////////////////////////////////////////////////////// -//////////////////////////////////////////////////////////////// -//////////////////////////////////////////////////////////////// -//////////////////////////////////////////////////////////////// -//////////////////////////////////////////////////////////////// -//////////////////////////////////////////////////////////////// -//////////////////////////////////////////////////////////////// -//////////////////////////////////////////////////////////////// -////////////////////////////////////////////////iQIiBBIBCgAMBQJR -5b0OBYMHhh+AAAoJEFq7v/H8EB6flTMP/jdcGryqXq+OheD3vVFoTcsseobh8xn9 -XEzPm0JkWC0AGyAjIhiuRevZ+fhfXx+9uvisYFQqVlX1jUQtZ7l+ZY3n6b4WjLCB -ItHOMGenxFdHG6+zqKr+pdtBhHPI+df1Vol0SOt5keeWpVChYiiXbzs8O0+78pce -iSvmxzXEGHzbpMoRTDjFuBxSWJgVjanpatfz9qD6n/NmzNhs3e6SgzWNqia0+VPy -K/FqwNSzw+dZZlToOGQ1PTat5mFKED5bAXPepleQ/b8ZN8Qjq2JxzbQeOKjaizC3 -cZISi3H5ddFsz5e2qoaJQ/RqCmGypt5+xAGw68z/Mb1zeDEAhRzGnPluHE0/rXpq -USJa88WqxpEYuPqBF09A8H0GATVUq/W5pNbCx/ssiM0zpY3kdtKocOMc6yx/2LuH -onTJp4Adnbrji7agRW0Aoc7KPldS4xYgS4sE7Kz+cYVrXSTZm81AMne7wjtcs+io -Y0nDJyzz3bG75/+caNZeAF99B5Ru1vyi/wFrMc8v8u0ToFrd52rrLMg3+JGN/vDw -Issvl9PM2IQoabm9RiOpm2I2Ja+Fc+PX90t8vI7xJ1ZsSD5BKQolV2mRCl8OGJjl -ileZpt4CbU5E2D1yhHg7Hfuf8bXTGeoD6+M2NkIBQ6KjdDPqvYCecLAYCG+2nYMk -dr1dT9iKgw69iQIiBBIBCgAMBQJSCg8ABYMB4TOAAAoJEP6Py3eAKIuQJuIP/1O0 -rAzcr6NOCbBeujsM1kX3MFmaYtFEGXG60MNFf0/VdSbCHISQbzxp+9PjcmmJx7w5 -aX96zAAzDnX8XarPxwZzDD/S0FW1s6msYlle6UljK6NWSBjM12zccaSSQasPvlII -LjqUoJNcxatPLBhL/xDZ0hQmYMk+7jVP7nCaj8llzXwoG+zBUErLXD6Rcy7y2EYC -aInJVij/56EWfwzclZE96xcQfM87PjUQ3ki6uc6AKG0wDgiZzEUmblNYpmZao2Mp -U4IHh+U0yY47IOrkrt9C3EnZQ2mY3y+m5irLbUlV7fWVsFren4UcYVW/biRZNO+S -yFA+x8BHbZvgDygGi2wIQxdjNLEFDKjUkiLP9Y1zyBD66cdxMJ6f/y7W/nDh0FJP -m1IVdUyvfCc8p0ktbHULyaGyll3SCeH9JXIz7ZiWHKO+TvPXf+WbO4lor16Mz4r0 -wOUGGbIv6d35/kNv2rTseIHuT7FAPWsN2toN9tIyOajyHzcCnnzn73ewM8GFB0dD -F65rtk1xWPfOhHd7P3Fgzyr0t4zvFXs0TlcGubNG+ItRttcf6bAGCoXXvPzqFgeI -pbC3rIld0OIbQ0BVY7Kj4ZWjO5mDxfTWPrAbwkjMha1B94MYiVZq+zO6xWklVvgf -VnjapLCTf0M3fSx5gBHYzZBZppAJoh0wnHSu4HLaiQIiBBIBCgAMBQJS2XLnBYMH -hh+AAAoJEB0aKKM0I5xpHhIQAIPjUtYqvKTHN3vqxxjzU3YQ45p9BAcbjR6Zo3/u -JIDyVhBsE2P8MuuPzRNgWOUcTgc8rYmaC5FmmlydRWPCtZOB0eftEjh58KnXywb0 -Wyr55KVgDxmWZVt4fflIJcFSfJgyftsEeNLjDxkhYHe620FAK/VULTLquipiNYuk -wkMuTMJsKhD7TfxyEbt2EWoMSSwcYVVpBEZnSsUeW4sbJxNIYADpeGja66vXwKOs -iQ79gRNYRXdVIhEgwVULcyHgOmCY/dgIiWTnoftb1Ps7YwuzJJ6BTArk33NHslJe -fPIORIP79ApslzpMEQ/kAEMVIc/+ZVoc8NflCgKqdlT3V/zNTrNn23TAS1mukGcc -Kf/Sp6lF38O2vTy0YURkHJ4pQyEk6sDyS+0wjrESnZGZGteXTk/hGWYdmdmnBSVX -DbxKHHnJnOUnAItWPvuUoHPHE7ZqbJIJ/SUuQQwyhEzErIVOjhviXE9aswK7hLxN -oajK9fjPB+6u9fXIkoWTTrkTTPxW8ddL4Ldpq7e+MuLN5PuJo+Y8aLOI0/+8Ujp4 -+GVxxe9t1kfGqD+wZhNZIgBM9dQLgpkQSq/31Ei2/qScE8Qi9xPmYgLbHT3TpBkI -9+GbYmKNdqZ7ezfHg0ACm7STgbW2ZSTVX2FRDi/J4l0Oc6di+nNKkAWaH1gPTUm0 -8IqoiQIiBBMBAgAMBQJNBJQ8BYMIzo83AAoJENqHDBNGqVewTJsQALe+NvsBS6q3 -gXa6vKpHHyF3GvvWNhoMRo1Vm18JEooRjTHzkTfwXr3TjoHjgLUQL0UHTsHvoPvw -XTnTQPTboLgUAgsQPv////////////////////////////////////////////// -//////////////////////////////////////////////////////////////// -//////////////////////////////////////////////////////////////// -//////////////////////////////////////////////////////////////// -//////////////////////////////////////////////////////////////// -//////////////////////////////////////////////////////////////// -//////////////////////////////////////////////////////////////// -//////////////////////////////////////////////////////////////// -//////////////////////////////////////////////////////////////// -////////////////////////////////iQIiBBMBAgAMBQJRCuQRBYMHhh+AAAoJ -EI4dHFk2fSR0APIQAIi3RhTqVYJViejdo+e+eVXlqbiO+hqsrRyoNfgxuVSZp/eE -mm3WV3KXI62KTy309a2lNUWRaYsMNZAtboDMJIj/Tu60SaUUL7XgyxZYBpzlsagq -vYzcxOGgvUHeiNdJAUU55v2BU8tSazkAojTzm+3bq+4IQX1QmF9qCpmde5JQHvWL -FMwQEEPVvLS4hX13P4MVUkojH0nm+eRK/J55N5SPJEqUSUujLDAMUFSFH0OSwvq5 -zzvcIqO/fwEEcfQd5vPM90NQLYBgIk87S64Ln2LRF2Dgvo88M5oQdP9cyH+9GL0q -Npa6Jzg8wDIimn7I9k7DpgJ2WAoTD+x9CQ1H3rwDyhbRyxjr7YgEUZkg2PS617a2 -iQzdptZGBHkkVVoxyuG55yR0Nj28PQqnlTHJTwq+PrvRi40HS+7fPlncDCMriEfB -G9S1Mqo8XwWLbO8Bp/2UvmUt/xPXmh1O7q+oej9UaydpU7ScxaiS8DO6IyjBoYpa -JWbxlNLL7xp4dUibE4IdkfyD1lNB+vvp9XWgIZb66ceeNR1CyGJFdGR1f0k93ynv -WNrF+fT/fFClVeUOgFuUZyMFm8asicoai/l9PFlM6ncwZSpBFyBywx1I7dMeqFF5 -BmpdKyxtRHhvLTkpkhcLX8EY3WB/oZkRb1Fc+R7ZNiOvOQu6+R4DCrN24c7eiQIi -BBMBAgAMBQJRNMjoBYMHhh+AAAoJEItDwODwovhb8ZcP/2N4C8owbZAr7E6t5nIl -2QHUzDNAnUwiBVjQX9mpfkbZ1LjZH4HKHJHLhreXCapqEqGfllEkFXnI77wlK1Vk -QoK8kwdFt5wATdcYY/6brQ2oJ74Xd08yGf3sLifpTfx19RndZb+gKaWc67v3HCk3 -Ux9ViI/oc4hPK6utx1CqTAvwkQWLU+crFYjbGMObSlbjUr9UgwknQ2qTVqUv4aAz -d9vVCLiCXJuy5pY4MJJj6NTPKqIv+JKUmkFVqysKs6oeoQSQ7I1JcyhKdaiQ/dEp -YisLMnNussnsB7W8aSjsIQtZvUrpA3TE89BqxUdEpoF6i+A2CbaU8e8WDcfgIIPR -TnElr9Ux2rG4QzePyOXSAmbTaxkiGioIp8piRN+gcmJ5P7mrDABAlL64jtTJQpOE -rGllhri8LqTpYcUXeGCcWKoF4YN/KSxAXHmMpAIZnesh05cMBnv3mGZaXycc6Gh+ -a1W5ROSGqEiDi+TyCqizYeYAz5tPTXA4SLgJi094CEVUL0NHTIl8Dt3p6KLPtuBG -IcZAUgBH5SbYqk3fm8lcy0F36chBq1Id38WQnmMf9MpxwPTu6NzztqFaAe3xSIPq -QtRGTxTdS3wMLuhCrgyp4/k0IQEBZO+WF5P+13R23dKT4CeJ0T/pvoIUzkK7Jjrt -DwINRiwNkJDGSr05EtqdJetwiQIiBBMBAgAMBQJRmAZZBYMHhh+AAAoJENqhmFPU -9KLsQBgP/AsBd6jCZUIf+WFH14mFdJ+NTgTuS5yVc2LbC1sZXxp17myaAhIypq5a -tSsbusJ1f6gugvRdacrnhyze2+i4+PNjJBg0lSJlTD1eN/iGm2lj5vY34HaRK45Q -u218IrO4plY7HLPdLhZcPTzvEA9MjmYTwlqoK8lFkxq6bYahH30YJf2WrNGqap6+ -/qq+dlR1J0k0XlspE0i5O8EVC8F7xCsag7ucTnmS6I59ejlybXbQKt899x9hY2YQ -J5LNqJ6Pb5puAqOgxCaGhOPq0GSM3CqEvbPnYTaeOuirTiAIPO64K7VqsANcVyLv -OEVU7onhrbJvG+zZhhBPiTWpGOEXSScrE8xgzJZV+JKHGjc4SonidKsC4x7Mo2wB -fAqgF03a1Gc+9sqw/CGDdh7Z4fa5MVRZpCa+gmgPwhymmbrQi/YebzMTx1GRIpmw -QFon/Xb1zWZvvR5GdjhKHMs8nr/ytqwE4T6glklft9ycbO5U6QgHzBHqMEhQYcMD -zj2jPYlCUm1u1msVGxkWmWfn6O3J8rBrtChOji8S86rWZIEi06XS4LXtraHW/cq1 -jthIgy7+QCwLKVBYs1q/wZUoxKrz0dUbNdLxuXwQ7OKIclyO5lf2AFSG0DgBgn51 -kLnoK5iTa0gdip/LlImJpMNkJ5LnYj6KYtT74qhEc7vG1ddBALbmiQIiBBMBCgAM -BQJSQI3IBYMHhh+AAAoJEGPr6F8kP5hSuuoP/i0+rkIiiwfjLVwTYVwLYWlPJRpU -0Q6Y8B2ka0UsxpaEAFlOuhBfQytef17EaTAhe0S9G41sGdxuUmkImpZgN5nDcDX0 -5f5NK0rlyD2mPu3HJdpG21b2qStbAyJ0s8CI/6gjd7vZvBVCIrK9t+JgmHlf6en9 -mZjrECkPBDWQNmjm1ZfwVx9/Mlzxo5mkHOIo1xb6FEfnngPlGLDml5noXixWxx0Q -MWqSf5p4WrGcoNiB4+Uxyx8f7N9oIEBQ3QPsMidwnHkLaxNkjl7hrY93iqkl1p6x -k86POYCklYWdS/7oJy0fWXieHLC9S5e7DxJxW14Xe856FtFulkdj/TE/aq5OmTU3 -HV/DfDDRKZVdRUiUSNG0d0Ufe6alXFUlAIMg5KYRlul7I2Ms3CxkPySbNdPjUjcR -VhRpPLaVZ+7tXonf+UIN2kVYzbB/8a5DIPF+zJ2JONyjAsmKpBOtxYFEZ0wkcbAM -JWX+5i1f0ebw7p7Snr6KdaU0QMJE/1bcMBgGXnfw5FKLXMacZz+QQypaUThcOJie -yydRupgfyyMEg32kB+0VVsAVVz8eJz/PARte7DZ3z68/8J57c6BdGna7ELiaWJVm -gCWGdnKDN7iZ3AusgC55xZ13jmMc8wv+07LOjUT7rYPl1u7fmQnbB5WWLCILpnfx -gVVLw7GJ004PJc8kiQIiBBMBCgAMBQJSXbQDBYMDdfAAAAoJEBXzUPn7p+OACjMP -/RnYMU5sYJGQHfYNGRBYU3g/uopFjg5/emqt63eBHj7uiyjWBGTB2ZI78rt3tWB/ -LoQiTYRnL7kVx5LHS00/cuhJAD3IlED3h4OVzBLwooWJNtX+8dMiIpTKD42FpXbb -pb1E2Bm1cX21tW4QzMEuy14ldti4VewA4+zoNEPSvO90FxNZ6MVTO/6w0a54QJon -73Pkk7IUQ0X7M7iy2DYwIRHF8ej0UtIeinllPKJEDGXCmUoQ4frd+SzbEu0Uadk+ -Q/JhoQM9xDlDqFTxBf1xk44+lmdqP517pkBvg0rvnEPwU/FCvhlHzHaicDUnGhRr -/f5ZtvVxQTetQ7XkSql1A+XBeGVbEDUPOYQ2GnW8su65i/6t0l0P2xIBl1aFkdyh -X8rsfkB9bKb2viHvTaYmv/G9P2VTgWW2HJvEgfYE2lkoJrxx75OPdR8s7I5SlUuO -p+kwlVq8wPyJqHs33hLWb6AwyWWLaM0snxLK1v2F4Vk8kk0nukYfCW+/4Cq523Fi -zfuSXFrvx3nIRcUCtCWsLMmOOf9whAzOkAUlemjUo9rIi1K5veVT2W81QTDfK8er -9Xuj3ICKo9EgApw1dlHgtz+2lcFCZXSYLW5EG42W6T+Y4xE9pN8pHSAEh7AfPPbR -PO6U+pWCK9f+gJCHI4AmwdBh851fAW93TC7zAvKYt5tfiQIiBBMBCgAMBQJTEIcq -BYMHhh+AAAoJEOrxL0q6+qG5XhUP/3BIiJKMSF/kU8lLJjlR0vXJUFj22FCyMiup -VCGJoej7CHMbXn0OAxSoKignag/RsI+7C5DfCo/GxGLZSG5b7YnfuKpqRQ9G7wbd -I6KR4+2wJBrGSoPDAZ0eiISywGSZYv5i8t61Pobp7GWa4QX0gtmvD2puIoFp+Q9n -9t7mPdxek2hv2owcC4cHuxFNhn9bNF00XVZ1WiAnMJOUGBTD5bUSTFYC+fBMpatc -57mtVgGTv5G33Nm9VMXdFKJRqcx+I9ur+Egv70/a5RDXPcSFf0ohgmppsF9mwaU8 -Ijz/U29JRrg1OVLPezybnceFeH5v+fVfIzhBZ8O4GGRjCA4Ct4TBOuWI+77V5bpJ -5OZyiN5ylrQifnjTQHqIQSdYjcKcckfaccsyeh6Jd+yTWbbURqAh06n8NYGZyQSG -qcpCckNLZo5xhpMiPNgz1wANGhfttry7t6Av5DrdHHsfKZWjx9NySCW4WN5uf4xc -BypYr1PuVxMJwBEmA+Y1zr0s1ktxDD0ngYBhuoj0tWArtqghgMCWp1tYFURQRyAH -kNE7OeciEfC5+T8MIJGlAE1N/UWa1ik3EKAms8Z9SE3rJ2ntRLaVOzlqcWGoy/f4 -jVkXnaS8cKwyxaebGyRbnFrVWd5fAis5a/PRUnqTZHe/kf/ws9GqAKVkch4K6J0E -6qlYCoBhiQIiBBMBCgAMBQJTZ5YwBYMHhh+AAAoJEKnR8PS0XNMLKq8QAJdlYmzC -/1MeLtf+O7KjIAelF8IuGaN0/2NCbMqrfndQxuPIBsrJBrypflpWH/bSY9fA1zdF -Nd+1KOHaHnwDT8hPC0ymudgDL63MJX3i38g2HVa9Uzrf7bXSvdNVLmG1j/aR8H2K -lAMh4DOJuJVO0e3rKqpBH7EcnYrc8/eynpfUvY8Je3kVrImhToYpmbYO2bx36zmI -g6E4q1QblEs8caHkprsg+sR+WUTfKRoTaqJQSPWDcTzAwssGTugFMPInKbCVIgBI -LJ+Hg5C8PnTXgY7qe1qYEXlsWg6gLjpzfXys2nw/trDZUbDfelaKnJgUSMyDDpQe -waEEYlkQlPg4qJqxqn5WpaBi+Y/dgiagnb615yrK1EdwOMUEdDO0ZzkNDeo4kk9x -hG16SwfKYXFXgUz4uDemMKRalI6ugtt0FfcqF78zxgcSDE1UNMlKsP2bTNUjYFg/ -18nrpJewaSWPUksqE3Z2nnp1Mao6vQ2bNjpDZcqaBojsvb9lkfhP9GBUSGvJOTs1 -upJxUy82y4tqId5FvRD4RGLYXOoK3k0zXwG0rSHt0YrTKXHrAsFdRR4yfFjGvNI2 -ZAQOyL/hUxmG5AdH6Y9i5y/4IK00TbEHypx7GRfubBGaKo+LH2ii3dARm0t+LGdM -kkXrmSLSmaXlBVaDRUhYqfuygz9dcVd0eq0dtE5HUEdUb29scyBQcm9qZWN0IFRl -YW0gKE9mZmljaWFsIE9wZW5QR1AgS2V5KSA8Z3BndG9vbHMtb3JnQGxpc3RzLmdw -Z3Rvb2xzLm9yZz6IgwQTEQgAKwIbAwUJCWYBgAYLCQgHAwIGFQgCCQoLBBYCAwEC -HgECF4AFAk002a8CGQEACgkQdtePBQDQJsRE6QD/UfEBF83bexmL2z7tKLViVKxU -KKiRdRsUpIDAZvhb6iwA/ifrad8tjuLWfV+Vj4WykuY/sFEihMZE02maoQPQFAcL -iQIiBBMBAgAMBQJNOhUpBYMImQ5KAAoJENqHDBNGqVewgYsQAIClfYv138Dgct7C -3DTGtp0YSvlMfKwGsTfAzGN5cEEXb/SNWxaqtOOktkT8lzrEfyor5fWPrM/qdCsd -6dYmdIwzdwayqpbaGMHn6Iw2oCCbQjSw4AY1fw30Q6nL+vz8hXnD/eZqg858R2Mh -xCuuwW70Q+TeLZ0QxYNjyn7MCG41yK3m/ovd00VDEDfiFZ9Max2K12iN59OQNOly -Bz7J5q0odZTstWP00TCxTXczmPmbhzX9WaOR/3P1khjncvKOkVg4gU7erxlNYxJt -zU3Xrp3S9MaQEByg30AOEEcvbuwHa/ENXkGVv24ArwIhlJTj55v7TZPveizYl21M -9gdDBSmryZJqdkbSHI6w2bkAqSshByA93JBXTq6E+4513tqiwX1RdFKgwtoDKmEv -yHbMLJY5+JKetWEIhaaosg/rYOEU8id/fIG+ZX3QN4gUlLTe1wQLckhfMGJ3VscR -AG7vTeKPufc1MGIiTm87090prvezECikjSJ6AQJwx7K57TuyLsTJUxHaUfItJVxl -Y9EG/WN6mxAuvI5cHYrClAK6iqDcw3yMwvI9QNRtReah6xBzqNlcKZ37BApAxj3b -ffUKhBeU56f4b46EBwInq1nnuAusRVW4UvXX5CKoNq4QRrf+yjI9kL9CCy+w4rY8 -mYVox9cS1lI2nPweqtH1s780TMIoiEwEExECAAwFAk1wLfUFgwhi9X4ACgkQ3RyQ -elD+nTJVrwCgy6Y6lwJjjRmhRO5mR6HQiWDNQEcAoLXz6xRmGdHRmqEQU1ReM5r4 -SUd+iEwEExECAAwFAk1wNIsFgwhi7ugACgkQKjggYk6OPIUCLQCfcVzDAkOr/I8I -uvKPWuafBvdnVPoAnAsbBKchElKWufn5ghHtd0OK0OEOiEYEEBECAAYFAk1wfXgA -CgkQNu3+0KV6jvoBvwCguOIJP86+RFhKmiOa59YGRdlcytcAnjPjKClRT1gX9CkV -4wdP5mZXRU08iEwEEhECAAwFAk1woQAFgwhignMACgkQ6sDC3HmRyHWG4QCfby/v -cWDMvaXzScQyHtgBUUn82qUAoI1u953HVUidpJosmKzIHf4xr/uIiEwEEhECAAwF -Ak1wocAFgwhigbMACgkQpuQ7zoNd4fXswwCgvRD0AUmZQw49f+9wqeCujKsYI3EA -oIeeMONWnm+NG8n542RXaES4EWs7iQIiBBIBAgAMBQJNcLZVBYMIYm0eAAoJEGT3 -KqQ0niMDcP8P/3UQta/lWFgza4xaeZHRrlcZErhkyZ400LCIvYLp+JRvyVr1xRNU -EbQISwTQSjGgCohoytoGQE0lHDmCMottL1HpLvYUwiW5UmvYO7k/wrxWHM1RKjet -8NR9wTgI2esiTFZff9gUk6eMCM/+t1cpIVqN2yv+h74iuWk8j9ll7yy2RD1L23l4 -gjvumu3CqDF/1Pj9kcdgMsbOK3DYVk7DU7G20NJ5BfRL0359sKBYtJHBhK8B/Xsv -D7L5rergJ0AsVxxdAlJFwjl/WjxnVM5yDPTmFTar/wlsHNsMpPxfJ1fV6oYfFFSx -VkbbTW8MZ4ubxjETfqg+fy1IoLk3WUm9dv8aIKHk21YOkqxMwY2LmQu9DE1cq9Q5 -LBxGR5CbPLITEPy5+56XHROpXFQQDd1i1LDlEHaGuZ7KIKYwmULbY3a1xMDnmub4 -z6yqzUnnDmj6CVi+zzA6ivL3FriwF5KJqHWZ46qDQmLZN2PwCuYBZ/bIBpDsLZpP -Kh7bpTvq4ACeW4mcEhVQf2CN4EY6sB3SELyvB6nBUHvwubYGZs8PP5agI4kMY4aQ -Rm9/m1NCGchiZvWZhhsJW+DgWDCztt1kqffJ4IGcjGIu30vQ+TZcASEnr+zU8vtp -iDBN6mD9tw0coQcKS8P3hu9Qrq72NW8D/MGL7+s2PNTq7LQTMu0mPrz3iQIiBBMB -AgAMBQJNcUfBBYMIYduyAAoJEFpUu7h4Il4IZtkP/2tKabEqZ5xsCY5+jK48GyS8 -O8DUwE362Sw3xkKNDK4i0DpI1GTasR1ILyA29je/+D6rr4efNZJuBeo3iJriau6v -q4vZRfTyoFiCWcMM3mHMIoMS0LtSFz6GM5DwnteGIk9PspHUEjnWLzYA1gWgo7EM -nwzBOaiwTK9eOW1hXmRWE7Ino8krMi1TIY48yrpeXn8FHJCp2uSk7VAcDcveZSdA -btzZR3S2+TL5SbB8tZqaYZPJGVQygx7LlmOnIQOCTrLG4cuBa2PGdD+i4aGxciZG -WfNh/mS11oVTCWF4HRp8RPCwjghHj0oudPq/tURlyybEOTIhQ49BmMCb68lsFQHx -ZunAZNfsP6kRGb8hIJivTIIp9BUMoTX7ZFOnQVTBPnMUfaWWdIH4uQq0jc0vBpRL -ITkkIJ6rueRYcXCsbn9/I7Znk3hceaNpepjEx6vAgWaTh8z2ISGJywNlepwwVFLu -aQC+1sxeM/CbTHGPHwIfjG5VdMSzbfg+b6RANaM+YT//0n5iUh+Bjat0IY5pMPv5 -IYnCvhg7yvf94kkbzUeyV/WEMtWLEx9yJrfSemAaqPTOYSnqFZAg/30Mh1Y7h9i3 -DfvzGkTDRXxeVzTX4c2Iz2ubp2tHVD4nnua6u0wKl2uietHrP1aMpZYljfWUGR2S -1x3Cqx4SBERf6knAHD4HiGQEExEIAAwFAk06FVUFgwiZDh4ACgkQ8ASQ4cFNa2uq -GAEAjAnLUJX+65jaAYVj7aJjpWwaBdFsLPZPMDwIwgqTxXEA/jPYsmfMSjUqTWp/ -+DiZKBb1ZNGIjhMVd1nAKgXeOOoeiQIiBBIBCAAMBQJNcJeBBYMIYovyAAoJEDLm -etqs5O3WAhcP/0LvDkjoKgnYUTYiQk/xZGl98gzWtTSwEE+HfsvCKjaJqNI8tPl7 -7opwGagxdc7fjyqR85Ry7ZZmoSQQD+cFXLHC6h8ceeH6T6nYo1QtjLlp+O4EO7sf -+eYf0jhv16xGosTpj8TNMHy/njQBQIS/DQ5lZl9FZ5GXETOeXc+5YwK62eGyybgH -vqORm9eDJzNnEPHE6nAyhCGheQ7nRDpWA89HeTi+5GpOqWWa8HKPGbgHulsRMXza -n9LxQajyx9xqfl3dtUSKTBB/ecQsmilrH/H5HtltAahMURI1j7NSXFnXNZCaE9qf -wCU7LKHsVRO0ULupyNjIzCmBm2BscRO2+VyRXwNZrw/HEtxxN/uSxB9fqEC/3PaG -vD2HKabkCC7eHk9cZp8TnoKe1Ylh+ruCuL5C3aC0kt7oPzC/pme4F15be7+8/p2Z -ki9DQNOBp6XiSwqgSiHSGKDxA8PvMTFJR/nchp+n+ni2E+HRpgv+BxAvoz6UbMCi -ryMMDysZrQw6FmWQS1c4mkD9S3Gq08JsAFTb7jzzmfXW/A15X5KetqdEhDmjlb8C -azcBcBTzN62bCsjaIuwSxzWS7yWsEdMdX4jBkUeZtldraxCqSQBXx3KeO3+Gp/zm -3zU5O40KAK2PR1niIOlodyu8xg8KJLB5KgDM+zu01hk4qriz7YiUwPkEiEwEExEC -AAwFAk1wohEFgwhigWIACgkQ0Fqwcg2kBBhVMQCdEF1OPY+ZZBu+jdE9iGd+hbCz -F3wAn1lXo7hiNqJHjnWlBS95I/0FkieWiGQEEBEIAAwFAk94eeEFgweGH4AACgkQ -z8FKEMj4XVHjFwEAl85r4m+qZe+PrXDVuFSXoT4Mp8tZj8STFJAebJmMKN0A/Ryk -qVVCqy/DgN6WLDb1yLdwJ+DkDxKr3QNCh+sF3k+ciGQEEhEIAAwFAk8DEYwFgweG -H4AACgkQ5YJxMm+fSTfF8gD/R+8jx9MnC/+5lkfhX+El6JuTI76Wi3oe+FvMMGZk -ah4A/0SZE+dFNGIh0msPqHJ1apX3mA8tbPPZ+RnPj3nARRObiGQEExEIAAwFAk14 -PwUFgwha5G4ACgkQqULFZhOcCcZAngD7Bzbz62FtH95fz8VXvuyAHoTpJkVf2/fK -m4Hyq3g9WVcA/jeGfeqGXSqgC5Wsr3QT5AKtI1Wg+JI2BGM0tIlMn+y8iIAEExEI -ACgCGwMFCQlmAYAGCwkIBwMCBhUIAgkKCwQWAgMBAh4BAheABQJQJ6YeAAoJEHbX -jwUA0CbEJVAA/iTkY6dOvoul59akEjzFcfsiHySe5rJVr6pMsso5sX4nAP9f8RW7 -17dtsuWtaGxaAPA4vZ4M5cesaCmWO1ElclsrY4iABBMRCAAoBQJNNNklAhsDBQkJ -ZgGABgsJCAcDAgYVCAIJCgsEFgIDAQIeAQIXgAAKCRB2148FANAmxA8mAQCqHjhx -ptv3SwapU9rjeXlWFDHyCxeXJ3Ks+A1D6KMgvAEAt+MVZWRsn8WD+sttTIAhZH+T -DBSeTE4qTaEBVIA9SB6JARwEEAECAAYFAk7CVqUACgkQgUIt4LWAaE6OQAf/U3Gp -CHSY2aW9Bpuaf1eGHOsPaCTANFsLfLWboGcdmqR7GgkLulXD3kAraQaTrkSCMl3l -gRiWUQNm1otU9iZ/MEZGHGngAmsHfLguC6mJxfJlv7rZ63ZQcwuo7ST9cUPIS7ag -XaHk1oMgUKCAMl3JG4GmsC4bvAcCrpq8bchg9r8fp2KxF2b8JwKuhJSXs0djXViR -4kPozcwH4MjIcT4Vk8835HjXIA/6il8H+MBBrdHmX4YeLqE0iksVcDlwqCRE5aff -EmZTmgHH96FZEneQfxKnqIQLqATPPBqpBj5NkU8xmYRY1lkgkyHiV9gzq7TBBzVX -tvaiguLugB5Fcc87xokBHAQQAQIABgUCTxvD2QAKCRDOH+rCOScOh1WFB/0e3tL9 -zEIVOLcKrGKNtkh7g8Sbbd9nHu2An4FJY/mRYIv2BuPN/+tK3J5kGfeKmsozW48j -+Eg0lzyUan0mSPZRv8qopIG1eUbKJl0LiVuhwQGWgNQ1h6oDpXF2gm5Ckh3vdhPz -6rbFAzBlZ4CPcpe6+2/iPVRJ8lRxMcdqlwgQImNKXycRYb2tZi02JhC4DHJFebB/ -kphbrzMA15q3JpZSLKw61+XdSDBBHVUhNBOnjvgRoWjz4EtXzGXYd1nfHJYv47gV -+o/+/Lco3FQxvMvRvzYs9cxGAKUo051RdcZGR9UP/9moM3WfdCpMB0jYPW0DggP+ -8ljRkGb4CrSxefFriQEcBBABAgAGBQJPcvlTAAoJEHWir3Fa8De9a88H/3lY21b/ -g1llGqGmtrBwWLE79f0An15sZspdoJCQaM6H8QbKVvNlWbOWNrAVR+RmZlWpJgEu -PIKM/KOEPErWLFiOTczCpuEYV6JHfbXoe8VibgSRyax7A1aLoeEFjZrS7wPWXiil -/4x/pKtyo16z0Mc+PJSzRUCJ5pSATbb3NnBtuwsNoQdeb3GZemDwEEXL1Y/jqUWb -lkBJUyiRQz11ShRhUb+Zx+jh8JMBf3FRu2OciXB1lj3kDFPnTGcV7aFt2p4mQgst -zZDdlmozmSV3cblQWrTDfkYmrhumGE7EjuJrEpYVLonxHQ4RmGJZSBIsweoA/oKc -VWiSRancFR7S36WJARwEEAECAAYFAk/MtZQACgkQi9GocOhXnV75dAf+MDG3EmCE -3quIPZA0937ptRS4MtdlKydqbmDyxlux4oswaa0Z/gnT/vq993R7t+L9n5LM2Wcc -yV9HET/ZJjB8+kHNo1qxSno1lTVhn/Rkv0TpLSDdQa8U6gO4IOumnTc3c6aWPjz1 -IYwRA/xsumrY0yAWl9tWiQ9UMVhrqk1eOUOv95fcSPhpKy+/0SqKeC+1U8KIABpr -t4IYAAzRCW/BjqUmNAGDZ1We9bW0l/ew4TtoHinpHvqK0cmgoXYX34+FpORW4W1p -8yJKQWvuhFIo7mmGgPzeDC+jZMDReYVaIRiMcw/f3oO3cpTYZsg5hxEZwrUJ49eH -rjj5OZZ7cAoOeokBHAQQAQIABgUCUJThggAKCRBH6hpFrSGdOtBBB/wNdcHTy4Pk -l0kNdWiv3zD8gMWZ8pIaZBCRIctlrOEGklooju78yaZDUVZuPT8nw5BpkrtyopRA -jDrqOY1zE4XhCl1jy4gknWECRFGGuPF0SRUmE/ezjvROpFFuPtpf0GggyEoGxggA -tr8DBsbQl8dVPec7+GvE1Aohr/1xUW/7YkpgNI81eJ0O7B4zPItJUHxZMA5Fagoa -EipnoEGEGcL2e29Yg5L7uGwumQ6fsn0IjRB5XwhSLHMzWSbIl0oWOOc4SWAYui33 -hABXlJzchC90lAh+7tnZAvR5VsrsGudpo7zOotVnf9PXH0kkFfozGnHPPT88p+6S -tz6f/y1Eu8yGiQEcBBMBAgAGBQJO416iAAoJEEkBWOU7kgfnffgIAKxFD6HKLLno -pxhT1IFnjxAGvavR36sTX4RY4keBNB2FoapNXAc/4rigXLyTMtPctW2n5CaIEFk3 -07gJW2WL6eLZdUanathAo1hjDVnsI6gKhwXdp74Iu7gULRIy4fwrTG4OU2Bshx5f -/hS6v4IvFU+ivNDECyLHklmT9dNFgBzhseT8WBI5lTpcdYHLGSHdagNILx/A4ou7 -hafU18ygkXjR5FJvowhUe8Hciq8ItQhzblD0rnTp+Hiij+xBdNdQCf10WlhvUvSe -DUhrmhkL1xubdVQz6X3oZVW6CH7N4xM9e/QUM3GdTTlV3osWWw9WL3Z9R7/SG1UZ -p31kVvBx1jiJARwEEwECAAYFAk9JgTMACgkQMZwhNNgqrJGRDAf/Xv7HZw7S+nah -54hzcwv8uQr42wJKuCTXQu16NYPtFmImcu26wLNHMEQ392ZqbM+08V/hQ/W7Scg9 -sILNIjTTFPpWto3rG9Zyq36YdlQPbHaL6sZiwwx1CDLTzmGnO/qkiviQAM4ITQ4D -W6Qeoo7MEQwq4b75FJaLQO1CZbGjKrxpD+rV5IZjnCPdMoTbu37NGB0VbbcjFZkj -J4Vlz9H/3kpdsMYPToJX1C+evH1N8rO/wGQqzpMV4ZjbemY879knacyUk2Uvp1BW -wTeLJ8qb1IHT7nLH7Tbtu+gzP3RNdlyrVv2Ja3h3vJmMeCCS3hJJQpL9TL4GokA6 -PWiFdEDFXYkBHAQTAQIABgUCT3M9tAAKCRD8+//H5ao+rWQ4B/0QHnwkThfkhACq -xRjaKDaYuoZp5RqA308v4g86vR2XQJMMyjN+jfeGyujte2hmOEOF8bAeRmcyL84j -mUYJq5eH5/tRFZGZLviafHoja8GJGarGSiaxNELFCYAcckv7PZ02iG70jgx9iez1 -13LCFDI6wN/H+b4YdynzUIqZebyptDeji3zSvX1vos1k2U+bs3MTAZxWY2d6kopU -pg17kTz1+VUhn9EAtC6ESQeg1EVqvShIVMCVcayUe0n3j4C4AtRLr49r5/lFjuqY -+tt3ra9vZSrt3g7lzQJ7zsq3d6T/4AR4SVLzRPbT16rgP2NKfwd9vkrTBhcZUXkP -2QiaA6lsiQEhBBIBAgAMBQJPCZ8sBYMJaKSAAAoJEHr2nzLAQQqni1UH+LRdFFIO -8fb5J00WJzelB4vNH4A+VnPXJdX9/9g9lrksNf9H3KFOpBbi+XzfmvnWKUQgI8Td -K4BWeAYJPygDT8txlJvTOqbavQWFjqXWJSqVnYf7AFhdCFYkPgMwYhRTsGEhqh1O -uyWShqoHovoXIUr6nxrQCmgNxrC+f8A299ZXRZJqZ0NK4JaHjL5t4CvJO/m1HLg/ -uotnS29RRzBDUCWz6z64FavD60oVyg3rmjBeN9C7d52EIpcypuBDmf3kTXjuSZiv -3lOLX1XroM1djH25euXqB0dsLT+aRITKEnhozHQW1SGFSYgyWakwZFOBcr6XalBq -gCjVcxRY21MHjokBIgQQAQIADAUCTt3FggWDB4YfgAAKCRA7AmJtnrlJGOUuB/4w -uLwTYob8vCVxc+Ch8lA1xjakvlavvuO6JM4hs+esfiSnHU85HyeTyFkp+fnEbwy8 -eF6TmBnyLfOTdbzXrBnbSLPUopNCxfphH1b82x478Oy4hYFgILexwZkrvTdvwx06 -V398g6fgbuOQNsCn4jon92SeQnMYw6G/lVHGEFwucswdXF1i1csxHHwpyzxbxVYr -pOlr7GY9r8MbYvYt7XXwVSRdR85QWL9vGnLY72uv81WrKUvnVGgmMgxw4nNAU96U -4pWwnhLo6qsUuBW8qxQ3rtZaIqET1qm25hOFINtBv9bMItuvDT1ElUDOUnnYogEl -IjZfW3/ZqXBBcbpSb1VtiQEiBBABAgAMBQJO4klxBYMHhh+AAAoJEGE8zbTm/aB1 -tUUH/1GbuVGZX0w7nWaaKu35dVFoQKJNRJ8ZtLOUad/mobERqPeIHrEltrvS7+3c -aclVt2WIYWBAoTb903bIvLT4CWeXGc3njA/c+Wvnbe4/I3tyCFoHh/+UzMLOTnto -yzS0+RkqlwI0X78BtjwcSEIszvVZU9L+Kn82w+Vf+LTG+r6WnYhm14mWhq2fgL6G -xvPMN29sAEQTkL2qYlNVs/8kiwEvjjcKqeUtDQth2FaedutfGqMopdWzc5zY78a8 -TVJe+oOU2KUHhgg4gy2VkKXZNy4evHm0jQlSQvVQjhtOvSlR1nME5i9GPxmEEPxm -7SBmep4Fs1+sHqBAyKU++eSoShWJASIEEAECAAwFAk7zALMFgweGH4AACgkQJFNQ -9gGHjvmT8gf/clU0l05zyuXp1KV+xWzAvnG2tloNP2qG1FViIA6c0LU/ky14vIWW -+jaKf2nXgFS7sjIOUzsv/9t5ucgd+Lz/0lmfyaLdEpcI8GSzWipisOYILcyHKqQR -rLaYm1PrnO0WNdkln1/hQlNQq5whQx+j3/BtZkjEbNnUkUXrI0dndW6gRGwAJDwQ -Dm7kPiTtBqYAQRRCr7kJx9XSxd1jBZENmLcq4wee2hMmXISdU+zBM4Zpixuy9kvY -JwVci7Q1qBD4v1JEZPy8KMquOpl3Bs+WOMc85XrkvcPCgRDnNlL4F4Rw1vjZTgXg -DGEsk7MpoRab0hIeKuTnzme9KRNmcRTLN4kBIgQQAQIADAUCTvzHSAUDABJ1AAAK -CRCXELibyletfEp3CACEtWvxHtM85Z8YAV1OvTW41WMXKGxUGCYg/EpiY/s/IkvD -+g3UYt0rO0I+4yn9bVsB+xkvL1+gE6x9gnlszperqbqVe7at1DKpY3qF+NPZUI1R -KWQ2GtqhnADah5umHM+GryJ7MxgNg4f/8rQdr5ijDsf51jf57bWHM0XVKWJqYkrn -2VgioX22rf+Rv4PyiOyUvUfQqclc6jUfydX7vyUZv4HOW5e7Oz8I5cSSHIomvAel -K35oDAcdOHtqEkzw/v9+LRlIQU9H74tGaCbFf3WO4IjqLYR/fhzlqlA81vNqYKry -3mXlECDChGSgwXTcHCdLI2bosEcR52MUyyruwRrriQEiBBABAgAMBQJPD0hVBYMH -hh+AAAoJEC+fiNv86ZEJJ5oIAKOv5vXMvwSczLKUzvTGZRKr3x+zMmQnUbK0Dsuk -MBlmO23ZC8/CirJYz+HM3tUp54UNvxUuPxm2bJqIFThJiRp6iEZc9TvfC+qZDHf8 -hVrlxwZN2mp1ylylDg1RwQQg1GdZ4cTf/d0BdWCoG2+vd8wgEgJogJHveEMjaMJb -91m42MSKu2BXc+tllHXURX7Vi56PkuP0s8wZdyAyKDzoVIxpgi9+9m3cz8km2i+R -Ar/nkOGh2fAWqVrIs7gytXQ7lLtZz4BcDks5nGOm65TW1JiFPLf9ty2tYkdIQyGi -pcFk8iszhfxHmSUZjdjJlk6AVJOQXi4BsG8RISh+YrHell6JASIEEAECAAwFAk8f -t04FAwASdQAACgkQlxC4m8pXrXxHbgf/UTS4J0lXpIcu+iCaBR/iYEw5kp3vqa6c -Dki9E/iI2P4s6f9aivrX/6rJgIHDOSoOvbEuCtLWAfivgL5+xWHgrobDOhHr8rDX -yjTC7uTwkr1PSuUcVJLhwVy1AhLUq5uOvwFW0LhifonbaqVGBjS9upCqem4bENtR -IPPtWJuTstMorbrzO6cyPod14Bi5YY3Q3Z6oEuC4B2o95PCSCmbkIa5/DgkihWwc -Toa4CDSUqpWDWzACBdEMbVmo8dqrtfbBlgagPaFMvIujsjE75uB+rDRVtX0YGMHN -9054MqMlXMiYZGOxirHQFFuwAhOG8lltvXRLIP30DTrTDCcZhuDtzIkBIgQQAQIA -DAUCTy9yBAWDB4YfgAAKCRAslvLoUF2iKzjTB/9YQ1jt7EFQQPvQ5pwBkxX9XOib -od0DzhqqDBv+YA2TNQDMHVj3XxiK0NPOcC2OaAHBBLPSruGwRIu1t5Zaj9yMreG0 -vv6zf1cSVegXtMIb/Ux6ts8wBOhwXvwOcR6fzS5E5NaEpx6Jr6FzuowCMQaqmoKE -9MPTM61qlvEfjDLo47ggYf6XdVTdJ6phLW3jPPrMWzwrRr3K2qzUEVpBIf9xNt8f -JQCvDObNPBZKuZC7NksVDy5MQRjJAbfoTKKMUSwjNWdGiI3TFV8M70T6XvqQXR7K -zPqi8uOpi5UqFTSUGIIlY+vQ86a9KwIt03h7k3kcqsERVbzh3QnEc7V2cZIuiQEi -BBABAgAMBQJPNGB6BQMAEnUAAAoJEJcQuJvKV618bQEH/0jWVVFqbaahgR761O30 -1bI6c+TpNgaEHROFZHzQkiCaMrM0+sESF6qXAFMWrwIf9LP9356yEWP1wkzV5hH5 -giKHWlBsaboXLi3SPf5upuGXIhuKmchLs5WeXJHt1fGlASQ2yE9dDwtYwx+Owa5W -zG2NvsLDTfOYyMckIJzJCzptW/5LB1dFylmHJHlLNRdJOllfYYn3BLx+nCRAHjcF -14EJdmIt/Kcc5HXPb3BahX79v5DIZCG/aVBxxZsaPyIsC/pDExEjGTyDTRZDqFfW -DC+ozHERChu+RFh+IinWwmSItiNdMDAv0jEWKQ+Vh2Y3OSM3939zTNOZXm3HgBCZ -gX2JASIEEAECAAwFAk9F8m8FAwASdQAACgkQlxC4m8pXrXyGCAgAhq4o6ekGMR6X -goFsHnBIaLAgL9hRuy89lrJkCFD2kZIv30jKIeg7zmTLpN5akOgbL8CCTcpmgk9b -bc2I6Z4z4KUOoO889JSjoLA6f05wofHrgmsmJc+jNG1r/vUKkzXe73Kf0bi1/1MA -oXXydDVuMhYfH+fCzbR6jreQ2ksWec8Db5ngvwVfR79EjsjpZHD8qO/QDGw9WEHo -vOkJOqrBOY0oCTALF3bhs2dUzrQmw90rLlYoobAQxWiQMrEzh+5VUM7pS/Jn/naI -F/e8aTU1rCZ/tUMxfG007b//CF6EbVZJNVUcsg8JER07vPdiJsgwcwDfGBWHpH5z -HOmNo+8WgIkBIgQQAQIADAUCT1WfWQWDB4YfgAAKCRAZLr/eJmMb9xYJB/9dzEbG -eb13ePUk+Z6BY32+23SN/yRwvCzd0aRs4L70Vfp7win/tu0ovJC1axvZ53zYHm3h -Fq7b7wwydNgdhQzJs6zVuPYlMAY0f8cajtpB7ygtvRWcCr8kxbV+NHVTW/2tXH84 -g6SsYXoGEd8nH6VGMwapqZ8OCHgj0T4J6Cc4zktoFxqK+fttBPhlbruJKGgtjYhx -7YPXUAZgqBpnqS6SAf5b1L+WopM5WpVPF+Q98DWIVZW6RnObn/5n/VWznf/qMXTr -eEm4w7kZ0G4kEH0cwgV2Gmet4U53jkiZazmxF/eXk/1ZRLmDocYZfEMmPtT0W5Ke -X0/oIsXV7frrcxHIiQEiBBABAgAMBQJPVxYQBQMAEnUAAAoJEJcQuJvKV618tkgI -AK2CeFdO1fKttUUmdl5vGUT8bofWiewj/0Aqr2SFdB8Demtjy/AVKVdPAypXA+bY -n9z2MJEFskgOP1LSX5XkNA6rrcf5irTWHiy5H+nEHL6SPOrq3cQUas9l3b2PrD0e -5lkonzO5AS5vxkZBjQDuLrnphTv5CX07c0pOUQkaC4ofeL9eH9/xcXCw3uZbe2gZ -s91ivsUn19O4ylRzW9PHqxV11BW+Zv1ITmqt13jUhJoSLK+X1/xs1L0kUmsbM9kl -+73iBFy0fXKd9JnmJtALiYlvDM8qIRYSSGp0OLdj+ycCjjsHUpUi/4C7LYY2C641 -BGhiIqmyIb+jJi30qX3XbO2JASIEEAECAAwFAk96JoMFgweGH4AACgkQXNaP/xZy -RAFqeQf/clCNm5aDG50sBn72gOjOLhCDx0xsmKdv8XptX3gLypxdp3YEE+QPd1y1 -Ll6f+IJ+J6DTnUqr6ghh80JEcELVGZrbm36OI37fiUD9ikcyATmVQ4xpgtH/5/Ot -EWqPJ+L8DJAdu9APig5mQ85kK+rmEC2v9uva4qdMJ0fvmio9Nc7q7kxaewTOAZKi -GEQYeLgT5JcAfaUCCKDaOncmyzV/KFKvIs8ECK2J/fEIWNDT5b1CauSqkKJcJhc3 -W5P2iLeoavOJGiqLTx6rL2qzs5SnDwWJjI/X99pvtLpTdZJWNCbfFTvutvsctNWE -GFPc1Q0zk8guqtR8DNnclhGxPemgOIkBIgQQAQIADAUCT3wwmQWDB4YfgAAKCRAu -8a6Lg+De6aTIB/wN+PCqIpIv7lnLLqdp/ygac9rR+lN80A0M+/b03+1hSmFnlDzH -np2p5wjGF+POT8RihkjuMc7LbU/S9eIAot3/M90L9iL3GgQ3z66zLK7o/SQUSJH6 -717hN6GuZWDqxVXpCxo5i7PisItJz5kZ1LuuAepK+LgM9jknDXYZcHnt+LM9nkHq -8ZKIHhdHrLpVW1wWrR8x+rQj6yOTpBYnJeRXihOC/R7A3PxZ+/vnhXExSNcIcK1t -dUUrIEikZ/5SBKpLeOUJNfRkGzjOlEvcQsP8IgNzjRGtuyE/Fkuy7WW9qimDvXhj -GjvDJsclkBAo4cL/1HMUiGyQRDhBcfU9amO6iQEiBBABAgAMBQJPhT30BYMHhh+A -AAoJEJkqGqxXqDqIqZgH/1Lt7cThml0pnt5Fcb2dAzDAgN267octXY2sw9JMI/G9 -4stbDg530M0dkMqhG9BXCqOSTwtY65VGv1uFx/fCuale/lmi3LAH5cmu15nNZhp9 -r9CVyeiA1oBLVNJo1ysoxQ8Jdnvx0rHXRxTen6W/9a+6Lp6D+SOZadmuWacS0Ejk -93WkFxJ02AstwYkqvZ7i/XZepRpiP9jO8ZpvRvOdhaxCeZUL05YYDnTp1uCLt2Nx -E9JjdXTktElnmA4XBtSCHOaDPyRe6wh0nrLG8OTHuMZhhryEdVhsJxUgmnfRylI5 -1PV6tkAKXYRLs5A9yfeowsXIrDGXGqma1JshKdUaU4aJASIEEAECAAwFAk+cXw4F -gweGH4AACgkQcmeKGXShgzjDsAf/VwPUDkLMZqwSPp3IL5Vis5QRzts1faYMOj84 -wmhjXOqmHNlzqb2Aqbd+QUkJ9RLoSPhmW2rF/rdNdnXj0jttaMzY4dytdvaxAfuq -5uLAMp1DK+0FFZbZKUkALJbkkIJukNm9X+T/TgNIzvSbjZLBDcgFIYG5qNpZMP2P -UWL66Mega52NYK6goFjaOxuugXNdAng2sCZHwGOxHa7s5ZdMrwDV89Eud8QoDCIM -tkXKn43dOSM7sdPhgET92J19eaJsNnYoFhAgaowCf+C+1Jo7dmORhNxRkG61ZgEm -Bo0dUoAVxA9RoL8FexXlnsEXvVhb9v6qz3C3iraBWc6/CtJRJ4kBIgQQAQIADAUC -T58LSwWDB4YfgAAKCRCcMiabSa0ozM9kB/4gfnHSA6XkYBKasQbE8J3lixKBBqzN -BjK98Rf4vFgCBi/DQGEg/4yFLLbgBAFPUbw+avHcnc32OYghReo3i8/0KlShN5wK -S8+aQ32EL7ISpXG6DXnnOVtr66I2OCeJtpnIv8K6GG6sd1cQCOewV5wbTY7r51bI -rPR1b7TBl0Wr7GefBl+Lro++aIrsaPgTvvpzXNYFQevpvzKTQC2b4yv6MnXQIyP6 -YTDwXMEiEHiOBFFOyohldr4wUMr2LtjcXv0rDyh6pnPJ2hL2tWP6UJ37eG26z+NB -H40aPR+L8UIvMvTzFclYxtuqaltHUdintFi4h8SCPpc/5xRJ2c0YaXWAiQEiBBAB -AgAMBQJPq6koBYMHhh+AAAoJEPUS2mzr2+YLougH/Ry2FAgZ8bOFP733XUG3rEWs -FhmQlcAe3xaKQhwQkmUIrY76Kmi8AoDBeSn4BKLs1aopDaszxw9MvgwAfO8UPQZ1 -rPXYJXUSRxKQD2VeH/uowjl2ZcjR7RYcoucIC9lL5fekDMaKy/jqt1jr7t2M6PMu -xSHNIgiqLFFOKCajxvCdY0hDr5yQB0fWMXH2HsXNQ9rqH7Rx+0xtSp8iDERXts2A -B+koILIRp5SPDZHnOr/YpmX9UZCp04D+7sgd3oCkMH3Gc4zEV29vKGRpgZst0yBR -qWGLjlcYI06xKX0REDu0vhJ+3iG1B0QePjDDFscTCgFBSLoR4kyPaLENEsJSZouJ -ASIEEAECAAwFAk/ISdMFgweGH4AACgkQEvf3MpIxKRg9ngf+MFUpfWZxMIxNJ3FB -wxWckQRViWixYE4+ZW6k8U/BGnZUyFICfBbA7khrQfWGQGoFv4EmYO2/YZ3hCl1F -fVDUHaeB6vfHrJaWHJlZZn/jszFRNFoGQkMsmQJeJaRj7qmlQzxUKriy8s39BcBe -StipSizNc5JRqrk7VCg4KCCuZPre6ELYQ8CjSMZ8qcRUojVa4PjexFrk8/Bv8dRW -1A4UstWzhM1TZMB2F2nBws5Mjv5G9kIjZuJ17khiDIU2sxM8rgLlVQQ/m2cWGVXX -egNEIOBcQPjmROsxk1gKsbeeoampc5IJZCCggTxy4dvfS/kGKmBE3xNiYHO8p9Oi -gZQXkokBIgQQAQIADAUCT/7YQQWDB4YfgAAKCRDZfQNfEwSLihKLCAC9yzzfxvN7 -YEUNrFxLGAIxolHmcz8OCLEMEPCeTJri7DUxWz+yj8+dduB4kgnab0vU/Y9wAwEz -0TkalZknmhLGC0Cg3hZZO1G2X03CqWbaaoUQ6FcI86auz2K1QpeWTsEwILq32GKm -vlWhNQEwgPTRppnfwv34W01c3pHTCEChgXSNmuVe9zTIHb/K3JUFKB5FG0B2EPU/ -WKQB/LxtXq4LRaTEi4ogAfzdOGH8TQSEo/GiYE7Gl/FVkq3GyZpNVOicLF6mLO2Z -llnOS6JJjRR16fEP4lxtYHF1VnCSfj6ugy/q47hbBik40XUzK2clSC9ry25kvMI/ -rUsv1QY6T2HCiQEiBBABAgAMBQJQMYuDBYMHhh+AAAoJEDkq/6NQfvzzwo8H/i38 -TkYoND9TOP2WI/f134Vcu5uh8GRrHyNZZUj/b7DsKypppFc49OQWXAFId+kASsAm -MlFUVCRFPEkLycT+lzAqwjVc1Vgl+Cd6nvDK3SmMFCk1uj8OxbwvWIDnKpHtnKsH -VWGbH2fKvI4hWSw+ArbrGlEIzOOS8PaynLLR7yP/04hDTTqkiur76yTuLWsVL/MX -Ccm6TyuIKDFfb4aLk0Pf/GJKrXVVwGwxJ9m8AjzI6hKILE+rJBwC8lW/avDugkf5 -Kgv1UvUhijtNrxM4vNM8eAfLJ89bOQeIh7iRQq1kQoIkgs2QGOxM4NSl4oT5OezT -M0uTSnV1XEFfYbjPN02JASIEEAECAAwFAlBqfEQFgweGH4AACgkQZbUe986vinII -LggAg6XS4tsRwBYXoENDnsnRyNqCt8gqZ8AngC0y+RT0wH775OAH4y0z9wxkS6n/ -24x7WYTa9beLbZthMblR4YfCt50absYecVdfu2hdAo17/TSsclUjifCTX34WzXiy -LV9kj3/L1WtU6YsaZql85v5MEC21c4fn66U7Yt5lS1bZtCedlWUku/BffvF6mPaa -ad7OFgP3doohB9KmsYBDason9Nxu62wX5MgouDLx11foN2Vn1KMH0ZJvZFeOrs5R -E2L/FxlyQYJ8m3eZb7FEL8CXmDtEdtK5cjL6ilKaLgadakIW1ogPtOoJhlct+RCS -P6VHAwYl67MH3qokS99o7c3NYIkBIgQQAQIADAUCUHsoJgWDB4YfgAAKCRBkuIKR -847pBiB7B/9/qhLXLG6GCNt8Kd/PEoIv6I8pKFW6MIlxhF1cSvTFn5P2H1fE4tm1 -Hp3IFwTcebliz9bM/cFsxXUo/9xqBXet/QrNTI3utFN0li9bRFh/W/8e0C2aOCn4 -fpfh5O06j8IsHJ+FQ7MZUGoafjGvIBWsfIPo4GArJNXYmzs4p5FBu3oqy7Oyxcdb -zry6IUBKuaHTOq8sQYWkC8txCSECIy0UYrOkgubt4qKsWKfvUdofp/WLn/o35CB7 -7/KbqA33yymYC2igeyV9jOHruvNDEoV76MR7sDvy+BeZk/Qq5Y9rQVpyIRFToHyi -2eXhKP7K55lJKf2YglpspeYJSE3cfXq4iQEiBBABAgAMBQJQmRGPBYMHhh+AAAoJ -EPy/JN1ZQCFsLJwH/0q9Sgp3QVfVcMaahVCXuDisKv/ltGpIgwBA6cyGGSqBx4iG -BHh9Ywp0e02Xm4d3/O3574DOOBxqt7Rao+GPKQTudXfozwJ/63rKNLWpl0KpwpsM -IDR04NJ53Hw0SdShJYaIppfel9RrKLeYTGHvsPrhXo/ZZrZg0UB7omEmB4O5BvBw -2PvWwWU05huVYIIIRJ6snnCZr9DhZ1KdzvwgqdSx+sOhz6CxDzfsbJZWFj0W/XYO -6iHWspWSuY4J4V06nx+7L7U53XUXPfKO5jDn2X5BOdNgxm+YRVyFTMjZE+BKO2W7 -/OGM2w6zW485poZLjBPHxN5Z7I8XXGU+7fJT1TGJASIEEgECAAwFAk8uFVQFgweG -H4AACgkQi/6syY2qiWoO7wgAzDVfShgxSHSIpytefWCWKVQe7WCqUvzmYszSwH5l -xVNSvU6hnW2wnSOK/7gqeaJX6OV0/wepnEQcHlwEnHN8KXbZs/gU0mYOTy+6KEGx -6q8Mgbi9DFzDkaZyVMWpbsH6qz78sPPlETfCQg94WLS42jiXUpVwLwV4H6gW+i6R -7ohfP0PIja+GCRCvO/Qq96rYM/SidT4lTvNrCZF6mtZq5lFdmn4i19xVr19Q5Zjl -yhuLP9JwyHyXQP7eBvt+iCSXgwKqasjMe7yWQ2QFurTabd+ir+jrP1FCEE+T3s2T -DAmwQ0RRRdTtfqWQPDbYG/WXCaAvqYoAQxct/oqm1Cp3yIkBIgQSAQIADAUCT0d9 -yAWDB4YfgAAKCRBWsLlsct17XQiRCACFjtKfkQTCHwsjjETI481xhPTWExAFFiHY -Ws80+Jvc3coXw/GSDvW5RsxcFO+lMgCd0mYpxDlQq6JyPPO5pxlvQI6En2hOvjg2 -5bqTB4dB6BWWnwnbRHchqaCPhsORo0lowz7Ar6CjNZpwFQWDo3HuMfgjot47KqV4 -Dmalc9rCrkNM5n2KaD7W3Dk6slNuKzkRDPZO18syyWeOdiSX5vn/o+2gqzZHO8Sa -fVVMnuoJBPmEoBFSHnaxxqfFRPwaGYzKGtF5rs+L5sgG+OD/yeHwNq906w9v2e/N -MnFq3V+T3BsrfBAhGKjzPnU4qhww3/8gHVr+gIf+HmHucHvYsq13iQEiBBIBAgAM -BQJP/A5JBYMHhh+AAAoJEEJHVeHIH6MaXJcH/jN0h4EdDqK/HOykS9kd0wdAbN07 -5tI9uvd8hWMB1wbQ9ChH0nUFrS+4jegGDO/PLoK2DMCOM49yoMkG8wBTV4q8Ab6d -rgVuuifMktLOsUcvGW121tzydGZk7MkDi/ojeD+WVvMMrdv/GxZblhohBahUAWSI -xTVMpS1rTpKOiZ+praNyCeHoRav5srmtLqrCZRm9lIPDTiBupqHumiKEAkC/vPpn -f9XP7heoRO1mfmV7yovtn1gAtiIpd4gtSl1GZClyU8ZiOnKvcF6TPFtwNFbzHRKN -6TAXqDFeYBEwkgBFTikz+241IgQePkA5LRNaTrKLvEDaawb/7gYlvJ1IlBiJASIE -EgECAAwFAlAlxLIFgweGH4AACgkQI5OU/n9qcEEwZgf/T2nr67u/4sVUx6WyWDBX -rh6L5Zbr13MJIjv/X98I0ZfKIpJlmhiyTXoPxmW5g19NVG/Vdl6jFC3gPEKpzzMP -OB2ZVsXmoeGEgOJNuLuapnvlrjW8rVxUw7R14rqfVCVXo7ACaEMVwxZfLMRPmJ3v -b+1dj5POCfQ4fOjpVoszFYv/UlP8h16mUQ9HNPjrJoDVhIZ43zem6dmWLOZU2XFQ -OdAKxd5iMvdpzYV4KxZWqdGiirEHAzYzwjh+wrwisTlo8dPxGUVFjMjne86Ue9Ix -38zk0f2STtuGfsFTn91LkATqM9aOXRh6ZZgsArW+YLCl4q60YxZwc6R/trZxqfoq -LokBIgQTAQIADAUCTtZ3rwWDB4YfgAAKCRCFNfr9JPHx03RxB/9lTClfBFiDvT+V -IB9W/GSxBpzmgSVF1KA5y/AHS+1YK76i4pY8zrLgMtYYUnDq8qgwMDZWTpG/b9jU -rMjlkQ9TVZNP8mQKVWqHeAZvYghj2JPz6pOs2T6qP78wsgrGtsZK/zMjm99wyxE5 -Ry6uxckAx6hWaA1572KuRUz/jfWnG3iTBH7cjiJ4JKux1OpIMOy/XcaWQPrPyTiU -3E1iLpeLxcMrdvSkKDEYm3lgABNTLDhZ8ReKvO0YvDxYLTZ8NvxuAqi3zT+MVNgF -yYwZrWG7p/aZmYbngjw17gCB+TyYoDkBrkjQRhQeU8zhHUHLx7N82byYU1h1BD7P -1r5p48feiQEiBBMBAgAMBQJO/KtjBYMHhh+AAAoJEDMh6WsBpRI6mpEH/AqQ/fBn -5+IxaER3SZXUkaYlv5aeENEQiv8zLcbmJeXkZOSR94EDKHGRqQyTQ4aq6/Q35Mr6 -6+FT33WiyrMDCSBbLdzt85f31C+2FYz9hZchFL4aOcJU3s/rra9p3mDCYKLDP89D -uoUmTrLDzjarI6GrfGkuPioTU6k8Fs8Bd6ecMwQ+fLxSU3RQMv0JuB+RjoRn8/rG -9g5dEL1PoCGsPZgTWm3CeFm4ROY4Gh+OjYZ/1l/etfPiGyTJQ77ZUVwcfBY4P6ub -I6awC7fFHrSucf0aYUcrNhFDO0ouMSvam8ZL3phWQsLk2chIO/gPjltdhDY97+sJ -t4505nQ1HbJd/xuJASIEEwECAAwFAk8Ii94FgweGH4AACgkQSC5x2ryNj9u3RQf/ -dhsG5QEmBZ2HdMTBaBuBPnKiNz0LUDPr8Xw7cKJ8AYTWQipcAZMhMczS8R7TjwUS -ErtEEfl7Nc7C0jUZjAT4tdNSx0fsQylHce5Yo3r8TqtM49bNJnX3H52DETiQnxKZ -ep10M6sARV+x+5DAKFbBnUcfoH6NoWZwdgZXSfAg3GiplM8KSbeQ9DfSViO8J5Qb -NtkuDEppBN3hxNCE4AObm09JYJYxKPjkSqwqrtv3z7Hgd6ZruVBg4tiWLTPOTtKL -qhyao2yktOKsMJA089k/TdidyAg8Ai20UDyspmS8ZNTUnM3l2tYlwdbsV3IkqBpr -IEkbzmcbKzaCjhjDsps27IkBIgQTAQIADAUCTxMGhgWDB4YfgAAKCRCgLigBXwG6 -GQv9CACXjw+Drs/txqiuEAl7tmMu7hGHpBwUkr/UCmbMIntDfuCT0i92TwuB11gI -4sMhtCsFpjVO467zqFLTW3XtSjVqUhdCRQdCgixDBIm17mp8mDW0BnHpAa+GovQa -MRgj800LoOwZGUPm7vtkhA8r3H4hWlxuxv5thfPXstEqEzDUym1nZqTuKCz5vu6k -C63noNQDbVpsfIVzjt114Ztfu/StzAhdfF3qA5+vBH0O/ijrLwLSki1f4wk94bxl -w+isUQSPwAHoARD1Rj7omB++OjyN4XTIhYh4n+5nwFZngbUJIDnWTmAcOKQhQkZs -ygUP3YfToERwlk/72HLFijn6Wf6PiQEiBBMBAgAMBQJPRU+ABYMHhh+AAAoJELh8 -xrGHRvjniRMIAIi4zpPhQnmx8JhbBkVjY9qusrPuWYqwJZS0FEbS+W/rrQT+y3/E -oCsjGnIaQNYMvECM9cerV18mIayNxkagHfcIxRMdk+AI1VJWOwFjJmMo70eAkrne -g6sDEC0jFMmxOuKgntPjyZU+dNfglM0UetfVW6x4d4hPWtNoZ8IQ0uVHC+9FalvE -413cvKw7CniDdbOzN7beOQ1bX4dfkfTfPLbPjDJBk4V7mnK/DW5AV8mmsFUFqBzZ -miw3MKK6MjRIvfB3dYWtSEtIazba3oE67C7xjF+k2+h57JlIO/4Mt8v1yABmCUaP -zIgRkDwCAqqD82o1UsikxN/MW0ZwiztgclCJASIEEwECAAwFAk9LF5sFgweGH4AA -CgkQ+JfkTKzpC7uYFgf/ZfxNsFPFpvr9zkvlaswwTWgvHODwmtMSUAkgYNjsES/d -MM0hGQXdH+e539rYOOCMBPzyGjUMKA7t23AVBtGJUwHlzOYBmFx4T7CgDkfKEI23 -MWZHkgazfWeYKwLoltFo0ht3SUiSaaNQiSajYT5OZ9DwY5T7Xn6ksXTHDHYW7dLs -tg95MJm19+PCmHm4mZ694DLNajt4JoYWxNpZs5j2DDa/wPxeJP8aE9/gkaVvRu5z -BltyIMwKlpvI28vCuj5P6Z4GjKaCe3Pqq057ISiye7ceFlhVrxgebTakgWnTSsGJ -qJumgH5nWGuZu+hE8ZehOVJNtqDmbf/M0KrFe9HdHokBIgQTAQIADAUCT1V38wWD -B4YfgAAKCRC/myMhHuGdKTnJB/9Gkg8rMVQjsc9OIX8hixROMMYFOAep2C4TRsx7 -CLZPeuJE3imX8t5FzIiQl1f9gA9uzhLWaZm2j6pgqy4QDTE65ZfDX7kX/+7A857b -lM+j5RJe8nfGS9qq+l573MZ9o4Yw/ushfQK9ea+8zb6+5OigAyfAi0v5nZMg0AXB -Gv0L1ERicrL8DnfdLCL83k67teDjTghD5TlSQU4u9hjal8q3/pU0m5U0BVlQ+txq -/znPWXMEnn/vGVXtknYWEsx6c6ghc75eJAHA29IYdOYrGBN3wJNWE4gEspBq4fQq -Sx7hhhV4qSTnKrqiyQdU4iiCgAgNRbCLDaK3IX76iCUFFyQ0iQEiBBMBAgAMBQJP -WkrDBYMHhh+AAAoJEG+Hv0uViH6PTHcH/iNzwQ0EXEG/CKVTromXwGVWOijO1gqD -gS3/vTz9SDtzCnE2j2NMdHUfM7ZU6xzcXOf8flbtGOtRNqpWYn9VIv34Pq8e1V5f -vsOe9pdw8dpMKPkVsbgkH9zOYXEvCgn1tWxXXzKGgAehgnCk9GbUoGz+JmIyC8S6 -K5acwoyXlhWcHDLwlP45zA2x1Ipcp4LHhYuGIo7WCV3FYfbZ/XTb8GXstwKPgrQK -zPa5M3BlrDSHaSCU20XQO0udIoKu0szdK9t134+MPIQGBUo7yIXv9sizQQuauU3O -CQ1zag/NUGZucVJE9y26G9EbYnId5qJfuElLN9o0oyXF1xJchbz96XOJASIEEwEC -AAwFAk9iahgFgweGH4AACgkQ1+c/OVSlhojUjQf/Rh/XUM+cb/rpGfpob3iPG7Uu -O7TsXyT4V5G5ufnr/ZKPI6gPRXxvh4TAufZpNuhwQUIOTaRVrWC+O/EErWSB/pQT -jPGik9SNBsmFJzYjka4MDHZdNaxah+1ccoXC2cZFbX2qt4J0hGQMqSImoty7CP3j -yfXiz2iY4INcrGKPqbCrGjyY4yv8Yu2ZNgyQNlv1p8IU74k7/sZE2y2N/X4X/sD/ -UuTojSfRucx9a38sTlMasOXSqd4LXDh4apUrqRbo5twpJrlYDgCv/I40E5Llli7Q -anZAd9gEbeuT2yb2K8BiWdEIbnlye94HMzTE437Dvf81dYyLGNJo8JoyHnFgCYkB -IgQTAQIADAUCT2ObOgWDB4YfgAAKCRBO/jaKX+9tIB04B/0SJgzugDu+1aUDAaz8 -Ks+t7aFf/66YExaXwWej2lFgL1L+tjZm6j5TSZ95mAqi2bwAsgda/Xo425W9vlH/ -wHnFhA2C0pFWUxe0zPNuTh2dP8cXpfz0ldcLvjg3XM+2p5X3xlFIHXHg+Ng0HLma -2/VHvUTyzmz0yy/zoSKTMNYrmqND+HdscASeKfj2AvS2LsMoEXg8/ZatzIIcLpjX -svqFuPpjZ6M/iIVYhdluaHEp7o9lxsr/Dm5fpjzFN7y7c+G2kfxEfE4a5yUqFybu -dFIAT75MHutzcsW7Fdi2DGA2hrv3aUh3EYB9kVz1/wkeMGKIB1J4SgjIyyfJgwyR -7t/tiQEiBBMBAgAMBQJPa6dNBYMHhh+AAAoJEDDzn45QD+3Ua1gH/0g9aBEC0bPc -vfa2erCVpzhJG7USis87J3C3mSHbAEzhDGSu4Qm87s79xiQt+TrUPzgtFNT8L/s1 -ekB9BjO4ltuyXE74urwsckzCNgMuodg21jF6yzAKnjsvL7rrlR1D5C9/fezGFSDI -M/Elu8HTbNX53Lfj3XbbM6UEvaDqRM4PUK2idhq86zWd++3Dh/n+JnxBTY4YLZa8 -1bpPjXsA856velBaD++2eLWzEWsK2GKWqiF4f7n0VNHT/kAaOizLqNR3MxuanB1F -z7tiW2SGZKc7nYgKEYtXQMePLUQdS3PaK8gOP6rMcB9pLHodpC/VFBrAQXaDm11t -C9MCCv+8CBaJASIEEwECAAwFAk9+DwcFgweGH4AACgkQmf0vmSJ6AKKEzAf/aNR3 -wkZUxijY9CVpihD9CH1St/UzljqgxWdjfXLUio7zbHDKFwwlyn6tWiBRq41ao7cV -ctiOuN4o9o/sFfzXGpV9lbhWGXV5+NRXgE+mUYAK6NpJpYjEOR7s8blGJlIuepqd -2w33oxJ3a26cu3Ix1KTgUYgx635bCqomZXU0WDyHk8W7m9Jolh+LJ7GeENbV5OpM -nRs0h+yab0h6bb+YEDTevPUAR2KTqfZ/cpPQVaLzO+ZXl0gIJb2w0JVLjOjcM5EZ -A8ckt7+m+8nGk7lAog+0FAoiGniiBUUhNC+Wd1wQByWsfq/DAnoMITEJNXiTu/a6 -wYJXdt2lNVlEJUMgyokBIgQTAQIADAUCT38QwwWDB4YfgAAKCRBXLCe6W0fbAgF8 -B/9E2WmwMxP9ULpmjE15RAE3GwWLHB8lA6R7AP3tQM76rk8RuDUpAUW3QLiZwFzV -SbInS1XZDpMdA7SkBfOMnBPMLjxjt23AQvzxuY69Z1OxAm/1rG8u2gqrWh83H68r -AVCqyifzsa/NnNeM0Cm5voZMEYF9plO+rucxnMhPE9tbLVWBsEM7ujfqY/vJrqPF -08em0C7gpzJ7TNNtD+yrauS42iZ/3JedS6WDiPnkSZcO5U1Ueu31cs3SuWuaD842 -6xHfCiupWZQvcDav02KJ12c1pBm5VcuOMJBGhpKOvSBq3NJKFLXGG34a/IPCDh2J -EZ/OYcVybO+PbnkbVyc/l3rliQEiBBMBAgAMBQJPxONCBYMQJ7GAAAoJEPQmriXQ -l1eTUOwH/2tT92Lc8wFlEG7kKRTYEYnIoNduWjGC/qv4+UXkgW1et+RfWFJjLY/h -2MyNxF11/65qypZsGhBdVhgCAISWgF6CtcRLOK5PQkAkST/AcLAjzFlhhbtM/qR2 -5fMbWUZBmKi6ui9s5rHWlcLeTi9cPSv+hOdnZc2AlZvTwwZNngCLUfedit+JX0ey -4kqDvTaXFUvvuTpPUfe6nzw3HhZ6jHz7tga1SBAkOK+HUdNPpRuxeW7Z4OVYqpIG -rOL4BLCRlDUIhTnZsWI5sy5ZarwkNSHJcILt8XuGjoerGhnz4cNNZUuQ7qstPHY8 -0+8y3ctAUPQP3hUcpv8WZ7Xiir67dx2JASIEEwECAAwFAk/p2aIFgweGH4AACgkQ -4dagWVovKHG17ggAjxFxKnwaxOLoV0qMlCnh0R81R8FJN+oAYs5t4cN30c2wXKOU -lVwrM9cOAoJ5yKGPFEIVZtAVIkASPSOVTXUd7aizWvCxQHW82oonN8z6Wm39Hudb -KEXJ8lpTvj4UWbmEmsxk7uVUmMFBzxTVdjSMkQ8TMQSa7UCN59DQs3Nl6QbSgeI6 -iAuQ8nNXNlEY8tcPE+8h+yXkqEWWXTIED2fMuCkzbXMuQzNg0yJZ7Y12tuyYEw9w -0gnpMtT/obAjvpum2szLovSV8GEjsa4C9Y+H9Lqb7u7bjMwU2kAfMO6cGvLHP8dj -ern0tNIjzafABxEBKvc7CHrtKeLO/Cgu7ieEUIkBIgQTAQIADAUCUBk/HwWDB4Yf -gAAKCRBwzAmBbwm0tQIZB/0YjXBaHNU5lkMk5fRzUga1R0V5sYHT8bz5J4vNUwbi -W5yXHlQMjRJDLclJbV4PUiY4yhEZXcxeAa83UIe14+BvQX7tc5N2BpSZR/j62R14 -JT03YA77UuCGrOa/4kAI35zuwvtdFKeVzKE2mmlEAhIA9LKkjhbEx1NBVoO4az/K -ca3o/BdhyVMSNwac8VAkjrUzfaPIUQUU5A/SKvFafcoj5ykWFvbHMYJjs+Nu9Vge -Y0f+JkdtYk6+SNmhdniHcu24udZ4uURbK+8RukxjWy0p+bjkv5sKDByIAxReHV88 -t6XWsU5zY+/wOnSjAl1NcLtz702gvtStN0ZumYF7YlLdiQEiBBMBAgAMBQJQfUkI -BYMHhh+AAAoJEFZVJXuLIrlQ/WgIAKH37LK//UQ5/0+CKWfF0yQJgVGogItYPxRo -p0bWQ+Sr43qUFH0xN1lk8ShgjoKcdUbKWZswYrWCDtnjaiZjzScSw7uxklxPU8LF -LAYeeILyXmywKgz+QvbE+Nt2dW3Ark3nob1uaEVHRbG60vHt888VzbNUCMlqju7y -4osDsSShtt+4WNv5kJzVkVVYD7Miw0ixfeJ2A8ZJjZAfOEp+MfbyPMjWDmivjekX -K2Z47WQEqFPh/9IfIlRklY0BdivFlXVQhLEWHMhnql7YHRJQMKtgCDMzY265GjzF -UTRhFU7Ilp028txhGruM1KmUUYqzK+puKzCYgdJAw7MX7t1O9VaJASIEEwECAAwF -AlCVXRsFgweGH4AACgkQDCogFRUSnqSdSAgAkt69xbYexlpLnXezycJSaLrGBpdL -qAEDYdJvolKiYd/pOI4KXwEnNuLOospr1xa8DiCEJxtU7taNncYW1ZL61QLnSM/M -wEFaOOhGCRnEL9X9UYTrYK0p9iNOiU/N1GXgP4YvpgM4XXo4xlKllB/ZeSYh+WX7 -qOF5HUwHM7DKD+vkd960tCqNKE4j62FxUqcwECNmDOgRwSAT+qQwvw1bJ2AjauQy -bu3VrwTZK9u8dG+R8fXJnE9nEHygSDBbzhHoGU44u61/9xirfy53bDC5mVG3TMuL -QAzGt+1BUccrfGjOiZt3bhaxx4lTuZw4McbAjc51rlm9MtSaB7X8Ox2GyIkBnAQT -AQIABgUCUJid9AAKCRAoGOMnewBSjpfHDACSgsXFU7SeBzB5vvD7/hPP/NOzHmN5 -lcqdx9wal5HNwCI+vmGHzVF2Vx4hNGCrKqlgybvxOuo8nvJ/AQsVwPjbxDeBdEBj -z77aKC67FCB/1U38P9B5Sj/ikifqYiYeAZkB2QIYSkZUqUmVAWPtTBNBWA5RLAyJ -wxq5YSMvlmh0auwJEmp8w1sQ9CyWxr+t2tezq18wM+QUoAuC1eS5WpX0wrG98kHU -tBSlKMi1gY6EK6SlhFjwo1DxjuSaw37RilvjQioySMioaA7EGprROJtCzvi4G1BX -MgbsG3L0H0d3IVDFEkRGP7O+U1FrEron0S0ppsm5K7wBgLLR8Ry+GMfig+oTkYrw -cxfFB9ETtzpj2txuWgtW1B/SoEsKORKBfb0jLiZ7KP3rs7jCx9CXmFnjvvkp6U7r -zACtHbn8vzXJI9WedjBHbmd4gdcOvW5Fg2O0cdvTmTPHXSTxkrdCASU6M9sq5gQ6 -EIRVsSL34Q1MIpMtaee4hNbSOrHuQQQXMfKJAhwEEAECAAYFAk80YF4ACgkQ0u5q -59jqvUZplBAAjvz8m6puSNNvw4v+AJiEim/qhEbzkpiMtUqsvxnWGeptKI8VGrpN -pRWi/zJUu2KkZh5PbBPMp+BxiCDVb/eXFz5izGy3En9tfTBCPT4v7YZ6ZUh2J3Af -psu5v5+IuyMJgOaWJNAbOL4zitzSIXytI0W+RXoq0dE6pd+e7598oFli6QnNjanJ -DJz2yY2rHrYHa16JCWUJYQHoFZvQ6jmBEcYWdKODLGIaK4EqZx1T9NOvN8DnzUFz -anuUk46IGI3lzmWM5LZEnFqG9ADb441xW7SAReOVtv85YK6uRJK76/Q7v1cc6PeW -FsPBU1bLHNGtOnm7nwnrzSd5Ji4Rj+ImQRLoTegVLpB1lD+5oXrferkHVNOhb9lH -Q/r2uezZQIpaS/SEX3rsc+YASc7VGKx/8vnOkkGu5AzQ7JgGBJiKfObIoeFkounx -cwABDgdrUDD0hXV2TH2Y9wVsWafSvgMOa19c2Ud3NZoPM+mU0GD17FL/DmeHPe1M -k1xq0fOH3730kU6PIAY/JBIrUYg8n/T0RdVZY+XPKGnHMKctskl2uptwHn/r66an -XHblr4nID2uNvNcKCjk5WVld1HqmCSFbZ47naRUBBH2HusiCW1XJI1fNOvLlnHhH -Xptf5rVv1yzmK6wRMLWKA2EKOIZvwyRZYnV+D8dw7EkgYgjXOBkaUPCJAhwEEgEC -AAYFAk9cITYACgkQYrnc/2YkwaKjURAAyZhJl8Q40f7BdiZsPp6YM4xgDczFYw5N -JgPR9H8cGiDPrCtKXTJ/cBEa6lYR2iB2iTuHoGoiJpfTujPkhKiY9/zWhRnPLicJ -Cj9yEzC3PmToxkcF45yoUGulpk8h4kxN7fkmqHJL6En57ixDjhsXVAsx8In9T8u6 -EQWxbCJTfZF7N6NrH5VkBWeQEOAEPgATGr+RWShqHaINYd4EWNnA5aoaf7AsX1a+ -ZsJgEBIbJx4YHKnyn3sHB0cyrd8np9kzxkd0Qx2HXuDzJ7j+BzbhYc+xtuWjK4jo -iBGDmfgWZGs+IhCn1DvkOv2nZjbnmrd6r90uxHle7QN251In04XGoYtlGyX/Y/i5 -hDFRLCln0nJrBPyAq2RAtWRdNFOCv9aFg2LGZFFA5yD+mGxDa8DcRYNUR+urQBkb -pQZyeDaZRL/NIZ3xS0lEcW95CrPVbMj9GjPXuo/h3szdKzHr7IVPm6GE68xr1bS6 -WHJVf/xEj72LkUOtxH3z8wCxlH+JcIyF5C4ftumP8Dml/tnRXVxvEQXnASOWXj3S -2lytxhWveQ3p8i1TGjNX3AFNT0pPbQSDEgvJHQc2uwovsLu33gZc1CF+lffuNsmU -9RzVSs21UJjVLFQ2VRroQZxHz+rnQ93KSczHRj9iOthi5ouoCK75lWQgGQvHtKtt -lboyiCLd/ZWJAhwEEwECAAYFAk9QxGEACgkQ4P0pBm0MFLHRyRAAsAfu4/JBDfQd -Ez9jnkuzfxhHMZvzOfm92ZTxM2DcXe94dcpT6prYyCVxAsPTCbjHvDcloXwY8s3l -hFoO06gpxtGrmkyrD9tAsuWtftmNHMgOQ4U6EL2PDdbXkz8nyMi//G1/c7vbt4a+ -z+itckX36IKwFE8gb7Q+ywt0ryr7gK51GgLuq6jGWlHCCVbrJqcE8ASXLEw1Ld8z -0HSxVZF9b6C0FrVW0Blmb7mHibHJtSWf3pxEGjYsasnbyL2lzv10h9Qkxfpc4Ls4 -Vknl4eXCM+pAumVwT/KOWYdgFyhfrYIjHIhXsJX3xg4hncqs8WtB74B34ej/K4xV -T0Lb17xqG6C+ZK86h0vdHYWKIbdLXvgVFb3JdGbbZasHzYDYs9Uu0fJEn3sD4tPt -ryXfFObSYKS77356JgT68ljUtuDsjOc8/eO6e847/nUx5tv8p1mPqXPHWHlsDOjI -fgA4zBvRk4Vp1prDwqzTcBlJYEPvUN0WPG0qmJvdV4onRhANaT+Bh2H7pEQ3O7LP -3uw4c8XC6uLDX0rkUdSBNIW+McNKWDp7aSos0fNUzlFfiCuVnFwBlMGWtsSmmqg3 -r2oS+e/2W4rchi+Ie11oKmwydPUdUb0dGK4AqD4mHEh0JhzOaB6JQxEIncPwl1Hq -BDoDg6Bmq5sCTPdK9dOAgSWHhzY30C+JAhwEEwECAAYFAk+gtTEACgkQbzCASdWw -vsMr9BAAxyC1i8YCkc/ZcaMAAJ8UVAuXX0wLczl1AlWhTiHkAz0ZhBo/i8wOY1YX -/E2ninOGLsnsNxTpRD8nxr88RK4sfKUGswfMXVqjla+CZy/XWY/dvJYpwNzI39a5 -dCfv9RBqLwxB9qmaRoma62pKaQSHqw/IjH3x+0S/x+BrD6Af9D9cKqUy/I+Iwofc -R1THV47CFLnLYYbMXX4xBDMNpFUOezhcIhQI0aKCQnRL2fZp3JGOkSGR/9iEuCt9 -0BdpUgh+9qqLjoi3OolgyGrLeogPrZrlDECIidtX+QvzZ0KMtOVO+ScJ037eHw+B -triMiv1fgIyozErG9GDgjeqKxuwLeT2B1iAkRdnKug+XG6cfHavCSs6qM9i3n7rs -7oQYeI1ofh2KX+4ONsGTUH6zbKhuablU+oBOmK8rlefMNObY0ekp2ch2cj1aSZZx -Xd3HJ4Me8bX2Opyh9EyBfoWKAwZrEV+hV4yxgpWyVw5GqKEwpyyhJkooOv9AzO22 -CRI9gOtrbj4JHH4uiJefHblBktyfa8L6q8MG+efRd0PUnB710HkK7Lc6AoicYCX4 -lEVVtTj71dyXXWAoBkvDNzvWrDm3oygQcI+bGkcyo2x/Cd14wzegxrKG/yliHNA2 -SLCltmPTHo2FPNImEO7zysXysT7VlKvQyEDC1cOTQS9Pmj803NqJAiIEEgECAAwF -Ak7SkFcFgweGH4AACgkQcDBDM8LkPFIQnBAArzHHb/9o/yCjiZV65ceHu5qlARaI -x4Vk50F8/CrMwTaBKvFbD3c9cM2LR7yWuglBbhkFZ+CzJDx9ZPJA1OuD2cApmDln -S/KHmpg8E8Ag1ToJrSI6p/bnzc5rGpPmuo9tYPJfBbqApqa0r1eD+/vsCIk1Oy8V -egg3ekBYoilXnvJHdG2PKTFroD8GonD5WHdlwf9F92Dddy2bisaX3Flkcdij+9TS -mQ+0Bvj6env1FZWE2Uq40R6hsvl9wkXQahXjWRtNJGBayuJDyG5cFZDBQh6Oqmc9 -FOTGdtrjf46yHq4u6id1AVMWoZ38cW5g/GNoOLVgPdLD0tP2tpIcO+do01v0kt9K -wQBZBEv8X1oQ4kMlv2beYHO8ShauKQ4D2LB6uJ/wVvCpQGzBzW9splhe2KXM1PUg -oFaAVz8BPjF9QXMvg2J/Mjl3i6Qplqr42nQwreVJHDZcVdjS67s3BS+F1j1RB9N8 -XRiQJq3iMvAyrPx0fMb8dEmfgf4/qhkoTCgjunqIgp9OfZiW/MlL/XlfaQzV8c6w -I4lRyThabnFv/pQTCNu32W9v5b2VLZ8l6l0XuKlwGkOMn781b4MjnQlfVWTYkv4a -fYZCVAf/tGfJJOse8xPiwK5Mccdj/JgGqqkBLPepTNvY1cEerE/1snt4rZc++VDO -9ugOL9whYPrPWROJAiIEEgECAAwFAk7Wh5EFgwb9A4AACgkQU32WWkISaYDPNQ/+ -OHN1/Wu/bjZ1FPED5ODXaqqw/wMIS52eOVtOroXIFoG7m3Kvu3Td0GQwW36n+LvB -RoxHJhvk7LGfZpgX9CtpiLvwnVAGl6cekB5gsI6AqVLjbag6cB1bGila88UmX58h -PkKEjcUrB6o7bVa7M9zQl+YeXxDheDZGuwYa11SoyaWDVq0MgIRmDrhPApJ5f2AV -D/nVwSEBvZB0gbFLrT+UckwGs1v/imZ6Au7VXicmX/kdgJoAgDXM+3/7GU8VSuwy -H3v7gWnrVHMqzV6nDjw8fuUN2CbRhNZiI2rnCCJA2sD8couuQspg9EUrickMvfyg -EM3w6g8Az9/iz9nULGTp3wVy7Lam225ZHgH35+JBwyiXzeNZvPhrjKlJtk38WhXR -3NKAvYzLNFLXqvHs4yU4kTWZX7j1hRg2gplvODKc2uL6Wb9chZOu3unGxTh9wy67 -RDApLm17siu2S7BwVbsR0PbgDEhSPd+UT9+qEHUphIXV2JFLHQUCS/cs939sDa1N -rMdxLEo10h4H9Kb7Omt3g7TH82Qsh4k/6pntM3ohCNjiMxZxhFZRRWKL6XJcqukQ -KUPOQWEDtshUdbZiOX4F2CiylisfqJxZTad1BIWzGJO7ccnzeGPM4WK96Krk0WOH -u16bZy5w96LTtaf32JUfR+RI7GKVR+cp0YmdeYGB6QyJAiIEEgECAAwFAk8JBagF -gwWk7AAACgkQZv2gf0WfcUM3sQ/8DaYbbp/iOA4D2gnHtXqGh3eQcZCiMAM7wulN -UbRxIx+WRq6CCii3xBVhnjw5vHp3CwP4fVm4B++CzVegejSwl6S9/+ncQYTdZ8Wt -6viY6/UYL1OulIIo+P4UmKF6lIy+x0pv8uuvvgONbqaaH3SjvuwM/bdpFaqAvyjN -PusGLgzA005mw8+3VF5g6zp7riHpefWg1V6/3jXTqUTMLHWS0aNbeEuKEDUaAcwm -k0/PuZtGZJjmQuxlURVUhetOZDCa1eeuyUr04pD3QGmsL8v8TIRcL/mpLbuSU7ed -eDfNgcaYpa9TsRuJp49NLtGOm8dliGTdJtNSeyn5r4jRIGQvNcNL82+C7rU+fiPz -xCeXVrA1GaOBYsleVaRJvgAeWhOJY5SJu2IhroU+LCg6Hog7/Oomabt2H7q/Q0ui -K2j6mCeWEEK+bX1WRj+zuNMnUGYuDKB/4WCKQiwk1WiNRRGDHvRJ+5dfQdw++uvG -ceEsWR78z383BdkggFJYD63AznlSikSSXTdDcNy10X0PMZ8ZuVJK5JoasEsM7o7L -8G4CfX1xE+LBaO2EZen+CV0frpTHgOdUHobUgDudbabGDnfSNsS7cXMOXaxJtQGM -SWgBLqfmYwB901/38d7i3EVcEEPWpPeDS2s4mlx2hZWsIVd3cq8v7U+JRb6oigVf -Qpc338CJAiIEEgECAAwFAlBmzeIFgweGH4AACgkQSfqBXz1V6IC+Ew//YmDnUJ8S -oGW7yJAaMg2kHikV6AfBRk17m3uxPNPizjb+BK8HK1ZZvZw5mAEtiICxKF4FCZv5 -47t+EHf+bCv57FnSSJfp4qKpID9c27IQT2yltAEP0n/YRlbgvPIgUhgo6mMaRPVI -ofR7BTcmsjYt9PPHuCW6M0dp1mJX/M6j8dfbp+EEspdzyWcxn3jeKJgCfmXYuNHG -x1D1eZkCGC08zAd2IJhrmVBgT8OdN54kp/KBHNT+Hy+7D15oO6AYJ12jM+FAdITf -5XE0fpQ7Ag80TYV1kVnjCwvTVNLmheXPLy0ghCEPo2mA38mdEMRTEy+FQ0OIGo6b -xWx5RNhAv93jyhXtVgrYYsEY/rE5YhsjHY0RqTc0wpzmn3JsE+/UdofzOdwHwDiE -0xMrmBhcicmLl4oOHKPYi0StEiYB+TLNoQ8yNjA9jPGE2OUxt1lCPDjk8gCEI3fG -od5K0VFglhnREpskfiNYA/svL8/PZAwI3kdSVErQ/ur4iKWbthXdaqI0VylLwg4p -q4eGZcpFXBGNTmGc2uQVJRHhVl+++nVQJsYUW2nn4lsiXzcoFC3B3kw9PXwW55Sh -VHkK4kn4Y2GAdZ951Nzkj8hTujSFRJLFlmCjydEcsaTFKZB+yoNN6h15FWlQTYNU -1ChvjyxZptl/c69UpJC970lcWAvSOeN2DOiJAiIEEwECAAwFAk06FWUFgwiZDg4A -CgkQnkbhOehFH7toeg/6AokFJ5+7Do8Ien9PbccemQngM9j+GFhr0WQT5BpilZ1O -gt0Mr6kQPRt98o+HzwD+sHjBRqqFMZV9XQTMwtKzpKyY0fPSE0Yb+UrWcouzOjA6 -TKOXorMb/HM7xeyBdThnmOArTQ5GBp3t+1fuazgWlu4qMUdnXKO9Ci5pZYz581oN -6yQwSn9RgFdt9VfPYOJGQmaeSerC41kT7efCksWX+TL5cFMsOqewPBsWTZaJWSw7 -lA1jKPIs2t6yyWTezaPObWjKmlIVpmqaX9yS2m9+M1SHTMgNj3scbb2QzLgsOEAu -mgSc8/ZxwteR6jdpzEHK1jeyk+cvkPfFNSetjODyjhgMkGfzL7icqxDP7SoB0MxY -FhGqVOmdzxpNf6/GHFl9CKgvDyGmJVTJnFg8/sO6B7ouY1QATU3CpQFYqTQSl+jX -bvMBSEH2VlssypzfwSn9IBX3PODV0xagJC5OYhTYbR9mCuQd1iM/ctN+brjHIMBD -Mc0FU1Wu1acKh7irzH8AOZK53Dn+tEiiYw3P49I4d+HP3yGcWTfUd3uq9gHGxfvH -nXySf3fTOguAoLbgoHinpQE4FH3t7PJWaQtLVzC1JZFIHXrlAFtxYA0OdxZW+hqZ -GORJ/zqmwCviPouuyLAN2Lv829qtWMAVd33pSnjxjiE71Syl6bXs/LrtQ+dE3zaJ -AiIEEwECAAwFAk7eyTYFgweGH4AACgkQxsDAV3TBeHHEdg/+NRDb/uLfoz+rVdJq -NJPxbPMAwjHEckT2FSUXvVaSJKdrG+USAf+0IQpQ44hlLPV8Ik+dff2C/E/KPX70 -ZUFJnqGCTZbdSLOcqU1lVI//5JdT9xvHrJ+ctVrzFxDU5UGZhCA52mpIEb74wjE6 -/QV+1Btv+dVoZZl4i/H9s53jGYkCnI6TrYTxbaZCJsc0bVweif98VC6UO25NG0N5 -S9/+Fk4AUZ4WoXE+48n86wdNndbvKVIT7vH36F1w+3JpwJA1Nx2vYrKDue6RwS5t -SeQdHzPO6Oqjuz403yi5FkPYWM33xQwdeN0ORlX56bt2O3i/8As0nq1Sh/h6nz6H -yicLbUxsDcjbWoTNppQ6xjHE/x2Wrt7PktOm6UBLckubLGkeGtO3rPUgiH3SDLHU -c+iwXGdEFTK95FR2vPU2MBniYuJGpsDVA8T7iVOXS88C52T1ZVnslQPMh0CUKmrV -zZ/UJTU10cK3yljebLRl8HoGF8eoAVuliW6MR9YfPSsd25cUipr9KKmkzMbEGSfp -7c7L1dcXelB3P9Drb4piN6UxaIZgHWZW0xr9LfrhmUKewS68l28rEipwp3Md5bez -dCymEXoNKThsMC9IoAMi+KC0SV+2ACitcZQl/OM5YUChrGBv2Gg0y354uwBdpTed -9FZzOdbud6Fy4niagsMReMfZ1hKJAiIEEwECAAwFAk8qGi8FgweGH4AACgkQoCJL -U0tOkxSCXBAAwoN73M/13JWt+3Rgdol3WGplLw7yawEm2bqPqt1dx7kKH2iCNDlH -LkQNWjf/uSN2thQJ4DmRdWAyL3M53ltAAEpKzDx5q+BZ5sk5foHizJdTGlnSrzL+ -c/2qwsO2BqAEVX+v6NbzBI1Q/2gHzkSXYDsmNkxi++ChsBpCckSDdCV3E9rfs8cQ -qqKPmH8KAr3Vrvzl+uYRfljoqW8FSdQuSv+CTR6RQsnuaAZyM7Hdxx0OwbUdpu34 -0Q+apr/YMGNCwRE9U+vh6BesKu+HBDpv2dF6J5tnLtaR9xgPM+T4Z5Ep7MFEI0WY -PuBBOggU3gVJU6vkUsSU5eGyHGron9ZaF1WxwoQ7n3j0IBDKx4q4kUf7DG7gZYdN -/B12VxyVDJ/BIxhy4DL0Y25ZwvSdexx4DewcKj1lKuwYvsY0OROw1jakvlIIX8uJ -GS8h4Tbr4NA5v1+VwFuzXXK7oHpxfKoICYx4A2HIDOP8PnvdGp3zxcYn8BtextIv -3H8Md9tNVJ6yfdB/szQ9nYlnsVrqmHLrdMlRdl+Wyi5Phje1Ek7JDxOHSpVU/18e -kyc4ZXVyepHH/gAVGOjW/2LF7k82scL97f2/7yjYvsBguc9dMOLZoSiL6dr4Vqtb -bJiqJFEM72Dx1xv9pNM92DgDg+aDceEgvoWXcTwic/7tT3WZtZXeqjqJAiIEEwEC -AAwFAk9QCiQFgweGH4AACgkQvmGIUCLomwJJ3g//Ur+Tk7qibcvI4UTEVfvwEYgY -cdtiO5XSEYv/YIbS3CufrNnnWtFjbT3n+spAg6pMlU2nD7201HKAe2U5UZzpg5Ug -aecfrM4uM3VH/huZGWiJhZnjMxrrmBuArb1yxBQrztVc3mCnLa/mbfF+2UscCv37 -QeEr8cdTkxMpU5cK5qmRuLaUKHswUtr+fngncX/0CliGN/W8Q80HKF6EI8KVmUJz -P41lYbkKoDbUJ8llTGUTN4EJgbQQvOnrNGMhHdZ1vQq6IighkTdlRHcLVIn8JcWi -JFVIzVvGrFudIzEJRkjt0bG3ehz/UO3qqRqx9oJ++CG8yslLDGKKrsOLfjCAj8Dq -uZhV2yz8m+yEb6y6Wme3FuHJVuVxFnrThFWHTWrBya3FXHBRbPHWNpmvXBdmq6L8 -GlvwRe/KRtqRKNhJU+0/1wsE9ZjqfIKO1KugTIEb5MtEtVJ1rRBZp9/Ok/z3o6q0 -57pM5vKhihfgQ8wGTA+SnmdBjfFdFThmWhbUIFGs8y/Y2QxP70zY6y1g0XoO4b7E -JMCi8Hn9rErIY5vTeDDnCz0tR1k5RcfP8vM5rwMFETlxJkF5+hqxVN/5SIP9j19h -9o5qU8CCSeSe1gk6+32fT/u6DJqyp8Y+npu83dzIg4eAD9cq9sO0RVdxSYDaDIf4 -FQqFWAlW6GSDz73SIymIRgQSEQoABgUCUy5JUwAKCRBNLAz81YpnoRZXAJwMlJri -zpUj4GE4fbR73DkR1z4DSQCdFy0izgwtQfyhnln2vqnFOGk5ME2IRgQTEQIABgUC -USN+aQAKCRDDD0JoKdxbBzoPAKDSpkfJRlQ6sAH/eibrvk1HlqEXJQCg2RRbXCL9 -EeYOTjk41rKIwMIACIOITAQQEQoADAUCUmZahAWDA2y1gAAKCRB5pifcfV7CGR/y -AJ9l8TwpxhXdCvA/7VC80ZjEN0wPtwCfdNxHC1PtAl/DpNqbGNpCOhuZc02ITAQS -EQIADAUCUQ7U6gWDB4YfgAAKCRB+iDRqXoXSA7iiAKCqfNhog/zAbSAFv9zy9R9j -8WCRRgCeOioe1h8aoYyZ/dJCJYUnTFq93ryITAQSEQIADAUCURu7BgWDB4YfgAAK -CRAoE4P6+xJU3TACAKDi47bi+PoiF+KYGMMMIywlvlySSACeMfO+zx8du35Pw293 -Soeg4CJO4dKIogQTAQoADAUCU1dc0gWDB4YfgAAKCRBkVDcAMrlDHCq/A/9hcSOP -kNaVRXZm3+EbyNYjVovWian3cVUrji0je18NmDvrkjrY+EpxJyz+l8NB5nX3VtjD -zisLtXu+sdDHqVWJY50Y6OI3LpotnXE2NrVu1bXG1mCw1iybpodOATt0Eyp6ObJ3 -rnrwEVXTimiMzo8bKO9iNYQfyV8eivAaQDgp6IkBHAQQAQIABgUCUqDzvwAKCRBa -PSKQ/tUqT0EbB/9B1NsJ69YL/wl3DOa48j5PC3O9jn1zMmTalas+2WKXLAIeYlo5 -kI6I2XYiDW86XnspJZ3JIbZErDRX/wns2UxR1lRqDUZvgSa7stLIK4USC7yJvmcw -Ncn2SHt7t76YlcaGFwqct2Zejy3NMSLlLSD93La+La0c0t/MLDOBGzeRqfb2rGjL -QrqQnaQDLsg1iYDphhX8AIXBa793RVNQPUcyvhDkX45soQZxf+MQIMeQu+SW3/Iu -19RwJeCB5N4eUkI7nhK5eRMm/8j7AI/9rVq7mlGHsYEH4e4M649N9Yb8PcCOiRAb -hivcd7ycwalSpAdtH/Kro8nhcQB2rsii10oRiQEcBBABCgAGBQJRdT+8AAoJEAwK -1KV6bYuHBv8IALG/ocEwDEfxIZXPgJ2+ohIKpc2DV2l8p5y56Ja9GXtgL+LqaBBK -BBmfBaxZISAG9aXIt/BY3PP28vJjaqTmxu8LiAo8JILubuZRFxOjMchFtY+SRIZ6 -w+pNa25E1z7937FAMw6URwo9WzJOeg8Or7ePf0gFVMEw2HjmDOQ0KKWgHbcLu7Hu -3Vp5v2gdTDw8HCrQcBMhaYC9qwzFDXK8dIMFkYA8T0UErVOp0flYFNM0fxaMdBGb -OyGp8AtzxDwgqUdVJKwya7LjZieK5x8fg0mvdCO1g0Y/ajM4is264dJQgH2y3EMI -vFyrpmHcxYbgV7Vi8BnqFAQllUH84HdEzGuJARwEEgEKAAYFAlLvzNUACgkQhncP -LKKldoZu3Af+Ip1HC1aXiKWyrqwhaVVsGBqPTZ90Ak39+/aAD/MyGtByrWlaHvUr -S2X/zvcnpl2ScMc5EeWFNeTulDivJ9aF3zM11+sem+FJ4do/jqijMCjkE/IbriUj -p8aij4NxtC2OfhAy1R24ctWzAUyAJ47q5RCPRGzBMDQBPl7SZIY3+NhU0rJJoEDh -R87iI+tTxUpQmnXzdNFspV/M66bsM0zW6+IqlLiacurOhEKOMWUacGmAgbFXerNP -uMY38O8lsdaMwwV6HP/3Mg2ecpy3eWrSniAZ0nqEJRH7u8ixmbFf1MY1cyjYWEne -fDe5F5jcECq7eOgnbQMLt7CsnIugjFqW5okBHAQTAQoABgUCU/8IEAAKCRA652Kv -+52uGoT2B/44Ne/VCaTz8xaw9XQFt4dhF1PJrL3ws2cAcs/PZnG9Bmz5BLdl2nL1 -HsUMAISbMZ7eEWNUczOUiBkq4/UATmedCfL9xHN4znQN12bqTg6uOnaYw53jfNIc -CzwXk1npmSGoBXbRrOxfXqXYikGM4jmj1cKSdBB0ah9VpYztnFJNdcxbqrkdYNOg -rjTtu4WCxz7kO7NHo1p7jGjVho47gsNPybpeVp4I96Ht4xg5NwicBuYb7W/RClMt -7ybVzEv9OIZBJlb78aZ7qYhq0MDhmEs5ZHVDhb14H4CtL9bHFtgjsIUh/0uQxwR+ -GsUSTBk4P4BjZnVwTq5t+SwLLrBnMs9QiQEcBBMBCgAGBQJUC7HuAAoJELHGb2TQ -RMu45H0H/2XUxZ4FgNEcVlwxKOs0DWsPKuxpBWhE+P8Xqo5eqHwGL+GsLoHlapLG -SZgP1xTygPxW6d438nzqnl7NbUAHI+22qRePC9Ozz8PDeO1zPXXNftO1JvpIkmIc -EdBR2xA8nUwIMBy6hebQLO8cmIJ2b56Fgkv3t/eVp6bN7EYSsjptiazwA/VK3KR1 -AcPakDC3ZQzZz5ZN9NbDOfsGZ/iUqqeLZFd93252O7upvDcTx+SJlz63mK7pZ3Xj -nCPW+u0Gljuedq3BUTt3Y88C8gpMCzOi9ReNcFCjI9xla4kryJI9wi+JLJ1PEILh -HKsnsGs5BygqloYARTsk5iJwp4OBaQSJASIEEAECAAwFAk7zALMFgweGH4AACgkQ -JFNQ9gGHjvmT8gf/clU0l05zyuXp1KV+xWzAvnG2tloNP2qG1FViIA6c0LU/ky14 -vIWW+jaKf2nXgFS7sjIOUzsv/9t5ucgd+Lz/0lmfyaLdEpcI8GSzWipisOYILcyH -KqQRrLaYm1PrnO0WNdkln1/hQlNQq5whQx+j3/BtZkjEbNnUkUXrI0dndW6gRGwA -JDwQDm7kPiTtBqYAQRRCr7kJx9XSxd1jBZENmLcq4wee2hMmXISdU+zBM4Zpixuy -9kvY//////////////////////////////////////////////////////////// -/////////////////////////////////////4kBIgQQAQIADAUCUM+7zgWDB4Yf -gAAKCRDeda+ctcD0PQo2B/0ewE1yEQAuYC8FZKVfXhIbsRZUId2t+QeXuC4rJWDO -f29NjPI6r4CHWQXADD/QjOVZshaFrL5uVX6oLgrON4z8BihmIYQ3Ah03OYVcoogc -9uGe3jzjwJH4Wt5RIUNO59ausMZN+o8JyLuBjOnNqt0SJZkoZ6qrEN50yUvJ7Z28 -0lRz3/mF9cOL/e4P5NHhjefoHTcSco1x23ZxcBF5+lQ+qOa8RGSonWnOcHhQw3Qm -lzV16wwqBBWjGWI+PWy0bnRkqWTz1aXjsEfa0D1jH/+rxwiDaZCO9a6G5KgH/1tX -kpZCOeNjXeeAYFm4gSMYFw8CIO28QbaBRmMvRoQz5zwaiQEiBBABAgAMBQJQ0kCe -BYMHhh+AAAoJEGzbhbFD93r9Gh4H/izEzvsDQQAZ6g6s+UCZaD/0NpGnooQSuk6s -epL56znwZdB9UUHy1tli+3NPWPeBnU9IrgvoV9Pf9Lgsz0tBpeIYI2qIsVT3kkmi -vkT4CV7zk+1vAjyVQX8blPU4rvJzxmusEZ+SiBNj+kV9+Ni7TGjpvLx1Lk3txRVk -sXLKG7vlgU1lTVqX1XYUrhmem82B2+3UvDKtUvrAr5wqwyLQ0r7wtKvdwNDImRSS -UjqFYf0gMi7O+3iC/GsOU32ABUO++43Q5B0EW4ZBoFoegeScS5pVotXn3vvsLmJG -iwFv4QDN/X5YdL+XVgHQCsMO7jOAidS5GbUUhz9sezAb3aeqbyeJASIEEAECAAwF -AlDgM90FgweGH4AACgkQnKN2ZlJEL3MuNwf+Lvy0+SLH2uTnnhq1IEKl8tcdtx1z -2gaWIlr6Utv9mH/TKRG29xF+uJlYUHlYsZ0FuF+380Vrljoo8YAAgtuAH5zhFDTV -fyc4LNfP9unUj385Fq92p6Z50wpNeDhyD3RO6Fdzyo5pnonuf3nMp53OgYQA/kql -I2pe4M6GNVUXMeYao1TxugGGmo9W7ksvanCOJje1DuoL7+9i7zdbBv8wR5EJsPQ+ -F3o80XqSPvhdb/ZaavJPq3NBwFzu+ERCHNEfJ2U/ChQM3Nqf9pJ4zteAoc0GF4RL -jz8BtqEFxQwZdPVT688ny/G0EZFncXQa5PHJ+4JjyGPU0M7Lq7j4f3X9EIkBIgQQ -AQIADAUCUQV3nAWDB4YfgAAKCRC1q8LxEHnvxibGB/9eTOill5N70DoJ9KIoGEPY -SXf4lVzpj6OoDlghgFJ7rblFn8OwS9n46108fc7JeqwnjyOlnlyn16t2YizU8ILW -SwSjFv2Kovsn3xiq/VEkO91GmMoujHsLnXyR5LUWp+NtZcn1Qo51xzvXy5+jJ7lo -gRlfg2lPQ9yaLEbmDSaOIwsU7gIjGwnTpDHYaas4ASGaH4Xhca3fCoG7M/Akk3Ps -SXGR0OcnquXlFUjUc84yOlA17qx5fDZDTEq8NKiN12XwG/mZ+9R9EdimFfxaySs5 -JGlRs8dvZJdOTOnjqmLUQFDX57J0BWzofz1vS0mXKX4fPxM4zbC8fx/TNs377Rt8 -iQEiBBABAgAMBQJRCctgBYMHhh+AAAoJEG4NrSLodIPce7YH/2vtmieGJz5ZVXYP -s47w6l1kXkdaPiVFx79LSHG95VgC8hzWk5d2MvIEqTIhPIUes97JbXIg1LP6rVhY -cH6hjW3QKTI8jBYcZUnfeAdAseiFY9baDMdKIlslgFkhRF3A/gONQ+CS1KBQs/kM -GeAuqxT2hXb4++AwxSUvIhf8cAQcsbkl5pIIgFlb7VgxokLG3BWukyl/u8qoHdBs -KFoS/lk62wPDk+Z7Uk5ocvXF8Wg76zVHf9XjqC6Gt94VxFssQWNNAlGuRGydm3tH -jfxL99vTfWzvADUwRdyWqSiee4rXFtY2RGj0kAE0NA0mhK60JP8un+G3Azv2c3tj -NjsZblKJASIEEAECAAwFAlEaiBoFgweGH4AACgkQMw5IUvPhIbOPnggAvUiiRdzQ -rxdrYTZpVSmmKtphQVEEtbEbjDTW863K0IU4Br9a+w4CbkmolVjbL/JzJs4GIkIu -QZe230B1+fschERbpMnvTaIksIEX6PiquZJIkGThyNwtKKi+3aKgnY9t3T49gNDF -GuK6OpXZEa6U6qjPPLEhv1MJyB4un7vMp6wrM+crEtDaNKMnZL5GdRj9i3kApXu2 -uNCk9vTqTg9rI1MgoyroXmaGHYEx9LCEMxugdt5dZnRUL3MU7TDZUsR22RncUlyw -kE4q+ajNH7hm72CWyGHGY9CeKBFbCMUrtv3iH784IObiESl4AnaJAe0sjh5GUeJU -UdbghTJo7TVIFYkBIgQQAQIADAUCUTCQ1QWDB4YfgAAKCRB/FNs5wgfyKh2RCACb -tii4VAFr2oAU7hi6JgdFTCK6RCTFYGAXcsi9vpz9iyz7jYRZ2Kd0Zb1pR/N6ix+d -8oxHt3mebsrSsbh6hSIOcKoVi0S4XLX7/uJ+17BKBg+D9lOBkri/ejCNBYYAm4Mv -mDEQyzMKx+tLfLZn1B+76rwfd25GKRHgUfFEMZwMt+OxePoMJ0wRp40/L+mUCh8O -sIdc6OBjNGJFz4SQVa7rMN/kwQpUhJ83QRvDHBjUzaH8d14jtG9x7xFOWG98+4IC -q8wYm9vkYDy+VShgOYX/e+az3OoQb6QeezhIGVOKbnAQUwVZPxdN9KMe0fMzARRb -KaRWcAy89G0nznI8tYMmiQEiBBABAgAMBQJRR+2JBYMHhh+AAAoJECK1E/AIC4YP -JCkH/iGUZmGFzlrQ43jngXjBIxhL678yxlGLlGHHJi4RnGC5B0Wv9acNMNUWjiJc -Jqoq6e4bM+3DsJSyhrCH9T4CbAEmvepR0PxCbuRsjLIoPQx8oZEWgUiCYcXIJoaq -b8O3XKcJuNPEmgCf+ASiZ0kQSEq7kcuIBozBZ2GwJB7X95SB4BIMI79cfP4WYG7X -NYT0N5PnkIU6G7UylI9Kb9AvHFHWDAxnz/Gf2GIeh0v4UNVa+lgZhHe1CXQ90u2R -FYSt3Th//m9tVba5WlD09a636lc0onW7DYNdJSXDyrHyZdja934vY9ci5M4Ph4ii -1V4oQCFqjVAoRZswRJpW+lOmyy+JASIEEAECAAwFAlFK9x4FgweGH4AACgkQRhIr -CbKw2zZ8DQgAiF8Y7qNiD0lILCm6VfIXycmdxU6RQnjV7b2v/zQL2jktMW5u8yXg -97ElPqG1p1/YB3Dmg2OyKXpy6wAl7Erx2YNWA5JrviPbvZiDv6eicLRAAarIyksi -SjJmGNyAhHD7zPoqyC4XCY031Jka/vgDAY0LV8PYwrlxkjeZJfZhLGSirbR/VKMY -EDWYx12GVFtXC121zqxxg2sZrz0QRHiGOV4Ndfj1jT3/Nnckmvdj4o/lAA10bg8P -6PAKJ7TNpOiMK68QfMG0GfgDjd28MQF4XW1niRd0/ENbHRW1INiIJVAjmbqCuhtm -6XUZBYbCkVS9YpAO3bm3J9YLgV5U7tlJHokBIgQQAQIADAUCUh+zoAWDB4YfgAAK -CRD8Gtm3ozO6PHHvB/0VWgLQywlOnBv6sq8BUya05XQT1hQu8k43GNKyJ8AwCKAZ -Cg+Sr38QOrjM+KIaB+TXLoLXTjhjXwiw4wTq8U77muZ8lJj6jFfweS7/lcn2+5N3 -HWcaFzpAhg+ZuoGdb8RVOMNNpAx/tIxQfiCga/lZ6GDNLrCLD6l7JDllEPxsqWoi -JR8FqtYLV7IrCNL66emVBaur+iLmIOwsmev7sbxPXL49FmoQN6L5h+XUw/bsYtb0 -Ug+RSdmw5H2HBdseF8mUx+jl3JpX71vUSSdWVwCx13+j3Eb4oG1p69E8qX7UJDRL -AYor84BMckCST0r5zLqMucHEOsAEKe+EiPQVFprciQEiBBABAgAMBQJSc+bIBYMA -AVGAAAoJECfXpfSJCkNr0mYH/15FLdF0xoVyqoZvCjYTQAPicuGdfMk3BpqSitRl -tWFAjsVL51Br8h5mjY0eMPawHlVossp50GB/iP3sRm7IHCS6btwfk8YZX7YNJKGp -xU4EtN1RMaOErtqUyR8nKr9ALHWQMkugXL+MVITpSjwDuvknUubnu/sP10+gpfc8 -0VVwZqxuIq3q9/KBKfpQWPUnPWQuTDp24nWWGx9cLzPL8JqLpABMZ0pP6nuH6hWV -rd72vELZPuEy4iXUwIf5BOsVyCejyW82pj/M0AOaHtqUT3v4jddkjB/rFVC2j7OH -UPBW/ssnCPVINm5mxzO76IEgFjMC7JB0/8RplbNWH501YKeJASIEEAECAAwFAlNF -UgsFgweGH4AACgkQ02GfakcGiXRSOggAqI9GfcM4qgI2vJl0FCMRDjhsWvjmeidQ -l9h2HKgiQKRUM97uVuBxhGrsyFs6wsz7+VK99CtFJpJdaysgsNTt68DOmMIv649s -wGRrMMHERbUsLw8LH+nn0dDbE3yjchXa7cOyq0fyyZT2TZkfq7PP5pHsErXGnVz6 -s/dqQZu4sYdSmyOckHBzUA7aUpbbPyFnSZKW4iQmKFDPYDtDoALpgc82m4L/kgYy -wSD8DQIPY3g+pBWPdCCIzBUnx43Aeq5fY7nqaqH8CA0tqbXLQz0liwwgroTFjNgH -WozOYGOgrWlW5AXjoBGkZ3w8L1zyjCkjIsBFN0A8UwlF2cLMzo9KMokBIgQQAQIA -DAUCU4+YQwUDABJ1AAAKCRCXELibyletfFc+B/sHr4UXMbidUy0SWTX9loRG1Y6O -hCJklNW1Wpx98XwMY++dCY4M/r7m4L/MyPeZD59QAqlwzbz/NusUOp3SgIV1NJS0 -RBmLMJUUWDdQjT7ichMtHyVEs//N8AT1n0YI3XQVb1O36fA8XQflmbPM9Es1F+NB -isI6S+K1xrEU7F4UHYLWlg/HtWWTbqXMEWN6D3MJ39Z7Lij1IPezORAKliuZe63O -zzwY0P7cOb1sXj7Aiw1dqlEooScrLw7OO8Z+HI64Ha5ZQB5vELvPYeoT7YdrEn0P -0i/64aim9Cwda6kI/vU2HyR/bg0krlR1NB+t9TiFdTuouYUAhSD942d3Nw8KiQEi -BBABAgAMBQJTxDCtBQMAEnUAAAoJEJcQuJvKV6181gQH/j5X12IKhGZJf7ZQ1ft7 -xk0yyJ9qq0YVvn48gycjErAWXJTWPTagkkqBRTfD/pJEGFQX/pWRIrSE8NMaFfn2 -tpod8jmAB/3cWYJ2WFQ5jyt+/jXDWu/BsJi+HVyEl/XO3AIHP5P54r3XezMvGRAX -HQoEHnwdY23UcefJaNhq+833MrC4bXf30U6j5il6ypPf9XOTlW1Z2G3nbG2MXD4T -GbAra3HqSKLBDqsgjWmI19/4aQ430oweejOZ9yCUsYgTtZ/3ojTXyfsL7GzyDhaX -cN1HZHmEfF7mLK2HmKjloWKg1NquWGheoWsSzhhlqNllWiOAMUBSDHbRo/sdzf68 -O+eJASIEEAECAAwFAlPMYnwFAwASdQAACgkQlxC4m8pXrXxfeAf/RY4+BWjTlWH/ -P0EboKaKY5mFem7RdNw/7BmftjmQ1CQhyvWfwj9ZCPeAxv0rr6oAE4TzI2IRwkhm -wACIv9VPV/ZF1Re1BzeX/a+05Hcn16U/UPA4sXUaC8CTSIewfUWKvifA9Si2f7t0 -lpb0lUwhgu0pOZrmetW6+qF89vDoB1R6m4FcPCYBQGQEduTzR8Lun5ai7qSm4WCq -r0DA1udd79ZESGbADB1q5dEw1RMU9ikQkyp4GykpxdfvCIBu+lXh4OvkDzbGtZN9 -qFcONE0jXjXtDaS8d5VUWUzBD2JFOdHeFuiMn4xfR5UwAnPX5yqc3yMyOEQRbSm0 -vPIvsi9Z8YkBIgQQAQIADAUCU93jKAUDABJ1AAAKCRCXELibyletfOMWCAC6RsQX -a95iuBNJN9tuEagi3XAIGUskEKCvtPeFDMa/HLQVRsPfkOVTD/42Bd6VFW+phyZL -mGCCZqxclsr0LJMK35q9DiUQoCjrjw/53zNBDhZnPE/tT5rCitlS2sxYeseXWnRQ -TRLzLokg0f1X9h48zdgrpwpRGzneSgSkyB7J+fpD+RjuAxupXqC82fAuaZS4Odzh -Ue8MWlGWI8QTy5BJRXi1lqRwaVK8KzGokEEhduw4C3D46lx+CWK7DN2NiprgqBPX -6SjGLkIuf0DElhuJQqpbii85okizE33q1cQ2MuLOCG1AN8oXRJFJaerct4spx6zf -J6lDILcLqbuxa7YNiQEiBBABAgAMBQJUANNxBQMAEnUAAAoJEJcQuJvKV618/aoI -AI5rMYgoYv1g3llF25RbpTgJIKFJ678yDvd3esiur3pyISl2ur4j84gqBjJFVNTg -qH1QZx0YOdS4K2jJQcS+ZLMwxwh+rFRR2Z1AXn0aXgCjPn6dvLNtBz7cvXHTRth+ -F6yg/MrT6TgM5L/xqhXJSUdFtpmDS6YeSWpJ4cuZqk3g3rwPaHaa3MJQSJJwHm8g -uWiiXCYWTGoE/S/tq0OvDP74T7HuFblQjWl/UUruiSZCaOm1ZLyf9IyCCaWYwpr8 -tPucLPqwiakodAOOk2i0nqeqIhCMlxw8uiDK4/4fdoj+yggND3BXECmAjrq2tmfD -QvrXN4f2GZ9La4dOeke8d/KJASIEEAECAAwFAlQSnngFAwASdQAACgkQlxC4m8pX -rXxAPggApqH4Vx6Ja7PMBaoTxAgJXg2lc02WH3piiwNn/9DAQs+vy9djeGW5O83L -Vg9rJP9lino/F6S1QIXC+ZhqmwtwvnTGFDDwWCba+Bq7/KvGK3OTqUQcKJXKKwQ0 -V3as30Dp/5K8tZNYM/0kwoTCgUv3TOmq2WCIvU+XDpOF5L4F/PYEDzJq9UmCbbAg -3SpvaIb0aR3NQnby0NMG9DrfI21lNKRdlnJjWTKALeKu4ihU9n609uYvYl9y8spI -P4q0CWcdb9wEdLPu/pg3koYNKIlihc+z9UjUwdJzdrgnq/r4L5SElppSs43sM2BW -fjlHaHKUb4ZHMSehJJ1dGBL4nZCcp4kBIgQQAQoADAUCUZRg8AWDB4YfgAAKCRBh -1YYWOogkIoUoB/0VOBbKVrkGSwbEG5kp+SBjkUKoBfCpG1NMbhviNUPB5cBe19V2 -NI3Pxl/Y1PTdsmQTwHRaxV/lKvlFrAdtYZgmNhQOaU86fRUkqm8CFBYL/GyKaoVB -EhmO7ST6wmN7cWkOPNueWcvjdm7ywbRtHddJE1uJn4OHHTWsE55WetbuPOPCQUVq -pa/gNt/TE4t8kxPqDoiiAisbWKg5GM4yoXTDWqeoimh+u05Y7hKsPPCQwfNJyAaO -16ehOMBp9mhDK7AiJxuelw4iRZ7kXgikEz2xmsy3SiJ+hg2kKy9cF0fKJSPVsbky -XDnCDW8wqWZsX5pAtss+fRr2xh4JiWpwIsUwiQEiBBABCgAMBQJRvoeJBYMHhh+A -AAoJEG6iiKAQFTfENT4H/2DEA638GgZqgocKchl04P0GpadN15mN9JyzSCeZLWM4 -IBChAzS4pOOBw1DzUlg1YrWpItYyXiUaqGAJ1yCwDO1cb6n0qLq6B8bZqC0nNQLS -vO+hCj6dxej63oCv1k1o1aXKZefGECavl/sftn+3vb74mx53vLoJ6dUoUOd6JhcX -rliqotBkjPswxg5CdWopEETV+1+kwkJYRtvaYpbTsGi/z73rT6+D4hJigrulvMTh -TJycQdBupIl3NAvsPUQpiVGbSzrsGhpMy6n7c/3BwDKdpCjujjyWnGwjaMbmCcsX -YuU2tw/P9Q+TkQ8gE3BHF2A3LtBCDWCqgUJmuinAn4uJASIEEAEKAAwFAlG/e+0F -gxeOLQAACgkQdTLkpEd3Fb30gAf/WB2664H2YEMQcT2z2mb2lMKGcuHK7TlU5vxX -jnikb2JaPNGAwUYQE6gWXXqipweCLmili2f+3c8vFsi6dAdJUQdU62JvXS21u3BH -X9jtHEt/3/Yzv/DO6h5ZJ4cXrsOYGmL8eBJnKbvI5b1ev9gUjgHy6hJgJn2rNaXy -0mwR/wUA/Z+rbROHC8CXUSRNfOpa1BNvSaeG0aUEbVDPdnFSjoqdQ8kfOsYJxpTz -PdX/P9Ge+8vptleFjyF8hue4TDrSj0nmEl/Q9Xd+UhoN2uGh07dcm/j6mgB43sNo -N/3TwtdkAf8dkewkfwOHJpwPPy7Fc/e9+36dJ9GbXUA0DjsROYkBIgQQAQoADAUC -UermKAWDB4YfgAAKCRCCQTE4VaMlRVo2B/0Rkr9720p9ovwqFmYoccExxXIUyCuN -bxJoi3niVQy8xNIeS0ScfZoEgkXfY13Gqb0JneGUIkaKrbL1NoY5zPbmgUHvv4/+ -zqt7iOzFGx64DvS+UsuhO6QbuB5f5oQji2hIUY5YQ8P4PCS+r0ZlUyV5jDlKAb7m -Ek2JJMQn4JRhHFpR1lm9w86tp+h6pmIgYIvdnZVpA+wNrruMrL5LtrpJkh/mnsiD -tpmsx0e94Ppx1Nfp4mVXbQCkPFy5qGu2D5ZXwXSOKr8fjyESSL8VNnByCknTXarP -Qqk8/m25vu7zO3DCPCCBnFWXv0or2nfLIaxkuNXfjs/uWJ7Ydx17lPNRiQEiBBAB -CgAMBQJSB4QSBYMHhh+AAAoJEEwzU0KTK0+6SEgH/1Ca/tBbo9+z08GeVoki2ozb -B8en9D0X32wZlkOpX67UxlmUw9FziKfxmiUbBJn/woAThISU3ASznQdCcjLRYPgX -1/RgnvYeYPaVIF+6JxR3AQGhxT1XW5cYnyO60w60095hJS8IgT31OSBHbPRKx2jk -zGkZ1ZoHIcbxazfKk7kzYkka3tSQCMYAzFxjqqpVJhoba9N32s+7x6g01DF8HdxG -Sc86HM+vn63DTRahz37L+bKkePULrWqEzsMYH7VGEB/2WK9wb8NGWXkXkfnbX1UJ -5hC28Wa1nJou+GDN0RxqDTVswH79BCgZPgA4X35XL8Cj5auFb0AB3zAp/J83f5yJ -ASIEEAEKAAwFAlJj5noFgweGH4AACgkQTEPPI3Oz2QCrmQgAtqeQA6veE9KDWkn6 -aTGK48XYjalMBSL+e2SG++u/aNgxtbTXOi27Zp9g1aOpHtQDtw7eTjC43m6ORjuQ -m6mx+3QzCEGOtQYBO/JZt0Wnu1oh36hHUwS5TCFHXUvUer2xGwTpbhAC22G0d2Mx -7vAQ4n+EPh85NKQyrc7CzsiVIARZl5VkM9/KZXAdG+9TVtnCW0KxUdb2yBxB9ygc -87f8/NtjD/16VFAsk4dzblyILw4RaGdwuZek3I1vi2eppHLPrSuc9I9I1v0mH+wa -bGMzq/BflfE+WPcyGnDBzPLlnKgLFf4NBB8kHLKAtMl7INknAp43ujBWDMXgQY9i -4A3nx4kBIgQQAQoADAUCUmbFsgWDB4YfgAAKCRDPN5TLU+ME9kWFCACJQVo+GsGg -g1PwS7d+XXsmHBOxnajfo6a4nxFmNAE9leZ3QD7xbz09UobAuxckqftrYFh14iaq -d2RBJJS3Pp0LmVn+o7KXQQV/2MqRXpIf+e36vejrqrfQdpTFqW2KtBuZ4UmPnhpR -58yIShLzvKgDhY4JIr6LNwWRlvlivJxauYW2Lv7CV8lPTBdrmMxA94B/gI5BRDuo -Yo837fJOXjulfz54qiTXX72vFdeR8OkdMlzgTrHVdUTcbDn9olfHiI5bk0Vip3xV -OX+r0juquaAfG8x+DPbjEpAStty/+7SBQBmk5+c735MP2NJrHpUGDlnFk0Gaa14Z -gcXmYJE0JinAiQEiBBABCgAMBQJSrK1VBYMHhh+AAAoJEC0k20fWyCgRtt4H/ixu -Ge3DbnYmaJA5Sv6FCsOtzz6uOATB7DxPevqKatai0iSU/8/jtd3G+U9MlA6sdIm4 -y+vSGPPVbM2zSZAZ3zA5/5Lz06D2MUQOAoWwD8KfIcqlrJYaTnppSFLlLxMoAaEZ -3PXSfMIKuI3+3y4vJxelBPSu6JA1wm0zycPX1gdks+kPyXASo7fnAoKRTM+w7EUR -Dn2IyUx/scVnp9o4ftlq5TyStG6roxL2gORPThGksYXOYvk4mH4QK/YyqkHCsXsQ -M2v6tna7aZlD+C/xqoeYQ9PGVOFLwAvaEJS+JL/ZhXG2K9zh/IlTCoNJUMDHVZ8A -YnuxDRRkGrhh2s3uALuJASIEEAEKAAwFAlK174EFgweGH4AACgkQYrD5ByzA845x -+Af+PN3fufIj8eSVoYKZcmocC0LKk1O+mVs1xzfzPazpIqtiJm3y5JPmULz+CAUl -C9yUHYxsf0gSVcvRNwWM7pA+cO1kW0HXCplhHF1ANjy4GxsswTNrY46H9tG560vD -6l9CiXRH6brNBcR3bTBC2FLRDBVF2NtthQ1r93iMAjuiBKIhd9u0IroD4QeT52IV -gBPg4h487Qd8Nve5wPKUCrBzvjwHby9BY4Kw1zz/JJehoy1Y+qm+eY0VLlBrkHVc -7BVzcrq4UNgbc/nn0xcJ5ebe+imGbEd9oMDGhMQyBsGfSThbVbupEPI/wof/K6os -zYQtZo+B3kZoVhqURqj9luavqYkBIgQQAQoADAUCUvX++AWDB4YfgAAKCRBxzDNt -vArm1xnjCACXhkKaQxn+MDTULFN0qrhoDTwONbSY01PzjfMhkULRLmLop4thrE0k -RfFAJH7Bm25lCyCijdA/CYrQFBmwqrElHWohgnigKQIokUY8krN2R8p+qLhJ+BVS -N4U5x1adWsmpll1snFIil+iKCHjETh0U8t4s46vS+NaxyFCuiy1FTUl4WiBBHDan -gO8Dw+JGMEETaDBSJWSRGCiy8LBRVZUeA5AXa4GkmJXARlgJzwaNI+NQdgT10d+l -0UQuJeaPyaqUa0BAny1trUUtpPxcZmCdsA2b1+UYINS8NZY7trVM2eA5sXEFHrfk -gvWu4irF7lAJ3VFfnflUNM8ci7V2hbrhiQEiBBABCgAMBQJTCo7QBYMHhh+AAAoJ -EDwFFcFBIdav5X0H/2/SRuoOo0W8chdqHkgb5t2A0RhxjYDNU7QoNoW/vzAKBfYP -ZMEqWxBZ8T+WIo3SxGhcVKXGrPgOgn8/akBt/QE+ZD5taKCurn3WUiUOFVkgKdK6 -kP+ijc4nb9QY+IU+BxI9nQJ7Ht0rRrMQX+2I5eH3djAK8SLjL1Pe1Ma3KZ11W00u -ufLHVZYWLLKA8K4FtykYK7Q20bQHxHQZgNYYplcrkMc/Kzr3slaDskL6v8SbglVW -dQbb33GNJO1OMeqDxutliPLjDGcfd6LGOvsBVpWjl4/2s5eInoAWIhI4b4AofXy6 -no65qaKx1EAIdrLcPeq1GACgc2CUBsTzGDWUyfWJASIEEAEKAAwFAlMcLLIFgweG -H4AACgkQCTpOHUIIVcEYpwf+NWX4DcNQfjqaIAVHYgXpf6L5rhnS2Pbzjnjva0aX -iKxuLYha9NRFjHGrKyQHifXWYqgrPbbtdmbJ9UukQnkwvGQ6XECryKybi/9wLEep -oTsO4MpKud71U9/0o/M7s6J7jOD6SpJJNp/s6YV+FUiX42aQM5SFPqvmMTyLiC4c -ym9129rh9O6VUTk9HlayHTakBXsXvHLGpMAddw2BeEp+IU4m4hKcT6Q3fO8XDg7H -a4kujdCml4QoHx9foRzRXSwdgLUfesphbFjB/h51zOoo+b06BZbI7BfCgo4HprzW -Qlhi2wLtYWRcKTmmUvFiDEmruvKoP32fAt2N0AovJHs5KYkBIgQQAQoADAUCUxyj -bQWDB4YfgAAKCRAIq+eupazdZdJnB/0a2FMprdS2FMiNy9UrCpfrKZCjaberuMS7 -t/eeJm0q3INJ8vrRsU06YM82gWzT6yCzbkIOPg8o0FIVrUjtIrn6EiB9gofuKATj -1Q87BQM3hWeQt8RCm3cdDK5DpwB8fHCTQrbv6gJWrdChBKFJb8fO1kZPtPJL5Zy5 -zDfdM1mbENkbpJqX2D3ePB0pje11FM/ivDhqnkaPNhRrn67YxCcjMABzFjhOsu9m -gr7HL5tRc1PYnfl1nAiKw0hF0eSyuBjVPVsIvLhXZ4KTYNiZk/iVxaVvG5eS6Id1 -bwGg0RibOIiHBD/kDwauzNJw7CTnJHzJUns5Jq/s4O2ZgooRItTViQEiBBABCgAM -BQJTODZPBYMHhh+AAAoJELE8c2d60eSDECEH/iHQHptT3we47zisrtN1MXQUae0r -c1L8Ib4aSsKW2+9Cffz1HchaE0PxeX4f6VN5r+Dl/lvEWdGXLf5Yk9V7pSrnecay -VxULxggJCWKTIsC7NePSGzIwTzwyoKRZjfrfd1yjFV2OsrTF17iQb4DHvEy6u9Sq -b/wwk2c9Wl5ddQFQh9xwQTBlgIwAGocWKUfeBbCUwHUV4WTNRV31mh2RaI7AMD3Z -qN4YoH/ZCzbPZxMx8Fcg/PU9iJTfIGD4wv4mb7MnIjGX1FKt3WqjiqiaUK70Jf/X -m87EaZapIR5tFh3QL76mtDLvqEzMyeo2PHXiXUZyuWpZT5jrdEw1Y1hpZcCJASIE -EAEKAAwFAlNJeikFgwtJ2AAACgkQKZovpao+TNqfzAf+OlClOD1uOgogeclSl6jR -rZRiTMAoD2LvU5nazWRBoUOdADKCyYe/bVZMbDRUdTEyvEsMIHdmsXsxmhkyW6+X -QkntwslNyRtED1NAoilxh5wP10acf5oUw9dltQa6ZeikVo8OlT8gC/Nd9iCRGzM4 -WzdzP9T6axhPH+M3NhV7JS6W2WVb2vxnN95uILD1KG2DVJkYyLOle0V/64zNRDuV -eu9FtStf0rKA++0zinLRnLoWsgk5OZleEcq/4fV102mvo5Ly5KYvgXt/CIa3lfXq -4Q6tSOxLBdwt9lhNmCoWsc9MEOqZPveMDuXygZ5omMkKkobfpFVwCGFPy+/bKK4Z -J4kBIgQQAQoADAUCU35wJgWDB67+AAAKCRA58xq0KnaCDpbCB/wIWkN9t38CSgCV -/3bUB4zrv3KFX+LC4b9gamoRKyAlx4BNqQij9tRP4fzoVHbiIGWpXquoHgCqEpd7 -UFjm2KedfRfZs1Czy9QMAv74ntFypWTNNEI65/l+ColV4PikoKRDHP2fufTVl5h8 -TbGAYBsH4k35etWm3ULqicwcpz3TgarJPEgF0ln9AB0K8mS0zF4Xcd7soVeyVpYX -w24xOwaMlwbutTF0AP8QD3tmiBXWs/GQMhua+viYUbvWYDro4d9f/sjmsz1tbgH8 -d14s9CLYt5HAcXjLgMONVkfhtnfh62aY9sZsx4LgledAFFPe3qPLdRy091J+G57N -MpkPBUKFiQEiBBABCgAMBQJTu4DaBYMHhh+AAAoJEFI9q8bWllz3gqQH/3MWTtQo -wLjBak9GCOqrFkgRBdxc/vJMh/HqLz0UooP2s91usUVV9k6A5Dkdf3MYnk0jn9EP -QEqO5kQn/ULsaMqsWtAGJ6d+WQSJPTTG0l7hMiDXXAzQCUaJ37WuBVWLkUxs+vob -6QAqXTTlsz5gyMZP4P2W/xudIkyyCb61bn1meDCZd2Wvk9lmX8OL0/KVnS240RAj -cYsfk5nmJe9KNIHnfkyuyAG+Pf6JDzodLzNlBSdgWQUlfnpYwZtC3ywfW15KCIYT -4RvYTLgOf2WaxYnZkB0QrMT6DEAIMJdPhRhRyoTIKbSPl9Mt2Pzfk7CdCPrCtnPO -HxWuQ9skhOJuPHWJASIEEAEKAAwFAlPjaqoFgwABUYAACgkQP8MwHN0JnfAAsAf/ -Y41wQ+iaeFnbCAQBGMFqFHBZKcnGPLEMDI1GRKPnkBrGRgDncp0RFVJc7tbZR14P -J/SGchg8gumREFawh1af3s8QC57QVAZpEztQkXmQ6m9SjQ94ZRQ2UtvUW/+Kd6bJ -eOWhqEqqokGoOBG2uuMbT8UhsL4HQA3H/q2XA9CqABhOSgHT31j618eTi9T8Y3DY -A7IrZBD/vCqTjRValp+REATt2rFg3gTxzQ6Zkl7tRK/PidNTR2wAVUIb+zAeUPic -yG2a/QgeuADcWPMwX2iRuTEmUkPUmfIYyn2ArJ96e7JjZ8t1oJhmcxf/69uEb1Oa -QT02FpHsow50RVocha7z64kBIgQQAQoADAUCU/RtLQWDB4YfgAAKCRBtY6EDy4vO -1OuRB/9AwQSa55HERSWuUkdXCQbLZxFzGpsiiea2D86HWdqikv/jVY1xiTbpJ9Mv -ERe01wSxxjhKlzZUeiNd86ToptM5xSjFKa7Pi3VxItQ/2fpGzPubZ8ATtmZronZz -Iyk0+KS3RjIAEFav/93Dte6xQIPa1svWEwe2W6m2VX7oifZGHZ3JxcvSec2KfNlD -ZY6W3iYMYGAhV0QqtZ39IQFxeJPOyhT4wgW7cyzhuuw9x+/z+dGjnEk3lpgnP6sG -eOwixJpCIoGbmjaqmil0x4jOT284R34M8llk76wDtJNW+d2SYQEg4XytsFES4l3y -UVtb/MAWokKTnEjoBadNQv74CLOQiQEiBBABCgAMBQJT9UgiBYMHhh+AAAoJEEY6 -66W7yU3gwaIIALBnxVEKZ3n/doLUaWuuWg1lQTWR4LHAk6TCgPSvfMvEto0WSzVG -F0rMx41zGhCPX/PHRQg36usgm5F/NnpD5Fv8CPZCmJ6cU2/qxIjO3B3S2uxD7Qvu -dVVXY4yF0VWyhNpmUUH+fGLsxh+AlGAWTuwJw0i0bUW/ZxydaaljhUEYolk0Kvn6 -Wc8Dt858VJ1txLFLm8lwEYkKIqC9dpK2A+/gEolcS8+kGM140/lOC3UC4QTF3fJf -SliKkD+MV0Ar0hn13+3BN+XE2e2nktKMMGwVQDaftBsLz6lq5lOOkwNirxB+qJFP -vpaChJwvRlU+DX7LDDsBa51+5vZ85db2HnOJASIEEAEKAAwFAlP77mIFgweGH4AA -CgkQpzQCdoAzOcHG1wgAr/+6i3LITl+AbXl8TxU4KY8wGOli4rHspZJEtevuFhEM -SNjyoom8u+xfTZ80XjR9UEd3FPXLueEOXnBtZp9hxfE6rdSAcOR6mwPwC+B9Sr25 -Yv1NRGxil4zGMLNe2t7tsRMoeCdNv3TZrcz+Frq4QW1B1obW1OglKqnBqIZfbo+7 -XcSqyvxxy9gFKA8scD7YMqX+quyT4DDKhKM8hNtg6r0Sx63K7jigo05Q0yGGmzdn -f6f/IULBxw5iH0hlZDHvUU8DzEy1jaIiYiO85WjVEVBqPYXzjLsw7g6xfMKE9sF3 -9f3Frd7Oy+W1esz58+MSusP57mHavqXJ3ze30g1oQokBIgQRAQIADAUCUNf4IwWD -B4YfgAAKCRC/bWlRbWmh6heRB/4hw5Fpi+orvXfd/MXfglhseO77cZW0nsanRBaH -swpNanKn7o/Q2lP2ar0cuGOLaWnAjEaLrvcdg1eoRsAljyKmSGiKy/qQyozleB2S -SYs8df87MaHTGayhM4pPegKnG/S+2xXv6IHkKjceC6fSx7RkZV6NDNDIlg8vUdTS -9Ji37IyVl2YDYzoutp8UvzO4OqXq1YOgrVusTsbBRj/tRvn/9RjIi/e/HMNxT6SB -zkOOVVNAQ67fhYotpyXEoLltoSnsnxOVwcNBhGLFfZQ6NnKUDCbivVS9R0QpYlJk -8nRmyRBUEIxFVFuwJ5MYnhB/GEQXecsT/91hq29+lxXil6r9iQEiBBEBAgAMBQJS -jsd7BYMHhh+AAAoJEBZvwjwdLR3YgT0H/j4rbr2GVsfQlAun97m4wVDXB3Gp4Tm9 -qhdXPme4+auz9HuLMVPE2FUrWT9bZ9Dci0tsU7EfysWBPqd6D6UvHrUiUjxCL9iy -MYJKyThjNbgdobeO0PWc/nLC6Qd2rGIZAztDqgGuGR6+XjGLZOW/Hy/F9DZ1q7yt -QFwxSvtPNpFZM60izgS6M24qxziqdV9un+cJEgl3MhZt+stXJGWExu9OYW54zqb3 -k68E1mh3FaIzuo5JQYD84Cew7cZprM2a9bAOdVuFVK6jFFQNVNdtJTHmCJqlq5Vj -tu5FTl58PBSeGxE3RtrZY77mreyNL8meTJyBDxVx+FMqRRE6nQmJQLGJASIEEQEK -AAwFAlJ/voUFgweGH4AACgkQr3VTikByPraz8AgAuPok+OdbcNvXRnYpVWOvFswI -bC+lzfEOYC7OP4C6aP3+x2Gdgxe3oTGx9ZBP6Ywu8CWGcQYpzaEQSKyvg72vV1KH -2MpPhdZtVqkhtJBdNP8I4uQsF9PwGT3MtqZfLDzASJ1dLiFNHChqJn86PvevD1l1 -1IRrXFIghN7qXsFasegHOIc9HL5PAjA/NXTIKfpjS2WqpxmXxc4Vix0LrfsKNAko -qunprDAUpD7KilO3AvADzGFYXyp4vlLwJ3k+tNIZ45hf7uccSmpWPHNF34VDEAoM -8KdhBqkehuGREpZG2dcHPdmwLHEDrV42X78Ms0XlgDUfmYQ3pjXh+Xu8Awk/X4kB -IgQRAQoADAUCUolixAWDB4YfgAAKCRCBL0nz4FA9YyXICACq1zovEDB2XyCz4bkI -xv8mrxZwri7Sn6wvbXiAdCmULaJxw8PUkK2zIljqODkTnxty+8nrYTSt2vbuunoZ -dm0VlI6J4tOoUQs4PTplBQCx/53/vo1EAHsp0x2GLD9/PYBka+poLxz1syiwNaS3 -EXpXEoFzyrmsMPsmN8cO0NQSQoA9PnR24ZWJxl/Ifj0E44Ez0A1KUgFWKrli9vjI -ydZvUYNU8WxaoU2pTMFuXZC9TSoOCeOlPSEvvE+dD/5pyIILeTcZBHl9tMRf/3cc -fXtF/wb5IaAIrjo/nnZAbidPNAVfzeqWiD4YldKg6D0s3Uh6nMWsQEtbWTzT2f7r -sm80iQEiBBEBCgAMBQJS9mh8BYMHhh+AAAoJEKeLuJMH/r1oGKsIAJf/wHKDwzJC -DoyoOb0ssTIGPsGVrEnewtLZAOfHwBdcZ190RLa4/J+Z5mjBS64b7rnZ3+I9Bsn8 -1PzkjHoaBxCEqTnfFH1pd5KDO7Xpugr/zrYtGKBpk19TVpj9w1nAT3+9ktj7sbm5 -rwZz8cWp/2UnDM/sDZH6KiAI6OIxKGbdmjCSASDN/ATcJezL/qWTwZ/buAOwjiVU -N3HjXDoBX7V/3ceZB8Howbag5mWOx0V2lvMGfoXuJ6fct2vWL1Qnlgo7q6ydP/lA -N0DrlwHf2MR+U0f/EW8sP49Xr+moezP1+RCz44TRoZt7ugDzbd4wsuAJ3Jodvr+F -TTUdmUZhANWJASIEEgECAAwFAlFcntAFgweGH4AACgkQX5UZBJqNDDYjUAf8DNmK -cval/aT7FqVrfj2gpm9xGkTk5HqZ7ektZ248iabISi0b9cnita7mXqh377W6UKjQ -voQuV7tnH67MOLbTt1gbOgb91K+I1ahV9xe3G8y3gE/7xNi4a5WHG222uJ5LS+B0 -f06TQPDUCeZ53154wsbHTlDxkI7q29rQnSxBuBO4sLHm0K1sRTezdvp7h5PaB3zZ -oWcGZHWe/v9agCNUAGeb9VURChBWOuSjpJaOC7juovyl6oNSd3pk4eGHNv6G0go3 -XtjjzKz4ZvOKuM9HF7YOWnx5GydJD4ySwYoIO8dM6O12W7N62PkM38/NKbZBoksm -r16IueaX8RBSyT/G7YkBIgQSAQIADAUCUe5uuAWDB4YfgAAKCRAQFYBc09ELgyvv -B/0bnACE9e4F/PHDbjXyf7UtKbxTi6g/H9djor2XftXc2HWTY2OwEQ/E+iFZ+4AD -8zmZYG8XcH+4M4Bz1+GNsH30HwGZOcbdpMENeSiDYSWMqqBNn+L7HuYVWoiuTujE -F7m3fka66FM0Re8GH7NaUKtqhLUCe2ud+HRFTsRLm+gTpQmwBBsFz3mkJu+GfC+0 -FzYgZsAmjj7enpiFL7zqEfUW+d8FC+UzFjldptPc7JG96KZ+C7BA7LnhEK3o4ErZ -EOQ/fD8K8QY42Q2LKNaW1KZCn4qPaJTsRz02uIkqM5RC2ngYJ6gsTAjCH+lt2p7g -zv3z/8yo9b6fa8spB5ZdQD2CiQEiBBIBCgAMBQJRqxnjBYMHhh+AAAoJEIXiUoU8 -9n1VxVoH/jbQIO4vZNGQoZuSYVzJfrOFJOAi/f6XBS4jSZ1kvUqTs85A5wG9P3y9 -frNOkSVofJha0t8INtVhmOVCYB85zbVqmv6ecZymBbX8Aigk0h7SCf2H7EiDG81i -d1yfpO+TpKPEyEnyRfTZufxZHi8f1qu/ygJJ8dXL8wheJmqRxFORSKRPGEOMoxH2 -Kmul6gJpjkcDEtm2fu/L84CCYms8cmgNsPNpdo5BZsiV4H/W6v1ruybG2+wuca0X -RlMt+bUwikPyWcgXDGWi2NWP62K7fu1kMLmYJ8/xbsn987TfuuC/TvvrRU/pHgNi -ME9zU4cSUwCl0mgSau0ssVcLXeLZjmmJASIEEwECAAwFAk9M/GgFgweGH4AACgkQ -FOnVw/nnI7tv7gf/RnxwX4YY9EzXT20zQbm3JqfWqJYQibtv2ynz9ZbrhwAK2HMf -1dhZ4Dvt5QRlhtJoBYWFEDlfHlXHfCF/fs3+fY9K/cr/J33dv4Layv5nhSSuZGHn -JnHCi0B+oTkm1P895kXsQGq6suOu7tvBhwAZ5gBq5qDm5wF814SXUQMawpjufSHp -Rmy/f37JpO1oRHBR4WxFxH5dfsT7lM55atyrOk2RFz9dy2lm2QGlcUK7MUMI6EgD -S53G4NPrcjw/cei8KfWUyol+ErhI/h4/2W++vUhWzmKg2JnOiK4nOyKOEwmBY/qk -FdlwIBNtXRyutiUec/MCqrsjTmMsHO2FwHG8wokBIgQTAQIADAUCURojXgWDB4Yf -gAAKCRDcGiEIpB+bJMyyCACph6QZFbbI3FRysaJajMJtFfIzj/uFHQdgIWWiyr8s -klyiSyOJ+Da1SzQbgU3/yAtYSA/DQ2kFyH9FwOY+wp5LBtlFaaRtEGzMwSUmJet4 -cTK83GNpvgjx2FpL1eS+tOPljNQFUHkjkYbTapY0Cc4vxwLT9i0O9IU9jmAjDpAu -VxNsdqJnI1I1Ye9xXaD3Dc2lCZwVFIZAdpFLIM168DNg56eRzHdRkJbCNnN4mL+f -LS4KqzzBr/uWO4ORnjh7wgGxKf9VICvXyO2bmZSgHRFvM7NS1Ct+yX8CV6kjq/fI -fKtvJA364M1JcmCf3wj/+hiQh3NIqJIyo50LSkv30mDoiQEiBBMBAgAMBQJRQVsR -BYMHhh+AAAoJEL0+/f6FaCWmbt4H/1z0sLE2VKU0LS4UP8XVSFejIMPf7Zwo3cnQ -MTFqoYf3g4XPw+pCuj33DcKK8MXOpFHU2xtw+pI0VfajQIEhYFBVHkt6HbVfYlrg -PHGcVLBRQVC/0Vh82dMDqWoUk1HZ1l2gl4xD77L/NamDVFcxSuHlW2P65j5Q6M6b -9i9d13FjN0TcbVbbFZeWApHa03LvjGsUzS8ireS+Fw9+GXMtETrNYWga2MOAg/wo -t5HoQXO3ubnzwc460sZC3LFuc+b0h9DmmqiJHp5HGxfOImIzJiqCdh04FppppU08 -UHDqbU7V3fFEs+EWGWtaqJKrIdJR+/wxxuGg51nkUWJ9j3nWx8OJASIEEwECAAwF -AlGczl4FgweGH4AACgkQWG8EWiUOKZAWGQgAy8IAYfydpW6DbGWdQNElk1Vs9x7y -pIQ6NLmr/oaoVvXnsCE4REOT19MJ1OcmRceU4TCpP4u2tdRFDp+3kNYlQO9SF++T -dCIglo6jKHaGWGocaDKM+2s51Ou0Myn1qT08I4iEECoBy3fhu/8P1GXWRKhFuxAo -9IRZgJ7ZKWoPTt7psMWKxWr1kxL+PBGz4T9ctaeGmXOYhKGyHdsDE5dKDimZSTZ7 -ZOPicDbyaPPZA627XQc7JpbQ9OebvBaZls0HevQcMmfRKusx04RzU254lmzQXp0j -FeGxcHh+9AG2Zvrtp8Qeyx0KU+EFsEX6X6ja0vg1tBVs5YWfN0Z5AqAEcIkBIgQT -AQIADAUCUeWfNwWDB4YfgAAKCRDG6LpeuI1p0JogB/91hsQVPLAMU0/2t03CZWZK -QTibsgjJNAuOhLlHJS4pCeXE47xJ9NoyI5MkvaKJb3o1cDJ62nWwsk7llTotFdt1 -Q3FWvxtc9Iwohl8kjTlg1Kv5RQOXfs1NPql55ZB1eHcDHOEj+1DjN2eP3yqLBTTr -lMN/P0inkhNYrWxD7LxnHgWaZ2LSp1w3g9PBh7KKcm5698ZvcURm87GJvI/mFLsA -FIktFeKXoW7LOD3xN7kiHd7yWBglqKkrAW/Ai/4fBmpU/T+l2nCv48ooIA/LeEj7 -asr5zCnGVyzb94QKgqwf173GOtAO6Rc0KSzYqZxdiUbPam/wn7ataoqbaHNNanVy -iQEiBBMBCgAMBQJRWeNbBYMHhh+AAAoJEBWHDbVHfktg4O0H/ikh6+PMLNLK4jCB -JP0RWFTpbYMm5+xCTba/hyGiMaPIqL8bh1USNA/lp6qHfy0KgRroAUrfOUsVZpuf -orfuQuRR0usJZ6zVYyb9JVFISUhTE8J2Dxoc7HU3LblG8bVH8vfpjp2KxL0pHkW1 -mImy+qY332i3nXVPHM7F3V0Y3gF0mxxqh8yxTyvbvgaj7Y2if3UptxaXHFnZr7ES -aHcp/783690O1T3SaqUhrkVKo3m6czAURJ4wZ2g3ZwwgoC+BDoqIgiMogeLxQwGW -84DlxldUHovGReaIgepxdLlfgSReBg6D2U5x5qps5q3W/sapBEtn6IJibYU7TLso -gX+4q0qJASIEEwEKAAwFAlGBlkkFgweGH4AACgkQo9kYe6UdEYPv5wf9Go+4RHpD -SVg2KWLiM5rQzxfJ89Mh79VagsWTv/IehOup9T5kvWiHS26jftoZ7IRLlFuCyq07 -8aKTYYKE0qT9qKn49+Dz/Gn06bNHjDnM+DJ0qlA0OWodoaWCfnhSal9SupFRIHzc -8U/dVL0+n/kArxKqOZeoHSY8FXkI4Aao421B7kSRhPBjyerE1uSNgToeH60radj5 -JxGjxl4q6eKBNilhrGyvE09FkgG27sCwsv45G4zPvUtopgGzUc+dIa8fyxvmVRYd -KTlTMFsnEE8w+ZqXmks8LfM71fvtItjIBgBY5j9FSbrn/hPXfzDQefPPhN416c33 -PJf6l/8p5F0nzokBIgQTAQoADAUCUdAKKwWDB4YfgAAKCRD35nv5oocXxFzACACV -okNoqFFSAsMwq6f8V4mLvGqgLvrW9XRDazg5K5odkjDAyq7y1p0V+RPSQv3mlSFc -chDBQfZHBsTww/VYShBflUaShkcY4PlbsJSdCna0vif5SDcsr/nOT9SlapyBvp0t -BaijLkfe3FWhj/5lIuibTu6uRO9D/l2DTwWhIvT8rELeAAgClvx+Gbalh7dTUxwU -qwMlRFChxpO8F+uVO7X472MeUY0sB5r3ynqf1VjtYv+9lCwYdXLkXF6ELlpwd/zK -Rk51qO0nSoaR1tpF1gqU0i9cxXR0QsdZOLUtbPGk122IUVEk0wtzOx2DF3V8p6jK -rz8sPox6Iv9KOaEUwgoJiQEiBBMBCgAMBQJR1FxOBYMHhh+AAAoJEIkJ+oKzI0P9 -+O0IAIzU3dfeL0raAAsrW9ghCXl4qqAaA6wvIPP3Gg2ApWh+FDDg6sk+8feefzmy -qGO/VbEu/H5JChw4xmOUbaN6zAXb/9WbxoGRo9NUIBANgQcGUhwhFEeWeO4ZeJYS -BO+70L9jcZWicT9/UsvuudaVm408f3WsEoqHslEAtHPHoiLJQtf8v4C4hqaIewrn -dHMY/aJ3uVFvsjcqVfdPbBtXbyg1EBwaBTf5pZktGqVKJpdD/nQgaY5jqoxel9aa -KP0RhRLTfsebhPBzkoNWBU60G1zqg4eaaZJRE/5svsPt9p2AivrgE3/IDnH3ay/f -QRKDhHkBqNRI5/Ou+Ko8PwszSlCJASIEEwEKAAwFAlHvi44FgweGH4AACgkQG3oo -MWsbH5sINAf+I4PKjn1jg+1CT6fNCccVjIybKlOoTX4GF5SJtv3pM+rrftrY7xsq -CFsBRcli64dczMssJ5bPGOgspRP0qorsNBzKPASgtg21gD1q39UE6xFwsHoL3kYT -8pnhKTlMk65BLqmq5zFORkHRSULcleRRqlM4aYR/2n0giwQDbKVwi05Xoa33daiD -M3k0IaWAzelpoXkWeC1IJrgX41+Db+8YcR/b1nWYg6UWy7hK6Gq5SsF+5nj58I9w -6MZ4Pn9QhAixDKv+E4Ou6vPcW8kjtdgZG/c1h0Hi0HUblIMVevGJOTC/8BEEbq/j -ROjwvEmlKnsrPscp2Ve/1kmLu+oZDKTbCokBIgQTAQoADAUCUgQOXwWDB4YfgAAK -CRAOTfy3D3VnMybqB/9pEmoRoxCJ7AIz+QjDlc0U1PNwFcj+JLua6iiyl2BC1Bjc -/x3eTY41DVDXZB5vWTPGsGqCmPS5jF9qJ+Q/ezeVB3DEljyOob6d+fUAKGV42QWv -Z7LzZpiWsdEwazno6QJGIdDO+8FZ6/C/6XtJj26N5//Mf5LFVv6QmXlYFoGPCOn3 -qqsop3+YZwtR0J1jymD+iDLv5IXoNtt8/F/UoMNAxYKGdpf1UNAe1wkzoQxr5+xB -vxbYSmChD3s+GqnOLw3Cix/vbo/4AMG1g/L8v7Y/jQ4cYkfBbP0h4VncHj0rQJaG -n2EDrBDq2HfYoJVAho0M43i6LQsdpZt+u/5rKhMiiQEiBBMBCgAMBQJSMz4pBYMH -hh+AAAoJEHBh+Po06oYnZjwH+wcEz6moHU+JqVN/X79uc7ZP/xPJ7Ufg8QsDBrH4 -tT3ios6B6Zdo3ysvFPW0v2Aq5bBo2q86UfTAFhti8EzhbyI5xCMVtCu0JDOptdES -VesPqNmvUAOosFHCsDwiUiW3MhZjmrR2i9tjrn0j3R0Me33Oidz5QWJTpby6TM47 -Uq9iCcnnHUp97hk257U6O22snOXpoxNByYnimmQIPC3rhySrREsXbEzMd9yPjYBq -5LiXzIrzK4qc+D3yxL88/PoeEeIX3s+z//xACn0NQYiz4v77Ip/o0qi346dgJ5oh -b2Tjx4rvpXiZH1WyPIjuQDoDRzck4WbWt/OXZgLawu+3hamJASIEEwEKAAwFAlLV -P5QFgweGH4AACgkQPDe2gKyQEhA3xAf+IqE6YcQTguYz4bCWaPEC4daKiIhGgC4t -+BrrvUx0TGMY72fM6dWeo5FagIPotaJUVipOP3pfizvI0K1wl3+dvtAqun46/SLD -OHpsVWIvuawUBzBo5Dpygjwl/NWUewKoVaiMyXLAi14W33A5yBM1VGCArJKW2i5K -Am4iC6SD1fxzIojvzyrZ7pdg27znzSK/LFQNRxIo4WcJZ16+FFGnM1PUw1fWarPx -c/wGRKEUha10xxWsp2T8sMbZc2EoYS7VDXU1Ip8MfMn0y6P1BggKFGSGnFHvuxjz -D+ZAWGXfcPQ5mGZQNyhxKEDoT83A9Klwuludnbt4dt5xQdfrbt1X74kBIgQTAQoA -DAUCUtWwwgWDB4YfgAAKCRCQX/zLSGzDB3gLB/4wktLHldoxWrhNHp/bJYnQlLNY -MOvNVtBzI8f5Oe3luwH61JZAVIP4Ovo5lm0UXZbIz148uxlPJaLK86KXnb38asHq -pdwgPD5aw1BTYAht8gpSnFnU2e/6mRf1fSezUMP2eaJnNDxza3xdU1zwbXJZJk0o -U6npW3W31eJVt1dL7pZ7NJYQNcvlkFpdkyWx7TD8uzZLPucPSF8zjRI6dNWAVggy -QCtrALysxUnH9xvnLzoWz60c9KRWiUxD/JPwdJGGDML9FtTpANHyT6wxGV6hu5sO -IWFsLdlRDm5Xqn6bqcrENrX5wJC4gfB+23772MxitokjKc59gjQ1Zr+jjZ2aiQEi -BBMBCgAMBQJS/8GJBYMHhh+AAAoJEB5nGbkK5hLTIGcH/RyWZ7/Ov1sov9remy8G -rxV3ovCx8jl88O9NSYFfIh07l+NR4EEgy6F4pNL+T/NzDk1c91nztv7ZfH6Nb25h -FVqSRSKCogQAMkYYjsW4iwusUqSgunW6N2ZWrSKUcokZl94L20VUT+P47Mgsml16 -9bEo7nHCTfyTYbIbaFgarAnqSf5VEZ9YmXYZ5dqG7dEHRaeBiI91Zsf87v9rQd4o -zmQ7WqcgjyRXGDx/dQWvRXnRyCj3BfgCPzdsZJ6avL1s3g3e0u5uNrYWpQt8Pm5w -zsPDp199M8AP26vQmW0Xx8Nfi39S95JsiLvA01ZRAxwh1Ib5DqcKEponOmCOYrg1 -KaKJASIEEwEKAAwFAlMHJm4FgweGH4AACgkQV30k8GJiSpXuRgf/Sf5sKtyAEUPj -WxGhF7nDGQdBeup+HZKZiAX5PHGzzhJha9BLxc2NMD33hUmtTPp42GNkF6xhg/bO -n41uZC6L5WFdOca/1DLaYoWrPh1FxA8mUjXmqI26T3AleViZHRvB7JiGLCH/PDPp -uFoc+gft8aim3GEZ3Fxcmpz7M3cn3DBgywV7xU4FP3epjcl3WoXn0Br962k4CmYO -bJ/uiS3h2tiNK4AH6nu3QOGJoNfAhx+wxcuyOTzfdytfLyC50nPu8xiM29S4UREB -RwrtAWivP/r/3YFKIcB2QNqxadfFaiFgHCOqEuFo9W4nhoeWsDOFvT0IOjLrPqlE -inpKxXBGxYkBIgQTAQoADAUCUxtBfwWDB4YfgAAKCRB3/8UYiE42TEgRB/4q2Xe+ -UPLs8DV4V0lCbWXjonlR1hbJctQT5yiEpTlCGnS2/ensKMxVuEBApJtXQstRHCaX -7A9Q+5vHdj9CYReX+ybKtFRoo8NupUuCE3r/BmqRInKRgTXPkKpxrY9332ZiJZma -urNcus68ucbRmIK6CM3X4iGQUw/pBg6mPhkDzFCIffK+q3y0d1vQKLNDNvNKALqm -WapBBfst+pvqj5Ld0h02jU0WuoArxyPQI1oqXtoHYbCVBSMFFt7yaaeIhgliOyuT -SuM/jXQD8i0bl9F9pF45LUNeuT6tjs/X1iRyl4apXC+acKa5XYaFNq1fNy/LW6PY -3pNsnsjszBupJIr9iQEiBBMBCgAMBQJTOWsJBYMHhh+AAAoJEOylh0vRN3RM3QEI -APD1eHTUS49A7aZ6aVlamr6IkR2PVPjjMIb8F1e/hkHwCRo1Hrt5pbkVH1RfOBhr -1Op+J0IwBTXn4vYMszJSJ1itLkYYmSXc9dwyff/1DVrAewX+x95vCYD965RwcJqQ -cDSAZbZWJGGFQLK1sUySjffCZBgSL2zco9TeGu1WPNOAQzBnHgpstroYYRDTQk+Q -YLt784SABBUAd8F5ETuA7bAxficcqMvjsG5N4N1Xj/8aRJx4kqZdPbogfclqswGe -atzg4SjEV/lEMrMR2/BpM8/v/fOP+VYyLHTM9lrPFK9FLTF/RZxLHDNEHXTGlBxp -dAiL3oAE2wOh9ifp4ua6KciJASIEEwEKAAwFAlPVl2UFgweGH4AACgkQgYFf2Mov -8lDCHwf/eZ4cP20DRG9MuWhjsWC3hzaOyJLPnA3OlE24iseQ9KmYCJnaQ5xuerVf -r+DWyGHYfKbKpYK5IphSDnDOYrUrgcD50dxIyXKR/KMcwLJXjuxdROidFiGQGxYS -F1iz7AI+VirBl9ED4SC1eA5XEKfTjwg4Z2hsqndqqvkV9pvFJtPZynlbCPrEVV59 -f0OLd5Wu9jKX647/Hv3vSKFJm31cH5ZUs8ozAV1pKA/9RZNYqd4EIj3uZ9505h5r -SpKLYHQPr2oY//rkvnMM41nL7nmENd6UOoOp2xZOc1GYwiCDRUAUkdhw7GdCoOvw -wVh2a1dG0W7HOPrDHIvlAuiJA1/QoIkBIgQTAQoADAUCU/Qm1wWDB4YfgAAKCRBi -dJveUmCJKzr8CACqPQR+ts99j77lP1ods9j1maAo520jgyrQ3APbQOhyKgDWSulL -f+z2ZYZlunniCfsIVddU0IpDDA9fw5VnxavuO0EX0xlDOgpp/oUPtVOaM2fKne3u -lmoAYQbGGWti72rL3OYgRhP7BDmAFDqiGdvWArIoDP5t9bcr2PhZmEISqLqco70x -pt7rt8+PufXKc8dW/upd8mtzQSs1+3Tusq4vUpGMizb0uSbe7Bx3T51EGolNXycC -dql0O3gAxDV7djm/qFOo36wJgOB9anj5NgbnQv0VJZ08NGyT8/I0+F9sbGQnKxta -h6yz++EjFG/Z6oBXqBmEBKOExHMmUvUc9QqfiQEiBBMBCgAMBQJUDtpGBYMHhh+A -AAoJEOg9K/aZaD+sm+IH/3S7SA8qlDQllnGmv7aD+ABiNpWMhdYHQUob+Z+0qbcf -4ntTwdIv9h+f1IJQ4Ae6+MIPUFVXeOFKaGxnJsaP9zw12x5Yv+tmoxk7NCuWTKxq -256YUDw2oLk9PiA1izW3hksaz0k6Ihs1VOvgdYQ1eI5vnmrQnnbzMUmi7lt7EF5M -yZRbWBUPCxg8X+zKodhonyxdMlD2NrFDWHiTXeJ2mKMkU9IgtNb9mVbHfdkipDNE -/cDjOLQiEVx5p0qgrVandPY4NXS9eV/h/hBN2fdPeq2NzHcE7jM7eAbjh/Xij6Fw -MnDWOzC1/Us5kKKs14QcdHNGIAWaYvdyYF/NJaCYQBiJAhwEEAECAAYFAk80YF4A -CgkQ0u5q59jqvUZplBAAjvz8m6puSNNvw4v+AJiEim/qhEbzkpiMtUqsvxnWGept -KI8VGrpNpRWi/zJUu2KkZh5PbBPMp+BxiCDVb/eXFz5izGy3En9tfTBCPT4v7YZ6 -ZUh2J3Afpsu5v5+IuyMJgOaWJNAbOL4zitzSIXytI0W+RXoq0dE6pd+e7598oFli -6QnNjanJDJz2yY2rHrYHa16JCWUJYQHoFZvQ6jmBEcYWdKODLGIaK4EqZx1T9NOv -N8DnzUFzanuUk46IGI3lzmWM5LZEnFqG9ADb441xW7SAReOVtv85YK6uRJK76/Q7 -v1cc6PeWFsPBU1bLHNGtOnm7nwnrzSd5Ji4Rj+ImQRLoTegVLpB1lD+5oXrferkH -VNOhb9lHQ/r2uezZQIpaS/SEX3rsc+YASc7VGKx/8vnOkkGu5AzQ7JgGBJiKfObI -oeFkounxcwABDgdrUDD0hXV2TH2Y9wVsWafSvgMOa19c2Ud3NZoPM+mU0GD17FL/ -DmeHPe1Mk1xq0fOH3730kU6PIAY/JBIrUYg8n/T0RdVZY+XPKGnHMChGNMfORN/B -evdOOgeOAtRAvRQdOwe+g+/BdOdNA9NuguBQCCxA+v////////////////////// -//////////////////////////////////////////////////////////////+J -AhwEEAECAAYFAlFLX/EACgkQoZmdJ3tJ+e8snBAAoM3dRvo5NsaWVc5q0ZEVCcE8 -rGpJv67Bcu0875Al5IzXaJInefCkHULQly6Q4DXe5X3NquQJdOo3XfUVKdTsx7f0 -P0RTKiO+ehZWrm9HcHj94KhwR3RTYEqipfKi8ukqLinkSExMM/sOGHzzu9wmE6up -2mwWARxfPp6cKVTnRlAVrikI6bFFVybfHML2ka0yQhTgDY/d3+V69JzJL9Q4wPyh -2a7VBQI2XYf4kTR/j7Ycg9OK9epIVCIqMtDnTN3bGXLFVH+ULbX9QKjoX2b6KLTG -NoF4zPWxx29yw/YDlOmh6dbYZdhDakkk/G+jcCIPQrIoRv4i9f0DR819M6uFO33p -7GrhN7tgFnyGiHI8TvAVeB3ZbXez/5z7SewtU3oSeIBi8gHUzrhpdmp/Zh/fnyN6 -UFyS/zGyVN7UoGgrzP8VCLwApZZLiRv7+99l0pTZAW+ZlSUgzQ2boVqjBHhXQQZ+ -kmNOGlWoyZpMbYjUuOPfVJ9q76T2w/QGF1uIyf/tAJ1iVeEefmYc0RnHUO/DjDDB -NwAfPgm9BzrPQA7bNhDcSb8mgknauYXMpGy+mFbVg/RzoWr4TOjnVsNkQHbKusLR -fgqFghTTEFpVRDsrx14tNkKwHFu85FeSj9P1XmUQsIOa7Oe67n8/OdZ3fH2e1F/X -QIm/JEU7kehh1BvnaEqJAhwEEAECAAYFAlPdjuUACgkQ5R+wkcOzh0UVnA/+IMhy -achufpMMkczSKTOLLDbCQsQiJ9l8trRlEZ2TblOo2KogJRKnC5gCqm7UABI+jYfZ -i9P+bMYVK4hlBlA8DDASPgmpNLSMvMLkvAYE8lAs4Ng6yc3LWvwKgqOhDQZA+FKA -P9VsgFgyK62PyFCeKnh8fPLubZeypWzb3/6ue+64fFh4HFJeknkjLBgjVLDoCdWh -J9gEW07QL9xLFDd7YLzEPi4G1uPIebGBsQN+AKaVVN7Z90Rk25O066mgdFuRVkOm -gdDzqi5S72Lvz+yGSLHSMDfc74uXfdU0U3LrHapR1UIljgcwiNYqP60WVh5hTxFH -62SBsJIc8ORtCeVV/hnGJmERCGn4oDHICBSFUC69j2hrxb8OKeB4wD8WYAdRSa2M -cTW7udXdfIURh7h09wp3lXsFXOcrMxuP3kXB22smfzMku0Vde1QaGuTUMXtDoEhk -iEolVYb5zNt0Klm5olAdJyG5D/F4OtUUs0VVncckvhs05IsuFX4CMb7CdoQVLZOI -96YWE/sIUhxPmXLw/HIEsxORLMrJszfY4CsrzbydBUXddtNFErKT8oazYKumTN6G -vMijaBx9viRJwgORIXbaix9QQaSQXwHRRKWVZnyURDunlXpr/UsmHXFnwHcpZLId -mWb8Ce278biTYnkDXslqgWW6yO3ab+jlUH//0n6JAhwEEAEKAAYFAlKUNNoACgkQ -4YEUlHnAQMaTFg//QPeyaeMjpmaK/lHB0cgI680ISHW/1pUAuXVIST6fPBdnRWbl -KjR3Y8PfXvSzpM3Pze8kWwR/uYi8DOD0X/wpdsSbI6GlLTCC6z6C4joj5vMxA6Yg -Ll3IwECzA75czuwXMstbCwchOE/nBOdqbFhZhf8RqeF0UPDrO9h9FZRcNcSSRF42 -YOM+/D4Ai1Q9p9S1PWSCLTkkCJgnMSVSTscxCoXlQjZbqQpa4f1uTf1nV+B7PUj3 -fUbzME4eiuK/XqWSIpv8Kj1mBemQKObD+hDyFDPp/32AveWERnBzEgEtc+ZSlyWz -QEwP0LarRT2hh59vWF63NT8+gqR936F7KZC3V8FhFmztpL7Lqb6A/+fbMG0hcDep -O87LudEg1GIvXt1jyS5QMZ0c2OJXXGVNFLn2SiQLp0ImBcDTw6j8mrgAsVemXN00 -4pFizfxRbjS4VCych0DR4Nh8SxyhHWc7e6pUVYHuknaDRLlGwC8vIyB572WrxAYb -yv39C+axSuxxd3n+NLKEgn3rvz5YAkGRT8jqrI21JRkw4R+j1C83FUsjo6YQkoyV -Do/lS+77S+cQEek13nxQYcTdC1HBZn8YDzGSU4ghOi2LjlJIFHarksxR1yS3UKui -TCjETsoWIXm4Xqxdb0mQxBx0nPLEx+KMM5lSd2JszCh6XXrZbAKp08sb64GJAhwE -EAEKAAYFAlLkVS8ACgkQjO7oLN2+hE2lExAAkXvzMHy9G+uF+J9qvj4egYbt5xdM -NoDVSXhmuXcezwpo6mkyBqj3a2wnwlIFOdzXxEb9tgqZP5pkXfmlUaOmgJJiS6O2 -DvlQcLlmzSMwIN9cTZzYgLpNep6kkFJBtcXSo2zAQWeUsvrOcgaOOny7aoA8mdhK -lFbcsQxy5Pr3Qcw00TOZU9VtuxNEbXX4bxiX/Mx0QeK2hO1o95uaRt3lOaU4ZEFg -7qg5gBQtVnCOitfxW7rUfaqVw6mPDr6A2qIqpPupvns11EqkT4OTDnx9XFyAmHD/ -DCLOt65jQER7HIqK1hEor0dmHStaD4KK+r6YwaNCbv0LcYeSZdUdfFDCewSE/Mdy -k4gW0dHTJqxN7GBIaDFVXZ1teubdnoO+++dJciJMiHyIffppDrIR0rhH0tf91Cjk -dv3St98sdoChomEj+40fok/BrL1GzdiiwvuHn6G8l0SRa/KQHD3W2zzLBwDw679S -tJ/f9j5ZN4IsTxeauMlNEeV9DZnnfC1fSIfolgZt5nzp9mE1H/fcgoR2J5MrVaLX -QcXtHIWhmDsem07DCeNiKReoq6nlM6djudC4kNnkwpTGLPub5Y0QHW2fO4Wmru+p -ZK+1h3qhisTL7hR/dW1UwUvOKOf13+xd2uGXSSuR0kWw4nEznoYqdD7kJTxrA/ZM -43gI4SaFWCWvbs+JAhwEEgECAAYFAlGreuYACgkQeyTlUxqX988fYA/7BKPuk0d5 -17tC1gI7JIKmUMDYRxrtzk2lJj0okV+IWqOh8vQZX+f7FwzHFo3YhPvLOX1V5Vtb -dDBlb+V6bc7TIcycjhaioS9jpW61RSRLJ8r2J2CFOqhtyBjviQ7oEwuuKQlA6usx -3niulevxq1/VEoYKFxFjJiJd7QFT1TfFIkj8KxPH8cbI0vSn81ZzTPpaFdDZqpTR -H1YVxa4n8Wx2CUc5wZzHCWsMXuz37J3RRfRlgKepwV9HV3BjuaNp8MsSUkUTt5/s -XGUnXNcdLvrTqgSmUPRVIsqeEKnVA/1TGIPVSqFbCXVnIXqbStGbC3gcYdKvxyHP -fXPUpRKjTCgkERN+11WY2PqR6BswKSbinQvIHGjUzEuduWWmtaiCE63HNllceOFI -KsrY4PVHSXuJa/DcjLvs25VX92eS1jdtZ2XBXrRVkJSCV+AmDH0mXb+qa9DswECG -J0l/7IsIZQ1fYdkH0ZHBmCSSPChNMZaDIpY5L1SXGsYZggElVsZPHnw26yIbCPXz -gM8TOdWyGCb6nXS4p3ldQDaML+CTqAtsnJkPSFqM/dK91kiI2VVkcG47DK+3PN3O -SK9NWe464aPHcAMhcnLJAlHExlgXjxLBrowhTkEimzonI5UsrOyqDoH4yOMM0HMD -JOtMGgPWq03xrzwAJzetMZ7QS0HLghklpAyJAhwEEgEKAAYFAlM0/KUACgkQL2O/ -igQUx+LF9Q//e/OgDdD7R7gpJdA7Oc4wco9M4UHGNLWTs1zH9QWGcVWI4fsq89Mc -CXtyNY+IKeCN+SL5q8jCNnO+gWoWTmHyjPcHHxfo6TmQ2HflTS2h/WrqF0UYMc0y -NK47hPDpiTiFVpQDTiOrzR93K07Q10e38oCXeTSCsPDSiu8wFEAbK9xL0ADjpFqU -70Qn96kmHoxLhBEArVN3xMcphxPkNa3YRRXZYvgymG6RNw8Qssn4ywXrB3WdhGIL -WvY8YhLdCCzuYAf4UNUv54YjIDNMzFCyl6UWc3gZfJ7KhGTjF5fRu6kbiA8pcchw -lJwdX9joae1eWyM62f6OhbIIhckwG/AYA/PdlcwnRrrYlNO+WmqfzhImzYx1MKIm -gpYeDhJOJ8k24vUytu4EEoVr18fOwGpahJUSDC/qCIcM+/gTiGAWURksVY2Qy/sr -E3TzF6pXtWjirhKV1cXmheW6hlXs9jaUJc7Iq6yiDEwX8RIwNX38++8c98iE3iBL -jwt92T7sT9OULpWJypg3KldOwLPaYfc3aec/pTdJVrPQcg1xY7rEjnUjdp+ZD5Ve -Cbgi0a0NYAocwWvAMitoMrFGs+SW++HxzU0iEVFORBt7V1AYhHOOQtKTfuij2TxE -onfxQN9q5vlVwk5O0omJoKj+9DDRcBoEgrdmkrSN1fp1cWPPoIstryOJAhwEEwEK -AAYFAlKEB3kACgkQKt3WLHscsGJAVg//bl/ofC2NAOyl0PZeoIfTQgjJTTpMOcLW -vVI7M80Hd1RDrQu1pFpKhfKgcAuFYQSEZHG43bi4bVskcAsE0EQzskA3wGdaK/JG -KHD/FL23IW5EuYpD8cZcatK9a41cSdF9LHs78Ommpp+8YUaEWT87BbJ9k4FdT61n -aOzooEuS+K+Iig+Xa/4LAkvQ0bUG+ULtS626Dd+Z4qqOm7RpltBrkmZTmjkol3VV -MIqotO6HQRFQS/wso5WrGdGMLUSy9PAhNjJtAwnsc3OhjgJm5qDbs+/k1wyGQdb0 -Fd6Gbkf+kw4qLoB8zPSutqo8W3itYznNuthSHI22DjbDqlo+D1KZL+DWhV7ae5kR -UGChoCzWGBwGemS9hklNm8H/rA8XTvPmLQ8jbDLOfFmlua1iDzu1kcAn7pVGcP8N -gbtM0GnbV+Hg67YnCIzgg70bxnQqQapvyDhUJ/0/I2yt0p8qUR1KywlycaiMp3EO -HoBe7gRD8LjJV9Zj9yHm/STWBWbXtZhMMOHqO2KC975or4maN23HN1RtE/3w6ZXS -IoWWb4kBzVZgxQybreLeNRXDfCLFhvR66y15j6sahXovHEuBDViZlLwGWiotm+ra -54QbGXteYHP7GWpugpSUroQW/yIZemfZzfs5p167fgmn3meyjqgDLSEEKwtRhs45 -J7W72ZpUmruJAhwEEwEKAAYFAlNUVH8ACgkQQuqJtGAIlsyPexAAmbr5FnB13O/Y -T1QXqWzLQ0+4C1WkNqdPlz7RalP+Kh93JHAks7GDx6dv3xQqpQTLN9/faJqS0D3k -E+YmjSCI0ccpodzup9XLSR68NswH1xqDZuWpa6719SUmB37L93xZPX4ik7zbhS1e -Sq7Mu3iepkYm0T0jU2Z0/2RKrJ6m9sOZmbsJLmcZ5k2qjt8vNXgLMW3ih4OCZ0jl -e3/IS4nwXqYDN6ptlBCwAAggKg2Nd49qfMCGbVFopBRB/SveJou0C5kyhIWAC5kw -sSOOZP5awBN4T6RvI98rMdiLMHbypfkToxglSkS2HOOOwlCOTvbVKrSLeMlz5b3W -O89msHmwNsodqEngYfZpiyyyFRXyfrWxeX0ybz9Rb6WXLiFEb3oc10LilcKAtRzA -8SwFQlhqts6G1KsleiFJ2l/XWm5PKuxxRruU8hZ8nTszMXQkEJKrTInJXR+wg69v -+i5atxw5WeqY/3M/3T232WtD44d2GQYQFiLt0PjtEf3oYpbCE7HzrfZAlPtgomsU -k9RlLTrh5BKKbhpMVoOb3h4NPrDLH53iaCsOKGcyATypEYdHJen0nwDbAcCqws4b -7w7vo6RMJKLdbdixVLNQ6pADXaKb4Ztp3Evs0Lh13YJZ36jWXhsKdvcPgz0S6v6r -JdIUiMx5hxuPLt20Xmio3kWWOAdOeKKJAhwEEwEKAAYFAlNlNukACgkQwMrtvDLN -Lqx2xw//aUt36rtQ4nFYhcrYuCx8XBiFR+wlG6XBQonfHt4HbRFXfeSBbgds99/a -8YYRpyfmLmNcc66WNEd59LTPQDVi316S9B0hUh/y2/CbsWb4JMx+uZShmHR45m/5 -GYqTkQIzNhT8egJwT0UZL+DPJloobmGANdjjtc+yZ61mdAPL2VU8rF7pCO91g0Hj -waa2SNkWLZhAsiCP695zFNQjMbHJNDxLzKrHZyw4GkklQ9l+ThLcTaQDiJpkJC6a -4P2QC0F2d34uc67uhtEUdPZT39IkMzWaoAfp/ZFLLSs3md3TAetP/peLLtcJCQrd -uLqkMYqaaj5psvDxcS5OxmuXkwPhMxFHwEJDUH+/sCXzC7ZWLdb9XYrmIt+JWJz2 -cOqSJlDN87msolErd6vfJB8RFcoS9X9aGbVY4rpLW9cbQ2f/vJ1zZnjYWeretC7k -aZ+qS8dDc1koeFQ78rdJWmegVcLmJoAPmNYACN9OqlRFvPhT+vM2NTAYBD7IwhmT -9NDm/l3NxdU90xJxtteFQhL8y6fvJLFt6GnW0QdFqlUO/cDK5fUM6mUQ9NXQHVKs -HOHNOTVZ6WXb1fv7znvsWzgwaAMQTu0ckMMYt9PVhqKVhf1d4Epu2snx6q0EBHVL -oAPcbr1BodUe2XQRoIzQsyffLWWb4B40zkbEcjj8hZQeYiEFlbmJAiIEEAECAAwF -AlET3tYFgweGH4AACgkQtHNPjD4qWgl7uQ/+KhI9S6iOTctMwdqz3nF7PGpz/Wob -VR/LWbJKJvD7OfOgZcScWQqQmW2FPzJdjCF8gjldms0p0Do/e3srU3tL5fxBL5of -3S9ZHtNm6RvDOpAiYh8tdKgt+FpG5KI0iPPCIu+9V6sxoW1vk9Nr6SRTuPjqOXH+ -TCvBHnn1aFIN/UHGie4618oYy89ianImD5QUq9O6wX5BJJaFsSU+NPnc3Z9iqz5E -biO5FjbV16wRCx1zJTi7IYZ76L4pxZkSoUTXdRjPzFqoexGGAA9KNIYB9+8x3bGd -WiQGs9BM0mXZfuXB8QoHSiNTdJEdCXZrSL6EWuGggHmwIkRa8zEnBWy/Wyfe1wWf -6FX1L4q28QLyLTbcLFdd5NXuiruMDR95DKGSUNWYK7PcIiPKWzikrvea6UXAI2CW -wdy8haPtNczYdw/7Q7B+fXselpBIqab20tXiV+zkF1hxlrQc/HtcW4sCR4bGbgz+ -5PqARYsnV4aApRIKmsmAaHe/SqonTcGOdVKHR9ihHcKH9UV9zt7BF2qtqa0/0ZsY -rjb/HCPWC7Q489maXrdfsE1zfmHbMzpL3M+A3OVZgc3Bk3h4juI3CTQUlzm2Bvax -lXK/uPj1jdDtqkqlA8HTBSl7dbNQ86R2OU5MD1yV/MnRJpjpE+hHm5iHN2O83ehn -1+cHf1Hv9Os/uLaJAiIEEAECAAwFAlGqq8kFgweGH4AACgkQ6/8lC4ueTn8kjw/9 -GpNPxVI2ajydS5iMrYqAPAO4ehMiy0wwZKxFq/nUaMYqU8hpSfbS3+b7L2+gSm4v -g3vGKn7qUwtiUlEia6TjhTWU0VWXpGxgGBHr/TgylZ4LHP6NCcqsoQLCuDHfulOR -RvC5NKeinjqeUz1ORaWV2dKo6deIYWTLKO9BGuxU9XafCFqruGOqDFbo7FwS43+E -INxsro+tyuriX/ikvJyHcDeiYJ0uaeQBuOF5pPXOejzqZKULxnwr1H5jFz3ln1ZJ -vxa87Dn7rakSyK98m9KfpKPJbOt3Yuaw6PjuKvMThx97+i4916+9g1wCz0ravptu -1nD2AtAowDaVjY+a86lZ7D4o+fuQyAaD1CfDJ5gQxhewOC4aH580Iilw3SRa/G5t -4n0APHOCD+3GgH1+hdsbyVO1qqDhcpxg3KK67QnNbbiFl9OA+Mge0AGpZ+kGVWcj -8vRRJt32aKmU7slifaN98fl//PeAr/yPBB3mKWo4pTarg6Nn7jdPx+lLobWDYYQg -QLw7C+zHSroakx7ny0C8t+NS6VRwnFXlIuq3Tweh2eWHv9cP5xYztpSvlB8OLNkE -h4rrKVg0MFNqT8xZFLxCDcf4K7NvPmKeo7zYp29/L8N24y84HBT/yO1IZMASLJrV -dEvuKxC5Tj4Z+8mKJDGfaHxEriBMQbRGpzhe9Z7eVN+JAiIEEAEKAAwFAlHJMR0F -gweGH4AACgkQeu3kqeahRlGqFA/8CgTInC7nQiQMdcWKT3UfvU/CP1771WaiGMEe -qhkHoEYnLAozZHUeBvfk7Fi8zk4a0+DVQl5JNEsOigFF1aUBL/P35IGEoY7tT9SC -GQMHfc3PsAJVm3DIjxAa4ZT85ldFwNxZwj1k/QgGGpzNLeRbUffFOLm1hLM/1DKs -INM9AcPZ95vtwaM9PDEYWA1f6ybjjlBYrkrGySa5w9zE4Rw4nZ8zeCJJMtj2rkZN -V1587prr4syQWfP8FuSckqVBiaKQVVUGv72QpcXt5cOYDVvxOSArXefI68NF2nf5 -VzTvdv90koalPaT7Mmf+m9gyXw0uEm9HHDA1ZYiWKfRuSkTwHApAQmUp/REC1hn2 -tcDxZF5FLDLgU9nqiMxQLi+KnQMckIUOWH/45hyZyxz+AY6gYUZr0qu8TwpK0Jcx -is3tEPpIZJF0TmaklIFwCkT1TnV6i7hDGFu+c2is67+Qub8XTWB+nIKc0Mb12NTR -7L/g9fnw3bowDCSQBBHUyu3MW7l7VcY9Q7eKttJ1qW83tA9KJqK7Mr+//tuBU8mG -IsvYkB52bEmDCGwhrMP2eMBUF1qDp6WGH0Inc5K7O/LfEdQiVBtIegXMcft75+Ml -pQLwoc9VxWd/3HK4j3BgUxZDybT6/u753s+ct+U9XAudrSjvbXaXidmqefyxkdDZ -BuLRk06JAiIEEAEKAAwFAlJjvcUFgweGH4AACgkQmjOmgi4y5FKu4Q/+NKLUaAAP -nad4wGoomp9PgVKE7BAK+YxpEdpkfwRUXeYdoBTzJFd1k+F8QjtX0BlRE4eTP32v -HsxUH+Aj04ahGbkrXiYuxdWutf+rcjtmjygrcPlZ2cHPtq1ZgPyjjTm6XA9yvr3l -mZ3pDKBctMbj7G5HvySsvT6nMk2f9EhK+CZwURg57iDv/JJgjb2p/QKZ/XH9odga -LuoibSFr23G/U4diHjsFE0eUnrq7YsiZCVbVaqHJ9i/7IvbY8wvS8GUwmma368Wy -RUZyqMGd5aH0oY14vxGkuJoAtY7hMA72HmMzWUw7aiyPh1S9f+PNTmXFlook+kXE -FDTEAMjcUJPa+hZMlBUgbCDYGtYsQboT3rZQKKauIrJLywNZLu6jpIWlp1du3tx5 -9saYffvBJH/lvZh0uiXMA6Az/rWUa2OYdCZJGY+PKRuoYIg+GP+exjyzts7H8kz0 -yfME0drZvWrlQcsQeTBWtel6M1PBFFEInbGWgQfcsOtCANlFBnKv9ptctq67Xftl -QqjgbN8qYgOBZ1w80rJuaScM9lCkXGkCzKjLtqZEpS1qNdF40EGOnfg8aJ6KF+vw -96CNp/hZ4255Ks6ijSustncfdF9YCcGqfRtxuXgxCUz95mAg/asIy2PdOorpcZEp -AEb65q4EJ6Yv0Wco0ERLPodfYpJQv62/whiJAiIEEAEKAAwFAlMpNIEFgweGH4AA -CgkQLNYVHBYlEa0wSA//SastXEzg1KGX4ptkOxK9hrE2KTpP9vhhGhe8P2I6IsZo -tBC9PvrHKZZJkchgofn0KwyjQwlc6D4jvgC/M10zNU75xNEebLEuwDtd4h5JddQV -JGuQmzDVcKRzyo8wQVBv1W3twreZHppoaECU/dcjoxSc96rxpYSqtTg5vwus5n5S -BVu0bD4WJfz18rtwUolY5eyu5D+i85+SkwyC3MAsqRNCmhiWvGxfCFdtYgf7UCiX -D7CSMYts/c8ATJ1KIXD4gTeW2ocj7C148RKlPKsqf4BzqoMuRG6XqRFNEZ22YvwM -GApDMzLXceEpZzO6CT66eCIbdRFVMUZKEvYxkB5pkZlVuZ35OK35Uwec29KxyH20 -sg1u74gw7/cplYXEsvtr/ex50DWZmHxtiH7OJOtE3f4So4lbbKP1wzvIJCulVnSi -BEniEXLZ6h/6N7vyCf4rOldXG4B9I2f2ZOEqu4UO9MpwN4BXDiNXPT9bBb7D6IMW -lttBt5Pdp+GANb/znhdPqedtn5t66+1cO0sOkvt+IYoke7SIJZ710WbnLx5qapoA -i8f6EVxa9BrQ7wrSylgCvDmLMj1aDuXRCviHiValWnEVyI/v7YnFWDJBLieoEgfH -zTVf/1hnEGMllyNnF+l8hZ1YH5aY2VMClaNPmJA9iNxB4xu6BWwCFsV2S6yTAjSJ -AiIEEAEKAAwFAlOQhNsFgweGH4AACgkQNpM0zlDthxIelQ//SHHt8XbcE8M7+CAk -gF1KCDbE3eR8VUcxo+W8vZ8dtovrjk1m+0xuwokToV11lCmwybmQzWF7873UZgvP -++IcyNCKuZePwwOtt9bbb5xmkVWFivf0jld+P7Bp444cUoQW83Z8/nXm+Zo9hv5Z -J2hvj99jT+d3sXmd6+dxEKGWJdPX+IX0ETD5exiJDCIOhPvrQfP8kJf7Axb3JIv4 -q3g+e+HQQ/oe1zpKXkKu7a1Jgy9cqE/ZH/DuySqas3R8oa6qB8fvxGn8iN+PT0E1 -3aFN0QLI1BCp36czMlJg8TZTto2OI6wxqKfPAvLYrMKhume8Ik7TU+SNPhqtq9b8 -F8HasobfNMqpxDr92/hx5lHrhl1MQsPtac3lwlwIKIdOJSi2mmGFyL0zAWdHPQCU -yqwX5zGPlIcyO6lsFZCdV9A+uVynQATOAY1etMdC4JHmC/R2qDk2PGvoZ2z/5rLi -t7ETx8y9iwkUP4HtH8en835Xe+ocq7CCZvnelYYDIrQQFbSNtn5nbwaQcnqr7os7 -oaJZoyjc4B+TPcvV9u+Jzf33dbB9f7abLjgsXiZuj994PgBt0Z+Yino7ZwLUqmLs -L8HuAmm+RFxsALttVN/WIA88yVFUZ06HvbVnUE+XI1K6rGVb06K2HbzAXfeInb9i -WQiptIUu7NQv81EcSeq8oyC2L4eJAiIEEAEKAAwFAlP9EqMFgweGH4AACgkQebQB -At4rUCWQXBAAhRy2bkqNlqzQp2RtBQOqCTE1jpnUOAP1QUk4UA/qmomk78t+CMxo -kDDTxttlbFsxxM6UfiF+SrMQY2ZOgaVDCZHljgdsVpNn1zDnZjdpQey8k/csIUGz -+/lujChYkEyP9ZTAoIYUWT8bfAR1Gu2PxYEDbZZbqxdvOWf72MPpobwv9Zy+KZ1T -tW3rkvgWkS3uYN/WetOhaUpLdoAyQIns+5200r/ViGNeutSeL/J+QA8Thwf8rXP/ -bOtEWB0t2hHEfIX7+W9tWMlCYm3tXBg0+hq/FZR/MUNTSzXF1cXEJbfsZHzoFt4D -tAFEoYZbynaPSYPjsTN3KH6B2Qn3mgyBJuf4+Z839GpbDUT5uRhFKZpV9dA+iC4a -m6ERvc0AnSf6jyqWv6dCzAv9mbSE4ufIGhCAV5imm2Iv+yoB8CXlwSMFSn8jtNjX -nwgoxZ541b3YAZ4R1YLzXl5Ika260wzXvw1a20nUEgduQKUwxv4YY6faWRjPRNG2 -WY4DAkf+MdL5Nj2ddGRtkwKosZwjQcoHsabZGje+aWqHiN90RtPZ5DzvoQL9ci9i -7Jj1bdKKRaYAiuDcL8NeJNZ0zEUMObFt8WkyTOTxaZBsBoH2Mt0LwxrCnzK2Myxg -SWJJPrvXpK/+lcQRmKgY/dweHUSHHwgKgDq3Fs+1Hy67tk1LahLkSuOJAiIEEAEK -AAwFAlQO3ycFgweGH4AACgkQiPRYTYJgSKXq0w/9HhC/c0kQOua/uSwcNTME3zva -gQn73nMqtsrPJg3Amv4BAT18H9cp8gIhIwA5NGcDxCiqG1NoIijwh0g/tov/tMQt -ncMlImJPQIfysBdEE6h2brzGTJAA1w8TfZlWRKDjzUt5MEc0wu6V/9mrD5a4vKhT -sm2l4B0Zv6xJXe0Ln3QyyPWGFTcxw+silbSFGeZHci4xmeQYrLXuyRyxhaULoJ40 -I5f9YTuEn6GE5shI8Lqt9yG8BqXC1dtSwJe3sUti2g4Z/mkXRa4CYnRLOcUWktrD -M3P+wGaHKbBhhroqw6Nte+Wu4qg567gKj3WNZkL0n5KbOKXpqIHRp0Pk9jU8Dh+X -4dXLU0TjS4oAopIVLDffTPMBLnRaVT/WpaNzzrTXwNalVyEDWHcLTwaX5dfPIVqa -Q/rKM4J728vTZ0nedFkuUK9l42d668T2fQ9D6SY2JXAMGs+Rbuhkd65SePMwp7QV -DR3njHJhQ80D3pi8zXYSl3ipjUZVx0g8pbETI5Lv7vnstgqccTzeVGuXSCcbSDiT -fCoxcenTBcCKCc6hxEg9OQb/yzV6NO7JhcKEme7jCcC22g/c0ZEx3IZGcos5QTdW -u8zwKa24S4bTMbQuMSE4ruwN/VClY+fqWJTgOcUvTuE62GwY3HGbzpRIxd4Jcyg0 -3qefDj6D3dBCDYHI7W6JAiIEEQECAAwFAlFwKnUFgweGH4AACgkQm3UG43JsIL1U -dA//ZHWUb3FZVV8/ANIQyGenGnXzRfXwIxaaIzwUV1l0hGrrJ78zbtUrqF83tEjA -GnPnDnSJkaFnn2RzO/CUg2NnsW1nxPd8f5eKNLEAhgMP+Uz0hBxCLAc1652OW9Om -ovCXQIyp4bTDCm7knQ4bZQa4crclnLkMBwKZYWjxgefHO3Sz4AIILi3UEGjoMNtG -RBrtlq1jjV9fmXsN8lgySWhPBy2aHmL37crMsXqLoTHduR0ITvYJpYfGhlMFlKI7 -7VyFYSCX2NVLihWiOXUNRJQ06s0gNtWP3O1gy3+xqvQN20nmE9LYAqJmrqCDNb3Q -EDoo06elhXeQ4ZCGv9wuzreMxnoGaVt+bx7XhkgWw1Ee2dEczHcNIkv2n5rzwnjx -a5D2RwgRRCFCJJNiRBwZfrxRiaEm8pxjsbG3B7abD2O8EQng/eO3JHYy1Rg6k4Py -22Fy0cgeOyvH7BccGXuq7rpP9siFgoGgCL8Sqa1BqMk3VrZ3fQ/D2k9uvv/rHtdc -DqsiJp9Ssxy81vV1j9TF60wsXYd7HOTNoUKoI5dXKRaKNLmNIAr+YZqOsRDR16/f -Dup3iWF9JQTZV9o4n79aMc0FQ06RHOEhikARKMYr/ct+xrz+uAnlZQ7LlQ8HY7C6 -oeNdAzm/HiRtuu651q+YThCUkXc18gfctVSjcFAz3MJ7dLmJAiIEEQEKAAwFAlKj -Uw0FgweGH4AACgkQvcgh9m7PwHhfXA/+JPEqk/7PL6Ed0WhoSrSADCwl5b91bTWC -fQ6fwZgOXdOXwOGl3Xui0PFhEIIMOXAqGJI2myV/+CIMaXQZvJ1yZkW6+T6uy4uf -+M+8SSIYeu9Wk2PPWP3yKhzR1bfWrRUT5IMKrqf3wiMn1AWdqTQWQrnCElr/XNs+ -uUmFEaD2tcrQ5+B8vqxE7jWaJ/8iusoWl/oHb3fjnUjxZtLMt+cSB5jZPfWBoRcC -AfIwp0ZlQYQ/9q7ROC9OxHEP1RrJHqEQejMymkV8KmM1ekkP2BSGMAXMgtxKxkd/ -zppuaowpvJ9WGmUMUj9Zo/EbNU03UYkuwV3w67+/ckKb/oxK9Wzxjh4jvjEZMfxU -xLT2i+0pBURV8Eq5MJQIdDqIiowqYDik6p22s3a5MQ0IDNVzTTG40n66gHl3By+S -BEFJadgQDz0FVnls1SY4SZVvqPkHpS2fECmjCNcR8FeiZ1DF4yQDBOl/SgRZpcLG -j/nGhfM1PgXhDHyv1oFJNbUqu6jr9S80QP0oJ7pZ8//KDfUpTiBGjLIluGypSGwL -IRyHjxmQbWbcQGt7wtK5p/qf/OloSNL+8T41u4m09FA4hgXW8Acp3r9n6mhY84hH -NrsUdBD0LbCpnOYGYMUddxgFklxXJ/NK81Q4FYvYc0hDCL4m7MzWDuzD3fjO4y2T -MSWIxUQjieiJAiIEEQEKAAwFAlOVr0cFgweGH4AACgkQa3OCvkGPYzAAmhAA2hdy -DXb/6rDPxPvgpmNKLWkQksCOesj3ugsW4sZebQJmaXA+20svvMsf4DzOwxYRmb7w -EzG6AtGYPalaCaIlox4dErlZV2npUnY20rSLPFVOhS7gS70bOlFRvbqvYK10XpNR -C2NNe1vyj44HpWwKvXhfq3oIEbByWR8MpV6B3Oqgju5tUvVNiYAHfiBKFKR2wVvK -G62P5kb3BRlAhl7/XBI5DCL7KlmQPbnz/GwxKa1CFFQZDjMFvQ64/OZHbPvUxedH -RxxCoFyzvswu7iftaJ55JDNmzNT0UJPKVhLQyM017+JFBMTDOxbQ9WTPMF5PXiPk -OoDdvSE1DwPCV5jZ++TBAF8DE0uQ3/OTLwm3Blbhq9iEsmnTewja0c3GqXECnbeV -1XdbhB6j9PxVFRjQCEk5L4pDLzW4F4ipNBPV+LC7AzAMSgLf0Mj/vNwWV2vCs3gq -M+BvA3Sh1oJs5XaQmFolyitWSlaBruUFQEhTQ0/XZg4DErF3qySaxWQ7Ma4T0r/c -R5w72uwcKiHFvOzHdsHjTliLFHAySZ9AueecDqOLcwq1HYc2UKNyHHpszibL+1Xn -4qmgkF9jFInS6+H/rN62LreVaIKBGVYS+YLIKlK+Jcq6ZVjnoIFV6TYoiqzgcUFw -ywjlhc+oMnhOHYXtffHAXlP6b42S7v8iAz3QsEKJAiIEEQEKAAwFAlPivW4FgwJh -FQAACgkQ6P2IHz48gBTfyQ/+OR9rVnWyNgFhlbhIF7lNDROWDfJorGAOKdvylYvd -vfz94jMqycTkBWeRREp+xX6OD+GyQdnL5U7lpRXvOHcjJZpCcC+OusK/lKo5eiVb -xhX30d54Yr3UYmSa2QitcnUCWt8hqhNkaiUfj1D/6yfoLLsu5BC78BR3Pi1OT7U8 -6Gtrhp6ahqZmzyLY7yRkTJ4/M5HKTqyvHI96LJA4NSnp4ihe81CMpV5ffx20mG/6 -vJF2UWXzveDL9MYql5uPSt69Orb7T7XZ192PXbGfZOGUSxuWeMnu7mO4jNt5i1gy -F4/zGtYczzJW/yyclIyJbkq3o/YYGu6HULFe1DY5fADDaw9FA5ePjVJa6LuqbRfG -+WSrv1egDRRoQf8Q823rZhf5SS1v6Ifg+lfH7/6foz95s2k2jIVcItniAqu/eQKy -PcTQwWJaKainfiMj4TtggFtj82xzAVT3wjgMlag+L2PYoEAdaxREu5adr9MLLnIk -OHKXsidnvcuMdDNwjeTAYvOxExtecu7d2Z200dJrpxJ9cpErejmYhy3PFHjQrAbj -PE2WzhwGMTgsA8m5f3ryw//HGZwlBg0aF7mIZ8KfKE4oRTz2+N8C3ujButeXQMtV -x+PR08xFH+TuhIDnckiEEQI9kmbWNjrRQhWsa0AKWxepRgVAwF1BMae/eZyUwnqz -uyqJAiIEEgEKAAwFAlHlvQ4FgweGH4AACgkQWru/8fwQHp/21w/+JMnv9LCMBMU4 -pVw127uiq5FM54gxwMNfKGF2ozYeHDn7Qew0YDeS5T53uH1Tgnrx+bB5LPed070R -KLpbekSu1LtfFhoLGACY5oBEdtwc+hvFy5MPGUwwOFylHtJl2qp4GrSyUwisD7yy -ryn0bGIAFaBfjNX3Gw05Z0bWVH7Cw+nbTI9I1g/uA5HdFtvVl8iDPM2dfEiKRqfm -FR4vakfnRJMXgCA8+9QnARPK5/IZqXkNLfu4tJSamI5Kwc9yHwRzIVp4CLjfA3NX -Sh/HzghHoq1dk9lnp5OT79s9/mNLQQPEE8HFnGfWtRFrUSp/KiOXbSHTw80DF3Cd -W5hjhdBB6L8yGQO5L5gGhc2PrIfsxqdEP6OHJHrTzvJaR96GYknMltXAAqgZMX0y -2kEmXiKcgZtbhzbK0ZdT3S9Wkf/gTJ9b9oemKbpFHWe+64tcgFzCTw86Vn72FTCN -3ZiMf6F1svGGJQeAq2EV0snrJQ8QLeZaChfkaLy1XIH+RQelF/hHbdHONE1+EpJV -faL7nRBPErn+7nq1peMRSl2CggD6fx/PYS/NP7AXo0dw44Al7ERzjAtjqozR5Z2f -drC+ywTaq+l1PAyfcLItg23VNCDiS1ZtuU7AH0CxVsvXOMifRo1NEfUD9J0cZ2S7 -kvnEiq7AKaNVj7aYRdFqS5NA7GPo8puJAiIEEgEKAAwFAlIKDwEFgwHhM4AACgkQ -/o/Ld4Aoi5DzOw/7BPovmWl7yHEY4OpEJbWht0kZdAorFlIVtRfkiSJ7/Qp0tTbl -9xFfcLyI91j9+UT5c5prL0iGiA5HmXdpazxceDFHimpWnp/GNAtqBT4p4OVMuYVn -gOvr+FfpZEeY8AKKCM02c7+Z3rj1Cpe7maoUY2W3/UoRxO+5osdYucYAxN76XFrf -QCPEUWNiAXIUJXW/GxHEM2uPyKHdmk+/QfyJ7mr1Rk4d0MlhAtyE5HOHtI/Ekwzf -QMlxSF9zK3xN/c8vwxGb6910d0EEasc8Wwiyghy0+hoJCzE2R+TWHbt5EzZ9pEjs -amukSeSgmubHpIQWLxsy/SLfuHqOqGap7Qlu0aqFI+2ip5fhN18ikiZeumWLYn+m -SeDH+hPKoF6EQMstRz3FRJHUYQGg13l1/DNu3hnJm2+BcmoYXAr2OWfW3Q1+0524 -Vk3ltJrULuWj21V2HeN0KT2lXMw9Ykc1c7mV192YuaNrJL2bA9IgCAbncIfhOang -/FFci118USnvZBrtpALaPJyQNk0BX+1korjSQ90RigXrF7/xEael7vULEzKPm32u -7JtHecpmP3+B0tAbAvLVLsg3WUCZ7+Aht6lRHX8WccqGfZeXQ9EYAkxi/iV2LeXR -AgHm96B8FAN8w1FKVvfoLiOoRYL4AX/+Z0xzrNuwM4OS6XhaxyVtNp9oxpOJAiIE -EgEKAAwFAlLZcucFgweGH4AACgkQHRooozQjnGnivhAAsZmCayd9qNo7LN/8lxh2 -mJb4pR6/XmSgXEngRQtJUr862uOp0n7FOMPG/ch6Cb+Vq4LFiVXAOlEIGRIwqiP1 -vTcLjZR2g9nB6QArcGrFjdxGYbDJumH2hFxzIChMtCTnnBKLAeCuCHL9r01lMDPq -Q5rJp2q+FdqhBDUCUoZjPko0GcBcHdMRvXNy7Pu5P132DURY2eCdygWRDj/CKdBh -Do4mstqJp1M6wWUYWwNhHAhx5b0ciahEPuKCKRXkhZR3HsFnWQi6E0wu3y5g+H2n -aZadDgge1z+TgCK+GH6LlVnbajoRwPVpqpmKefDMc0n6+eJZThyujQMuu8Vvjs2q -TfQDXh/YaO76A9SgyBREG6he7MvHW12TLoh4Q5TnzshNpzxzO2LOzOwbY3xMJgNv -cuZXPARwRhnnDtXAcHuvpZ9ZwJ665TA1ginBTTthO3EPAL3YJPvWve1qX4+n+xxi -W3XkqNyX/gnMZFo4G/4k8kPrcfrSzuzC/ipLnZN7Yosp+TYZgMwbVK1kuJg0c0qU -8mPsLUPo6PFlYCCS9ML815tzTPUKKOpOqmMu5xM3Urt0hpBAlpPG93g1Z4ARnZLK -DSLw9WnoTlsuQg5aJKnDHHfViUkS2yHd3VQlc/QqvTAEsEVzzYTdNYj5KBqgkyjt -IzGhN4JngfZbWNZGxRdTfceJAiIEEwECAAwFAlEK5BAFgweGH4AACgkQjh0cWTZ9 -JHSsFw/9HIJ5exOmuE7deUlnX7l6Z5jc39CIIREoOpW77N1YsOTi7bd6WdHFMXaE -BmSC6CjuTZvCHG/dqOv10qjegyZyNzxhv7LgDrZ3yvxq5GlRdOt6xD0RiYhD7BKi -8nxo+kYC3bhP0yyoiA0nzIM7S/KGT+y7MKRzkHmV9MqrYaSme5BueFk7dzCM3TId -6hpOdsayjRVN+RRe8EVBpL2lLaW8Gtp0VL+1s+qdgJxRzjqNxYz80VZ0YoNN53xp -Zh3hagUPNr7f/B5nOMHt9KMb2Q34krbgozXpvBRzCRvNO6fS2KEk5ERDl8y8r85F -iQbHvQvleHPyESfVv3CVbxTIk7ADxxJ1ZFDmDzN74jbuO5hIHY8LuULCrfLQiC/R -jtFsCcMLcLWPvwHnDMbSZGq7gyQa4iLR84LqGgTze0M3QcSw9BwNAh2eTMtkhA2q -bGSUl1QBXAdXZTRfV3mmSC7ggOzwJMZMOB2csFon6m1p5QY2rC/lBf0z4144sqEC -sa+O2Jjfeac+z4k61GJAX8C/PegGrEc28HzAHPBZjiekNPrrgDHwduAagac72+Xo -4ZEzbRAPpLWpGUvw5L0lPlJGxKtOStWDwTD2KME4yCKZsnDdYckkdJzlFUZLdGpr -FlkTG3LhKZeUWEcXSgoNXKTrUNte5dxZy09nRrN886i8v01P9h2JAiIEEwECAAwF -AlE0yOgFgweGH4AACgkQi0PA4PCi+Fs5tRAAmoWYJeAYIiftPZ4nrFcYQVLBsvo7 -bG5TU7lwZmnR+wTY5dbH7nQeAkudeKu5dDSbMMOLsDC6IQuGeI47oJE1POoa5cWd -KQRVq1lk+Kf7W9SehtkVdkrSJzvo1LTrBbyhLn/m5kBbmMRJ1TVzAqZfxj3/iVVq -ICDbCItVA/pKY5V4rBBwMlEFhcvpJF1euw+O6qWHFrcUh3EZ/e8IByt7IoSAPBtk -LEr+Fc5nldo3UJA99Sj7oU1aSysQ5fmeHUqVizugoYmfaT5g3iJAqZ5Pem2Y6Ddk -GdehU/YrR8LUBQ4/gaC1YvvjDi5BNcHtyZ7bkn3bWA1tG93oeLfexZktj9BuWffN -oPqNZyglJMRxTjIguXCpyd43xibGVenoeqopUK9R/Fh7wscZEAmMVi+nAcKEhaWG -qm7kukwbi/ORj4v9t6x2IUp5xFI4vzdT9Ef80lCrmpPf1izZwgRlkeOeWIwKS8pI -fym9SZjx4PlcpUjXWczEYXOuDo8neCDDXDmVkDkKbFjgUibjcbxL7x4RhU4rQ1mr -3t7FhHwU1LQYGzaqcJmVvvTgtk7yl4d+uNI4SE/fmGrC01Vc6Hg0LzZMp2yuafX6 -5b4WdR8DVamQqK4HQJKN8nXXTv6DsUH3TxhD3Qu7fTUYLUmtnYkVP5NEnn29Ruf7 -dFebJFw+EkhL+OGJAiIEEwECAAwFAlGYBlkFgweGH4AACgkQ2qGYU9T0ouw3+g// -aVullgAaCtR5Lbko77gHSBdUFrE9czZ7JierZJgmcumVyipCNV/noQHP0hrnLIr3 -OqwS69Vfg4tFC/CYrGGjvnOiuYQV1rv5k7ZrkWXtxlQ/nxd00ZISVfOkyzGelkCk -vSldvd3onqk58Rcl7bQEwzQM8mtx54OqLSg6qs3CLbzztORUuhasdFJCViZiFQDy -ruuThps7fyCpWJh17fIKW8rWEo3stMS4noLXiGXA2DkAtKygtseEk+17GnFNKdjj -hi0qVF7etfuLSML8SSBA1Hk+XlJp8sHeUZOEtJLp0vdEc/fmiIB87ALBU2kERDD6 -welShsVniWIqqJMi5RR7hgeRhdURMVjLQ06F1PdC356XPI/f2U25EqZxSQ9qMh1r -0dIhPepfvc3tPLbA2hp7sPwCYFcPJfSXGO0lTBgsUg3OAMi/MqyCKD7aOSBbT7S9 -4l2dhnR/S2U9sqwXOjznvKSHt8uONmsZPQCRyRUtwpodG/WQTWhkZmjYt7X4m4S/ -kE7JPIPQSpZFTMiuR7sewENevS/vFct8CiRB9fQdsXa6OJJp+wNE0s9P1qym/ZVQ -MuYxyolmihNqlkGemk49/YkrFsXhQsJ46u7hdxk6BUiYERGCr2XVPn2XhHkuVq6j -XUkHWRT8M/Chs+W4sIkMW7orM9ntmgeqpVxdjRrOyYmJAiIEEwEKAAwFAlJAjckF -gweGH4AACgkQY+voXyQ/mFKWoBAAp3wFRqHjG5WeWYuyAEvIsz6+PjxbzJ1nXsUC -6F1O3JX4X1t8JN13ncOc7rjpUoF+CYfdaBggiX3xD9nxA2TiUPDS0yjO/8ey1ONm -EwUo0k5+3+Wm+Tom2KcOgz5a5c7bEM+vXjU7kENUT9OpbsCy7iHQJSqJZWQb02mw -vHOuMwTgA2mknyXrCdMZTejqFavdrKHV2iUoql9hOjUOImnXNeElSKC/YsWnEYwG -sbdUhhuCPGkO9eXu01ZU+TC5xIfnDGO8TIlHmtv8UcgGfPgBZYA8686x75oQDYLM -aHNYYuFoes30CPtsz4adOPQYqX8gS6v6APApk2LOMPlTWp/NgFnv4E1bxtUFecQe -w10a4bt50NLGBLvMDz1uDo0sjXTbhNimpN7fPzpX3ogDM+Q0QR5LX0p9fpJeuH7s -d6xUMz2YAqH4nrwS1GsDetdCAUvtAPAzdCIz+jB4GjBb3V+2eai++L21c/TyD1lZ -nf2WSxp3pR6P4n5aWjV3GPrHve+Z6z/1UivbdG0Efq8tEfiu1/c7fEJncBSwXxGn -KsmshO++nC+g+O2ebpgHhE+uiOQG7goaDhuG4iZyvT/NZoGWj1vkHBEjA4Dwg6gE -N75a9KkbKeUYzhJU1xpLTUEoqZp4SdlVAXZcbcctLos/jG0PQUp4DIHEUSov5BOp -AJHRBBWJAiIEEwEKAAwFAlJdtAMFgwN18AAACgkQFfNQ+fun44D3Zw/+NM+mo0ld -5OVQza2fr0KaiZKIFLQMZ6oOKdLqu5ju5O47Wlb+3mb/1ZFp1wcErngoSAkY5U7N -+KY6qaXJhhtxsGoQ0jhmeGzHl0o4Hy9riPhNLXaQC44CIi+pkIrOmVhyalswEBdh -KdmTUwv53pt/ZtbuhPAS/lkwt7MGTkPK6Azp8RrRs6ByAPvPfPLjsyqKChsTvx5I -iTiW60eP/2QpSBYrab1ZKal0M3lyqLuzIoISPTGLaFPsqdOAfL8XdK3vqfviw3GZ -KeGxoxotKnVljLAiWHkX2M9spXgVOtC4bTgnftfxtsczKDHtdMbFQ+KKI4kEtEv0 -8cvDMmER1tw8K1I5SIaHvJ506xUkuLh5M4wmFaWDUprynRB5wPrWK5ysJnoeLuVI -glo/EUqvVXCNq6c+gXycy73v5ag3A2FKS6VnVb7EYhAfqJI8BMmXXY6+62Fl1MZd -04eZ0n62AJ6N2zU+1/hhjQt8/oZ32odKMSUTa6dBl287tjW4qzY9H+oQEKYTi+Ru -lY3H49TCHQd/JxD29Nr4KSZpllCI/AdfqHW9qfGbhUp7p+gr1DVXiJqLGMyS2CJH -vIPdzIpSQCqjB3crbZAOAGowgjQh8Palscg05VtgNAcVGir8uXahs58QJ3j0xSIk -mO7V+bBUsMpylYSC+yG5T8sX780ljSBaEtqJAiIEEwEKAAwFAlMQhyoFgweGH4AA -CgkQ6vEvSrr6oblheQ//ex/fUJ+nx1aXxCF2m7GUXNHxVmG1a/FTW5lMiAWRf8Io -BGi/g0cz3lHP1vQjoLdSgkueCWPzCHOLN/QgUJdPjjp4lZWI3IpY+DzcYCIHOQaZ -jfu5z/g4ktzoMlGtry6FusFao4dZjV3CuBaBxHmaBO/HQXZy5kFpzGy60Q7/glfa -1KWjBtQC0Z690YX8Do+0Zl7rpPk3D+zN+otj+yieaamc+LaYWNfKS0S64x5gv7ny -kkWPIyQT3F7DFhUVlZkTqUXyl5lVS/VrgZjf/MuJNV1o5EkXXpNJTBT8IW67vjra -uEfy2Qlk45fez9Bs99fyBUvy/LL7kDAaihFd0Z/8F48HMlsMKmTQSanfg0XlHQgV -mLFlYvNSOqOc/uk9s6Qirpc5jF9Zi5zAcchup5c0IRuVObhK59WeEw4HYipNIEAq -8uGX+mQ2VKn6aCvq/qCsr5/F6kZz8TKrsBxJ2fSoZX1fuEzw81Wgfv/cthgOtwFu -AlYVG1uQ6FAP3EBZ36wNrbzlj0F+Uc+PY75uNWUeSxnnXUQgcf9G9C3UZRvv3SHq -0L7MszFYh6puWKvwkcNSjAvf0GxRwm146Ni3fFX2iICy6Ku62dH+f8nvhgXs/o15 -AvGEsE4reJV9xLI303tL2JNspOmSR0vFG0tw4JO1b0Nuc7dcIbOlgTO8aFrZueGJ -AiIEEwEKAAwFAlNnlj0FgweGH4AACgkQqdHw9LRc0wt6rxAAj7xwJc8CJOPNRYrD -TbsOCbmk4P7GAjNRqtzJpa0zYwycOmvb3LuQ3qEieQanQ8ePIcxYOp6DTPrlId9N -2Z8CWXHZIc/fe4ZdaT6E9mxIcErq0qQmneetJjafP8+aP7NV5/+CaEbDF26/LNWe -zMZLrTsQKpgzD4cMsGTqRKyTuWGwRjMeiG5x1ZjeVrOc1sz6VlEitbMyBwXDR3k8 -EY4a2AqHqbgWwkPctd4p7Grl+VDrztDdZfJuq/jbN1TF1YjR7kx9hiDkkNmj2bMG -EmH4igLtXry5zvMgnE17ywDquT9CuOM0cPA3eFlQMEy5VJ96ahlR3PCfI/CuGjiU -zjhnxjv+C4kG+QONLEvcvBbb3eqpj8ccIwDYCMInJEKtE12Fw+BwBG6Qj9TogMU+ -MqAo2f7rfl4+RGoxo+s4vhK2Y1gxV4vZs0omDOVd16L3GGNsa8DTGP7eRS+oDlor -4VZynSFfPQFE3HHHHhMsFd/SjOXUgu2HqlHcZYWN72qALL49nWasLk82JuEgQSso -JFBSNalZ+tSauaQcYEQVY7yLTLn7jgyA4NkCCUD3xzm3+60l3Ar1IMoyXL/wbeaz -6M9wb+9H+Yyr83e0AOOTEU5Weukm/O+NsqCGZSMTcjVkLtfOxXwHzk8i/mAUxp4I -nttU9/viq8GEp8VguVhaubCrWDq0IUdQR1Rvb2xzIFRlYW0gPHRlYW1AZ3BndG9v -bHMub3JnPoiEBBMRCAAsAhsDBQkJZgGABwsJCAcDAgEGFQgCCQoLBBYCAwECHgEC -F4AFAlAnph4CGQEACgkQdtePBQDQJsT/DwD/eGu/ve2WJGKWFyh39JG7fSSBle7z -WUuP7Y6E4lkcEbMBAN74zkTBG3GpOyOTDwnYciddo1bcxWzH7YaElrYeYcVqiQEi -BBABAgAMBQJQMYt+BYMHhh+AAAoJEDkq/6NQfvzzA8cH/iSkUKGQ+tpY/fjEdLoX -1r2+GPiq2bai8p29OrnoLnmt1KXJkxpzT0XOeLYgnaZxpxTsLrydxbXl/haBdwnU -sOPq2gbsPIorqRMtE6R6cgzJZyinpKq4Xhyhf/gncKMP6S8Tor0dVuGFu7+6vVCU -gYaeJODiUYlV/leVTg7gGMVBfwV2cVnr2DNl2DATqxPJWtgOGTtYQHaD5A1Ft0Vx -cAbTkUIZEHHpwrBJqeXo31AqSber76ITJBb/KXn9KKNe9RFSya/1UhA4yrNNkQ4L -qwVCUERyR5oKelZCJHe7j9LE3FQKjJc8yG7ziIzigZKbkCk+MwE0BYX4JwSHERMB -1/6IRgQSEQoABgUCUy5JUwAKCRBNLAz81YpnofvcAJ9bhM/FAI5RJatOO/4Q1VHG -dFMVPwCfYLWjoolIr+3rFqR6g70zROe4Ib6IRgQTEQIABgUCUSN+aQAKCRDDD0Jo -KdxbB/lfAJ0UrCWTirGLgGmptY/TSXAFUft8igCgppHW1iL4DEhtMoyTKgCemmjP -rlCITAQQEQoADAUCUmZahAWDA2y1gAAKCRB5pifcfV7CGQQdAJ9AUeLRQeqVRZp1 -RGFp3v1SZV4XaACfWVBgNf8AO9RfqAUKb9GAC7XIk4yITAQSEQIADAUCURu7BgWD -B4YfgAAKCRAoE4P6+xJU3ZF1AJ9CA5StVzwiT1iaJjtiXiR0jrAjpwCdETakpP5q -dGLUxxb79PD/4dN9G+CITAQTEQIADAUCUjmQmwWDB4YfgAAKCRDdHJB6UP6dMhko -AKDeC1xhsMjaOBhNYSlqgUkZwv1a/wCeNtes+vv3DPek2V02/QTIG6XH4DuIZAQT -EQgADAUCUmhW3wWDDSsLgAAKCRDlgnEyb59JNxiZAQC9aQE8X4crCU4VkpnvNQYa -1WEDKq+u4iKP8R3mzD9nBwD/ePPy5eHgqaDgG2GJw7X10CCZeduSBvYVAZCwpIti -dOmIgQQTEQgAKQUCUCemEgIbAwUJCWYBgAcLCQgHAwIBBhUIAgkKCwQWAgMBAh4B -AheAAAoJEHbXjwUA0CbEYlgA/iBPKQe0aGuaEvwe0t4Z/gUPJHDSTQAvDIvueHlT -XFQyAP97bKo1AAuEUkPc5tVjqAmT0U9nVsOtRvLnE8JZO6tloIiiBBMBCgAMBQJT -V1y8BYMHhh+AAAoJEGRUNwAyuUMcnAYEAJZ/8HMgDNeGjpUxRBBJHDDxnWbrUk0j -nLTtmu64gfYNACXvvrpdbjcGcDyCXL3GOq2pRCgEwMeaaK9bxzc3wVpaJpcKxBOc -71grTqmWg7hdPlJcUbs8GlbwU5SlSNI1HbX2yc6OSUxF0a7I9PRPsC0lgq1Y6GLO -Ord+vvYQE4EPiQEcBBABAgAGBQJSn8JlAAoJEMgCY35T42I3QRoH/0S7JBXgtYB2 -3RU+p3wSbx2LIZqIqSfcaiGYSNLmXi9JZ5MQxKtV5zX+nx/U2vtfREMFkoPtt1I4 -millKUBskFRN6DwGvpaie+u8RS2oxEAPNtcfYL3TbAoh3xSVQQFoWtzArM59Jsmt -XTse2laNsYDl8XTo7tLGMhiFE7tQRXV8WOfeuGGV70ZS6eAv2gKa88Z/jYDdfddq -fHGL81frcB2WoBAvYTfER/wprm9MNOoUfa/NhGDUF4+eM1h0BbNmq+gTvdJkTmjG -HyWS64qFQwtyZUILFVz0104gp2D4/gdHaaspYFZgKOdSMf2RPeQ2sm5Hdxfnj6Jo -SOzSL0OC+iyJARwEEAECAAYFAlKg87YACgkQWj0ikP7VKk+0Tgf/atVp7dGW0pMv -jrcRYbswwbPa8ZELFonc/bePE2GaViwvjQcG9fL4pXW/XzdxbnxxpgJj3s1YTN1T -qqW7VQ4PjqxROUGBpTlJx1w3D5UQcNhuqQiWoQ1rRlVU37XfLNhHKPqH/e9OoZV8 -ez1YpvtyVcI16RJw6zJk3dodNyi47MCcWflnnXMeDcKjVR2NT0FbYtENUvzCIYVL -5/+MN7d0nb3gYnc6MpShhNbk1VFZclDXnd2rVrnZ/bHD8M3lT7E6gTF02xhiZgk4 -k6qp8ttTBZg2C53oiV6UUWwKJQPJY8CI5Ask+5YOLyVvcWrifx/TTBULZgTKlPvw -0vLnHA+P2YkBHAQQAQoABgUCUXU/vAAKCRAMCtSlem2Lh8xXB/9g0OronQtutmN0 -U/MX8BrUU9nIrY4lwfsTo5LfOODwwKaS9aco27AvYODQcFqVLACYv3Hx8L96N+ly -XlX20Hg3/ckizWxDfMbvBa1GzzdsDUJxDDpiu1yKs3T0ksMSxIqwEES3KsYzNedr -41IB0RxZSGWA/19pnKMYiQNQLz/le/WUdAjO9ZQXV8h+s9cmkyrawuGS88/h8ofd -xevlmVmxBCPf3ERWFlkRWR+mhLXN2USaI56qO3Zo5/qBkbElJMGOOUBOnLAw1SpO -+QGv5sl+6aYlH4Yx7NLlZOkJqe68oFaYC4ZYS0BnERbQwBBq21bXVDANNewxxmhl -a02a/uQfiQEcBBIBCgAGBQJS78zVAAoJEIZ3DyyipXaGnFEIAMJlxQ6uIzJoMSLy -Jj+10CtfTsNMhIHzYPPKa+f48yp1omuWUR/M6UK24JVkXXpUEdnkzeMkZKSN4YDx -Dz+8gqoxNlwBFThQD3V1yhjezH9F7MTGlLSQnvHVK0G8gUyScQxM2CTLR0TXmL1C -QFhfumgnL11N9+Cz8p+Kt3MTdeXOAnwa8UbWme0u4FkBDiPr/sR6bSW6o9nmplFo -aL1JVaYrabHPJO9Rnm2rT+kdTHYAbNLjQFzYxMIOf/M0nzWNTQlHS3zPTvSrmDF5 -Pc1swxQ/g55IuxGL7Df97vLqtrYHAO+1PdHOiE3imTApye0ZLmcLq1UEg1Sv9QCM -XAfdnVyJARwEEwEKAAYFAlP/CBAACgkQOudir/udrhpNzggAiR75gbtbcgse9aSk -utufEy5Znn+r8DinodrDik8WxfIv7LlhI7Pln6ju7YhjRBRJ5/Aj1godO8/yPzaM -bKjhNNZvpQ1jaQ4XA8hqjqYDM7AyefuLX/8v50ge/PixHrFS+lRiCtKKV7tC+OLg -9rAcww8TcIp4UexlasMMn9igIz0TrHZnD5yQRk7avuyThomigO6Xr5ZAQvsqM53e -pQ2K06i3Zyd8PJdxPbyRiLQbiZhacOM37OIVHQ+o3Jzi8Nf0ifihNnQq2+HgK9Lf -rHKnEQ3/iifvjJ1Q11QwoOC2wm85ZSQGrzqIw7PbXMKdXil0DDcXYmaOh2bdRJwW -4NJfQokBHAQTAQoABgUCVAux7gAKCRCxxm9k0ETLuH57B/9GKbPzv3OpSevUnJk8 -Yvh6F2abIK9HmY5NvEGMqTZbCx+Yq/epZWYKmZnsUCB1hR7rGqjkRDlyHiknCsWD -BoYFwV1ee8u88WSPd9rrnWMcBlJwnDqdD0MZgSgcIM9Nkm2WCy5Lv/dCbZVX9yky -GBO/GZRYtCjY734TB6zWeSNvRm+196UsNCdLqin5TVEumBjliDFAS+zR1zNrbMO4 -4DwrE0SCLdLPpaF7gu2dgN0I3ItKy1CZtHf8MnyrMeLLz9OvWkbXBTSh18aeoDc5 -lc1yUbiLXOogo/xlfhAS1qZVs9yllgSfYP7DmWto9A92NxOmBUA2t1ELoyBpGkMv -G8cxiQEiBBABAgAMBQJQz7uxBYMHhh+AAAoJEN51r5y1wPQ9fy0H/0sJhQFw8ugG -K5MN6Ym9csW2vLsuN+O1loUNILs5mrKRNAX8QZhnftA5rBtsmgRDCzGS3bdFuRM3 -MZMvsXZuHqUY/5/iWdJIzlv0LGZsKG4lQJ8CRSjPAyYbLxqKx5fEZSDbeiQZZOdr -t7T+WrZoqHtcexP7ZYRh3UZjXBS0kov00BqFlzCdf4vEYYd0K2ktK4E0FD/jNTzR -YXl23rPDG+LsFO7zJNU+umGaZ6eFJ4utoT6y/u014smcFS5XbMRq3/I1/A9TWr8A -6uSi6AgygRkhVHof8kgTCe+BFeWVVOlrUGZibNN02WD+0ldB9P6bBhOfqW0s3Ge7 -9riXW4yztc2JASIEEAECAAwFAlIfs5MFgweGH4AACgkQ/BrZt6Mzujy/ywf+JeKD -iBBdZNyal+5HI9gD21f8hkm0NIo9xemzSk8UXYLG8MXDIha1hpVuIVPVseRSRXbB -URyl5DLjzarFVK41P3FbVt5DTUoG7l+VTCAFm4oeSQTG81YXwlBKOvgWJKF6xSdF -Zd1g1g3RqP1AN7X908YOsQu2HYluMKAoHvIO0aXL68IQeyG0Gf0mRYM5/EMWpaHM -rDNFeAIreDF0IZbKYigZ68rHg0JZH99sKCelfSUkSC+8hdX6QfPViGUdd8TM8m7C -lr7j6FiNz951iwrCdvOeWGS1x3b36uwFXpuxpNRuWCejuSaP1sIArLXjJNn0nIAI -1w3dcGjxgXQ6AJGTUIkBIgQQAQIADAUCUnPmyAWDAAFRgAAKCRAn16X0iQpDa0CL -B/9Hn5T3/t4KjKuA/ButIvWwyXA4QQ5JRwvsVahrSaxr5cTdeaTNRUzBwFj8w2hD -vOUfRLLKN7GVbtgVGc9kQUueGWsaKDNZnD3sUJWtiGJ8ErbVVQqDcEJXG1J57gb2 -JyDLhDJzeMj4lSSl7XOV9JDgxjLiNGTmH5Qrl0SPGVffx0mRy+SX8wHPb8h/sH+n -VnF7d2RcOtKYRKrBC8U1nbI7aH3lOZzFg59l2kHaeK4+d/gZeZ4RPgjjs1eVDjU1 -ayiJoy9d0SfVBNlV+V5PyCjmSbwy/fY1xDcNLViG3MNkPL7rTkeS3ZJT7KMdUX6Q -ytEHuSkJNsiA2cVazzcxdYfKiQEiBBABAgAMBQJTRVGkBYMHhh+AAAoJENNhn2pH -Bol0svMIAJUn94kLbT7sSxzPK7OrCZT7kL5tu9a8J5FX5nRsUXyHC4W+QZpDS+vg -1CQnDttv4SoN2YW7LF8K+4yyw6dLkFOK0EhHLfDYSa3E40c1T1q421yP3UEb+hfo -max3xrSLMScmON4EU4xY/8IJ7k2UUfwt6/y+3aY27QmKCbgbG8hmUY4XAvFGZoyH -T7aT+nmHJU6T/b8fqMN/FVHprgkFEStN2ZT50rWmHiZlOChJa8cf89da+DG4zzVi -IGpbNdu4xPy0PNa9FCzafWFZaX7mfowA1IrSXV5cn7gLwhlDPJA0kxqu8qrVkC// -6ciXxNVI3MZzcrt+FKurMkqAXackeTmJASIEEAECAAwFAlNk5XUFAwASdQAACgkQ -lxC4m8pXrXxFGAf/ebCSnceXOsHuvn3N7BRUDY4bOd/s+WuzpY1YAdDGBNLM3L3q -9FhbSffYwMhx/SfIhkOoW/jEcM1suA3XAvgHd0M2R66cpVOhPY44Xrz8wGCec00Y -hgSiEts6bSQf80Ds2F3FEuCQlAF/El2Qq01Yod6kb5hdDJ1AX5tfRkSZmBLm8xpU -szHO3UaEW/57hEYETNPEwCt+K89gXoHFHwu1opC93qjZoGcQlNfnHUDanpxIKdh5 -ShsEpfaDfnVIklj6pCluk1f9E5ZWu3lleoax64E5V1HGm0mORuJAtHkVObwXqDtE -7Gl60sRHSVh/fIle2k9PzgkAtmtPFdbN2Z/nyokBIgQQAQIADAUCU4+YQwUDABJ1 -AAAKCRCXELibyletfCqSB/93YC95Ly5bFIdUUQxqGsHKlMvNQY7GURgNCNb8dwxq -CxWSvoaWx0BYKRUcZAYQl7AdYZ86FBeAQSaJcEtdLUPpP87vEdOCf8QiLU3iyZaG -ACkqPPHgsYZIWFH4Idby8MH+wZunHcFCL1tKXjB0GCTkkeKzWXQ4QVYf++LROCt/ -wvyW4y8rLy9xOtwHRIiKJh1DmLcEHXhLUnfMa270oIUXMQj/ewu8CTihl1kdlpL3 -8CCc/1iWn7b/E2XbZagr4RQOHBJPWRw+C4bckqKS35Tqaft5qGeRRI3xqGcaGtEe -YxDsm1hKSHvJeFnttUxiz3bL9rkRnWev32Ym9h0Pp77kiQEiBBABAgAMBQJTxDCt -BQMAEnUAAAoJEJcQuJvKV618UGEIALLfbs+fDVLdgy5dCdY2oWwnNPF31+iJ7vlr -hU0kYn5Six5fCKYmueG/7x5G+GR7haG/ZXaFn9usZ4q5x+x5zp11CwctYCoDsxob -okuqrwISFSUFXV+6TF33r9Jp6388W3GGD3abJKSuhYuFG9AVzuWmxtsKRIUiJO+b -0LiA3OeMWG3V1gnIcOA35yyjOmOSJkB6Uz0we6UishvMi6E0ZnoT7FjGZA7oT7Qt -CFBThtyKcnWvVyD/ls8s1DHwnPJgzvz7RjZsWDcwSWQWewvcwfwFSBW0coPEthgr -wbMA15q42izxobi01qnodAIMS7jaHAvCDQQqrEO1EqE1/DfgyUyJASIEEAECAAwF -AlPMYnwFAwASdQAACgkQlxC4m8pXrXwJZgf/Z7Y40nE3z3f/Y28gUaV4WWoZXVp7 -u2EmkUDHDyxIaFlxPJ5C65DJcewSVeKmR9ZlMenz/KFRgWiktpkWmVZenBhi3OJL -x91H5cFk+2gLCcjxUdyC1A91KwKT0ICXaDt2GbaHBBoQNHGzuVZql5gBVyvIP2rs -4VJ9mhz8pDTRzlWWcedIAdtKAUOeseOzHzvUnFfPRMnN+CbdV8hn3jFlj7nEV9zR -ecsJXkwld330Y7ZClo30amURfg54BhZ3KuVCUKRN4cUGayIP+fd1NsQfmciHB4wL -Duw64rgf3PbhhBKRpFuWRRddN5a4kdoSePte7i2TS/57SRRd7Sf3y/7vtokBIgQQ -AQIADAUCU93jKAUDABJ1AAAKCRCXELibyletfOxxCADF1vqJqSeXNIOX2TMXkoG2 -mTVJgn8peqWMwkXGrODbywtzsLwsypzakX9LqxmzDUaSneZpZ0+rXz2OwJlxoQJX -Bsnrf9CdtulGLUqsYwTYEuuxo8fp4ThF+7N++d1tZ+rTMa1iRYxcGrYOi+/AxKFt -nyT3Vk8gHrxXIxkivfLsc0fCbawEOry7lRQ/vRAX9VGxyWodf5kjeUEC9v5R/Zhy -oTTo0aeigiPRRsXWAEuODJLGH9lBgiZTDUAJsFBipBcyTpBkDZyniVJfJL3C/9Ir -E0hz0z96EDrjwnPkUIwo5E7HxdUTuBpTdtp6yieJEzDMiaENpX5CC9Pf4uKa8H0E -iQEiBBABAgAMBQJUANNxBQMAEnUAAAoJEJcQuJvKV618E8cIAJBWN+/hUJdSjruw -a9t8uipcNMJ+6zXsnTFpss9RUwPqqD5AcHrf+JyqwbrHqjoZ3NhlkcADBsiaNA9q -5z+Ym7icsAX/9Mt/Z11W7SpYZXZ8sNOADQIWG0PJd1RYZ1T7nilXqFnUXhcNjTwk -6+10dqsfe6Qvm/jGUEa+qr68lZ/T+r1lU1Z1iavC88d6W1aL5MAGTHYpwIFCd+xy -yjxNgiaqV9iJ9jPaXCJUHtKvCTLhpMU2w7pekaHsHraz42U7cvT0BgR/Q0+o9eYU -NqWzQ8lQ1K61ZpWastap+vua9GV9uV74o4tPdEq1Hdun1KDJRwvA4ncI2PJaIVeG -TQdREnCJASIEEAECAAwFAlQSnngFAwASdQAACgkQlxC4m8pXrXxImQf/XEngJ2DD -sQqK95PkpGjNbM/+r+8wt3Z5WMeZrouCFtu65aZrGaqKX8voSAs77ZB55lI4K3mU -lnvibUrL6bSlesZN7PDrtpFSWtuGMu5UWd7+p3y8eibnwvn18kROf2YJVk9usC62 -dgodQR30Juuuby69wK5fKyidZKV1Wy97GRyHKUAvBFJeIvp/mgO1dhMt3i+AamSl -ppuAJRBsYQKBp4UjQfH+qktWW7+AYWrw3Ccmk9MPx++yNHRCXrc8npv1WPVHbcvk -ZAz0+2IygX8VwrTJEA1aoiQKYurFNeBpZZmQfHozq2+pYMCzLKGg8GlVwqst6XaX -vZnVBww2F27zfYkBIgQQAQoADAUCUZRg7AWDB4YfgAAKCRBh1YYWOogkIiqyB/9j -k+1UAYaShPBwluNQZO6QW2SfM6g4mQCp8JQwFxn+cjrphGUYV6TbIDpU97Y3mPp3 -DM5rWT+amFvdJGyUNxKTJ6C8uHJoC3r95tzOVqEnqIl1dP96An7IWMHMDPHrGXFg -3+rkpSztU/xlFWBjVGMrbM1Wy955cDv4SuSKDGHTzMkizQpJpMzZY6Me5aMIeDvI -nxY9PsoK67IeLjmLNNY6X4UwJa9DNF4VvT/xpz3SuRw5RrSZwE2/K3NxQ/2S6VUD -y4zItPemuyQEOnp+Xy3FiV5Ocr47/M7jep4KnvXTjjeYlHALYFRZHKiRkGRpSP6/ -1hEFVft7nprlqi443O2WiQEiBBABCgAMBQJRv3uIBYMXji0AAAoJEHUy5KRHdxW9 -mRsIAJUhZmW3vPQMEr0lt2dmdacOeta83/ghaB3a5/xqGCxYbOoKGtL37mxBzUbN -SQkFVDTgZIvfhs/ISZWaGPz+JXDFeoED/o36BpV0gCKf5RXOKShIIYzlm7KpEoJT -7QG9kzPmvDWwyUXy4azIjwq0A2Dxxl8uEwB+i9X9zRz0pOgW4YtCVKlcdH0BV5za -5OJdQt8MK1N+P7w49Ag2YSxAEUpL6ghcNDg3E9MJxqn4G/uJupRE7EnAIV4Palqf -EiEIYTVgxWTne4NrnC5ZMs62/SJ8+9RHD4YSyKpcIh7O+O77+aGtWx7lf6mRyQCG -CJdq0RowdqU1Vw213TwQg2WHIhuJASIEEAEKAAwFAlHq5iQFgweGH4AACgkQgkEx -OFWjJUVUMQgA7A/6iUgpf6L7VwBPtrH++6J3mcYK19DJ409lpeHlEEzgj6WO9f8r -ZIrXGJcuh09jgnFEvU7u5txdzrsmGuwfWXMC8rO5F/XamZNQeorS1/XrfOxOJt9d -SfMUg1NSAJHlZLW7T5PkDif7pi00r6wCyBPChdxdU0Cgjgn3Wn1/pPCmBtL+FKCM -gXYUn0VeFBRkHiqv6v3xpNnXdajPlgDNMtss5MMiNovZs+RCL8hkVey8Gd1+dVle -omgxPvVIF1tXTn4OpLZeD+ihQFJW93tlBnkjuf1dAWEccWpldE7T6z1V4nOPRGJh -dyFTq6EcMTDUaCg/hn45NmgGtGaxArWfIIkBIgQQAQoADAUCUgeEEAWDB4YfgAAK -CRBMM1NCkytPutJkB/0XbymNKmXRVgqT6YD1TKptzXfJp/iE6vVbHMNlu5wikLCJ -7XslJV4ADQ5OTl22OKvknvUqr4+jJVLHyz99Pxs0Z6XEXJ3ILq9PnKArj88ABWgX -lU7dii6f9m7Pvw03k55EyzrLGWccgyZiMNR9Dr9VIlDNlKoJUG/+jrRUsKig5TfU -a5SW3muPueliH4bpv9FldT/PheBQY73b1csnf6FSwbvqnPJ7k1i0bOe/b8Jrwgyg -eAtQ9DENRbfm/VVe6JBRJtmx73NUPnwq1bSeLeiJfQ++8cFLm0pbFYbw5mOVT4UW -tHabib5yMgVa5O5Co5rKd72b0daiwTbsvzQKcLG9iQEiBBABCgAMBQJSY+Z6BYMH -hh+AAAoJEExDzyNzs9kA9ecH/iAaa6OeLL90GOQ08cTlcfNMqf5ct1Da9GGCAyAt -eGFK3hWzK5oQQSA4PTkXvj21iUY0u+GH+g4FlUT2OnY/1up7373n/f01Jfh1XLvU -HsClDcVb5xtJOcrbumF0aGyEg4Wvt91smpER7zqm6Q0Z/qzWKj9GdzsfLvNjQAdO -MBDtlgexrgjYY6644NzSzjjA70PNvnD9/h/D4gLl7hi11pBZwGGUQgHBn4HeeyKK -plxs2UnAuLUf0mPN634L8bP7qmcYL2x/wXOQVSL/h0PybMoio3S5siVzPqpTf8k8 -Wqbtx/hQXJKymxWDAO8s/7j0SIfCOD1V21wYT929xvBAisWJASIEEAEKAAwFAlJm -xZMFgweGH4AACgkQzzeUy1PjBPYTSAf+NNPBFaWh5m4i9/MDMymcQSk7BLtgVqXi -J6+1CWXwIlMyBbRVktgoSKOHmEGcJI2uBi5blS7k+aC8aUyhRkFkMbNfDKUbrGwi -aJGtueCAqwMJwlrctlv3G+x5AR2l3rMelBluxlIBDWZ8ra8g3q5tZtiaH4ea5ZUs -tirC+MJ5MrI0gDCBiGoSm6brl1tgD0agFncbIs2bBlYDMTRbKPT4TqBdrAuPACeV -NgDIqRmZc/Sk+28QDa0OGvy1laxml1JiwO2ZLvh1LaJyBUZsbP3JN4gvRUTVRItJ -G0L1ki4s5D9sdpy/etvh2guExcHrQhYmrFQfM9m/tgBLX5KaCwCEf4kBIgQQAQoA -DAUCUqytVQWDB4YfgAAKCRAtJNtH1sgoEVkzB/96Fdjo0zdfjE+d4/iTLJmbaxKr -6/Uki3ch9aTEmiD2yWI3K3QnMtbNmtCPt9hr/hwEWXyxgf0Q37niyH/5LfZnzZTH -D0w34TErp2UbX2E7EHCbPrSbJLJRa5N//cHTXdsJEIKgCkHJlQ7eso5GgvBkfI/w -eQOaZpi9QButBJYcwbUkeTq/7h7NGGcj6Dj/paHS31JqclR7HZjOqAhHThEE2h/Q -b3WEcidVL5lnJENFP3TphulSWJaSva51vptUfqF83X+UJq3TdCDaaEXGZrPYr/zb -yVnzFy5/+y8IHICCpYsgUV2sncaKmY6ytfPkkdPr5pInEVoCkPoPnk1T+dHHiQEi -BBABCgAMBQJSte91BYMHhh+AAAoJEGKw+QcswPOOiqAH/0D2yb6OW7HwXQPVMV/9 -QkyAk3QRJD1wRqqXom7UnXHhEvwIzm+Ll6O0oYzVRn2CEYqiSe9G2dmmJ1oxapj0 -uoWT8+SzHtP/SOdDaboI9Ymhhxb5pFSaSl6a2oFyy1zKq/mpAS/AGDoI2s7w67oj -xtSLsySa/t51qHOZOa5tnaYHcgumA67yQMrwfYI9Dn4g29VXeYIOYnC9ULaQ8J3r -/YDqzhqwTnHCG2y9jUcg6hTtpdmA2IinXW9f2CabE9fJsYzlfxk8n3Q0RFKyW+DS -UT45B8bqKR0BBpsQNLjUg4dBOgF5dB83+W+Nui5bMiE2EuB4FsiXgImNmw66wEgP -12KJASIEEAEKAAwFAlLbMREFgweGH4AACgkQPRSZtT539HCLjwf/btq6l2krGEtP -QfyBIEzHuX8loOBUCv63ivgqDP2pfxdNMdxVhlinleZX/lU4+9sUzNLq80MvFRN4 -pBMBbPTDYrPFHI6gYA9MfNVmts1lDvl1pxIctma0hZ7jfpwCGRcZBBZiM5bXMRgP -iRyBhqRIwS13eho9xNCRnuL6VmiyjqU6Rf2IzFwvTrNyFTYIIDM55EU3iKN9NGIG -72CTSrgY6L6/9PmjiBC+CuyVQDn2r6+aaJ8/56Wb3iHgl2gCZZzjpvooK6f/Lpyk -puRj0WiUP3JLMjPSXrn9PELr7oYraye/TDD5IbHDRqbGDAvXPJKyflCpIHxGktkS -fdM8wvzWOIkBIgQQAQoADAUCUvX++AWDB4YfgAAKCRBxzDNtvArm1/VKCACJWISw -BFI+do4xdj23K9w/Xfa7eorxQGgnoCSF6SuNdTJ2tQSOQysD/76gM+QhYqyxcyIH -EaSag3fQnj/GR92unrqoCkLqqnpMbkVAcEiV4f5EY4Kwd7eAZ8cw+KpQnlvF/iNA -1orKbGpDYB7U5XtSjmdqQeZnhRFk3AmG0+1OoeR775z3nuEh0jEjfrqI41fKIJor -zmT2g2Ot0YHVcvEgXAD9pNuDef1QweqXYk8ZhWoYd53s8w6OYbp3tcHHnpxqcIQu -jTXe6c3sSWIz+0RAdLmVc8DV8+MXfoSFTbJizCChoicuI+RqAuMnGTDXGrkSd6at -8o4eK+CSGNgglRYtiQEiBBABCgAMBQJTCo7MBYMHhh+AAAoJEDwFFcFBIdavHqUI -AIZHJvELYPbMgF1w7WJmKo9Wag4TY/beEeY/8G7K4pnqhEFD2g/RXtKb+3HmH9Lz -nuf4KNCMI67UB0plwAr1AVZFTNSRuGT7rHhzCVlToWZ5tGeSQ3rWRE27fcWdYkGp -/iH7NcJzgENAQiB80vOBw5oZGysLPwaSa7eTYWEUsMuyvKPHawICVWmRDhDh2n7E -i35e3S2znp3iWT5yW6jboWm616GpSwD75NBG63vozu5Yzqa7jTDfWE9S8rnzxHKD -57z/uNZxQa10Qn428VMhK6EdeCRTQKwxiZ2AKDn2LJegf30orTkMw4eFEhnQ7939 -H89OZXtPuvtHLQm62xszpwqJASIEEAEKAAwFAlMcLLIFgweGH4AACgkQCTpOHUII -VcFYmQf+LE6FTIOZOZdbTMDJtyf0qfMWa5nBTzZ6vOE8+BQZLMjEs5Trw/Melk6h -stNl8OEFNnoMQxEocnzo1Sof45WCCIA1Dch9xRVUkvQSu6Lt/b/SETYBApnUx5CJ -5BxGPErdBs8aBVHSYQRVZWWqa52RSdCi19lBdWcjMVROR8T+b4DU5ogOIq9AFpsl -MhIwPlkCKIbey1MOGByTzP6c5uibQTG4oQLg8YKZ0kbY55zu+oQiJWk4Aljk+SbE -361JD5484brIN3GhlTf5Zggv25eODWaF7V1PcRG6kJpPdpguxZsqgiaP/JD4S0TR -qp/KxRf27AEMoAXAzY27u0uo4wGYxYkBIgQQAQoADAUCUxyjbQWDB4YfgAAKCRAI -q+eupazdZYOACACjZL/fHtHJVI7DRXZed3G9sovA/OSvBN9Xvq8zovbODx2IOPUP -EjXWFasCfQV/8JrDkPKS/HTx0rfTi0RQ9Cur2XvjYSFdQhHKcOgWEJQevPyLLIiK -rZHcTwLrjwSZOXN2uvy2QBRUcJoKieHM2p21jJcEfSi0Bd2aruHHaqFfac1vqF4a -xKW3CzP8KD6/y4l3Wi6Y2qENkKxFbGB1frSgVoceHztuuy3TpwRcqeO80TOFt1CA -JnnjNnhHZO7BN0srIM9HU7Ca/v24kLRP+CPofkuywKG65XNH7209ViQbcbVG6E9b -u+yltI2bVykz5l3M4p/8mGnry75uTILMXYZXiQEiBBABCgAMBQJTODZOBYMHhh+A -AAoJELE8c2d60eSDxcYIAMWG1kf1ckCvbu/La1r/AqIbqJKEbc+joFDJIcEMYrTv -QG5cwb7PgF+JZVrLd3l66rMOWRp8q4UwohBshGd4Gy1xWTaWJT1JebCrQDaJC1zd -m5KM/668KsD2MaJWweC4h0nKgOG6Q4F5D48HRkeMhCs4+xZIONygQ8tVKDC6GEYI -f9HnpDHQz1GGmqmSX6Xzql8bJKNM7w2ku3BuzfNIuFCjHDOqESMULGY7EsQBCWaj -CKjtg08DzXjyFqbehdLwPg+UHS1GhGnvzqXnUGJm/7VRdNsIq6Lb3ZAEjP9TYuyp -H/lS8DxVUTN2wanV3WlmiWbI/hj3kDIIFjTB1uuBJo6JASIEEAEKAAwFAlNJeiIF -gwtJ2AAACgkQKZovpao+TNrZbAf/Q6x1MKhOzToKK5OHTlPnC0q7ywwNQCCc70wo -RuSxkI+iB9P6r1vUFmUaQQY7VEg5pV89upPNCrim8NMAxo0YIGL3u1mKYkFUwxrs -Dkd3qzu5EILcQxVkYPlrkGUoydltqlF1COlwLsxJWmrc9GzRch28xZuaBePXUO8b -eolq/o2VNVtGpjKbFIYQrStGde5bDIKnXSy/LqBFpNRJjDlnkmwPuvCh0n3ksgl7 -AqneXD2hiKzVKegcAOL8BpSJuA0UOoONzfxSgkSRRtcB4K8arZiiVm0mFO3ZIksy -Q+wWkN5LoMQWOvWQch6kpeilExy7cg7mFuu2dqvLXCG1mcezxokBIgQQAQoADAUC -U35wJgWDB67+AAAKCRA58xq0KnaCDvyCB/97hE+uXoyKjs5gc7pDBtCnnfJiQz35 -gbhMVmC4Pzlvb6/oIUQ/r1ZbgC2DKrGidwNif1aB5J2yKDVgBdc0rf4xin38LI+7 -TM8p7tFMzUrlkSYZN6E8RICkr6aNqYat1TB8JeBR2FC0d7Ox7+eUIW3a69Qc1lCJ -iCfUWozHNWz4xTyQnx1GguaNeMUKsRF7akTVuRuMni+BSAS7mmxiXs52HGt8izNP -EUXmz05vxA0ujSeaHNV+uiIReeSet5QsW2qd2hqp7xPii1lwTzoQrpVYilVVrlPX -kwsHpRtstMVQEihTCfnw5KJLGl7eO1MzL1QF4KG0iRIvevLsgZj0Q+g/iQEiBBAB -CgAMBQJTu4DTBYMHhh+AAAoJEFI9q8bWllz3HSAH/2/s3+tM09+KyyxjlE0RncRE -9CY0+dELqH87nHGLsMX+c8Z9LPi/20z6mpdovva7ZUnPgAblHidwkGLTvSyqukri -RFWonoVMm3MnkXl0RhP8+U4V8Hs7ToS3FTrVppAWs5lArxMaQaYl1LiLEptSsBOT -KatGDv7SHuGr/vFDREDEw3GZdoAeBJPGXkyaGv9tzqZSuwKrhEZnfuDHVxCdFxyN -rcsjzKYN8Jol+WCGFAiBn5UfAF6oC6Vvo0ngURswsdpqGnbkpBS58vrLKj9amjF1 -Tf3mH0DoZNcSqrXyBgKOVmuxlmuCdfZjTwB3vwKSEAkV1w9/x6UnkMiZsXUGsCaJ -ASIEEAEKAAwFAlPjaqAFgwABUYAACgkQP8MwHN0JnfBI4AgApZd2w8PO+L9GeBN9 -+sPQqyYoLEFdU67eKOu02s7H6vku7MaaX4xbIQheWPtS2IHX30Q6W3YAGSdjB15y -gJaGVgEwUQcoHGpTh5PSbWX1PW7e5JJT7zZ5DkMSIuYRh7jaajVJYOZ+edjLtMSF -A3Z7gcsDWbfiUbS5i0gBqsBH0JJI7UejkWcX1tJBTtC7hLlqTff1hOGzONwWPxyg -HFiaM20jmeVRmQPB9wV2p7WWiKr7txt+oUOfOhwg3fzqbOOQFowxJJB3eWz1hYBE -a8FG+e4oqFpeKbwsG6goocgHJ4uBoOOvPq5c4VmxDDBQR+ul0j8m1C+ZRg+27NuJ -r79EUYkBIgQQAQoADAUCU/RtEgWDB4YfgAAKCRBtY6EDy4vO1CrVB/41z6IqZfSJ -6vJD9Vgc9p5LBLOlX926jZwGVtb29bGR9zy4aq/iIS+y1ICqWpLZS+AbKCX33f6b -ej9VXntV2JaQ4AjATf6KquTR3ScDEHMVUcQiapOQkYXv1XWYqOOQkoFwfJkyuWDL -fy8uRIgtEACm+5DARipUrA/0BNHKaiE1CkrB3/tLYBtfJqYBSLaQdzbAMuOeGZwe -NIY9J2ZUIN9mAxhaoN8lzHGHU1AYh/j0kKzHY797hni2nET+jGqAh7MZowrNQxqO -PYRauAe4viRcBpaSds6EVnNG6g/LSgdINr4hhq4Bl5sfQVzn6/BgFLkIYN9I9xqh -q5pwqxfs/UQFiQEiBBABCgAMBQJT9UgWBYMHhh+AAAoJEEY666W7yU3g/MgH/js+ -vFM4vzdpwjWxagl00nlW73FGrEpOW1VLwWOP01WWskL2tjGiKY6Pq95aIggmIzKA -/f9L5OcNRdMYwIe1ovI74vgY0syC6EkgDZp8X6srV9a/xeSlHIqwDn46nvBwKonA -+19Hcgzv1ACKl6ZyyK7eav050rPHLKY5J0JLFUlLBgPAm/pqDFHXopqnFsCQg/zg -5G6dHQFVCtHROQqa4ogg328+jmFqKWnGg0R+BmkFk1yVxk+FFBXdNVo/XuzJXJm+ -FJrmfTDaTw2wfS0sHpAZSP3QHzzxhJjqQ0CmrpAr4rMvatZpzBKtJYIMGkF9X3ca -WY1uqp1D6F4zF3G5WP+JASIEEAEKAAwFAlP77lIFgweGH4AACgkQpzQCdoAzOcE7 -wAgAkEMHxE0jguOhsXQoUCG2OgG0j2iGjhIxfmWZ/+qZF/ZEkpBKugmWKU748Trh -00XHuhcrUpwsLNkyyRok1DR/Rsm+Pyt/6HSUKbc4aCvutzidj2gAVFh1PxERRjCm -NrnxZmBTetAdUJRLOZaBDABJ7ZNbTd1Rpi061J8N2Ed0cm6ySa5jomPIn9zIPZmy -lPe00IZ3OmflGdPk9MwBO4HdR9QBbcHajazEwLaxu8KBaIXpw9Ob6jbDO4OVo9il -8TQUcwjHoG+nTVKjZglqKXMu/fzSSuAtNO8IhJWneEoNjn6Nx6XAy35Yg7tjJVnV -1tl1mv9BbtZGEDKHrbWQLkt3NIkBIgQRAQIADAUCUo7HdAWDB4YfgAAKCRAWb8I8 -HS0d2C62B/wLGqgnprk2cqvXQ62GbGcLgSADj4aCVaW6XhZSmen8fDriVipufISH -NfegiSWpvQ+MjEynGbbHneDYwj2n4XLFRibyXsC/KhMGNsv+cvZ36LaEA0uj6H3w -Uuvv8X64ol8daoPyIeGpYHYSXKDMXYb7GypQ5OXVsdXcgP6d4/KzxopXX8/GyZOg -O4qwuCVXRRGVljB0FWk/hF5ITrTJ0w+xMvPVBUDNlShvADU0K1KR40L2S9syunVg -DiDdqhbABSKpxtpr8LpSUzwnXjyDQiqlgTECpoFOs3YOJQ5XoGQQf4wf2ww7B0/s -fkjoIyXCZB1vmh5KwN3hIpA3ZLmCvtAjiQEiBBEBCgAMBQJRwsghBYMHhh+AAAoJ -EHZpltsxgCxkiP0H/jKkM6IrlGty//3/Dc+S6cPEgo48Vdj1+JEigwvc31EHWpvT -t1hc1c+gcR7MdY+B6zg9Lv95+hmMelHTDI9CJu38Bzi5GZXJU0JYA0EgAudHaCIv -vxaFiv8c2Mif0pfr6TNyx6GS9BwiO9ZBpO9HkAUbma9SuMCo5+6TyN5PlxzDzb1Y -yKNueBhaBOr1x+coKmOJ5RDTuirJ5GTysS3N2tT7X6IxP0NEJZgBVcJmHjNH/gMJ -wtGTmMpFE0t6SW1hUcB+DZR9duFZT6nxam9LdxV2F2GHAzDlj/VyZYSTfGyQTHHG -ncwUqnJ4YDFlJ3RXvurbGGvqnwTJiMynbBAg82KJASIEEQEKAAwFAlJ/vnsFgweG -H4AACgkQr3VTikByPrb1rwf9HEi0eFsCzYhkBEiCOgzcMDIIaNnKE36n2ACvvEyN -JX0nURSKoFn7Xqan+o/PYblQvfyZ+uyFeGQ7oEV+3SSziXSDDHLXbd+FiIFR9O2W -eiVqddFbNrJkaDiU68XIug4McG6iKDVe6zrc+osKEy5u5V7oWc6JOKynxxzdEsxt -nVLx4U2lRiu6RNo9X23XwHDF3VFtSqaGIzCcMaOPbKlCQ+8zXddSslsO/Ltc9x1K -yGqHxKUnXVUOSQVCLY6NPJj351jiI58hJqLX1MnfszSFLz61DmgMjIkSu4HoU/Vp -5ZTGZtJ2ptDIDxny0LRzyOqMXNOlEXmdEqmyvAbkMdyUWYkBIgQRAQoADAUCUoli -vgWDB4YfgAAKCRCBL0nz4FA9Y16DB/0TS0kSLBYfPntvZLmDqk7gENKEQOXsXf8H -uugT2F7j7zyN+8+It//Ey+5aqTzG7dVtPq5dvdoClCDxYgL41ZC4XOAn7loee5Qe -F5IjSvz7QRprnISgCl5DKKMD2hjUkNwE8jGBPrOs0mXl0o+ln9ux/Y+VljmYrSqz -60WbDIYsnb1rt2vApYPvUz6UJgxCCHAe8XhR3DDPjyKA8d5Su+88oY5+e7Z2g4qo -myGDnce/nCZkqTHv6OXCWvpmDYRJEijMmzAGWvWzSrQ6LqmOXwK/7Sg0dEC04a9D -qfSDk3ZzBq/IVHDOA6asD2jLajgvKTAvD5tNoJESkxNpacr6u8ZniQEiBBEBCgAM -BQJS9mhrBYMHhh+AAAoJEKeLuJMH/r1o2mEH/ixiUra2qEVNp10Vj2iYbBnJ23KG -NtLHJ8liBwvRiTuCxojr4qeMLBVta7ZqZck7Al7LlpJlwTvxA1AlQbB9hCECDbtu -ZbRpxb9aRskK6XX+lPUUNBWicZNoEfvxEa09Bh+VN1abwraLT3O4lj/VNGMzaa37 -ijqydn19Nqi74UPaoDB053YZAZChERM44Tqk4ruAK7xFwwlAYg43jTRTNF82peJJ -O7l/WoCmCf6uC1OU6hK8SOAzCP7sIHmWzirURosf64U3JGNM3laWAKynNCefYgz0 -2j0ajAHcOQEpuMEoT/FHgLocC8ZVL0S+QBTid8l4FNxTvcdFkC0G04qse5OJASIE -EgECAAwFAlFcnskFgweGH4AACgkQX5UZBJqNDDYWtggAk7tTzZIkousCcbsusGS2 -OTO+P54RwZ7UTF/aLKRIWbqyKjXEMqZ0zsmxiOxSai+tDuPGTIKodNsiKf/Jkj7g -H66fQTN1DlaKrXCmcsWAomY4grUDQ2OkRvg7Zy5I5TnxLCzLz4yaVC28TMykVWwo -3i/jdS4RY3K0/hPH3z5JUDHntzb0hN32Z27+ZmAE9z4tGvHpaTnWz8QwD6qHBzNR -O09KZPSA2BsC62di9ykB6cUuAVLD0q07P8WJh7z4jv5yaFvoAVc8b2lbviXfgR/y -+l07PEicFLsdgGP8SHAUh2OVbXfTePdBAx5NLXesNtmPErVyw0xkzLwzKAgg6K1p -yokBIgQSAQIADAUCUe5urQWDB4YfgAAKCRAQFYBc09ELgzPmCACcL9NQiRxgmwhK -xg9N5n4mmfKuW0tiA5pNBo/LmwVIWjBgn+xyPXZnPXSE8eoLAb7/p1z0cY706D0U -XcLzgr+LLGe2XqLO4/A8XSkCS3JBJSFp31oBkApEgIrXPxC8gX/z9FSx3kTAwKvU -Cvbh3hh8G3nitWbDR2RlNconbrmxNvCXfska0u66CCs7x+kuKWF+RKyO1DVnrzBo -CKyAt5WtY2rhFymemUTcXckJrHnuoJgjkG1CyLvcc7ZV5+wegvaMNoIXQmJ0Lysj -Ddw+XDHhGVhYY2LJjCL1SkGPsKQ1NryxRxQK4nVBE4+h3rl2EvaYB+i2u8EKyDpk -hBWhtKTliQEiBBIBCgAMBQJRqxnjBYMHhh+AAAoJEIXiUoU89n1VSvcIAIPenyaR -M7YNZgq0kAMVEwg64yfD9CwC9LTSPvj7J9iSNf0i95c3QelnoEBeQmBdaph4dCsN -EgQMRYT/MfnRRaLTeEPBgMj8BhYbuMJ8OVS6uVr7ySpdTVc+Txm3Ri63izAMTQFS -FoWedIFH1m4tWjvzz8LFkiqP3EpX7EqUUGszrAiT+U7wfXARQLtuNPUYIgQFuaQL -I4BaOV8UqcmGmfepUO8n9ew1HkMRzYRkJNlI4EyEyh1tzz9224P0N3EbbmmwKn77 -dAffTgjIIOYSxht54ttnk5Ho9HJ6ukLpTJO5T6cWqP/IuAew17PjbhwTvaPkc0je -V9Z9pwAiRbwK1saJASIEEwECAAwFAlGczlcFgweGH4AACgkQWG8EWiUOKZCOIQf9 -ENK76LZu+Oj3m10/HaMairkDZQ10iyLEtPkrGiZZN6T/sF33ybJI1Ur5jZ23PUXU -uLTzUGFBeAx2rQqq/ocKkNiGImrW44XSqCbxKMRLfKmJgRj45SuV6xnGT8IyI+PE -L5sm26BXY30JLY2w0p61JcWTXwbR+GYl8nj5keHhS8U3Ygq2FxF3CUYcvF1u7Myp -e4KqvBPKo2Ywthjh3HRygg/whStQLrQlWUvbgA8Ac/GIP3HE6ofj0uKmfCGSyZp6 -AgXRbhyXkHxm4rfCoQfOBbdg4OU7c5koVj3cMpMD3DSWdbY+brMkp/Uv7rQ02m8/ -3nTov51c6m+fHVDKEBgi44kBIgQTAQIADAUCUeWfMgWDB4YfgAAKCRDG6LpeuI1p -0PRRB/4/0ng8YURCC3xMMMt/qCQiyjKX7nkR7dvhaLhPNVkD0y1LCOHceCUB59g6 -nVw07xrbINYHmPQzNs4+d5RUcikbqolh8W/XvDFSS0NHEB+Q1wQG+LVu5cqOQqT1 -l+QZi+17H2sVJMzMjozPWA57N7UmhCd8y7X7ktmdxdgPWT10V4/1y0NotDQUXbLt -GWUBrJDpJqQ38/in65JHf/ktEdOlG7FF4RKp+qIGUK6gODUhHP3YAI2KeT8ElaCX -fMHo6WAa4Hp1gnGqXFZ80WoT/Qr0+UyHALoxSioWhNVG6hcxxC3BNKbPFyTRD+fG -qGbTmqe1Z0KqzTALQJAVlbi77KnviQEiBBMBCgAMBQJRWeM8BYMHhh+AAAoJEBWH -DbVHfktggh8IAIyGnT2ocUoXNx+6zod+4hKGP/ZRtzL8zlIFqVaXpKNhDtBeVQ/+ -ZnrSRduCf0XYlB44SA7eVaMS/s+DHmbsNzbEQL3JBkJbNHoJ+YQ7Cs0PKcUZtlhS -nl0QsfC6KDTsEXN5K9bt078+erUUnaa32Pu8tm0hJLPXkOdHHbn2CdDjaCLw2njc -P8b60sWnF3MP/9RjiJhzv3Oh2VR67Z8R5efO3aoh/oBY0L0s2X680m1bFDLlNQfp -uvcSiKU9KbQX856kFb8ajJ/+iSa9gzzrq7R4ovTMtSfbsfrREb/bWXvjK64dRJYw -wtwpWlY8e4rTnkoseGR7GSAJh3g7PXxSPuWJASIEEwEKAAwFAlFytCUFgweGH4AA -CgkQi4dqW2Yzvwvawgf+JQBXxJirJIXGldGrWNr9RDnHKTqooa7dKc2McejCwbR3 -EAamAu0VsItaX+ynfXXTjmpyFjSGEZj7+DY/2puWY+FK1ahzdx1RYZwt77GtmKCk -KcTq1DJuezflylTeupG+M6w2B8MbpC3CvyrtZHXLSZpJfx4Fi61iCryTlTckFtKW -UaeZlaUgjn5WW6e5Ox8jcNQOGcvkSK457x/6wUeAnkAJwLyIyvtNuz8NcifXr9Zr -Hn5dhshUd4f1kPqI/WfiAhqdBpH4XgCGHb2LQ1VlBezJAv1+PqwQ9Jy9t8758VAo -CA92YKkJ0e7IUW/R+3GzpDM+xG+DZAQQ1tqGRfTHxIkBIgQTAQoADAUCUYGWPwWD -B4YfgAAKCRCj2Rh7pR0RgyCPB/4gWV3bOq0SfJktC8F4Kje3GGVdYpgTirRHeLfH -O6KD+VIQJPSJW7Us1Eszy1ej7npuep6TW50kt7hdK7t5PoKfyOoiHlVP2jRHNOKQ -lWcdRHzHbFKwi2vn4MlIZc2RiLWS4Twy9sdbEDvcCxPb+g9insMqz8kZ93vCvnTF -SDWdhNzwlSMa1pjfT8OEqsaqt8lNrvCiPLYQKBp61Y3yWSIqspgfdtiQmp9GddXA -PgLb4oCCgFKi+9/BXp/1piKjZPvH6ttbzRT7p1mP1vUfa3RxMbeHYQXD/IDfDHLE -mN/j5YVT/CEluo2wIfRkc/Cwq1vv6gq41nkNkLQoS7P7Mk4niQEiBBMBCgAMBQJR -0AoTBYMHhh+AAAoJEPfme/mihxfETIYH/jXoICylgDAGECgjDkaR1Jxp7LCvo0aY -2qS4zwS0FMnZbjxJws2Ozfjek5uemzf0Db0qq/KxkiY1gGGQl5knPlpe26cUDCW3 -XKv+slJtgPT/sAxMF/URcRtx9rqFPf57I/3TN9LW6C/vrstlvCt32BceFRY5O6FZ -tXHPbm+tsWdFUP5nCkuSx5bkQJqio66ergQmm39Ghu6NJo/6xh9dlWFrzt2clS8Z -gNV0UXvpNtDQZmoyTRAnOhUdVJ4gAAA2XK0I345GG2rqGgfHisMOJXrxMB7V4EJs -kM6bB1btYPQFn7JiqvFbbIPDPr90ZOXOOP1cEZk9Mfsd/clgTWOGKKSJASIEEwEK -AAwFAlHUXEkFgweGH4AACgkQiQn6grMjQ/043gf+M3S+L3YF9U+V38LkwpC2vQMs -OlKoBY91wWk2GlB/9bbfbOiCk+KE5ZvviWhy6pYiiy4d/60AnPq8sbmX2VwZ/jJH -/+AnYEQcICfSPdcZQ2HYzR5Az+BuoVTkCE1uCWn3/VvWKKCExJxrvhYO86mm3hX/ -mlvMcLGsyTyVtNo0el4b++DEh8qZO3NXW3j0awsDIIgniUz6pQ43LcHCauIQxUFs -v9ps63jhzn5Vs6UfuPcdwBTz2b0W5YYLJVEO1ylnMkPXNyLxsnYouDCq+9iUXdpP -juN44cCaURhxzpkp6+ydFP+tBr+79TGiN6Fjyq9SEPHUOjo39ER9Mlt7ezoLi4kB -IgQTAQoADAUCUdRcSQWDB4YfgAAKCRCJCfqCsyND/TjeB/4zdL4vdgX1T5XfwuTC -kLa9Ayw6UqgFj3XBaTYaUH/1tt9s6IKT4oTlm++JaHLqliKLLh3/rQCc+ryxuZfZ -XBn+Mkf/4CdgRBwgJ9I91xlDYdjNHkDP4G6hVOQITW4Jaff9W9YooITEnGu+Fg7z -qabeFf+aW8xwsazJPJW02jR6Xhv74P/////////////////////////8oRjTHzkT -fwXr3TjoHjgLUQL0UHTsHvoPvwXTnTQPTboLgUAgsQP///////////////////// -//////////////////////////////////////////////////////////////// -////iQEiBBMBCgAMBQJR1FxJBYMHhh+AAAoJEIkJ+oKzI0P9ON4H/jN0vi92BfVP -ld/C5MKQtr0DLDpSqAWPdcFpNhpQf/W232zogpPihOWb74locuqWIosuHf+tAJz6 -vLG5l9lcGf4yR//gJ2BEHCAn0j3XGUNh2M0eQM/gbqFU5AhNbglp9/1b1iighMSc -a74WDvOppt4V/5pbzHCxrMk8lbTaNHpeG/vg//////////////////////////// -//////////////////////////////////////////////////////////////// -//////////////////////////////////////////////////////////////// -//////////+JASIEEwEKAAwFAlHvi3sFgweGH4AACgkQG3ooMWsbH5t60ggAh6ds -ux+NVPA4/wD7eniZVHVAR5kNtFYYrmfjZFdNblKCWOizE8tHoqECpsUSMykBVwSu -WnaOCcsMUoiWjiTlFkdnMCcvyi4ttmiP7rZIDSiUGj89kxb8MKCfajx5IkD+c893 -f0AVvnnQjA+eiX9rv+AGbpqUXnz2MRpEiHO+i2G7t2s1L3fNTEsybr/0jYGUhZ46 -74q6iDtGlZd6uk/RQug0uR10buMLxjUzfDU8sCKB25UxrrGrfEf7eNR4DYUIQ+Yb -k3ocmhK83AUO6xyI1bo+UFrvdgIfETv0rQcmaNNmAZVT64avM00FYWVwCMuOT1Xq -SEFJdmke/BH2vt6S1YkBIgQTAQoADAUCUgQOUgWDB4YfgAAKCRAOTfy3D3VnMzdD -B/93Hp8wv67Fxz+NkqIA6KXiUK20Hif9D8rPDLnKi/qD3ytbKvw/oGaTjsAF5yTF -vAQc0Wt+GOqkI9HBagLXrU9fyZFUx80PBFXU1A5pFXHCxQOHKu0GanfuehsgA09N -Sj1jZuDIFwhPT2AheD8lHMx1LGAnM+A+ppToHpiYRLCWLAG0H1lY1dPnbz6sU948 -hVQABQ86MpoqMQdXggT99IrdCxYSe4vLVr5uEgIE/DI7wCWC9uLgjQTFXEXi1gSn -iI6VM3Qul2+qtSTdIOGJwsmwR1hPdrYDUmFpzowc3Ke2FOgiMXXYOx8+0C2q8/mB -i5s8BnHVSA+aAze5ssCxnRHNiQEiBBMBCgAMBQJSMz4dBYMHhh+AAAoJEHBh+Po0 -6oYnsvoIAIwEBX2x2Xcuuz3qkcZGxQqL1RbPyJrkhQ7N2loxmrHaphkITnrCMvWm -BxuygO+PyKcjQzYXUIdzB1J37H6ti5FnjyEvi4TyM7aT7QoBlpCIISyBtgLuPEw6 -nql4F6Cltu2GaelxAlCmxbAvzTAaWQUyHItGYYl32l4SPJZZV15vjEJjhHmo7fl5 -AYvcwq73INAmjwTKuT2Xo6XJYH6tJ3x0wZZsVGHt/c23q0bDRhW6ZUM8fRZEyok0 -qxvGWcMdCDg7R4qNmznukUh2elE7aaW8jEZgw3+Clas2zWxcgAaCkePARUZcWKJ0 -lPJY+zBAPbDhqxkKAT6NBbwETs6fmLWJASIEEwEKAAwFAlLVP44FgweGH4AACgkQ -PDe2gKyQEhBjLQgAmg0uC4ODFtMlNgbNW3gFGSdVTxEmcsTCPrWVdJpyEcPlA6Jy -yEJALrVnAfRyLf4o92WZ2k28mfUJkkjTUqpTBPTdw9+8S6iTjCfc9RnFSv5Bj3Ja -Rb/l/K1AaRw1Ja9/cActJ+RoquG/QIpspWP6X5oRU7Hj36mfV3FvVEwf9Q5Tjuav -xJN4Q6dBamJfAjTW9l55YrErrAsxSqKyDs1STNc2Ydnq8OxmcW2O5FsDPe5P+DMD -sgRpJTCWjUlbhJohapmWaCgAR5+7Kuv8HD9AqYZZ7tNtAzASnmf++e/tezlnNA4H -uyOH2D/01zN7LIqBQg8i1uo9APVxZWDV3hjWC4kBIgQTAQoADAUCUtWwtQWDB4Yf -gAAKCRCQX/zLSGzDB9IxB/44d2M0KsxRtuW+cxBEkcGKS5uhHseGQLSkQUa7zrL5 -/o5fpP6jnXpL7hie0FOyYNwv/HlIiXvHSLdbqcQcoqp4F+K+nC6hiPKoKUnkPGq5 -sPnYerW7jVIpemZmBiG3LoWbGIO5fQJ9/X2WRQH7sOxClmCC36lHGu4yHTmK/WT0 -41BYIxjOYio2wpNUW9EwENWaseCp8sUClBSyo0ZDAgwSaDJFfV4T8YHXkouhnQD1 -Xslw9UMm+aKvqF9pUgEIbjnocMmtZzeG5p4qWzbbwtvlygNWRrHlTHGzzfRf16Hm -hOqnZTWQLYVKIm4mqUySC7kg8bXHkugvqiBw8ZUQeTELiQEiBBMBCgAMBQJS/8F3 -BYMHhh+AAAoJEB5nGbkK5hLTkdIH/jq+XWLIme0pPoiUxguMAsjzAggNmryB7+uU -dOJ3gkFKJvVylQFK9Dq47nZOdV++v+BEaEVmDjXAmu5iehUR+8wDLTEuds+7HhAU -CTe1DxCzSQM1iGCXO+8VHtOnM5jcRhmUEeyt/Nj5zt3egQyy1B9IEoH9QnYwXye1 -tm/iigK09nB1+BI4tArXtjzPzHJ7K49ftfYiMxzw2vfhrHYaR07javIa2urzh4SI -LX5BO+AP0yTdZ0hiNxl9wPtFCI0idEp/GfpiU0zdwzQDGu7+s/PU6FJ1b47UmarX -lvJKONkVicq63dGNZKz/gmW1lTGAuciZ4Lfo/XLwIQLGqAAixDWJASIEEwEKAAwF -AlMHJmEFgweGH4AACgkQV30k8GJiSpWFZAgAnKpEHDzKzyuapd3ooBkABAppYyzt -gB0/wCqRKGfIdEqtkOwXYznaNYu14L4513XnA22SHr6VI9hK7kHvjO/Fz4AZItQi -whHXCwMrwWF4LyZiI3UuSm2pFPbh6av7YxVdlwVg8ePXbZL9KRmVE1NeaeEOOkLK -vKYdZIb0ynnCOT6w5xyKy18G7REsX3EZ/phYMB8ueUa3bR6pp5tteTVah6RrKwBk -9ggMC0Y7rod31cTaogb0x29qbxY3uUBeeQVW6olnxiJrhJveXX1woEfzW29EP9mN -VLwADXZGmWccsInO0gb7HkxlwBK7+3ObV7k6pqul5AtfjDw2yuWI7spRVIkBIgQT -AQoADAUCUxtBfwWDB4YfgAAKCRB3/8UYiE42TO3QB/0ZozgVQiKFPV2UNpA1aKHf -5FoPXZlExl5z0A5oSX0wwfXErZo3CVAS+2nXY8VQo1PBlZwxoLMvwayJF4GkmwAI -UHDl9RUMLcM5kuQHQSMR3UIldhP6/SPaoRwgiw72WQIZhzP0FkW2tEVuLqDdcQKb -7jqLH8/VV9xnsy5tGsU0E2YQhCZe+ICCs+kRLR6dH/U719VTu/NIutZf3vLs2RO+ -rO44sRR89xu0ocbvwEmHGUH9ULyZ+ZWVQXq9fZhVOoAJW+rOgpW52cQpJSmE4Hb6 -KY9nJAuE3EAhudwOlAId8dbMz2B91BfNJH+v1ZjT7o1aGe2PKT08Ri6eDPvM32Fd -iQEiBBMBCgAMBQJTOWsCBYMHhh+AAAoJEOylh0vRN3RMh2MIAO5o47jdw5xbNLjq -klGputjg6gL0t/OzJI+aykVg26XmB/YpX9L/Ak+OAEuCRh+mhtknpAOQeMfz5Fxl -HDGM5Uzl1nfPyJIda0kAcD1mci9KnfxDLrqWKYyeIyQUujca+tx8vPqcPcJjuUws -mo9vUZrMMCH226k33szFujQgdcAAk1MOBPoLLY58ZWy9ai6Lu/6E+cNdSVK8bAaF -zYdu0z4elRiHq3SLDUyj2qSuN2B1m+Tnu5dt3QregCdZn2eB6QhG1UVK2OzNxKYr -stEflvsNQpiQbzKOLeahcNv5SFF+9BxYmGuRxI3esoOUFhiq+BKtmK6YZ/PVk4Ay -YP1ut5KJASIEEwEKAAwFAlPVl1UFgweGH4AACgkQgYFf2Mov8lClWQf/TkleWvmt -GbDpQCGIXrY+Hfln/9aqpPABIcaM3OsKAIY62RMnL4/lXzHI9IT/YVsN0CmpSslF -8nSCDewXa2TIDKi1l3OFIlIpmMQfTUtpDDTqU0eJ4rPwzyii/u8GYL8DcDUZqqDT -cF7H6xYvjv45kL/clNZ/VlMI5iUYWR+2g8k622GtGUmbTvxyfN6y5y4LL2rViFIK -S8qA5OZlV5g28KwxWbpgMjJQcKv23jbM/DZfDYrXYLYGDUjKZ4vUUhTiQUKVdON4 -IuqW2xDpKdBOM2SIKSefKfHClP8p3shUWhBxnzUN5C5eHhqo2zlvOfWszrJzk7TG -1H2H7JvQpK9zPYkBIgQTAQoADAUCU/QmzAWDB4YfgAAKCRBidJveUmCJKwyBB/9I -OYufasRrn6uvj/iW79jFcrUSwczVHh4Q8ZBKFVSNG/rJJXtswA+H2DVzjVHU9BVh -GjdHbrC3G0Gqs2D5vX+yXh96aRtkEqmHGvmGuTGPUOvIs6w2HlbgdN8h9ocqpFAH -GjHmnFPB2GqxtxIKBxdAyBZDs6dz/ngkHH7mSrZphbufrVAHRR/3fPl2xRUUEPmz -hzwATAtsO9vtDyNRBZ9sDeCPkjSu87QjWLGC2eLkOBq3UhRL4cXzLNAMBdQXMGBW -MZ9pk67Pdz/sJbRcxbeMYUS1O7thulUjls/LYzgfqiIiDnZWSjKcTaEwBn/I7lsm -tDZ85RIvwGrkO5pdZ87kiQEiBBMBCgAMBQJUDto9BYMHhh+AAAoJEOg9K/aZaD+s -GwoH/Au3IMfqeseL4QbiIMPcmOw28QbfIGYES0ctKTkLhz4u8pSE9udyJ7TkBzLd -Kd3gvs+9twAtkvYEXchocwAmaHgXjJOMj+qRZehCfr1TeI1bYFb1NUkLR+Xi9yxX -B1FbA5SGWxbI+OBHzFdVViXl0bQbXom1wXb7nJh5x9bX71O++bhj1z9md9SRM3Rq -NN/+6h81vWd8b908L8y7rgtbSdaR1Xe7wtUeoiYdIECp1CHBt7a2nDpA3m1GSNBd -6m8ynpUdt358HxmEwIICFMJ05cdlNGCa3d0sHoV+dacKIWO26ulI1/t9j+BN+Nav -kcyXLfIu3HE+LYd/ncNiG/PTjduJAhwEEAECAAYFAlFLX+oACgkQoZmdJ3tJ+e+b -wA/+LIFF7EVTPLu4rTuEwxL3TmCpVj08GeBA+feUxxZXFV+MfWNqW+Sv+EI6418C -0pMklta6sXp5/ZMv9xeTrotkfNFXKxk31aTktJXMxIgr8y83T+wV79Bvw7Fv6kj0 -FyPjZKxNzeFIu6xOQePLu3TP6hkL45uPclOP/RDc351mGw0GYM87q6h0D55wyElW -dQpnvpGU22ejVnnidrJlEZawGHXueu7y7SbnPz6AQeJeZv/hCDJdsYH2khV78R2B -bN7/tLeC1ecXHcv4Er4m64kTWLq1tYacfVau3lUXa1RKgHuT2XMySaoAsWR3TSKG -+WnblcL+O8UP9O9P9qDK9ypLCEEJAvrKQSO3T6IoN93kAkwwuYOy9/szougLDt2a -FJN1W4Ntm3AGp/ofPbeqHbF4/pmeA7i5XHmLCQj5YPclm5FPToKTHMqvYbA7gs/N -VgnRUPESJKynOSDE4fU5CuvtuhEd2m/ZCAGoqn1KsOlVwdx2ZPvfL5heBj1ZFuRD -DIAY85oE2m6MAyj6sc9zCi8sW/hQFHne6jjfN0nb91CWtSm6eY/hlJwsrx29pW6H -wVOAgsvyjTMjb8Bim9c+AQBqrjrMh3yn9Bl6sCKBcBB3sOUGSIHAw+kD37H6AN5J -a5lVA6MSsQY1FMnijEoYC5MyFDjH21H2VDh8la89GBOWjp6JAhwEEAECAAYFAlPd -juUACgkQ5R+wkcOzh0X2ohAAmH0DrKeZpAlIUNWmvGWeuba8pHaXF5nhD4gi5JZA -T77IxVzTau7SodU21hupnOGaNMI/hROZcRvJJhL+7oqcNBmEovGHhK5JVxEeuVX3 -RMJPt7MTNenCo7NQRbnSggrFUA9ce+qk7Suc4n9ExNSGXLlyQJKc2wlRqrdtoy7X -G0/7a0kXFB7EN324JT5+4KlS1cIMdCPPeEpRSy0M9oGlSkOAx777iM5IUkS3y7hx -OIe+9yl/7lcT2UGt4cx0cLnlFqMILo2nIfebmnl6alSCLWXr4JyB3Hj5OtI1azUX -Va2cm2j7ZU7oR0dw1jR8dNW/I4w6sxGuTNJ7ktjOpjyDzHZYbgZre0WHrqbLS/Op -+F7NIHlDNmYLwF0XXULu0CVh4DooS9uqoeRDXcDamVoymjrRizS9oJizJ/YCy64/ -HuN13gjZBXP9FHz/4My+/OOQLNYM6fT/g/jNnuSgY3eN8TQqXTSx1IMO6Oofu7fQ -hG5TCTPH88gD2kS2+eIlv4xYaB3aIiORyBM1MIWD7epUGLEtR8r4TxBGkGpzfvBw -r9cwA0AHN3Hpvxlav6hWzIXC4puF7VujyCf5h+5jfAov7q/ho6+522EvtAOdciiM -fO6Wv6WpLmXBcrCM3WtJuT05ypDYr2s9uuQPH02p+DQr1QTV1MBNaPbmSnSIv0bo -kOuJAhwEEAEKAAYFAlKUNM8ACgkQ4YEUlHnAQMZoew/9FOAnWe81/kS2/QwudIb6 -RWtfhmzRO796bPKoqGrBKrqhlIRiLRT/jJho6O0yJhusN9i5N8Do140rho0eYBRi -YCtub/OLV1t2skbW5Zr7PFSIrN30nwLjB1t6T4ZM522Hmncic7PIZIwfTspTnx+X -0IEVvQkEj9qKx824JwUwW/R9l4yKwFWSet0J+JKBXVtciH1XVoFxvrs7Tlp9+OKf -2S1yq3ORKAwmwzLvJoeCsUCxUbt8t+pijGiufR4gN1VzReAkhBgVD8iROpEjtZtx -+jbrBGbZEsriDlw/7/c/b07uIJ9u4DcbWegk9EsvLc48TUD/f6DezlBTzbRZtI45 -PVWihEgn+uXxG5ZCh+rxQBm+mo0KLYFDkWztDEfpkjyz8Hyp0cscErnykSaZfl5k -G9ebN7V3HmW5fre4xovQUwDUyc58v2ICxwucmWeDADAmF6ShSZgrDVUNgeAJK+q0 -lcOVy1v+iCwvkiS039y++XM2NDUxYCv78KZ+1Qvr3hd4W1HBA1bWb1+1f9JtezIT -XjllN06qpYkdf3FPJbVrVBX2em4Je/KkJm7suNnvA/CIxjUsarAz9W0OKL80kpIO -NI5LmP1cnMM/z8p1t/C6NclJ21W5DcGZmoAUOK+BdMoALFI3wTdiAslI/LVILN9e -mBpxeI6kyg2Y3XnMUjs628iJAhwEEAEKAAYFAlLkVS8ACgkQjO7oLN2+hE2V+Q/+ -I7HQGn5BGxLWw+JHL6CaLNjLGVYG2gnWsSyDtWwAyLfi7iIyh89ta6tuMiN0aTBn -C1LvEJYpzAoLBs311Xu7nzSEmMaTEq6aCphgKl2G+t2TAC+4xwxx0kB/TxySJTby -zPwM9Tqy/FD0iW+avbBNqwKEVF3Pfvf2GBzoNF+z1UIQfvi4VzIKcO/1lUCancpe -obzMln/l3Hk52QiONfVSX4Jw+CuGOfay39ZyIwO2ACXx1QbgRf11tTBcEjjHYLDf -hJyYzGCnthpbcacvav263W8hR0rT+huJLhmm1tvgCtN8ZfcVw+y3Fpz7+CSPp6oV -Z0z29Bsjxbh3+2e4OYaK4WCje5dRZMjOeYvF4EBYqMmxYvxpwFGXIvq5ogmYf2+r -SoukHpuxcVLQptocpm7mxoMh7iquUNHlpI16eUDBuDDLJ/OVzGCgxDJ9cRjg/L5n -rN+GUSnAUsk8DFSV8qG3Xj4TZ6/g7AG9qt6h8b/lXCwYtfPIiNMle5nMhQdFCQAd -08O15FnaZgIz6pybVd/PoKoXg9ntj+0a5bEaKehJ8uhSK4O0zeEv09zdR2wmpZOH -Rvnm1BEJSn4Wr3Eurbu9Ezht0gLpvVQeCi8ZESGqfsNzx0B0l3Nvo3iC3s1lfh84 -LTJqUKQDJMFRwfBn/hz46o7RbtVbn+l/ArEQ+I4WZ7uJAhwEEgECAAYFAlGreuQA -CgkQeyTlUxqX988odRAAmZXIclGO1QeqlfzLoFnPr7ZDvzwlQE+OGQXRyUUSiNZb -VoJu6+ZOWPdixS8MecSFCQXGLWDSBzvIJzYzTTGWcV6XmK1ZD7FP24lHVsUO4KMv -i8gL84qCE6oUsO69T49ELIebmwoVTu9K9OMOe09VqL/5dqH4Qq/MiJlrjDOjAYw4 -85c90GZE0g3ZcYoOOsews6tVqDkMRLM4NitznvnqygsKY/k7V5Q+to2MJ/2uKDkt -YQuZ9g50/0ksEibfZDaBhpaMmajrGb2Mx4x718AY10TxMsURcN/etq1z7VmCV+yX -cm89qlwSkbegvMXJrPxtTLwdsApZJXK6gF3khkXd37kT6sccEsld7pK7HOUoELPo -LM0K5wz7xKRdVqhzV01VDVCo/4LZInZ19Jb4Trs+WG6MzvloTWHCL9aubUnXQ3Bh -3rH5OUF2Wxb6d7jfH+CcWXh+145bxB2zXZcQAbvhJCVEVDEohEOqlatc/hKnpAJn -5ga9Qm2OXkV/oBA7SDa4anJgvTnHl1+3BdRpxV3dxo5ZyhGLC7q8h5/EknbwzWXp -/McePStQrp7MnRmq+H8T+0Cr63Zzm1L5A2auDXt4EpRm4McUQv+ajgColtDNFGi3 -ZP1EAWyiCbFKN5u65qG08qRxTeXN50fZSizHcAnB5A2EEYrOIzo/99nig2zbsMWJ -AhwEEgEKAAYFAlM0/KQACgkQL2O/igQUx+JQZQ/5AdoUQaM8i96RRm6pGy8knew8 -7X/MAwi7OgUE7fSu1X8GeeNFG7sMs//87cl3j2BubtFgn5o2l6CrIGQijkXtKjRo -orKHT8EfRjmpBIFXEF4mdeWYq78o4830rngR8jnrT/n1A2Q9p7u/jXPSiEYRdpNb -dDCx4i/u2kkT5846vpJpdZ1jt2CgkKxAYMLWdM49WlV/hJ0ZgfK9IwANPGCCnnn6 -YsOLLNI5xBjZac9vtTocM+S+M1JkOif05ER4UF1XPfAI9qJGStAFEQkFhFz1MEgh -0t5+/oIypCVqK81tu1fEFz6nVYQ0eqUjR0y90YMbthe3kefR6tPTBGdr81kfRRu4 -wHAlKENvJcGHgtVPe2KVedc5/9749uZLb4w//xCB3d13q2DCwVLRFGhkoAEqR53H -Os2z36gwas8pg9vg6w2eVRNlh1wAWqEcddNcU/B9HtxNpz08kyDBCjHnom/tETkj -xGKto04gq+up+AMh4k2Bu21yFjf6xURmUs7jpgcq+gSRgD4UFQwqF/QWOtIqagQo -aTTmZFivM2nKyZ9/A2AjTVmnlztKPi2ykQ8NSrq8ee3fGfGHBJXmsLH7t3mkdJMx -6Kib4Im9cw2IT5bAWfMYcZ6sBQh9ide3Zhdh8oBy0CMFkF94UfEoeMQoCTWnfVsW -4NfuaVtFXSBFyxBVV3mJAhwEEwEKAAYFAlKEB3gACgkQKt3WLHscsGKLFA//WwtG -wAxw4wSzJXPIjLNwSTdfbYP5mmO8LMfhtYJ4HyZiZ236SKfYzYkpcNOwCwTNaShC -WLR5miQR+bIVYdd9beusZBKkEzRixbWAHAHUUibDq1sJRoYp/GjrpJNHnafqux66 -cHW/JwfhkSFKvdmvgZZurhg8rciWPfpuDvYPL2v0q1ppl8vdsLjh1NJIGWi+ZaCb -6pZbpNe7aNeCFxl+YEy6uJVzZpgdb8C6/0JJH/pebIsV+R4GcyoowZqjiG5TiCHM -Z26FijftPZ+H+4oyNn0SpP5ip4QmtTUADsyk8jT+wVwv+B6mPtXFy+Ttzszsh3xZ -7mqKMZ6qD/ds5e2C9sN5OYWYQp+MLkQ3pV3+WgNNKIdm5BwC0y3YT/H668L3p5zz -1mLgXmRXvBsPYm8KXxzXFKVxz0tACUa+2Qvj6d5pPGL8R2jkuP7Bra0E4LuhekpU -djOF1iBXlNdTwE6ifg6N16WTCNBhw/j6f7nahWtn9JKWxfIuBOIPJ9ZaOCs1h4LG -AqvP76RyHcZ31kkdGScYnFF4UEH49eoxi0Bkne6xFzhdDffzddtlr6P+VRQVENDR -m0QCdyI/oNePNWmBjLfXXwWDXRkydi1nXGhoSjwJyWJXsPJPJbvyUvC7sOJPKVy1 -4GeNvKKxLTB4D7pOgEZzTwEQChdLkuNOQ6waWiGJAhwEEwEKAAYFAlNUVHUACgkQ -QuqJtGAIlsyZ/hAAoAx6O65gemTRw5HbX3YlNl+YDS+HVdmiM+9tkfh1B2bZNXNn -WNtJ/rFKvpGWXQIFXjINhjOzgRHZWIgTLCwRdFP4JA/nDEoQDnjIyaTuAirrhJpL -ok+gInfvT28TabZVY0j8BPB2sbvYtOSdfm/6f3ITkG0+W1eITluHefJtDDMfOxfa -rKSvys/GHJmaLphA8xzlehjzuj/IEIzeWJG+vy1Tt7HqqaCjM6rP1ISzLSxxcihg -MTXm1WoP3k5n/ZH2rBKdq/TqITzh+Ag3B7I1TS0TVgDo63QNcdo5ABp8mZ/9SV9N -3lWASn99adAyCBPNuCUzFrdAKxD3csNzeB2t0qGcpPuVRiL58qxzCRY10jETRp1N -ew3nMp8zEE+dwNVKNONY3GdV9Aaf2Tr0PMULlsgPB7pefLVB3yKlFWjburOQ/VZD -Q1ZJBVSQ1c2ZU72O2cICKRtuGZJh4Tm169zK0w+0JpWxhSikY7vCoA+2aSDD5djB -ri4sxgefIllmZ1GUkLBjC215D7hqY5QjfeSo4g0F93jOwG7lBYXgh7d9q9E3zdNI -0sqC6rJBu6i4txBmAx9KCdcaho5JudIWQjtd7RnNdxjI0XZm1paTIxNq/Nbz6xIr -QuQcWo1775zh0ZLFTP1jeut9DZIlyXLTunaAEgIGRj7bj1DzVgl669Milz6JAhwE -EwEKAAYFAlNlNtEACgkQwMrtvDLNLqzWFg/9Hy27jA5r8nfAO7UYpR7u+RpjN6nP -tQ1afTYjbe2QSQ0AbbtXtcxMbjabmmLaOJqAoUUONMDFgEoOBrhLGfYh99RLPqDX -RALvJf/El04SSEU96hmN1d3c05VL+CK25TtSqHK5d9tVQ7cd93i+TDrLi8reSrYx -n68UASdzm1FkT0XN+MNjRrqfVqZAXs05m7tMm9Ubbl2f4PA9u79a0azEzxxJpLzH -GOCoKOK6jnsfZxiKdYWtSXRZkiH8LuQKSe7FeDxmlVSr9qXFkkAsSYB6TyZ+DY2h -v+0srQaakC9T8RJNcBk+gZXNYafp1L7DIJDRmazYRoix6Cteh0uMyJ/S/AWWX+0B -n7Nu+PAnPU8aYt7BjJq4fNIlqCLamU9ssmHT0qa+8LvZlniSQuKaSwlKtAZagkTs -tf5E9eDdQuwOLs9uEdTyVIpOuwQox7eByt64rNIozM49ZafVYyf6y+uR0L8oX/Er -ld/G5AD80cuPowwKTAc9cZXfcXMjAcRUrJ3LlzwIJl/r0fOUhcK2nYTE9Lcc3cwN -M+Q8HfitB6w2OU6afo2Gf+d5zQ+ZMupPF1G+Aw9+dybKbygB+t/F7h7hyPut+aRY -iiiNaIpVCmGAiI4fqnokVCcrEIifpUJNZaiu1ntSAUaaywRYYlO1JNxgWNMX/5MG -TIIsTB/to2N+PlSJAiIEEAECAAwFAlET3tUFgweGH4AACgkQtHNPjD4qWgm6rA// -ZmPeSigjqDn1wtk3pVCYYInOSTCIEjdMZjkFYoWkGVaQ3FUhFlaQF9OmcBzebz7n -Pjlm1NusQXUn4JZXzmeaAlIf5tz3Mu2sRkZTChA/hsd36rFldcpzBa2I8rsEn25O -/eFW/udqjqUlpPx+OFUC4H+19MgDIMB4UMQn97xCW9irlWzTCt6lofE/frO2a5mC -cPBCSnNzShHdoGVckjfzDy5cgRdqVPZGrVOOZmKXkBhSubfX8te/iT+9Dp/+epC7 -OnsiPQxkcF4xvs7i4W5+hxQjrcWW8ZBxhZZCleZr9jO0sjE5hkG5KvekYKB3qAgt -8XcqMzb2OH6BsEXjsRD/HSo7PqXjImdXR0wBUnvZhoeB5wf6fMLwiBoKrpeB4gLd -oRpwtXmU1M0Yn4VXOLZo0ACFHFjZSEk5qYBaYibzKl5Db9LacYZH3f/QEL9XK576 -BuO4TsY0Uzq4DzgtHCJIxEv/VWCIbEqhnPyQoI4Hle7PFbfHkMC3RsME90ywJiiU -/WGrMfRx5/LAdZ0IcTKS1JiCo0Lkzwcpe9W/GJM6jOZOsClGbluosjZltRAMHgJB -Qbzk/UcpYLHSfi7IuPcrh6+bkU0lPgHxwfR/U/aLs7ZQRQTtFsgtzh6skFa2YGDH -5ejDh2jerMmGj/LZySSftML2vN3hHv6sNknVPtwqBjyJAiIEEAECAAwFAlFJAngF -gweGH4AACgkQZv2gf0WfcUO2FBAAjSQdqPLD+3JSfZIFRicMOc/jIe5weGGIZB8U -2QwiaNQqf2fmkSGQc/uw17ktiRZKGOsGChVuKsXM1Nce7B4hYIXnHnAtn8xxeIfs -McMBMVWrzEjck2LVosKHUKH1McWr4ogGk4ZyYqFTNQUqJ7Gj00o2m9ju+dQ3mJr/ -H3erjfsUoVKkMoEwTl7GXwqFKXlc53bR+N8vR6FhRvGuf+XEwi3bK8oyyahPfvyJ -tMikf53Pv+cya+hpLF/KNVWKn6zPwHulnX7xTih9YRu51T1bmXnoFbTU305x/JE7 -iQPrl+KhI6y9LnbWKG8nvH47E9+HGNJbblf/QffTN2xMaBTRQUxQERlPPIAAzcY5 -Qhpy3DI7bi742Lrlkm+EKBfI0SU+RFeC6x4pUaffHyZ+vCUlBwY73VfMUuPa1QWP -cQxcdlUbGHd+SuWiF3P4z3GuBXXfTylVazSabAUvQv9MLiBj3/PB8Uv+citJRyJq -f4PBav4zKeHSuC/gT9ydKTGAJo/Sob6SWnzT6REzlAyrAMrqp+bA7JXqXJDr9DIa -xz+dR+XVwcKlkrMOU6++jrloJBCxJPC0pG0+7KxERlEmzmwxgKN8kCRSC/c3ac/6 -B8n58KEnbFVAvgCufVpXBqRXQ0rPeaSH+kUsosnWhKhvOk4X1VIIGe0i/wLFx3+K -DHD5L0mJAiIEEAECAAwFAlGqq8kFgweGH4AACgkQ6/8lC4ueTn9t8A//QNVqnNed -hMvChOiRsNKMdtOynilrnbKX8wqM8wEr7CLb+4Bzfyy0/Q3V18OJFXmpRSDsPuQF -9daaQU3oxrU4572EPFOYeFrqvxArEosdkoL7M+SueoGHJaWTipSyrVuKl19AvRgg -7NDHQzbgk94FuHIRDdu879ydtGg7roh/7I9J0SeLlWxrJV4Y/qR/X7UDqOyEhxME -yAehWNePagI6ksTCXC3r/0Eve2i+azBxnl+HGvimtEEypRyEIXumP4IuNi9Ios9p -a9FGw9Y0n1K7XpR2Rf5zzg+fW8j+tDlxEhkJo4L5wEZVqaIRzhj9dUuf+xxyyWl3 -Kgb583obK3T9s7eDV6j+sXvlpGQ4Dlqwsgk1TYhbbNQCYU0hzRumt354QPnWoESU -BPgtZ+zOqz3jIpw3UWCg2E27fTomvo7/bFJVVYr5Y0buCWTn4ATZsQsZY/113M53 -NujxQ4vBKJM8flfTsEYxNRTbVr+1W2Lk7CuUnwgbkSD0a7bFWRdsCFm8VtukGJZP -vlGPLeaV8PLrasQlcUzMF+DdGNpUu97edEP4Dt3AloyqW55M435uBQdunA3cXlpX -IB1ZciYajQwi7i5wSlk2h3bcGvC8EgzVQwI3RQ142oB/RMCJbhnkMIK1kIF4u95h -2VT237JxzSallgFUTvh3MVK+RU+3uxAEfD2JAiIEEAEKAAwFAlHJMQsFgweGH4AA -CgkQeu3kqeahRlHmcg/+Noi1qk6ow2QHMIb4vqIY1xEUhMe6kORung7sKhILeRKi -VghdNXgBFrhheEU6o7QDMx7qrbHKc6vVAWnmCgwlDwSVOTWBOK+15kNsaSxM8K3F -A8lvE4+BDWjxIoLqFz9kKkUutmlcjUNxiMrdkRD8kqVkPIDcgu+7hmvq7uzGuGua -c9PQGavPXGBMaDlWx4k61kpjnijfR9mgZh2bw43Qv0ufk1JS4Hb/8oWvFT+ltkns -/gUY4nkNQBsjoT1kNskhaQSM7XVfdVxDEdw7tI31O+/dAWsTcl5wV/WVDpbwr8lL -6KUQ5/ZpTi5rWG6OVHps4lTM3GVi1SP4DRDGmifyQ3eHOJmLLw0j6yV4FGcxt8mt -SY3OjOCHO9m9MRwSA0IGiyOaw/UYubximVqhyHG+zRBxjhJW3pwq3mSc8FG66MgR -8KA2rXGfoj2kDtVxDotUMihfP0UZcElmp4CqpteOgLNdzo3Mvj0KWvf4HZX/lH8I -qAg86ic0Q54tYAktmv1Re3SnysV2iPZmdybXp6KFRAmIUlO0JB69iQqVPDf88paL -fTl+fANcJAZ8W5Ks3OWAMhzMONc+fgA3XxqF3TG7eUX/y/4DdRfeu8DCE7HSFN5b -xj8YD338tseXS2rhjCmDKHIxuhXHw1FMUmnltm/pVyj88UyO/K90iPaHzd+p4q6J -AiIEEAEKAAwFAlJjvb4FgweGH4AACgkQmjOmgi4y5FKWAQ/9EutG28JHCHv/yac7 -+bns0h8/Zt4E/a/S02m3dU9PiA0tqSj6QhfvpMjEJVh6RhfGn7ww+Txh0d14yjZF -++YGkEBnjoT8I6lfgYjkTj+/V1Ou6Wa2154Oc/GeXLEZCX4vsLrp8kchumElz4ak -mr4cRbXvrNqBCjMh/jaHhlnwlA4SPhL6wdSCzhvzBHXrD9nIalpCPqxtW8fHhocf -/VFhf4sMsYRg1nkBK7NejPBGnWrC83k2+AT84eNkczSvAeRYEDxUk/1yDxhpV7zq -5KzAyYltbsDdVe1TrMclECxx6E8WzYA8wIcvRI1DAoWANnN7++0QWPoC8n+Q54MQ -d6vfVMZsPqAhNE2+06K7qdZUnbgdYvIVvsMLaMvy5jENR6SnMoafR83hy8FEPr+5 -0Fv5WMM1vs521hyFRP3x6E8PlXRUzA+o/o3qdsAnrheF+8aFFIpFdadhCuysmzTX -2BcCklqUHLZM7uVzj4eT72FeHqhki0GN87VJA0raUn/Jrln716g+G/An6BgjALvy -JegHWYPcIUrOdYdpV6bH5nNjo63MDQiO3AW2Nr5Om6KFmsdHYnx3eGIz1vBkP+LX -fZcPG3CACedYNGYH3Gderw+CBfbciW9Gy3Z78XFhUEQA8lbcYiimkB8TB9HncGwS -VkA7gyX1L3dI4YHsV33e/doyHNWJAiIEEAEKAAwFAlMpNFYFgweGH4AACgkQLNYV -HBYlEa0YEQ/8CkbnN9FmcJooKrZpMCL9TtQPNDC+OQ3Jf5eqkcHm4WIkKKMZ2XWV -u2JkZHcRk7+9SiLoJLDIfBa3192ZFnbfAkqtvW4t4L2WG9nVdkJNeZUzpCZVMH5m -6aJESnq4/7AMG/mYDf3npWhtTqIRR2p1RRVN8pM29DR+hCDLdz0FcJgRVV12aIaI -e09iM5Tb8+PwpqSV3Vr+ii960lMv9WNhpB0g/gaCznK1FHdjDuMWPOAp1ZgTGE5e -2eT1O7xP2nExx+6QbPw8KuzjzoKqsM2wG5nUWnQBl36ACxBxhZhSDw4YWmcbxrlj -nPdrLQtXy1Z7rmCIwh3uMepvbHwRPVXy+dkN1rhVDbnpolSkHVT5VsvU+3RK+/lE -knlmOqf96+Y6BE7im+ElqAFgYGR2QK0y4NOrqlEjZ6cbAIn3nGMGxWEiV3L5CeZ7 -ub4J6GNP1yRt+7YSoaXFsi6o7xCiwk6xGD+TWNXFWTVYliPvmVgZjlHKyrR/b0dt -rOXsuCtC+a7sf39MJoMZS3u6/uiiKYCBSP6VIwK4FhEz5AJyQOnf5Bh7njW/ApfA -RV73ZMHWzemgf73Cua9YRw5vEZ14fwLLAv2GpDEBZykK4B2RH06x/u2tP1Wgd/dq -kSjKPU8ubcroNn0ByJmdJRjpuTYUrydhZtYFZJXqmrhJO50I8sNnK7OJAiIEEAEK -AAwFAlOQhNIFgweGH4AACgkQNpM0zlDthxJP2BAAjAD355MNcKEotdk2VyJx4vph -yzlwvtqCPElKs4c53mbEgVyF1ohh1PVmYqfEt8ZGbCbOXhJNm+Qjkx+2YbDM14/T -/rAaxjMmBiTI+yr6c9XXxq7UkzUVCrE+E58dzx/ReWfUJSE0LJHDFjz6Wrclcvp/ -GRnQyaimv+/g9FftrSSCs8A+yvtiU4RHffPbefZMadO2lT6uRQAKQnK1CqNbtX+L -Kty5mNpvCc8hQFJCyX/o+BjvnuVwGxTMTGLVU/7OPBqvetk8TECXM4OpKH6k5i31 -BWuWLXldwBNWWscoioUmnDva4bDEFLnfYo/X4eX/NmJjw9AhMklAtbJIWKa6yNbs -kwz7Jdl6phl64gqL6b4PnaLsUv5O7jKnylGClueIiCdDNCQ2MRU0MfQ3D22++RHS -7xoY/EM+YG6ty7GZjX54Q9UGImvrFOTt91woY2rlqXzyGl37+y++zJgk8wffx70B -LQV6lUYeaVpzB/yIOfYqH4qA+Ev0/QlQk7aBcaDFzXGZshjJk6knWU5vg5FkaHWe -NGJILq9Na9wRdgdC6i5JgZgQgF+DZETatZZU2Y2IxMWVGlHpvY6K5RrC4aR0DCPZ -h8CitqI6l26/csYZk6MpLQllbvI74hwQoAXyFWC9DnBERjZBjhJ8ec455Ab732Wl -AoX4pmCVFfRR+QAQmtWJAiIEEAEKAAwFAlP9EjUFgweGH4AACgkQebQBAt4rUCUB -xRAAqAmk+UgsY9i38DYEwPdk/hK8DKxIimp6w6co7aIms8TcSU2Wv0CW0bBT+emX -Jz8IN6puqrPCWae8k+VRFMQoLJekwlAr9Wb++3msB4W4a+dbLHwsWuG73EonUqyZ -ecstpEx90BbhdFeNYyRLd4RLf4m4TbwpaK6HXUYe9W3Vkvqzr+5w1vStYZYBBXLp -jnn0OvySgB3SyUeG3O0JD/nz3NJ2oC3/cfruBqcO8kw3IWf4SxgKbSdJQlp8FiIn -vnbF0d8Ko2nMZeyyLiIk61rDsvBcIbUcAaZm1sy6mO0O7IAB2IfUNn7LIxvcjI93 -s0B0u0Vsj3qgTH25zFe2zGBiyDliUf2IKY8U1AGmT3GN16aiGXrLrk3SBvvUV85h -b1ac4IcwDq5Sx07/JvNLge8RZo4ulsYdBWMts/Nfx40xG0Msoxb+4zxcV6f6lpls -1YR7e58Ds+5KQyPRpr5j5lqBhQt8ESXEQilRp6IE90HTfXwTHS0y0Fgnt/pVO0ah -P2EmLI96exyqYMcGpnP+CwIkwuHYQrMbSyFBftvxlPic4KxZxbBbSt61r6xrz2nS -MaMw6ffMbiOobYH0es7YPz8i5Ay0NvoHP0xfiwpVNPgAEhENHClXZgFqbGLiXYHG -qC9PHmM8mPkVz/9WDAFOQWc04zYXYizlCmNS3gsvwD/XLwqJAiIEEAEKAAwFAlQO -3xsFgweGH4AACgkQiPRYTYJgSKVYTxAAqpfLUKXHTCPvoVzHmVr/FExxXeNe8VG8 -Tlq4XngWI1aMcbd5Rjm+mIzOAOSQ/FGK90hirfVi5iS+SQeKH6jWXFJNcK5vnqmV -nhzMNoec1OOzif2Xcswvfd/oXjvWqi61QKezNEqW9tHtxhnewihHBA2i7siDLL2a -U/cXOpJ2ps52RE0rbzUz+uyWeOzgd29aTMrBtNB0d/cg1biLfKUzLrFtsc4MOMtV -zr0Fn/oDfkgRhK1UT43AfIlfVOe+Qh+nQ1Lh67umUUr+ZU0Hjgnqifs568Rc18/j -z9hlz+ZDnd+Z5CJSKVtoLQ9A9XJwhciS6FVqaId/yjVmNwClNn0HY+Wtt38Tv/PL -V271GjBBuHmbOZlfeiXb0pXA/QsZz8x+T1fcjeop/2eiPgd1kj21+VI24Cr6cvUZ -DvtbDhObfu3ccJA3nIRa26LhVEmsnDwSmJXbce1kWBa36VFd60FgbS2mbbcx4tQT -z+Dr2fDtWkea5oByIToTXckhj1AVAV5X0mO9H24ftd7yZrxGeDO8A9EvtHzKAfu6 -KhiiA8f1oFUH1ucmizBh76AkHbfDdo+l6YR9pogmQUiZFOC93JCdfxsPL9QWekgr -5mPv05b/7+cl3emxp3RG3i2EYM1O9+l9mpqhEXmAyTsJc2nIBD/mggnkO+PSBjw4 -gGcZSeMLGdiJAiIEEQECAAwFAlFwKnQFgweGH4AACgkQm3UG43JsIL0LSA/5AbEL -aXWj4oQKbALjV1iNzGs5NmKgLBb0bYv3BlIwSswm02XVXs5W4Pi8KiHL7pwpM5JZ -rdY4eb7nEOWa326AV4WRHx5sBhsVvOTvWXrSyH7qMhBuDBcxNtR8LuOEWccI4K7S -SBe8GgVvhRTeooNimTwwkGO1U2YfKFD8pd4dfhoBSEzDTtQCy6dWqVspE2ztMhXM -Oq2mq8T1qji0EG72iJhc98mdjGxLI9mu9UdqvNjHeoNB9XwPvCWGPuXj/F4r7im2 -jTo1UUNA0LyMMixYa1dbigRhen2vxhKFQ1ZFdCjk5RB3/wbMeWth0Qbp2A7Bg4PY -u7wEaKmHofvbnbmO+uAlyhrG88FFjl8TGWMtLWX46Gc/fBRjWMGzTXOb+laop/Zv -sOKYCv7TovWP8xfgocgI7aueEX6yZiHtmIFpMNF1wTtYbwhf4akj06ZQ386bgNhA -wDPj/8CibqwXwsKlZ32rn8nEiilEwVZwPT1/t0l7dobQVMf0l2ELtkfDAesk+ZhG -WdKfXaSaVjYxy9F2TIr908/2QjucwIaybAakHaZddsN3tc1KfbldwVyt5ti6BMN7 -JsD9I48axGcgwmIPsVqVoCc6RSEaZJqxlzj0JwwPbWRIqH7IZEDN4QKOJcNvUitc -g/rVsbuOgKpcplX8JR4Elj/uWoOU4ES1CJp9SnuJAiIEEQEKAAwFAlKjUtsFgweG -H4AACgkQvcgh9m7PwHi8YQ//SsFqGwtfhqPJIbGJmh6+C4ayUNB/+TG61TRJJXiE -xgrSVkgbRvo7zkSNfpI3Bk5pLpOvSEcUDA+PM3DrH6oIXcap49zdsZU1+p1ITTXv -EO9Tw0YXHsL3Fv6eQPwab9REdje7GgnbZUa6LKOyuMc+nEAk2d7yn80FfkLv0Lmm -jnuR0QcHWBDmNxO46Nmd9lf2PmqUURkqOH6XuKzOjCFYGe+r4S3h6lRmORh5GzfS -cG5+2vJFXVlI35nvoqjaq3XCanU026JmRbRHC2uO9aJmdCp3/xyedM53bE00tIul -9vLXJiZuc/ObBH/js/HMtdUpfT4Jl9FrwhXILoKKOSO5+Iw1yFlIL+/iyFHw4oeP -BwXOeobBycpuK3LV1npOSwNv/2GpNHziVMQrrLuRpr2WltXXZ+PiKraIclz1hAr0 -qWJarw4U8jxkmHSyukJ1WhkTpsk1rz+wIxIQq7Jb53q6KWkIcB7edVqLy11WALy6 -+T1epuDRwYHT+rttvxZ5KP4sYzoJyYWXlHbbs+C1RiTvDHi54XKWxZvqHy4La07W -ezmGzjd/YevzTv8EU4Dd3o+PHsCzSC58BLyw32BYYdWrEqYFxt/sU/PEdH5QOHXd -ev/0dBFSPULsgaOENEDt2fLf9T06vAYKuIKseeWi5N3gEFWo4vLTIc1XL9lat3Zc -s+yJAiIEEQEKAAwFAlOVr0AFgweGH4AACgkQa3OCvkGPYzBJXg//ZXSj1k8w3Lqt -BJ3St8A492hiGO2Gn/xer0RlcAb4wCzJSB/fQMLXPulVYqPxhaxUavHAV3PxhF1v -tVCzGNcXm61tcy8Sff7n3WrgiQIhqi70WJ+kvqDnL3cTl1+mIVx7+ELqrzyS/6hH -SBhGSfgAiorLRpxLpIloUpLrLRGqPo3FRlfEjCn1xyraaVsvqWN9bVM+zekTgsNd -9CKWJHroO0jLjMrP3mIC1m1Zjsh+gtfJUSUekL3M5cG5yTfmyWJmovCqKbsE80bv -Atj8LXg1GYJKrag5jVzf7Vtz6+or84RpXER8Hu8nvhPdQF/D69kxIx/yVtptHOii -xRopbpA60BJFvnQK7viSy305m0yypyRKLedNU0IsXOVoKLU0rNriQ3lTiJmsza6W -nqjYzoUxKjUyPZWSGwhBefePqdQJMrGOw9lL3nKPD9pqfbMw73Gmgvvw6fWeR8jw -qJJ4Tc374HmDaRchFlZuuKCMJ3efvOjaVY7DT1/sflFJF1oVaZTtsfzGYse9KmVa -6KP/j/e+46N2izpqUi35bC/15NyHWhj3e9dogzJ857Nnw70zKoVmja++LSsYl0O1 -wzVysgPHeaSldeB2lv8VqPXdDz/20uMRLTku9zGGpY1DBN5Uqn1HDk9Kp9I1772P -PjM3TsipwPu6xQeA71wjRSLNFiRAj2qJAiIEEQEKAAwFAlPivW0FgwJhFQAACgkQ -6P2IHz48gBRJaA/9GcoTim0rg9Mtkgio82sZv3GDOfEadexgsQWTCUtTmJpsk0sz -RLWSQREJ9iDrQaO4P3pX586ywilJ2nOJggNZuihK2c8Kqf+JXw2oK30WkdltLvZ1 -o0CuvkJEK4sUYxNJLy+kKkp7ksIZvSlS/YSzI6RpX3TU7se0UGS3bxYe+smj0geR -P02B5yaW/NQJhBNbBFGUrGj8rgA11ouhomFmEukzvWduyZx1cIiyXlP6DeJJNBC3 -h/f7v60OhxbveS/ETUclTEXcDBY6t8Ux9kOm3OenqYq75B7Su2cjpZhiMb79vVEg -tQiVlhuBpcX5EPjgGR6CJhjcp0e903hlkO15x1q04qHonVJQr4TabC7oXaQ1Wr0J -Cb8tyCTSuJs+5ihQkrYbmWE7nIUu1IBi4Hx3IrV1R8A5EbH8uDmAli8pW5pFCx/4 -HXGyntM/Ltr8OWI1MymlbGptJDAi2D8pPPWdCF1Pe2p6vW/nj6yoOE2KdlwllOnA -4ZCCOgeI94Jdk9NXZKH2BMl6kytVbnzXKJ45MG6LaXGyBy0iq9X8aYqHPbVrlUzw -McU5Ov9aTNKX+YfvVNs0zNF3yrEHj3OKCJ9lEDJ9GEtSbxMkPwsbYpH34/cj4kHi -DlzfZGfGnGItOfZtRKh4zCdlme5SvGXr2JH3US5fGJBk+vF01+ASTTOnmtuJAiIE -EgECAAwFAlHGCWwFgweGH4AACgkQKyARB9oAQXHrPRAAhPfto19KSOBvPWMLO4kj -kxnu1tay8z/aZJRLSUGm5Ny6GTX1lu7uX5Gy2YrwkNRVf4cLlgg4jSfILrJ/TKIP -4KUOSm5xecUEuv0RYN2oTcGxJYQv6wp3jAr4CmTpmA0n7BPFaB45vDYsMcIZP1Fv -mRDwtXdGYxc3ChBw7P0+w9uyY9WCxLvZ0JICEpxcr3gqoS+Hj8GZLo9pk2xQvZWJ -3T8/QnLvBG1S/SP4fqNR/hV6pTuF41LSoOP/2A3kjCPyFy/OzPCaE6IlocYYUUmJ -xIgiJbCtE5R2pfpgdaOckj5HIIl7jRpHBT3A2HKfrSoKsZ2YTqluYAaMQolzOYUI -lzDDbRcKsYXMzpVB7suJ2pl0/RhRncULPt5wOKMGkcmsJy55UIhRtCC88Y0Qk3yf -tgyMvhY6dmaaRhzA747zY/8c64yJKgugwgSdZA9zZ+mAgw24pubs2IFBT84zW1PR -O06A33JOtDnf92GBZOFf2scMwe+Zf10/DR9bp+UNXUyoJCO46vLTPBw4qqoUNqSl -a7vwR+OlyQw8COMYFdWmE3APWN3APQCwcWmhZLMNkUBIstqvea3DK+gUyuAKH/iM -FxMu3r6rfd8OrwsUq2Sf/LrT/NYrRc4DdPoXM0mIO32GkpWfqNgvetIwAuHKv7oB -QhmR+WRjrjPhMDr7O83PbY6JAiIEEgECAAwFAlJKxnoFgweGH4AACgkQywfa0jAS -7nwjHQ/+K2ufKJStbzXAKofAqeSQULfrrr2va7XvL4fxRfharlYruFz7c+3Kr1g/ -qv2tEtM/NWkxjtUATBSTyZ8uNTSNm9mkC9vKStvluCfKyOVGnpRMBjBKbKwM81wp -+WOyTvh4ZQ9HUGLKrjJP3gCZCSXxKN8u9ieeppTooIo1lgC7d4jJWjX7F+h1KpzK -+NrC1MUae939WyBAZyTWelggTL/1jR5OMU/Qi/UFiYTP3JApeop843YmjveS+t/T -JyJsGBFzW/mFSU1i4KEV5Peva+fuusJnvqe5g3XEUmTwiXu9POj1Y0hpLCdAknUQ -xcjsp0QZZdlYVFLUTQVM9s4G/HYV7XJlN0L6cpDZb7NG9wpC4+Hsl2EJ+qzB5Nyp -aVgRtSnVUR1lH3d3py+aT/SfksoplqA0xI1y/2cL72HX8VkIINmct/RsS9Rmxoij -wWyjX4V0Lm9VfRdIQMXs/7ftwbaeFPcA39mQ1LJogoaxgQHlYIqlphM0gg5kbivQ -EGzAsVE/XxHWGclvrf8n2j9G6Fxlyt9M7THZwYG04c6JDjg+KGsVZdNdIx6zSkWb -/iaAdLSFFsgAZsq+b2r83X3yqFePgb8SJWgpjgCSP+3zKypNXq1HaPbQitxFJl4F -MSQuLqN0uoE+CvcPKF0ixCIdweknPTSWp8KmSVI8tiaiO+125ASJAiIEEgEKAAwF -AlHlvPwFgweGH4AACgkQWru/8fwQHp8EkQ//ZYfA6uSmO30I+WxSoAbn+TLs7+Zb -cvYVcvQDKTYUbUwy8b3wW/kEA+t+QCFhVxp1GKwu3PWIdKZ5k/zLbO9e6NxcoYto -U+K3aUsXtk20JmpEBYHYlpfmPZmHfsbCcJunoo6ijB0cjEStym2WfFWWZWx7LlSk -Sj1s8scUDN5zYhloj6oSx0CqJEyx3HwVMaYxvu78iXrVlFfPo+wBFdRnzc8mWv6C -+NCsdOtVnCC2TKp2KiOOyAAJRNSmzzqlVm9aDoxi1qW8jBB9vPtBPh7acmx+Gsfz -+xMeeuy94vJbR0kIQghcm08wWGO8fd4+nTiZM+LRmm6TysF6Da7oPB0DVwMkOu+/ -8d5hqbUfxnl9GIItS3g0HyVg3z44/W0XkJNp8QAw+WIYPx4JCYdrjvu/HiWRmAjE -0W8t9XsOfnqbn75TJBU/FhaSd1FNqKTrm1GMPc9ADGlQf6IZm7dICr2woD2LWyBv -qXs1byqZqhuPn7cbw0llpRswv24Tm4cAd8knZAI4wbTM1sW2nasdD6oDKCJTBq8W -qMvWNIJ4p6sfngMCY3EqzGzxoHY6lC+3TTm2P9+PfSgQAxjLpKIJT8QQ1ltU7zVK -/3YAUy3FmStcb8N/Gluo8S0vz8Oao2qYYMqvRdJQZVGNuXLSJxzUatw4eEyydc57 -6OWWmku35wvMyzWJAiIEEgEKAAwFAlIKDvYFgwHhM4AACgkQ/o/Ld4Aoi5DKZRAA -nTk1/Khe+Pn66oZllHTyCPak34KgKxpOUFBKk4jrCKEqF9c9WLEznjrLphvB1Tgg -hE3IZ6Z+DKStewIANcqW6dc7Rv6bnPiE2C2y2KQ3S92oDKGAyoXWMW2OCyubP7NL -bG1u9jR/WKOlv570C4jBqtmOO+tbzonWBeXxcSJtwmmNi3oGaRYmlp1+IheEMPTo -vOyNyoMb0nJLPftKmwkKfooVrbE/3qY5uHU9VBnrqC5ATSiPgL+pkLTIDOlYyoFW -/6Axsiui7M8Jyy15h/eMhKwkCvJVrukH7Jv9UCmWH3Nu8i9d+W27R50I9n5a/nCU -AzjTQO+yZVsGm7AeKZDxMAXdJ7D87wWf5zmlfziDxS+9LwrBBa0b+qap2EQLOFFy -ylZsPEpB9oAjjbGmjZ75NnbZyyq3tnbL2BOwtNVTbiWHX2E/wfL6a0J70sQgTNQt -1crJXGlVWv0zvfSLNh9Uzsia4ZrFahwB5JLClXzvS7ZjiaVDtceMLQVPmtMp38wm -be8Eg1YjMO5dO4SYt/HtIfvjt4Gu6KERQ2fPUpVGcNYILBKGSQKtP1NVdFQYkEd1 -fScW2UavpH961tfPxbGozyWf6a3HBq0kvo1c+hrC/SJA7YNCfQw7Kr+CpEZFFPOX -o62GLXDoZAyTcrHWRBRvWjaaxfiVaQ3drhaaMAOr/ByJAiIEEgEKAAwFAlLZctwF -gweGH4AACgkQHRooozQjnGkvGhAAxJ1lV8n/sZDFfyI82bhYTcRr2O8hw7T/IetK -IsPEGdkfnAUGyie+tIAQtszeSqT+DXpWSl+ggxTTbiDDcFjN9YlfSD67Y7jsjUog -nbcEBz62OHgdk0koomK7qSU5iUuprMA07cyi9iNxrybBECIQziYsh+Il/FMLgKGK -+19iuOPMtRwfV81mpaNsdKjY1kDXpPwokIFytis+hVSXN7vBdHgO2kzM64d1RccZ -EFzT5m4zug6YCDZWD0C5yWk0IFQbQSIztfPVDyHFcIsvAaWuy4yKQvIKKXyXo/LS -Cu61G7K7eyzQz5wQZ999D7uIzcK1KjD4em49QsSevtYMvVvikI0XFbXUyBicjO75 -Js8T4Ih6/RqzpvUWZW6d63gA2IBfj97YFdqcG07KYdpsatqDmogNjt61QkO+7Urf -MDfsOv8OJZhSF6yop8PJvgcI64XDRdZfslN0jOjCy7RO6VIUr+/wmMEAAPToQQjT -rmrha/S+kqbfNRqTgQ/H/vJaBtQgrEo7v2kp16lVTCMSfEAVigw6vOXCFsKi6BtO -+67n0uCN0gkGt0QBMdAMVU2JblYAm1L5MJGx7kxYr60a4SMQ3IbzceWyQTuSwEmW -1/FA+YdEQvKw9NmBGSBNimxr7c0FtbMIp6K+yCc12HLul695k+Ysv3PKwWTBduc1 -E+MHuQSJAiIEEgEKAAwFAlPbHAcFgweGH4AACgkQa5bkIBYR6J5STA/9HyGdbqRi -hDSGMaf9QyFxrFUAh/hAnuyz9gBtUWrFZUeAkJMlIC1lxjESDXQg5sPSAoq8wy9/ -Snu2i+jrc6WZ3iO8S3rWkaDJ3P6S2u6ZOOXloZoC5BVgX5r64rvrhVqEl3jMd0NT -A9F8tQoSpnZL3Jt0w/AtDT50iXFJrKoNFhKKUthGc0NRxOml7PmNCYeP2AbADtFs -kamIbeSrY0wIQJcjpl0q/cF8ImVepKouMl/H6I509anYDOPgMr45lyS9GT4BO6OG -HBFskrffs6aYcWfS+5j9/SDtGDWHy2h1w4GjI9WPPPydxluvGIGaMVBHeqcu6nfm -Kt7YZMpcfn38FjC0889fGCQ605W0dpOYz4jFiiNh2nWQd263yS0e2Zu8VtUAtKOP -e0CqmVuyAbX6ZlMusulfk6dqaZqeul8S7JZiSsRXgYJ14ZG0o7BHUqjDcEfWumgn -+H8Z5058wNMPKHEZ2sZZdPs3g83MaAUuQ8e6naYO7B7+m1XPt4syjHjlVDM33p6h -XIVhbKkAl1Vh0N/Nonki1Nt5V431Nt8Pz0wD5zI/QM9mstoHPivy5tK/Y6whrCiV -jZzuS3vvFsMOdQvJv2aNvBaaLQdWSCV32inzASrG0sknO9WWL/JB2exBd6b+V+p6 -h5D87WpBtl00OE1S1MOSxY7ReVBQO5m3T0iJAiIEEwECAAwFAlEK5BAFgweGH4AA -CgkQjh0cWTZ9JHSwIg/8CP8wOeFB1JqryQI3QMOsRkpioVTizj3cvQNVz/PyxA3/ -Ie4DNUk9MhnuuqkerY3eR+3S+sOXJiAFzlawvATnmKpjgrenFIEMQ/p5GXxJ+IJD -AaYNpi/rwjtJnwNDv3mY0UcUXFW5gojJP3PLYDR6g2x8e1tzj3mNSx1MNUB3vsHK -h4T8Bb1q1dH/z7phRIrHBYiD2MS/xd+2iQ2AEk8EnWjb+vnBzuRbtQJqvgpxUgvI -Ce6ymQDXZkGBwAnlPIIYXkcPbQseGpTQ5vwG0kzl57MQ9EG8XxHMfRJ1N5W2Moys -2mrD6OkHkOx3tlsHqWBefWz22ipgPzAuO7XjTb7LZ9COLs7juF0KyM6Cl2Gc/MeX -DyEW6qKAwVDZhTKZ8eODxyi6PRXSO1JbVhRKOyjtTCVKsH5wFTaO+3vcYbuX5ZNr -yWNBtmZWVzc6S2L3CrfYJKUyXwH7KMBxNPYOUeEnDpxfQxzpaWPUzhH2+RRBJCk1 -WMWop+Gj/zQB2Uc+7yNMy/jtJci7+LhhHGAc0l0hLDk23IebEJ6Axbe/RUrGkv1b -qisvxas+k97ZyU6/sYL4wnbrxT9ZPk/aAwvfgQmbkchELSd4wsXvtOt0s4MxK685 -QQCX00sRlQgozMtrkAzcdFxxpKNs7gLQK/2AiXC9/yxkC1oVyrxGWj/g/7UKJjOJ -AiIEEwECAAwFAlE044QFgwHhM4AACgkQi0PA4PCi+Fsk1RAAkg65+NLK5R70Elq+ -gjIfHSZlZt3HtuFHvf3+V3d5M436GQ+e4uX9hXvEjOdQa4twEZLdeIQSJknL4DFh -JZS96yGlh2VAC0McsxcjxrDTYIgciykNPca66E1TTJOUDE/CAjiKaXOSIgx9IjHr -OtGw2iC4M18dIf0xUlU50+pCqV66zJ0yNQ9CXIrQZc9rzkj6Ni6gC5ESIGCK/LiH -GPBRiN9hE4P3auP3sX0FTcmRjmakoWsC77Re34dHnR5BJHUqo+OqTkiWh8Zhw/e3 -yZVT4SCDRdH1A5Y0x6zR5ZGvEeExEGyelPOMNqosU7eOVaXKD97xDL0NiLeNDRcm -gOcqmVJurIIoEyF8WBidEYnmjbXz+XZBx0FpuDW3HKqjsETaLJaD5s0lTr6sl4/r -0o3ZaP98IdShUINoi3AV3iEbRceZY32z0hHBPuEudqu0fvGXtds4fG0h6I9P3P4w -5WlX4NU4NUU6mHydg6aWFH9qAgkCas5JzDl2jQuB3y6P1D5Pt4vdhWxBbw3wMnFA -DfySuCpR23kbYWz9TUhRJhoCZ+fph3Mt1GnLawozXAmTMu1m6sN1+zHd1Thz/ZhL -EH4x9iEwNi3bB/HeAY7Z7UgDoDoFf4t2RGzR3BpvgFT5cFVe/cAFAVvf/1TKFSWy -fuaDyzU4gIaSR3phLdgq+TPfJiyJAiIEEwECAAwFAlGYBlEFgweGH4AACgkQ2qGY -U9T0ouwFtBAAp5Ky267FgmDN/nDFC90lhGcyfZ3acQAzIRIke0W8kNL2TymAnv+J -B5BgoJsxaq/eeyD2pFKAgUgfbkLYSj/WtMq/OGyMGNY7XPIHS09Xg+V3EF4RSYF6 -KeUlXoT0DF9JHxG0VdotQXXQ8vhTGimfkSJVfIMim0la7o8aSn0hNdz3GwH8E7YD -9POMb5obUIjpjKyAv7g555nezCCuS8ZC69T7RV/cjRzdpojSDHOomkiefKFRHjO7 -eqaJHNOfOXb6QBgXZ/zGjTrpw2SQhhIa46xEPbbwlwiGzTtZo4B/XfAcYs10S0WR -TRP1lPlb8pt4jK2J/R9DGI6yDUMFPxNb5MZWzMFW2n6E1D3ZPlTCIZnLOjhQ6s7S -ndRZ2dES3g91MQ3AR8G5msOom4tBj4KIBdrXLe6o4Fo0Lz3UXQX2F4iFs7E5Qj6e -nUJRq5tUXNmqphs7/3xYLtqxUJE2Tkg3usu3cwGtY3VWVftTkCUmStiZIn9kHZwW -NPOThTB6MDb33EeO2VGCBlfZVZ1+mM+qzW+ezijUuJ/+njclLRMYUotCtU8LOGfn -XombJzRzE+3gZjQ0JRohQEZpBsHCjjkVX4aU6X5djnTmanlX+c2jw3EAkH8JduRU -A9m/xPaBdqf59NLYQ2yTwU4s3VxWIoKVko7acIBmkszE3U8G5L6butmJAiIEEwEC -AAwFAlI4sTUFgweGH4AACgkQd5/rE5LLut9GZBAAmxW1cRqWu4g5dDTzawmC5mwO -1VzOG+I6ULdtWOrugrOl/SNR/GbAY3knbKlL2QVVx/a/k0jJEXwVEmxNZUG9b289 -FsmRDcRXtlWZg1oIcMkstFohVhFOuoKBO3kheL3d8sp9gCs4mro/IdscmR6U1RQy -BcowvNBwvKKo+OeefVdHQ2xEIrO3TXsXiESXxrDCLtXo6D8Ggj1G/7LHF++CpAru -qk/crgLyyAkY+O8Pp88+Bt0DLGx0+NQGtxDCEsxOEwKKQVmzqIWW0JDoBzLbJYAv -5DBLmaUhTjCjmgthmHAxDGe7aDD/tYmErQMuXAId2DZE6GZk0ZjPJz2NEJsdJtnX -48giLFxPKp4MO3qJvRCSJWlYKWhwRTtIfDuNb1KJkebN8x+1Jexy8OY4fvjYCaUK -pUyjeoieEz6nLHguLCavXH9rEI3uwjS3XdCzQm0EORObFtNOCbOc7aTxuPSVQL4E -mv+jsYmi0ZRFS3rOieMAY6lnUAwsQ81NUB9zrv116B/NA4clwFqogJ/a2d8lK96K -NxR0XFq1zHDLIZG1HRsP1wOKXoNDpbyQDHjS//hYxVgC6583c4b7jhuVD2XHzFaW -hJB5/tldbsHNlP71GkuVZXJqOh5rM/3/E8HF8l7hrM6Pm9S5YNCog+Uo8pBWzi9e -j41/ieNzi26cnnJcTLGJAiIEEwEKAAwFAlHUHkIFgweGH4AACgkQ2ocME0apV7AX -Vg/+K3PXwfj6b7Ie1TBUgkMShKMCiUXkwl0NC1F/7i+2rxSSFRZpEIVfq7fxl9Ob -5bXT2wRHy94Z3Ngu3NCzNrsxUEmKNKWGqfl/O2qzt/kKGy2cpfejXGe1wwhjwfWW -MtYeuY4EC7ZW6yOjvQw3koDvBahnP/AmynZkH5JS2ivETNmOp5L2pYnNyw6xfhKr -8lcF8dLvtFFlRGknBYLz9ZUHsCxK4N7T0gezz5ytasbxoD2W9t+tDRbGch//XEMS -inHT+yxeFo4steUV/bPoh1xOV0yXbZx1w6b96uOLVVuHaU0WL6UZwUnt0GUr6I+l -ABHl3HqOJZKywl5Pve41Dufa5wjjCQHQv7/yRMfnDk6Cmbt5NksskkeRqDEfRj1k -8Gmp91p/wB8xtaH+bptWk9cIQZC5hsLpaHaaD1v9UF7/P36+PUJuIQerYn+XdopN -h2+Fpb4/btst2tzXLwLXAqllOaXoQ8Hc49WdeZ5XXxxsHM0uMxGWRsvERf2XgAyf -vr3rCeg0whhkCOV5X/R1jYmE3B/KeWz33Fi0j0FL6d/Ntm+EOWPVR3NgD2EManwr -oJcszhvPV87UnV3+WqiLYPcoN/pWjj3E5o7J0cXD+RoIRFVaxiyzPlp5TvKMHF6P -ShqPZZNQHMaAlI1hY2vZnfajrJgXUbqJRSwWHUAvI92S8miJAiIEEwEKAAwFAlIp -00QFgw0rC4AACgkQlgAJBSt/PUY3jQ/9Ga5bqWWOBlUAejDN2D2419LdQpZE/gad -ZYsTm0Tdn6VaJpKKyjBvtv0N7OHJMGu/rQMv/JNbOCLVB4VLtSthVfK+AkviRado -w6uiaWWfPzWbrXKVHLQwWUheaZBKTztkPSyMyEMAdcRho4k+BBwzWnoiyCgcAhJ1 -Tip0wj/87DjeV/7H6GO5XRGlMG8zMpY+j0NNYwEhS3RPRLzkrmLdGZgTMlKF/5h7 -smIBlMzGnvtF4OX8U68B4N/N9pSi2O50bP3dlqFIz+itIPu4jDFvMwmNAhQpt0Ec -rXVXzg6wQDta+6UIHe9cM1N3Vlaml9M+ZIfFzsnWBgv8YliJoWlE1Zb+kJ+uQ/h0 -/JAWUtEJH+LS2+pIJYbwWsB+WQG+X/v1fzIpQdYVl47C5SJVAMgp6n3nVDl42ULW -5cOMPKxgg4G9x8GknyvGZvOgFDU8iuNA122IDfLAGQMDqjF7/Y9KkYCgwb4/kRau -9uHgn/D2l+s+L3vlil+axbi5jh7V0IJY7cEgKZz0s8qaYoI6S0qH8jePm0s0NqcI -mfO4KNevpu4w2T+Na9lKNfLwqS3/zdpshuHnN7UBwq7XsWwCy0AlUlXiW6u9zQ0/ -xK7WJxFq4th7jTF3XttGyiDzx4GSQ1VbqbuEeuN82OTOFfOCGmQ8FS1KxaRbrydf -Ia0xQq9eJD+JAiIEEwEKAAwFAlJAjcgFgweGH4AACgkQY+voXyQ/mFICSQ/+Li7j -UAfwXRe9nCYPBWXCvh9SDByoNjPUssS+X8DtkVfM9xSwzENjXWHxeE1AmgbNIov/ -an8uAG1jiVmZWj8tEEwDQkm/PxLA3VpOqx2FDsT4cinhg1krv7o6n24LlW7FliU0 -k5l+M6nl2obyRUNBe4Zl3mY2DX5Q5BEZpngffTkFgwtgbryrhbMd/4dKsyCx7N+6 -mWx6rgFcGC30kp5aKMYUKAm/HM7Zbvx/NPDozretx9gR0cMmSpsiWDBbI5LgWvsE -oQbHML3BCpqke+EidqleWwlnX+dAZfjVq+CUGEHv45dJLWTFWwHmYI1afMavSW31 -Wqu375smjLTbPm929X34KIM6quE036tZT2AM4/ejhkUMinUhHXr/0cQ3LdH9YmJl -RwUTM9NcVHE/fUjdkgmyy1zkDkzjB20hJNFzBlfxVsdfyhFqdNPbosBeq6NcOf3o -FMNztOFAmCzDz8wwohdMH9XWuH18c2JfJz0oa/LLnjXn3Ia27xcgzsm/bGerRYgm -JhjyNYMAvPp7MeZOcsvuXlcn0sauRz8Vc5jLVmrFGHFPHHTMHezVfT7fbDuI+fob -Qb4PpRk6wfOI1Axev6y1g3zrygZE/Vv8a2nF5r9orbZi2rVpdtmTh/4SYQdwYQoO -UdVD9NOaYQKSB6E5Y/PECk4rN93PsSA8/C/RA5OJAiIEEwEKAAwFAlJdtAMFgwN1 -8AAACgkQFfNQ+fun44BE2xAAg7TFEDOiLGe9sXmU6pS+0rFI9gkB78gy81qGshJN -KDz4JQ/mG502h16ubn7Lji5p+giv2Nl8ONk+LT+uZThg70HfsizZ0GmU2HTFEErP -Ot/U4PAP5B/K7R5Xu/W9aI+EpJeR6gjjjseXYuGIxNn7s1+xJMi4CN1aYen41Bxv -gRTQFvHEUgd7hl4QwfTb6cRS1STzUUrUKECXbjm+vwHzwtfrPEPoSYjEaiCasGkW -ka05FNXNuyIaSgUl/NOifSkQId3wQPO9xS0RCv/Kx+MVi5XwdZm9A8pvZ7/Id87h -OQcuegxynLgeWiXiQXnPewZCaRCh4ihjhhVWzfvlFd597gQF96ZMUyiY1zWb1qZY -tP8SaFrVYC5k7MzfsY8DJxxzObAvalX8ibyzS21hi5hmtKV8pZTPlh1+mcx+JO4C -QEwdeJiU6ajXupNAa5tmUTT1D6mS1/YgcvxoKaCZGPeUzXJ40Vufl/beN5KNLYOZ -FjNAr1IacBIpnrQvyi0xDjBCYkiI8HYKSCImn/dndBs6x47N3e9rrOqkaKs3O6FJ -lMG6QrfbNYokPIVh2wgg5d6bBAb3bq1YEDEd7BW3rjdL4ynKmypFTt4Je+j9z6ky -/RV6oRGJioxS9jZK40i30r32/IZCsA8DsGUkEZoUobxIEUcl345+C8jwV9eM2O9i -77GJAiIEEwEKAAwFAlMQhykFgweGH4AACgkQ6vEvSrr6obmO6A/+J+SGseaheSu0 -97cNtTAuaCnC9dck+woiK97DBl+RkibU1uzfyPht0rcPbrTc8TpFo97Iy1fBUoqe -2FzSy9PipAC/7NZlNlHmmVSCUiSWvnf+4DH7aTwI9tXP8ZIrOTe1Ss8RnhLqgpMp -Co3QPN5fYF/9NfZYd4sNJMDSxKdCGuZ4FGXwQmPIpAPgNMMRsyUVopcbCRWNLPmz -3LkzzcVAYQZ4mVRDrgSiyddbN1aTnQpjyGgkdQXqXyAwcfLPHDt2bnfmXmrXw132 -2X9QwYLKUAFEW6iSIDy3z9wmXzDmo2nnSw17VU/V+E94+ImPJ3ksg7h5zaYe+4Mp -aixa36WRYVThZnzpPssn1yguvQDK+QYRyH6sSIzTLbiIkw0SEy5K27ZAiwaJ4v/Q -ld3pSHPjEGdIOEtuejSGP6+kHTJXxTbEdiHVJDGjhlQO//g90mR3sZtFSboeBlnw -6gtFXcvELDWKP6RWwoEZE/n6Z006aJvmQD5Di2bB4qYC3gMxqfuwNU8efgEAm96F -g1A2YhKKS59Ui/MIGghPJ41D8gUdtfA/XmKFC5u6JwazAju7bV/X32kZIehAoAO7 -lFsgPCQfYvobP0l2uABCFuxcxnNBIx1dQNOCKBPZZ8h/2p6HhG8QZo7ktylktPpC -9snUPk1drBrnpwEFsLcCVnF3Hwi8hFaJAiIEEwEKAAwFAlNnliQFgweGH4AACgkQ -qdHw9LRc0wvgag//YW09Scg9grffh/fD4sA1V7oGuNWB90ZtOASA3/9c0yqQ3mZH -BmO7Fx/y8R4zhZETUniMyeMuaCik1UuRfvLxwb4HwtYGLygnIS+PnV0dkqap4JOF -qcu7eEKx0UaA1YVu0Tw5gzso/lMz/yqucfp6sCrt93H4OgD0DYR/Sbv2GZws7STk -QanS9lP/dC15aFEuoCRia5B9F1VVED3CI66t66ScyKNrGZTwCs1LB1yB7CjnMUM+ -tgZ5nbzKNg9EauuaaoHAuhBXts/4boCCLUg348Qf/2qqasE5bHdnP5soWCKEXOce -D4zx6UNzre/PUV6irPdZcBuO8cKxWHP6uLnQAi5Kxu5+btycOR99TXYuWJfimwxe -PsFZwuD+qrq5Q+KKeKZzh/eOycPh8/XlwD5giZ1OWhzrMx5IYamHt7MH5vWOxlok -D6KTDzhMooQow28KQJ8K8F1y80eJddeN+d1NsuK/f0oO3iqO6GcFCDGurqEDGa8M -oJTD4gWbzRkOOZGxnc9vxQobqmZWtVYekurh0lnB1otgEGVLHShcEjUWoj0OpjS1 -qSJWOcaFtkUa7DbJyjmh+peYU74DF1KfQ194ROTp5ASTWGVz+YrqB6SWrCigwALM -yvmANYuXFsNJWbT4Sm1Ar2BAs+mPvsrohugJin6B9zzOG3KHB5kC5pA6J77R1kLW -QAEQAAEBAAAAAAAAAAAAAAAA/9j/4AAQSkZJRgABAQEASABIAAD/4QCARXhpZgAA -TU0AKgAAAAgABQESAAMAAAABAAEAAAEaAAUAAAABAAAASgEbAAUAAAABAAAAUgEo -AAMAAAABAAIAAIdpAAQAAAABAAAAWgAAAAAAAABIAAAAAQAAAEgAAAABAAKgAgAE -AAAAAQAAAICgAwAEAAAAAQAAAIAAAAAA/9sAQwACAQECAQECAgECAgICAgMFAwMD -AwMGBAQDBQcGBwcHBgYGBwgLCQcICggGBgkNCQoLCwwMDAcJDQ4NDA4LDAwL/9sA -QwECAgIDAgMFAwMFCwgGCAsLCwsLCwsLCwsLCwsLCwsLCwsLCwsLCwsLCwsLCwsL -CwsLCwsLCwsLCwsLCwsLCwsL/8AAEQgAgACAAwEiAAIRAQMRAf/EAB8AAAEFAQEB -AQEBAAAAAAAAAAABAgMEBQYHCAkKC//EALUQAAIBAwMCBAMFBQQEAAABfQECAwAE -EQUSITFBBhNRYQcicRQygZGhCCNCscEVUtHwJDNicoIJChYXGBkaJSYnKCkqNDU2 -Nzg5OkNERUZHSElKU1RVVldYWVpjZGVmZ2hpanN0dXZ3eHl6g4SFhoeIiYqSk5SV -lpeYmZqio6Slpqeoqaqys7S1tre4ubrCw8TFxsfIycrS09TV1tfY2drh4uPk5ebn -6Onq8fLz9PX29/j5+v/EAB8BAAMBAQEBAQEBAQEAAAAAAAABAgMEBQYHCAkKC//E -ALURAAIBAgQEAwQHBQQEAAECdwABAgMRBAUhMQYSQVEHYXETIjKBCBRCkaGxwQkj -M1LwFWJy0QoWJDThJfEXGBkaJicoKSo1Njc4OTpDREVGR0hJSlNUVVZXWFlaY2Rl -ZmdoaWpzdHV2d3h5eoKDhIWGh4iJipKTlJWWl5iZmqKjpKWmp6ipqrKztLW2t7i5 -usLDxMXGx8jJytLT1NXW19jZ2uLj5OXm5+jp6vLz9PX29/j5+v/aAAwDAQACEQMR -AD8A/fyiiigAooqtrWs2fhzR7vUfEN1b2NhYQvcXNzcSCOK3iRSzu7sQFVVBJJOA -ATQBZrxD4tft8eCfh54sfwv4KGpePfGanadE8OQG8mhbjiZ1+SLGecnI7ivG9S+L -XjD/AIKLPLcfD7VdW+G37Pqu0Ka1Apg174gAHDGyDDdaWJwQJSN8g5GFOK29U8e+ -Bf2MfACaL8JtHsPDds4xHa2i7ry9bH3ppTl5GPqSaAOhvPiJ+0D4+j89NO8DfCzT -XGV/tW7+336jtlIwUz7HFc/e6V4vLE+MP2jDHMeSunaIsSD2H73+leY2kfxd/aZv -Hl8J6dLpmmueJ7gkYX1OeBUd/wDsnW+jylPih8YfDOmXn8cP29C6H0IBzQB6nY6R -4yDA+C/2i1mmByE1LRVkVvYnzD/Kt63+Jv7QPw7j8+90TwX8UtMTBZtGvPsd+w7k -RuFXp2AY14fp/wCyUutSBfhR8XfDWr3f8MC36B2PoFJzTptQ+LX7Md+reNdMnv8A -TkPM1vk8eoxwaAPpr4N/t6+Bvip4oHhrxA9/4K8ZAhDofiCA2VzI3pEXwsmccAHc -fSvbK+SIvE3w/wD23PAJ0z4s6PZ+IIohjEo8rUNOb+9DMMOjD2P1zXPaV8dfGX/B -OK/sovjvrGofEP4AXcyWtv4wmUyav4HZjtRNVA5mtMkD7QOU/i+X7oB9sUVDp+oW -+rWEF3pU8N1a3UaywzROHjlRhlWVhwwIIII4INTUAFFFFABRRRQAV8p/tbtH+1f8 -VJvhlq80qfC3wUbfUfHnlOUPiG7fEtnogYf8syAtxcAdUMKdHYH6P+J/j6z+FXw4 -1/xN4iJFj4f0+fUZwOrJFGzkD3O3A9zXyJ4L1xvCvhRbPxLMjahbNJrfiOYHi41a -7/f3GT6R7lhUdliUdqAOy+KXxYHg7QI5obaJryRVs9J0y3UIkeBhI0UcKqgc9gBX -m2oaP4a/Z98P23xA/ada78TeKfEN0LTQdBs4zNeazdt923tIRkkDjLYwByayfgf4 -wg+Nvxdvte8T3C2+haLHNKZpDhLW1iUvNKfTIU8+gr3b9kj4JyfEfxzJ8dvjRZN/ -wkWu2ptvCGmXC5Xwjobf6pI0P3Lm4XEsz/eG8R8BW3AGV4S/Zr+Jn7RtlDqH7Uuu -yeCNAlAa28FeG5VX7PH2W7uRkSPjGVAYehHSvUPDH7FHwv8AClikFh4SsJwowWu3 -kuGY+p3sRn6AV6pRQB5V4q/Yl+F/i6yaHUPCVjb5HD2jvbsh9RsYDP1BrzHxh+z5 -8Tf2b9Pmvv2dtVl+JHhaEFrrwX4hlVriSPuLG6OAr4zhGCr9TX1HRQB8IQeHPDvx -h8N/8LM/ZPuLnSNS065a01bSLuMwXWl3aH95Z3sB5jYHI5HuK9L+HPxOtPiD4RuP -7TsYLiK5jex1rSLpA8cgI2yRSIeCCCfqCK2v2mvg/F8IPiBL8bPhpamN0t1tPH2m -wL8niHSF4N0UHBurRf3qP95o0eM5+Tb4D8YPFZ/Z8+OYubWVZNM1B0imdDlJ4nG6 -KYevB6+hoA9Y/Yumf9lD4nj4MS3dxe/DvXrebV/hrdXDl5NPiQ7rvRHc9fs+4SQ5 -58lmXpGAPrCviL4meIpNV8EGbwuyvrGgSr4t8NuDgi9swZHhB/uzwefCw7h6+yfB -Pi6y8f8Ag3Sde8OSCbT9as4b+2f+/FKgdT+TCgDUooooAKKKKAPmj/grX8U4fhT+ -xpfT3zhItY17RtLlJP3opNQgMy/QxJKv418RX/xuuPEPwTmu/OY3nii+nupWzztZ -if5YFe4/8HLWoSaX/wAE3oZ7Zirp400Ygj/ro9fDnwq8QvrHwt0mN2yttaYx6E0A -fRf7MWuWmsaBp/ge6kXz/iPreneH5I8/NLZtKbi9UezW1tMh9mr9WkQRoFjAVVGA -AMACvwl/ZJ8f3E//AAV2/Z10COQ/ZF1C/mdM8Fxo99g/qa/dugAooooAKKKKAGXV -rHe20kN5GksMylHRxlXUjBBB6givyf8A2oPElvDpCeGFm8278CXN54Zl3HLmKyun -jtWbvk23kHNfrHX4MftAfEG4f/gqD+0boFxIfssXiHfEmeFY2lsxx9TmgD37SPjx -J4a+Fel6hdykzeG9RhZix+/ETgg+xUkV9rf8Ej/iXH8Uv2CPBt3ayeYmlT6joiHO -cR2eoXFvGPwjijr8pvjT4ifR/hPq8UbFRPbhuvcZr76/4Nt76TUv+CV3hya5Ys8n -iPXiSe//ABM56APvKiiigAoorA+K2tXHhv4XeJNR0mTyrqw0q6uYXwDsdIWZTg8H -BArSjTdapGmt20vvMMTXjhaM60lpFNv5K58Jf8HODbf+CZyn/qc9G/8ARj18D/s8 -T+f8NIST0gA/SvurwJrrftLeC00f4+7fGukvMl2bLWx9ut/NTJSTy5cruUk4OMjt -WF4+8BeG/CMT2/hbQND06BRhY7ewijUfgFr72Xh7io4qWF9tG662dj8Yp+N+Anls -My+qVOWXS8b/AJ2PiT9h+9N3/wAFwPgKCc7dQ1ID/wAFF9X9CVfivJDY+CviTZeJ -fCWn6ZpviLSmd7LVLaziivLRmRo2McqqGUlHdTg8hiO9di37Y3xLDgDxz4lwf+n9 -/wDGvoYeDeYVIqSxMP8Ayb/I+DqfStySnOUHl1bTzh/8kfrvRX5DH9sj4l5/5Hnx -J/4Gv/jQf2yfiWf+Z58Sf+Br/wCNX/xBfMf+gmn/AOTf5C/4mvyP/oXVvvh/8kfr -zRX5Dt+2R8S8Z/4TnxJ/4Gv/AI0g/bG+JhPPjnxJz/0/P/jR/wAQXzH/AKCaf/k3 -+Qf8TX5H/wBC+t98P/kj9ea/ng/acvTb/wDBZP8AaDUH7/iNFP8A4BW9fVKftj/E -tjx458SY9r5/8a8t8Y/E3wb4V8Z3/in4u/2I/iDWJPPubqWyjuNS1KQKFDEBTJI2 -1VG49AByBWGI8H8dhoOpUxVNJf4v8jfCfSmynHV44ejlldylokuR/gmeeftNz+T8 -NZ8HrCf5V+iX/BtLz/wSg8MH18Q69/6cp6/Pzx5+1K3xdtX0rwr4Z0TSNHlGx57v -T4Li/mX/AGcqY4Afbc3+0tchD+0t4+/Zl8L22jfAXxh4h8I6Np07XMGn6ZfSQWqS -O5d2MKnYxZyWbIO4k5zmvjHwrU+sfV4VU/Ozt/mfrkPEeg8D9dqYacf7t4t/g7fi -f0V0VQ8L30mqeGdOubwhpri1ilcgYyzICePqav18q1Z2P0eL5kmgrkP2hJfI+Afj -h/7nh+/b8raSuvrhv2npvs/7NfxDk/ueGdSb8rWSujBO2Ipv+8vzOPM48+DrR7xl -+TPzl/Y18Ufa7KDLZ+XrWt8ZdbH2iXnPJxXjH7CPjIXNtb5cn5a5r9rr9sWx8K6r -eaV4ASHWdXiYxzSs3+iWbdwzKcyOP7injuwPFf0VWr06WZTrTeh/FdDLqtfI6WFp -Ru1+Gi3JPFusFtRYKc49K4vXvitoXhxsa/relWbL/DNdxo35E5r5T+IXxL1/x5fy -P4v1m+ulc58hHMFuvsIkwCP97J965WOKC3J+zQwxn1VAM19MuJ3GKjSp/e/0X+Z+ -cU/DaFSpKeIr7vaK/Vv/ANtPrO8/al8FWeR/wkFtOw/594pZs/iimsu9/bI8KQf8 -ei61dn/plYMoP4yFa+YvtnTmg3OeprGfE2Meyivk/wDM9Sn4dZXDWTm/+3l+kV+Z -9C3/AO2zaKCNH8N6rMexnnihH/jpc/pXP6p+2X4lugRo2kaLYg9GmkluWH4DYK8a -+0+hFH2r3FclTPMdU/5e29El+l/xPTo8FZRQ1WHTfm5P8G7fgd9rX7QPjXxErJf+ -Irm2ibrHYxJaj6blBf8A8erB0Z92otLKXknlOZJJGLySH/adiSfxNYUd0WIAySTg -Yr034X/ALX/Ft5DLqSJotk+D5t4CJGHqkI+dvqQo968ytKtjHaTcn5ts9ihhcLla -ThCNOPWyUV87WudR8O5C80QXJJIAAGST2Ar03xT+zZPYWR1z4tW7W1uuJLfTHyst -x3DTDqif7H3j3wOvs37K/wAJvCvwnliv440ur63G99RviuYQOrIPuxD35P8AtV5h -+2v+1do3jHxfLonw6aTW2LM1xexHbZ26L95vMP8ArMdBsBBJAzzXhYTA08LmEJ4p -/L5/j8j7LHZjVx+TVKOXrW3xbW03129WfvD4SwfCumbQAPskWABgD5BWhWZ4Lbf4 -O0k+tlCf/HBWnX4VU+J+p/WdH+HH0QV57+1vL5H7KfxNf+54T1Vvys5a9CrzD9tw -7f2MPi6fTwVrP/pDNVUZctSL80TiY89Kce6f5H87nwS/aSvbrShongm7ktbd1Md5 -eRMVklGOY4mHKjsXHJ6DHWsrxzfpDuSAKqLwqqMAV5B+yjq/lmMZGMdPSu+8ban5 -kj4Nfs9KpPFV/az3P5rxNCngML7CmrJf1qcvqV5vmb5qovec9TUN5Puck9D+tVWm -OK96MrI+QjSvqXftnuKPtnvVDfigSU+dmnsUdhonw41nXFVoore2ifkSXVzHCMeo -DNuP4A11Wk/B/R9OAk8Z+IYpMcmKzKxr+MsvP/jlePSWNvMd01vCzHnJjBNIunWq -kEW0GT38sVrSrRh8cOb52X5X/ExxGEqVNKVTl/7du/vbt+B9C6X8R/A3w4P/ABT0 -+k286/8ALSFjd3R/4GNzD/gO0e1RzftXiC4z4T02e5lP/Le9byUz67Bl2/HbXg8b -CJcIAoHYDArsPAvw21XxW0c6RrZWLH/j7ucrGf8AcHWQ/wC6D7kV2f2pXcfZUIqK -f8q1/X8jxZ8O4XnVfFSlUa6ylovkrW++x65oPj/xF8XdVtbTxBeXWqGeRVg06BNl -uW7ARD75933GtH9pLw6nwl8K3UNy8b6reANdupyIwOREp7gdSe59gK7j9n3RdK+H -fltoqtLeSDbLeTKPNcd1UdI19hknuTXkn7fviwz3N18x5JrwpYWWHrPEVfi+8+wp -42nisMsJh1aHlpf0Xb8/z/pf8BNu8DaKfWwgP/kNa1qx/h4c+ANDPrp9v/6LWtiv -wKW7P6zhpFBXl37cP/Jlfxg/7EnWv/SCavUa8t/bkOP2KfjAT/0JGtf+kE1OHxIV -T4H6H8of7NWqfY5E5PSu/wDE+r+dI2DXjnwU1P7IIzntXdXuqmdySc1+15cl7NSP -5kzpy9tKmu5LPcbu5qB7jA5NVHusnn+dMNxXp+0R5EaFjatNA1K/iWSy07UJo3GV -aO2dgR7ECr1v8O/ENzzFomrAHu9s6D82AFc1Hqlxb/8AHnd3kGP+eNw8f/oJFTp4 -s1eI/Jq983/XRll/VlJojNX978P+HRc6L+x+Lt+SZ1dr8Jdak/4/VsbId/OvI8j/ -AICrFv0rVsfhNZW+G1zWDL6x2UBOf+Bybcf98muE/wCE51vH/IUbn/p3i4/8dqOT -xhrE+fN1a6A/2FjT+S10Rq4dbqT+5fqcc8PjJaRcF/4E3+Vj2DRtJ0fw+Q+iabEZ -U5E92ftEg9wCAg+oXPvT9V+LOnadcsdY1NZrjuiMZpfptXJH4141p+m6h4vvPIgG -oapJ1ZWleRVHqwJ2qPc4Fdt4U8C2HhZkl1r7Ne3acpbRYNvCfV2HEhH90fL6luld -dHHv4MNTSfff7/8Ahzy8XlEZLnxtdtdlp92/5HuHwr8ezahZxXU9tLZRzENAkzDz -ZE/vsoztB7AnJHPGRnx39tLxF/aN1cfMTnNdHp/iyRLsyzOzOxyxJ615F+0nrx1J -52Y5zWOaJxoOUndm2QTVTFRpwjZXWnkf1ufDnn4e6D/2Drf/ANFLWzWL8ODn4eaD -/wBg63/9FLW1X85Pc/suOyCvHP2+NTki/Y3+Ktrp8UtxdXvg/V7eGGJSzyu9jMqq -qjkkkgADqa9jrl/iN4K/4S/THgJIDDFEXZphJcyaP42fhhdNbKqsCGHBB4INds98 -Sfmr+mfXP+Cc/h/W76Wa60vTmaUksTaod2eueOaxNC/4JV+DfDEcieH9B0q1WYgu -EtlO7HTrnAHYDgdhX2mH4v8AYQUPY3/7e/4B+b4zw++t1XV+sWv/AHf/ALY/nH0n -wfq2vWonsbNxbMcCaZ1hib6O5AP4GrJ+G2sj/lnYH3Go23/xyv6QW/4Jt6C+3fYW -R2jaubdeB6Dik/4dseH/APoH2P8A4Dp/hXQuNV1oP/wL/gHK/DaXTEr/AMA/+2P5 -wV+GurN/rP7NTPdtSt/6SVLH8Nbkf8fep6NB/wBvDSH/AMho1f0c/wDDtjw//wBA -+x/8B0/wo/4dsaB/0D7H/wAB0/wqv9dYdaD/APAl/wDIkPw2qdMSv/AH/wDJn858 -PgDToCP7R1mSX1W1tCf/AB6Rl/lWhaaXoGmHMGmy3sg6Ne3BZf8AviMKPwJav6IP -+HbGgf8AQPsf/AdP8KP+HbHh8f8AMPsf/AdP8K0jxxRjvhm/+3//ALUxn4Z4iWix -qXpT/wDtz+eybxNLPbCBNsNsDkQQosUQ/wCAKAM+/WoBqmOgNf0Nf8O2NA/6B9j/ -AOA6f4Uf8O2dA/6B9j/4Dp/hXTHxDjFWWG/8m/8AtThn4RSqO8sZd/4P/tz+ehNY -YDgMa81+MVxLqspgsY5JppmCRxxqWZ2PAAA5JJ7V/SjrP/BK7wd4ingl1zQ9LuZL -bPls9uPlyQSDjqMgHByOOlbuhf8ABPDQ9D1KK5tNPslliYOrC3QMpHcHHBrnxfHn -1qm6fsLf9vf/AGp15d4V/UK8a31q9v7lv/bj3r4EeJP7c+GWheYCkkenW6OrDBVh -EoII9QQa7SuX+HPgr/hENMSAEkKMV1Ffnb1P15Kysf/ZiIAEExEIACgFAk7EII4C -GwMFCQlmAYAGCwkIBwMCBhUIAgkKCwQWAgMBAh4BAheAAAoJEHbXjwUA0CbEAKwA -/3rgjN2G79APlHG9QRHxnistmGi42rGoFWxAYZNuFKy8AQCdg4U6s2ZH+8a6GVlc -8r4mtf/g0CLdwPBvhUftop7Lm4kBHAQQAQIABgUCT8y1mgAKCRCL0ahw6FedXnAc -B/wIS6rxqOTWhrnIuJ+CSO8gn4lPe90TgEuhJW+zG9o6q+H6xJbtEhP4OWAA4TfL -Uu5jhAUmIqYY3el4O6nxrx5400WbtP4RCrGMm72NPykAWlxFaeo2ZBB81dk+mejV -WYkgxmaTjplz75KQhZ4t2YR/WrLLqrQYWML8GVvfulxBTWvhVejT+oUQALtwoym7 -muqf0Z7vGut/mPDFlQGB+2BipQNMpDcCq7TfNt/LlLzZoR/3zWL1Rp7eRICsz/tD -P+F7yuSEP5iDbXKZ++c+2yuEnRm6DTZ41sR8ykrfzGZqKjJ9zqGfNXDXYgmk3BOP -YqpcoannUcpxoaaB2ZzSD2MFiQEiBBABAgAMBQJPVZ9iBYMHhh+AAAoJEBkuv94m -Yxv3U1YIAK1L5MY0fU2k7zCnXjWwgU9oIU73n40h+3icL0lKBN4VL2h1N29F7ZQt -6EJxenOOMmpSt6QMSvVKhnLK6R8IS5XF7gnItKAsG2Fsah+SKATBTB1/5nqe0jOw -8NwzMRr5KwWic6qjilFfMv3StADCNah8p3pt8yAHL3qUN07ZODAOftKvwZrBgJ9R -/TVEHgUwAHLjsOR3eVp0EZQ3vBTXODx42tB8eZ3iOmR7JqBnyym0sEVnVd/d/M5o -8lC/ZxqtvCX3Co6ke9Hs+s8MzDui7engsiKMiTARlSMIw6owDOCR/MlGhT6Sbxb9 -2KLxBghxu9R6kgCqRnnGdKgOHNSLPHyJASIEEAECAAwFAk96JooFgweGH4AACgkQ -XNaP/xZyRAFJnQf/dcmSCMHz2SmUdCOHkmTCJMdR4ttie2v4P8j00XGrZVPwFn7X -MonMLkS+7nDb8wiAL592emlgACtiWoz+8fApNmohRkfnm3jK7VGKii3EjVDvTLoO -cZiiADUMYRqJQZTCZ0M/Cvz9QWEudCAwxSs1BBB1w0z+kM76rGiO0oX8XslYtafv -D9u7vECdZdB/zdMefCn3QyXvIRDr8z6B1lHSkIciURu7L5mVTJiaYrWFcxErT9z0 -RAn/BmTAY25Wgs/0vM1OvoiNmq/RhVG73q2D3cMhV8hivwhv6xzwqEFIfXLmpWyt -HASkkXHYxbRuflHRg+p0YE5c2vPcJeEY6ZHON4kBIgQQAQIADAUCT58LVAWDB4Yf -gAAKCRCcMiabSa0ozObkB/41MEALwuJRjra0jSQqRno5LbNnkTfJMDhBO7aLG0i0 -CVyPJwOrpftXFh3qCkjz0fmbAcWaaA69tmiF8YbughIQX5tXbbhFaDwrlcV2ySVC -6tteIMY5qDfvvnvT0b7wXduAhFs1Q/JClu2q9NsJxqAi2C/225jlFrc0S8CTVBVd -ODK8zRLiIUpHq9dNogLcqbWxhYXzjPFsa1cZEq02vCnrfwI/L8DFD0OsiIc32Qma -IYHGGwXP+CQnubSKN9IPoP5F/IZUhrUFVrd7IcXXQ2kI/wOVk0Q3/gc+kASs9SmO -5HLj5DAFkhin1xYpIjH7PYa81xcyFaY1RWmP+94crYKKiQEiBBABAgAMBQJP/thI -BYMHhh+AAAoJENl9A18TBIuK3DIIAIm9DDI9V1fihVHdD4xb9V0plV57s+ycASUe -S4apBX1orG0tcD32KzFRZJMBSbabQXO+3KQlQEySRtos8Ssoe2NTwCWIITGFoMKQ -DoNBzwW3K98iOoxEIoBbXAuUtBtaHgCRyimvMKnZpY+J3l7Ai2ZQdeEkRtSWsxzE -SrjUyvM0+4npT1RTrR+9NRu6mfC5/aYopLmmNESLy6gpDS2tWK4uR4nNtPCfv76t -EA2H4GZif3498SvNkkVon/zVFzU2lh13YWr3FscRNWlFbvbuktUkyL6biPRCAWjZ -vWNrhZBOWCKnjRcnFnRYfH3ukAXB6lESUwDWtR5i4ENgBu9+ij+JASIEEAECAAwF -AlAxi4MFgweGH4AACgkQOSr/o1B+/POvnwgAn0ozjeURk0On19e8GAe60qgUuq7F -+KVMWr8tOB2tclD9Dcar86blLAOMSDuxy2w64vgl2AD3goOLFi/WIfoNtSVpQazE -/pG4Lxh422JZ4l3oDPXB7ARLQgyiJv7rurDeLl4xu8kfeSTOx+8I/bkWfpHcCPaW -5cXTo+E6BNAFepnS9lb2/UwljqDFycSz4XV3QGZ+AeKLg9hCtt49Tgh/QMBoRRKB -VUTkcPb+MxAEFck68Vj+KNeGYyuDIoL5OTqn5KYsFcts3/URt9vyzSbcrkeWXZiH -OVPy7R0ik17sucgQ19NvweneLCGR68JE9D3X4qEeErCOCQJHyeSfEpvYl4kBIgQT -AQIADAUCT3NBdgWDB4YfgAAKCRD8+//H5ao+rVWsCACcSqq4wnQ1LkSRJNr/02cB -0y85fWkUgB0Id0GpktOlgi5tt/VumcBj4fwcNpBEaSCY4xUyH5JNYGcxppYy4nLS -rQWu5cPDRtHcmSG1Cv6YyShSYtEMKGl//hdfBF8KhBv66eXmVLmKHAsIgL5f6zhf -YsA40DC2KjCceIIca4VTj8UNlIJIoGRa4QXAUx+OhEOl0t0t4lMZsmHfMLPItCzK -apGxFrdpWlLsvjmWNu7G86yyvmClwL8qgFL5GZ6CU//fIQeSj6snUK8RSOditizb -aSfavvVxf4XTJ7uU/O4QTbLHHVBjyawT8YUsVMzX3aSYSuMIItgqeKvzcgX+YqUF -iQIcBBABAgAGBQJPNGBfAAoJENLuaufY6r1GowcP/A89WurBtYG4cB+EYvIqieP6 -m08mvrpZVk4/lYm31cBvVZ8RODevXM8qRgo9PLg5tAtDZ3UrjdiJyjYsaHx5wP12 -ZG429FclGDi4KrifoWcY6dHys++YEl+Y9PSfYKygeHHBcMc9MWe5g3AExY3PfGZo -wAD0gbIn1Q6+9xa9kUbZAaGm3sn4DDHChWclHHVXLeES7tm2PKfq7yTXRJmQehmc -FYoE3Hxc3RN9oyHvl+V9u1r78yzHqwuN+rBdXEhLaUMXBm2Lx6izPboSiUpmI4r2 -pHoZdWsvrdCauTIAno4jNYx0jJI01U2RLEww5MsrFEf2DJ1zS/2IFRHX5632csgB -apR8+p3Fkol5eLV/81nG8eK1F6UN/IYh0T27QUQu+JF4gC7IVlLcjO9u4l8hU0gv -fi/jo5oXnTRjadJBwoccfoKijTl5qqJthrJ/qbOeWKv2+0qTVAbXRqp1wJRkMsb3 -CnMlgyt9V1xkryLvVn9Tqnfc2EkpbaLmnPdI8SA9qX2O6Ov+MfASi2HuVroX7UPz -yu6SiUOsh//fOF5lp5Hm/0Nag0kE+eq7KL9PzvoWz+iIk7ITm92eGw68X/VzZ3up -l2XIIxSClngo3ThygPSeSoMywoiM2TRWUdHAH4FpisAgcblq9oqgH/JKGroS0Z/H -WbZMD1k9ZQ7ClmBngby+iQIiBBIBAgAMBQJPCQWpBYMFpOwAAAoJEGb9oH9Fn3FD -jJEP/ilodhc4FGb/PL6fz2f+RujmnYgwkuMxG6LRmE5iktKC1KZBPjUwFGV67H64 -sirZ8FWHWuEbhpynZCIPVEQdbxE/ABTCRoWS/FaNCWdI5NFLh5NlLTHl61x+PQEz -FH+Vw1goYDacGjJ27Vxcvlr5q11EI2ihtdLF5jgdNbYDbh+0mWhQXPAj7uHA24OK -JWjoCDhNGIww4ndrqkONzQMzZ14kTNNAwx4Rz5W4ajN8Hfh6wM9JQ+amgNOowKQi -jXpUdK3TJ+u7y5a+s7M11IgvMno88wHb/+SquAhXeB/+GlrgVd5kTwMQtPtT5Ao8 -9vhL7r8lS6TyJgDD2YXhLF0nq9RE7ZrRyoBH/JGGPAJtVG00UdxV/hvsFAqcrxgz -dhgKedk2NeiuP8SSWLrqPyR8jJMKlRztcOyq7IDmabfUcih844Sg0FdSGVmslvow -PooNkOXEFxNW54K3+XP/c2MC1tkUvjJMRWvHZfymqzZd/rorJs1A/M2d1q1KuTq5 -0PuhZ5PaJsLdzRzFavAppOjnsp1a6rATP2Udf0+wSurWku1+IPUHJD0rNfp3PSBa -RhKgiK+d39qtLt4zfh0/nwGkWwI70D9LozVYJ35XWZGB64ubRHMmyokd1UfRFC/T -SiOMaJZdTVB/KKMrCrvRxJ2Fkuo2x+fDKhcmZenp+PLG4T1CiEYEEhEKAAYFAlMu -SVMACgkQTSwM/NWKZ6GnYACgqZaussejH0XDvUOx3TEKRqVusWcAnirWp+i3LcwK -cqpNYOMVioRTEij8iEYEExECAAYFAlEjfmkACgkQww9CaCncWwecxgCgjR0ZaARo -R2EwnGL0S1Jmdz0oi0wAoKSsEqwT8BzN1U3sk4nEWvJur16DiEwEEBEKAAwFAlJm -WoQFgwNstYAACgkQeaYn3H1ewhlkEwCeNbCkNL0xwrjGntIG97/XldfF2qkAn0nu -Rm+tqxRVPhlZDcVyA1f0g71QiEwEEhECAAwFAlEO1PkFgweGH4AACgkQfog0al6F -0gNsHACglLXn/kcWOrWFOI+eexBZ+7Z3ncQAmwWpHNgJYe8hTKeDlP/94msD7ldR -iEwEEhECAAwFAlEbuwYFgweGH4AACgkQKBOD+vsSVN07wQCeJBTsBKx1XeqWzCk7 -m3FNgx3hK3oAoIK1vCVftGgqpOkVPgZN5cA+qAN2iGQEExEIAAwFAlJoVvIFgweG -H4AACgkQ5YJxMm+fSTfvWAEAvI1aXVc4lyZr1Ym6tvTAPFQuFWrmpJkXVbDa65Ol -LUQBAKKuGEGMvP2tl3kvluadHkmcOpPVGJXFJld4ud5EoPc/iKIEEwEKAAwFAlNX -XNIFgweGH4AACgkQZFQ3ADK5QxyBZwP+LqzvBM1C+iAPfX66liqS02QaaRlOh/CI -59CX10UG7IHXRgMU///6Jr/9YP1STDP4dBGsXXY9JVoHXjVnXhWUP/ojsT5D0cNY -yKBEco9jNaNdGD0MCwYjQqIaL59FHwULhJOrp+eADq5pmjtteGwxNZEDhEKN60ZS -TUr18REJasyJARwEEAEKAAYFAlF1P7wACgkQDArUpXpti4coQQgApyMWUAE0yJV8 -jw0i/bwtyH5l1mZbKFo/cdUtgUUvAY0NsT/RDtFwvRj7xvUeMaF4ETqgHLEga6LW -mtGagsWPBB2pCZRaHaSCl2nPlfiHaLlxsXwf+hc26XBHsCd4DiEevZc29nC9Tf8j -Som9Qnc2LfJZWgc5222j1f0yxf15xSVsClXJBEbu1pv44GICT+wzJYrd8QD5VvqT -RTaA/3RvF1YpPaFUtKoUdl8Xy/ndDOXgasrX8YjRo2OVm4fmMIRsuvNle3+6pZDC -HPQzyM5e3DDeNcVQnYX58G5WvBOHVgRftnEF3vrzJor8RMpASKmBr1ey+NKs259k -X4VsWWOYKYkBHAQSAQoABgUCUu/M1QAKCRCGdw8soqV2hh/lCADa4b3Fj36Bvjtm -Bm5geZpeOTj0tP1Kv2VSHTnVzLb7cabacoJaz5dJzJ9MwMMPrJ30AXtsH6wzxFcS -F/Zise6npevgdRTaP0mxAije6cwYH05WljGsTUpLFKNFqj62O3IKJOQUpm0aanoE -3l273Epce8mGg0ZFEDyUfWK3DH+V3Xa/3+/RmG+FMzp5quIwIa1l+7p0VZAnh6MF -uhJd+l/BprMmpkkuRr7Hkb3RrSiHkht039V0LEb6UlYEjwoMR1pnA8dZGnp2jL+o -YVeiPaoMCRmDoaSaF9MqDHtdLA9uHfs1t6+LhOCR8tGRSt5Gh68aFcyJkkrrcIUO -RVw2kyV1iQEcBBMBCgAGBQJT/wgQAAoJEDrnYq/7na4aMWoH/RPfO0xEoNCMflkp -GICorT9XcpaHGRzT92k//oZUmAKMHWhQuT7vDerN5hBt1Tk/2HunYKSYqNpe+YpA -02kujn10GuWYfKwb6YDu/YMatqRlbE+oibF7IHaem62ogX3rTK+meSX5w1GnpVOQ -XUIQedYaktFx+XFOyMk4WpAfRdQfjAf5b38XLzRrl623oHnNk9Yw3eBRDhY+6Ser -gf25B9lBgN+MrtwrJqc10sFm8z8D8cOq3NB9E7uesbRqsoK80uf+ozLZixM3SuyA -gNsSyUm4Gy6zGDrvAVTgp4V3Gwrx5P8kNDc7ZqvcvanQlEAOqgbnpi3bw6RpJZmT -0li5ZoWJARwEEwEKAAYFAlQLse4ACgkQscZvZNBEy7jOhQf+K2OT14/XY5/sJfLK -n8PG7OAc41alXDBCNhHV/1NFj+fSUb6TPYWPUId2NlQ4H/pf/Pd7agPkF238pl+S -NuwoCsKjFvn7COYlcsv3NFnskmMAkLKWRDxqEemIL8R2HgMdSIJwS/8eU7Xh0CCq -93DTFzAMPa8aUPrnreLQJcv9UO8JleCtSUhupxo1Xdr1Dsl8iW4EOzr99WBHSJOT -tYBRustik+wE9qcK62WOmwrO3SienD2lbEmQfs6Dw5cb4b1spUngTjibqbfuoKHR -313YF5WUIJTPnfWAztzQmijHyj7Srza0dTt8sl9pBb7j0wT+UT3o8r2cqqXaL6v1 -8g9RgokBIgQQAQIADAUCT1WfYgWDB4YfgAAKCRAZLr/eJmMb91NWCACtS+TGNH1N -pO8wp141sIFPaCFO95+NIft4nP////////////////////////////////////// -//////////////////////////////////////////////////////////////// -//////////////////////////////////////////////////////////////// -//////////////////////////////////////////////////////////////// -//////////////////////////////////////////////////////////////// -////////////iQEiBBABAgAMBQJQz7vOBYMHhh+AAAoJEN51r5y1wPQ94mEH/3S4 -5h0xUJVjcklrGyIlv2swicZvw0uknVtgpw27Bwc8Nx0h1kgfeAQRT6nbIkO0ZR6a -YOHBa1IJFSEMwNTmwGGqYpY3Udh27dITPSBqHa5hZfghHRc8BP03j8/ugkJ4zVtR -6kdlfy3XpCcnxu+XOunOdJcWa+vL3Rw0pkAZGaxrbPb6PTMlkWICg0eVFtHnIxdM -ab+8W6kYwg889lo4D6yVyHWCjPMHrATvY4V9ue3Egv971ANivqw3/J8loHdPffjH -/KkGAp14716rzLPFKWxm8goQs7ZacWDtObcPsXmD5KcoKNeFJZSkbgwZkyIe8hkb -SixlZlMTZ0gtstUA3CGJASIEEAECAAwFAlIfs6AFgweGH4AACgkQ/BrZt6MzujwY -/wf6AluenrECEaLTs8ScciFGlBv4aUkyt6fBcQ1IGg7BYdPBf0lNqIS6CaDMWTrs -UTiZekd1yL1OsMxYUiA4ZqBC5vHTeBbAsBn5sq7vVqUmgKPvQgmKgCF4FjscKRWK -UrCkM2fBE0iCVZR45aVm5TZR5Nrs0D3K0qo7aGC3bpyW424k1oA8TWHrhnxm4hyn -GLztDQZs2Z+QBJOxlhPQFlzsmEILkO5jriIuOrPLyZ1WaXX251O8dmWkJAY09i2M -m6KoSTvZlD/aAcamKME66pxn0ZjIVIwleniZehv3zWPvGW4cq/3737EFhlhpPCAM -apWlzTX8q1nKnMBHNZxgT16p64kBIgQQAQIADAUCUnPmyAWDAAFRgAAKCRAn16X0 -iQpDa6PFB/9NAEpHnUFFKclOtWtQJzuXHi1IGd6n+siOaLkXdaLGYXY32bGJfIUj -NByu2fMWqIyYmNSreK3eQb6Qoq61D5KrgLBCS0jSqYK/wYEDZ2iiEDvvSoBMrz/6 -TnxAMmeVDOMDDt3wyafP65dLxRk/Q5P783TNvQULFBqIH6Kq6GV044JyFuC+g2Ao -z7OVDABCSjAX43h3UlS3vFbY1uL0fDZjCB6LWrKyznfC11INIR4fhYCRN6jzA0sL -ZirCj3OmHqNfs12msqs81QG3Iw/GNiXTq30G4vsRPS3DRS4amOOs2TXKQi48JF1b -UfHcbqlnLWtCseQ38ZwRXt24d279/aW1iQEiBBABAgAMBQJTRVILBYMHhh+AAAoJ -ENNhn2pHBol0up0H/1Pq2NS2Gi0UTLLEzUFtCRLpbmcl8Awdb/BQqYl7gWV+aBNh -DPdCN3G4KhSdWiquKEOJKIBW5YI/KU+klv5cI2ZYGDrdnjaRdyq4ENXXyv2VhVJB -a+21QQCz21ll3wiC7ES10fsXRAK/5aPBGxVc5AgIq794MDZX+9AvXHxnnWM5CpqN -jqROLkbjwkWUnjqrx/OMo4a8uTREAE8XFZFk+rTnKvEhjunisKzej5SeBNKd2S2c -YyWKZNymYqDgQpHCgdRD7CZl9W7lcJqmNILXi5GEWSQ4aVhi12IX3YKsgu9qcBHj -Nn9BQ94qoU2hkpBAsEO33MPhoWqOGK20kbhnklSJASIEEAEKAAwFAlGUYPAFgweG -H4AACgkQYdWGFjqIJCJRZgf9H32rlqKBjP2F+l8vzTXs8RhRPxOPplfOmwnmIapu -HyOZ0AeK6edq5wxzKGZxd87hMHZyAye05Kd5JpC//N6msnWaYg3qGCFvl8qaJlbt -3TmAhCuIKRblbF0mdYJga2bjx8TcgPGpVkWFx2K98+CVrxHDTPGgAlw1YXf/oMaX -/hN2IsRhDV36Kn+ACe8N1PTJRmk2FUtTB/JjiB3UHjRSXi0yOvYo/4ymj/l1fNZd -DIFIG7ebvXIidlZ81/HUBHIYoLhc2K43Z/kZLrOUYF32eWKk1krljrVdNkyh02az -+31HunZysORrixGZaXbNfOrx5zF1vEzV+nutUuPg1zK2PIkBIgQQAQoADAUCUb97 -7QWDF44tAAAKCRB1MuSkR3cVvaReCACgJBBwCbj6/aVAhF3FnfWx86Ehxf779b9W -eohoFVG/S4syJz6ciuBs33c69qb4qiPF1dWBsGcp0R0FsFq8Gze9CtO4QUaidqMq -DhPMuJxYW2O013+/GOs2J8uIRx9E+96JCOCChoEzyyraxCPCrpnjwspHlpmIB9w9 -wLr6gF1E6UeKs0ZYZcpB9vWpRvQcNUCp1VglgUWiuDglzWTodRWwM+Iau64mOKId -BSPpZRZ41SU87ORI8P/KYdm8RMggIGTlEIA1gEmJs979hU3HHd1fxTAvdYghTYwS -qlfLvC3411/m+vIkOgkHr0MktKdTUxsYEf5ysalH+SPqrMGMPafSiQEiBBABCgAM -BQJR6uYoBYMHhh+AAAoJEIJBMThVoyVFTiUH/1zlHI4ZzEJm6PwztJlqLswS/1W2 -s/EdRZEUA9Ty58eJFF+0PF+ImWdcl3t6BQh4z6F3Jhq/nfUmGXTJFLCWzE8qvtRb -redqn/ubEi7e48pfdU0rWbiM9RECnfheJOO9mOssWZ0hveN1099fismMtZeAC1wZ -UZAxIUbXJDrHTU71J1zZUN8ai/W3A5MFmfNrWB1Sdb8KMfRwSPUKACK+mt4kxAEQ -rPMSELVikrnXhCExkZUBT+TZelFZ053Q8wmHoDzE1Fyw3LuITdBqKsQ1ykZwgZC+ -BGDYW84yaaOv9DgqcYWP19Y5jfMlq5/E3+dW55y1G1i73esibrI5JTPQLh+JASIE -EAEKAAwFAlIHhBIFgweGH4AACgkQTDNTQpMrT7rbEQf+LfyYBze34hl6HvPh+41T -aYf3J4MnuOJtqOk1NRWhcCNNyIqRZaWdYgo0Nep17xzEIm0mJ/TBidfomMezNXpP -cx3yZ2yQnF6CuyuVlGnt/Ig/Cqw4h53I7l3CS33kypYh6t8dLKhkjO5FXpyhZqBZ -CQJ+0u9WEDWfBGI8MBvxGOhzpBydakWe8zaL6Z1QltyQuptOSPrkYusvEKyVf45/ -eMTzVuIIRkkvTYfjQL6MZTtiMIkvNJWl5OPaiY6jG7RJmvSkk/4rMJ3oEBlkY34w -KNxPFVruKSSvKm7qm+garYVCvBrYDwxJnGKxfmkVtXH+zdUL0CYy6pd9Ycm7vlSQ -CIkBIgQQAQoADAUCUmPmegWDB4YfgAAKCRBMQ88jc7PZALusCACpBKC6qLAJ/5w/ -YP0G6ETHL2v7W2y81xxCM31xhwEoZDgOsp/LG/eeAnnEItihPhqc4F9ivQ6MQd2k -KyXCkMX+tGsaupc3oMthI5B+1XAhf3+0Y4R2cGNtM1Elo2hWlnOmNGwJa2pWJsJB -85BXsg/eZF0QQDb4/m/orS1uDERdvaXyZJHeAKeEZcJq0m9Pz1mOOCxwY6FfLyQm -td9F7RQboIVgvXSpwhLYAMGCNMr5UfSsRyWLB+mKaQZ1aCfBcS7pCM8Akrisg1gi -emxYh5pHK6vxlSfk8jCxtkwAnT3393eicCs/95fpxJpsHXuKrXe7C7AeHzFLHN7Y -LtNA4AaTiQEiBBABCgAMBQJSZsWyBYMHhh+AAAoJEM83lMtT4wT2UeoH/1ZM9Gvd -qaF2Z+zSy48+g9hK7drl/V65D18xwTfC3b3bT4owOqYDHMAqFOPIkREJxv/cl9k0 -5kYokccnc1f2SxI4e3wuuYz8BCfSqgraDwD9Uq14Cefzv97fIj1oD1Dtli/E5QgO -a6SvL9mZ9VNNWeD0KMFZZqQ10MgFKsRm/7SBACcroUc9jPo2NZnI2kI+T0WsoQHq -kYsIoQpblstRxTS2DiE2vFHusatrf7V3lrOryJwKrCM+5uWVJ4qLM384skjPPXEW -qUEg8dqhG1D/90q2u0oE8xU2XUwNOCVF8kDk2eL2EP8JB6ekrNrFe8oyqFPMqt59 -FP24tgwv+1whnSGJASIEEAEKAAwFAlKlTEcFgweGH4AACgkQAaGXXUswPLnjywgA -slTHHSXOh090oG5PzmrogZacOucvqN701D/jr2/YMI2GEK6VL4+JVbcJv4KKt6/Z -qERh1P8EOORZJ05Do5+gBjzUHYzLTu1RJKU6P2yf2oC3umF6CSMXJrYVzp/MnjUR -I6p0jTzKR8wB7Qj34ytD7MUpYYszNf9GmsgtWKRg2+FkJn2JINlAjfbP5EAjvBE1 -TOUmSxUU1Sz48SG8lSP9pi/KAmQ8mO87dnsZaYWuBgSUnTmrayuVqPm/qcg7LNsR -Qw0ybbS6U6b+IpuYcqzj4YbZbQ//lDnyGQfi6NRXU8wevUemawwRR9aXm58ncVM5 -3eYRib1IKkhe2/6IIjNutokBIgQQAQoADAUCUqytVQWDB4YfgAAKCRAtJNtH1sgo -EYPLB/wNx2HCxYJ/zYQt1rDyZ4rvaMhHEkhKt5mJtqIMlhbk2LFvSmTN9QdqvgKi -W+HwmH8VqxEc8LCMdrWgFLPxI38VkS/6DedJ4COkhzscZnUgoOzIKArZZQeC0MCl -cIgN1YArvWsMa5ATeTxN/rCC2XujZAQnY230nypLfAKv6vNf9ecMxjmrgBZsLURj -DCIlzJG3rymFgzAiIolj9gQrprlmLhpD0rASYmp3IRd4NQvoAeNsHnf1efwlpz9q -RL5YlSva+VDyRFv1nzDenfto+7uUa8pcFF0o6Ldsas08YxCh7s2kf5TPwSMEmL4K -sOrH6OeekRI3UFPLftmnEOwFzM9TiQEiBBABCgAMBQJSte+BBYMHhh+AAAoJEGKw -+QcswPOOCAMH/Apkp9vzF2YYeIrfc5kQC37omRx/GRc+ektjAJSWaPnouzPbXnlJ -Eyz6nN14B7n867mrVILjDxQROwbzkmMFzK5MDRyvG7qiyO/MfhVnxD/DjYoIoaOy -tKg3wgr2pWxiLuudZ708cZDtclTx0FI/nKKJjjBat3W5KfXDeSaBfsREht2R8SvS -/ZOKSYJxZ+GXYu+y6t+MTq//maT5KZxdVZ53gaEyR0yS/9uuWXDEwec26WqnYZWW -6HTEoJCz71/zU8GY1vBVnyvBrq9jHeD9x19t2ffVHBnbm8gb3RapHjRBSogM9DF8 -hwDqrcWsMFIXZEoM7ZSBuOPeSTP72V0wtNOJASIEEAEKAAwFAlLFXwAFgweGH4AA -CgkQqz0LOWN+rFDYDwf+Msm0HGtb0eSaRKrxQKVNpAYbLwMOMnLxDnUG9FpkIjzs -pddQBK1/bYJALdRs79rfdRFpuOaTAluKKPacC6raafUoyca05QmKKbeh1mZMgkmj -+BXiI9+MN96EOP0STq22HJqbmdMcHRnJfl1Y/DaPz8m1fcYtEhcgfWJvzMpriQ5K -c3RLOAgITeaABkvYpZSALGC3ihXPVmP42f5x6zBDruY7lwBqLs2cUjbUWe+wRa7c -rbTJs4g61Vu32WY2/HAuc40C3dJbyQ96qXYg7lgLGzslnHQgAYaTsRH3P6Dmh8Ow -Hza9oXXD6XzhJiJU1si+OW9UKsxtOl9Wf0ytY9ZDqIkBIgQQAQoADAUCUvX++QWD -B4YfgAAKCRBxzDNtvArm113FB/9jzYg8LJwwSFoy2Wqa3c1twhgEv/JsK19HDhQS -ksrlQWktynHzg0BQ8p5DoEWE4fwJbF1Gbw2TYRX5f+ygre1xSTTISGonzeHszbsu -ZtieMTSQCIpzwl4BjA7l73UzbO31eW+ZBiyRDu/fMFzmLE8oDeJtPka4D9aDPoXY -b0lLerX5LY3xCcEhiAcFswKBFAseNLbu6tfqP/2k0OY5P5HvvONzcPllwKIcvzZc -rLa8L0nDc3eEO+nBEcuPLujwMLurdhmpbO8KoF97TEeBVkhrT+lvPDsZcPW58QZX -4kXdmfldozW+kRcYghtYPewlEt9Rl0QrVKaXroIYz079fyjviQEiBBABCgAMBQJT -Co7QBYMHhh+AAAoJEDwFFcFBIdav4nEIAKKZpwn0GJGpr+6SglEN4p1tZDT0QMgE -+gBRj6U4462ywAbcMCmplbMU27y47p8Hc7JYX24PRlV4eEZp7cCr9MLyhGMTA5am -SkCgDnJ50Oh3qlN5+XAgELWLjeejPwHBa5pme/Smn7Te4bmAAbun6QR5xc7tdswM -fdEnEDZ2iLWLzvJOLSPzOn/igJpqSd/w/FsxCB2MbNPXldZO7KrEWz3Xv6RwT69C -R2oVmwqfZvmiK0qihba0qngkGv7zOrsz6PgkrPUECe9+0tSpCY2+mInpVKST7VqU -9gxkFLaKEBLgkU5yqCqPb1f+6FkZ6vo5dGN5XKbsnhS54FM1ALjNliqJASIEEAEK -AAwFAlMKjtAFgweGH4AACgkQPAUVwUEh1q/icQgAopmnCfQYkamv7v////////// -//////////////////////////////////////////////////////////////// -//////////////////////////////////////////////////////////////// -//////////////////////////////////////////////////////////////// -//////////////////////////////////////////////////////////////// -/////////////////////////////////////////////////////////////4kB -IgQQAQoADAUCUxwssgWDB4YfgAAKCRAJOk4dQghVwXFvB/9dTRHN8CwQtLf4K16B -X26VQwEECxAXVxi5bwbXIrvDNK4i9RohODhPmOzZd/5ruSJ7cHP5RRrlhuNiURa2 -iMv8AHrafVPzigDNsrLfCEibmHA0+0zt2O1IbsNGfxMknijdKuPhl0C7omfAs8dx -FYRhw3iR/8kw7vV5MShIoBlEj/QbYbd4vUetqKa16X4PE+MGVcMawkNbiZFgqg7W -43LB7og7PfJr0k8YolOt/i0G1AnfSmvfXiPu2YCcrJfxNW2xenDKlJ98kvRnWrqL -rdTsx+VLwENZWSfOY/x5ZngN997lymY7PslaO4bxPIfJqlTfxgna80/th6ZaNnJ5 -AdujiQEiBBABCgAMBQJTHKNtBYMHhh+AAAoJEAir566lrN1lQ9QIALy4fr2YzSY7 -0Yah2X97pMow6b8J/zxBmdnsB48eufZSE5Dn7s4VCYhfn3sDra5o03eK3/mdj6LQ -Mcp9oJi1UrC1mXH7ucFP0kpyX7DwDlDLLFsdMSni/5dYh69Zzttqg9XXoT2mRF+p -tUf2dgbBzBgu1LigsF1aZBsBYDHKA/C4i2JQIw8N/MsgpEQB+SW2FB0ikRb6VnfL -LD+ZH36nnI9wmO6NftdK6WsK7dD1RNv3mXzSTFVMILCafqswjqC4ZJOfCih2NgSu -0RjgBLfwu7TY4pCni706hUoinX56dpCnO3bt7p3eSgHtTpvrXVmakPDJULA/54dL -BY/L+6bO/fKJASIEEAEKAAwFAlM4Nk8FgweGH4AACgkQsTxzZ3rR5INvVgf+PuYn -WO14iPmVkFt9QVWnjCObA2qJ3PJ2NYY+0SbQ9t+xIRqauqOtNBmzn7rn7vvnYidQ -x79Rt1i/vQr5b97Zh8dAq7DQ20LbJzuVkc2+cSrp1Uv76HhcsG3a/pIILcbSJoGd -EoNZ+FOycaF0eyyWFcJV2DHHDXE7tkMbtPMDgzsWIvIIuK6TxAh80zRV2XJq6DNa -ow5EzgszLsytTANpFg4kTnt6i2QLjHIq9UHUo3LaBKvCCN+UAsIx+FJQzY5v/YLA -as01rP6P3SpBdj/g1TrNyOQYCui5vPcgR3ZU2ybsPUHeWCsiIrqVnqPfGxhSHNu7 -E6APr8bsc7mbsYQkD4kBIgQQAQoADAUCU0l6KQWDC0nYAAAKCRApmi+lqj5M2nje -B/0cMezf1u7OsSCENQW+xvmS++VfPiYTL6OvJVe7iPvAbxw9dR9caDiVJjbQva3H -qehPt04CVAR+OuRCz6mdDF9ndboLS/+ctLY9mVJA061ajsZQXOHsCYCAQ9CpfMcY -E8775w9J+gH5zq9k8VewXsiXoW8Ds2Iy/WFrVdzGfAElnTWH0CwLm28fj1Y0igUR -4S8lqoAhnBYumdXI+szN2kiB2PgeB8W2xsxvQ1zmAlXKX2Vw+Py+iH6EYW6pRkT5 -jL+H7N248TVpKsSvcIryCfLO55p34LWZ1x94jOc35Fp6vE3xpzkBCIJBm2A10IyV -Q7IZSPjsFdR36atx2pdJJTA6iQEiBBABCgAMBQJTu4DaBYMHhh+AAAoJEFI9q8bW -llz34H8H/RjGh9BLaUUoIpSvQXHPxQZoZLvq3+7zzAaByYDcCICl+XiRszNPOd3n -N9siSkv9IUb9iEEzZdy3OGYAhmSMtvv7jFJIvoBE6KWGarYGK8siToL7FV/YDc2B -VLyIliflnsWum9nUbCkBvl6rAUKpWurITtm1VvSLziy2DpfGNwSYGSFuMvLd7GEQ -n/Zqa/NImhSU5vK+H9RW1ii7y1c2OsJlsgM96w4ZhUSSAUOvbVhr+dQuPmIchoOV -6R3kht1Xd0qkpmckBA57SN+GeOcYoZDgROavOBg94oVJrubh4UvUg3IU7Rye1PLE -AdsnHlUmvFJeFVB8K9fNF+sC8nmLz7WJASIEEAEKAAwFAlPjaqoFgwABUYAACgkQ -P8MwHN0JnfDp6wf9GMW8mpTFdwzNDhjsKGVSO2lp3bUOdG+lcce5+WSO1OrvPmlw -JAxIQAbUZG8g9UuHbqMxVYikeTUAa4iC/SpvDOK3I1BaFE8ZYJmfBkN9CPoDp/rL -gkD15VcXz0//wPKgq8FNA9tVIRZxZYk018/NBkczTam6TN2CwnAVP2yB13ByxyNb -Op/+0y/SP8dLoX5JSFZXQCJqj+TVTqRgXL+Rv58MGvhPTfexY9nS1f4vFgskOKEg -ziKwFuwR9v0MUElAdr6o92Cmns85o0QQhqoj9HtWfaiIW81YCpjiqFW1jTQFov4K -yMOTLljOwytNGQWjUhl0D9vpO/PS0s+3jAJMQYkBIgQQAQoADAUCU/RtLQWDB4Yf -gAAKCRBtY6EDy4vO1LBeCACL15OD/BZ2Avo6ncs/ZR5uK1rC/jzReB3dVVzxeEUA -xv0LCFP3y797VYs5UEVKsHG7o99CTabqcrHbmZtenuX9TxUDBXrhZdejY2cOMz06 -p78Tc7V9GF7S23rMeWRY+vUptkxnByQLFsQF0g9KMw6P3otbT8IRJFTfq5MYhAQG -Z1Ccqq6KuWANRZlPPCAz3J6C3qLRmDzZVOjqXZbcE4G6S10ZNDowQy6/BJ1BMSHN -nFNOMx5ZL474emGfo0bP6Z2Rh6q2n+XBbCVaBe0yrWh2yPDV/4Ci8ZIc+KMTbHlK -Y3JDMWa9IjuGZN957ZezJ9pRvIJ1Xr/0ZBJ3Se+84k8BiQEiBBABCgAMBQJT9Ugi -BYMHhh+AAAoJEEY666W7yU3goBsH/jUtUiLqfHoSJt7rnjfGnP1juEetzqFyjT+o -aXzipOm+wXElfO+7bb67ZViDyC4+SZD/EMira7Ootjtox/PZ5jwmeakS/ACgfiA7 -b3ylzGpMmNgAdkL+nLig6AWnzmDbHyED4T2MrZlMKoBaBbgS+/52zxSaaO/Jjd+H -tCE6y9yguCpVGHG1Rx13EuEKEPpylC1xDjAObpXO8XXU8iW/0rJ/e9+vnpchJPvY -BN7HpZFAYuKBciquHnYjS+rBKApgkKKbDaW0qMELWTHWRe7YRGXnUug26IdMAeIH -ZLqBMdY7yYmq9Yv2w784RgiOZL6kbvno+/bmyVbGbnWE+jTkTO+JASIEEAEKAAwF -AlP77mIFgweGH4AACgkQpzQCdoAzOcEvqQgAp7fSN+DgqW/oJz4QBljSb6qkQLeV -Nz4FiaZgT0uMkHZa6E9SWXdXr1SUczyUF9RXaZ/EfATinoUDUC5pzkVyQFQLpnBn -bEYYWstzH4gg0uAr/8+BCSWp9YVUpi/HtwTHXrh0A6OvRSkzygRZto596dKDktCp -TD7Us0g35zt9Ysvvl2K/EW9fdCow47Sq2lZWZNdVaKpOgLbli9pW7X3IcUHB76EF -yd4ondyzBXR5RLYT+zc1pyRpcsA/xxEpl4uQ/LsyVQVJ+6wPesF3m+LLqvLPQGT5 -yn5GJOG8WwT4BTjDY3fEs/nEZm3r4W0GW5ixfw0rAFLREMHrIFZaP34IRYkBIgQR -AQIADAUCUo7HewWDB4YfgAAKCRAWb8I8HS0d2AO8B/wMHt6uynYfthR6brSZn8k5 -WfZ1KT86b4eRVYpppDEdVyZDQnTvrkgwkQGUKUMcPfTeNO37Om9fbfhvFOM4Cqs6 -6tX1PFUnfn8WYhkBn66pxpfFmgwxmwHv5NxsaD3FoJMiHAtqs4FLgbclwnVSson5 -XOZyyRe2nFCj6bHlX0d1g0UgKXr8xiTeK0F29Ikijq0yXNSCRPVo63yYSGiL6f2c -BsQgZdGalVmHUH2HOCbofvNjZ0U1xe+RiyrjCMutHO51v5IHALLWyK/BpjhRmFfT -HyJiA/Xf+t81SwJLr8qrcJHRiANnSYcZmzHP5+hjudC8ZMYpMtiNaQJF+mKhIvQE -iQEiBBEBCgAMBQJSf76FBYMHhh+AAAoJEK91U4pAcj62+kcH/1Dy96XSzILHipFD -8OfdUukmPo0exFA/Ygxqj3aYVW+URLaoAf3i7fE018x6ros4tG28Dsr5HteGQH+G -89ibak/k1SSi6Sy3DUtRALZKoggepiwTbgx5FgF04s1jS4ZfdMHgcocbUm4DIJJi -1RXnF7PXmDzKXBmK6FYaeIgdWbtOVti8rCPGsnrgpuG80L5fBgyINBo7jvEKlksu -/4EaHct1cxGbU9Mx1ywtPBl1lxwZXpTjBKbm9KexLMVCdPhA3bEwFstqfkgNBm7A -fZWpxp/fRlh3/jERBI8s9xmoQPS34JCuLoP+CWli2s+ix8WUMa9p9xan9cMQBvqR -vMbdC9aJASIEEQEKAAwFAlKJYsQFgweGH4AACgkQgS9J8+BQPWNYFgf/YYsG6NUO -kbx2w6Nw53Yd1nkvbRSbgBrtVKAMZDRHam2tKfpIv37cJ2DAB7RDSRKeuhdR28oW -Uhp64QxBYjPKF8c1ifDUNioiLI2J/FunNnIuN1JzWkTpnoPdbpE78vVsj36nLGqR -K+ZUavCFFRlgh41OpjRat96+h/siUHTx1ea/crGwcTwuxiZ7Xo+q09de25EI3XS7 -7+kgnNpdJDP7R2iSWE6RhDkwwWnMfPfwoFzP1CIKMsUpqtHnyN+ID/G0f8cx5SK8 -NlOXgD3OFyfo0Kp8SAu84whLloa48WBZfY7MqDh+ALkSW0bhRFf67kQlFu71fATY -BCFauVC7EoP1XokBIgQRAQoADAUCUvZofAWDB4YfgAAKCRCni7iTB/69aAFfB/0S -lchH3f5DvH6CFbbtsbQXH/PNUKG5pWTkBv64JIdj32zB0w8B/cQ4ZLndrzs9oRnD -dkNH1YLkgYhD84jM163GmTE2XZ6Si6Im4wzCV6e76E5oyCvxe/hm7uZKUYWOCTNx -TlpNhm/iWPPSe0A+lVvcJ7hrWpZ1REkRFajro93O/aQT9/c8/kyHCK/B2Y/HH5iM -QKijZt6wr6jNQ7tFq9kCq1ODDJhYCOfDCM9UTprL2kb22WuaGjkKi9qFW0D/t/YW -6zX3Hy7thuavA4yuC6iI5Ede7sBE9hYSCU7G8oE6SQxv0qGFeekWrYsFyXujxcTf -XXBchPn+1O5vF/OC06iSiQEiBBIBAgAMBQJRXJ7QBYMHhh+AAAoJEF+VGQSajQw2 -e4cH/33JXAyuwrAya9/1BnC8r9dmht2yWoMYa8/mOcmw0p8BgAEZzVOt0oJNLPp0 -x/vfjIiR6/jBXtJtMfdxBhSu2JuTCoGw1TKUnbqinVW9oF2oVsaf3nMzQveE4RLI -nGdUfrOsBHdeD6gBzpqMEIgJfRPg8Y3TIVcI8S4jTQO4bFNlN1HLCi1kWc2Ze81W -de02YCNAnGTTSEIxeS2+45oDki62UKq6SuSj75pN6VCj7o1mfh/yQeYLg4Wfq6/P -IXGt4RYN6FyTGxhU3YIZ913KHU4DP+JBnDG1BqF7oau69JRx6DVdmmU6xLqhJjnx -PUjRKWllVMeMfn84DCxzJrptK5qJASIEEgECAAwFAlHubrgFgweGH4AACgkQEBWA -XNPRC4MRewgAipEdEwziW6tHYnVUAls3Nc4TOEz/5U5GbNobAtReu+HvSWqmCny8 -RJUtq7q31nEyah6lclZZFjsokY24rCOsZk4pYsyLSWTlqF8IrHl7DsCmVsw1AnI0 -FX5611lbrsP8Fj/MvGyxOpEPDbfKerHi+MQMo7VwqvfGZ5eGjDjPZWAx6R40ezc9 -RA6b8sVaA5qBGeQvOUK4ZcKIk0hjPsZTf3dDEB3v5Ot0Y7kw5qAGLeYsFjYKfGh2 -Yf0HVjKztscxhnmLis+5RNXsiO0G0+opXB0hnDjIwTCwaQn/bnO9GnTdH4vCiaco -Y1jZmEFgagaqmX3hzwfGdgMmOQPSHWQKAIkBIgQSAQoADAUCUasZ4wWDB4YfgAAK -CRCF4lKFPPZ9VcntCAC9uqefYbRmB4TLOLPeRcwXqV2CxAaXmVFWcRSleBX391HI -5QjDSX+AGGMCEwUvwHvpE7mafztbY53g74JGkEdVjWlW99Sc/uSi3g01PcZ32tl8 -F4OXF75Cf5OSB1NaoU65/6F+MG9DLcNu5xmu8WRfb00GiqxXDNFnf2Huz0oKFlPF -ad5wNdUfNoGNT6YTfgR6fGFVXKCspQPqqHRVRxUN/p5vsGy+TbgIM0P4cBTwS9b2 -80aLmjZkUJ/1n7kCATjiTcc6buDArwHSdQSDC74vzoLvlBdct5d/kJdpOUrKzhrx -NbNuS5J3vq18GGlZ0yFPMdaNgXEOnMvxpXoVX1I8iQEiBBMBAgAMBQJPTPxuBYMH -hh+AAAoJEBTp1cP55yO7y78H/1UnfCPCyKdgyt7vKYrJdr51qlRHWhLSQ9oSMn1r -Oqss7Z8G3W/O2jLqPTIpjRBVaRlHnGjaGRHG5uv6vX9bu6jm7sUu7ippCF+udDCE -WoVlQRZxlephzOn5ZIoBQ9eHsPGpjGGdOiXumVpU7RNFoXgLjQbDb3Ifjx2YqEfs -5Vef0gcjYKnyo+1nYazqKIvXkGhcueHvoaUW4gqVCHylf3yT/OpzK2unyqg8zvbn -Z4m/GfoGR9Wi7APx+NiX47kgfDF/NzJOUj2a0nufAnuB1XYI+U23kRaVu0eFhriS -xQ4PyM7sqYqRa/1OMONEMa4+eAYtp/2bkttXdHGqIrBpmWiJASIEEwECAAwFAlGc -zl4FgweGH4AACgkQWG8EWiUOKZA2RAf/S4ggEmcZZoMRFv/j3FF3gcm3DdOFG4AE -1kRZunbA3I2LjkF3sACi7OMcCFFREqq9cJ/HeKbtZNMBByCHfG4Z8UTJCUt2c7X/ -wsJMNZyV73yzh2BCk6qVAJ7Uns4gpVZBAUW56cLTWkoJIn8V/t1CR8ASVAWKwpn+ -hg0uNR+4YNgwaLw+3U9zCMgsSUuW2T2udPerd5sMEHt4sgPWEAHcM6IKGR0cZ/Ry -wLgp3WbdQDu+AMtWZS197sy8uxI+AWvZvDUWVme9hFNzugrE8a/T9ksQvvnivOVp -jYtGtcvTE+r7nH1QcHMLPneQd7UE4qg7DJp0X4fbfEL5/wvywPIsEokBIgQTAQIA -DAUCUeWfNwWDB4YfgAAKCRDG6LpeuI1p0HOpB/9luBSzIr5aE4Lo9E70MUqH5VlQ -14Or86CrOnrKFIpV3+T41rX4tfnp5hxA/XFxeNZpl/SrFYEIOa/XALaHQNVgFaE1 -WsmjGbefYEJQj5MZllDfrGiRN7Fd8tPMUbTc2I8OcEjVwTvZHyUa4JWHBOYJHwIz -pjy3Y+fEZJ0/lQNRRdjVtxPutswJwSipH3pjkqfPvuflKB6o3p5GxvuPfjD3ZALH -iwVnucnR7+00H7pwfVxGntt9EL6PSQGW6zAwUmzgb6KzVYe/V9ndpdce3k1Sh0KV -1ZjXaMewD5eTtBRiFv/kFI2EXJylfQNwyc/mEWR53Tg9tadVqcMfPb/CMvwBiQEi -BBMBCgAMBQJRWeNbBYMHhh+AAAoJEBWHDbVHfktg9CUH/0Suqku+ZmpdTjQEUjCJ -xwG28QsRGNYetuipKJ54lGuBsWfbJkEDhoPIdMEqGTOXlBNNH3/A3Ehvsl1qlDzh -m+8ySWMIc/p6B4i27bcfddl0k6OfphZBaBDKD41bMqVSEbh5/9D7OqTSIN43ayDN -+a2lTjiRbN0cLi2nvvusXcjDWW0jca22xaYUpNLEs4OmML5E/0W6ntjN99lPjieW -oYhMswLuswO7utqmZzuKd69JTL3RnePZvUjgrxAmPRYWjuxKggy77boOpJVkX8i6 -hdSIlshycxQBPRmLSHP3bFj5+KK5AORIxIgcLpe22ZtIkA8R7yLU8xvdhy57Sb9U -d5qJASIEEwEKAAwFAlGBlkkFgweGH4AACgkQo9kYe6UdEYP7/wf+OAC+wLUIbLzT -mrORFdJeoY9GJnhQKp7HHsQaK1o4ftMXK1zdWhiU+VqAEvuic/qyAkBGbCdL2mXF -YbftDs+v8ZqWPJsVMXbo0Pki0sZ4MqkakyVE8WkQ0GaCs517KbuyzN5CpG9SgG3u -QQwumSHDcnT5OGah86i4ivveuHY7DTcirwIgFnvI3o8pEpq7mTWKsF1aBl052fcq -xF9OH1uhg9EUmzSUtYbyIUSi3JvfFmn4MSm+jfbXcneDVq1UeMsNhwQDXenj+TEE -N8JUmgPuP720rRPBMsuk3OtgunMUnwtWhv/M76p+41zszskeqzw7Isgg8Wd6WsX7 -t362FRB/aokBIgQTAQoADAUCUdAKLAWDB4YfgAAKCRD35nv5oocXxEViCAClGm6l -+vn73OPnvQYTuulDQCuE1EtRLGZ4sbuWnSNW0sm++mNLq8ilw/u33jEU6oxMuLyz -gK1zDtrLzRNUKQV4ofMC5IY4kViA1OZOGiW1gDKdm3KJ0MbNFWkLUbPpsSksyNPJ -ECT9AFxgysS3U8YXQRZ0yLyRZOwbxqtWb0QzobtzXJCVykwwbbXQ4/Y0KrQ6X07f -hYZ0Vuf0Ncm7vn2h4UcKKeAyXGpktY1HtGZNvar1GT5QlGu7HZ/IqZLC27mb7P5F -eN/BZ0/4DGd8DWucE5BQ8xz5dZ5L4f1/OdCb+JEorozhMmimMqjpwuu3gBQaPWip -cqVSNeHTuLp99KVwiQEiBBMBCgAMBQJR1FxOBYMHhh+AAAoJEIkJ+oKzI0P9aHgI -AJRVDDrIerdpfkGlflIJhhZMRXwfeaTQrpKh4WGSQHsO4nZATTuNm5SiItMSf6Z2 -r1p/mGwSTvgxnb1uqJEoFcEByQJ/LQWu5jPI8vDHwJVB/1qWUlVlUrKudNb0unG2 -ldDOgSg6J8Z9vt4QdbBoIGap/DQTYU/DNJ8NqGx+8wgIqNkgtMDJ7ndyWeQn8ouE -yHHgjO8UPr5IdUwah0k6lB4vgGjFRSbVGJ19I/3Sw16kZ0/dXrFlH0O8JO3sn9PE -CkYu6lGQ9SfPFFpEXZwiRvQzMJ6AwGx2iRe6a8ogrAUi7zG7NOGGtCrIBYBJoDvh -08+HwpwQtXYvPeH4+9WZMwyJASIEEwEKAAwFAlHvi44FgweGH4AACgkQG3ooMWsb -H5vk/QgAovev00nGjw0FUkZvk5i46TrOoRljaHM54CobjDbt6pm4qUrS5d6VPPAu -u82dN9LRVpFt/Pf2EM5u62usrSQTWOwbPeZt9ewiCj9M6SFn7EFHVcMYYXLm426f -6QHLBG243XjbyJZwfc5LWSrtbWd2C4B8U9634oHJBoJzslOMctww0odWBBfvRbJ4 -kvSq1DJfm6eUJJRqJMjKQD8XkJpLuqJJiRTTtW2k4kuimZl7j1gzQIf6Id7qkrBN -FRSdw3j9tzG6AN73WAL4CGtHfIZF/44bWUdb3gw8YDv2dO5VeXkTxJp4ua/nW2gM -BYaAgNzprj1KSATOwqEG4r+K6ENdMokBIgQTAQoADAUCUgQOXwWDB4YfgAAKCRAO -Tfy3D3VnM6ayB/0QUODOELIeIgh02iWPDF4mX/F0hppdv0tyAzhSifmrFqYB+yOA -WQt6O1PucHZ5xyx60PJ/a95yB2mQ7L8AU5B4EZ/cUYNol3fAxn4BapwvofDFhWeh -Tb157IJILPSlVh7kfNk/SOzq6jKdS870Z8HKod+be3wBCXzhYA7alcacZiWLvBZZ -2U8ey1xVFvT7n+Kpv4VIjj7vozcPU8pyI72wKFLXeasN20wx4viFH/HkIJ3MeM9U -vQoXTE90R/N4o5OFeqLMDu2vvhyDYrIipTggf5+XvmzKvsHYr0+zZldQ04J5y1uX -kxNe74u2Todb4zurxgrN1yx1n6PutCDTYxuPiQEiBBMBCgAMBQJSMz4pBYMHhh+A -AAoJEHBh+Po06oYnBbIIAJJsDkLywdxsO2Pbtp04tdni/yQmaih+AS3RUOzyS1r/ -uGYA7clPwhM/uv75eY578nKS8ln+ff/yof+0ENzN0BVeMxLvi3aEHqPgjW/BaQ/l -zNrBfG66p6fQ4KfHxGYZwZ+pjs7Hq3fRQJdE5/0bwni4l7LmxWFEPnDXwP14HQhx -NiJspPC9jHgdot8fW8pouWoFzUhq+J+dWX6CujbGTdlGj6XFLy64Y9UA/LPxZfLm -gtjvClcHNAxW+ongDXkJ9ySwoLx1psWejbmM2niWT3+a5x8MeoK6SVx3o3dMVRwD -1QLo5qAvAtOXC8wYaoHSX+arz1HSXQd+lr/JsfBnyyCJASIEEwEKAAwFAlLVP5QF -gweGH4AACgkQPDe2gKyQEhD4gQf+Mnl5VFXyga3/dI2n3HLEeaImonSv5cA1ntm9 -RFrumQ/D35umYPXT29uiy9ZUGr4iCQ7hBXAItfQYb3nESKvPIJ4G5nBm/oPt1ras -uq4IKwYupb+Z+fTbbWMOK7MSquOEJ892rSTxLo8/SlotjQ/qRP4DyESCG2WeiE9K -01bbbwh8ctncPHSiu3Aw7sMyYA4bJYi/cA0B68gR3cNYJg0g8op+YNrUIANf5FkD -pJRg+T81LDzWiK3ZeZCg6LKL3UMSIOqEwYw4w2G5ZhjcMHJxtRPVIbNFqWdgQfC/ -CJzYyTpCphS95dXMctRLFPm4IzOlqNSB1KReUQ17pkqmF0E7BokBIgQTAQoADAUC -UtWwwgWDB4YfgAAKCRCQX/zLSGzDBwKoCACqdhrGtJLx6nvLVx1buOEO9vubIqVE -3t1k4rvNEsYmyS2WesPjBEGt7qS9SKhCGoBJyHmprkMBOXwY6B/yCmqUFcDD7cp7 -UifDfOBDOseSYoP/dtea/g0TWEQvn8hXDlpRDBQxmYOBPSq5hhlfXQLNC5jdUjvL -VLOmFSnTjshVxrfKWMVCfrPBcdv/klVtmL5fw3IdBsUKlXa4/eG00BOKkpeS9upT -s/dWaRxFSJVAIl1wQELgDIof+nt3y08M9omi7jeG4ME27b8RE/2Q7mV3lfpne56a -djULA/mW+snmmJoNsyHV+QqdGAimdKbOoKvQXo0iT5QZ6L4tHNhaoNtyiQEiBBMB -CgAMBQJS/8GJBYMHhh+AAAoJEB5nGbkK5hLTI8cH/3wCzSdopMOkqk+hIJMxsSVA -e0SHZpIXMGKw/IXse3yjoGDaASyyjRBzgvre5P+pOM00HU3LH5Avl2qau2BSewVr -odv9iH4Fjvori4qMSHKcZ9WCH18Fzj4bM52yybyrl1bv9ffyVkQz/4DaZ23tqYAM -j2U+8hxmsRpRipPChKHlrGEndooxl4sdffxUkiAQIqlbl6kzpDsgpOvinRt5l9Nv -5noFQ4Y6dPnAuwg0vs6gJb5xIiGHroPEbOqGcu/FlC67ObKRpAFZCj9SGHy/9JaD -U1xoCr7ferRAYU3RF40g1T1fkkDqWsVmrJ1EnMMWqyEDmhO5+uEAwpIKin3THJqJ -ASIEEwEKAAwFAlMHJm4FgweGH4AACgkQV30k8GJiSpW/Tgf/fQHsCNoktrk4NeBQ -CqAj3AyIkSiHwnlEZV5RvZRm2taXx+N7qamaPsu57IfeO3pyy5DE1fmxwCPTtLuh -k4jVuSw4MpmkGez+OIRdhIt84+BbcS+xRwqn88sevJOfcc0LC7rf/lYQLfn4LIKb -xA8Vem7o49fzM+w9PoboxiPXF1PjLXP2tScfgL08Jj/47uNfwgENCuw5F+T1vZz0 -t5Xvp/EYC0gUrlwXnk0s9rSMroJnyGoaULH+v0PeYoDqgc+wcLyvdHNyD2YjvrtR -aAiYzqm8msERyzlLt5UGV8PtVG1PZgAcc6fW7dH95WkX6iLGmnDWDuiOapXZUpfe -3SpzaokBIgQTAQoADAUCUxtBgAWDB4YfgAAKCRB3/8UYiE42TO/oB/9tfP8hPoMV -YxUVxeeNOG9IOX09euAFQ/tQGmbz2RXjNyqnzOWjS4MZeMvWEG40Mfu5MdsI62hk -N+GjFjx+8GCoMjliECVN13688WfhvzernrOK9bwDwgLfFLomv7jSx7WECvmC85fs -YhI2arNMQ6fom7G68HdlmaCEO4uWfcpo+EKB4Vysk/KsIHFGXATkvbAE7EddXrQF -l1ddq2ATNRydDd0aqRu2wPSMRYQ1jmZLastc0cskaUe0wPkH8ctQQv7NYhs6DHDV -UwrbMkYwweH4AEzGFJMa5RmnL1fRtjurnMqpCVlhd/SZRwj0ivF8pYlPAt2TBXRn -qrS7v3w8hECuiQEiBBMBCgAMBQJTOWsJBYMHhh+AAAoJEOylh0vRN3RMESkIAJEs -zBZzwXotPzKH2sIbXRNSCbfMlYshZ4ryQNRl/IMag6e5+MQT+wZEnhZkUGIAnK71 -4ORC/MMaurnmIptLXV8BZMzFa+CwJjYTYv9U+fHYl0stPi0R0Y6wsYLg3RnIJlIb -bbO8sId+Mz18zuDHDHthuHIbAQlLyoIOq8u20xjtUZHDJExKYQzuUZ64CsU/Qi8R -mD4bn2FnvtAHVWnwoxng40Gdf60JqNNm84zrARgjbqFC6HGSGdZAnqXLIr6fKz6s -4sPsr5tOx6kPMgxWhsvCuc72P9bj0CZJ/I8z8MzBG40sGVnqwOIk31t8CZxJYW3v -4X0t324AIK9APjQLXVyJASIEEwEKAAwFAlPVl2UFgweGH4AACgkQgYFf2Mov8lDo -Ngf9GNe8Ko5VwnEpbrty9U5uOtjvzFOLcruh0+13MR/UvELugYci7RTB0BfEU39/ -yHtwcwym1l/vu0rvMBmRp94Oymnr55eR3M2FKpjY+1ncR2c5/W7yoH3K9c91hw4p -8XNXsSFuN+x0i3uFDGqay6/VLlcRgeCFM+8VULn2owRYk6xeN4+PxpaXTaBOoFD3 -SAaatFuewyssHKTzD2pPkzRSrZcdZ3Xnbo1IRXF+WUiceL9EREesuszgecubBhQi -ZMB7r0MZZLOSyHkJQUz2AbBAzjawppnqn3hDv0XSYwc6h9kTgPV8BRl2v/mzlYL5 -4Ie3K8I50pbsf5JTVlaorkBjeYkBIgQTAQoADAUCU/Qm1wWDB4YfgAAKCRBidJve -UmCJK1q2CACc3swE9/jqh7d6QzIoTrq+KRw3Nk05OGQb9euhktx6/sb+F1TowG5g -32XVyVOOf7NgHTuGgcIpA0DZj+YKFTUFet6tyZIBiTGJtmQhSVkJsaRD0iIXntZS -Ja3wDYaVYl0u4ZVhfU0CAXs5U8ilCXRqlRRdsGgH3do58ZhuCsTRKXjJOl0wZrzM -QcTO5523m35szm4Yz3mWQsFAWG7/1NqCZ50pusLQqDekQiPLLV7ZdFOYj+ZBdOjW -9liHikwHZ+f4Z/98Vn/8Ls9cda04LPy0TFS7PvwG2AzXAREgA6o/CYhLL/kxtzkF -kyQxx+0k2yVYcXTyPBS12fXhRIEoOKISiQEiBBMBCgAMBQJUDtpGBYMHhh+AAAoJ -EOg9K/aZaD+ssJYIAIA6ffRiIQ3yi+S15kclyihVFlqRHpsraNZDSLxpsviXS+cz -1/pssYJUmsHUwm4A7OA7jrf7tGIT03jB99ApzU5b6f2azIm8eGjoosT308uKhOIs -ZHaX1a0Fls6GJEsv3FTK3KZV9rGSVephl3kOKxFp59WwBNSAnVEdHuUVmi7KQtQK -6klMwWvYNSdzRqEY6G0CHOwHl7At+2sphgg5MlFzM7hA+uIUzGHAGx7rVwgFu3eR -8SjyoV48MhTMgm/AE5k/7jGeHYL0y13tsNZp2ZMuqp16QkdtTX5YZVSM5j7om1Fj -CaIhgGz/vMsqOj6gE4ytji/3mcTl5eYKaX0E5KaJAhwEEAECAAYFAlFLX/IACgkQ -oZmdJ3tJ+e+HWA//e+BsD4fA6WHVCeukgCf9Uj3qlsiJMl+25YS3eEY7czHttnwB -O72pP8a9AHY3W3iCB9pLG1LehHhpl6a9/DlIQ5450UOI+4tgwxz3wLxbXmrwjopx -l6otN0aPYw25LmVNwfRi9EF9V0bvr1azJ0H5B+Uln+hm/XVL8XPUuGlhykRWXKpW -NhA8yPiS/cp+yzk8KmavDowf53B83sWts1Q/7xxVk96mF2TgDGEGnlN81rd8mz4S -+1GNJlYDBLjzKRozsCTmdxM5cvehzHAR7iMax/JNjig4GvCADJMB6cGY4x6sHt+m -G8ni+3l3tjmW79Ig1h/qBpt8DjlAsU6TfEwqPXRidKTkWrcGH/kxZ0tUC/Fp18e1 -//OvtTLeP22lnW6q8erh+62SFPa5DHwlVuK80CVH2cfe+8wOWeYqstireW2GzHz0 -NJTR8xzBBziUwxCtEmGSrOZN0s9qNUCssjhL/mWXDZbLqMV1dq0Uli7YQ8wJVWkA -GjXZiTiRRxu8MrNNVkCNUtCZM6xbqNF0qcdRpEXdfCOxxmRE9fdqP6nnqAz5fl9V -KPv15GHHz8yi1Tq1zVB06Axhxh87ylcQeX2NoF9u4TUZT1jX3svkXwhMSV1vOPc8 -p1DoRLAfijFOB32J18UT5fsp49tiMjj/hLQ4XBHzWqXY3fvPvysiSRa4EaeJAhwE -EAECAAYFAlPdjuUACgkQ5R+wkcOzh0U2hw/+LcFJ5wM0ZDAZpizm0+ZMz423M1A2 -+Fi3buKDb4CA+pVjUgLk2+M8FxJoeHwsd3dh5hOo8bMlyppDyuDLh4uvmsfYyVas -z7U3bIkoWIb7IulInIxaUnDmRg6jRiqnxCHKLdcb/0F/fnr7GmfW8V5Vrgw8Eapf -0rnEL8N4qTV4xfJKdQIwxCGIMlw4yUi5l/0hfSFnDjLI8+i4P3Xqjc0mjGWpz9r4 -39osqjPA7YtyVmT1jFhw+tahUmsEZUanRQDIM94ayAfkYj+nEBnLVmh4ByT8FH3h -DM0ToQHJOjkDCZZXbTBP+uStoNXxMWcY5LJ1zTZUxxheaPyuL+MPM8jJn2RqLYJf -fdDFZjzRmWTV+4KVjF35Pw/jIyiC2PultkcwWfoSrq0w1BNAazv2iUuCjKeeE/2p -whVdKShFcEr8oPkVQG7k+JN0itlGTZzX9Z0kpRn7KDDi3d73BHHl7pJ3+cSJzfSP -CBjyVQn7Sozi1bo5wXTPPdCwuX027VBCMyMmtxzzaarONeyyWXVW4pvzAdn1ieFR -BMIVvYwnbsrxmQhkoU+ut2Yi9aFK7jHOFL5Pzt009yb2ir/VCS+ISBtNffCSa1FR -iMOLt4Bw86fNWitt/J38Cx0xhf1VAqXhm8Ibyo6xcgMr2UDcapiQaCIEv/E/bdCV -IHhXbhL6orfZ9e2JAhwEEAEKAAYFAlKUNNoACgkQ4YEUlHnAQMZATg/+J9hgvwbe -HuqFnNmYNVi16RBX07fZjkikvmL05sypsFtYVsnKbh/sHDnM5clOZzYsRKYT/9My -S/mOIf1mkTlfxiqKnG+O8zPaIxDxtp8bE7mWwO4tIC03of6kljv7ZeThFk7c6Rhl -bVuS2NZPhV2ONpl8jzqIS1QBdJp4puc+6L9BKq4kSYOBNVt6tyVUv52MEJ9E2SZ/ -ZcVYagQESl1pJ8WGecuaAjB8PiC7gQrvq4kOLGXJOVywpwSKZyF7k4izBGo/YedI -uEkbq0KRRFF6aFTC9nn9vTvxMPTIq8PEze5YCMm0xqPuA/3X6K7PmrZyPC4RiLp0 -hDTb6Pk0VUj33hXhzLjhrv53LAW/cJURKobhP2YF4ew1JP2GaZziusx8H4pUMMg0 -7mr68TipUNdS/QKnhtXZPovnPVNCMG+4kOxAS4+rUOwH8J7KU8HgLdY7gURf/7wQ -VQzxT/9dIDxJPwK0/HDJtCqTfCh4Rfjq9ZzRuVhZbwwFy1fuFNdZZD1xgB5QTZP5 -NV7Ia+3uSjVmH1LSIElR7fGTQ1RQ/u7DEp/8wYGtHQQePvsgTPcYCfL2CYey5TOR -H3lHEIIJVbpQsPIJMNFGHW/qOddxeFkKaSum+usU3ji68kvV0Ifn37X6z8dkEKos -EtiC6OBF1osqG0xsvI++FT0RC/QC0+MlvaWJAhwEEAEKAAYFAlLkVTAACgkQjO7o -LN2+hE1s6BAAg/e076a+deXtCeGT/vyydyLBbOJtjxyZWYc6J61sZ1AjwULwwwTA -DuSr6VWPjnmCXOnrE55tLDCCwAz1jMVjosDha3uvd+xfuMVidwATVUmvGls5ATXX -/4RoV34eFugA3f24bEDdAJAXLeKlRLStycylI5crz3yRphCztHESc7GyCDuBj/Ai -1Zd/o+0/7YSvyPAPimPQHsN42uug8pdckZ8xjSr4KZ2jSpWXbZSv9wt9M261Ea3t -fZayM5KRgbHIoHov3kVXZ/0+mQlOLLzKJuWipvmxeMDb8QZP6ll9iRATqjdrggRa -mGtV8nRop+bRKsYfYhIkP7UsjqQhOzlYL5JMqLR8XpWE81O9AoTrpNblHoh4XfdT -T0Mo4IJiGY+aXOxrQ1TObCSO7MNAOE1j3hgjVY42chhxEoQh7/Ot404bF57yQ4SR -5vwX2cw7dvU+rkvTyAVnXu4+86XMruIcj87Z8VyFwSs1eJBC1ufmHmn40AW5u0lP -n8mK++w+LnEtlKVcYvwybwsBFAhllVVVpUgX0PcBiEriD51a4j5y4j1etXg9dcp7 -mgodU9sF27lOaBQ/EWnvob4TY9L2fVKKVgGHXN3mi/ipouyBABlBxg9bapRD5l3b -dNIKPivc1acVjT71iU61ljBEN/hVEJupXGXQA8JHEq3mZYB5d1EJLtmJAhwEEgEC -AAYFAlGreuYACgkQeyTlUxqX988ozA/+LG7jLyB+oiqomWwqSfRCtbfaWXt45XrU -y26tfuQbLk8NsLGmHgFB/v1tMc5LIveFd4/HgH1KlaOD87SwtZxf6q5qN89mBtlX -gvgPEw/2h5Gww9dXjVIBL4rP+cI0LyIyBu0jXJW36Kq/GwFlHeLQiaI3q7eab7Zi -cBhDiL7AwJCjYm9Tr6Ule1vuK3HfI92ozAjZ/GGwHU4BZidFKJc/lIsP+PfCFhyd -4XSAdgduIG0MMGnMJnrlM5AjighhQ0rx3q6+qMuSVHqkAnWmHGMb7V1ssbW+StTQ -juiBH1nqiQefGrzTWNr/VaFSwYFvkpBhCN/xg6QdDRTP1FBH4EFKqJQ7cIbKfD6S -WOK5qv38FfFY12FTENqu9o5GiXqij+f5yhexUr1k/c4457AKrTMYFuvB6QVB9pKL -YxdD+gxf/9zm+B1oNjqsfvHgiwbTasWehFGuao2z+5fnLyWbnnCGYLircq0r+LD5 -SHFegu9HQl6bX9N2iouxnw9EnI7G/Suqq0FYKYSG5fhwIAUW70gfSMOGvAYynAlg -CQSDDzCUMbto6/CRiPB2qQZpTdv9FIKAN0A/JBEBFzb6CVie++RnRk8baD+5XesT -UmfEoeIgV2yId0KPOQLSuo9oLtNmQ1XM19pEXyhsHnNs2FwbWuunOaF68Q8dcvBH -TCEnvCYDcrWJAhwEEgEKAAYFAlM0/KUACgkQL2O/igQUx+Jh6Q/+IMuiMx4IBi1f -5pRc78kSw+eTbOh0fFCT8o5XAL2CBrq9RQLrt1ThhlB588dFvDtJT0h5TGoD0UhP -X8xaFl50ADXNs/W1fcV60ekVXxScXtFqdJsGfrn3OsaltWc7BOnSz5WyuyPP9K18 -AoMHYD3mL2jH0aoaoN4Vy0KND7LW+NznZTR/n3IxeLI/zxqeqq9eze2K+yH/9gE+ -Sjgb3k23JiXn6aGYS4KAMG6UYfxD/VyBBNB6TZqpNsisreFhRLPtdedgUaYK3qKl -gf4Q1kDPGC6tNPJlN0LJbkGYZ8vZMrMfcmszMrHOvB/d7MbRYc0mfraWqGlI2NU+ -ZSFiRohexJz+rS/65DzvxC5rAs3Mmqi/CZxGvsWyQco2yjKDvz3yzRxZAFO1KNtU -cVva/NEikfSIAUJ07ySlKmxreHdRwfqOomb8A2/xtGVJYmjytzYN5FEe/pRHHbfz -0e1wsiRPpYkBYCVEyWj+ZHA8u3iiEq1FzFT5gMo0w9WAdfmpzItOhlUhObaFFa3k -9HpUawfF4JFT691UX4YKWhBSXrYqR0iHFfn6sg2x3BN+YCKM5OI+lNC89hOed0Zi -ijL7NIvKFiwujOzq4z861k8QDA3Mn3FsaSQI2xyolk79M5bAiwr1F9WG1FcmFYrM -0V7LWxSCLeLeH1r1gm6ZqGQxm4mOquiJAhwEEwEKAAYFAlKEB3kACgkQKt3WLHsc -sGJWBQ//femeHoZ8PTlhbfxsThUw9ouWwMHzEtOhCaUvILEAC5lX0vA+WOBfPEgJ -YWp7d8RIcZ2jRMqDyfzvQ82LYhiqOiWdxXUpYnU4AO0VH4LqqQX9cFlG99PjV97K -v3aWr+dDfLIWACQd/Gx+R1gUMYl23KM1PXubeYLClX6bpKv96IzqgzL84UOjtJbY -iEYmIK/ZCLcZM2InKJa00eliRwWwOsVGEZrGccx0LdXu0FPLwd4VFwC7IJUh8XzA -EO4KSLNC/iex87Ww0gxJizdSMJ8V6chjhB3x73qkR3Yx9vIbP5Ho7wjy/Wzj0NXH -2VzBuuwufGyrsTwkOCSROEyZfy+iHHjyYsKUvdKUf9LNgE75GaztZnVo5BC4TnD6 -JhU/kW9P3tV0h+lGUUmMJtgSPtIEc22KP/jBdbHuaCVZNj/f0W3BuRDcsmMtcEC3 -LemuhpDBHv9N8/2nYUkCOLo019QSQLS5IOVRe8OxhAHt6V0pLI3mrPaJdP1KyJtl -ZmJcH1C+kAagAhKrtKWO0d4b5Pk1BLeQH9GcuqrwxxT80LV0Hg1TVGP6F+BB0p09 -JR0iM/HLQvoSeK02YjuSDnoKRKor74TN8/OvPHFrOzX4JXxcNhbvFIMcJ/rtpMxu -L0lHr1nTatlwpNVVxcnMe8L2+8PGGjgAqmBa+A1Og1XjNk+jxYWJAhwEEwEKAAYF -AlNUVH8ACgkQQuqJtGAIlszcoQ//QofSH3JarpK3wlA45v026Cl8OBJ6k1H29Myw -2daukT0Zaz++8muMd935KWHuGDrrSJ1eIjEzk67GoDUmZgeZP1Jvqql4V7wStvTP -/U2ATXDwOVwv5Tma0+x5YCSkVzqqcBIT0edJySgQjgGvXho5qpskePcGtPW4eXW/ -X9LIpe0YBdpKYCqiZqrl/YjIiCIXGvKDZEfLcmoCTBrsGdqKl411sDKa53sPLQt1 -iurJ2/VcTenJ5mVMfDoebQKDBoNNft7De+Wl8GND6jNFH/p+6n/aZpzOmdRQGNEu -RC8bPGEDsRp1Kl8ixZsArtl7ZgU6xerMOwYpvJUnCcBjyAv6Z4PUA509BU9TNOQD -ZTwP2+Oi+wduVFSfroE8KcaIn8quSzEOCFm68N7YzcYMCKl/kDE8oV82v69LPF3A -lz7DgM31J2dYQUrcQ64acUNUylJRbnMHvfat2nM0WpEKi93T1JRMHb+tdDFUOu8l -5b45MDyMRFQb4Gw6/l5+PL0XdIgSFT0/1ERlAIZgwQ4DEqpvmLQ0AOVxPraybPsi -eGCnpm13n6iPckazR1i3wKaUofgMzr0ybUgRb2R52vWCa3zHLsRbXGUKO5sz+iN9 -r39eUN0qIL6Tzsa0DOhm/pMly+DRKwJclTKGM6oyfFVIMGOAz3mFf86FU7xPNBN/ -TbahwNiJAhwEEwEKAAYFAlNlNuoACgkQwMrtvDLNLqzTPA/+IQ1Ikfc5w98Mn3Fy -HyOPbr75wiq1GhckpnmM8JZGJ0kJUjdIrEWB6F+Z9TY4f7bYXno5FMEUfesE6d89 -6QiuoQKMGemXn5hOrDODvFo0Xn7PbWexIFKA3MJ+3FryyzDslO8b3vS6pKsNLScq -4eykgPrt7u8gwNW6X/YNHmYQkFHlBfYcwOwUHMPeCblJ74XNlcbO6tSm5hqyP1H2 -hVGfiKWMYW9bhob9qi1GKYvJ18JbecPCY539B6hIwci9Ee3dEIsKLzTkzttR/CQT -IPzbVEX2S/OfxR8JYMjuquZgfLxHkh3FAdwsUw1c7vndzG+iy1EFi2+UdV7Dc0xK -94KLS6nCIdKWWbYOANOvZnINjo+QwWVBOOBfmagtOG7eIMLUbfkX1IksXEzIEN1u -J9BWaf1j+GQw3j+c89ENgLNF0BT0udwfF/mUsE9g0wxFyqbIj306A80JDwgN+CCK -jKatHMVRJCa7hW9p++mtexEGAtcbP0Cjn0ayPSXUZlqxGPs3xSiT684WU9nIJhP0 -D/x9C4eoCGoE2eZxFY3ZMqm+uUYoORlc2WPldwq/aLEVgy7IvHHqJPQShoFfmIAH -c+40iT9cKmBdH7ZCBxQfUDNGFN18IwBgaTO4oZMRthiChEN2a5XJfL0Fb40X9NcX -MJZLAHQTJbCFp7IMaXC7m4Ttc7KJAiIEEAECAAwFAlET3tcFgweGH4AACgkQtHNP -jD4qWgn8VBAAsFu8OBUxtid+o1PKRziAK25WBV1JqJw2WjRSBZgH9JcIX+lgVD4x -38a+nNgEI8T5c4aG+D3Xb/gMRBGrndwfxy1zOaoudqVy81w2+c368gYIqQXKi67z -Y8QDZIKsvyc6s0nw4tJ/ZAKVerz49mCiMcSqWFud9liAG3G3ufueHJXsWqIJTG1U -mcyhBsamTu+JW2dtX+qKDMxgPRO9BoIkFbp/wqo6UVm9pgIrBvNiXim/VQu4hqcJ -2dqii0ueXKo49BohS5cEVO5toevDI0clHYbw7+59frLeqWAssuFfVBrGzLqdlBJT -yqd8FQSq8IUQuQ8wOU6mJe4D5pUt7rjKSksP3AuDsMdL3j26r3j7WVDQMNqa3hNo -IHFYJmArR3WoX/s72XReu4/wKlfFqUtQ84DG/Fup+rSYFGw92VzroUpUMeeJWRId -aJgjFk09RmDWiv/z6g4L929OKntl9emgiWeYgrx2z18rrXJ1iYLDuJxVYAToLgSM -xz1/nkFS6+kpfGGsQkStFKFVu9ddaFjj9e8UAP011bpIycqZJVFb+B94dI4g9ZQ7 -76h41EcwgRn+4SQW4nAHAvmP8gHTujxB0hl+HQVzJyzL9XlokRJ5xUSnOd2VNG6o -wyWkq5HezqstJ6271J15uGP81r5z/1zLWbyMd1odXnv8XBFSPqs8AVGJAiIEEAEC -AAwFAlGqq8kFgweGH4AACgkQ6/8lC4ueTn+38A/+MLYy+8zPCPW1GdRqBwNHtz5v -0845FGW6dvMirulIHt6odAo+xoBoG06yDqj10M/bY6ccbN7HBsdIQuJQFc9+RAQV -9YYsEzb6VtJNyp9voVIbHRkECjt5VPk3ZWost+jXC8eNhNaUthMxukqZ91gaN+27 -ZOYBicw6i2LCr/qG35O8C01xOjgSEtpEPyroCUwUbtsZBrbLNuayj4/qIHfyUdaL -y3OA2lpg3/vL/OrSomuJvr06hXQULQKYdMqn/CN4p8SB5Et1bX20qBZvEFyhrIC8 -E/Ekc/HXM4E58gXkoX6O6aaeLTFxAj1xC7iUKleUv88CX/tOxzcLS+DbMEqcYPCl -hxD3dDjQxycwXAHntvNjPqKm00mkHnQBGJkmxlN/vyIX6Xvl3cGDRJjifYua41FE -LNUvvnucJJNBMKxHiiFR006tieO7+562JqnMWJYGJXNeOkm0HQIvgMx1LhvOhjdk -eNU/RpHyKdRFnUbG7svJP21hYH5xZXvEcl5/lI9dJQkuApWEzyL5C/jPXu+Ewhe1 -+2djwHBjix76/l5ks3aPrbCPi53/i82N3cGYkueLSoMNZJNYzE8XGg1UJjaooQSF -UUniFzgqEjzhBfcNCZUakLwD6MTEvYAaVn/UIjVqKBmMXIm8KW6tiF968Id8ZDAr -Qdn4K09aFgZThx8QsDyJAiIEEAEKAAwFAlHJMR0FgweGH4AACgkQeu3kqeahRlFs -/BAAwBQawleJquL31RwaG3MrStEC9IC7zZAvvXCWk1Vy+5tLSqaopJhosCrEuqFi -UyD6hzYNgqdrn44Wrzvs/b5wuvuLFb4ZOBalyCohocY/QELhiHZAToVSDBTNDKwz -jUZiO2T11FJg/JDOXEAUjV1XCLczZTnDX2UORlTJJecsKobCvAukFBXECSE/+hV9 -i3jnzqwuGtKvAgTB+Z/Hh1y0A3TNe/tsXK3p/DO1FjwwTSg/Ol2E11H+iAUGXYGd -ZKScw2UND3AiCFzGV5tlwkchUrZ6qsuMSIvoxYxHEc2OA4XK5xV8Vq327N9gzeN+ -2P0x757vteRasz+07UbLLKo88WRU3A3bB+6bmfg0dEM7oNXDuVkkeBAXDWvnLcT0 -Tc1UuxyqQ5w2bfcy6m6G32gv6fz2wDon4takJM6GXGZm1ERI5gZsWWUpS7liD0Sv -8aOQKF04yWgXXtqKo0oD6RtefoId92zKupm55ZwYpGC9UOfXi6hPdxskb0YlfqTs -O3bLoP4pGIHCj0pL6K8fC2hGsMssjk0aoXdTAzrSFi5zXVg90sDoqdfVGHs7MCZk -yiKeid/1KEyKFTeEiAWnBANfbdmeYqG27Iu9HozKcG8cBZPm0n6qET39nvlydE/r -PWLs8R+e7vCZCOVPRaZJNm8d5PrwUKKieOilFrpqRn6UmuiJAiIEEAEKAAwFAlHJ -MR0FgweGH4AACgkQeu3kqeahRlFs/BAAwBQawleJquL31RwaG3MrStEC9IC7zZAv -vXCWk1Vy+5tLSqaopJhosCrEuqFiUyD6hzYNgqdr//////////////////////// -//////////////////////////////////////////////////////////////// -//////////////////////////////////////////////////////////////// -//////////////////////////////////////////////////////////////// -//////////////////////////////////////////////////////////////// -//////////////////////////////////////////////////////////////// -//////////////////////////////////////////////////////////////// -//////////////////////////////////////////////////////////////// -//////////////////////////////////////////////////////////////// -//////////////////////////////////////////////////////////////// -//////////+JAiIEEAEKAAwFAlJjvcUFgweGH4AACgkQmjOmgi4y5FJ3TQ//QbGo -2K01itLikagmnAiZNdg1/At+7GDZPkwHrW3s7Bd6+994fiBgseBp2/2Vu/wgfri8 -0AyaFVoXeOTMMlUU9WXRVF7QIAQvdK9pJIKpqGkksZu8D9u1Dja3XKqSPTj/umYn -Ss7BRuDKYnMCzPbjnYrW/xtDUvecefIjoPLIfq4S/DBBHNX7DC10tlT4h8KlkK/m -3PxsXO0IwHzVFjaWQbPKIHQZq7g4w41PnsoSGr8KOnVbseVTr+hpyOGEzyvZ+9uO -B8shvD5zAXR96S0XN/cue1MbUJLbokvadAFxqtwjPnfT0gCABIDbe7a6Jb6ZhYkR -w8BDFefiQNMxZjUzN8VM7gs+VznaB8zGQyaM/OmS63rPFQjTnsW0wLGV7Ah10fKC -bqWCwOPjT4iuGjad9vpjbW6W7M6Wv6GuGeUsHD5f1ua3C1Js7JC2WN78Ngc+3q25 -C2gHnhbO9kyksKM1djXlhlOrhHY2B05Nb2O62F57G0n/GPOWZwAuzpPj6A2HWwID -r+cPgWggrB2PJn3EtD6IA/Arsfgam5V9Hp4AJPMrMkYBESo+MUMJdjRXHCh4cGLS -ayy9LtvaBEJj4xRwnu0zkKGMpKNyxAmfVzsIgTWSt450phRaJ7oOnylxmmrM8iKi -pUKqExrrCK/FYUHtgEmcMZUNQF5igOHIS/yWlDeJAiIEEAEKAAwFAlMpNIEFgweG -H4AACgkQLNYVHBYlEa38oA//RRlfx0GNqUxQptuUOmACgWPQvdritcHYMi9jz3b5 -/xBV9dEAtJxy8Ss3tAdWYYwuMwYGTqENFhC/ZUkhYyXMbf6G3LNYBVqaODPpXtyG -RzO8nKt2uRMWPnCjJY67D9npJ+tduKfUa37rg4Bu8gxr3hoMy453n+PpoKLIJlOu -17PnrOLySj6lTgHbKlGj1abEnbmNZkZrKoRjnPnMKYLEqazCe0oqq41BjHNlkKNC -BSMN7rEIJkCGAqMFhWSeNuUmAGTxBKS0GIE3okjDzcJ8eEjrPJ0F9BBoZv3qdQtr -1cFjYLrsV+JgvIAoMCpjrllB94SP7EN/MwpNHLDr++9DkobBXcMZedk/jQjuQ7Z0 -MjsGkT8KvqBLHj9SiZ9vRo7F7nRYrj62dMCqBBKBWxZAqGwGyjfnJm6NgyIij/xd -fLrAfGn8F5ZtMDANHbvO+Db+z9nz752N26YDs+qwRgYya9E3YTLsw2SxpL7KgIW9 -N+9GgWIqldi3loaOi1L7AvJ8r52VUDXNBrTH5nJkaAT2rGlNA420HRkwj0oFmyfv -tE8xDCnuLVSfC8/USCdFwvSiP/gr/56ww+UPCIo3ec1fFSw7pzk/+T7WjwVn0Kbe -7RsUwsLAB194HONtwTowDn0msSALf6Kmlk7wmS2P2rmGwvlZzEClyK0V6AsNP02z -vu+JAiIEEAEKAAwFAlOQhNsFgweGH4AACgkQNpM0zlDthxLL3A/9FlcL3CRRmUdC -+cZo7DzgzWkTU1GriHfyE1UZUeV/Nbxz1DTEoWuiRj92PbUQSQ8Q2PclZO0fktVe -kdjMTn94Min189qr3YFKd1oaAi+Mm7jb2OjvjE8cu9LMXR/CetF34bekmYtBTgIL -Ok7lL+ECw0aBdT5DHbYD5gLwjC1iLYS6ad896FrJ0pNACIzEaNhD16LFF3Wr25me -3rNzFHOPYQ7vaCg4eDgIOFQbL6KeJ1J/rLHiCi+rd8sT5Ar0b8gFcLX0xPulTuBV -zacso1ms+w3d6muOx6RQrqUcQOKfi2jCvLfwPaLjkWyHwtD9swnAPONo5637G0Br -9m8sg36rR05B5mgaIPI4TXW9tyPSmJIn4shJLDVoa41BCxjgeVEUmqViiRDFXgqZ -fdWdiHJ1+rP43uovOH4gYSnrSPWy3wlc1sfMtApxCU8slDJzvzyJ6pYEDzLjuQE8 -AjOKmFXdwMp/m0AL6Eq97gwqusy4UAiFUdmr8R/dUtYXK6/tN67Piu3m5Fob+fhv -BtC7r/nOShcUjPh054QVVWLCXzy3eRt9l6XNZis1gkyfr7N9zHJA425id2tQ4x/7 -ypNrB02WVEq/zUaezNeF/NyKrbrPiYO1uOfii5BG3CHUotX00u6COAJxr3zBppWX -J9f2NaNAEMugGE/g7/3SeoBSmNey6+eJAiIEEAEKAAwFAlP9EqMFgweGH4AACgkQ -ebQBAt4rUCUjHhAAzT0AoXHuPcXTOPRwC6TcEfliFbjGLPObOenhRJWMLCje2wZp -h/6Fqb6vC8BC1a75IL9EwDqHlfZBl8cs6ZdFcsTOPhxjgVqTIb+Zh8t3oSj8pIs7 -1UcuxmqpapD8EjDHeoO7UC3FXogjYIDQdnmk1w3mdWcYRhZ86/CTefCZgjjrSaLe -Q7AvMywEtT0Fzd8luStp6FuZErNiB5SgChFJEkjr5fDu5fKpvvey3sPhj9Y0fFnE -ucLieHK6gVxq4y1rnnGfZXbPxQLxusY/pfJrLN3ByWAPdnaK8/IU5YZFKKucU4MD -ZPJ10otmxUnLTRgd7nUWdqz3SyGvHsqT3Ajq06y/JJq4P9WFXEd296pMHjO0w3Jp -sMlZe66Lv2ojJaPbr59dYN5X+QgtZH0RTFa9qjMUETKS87kJGmfrZUDA3b9lKSDu -csVobPQom1dxtATpg2c+pohbKqVrXysGDKWBUZnveOspqRMjoeTWyEBIotnOYnC1 -ISc8n3tp/nqN+BQkiB1VzJsFjNrO8gObqWad8tNThGY6jOnkORIEl8ioez8PgPFT -/pH2yPgFWdTGVJ3Rp3EPqmM3PpuTElm54V1IYzt+ayZk8KdnNrScnKL0AEvSXPMh -FqQNtx+SYWRBHsaaiBz2eQFd0+LTVg0R1h6gqJ2IjcsUlBC8dtIGEKVIUK+JAiIE -EAEKAAwFAlQO3ycFgweGH4AACgkQiPRYTYJgSKVFshAAtZF8UQWkIEiP/wTrAQIl -gUjEXSILtzHsX3gWf5fokcysl9NNSixM/Z9i/wAGne1uy6CII0ITgKeLaEdVble9 -8pnYk1+EnRHoIqok8gjFnVa06NUGevZ8MXiGjpYMsyei+vYwz6/cCfvJq3qeIfII -dC+6HGBYzYSZykt9mJMwywzuAsJZcff7NSrEk9D1i1fWJ7ePPJxm5Q2DXy/4J8A1 -M0K01qtPzEUlDQwZoxjvbKmB0rTa9aSvaLERSYI9bc2l4qcK/VJZvLa4fN8dMlNm -hJb9J188zxKqBNDDtm5uieMOcLgT2D2NNxfmdC1Il9w82g+x8SbBUk82qJIQ7X/2 -TvSycuTyxK1wGXPeiWmITTup1ICvavXNFR0n8zjI/Q0IF/SWdlcrvT9yjBGTSZah -k57/3DPg2NZQ3b1BPWYWTqbZ6OAYn8aemEjv+x/QQdX3tqVHn+n7M4ZsH0IB21l1 -s3v80gHhhfuL2gcE/p9RmeC72+8NCldNxDZShxBvv6SUOnEqTASyLdhMg4BFP5pR -GWCQRpbpjZnuw5tiZnvELVSZMPDaqWgRnvi/aaRpi3CCOyVH6VZYZHHG17K+bevm -f4X5PguN9gDzcAwuAA/ZShG6rxU7hGgcn46SBI4Il8ZDNzJhPUO7ClqbS28Vej+C -J2Vls/YBTeXP+G9EpXejjWCJAiIEEQECAAwFAlFwKnUFgweGH4AACgkQm3UG43Js -IL3kgA/8DDDrpnwtXx5+3YsZ3LgmrvCtnJT10OIzbslb4PQCnJsac61vnYUCiV9l -F6T8dCwat4acKq+Bepj7ku+LzKKqFa3a+pc0E59pl+U6WHxsjKUZuzEphXGTdJUY -SPbpf4/urqfbHgg0Lp2TvOnOXnaSGVMzs1VwmDk7CdKUS7CWLPJgDZ4hIad46HnS -h/Ge3LD4VATa9oTkUqd73k3QE7LB7I+NLxadly57aqFJH9j/yCXhcaRUjmcM8X7B -bVO8+UVP+0kRiejYGSsjimZnMwpa4BdDWUoy5ZQmh9H31LzYJg9hCW8bf85jTSzM -Nh2/tDSYJR6YEIBF35Oer/llh9lipFxv1bIiHqMNqYQX4m1+8lbw15F/HlrFKuvL -mMrcSu4FlQ3G2HJctgjgU5Jdk6j+39AW+AaZbbMrhpTWvLdfqCGmvxhIf0Z95Qof -ojADrdKWbu+J5Q5VGdqwr1WjafVawgykEvvKFNScNcoExYK79WvpK93Dx9noSRRK -c5wm19lY82QeuWrBSVx+32aq6FFWkupH7eHz4bSLnXnk3OPeoZZARP2mV+bfsSI6 -vwT0NnCRJbYOXhxD1LWbbzFjD8BYbEFjRUxImcld1+NHOTdXm39v1oGntiEc/PkB -K4v5AhivOtbywWYrs7GcCcoXbAUl+cFIOWcng1OKZP7xy3jyKFuJAiIEEQEKAAwF -AlKjUw0FgweGH4AACgkQvcgh9m7PwHjdkw/+NjFEYXW/4wInw3gBLSVBF5hmNa2H -09iUg+J9bmSYTFun6ajPCKlo/5oMY6hcTPgrKF6TH/yyTL2xO1dtpeFjwKU3KoJh -JAI7fko6dFuPsr1xELLdV73BCx1P+Zd0RgZDzGNbgDiPAGKE7hvEQQu6MthTMxTu -MjqIVcXgpZuEbdMD6vLLZ9PIs+8TGuWkFrDjxQm6dDTqmg/ztSjIv7BiZvTin4J1 -XkoGr7BPVTMXI/64/QfziSNwucrzn9vtd5THT6Gn80uWjC1APfzztrZURdrdTQ/D -vcnxcWpdhBj/+6zGKEghao7iF00EDRfL3mAnOnXB2fxAnw1o2g5h6fLu5FFaaIwt -GCToht4VWrf51IMV9yYbIN6Bx/WTRWl/3GfYp52aqh/c5Belzgn3Yl92RIWSPkta -ZnI/1d57CHIXQcswRYiaLJhzDY5Hn3VOt2Lpa+wSL9E4LThD3vvfTpMfJwSJpXgB -rPXTq7qSPN6CuMZwYWdppetzQr4sWD+jqLYKF6e9QKP7noFL0/AfSbKpMPHdVExq -Kh/gT+OSC4Q223Xoquis7dgkWyRSVMvu/xCELwVql2HRPHGjOcVIMaAWz/1/bDng -v6+4bl3088OAVEExJ3IGpByl8Qx2yFb0lHhKL/gNktGulby33smTuvHVAqlzSlpH -X56CaVDKD6yWADmJAiIEEQEKAAwFAlOVr0cFgweGH4AACgkQa3OCvkGPYzBqXg// -TsP05CWqAqTABn3M2flphuXimotUjdUgMkaizSpZAdrpqbpKYFy18DFqe5dXbYt/ -U8yPDy52tcUh1j6KIXDmAO6QHpmOo5LzW/8FqVc2YzcX7EpHh8hiF4MVwJCsi6fw -jkzQHeVetT2w4SeCdaRr0xkNrMw5AkAf/NGXbYv7XmLjVHrfraNbqfzM71da4RuA -hDiuPO6rspRZMkgxj+Ae9+gECmM7VrpkanyQQvrdS/ri8aKWJ54yBv3OVe0Ge0pn -zixnPgX4WUgEslD1AAp7a9U3q+x+d1UPQqu1pCTCQExVaPr2EkKR0K6O3VnXFsnd -mmDPRxTijJuzne0NpCr1RNAZvi3e7gpMugnrDY4aWkl+NfXoF3cv9s5YgYqXW+rm -VItX41Dyrhvnpaf2csNkvY7HPw3+0/zpo5wiHQ1BFWhsHWW4SfC66qGN0rHfI3Uv -zbI0FXmJ4fE1D8PMt2/yoTCoUxda9K/Jan7D8CluDppJKvvCpL0J4c+32pq6VpKh -bn/n/7T/90mT+qJlFv3GUeNZyv8ELAVWnNpMD2kPbcX9x/FWNbt0+fp4VpgtIy3I -04kzFKXbYtyuqHKGUQ5495jT8GBXDPJtrqczMzrUsIZfKWt8brHc0/gdRIZipRgD -8JSlU9Sdk0sJIFP4uMoqkXkgnlhInL7M1aY/g9+b/TeJAiIEEQEKAAwFAlPivW4F -gwJhFQAACgkQ6P2IHz48gBRaWBAApCiHzE5gzbl+hJmryhtNNoQtk62OMhdUXLm6 -8Fgi9xy0OWzBzFH6BSjXazzKlZ2LYbBJYHTDmTjJiB/hUTm4qAHFi77Z8kUjF2wP -2ial6OOL81ov/+j8P3aGMJsmzWVHYx9vd4AzCaFCexgglKmwieKCBkgCTLII9WKB -AAaXgPwv743VgHhTglw8wmdJodA2xpD41z7XQv+kgRewIJo8lNsIj78NDtgAgRvb -Uk5n5YDyZ341HJtBva7Yisn69En+2Tdrk1q0wA4dmNQQsafQxbHyYZG14dwYt0f5 -1czP87Z5wSgu1xNBdLrfD/ZKqevDiwewKoa2HS+HCX/zSYY5pUAigBkBYkRnfRB1 -i2yPvYgV9alEHfbFSx8ks0zFPUxB8LPaYIqwUlSO68+Ggj4T9AYFoC4Xxdj/usdl -MVrjiCfAL2nTqFTLjVT995ikSIZbmFy/n75fGx0ZvINLzCUaM99kZrBPbrLpAW8+ -f0NkmTZOKtbbGj6NlNZwroLqA8JxbilavKsy+Rd5p3lJCCd+4XfbmPQNEa5xYiQ+ -Q//RJmfHgtSFAo84tiLtPpZiWbu7aknM0e0kBPjxX5a3BugjKpnmmNgK3OGKIKKZ -5K5LkAbdZkmmZrohvAirtQ5ybKNmz57wW927unbStXDb4gkzONJ8kL8wgv/K7IEd -l1x+leGJAiIEEgEKAAwFAlHlvQ4FgweGH4AACgkQWru/8fwQHp+HGA//W30KEaVV -1JRkdoRrF4YxKbmshxT+TaLEEg6rqmgoGvOoglQNAdBTXy2WLBtRffJ8zifXwFSU -Q9Gw0+euAOdlCkr2ZCPBcHE1tTradkRwrsZgc8GgOowJr9HW+rj/0x6R48mdb1iH -4V8lTWTzrA2+QXMVazgibaCtqeJ4eptUKBOPxT4hCuZ1c8RmwWdOHK+6Yx6YyYku -MEQ8FtgKHC7SqrICxXeE6jDXocqgzkx6ODURwiQlgbOHuY7+Qa0C2Egzi47GRqTT -ZmO1xUAfBPeUrGWACNmbRotxNCiYJ6r4YeCm9dsFrbdeCUmTru62Ih+7x0rxlMuA -/cN/JbmqTi5L+PfPmtWpQcf9s+WbXY+BBZfw3PczZ7W1hMb//spOOVOFC8lLgNHM -mTCkEX5+UERmE8b/C7bd4VeEetn0+Px5PZZP7KA9m/3sFwdiGCBBdrTDHyoTf4ew -uazQT0/V5ZXUtqfJXHFDJKpf6M7e4kFHft1o1yYDRavHgr1UrTqaaVDs3qtnUTV6 -DCI+f/5SfEz0pxiijfl9I2iVRlLmAHfpq6gYnXxv0SI6VIOY0yzbkvd5oFAPT+r9 -E4EmLJpusrcqotCm2rDKosbOwscxJWQPHiqeiLoeJ1TQnYPdOKERlwiWAFHei0Aq -25MOZ6PaVfkJYdR+KykDMvLua38FDj6zYtOJAiIEEgEKAAwFAlIKDwEFgwHhM4AA -CgkQ/o/Ld4Aoi5CeDhAA1ry1QKYAIPclDaSoZCHuuwD7boIWgkMqxCx6lp4NznF0 -Nr5277cQPkU8iK91m6yQfYqymEZ4o7oyLR8eYzH/vPOkyGDMzlYJ/ozzd11P8fel -NjVtXaWGHnqvr1PhdXjeXaGQGmbjvj2iM1fvnWc9aT6/hJ4Mk0iz/tTJ/39ZEtpR -T/wU5Ef9AYVgf355wEpjV3f4DVwKTxyRBThrUQtflSI37lgIkNrCgIe7B1fJXh0B -K2hOMId0LTl8xCxNGjWGEo4fZcIUjlJQfAE6Cex7Sx+RTXc25l6drZ0A/PnjkcOR -PwAK2dz+6/e7K6CWrLwippOgvj7UHTVV62otJ80zNKsVpPyGrlkMSxEiyhUBJbGD -LXEvP90mR63bVOkhtfj5iwFYUwSpWNtydUvwxdL7KPr0RPmf3azktvHarvc6/jlP -8fLdcu5rbgHo83u/raohKm1T2pRnqwuLFaI/AvHfOOBP7Bd4/EmfAAhghx2uNipG -HquuObgLb1auarTgQo4KObNT1M6NH9VawcgCzQLNeYTdfQsA2yiqssU5plNVHkob -x2r2U83ncKXhmkrWWAWUuZbkFlrUfi9XPzyvaICJu6aJvAGhWweTn6EV6L/R9aPm -G/VvFNJfn0RjNwxbWrgxsHNc8LoYJ6H3JzO/O0lJPjXsZGtBh5k35HbEpnQOEneJ -AiIEEgEKAAwFAlLZcugFgweGH4AACgkQHRooozQjnGkJKhAAkKdvVE9ZCs8KeYXA -eGqjfJPbx6pqFaCnl2vvrR6yzntRTnSicawjf3TwLB2H22Sa0R29RjecMuqR/Yv/ -xAizQeGdoB9Qci8T42hb78AYl+0fulsULkx2KRwZXsFsUQvOEYpuFe8jZm64YkWz -0deFEy9cwSTxH0auUdVpFUr9r3tjOaesLSCb6hFgVGaY55EgJQ67Lv5CSSYhvS9g -jfKcO+rHmKQOXOrikbRHDytwwl2d+u9GMgCymd1SNZpDtOBpin1UVJFuW9euaftg -UZv9sS2DyU6ET9mJtbdr69utEUeP4ue6c4KixQxpnWZKq0+MKku9inbRAlTkQ30x -qzxcLyma2HI7twc6h3sFS1aGrnm4RYqULdvobr70JExAQjk7T9E9n2a67gIEJGvZ -ccadKZYX5HBcZa6BWcPh86KFl74sr7UhNlvsr7584BPiRtCQGRtryql8v7Stpjly -6O3l3nRqrpsSaa706dNjKlMrYNjNvrpMw34qkcLjMR6NNv0WIZwo4Gq0UPDrM2PH -joxzF65f5KIl+EqMGFdBhDyvf/UL6vlBNBmIXfMiW4NPqnvDQiy+JkIoI5PAAnCG -CcIeQ9VyJufpYr7orKbVdGFBCmH4Bfv4z0Ts4LEPLGl8tQ81CEoBU4p4X36Jq7xM -CyjGSf3sR5mRwwAROU4leFbj3ECJAiIEEwECAAwFAlEK5BEFgweGH4AACgkQjh0c -WTZ9JHSCeQ//bjGxsdLJqna7SuJKj80g0QiuSywqMGGfdfDtA0Re5Za1zsytFMHU -lfzGX4400isTgs5Eh+9JL6AeSSJmHQcMA45sRCglR2+w9eFwzd783nnT7ernZKrq -HdoZ6gvZHfSLhJzJbtwzpBDqVithZaEKaJr+NLbFbsdBHWar3+VofcVsn6/trJMY -bUlxZb6CAPcqdBsCGPTd6u73SrhCOCUohUiWaAk3iXJLF80/d051OVo+XCDRAbdl -Y8v1m9mSqEWz0MejRv15+uOWySigRfs3e0gE25j3iRuKZBSGHNejDuW8BUJcVGMu -klkQAq6AbZvLLYPwb+NKrJ/1UpQ4nGLqQtlPT3esrIrmnaAQdq8uCLBDugnKpkV8 -/eaX9u02hZH3emF1y9kz86WgZkdpWG0rkDdJMLo+SltuAKSYARUbeF6Ld9nrua7z -X/xrui47edaXZLdVDXiBEGOJMzJ1hXMwpbk8/8j2+aZMflCFsSqISS4d0tMTwjcK -O9lEID68FXbDDBABUUT5TLF1odB3KGeWdi5eeFgTQuF9W0S4Y/uVOG/zWOVl/KSm -GjgcvWP0DNgWf8MguccMdjcwe9jCE8op/DStpJSP5tAojQKYUzP3P1fIwiPQt0WN -RzZa6dmv5NZF7fl49G+dryoeOqdaC9nIN8iuNiOfyEhecVElcLx5U1CJAiIEEwEC -AAwFAlE044UFgwHhM4AACgkQi0PA4PCi+FulUg//dM5/Wj43I8BUcenrX/7hAH1J -TaXBa6jUd0QSqVTYFKkkiEXE/to0otA9uYhxROdk8XRm/SYpvnBCw7ThNv3u1iOL -2Q3+4JQ1v3dZ+ts0N/0CHMVbdnayQr8M6rWSynXrSjy4fLVMMzUT4vyvEhT0FZgz -fY0+yXgQ8dL2AhJ9+1RWsb6wU0MEwM+464dHJHw6YQIJl5L74Rn9GSKxS124ELcN -l/4OlVZuwxkwENlwhBpTAGExUcI5zNF+BngK5lvdcuEnJS7rlK/MuZAApoIvQAPJ -kk6gVEXAI3S0r7vhlvADGMIsko3CtmuEg/wzyhVvxDzhICUhJvpIpi+yRQw9lOMT -sdakaL9HmXQk0l9xx/+SsY1q0mjP1+kBizCtYNDmHl4tI4FTtOgh1VG+UpdxzKBI -jel5Tb7ZDeoaxZxOIB+2TC5k+T5U2d/4CU0sxP6BipliGe8iHqIOEgso7HL2gcUg -MJe1syOvhQKwbw9fF+mcjYx8t8A/LIs+ku0NBZcg9VkVvyg8sxvctdV30McuTuqd -NtLKd/s1JgXmjAKOZf0WrLWyys0qjeSy7MLEKn2v6t1g/ELZPhFJCtyvqkrNOs29 -2vu+lx9JfGqnLDdNoEKi0iwqmbpCG6OcQT0DxdxF5GAfnWimVohbwV7S67JpoD3w -mQrfSH80rc9wxmriPHKJAiIEEwECAAwFAlGYBlkFgweGH4AACgkQ2qGYU9T0ouzS -jRAArfnnpnlCpzHmTUr+n01YrK91HSmS1rmgK4hlZExLqTrv8UlcOGlfwQgItyHl -WXqxaJ6eyAq9op91vX1Lki1n0FTu4dY6EqV/kOW+Wb6ODXkMtApdqTpbBI9Cmhkj -7+rC35Bu4yQmgDKkj+7mLo3L4wi8JeTLXMrh9sQgkW2e3S+CNKha6UEy614avZnD -Ju0MCB3oELDIrRO0iG51Ol9b/LfRs1+SO5df14mH0AkW2l+HSuMLiKfbYo3d6WVo -X1Cf5c0M+QvJjWhT0AZkt9F3Opd2D0O0U7/CSWeOxek151R9e+UWGliZuGGr80VV -dUhdPpeTYMIhSQ4hoJEciX1eXnaUbVx9hLuPiUxrjKV/8epvXMCoGXD+JJO4zH6H -TtAVj9DMxDs3hqaH2IwbGgk1O5ZY/4S2TelP5NDH1CVU00zZT3dM7IrZ4YsUlZsE -Oy+DEqw84ZlMsqxQTYrtmrL2JQH3ztq3OUT8sLNd4Cc9xvbscfgqbGwiQzHj6YkQ -oCJQg9fLnsXJ8/WYehYHwfN7r+5vpzjRNGSZNP6T5Kp4w3MtmWqiSVt2vh5p2cm9 -47NirH3kXS3A7VJtb4sfKKjxPPo6zmdKAPrR3r9ff+VIekutI5inwHw0zClaCDSm -1MNzdSooQXM4qZ5+7CF5tZZ2GmO0ZV7wt3yRJ8yrdI2WYgOJAiIEEwECAAwFAlI5 -kUIFgweGH4AACgkQd5/rE5LLut+0Vw/+IxFgWJc1ftDLu65eX1yFE1s2isGE2Ba5 -lACqcCkMoHUUgp+qJIKIJZl2Jvz6Aj/2IC12srmURz9lZFuG0Wb8OI+Xad6b8NQB -aUgpSikyGeJYr2aCV07KiC60rHwbogov+yEN8kHvRG+ddOqPDHzj5uq0b/RKOre5 -/7IiOj16dwHs2v+XTSH5VDEoOjQqnZ5VNwL46VR4ZswavJCd9wFSfqC4G8vK4izB -p4rlJHZV+R4vVStbYimrmkMDmFJPgZb8hY9TNBgfyO423kApl5yl313g7R8cJXe+ -9uW3As6H5jrYC0bhbGi4nxuCLM/oqSmbdFo8kSJUl+eaXX1SY3p4uwNlWKZ6NqK4 -JvThMfuvJpeBiyGIF/Rc1iVkT41Wg6IjWr8huyq/QwMVh5l1dgyyOqDmcKk7kQoH -SzPaPJk/+V3vnXDSreyJP2do+FifoKWV+kT+2niPpBvgcW9QZEF6z3UM71Roqgy3 -lryDtTO8W+G8Ly4m2D8hWoIl4w2aJhuD077jAxHYSqvziWqfFYsQLFqypYOSBCVB -9lTTVdxHerjjcYfGhh4sMScK5L/rKwd+VHS5GjVsK+d30XmpHFGxnCqEFiqso9aF -RWJTRzvRqF6Eh4hgVMy6iTJ8mHTbl/aXyf8VPCUifgHHKhEfj0dlI/LtFXtroxty -CYmAJ4a110CJAiIEEwEKAAwFAlJAjckFgweGH4AACgkQY+voXyQ/mFJ0rA/6Ard2 -iZNeM+LNVqMGL3+9FMlbjN2ReYpgla50OKMFvdpjtOWB73y/v1w4wQcf0U83XUKr -b6qkulC5sBFfg7qfCwk+Pg9D13hEddJ1OqGZxM5upiE0I2IJr93Iy4uALaRwYTD8 -jeQrLZK8mEotfsKNabMnuUU7yU1hqfMVjhebdutA2FydGT2/QC/Z/imn/FGNEMqB -dWdZFOHN//207Yur9AZorP51xQ3CAYmgx3aMaP4S0q5yckj+eoGSmlzE/U4i1VHa -GzofCP/8FR6FpDDW1SZxLF+TpbXRlvOX70rlMO78+mSw4wHttqe7+3mCd+ARhlu2 -fdhD+LVn65YQnarSbxEgYO1IPHLrzSSjU3t2Sh7wOCMG5VVpZwl127szhT44NxaX -GPLDoXWaAV2NSL7Pt3d7WgHrcjkfv84ugbeZ41j/u2X5LvlsUhjLZDrAw54ZNmKc -JQYMku5E8Q1xuSP8nLcpJR9LS0dShyOwzsy2ip7pUDWnJMQhAgcc0zulWme0dNIN -czq3Jatd2TB8I6AU0h35IuAc64Nu2VEgNZ/5F5SVoql52dF30HDEDfm2EEj736hd -S1LewY+Rr0pqnl/yEPuoGx/CMkRimoAF1av10a5+Q0b+ZQqmq4hnC6I5/8SgyVC9 -GLlUfbYSl4UUd0f1v9ShTtpes4iFl57vOSCYfFSJAiIEEwEKAAwFAlJdtAMFgwN1 -8AAACgkQFfNQ+fun44BELA/+JYA5g6GkcwiHTF7UD9vi0we3SbMoS/ewhMpsNClL -hLMCdHJ9neBRu+Fd7zZ/I7IHJs46ffwE2O34ttRm8moqsI568meVYx1sMv2xqyiK -/9Y1NmI60oMjkE8RhpjLPtgyxMJVaUY7qyMuhXaSfAFcthCbNbYyf42Iu4ynD+uK -O7wGCbe8yM8aAZVV85/pT6FjXBd/aIB/atvgLP9APOEkWDuYXgAXXvOFqT8AzhQe -JkXSU5wK1uF4hlFMtr44p5TpGABLikdk5C6foSUljnjYlKo66b7a3fAb4ELcE4qc -cks/+/zL+vIx7R6I/8c+DioWTmBVN7Jc7RuuENmG8TMvvRRn2unNAAKKmTdnDm92 -oAR2JdslDBXzXv5bh5AHWzBE5oMIruK21uGXKO0Ue7H74JHM/r7hLakT0VREOcCj -7WvD4Z1rbQ3giY1Zjgbq91OYOhJwygLHGNMQaQwy/RfV2eDJDobiJ0OIqvpZOwdk -AqsXV2Gnwymhxyah7lTkjD3KjJJ3rLinkZzOUI4A9iNfcK4RHy0PV68/aCsFA7vY -d1ERoTcOSGy0tFjcRwRySOGjW7nilDDBqajgLsqRj92BVC3lYcfBylU1e+voNZjF -Vz94I+tSbqjrJp4fylQWvd9Fg0j7TOQVicABU0Ft17sN3d2Hkzplka3K6RuK3Zp3 -VlaJAiIEEwEKAAwFAlMQhyoFgweGH4AACgkQ6vEvSrr6obkuihAA3N0z/G2VK0RG -87x0N/p+NIpZMWwD4tw6NGu7TPZLzQ4lXgQ040RaxiLN/Xs4ovZJhgBL6iEDG25S -SqTWosRhiIXf5CmfjAHTfXJJ+iKL0NwE8W/SN2vzrXF5+HWTq23F5bGCGUrZ0+1m -SctRhn6aEzmUPzOOwhWeZmMVOM0SWUGKSLtNs+NLmUvhNKrdqrO4UdGmy7k+ELI+ -B4327uOL8fma/1SebkVD+mc6mEty4CIyVgTA/miw/WRpH1wvc8jLV3vfl9S5sYbH -RgYxJPrvbqaJHk+f1Nlsut8/2oFW1kItFs52wjvXIuRpZ5fm4VfTq5eQ+TIhkziP -FJZxNqoXSJGEEdcYUceJFSQeg2CIeZ5gJY4Tts/x+kAmexkcCwmkqLD8AC+Qgsa7 -KKy0QykUoQpIAteodb9JEBPknYmGL5Nnr+/NLOrzJBq+A1unU5M5NlAZ3mYByxP/ -Pvj0NYp3YfVu7FisRaEXRJKKIwM4Sfzj30PaavqlDXyjPicyil/iGfAPSgIAXE8y -IrO7pT/ga1di1DgKXIGPtNQ8tJoHgSi8vZZqQz7Oq/ucI0HN9V/am4Y1ChhoxRy8 -5a3Vd4zL4AwO6HQVNgbPO2i1zv14ZOCrYUEc+j1KTXdP9xv8DdYS1uNoGyN3QnNS -5F4Is3dQU8XXgbfDqbLDij6tQysgtpq5Ag0ETG0h8xAIAJRp6DW+NamD4fxmZ14l -g6LKtqw18nyZj5MhWRxT/O8xzRwox6W67GKL30lY4SiqZZlRYwh9mYtNyR9Ix9Mw -73p8oZqq0pDCHXIPC1EjgbnxlMEYtX1CnUCwn/Izhatk/b1OPOiDvQ/CCpKc9vWJ -pPNyq4w92Hjv3jwgYV1+e+kA/HYrRUipTUJ7blnNoGxfpp+WbJr9O5EeOBkyLHMP -8sGEAGJQeB7cWMKQGZG00XsbA7W7fW/NQVJAfGs5AAtjDCROnAcILeWhe+YhkYpa -xWUJWDTRJQEJPibu0DirhUQwhbijSenLomSQjw62D0mvqC/ILxhcjz5ndrc5vPdw -SVcABREIAIWDzQ55WG4TG46879v8BiC8CMyKlSSuidrXADWJvJShxVY7EigSYoGL -DBK10XYLTejFFDaqN0Bk5i87jagr3D8tVj1lviQivi8zjF54qY17Vi8MNefslWME -MSGAMGn0Kd/Ap6jDnOasB6Z2B7C1aQO5bv+KAPgoduqFCAr3R9Lhkp5evoRMnNPb -duBMh0u/ioo4TXSy1QqXgzeH3V2RXpsacSpw3IvPPLikVkN/l2qv5SuO9lWL2Cci -1ii1ocIRisXicCO3M0rW4pLaNrqCYQ6nsP84kttnpcbxKeludUPWWVfhJcY5ooNv -rPQ7CKUfvAQzjR/FylgfUD34gJ+wsoKIZwQYEQgADwUCTG0h8wIbDAUJCWYBgAAK -CRB2148FANAmxIFkAP9WDPMOIaC27XuriVk9ZTA29qbSPbuHAbfJBUDJUQaUFgEA -v4hcG8hEwsWbB0FD01ZPjkkMaPY/bpECewaPNuwnTly5Ag0EU0PD8wEQAOEoyhht -lLEWLdpnPXvahZ5D88iC81IlW/Y0GFIoI/LDTsDgCc9qxorqmCK9I6Sp0WR7fmQj -XTtwCjQmrVxYgiAoYcjQIfTAt17Ri73UA2JMLWrx1Xu7LmNctavZjO0f0j2cIGPq -gjuKi0jrnrwHhEdJBqxpnrAt1GCqZ+JzfrzQDvD9+D6rVIeQKrWtj5+oxCrwGCky -aKY6yJDFuaqIfuJ29gR+EMPePTHpsaN+Lnb1I/p1cYyBqn2lh35Cb/as1Nx7JTbh -UAM/SrzY2N1VAB96S32mjzpwCt4mGu/mPD0KAXaTDEPH4bNW+c9jX2cDpP0nF5TL -a3RQmTH2sJPoT9r48ZCxvoPmq8j4eeN5r1mDe9obXeri98wC1hYUimCNVOvoKu4J -pOf7rg9pcxyOXKDCYp+MG+41LEAirA3O65njlN2AQT0dEVBwrILi4Ha7HL0LXWdq -YqrjZjByxPr5dYHTongzcqpacuhrjMAZ53abw6i3K00k2IiK1PveLdO5qn9bFoEZ -uVAnFND0Cfvjxy4DQYqGhm6cDsjnCi5jkeygjfyJQxfWDKSjlEG54HLszLREAg2s -IBFzFbd1c2u3aipTtX0uneWLAI/39/M7rnBqjw7q410duDbRQWhgPKTKOFmF7jqO -su/FxrA2k+3gLXEgua/f/GbAvsl3sSRlcSDhABEBAAGJAoYEGBEKAA8FAlNDw/MC -GwIFCRJQFgACKQkQdtePBQDQJsTBXSAEGQEKAAYFAlNDw/MACgkQ6KZkSA2eQ/U1 -nBAAx5uKQVxNkxvS8/ecxCm3g45bV8wuul3+ViSxA1LWFNkO1D1gObEwvuXEIzcG -h09FoSppTVKHzGxS6EALoGPuL8fDLH3nexUNTPC02d86UAKwz1h0QfExYdfeOd8Z -dwkh/QWVtRsONavIWd+RE3Z3Of4v/BfOT5fQrOvnCe/a/6TbJ/OzMcsfCdZF6F42 -5VgS1xLZD/iQ+fPUXqAciz5ZQ2/plBEwuqRxeD5mRvfMY8QWgstdQIHl905ohm/v -fml8sMrR+QUq32ZeHNlbk+atFPPItbVXAJZeTihxZSo56KQqbPG8ZwSFEdLFYYZr -VmdmfL9YJhGiXaXF4BXDwLcJCfIgDznnJvLuwDo6+wiejv6OvWHHRrCWvoNeX/J3 -UIQwl675xziXX97EFlYS0L7a9wXVRkQIIjevuLmRNh8ICLKPNauWGg81SLomZ/Se -0hIp+EfNm/2HYTGOSvvaEKkdFL7uYzDzaJ/88DFXlpAliONPSxFx70xP49Jon6+p -kUyMe45CSbwRK1ScY5DD/magvvyO3EeSTospaX1y4g7jc9s5JjDaXsi5mKl4fNf5 -Dnzy6hxITUQJdvhNXWLW8gpcCoJCZ6B5GGXfWAGpAV7wOwWm6q8BSpP2Mu79K6Rf -2zZFUV4frPhuKxTtftXazLjOYbzEbIWn5l2z2knjYX8rFRZyAAD+MVRhQqRvqK2l -MH+JSYoirlA5rmiFOWeiCFayTsBE0WwA/R3ZgoH2n/lxtxyBDUmb18Bd8Kck8P5q -EEeYI+M0NbpHmQENBFQchgwBCADUkW0Iohz9hxYC8LfBdQoNbj8TayAYac6U5T7X -U+8vXnnM0QrHZK+IZGboFH8LrkSujT7Wz0PfSEJeGD+cfy5g+HqmDKmR82Jp/DrV -VwRadjSNRpkXROKHqR/peI6sfIdQ0SmuDVvNNfP502j2m3jcRYxekfSd/fVu+Dr0 -8rWU13GnZttzse0dYO9U3l3nb+6/6hNHKRcQESr54b3s49JxX/Um+TAedy9WiRsr -+UXFGcmtUyWYoJyc3aCY6LPJu6WPjS+3My2vkJZ4MW+NbzSJC4uQbLB4CjeYWOYL -mji67gBXMEl3yMp4Shai/A9Vbc2srlocU3szlmmqAkUgooIDABEBAAG0NE1hcmNp -biBLcnp5xbxhbm93c2tpIDxtYXJjaW4ua3J6eXphbm93c2tpQGdtYWlsLmNvbT6J -AT4EEwECACgFAlQchgwCGwMFCQeGH4AGCwkIBwMCBhUIAgkKCwQWAgMBAh4BAheA -AAoJEIeOz7hmdTNB0DYIAJhWQwT7raK3IB3eW3bBEhYOUoN3pEvUh5RIbuH2YFUf -GmljBL+ZGuBx3mxGaMoIUspEuxSi5oDsCLdSRyoWW+FpqdO/PGTnJKBbQOjTMgsi -GZdT5FnyKInhFg/k2qvynUTdW8sLITtc0OU8NnjflwNSlFWAHxT5qb8XS7x3YaSZ -wrGQcqnZWJSu7udgB9+cUfhmHPY54Epf1t6KuaYED+cDZqira4mbAT5+J5o/Kl4d -xEul02cRG5B3zMJ0MGvnhaRjUvzmeFnB9kNJyq2r5eV+dFUx0uOwbgnR4echTCyk -eFmYwuH4+z6jJKd3FhX+SqbeO2uWUYoezxHhPN1+IeG5AQ0EVByGDAEIAOTw+Op8 -oPTBFAb8jb/qG85mBZtOumncJK0dAPoQ013w3bdLTDGt/uC6wu/x+RNRAnWyPyOY -Fg+vYX5djRLgXfM8BqqRGzzqksWr4Mr0aZgTxgqYpAs4dLPjZWqeMOGFZQ2/wEEL -qlx6Jsczb97EjD2uyVeRLvi32IbSFxMkmtcflESRUmroAIfP624tuVvOQUnk57Ov -FcRLbHKGWBErmWMfSBmUVYdYD5eahnOJW01SmsEwNE8lhsu1cefnpzRUBDlyz6Gs -McGqzaaXud4nDKTVROOCPzES9p5hcbac3ll+FjfF6T65il4Umzi/iIoYADnw3gTf -6qDmBFyeNcZ9WsUAEQEAAYkBJQQYAQIADwUCVByGDAIbDAUJB4YfgAAKCRCHjs+4 -ZnUzQSgbCACYCfBS4nqUKA6gY0BDsQ1skdkrlKUTNz2QwWUQL0ZUX3m50Drje/Qj -7wJB6qcs+MP6eKr8qsKxtWnQ+a9avM9djEiQ2Y2s5oMt9aR8AViJeeBdXa3M41uj -B7PYzgbfOVOtqrWNhzo0E85mDQWb6tygkUezhFAiX2ZJ4WSvt2dE2zYwdq86yUs1 -x/hiCIhT37U4n030HQoJK/Xy11Ew/vcTbirhrQ5gxrervNpeVJWlFVc66CD5Az8O -RC0K/GywyW6CtRKHJnEiFF213HCt2AcCeMi6uymY4RCOQVl2W+BXpbaq9BGNncHC -8HtDp6J1RYqQ36MxGfm1V46rhEidH4v+ -=1l2h ------END PGP PUBLIC KEY BLOCK----- diff --git a/ObjectivePGPTests/TestingFiles/pubring-test-encrypted.gpg b/ObjectivePGPTests/TestingFiles/pubring-test-encrypted.gpg deleted file mode 100644 index cbf218b1..00000000 Binary files a/ObjectivePGPTests/TestingFiles/pubring-test-encrypted.gpg and /dev/null differ diff --git a/ObjectivePGPTests/TestingFiles/pubring-test-plaintext-key-armored.asc b/ObjectivePGPTests/TestingFiles/pubring-test-plaintext-key-armored.asc deleted file mode 100644 index 90849424..00000000 --- a/ObjectivePGPTests/TestingFiles/pubring-test-plaintext-key-armored.asc +++ /dev/null @@ -1,29 +0,0 @@ ------BEGIN PGP PUBLIC KEY BLOCK----- - -mQENBFNv5BEBCADqHwsQFnp2cTH8W0baCzDQA1knbcdmNMnbqdZeX/5rI7wEy5+q -cZ7OgE4d+Oe6S8xzub06A5sZkwQxVkeybl1VO5/Yox5NDokkH+M28WJjAc1//OJX -gKo87EEEBN+hXW6SVZTq0n8j6HzcVknYWpPSoDgsbSfDwVmmFBWo0kT87iwWfcxW -AVtjtnV6clY8Jd5xZ2t8RXrR5b3jQ7cuEfAtcWPG25Z8jyDH2UbI0PTHZ19Xpua4 -T3p1EXXHdOB9g/njpKWlC7Ts1OtQy//8X3ZvYKgIFsmW2/3KvNdeZs5zC0wHutUs -HxZe0Ih+1iL+oxWQHfiZ/J7GgTiUWJ1fsVKHABEBAAG0I01hcmNpbiAodGVzdCkg -PG1hcmNpbmtAdXAtbmV4dC5jb20+iQE5BBMBAgAjBQJTb+QRAhsDBwsJCAcDAgEG -FQgCCQoLBBYCAwECHgECF4AACgkQJaIzwpUuTotICggA2yVJ4Y/9sBlOyX60/pgo -7tL7koWwrow0o0VtjTUoNmGnb8reJgywyDltfyoEzkiUWdWSMrGmHuYtfCie7SqO -MnDAsK2i5MPY4+gxY7KmI30PBF+fy7LR7iX+GXgkf12Sg6KcSLwJ/RHrFwG8CYyY -tWI9vNvDeoj2l6KRJIURiVMxsb4bviDYL29s4SaTxdoe9NgrH20vZfl+qX64HB1X -ybiX8/66oS9epoqFBtCpyI6wJdyQd2WwTnwgNOg6g+cySfKAE5etO0O+0OVZZsJQ -R+SzS2KBy9+xgU4q1SE4mJGJd9/Xbx4LyZR2O1ovQzH738w5NhaxaFOzkHFacc7y -07kBDQRTb+QRAQgAq8zkJZ+dbRiuE779UKDdP5mht7ojkMJu9Zr4dq4V6rfTySRm -y9Gt3f08I9QkxRF9YGlsuvjxf4h1+rjFJeJv4VbKxl+dPUl3QZWiIWqo5IsEKIPF -ScLUp7zHFnqApsMufMR+dGalH4hoSA9s15gyd0wRDNB7w4S4RGUNFNDuq+Cy4UZ5 -Nn0Gul8RaOvpXpuK5FBpAHKLApi37hrqR9Z/tam4BwpgtzMetG5kZvWACYD0NGe9 -Pfry2wzxxj4nQyWBi6p9ruxyUbOXN6B2oSjFYCZGr1pRZZwzUnAKo2KUsRvGDyv3 -wrTZpWKcrPyYtSP8knrEmHbAyVj7m+a9nIEGrwARAQABiQEfBBgBAgAJBQJTb+QR -AhsMAAoJECWiM8KVLk6Lhh4IAIDBmzNMKj/F31IYBKlGIF2nbqyvePNt8h0+5kuv -+2IVEengQU9xE01nxLd2JVtzGlOEuI7xMcJxeaQ2qgCqzHaYrrw3rmpj5XQ3Ni8y -E+mxKRsV/kqisknC5CHPif+2qM1/j1OkZ7cJ11Hvu+9XJJN6ifeMWMIf2yYhGlgp -9J6111QFxuheZCPLt+fTaRe+Q9bwj+pFjMkc7Rd0U+2+iIjXamJEeug3RxX6a/6E -76dlpO+X6VQonIXIMFsXrxeUiEDiU5uGgWfsQ2MgtgZA2YTKd1iDgAbVV6SlDWXC -t01jHZO7Sm3gath9OP46B1rA8tjkBIIBTjRVHR3LUA7qoxw= -=sQBj ------END PGP PUBLIC KEY BLOCK----- diff --git a/ObjectivePGPTests/TestingFiles/pubring-test-plaintext.gpg b/ObjectivePGPTests/TestingFiles/pubring-test-plaintext.gpg deleted file mode 100644 index b83d4d2c..00000000 Binary files a/ObjectivePGPTests/TestingFiles/pubring-test-plaintext.gpg and /dev/null differ diff --git a/ObjectivePGPTests/TestingFiles/secring-test-encrypted.gpg b/ObjectivePGPTests/TestingFiles/secring-test-encrypted.gpg deleted file mode 100644 index 0d9af8a5..00000000 Binary files a/ObjectivePGPTests/TestingFiles/secring-test-encrypted.gpg and /dev/null differ diff --git a/ObjectivePGPTests/TestingFiles/secring-test-plaintext-encrypted-message.asc b/ObjectivePGPTests/TestingFiles/secring-test-plaintext-encrypted-message.asc deleted file mode 100644 index 396f3031..00000000 --- a/ObjectivePGPTests/TestingFiles/secring-test-plaintext-encrypted-message.asc +++ /dev/null @@ -1,13 +0,0 @@ ------BEGIN PGP MESSAGE----- -Version: GnuPG v2 - -hQEMA/mTW70RXA/NAQf+PnFa0PdM75SsQaucor1yFm3PUJ8RjYddwKv01rujoGSM -DYh5EKDYLIcI8Xj89GHaNfj6A+EJkBb9dZp/6phxzmxQ73Ntv80rEtEzOwt1y9l/ -mUcX8JMomQfhTEI8rMOtq0dI2vV1oOKQZjTxfoeVSkgBgN1mog8e0KVlCyeSb3vf -xBrSbsAkcd+TAVsvHMKMBboYBE4bXfku79THETvfCWhIfXd28n1o5PdYjXT29+/F -fihZlsyt7kV8yf2rUuZm8ta11GRnjaJzmMcU3RIdANSacTGBuEUOBh2NZaGnWTIv -yO0c5ATnbcZuMfnZmKwAhgxOLqpsyCah3GVKTaygJtJBAe5TaU8msat/XsXHWQll -3PdDRxxvsmSav+Slf+5DM9dDRqRuHNcGd9lYl73sZa55cD3sKux8i+2e1aoMM9hk -Mok= -=Wrsg ------END PGP MESSAGE----- diff --git a/ObjectivePGPTests/TestingFiles/secring-test-plaintext.gpg b/ObjectivePGPTests/TestingFiles/secring-test-plaintext.gpg deleted file mode 100644 index baff832b..00000000 Binary files a/ObjectivePGPTests/TestingFiles/secring-test-plaintext.gpg and /dev/null differ diff --git a/ObjectivePGPTests/en.lproj/InfoPlist.strings b/ObjectivePGPTests/en.lproj/InfoPlist.strings deleted file mode 100644 index 477b28ff..00000000 --- a/ObjectivePGPTests/en.lproj/InfoPlist.strings +++ /dev/null @@ -1,2 +0,0 @@ -/* Localized versions of Info.plist keys */ - diff --git a/Podfile b/Podfile index d53ceb2e..7d5d4e9d 100644 --- a/Podfile +++ b/Podfile @@ -1,12 +1,12 @@ target :ObjectivePGP do platform :ios, "6.0" - pod 'OpenSSL-Universal' + pod 'OpenSSL-Universal', '1.0.1.k' link_with 'ObjectivePGPTests' end -target :ObjectivePGPOSX do - platform :osx, "10.7" - pod 'OpenSSL-Universal' - link_with 'opgp' -end +# target :ObjectivePGPOSX do +# platform :osx, "10.7" +# pod 'OpenSSL-Universal' +# link_with 'opgp' +# end diff --git a/Podfile.lock b/Podfile.lock index 4b59d370..3b376a62 100644 --- a/Podfile.lock +++ b/Podfile.lock @@ -1,10 +1,10 @@ PODS: - - OpenSSL-Universal (1.0.1.h) + - OpenSSL-Universal (1.0.1.k) DEPENDENCIES: - - OpenSSL-Universal + - OpenSSL-Universal (= 1.0.1.k) SPEC CHECKSUMS: - OpenSSL-Universal: 9c112508615ed33bb35f730eed820e93175a9dec + OpenSSL-Universal: 60ee5ddf6530100c0aa702c2e0c9881cfd4a89a5 -COCOAPODS: 0.33.1 +COCOAPODS: 0.36.0.beta.1 diff --git a/Pods/BuildHeaders/OpenSSL-Universal/openssl/aes.h b/Pods/BuildHeaders/OpenSSL-Universal/openssl/aes.h deleted file mode 120000 index 0d3ef8d2..00000000 --- a/Pods/BuildHeaders/OpenSSL-Universal/openssl/aes.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/aes.h \ No newline at end of file diff --git a/Pods/BuildHeaders/OpenSSL-Universal/openssl/asn1.h b/Pods/BuildHeaders/OpenSSL-Universal/openssl/asn1.h deleted file mode 120000 index c56ac308..00000000 --- a/Pods/BuildHeaders/OpenSSL-Universal/openssl/asn1.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/asn1.h \ No newline at end of file diff --git a/Pods/BuildHeaders/OpenSSL-Universal/openssl/asn1_mac.h b/Pods/BuildHeaders/OpenSSL-Universal/openssl/asn1_mac.h deleted file mode 120000 index 126d6324..00000000 --- a/Pods/BuildHeaders/OpenSSL-Universal/openssl/asn1_mac.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/asn1_mac.h \ No newline at end of file diff --git a/Pods/BuildHeaders/OpenSSL-Universal/openssl/asn1t.h b/Pods/BuildHeaders/OpenSSL-Universal/openssl/asn1t.h deleted file mode 120000 index b2aa7c86..00000000 --- a/Pods/BuildHeaders/OpenSSL-Universal/openssl/asn1t.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/asn1t.h \ No newline at end of file diff --git a/Pods/BuildHeaders/OpenSSL-Universal/openssl/bio.h b/Pods/BuildHeaders/OpenSSL-Universal/openssl/bio.h deleted file mode 120000 index bd30e17a..00000000 --- a/Pods/BuildHeaders/OpenSSL-Universal/openssl/bio.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/bio.h \ No newline at end of file diff --git a/Pods/BuildHeaders/OpenSSL-Universal/openssl/blowfish.h b/Pods/BuildHeaders/OpenSSL-Universal/openssl/blowfish.h deleted file mode 120000 index 134fd56f..00000000 --- a/Pods/BuildHeaders/OpenSSL-Universal/openssl/blowfish.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/blowfish.h \ No newline at end of file diff --git a/Pods/BuildHeaders/OpenSSL-Universal/openssl/bn.h b/Pods/BuildHeaders/OpenSSL-Universal/openssl/bn.h deleted file mode 120000 index bee53b36..00000000 --- a/Pods/BuildHeaders/OpenSSL-Universal/openssl/bn.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/bn.h \ No newline at end of file diff --git a/Pods/BuildHeaders/OpenSSL-Universal/openssl/buffer.h b/Pods/BuildHeaders/OpenSSL-Universal/openssl/buffer.h deleted file mode 120000 index 6a3d230e..00000000 --- a/Pods/BuildHeaders/OpenSSL-Universal/openssl/buffer.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/buffer.h \ No newline at end of file diff --git a/Pods/BuildHeaders/OpenSSL-Universal/openssl/camellia.h b/Pods/BuildHeaders/OpenSSL-Universal/openssl/camellia.h deleted file mode 120000 index ede50fae..00000000 --- a/Pods/BuildHeaders/OpenSSL-Universal/openssl/camellia.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/camellia.h \ No newline at end of file diff --git a/Pods/BuildHeaders/OpenSSL-Universal/openssl/cast.h b/Pods/BuildHeaders/OpenSSL-Universal/openssl/cast.h deleted file mode 120000 index c76ac5b6..00000000 --- a/Pods/BuildHeaders/OpenSSL-Universal/openssl/cast.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/cast.h \ No newline at end of file diff --git a/Pods/BuildHeaders/OpenSSL-Universal/openssl/cmac.h b/Pods/BuildHeaders/OpenSSL-Universal/openssl/cmac.h deleted file mode 120000 index c96f424d..00000000 --- a/Pods/BuildHeaders/OpenSSL-Universal/openssl/cmac.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/cmac.h \ No newline at end of file diff --git a/Pods/BuildHeaders/OpenSSL-Universal/openssl/cms.h b/Pods/BuildHeaders/OpenSSL-Universal/openssl/cms.h deleted file mode 120000 index 51e21f58..00000000 --- a/Pods/BuildHeaders/OpenSSL-Universal/openssl/cms.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/cms.h \ No newline at end of file diff --git a/Pods/BuildHeaders/OpenSSL-Universal/openssl/comp.h b/Pods/BuildHeaders/OpenSSL-Universal/openssl/comp.h deleted file mode 120000 index c8debdbb..00000000 --- a/Pods/BuildHeaders/OpenSSL-Universal/openssl/comp.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/comp.h \ No newline at end of file diff --git a/Pods/BuildHeaders/OpenSSL-Universal/openssl/conf.h b/Pods/BuildHeaders/OpenSSL-Universal/openssl/conf.h deleted file mode 120000 index bc581d8f..00000000 --- a/Pods/BuildHeaders/OpenSSL-Universal/openssl/conf.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/conf.h \ No newline at end of file diff --git a/Pods/BuildHeaders/OpenSSL-Universal/openssl/conf_api.h b/Pods/BuildHeaders/OpenSSL-Universal/openssl/conf_api.h deleted file mode 120000 index 52243074..00000000 --- a/Pods/BuildHeaders/OpenSSL-Universal/openssl/conf_api.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/conf_api.h \ No newline at end of file diff --git a/Pods/BuildHeaders/OpenSSL-Universal/openssl/crypto.h b/Pods/BuildHeaders/OpenSSL-Universal/openssl/crypto.h deleted file mode 120000 index 072c9ab2..00000000 --- a/Pods/BuildHeaders/OpenSSL-Universal/openssl/crypto.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/crypto.h \ No newline at end of file diff --git a/Pods/BuildHeaders/OpenSSL-Universal/openssl/des.h b/Pods/BuildHeaders/OpenSSL-Universal/openssl/des.h deleted file mode 120000 index f074776d..00000000 --- a/Pods/BuildHeaders/OpenSSL-Universal/openssl/des.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/des.h \ No newline at end of file diff --git a/Pods/BuildHeaders/OpenSSL-Universal/openssl/des_old.h b/Pods/BuildHeaders/OpenSSL-Universal/openssl/des_old.h deleted file mode 120000 index b3a35dd7..00000000 --- a/Pods/BuildHeaders/OpenSSL-Universal/openssl/des_old.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/des_old.h \ No newline at end of file diff --git a/Pods/BuildHeaders/OpenSSL-Universal/openssl/dh.h b/Pods/BuildHeaders/OpenSSL-Universal/openssl/dh.h deleted file mode 120000 index 2b66545f..00000000 --- a/Pods/BuildHeaders/OpenSSL-Universal/openssl/dh.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/dh.h \ No newline at end of file diff --git a/Pods/BuildHeaders/OpenSSL-Universal/openssl/dsa.h b/Pods/BuildHeaders/OpenSSL-Universal/openssl/dsa.h deleted file mode 120000 index e77c3962..00000000 --- a/Pods/BuildHeaders/OpenSSL-Universal/openssl/dsa.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/dsa.h \ No newline at end of file diff --git a/Pods/BuildHeaders/OpenSSL-Universal/openssl/dso.h b/Pods/BuildHeaders/OpenSSL-Universal/openssl/dso.h deleted file mode 120000 index 8d543cde..00000000 --- a/Pods/BuildHeaders/OpenSSL-Universal/openssl/dso.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/dso.h \ No newline at end of file diff --git a/Pods/BuildHeaders/OpenSSL-Universal/openssl/dtls1.h b/Pods/BuildHeaders/OpenSSL-Universal/openssl/dtls1.h deleted file mode 120000 index 04119d23..00000000 --- a/Pods/BuildHeaders/OpenSSL-Universal/openssl/dtls1.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/dtls1.h \ No newline at end of file diff --git a/Pods/BuildHeaders/OpenSSL-Universal/openssl/e_os2.h b/Pods/BuildHeaders/OpenSSL-Universal/openssl/e_os2.h deleted file mode 120000 index f5ab4aa9..00000000 --- a/Pods/BuildHeaders/OpenSSL-Universal/openssl/e_os2.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/e_os2.h \ No newline at end of file diff --git a/Pods/BuildHeaders/OpenSSL-Universal/openssl/ebcdic.h b/Pods/BuildHeaders/OpenSSL-Universal/openssl/ebcdic.h deleted file mode 120000 index d9e13182..00000000 --- a/Pods/BuildHeaders/OpenSSL-Universal/openssl/ebcdic.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/ebcdic.h \ No newline at end of file diff --git a/Pods/BuildHeaders/OpenSSL-Universal/openssl/ec.h b/Pods/BuildHeaders/OpenSSL-Universal/openssl/ec.h deleted file mode 120000 index 74dbe244..00000000 --- a/Pods/BuildHeaders/OpenSSL-Universal/openssl/ec.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/ec.h \ No newline at end of file diff --git a/Pods/BuildHeaders/OpenSSL-Universal/openssl/ecdh.h b/Pods/BuildHeaders/OpenSSL-Universal/openssl/ecdh.h deleted file mode 120000 index 1e411510..00000000 --- a/Pods/BuildHeaders/OpenSSL-Universal/openssl/ecdh.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/ecdh.h \ No newline at end of file diff --git a/Pods/BuildHeaders/OpenSSL-Universal/openssl/ecdsa.h b/Pods/BuildHeaders/OpenSSL-Universal/openssl/ecdsa.h deleted file mode 120000 index 4e423be0..00000000 --- a/Pods/BuildHeaders/OpenSSL-Universal/openssl/ecdsa.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/ecdsa.h \ No newline at end of file diff --git a/Pods/BuildHeaders/OpenSSL-Universal/openssl/engine.h b/Pods/BuildHeaders/OpenSSL-Universal/openssl/engine.h deleted file mode 120000 index aa884239..00000000 --- a/Pods/BuildHeaders/OpenSSL-Universal/openssl/engine.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/engine.h \ No newline at end of file diff --git a/Pods/BuildHeaders/OpenSSL-Universal/openssl/err.h b/Pods/BuildHeaders/OpenSSL-Universal/openssl/err.h deleted file mode 120000 index 0a3f3a34..00000000 --- a/Pods/BuildHeaders/OpenSSL-Universal/openssl/err.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/err.h \ No newline at end of file diff --git a/Pods/BuildHeaders/OpenSSL-Universal/openssl/evp.h b/Pods/BuildHeaders/OpenSSL-Universal/openssl/evp.h deleted file mode 120000 index 6a2d06fe..00000000 --- a/Pods/BuildHeaders/OpenSSL-Universal/openssl/evp.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/evp.h \ No newline at end of file diff --git a/Pods/BuildHeaders/OpenSSL-Universal/openssl/hmac.h b/Pods/BuildHeaders/OpenSSL-Universal/openssl/hmac.h deleted file mode 120000 index d17dbadb..00000000 --- a/Pods/BuildHeaders/OpenSSL-Universal/openssl/hmac.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/hmac.h \ No newline at end of file diff --git a/Pods/BuildHeaders/OpenSSL-Universal/openssl/idea.h b/Pods/BuildHeaders/OpenSSL-Universal/openssl/idea.h deleted file mode 120000 index 9eda28c4..00000000 --- a/Pods/BuildHeaders/OpenSSL-Universal/openssl/idea.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/idea.h \ No newline at end of file diff --git a/Pods/BuildHeaders/OpenSSL-Universal/openssl/krb5_asn.h b/Pods/BuildHeaders/OpenSSL-Universal/openssl/krb5_asn.h deleted file mode 120000 index 764f23e1..00000000 --- a/Pods/BuildHeaders/OpenSSL-Universal/openssl/krb5_asn.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/krb5_asn.h \ No newline at end of file diff --git a/Pods/BuildHeaders/OpenSSL-Universal/openssl/kssl.h b/Pods/BuildHeaders/OpenSSL-Universal/openssl/kssl.h deleted file mode 120000 index e532a528..00000000 --- a/Pods/BuildHeaders/OpenSSL-Universal/openssl/kssl.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/kssl.h \ No newline at end of file diff --git a/Pods/BuildHeaders/OpenSSL-Universal/openssl/lhash.h b/Pods/BuildHeaders/OpenSSL-Universal/openssl/lhash.h deleted file mode 120000 index 8c154118..00000000 --- a/Pods/BuildHeaders/OpenSSL-Universal/openssl/lhash.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/lhash.h \ No newline at end of file diff --git a/Pods/BuildHeaders/OpenSSL-Universal/openssl/md4.h b/Pods/BuildHeaders/OpenSSL-Universal/openssl/md4.h deleted file mode 120000 index da810d17..00000000 --- a/Pods/BuildHeaders/OpenSSL-Universal/openssl/md4.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/md4.h \ No newline at end of file diff --git a/Pods/BuildHeaders/OpenSSL-Universal/openssl/md5.h b/Pods/BuildHeaders/OpenSSL-Universal/openssl/md5.h deleted file mode 120000 index bde5a0e9..00000000 --- a/Pods/BuildHeaders/OpenSSL-Universal/openssl/md5.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/md5.h \ No newline at end of file diff --git a/Pods/BuildHeaders/OpenSSL-Universal/openssl/mdc2.h b/Pods/BuildHeaders/OpenSSL-Universal/openssl/mdc2.h deleted file mode 120000 index ce69f630..00000000 --- a/Pods/BuildHeaders/OpenSSL-Universal/openssl/mdc2.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/mdc2.h \ No newline at end of file diff --git a/Pods/BuildHeaders/OpenSSL-Universal/openssl/modes.h b/Pods/BuildHeaders/OpenSSL-Universal/openssl/modes.h deleted file mode 120000 index b7dc082d..00000000 --- a/Pods/BuildHeaders/OpenSSL-Universal/openssl/modes.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/modes.h \ No newline at end of file diff --git a/Pods/BuildHeaders/OpenSSL-Universal/openssl/obj_mac.h b/Pods/BuildHeaders/OpenSSL-Universal/openssl/obj_mac.h deleted file mode 120000 index 608b1598..00000000 --- a/Pods/BuildHeaders/OpenSSL-Universal/openssl/obj_mac.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/obj_mac.h \ No newline at end of file diff --git a/Pods/BuildHeaders/OpenSSL-Universal/openssl/objects.h b/Pods/BuildHeaders/OpenSSL-Universal/openssl/objects.h deleted file mode 120000 index 43b783f2..00000000 --- a/Pods/BuildHeaders/OpenSSL-Universal/openssl/objects.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/objects.h \ No newline at end of file diff --git a/Pods/BuildHeaders/OpenSSL-Universal/openssl/ocsp.h b/Pods/BuildHeaders/OpenSSL-Universal/openssl/ocsp.h deleted file mode 120000 index 261a9e9c..00000000 --- a/Pods/BuildHeaders/OpenSSL-Universal/openssl/ocsp.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/ocsp.h \ No newline at end of file diff --git a/Pods/BuildHeaders/OpenSSL-Universal/openssl/opensslconf.h b/Pods/BuildHeaders/OpenSSL-Universal/openssl/opensslconf.h deleted file mode 120000 index d1e7fd0f..00000000 --- a/Pods/BuildHeaders/OpenSSL-Universal/openssl/opensslconf.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/opensslconf.h \ No newline at end of file diff --git a/Pods/BuildHeaders/OpenSSL-Universal/openssl/opensslv.h b/Pods/BuildHeaders/OpenSSL-Universal/openssl/opensslv.h deleted file mode 120000 index a37a214c..00000000 --- a/Pods/BuildHeaders/OpenSSL-Universal/openssl/opensslv.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/opensslv.h \ No newline at end of file diff --git a/Pods/BuildHeaders/OpenSSL-Universal/openssl/ossl_typ.h b/Pods/BuildHeaders/OpenSSL-Universal/openssl/ossl_typ.h deleted file mode 120000 index 55cb36c6..00000000 --- a/Pods/BuildHeaders/OpenSSL-Universal/openssl/ossl_typ.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/ossl_typ.h \ No newline at end of file diff --git a/Pods/BuildHeaders/OpenSSL-Universal/openssl/pem.h b/Pods/BuildHeaders/OpenSSL-Universal/openssl/pem.h deleted file mode 120000 index cb2c3814..00000000 --- a/Pods/BuildHeaders/OpenSSL-Universal/openssl/pem.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/pem.h \ No newline at end of file diff --git a/Pods/BuildHeaders/OpenSSL-Universal/openssl/pem2.h b/Pods/BuildHeaders/OpenSSL-Universal/openssl/pem2.h deleted file mode 120000 index 52a0dc2c..00000000 --- a/Pods/BuildHeaders/OpenSSL-Universal/openssl/pem2.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/pem2.h \ No newline at end of file diff --git a/Pods/BuildHeaders/OpenSSL-Universal/openssl/pkcs12.h b/Pods/BuildHeaders/OpenSSL-Universal/openssl/pkcs12.h deleted file mode 120000 index b2ddc7dd..00000000 --- a/Pods/BuildHeaders/OpenSSL-Universal/openssl/pkcs12.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/pkcs12.h \ No newline at end of file diff --git a/Pods/BuildHeaders/OpenSSL-Universal/openssl/pkcs7.h b/Pods/BuildHeaders/OpenSSL-Universal/openssl/pkcs7.h deleted file mode 120000 index d4dad2a2..00000000 --- a/Pods/BuildHeaders/OpenSSL-Universal/openssl/pkcs7.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/pkcs7.h \ No newline at end of file diff --git a/Pods/BuildHeaders/OpenSSL-Universal/openssl/pqueue.h b/Pods/BuildHeaders/OpenSSL-Universal/openssl/pqueue.h deleted file mode 120000 index ec50aa0c..00000000 --- a/Pods/BuildHeaders/OpenSSL-Universal/openssl/pqueue.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/pqueue.h \ No newline at end of file diff --git a/Pods/BuildHeaders/OpenSSL-Universal/openssl/rand.h b/Pods/BuildHeaders/OpenSSL-Universal/openssl/rand.h deleted file mode 120000 index eef219e8..00000000 --- a/Pods/BuildHeaders/OpenSSL-Universal/openssl/rand.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/rand.h \ No newline at end of file diff --git a/Pods/BuildHeaders/OpenSSL-Universal/openssl/rc2.h b/Pods/BuildHeaders/OpenSSL-Universal/openssl/rc2.h deleted file mode 120000 index 7760b301..00000000 --- a/Pods/BuildHeaders/OpenSSL-Universal/openssl/rc2.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/rc2.h \ No newline at end of file diff --git a/Pods/BuildHeaders/OpenSSL-Universal/openssl/rc4.h b/Pods/BuildHeaders/OpenSSL-Universal/openssl/rc4.h deleted file mode 120000 index 47f64a65..00000000 --- a/Pods/BuildHeaders/OpenSSL-Universal/openssl/rc4.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/rc4.h \ No newline at end of file diff --git a/Pods/BuildHeaders/OpenSSL-Universal/openssl/ripemd.h b/Pods/BuildHeaders/OpenSSL-Universal/openssl/ripemd.h deleted file mode 120000 index 585b27fa..00000000 --- a/Pods/BuildHeaders/OpenSSL-Universal/openssl/ripemd.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/ripemd.h \ No newline at end of file diff --git a/Pods/BuildHeaders/OpenSSL-Universal/openssl/rsa.h b/Pods/BuildHeaders/OpenSSL-Universal/openssl/rsa.h deleted file mode 120000 index 4b5b81f9..00000000 --- a/Pods/BuildHeaders/OpenSSL-Universal/openssl/rsa.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/rsa.h \ No newline at end of file diff --git a/Pods/BuildHeaders/OpenSSL-Universal/openssl/safestack.h b/Pods/BuildHeaders/OpenSSL-Universal/openssl/safestack.h deleted file mode 120000 index b0662203..00000000 --- a/Pods/BuildHeaders/OpenSSL-Universal/openssl/safestack.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/safestack.h \ No newline at end of file diff --git a/Pods/BuildHeaders/OpenSSL-Universal/openssl/seed.h b/Pods/BuildHeaders/OpenSSL-Universal/openssl/seed.h deleted file mode 120000 index 860da69f..00000000 --- a/Pods/BuildHeaders/OpenSSL-Universal/openssl/seed.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/seed.h \ No newline at end of file diff --git a/Pods/BuildHeaders/OpenSSL-Universal/openssl/sha.h b/Pods/BuildHeaders/OpenSSL-Universal/openssl/sha.h deleted file mode 120000 index ef529a83..00000000 --- a/Pods/BuildHeaders/OpenSSL-Universal/openssl/sha.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/sha.h \ No newline at end of file diff --git a/Pods/BuildHeaders/OpenSSL-Universal/openssl/srp.h b/Pods/BuildHeaders/OpenSSL-Universal/openssl/srp.h deleted file mode 120000 index 60f739ec..00000000 --- a/Pods/BuildHeaders/OpenSSL-Universal/openssl/srp.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/srp.h \ No newline at end of file diff --git a/Pods/BuildHeaders/OpenSSL-Universal/openssl/srtp.h b/Pods/BuildHeaders/OpenSSL-Universal/openssl/srtp.h deleted file mode 120000 index 64502caf..00000000 --- a/Pods/BuildHeaders/OpenSSL-Universal/openssl/srtp.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/srtp.h \ No newline at end of file diff --git a/Pods/BuildHeaders/OpenSSL-Universal/openssl/ssl.h b/Pods/BuildHeaders/OpenSSL-Universal/openssl/ssl.h deleted file mode 120000 index 501c6d7e..00000000 --- a/Pods/BuildHeaders/OpenSSL-Universal/openssl/ssl.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/ssl.h \ No newline at end of file diff --git a/Pods/BuildHeaders/OpenSSL-Universal/openssl/ssl2.h b/Pods/BuildHeaders/OpenSSL-Universal/openssl/ssl2.h deleted file mode 120000 index 038f81de..00000000 --- a/Pods/BuildHeaders/OpenSSL-Universal/openssl/ssl2.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/ssl2.h \ No newline at end of file diff --git a/Pods/BuildHeaders/OpenSSL-Universal/openssl/ssl23.h b/Pods/BuildHeaders/OpenSSL-Universal/openssl/ssl23.h deleted file mode 120000 index 6b52b146..00000000 --- a/Pods/BuildHeaders/OpenSSL-Universal/openssl/ssl23.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/ssl23.h \ No newline at end of file diff --git a/Pods/BuildHeaders/OpenSSL-Universal/openssl/ssl3.h b/Pods/BuildHeaders/OpenSSL-Universal/openssl/ssl3.h deleted file mode 120000 index 3029f9ed..00000000 --- a/Pods/BuildHeaders/OpenSSL-Universal/openssl/ssl3.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/ssl3.h \ No newline at end of file diff --git a/Pods/BuildHeaders/OpenSSL-Universal/openssl/stack.h b/Pods/BuildHeaders/OpenSSL-Universal/openssl/stack.h deleted file mode 120000 index dad9b50c..00000000 --- a/Pods/BuildHeaders/OpenSSL-Universal/openssl/stack.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/stack.h \ No newline at end of file diff --git a/Pods/BuildHeaders/OpenSSL-Universal/openssl/symhacks.h b/Pods/BuildHeaders/OpenSSL-Universal/openssl/symhacks.h deleted file mode 120000 index 77a17131..00000000 --- a/Pods/BuildHeaders/OpenSSL-Universal/openssl/symhacks.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/symhacks.h \ No newline at end of file diff --git a/Pods/BuildHeaders/OpenSSL-Universal/openssl/tls1.h b/Pods/BuildHeaders/OpenSSL-Universal/openssl/tls1.h deleted file mode 120000 index eb7e49b2..00000000 --- a/Pods/BuildHeaders/OpenSSL-Universal/openssl/tls1.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/tls1.h \ No newline at end of file diff --git a/Pods/BuildHeaders/OpenSSL-Universal/openssl/ts.h b/Pods/BuildHeaders/OpenSSL-Universal/openssl/ts.h deleted file mode 120000 index f1a47fcd..00000000 --- a/Pods/BuildHeaders/OpenSSL-Universal/openssl/ts.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/ts.h \ No newline at end of file diff --git a/Pods/BuildHeaders/OpenSSL-Universal/openssl/txt_db.h b/Pods/BuildHeaders/OpenSSL-Universal/openssl/txt_db.h deleted file mode 120000 index 961fd525..00000000 --- a/Pods/BuildHeaders/OpenSSL-Universal/openssl/txt_db.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/txt_db.h \ No newline at end of file diff --git a/Pods/BuildHeaders/OpenSSL-Universal/openssl/ui.h b/Pods/BuildHeaders/OpenSSL-Universal/openssl/ui.h deleted file mode 120000 index 3b87f104..00000000 --- a/Pods/BuildHeaders/OpenSSL-Universal/openssl/ui.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/ui.h \ No newline at end of file diff --git a/Pods/BuildHeaders/OpenSSL-Universal/openssl/ui_compat.h b/Pods/BuildHeaders/OpenSSL-Universal/openssl/ui_compat.h deleted file mode 120000 index faed055e..00000000 --- a/Pods/BuildHeaders/OpenSSL-Universal/openssl/ui_compat.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/ui_compat.h \ No newline at end of file diff --git a/Pods/BuildHeaders/OpenSSL-Universal/openssl/whrlpool.h b/Pods/BuildHeaders/OpenSSL-Universal/openssl/whrlpool.h deleted file mode 120000 index 1eab3917..00000000 --- a/Pods/BuildHeaders/OpenSSL-Universal/openssl/whrlpool.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/whrlpool.h \ No newline at end of file diff --git a/Pods/BuildHeaders/OpenSSL-Universal/openssl/x509.h b/Pods/BuildHeaders/OpenSSL-Universal/openssl/x509.h deleted file mode 120000 index 41ade4ed..00000000 --- a/Pods/BuildHeaders/OpenSSL-Universal/openssl/x509.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/x509.h \ No newline at end of file diff --git a/Pods/BuildHeaders/OpenSSL-Universal/openssl/x509_vfy.h b/Pods/BuildHeaders/OpenSSL-Universal/openssl/x509_vfy.h deleted file mode 120000 index f4215374..00000000 --- a/Pods/BuildHeaders/OpenSSL-Universal/openssl/x509_vfy.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/x509_vfy.h \ No newline at end of file diff --git a/Pods/BuildHeaders/OpenSSL-Universal/openssl/x509v3.h b/Pods/BuildHeaders/OpenSSL-Universal/openssl/x509v3.h deleted file mode 120000 index 990178e2..00000000 --- a/Pods/BuildHeaders/OpenSSL-Universal/openssl/x509v3.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/x509v3.h \ No newline at end of file diff --git a/Pods/Headers/OpenSSL-Universal/openssl/aes.h b/Pods/Headers/OpenSSL-Universal/openssl/aes.h deleted file mode 120000 index 0d3ef8d2..00000000 --- a/Pods/Headers/OpenSSL-Universal/openssl/aes.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/aes.h \ No newline at end of file diff --git a/Pods/Headers/OpenSSL-Universal/openssl/asn1.h b/Pods/Headers/OpenSSL-Universal/openssl/asn1.h deleted file mode 120000 index c56ac308..00000000 --- a/Pods/Headers/OpenSSL-Universal/openssl/asn1.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/asn1.h \ No newline at end of file diff --git a/Pods/Headers/OpenSSL-Universal/openssl/asn1_mac.h b/Pods/Headers/OpenSSL-Universal/openssl/asn1_mac.h deleted file mode 120000 index 126d6324..00000000 --- a/Pods/Headers/OpenSSL-Universal/openssl/asn1_mac.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/asn1_mac.h \ No newline at end of file diff --git a/Pods/Headers/OpenSSL-Universal/openssl/asn1t.h b/Pods/Headers/OpenSSL-Universal/openssl/asn1t.h deleted file mode 120000 index b2aa7c86..00000000 --- a/Pods/Headers/OpenSSL-Universal/openssl/asn1t.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/asn1t.h \ No newline at end of file diff --git a/Pods/Headers/OpenSSL-Universal/openssl/bio.h b/Pods/Headers/OpenSSL-Universal/openssl/bio.h deleted file mode 120000 index bd30e17a..00000000 --- a/Pods/Headers/OpenSSL-Universal/openssl/bio.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/bio.h \ No newline at end of file diff --git a/Pods/Headers/OpenSSL-Universal/openssl/blowfish.h b/Pods/Headers/OpenSSL-Universal/openssl/blowfish.h deleted file mode 120000 index 134fd56f..00000000 --- a/Pods/Headers/OpenSSL-Universal/openssl/blowfish.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/blowfish.h \ No newline at end of file diff --git a/Pods/Headers/OpenSSL-Universal/openssl/bn.h b/Pods/Headers/OpenSSL-Universal/openssl/bn.h deleted file mode 120000 index bee53b36..00000000 --- a/Pods/Headers/OpenSSL-Universal/openssl/bn.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/bn.h \ No newline at end of file diff --git a/Pods/Headers/OpenSSL-Universal/openssl/buffer.h b/Pods/Headers/OpenSSL-Universal/openssl/buffer.h deleted file mode 120000 index 6a3d230e..00000000 --- a/Pods/Headers/OpenSSL-Universal/openssl/buffer.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/buffer.h \ No newline at end of file diff --git a/Pods/Headers/OpenSSL-Universal/openssl/camellia.h b/Pods/Headers/OpenSSL-Universal/openssl/camellia.h deleted file mode 120000 index ede50fae..00000000 --- a/Pods/Headers/OpenSSL-Universal/openssl/camellia.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/camellia.h \ No newline at end of file diff --git a/Pods/Headers/OpenSSL-Universal/openssl/cast.h b/Pods/Headers/OpenSSL-Universal/openssl/cast.h deleted file mode 120000 index c76ac5b6..00000000 --- a/Pods/Headers/OpenSSL-Universal/openssl/cast.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/cast.h \ No newline at end of file diff --git a/Pods/Headers/OpenSSL-Universal/openssl/cmac.h b/Pods/Headers/OpenSSL-Universal/openssl/cmac.h deleted file mode 120000 index c96f424d..00000000 --- a/Pods/Headers/OpenSSL-Universal/openssl/cmac.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/cmac.h \ No newline at end of file diff --git a/Pods/Headers/OpenSSL-Universal/openssl/cms.h b/Pods/Headers/OpenSSL-Universal/openssl/cms.h deleted file mode 120000 index 51e21f58..00000000 --- a/Pods/Headers/OpenSSL-Universal/openssl/cms.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/cms.h \ No newline at end of file diff --git a/Pods/Headers/OpenSSL-Universal/openssl/comp.h b/Pods/Headers/OpenSSL-Universal/openssl/comp.h deleted file mode 120000 index c8debdbb..00000000 --- a/Pods/Headers/OpenSSL-Universal/openssl/comp.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/comp.h \ No newline at end of file diff --git a/Pods/Headers/OpenSSL-Universal/openssl/conf.h b/Pods/Headers/OpenSSL-Universal/openssl/conf.h deleted file mode 120000 index bc581d8f..00000000 --- a/Pods/Headers/OpenSSL-Universal/openssl/conf.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/conf.h \ No newline at end of file diff --git a/Pods/Headers/OpenSSL-Universal/openssl/conf_api.h b/Pods/Headers/OpenSSL-Universal/openssl/conf_api.h deleted file mode 120000 index 52243074..00000000 --- a/Pods/Headers/OpenSSL-Universal/openssl/conf_api.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/conf_api.h \ No newline at end of file diff --git a/Pods/Headers/OpenSSL-Universal/openssl/crypto.h b/Pods/Headers/OpenSSL-Universal/openssl/crypto.h deleted file mode 120000 index 072c9ab2..00000000 --- a/Pods/Headers/OpenSSL-Universal/openssl/crypto.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/crypto.h \ No newline at end of file diff --git a/Pods/Headers/OpenSSL-Universal/openssl/des.h b/Pods/Headers/OpenSSL-Universal/openssl/des.h deleted file mode 120000 index f074776d..00000000 --- a/Pods/Headers/OpenSSL-Universal/openssl/des.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/des.h \ No newline at end of file diff --git a/Pods/Headers/OpenSSL-Universal/openssl/des_old.h b/Pods/Headers/OpenSSL-Universal/openssl/des_old.h deleted file mode 120000 index b3a35dd7..00000000 --- a/Pods/Headers/OpenSSL-Universal/openssl/des_old.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/des_old.h \ No newline at end of file diff --git a/Pods/Headers/OpenSSL-Universal/openssl/dh.h b/Pods/Headers/OpenSSL-Universal/openssl/dh.h deleted file mode 120000 index 2b66545f..00000000 --- a/Pods/Headers/OpenSSL-Universal/openssl/dh.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/dh.h \ No newline at end of file diff --git a/Pods/Headers/OpenSSL-Universal/openssl/dsa.h b/Pods/Headers/OpenSSL-Universal/openssl/dsa.h deleted file mode 120000 index e77c3962..00000000 --- a/Pods/Headers/OpenSSL-Universal/openssl/dsa.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/dsa.h \ No newline at end of file diff --git a/Pods/Headers/OpenSSL-Universal/openssl/dso.h b/Pods/Headers/OpenSSL-Universal/openssl/dso.h deleted file mode 120000 index 8d543cde..00000000 --- a/Pods/Headers/OpenSSL-Universal/openssl/dso.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/dso.h \ No newline at end of file diff --git a/Pods/Headers/OpenSSL-Universal/openssl/dtls1.h b/Pods/Headers/OpenSSL-Universal/openssl/dtls1.h deleted file mode 120000 index 04119d23..00000000 --- a/Pods/Headers/OpenSSL-Universal/openssl/dtls1.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/dtls1.h \ No newline at end of file diff --git a/Pods/Headers/OpenSSL-Universal/openssl/e_os2.h b/Pods/Headers/OpenSSL-Universal/openssl/e_os2.h deleted file mode 120000 index f5ab4aa9..00000000 --- a/Pods/Headers/OpenSSL-Universal/openssl/e_os2.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/e_os2.h \ No newline at end of file diff --git a/Pods/Headers/OpenSSL-Universal/openssl/ebcdic.h b/Pods/Headers/OpenSSL-Universal/openssl/ebcdic.h deleted file mode 120000 index d9e13182..00000000 --- a/Pods/Headers/OpenSSL-Universal/openssl/ebcdic.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/ebcdic.h \ No newline at end of file diff --git a/Pods/Headers/OpenSSL-Universal/openssl/ec.h b/Pods/Headers/OpenSSL-Universal/openssl/ec.h deleted file mode 120000 index 74dbe244..00000000 --- a/Pods/Headers/OpenSSL-Universal/openssl/ec.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/ec.h \ No newline at end of file diff --git a/Pods/Headers/OpenSSL-Universal/openssl/ecdh.h b/Pods/Headers/OpenSSL-Universal/openssl/ecdh.h deleted file mode 120000 index 1e411510..00000000 --- a/Pods/Headers/OpenSSL-Universal/openssl/ecdh.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/ecdh.h \ No newline at end of file diff --git a/Pods/Headers/OpenSSL-Universal/openssl/ecdsa.h b/Pods/Headers/OpenSSL-Universal/openssl/ecdsa.h deleted file mode 120000 index 4e423be0..00000000 --- a/Pods/Headers/OpenSSL-Universal/openssl/ecdsa.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/ecdsa.h \ No newline at end of file diff --git a/Pods/Headers/OpenSSL-Universal/openssl/engine.h b/Pods/Headers/OpenSSL-Universal/openssl/engine.h deleted file mode 120000 index aa884239..00000000 --- a/Pods/Headers/OpenSSL-Universal/openssl/engine.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/engine.h \ No newline at end of file diff --git a/Pods/Headers/OpenSSL-Universal/openssl/err.h b/Pods/Headers/OpenSSL-Universal/openssl/err.h deleted file mode 120000 index 0a3f3a34..00000000 --- a/Pods/Headers/OpenSSL-Universal/openssl/err.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/err.h \ No newline at end of file diff --git a/Pods/Headers/OpenSSL-Universal/openssl/evp.h b/Pods/Headers/OpenSSL-Universal/openssl/evp.h deleted file mode 120000 index 6a2d06fe..00000000 --- a/Pods/Headers/OpenSSL-Universal/openssl/evp.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/evp.h \ No newline at end of file diff --git a/Pods/Headers/OpenSSL-Universal/openssl/hmac.h b/Pods/Headers/OpenSSL-Universal/openssl/hmac.h deleted file mode 120000 index d17dbadb..00000000 --- a/Pods/Headers/OpenSSL-Universal/openssl/hmac.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/hmac.h \ No newline at end of file diff --git a/Pods/Headers/OpenSSL-Universal/openssl/idea.h b/Pods/Headers/OpenSSL-Universal/openssl/idea.h deleted file mode 120000 index 9eda28c4..00000000 --- a/Pods/Headers/OpenSSL-Universal/openssl/idea.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/idea.h \ No newline at end of file diff --git a/Pods/Headers/OpenSSL-Universal/openssl/krb5_asn.h b/Pods/Headers/OpenSSL-Universal/openssl/krb5_asn.h deleted file mode 120000 index 764f23e1..00000000 --- a/Pods/Headers/OpenSSL-Universal/openssl/krb5_asn.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/krb5_asn.h \ No newline at end of file diff --git a/Pods/Headers/OpenSSL-Universal/openssl/kssl.h b/Pods/Headers/OpenSSL-Universal/openssl/kssl.h deleted file mode 120000 index e532a528..00000000 --- a/Pods/Headers/OpenSSL-Universal/openssl/kssl.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/kssl.h \ No newline at end of file diff --git a/Pods/Headers/OpenSSL-Universal/openssl/lhash.h b/Pods/Headers/OpenSSL-Universal/openssl/lhash.h deleted file mode 120000 index 8c154118..00000000 --- a/Pods/Headers/OpenSSL-Universal/openssl/lhash.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/lhash.h \ No newline at end of file diff --git a/Pods/Headers/OpenSSL-Universal/openssl/md4.h b/Pods/Headers/OpenSSL-Universal/openssl/md4.h deleted file mode 120000 index da810d17..00000000 --- a/Pods/Headers/OpenSSL-Universal/openssl/md4.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/md4.h \ No newline at end of file diff --git a/Pods/Headers/OpenSSL-Universal/openssl/md5.h b/Pods/Headers/OpenSSL-Universal/openssl/md5.h deleted file mode 120000 index bde5a0e9..00000000 --- a/Pods/Headers/OpenSSL-Universal/openssl/md5.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/md5.h \ No newline at end of file diff --git a/Pods/Headers/OpenSSL-Universal/openssl/mdc2.h b/Pods/Headers/OpenSSL-Universal/openssl/mdc2.h deleted file mode 120000 index ce69f630..00000000 --- a/Pods/Headers/OpenSSL-Universal/openssl/mdc2.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/mdc2.h \ No newline at end of file diff --git a/Pods/Headers/OpenSSL-Universal/openssl/modes.h b/Pods/Headers/OpenSSL-Universal/openssl/modes.h deleted file mode 120000 index b7dc082d..00000000 --- a/Pods/Headers/OpenSSL-Universal/openssl/modes.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/modes.h \ No newline at end of file diff --git a/Pods/Headers/OpenSSL-Universal/openssl/obj_mac.h b/Pods/Headers/OpenSSL-Universal/openssl/obj_mac.h deleted file mode 120000 index 608b1598..00000000 --- a/Pods/Headers/OpenSSL-Universal/openssl/obj_mac.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/obj_mac.h \ No newline at end of file diff --git a/Pods/Headers/OpenSSL-Universal/openssl/objects.h b/Pods/Headers/OpenSSL-Universal/openssl/objects.h deleted file mode 120000 index 43b783f2..00000000 --- a/Pods/Headers/OpenSSL-Universal/openssl/objects.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/objects.h \ No newline at end of file diff --git a/Pods/Headers/OpenSSL-Universal/openssl/ocsp.h b/Pods/Headers/OpenSSL-Universal/openssl/ocsp.h deleted file mode 120000 index 261a9e9c..00000000 --- a/Pods/Headers/OpenSSL-Universal/openssl/ocsp.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/ocsp.h \ No newline at end of file diff --git a/Pods/Headers/OpenSSL-Universal/openssl/opensslconf.h b/Pods/Headers/OpenSSL-Universal/openssl/opensslconf.h deleted file mode 120000 index d1e7fd0f..00000000 --- a/Pods/Headers/OpenSSL-Universal/openssl/opensslconf.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/opensslconf.h \ No newline at end of file diff --git a/Pods/Headers/OpenSSL-Universal/openssl/opensslv.h b/Pods/Headers/OpenSSL-Universal/openssl/opensslv.h deleted file mode 120000 index a37a214c..00000000 --- a/Pods/Headers/OpenSSL-Universal/openssl/opensslv.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/opensslv.h \ No newline at end of file diff --git a/Pods/Headers/OpenSSL-Universal/openssl/ossl_typ.h b/Pods/Headers/OpenSSL-Universal/openssl/ossl_typ.h deleted file mode 120000 index 55cb36c6..00000000 --- a/Pods/Headers/OpenSSL-Universal/openssl/ossl_typ.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/ossl_typ.h \ No newline at end of file diff --git a/Pods/Headers/OpenSSL-Universal/openssl/pem.h b/Pods/Headers/OpenSSL-Universal/openssl/pem.h deleted file mode 120000 index cb2c3814..00000000 --- a/Pods/Headers/OpenSSL-Universal/openssl/pem.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/pem.h \ No newline at end of file diff --git a/Pods/Headers/OpenSSL-Universal/openssl/pem2.h b/Pods/Headers/OpenSSL-Universal/openssl/pem2.h deleted file mode 120000 index 52a0dc2c..00000000 --- a/Pods/Headers/OpenSSL-Universal/openssl/pem2.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/pem2.h \ No newline at end of file diff --git a/Pods/Headers/OpenSSL-Universal/openssl/pkcs12.h b/Pods/Headers/OpenSSL-Universal/openssl/pkcs12.h deleted file mode 120000 index b2ddc7dd..00000000 --- a/Pods/Headers/OpenSSL-Universal/openssl/pkcs12.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/pkcs12.h \ No newline at end of file diff --git a/Pods/Headers/OpenSSL-Universal/openssl/pkcs7.h b/Pods/Headers/OpenSSL-Universal/openssl/pkcs7.h deleted file mode 120000 index d4dad2a2..00000000 --- a/Pods/Headers/OpenSSL-Universal/openssl/pkcs7.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/pkcs7.h \ No newline at end of file diff --git a/Pods/Headers/OpenSSL-Universal/openssl/pqueue.h b/Pods/Headers/OpenSSL-Universal/openssl/pqueue.h deleted file mode 120000 index ec50aa0c..00000000 --- a/Pods/Headers/OpenSSL-Universal/openssl/pqueue.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/pqueue.h \ No newline at end of file diff --git a/Pods/Headers/OpenSSL-Universal/openssl/rand.h b/Pods/Headers/OpenSSL-Universal/openssl/rand.h deleted file mode 120000 index eef219e8..00000000 --- a/Pods/Headers/OpenSSL-Universal/openssl/rand.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/rand.h \ No newline at end of file diff --git a/Pods/Headers/OpenSSL-Universal/openssl/rc2.h b/Pods/Headers/OpenSSL-Universal/openssl/rc2.h deleted file mode 120000 index 7760b301..00000000 --- a/Pods/Headers/OpenSSL-Universal/openssl/rc2.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/rc2.h \ No newline at end of file diff --git a/Pods/Headers/OpenSSL-Universal/openssl/rc4.h b/Pods/Headers/OpenSSL-Universal/openssl/rc4.h deleted file mode 120000 index 47f64a65..00000000 --- a/Pods/Headers/OpenSSL-Universal/openssl/rc4.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/rc4.h \ No newline at end of file diff --git a/Pods/Headers/OpenSSL-Universal/openssl/ripemd.h b/Pods/Headers/OpenSSL-Universal/openssl/ripemd.h deleted file mode 120000 index 585b27fa..00000000 --- a/Pods/Headers/OpenSSL-Universal/openssl/ripemd.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/ripemd.h \ No newline at end of file diff --git a/Pods/Headers/OpenSSL-Universal/openssl/rsa.h b/Pods/Headers/OpenSSL-Universal/openssl/rsa.h deleted file mode 120000 index 4b5b81f9..00000000 --- a/Pods/Headers/OpenSSL-Universal/openssl/rsa.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/rsa.h \ No newline at end of file diff --git a/Pods/Headers/OpenSSL-Universal/openssl/safestack.h b/Pods/Headers/OpenSSL-Universal/openssl/safestack.h deleted file mode 120000 index b0662203..00000000 --- a/Pods/Headers/OpenSSL-Universal/openssl/safestack.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/safestack.h \ No newline at end of file diff --git a/Pods/Headers/OpenSSL-Universal/openssl/seed.h b/Pods/Headers/OpenSSL-Universal/openssl/seed.h deleted file mode 120000 index 860da69f..00000000 --- a/Pods/Headers/OpenSSL-Universal/openssl/seed.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/seed.h \ No newline at end of file diff --git a/Pods/Headers/OpenSSL-Universal/openssl/sha.h b/Pods/Headers/OpenSSL-Universal/openssl/sha.h deleted file mode 120000 index ef529a83..00000000 --- a/Pods/Headers/OpenSSL-Universal/openssl/sha.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/sha.h \ No newline at end of file diff --git a/Pods/Headers/OpenSSL-Universal/openssl/srp.h b/Pods/Headers/OpenSSL-Universal/openssl/srp.h deleted file mode 120000 index 60f739ec..00000000 --- a/Pods/Headers/OpenSSL-Universal/openssl/srp.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/srp.h \ No newline at end of file diff --git a/Pods/Headers/OpenSSL-Universal/openssl/srtp.h b/Pods/Headers/OpenSSL-Universal/openssl/srtp.h deleted file mode 120000 index 64502caf..00000000 --- a/Pods/Headers/OpenSSL-Universal/openssl/srtp.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/srtp.h \ No newline at end of file diff --git a/Pods/Headers/OpenSSL-Universal/openssl/ssl.h b/Pods/Headers/OpenSSL-Universal/openssl/ssl.h deleted file mode 120000 index 501c6d7e..00000000 --- a/Pods/Headers/OpenSSL-Universal/openssl/ssl.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/ssl.h \ No newline at end of file diff --git a/Pods/Headers/OpenSSL-Universal/openssl/ssl2.h b/Pods/Headers/OpenSSL-Universal/openssl/ssl2.h deleted file mode 120000 index 038f81de..00000000 --- a/Pods/Headers/OpenSSL-Universal/openssl/ssl2.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/ssl2.h \ No newline at end of file diff --git a/Pods/Headers/OpenSSL-Universal/openssl/ssl23.h b/Pods/Headers/OpenSSL-Universal/openssl/ssl23.h deleted file mode 120000 index 6b52b146..00000000 --- a/Pods/Headers/OpenSSL-Universal/openssl/ssl23.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/ssl23.h \ No newline at end of file diff --git a/Pods/Headers/OpenSSL-Universal/openssl/ssl3.h b/Pods/Headers/OpenSSL-Universal/openssl/ssl3.h deleted file mode 120000 index 3029f9ed..00000000 --- a/Pods/Headers/OpenSSL-Universal/openssl/ssl3.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/ssl3.h \ No newline at end of file diff --git a/Pods/Headers/OpenSSL-Universal/openssl/stack.h b/Pods/Headers/OpenSSL-Universal/openssl/stack.h deleted file mode 120000 index dad9b50c..00000000 --- a/Pods/Headers/OpenSSL-Universal/openssl/stack.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/stack.h \ No newline at end of file diff --git a/Pods/Headers/OpenSSL-Universal/openssl/symhacks.h b/Pods/Headers/OpenSSL-Universal/openssl/symhacks.h deleted file mode 120000 index 77a17131..00000000 --- a/Pods/Headers/OpenSSL-Universal/openssl/symhacks.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/symhacks.h \ No newline at end of file diff --git a/Pods/Headers/OpenSSL-Universal/openssl/tls1.h b/Pods/Headers/OpenSSL-Universal/openssl/tls1.h deleted file mode 120000 index eb7e49b2..00000000 --- a/Pods/Headers/OpenSSL-Universal/openssl/tls1.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/tls1.h \ No newline at end of file diff --git a/Pods/Headers/OpenSSL-Universal/openssl/ts.h b/Pods/Headers/OpenSSL-Universal/openssl/ts.h deleted file mode 120000 index f1a47fcd..00000000 --- a/Pods/Headers/OpenSSL-Universal/openssl/ts.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/ts.h \ No newline at end of file diff --git a/Pods/Headers/OpenSSL-Universal/openssl/txt_db.h b/Pods/Headers/OpenSSL-Universal/openssl/txt_db.h deleted file mode 120000 index 961fd525..00000000 --- a/Pods/Headers/OpenSSL-Universal/openssl/txt_db.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/txt_db.h \ No newline at end of file diff --git a/Pods/Headers/OpenSSL-Universal/openssl/ui.h b/Pods/Headers/OpenSSL-Universal/openssl/ui.h deleted file mode 120000 index 3b87f104..00000000 --- a/Pods/Headers/OpenSSL-Universal/openssl/ui.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/ui.h \ No newline at end of file diff --git a/Pods/Headers/OpenSSL-Universal/openssl/ui_compat.h b/Pods/Headers/OpenSSL-Universal/openssl/ui_compat.h deleted file mode 120000 index faed055e..00000000 --- a/Pods/Headers/OpenSSL-Universal/openssl/ui_compat.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/ui_compat.h \ No newline at end of file diff --git a/Pods/Headers/OpenSSL-Universal/openssl/whrlpool.h b/Pods/Headers/OpenSSL-Universal/openssl/whrlpool.h deleted file mode 120000 index 1eab3917..00000000 --- a/Pods/Headers/OpenSSL-Universal/openssl/whrlpool.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/whrlpool.h \ No newline at end of file diff --git a/Pods/Headers/OpenSSL-Universal/openssl/x509.h b/Pods/Headers/OpenSSL-Universal/openssl/x509.h deleted file mode 120000 index 41ade4ed..00000000 --- a/Pods/Headers/OpenSSL-Universal/openssl/x509.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/x509.h \ No newline at end of file diff --git a/Pods/Headers/OpenSSL-Universal/openssl/x509_vfy.h b/Pods/Headers/OpenSSL-Universal/openssl/x509_vfy.h deleted file mode 120000 index f4215374..00000000 --- a/Pods/Headers/OpenSSL-Universal/openssl/x509_vfy.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/x509_vfy.h \ No newline at end of file diff --git a/Pods/Headers/OpenSSL-Universal/openssl/x509v3.h b/Pods/Headers/OpenSSL-Universal/openssl/x509v3.h deleted file mode 120000 index 990178e2..00000000 --- a/Pods/Headers/OpenSSL-Universal/openssl/x509v3.h +++ /dev/null @@ -1 +0,0 @@ -../../../OpenSSL-Universal/include-osx/openssl/x509v3.h \ No newline at end of file diff --git a/Pods/Headers/Private/OpenSSL-Universal/openssl/aes.h b/Pods/Headers/Private/OpenSSL-Universal/openssl/aes.h new file mode 120000 index 00000000..5ac13ea3 --- /dev/null +++ b/Pods/Headers/Private/OpenSSL-Universal/openssl/aes.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/aes.h \ No newline at end of file diff --git a/Pods/Headers/Private/OpenSSL-Universal/openssl/asn1.h b/Pods/Headers/Private/OpenSSL-Universal/openssl/asn1.h new file mode 120000 index 00000000..8a9b42b1 --- /dev/null +++ b/Pods/Headers/Private/OpenSSL-Universal/openssl/asn1.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/asn1.h \ No newline at end of file diff --git a/Pods/Headers/Private/OpenSSL-Universal/openssl/asn1_mac.h b/Pods/Headers/Private/OpenSSL-Universal/openssl/asn1_mac.h new file mode 120000 index 00000000..eb702c90 --- /dev/null +++ b/Pods/Headers/Private/OpenSSL-Universal/openssl/asn1_mac.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/asn1_mac.h \ No newline at end of file diff --git a/Pods/Headers/Private/OpenSSL-Universal/openssl/asn1t.h b/Pods/Headers/Private/OpenSSL-Universal/openssl/asn1t.h new file mode 120000 index 00000000..ca2c71b0 --- /dev/null +++ b/Pods/Headers/Private/OpenSSL-Universal/openssl/asn1t.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/asn1t.h \ No newline at end of file diff --git a/Pods/Headers/Private/OpenSSL-Universal/openssl/bio.h b/Pods/Headers/Private/OpenSSL-Universal/openssl/bio.h new file mode 120000 index 00000000..5e22b187 --- /dev/null +++ b/Pods/Headers/Private/OpenSSL-Universal/openssl/bio.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/bio.h \ No newline at end of file diff --git a/Pods/Headers/Private/OpenSSL-Universal/openssl/blowfish.h b/Pods/Headers/Private/OpenSSL-Universal/openssl/blowfish.h new file mode 120000 index 00000000..1e900bae --- /dev/null +++ b/Pods/Headers/Private/OpenSSL-Universal/openssl/blowfish.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/blowfish.h \ No newline at end of file diff --git a/Pods/Headers/Private/OpenSSL-Universal/openssl/bn.h b/Pods/Headers/Private/OpenSSL-Universal/openssl/bn.h new file mode 120000 index 00000000..2f687a98 --- /dev/null +++ b/Pods/Headers/Private/OpenSSL-Universal/openssl/bn.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/bn.h \ No newline at end of file diff --git a/Pods/Headers/Private/OpenSSL-Universal/openssl/buffer.h b/Pods/Headers/Private/OpenSSL-Universal/openssl/buffer.h new file mode 120000 index 00000000..ab3cbb66 --- /dev/null +++ b/Pods/Headers/Private/OpenSSL-Universal/openssl/buffer.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/buffer.h \ No newline at end of file diff --git a/Pods/Headers/Private/OpenSSL-Universal/openssl/camellia.h b/Pods/Headers/Private/OpenSSL-Universal/openssl/camellia.h new file mode 120000 index 00000000..36ad7094 --- /dev/null +++ b/Pods/Headers/Private/OpenSSL-Universal/openssl/camellia.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/camellia.h \ No newline at end of file diff --git a/Pods/Headers/Private/OpenSSL-Universal/openssl/cast.h b/Pods/Headers/Private/OpenSSL-Universal/openssl/cast.h new file mode 120000 index 00000000..802b1e26 --- /dev/null +++ b/Pods/Headers/Private/OpenSSL-Universal/openssl/cast.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/cast.h \ No newline at end of file diff --git a/Pods/Headers/Private/OpenSSL-Universal/openssl/cmac.h b/Pods/Headers/Private/OpenSSL-Universal/openssl/cmac.h new file mode 120000 index 00000000..ba473991 --- /dev/null +++ b/Pods/Headers/Private/OpenSSL-Universal/openssl/cmac.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/cmac.h \ No newline at end of file diff --git a/Pods/Headers/Private/OpenSSL-Universal/openssl/cms.h b/Pods/Headers/Private/OpenSSL-Universal/openssl/cms.h new file mode 120000 index 00000000..023d8fe9 --- /dev/null +++ b/Pods/Headers/Private/OpenSSL-Universal/openssl/cms.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/cms.h \ No newline at end of file diff --git a/Pods/Headers/Private/OpenSSL-Universal/openssl/comp.h b/Pods/Headers/Private/OpenSSL-Universal/openssl/comp.h new file mode 120000 index 00000000..ffcc7ef1 --- /dev/null +++ b/Pods/Headers/Private/OpenSSL-Universal/openssl/comp.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/comp.h \ No newline at end of file diff --git a/Pods/Headers/Private/OpenSSL-Universal/openssl/conf.h b/Pods/Headers/Private/OpenSSL-Universal/openssl/conf.h new file mode 120000 index 00000000..c74a3a98 --- /dev/null +++ b/Pods/Headers/Private/OpenSSL-Universal/openssl/conf.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/conf.h \ No newline at end of file diff --git a/Pods/Headers/Private/OpenSSL-Universal/openssl/conf_api.h b/Pods/Headers/Private/OpenSSL-Universal/openssl/conf_api.h new file mode 120000 index 00000000..f49cca1b --- /dev/null +++ b/Pods/Headers/Private/OpenSSL-Universal/openssl/conf_api.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/conf_api.h \ No newline at end of file diff --git a/Pods/Headers/Private/OpenSSL-Universal/openssl/crypto.h b/Pods/Headers/Private/OpenSSL-Universal/openssl/crypto.h new file mode 120000 index 00000000..76cd62f2 --- /dev/null +++ b/Pods/Headers/Private/OpenSSL-Universal/openssl/crypto.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/crypto.h \ No newline at end of file diff --git a/Pods/Headers/Private/OpenSSL-Universal/openssl/des.h b/Pods/Headers/Private/OpenSSL-Universal/openssl/des.h new file mode 120000 index 00000000..6517234f --- /dev/null +++ b/Pods/Headers/Private/OpenSSL-Universal/openssl/des.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/des.h \ No newline at end of file diff --git a/Pods/Headers/Private/OpenSSL-Universal/openssl/des_old.h b/Pods/Headers/Private/OpenSSL-Universal/openssl/des_old.h new file mode 120000 index 00000000..6798ab42 --- /dev/null +++ b/Pods/Headers/Private/OpenSSL-Universal/openssl/des_old.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/des_old.h \ No newline at end of file diff --git a/Pods/Headers/Private/OpenSSL-Universal/openssl/dh.h b/Pods/Headers/Private/OpenSSL-Universal/openssl/dh.h new file mode 120000 index 00000000..55041546 --- /dev/null +++ b/Pods/Headers/Private/OpenSSL-Universal/openssl/dh.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/dh.h \ No newline at end of file diff --git a/Pods/Headers/Private/OpenSSL-Universal/openssl/dsa.h b/Pods/Headers/Private/OpenSSL-Universal/openssl/dsa.h new file mode 120000 index 00000000..02f6474e --- /dev/null +++ b/Pods/Headers/Private/OpenSSL-Universal/openssl/dsa.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/dsa.h \ No newline at end of file diff --git a/Pods/Headers/Private/OpenSSL-Universal/openssl/dso.h b/Pods/Headers/Private/OpenSSL-Universal/openssl/dso.h new file mode 120000 index 00000000..0f7aca0c --- /dev/null +++ b/Pods/Headers/Private/OpenSSL-Universal/openssl/dso.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/dso.h \ No newline at end of file diff --git a/Pods/Headers/Private/OpenSSL-Universal/openssl/dtls1.h b/Pods/Headers/Private/OpenSSL-Universal/openssl/dtls1.h new file mode 120000 index 00000000..3724ff70 --- /dev/null +++ b/Pods/Headers/Private/OpenSSL-Universal/openssl/dtls1.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/dtls1.h \ No newline at end of file diff --git a/Pods/Headers/Private/OpenSSL-Universal/openssl/e_os2.h b/Pods/Headers/Private/OpenSSL-Universal/openssl/e_os2.h new file mode 120000 index 00000000..4f9bdceb --- /dev/null +++ b/Pods/Headers/Private/OpenSSL-Universal/openssl/e_os2.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/e_os2.h \ No newline at end of file diff --git a/Pods/Headers/Private/OpenSSL-Universal/openssl/ebcdic.h b/Pods/Headers/Private/OpenSSL-Universal/openssl/ebcdic.h new file mode 120000 index 00000000..6d9c0ea0 --- /dev/null +++ b/Pods/Headers/Private/OpenSSL-Universal/openssl/ebcdic.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/ebcdic.h \ No newline at end of file diff --git a/Pods/Headers/Private/OpenSSL-Universal/openssl/ec.h b/Pods/Headers/Private/OpenSSL-Universal/openssl/ec.h new file mode 120000 index 00000000..fa89bf82 --- /dev/null +++ b/Pods/Headers/Private/OpenSSL-Universal/openssl/ec.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/ec.h \ No newline at end of file diff --git a/Pods/Headers/Private/OpenSSL-Universal/openssl/ecdh.h b/Pods/Headers/Private/OpenSSL-Universal/openssl/ecdh.h new file mode 120000 index 00000000..2b1ad6e6 --- /dev/null +++ b/Pods/Headers/Private/OpenSSL-Universal/openssl/ecdh.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/ecdh.h \ No newline at end of file diff --git a/Pods/Headers/Private/OpenSSL-Universal/openssl/ecdsa.h b/Pods/Headers/Private/OpenSSL-Universal/openssl/ecdsa.h new file mode 120000 index 00000000..f8bcffdf --- /dev/null +++ b/Pods/Headers/Private/OpenSSL-Universal/openssl/ecdsa.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/ecdsa.h \ No newline at end of file diff --git a/Pods/Headers/Private/OpenSSL-Universal/openssl/engine.h b/Pods/Headers/Private/OpenSSL-Universal/openssl/engine.h new file mode 120000 index 00000000..c2fd1ebb --- /dev/null +++ b/Pods/Headers/Private/OpenSSL-Universal/openssl/engine.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/engine.h \ No newline at end of file diff --git a/Pods/Headers/Private/OpenSSL-Universal/openssl/err.h b/Pods/Headers/Private/OpenSSL-Universal/openssl/err.h new file mode 120000 index 00000000..d9bc380e --- /dev/null +++ b/Pods/Headers/Private/OpenSSL-Universal/openssl/err.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/err.h \ No newline at end of file diff --git a/Pods/Headers/Private/OpenSSL-Universal/openssl/evp.h b/Pods/Headers/Private/OpenSSL-Universal/openssl/evp.h new file mode 120000 index 00000000..93f6eb7c --- /dev/null +++ b/Pods/Headers/Private/OpenSSL-Universal/openssl/evp.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/evp.h \ No newline at end of file diff --git a/Pods/Headers/Private/OpenSSL-Universal/openssl/hmac.h b/Pods/Headers/Private/OpenSSL-Universal/openssl/hmac.h new file mode 120000 index 00000000..268e9e1b --- /dev/null +++ b/Pods/Headers/Private/OpenSSL-Universal/openssl/hmac.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/hmac.h \ No newline at end of file diff --git a/Pods/Headers/Private/OpenSSL-Universal/openssl/idea.h b/Pods/Headers/Private/OpenSSL-Universal/openssl/idea.h new file mode 120000 index 00000000..07b503cc --- /dev/null +++ b/Pods/Headers/Private/OpenSSL-Universal/openssl/idea.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/idea.h \ No newline at end of file diff --git a/Pods/Headers/Private/OpenSSL-Universal/openssl/krb5_asn.h b/Pods/Headers/Private/OpenSSL-Universal/openssl/krb5_asn.h new file mode 120000 index 00000000..506cde6f --- /dev/null +++ b/Pods/Headers/Private/OpenSSL-Universal/openssl/krb5_asn.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/krb5_asn.h \ No newline at end of file diff --git a/Pods/Headers/Private/OpenSSL-Universal/openssl/kssl.h b/Pods/Headers/Private/OpenSSL-Universal/openssl/kssl.h new file mode 120000 index 00000000..7bd572cc --- /dev/null +++ b/Pods/Headers/Private/OpenSSL-Universal/openssl/kssl.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/kssl.h \ No newline at end of file diff --git a/Pods/Headers/Private/OpenSSL-Universal/openssl/lhash.h b/Pods/Headers/Private/OpenSSL-Universal/openssl/lhash.h new file mode 120000 index 00000000..14f0e7c0 --- /dev/null +++ b/Pods/Headers/Private/OpenSSL-Universal/openssl/lhash.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/lhash.h \ No newline at end of file diff --git a/Pods/Headers/Private/OpenSSL-Universal/openssl/md4.h b/Pods/Headers/Private/OpenSSL-Universal/openssl/md4.h new file mode 120000 index 00000000..933005d1 --- /dev/null +++ b/Pods/Headers/Private/OpenSSL-Universal/openssl/md4.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/md4.h \ No newline at end of file diff --git a/Pods/Headers/Private/OpenSSL-Universal/openssl/md5.h b/Pods/Headers/Private/OpenSSL-Universal/openssl/md5.h new file mode 120000 index 00000000..2976a29f --- /dev/null +++ b/Pods/Headers/Private/OpenSSL-Universal/openssl/md5.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/md5.h \ No newline at end of file diff --git a/Pods/Headers/Private/OpenSSL-Universal/openssl/mdc2.h b/Pods/Headers/Private/OpenSSL-Universal/openssl/mdc2.h new file mode 120000 index 00000000..f6604481 --- /dev/null +++ b/Pods/Headers/Private/OpenSSL-Universal/openssl/mdc2.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/mdc2.h \ No newline at end of file diff --git a/Pods/Headers/Private/OpenSSL-Universal/openssl/modes.h b/Pods/Headers/Private/OpenSSL-Universal/openssl/modes.h new file mode 120000 index 00000000..ab014ac0 --- /dev/null +++ b/Pods/Headers/Private/OpenSSL-Universal/openssl/modes.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/modes.h \ No newline at end of file diff --git a/Pods/Headers/Private/OpenSSL-Universal/openssl/obj_mac.h b/Pods/Headers/Private/OpenSSL-Universal/openssl/obj_mac.h new file mode 120000 index 00000000..e59e6b64 --- /dev/null +++ b/Pods/Headers/Private/OpenSSL-Universal/openssl/obj_mac.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/obj_mac.h \ No newline at end of file diff --git a/Pods/Headers/Private/OpenSSL-Universal/openssl/objects.h b/Pods/Headers/Private/OpenSSL-Universal/openssl/objects.h new file mode 120000 index 00000000..5a9b15bf --- /dev/null +++ b/Pods/Headers/Private/OpenSSL-Universal/openssl/objects.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/objects.h \ No newline at end of file diff --git a/Pods/Headers/Private/OpenSSL-Universal/openssl/ocsp.h b/Pods/Headers/Private/OpenSSL-Universal/openssl/ocsp.h new file mode 120000 index 00000000..901097d9 --- /dev/null +++ b/Pods/Headers/Private/OpenSSL-Universal/openssl/ocsp.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/ocsp.h \ No newline at end of file diff --git a/Pods/Headers/Private/OpenSSL-Universal/openssl/opensslconf.h b/Pods/Headers/Private/OpenSSL-Universal/openssl/opensslconf.h new file mode 120000 index 00000000..61a95af3 --- /dev/null +++ b/Pods/Headers/Private/OpenSSL-Universal/openssl/opensslconf.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/opensslconf.h \ No newline at end of file diff --git a/Pods/Headers/Private/OpenSSL-Universal/openssl/opensslv.h b/Pods/Headers/Private/OpenSSL-Universal/openssl/opensslv.h new file mode 120000 index 00000000..ce4149a2 --- /dev/null +++ b/Pods/Headers/Private/OpenSSL-Universal/openssl/opensslv.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/opensslv.h \ No newline at end of file diff --git a/Pods/Headers/Private/OpenSSL-Universal/openssl/ossl_typ.h b/Pods/Headers/Private/OpenSSL-Universal/openssl/ossl_typ.h new file mode 120000 index 00000000..e048d087 --- /dev/null +++ b/Pods/Headers/Private/OpenSSL-Universal/openssl/ossl_typ.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/ossl_typ.h \ No newline at end of file diff --git a/Pods/Headers/Private/OpenSSL-Universal/openssl/pem.h b/Pods/Headers/Private/OpenSSL-Universal/openssl/pem.h new file mode 120000 index 00000000..4d0e1bc4 --- /dev/null +++ b/Pods/Headers/Private/OpenSSL-Universal/openssl/pem.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/pem.h \ No newline at end of file diff --git a/Pods/Headers/Private/OpenSSL-Universal/openssl/pem2.h b/Pods/Headers/Private/OpenSSL-Universal/openssl/pem2.h new file mode 120000 index 00000000..cb1dfbf9 --- /dev/null +++ b/Pods/Headers/Private/OpenSSL-Universal/openssl/pem2.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/pem2.h \ No newline at end of file diff --git a/Pods/Headers/Private/OpenSSL-Universal/openssl/pkcs12.h b/Pods/Headers/Private/OpenSSL-Universal/openssl/pkcs12.h new file mode 120000 index 00000000..c1f405f1 --- /dev/null +++ b/Pods/Headers/Private/OpenSSL-Universal/openssl/pkcs12.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/pkcs12.h \ No newline at end of file diff --git a/Pods/Headers/Private/OpenSSL-Universal/openssl/pkcs7.h b/Pods/Headers/Private/OpenSSL-Universal/openssl/pkcs7.h new file mode 120000 index 00000000..7553e5d0 --- /dev/null +++ b/Pods/Headers/Private/OpenSSL-Universal/openssl/pkcs7.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/pkcs7.h \ No newline at end of file diff --git a/Pods/Headers/Private/OpenSSL-Universal/openssl/pqueue.h b/Pods/Headers/Private/OpenSSL-Universal/openssl/pqueue.h new file mode 120000 index 00000000..72f40be5 --- /dev/null +++ b/Pods/Headers/Private/OpenSSL-Universal/openssl/pqueue.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/pqueue.h \ No newline at end of file diff --git a/Pods/Headers/Private/OpenSSL-Universal/openssl/rand.h b/Pods/Headers/Private/OpenSSL-Universal/openssl/rand.h new file mode 120000 index 00000000..ff68df2c --- /dev/null +++ b/Pods/Headers/Private/OpenSSL-Universal/openssl/rand.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/rand.h \ No newline at end of file diff --git a/Pods/Headers/Private/OpenSSL-Universal/openssl/rc2.h b/Pods/Headers/Private/OpenSSL-Universal/openssl/rc2.h new file mode 120000 index 00000000..f4da7193 --- /dev/null +++ b/Pods/Headers/Private/OpenSSL-Universal/openssl/rc2.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/rc2.h \ No newline at end of file diff --git a/Pods/Headers/Private/OpenSSL-Universal/openssl/rc4.h b/Pods/Headers/Private/OpenSSL-Universal/openssl/rc4.h new file mode 120000 index 00000000..d491716a --- /dev/null +++ b/Pods/Headers/Private/OpenSSL-Universal/openssl/rc4.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/rc4.h \ No newline at end of file diff --git a/Pods/Headers/Private/OpenSSL-Universal/openssl/ripemd.h b/Pods/Headers/Private/OpenSSL-Universal/openssl/ripemd.h new file mode 120000 index 00000000..ff4cfbd8 --- /dev/null +++ b/Pods/Headers/Private/OpenSSL-Universal/openssl/ripemd.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/ripemd.h \ No newline at end of file diff --git a/Pods/Headers/Private/OpenSSL-Universal/openssl/rsa.h b/Pods/Headers/Private/OpenSSL-Universal/openssl/rsa.h new file mode 120000 index 00000000..a12f4c04 --- /dev/null +++ b/Pods/Headers/Private/OpenSSL-Universal/openssl/rsa.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/rsa.h \ No newline at end of file diff --git a/Pods/Headers/Private/OpenSSL-Universal/openssl/safestack.h b/Pods/Headers/Private/OpenSSL-Universal/openssl/safestack.h new file mode 120000 index 00000000..42c9170c --- /dev/null +++ b/Pods/Headers/Private/OpenSSL-Universal/openssl/safestack.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/safestack.h \ No newline at end of file diff --git a/Pods/Headers/Private/OpenSSL-Universal/openssl/seed.h b/Pods/Headers/Private/OpenSSL-Universal/openssl/seed.h new file mode 120000 index 00000000..36b51715 --- /dev/null +++ b/Pods/Headers/Private/OpenSSL-Universal/openssl/seed.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/seed.h \ No newline at end of file diff --git a/Pods/Headers/Private/OpenSSL-Universal/openssl/sha.h b/Pods/Headers/Private/OpenSSL-Universal/openssl/sha.h new file mode 120000 index 00000000..ac9a50ef --- /dev/null +++ b/Pods/Headers/Private/OpenSSL-Universal/openssl/sha.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/sha.h \ No newline at end of file diff --git a/Pods/Headers/Private/OpenSSL-Universal/openssl/srp.h b/Pods/Headers/Private/OpenSSL-Universal/openssl/srp.h new file mode 120000 index 00000000..a659a48b --- /dev/null +++ b/Pods/Headers/Private/OpenSSL-Universal/openssl/srp.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/srp.h \ No newline at end of file diff --git a/Pods/Headers/Private/OpenSSL-Universal/openssl/srtp.h b/Pods/Headers/Private/OpenSSL-Universal/openssl/srtp.h new file mode 120000 index 00000000..8f72423a --- /dev/null +++ b/Pods/Headers/Private/OpenSSL-Universal/openssl/srtp.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/srtp.h \ No newline at end of file diff --git a/Pods/Headers/Private/OpenSSL-Universal/openssl/ssl.h b/Pods/Headers/Private/OpenSSL-Universal/openssl/ssl.h new file mode 120000 index 00000000..e99ba709 --- /dev/null +++ b/Pods/Headers/Private/OpenSSL-Universal/openssl/ssl.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/ssl.h \ No newline at end of file diff --git a/Pods/Headers/Private/OpenSSL-Universal/openssl/ssl2.h b/Pods/Headers/Private/OpenSSL-Universal/openssl/ssl2.h new file mode 120000 index 00000000..3dc176f7 --- /dev/null +++ b/Pods/Headers/Private/OpenSSL-Universal/openssl/ssl2.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/ssl2.h \ No newline at end of file diff --git a/Pods/Headers/Private/OpenSSL-Universal/openssl/ssl23.h b/Pods/Headers/Private/OpenSSL-Universal/openssl/ssl23.h new file mode 120000 index 00000000..68ad0b34 --- /dev/null +++ b/Pods/Headers/Private/OpenSSL-Universal/openssl/ssl23.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/ssl23.h \ No newline at end of file diff --git a/Pods/Headers/Private/OpenSSL-Universal/openssl/ssl3.h b/Pods/Headers/Private/OpenSSL-Universal/openssl/ssl3.h new file mode 120000 index 00000000..33ba7e0f --- /dev/null +++ b/Pods/Headers/Private/OpenSSL-Universal/openssl/ssl3.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/ssl3.h \ No newline at end of file diff --git a/Pods/Headers/Private/OpenSSL-Universal/openssl/stack.h b/Pods/Headers/Private/OpenSSL-Universal/openssl/stack.h new file mode 120000 index 00000000..29fdb6bc --- /dev/null +++ b/Pods/Headers/Private/OpenSSL-Universal/openssl/stack.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/stack.h \ No newline at end of file diff --git a/Pods/Headers/Private/OpenSSL-Universal/openssl/symhacks.h b/Pods/Headers/Private/OpenSSL-Universal/openssl/symhacks.h new file mode 120000 index 00000000..d8ff562f --- /dev/null +++ b/Pods/Headers/Private/OpenSSL-Universal/openssl/symhacks.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/symhacks.h \ No newline at end of file diff --git a/Pods/Headers/Private/OpenSSL-Universal/openssl/tls1.h b/Pods/Headers/Private/OpenSSL-Universal/openssl/tls1.h new file mode 120000 index 00000000..c7ab3697 --- /dev/null +++ b/Pods/Headers/Private/OpenSSL-Universal/openssl/tls1.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/tls1.h \ No newline at end of file diff --git a/Pods/Headers/Private/OpenSSL-Universal/openssl/ts.h b/Pods/Headers/Private/OpenSSL-Universal/openssl/ts.h new file mode 120000 index 00000000..72d043ea --- /dev/null +++ b/Pods/Headers/Private/OpenSSL-Universal/openssl/ts.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/ts.h \ No newline at end of file diff --git a/Pods/Headers/Private/OpenSSL-Universal/openssl/txt_db.h b/Pods/Headers/Private/OpenSSL-Universal/openssl/txt_db.h new file mode 120000 index 00000000..bda109a3 --- /dev/null +++ b/Pods/Headers/Private/OpenSSL-Universal/openssl/txt_db.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/txt_db.h \ No newline at end of file diff --git a/Pods/Headers/Private/OpenSSL-Universal/openssl/ui.h b/Pods/Headers/Private/OpenSSL-Universal/openssl/ui.h new file mode 120000 index 00000000..28932343 --- /dev/null +++ b/Pods/Headers/Private/OpenSSL-Universal/openssl/ui.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/ui.h \ No newline at end of file diff --git a/Pods/Headers/Private/OpenSSL-Universal/openssl/ui_compat.h b/Pods/Headers/Private/OpenSSL-Universal/openssl/ui_compat.h new file mode 120000 index 00000000..ba514f45 --- /dev/null +++ b/Pods/Headers/Private/OpenSSL-Universal/openssl/ui_compat.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/ui_compat.h \ No newline at end of file diff --git a/Pods/Headers/Private/OpenSSL-Universal/openssl/whrlpool.h b/Pods/Headers/Private/OpenSSL-Universal/openssl/whrlpool.h new file mode 120000 index 00000000..64c4e2a6 --- /dev/null +++ b/Pods/Headers/Private/OpenSSL-Universal/openssl/whrlpool.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/whrlpool.h \ No newline at end of file diff --git a/Pods/Headers/Private/OpenSSL-Universal/openssl/x509.h b/Pods/Headers/Private/OpenSSL-Universal/openssl/x509.h new file mode 120000 index 00000000..261d7837 --- /dev/null +++ b/Pods/Headers/Private/OpenSSL-Universal/openssl/x509.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/x509.h \ No newline at end of file diff --git a/Pods/Headers/Private/OpenSSL-Universal/openssl/x509_vfy.h b/Pods/Headers/Private/OpenSSL-Universal/openssl/x509_vfy.h new file mode 120000 index 00000000..4c24393e --- /dev/null +++ b/Pods/Headers/Private/OpenSSL-Universal/openssl/x509_vfy.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/x509_vfy.h \ No newline at end of file diff --git a/Pods/Headers/Private/OpenSSL-Universal/openssl/x509v3.h b/Pods/Headers/Private/OpenSSL-Universal/openssl/x509v3.h new file mode 120000 index 00000000..0c062917 --- /dev/null +++ b/Pods/Headers/Private/OpenSSL-Universal/openssl/x509v3.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/x509v3.h \ No newline at end of file diff --git a/Pods/Headers/Public/OpenSSL-Universal/openssl/aes.h b/Pods/Headers/Public/OpenSSL-Universal/openssl/aes.h new file mode 120000 index 00000000..5ac13ea3 --- /dev/null +++ b/Pods/Headers/Public/OpenSSL-Universal/openssl/aes.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/aes.h \ No newline at end of file diff --git a/Pods/Headers/Public/OpenSSL-Universal/openssl/asn1.h b/Pods/Headers/Public/OpenSSL-Universal/openssl/asn1.h new file mode 120000 index 00000000..8a9b42b1 --- /dev/null +++ b/Pods/Headers/Public/OpenSSL-Universal/openssl/asn1.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/asn1.h \ No newline at end of file diff --git a/Pods/Headers/Public/OpenSSL-Universal/openssl/asn1_mac.h b/Pods/Headers/Public/OpenSSL-Universal/openssl/asn1_mac.h new file mode 120000 index 00000000..eb702c90 --- /dev/null +++ b/Pods/Headers/Public/OpenSSL-Universal/openssl/asn1_mac.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/asn1_mac.h \ No newline at end of file diff --git a/Pods/Headers/Public/OpenSSL-Universal/openssl/asn1t.h b/Pods/Headers/Public/OpenSSL-Universal/openssl/asn1t.h new file mode 120000 index 00000000..ca2c71b0 --- /dev/null +++ b/Pods/Headers/Public/OpenSSL-Universal/openssl/asn1t.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/asn1t.h \ No newline at end of file diff --git a/Pods/Headers/Public/OpenSSL-Universal/openssl/bio.h b/Pods/Headers/Public/OpenSSL-Universal/openssl/bio.h new file mode 120000 index 00000000..5e22b187 --- /dev/null +++ b/Pods/Headers/Public/OpenSSL-Universal/openssl/bio.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/bio.h \ No newline at end of file diff --git a/Pods/Headers/Public/OpenSSL-Universal/openssl/blowfish.h b/Pods/Headers/Public/OpenSSL-Universal/openssl/blowfish.h new file mode 120000 index 00000000..1e900bae --- /dev/null +++ b/Pods/Headers/Public/OpenSSL-Universal/openssl/blowfish.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/blowfish.h \ No newline at end of file diff --git a/Pods/Headers/Public/OpenSSL-Universal/openssl/bn.h b/Pods/Headers/Public/OpenSSL-Universal/openssl/bn.h new file mode 120000 index 00000000..2f687a98 --- /dev/null +++ b/Pods/Headers/Public/OpenSSL-Universal/openssl/bn.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/bn.h \ No newline at end of file diff --git a/Pods/Headers/Public/OpenSSL-Universal/openssl/buffer.h b/Pods/Headers/Public/OpenSSL-Universal/openssl/buffer.h new file mode 120000 index 00000000..ab3cbb66 --- /dev/null +++ b/Pods/Headers/Public/OpenSSL-Universal/openssl/buffer.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/buffer.h \ No newline at end of file diff --git a/Pods/Headers/Public/OpenSSL-Universal/openssl/camellia.h b/Pods/Headers/Public/OpenSSL-Universal/openssl/camellia.h new file mode 120000 index 00000000..36ad7094 --- /dev/null +++ b/Pods/Headers/Public/OpenSSL-Universal/openssl/camellia.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/camellia.h \ No newline at end of file diff --git a/Pods/Headers/Public/OpenSSL-Universal/openssl/cast.h b/Pods/Headers/Public/OpenSSL-Universal/openssl/cast.h new file mode 120000 index 00000000..802b1e26 --- /dev/null +++ b/Pods/Headers/Public/OpenSSL-Universal/openssl/cast.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/cast.h \ No newline at end of file diff --git a/Pods/Headers/Public/OpenSSL-Universal/openssl/cmac.h b/Pods/Headers/Public/OpenSSL-Universal/openssl/cmac.h new file mode 120000 index 00000000..ba473991 --- /dev/null +++ b/Pods/Headers/Public/OpenSSL-Universal/openssl/cmac.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/cmac.h \ No newline at end of file diff --git a/Pods/Headers/Public/OpenSSL-Universal/openssl/cms.h b/Pods/Headers/Public/OpenSSL-Universal/openssl/cms.h new file mode 120000 index 00000000..023d8fe9 --- /dev/null +++ b/Pods/Headers/Public/OpenSSL-Universal/openssl/cms.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/cms.h \ No newline at end of file diff --git a/Pods/Headers/Public/OpenSSL-Universal/openssl/comp.h b/Pods/Headers/Public/OpenSSL-Universal/openssl/comp.h new file mode 120000 index 00000000..ffcc7ef1 --- /dev/null +++ b/Pods/Headers/Public/OpenSSL-Universal/openssl/comp.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/comp.h \ No newline at end of file diff --git a/Pods/Headers/Public/OpenSSL-Universal/openssl/conf.h b/Pods/Headers/Public/OpenSSL-Universal/openssl/conf.h new file mode 120000 index 00000000..c74a3a98 --- /dev/null +++ b/Pods/Headers/Public/OpenSSL-Universal/openssl/conf.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/conf.h \ No newline at end of file diff --git a/Pods/Headers/Public/OpenSSL-Universal/openssl/conf_api.h b/Pods/Headers/Public/OpenSSL-Universal/openssl/conf_api.h new file mode 120000 index 00000000..f49cca1b --- /dev/null +++ b/Pods/Headers/Public/OpenSSL-Universal/openssl/conf_api.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/conf_api.h \ No newline at end of file diff --git a/Pods/Headers/Public/OpenSSL-Universal/openssl/crypto.h b/Pods/Headers/Public/OpenSSL-Universal/openssl/crypto.h new file mode 120000 index 00000000..76cd62f2 --- /dev/null +++ b/Pods/Headers/Public/OpenSSL-Universal/openssl/crypto.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/crypto.h \ No newline at end of file diff --git a/Pods/Headers/Public/OpenSSL-Universal/openssl/des.h b/Pods/Headers/Public/OpenSSL-Universal/openssl/des.h new file mode 120000 index 00000000..6517234f --- /dev/null +++ b/Pods/Headers/Public/OpenSSL-Universal/openssl/des.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/des.h \ No newline at end of file diff --git a/Pods/Headers/Public/OpenSSL-Universal/openssl/des_old.h b/Pods/Headers/Public/OpenSSL-Universal/openssl/des_old.h new file mode 120000 index 00000000..6798ab42 --- /dev/null +++ b/Pods/Headers/Public/OpenSSL-Universal/openssl/des_old.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/des_old.h \ No newline at end of file diff --git a/Pods/Headers/Public/OpenSSL-Universal/openssl/dh.h b/Pods/Headers/Public/OpenSSL-Universal/openssl/dh.h new file mode 120000 index 00000000..55041546 --- /dev/null +++ b/Pods/Headers/Public/OpenSSL-Universal/openssl/dh.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/dh.h \ No newline at end of file diff --git a/Pods/Headers/Public/OpenSSL-Universal/openssl/dsa.h b/Pods/Headers/Public/OpenSSL-Universal/openssl/dsa.h new file mode 120000 index 00000000..02f6474e --- /dev/null +++ b/Pods/Headers/Public/OpenSSL-Universal/openssl/dsa.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/dsa.h \ No newline at end of file diff --git a/Pods/Headers/Public/OpenSSL-Universal/openssl/dso.h b/Pods/Headers/Public/OpenSSL-Universal/openssl/dso.h new file mode 120000 index 00000000..0f7aca0c --- /dev/null +++ b/Pods/Headers/Public/OpenSSL-Universal/openssl/dso.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/dso.h \ No newline at end of file diff --git a/Pods/Headers/Public/OpenSSL-Universal/openssl/dtls1.h b/Pods/Headers/Public/OpenSSL-Universal/openssl/dtls1.h new file mode 120000 index 00000000..3724ff70 --- /dev/null +++ b/Pods/Headers/Public/OpenSSL-Universal/openssl/dtls1.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/dtls1.h \ No newline at end of file diff --git a/Pods/Headers/Public/OpenSSL-Universal/openssl/e_os2.h b/Pods/Headers/Public/OpenSSL-Universal/openssl/e_os2.h new file mode 120000 index 00000000..4f9bdceb --- /dev/null +++ b/Pods/Headers/Public/OpenSSL-Universal/openssl/e_os2.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/e_os2.h \ No newline at end of file diff --git a/Pods/Headers/Public/OpenSSL-Universal/openssl/ebcdic.h b/Pods/Headers/Public/OpenSSL-Universal/openssl/ebcdic.h new file mode 120000 index 00000000..6d9c0ea0 --- /dev/null +++ b/Pods/Headers/Public/OpenSSL-Universal/openssl/ebcdic.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/ebcdic.h \ No newline at end of file diff --git a/Pods/Headers/Public/OpenSSL-Universal/openssl/ec.h b/Pods/Headers/Public/OpenSSL-Universal/openssl/ec.h new file mode 120000 index 00000000..fa89bf82 --- /dev/null +++ b/Pods/Headers/Public/OpenSSL-Universal/openssl/ec.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/ec.h \ No newline at end of file diff --git a/Pods/Headers/Public/OpenSSL-Universal/openssl/ecdh.h b/Pods/Headers/Public/OpenSSL-Universal/openssl/ecdh.h new file mode 120000 index 00000000..2b1ad6e6 --- /dev/null +++ b/Pods/Headers/Public/OpenSSL-Universal/openssl/ecdh.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/ecdh.h \ No newline at end of file diff --git a/Pods/Headers/Public/OpenSSL-Universal/openssl/ecdsa.h b/Pods/Headers/Public/OpenSSL-Universal/openssl/ecdsa.h new file mode 120000 index 00000000..f8bcffdf --- /dev/null +++ b/Pods/Headers/Public/OpenSSL-Universal/openssl/ecdsa.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/ecdsa.h \ No newline at end of file diff --git a/Pods/Headers/Public/OpenSSL-Universal/openssl/engine.h b/Pods/Headers/Public/OpenSSL-Universal/openssl/engine.h new file mode 120000 index 00000000..c2fd1ebb --- /dev/null +++ b/Pods/Headers/Public/OpenSSL-Universal/openssl/engine.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/engine.h \ No newline at end of file diff --git a/Pods/Headers/Public/OpenSSL-Universal/openssl/err.h b/Pods/Headers/Public/OpenSSL-Universal/openssl/err.h new file mode 120000 index 00000000..d9bc380e --- /dev/null +++ b/Pods/Headers/Public/OpenSSL-Universal/openssl/err.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/err.h \ No newline at end of file diff --git a/Pods/Headers/Public/OpenSSL-Universal/openssl/evp.h b/Pods/Headers/Public/OpenSSL-Universal/openssl/evp.h new file mode 120000 index 00000000..93f6eb7c --- /dev/null +++ b/Pods/Headers/Public/OpenSSL-Universal/openssl/evp.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/evp.h \ No newline at end of file diff --git a/Pods/Headers/Public/OpenSSL-Universal/openssl/hmac.h b/Pods/Headers/Public/OpenSSL-Universal/openssl/hmac.h new file mode 120000 index 00000000..268e9e1b --- /dev/null +++ b/Pods/Headers/Public/OpenSSL-Universal/openssl/hmac.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/hmac.h \ No newline at end of file diff --git a/Pods/Headers/Public/OpenSSL-Universal/openssl/idea.h b/Pods/Headers/Public/OpenSSL-Universal/openssl/idea.h new file mode 120000 index 00000000..07b503cc --- /dev/null +++ b/Pods/Headers/Public/OpenSSL-Universal/openssl/idea.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/idea.h \ No newline at end of file diff --git a/Pods/Headers/Public/OpenSSL-Universal/openssl/krb5_asn.h b/Pods/Headers/Public/OpenSSL-Universal/openssl/krb5_asn.h new file mode 120000 index 00000000..506cde6f --- /dev/null +++ b/Pods/Headers/Public/OpenSSL-Universal/openssl/krb5_asn.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/krb5_asn.h \ No newline at end of file diff --git a/Pods/Headers/Public/OpenSSL-Universal/openssl/kssl.h b/Pods/Headers/Public/OpenSSL-Universal/openssl/kssl.h new file mode 120000 index 00000000..7bd572cc --- /dev/null +++ b/Pods/Headers/Public/OpenSSL-Universal/openssl/kssl.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/kssl.h \ No newline at end of file diff --git a/Pods/Headers/Public/OpenSSL-Universal/openssl/lhash.h b/Pods/Headers/Public/OpenSSL-Universal/openssl/lhash.h new file mode 120000 index 00000000..14f0e7c0 --- /dev/null +++ b/Pods/Headers/Public/OpenSSL-Universal/openssl/lhash.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/lhash.h \ No newline at end of file diff --git a/Pods/Headers/Public/OpenSSL-Universal/openssl/md4.h b/Pods/Headers/Public/OpenSSL-Universal/openssl/md4.h new file mode 120000 index 00000000..933005d1 --- /dev/null +++ b/Pods/Headers/Public/OpenSSL-Universal/openssl/md4.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/md4.h \ No newline at end of file diff --git a/Pods/Headers/Public/OpenSSL-Universal/openssl/md5.h b/Pods/Headers/Public/OpenSSL-Universal/openssl/md5.h new file mode 120000 index 00000000..2976a29f --- /dev/null +++ b/Pods/Headers/Public/OpenSSL-Universal/openssl/md5.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/md5.h \ No newline at end of file diff --git a/Pods/Headers/Public/OpenSSL-Universal/openssl/mdc2.h b/Pods/Headers/Public/OpenSSL-Universal/openssl/mdc2.h new file mode 120000 index 00000000..f6604481 --- /dev/null +++ b/Pods/Headers/Public/OpenSSL-Universal/openssl/mdc2.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/mdc2.h \ No newline at end of file diff --git a/Pods/Headers/Public/OpenSSL-Universal/openssl/modes.h b/Pods/Headers/Public/OpenSSL-Universal/openssl/modes.h new file mode 120000 index 00000000..ab014ac0 --- /dev/null +++ b/Pods/Headers/Public/OpenSSL-Universal/openssl/modes.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/modes.h \ No newline at end of file diff --git a/Pods/Headers/Public/OpenSSL-Universal/openssl/obj_mac.h b/Pods/Headers/Public/OpenSSL-Universal/openssl/obj_mac.h new file mode 120000 index 00000000..e59e6b64 --- /dev/null +++ b/Pods/Headers/Public/OpenSSL-Universal/openssl/obj_mac.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/obj_mac.h \ No newline at end of file diff --git a/Pods/Headers/Public/OpenSSL-Universal/openssl/objects.h b/Pods/Headers/Public/OpenSSL-Universal/openssl/objects.h new file mode 120000 index 00000000..5a9b15bf --- /dev/null +++ b/Pods/Headers/Public/OpenSSL-Universal/openssl/objects.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/objects.h \ No newline at end of file diff --git a/Pods/Headers/Public/OpenSSL-Universal/openssl/ocsp.h b/Pods/Headers/Public/OpenSSL-Universal/openssl/ocsp.h new file mode 120000 index 00000000..901097d9 --- /dev/null +++ b/Pods/Headers/Public/OpenSSL-Universal/openssl/ocsp.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/ocsp.h \ No newline at end of file diff --git a/Pods/Headers/Public/OpenSSL-Universal/openssl/opensslconf.h b/Pods/Headers/Public/OpenSSL-Universal/openssl/opensslconf.h new file mode 120000 index 00000000..61a95af3 --- /dev/null +++ b/Pods/Headers/Public/OpenSSL-Universal/openssl/opensslconf.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/opensslconf.h \ No newline at end of file diff --git a/Pods/Headers/Public/OpenSSL-Universal/openssl/opensslv.h b/Pods/Headers/Public/OpenSSL-Universal/openssl/opensslv.h new file mode 120000 index 00000000..ce4149a2 --- /dev/null +++ b/Pods/Headers/Public/OpenSSL-Universal/openssl/opensslv.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/opensslv.h \ No newline at end of file diff --git a/Pods/Headers/Public/OpenSSL-Universal/openssl/ossl_typ.h b/Pods/Headers/Public/OpenSSL-Universal/openssl/ossl_typ.h new file mode 120000 index 00000000..e048d087 --- /dev/null +++ b/Pods/Headers/Public/OpenSSL-Universal/openssl/ossl_typ.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/ossl_typ.h \ No newline at end of file diff --git a/Pods/Headers/Public/OpenSSL-Universal/openssl/pem.h b/Pods/Headers/Public/OpenSSL-Universal/openssl/pem.h new file mode 120000 index 00000000..4d0e1bc4 --- /dev/null +++ b/Pods/Headers/Public/OpenSSL-Universal/openssl/pem.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/pem.h \ No newline at end of file diff --git a/Pods/Headers/Public/OpenSSL-Universal/openssl/pem2.h b/Pods/Headers/Public/OpenSSL-Universal/openssl/pem2.h new file mode 120000 index 00000000..cb1dfbf9 --- /dev/null +++ b/Pods/Headers/Public/OpenSSL-Universal/openssl/pem2.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/pem2.h \ No newline at end of file diff --git a/Pods/Headers/Public/OpenSSL-Universal/openssl/pkcs12.h b/Pods/Headers/Public/OpenSSL-Universal/openssl/pkcs12.h new file mode 120000 index 00000000..c1f405f1 --- /dev/null +++ b/Pods/Headers/Public/OpenSSL-Universal/openssl/pkcs12.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/pkcs12.h \ No newline at end of file diff --git a/Pods/Headers/Public/OpenSSL-Universal/openssl/pkcs7.h b/Pods/Headers/Public/OpenSSL-Universal/openssl/pkcs7.h new file mode 120000 index 00000000..7553e5d0 --- /dev/null +++ b/Pods/Headers/Public/OpenSSL-Universal/openssl/pkcs7.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/pkcs7.h \ No newline at end of file diff --git a/Pods/Headers/Public/OpenSSL-Universal/openssl/pqueue.h b/Pods/Headers/Public/OpenSSL-Universal/openssl/pqueue.h new file mode 120000 index 00000000..72f40be5 --- /dev/null +++ b/Pods/Headers/Public/OpenSSL-Universal/openssl/pqueue.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/pqueue.h \ No newline at end of file diff --git a/Pods/Headers/Public/OpenSSL-Universal/openssl/rand.h b/Pods/Headers/Public/OpenSSL-Universal/openssl/rand.h new file mode 120000 index 00000000..ff68df2c --- /dev/null +++ b/Pods/Headers/Public/OpenSSL-Universal/openssl/rand.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/rand.h \ No newline at end of file diff --git a/Pods/Headers/Public/OpenSSL-Universal/openssl/rc2.h b/Pods/Headers/Public/OpenSSL-Universal/openssl/rc2.h new file mode 120000 index 00000000..f4da7193 --- /dev/null +++ b/Pods/Headers/Public/OpenSSL-Universal/openssl/rc2.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/rc2.h \ No newline at end of file diff --git a/Pods/Headers/Public/OpenSSL-Universal/openssl/rc4.h b/Pods/Headers/Public/OpenSSL-Universal/openssl/rc4.h new file mode 120000 index 00000000..d491716a --- /dev/null +++ b/Pods/Headers/Public/OpenSSL-Universal/openssl/rc4.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/rc4.h \ No newline at end of file diff --git a/Pods/Headers/Public/OpenSSL-Universal/openssl/ripemd.h b/Pods/Headers/Public/OpenSSL-Universal/openssl/ripemd.h new file mode 120000 index 00000000..ff4cfbd8 --- /dev/null +++ b/Pods/Headers/Public/OpenSSL-Universal/openssl/ripemd.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/ripemd.h \ No newline at end of file diff --git a/Pods/Headers/Public/OpenSSL-Universal/openssl/rsa.h b/Pods/Headers/Public/OpenSSL-Universal/openssl/rsa.h new file mode 120000 index 00000000..a12f4c04 --- /dev/null +++ b/Pods/Headers/Public/OpenSSL-Universal/openssl/rsa.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/rsa.h \ No newline at end of file diff --git a/Pods/Headers/Public/OpenSSL-Universal/openssl/safestack.h b/Pods/Headers/Public/OpenSSL-Universal/openssl/safestack.h new file mode 120000 index 00000000..42c9170c --- /dev/null +++ b/Pods/Headers/Public/OpenSSL-Universal/openssl/safestack.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/safestack.h \ No newline at end of file diff --git a/Pods/Headers/Public/OpenSSL-Universal/openssl/seed.h b/Pods/Headers/Public/OpenSSL-Universal/openssl/seed.h new file mode 120000 index 00000000..36b51715 --- /dev/null +++ b/Pods/Headers/Public/OpenSSL-Universal/openssl/seed.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/seed.h \ No newline at end of file diff --git a/Pods/Headers/Public/OpenSSL-Universal/openssl/sha.h b/Pods/Headers/Public/OpenSSL-Universal/openssl/sha.h new file mode 120000 index 00000000..ac9a50ef --- /dev/null +++ b/Pods/Headers/Public/OpenSSL-Universal/openssl/sha.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/sha.h \ No newline at end of file diff --git a/Pods/Headers/Public/OpenSSL-Universal/openssl/srp.h b/Pods/Headers/Public/OpenSSL-Universal/openssl/srp.h new file mode 120000 index 00000000..a659a48b --- /dev/null +++ b/Pods/Headers/Public/OpenSSL-Universal/openssl/srp.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/srp.h \ No newline at end of file diff --git a/Pods/Headers/Public/OpenSSL-Universal/openssl/srtp.h b/Pods/Headers/Public/OpenSSL-Universal/openssl/srtp.h new file mode 120000 index 00000000..8f72423a --- /dev/null +++ b/Pods/Headers/Public/OpenSSL-Universal/openssl/srtp.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/srtp.h \ No newline at end of file diff --git a/Pods/Headers/Public/OpenSSL-Universal/openssl/ssl.h b/Pods/Headers/Public/OpenSSL-Universal/openssl/ssl.h new file mode 120000 index 00000000..e99ba709 --- /dev/null +++ b/Pods/Headers/Public/OpenSSL-Universal/openssl/ssl.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/ssl.h \ No newline at end of file diff --git a/Pods/Headers/Public/OpenSSL-Universal/openssl/ssl2.h b/Pods/Headers/Public/OpenSSL-Universal/openssl/ssl2.h new file mode 120000 index 00000000..3dc176f7 --- /dev/null +++ b/Pods/Headers/Public/OpenSSL-Universal/openssl/ssl2.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/ssl2.h \ No newline at end of file diff --git a/Pods/Headers/Public/OpenSSL-Universal/openssl/ssl23.h b/Pods/Headers/Public/OpenSSL-Universal/openssl/ssl23.h new file mode 120000 index 00000000..68ad0b34 --- /dev/null +++ b/Pods/Headers/Public/OpenSSL-Universal/openssl/ssl23.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/ssl23.h \ No newline at end of file diff --git a/Pods/Headers/Public/OpenSSL-Universal/openssl/ssl3.h b/Pods/Headers/Public/OpenSSL-Universal/openssl/ssl3.h new file mode 120000 index 00000000..33ba7e0f --- /dev/null +++ b/Pods/Headers/Public/OpenSSL-Universal/openssl/ssl3.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/ssl3.h \ No newline at end of file diff --git a/Pods/Headers/Public/OpenSSL-Universal/openssl/stack.h b/Pods/Headers/Public/OpenSSL-Universal/openssl/stack.h new file mode 120000 index 00000000..29fdb6bc --- /dev/null +++ b/Pods/Headers/Public/OpenSSL-Universal/openssl/stack.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/stack.h \ No newline at end of file diff --git a/Pods/Headers/Public/OpenSSL-Universal/openssl/symhacks.h b/Pods/Headers/Public/OpenSSL-Universal/openssl/symhacks.h new file mode 120000 index 00000000..d8ff562f --- /dev/null +++ b/Pods/Headers/Public/OpenSSL-Universal/openssl/symhacks.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/symhacks.h \ No newline at end of file diff --git a/Pods/Headers/Public/OpenSSL-Universal/openssl/tls1.h b/Pods/Headers/Public/OpenSSL-Universal/openssl/tls1.h new file mode 120000 index 00000000..c7ab3697 --- /dev/null +++ b/Pods/Headers/Public/OpenSSL-Universal/openssl/tls1.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/tls1.h \ No newline at end of file diff --git a/Pods/Headers/Public/OpenSSL-Universal/openssl/ts.h b/Pods/Headers/Public/OpenSSL-Universal/openssl/ts.h new file mode 120000 index 00000000..72d043ea --- /dev/null +++ b/Pods/Headers/Public/OpenSSL-Universal/openssl/ts.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/ts.h \ No newline at end of file diff --git a/Pods/Headers/Public/OpenSSL-Universal/openssl/txt_db.h b/Pods/Headers/Public/OpenSSL-Universal/openssl/txt_db.h new file mode 120000 index 00000000..bda109a3 --- /dev/null +++ b/Pods/Headers/Public/OpenSSL-Universal/openssl/txt_db.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/txt_db.h \ No newline at end of file diff --git a/Pods/Headers/Public/OpenSSL-Universal/openssl/ui.h b/Pods/Headers/Public/OpenSSL-Universal/openssl/ui.h new file mode 120000 index 00000000..28932343 --- /dev/null +++ b/Pods/Headers/Public/OpenSSL-Universal/openssl/ui.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/ui.h \ No newline at end of file diff --git a/Pods/Headers/Public/OpenSSL-Universal/openssl/ui_compat.h b/Pods/Headers/Public/OpenSSL-Universal/openssl/ui_compat.h new file mode 120000 index 00000000..ba514f45 --- /dev/null +++ b/Pods/Headers/Public/OpenSSL-Universal/openssl/ui_compat.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/ui_compat.h \ No newline at end of file diff --git a/Pods/Headers/Public/OpenSSL-Universal/openssl/whrlpool.h b/Pods/Headers/Public/OpenSSL-Universal/openssl/whrlpool.h new file mode 120000 index 00000000..64c4e2a6 --- /dev/null +++ b/Pods/Headers/Public/OpenSSL-Universal/openssl/whrlpool.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/whrlpool.h \ No newline at end of file diff --git a/Pods/Headers/Public/OpenSSL-Universal/openssl/x509.h b/Pods/Headers/Public/OpenSSL-Universal/openssl/x509.h new file mode 120000 index 00000000..261d7837 --- /dev/null +++ b/Pods/Headers/Public/OpenSSL-Universal/openssl/x509.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/x509.h \ No newline at end of file diff --git a/Pods/Headers/Public/OpenSSL-Universal/openssl/x509_vfy.h b/Pods/Headers/Public/OpenSSL-Universal/openssl/x509_vfy.h new file mode 120000 index 00000000..4c24393e --- /dev/null +++ b/Pods/Headers/Public/OpenSSL-Universal/openssl/x509_vfy.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/x509_vfy.h \ No newline at end of file diff --git a/Pods/Headers/Public/OpenSSL-Universal/openssl/x509v3.h b/Pods/Headers/Public/OpenSSL-Universal/openssl/x509v3.h new file mode 120000 index 00000000..0c062917 --- /dev/null +++ b/Pods/Headers/Public/OpenSSL-Universal/openssl/x509v3.h @@ -0,0 +1 @@ +../../../../OpenSSL-Universal/include-ios/openssl/x509v3.h \ No newline at end of file diff --git a/Pods/Manifest.lock b/Pods/Manifest.lock index 4b59d370..3b376a62 100644 --- a/Pods/Manifest.lock +++ b/Pods/Manifest.lock @@ -1,10 +1,10 @@ PODS: - - OpenSSL-Universal (1.0.1.h) + - OpenSSL-Universal (1.0.1.k) DEPENDENCIES: - - OpenSSL-Universal + - OpenSSL-Universal (= 1.0.1.k) SPEC CHECKSUMS: - OpenSSL-Universal: 9c112508615ed33bb35f730eed820e93175a9dec + OpenSSL-Universal: 60ee5ddf6530100c0aa702c2e0c9881cfd4a89a5 -COCOAPODS: 0.33.1 +COCOAPODS: 0.36.0.beta.1 diff --git a/Pods/OpenSSL-Universal/README.md b/Pods/OpenSSL-Universal/README.md index 10a69e02..3cb6cf5c 100644 --- a/Pods/OpenSSL-Universal/README.md +++ b/Pods/OpenSSL-Universal/README.md @@ -3,7 +3,7 @@ OpenSSL-Universal OpenSSL CocoaPod for iOS and OSX. Complete solution to OpenSSL on iOS and OSX. Package came with precompiled libraries, and include script to build newer version if necessary. -Current version contains binaries build with SDK iOS 7.0 (target 5.1.1), and SDK OSX 10.9 (target 10.8) for all supported architectures. +Current version contains binaries build with SDK iOS 8.0 (target 5.1.1), and SDK OSX 10.9 (target 10.8) for all supported architectures. **Architectures** @@ -24,7 +24,7 @@ pod 'OpenSSL-Universal' Or always latest version ```` -pod 'OpenSSL-Universal', :git => 'https://github.com/krzak/OpenSSL.git', :branch => :master +pod 'OpenSSL-Universal', :git => 'https://github.com/krzyzanowskim/OpenSSL.git', :branch => :master ```` **Authors** diff --git a/Pods/OpenSSL-Universal/include-ios/openssl/asn1.h b/Pods/OpenSSL-Universal/include-ios/openssl/asn1.h index 220a0c8c..3c45d5d0 100644 --- a/Pods/OpenSSL-Universal/include-ios/openssl/asn1.h +++ b/Pods/OpenSSL-Universal/include-ios/openssl/asn1.h @@ -776,7 +776,7 @@ DECLARE_ASN1_FUNCTIONS_fname(ASN1_TYPE, ASN1_ANY, ASN1_TYPE) int ASN1_TYPE_get(ASN1_TYPE *a); void ASN1_TYPE_set(ASN1_TYPE *a, int type, void *value); int ASN1_TYPE_set1(ASN1_TYPE *a, int type, const void *value); -int ASN1_TYPE_cmp(ASN1_TYPE *a, ASN1_TYPE *b); +int ASN1_TYPE_cmp(const ASN1_TYPE *a, const ASN1_TYPE *b); ASN1_OBJECT * ASN1_OBJECT_new(void ); void ASN1_OBJECT_free(ASN1_OBJECT *a); @@ -1329,6 +1329,7 @@ void ERR_load_ASN1_strings(void); #define ASN1_R_ILLEGAL_TIME_VALUE 184 #define ASN1_R_INTEGER_NOT_ASCII_FORMAT 185 #define ASN1_R_INTEGER_TOO_LARGE_FOR_LONG 128 +#define ASN1_R_INVALID_BIT_STRING_BITS_LEFT 220 #define ASN1_R_INVALID_BMPSTRING_LENGTH 129 #define ASN1_R_INVALID_DIGIT 130 #define ASN1_R_INVALID_MIME_TYPE 205 @@ -1378,6 +1379,7 @@ void ERR_load_ASN1_strings(void); #define ASN1_R_TIME_NOT_ASCII_FORMAT 193 #define ASN1_R_TOO_LONG 155 #define ASN1_R_TYPE_NOT_CONSTRUCTED 156 +#define ASN1_R_TYPE_NOT_PRIMITIVE 218 #define ASN1_R_UNABLE_TO_DECODE_RSA_KEY 157 #define ASN1_R_UNABLE_TO_DECODE_RSA_PRIVATE_KEY 158 #define ASN1_R_UNEXPECTED_EOC 159 diff --git a/Pods/OpenSSL-Universal/include-ios/openssl/bio.h b/Pods/OpenSSL-Universal/include-ios/openssl/bio.h index 05699ab2..32eba714 100644 --- a/Pods/OpenSSL-Universal/include-ios/openssl/bio.h +++ b/Pods/OpenSSL-Universal/include-ios/openssl/bio.h @@ -175,6 +175,8 @@ extern "C" { #define BIO_CTRL_DGRAM_SET_NEXT_TIMEOUT 45 /* Next DTLS handshake timeout to * adjust socket timeouts */ +#define BIO_CTRL_DGRAM_GET_MTU_OVERHEAD 49 + #ifndef OPENSSL_NO_SCTP /* SCTP stuff */ #define BIO_CTRL_DGRAM_SCTP_SET_IN_HANDSHAKE 50 @@ -607,6 +609,8 @@ int BIO_ctrl_reset_read_request(BIO *b); (int)BIO_ctrl(b, BIO_CTRL_DGRAM_GET_PEER, 0, (char *)peer) #define BIO_dgram_set_peer(b,peer) \ (int)BIO_ctrl(b, BIO_CTRL_DGRAM_SET_PEER, 0, (char *)peer) +#define BIO_dgram_get_mtu_overhead(b) \ + (unsigned int)BIO_ctrl((b), BIO_CTRL_DGRAM_GET_MTU_OVERHEAD, 0, NULL) /* These two aren't currently implemented */ /* int BIO_get_ex_num(BIO *bio); */ diff --git a/Pods/OpenSSL-Universal/include-ios/openssl/bn.h b/Pods/OpenSSL-Universal/include-ios/openssl/bn.h index 21a1a3fe..c4d61852 100644 --- a/Pods/OpenSSL-Universal/include-ios/openssl/bn.h +++ b/Pods/OpenSSL-Universal/include-ios/openssl/bn.h @@ -780,7 +780,9 @@ int RAND_pseudo_bytes(unsigned char *buf,int num); #define bn_wcheck_size(bn, words) \ do { \ const BIGNUM *_bnum2 = (bn); \ - assert(words <= (_bnum2)->dmax && words >= (_bnum2)->top); \ + assert((words) <= (_bnum2)->dmax && (words) >= (_bnum2)->top); \ + /* avoid unused variable warning with NDEBUG */ \ + (void)(_bnum2); \ } while(0) #else /* !BN_DEBUG */ diff --git a/Pods/OpenSSL-Universal/include-ios/openssl/dtls1.h b/Pods/OpenSSL-Universal/include-ios/openssl/dtls1.h index e65d5011..33857526 100644 --- a/Pods/OpenSSL-Universal/include-ios/openssl/dtls1.h +++ b/Pods/OpenSSL-Universal/include-ios/openssl/dtls1.h @@ -84,6 +84,8 @@ extern "C" { #endif #define DTLS1_VERSION 0xFEFF +#define DTLS_MAX_VERSION DTLS1_VERSION + #define DTLS1_BAD_VER 0x0100 #if 0 @@ -115,6 +117,9 @@ extern "C" { #define DTLS1_SCTP_AUTH_LABEL "EXPORTER_DTLS_OVER_SCTP" #endif +/* Max MTU overhead we know about so far is 40 for IPv6 + 8 for UDP */ +#define DTLS1_MAX_MTU_OVERHEAD 48 + typedef struct dtls1_bitmap_st { unsigned long map; /* track 32 packets on 32-bit systems @@ -229,6 +234,7 @@ typedef struct dtls1_state_st /* Is set when listening for new connections with dtls1_listen() */ unsigned int listen; + unsigned int link_mtu; /* max on-the-wire DTLS packet size */ unsigned int mtu; /* max DTLS packet size */ struct hm_header_st w_msg_hdr; @@ -250,6 +256,10 @@ typedef struct dtls1_state_st unsigned int handshake_fragment_len; unsigned int retransmitting; + /* + * Set when the handshake is ready to process peer's ChangeCipherSpec message. + * Cleared after the message has been processed. + */ unsigned int change_cipher_spec_ok; #ifndef OPENSSL_NO_SCTP @@ -284,4 +294,3 @@ typedef struct dtls1_record_data_st } #endif #endif - diff --git a/Pods/OpenSSL-Universal/include-ios/openssl/ebcdic.h b/Pods/OpenSSL-Universal/include-ios/openssl/ebcdic.h index 6d65afcf..85f3cf7f 100644 --- a/Pods/OpenSSL-Universal/include-ios/openssl/ebcdic.h +++ b/Pods/OpenSSL-Universal/include-ios/openssl/ebcdic.h @@ -5,6 +5,10 @@ #include +#ifdef __cplusplus +extern "C" { +#endif + /* Avoid name clashes with other applications */ #define os_toascii _openssl_os_toascii #define os_toebcdic _openssl_os_toebcdic @@ -16,4 +20,7 @@ extern const unsigned char os_toebcdic[256]; void *ebcdic2ascii(void *dest, const void *srce, size_t count); void *ascii2ebcdic(void *dest, const void *srce, size_t count); +#ifdef __cplusplus +} +#endif #endif diff --git a/Pods/OpenSSL-Universal/include-ios/openssl/ec.h b/Pods/OpenSSL-Universal/include-ios/openssl/ec.h index dfe8710d..572111f1 100644 --- a/Pods/OpenSSL-Universal/include-ios/openssl/ec.h +++ b/Pods/OpenSSL-Universal/include-ios/openssl/ec.h @@ -629,7 +629,7 @@ int EC_POINT_cmp(const EC_GROUP *group, const EC_POINT *a, const EC_POINT *b, BN int EC_POINT_make_affine(const EC_GROUP *group, EC_POINT *point, BN_CTX *ctx); int EC_POINTs_make_affine(const EC_GROUP *group, size_t num, EC_POINT *points[], BN_CTX *ctx); -/** Computes r = generator * n sum_{i=0}^num p[i] * m[i] +/** Computes r = generator * n sum_{i=0}^{num-1} p[i] * m[i] * \param group underlying EC_GROUP object * \param r EC_POINT object for the result * \param n BIGNUM with the multiplier for the group generator (optional) diff --git a/Pods/OpenSSL-Universal/include-ios/openssl/modes.h b/Pods/OpenSSL-Universal/include-ios/openssl/modes.h index f18215bb..7773c254 100644 --- a/Pods/OpenSSL-Universal/include-ios/openssl/modes.h +++ b/Pods/OpenSSL-Universal/include-ios/openssl/modes.h @@ -7,6 +7,9 @@ #include +#ifdef __cplusplus +extern "C" { +#endif typedef void (*block128_f)(const unsigned char in[16], unsigned char out[16], const void *key); @@ -133,3 +136,6 @@ typedef struct xts128_context XTS128_CONTEXT; int CRYPTO_xts128_encrypt(const XTS128_CONTEXT *ctx, const unsigned char iv[16], const unsigned char *inp, unsigned char *out, size_t len, int enc); +#ifdef __cplusplus +} +#endif diff --git a/Pods/OpenSSL-Universal/include-ios/openssl/opensslconf.h b/Pods/OpenSSL-Universal/include-ios/openssl/opensslconf.h index 04a5c390..2df86d6b 100644 --- a/Pods/OpenSSL-Universal/include-ios/openssl/opensslconf.h +++ b/Pods/OpenSSL-Universal/include-ios/openssl/opensslconf.h @@ -1,6 +1,9 @@ /* opensslconf.h */ /* WARNING: Generated automatically from opensslconf.h.in by Configure. */ +#ifdef __cplusplus +extern "C" { +#endif /* OpenSSL was configured with the following options: */ #ifndef OPENSSL_SYSNAME_iOS # define OPENSSL_SYSNAME_iOS @@ -35,12 +38,18 @@ #ifndef OPENSSL_NO_STORE # define OPENSSL_NO_STORE #endif +#ifndef OPENSSL_NO_UNIT_TEST +# define OPENSSL_NO_UNIT_TEST +#endif #endif /* OPENSSL_DOING_MAKEDEPEND */ #ifndef OPENSSL_THREADS # define OPENSSL_THREADS #endif +#ifndef OPENSSL_NO_ASM +# define OPENSSL_NO_ASM +#endif #ifndef OPENSSL_NO_DYNAMIC_ENGINE # define OPENSSL_NO_DYNAMIC_ENGINE #endif @@ -77,6 +86,9 @@ # if defined(OPENSSL_NO_STORE) && !defined(NO_STORE) # define NO_STORE # endif +# if defined(OPENSSL_NO_UNIT_TEST) && !defined(NO_UNIT_TEST) +# define NO_UNIT_TEST +# endif #endif /* crypto/opensslconf.h.in */ @@ -86,8 +98,8 @@ #if !(defined(VMS) || defined(__VMS)) /* VMS uses logical names instead */ #if defined(HEADER_CRYPTLIB_H) && !defined(OPENSSLDIR) -#define ENGINESDIR "/tmp/openssl-1.0.1h-i386/lib/engines" -#define OPENSSLDIR "/tmp/openssl-1.0.1h-i386" +#define ENGINESDIR "/tmp/openssl-1.0.1k-i386/lib/engines" +#define OPENSSLDIR "/tmp/openssl-1.0.1k-i386" #endif #endif @@ -233,3 +245,6 @@ YOU SHOULD NOT HAVE BOTH DES_RISC1 AND DES_RISC2 DEFINED!!!!! #endif /* DES_DEFAULT_OPTIONS */ #endif /* HEADER_DES_LOCL_H */ +#ifdef __cplusplus +} +#endif diff --git a/Pods/OpenSSL-Universal/include-ios/openssl/opensslv.h b/Pods/OpenSSL-Universal/include-ios/openssl/opensslv.h index c3b6acec..0aebfd44 100644 --- a/Pods/OpenSSL-Universal/include-ios/openssl/opensslv.h +++ b/Pods/OpenSSL-Universal/include-ios/openssl/opensslv.h @@ -1,6 +1,10 @@ #ifndef HEADER_OPENSSLV_H #define HEADER_OPENSSLV_H +#ifdef __cplusplus +extern "C" { +#endif + /* Numeric release version identifier: * MNNFFPPS: major minor fix patch status * The status nibble has one of the values 0 for development, 1 to e for betas @@ -25,11 +29,11 @@ * (Prior to 0.9.5a beta1, a different scheme was used: MMNNFFRBB for * major minor fix final patch/beta) */ -#define OPENSSL_VERSION_NUMBER 0x1000108fL +#define OPENSSL_VERSION_NUMBER 0x100010bfL #ifdef OPENSSL_FIPS -#define OPENSSL_VERSION_TEXT "OpenSSL 1.0.1h-fips 5 Jun 2014" +#define OPENSSL_VERSION_TEXT "OpenSSL 1.0.1k-fips 8 Jan 2015" #else -#define OPENSSL_VERSION_TEXT "OpenSSL 1.0.1h 5 Jun 2014" +#define OPENSSL_VERSION_TEXT "OpenSSL 1.0.1k 8 Jan 2015" #endif #define OPENSSL_VERSION_PTEXT " part of " OPENSSL_VERSION_TEXT @@ -86,4 +90,7 @@ #define SHLIB_VERSION_NUMBER "1.0.0" +#ifdef __cplusplus +} +#endif #endif /* HEADER_OPENSSLV_H */ diff --git a/Pods/OpenSSL-Universal/include-ios/openssl/ossl_typ.h b/Pods/OpenSSL-Universal/include-ios/openssl/ossl_typ.h index ea9227f6..12cdd43b 100644 --- a/Pods/OpenSSL-Universal/include-ios/openssl/ossl_typ.h +++ b/Pods/OpenSSL-Universal/include-ios/openssl/ossl_typ.h @@ -55,6 +55,10 @@ #ifndef HEADER_OPENSSL_TYPES_H #define HEADER_OPENSSL_TYPES_H +#ifdef __cplusplus +extern "C" { +#endif + #include #ifdef NO_ASN1_TYPEDEFS @@ -199,4 +203,7 @@ typedef struct ocsp_req_ctx_st OCSP_REQ_CTX; typedef struct ocsp_response_st OCSP_RESPONSE; typedef struct ocsp_responder_id_st OCSP_RESPID; +#ifdef __cplusplus +} +#endif #endif /* def HEADER_OPENSSL_TYPES_H */ diff --git a/Pods/OpenSSL-Universal/include-ios/openssl/pkcs7.h b/Pods/OpenSSL-Universal/include-ios/openssl/pkcs7.h index 04f60379..5d54c4ac 100644 --- a/Pods/OpenSSL-Universal/include-ios/openssl/pkcs7.h +++ b/Pods/OpenSSL-Universal/include-ios/openssl/pkcs7.h @@ -233,10 +233,6 @@ DECLARE_PKCS12_STACK_OF(PKCS7) (OBJ_obj2nid((a)->type) == NID_pkcs7_signedAndEnveloped) #define PKCS7_type_is_data(a) (OBJ_obj2nid((a)->type) == NID_pkcs7_data) #define PKCS7_type_is_digest(a) (OBJ_obj2nid((a)->type) == NID_pkcs7_digest) -#define PKCS7_type_is_encrypted(a) \ - (OBJ_obj2nid((a)->type) == NID_pkcs7_encrypted) - -#define PKCS7_type_is_digest(a) (OBJ_obj2nid((a)->type) == NID_pkcs7_digest) #define PKCS7_set_detached(p,v) \ PKCS7_ctrl(p,PKCS7_OP_SET_DETACHED_SIGNATURE,v,NULL) diff --git a/Pods/OpenSSL-Universal/include-ios/openssl/pqueue.h b/Pods/OpenSSL-Universal/include-ios/openssl/pqueue.h index 87fc9037..26b53480 100644 --- a/Pods/OpenSSL-Universal/include-ios/openssl/pqueue.h +++ b/Pods/OpenSSL-Universal/include-ios/openssl/pqueue.h @@ -64,6 +64,9 @@ #include #include +#ifdef __cplusplus +extern "C" { +#endif typedef struct _pqueue *pqueue; typedef struct _pitem @@ -91,4 +94,7 @@ pitem *pqueue_next(piterator *iter); void pqueue_print(pqueue pq); int pqueue_size(pqueue pq); +#ifdef __cplusplus +} +#endif #endif /* ! HEADER_PQUEUE_H */ diff --git a/Pods/OpenSSL-Universal/include-ios/openssl/rsa.h b/Pods/OpenSSL-Universal/include-ios/openssl/rsa.h index 5f269e57..ebc71161 100644 --- a/Pods/OpenSSL-Universal/include-ios/openssl/rsa.h +++ b/Pods/OpenSSL-Universal/include-ios/openssl/rsa.h @@ -97,7 +97,7 @@ struct rsa_meth_st int (*rsa_priv_dec)(int flen,const unsigned char *from, unsigned char *to, RSA *rsa,int padding); - int (*rsa_mod_exp)(BIGNUM *r0,const BIGNUM *I,RSA *rsa,BN_CTX *ctx); /* Can be null */ + int (*rsa_mod_exp)(BIGNUM *r0,const BIGNUM *i,RSA *rsa,BN_CTX *ctx); /* Can be null */ int (*bn_mod_exp)(BIGNUM *r, const BIGNUM *a, const BIGNUM *p, const BIGNUM *m, BN_CTX *ctx, BN_MONT_CTX *m_ctx); /* Can be null */ @@ -559,6 +559,7 @@ void ERR_load_RSA_strings(void); #define RSA_R_OPERATION_NOT_ALLOWED_IN_FIPS_MODE 158 #define RSA_R_OPERATION_NOT_SUPPORTED_FOR_THIS_KEYTYPE 148 #define RSA_R_PADDING_CHECK_FAILED 114 +#define RSA_R_PKCS_DECODING_ERROR 159 #define RSA_R_P_NOT_PRIME 128 #define RSA_R_Q_NOT_PRIME 129 #define RSA_R_RSA_OPERATIONS_NOT_SUPPORTED 130 diff --git a/Pods/OpenSSL-Universal/include-ios/openssl/safestack.h b/Pods/OpenSSL-Universal/include-ios/openssl/safestack.h index ea3aa0d8..bc194cb2 100644 --- a/Pods/OpenSSL-Universal/include-ios/openssl/safestack.h +++ b/Pods/OpenSSL-Universal/include-ios/openssl/safestack.h @@ -57,6 +57,10 @@ #include +#ifdef __cplusplus +extern "C" { +#endif + #ifndef CHECKED_PTR_OF #define CHECKED_PTR_OF(type, p) \ ((void*) (1 ? p : (type*)0)) @@ -2660,4 +2664,8 @@ DECLARE_SPECIAL_STACK_OF(OPENSSL_BLOCK, void) #define lh_SSL_SESSION_free(lh) LHM_lh_free(SSL_SESSION,lh) /* End of util/mkstack.pl block, you may now edit :-) */ + +#ifdef __cplusplus +} +#endif #endif /* !defined HEADER_SAFESTACK_H */ diff --git a/Pods/OpenSSL-Universal/include-ios/openssl/srtp.h b/Pods/OpenSSL-Universal/include-ios/openssl/srtp.h index c0cf33ef..096b624d 100644 --- a/Pods/OpenSSL-Universal/include-ios/openssl/srtp.h +++ b/Pods/OpenSSL-Universal/include-ios/openssl/srtp.h @@ -1,4 +1,4 @@ -/* ssl/tls1.h */ +/* ssl/srtp.h */ /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) * All rights reserved. * @@ -118,6 +118,8 @@ #ifndef HEADER_D1_SRTP_H #define HEADER_D1_SRTP_H +#include + #ifdef __cplusplus extern "C" { #endif @@ -130,6 +132,8 @@ extern "C" { #define SRTP_NULL_SHA1_80 0x0005 #define SRTP_NULL_SHA1_32 0x0006 +#ifndef OPENSSL_NO_SRTP + int SSL_CTX_set_tlsext_use_srtp(SSL_CTX *ctx, const char *profiles); int SSL_set_tlsext_use_srtp(SSL *ctx, const char *profiles); SRTP_PROTECTION_PROFILE *SSL_get_selected_srtp_profile(SSL *s); @@ -137,6 +141,8 @@ SRTP_PROTECTION_PROFILE *SSL_get_selected_srtp_profile(SSL *s); STACK_OF(SRTP_PROTECTION_PROFILE) *SSL_get_srtp_profiles(SSL *ssl); SRTP_PROTECTION_PROFILE *SSL_get_selected_srtp_profile(SSL *s); +#endif + #ifdef __cplusplus } #endif diff --git a/Pods/OpenSSL-Universal/include-ios/openssl/ssl.h b/Pods/OpenSSL-Universal/include-ios/openssl/ssl.h index 4c1242c9..2ba59232 100644 --- a/Pods/OpenSSL-Universal/include-ios/openssl/ssl.h +++ b/Pods/OpenSSL-Universal/include-ios/openssl/ssl.h @@ -264,6 +264,7 @@ extern "C" { #define SSL_TXT_aGOST94 "aGOST94" #define SSL_TXT_aGOST01 "aGOST01" #define SSL_TXT_aGOST "aGOST" +#define SSL_TXT_aSRP "aSRP" #define SSL_TXT_DSS "DSS" #define SSL_TXT_DH "DH" @@ -595,9 +596,8 @@ struct ssl_session_st #define SSL_OP_SINGLE_ECDH_USE 0x00080000L /* If set, always create a new key when using tmp_dh parameters */ #define SSL_OP_SINGLE_DH_USE 0x00100000L -/* Set to always use the tmp_rsa key when doing RSA operations, - * even when this violates protocol specs */ -#define SSL_OP_EPHEMERAL_RSA 0x00200000L +/* Does nothing: retained for compatibiity */ +#define SSL_OP_EPHEMERAL_RSA 0x0 /* Set on servers to choose the cipher according to the server's * preferences */ #define SSL_OP_CIPHER_SERVER_PREFERENCE 0x00400000L @@ -652,6 +652,15 @@ struct ssl_session_st */ #define SSL_MODE_SEND_CLIENTHELLO_TIME 0x00000020L #define SSL_MODE_SEND_SERVERHELLO_TIME 0x00000040L +/* Send TLS_FALLBACK_SCSV in the ClientHello. + * To be set only by applications that reconnect with a downgraded protocol + * version; see draft-ietf-tls-downgrade-scsv-00 for details. + * + * DO NOT ENABLE THIS if your application attempts a normal handshake. + * Only use this in explicit fallback retries, following the guidance + * in draft-ietf-tls-downgrade-scsv-00. + */ +#define SSL_MODE_SEND_FALLBACK_SCSV 0x00000080L /* Note: SSL[_CTX]_set_{options,mode} use |= op on the previous value, * they cannot be used to clear bits. */ @@ -683,6 +692,10 @@ struct ssl_session_st SSL_ctrl((ssl),SSL_CTRL_MODE,0,NULL) #define SSL_set_mtu(ssl, mtu) \ SSL_ctrl((ssl),SSL_CTRL_SET_MTU,(mtu),NULL) +#define DTLS_set_link_mtu(ssl, mtu) \ + SSL_ctrl((ssl),DTLS_CTRL_SET_LINK_MTU,(mtu),NULL) +#define DTLS_get_link_min_mtu(ssl) \ + SSL_ctrl((ssl),DTLS_CTRL_GET_LINK_MIN_MTU,0,NULL) #define SSL_get_secure_renegotiation_support(ssl) \ SSL_ctrl((ssl), SSL_CTRL_GET_RI_SUPPORT, 0, NULL) @@ -1510,6 +1523,7 @@ DECLARE_PEM_rw(SSL_SESSION, SSL_SESSION) #define SSL_AD_BAD_CERTIFICATE_STATUS_RESPONSE TLS1_AD_BAD_CERTIFICATE_STATUS_RESPONSE #define SSL_AD_BAD_CERTIFICATE_HASH_VALUE TLS1_AD_BAD_CERTIFICATE_HASH_VALUE #define SSL_AD_UNKNOWN_PSK_IDENTITY TLS1_AD_UNKNOWN_PSK_IDENTITY /* fatal */ +#define SSL_AD_INAPPROPRIATE_FALLBACK TLS1_AD_INAPPROPRIATE_FALLBACK /* fatal */ #define SSL_ERROR_NONE 0 #define SSL_ERROR_SSL 1 @@ -1620,6 +1634,10 @@ DECLARE_PEM_rw(SSL_SESSION, SSL_SESSION) #define SSL_CTRL_GET_EXTRA_CHAIN_CERTS 82 #define SSL_CTRL_CLEAR_EXTRA_CHAIN_CERTS 83 +#define SSL_CTRL_CHECK_PROTO_VERSION 119 +#define DTLS_CTRL_SET_LINK_MTU 120 +#define DTLS_CTRL_GET_LINK_MIN_MTU 121 + #define DTLSv1_get_timeout(ssl, arg) \ SSL_ctrl(ssl,DTLS_CTRL_GET_TIMEOUT,0, (void *)arg) #define DTLSv1_handle_timeout(ssl) \ @@ -1870,13 +1888,15 @@ const SSL_METHOD *SSLv2_server_method(void); /* SSLv2 */ const SSL_METHOD *SSLv2_client_method(void); /* SSLv2 */ #endif +#ifndef OPENSSL_NO_SSL3_METHOD const SSL_METHOD *SSLv3_method(void); /* SSLv3 */ const SSL_METHOD *SSLv3_server_method(void); /* SSLv3 */ const SSL_METHOD *SSLv3_client_method(void); /* SSLv3 */ +#endif -const SSL_METHOD *SSLv23_method(void); /* SSLv3 but can rollback to v2 */ -const SSL_METHOD *SSLv23_server_method(void); /* SSLv3 but can rollback to v2 */ -const SSL_METHOD *SSLv23_client_method(void); /* SSLv3 but can rollback to v2 */ +const SSL_METHOD *SSLv23_method(void); /* Negotiate highest available SSL/TLS version */ +const SSL_METHOD *SSLv23_server_method(void); /* Negotiate highest available SSL/TLS version */ +const SSL_METHOD *SSLv23_client_method(void); /* Negotiate highest available SSL/TLS version */ const SSL_METHOD *TLSv1_method(void); /* TLSv1.0 */ const SSL_METHOD *TLSv1_server_method(void); /* TLSv1.0 */ @@ -2055,6 +2075,10 @@ int SSL_set_session_secret_cb(SSL *s, tls_session_secret_cb_fn tls_session_secre void SSL_set_debug(SSL *s, int debug); int SSL_cache_hit(SSL *s); +#ifndef OPENSSL_NO_UNIT_TEST +const struct openssl_ssl_test_functions *SSL_test_functions(void); +#endif + /* BEGIN ERROR CODES */ /* The following lines are auto generated by the script mkerr.pl. Any changes * made after this point may be overwritten when the script is next run. @@ -2320,6 +2344,7 @@ void ERR_load_SSL_strings(void); #define SSL_R_BAD_SRP_B_LENGTH 348 #define SSL_R_BAD_SRP_G_LENGTH 349 #define SSL_R_BAD_SRP_N_LENGTH 350 +#define SSL_R_BAD_SRP_PARAMETERS 371 #define SSL_R_BAD_SRP_S_LENGTH 351 #define SSL_R_BAD_SRTP_MKI_VALUE 352 #define SSL_R_BAD_SRTP_PROTECTION_PROFILE_LIST 353 @@ -2373,6 +2398,7 @@ void ERR_load_SSL_strings(void); #define SSL_R_HTTPS_PROXY_REQUEST 155 #define SSL_R_HTTP_REQUEST 156 #define SSL_R_ILLEGAL_PADDING 283 +#define SSL_R_INAPPROPRIATE_FALLBACK 373 #define SSL_R_INCONSISTENT_COMPRESSION 340 #define SSL_R_INVALID_CHALLENGE_LENGTH 158 #define SSL_R_INVALID_COMMAND 280 @@ -2519,6 +2545,7 @@ void ERR_load_SSL_strings(void); #define SSL_R_TLSV1_ALERT_DECRYPTION_FAILED 1021 #define SSL_R_TLSV1_ALERT_DECRYPT_ERROR 1051 #define SSL_R_TLSV1_ALERT_EXPORT_RESTRICTION 1060 +#define SSL_R_TLSV1_ALERT_INAPPROPRIATE_FALLBACK 1086 #define SSL_R_TLSV1_ALERT_INSUFFICIENT_SECURITY 1071 #define SSL_R_TLSV1_ALERT_INTERNAL_ERROR 1080 #define SSL_R_TLSV1_ALERT_NO_RENEGOTIATION 1100 diff --git a/Pods/OpenSSL-Universal/include-ios/openssl/ssl3.h b/Pods/OpenSSL-Universal/include-ios/openssl/ssl3.h index 37f19e3a..6fad054e 100644 --- a/Pods/OpenSSL-Universal/include-ios/openssl/ssl3.h +++ b/Pods/OpenSSL-Universal/include-ios/openssl/ssl3.h @@ -128,9 +128,14 @@ extern "C" { #endif -/* Signalling cipher suite value: from draft-ietf-tls-renegotiation-03.txt */ +/* Signalling cipher suite value from RFC 5746 + * (TLS_EMPTY_RENEGOTIATION_INFO_SCSV) */ #define SSL3_CK_SCSV 0x030000FF +/* Signalling cipher suite value from draft-ietf-tls-downgrade-scsv-00 + * (TLS_FALLBACK_SCSV) */ +#define SSL3_CK_FALLBACK_SCSV 0x03005600 + #define SSL3_CK_RSA_NULL_MD5 0x03000001 #define SSL3_CK_RSA_NULL_SHA 0x03000002 #define SSL3_CK_RSA_RC4_40_MD5 0x03000003 @@ -388,8 +393,12 @@ typedef struct ssl3_buffer_st #define TLS1_FLAGS_TLS_PADDING_BUG 0x0008 #define TLS1_FLAGS_SKIP_CERT_VERIFY 0x0010 #define TLS1_FLAGS_KEEP_HANDSHAKE 0x0020 +/* + * Set when the handshake is ready to process peer's ChangeCipherSpec message. + * Cleared after the message has been processed. + */ #define SSL3_FLAGS_CCS_OK 0x0080 - + /* SSL3_FLAGS_SGC_RESTART_DONE is set when we * restart a handshake because of MS SGC and so prevents us * from restarting the handshake in a loop. It's reset on a @@ -451,8 +460,11 @@ typedef struct ssl3_state_st * and freed and MD_CTX-es for all required digests are stored in * this array */ EVP_MD_CTX **handshake_dgst; - /* this is set whenerver we see a change_cipher_spec message - * come in when we are not looking for one */ + /* + * Set whenever an expected ChangeCipherSpec message is processed. + * Unset when the peer's Finished message is received. + * Unexpected ChangeCipherSpec messages trigger a fatal alert. + */ int change_cipher_spec; int warn_alert; diff --git a/Pods/OpenSSL-Universal/include-ios/openssl/tls1.h b/Pods/OpenSSL-Universal/include-ios/openssl/tls1.h index c992091e..6ae88764 100644 --- a/Pods/OpenSSL-Universal/include-ios/openssl/tls1.h +++ b/Pods/OpenSSL-Universal/include-ios/openssl/tls1.h @@ -159,17 +159,19 @@ extern "C" { #define TLS1_ALLOW_EXPERIMENTAL_CIPHERSUITES 0 +#define TLS1_VERSION 0x0301 +#define TLS1_1_VERSION 0x0302 #define TLS1_2_VERSION 0x0303 -#define TLS1_2_VERSION_MAJOR 0x03 -#define TLS1_2_VERSION_MINOR 0x03 +#define TLS_MAX_VERSION TLS1_2_VERSION + +#define TLS1_VERSION_MAJOR 0x03 +#define TLS1_VERSION_MINOR 0x01 -#define TLS1_1_VERSION 0x0302 #define TLS1_1_VERSION_MAJOR 0x03 #define TLS1_1_VERSION_MINOR 0x02 -#define TLS1_VERSION 0x0301 -#define TLS1_VERSION_MAJOR 0x03 -#define TLS1_VERSION_MINOR 0x01 +#define TLS1_2_VERSION_MAJOR 0x03 +#define TLS1_2_VERSION_MINOR 0x03 #define TLS1_get_version(s) \ ((s->version >> 8) == TLS1_VERSION_MAJOR ? s->version : 0) @@ -187,6 +189,7 @@ extern "C" { #define TLS1_AD_PROTOCOL_VERSION 70 /* fatal */ #define TLS1_AD_INSUFFICIENT_SECURITY 71 /* fatal */ #define TLS1_AD_INTERNAL_ERROR 80 /* fatal */ +#define TLS1_AD_INAPPROPRIATE_FALLBACK 86 /* fatal */ #define TLS1_AD_USER_CANCELLED 90 #define TLS1_AD_NO_RENEGOTIATION 100 /* codes 110-114 are from RFC3546 */ diff --git a/Pods/OpenSSL-Universal/include-ios/openssl/x509.h b/Pods/OpenSSL-Universal/include-ios/openssl/x509.h index 092dd745..ed767f84 100644 --- a/Pods/OpenSSL-Universal/include-ios/openssl/x509.h +++ b/Pods/OpenSSL-Universal/include-ios/openssl/x509.h @@ -768,6 +768,7 @@ int X509_ALGOR_set0(X509_ALGOR *alg, ASN1_OBJECT *aobj, int ptype, void *pval); void X509_ALGOR_get0(ASN1_OBJECT **paobj, int *pptype, void **ppval, X509_ALGOR *algor); void X509_ALGOR_set_md(X509_ALGOR *alg, const EVP_MD *md); +int X509_ALGOR_cmp(const X509_ALGOR *a, const X509_ALGOR *b); X509_NAME *X509_NAME_dup(X509_NAME *xn); X509_NAME_ENTRY *X509_NAME_ENTRY_dup(X509_NAME_ENTRY *ne); diff --git a/Pods/OpenSSL-Universal/include-osx/openssl/aes.h b/Pods/OpenSSL-Universal/include-osx/openssl/aes.h deleted file mode 100644 index 031abf01..00000000 --- a/Pods/OpenSSL-Universal/include-osx/openssl/aes.h +++ /dev/null @@ -1,147 +0,0 @@ -/* crypto/aes/aes.h -*- mode:C; c-file-style: "eay" -*- */ -/* ==================================================================== - * Copyright (c) 1998-2002 The OpenSSL Project. All rights reserved. - * - * Redistribution and use in source and binary forms, with or without - * modification, are permitted provided that the following conditions - * are met: - * - * 1. Redistributions of source code must retain the above copyright - * notice, this list of conditions and the following disclaimer. - * - * 2. Redistributions in binary form must reproduce the above copyright - * notice, this list of conditions and the following disclaimer in - * the documentation and/or other materials provided with the - * distribution. - * - * 3. All advertising materials mentioning features or use of this - * software must display the following acknowledgment: - * "This product includes software developed by the OpenSSL Project - * for use in the OpenSSL Toolkit. (http://www.openssl.org/)" - * - * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to - * endorse or promote products derived from this software without - * prior written permission. For written permission, please contact - * openssl-core@openssl.org. - * - * 5. Products derived from this software may not be called "OpenSSL" - * nor may "OpenSSL" appear in their names without prior written - * permission of the OpenSSL Project. - * - * 6. Redistributions of any form whatsoever must retain the following - * acknowledgment: - * "This product includes software developed by the OpenSSL Project - * for use in the OpenSSL Toolkit (http://www.openssl.org/)" - * - * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY - * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE - * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR - * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR - * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, - * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT - * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; - * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) - * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, - * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) - * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED - * OF THE POSSIBILITY OF SUCH DAMAGE. - * ==================================================================== - * - */ - -#ifndef HEADER_AES_H -#define HEADER_AES_H - -#include - -#ifdef OPENSSL_NO_AES -#error AES is disabled. -#endif - -#include - -#define AES_ENCRYPT 1 -#define AES_DECRYPT 0 - -/* Because array size can't be a const in C, the following two are macros. - Both sizes are in bytes. */ -#define AES_MAXNR 14 -#define AES_BLOCK_SIZE 16 - -#ifdef __cplusplus -extern "C" { -#endif - -/* This should be a hidden type, but EVP requires that the size be known */ -struct aes_key_st { -#ifdef AES_LONG - unsigned long rd_key[4 *(AES_MAXNR + 1)]; -#else - unsigned int rd_key[4 *(AES_MAXNR + 1)]; -#endif - int rounds; -}; -typedef struct aes_key_st AES_KEY; - -const char *AES_options(void); - -int AES_set_encrypt_key(const unsigned char *userKey, const int bits, - AES_KEY *key); -int AES_set_decrypt_key(const unsigned char *userKey, const int bits, - AES_KEY *key); - -int private_AES_set_encrypt_key(const unsigned char *userKey, const int bits, - AES_KEY *key); -int private_AES_set_decrypt_key(const unsigned char *userKey, const int bits, - AES_KEY *key); - -void AES_encrypt(const unsigned char *in, unsigned char *out, - const AES_KEY *key); -void AES_decrypt(const unsigned char *in, unsigned char *out, - const AES_KEY *key); - -void AES_ecb_encrypt(const unsigned char *in, unsigned char *out, - const AES_KEY *key, const int enc); -void AES_cbc_encrypt(const unsigned char *in, unsigned char *out, - size_t length, const AES_KEY *key, - unsigned char *ivec, const int enc); -void AES_cfb128_encrypt(const unsigned char *in, unsigned char *out, - size_t length, const AES_KEY *key, - unsigned char *ivec, int *num, const int enc); -void AES_cfb1_encrypt(const unsigned char *in, unsigned char *out, - size_t length, const AES_KEY *key, - unsigned char *ivec, int *num, const int enc); -void AES_cfb8_encrypt(const unsigned char *in, unsigned char *out, - size_t length, const AES_KEY *key, - unsigned char *ivec, int *num, const int enc); -void AES_ofb128_encrypt(const unsigned char *in, unsigned char *out, - size_t length, const AES_KEY *key, - unsigned char *ivec, int *num); -void AES_ctr128_encrypt(const unsigned char *in, unsigned char *out, - size_t length, const AES_KEY *key, - unsigned char ivec[AES_BLOCK_SIZE], - unsigned char ecount_buf[AES_BLOCK_SIZE], - unsigned int *num); -/* NB: the IV is _two_ blocks long */ -void AES_ige_encrypt(const unsigned char *in, unsigned char *out, - size_t length, const AES_KEY *key, - unsigned char *ivec, const int enc); -/* NB: the IV is _four_ blocks long */ -void AES_bi_ige_encrypt(const unsigned char *in, unsigned char *out, - size_t length, const AES_KEY *key, - const AES_KEY *key2, const unsigned char *ivec, - const int enc); - -int AES_wrap_key(AES_KEY *key, const unsigned char *iv, - unsigned char *out, - const unsigned char *in, unsigned int inlen); -int AES_unwrap_key(AES_KEY *key, const unsigned char *iv, - unsigned char *out, - const unsigned char *in, unsigned int inlen); - - -#ifdef __cplusplus -} -#endif - -#endif /* !HEADER_AES_H */ diff --git a/Pods/OpenSSL-Universal/include-osx/openssl/asn1.h b/Pods/OpenSSL-Universal/include-osx/openssl/asn1.h deleted file mode 100644 index 220a0c8c..00000000 --- a/Pods/OpenSSL-Universal/include-osx/openssl/asn1.h +++ /dev/null @@ -1,1404 +0,0 @@ -/* crypto/asn1/asn1.h */ -/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) - * All rights reserved. - * - * This package is an SSL implementation written - * by Eric Young (eay@cryptsoft.com). - * The implementation was written so as to conform with Netscapes SSL. - * - * This library is free for commercial and non-commercial use as long as - * the following conditions are aheared to. The following conditions - * apply to all code found in this distribution, be it the RC4, RSA, - * lhash, DES, etc., code; not just the SSL code. The SSL documentation - * included with this distribution is covered by the same copyright terms - * except that the holder is Tim Hudson (tjh@cryptsoft.com). - * - * Copyright remains Eric Young's, and as such any Copyright notices in - * the code are not to be removed. - * If this package is used in a product, Eric Young should be given attribution - * as the author of the parts of the library used. - * This can be in the form of a textual message at program startup or - * in documentation (online or textual) provided with the package. - * - * Redistribution and use in source and binary forms, with or without - * modification, are permitted provided that the following conditions - * are met: - * 1. Redistributions of source code must retain the copyright - * notice, this list of conditions and the following disclaimer. - * 2. Redistributions in binary form must reproduce the above copyright - * notice, this list of conditions and the following disclaimer in the - * documentation and/or other materials provided with the distribution. - * 3. All advertising materials mentioning features or use of this software - * must display the following acknowledgement: - * "This product includes cryptographic software written by - * Eric Young (eay@cryptsoft.com)" - * The word 'cryptographic' can be left out if the rouines from the library - * being used are not cryptographic related :-). - * 4. If you include any Windows specific code (or a derivative thereof) from - * the apps directory (application code) you must include an acknowledgement: - * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" - * - * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND - * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE - * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE - * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE - * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL - * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS - * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) - * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT - * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY - * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF - * SUCH DAMAGE. - * - * The licence and distribution terms for any publically available version or - * derivative of this code cannot be changed. i.e. this code cannot simply be - * copied and put under another distribution licence - * [including the GNU Public Licence.] - */ - -#ifndef HEADER_ASN1_H -#define HEADER_ASN1_H - -#include -#include -#ifndef OPENSSL_NO_BIO -#include -#endif -#include -#include - -#include - -#include -#ifndef OPENSSL_NO_DEPRECATED -#include -#endif - -#ifdef OPENSSL_BUILD_SHLIBCRYPTO -# undef OPENSSL_EXTERN -# define OPENSSL_EXTERN OPENSSL_EXPORT -#endif - -#ifdef __cplusplus -extern "C" { -#endif - -#define V_ASN1_UNIVERSAL 0x00 -#define V_ASN1_APPLICATION 0x40 -#define V_ASN1_CONTEXT_SPECIFIC 0x80 -#define V_ASN1_PRIVATE 0xc0 - -#define V_ASN1_CONSTRUCTED 0x20 -#define V_ASN1_PRIMITIVE_TAG 0x1f -#define V_ASN1_PRIMATIVE_TAG 0x1f - -#define V_ASN1_APP_CHOOSE -2 /* let the recipient choose */ -#define V_ASN1_OTHER -3 /* used in ASN1_TYPE */ -#define V_ASN1_ANY -4 /* used in ASN1 template code */ - -#define V_ASN1_NEG 0x100 /* negative flag */ - -#define V_ASN1_UNDEF -1 -#define V_ASN1_EOC 0 -#define V_ASN1_BOOLEAN 1 /**/ -#define V_ASN1_INTEGER 2 -#define V_ASN1_NEG_INTEGER (2 | V_ASN1_NEG) -#define V_ASN1_BIT_STRING 3 -#define V_ASN1_OCTET_STRING 4 -#define V_ASN1_NULL 5 -#define V_ASN1_OBJECT 6 -#define V_ASN1_OBJECT_DESCRIPTOR 7 -#define V_ASN1_EXTERNAL 8 -#define V_ASN1_REAL 9 -#define V_ASN1_ENUMERATED 10 -#define V_ASN1_NEG_ENUMERATED (10 | V_ASN1_NEG) -#define V_ASN1_UTF8STRING 12 -#define V_ASN1_SEQUENCE 16 -#define V_ASN1_SET 17 -#define V_ASN1_NUMERICSTRING 18 /**/ -#define V_ASN1_PRINTABLESTRING 19 -#define V_ASN1_T61STRING 20 -#define V_ASN1_TELETEXSTRING 20 /* alias */ -#define V_ASN1_VIDEOTEXSTRING 21 /**/ -#define V_ASN1_IA5STRING 22 -#define V_ASN1_UTCTIME 23 -#define V_ASN1_GENERALIZEDTIME 24 /**/ -#define V_ASN1_GRAPHICSTRING 25 /**/ -#define V_ASN1_ISO64STRING 26 /**/ -#define V_ASN1_VISIBLESTRING 26 /* alias */ -#define V_ASN1_GENERALSTRING 27 /**/ -#define V_ASN1_UNIVERSALSTRING 28 /**/ -#define V_ASN1_BMPSTRING 30 - -/* For use with d2i_ASN1_type_bytes() */ -#define B_ASN1_NUMERICSTRING 0x0001 -#define B_ASN1_PRINTABLESTRING 0x0002 -#define B_ASN1_T61STRING 0x0004 -#define B_ASN1_TELETEXSTRING 0x0004 -#define B_ASN1_VIDEOTEXSTRING 0x0008 -#define B_ASN1_IA5STRING 0x0010 -#define B_ASN1_GRAPHICSTRING 0x0020 -#define B_ASN1_ISO64STRING 0x0040 -#define B_ASN1_VISIBLESTRING 0x0040 -#define B_ASN1_GENERALSTRING 0x0080 -#define B_ASN1_UNIVERSALSTRING 0x0100 -#define B_ASN1_OCTET_STRING 0x0200 -#define B_ASN1_BIT_STRING 0x0400 -#define B_ASN1_BMPSTRING 0x0800 -#define B_ASN1_UNKNOWN 0x1000 -#define B_ASN1_UTF8STRING 0x2000 -#define B_ASN1_UTCTIME 0x4000 -#define B_ASN1_GENERALIZEDTIME 0x8000 -#define B_ASN1_SEQUENCE 0x10000 - -/* For use with ASN1_mbstring_copy() */ -#define MBSTRING_FLAG 0x1000 -#define MBSTRING_UTF8 (MBSTRING_FLAG) -#define MBSTRING_ASC (MBSTRING_FLAG|1) -#define MBSTRING_BMP (MBSTRING_FLAG|2) -#define MBSTRING_UNIV (MBSTRING_FLAG|4) - -#define SMIME_OLDMIME 0x400 -#define SMIME_CRLFEOL 0x800 -#define SMIME_STREAM 0x1000 - -struct X509_algor_st; -DECLARE_STACK_OF(X509_ALGOR) - -#define DECLARE_ASN1_SET_OF(type) /* filled in by mkstack.pl */ -#define IMPLEMENT_ASN1_SET_OF(type) /* nothing, no longer needed */ - -/* We MUST make sure that, except for constness, asn1_ctx_st and - asn1_const_ctx are exactly the same. Fortunately, as soon as - the old ASN1 parsing macros are gone, we can throw this away - as well... */ -typedef struct asn1_ctx_st - { - unsigned char *p;/* work char pointer */ - int eos; /* end of sequence read for indefinite encoding */ - int error; /* error code to use when returning an error */ - int inf; /* constructed if 0x20, indefinite is 0x21 */ - int tag; /* tag from last 'get object' */ - int xclass; /* class from last 'get object' */ - long slen; /* length of last 'get object' */ - unsigned char *max; /* largest value of p allowed */ - unsigned char *q;/* temporary variable */ - unsigned char **pp;/* variable */ - int line; /* used in error processing */ - } ASN1_CTX; - -typedef struct asn1_const_ctx_st - { - const unsigned char *p;/* work char pointer */ - int eos; /* end of sequence read for indefinite encoding */ - int error; /* error code to use when returning an error */ - int inf; /* constructed if 0x20, indefinite is 0x21 */ - int tag; /* tag from last 'get object' */ - int xclass; /* class from last 'get object' */ - long slen; /* length of last 'get object' */ - const unsigned char *max; /* largest value of p allowed */ - const unsigned char *q;/* temporary variable */ - const unsigned char **pp;/* variable */ - int line; /* used in error processing */ - } ASN1_const_CTX; - -/* These are used internally in the ASN1_OBJECT to keep track of - * whether the names and data need to be free()ed */ -#define ASN1_OBJECT_FLAG_DYNAMIC 0x01 /* internal use */ -#define ASN1_OBJECT_FLAG_CRITICAL 0x02 /* critical x509v3 object id */ -#define ASN1_OBJECT_FLAG_DYNAMIC_STRINGS 0x04 /* internal use */ -#define ASN1_OBJECT_FLAG_DYNAMIC_DATA 0x08 /* internal use */ -typedef struct asn1_object_st - { - const char *sn,*ln; - int nid; - int length; - const unsigned char *data; /* data remains const after init */ - int flags; /* Should we free this one */ - } ASN1_OBJECT; - -#define ASN1_STRING_FLAG_BITS_LEFT 0x08 /* Set if 0x07 has bits left value */ -/* This indicates that the ASN1_STRING is not a real value but just a place - * holder for the location where indefinite length constructed data should - * be inserted in the memory buffer - */ -#define ASN1_STRING_FLAG_NDEF 0x010 - -/* This flag is used by the CMS code to indicate that a string is not - * complete and is a place holder for content when it had all been - * accessed. The flag will be reset when content has been written to it. - */ - -#define ASN1_STRING_FLAG_CONT 0x020 -/* This flag is used by ASN1 code to indicate an ASN1_STRING is an MSTRING - * type. - */ -#define ASN1_STRING_FLAG_MSTRING 0x040 -/* This is the base type that holds just about everything :-) */ -struct asn1_string_st - { - int length; - int type; - unsigned char *data; - /* The value of the following field depends on the type being - * held. It is mostly being used for BIT_STRING so if the - * input data has a non-zero 'unused bits' value, it will be - * handled correctly */ - long flags; - }; - -/* ASN1_ENCODING structure: this is used to save the received - * encoding of an ASN1 type. This is useful to get round - * problems with invalid encodings which can break signatures. - */ - -typedef struct ASN1_ENCODING_st - { - unsigned char *enc; /* DER encoding */ - long len; /* Length of encoding */ - int modified; /* set to 1 if 'enc' is invalid */ - } ASN1_ENCODING; - -/* Used with ASN1 LONG type: if a long is set to this it is omitted */ -#define ASN1_LONG_UNDEF 0x7fffffffL - -#define STABLE_FLAGS_MALLOC 0x01 -#define STABLE_NO_MASK 0x02 -#define DIRSTRING_TYPE \ - (B_ASN1_PRINTABLESTRING|B_ASN1_T61STRING|B_ASN1_BMPSTRING|B_ASN1_UTF8STRING) -#define PKCS9STRING_TYPE (DIRSTRING_TYPE|B_ASN1_IA5STRING) - -typedef struct asn1_string_table_st { - int nid; - long minsize; - long maxsize; - unsigned long mask; - unsigned long flags; -} ASN1_STRING_TABLE; - -DECLARE_STACK_OF(ASN1_STRING_TABLE) - -/* size limits: this stuff is taken straight from RFC2459 */ - -#define ub_name 32768 -#define ub_common_name 64 -#define ub_locality_name 128 -#define ub_state_name 128 -#define ub_organization_name 64 -#define ub_organization_unit_name 64 -#define ub_title 64 -#define ub_email_address 128 - -/* Declarations for template structures: for full definitions - * see asn1t.h - */ -typedef struct ASN1_TEMPLATE_st ASN1_TEMPLATE; -typedef struct ASN1_TLC_st ASN1_TLC; -/* This is just an opaque pointer */ -typedef struct ASN1_VALUE_st ASN1_VALUE; - -/* Declare ASN1 functions: the implement macro in in asn1t.h */ - -#define DECLARE_ASN1_FUNCTIONS(type) DECLARE_ASN1_FUNCTIONS_name(type, type) - -#define DECLARE_ASN1_ALLOC_FUNCTIONS(type) \ - DECLARE_ASN1_ALLOC_FUNCTIONS_name(type, type) - -#define DECLARE_ASN1_FUNCTIONS_name(type, name) \ - DECLARE_ASN1_ALLOC_FUNCTIONS_name(type, name) \ - DECLARE_ASN1_ENCODE_FUNCTIONS(type, name, name) - -#define DECLARE_ASN1_FUNCTIONS_fname(type, itname, name) \ - DECLARE_ASN1_ALLOC_FUNCTIONS_name(type, name) \ - DECLARE_ASN1_ENCODE_FUNCTIONS(type, itname, name) - -#define DECLARE_ASN1_ENCODE_FUNCTIONS(type, itname, name) \ - type *d2i_##name(type **a, const unsigned char **in, long len); \ - int i2d_##name(type *a, unsigned char **out); \ - DECLARE_ASN1_ITEM(itname) - -#define DECLARE_ASN1_ENCODE_FUNCTIONS_const(type, name) \ - type *d2i_##name(type **a, const unsigned char **in, long len); \ - int i2d_##name(const type *a, unsigned char **out); \ - DECLARE_ASN1_ITEM(name) - -#define DECLARE_ASN1_NDEF_FUNCTION(name) \ - int i2d_##name##_NDEF(name *a, unsigned char **out); - -#define DECLARE_ASN1_FUNCTIONS_const(name) \ - DECLARE_ASN1_ALLOC_FUNCTIONS(name) \ - DECLARE_ASN1_ENCODE_FUNCTIONS_const(name, name) - -#define DECLARE_ASN1_ALLOC_FUNCTIONS_name(type, name) \ - type *name##_new(void); \ - void name##_free(type *a); - -#define DECLARE_ASN1_PRINT_FUNCTION(stname) \ - DECLARE_ASN1_PRINT_FUNCTION_fname(stname, stname) - -#define DECLARE_ASN1_PRINT_FUNCTION_fname(stname, fname) \ - int fname##_print_ctx(BIO *out, stname *x, int indent, \ - const ASN1_PCTX *pctx); - -#define D2I_OF(type) type *(*)(type **,const unsigned char **,long) -#define I2D_OF(type) int (*)(type *,unsigned char **) -#define I2D_OF_const(type) int (*)(const type *,unsigned char **) - -#define CHECKED_D2I_OF(type, d2i) \ - ((d2i_of_void*) (1 ? d2i : ((D2I_OF(type))0))) -#define CHECKED_I2D_OF(type, i2d) \ - ((i2d_of_void*) (1 ? i2d : ((I2D_OF(type))0))) -#define CHECKED_NEW_OF(type, xnew) \ - ((void *(*)(void)) (1 ? xnew : ((type *(*)(void))0))) -#define CHECKED_PTR_OF(type, p) \ - ((void*) (1 ? p : (type*)0)) -#define CHECKED_PPTR_OF(type, p) \ - ((void**) (1 ? p : (type**)0)) - -#define TYPEDEF_D2I_OF(type) typedef type *d2i_of_##type(type **,const unsigned char **,long) -#define TYPEDEF_I2D_OF(type) typedef int i2d_of_##type(type *,unsigned char **) -#define TYPEDEF_D2I2D_OF(type) TYPEDEF_D2I_OF(type); TYPEDEF_I2D_OF(type) - -TYPEDEF_D2I2D_OF(void); - -/* The following macros and typedefs allow an ASN1_ITEM - * to be embedded in a structure and referenced. Since - * the ASN1_ITEM pointers need to be globally accessible - * (possibly from shared libraries) they may exist in - * different forms. On platforms that support it the - * ASN1_ITEM structure itself will be globally exported. - * Other platforms will export a function that returns - * an ASN1_ITEM pointer. - * - * To handle both cases transparently the macros below - * should be used instead of hard coding an ASN1_ITEM - * pointer in a structure. - * - * The structure will look like this: - * - * typedef struct SOMETHING_st { - * ... - * ASN1_ITEM_EXP *iptr; - * ... - * } SOMETHING; - * - * It would be initialised as e.g.: - * - * SOMETHING somevar = {...,ASN1_ITEM_ref(X509),...}; - * - * and the actual pointer extracted with: - * - * const ASN1_ITEM *it = ASN1_ITEM_ptr(somevar.iptr); - * - * Finally an ASN1_ITEM pointer can be extracted from an - * appropriate reference with: ASN1_ITEM_rptr(X509). This - * would be used when a function takes an ASN1_ITEM * argument. - * - */ - -#ifndef OPENSSL_EXPORT_VAR_AS_FUNCTION - -/* ASN1_ITEM pointer exported type */ -typedef const ASN1_ITEM ASN1_ITEM_EXP; - -/* Macro to obtain ASN1_ITEM pointer from exported type */ -#define ASN1_ITEM_ptr(iptr) (iptr) - -/* Macro to include ASN1_ITEM pointer from base type */ -#define ASN1_ITEM_ref(iptr) (&(iptr##_it)) - -#define ASN1_ITEM_rptr(ref) (&(ref##_it)) - -#define DECLARE_ASN1_ITEM(name) \ - OPENSSL_EXTERN const ASN1_ITEM name##_it; - -#else - -/* Platforms that can't easily handle shared global variables are declared - * as functions returning ASN1_ITEM pointers. - */ - -/* ASN1_ITEM pointer exported type */ -typedef const ASN1_ITEM * ASN1_ITEM_EXP(void); - -/* Macro to obtain ASN1_ITEM pointer from exported type */ -#define ASN1_ITEM_ptr(iptr) (iptr()) - -/* Macro to include ASN1_ITEM pointer from base type */ -#define ASN1_ITEM_ref(iptr) (iptr##_it) - -#define ASN1_ITEM_rptr(ref) (ref##_it()) - -#define DECLARE_ASN1_ITEM(name) \ - const ASN1_ITEM * name##_it(void); - -#endif - -/* Parameters used by ASN1_STRING_print_ex() */ - -/* These determine which characters to escape: - * RFC2253 special characters, control characters and - * MSB set characters - */ - -#define ASN1_STRFLGS_ESC_2253 1 -#define ASN1_STRFLGS_ESC_CTRL 2 -#define ASN1_STRFLGS_ESC_MSB 4 - - -/* This flag determines how we do escaping: normally - * RC2253 backslash only, set this to use backslash and - * quote. - */ - -#define ASN1_STRFLGS_ESC_QUOTE 8 - - -/* These three flags are internal use only. */ - -/* Character is a valid PrintableString character */ -#define CHARTYPE_PRINTABLESTRING 0x10 -/* Character needs escaping if it is the first character */ -#define CHARTYPE_FIRST_ESC_2253 0x20 -/* Character needs escaping if it is the last character */ -#define CHARTYPE_LAST_ESC_2253 0x40 - -/* NB the internal flags are safely reused below by flags - * handled at the top level. - */ - -/* If this is set we convert all character strings - * to UTF8 first - */ - -#define ASN1_STRFLGS_UTF8_CONVERT 0x10 - -/* If this is set we don't attempt to interpret content: - * just assume all strings are 1 byte per character. This - * will produce some pretty odd looking output! - */ - -#define ASN1_STRFLGS_IGNORE_TYPE 0x20 - -/* If this is set we include the string type in the output */ -#define ASN1_STRFLGS_SHOW_TYPE 0x40 - -/* This determines which strings to display and which to - * 'dump' (hex dump of content octets or DER encoding). We can - * only dump non character strings or everything. If we - * don't dump 'unknown' they are interpreted as character - * strings with 1 octet per character and are subject to - * the usual escaping options. - */ - -#define ASN1_STRFLGS_DUMP_ALL 0x80 -#define ASN1_STRFLGS_DUMP_UNKNOWN 0x100 - -/* These determine what 'dumping' does, we can dump the - * content octets or the DER encoding: both use the - * RFC2253 #XXXXX notation. - */ - -#define ASN1_STRFLGS_DUMP_DER 0x200 - -/* All the string flags consistent with RFC2253, - * escaping control characters isn't essential in - * RFC2253 but it is advisable anyway. - */ - -#define ASN1_STRFLGS_RFC2253 (ASN1_STRFLGS_ESC_2253 | \ - ASN1_STRFLGS_ESC_CTRL | \ - ASN1_STRFLGS_ESC_MSB | \ - ASN1_STRFLGS_UTF8_CONVERT | \ - ASN1_STRFLGS_DUMP_UNKNOWN | \ - ASN1_STRFLGS_DUMP_DER) - -DECLARE_STACK_OF(ASN1_INTEGER) -DECLARE_ASN1_SET_OF(ASN1_INTEGER) - -DECLARE_STACK_OF(ASN1_GENERALSTRING) - -typedef struct asn1_type_st - { - int type; - union { - char *ptr; - ASN1_BOOLEAN boolean; - ASN1_STRING * asn1_string; - ASN1_OBJECT * object; - ASN1_INTEGER * integer; - ASN1_ENUMERATED * enumerated; - ASN1_BIT_STRING * bit_string; - ASN1_OCTET_STRING * octet_string; - ASN1_PRINTABLESTRING * printablestring; - ASN1_T61STRING * t61string; - ASN1_IA5STRING * ia5string; - ASN1_GENERALSTRING * generalstring; - ASN1_BMPSTRING * bmpstring; - ASN1_UNIVERSALSTRING * universalstring; - ASN1_UTCTIME * utctime; - ASN1_GENERALIZEDTIME * generalizedtime; - ASN1_VISIBLESTRING * visiblestring; - ASN1_UTF8STRING * utf8string; - /* set and sequence are left complete and still - * contain the set or sequence bytes */ - ASN1_STRING * set; - ASN1_STRING * sequence; - ASN1_VALUE * asn1_value; - } value; - } ASN1_TYPE; - -DECLARE_STACK_OF(ASN1_TYPE) -DECLARE_ASN1_SET_OF(ASN1_TYPE) - -typedef STACK_OF(ASN1_TYPE) ASN1_SEQUENCE_ANY; - -DECLARE_ASN1_ENCODE_FUNCTIONS_const(ASN1_SEQUENCE_ANY, ASN1_SEQUENCE_ANY) -DECLARE_ASN1_ENCODE_FUNCTIONS_const(ASN1_SEQUENCE_ANY, ASN1_SET_ANY) - -typedef struct NETSCAPE_X509_st - { - ASN1_OCTET_STRING *header; - X509 *cert; - } NETSCAPE_X509; - -/* This is used to contain a list of bit names */ -typedef struct BIT_STRING_BITNAME_st { - int bitnum; - const char *lname; - const char *sname; -} BIT_STRING_BITNAME; - - -#define M_ASN1_STRING_length(x) ((x)->length) -#define M_ASN1_STRING_length_set(x, n) ((x)->length = (n)) -#define M_ASN1_STRING_type(x) ((x)->type) -#define M_ASN1_STRING_data(x) ((x)->data) - -/* Macros for string operations */ -#define M_ASN1_BIT_STRING_new() (ASN1_BIT_STRING *)\ - ASN1_STRING_type_new(V_ASN1_BIT_STRING) -#define M_ASN1_BIT_STRING_free(a) ASN1_STRING_free((ASN1_STRING *)a) -#define M_ASN1_BIT_STRING_dup(a) (ASN1_BIT_STRING *)\ - ASN1_STRING_dup((const ASN1_STRING *)a) -#define M_ASN1_BIT_STRING_cmp(a,b) ASN1_STRING_cmp(\ - (const ASN1_STRING *)a,(const ASN1_STRING *)b) -#define M_ASN1_BIT_STRING_set(a,b,c) ASN1_STRING_set((ASN1_STRING *)a,b,c) - -#define M_ASN1_INTEGER_new() (ASN1_INTEGER *)\ - ASN1_STRING_type_new(V_ASN1_INTEGER) -#define M_ASN1_INTEGER_free(a) ASN1_STRING_free((ASN1_STRING *)a) -#define M_ASN1_INTEGER_dup(a) (ASN1_INTEGER *)\ - ASN1_STRING_dup((const ASN1_STRING *)a) -#define M_ASN1_INTEGER_cmp(a,b) ASN1_STRING_cmp(\ - (const ASN1_STRING *)a,(const ASN1_STRING *)b) - -#define M_ASN1_ENUMERATED_new() (ASN1_ENUMERATED *)\ - ASN1_STRING_type_new(V_ASN1_ENUMERATED) -#define M_ASN1_ENUMERATED_free(a) ASN1_STRING_free((ASN1_STRING *)a) -#define M_ASN1_ENUMERATED_dup(a) (ASN1_ENUMERATED *)\ - ASN1_STRING_dup((const ASN1_STRING *)a) -#define M_ASN1_ENUMERATED_cmp(a,b) ASN1_STRING_cmp(\ - (const ASN1_STRING *)a,(const ASN1_STRING *)b) - -#define M_ASN1_OCTET_STRING_new() (ASN1_OCTET_STRING *)\ - ASN1_STRING_type_new(V_ASN1_OCTET_STRING) -#define M_ASN1_OCTET_STRING_free(a) ASN1_STRING_free((ASN1_STRING *)a) -#define M_ASN1_OCTET_STRING_dup(a) (ASN1_OCTET_STRING *)\ - ASN1_STRING_dup((const ASN1_STRING *)a) -#define M_ASN1_OCTET_STRING_cmp(a,b) ASN1_STRING_cmp(\ - (const ASN1_STRING *)a,(const ASN1_STRING *)b) -#define M_ASN1_OCTET_STRING_set(a,b,c) ASN1_STRING_set((ASN1_STRING *)a,b,c) -#define M_ASN1_OCTET_STRING_print(a,b) ASN1_STRING_print(a,(ASN1_STRING *)b) -#define M_i2d_ASN1_OCTET_STRING(a,pp) \ - i2d_ASN1_bytes((ASN1_STRING *)a,pp,V_ASN1_OCTET_STRING,\ - V_ASN1_UNIVERSAL) - -#define B_ASN1_TIME \ - B_ASN1_UTCTIME | \ - B_ASN1_GENERALIZEDTIME - -#define B_ASN1_PRINTABLE \ - B_ASN1_NUMERICSTRING| \ - B_ASN1_PRINTABLESTRING| \ - B_ASN1_T61STRING| \ - B_ASN1_IA5STRING| \ - B_ASN1_BIT_STRING| \ - B_ASN1_UNIVERSALSTRING|\ - B_ASN1_BMPSTRING|\ - B_ASN1_UTF8STRING|\ - B_ASN1_SEQUENCE|\ - B_ASN1_UNKNOWN - -#define B_ASN1_DIRECTORYSTRING \ - B_ASN1_PRINTABLESTRING| \ - B_ASN1_TELETEXSTRING|\ - B_ASN1_BMPSTRING|\ - B_ASN1_UNIVERSALSTRING|\ - B_ASN1_UTF8STRING - -#define B_ASN1_DISPLAYTEXT \ - B_ASN1_IA5STRING| \ - B_ASN1_VISIBLESTRING| \ - B_ASN1_BMPSTRING|\ - B_ASN1_UTF8STRING - -#define M_ASN1_PRINTABLE_new() ASN1_STRING_type_new(V_ASN1_T61STRING) -#define M_ASN1_PRINTABLE_free(a) ASN1_STRING_free((ASN1_STRING *)a) -#define M_i2d_ASN1_PRINTABLE(a,pp) i2d_ASN1_bytes((ASN1_STRING *)a,\ - pp,a->type,V_ASN1_UNIVERSAL) -#define M_d2i_ASN1_PRINTABLE(a,pp,l) \ - d2i_ASN1_type_bytes((ASN1_STRING **)a,pp,l, \ - B_ASN1_PRINTABLE) - -#define M_DIRECTORYSTRING_new() ASN1_STRING_type_new(V_ASN1_PRINTABLESTRING) -#define M_DIRECTORYSTRING_free(a) ASN1_STRING_free((ASN1_STRING *)a) -#define M_i2d_DIRECTORYSTRING(a,pp) i2d_ASN1_bytes((ASN1_STRING *)a,\ - pp,a->type,V_ASN1_UNIVERSAL) -#define M_d2i_DIRECTORYSTRING(a,pp,l) \ - d2i_ASN1_type_bytes((ASN1_STRING **)a,pp,l, \ - B_ASN1_DIRECTORYSTRING) - -#define M_DISPLAYTEXT_new() ASN1_STRING_type_new(V_ASN1_VISIBLESTRING) -#define M_DISPLAYTEXT_free(a) ASN1_STRING_free((ASN1_STRING *)a) -#define M_i2d_DISPLAYTEXT(a,pp) i2d_ASN1_bytes((ASN1_STRING *)a,\ - pp,a->type,V_ASN1_UNIVERSAL) -#define M_d2i_DISPLAYTEXT(a,pp,l) \ - d2i_ASN1_type_bytes((ASN1_STRING **)a,pp,l, \ - B_ASN1_DISPLAYTEXT) - -#define M_ASN1_PRINTABLESTRING_new() (ASN1_PRINTABLESTRING *)\ - ASN1_STRING_type_new(V_ASN1_PRINTABLESTRING) -#define M_ASN1_PRINTABLESTRING_free(a) ASN1_STRING_free((ASN1_STRING *)a) -#define M_i2d_ASN1_PRINTABLESTRING(a,pp) \ - i2d_ASN1_bytes((ASN1_STRING *)a,pp,V_ASN1_PRINTABLESTRING,\ - V_ASN1_UNIVERSAL) -#define M_d2i_ASN1_PRINTABLESTRING(a,pp,l) \ - (ASN1_PRINTABLESTRING *)d2i_ASN1_type_bytes\ - ((ASN1_STRING **)a,pp,l,B_ASN1_PRINTABLESTRING) - -#define M_ASN1_T61STRING_new() (ASN1_T61STRING *)\ - ASN1_STRING_type_new(V_ASN1_T61STRING) -#define M_ASN1_T61STRING_free(a) ASN1_STRING_free((ASN1_STRING *)a) -#define M_i2d_ASN1_T61STRING(a,pp) \ - i2d_ASN1_bytes((ASN1_STRING *)a,pp,V_ASN1_T61STRING,\ - V_ASN1_UNIVERSAL) -#define M_d2i_ASN1_T61STRING(a,pp,l) \ - (ASN1_T61STRING *)d2i_ASN1_type_bytes\ - ((ASN1_STRING **)a,pp,l,B_ASN1_T61STRING) - -#define M_ASN1_IA5STRING_new() (ASN1_IA5STRING *)\ - ASN1_STRING_type_new(V_ASN1_IA5STRING) -#define M_ASN1_IA5STRING_free(a) ASN1_STRING_free((ASN1_STRING *)a) -#define M_ASN1_IA5STRING_dup(a) \ - (ASN1_IA5STRING *)ASN1_STRING_dup((const ASN1_STRING *)a) -#define M_i2d_ASN1_IA5STRING(a,pp) \ - i2d_ASN1_bytes((ASN1_STRING *)a,pp,V_ASN1_IA5STRING,\ - V_ASN1_UNIVERSAL) -#define M_d2i_ASN1_IA5STRING(a,pp,l) \ - (ASN1_IA5STRING *)d2i_ASN1_type_bytes((ASN1_STRING **)a,pp,l,\ - B_ASN1_IA5STRING) - -#define M_ASN1_UTCTIME_new() (ASN1_UTCTIME *)\ - ASN1_STRING_type_new(V_ASN1_UTCTIME) -#define M_ASN1_UTCTIME_free(a) ASN1_STRING_free((ASN1_STRING *)a) -#define M_ASN1_UTCTIME_dup(a) (ASN1_UTCTIME *)\ - ASN1_STRING_dup((const ASN1_STRING *)a) - -#define M_ASN1_GENERALIZEDTIME_new() (ASN1_GENERALIZEDTIME *)\ - ASN1_STRING_type_new(V_ASN1_GENERALIZEDTIME) -#define M_ASN1_GENERALIZEDTIME_free(a) ASN1_STRING_free((ASN1_STRING *)a) -#define M_ASN1_GENERALIZEDTIME_dup(a) (ASN1_GENERALIZEDTIME *)ASN1_STRING_dup(\ - (const ASN1_STRING *)a) - -#define M_ASN1_TIME_new() (ASN1_TIME *)\ - ASN1_STRING_type_new(V_ASN1_UTCTIME) -#define M_ASN1_TIME_free(a) ASN1_STRING_free((ASN1_STRING *)a) -#define M_ASN1_TIME_dup(a) (ASN1_TIME *)\ - ASN1_STRING_dup((const ASN1_STRING *)a) - -#define M_ASN1_GENERALSTRING_new() (ASN1_GENERALSTRING *)\ - ASN1_STRING_type_new(V_ASN1_GENERALSTRING) -#define M_ASN1_GENERALSTRING_free(a) ASN1_STRING_free((ASN1_STRING *)a) -#define M_i2d_ASN1_GENERALSTRING(a,pp) \ - i2d_ASN1_bytes((ASN1_STRING *)a,pp,V_ASN1_GENERALSTRING,\ - V_ASN1_UNIVERSAL) -#define M_d2i_ASN1_GENERALSTRING(a,pp,l) \ - (ASN1_GENERALSTRING *)d2i_ASN1_type_bytes\ - ((ASN1_STRING **)a,pp,l,B_ASN1_GENERALSTRING) - -#define M_ASN1_UNIVERSALSTRING_new() (ASN1_UNIVERSALSTRING *)\ - ASN1_STRING_type_new(V_ASN1_UNIVERSALSTRING) -#define M_ASN1_UNIVERSALSTRING_free(a) ASN1_STRING_free((ASN1_STRING *)a) -#define M_i2d_ASN1_UNIVERSALSTRING(a,pp) \ - i2d_ASN1_bytes((ASN1_STRING *)a,pp,V_ASN1_UNIVERSALSTRING,\ - V_ASN1_UNIVERSAL) -#define M_d2i_ASN1_UNIVERSALSTRING(a,pp,l) \ - (ASN1_UNIVERSALSTRING *)d2i_ASN1_type_bytes\ - ((ASN1_STRING **)a,pp,l,B_ASN1_UNIVERSALSTRING) - -#define M_ASN1_BMPSTRING_new() (ASN1_BMPSTRING *)\ - ASN1_STRING_type_new(V_ASN1_BMPSTRING) -#define M_ASN1_BMPSTRING_free(a) ASN1_STRING_free((ASN1_STRING *)a) -#define M_i2d_ASN1_BMPSTRING(a,pp) \ - i2d_ASN1_bytes((ASN1_STRING *)a,pp,V_ASN1_BMPSTRING,\ - V_ASN1_UNIVERSAL) -#define M_d2i_ASN1_BMPSTRING(a,pp,l) \ - (ASN1_BMPSTRING *)d2i_ASN1_type_bytes\ - ((ASN1_STRING **)a,pp,l,B_ASN1_BMPSTRING) - -#define M_ASN1_VISIBLESTRING_new() (ASN1_VISIBLESTRING *)\ - ASN1_STRING_type_new(V_ASN1_VISIBLESTRING) -#define M_ASN1_VISIBLESTRING_free(a) ASN1_STRING_free((ASN1_STRING *)a) -#define M_i2d_ASN1_VISIBLESTRING(a,pp) \ - i2d_ASN1_bytes((ASN1_STRING *)a,pp,V_ASN1_VISIBLESTRING,\ - V_ASN1_UNIVERSAL) -#define M_d2i_ASN1_VISIBLESTRING(a,pp,l) \ - (ASN1_VISIBLESTRING *)d2i_ASN1_type_bytes\ - ((ASN1_STRING **)a,pp,l,B_ASN1_VISIBLESTRING) - -#define M_ASN1_UTF8STRING_new() (ASN1_UTF8STRING *)\ - ASN1_STRING_type_new(V_ASN1_UTF8STRING) -#define M_ASN1_UTF8STRING_free(a) ASN1_STRING_free((ASN1_STRING *)a) -#define M_i2d_ASN1_UTF8STRING(a,pp) \ - i2d_ASN1_bytes((ASN1_STRING *)a,pp,V_ASN1_UTF8STRING,\ - V_ASN1_UNIVERSAL) -#define M_d2i_ASN1_UTF8STRING(a,pp,l) \ - (ASN1_UTF8STRING *)d2i_ASN1_type_bytes\ - ((ASN1_STRING **)a,pp,l,B_ASN1_UTF8STRING) - - /* for the is_set parameter to i2d_ASN1_SET */ -#define IS_SEQUENCE 0 -#define IS_SET 1 - -DECLARE_ASN1_FUNCTIONS_fname(ASN1_TYPE, ASN1_ANY, ASN1_TYPE) - -int ASN1_TYPE_get(ASN1_TYPE *a); -void ASN1_TYPE_set(ASN1_TYPE *a, int type, void *value); -int ASN1_TYPE_set1(ASN1_TYPE *a, int type, const void *value); -int ASN1_TYPE_cmp(ASN1_TYPE *a, ASN1_TYPE *b); - -ASN1_OBJECT * ASN1_OBJECT_new(void ); -void ASN1_OBJECT_free(ASN1_OBJECT *a); -int i2d_ASN1_OBJECT(ASN1_OBJECT *a,unsigned char **pp); -ASN1_OBJECT * c2i_ASN1_OBJECT(ASN1_OBJECT **a,const unsigned char **pp, - long length); -ASN1_OBJECT * d2i_ASN1_OBJECT(ASN1_OBJECT **a,const unsigned char **pp, - long length); - -DECLARE_ASN1_ITEM(ASN1_OBJECT) - -DECLARE_STACK_OF(ASN1_OBJECT) -DECLARE_ASN1_SET_OF(ASN1_OBJECT) - -ASN1_STRING * ASN1_STRING_new(void); -void ASN1_STRING_free(ASN1_STRING *a); -int ASN1_STRING_copy(ASN1_STRING *dst, const ASN1_STRING *str); -ASN1_STRING * ASN1_STRING_dup(const ASN1_STRING *a); -ASN1_STRING * ASN1_STRING_type_new(int type ); -int ASN1_STRING_cmp(const ASN1_STRING *a, const ASN1_STRING *b); - /* Since this is used to store all sorts of things, via macros, for now, make - its data void * */ -int ASN1_STRING_set(ASN1_STRING *str, const void *data, int len); -void ASN1_STRING_set0(ASN1_STRING *str, void *data, int len); -int ASN1_STRING_length(const ASN1_STRING *x); -void ASN1_STRING_length_set(ASN1_STRING *x, int n); -int ASN1_STRING_type(ASN1_STRING *x); -unsigned char * ASN1_STRING_data(ASN1_STRING *x); - -DECLARE_ASN1_FUNCTIONS(ASN1_BIT_STRING) -int i2c_ASN1_BIT_STRING(ASN1_BIT_STRING *a,unsigned char **pp); -ASN1_BIT_STRING *c2i_ASN1_BIT_STRING(ASN1_BIT_STRING **a,const unsigned char **pp, - long length); -int ASN1_BIT_STRING_set(ASN1_BIT_STRING *a, unsigned char *d, - int length ); -int ASN1_BIT_STRING_set_bit(ASN1_BIT_STRING *a, int n, int value); -int ASN1_BIT_STRING_get_bit(ASN1_BIT_STRING *a, int n); -int ASN1_BIT_STRING_check(ASN1_BIT_STRING *a, - unsigned char *flags, int flags_len); - -#ifndef OPENSSL_NO_BIO -int ASN1_BIT_STRING_name_print(BIO *out, ASN1_BIT_STRING *bs, - BIT_STRING_BITNAME *tbl, int indent); -#endif -int ASN1_BIT_STRING_num_asc(char *name, BIT_STRING_BITNAME *tbl); -int ASN1_BIT_STRING_set_asc(ASN1_BIT_STRING *bs, char *name, int value, - BIT_STRING_BITNAME *tbl); - -int i2d_ASN1_BOOLEAN(int a,unsigned char **pp); -int d2i_ASN1_BOOLEAN(int *a,const unsigned char **pp,long length); - -DECLARE_ASN1_FUNCTIONS(ASN1_INTEGER) -int i2c_ASN1_INTEGER(ASN1_INTEGER *a,unsigned char **pp); -ASN1_INTEGER *c2i_ASN1_INTEGER(ASN1_INTEGER **a,const unsigned char **pp, - long length); -ASN1_INTEGER *d2i_ASN1_UINTEGER(ASN1_INTEGER **a,const unsigned char **pp, - long length); -ASN1_INTEGER * ASN1_INTEGER_dup(const ASN1_INTEGER *x); -int ASN1_INTEGER_cmp(const ASN1_INTEGER *x, const ASN1_INTEGER *y); - -DECLARE_ASN1_FUNCTIONS(ASN1_ENUMERATED) - -int ASN1_UTCTIME_check(ASN1_UTCTIME *a); -ASN1_UTCTIME *ASN1_UTCTIME_set(ASN1_UTCTIME *s,time_t t); -ASN1_UTCTIME *ASN1_UTCTIME_adj(ASN1_UTCTIME *s, time_t t, - int offset_day, long offset_sec); -int ASN1_UTCTIME_set_string(ASN1_UTCTIME *s, const char *str); -int ASN1_UTCTIME_cmp_time_t(const ASN1_UTCTIME *s, time_t t); -#if 0 -time_t ASN1_UTCTIME_get(const ASN1_UTCTIME *s); -#endif - -int ASN1_GENERALIZEDTIME_check(ASN1_GENERALIZEDTIME *a); -ASN1_GENERALIZEDTIME *ASN1_GENERALIZEDTIME_set(ASN1_GENERALIZEDTIME *s,time_t t); -ASN1_GENERALIZEDTIME *ASN1_GENERALIZEDTIME_adj(ASN1_GENERALIZEDTIME *s, - time_t t, int offset_day, long offset_sec); -int ASN1_GENERALIZEDTIME_set_string(ASN1_GENERALIZEDTIME *s, const char *str); - -DECLARE_ASN1_FUNCTIONS(ASN1_OCTET_STRING) -ASN1_OCTET_STRING * ASN1_OCTET_STRING_dup(const ASN1_OCTET_STRING *a); -int ASN1_OCTET_STRING_cmp(const ASN1_OCTET_STRING *a, const ASN1_OCTET_STRING *b); -int ASN1_OCTET_STRING_set(ASN1_OCTET_STRING *str, const unsigned char *data, int len); - -DECLARE_ASN1_FUNCTIONS(ASN1_VISIBLESTRING) -DECLARE_ASN1_FUNCTIONS(ASN1_UNIVERSALSTRING) -DECLARE_ASN1_FUNCTIONS(ASN1_UTF8STRING) -DECLARE_ASN1_FUNCTIONS(ASN1_NULL) -DECLARE_ASN1_FUNCTIONS(ASN1_BMPSTRING) - -int UTF8_getc(const unsigned char *str, int len, unsigned long *val); -int UTF8_putc(unsigned char *str, int len, unsigned long value); - -DECLARE_ASN1_FUNCTIONS_name(ASN1_STRING, ASN1_PRINTABLE) - -DECLARE_ASN1_FUNCTIONS_name(ASN1_STRING, DIRECTORYSTRING) -DECLARE_ASN1_FUNCTIONS_name(ASN1_STRING, DISPLAYTEXT) -DECLARE_ASN1_FUNCTIONS(ASN1_PRINTABLESTRING) -DECLARE_ASN1_FUNCTIONS(ASN1_T61STRING) -DECLARE_ASN1_FUNCTIONS(ASN1_IA5STRING) -DECLARE_ASN1_FUNCTIONS(ASN1_GENERALSTRING) -DECLARE_ASN1_FUNCTIONS(ASN1_UTCTIME) -DECLARE_ASN1_FUNCTIONS(ASN1_GENERALIZEDTIME) -DECLARE_ASN1_FUNCTIONS(ASN1_TIME) - -DECLARE_ASN1_ITEM(ASN1_OCTET_STRING_NDEF) - -ASN1_TIME *ASN1_TIME_set(ASN1_TIME *s,time_t t); -ASN1_TIME *ASN1_TIME_adj(ASN1_TIME *s,time_t t, - int offset_day, long offset_sec); -int ASN1_TIME_check(ASN1_TIME *t); -ASN1_GENERALIZEDTIME *ASN1_TIME_to_generalizedtime(ASN1_TIME *t, ASN1_GENERALIZEDTIME **out); -int ASN1_TIME_set_string(ASN1_TIME *s, const char *str); - -int i2d_ASN1_SET(STACK_OF(OPENSSL_BLOCK) *a, unsigned char **pp, - i2d_of_void *i2d, int ex_tag, int ex_class, - int is_set); -STACK_OF(OPENSSL_BLOCK) *d2i_ASN1_SET(STACK_OF(OPENSSL_BLOCK) **a, - const unsigned char **pp, - long length, d2i_of_void *d2i, - void (*free_func)(OPENSSL_BLOCK), int ex_tag, - int ex_class); - -#ifndef OPENSSL_NO_BIO -int i2a_ASN1_INTEGER(BIO *bp, ASN1_INTEGER *a); -int a2i_ASN1_INTEGER(BIO *bp,ASN1_INTEGER *bs,char *buf,int size); -int i2a_ASN1_ENUMERATED(BIO *bp, ASN1_ENUMERATED *a); -int a2i_ASN1_ENUMERATED(BIO *bp,ASN1_ENUMERATED *bs,char *buf,int size); -int i2a_ASN1_OBJECT(BIO *bp,ASN1_OBJECT *a); -int a2i_ASN1_STRING(BIO *bp,ASN1_STRING *bs,char *buf,int size); -int i2a_ASN1_STRING(BIO *bp, ASN1_STRING *a, int type); -#endif -int i2t_ASN1_OBJECT(char *buf,int buf_len,ASN1_OBJECT *a); - -int a2d_ASN1_OBJECT(unsigned char *out,int olen, const char *buf, int num); -ASN1_OBJECT *ASN1_OBJECT_create(int nid, unsigned char *data,int len, - const char *sn, const char *ln); - -int ASN1_INTEGER_set(ASN1_INTEGER *a, long v); -long ASN1_INTEGER_get(const ASN1_INTEGER *a); -ASN1_INTEGER *BN_to_ASN1_INTEGER(const BIGNUM *bn, ASN1_INTEGER *ai); -BIGNUM *ASN1_INTEGER_to_BN(const ASN1_INTEGER *ai,BIGNUM *bn); - -int ASN1_ENUMERATED_set(ASN1_ENUMERATED *a, long v); -long ASN1_ENUMERATED_get(ASN1_ENUMERATED *a); -ASN1_ENUMERATED *BN_to_ASN1_ENUMERATED(BIGNUM *bn, ASN1_ENUMERATED *ai); -BIGNUM *ASN1_ENUMERATED_to_BN(ASN1_ENUMERATED *ai,BIGNUM *bn); - -/* General */ -/* given a string, return the correct type, max is the maximum length */ -int ASN1_PRINTABLE_type(const unsigned char *s, int max); - -int i2d_ASN1_bytes(ASN1_STRING *a, unsigned char **pp, int tag, int xclass); -ASN1_STRING *d2i_ASN1_bytes(ASN1_STRING **a, const unsigned char **pp, - long length, int Ptag, int Pclass); -unsigned long ASN1_tag2bit(int tag); -/* type is one or more of the B_ASN1_ values. */ -ASN1_STRING *d2i_ASN1_type_bytes(ASN1_STRING **a,const unsigned char **pp, - long length,int type); - -/* PARSING */ -int asn1_Finish(ASN1_CTX *c); -int asn1_const_Finish(ASN1_const_CTX *c); - -/* SPECIALS */ -int ASN1_get_object(const unsigned char **pp, long *plength, int *ptag, - int *pclass, long omax); -int ASN1_check_infinite_end(unsigned char **p,long len); -int ASN1_const_check_infinite_end(const unsigned char **p,long len); -void ASN1_put_object(unsigned char **pp, int constructed, int length, - int tag, int xclass); -int ASN1_put_eoc(unsigned char **pp); -int ASN1_object_size(int constructed, int length, int tag); - -/* Used to implement other functions */ -void *ASN1_dup(i2d_of_void *i2d, d2i_of_void *d2i, void *x); - -#define ASN1_dup_of(type,i2d,d2i,x) \ - ((type*)ASN1_dup(CHECKED_I2D_OF(type, i2d), \ - CHECKED_D2I_OF(type, d2i), \ - CHECKED_PTR_OF(type, x))) - -#define ASN1_dup_of_const(type,i2d,d2i,x) \ - ((type*)ASN1_dup(CHECKED_I2D_OF(const type, i2d), \ - CHECKED_D2I_OF(type, d2i), \ - CHECKED_PTR_OF(const type, x))) - -void *ASN1_item_dup(const ASN1_ITEM *it, void *x); - -/* ASN1 alloc/free macros for when a type is only used internally */ - -#define M_ASN1_new_of(type) (type *)ASN1_item_new(ASN1_ITEM_rptr(type)) -#define M_ASN1_free_of(x, type) \ - ASN1_item_free(CHECKED_PTR_OF(type, x), ASN1_ITEM_rptr(type)) - -#ifndef OPENSSL_NO_FP_API -void *ASN1_d2i_fp(void *(*xnew)(void), d2i_of_void *d2i, FILE *in, void **x); - -#define ASN1_d2i_fp_of(type,xnew,d2i,in,x) \ - ((type*)ASN1_d2i_fp(CHECKED_NEW_OF(type, xnew), \ - CHECKED_D2I_OF(type, d2i), \ - in, \ - CHECKED_PPTR_OF(type, x))) - -void *ASN1_item_d2i_fp(const ASN1_ITEM *it, FILE *in, void *x); -int ASN1_i2d_fp(i2d_of_void *i2d,FILE *out,void *x); - -#define ASN1_i2d_fp_of(type,i2d,out,x) \ - (ASN1_i2d_fp(CHECKED_I2D_OF(type, i2d), \ - out, \ - CHECKED_PTR_OF(type, x))) - -#define ASN1_i2d_fp_of_const(type,i2d,out,x) \ - (ASN1_i2d_fp(CHECKED_I2D_OF(const type, i2d), \ - out, \ - CHECKED_PTR_OF(const type, x))) - -int ASN1_item_i2d_fp(const ASN1_ITEM *it, FILE *out, void *x); -int ASN1_STRING_print_ex_fp(FILE *fp, ASN1_STRING *str, unsigned long flags); -#endif - -int ASN1_STRING_to_UTF8(unsigned char **out, ASN1_STRING *in); - -#ifndef OPENSSL_NO_BIO -void *ASN1_d2i_bio(void *(*xnew)(void), d2i_of_void *d2i, BIO *in, void **x); - -#define ASN1_d2i_bio_of(type,xnew,d2i,in,x) \ - ((type*)ASN1_d2i_bio( CHECKED_NEW_OF(type, xnew), \ - CHECKED_D2I_OF(type, d2i), \ - in, \ - CHECKED_PPTR_OF(type, x))) - -void *ASN1_item_d2i_bio(const ASN1_ITEM *it, BIO *in, void *x); -int ASN1_i2d_bio(i2d_of_void *i2d,BIO *out, unsigned char *x); - -#define ASN1_i2d_bio_of(type,i2d,out,x) \ - (ASN1_i2d_bio(CHECKED_I2D_OF(type, i2d), \ - out, \ - CHECKED_PTR_OF(type, x))) - -#define ASN1_i2d_bio_of_const(type,i2d,out,x) \ - (ASN1_i2d_bio(CHECKED_I2D_OF(const type, i2d), \ - out, \ - CHECKED_PTR_OF(const type, x))) - -int ASN1_item_i2d_bio(const ASN1_ITEM *it, BIO *out, void *x); -int ASN1_UTCTIME_print(BIO *fp, const ASN1_UTCTIME *a); -int ASN1_GENERALIZEDTIME_print(BIO *fp, const ASN1_GENERALIZEDTIME *a); -int ASN1_TIME_print(BIO *fp, const ASN1_TIME *a); -int ASN1_STRING_print(BIO *bp, const ASN1_STRING *v); -int ASN1_STRING_print_ex(BIO *out, ASN1_STRING *str, unsigned long flags); -int ASN1_bn_print(BIO *bp, const char *number, const BIGNUM *num, - unsigned char *buf, int off); -int ASN1_parse(BIO *bp,const unsigned char *pp,long len,int indent); -int ASN1_parse_dump(BIO *bp,const unsigned char *pp,long len,int indent,int dump); -#endif -const char *ASN1_tag2str(int tag); - -/* Used to load and write netscape format cert */ - -DECLARE_ASN1_FUNCTIONS(NETSCAPE_X509) - -int ASN1_UNIVERSALSTRING_to_string(ASN1_UNIVERSALSTRING *s); - -int ASN1_TYPE_set_octetstring(ASN1_TYPE *a, - unsigned char *data, int len); -int ASN1_TYPE_get_octetstring(ASN1_TYPE *a, - unsigned char *data, int max_len); -int ASN1_TYPE_set_int_octetstring(ASN1_TYPE *a, long num, - unsigned char *data, int len); -int ASN1_TYPE_get_int_octetstring(ASN1_TYPE *a,long *num, - unsigned char *data, int max_len); - -STACK_OF(OPENSSL_BLOCK) *ASN1_seq_unpack(const unsigned char *buf, int len, - d2i_of_void *d2i, void (*free_func)(OPENSSL_BLOCK)); -unsigned char *ASN1_seq_pack(STACK_OF(OPENSSL_BLOCK) *safes, i2d_of_void *i2d, - unsigned char **buf, int *len ); -void *ASN1_unpack_string(ASN1_STRING *oct, d2i_of_void *d2i); -void *ASN1_item_unpack(ASN1_STRING *oct, const ASN1_ITEM *it); -ASN1_STRING *ASN1_pack_string(void *obj, i2d_of_void *i2d, - ASN1_OCTET_STRING **oct); - -#define ASN1_pack_string_of(type,obj,i2d,oct) \ - (ASN1_pack_string(CHECKED_PTR_OF(type, obj), \ - CHECKED_I2D_OF(type, i2d), \ - oct)) - -ASN1_STRING *ASN1_item_pack(void *obj, const ASN1_ITEM *it, ASN1_OCTET_STRING **oct); - -void ASN1_STRING_set_default_mask(unsigned long mask); -int ASN1_STRING_set_default_mask_asc(const char *p); -unsigned long ASN1_STRING_get_default_mask(void); -int ASN1_mbstring_copy(ASN1_STRING **out, const unsigned char *in, int len, - int inform, unsigned long mask); -int ASN1_mbstring_ncopy(ASN1_STRING **out, const unsigned char *in, int len, - int inform, unsigned long mask, - long minsize, long maxsize); - -ASN1_STRING *ASN1_STRING_set_by_NID(ASN1_STRING **out, - const unsigned char *in, int inlen, int inform, int nid); -ASN1_STRING_TABLE *ASN1_STRING_TABLE_get(int nid); -int ASN1_STRING_TABLE_add(int, long, long, unsigned long, unsigned long); -void ASN1_STRING_TABLE_cleanup(void); - -/* ASN1 template functions */ - -/* Old API compatible functions */ -ASN1_VALUE *ASN1_item_new(const ASN1_ITEM *it); -void ASN1_item_free(ASN1_VALUE *val, const ASN1_ITEM *it); -ASN1_VALUE * ASN1_item_d2i(ASN1_VALUE **val, const unsigned char **in, long len, const ASN1_ITEM *it); -int ASN1_item_i2d(ASN1_VALUE *val, unsigned char **out, const ASN1_ITEM *it); -int ASN1_item_ndef_i2d(ASN1_VALUE *val, unsigned char **out, const ASN1_ITEM *it); - -void ASN1_add_oid_module(void); - -ASN1_TYPE *ASN1_generate_nconf(char *str, CONF *nconf); -ASN1_TYPE *ASN1_generate_v3(char *str, X509V3_CTX *cnf); - -/* ASN1 Print flags */ - -/* Indicate missing OPTIONAL fields */ -#define ASN1_PCTX_FLAGS_SHOW_ABSENT 0x001 -/* Mark start and end of SEQUENCE */ -#define ASN1_PCTX_FLAGS_SHOW_SEQUENCE 0x002 -/* Mark start and end of SEQUENCE/SET OF */ -#define ASN1_PCTX_FLAGS_SHOW_SSOF 0x004 -/* Show the ASN1 type of primitives */ -#define ASN1_PCTX_FLAGS_SHOW_TYPE 0x008 -/* Don't show ASN1 type of ANY */ -#define ASN1_PCTX_FLAGS_NO_ANY_TYPE 0x010 -/* Don't show ASN1 type of MSTRINGs */ -#define ASN1_PCTX_FLAGS_NO_MSTRING_TYPE 0x020 -/* Don't show field names in SEQUENCE */ -#define ASN1_PCTX_FLAGS_NO_FIELD_NAME 0x040 -/* Show structure names of each SEQUENCE field */ -#define ASN1_PCTX_FLAGS_SHOW_FIELD_STRUCT_NAME 0x080 -/* Don't show structure name even at top level */ -#define ASN1_PCTX_FLAGS_NO_STRUCT_NAME 0x100 - -int ASN1_item_print(BIO *out, ASN1_VALUE *ifld, int indent, - const ASN1_ITEM *it, const ASN1_PCTX *pctx); -ASN1_PCTX *ASN1_PCTX_new(void); -void ASN1_PCTX_free(ASN1_PCTX *p); -unsigned long ASN1_PCTX_get_flags(ASN1_PCTX *p); -void ASN1_PCTX_set_flags(ASN1_PCTX *p, unsigned long flags); -unsigned long ASN1_PCTX_get_nm_flags(ASN1_PCTX *p); -void ASN1_PCTX_set_nm_flags(ASN1_PCTX *p, unsigned long flags); -unsigned long ASN1_PCTX_get_cert_flags(ASN1_PCTX *p); -void ASN1_PCTX_set_cert_flags(ASN1_PCTX *p, unsigned long flags); -unsigned long ASN1_PCTX_get_oid_flags(ASN1_PCTX *p); -void ASN1_PCTX_set_oid_flags(ASN1_PCTX *p, unsigned long flags); -unsigned long ASN1_PCTX_get_str_flags(ASN1_PCTX *p); -void ASN1_PCTX_set_str_flags(ASN1_PCTX *p, unsigned long flags); - -BIO_METHOD *BIO_f_asn1(void); - -BIO *BIO_new_NDEF(BIO *out, ASN1_VALUE *val, const ASN1_ITEM *it); - -int i2d_ASN1_bio_stream(BIO *out, ASN1_VALUE *val, BIO *in, int flags, - const ASN1_ITEM *it); -int PEM_write_bio_ASN1_stream(BIO *out, ASN1_VALUE *val, BIO *in, int flags, - const char *hdr, - const ASN1_ITEM *it); -int SMIME_write_ASN1(BIO *bio, ASN1_VALUE *val, BIO *data, int flags, - int ctype_nid, int econt_nid, - STACK_OF(X509_ALGOR) *mdalgs, - const ASN1_ITEM *it); -ASN1_VALUE *SMIME_read_ASN1(BIO *bio, BIO **bcont, const ASN1_ITEM *it); -int SMIME_crlf_copy(BIO *in, BIO *out, int flags); -int SMIME_text(BIO *in, BIO *out); - -/* BEGIN ERROR CODES */ -/* The following lines are auto generated by the script mkerr.pl. Any changes - * made after this point may be overwritten when the script is next run. - */ -void ERR_load_ASN1_strings(void); - -/* Error codes for the ASN1 functions. */ - -/* Function codes. */ -#define ASN1_F_A2D_ASN1_OBJECT 100 -#define ASN1_F_A2I_ASN1_ENUMERATED 101 -#define ASN1_F_A2I_ASN1_INTEGER 102 -#define ASN1_F_A2I_ASN1_STRING 103 -#define ASN1_F_APPEND_EXP 176 -#define ASN1_F_ASN1_BIT_STRING_SET_BIT 183 -#define ASN1_F_ASN1_CB 177 -#define ASN1_F_ASN1_CHECK_TLEN 104 -#define ASN1_F_ASN1_COLLATE_PRIMITIVE 105 -#define ASN1_F_ASN1_COLLECT 106 -#define ASN1_F_ASN1_D2I_EX_PRIMITIVE 108 -#define ASN1_F_ASN1_D2I_FP 109 -#define ASN1_F_ASN1_D2I_READ_BIO 107 -#define ASN1_F_ASN1_DIGEST 184 -#define ASN1_F_ASN1_DO_ADB 110 -#define ASN1_F_ASN1_DUP 111 -#define ASN1_F_ASN1_ENUMERATED_SET 112 -#define ASN1_F_ASN1_ENUMERATED_TO_BN 113 -#define ASN1_F_ASN1_EX_C2I 204 -#define ASN1_F_ASN1_FIND_END 190 -#define ASN1_F_ASN1_GENERALIZEDTIME_ADJ 216 -#define ASN1_F_ASN1_GENERALIZEDTIME_SET 185 -#define ASN1_F_ASN1_GENERATE_V3 178 -#define ASN1_F_ASN1_GET_OBJECT 114 -#define ASN1_F_ASN1_HEADER_NEW 115 -#define ASN1_F_ASN1_I2D_BIO 116 -#define ASN1_F_ASN1_I2D_FP 117 -#define ASN1_F_ASN1_INTEGER_SET 118 -#define ASN1_F_ASN1_INTEGER_TO_BN 119 -#define ASN1_F_ASN1_ITEM_D2I_FP 206 -#define ASN1_F_ASN1_ITEM_DUP 191 -#define ASN1_F_ASN1_ITEM_EX_COMBINE_NEW 121 -#define ASN1_F_ASN1_ITEM_EX_D2I 120 -#define ASN1_F_ASN1_ITEM_I2D_BIO 192 -#define ASN1_F_ASN1_ITEM_I2D_FP 193 -#define ASN1_F_ASN1_ITEM_PACK 198 -#define ASN1_F_ASN1_ITEM_SIGN 195 -#define ASN1_F_ASN1_ITEM_SIGN_CTX 220 -#define ASN1_F_ASN1_ITEM_UNPACK 199 -#define ASN1_F_ASN1_ITEM_VERIFY 197 -#define ASN1_F_ASN1_MBSTRING_NCOPY 122 -#define ASN1_F_ASN1_OBJECT_NEW 123 -#define ASN1_F_ASN1_OUTPUT_DATA 214 -#define ASN1_F_ASN1_PACK_STRING 124 -#define ASN1_F_ASN1_PCTX_NEW 205 -#define ASN1_F_ASN1_PKCS5_PBE_SET 125 -#define ASN1_F_ASN1_SEQ_PACK 126 -#define ASN1_F_ASN1_SEQ_UNPACK 127 -#define ASN1_F_ASN1_SIGN 128 -#define ASN1_F_ASN1_STR2TYPE 179 -#define ASN1_F_ASN1_STRING_SET 186 -#define ASN1_F_ASN1_STRING_TABLE_ADD 129 -#define ASN1_F_ASN1_STRING_TYPE_NEW 130 -#define ASN1_F_ASN1_TEMPLATE_EX_D2I 132 -#define ASN1_F_ASN1_TEMPLATE_NEW 133 -#define ASN1_F_ASN1_TEMPLATE_NOEXP_D2I 131 -#define ASN1_F_ASN1_TIME_ADJ 217 -#define ASN1_F_ASN1_TIME_SET 175 -#define ASN1_F_ASN1_TYPE_GET_INT_OCTETSTRING 134 -#define ASN1_F_ASN1_TYPE_GET_OCTETSTRING 135 -#define ASN1_F_ASN1_UNPACK_STRING 136 -#define ASN1_F_ASN1_UTCTIME_ADJ 218 -#define ASN1_F_ASN1_UTCTIME_SET 187 -#define ASN1_F_ASN1_VERIFY 137 -#define ASN1_F_B64_READ_ASN1 209 -#define ASN1_F_B64_WRITE_ASN1 210 -#define ASN1_F_BIO_NEW_NDEF 208 -#define ASN1_F_BITSTR_CB 180 -#define ASN1_F_BN_TO_ASN1_ENUMERATED 138 -#define ASN1_F_BN_TO_ASN1_INTEGER 139 -#define ASN1_F_C2I_ASN1_BIT_STRING 189 -#define ASN1_F_C2I_ASN1_INTEGER 194 -#define ASN1_F_C2I_ASN1_OBJECT 196 -#define ASN1_F_COLLECT_DATA 140 -#define ASN1_F_D2I_ASN1_BIT_STRING 141 -#define ASN1_F_D2I_ASN1_BOOLEAN 142 -#define ASN1_F_D2I_ASN1_BYTES 143 -#define ASN1_F_D2I_ASN1_GENERALIZEDTIME 144 -#define ASN1_F_D2I_ASN1_HEADER 145 -#define ASN1_F_D2I_ASN1_INTEGER 146 -#define ASN1_F_D2I_ASN1_OBJECT 147 -#define ASN1_F_D2I_ASN1_SET 148 -#define ASN1_F_D2I_ASN1_TYPE_BYTES 149 -#define ASN1_F_D2I_ASN1_UINTEGER 150 -#define ASN1_F_D2I_ASN1_UTCTIME 151 -#define ASN1_F_D2I_AUTOPRIVATEKEY 207 -#define ASN1_F_D2I_NETSCAPE_RSA 152 -#define ASN1_F_D2I_NETSCAPE_RSA_2 153 -#define ASN1_F_D2I_PRIVATEKEY 154 -#define ASN1_F_D2I_PUBLICKEY 155 -#define ASN1_F_D2I_RSA_NET 200 -#define ASN1_F_D2I_RSA_NET_2 201 -#define ASN1_F_D2I_X509 156 -#define ASN1_F_D2I_X509_CINF 157 -#define ASN1_F_D2I_X509_PKEY 159 -#define ASN1_F_I2D_ASN1_BIO_STREAM 211 -#define ASN1_F_I2D_ASN1_SET 188 -#define ASN1_F_I2D_ASN1_TIME 160 -#define ASN1_F_I2D_DSA_PUBKEY 161 -#define ASN1_F_I2D_EC_PUBKEY 181 -#define ASN1_F_I2D_PRIVATEKEY 163 -#define ASN1_F_I2D_PUBLICKEY 164 -#define ASN1_F_I2D_RSA_NET 162 -#define ASN1_F_I2D_RSA_PUBKEY 165 -#define ASN1_F_LONG_C2I 166 -#define ASN1_F_OID_MODULE_INIT 174 -#define ASN1_F_PARSE_TAGGING 182 -#define ASN1_F_PKCS5_PBE2_SET_IV 167 -#define ASN1_F_PKCS5_PBE_SET 202 -#define ASN1_F_PKCS5_PBE_SET0_ALGOR 215 -#define ASN1_F_PKCS5_PBKDF2_SET 219 -#define ASN1_F_SMIME_READ_ASN1 212 -#define ASN1_F_SMIME_TEXT 213 -#define ASN1_F_X509_CINF_NEW 168 -#define ASN1_F_X509_CRL_ADD0_REVOKED 169 -#define ASN1_F_X509_INFO_NEW 170 -#define ASN1_F_X509_NAME_ENCODE 203 -#define ASN1_F_X509_NAME_EX_D2I 158 -#define ASN1_F_X509_NAME_EX_NEW 171 -#define ASN1_F_X509_NEW 172 -#define ASN1_F_X509_PKEY_NEW 173 - -/* Reason codes. */ -#define ASN1_R_ADDING_OBJECT 171 -#define ASN1_R_ASN1_PARSE_ERROR 203 -#define ASN1_R_ASN1_SIG_PARSE_ERROR 204 -#define ASN1_R_AUX_ERROR 100 -#define ASN1_R_BAD_CLASS 101 -#define ASN1_R_BAD_OBJECT_HEADER 102 -#define ASN1_R_BAD_PASSWORD_READ 103 -#define ASN1_R_BAD_TAG 104 -#define ASN1_R_BMPSTRING_IS_WRONG_LENGTH 214 -#define ASN1_R_BN_LIB 105 -#define ASN1_R_BOOLEAN_IS_WRONG_LENGTH 106 -#define ASN1_R_BUFFER_TOO_SMALL 107 -#define ASN1_R_CIPHER_HAS_NO_OBJECT_IDENTIFIER 108 -#define ASN1_R_CONTEXT_NOT_INITIALISED 217 -#define ASN1_R_DATA_IS_WRONG 109 -#define ASN1_R_DECODE_ERROR 110 -#define ASN1_R_DECODING_ERROR 111 -#define ASN1_R_DEPTH_EXCEEDED 174 -#define ASN1_R_DIGEST_AND_KEY_TYPE_NOT_SUPPORTED 198 -#define ASN1_R_ENCODE_ERROR 112 -#define ASN1_R_ERROR_GETTING_TIME 173 -#define ASN1_R_ERROR_LOADING_SECTION 172 -#define ASN1_R_ERROR_PARSING_SET_ELEMENT 113 -#define ASN1_R_ERROR_SETTING_CIPHER_PARAMS 114 -#define ASN1_R_EXPECTING_AN_INTEGER 115 -#define ASN1_R_EXPECTING_AN_OBJECT 116 -#define ASN1_R_EXPECTING_A_BOOLEAN 117 -#define ASN1_R_EXPECTING_A_TIME 118 -#define ASN1_R_EXPLICIT_LENGTH_MISMATCH 119 -#define ASN1_R_EXPLICIT_TAG_NOT_CONSTRUCTED 120 -#define ASN1_R_FIELD_MISSING 121 -#define ASN1_R_FIRST_NUM_TOO_LARGE 122 -#define ASN1_R_HEADER_TOO_LONG 123 -#define ASN1_R_ILLEGAL_BITSTRING_FORMAT 175 -#define ASN1_R_ILLEGAL_BOOLEAN 176 -#define ASN1_R_ILLEGAL_CHARACTERS 124 -#define ASN1_R_ILLEGAL_FORMAT 177 -#define ASN1_R_ILLEGAL_HEX 178 -#define ASN1_R_ILLEGAL_IMPLICIT_TAG 179 -#define ASN1_R_ILLEGAL_INTEGER 180 -#define ASN1_R_ILLEGAL_NESTED_TAGGING 181 -#define ASN1_R_ILLEGAL_NULL 125 -#define ASN1_R_ILLEGAL_NULL_VALUE 182 -#define ASN1_R_ILLEGAL_OBJECT 183 -#define ASN1_R_ILLEGAL_OPTIONAL_ANY 126 -#define ASN1_R_ILLEGAL_OPTIONS_ON_ITEM_TEMPLATE 170 -#define ASN1_R_ILLEGAL_TAGGED_ANY 127 -#define ASN1_R_ILLEGAL_TIME_VALUE 184 -#define ASN1_R_INTEGER_NOT_ASCII_FORMAT 185 -#define ASN1_R_INTEGER_TOO_LARGE_FOR_LONG 128 -#define ASN1_R_INVALID_BMPSTRING_LENGTH 129 -#define ASN1_R_INVALID_DIGIT 130 -#define ASN1_R_INVALID_MIME_TYPE 205 -#define ASN1_R_INVALID_MODIFIER 186 -#define ASN1_R_INVALID_NUMBER 187 -#define ASN1_R_INVALID_OBJECT_ENCODING 216 -#define ASN1_R_INVALID_SEPARATOR 131 -#define ASN1_R_INVALID_TIME_FORMAT 132 -#define ASN1_R_INVALID_UNIVERSALSTRING_LENGTH 133 -#define ASN1_R_INVALID_UTF8STRING 134 -#define ASN1_R_IV_TOO_LARGE 135 -#define ASN1_R_LENGTH_ERROR 136 -#define ASN1_R_LIST_ERROR 188 -#define ASN1_R_MIME_NO_CONTENT_TYPE 206 -#define ASN1_R_MIME_PARSE_ERROR 207 -#define ASN1_R_MIME_SIG_PARSE_ERROR 208 -#define ASN1_R_MISSING_EOC 137 -#define ASN1_R_MISSING_SECOND_NUMBER 138 -#define ASN1_R_MISSING_VALUE 189 -#define ASN1_R_MSTRING_NOT_UNIVERSAL 139 -#define ASN1_R_MSTRING_WRONG_TAG 140 -#define ASN1_R_NESTED_ASN1_STRING 197 -#define ASN1_R_NON_HEX_CHARACTERS 141 -#define ASN1_R_NOT_ASCII_FORMAT 190 -#define ASN1_R_NOT_ENOUGH_DATA 142 -#define ASN1_R_NO_CONTENT_TYPE 209 -#define ASN1_R_NO_DEFAULT_DIGEST 201 -#define ASN1_R_NO_MATCHING_CHOICE_TYPE 143 -#define ASN1_R_NO_MULTIPART_BODY_FAILURE 210 -#define ASN1_R_NO_MULTIPART_BOUNDARY 211 -#define ASN1_R_NO_SIG_CONTENT_TYPE 212 -#define ASN1_R_NULL_IS_WRONG_LENGTH 144 -#define ASN1_R_OBJECT_NOT_ASCII_FORMAT 191 -#define ASN1_R_ODD_NUMBER_OF_CHARS 145 -#define ASN1_R_PRIVATE_KEY_HEADER_MISSING 146 -#define ASN1_R_SECOND_NUMBER_TOO_LARGE 147 -#define ASN1_R_SEQUENCE_LENGTH_MISMATCH 148 -#define ASN1_R_SEQUENCE_NOT_CONSTRUCTED 149 -#define ASN1_R_SEQUENCE_OR_SET_NEEDS_CONFIG 192 -#define ASN1_R_SHORT_LINE 150 -#define ASN1_R_SIG_INVALID_MIME_TYPE 213 -#define ASN1_R_STREAMING_NOT_SUPPORTED 202 -#define ASN1_R_STRING_TOO_LONG 151 -#define ASN1_R_STRING_TOO_SHORT 152 -#define ASN1_R_TAG_VALUE_TOO_HIGH 153 -#define ASN1_R_THE_ASN1_OBJECT_IDENTIFIER_IS_NOT_KNOWN_FOR_THIS_MD 154 -#define ASN1_R_TIME_NOT_ASCII_FORMAT 193 -#define ASN1_R_TOO_LONG 155 -#define ASN1_R_TYPE_NOT_CONSTRUCTED 156 -#define ASN1_R_UNABLE_TO_DECODE_RSA_KEY 157 -#define ASN1_R_UNABLE_TO_DECODE_RSA_PRIVATE_KEY 158 -#define ASN1_R_UNEXPECTED_EOC 159 -#define ASN1_R_UNIVERSALSTRING_IS_WRONG_LENGTH 215 -#define ASN1_R_UNKNOWN_FORMAT 160 -#define ASN1_R_UNKNOWN_MESSAGE_DIGEST_ALGORITHM 161 -#define ASN1_R_UNKNOWN_OBJECT_TYPE 162 -#define ASN1_R_UNKNOWN_PUBLIC_KEY_TYPE 163 -#define ASN1_R_UNKNOWN_SIGNATURE_ALGORITHM 199 -#define ASN1_R_UNKNOWN_TAG 194 -#define ASN1_R_UNKOWN_FORMAT 195 -#define ASN1_R_UNSUPPORTED_ANY_DEFINED_BY_TYPE 164 -#define ASN1_R_UNSUPPORTED_CIPHER 165 -#define ASN1_R_UNSUPPORTED_ENCRYPTION_ALGORITHM 166 -#define ASN1_R_UNSUPPORTED_PUBLIC_KEY_TYPE 167 -#define ASN1_R_UNSUPPORTED_TYPE 196 -#define ASN1_R_WRONG_PUBLIC_KEY_TYPE 200 -#define ASN1_R_WRONG_TAG 168 -#define ASN1_R_WRONG_TYPE 169 - -#ifdef __cplusplus -} -#endif -#endif diff --git a/Pods/OpenSSL-Universal/include-osx/openssl/asn1_mac.h b/Pods/OpenSSL-Universal/include-osx/openssl/asn1_mac.h deleted file mode 100644 index 87bd0e9e..00000000 --- a/Pods/OpenSSL-Universal/include-osx/openssl/asn1_mac.h +++ /dev/null @@ -1,578 +0,0 @@ -/* crypto/asn1/asn1_mac.h */ -/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) - * All rights reserved. - * - * This package is an SSL implementation written - * by Eric Young (eay@cryptsoft.com). - * The implementation was written so as to conform with Netscapes SSL. - * - * This library is free for commercial and non-commercial use as long as - * the following conditions are aheared to. The following conditions - * apply to all code found in this distribution, be it the RC4, RSA, - * lhash, DES, etc., code; not just the SSL code. The SSL documentation - * included with this distribution is covered by the same copyright terms - * except that the holder is Tim Hudson (tjh@cryptsoft.com). - * - * Copyright remains Eric Young's, and as such any Copyright notices in - * the code are not to be removed. - * If this package is used in a product, Eric Young should be given attribution - * as the author of the parts of the library used. - * This can be in the form of a textual message at program startup or - * in documentation (online or textual) provided with the package. - * - * Redistribution and use in source and binary forms, with or without - * modification, are permitted provided that the following conditions - * are met: - * 1. Redistributions of source code must retain the copyright - * notice, this list of conditions and the following disclaimer. - * 2. Redistributions in binary form must reproduce the above copyright - * notice, this list of conditions and the following disclaimer in the - * documentation and/or other materials provided with the distribution. - * 3. All advertising materials mentioning features or use of this software - * must display the following acknowledgement: - * "This product includes cryptographic software written by - * Eric Young (eay@cryptsoft.com)" - * The word 'cryptographic' can be left out if the rouines from the library - * being used are not cryptographic related :-). - * 4. If you include any Windows specific code (or a derivative thereof) from - * the apps directory (application code) you must include an acknowledgement: - * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" - * - * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND - * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE - * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE - * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE - * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL - * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS - * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) - * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT - * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY - * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF - * SUCH DAMAGE. - * - * The licence and distribution terms for any publically available version or - * derivative of this code cannot be changed. i.e. this code cannot simply be - * copied and put under another distribution licence - * [including the GNU Public Licence.] - */ - -#ifndef HEADER_ASN1_MAC_H -#define HEADER_ASN1_MAC_H - -#include - -#ifdef __cplusplus -extern "C" { -#endif - -#ifndef ASN1_MAC_ERR_LIB -#define ASN1_MAC_ERR_LIB ERR_LIB_ASN1 -#endif - -#define ASN1_MAC_H_err(f,r,line) \ - ERR_PUT_error(ASN1_MAC_ERR_LIB,(f),(r),__FILE__,(line)) - -#define M_ASN1_D2I_vars(a,type,func) \ - ASN1_const_CTX c; \ - type ret=NULL; \ - \ - c.pp=(const unsigned char **)pp; \ - c.q= *(const unsigned char **)pp; \ - c.error=ERR_R_NESTED_ASN1_ERROR; \ - if ((a == NULL) || ((*a) == NULL)) \ - { if ((ret=(type)func()) == NULL) \ - { c.line=__LINE__; goto err; } } \ - else ret=(*a); - -#define M_ASN1_D2I_Init() \ - c.p= *(const unsigned char **)pp; \ - c.max=(length == 0)?0:(c.p+length); - -#define M_ASN1_D2I_Finish_2(a) \ - if (!asn1_const_Finish(&c)) \ - { c.line=__LINE__; goto err; } \ - *(const unsigned char **)pp=c.p; \ - if (a != NULL) (*a)=ret; \ - return(ret); - -#define M_ASN1_D2I_Finish(a,func,e) \ - M_ASN1_D2I_Finish_2(a); \ -err:\ - ASN1_MAC_H_err((e),c.error,c.line); \ - asn1_add_error(*(const unsigned char **)pp,(int)(c.q- *pp)); \ - if ((ret != NULL) && ((a == NULL) || (*a != ret))) func(ret); \ - return(NULL) - -#define M_ASN1_D2I_start_sequence() \ - if (!asn1_GetSequence(&c,&length)) \ - { c.line=__LINE__; goto err; } -/* Begin reading ASN1 without a surrounding sequence */ -#define M_ASN1_D2I_begin() \ - c.slen = length; - -/* End reading ASN1 with no check on length */ -#define M_ASN1_D2I_Finish_nolen(a, func, e) \ - *pp=c.p; \ - if (a != NULL) (*a)=ret; \ - return(ret); \ -err:\ - ASN1_MAC_H_err((e),c.error,c.line); \ - asn1_add_error(*pp,(int)(c.q- *pp)); \ - if ((ret != NULL) && ((a == NULL) || (*a != ret))) func(ret); \ - return(NULL) - -#define M_ASN1_D2I_end_sequence() \ - (((c.inf&1) == 0)?(c.slen <= 0): \ - (c.eos=ASN1_const_check_infinite_end(&c.p,c.slen))) - -/* Don't use this with d2i_ASN1_BOOLEAN() */ -#define M_ASN1_D2I_get(b, func) \ - c.q=c.p; \ - if (func(&(b),&c.p,c.slen) == NULL) \ - {c.line=__LINE__; goto err; } \ - c.slen-=(c.p-c.q); - -/* Don't use this with d2i_ASN1_BOOLEAN() */ -#define M_ASN1_D2I_get_x(type,b,func) \ - c.q=c.p; \ - if (((D2I_OF(type))func)(&(b),&c.p,c.slen) == NULL) \ - {c.line=__LINE__; goto err; } \ - c.slen-=(c.p-c.q); - -/* use this instead () */ -#define M_ASN1_D2I_get_int(b,func) \ - c.q=c.p; \ - if (func(&(b),&c.p,c.slen) < 0) \ - {c.line=__LINE__; goto err; } \ - c.slen-=(c.p-c.q); - -#define M_ASN1_D2I_get_opt(b,func,type) \ - if ((c.slen != 0) && ((M_ASN1_next & (~V_ASN1_CONSTRUCTED)) \ - == (V_ASN1_UNIVERSAL|(type)))) \ - { \ - M_ASN1_D2I_get(b,func); \ - } - -#define M_ASN1_D2I_get_int_opt(b,func,type) \ - if ((c.slen != 0) && ((M_ASN1_next & (~V_ASN1_CONSTRUCTED)) \ - == (V_ASN1_UNIVERSAL|(type)))) \ - { \ - M_ASN1_D2I_get_int(b,func); \ - } - -#define M_ASN1_D2I_get_imp(b,func, type) \ - M_ASN1_next=(_tmp& V_ASN1_CONSTRUCTED)|type; \ - c.q=c.p; \ - if (func(&(b),&c.p,c.slen) == NULL) \ - {c.line=__LINE__; M_ASN1_next_prev = _tmp; goto err; } \ - c.slen-=(c.p-c.q);\ - M_ASN1_next_prev=_tmp; - -#define M_ASN1_D2I_get_IMP_opt(b,func,tag,type) \ - if ((c.slen != 0) && ((M_ASN1_next & (~V_ASN1_CONSTRUCTED)) == \ - (V_ASN1_CONTEXT_SPECIFIC|(tag)))) \ - { \ - unsigned char _tmp = M_ASN1_next; \ - M_ASN1_D2I_get_imp(b,func, type);\ - } - -#define M_ASN1_D2I_get_set(r,func,free_func) \ - M_ASN1_D2I_get_imp_set(r,func,free_func, \ - V_ASN1_SET,V_ASN1_UNIVERSAL); - -#define M_ASN1_D2I_get_set_type(type,r,func,free_func) \ - M_ASN1_D2I_get_imp_set_type(type,r,func,free_func, \ - V_ASN1_SET,V_ASN1_UNIVERSAL); - -#define M_ASN1_D2I_get_set_opt(r,func,free_func) \ - if ((c.slen != 0) && (M_ASN1_next == (V_ASN1_UNIVERSAL| \ - V_ASN1_CONSTRUCTED|V_ASN1_SET)))\ - { M_ASN1_D2I_get_set(r,func,free_func); } - -#define M_ASN1_D2I_get_set_opt_type(type,r,func,free_func) \ - if ((c.slen != 0) && (M_ASN1_next == (V_ASN1_UNIVERSAL| \ - V_ASN1_CONSTRUCTED|V_ASN1_SET)))\ - { M_ASN1_D2I_get_set_type(type,r,func,free_func); } - -#define M_ASN1_I2D_len_SET_opt(a,f) \ - if ((a != NULL) && (sk_num(a) != 0)) \ - M_ASN1_I2D_len_SET(a,f); - -#define M_ASN1_I2D_put_SET_opt(a,f) \ - if ((a != NULL) && (sk_num(a) != 0)) \ - M_ASN1_I2D_put_SET(a,f); - -#define M_ASN1_I2D_put_SEQUENCE_opt(a,f) \ - if ((a != NULL) && (sk_num(a) != 0)) \ - M_ASN1_I2D_put_SEQUENCE(a,f); - -#define M_ASN1_I2D_put_SEQUENCE_opt_type(type,a,f) \ - if ((a != NULL) && (sk_##type##_num(a) != 0)) \ - M_ASN1_I2D_put_SEQUENCE_type(type,a,f); - -#define M_ASN1_D2I_get_IMP_set_opt(b,func,free_func,tag) \ - if ((c.slen != 0) && \ - (M_ASN1_next == \ - (V_ASN1_CONTEXT_SPECIFIC|V_ASN1_CONSTRUCTED|(tag))))\ - { \ - M_ASN1_D2I_get_imp_set(b,func,free_func,\ - tag,V_ASN1_CONTEXT_SPECIFIC); \ - } - -#define M_ASN1_D2I_get_IMP_set_opt_type(type,b,func,free_func,tag) \ - if ((c.slen != 0) && \ - (M_ASN1_next == \ - (V_ASN1_CONTEXT_SPECIFIC|V_ASN1_CONSTRUCTED|(tag))))\ - { \ - M_ASN1_D2I_get_imp_set_type(type,b,func,free_func,\ - tag,V_ASN1_CONTEXT_SPECIFIC); \ - } - -#define M_ASN1_D2I_get_seq(r,func,free_func) \ - M_ASN1_D2I_get_imp_set(r,func,free_func,\ - V_ASN1_SEQUENCE,V_ASN1_UNIVERSAL); - -#define M_ASN1_D2I_get_seq_type(type,r,func,free_func) \ - M_ASN1_D2I_get_imp_set_type(type,r,func,free_func,\ - V_ASN1_SEQUENCE,V_ASN1_UNIVERSAL) - -#define M_ASN1_D2I_get_seq_opt(r,func,free_func) \ - if ((c.slen != 0) && (M_ASN1_next == (V_ASN1_UNIVERSAL| \ - V_ASN1_CONSTRUCTED|V_ASN1_SEQUENCE)))\ - { M_ASN1_D2I_get_seq(r,func,free_func); } - -#define M_ASN1_D2I_get_seq_opt_type(type,r,func,free_func) \ - if ((c.slen != 0) && (M_ASN1_next == (V_ASN1_UNIVERSAL| \ - V_ASN1_CONSTRUCTED|V_ASN1_SEQUENCE)))\ - { M_ASN1_D2I_get_seq_type(type,r,func,free_func); } - -#define M_ASN1_D2I_get_IMP_set(r,func,free_func,x) \ - M_ASN1_D2I_get_imp_set(r,func,free_func,\ - x,V_ASN1_CONTEXT_SPECIFIC); - -#define M_ASN1_D2I_get_IMP_set_type(type,r,func,free_func,x) \ - M_ASN1_D2I_get_imp_set_type(type,r,func,free_func,\ - x,V_ASN1_CONTEXT_SPECIFIC); - -#define M_ASN1_D2I_get_imp_set(r,func,free_func,a,b) \ - c.q=c.p; \ - if (d2i_ASN1_SET(&(r),&c.p,c.slen,(char *(*)())func,\ - (void (*)())free_func,a,b) == NULL) \ - { c.line=__LINE__; goto err; } \ - c.slen-=(c.p-c.q); - -#define M_ASN1_D2I_get_imp_set_type(type,r,func,free_func,a,b) \ - c.q=c.p; \ - if (d2i_ASN1_SET_OF_##type(&(r),&c.p,c.slen,func,\ - free_func,a,b) == NULL) \ - { c.line=__LINE__; goto err; } \ - c.slen-=(c.p-c.q); - -#define M_ASN1_D2I_get_set_strings(r,func,a,b) \ - c.q=c.p; \ - if (d2i_ASN1_STRING_SET(&(r),&c.p,c.slen,a,b) == NULL) \ - { c.line=__LINE__; goto err; } \ - c.slen-=(c.p-c.q); - -#define M_ASN1_D2I_get_EXP_opt(r,func,tag) \ - if ((c.slen != 0L) && (M_ASN1_next == \ - (V_ASN1_CONSTRUCTED|V_ASN1_CONTEXT_SPECIFIC|tag))) \ - { \ - int Tinf,Ttag,Tclass; \ - long Tlen; \ - \ - c.q=c.p; \ - Tinf=ASN1_get_object(&c.p,&Tlen,&Ttag,&Tclass,c.slen); \ - if (Tinf & 0x80) \ - { c.error=ERR_R_BAD_ASN1_OBJECT_HEADER; \ - c.line=__LINE__; goto err; } \ - if (Tinf == (V_ASN1_CONSTRUCTED+1)) \ - Tlen = c.slen - (c.p - c.q) - 2; \ - if (func(&(r),&c.p,Tlen) == NULL) \ - { c.line=__LINE__; goto err; } \ - if (Tinf == (V_ASN1_CONSTRUCTED+1)) { \ - Tlen = c.slen - (c.p - c.q); \ - if(!ASN1_const_check_infinite_end(&c.p, Tlen)) \ - { c.error=ERR_R_MISSING_ASN1_EOS; \ - c.line=__LINE__; goto err; } \ - }\ - c.slen-=(c.p-c.q); \ - } - -#define M_ASN1_D2I_get_EXP_set_opt(r,func,free_func,tag,b) \ - if ((c.slen != 0) && (M_ASN1_next == \ - (V_ASN1_CONSTRUCTED|V_ASN1_CONTEXT_SPECIFIC|tag))) \ - { \ - int Tinf,Ttag,Tclass; \ - long Tlen; \ - \ - c.q=c.p; \ - Tinf=ASN1_get_object(&c.p,&Tlen,&Ttag,&Tclass,c.slen); \ - if (Tinf & 0x80) \ - { c.error=ERR_R_BAD_ASN1_OBJECT_HEADER; \ - c.line=__LINE__; goto err; } \ - if (Tinf == (V_ASN1_CONSTRUCTED+1)) \ - Tlen = c.slen - (c.p - c.q) - 2; \ - if (d2i_ASN1_SET(&(r),&c.p,Tlen,(char *(*)())func, \ - (void (*)())free_func, \ - b,V_ASN1_UNIVERSAL) == NULL) \ - { c.line=__LINE__; goto err; } \ - if (Tinf == (V_ASN1_CONSTRUCTED+1)) { \ - Tlen = c.slen - (c.p - c.q); \ - if(!ASN1_check_infinite_end(&c.p, Tlen)) \ - { c.error=ERR_R_MISSING_ASN1_EOS; \ - c.line=__LINE__; goto err; } \ - }\ - c.slen-=(c.p-c.q); \ - } - -#define M_ASN1_D2I_get_EXP_set_opt_type(type,r,func,free_func,tag,b) \ - if ((c.slen != 0) && (M_ASN1_next == \ - (V_ASN1_CONSTRUCTED|V_ASN1_CONTEXT_SPECIFIC|tag))) \ - { \ - int Tinf,Ttag,Tclass; \ - long Tlen; \ - \ - c.q=c.p; \ - Tinf=ASN1_get_object(&c.p,&Tlen,&Ttag,&Tclass,c.slen); \ - if (Tinf & 0x80) \ - { c.error=ERR_R_BAD_ASN1_OBJECT_HEADER; \ - c.line=__LINE__; goto err; } \ - if (Tinf == (V_ASN1_CONSTRUCTED+1)) \ - Tlen = c.slen - (c.p - c.q) - 2; \ - if (d2i_ASN1_SET_OF_##type(&(r),&c.p,Tlen,func, \ - free_func,b,V_ASN1_UNIVERSAL) == NULL) \ - { c.line=__LINE__; goto err; } \ - if (Tinf == (V_ASN1_CONSTRUCTED+1)) { \ - Tlen = c.slen - (c.p - c.q); \ - if(!ASN1_check_infinite_end(&c.p, Tlen)) \ - { c.error=ERR_R_MISSING_ASN1_EOS; \ - c.line=__LINE__; goto err; } \ - }\ - c.slen-=(c.p-c.q); \ - } - -/* New macros */ -#define M_ASN1_New_Malloc(ret,type) \ - if ((ret=(type *)OPENSSL_malloc(sizeof(type))) == NULL) \ - { c.line=__LINE__; goto err2; } - -#define M_ASN1_New(arg,func) \ - if (((arg)=func()) == NULL) return(NULL) - -#define M_ASN1_New_Error(a) \ -/* err: ASN1_MAC_H_err((a),ERR_R_NESTED_ASN1_ERROR,c.line); \ - return(NULL);*/ \ - err2: ASN1_MAC_H_err((a),ERR_R_MALLOC_FAILURE,c.line); \ - return(NULL) - - -/* BIG UGLY WARNING! This is so damn ugly I wanna puke. Unfortunately, - some macros that use ASN1_const_CTX still insist on writing in the input - stream. ARGH! ARGH! ARGH! Let's get rid of this macro package. - Please? -- Richard Levitte */ -#define M_ASN1_next (*((unsigned char *)(c.p))) -#define M_ASN1_next_prev (*((unsigned char *)(c.q))) - -/*************************************************/ - -#define M_ASN1_I2D_vars(a) int r=0,ret=0; \ - unsigned char *p; \ - if (a == NULL) return(0) - -/* Length Macros */ -#define M_ASN1_I2D_len(a,f) ret+=f(a,NULL) -#define M_ASN1_I2D_len_IMP_opt(a,f) if (a != NULL) M_ASN1_I2D_len(a,f) - -#define M_ASN1_I2D_len_SET(a,f) \ - ret+=i2d_ASN1_SET(a,NULL,f,V_ASN1_SET,V_ASN1_UNIVERSAL,IS_SET); - -#define M_ASN1_I2D_len_SET_type(type,a,f) \ - ret+=i2d_ASN1_SET_OF_##type(a,NULL,f,V_ASN1_SET, \ - V_ASN1_UNIVERSAL,IS_SET); - -#define M_ASN1_I2D_len_SEQUENCE(a,f) \ - ret+=i2d_ASN1_SET(a,NULL,f,V_ASN1_SEQUENCE,V_ASN1_UNIVERSAL, \ - IS_SEQUENCE); - -#define M_ASN1_I2D_len_SEQUENCE_type(type,a,f) \ - ret+=i2d_ASN1_SET_OF_##type(a,NULL,f,V_ASN1_SEQUENCE, \ - V_ASN1_UNIVERSAL,IS_SEQUENCE) - -#define M_ASN1_I2D_len_SEQUENCE_opt(a,f) \ - if ((a != NULL) && (sk_num(a) != 0)) \ - M_ASN1_I2D_len_SEQUENCE(a,f); - -#define M_ASN1_I2D_len_SEQUENCE_opt_type(type,a,f) \ - if ((a != NULL) && (sk_##type##_num(a) != 0)) \ - M_ASN1_I2D_len_SEQUENCE_type(type,a,f); - -#define M_ASN1_I2D_len_IMP_SET(a,f,x) \ - ret+=i2d_ASN1_SET(a,NULL,f,x,V_ASN1_CONTEXT_SPECIFIC,IS_SET); - -#define M_ASN1_I2D_len_IMP_SET_type(type,a,f,x) \ - ret+=i2d_ASN1_SET_OF_##type(a,NULL,f,x, \ - V_ASN1_CONTEXT_SPECIFIC,IS_SET); - -#define M_ASN1_I2D_len_IMP_SET_opt(a,f,x) \ - if ((a != NULL) && (sk_num(a) != 0)) \ - ret+=i2d_ASN1_SET(a,NULL,f,x,V_ASN1_CONTEXT_SPECIFIC, \ - IS_SET); - -#define M_ASN1_I2D_len_IMP_SET_opt_type(type,a,f,x) \ - if ((a != NULL) && (sk_##type##_num(a) != 0)) \ - ret+=i2d_ASN1_SET_OF_##type(a,NULL,f,x, \ - V_ASN1_CONTEXT_SPECIFIC,IS_SET); - -#define M_ASN1_I2D_len_IMP_SEQUENCE(a,f,x) \ - ret+=i2d_ASN1_SET(a,NULL,f,x,V_ASN1_CONTEXT_SPECIFIC, \ - IS_SEQUENCE); - -#define M_ASN1_I2D_len_IMP_SEQUENCE_opt(a,f,x) \ - if ((a != NULL) && (sk_num(a) != 0)) \ - ret+=i2d_ASN1_SET(a,NULL,f,x,V_ASN1_CONTEXT_SPECIFIC, \ - IS_SEQUENCE); - -#define M_ASN1_I2D_len_IMP_SEQUENCE_opt_type(type,a,f,x) \ - if ((a != NULL) && (sk_##type##_num(a) != 0)) \ - ret+=i2d_ASN1_SET_OF_##type(a,NULL,f,x, \ - V_ASN1_CONTEXT_SPECIFIC, \ - IS_SEQUENCE); - -#define M_ASN1_I2D_len_EXP_opt(a,f,mtag,v) \ - if (a != NULL)\ - { \ - v=f(a,NULL); \ - ret+=ASN1_object_size(1,v,mtag); \ - } - -#define M_ASN1_I2D_len_EXP_SET_opt(a,f,mtag,tag,v) \ - if ((a != NULL) && (sk_num(a) != 0))\ - { \ - v=i2d_ASN1_SET(a,NULL,f,tag,V_ASN1_UNIVERSAL,IS_SET); \ - ret+=ASN1_object_size(1,v,mtag); \ - } - -#define M_ASN1_I2D_len_EXP_SEQUENCE_opt(a,f,mtag,tag,v) \ - if ((a != NULL) && (sk_num(a) != 0))\ - { \ - v=i2d_ASN1_SET(a,NULL,f,tag,V_ASN1_UNIVERSAL, \ - IS_SEQUENCE); \ - ret+=ASN1_object_size(1,v,mtag); \ - } - -#define M_ASN1_I2D_len_EXP_SEQUENCE_opt_type(type,a,f,mtag,tag,v) \ - if ((a != NULL) && (sk_##type##_num(a) != 0))\ - { \ - v=i2d_ASN1_SET_OF_##type(a,NULL,f,tag, \ - V_ASN1_UNIVERSAL, \ - IS_SEQUENCE); \ - ret+=ASN1_object_size(1,v,mtag); \ - } - -/* Put Macros */ -#define M_ASN1_I2D_put(a,f) f(a,&p) - -#define M_ASN1_I2D_put_IMP_opt(a,f,t) \ - if (a != NULL) \ - { \ - unsigned char *q=p; \ - f(a,&p); \ - *q=(V_ASN1_CONTEXT_SPECIFIC|t|(*q&V_ASN1_CONSTRUCTED));\ - } - -#define M_ASN1_I2D_put_SET(a,f) i2d_ASN1_SET(a,&p,f,V_ASN1_SET,\ - V_ASN1_UNIVERSAL,IS_SET) -#define M_ASN1_I2D_put_SET_type(type,a,f) \ - i2d_ASN1_SET_OF_##type(a,&p,f,V_ASN1_SET,V_ASN1_UNIVERSAL,IS_SET) -#define M_ASN1_I2D_put_IMP_SET(a,f,x) i2d_ASN1_SET(a,&p,f,x,\ - V_ASN1_CONTEXT_SPECIFIC,IS_SET) -#define M_ASN1_I2D_put_IMP_SET_type(type,a,f,x) \ - i2d_ASN1_SET_OF_##type(a,&p,f,x,V_ASN1_CONTEXT_SPECIFIC,IS_SET) -#define M_ASN1_I2D_put_IMP_SEQUENCE(a,f,x) i2d_ASN1_SET(a,&p,f,x,\ - V_ASN1_CONTEXT_SPECIFIC,IS_SEQUENCE) - -#define M_ASN1_I2D_put_SEQUENCE(a,f) i2d_ASN1_SET(a,&p,f,V_ASN1_SEQUENCE,\ - V_ASN1_UNIVERSAL,IS_SEQUENCE) - -#define M_ASN1_I2D_put_SEQUENCE_type(type,a,f) \ - i2d_ASN1_SET_OF_##type(a,&p,f,V_ASN1_SEQUENCE,V_ASN1_UNIVERSAL, \ - IS_SEQUENCE) - -#define M_ASN1_I2D_put_SEQUENCE_opt(a,f) \ - if ((a != NULL) && (sk_num(a) != 0)) \ - M_ASN1_I2D_put_SEQUENCE(a,f); - -#define M_ASN1_I2D_put_IMP_SET_opt(a,f,x) \ - if ((a != NULL) && (sk_num(a) != 0)) \ - { i2d_ASN1_SET(a,&p,f,x,V_ASN1_CONTEXT_SPECIFIC, \ - IS_SET); } - -#define M_ASN1_I2D_put_IMP_SET_opt_type(type,a,f,x) \ - if ((a != NULL) && (sk_##type##_num(a) != 0)) \ - { i2d_ASN1_SET_OF_##type(a,&p,f,x, \ - V_ASN1_CONTEXT_SPECIFIC, \ - IS_SET); } - -#define M_ASN1_I2D_put_IMP_SEQUENCE_opt(a,f,x) \ - if ((a != NULL) && (sk_num(a) != 0)) \ - { i2d_ASN1_SET(a,&p,f,x,V_ASN1_CONTEXT_SPECIFIC, \ - IS_SEQUENCE); } - -#define M_ASN1_I2D_put_IMP_SEQUENCE_opt_type(type,a,f,x) \ - if ((a != NULL) && (sk_##type##_num(a) != 0)) \ - { i2d_ASN1_SET_OF_##type(a,&p,f,x, \ - V_ASN1_CONTEXT_SPECIFIC, \ - IS_SEQUENCE); } - -#define M_ASN1_I2D_put_EXP_opt(a,f,tag,v) \ - if (a != NULL) \ - { \ - ASN1_put_object(&p,1,v,tag,V_ASN1_CONTEXT_SPECIFIC); \ - f(a,&p); \ - } - -#define M_ASN1_I2D_put_EXP_SET_opt(a,f,mtag,tag,v) \ - if ((a != NULL) && (sk_num(a) != 0)) \ - { \ - ASN1_put_object(&p,1,v,mtag,V_ASN1_CONTEXT_SPECIFIC); \ - i2d_ASN1_SET(a,&p,f,tag,V_ASN1_UNIVERSAL,IS_SET); \ - } - -#define M_ASN1_I2D_put_EXP_SEQUENCE_opt(a,f,mtag,tag,v) \ - if ((a != NULL) && (sk_num(a) != 0)) \ - { \ - ASN1_put_object(&p,1,v,mtag,V_ASN1_CONTEXT_SPECIFIC); \ - i2d_ASN1_SET(a,&p,f,tag,V_ASN1_UNIVERSAL,IS_SEQUENCE); \ - } - -#define M_ASN1_I2D_put_EXP_SEQUENCE_opt_type(type,a,f,mtag,tag,v) \ - if ((a != NULL) && (sk_##type##_num(a) != 0)) \ - { \ - ASN1_put_object(&p,1,v,mtag,V_ASN1_CONTEXT_SPECIFIC); \ - i2d_ASN1_SET_OF_##type(a,&p,f,tag,V_ASN1_UNIVERSAL, \ - IS_SEQUENCE); \ - } - -#define M_ASN1_I2D_seq_total() \ - r=ASN1_object_size(1,ret,V_ASN1_SEQUENCE); \ - if (pp == NULL) return(r); \ - p= *pp; \ - ASN1_put_object(&p,1,ret,V_ASN1_SEQUENCE,V_ASN1_UNIVERSAL) - -#define M_ASN1_I2D_INF_seq_start(tag,ctx) \ - *(p++)=(V_ASN1_CONSTRUCTED|(tag)|(ctx)); \ - *(p++)=0x80 - -#define M_ASN1_I2D_INF_seq_end() *(p++)=0x00; *(p++)=0x00 - -#define M_ASN1_I2D_finish() *pp=p; \ - return(r); - -int asn1_GetSequence(ASN1_const_CTX *c, long *length); -void asn1_add_error(const unsigned char *address,int offset); -#ifdef __cplusplus -} -#endif - -#endif diff --git a/Pods/OpenSSL-Universal/include-osx/openssl/asn1t.h b/Pods/OpenSSL-Universal/include-osx/openssl/asn1t.h deleted file mode 100644 index d230e4bf..00000000 --- a/Pods/OpenSSL-Universal/include-osx/openssl/asn1t.h +++ /dev/null @@ -1,960 +0,0 @@ -/* asn1t.h */ -/* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL - * project 2000. - */ -/* ==================================================================== - * Copyright (c) 2000-2005 The OpenSSL Project. All rights reserved. - * - * Redistribution and use in source and binary forms, with or without - * modification, are permitted provided that the following conditions - * are met: - * - * 1. Redistributions of source code must retain the above copyright - * notice, this list of conditions and the following disclaimer. - * - * 2. Redistributions in binary form must reproduce the above copyright - * notice, this list of conditions and the following disclaimer in - * the documentation and/or other materials provided with the - * distribution. - * - * 3. All advertising materials mentioning features or use of this - * software must display the following acknowledgment: - * "This product includes software developed by the OpenSSL Project - * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)" - * - * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to - * endorse or promote products derived from this software without - * prior written permission. For written permission, please contact - * licensing@OpenSSL.org. - * - * 5. Products derived from this software may not be called "OpenSSL" - * nor may "OpenSSL" appear in their names without prior written - * permission of the OpenSSL Project. - * - * 6. Redistributions of any form whatsoever must retain the following - * acknowledgment: - * "This product includes software developed by the OpenSSL Project - * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)" - * - * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY - * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE - * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR - * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR - * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, - * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT - * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; - * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) - * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, - * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) - * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED - * OF THE POSSIBILITY OF SUCH DAMAGE. - * ==================================================================== - * - * This product includes cryptographic software written by Eric Young - * (eay@cryptsoft.com). This product includes software written by Tim - * Hudson (tjh@cryptsoft.com). - * - */ -#ifndef HEADER_ASN1T_H -#define HEADER_ASN1T_H - -#include -#include -#include - -#ifdef OPENSSL_BUILD_SHLIBCRYPTO -# undef OPENSSL_EXTERN -# define OPENSSL_EXTERN OPENSSL_EXPORT -#endif - -/* ASN1 template defines, structures and functions */ - -#ifdef __cplusplus -extern "C" { -#endif - - -#ifndef OPENSSL_EXPORT_VAR_AS_FUNCTION - -/* Macro to obtain ASN1_ADB pointer from a type (only used internally) */ -#define ASN1_ADB_ptr(iptr) ((const ASN1_ADB *)(iptr)) - - -/* Macros for start and end of ASN1_ITEM definition */ - -#define ASN1_ITEM_start(itname) \ - OPENSSL_GLOBAL const ASN1_ITEM itname##_it = { - -#define ASN1_ITEM_end(itname) \ - }; - -#else - -/* Macro to obtain ASN1_ADB pointer from a type (only used internally) */ -#define ASN1_ADB_ptr(iptr) ((const ASN1_ADB *)(iptr())) - - -/* Macros for start and end of ASN1_ITEM definition */ - -#define ASN1_ITEM_start(itname) \ - const ASN1_ITEM * itname##_it(void) \ - { \ - static const ASN1_ITEM local_it = { - -#define ASN1_ITEM_end(itname) \ - }; \ - return &local_it; \ - } - -#endif - - -/* Macros to aid ASN1 template writing */ - -#define ASN1_ITEM_TEMPLATE(tname) \ - static const ASN1_TEMPLATE tname##_item_tt - -#define ASN1_ITEM_TEMPLATE_END(tname) \ - ;\ - ASN1_ITEM_start(tname) \ - ASN1_ITYPE_PRIMITIVE,\ - -1,\ - &tname##_item_tt,\ - 0,\ - NULL,\ - 0,\ - #tname \ - ASN1_ITEM_end(tname) - - -/* This is a ASN1 type which just embeds a template */ - -/* This pair helps declare a SEQUENCE. We can do: - * - * ASN1_SEQUENCE(stname) = { - * ... SEQUENCE components ... - * } ASN1_SEQUENCE_END(stname) - * - * This will produce an ASN1_ITEM called stname_it - * for a structure called stname. - * - * If you want the same structure but a different - * name then use: - * - * ASN1_SEQUENCE(itname) = { - * ... SEQUENCE components ... - * } ASN1_SEQUENCE_END_name(stname, itname) - * - * This will create an item called itname_it using - * a structure called stname. - */ - -#define ASN1_SEQUENCE(tname) \ - static const ASN1_TEMPLATE tname##_seq_tt[] - -#define ASN1_SEQUENCE_END(stname) ASN1_SEQUENCE_END_name(stname, stname) - -#define ASN1_SEQUENCE_END_name(stname, tname) \ - ;\ - ASN1_ITEM_start(tname) \ - ASN1_ITYPE_SEQUENCE,\ - V_ASN1_SEQUENCE,\ - tname##_seq_tt,\ - sizeof(tname##_seq_tt) / sizeof(ASN1_TEMPLATE),\ - NULL,\ - sizeof(stname),\ - #stname \ - ASN1_ITEM_end(tname) - -#define ASN1_NDEF_SEQUENCE(tname) \ - ASN1_SEQUENCE(tname) - -#define ASN1_NDEF_SEQUENCE_cb(tname, cb) \ - ASN1_SEQUENCE_cb(tname, cb) - -#define ASN1_SEQUENCE_cb(tname, cb) \ - static const ASN1_AUX tname##_aux = {NULL, 0, 0, 0, cb, 0}; \ - ASN1_SEQUENCE(tname) - -#define ASN1_BROKEN_SEQUENCE(tname) \ - static const ASN1_AUX tname##_aux = {NULL, ASN1_AFLG_BROKEN, 0, 0, 0, 0}; \ - ASN1_SEQUENCE(tname) - -#define ASN1_SEQUENCE_ref(tname, cb, lck) \ - static const ASN1_AUX tname##_aux = {NULL, ASN1_AFLG_REFCOUNT, offsetof(tname, references), lck, cb, 0}; \ - ASN1_SEQUENCE(tname) - -#define ASN1_SEQUENCE_enc(tname, enc, cb) \ - static const ASN1_AUX tname##_aux = {NULL, ASN1_AFLG_ENCODING, 0, 0, cb, offsetof(tname, enc)}; \ - ASN1_SEQUENCE(tname) - -#define ASN1_NDEF_SEQUENCE_END(tname) \ - ;\ - ASN1_ITEM_start(tname) \ - ASN1_ITYPE_NDEF_SEQUENCE,\ - V_ASN1_SEQUENCE,\ - tname##_seq_tt,\ - sizeof(tname##_seq_tt) / sizeof(ASN1_TEMPLATE),\ - NULL,\ - sizeof(tname),\ - #tname \ - ASN1_ITEM_end(tname) - -#define ASN1_BROKEN_SEQUENCE_END(stname) ASN1_SEQUENCE_END_ref(stname, stname) - -#define ASN1_SEQUENCE_END_enc(stname, tname) ASN1_SEQUENCE_END_ref(stname, tname) - -#define ASN1_SEQUENCE_END_cb(stname, tname) ASN1_SEQUENCE_END_ref(stname, tname) - -#define ASN1_SEQUENCE_END_ref(stname, tname) \ - ;\ - ASN1_ITEM_start(tname) \ - ASN1_ITYPE_SEQUENCE,\ - V_ASN1_SEQUENCE,\ - tname##_seq_tt,\ - sizeof(tname##_seq_tt) / sizeof(ASN1_TEMPLATE),\ - &tname##_aux,\ - sizeof(stname),\ - #stname \ - ASN1_ITEM_end(tname) - -#define ASN1_NDEF_SEQUENCE_END_cb(stname, tname) \ - ;\ - ASN1_ITEM_start(tname) \ - ASN1_ITYPE_NDEF_SEQUENCE,\ - V_ASN1_SEQUENCE,\ - tname##_seq_tt,\ - sizeof(tname##_seq_tt) / sizeof(ASN1_TEMPLATE),\ - &tname##_aux,\ - sizeof(stname),\ - #stname \ - ASN1_ITEM_end(tname) - - -/* This pair helps declare a CHOICE type. We can do: - * - * ASN1_CHOICE(chname) = { - * ... CHOICE options ... - * ASN1_CHOICE_END(chname) - * - * This will produce an ASN1_ITEM called chname_it - * for a structure called chname. The structure - * definition must look like this: - * typedef struct { - * int type; - * union { - * ASN1_SOMETHING *opt1; - * ASN1_SOMEOTHER *opt2; - * } value; - * } chname; - * - * the name of the selector must be 'type'. - * to use an alternative selector name use the - * ASN1_CHOICE_END_selector() version. - */ - -#define ASN1_CHOICE(tname) \ - static const ASN1_TEMPLATE tname##_ch_tt[] - -#define ASN1_CHOICE_cb(tname, cb) \ - static const ASN1_AUX tname##_aux = {NULL, 0, 0, 0, cb, 0}; \ - ASN1_CHOICE(tname) - -#define ASN1_CHOICE_END(stname) ASN1_CHOICE_END_name(stname, stname) - -#define ASN1_CHOICE_END_name(stname, tname) ASN1_CHOICE_END_selector(stname, tname, type) - -#define ASN1_CHOICE_END_selector(stname, tname, selname) \ - ;\ - ASN1_ITEM_start(tname) \ - ASN1_ITYPE_CHOICE,\ - offsetof(stname,selname) ,\ - tname##_ch_tt,\ - sizeof(tname##_ch_tt) / sizeof(ASN1_TEMPLATE),\ - NULL,\ - sizeof(stname),\ - #stname \ - ASN1_ITEM_end(tname) - -#define ASN1_CHOICE_END_cb(stname, tname, selname) \ - ;\ - ASN1_ITEM_start(tname) \ - ASN1_ITYPE_CHOICE,\ - offsetof(stname,selname) ,\ - tname##_ch_tt,\ - sizeof(tname##_ch_tt) / sizeof(ASN1_TEMPLATE),\ - &tname##_aux,\ - sizeof(stname),\ - #stname \ - ASN1_ITEM_end(tname) - -/* This helps with the template wrapper form of ASN1_ITEM */ - -#define ASN1_EX_TEMPLATE_TYPE(flags, tag, name, type) { \ - (flags), (tag), 0,\ - #name, ASN1_ITEM_ref(type) } - -/* These help with SEQUENCE or CHOICE components */ - -/* used to declare other types */ - -#define ASN1_EX_TYPE(flags, tag, stname, field, type) { \ - (flags), (tag), offsetof(stname, field),\ - #field, ASN1_ITEM_ref(type) } - -/* used when the structure is combined with the parent */ - -#define ASN1_EX_COMBINE(flags, tag, type) { \ - (flags)|ASN1_TFLG_COMBINE, (tag), 0, NULL, ASN1_ITEM_ref(type) } - -/* implicit and explicit helper macros */ - -#define ASN1_IMP_EX(stname, field, type, tag, ex) \ - ASN1_EX_TYPE(ASN1_TFLG_IMPLICIT | ex, tag, stname, field, type) - -#define ASN1_EXP_EX(stname, field, type, tag, ex) \ - ASN1_EX_TYPE(ASN1_TFLG_EXPLICIT | ex, tag, stname, field, type) - -/* Any defined by macros: the field used is in the table itself */ - -#ifndef OPENSSL_EXPORT_VAR_AS_FUNCTION -#define ASN1_ADB_OBJECT(tblname) { ASN1_TFLG_ADB_OID, -1, 0, #tblname, (const ASN1_ITEM *)&(tblname##_adb) } -#define ASN1_ADB_INTEGER(tblname) { ASN1_TFLG_ADB_INT, -1, 0, #tblname, (const ASN1_ITEM *)&(tblname##_adb) } -#else -#define ASN1_ADB_OBJECT(tblname) { ASN1_TFLG_ADB_OID, -1, 0, #tblname, tblname##_adb } -#define ASN1_ADB_INTEGER(tblname) { ASN1_TFLG_ADB_INT, -1, 0, #tblname, tblname##_adb } -#endif -/* Plain simple type */ -#define ASN1_SIMPLE(stname, field, type) ASN1_EX_TYPE(0,0, stname, field, type) - -/* OPTIONAL simple type */ -#define ASN1_OPT(stname, field, type) ASN1_EX_TYPE(ASN1_TFLG_OPTIONAL, 0, stname, field, type) - -/* IMPLICIT tagged simple type */ -#define ASN1_IMP(stname, field, type, tag) ASN1_IMP_EX(stname, field, type, tag, 0) - -/* IMPLICIT tagged OPTIONAL simple type */ -#define ASN1_IMP_OPT(stname, field, type, tag) ASN1_IMP_EX(stname, field, type, tag, ASN1_TFLG_OPTIONAL) - -/* Same as above but EXPLICIT */ - -#define ASN1_EXP(stname, field, type, tag) ASN1_EXP_EX(stname, field, type, tag, 0) -#define ASN1_EXP_OPT(stname, field, type, tag) ASN1_EXP_EX(stname, field, type, tag, ASN1_TFLG_OPTIONAL) - -/* SEQUENCE OF type */ -#define ASN1_SEQUENCE_OF(stname, field, type) \ - ASN1_EX_TYPE(ASN1_TFLG_SEQUENCE_OF, 0, stname, field, type) - -/* OPTIONAL SEQUENCE OF */ -#define ASN1_SEQUENCE_OF_OPT(stname, field, type) \ - ASN1_EX_TYPE(ASN1_TFLG_SEQUENCE_OF|ASN1_TFLG_OPTIONAL, 0, stname, field, type) - -/* Same as above but for SET OF */ - -#define ASN1_SET_OF(stname, field, type) \ - ASN1_EX_TYPE(ASN1_TFLG_SET_OF, 0, stname, field, type) - -#define ASN1_SET_OF_OPT(stname, field, type) \ - ASN1_EX_TYPE(ASN1_TFLG_SET_OF|ASN1_TFLG_OPTIONAL, 0, stname, field, type) - -/* Finally compound types of SEQUENCE, SET, IMPLICIT, EXPLICIT and OPTIONAL */ - -#define ASN1_IMP_SET_OF(stname, field, type, tag) \ - ASN1_IMP_EX(stname, field, type, tag, ASN1_TFLG_SET_OF) - -#define ASN1_EXP_SET_OF(stname, field, type, tag) \ - ASN1_EXP_EX(stname, field, type, tag, ASN1_TFLG_SET_OF) - -#define ASN1_IMP_SET_OF_OPT(stname, field, type, tag) \ - ASN1_IMP_EX(stname, field, type, tag, ASN1_TFLG_SET_OF|ASN1_TFLG_OPTIONAL) - -#define ASN1_EXP_SET_OF_OPT(stname, field, type, tag) \ - ASN1_EXP_EX(stname, field, type, tag, ASN1_TFLG_SET_OF|ASN1_TFLG_OPTIONAL) - -#define ASN1_IMP_SEQUENCE_OF(stname, field, type, tag) \ - ASN1_IMP_EX(stname, field, type, tag, ASN1_TFLG_SEQUENCE_OF) - -#define ASN1_IMP_SEQUENCE_OF_OPT(stname, field, type, tag) \ - ASN1_IMP_EX(stname, field, type, tag, ASN1_TFLG_SEQUENCE_OF|ASN1_TFLG_OPTIONAL) - -#define ASN1_EXP_SEQUENCE_OF(stname, field, type, tag) \ - ASN1_EXP_EX(stname, field, type, tag, ASN1_TFLG_SEQUENCE_OF) - -#define ASN1_EXP_SEQUENCE_OF_OPT(stname, field, type, tag) \ - ASN1_EXP_EX(stname, field, type, tag, ASN1_TFLG_SEQUENCE_OF|ASN1_TFLG_OPTIONAL) - -/* EXPLICIT using indefinite length constructed form */ -#define ASN1_NDEF_EXP(stname, field, type, tag) \ - ASN1_EXP_EX(stname, field, type, tag, ASN1_TFLG_NDEF) - -/* EXPLICIT OPTIONAL using indefinite length constructed form */ -#define ASN1_NDEF_EXP_OPT(stname, field, type, tag) \ - ASN1_EXP_EX(stname, field, type, tag, ASN1_TFLG_OPTIONAL|ASN1_TFLG_NDEF) - -/* Macros for the ASN1_ADB structure */ - -#define ASN1_ADB(name) \ - static const ASN1_ADB_TABLE name##_adbtbl[] - -#ifndef OPENSSL_EXPORT_VAR_AS_FUNCTION - -#define ASN1_ADB_END(name, flags, field, app_table, def, none) \ - ;\ - static const ASN1_ADB name##_adb = {\ - flags,\ - offsetof(name, field),\ - app_table,\ - name##_adbtbl,\ - sizeof(name##_adbtbl) / sizeof(ASN1_ADB_TABLE),\ - def,\ - none\ - } - -#else - -#define ASN1_ADB_END(name, flags, field, app_table, def, none) \ - ;\ - static const ASN1_ITEM *name##_adb(void) \ - { \ - static const ASN1_ADB internal_adb = \ - {\ - flags,\ - offsetof(name, field),\ - app_table,\ - name##_adbtbl,\ - sizeof(name##_adbtbl) / sizeof(ASN1_ADB_TABLE),\ - def,\ - none\ - }; \ - return (const ASN1_ITEM *) &internal_adb; \ - } \ - void dummy_function(void) - -#endif - -#define ADB_ENTRY(val, template) {val, template} - -#define ASN1_ADB_TEMPLATE(name) \ - static const ASN1_TEMPLATE name##_tt - -/* This is the ASN1 template structure that defines - * a wrapper round the actual type. It determines the - * actual position of the field in the value structure, - * various flags such as OPTIONAL and the field name. - */ - -struct ASN1_TEMPLATE_st { -unsigned long flags; /* Various flags */ -long tag; /* tag, not used if no tagging */ -unsigned long offset; /* Offset of this field in structure */ -#ifndef NO_ASN1_FIELD_NAMES -const char *field_name; /* Field name */ -#endif -ASN1_ITEM_EXP *item; /* Relevant ASN1_ITEM or ASN1_ADB */ -}; - -/* Macro to extract ASN1_ITEM and ASN1_ADB pointer from ASN1_TEMPLATE */ - -#define ASN1_TEMPLATE_item(t) (t->item_ptr) -#define ASN1_TEMPLATE_adb(t) (t->item_ptr) - -typedef struct ASN1_ADB_TABLE_st ASN1_ADB_TABLE; -typedef struct ASN1_ADB_st ASN1_ADB; - -struct ASN1_ADB_st { - unsigned long flags; /* Various flags */ - unsigned long offset; /* Offset of selector field */ - STACK_OF(ASN1_ADB_TABLE) **app_items; /* Application defined items */ - const ASN1_ADB_TABLE *tbl; /* Table of possible types */ - long tblcount; /* Number of entries in tbl */ - const ASN1_TEMPLATE *default_tt; /* Type to use if no match */ - const ASN1_TEMPLATE *null_tt; /* Type to use if selector is NULL */ -}; - -struct ASN1_ADB_TABLE_st { - long value; /* NID for an object or value for an int */ - const ASN1_TEMPLATE tt; /* item for this value */ -}; - -/* template flags */ - -/* Field is optional */ -#define ASN1_TFLG_OPTIONAL (0x1) - -/* Field is a SET OF */ -#define ASN1_TFLG_SET_OF (0x1 << 1) - -/* Field is a SEQUENCE OF */ -#define ASN1_TFLG_SEQUENCE_OF (0x2 << 1) - -/* Special case: this refers to a SET OF that - * will be sorted into DER order when encoded *and* - * the corresponding STACK will be modified to match - * the new order. - */ -#define ASN1_TFLG_SET_ORDER (0x3 << 1) - -/* Mask for SET OF or SEQUENCE OF */ -#define ASN1_TFLG_SK_MASK (0x3 << 1) - -/* These flags mean the tag should be taken from the - * tag field. If EXPLICIT then the underlying type - * is used for the inner tag. - */ - -/* IMPLICIT tagging */ -#define ASN1_TFLG_IMPTAG (0x1 << 3) - - -/* EXPLICIT tagging, inner tag from underlying type */ -#define ASN1_TFLG_EXPTAG (0x2 << 3) - -#define ASN1_TFLG_TAG_MASK (0x3 << 3) - -/* context specific IMPLICIT */ -#define ASN1_TFLG_IMPLICIT ASN1_TFLG_IMPTAG|ASN1_TFLG_CONTEXT - -/* context specific EXPLICIT */ -#define ASN1_TFLG_EXPLICIT ASN1_TFLG_EXPTAG|ASN1_TFLG_CONTEXT - -/* If tagging is in force these determine the - * type of tag to use. Otherwise the tag is - * determined by the underlying type. These - * values reflect the actual octet format. - */ - -/* Universal tag */ -#define ASN1_TFLG_UNIVERSAL (0x0<<6) -/* Application tag */ -#define ASN1_TFLG_APPLICATION (0x1<<6) -/* Context specific tag */ -#define ASN1_TFLG_CONTEXT (0x2<<6) -/* Private tag */ -#define ASN1_TFLG_PRIVATE (0x3<<6) - -#define ASN1_TFLG_TAG_CLASS (0x3<<6) - -/* These are for ANY DEFINED BY type. In this case - * the 'item' field points to an ASN1_ADB structure - * which contains a table of values to decode the - * relevant type - */ - -#define ASN1_TFLG_ADB_MASK (0x3<<8) - -#define ASN1_TFLG_ADB_OID (0x1<<8) - -#define ASN1_TFLG_ADB_INT (0x1<<9) - -/* This flag means a parent structure is passed - * instead of the field: this is useful is a - * SEQUENCE is being combined with a CHOICE for - * example. Since this means the structure and - * item name will differ we need to use the - * ASN1_CHOICE_END_name() macro for example. - */ - -#define ASN1_TFLG_COMBINE (0x1<<10) - -/* This flag when present in a SEQUENCE OF, SET OF - * or EXPLICIT causes indefinite length constructed - * encoding to be used if required. - */ - -#define ASN1_TFLG_NDEF (0x1<<11) - -/* This is the actual ASN1 item itself */ - -struct ASN1_ITEM_st { -char itype; /* The item type, primitive, SEQUENCE, CHOICE or extern */ -long utype; /* underlying type */ -const ASN1_TEMPLATE *templates; /* If SEQUENCE or CHOICE this contains the contents */ -long tcount; /* Number of templates if SEQUENCE or CHOICE */ -const void *funcs; /* functions that handle this type */ -long size; /* Structure size (usually)*/ -#ifndef NO_ASN1_FIELD_NAMES -const char *sname; /* Structure name */ -#endif -}; - -/* These are values for the itype field and - * determine how the type is interpreted. - * - * For PRIMITIVE types the underlying type - * determines the behaviour if items is NULL. - * - * Otherwise templates must contain a single - * template and the type is treated in the - * same way as the type specified in the template. - * - * For SEQUENCE types the templates field points - * to the members, the size field is the - * structure size. - * - * For CHOICE types the templates field points - * to each possible member (typically a union) - * and the 'size' field is the offset of the - * selector. - * - * The 'funcs' field is used for application - * specific functions. - * - * For COMPAT types the funcs field gives a - * set of functions that handle this type, this - * supports the old d2i, i2d convention. - * - * The EXTERN type uses a new style d2i/i2d. - * The new style should be used where possible - * because it avoids things like the d2i IMPLICIT - * hack. - * - * MSTRING is a multiple string type, it is used - * for a CHOICE of character strings where the - * actual strings all occupy an ASN1_STRING - * structure. In this case the 'utype' field - * has a special meaning, it is used as a mask - * of acceptable types using the B_ASN1 constants. - * - * NDEF_SEQUENCE is the same as SEQUENCE except - * that it will use indefinite length constructed - * encoding if requested. - * - */ - -#define ASN1_ITYPE_PRIMITIVE 0x0 - -#define ASN1_ITYPE_SEQUENCE 0x1 - -#define ASN1_ITYPE_CHOICE 0x2 - -#define ASN1_ITYPE_COMPAT 0x3 - -#define ASN1_ITYPE_EXTERN 0x4 - -#define ASN1_ITYPE_MSTRING 0x5 - -#define ASN1_ITYPE_NDEF_SEQUENCE 0x6 - -/* Cache for ASN1 tag and length, so we - * don't keep re-reading it for things - * like CHOICE - */ - -struct ASN1_TLC_st{ - char valid; /* Values below are valid */ - int ret; /* return value */ - long plen; /* length */ - int ptag; /* class value */ - int pclass; /* class value */ - int hdrlen; /* header length */ -}; - -/* Typedefs for ASN1 function pointers */ - -typedef ASN1_VALUE * ASN1_new_func(void); -typedef void ASN1_free_func(ASN1_VALUE *a); -typedef ASN1_VALUE * ASN1_d2i_func(ASN1_VALUE **a, const unsigned char ** in, long length); -typedef int ASN1_i2d_func(ASN1_VALUE * a, unsigned char **in); - -typedef int ASN1_ex_d2i(ASN1_VALUE **pval, const unsigned char **in, long len, const ASN1_ITEM *it, - int tag, int aclass, char opt, ASN1_TLC *ctx); - -typedef int ASN1_ex_i2d(ASN1_VALUE **pval, unsigned char **out, const ASN1_ITEM *it, int tag, int aclass); -typedef int ASN1_ex_new_func(ASN1_VALUE **pval, const ASN1_ITEM *it); -typedef void ASN1_ex_free_func(ASN1_VALUE **pval, const ASN1_ITEM *it); - -typedef int ASN1_ex_print_func(BIO *out, ASN1_VALUE **pval, - int indent, const char *fname, - const ASN1_PCTX *pctx); - -typedef int ASN1_primitive_i2c(ASN1_VALUE **pval, unsigned char *cont, int *putype, const ASN1_ITEM *it); -typedef int ASN1_primitive_c2i(ASN1_VALUE **pval, const unsigned char *cont, int len, int utype, char *free_cont, const ASN1_ITEM *it); -typedef int ASN1_primitive_print(BIO *out, ASN1_VALUE **pval, const ASN1_ITEM *it, int indent, const ASN1_PCTX *pctx); - -typedef struct ASN1_COMPAT_FUNCS_st { - ASN1_new_func *asn1_new; - ASN1_free_func *asn1_free; - ASN1_d2i_func *asn1_d2i; - ASN1_i2d_func *asn1_i2d; -} ASN1_COMPAT_FUNCS; - -typedef struct ASN1_EXTERN_FUNCS_st { - void *app_data; - ASN1_ex_new_func *asn1_ex_new; - ASN1_ex_free_func *asn1_ex_free; - ASN1_ex_free_func *asn1_ex_clear; - ASN1_ex_d2i *asn1_ex_d2i; - ASN1_ex_i2d *asn1_ex_i2d; - ASN1_ex_print_func *asn1_ex_print; -} ASN1_EXTERN_FUNCS; - -typedef struct ASN1_PRIMITIVE_FUNCS_st { - void *app_data; - unsigned long flags; - ASN1_ex_new_func *prim_new; - ASN1_ex_free_func *prim_free; - ASN1_ex_free_func *prim_clear; - ASN1_primitive_c2i *prim_c2i; - ASN1_primitive_i2c *prim_i2c; - ASN1_primitive_print *prim_print; -} ASN1_PRIMITIVE_FUNCS; - -/* This is the ASN1_AUX structure: it handles various - * miscellaneous requirements. For example the use of - * reference counts and an informational callback. - * - * The "informational callback" is called at various - * points during the ASN1 encoding and decoding. It can - * be used to provide minor customisation of the structures - * used. This is most useful where the supplied routines - * *almost* do the right thing but need some extra help - * at a few points. If the callback returns zero then - * it is assumed a fatal error has occurred and the - * main operation should be abandoned. - * - * If major changes in the default behaviour are required - * then an external type is more appropriate. - */ - -typedef int ASN1_aux_cb(int operation, ASN1_VALUE **in, const ASN1_ITEM *it, - void *exarg); - -typedef struct ASN1_AUX_st { - void *app_data; - int flags; - int ref_offset; /* Offset of reference value */ - int ref_lock; /* Lock type to use */ - ASN1_aux_cb *asn1_cb; - int enc_offset; /* Offset of ASN1_ENCODING structure */ -} ASN1_AUX; - -/* For print related callbacks exarg points to this structure */ -typedef struct ASN1_PRINT_ARG_st { - BIO *out; - int indent; - const ASN1_PCTX *pctx; -} ASN1_PRINT_ARG; - -/* For streaming related callbacks exarg points to this structure */ -typedef struct ASN1_STREAM_ARG_st { - /* BIO to stream through */ - BIO *out; - /* BIO with filters appended */ - BIO *ndef_bio; - /* Streaming I/O boundary */ - unsigned char **boundary; -} ASN1_STREAM_ARG; - -/* Flags in ASN1_AUX */ - -/* Use a reference count */ -#define ASN1_AFLG_REFCOUNT 1 -/* Save the encoding of structure (useful for signatures) */ -#define ASN1_AFLG_ENCODING 2 -/* The Sequence length is invalid */ -#define ASN1_AFLG_BROKEN 4 - -/* operation values for asn1_cb */ - -#define ASN1_OP_NEW_PRE 0 -#define ASN1_OP_NEW_POST 1 -#define ASN1_OP_FREE_PRE 2 -#define ASN1_OP_FREE_POST 3 -#define ASN1_OP_D2I_PRE 4 -#define ASN1_OP_D2I_POST 5 -#define ASN1_OP_I2D_PRE 6 -#define ASN1_OP_I2D_POST 7 -#define ASN1_OP_PRINT_PRE 8 -#define ASN1_OP_PRINT_POST 9 -#define ASN1_OP_STREAM_PRE 10 -#define ASN1_OP_STREAM_POST 11 -#define ASN1_OP_DETACHED_PRE 12 -#define ASN1_OP_DETACHED_POST 13 - -/* Macro to implement a primitive type */ -#define IMPLEMENT_ASN1_TYPE(stname) IMPLEMENT_ASN1_TYPE_ex(stname, stname, 0) -#define IMPLEMENT_ASN1_TYPE_ex(itname, vname, ex) \ - ASN1_ITEM_start(itname) \ - ASN1_ITYPE_PRIMITIVE, V_##vname, NULL, 0, NULL, ex, #itname \ - ASN1_ITEM_end(itname) - -/* Macro to implement a multi string type */ -#define IMPLEMENT_ASN1_MSTRING(itname, mask) \ - ASN1_ITEM_start(itname) \ - ASN1_ITYPE_MSTRING, mask, NULL, 0, NULL, sizeof(ASN1_STRING), #itname \ - ASN1_ITEM_end(itname) - -/* Macro to implement an ASN1_ITEM in terms of old style funcs */ - -#define IMPLEMENT_COMPAT_ASN1(sname) IMPLEMENT_COMPAT_ASN1_type(sname, V_ASN1_SEQUENCE) - -#define IMPLEMENT_COMPAT_ASN1_type(sname, tag) \ - static const ASN1_COMPAT_FUNCS sname##_ff = { \ - (ASN1_new_func *)sname##_new, \ - (ASN1_free_func *)sname##_free, \ - (ASN1_d2i_func *)d2i_##sname, \ - (ASN1_i2d_func *)i2d_##sname, \ - }; \ - ASN1_ITEM_start(sname) \ - ASN1_ITYPE_COMPAT, \ - tag, \ - NULL, \ - 0, \ - &sname##_ff, \ - 0, \ - #sname \ - ASN1_ITEM_end(sname) - -#define IMPLEMENT_EXTERN_ASN1(sname, tag, fptrs) \ - ASN1_ITEM_start(sname) \ - ASN1_ITYPE_EXTERN, \ - tag, \ - NULL, \ - 0, \ - &fptrs, \ - 0, \ - #sname \ - ASN1_ITEM_end(sname) - -/* Macro to implement standard functions in terms of ASN1_ITEM structures */ - -#define IMPLEMENT_ASN1_FUNCTIONS(stname) IMPLEMENT_ASN1_FUNCTIONS_fname(stname, stname, stname) - -#define IMPLEMENT_ASN1_FUNCTIONS_name(stname, itname) IMPLEMENT_ASN1_FUNCTIONS_fname(stname, itname, itname) - -#define IMPLEMENT_ASN1_FUNCTIONS_ENCODE_name(stname, itname) \ - IMPLEMENT_ASN1_FUNCTIONS_ENCODE_fname(stname, itname, itname) - -#define IMPLEMENT_STATIC_ASN1_ALLOC_FUNCTIONS(stname) \ - IMPLEMENT_ASN1_ALLOC_FUNCTIONS_pfname(static, stname, stname, stname) - -#define IMPLEMENT_ASN1_ALLOC_FUNCTIONS(stname) \ - IMPLEMENT_ASN1_ALLOC_FUNCTIONS_fname(stname, stname, stname) - -#define IMPLEMENT_ASN1_ALLOC_FUNCTIONS_pfname(pre, stname, itname, fname) \ - pre stname *fname##_new(void) \ - { \ - return (stname *)ASN1_item_new(ASN1_ITEM_rptr(itname)); \ - } \ - pre void fname##_free(stname *a) \ - { \ - ASN1_item_free((ASN1_VALUE *)a, ASN1_ITEM_rptr(itname)); \ - } - -#define IMPLEMENT_ASN1_ALLOC_FUNCTIONS_fname(stname, itname, fname) \ - stname *fname##_new(void) \ - { \ - return (stname *)ASN1_item_new(ASN1_ITEM_rptr(itname)); \ - } \ - void fname##_free(stname *a) \ - { \ - ASN1_item_free((ASN1_VALUE *)a, ASN1_ITEM_rptr(itname)); \ - } - -#define IMPLEMENT_ASN1_FUNCTIONS_fname(stname, itname, fname) \ - IMPLEMENT_ASN1_ENCODE_FUNCTIONS_fname(stname, itname, fname) \ - IMPLEMENT_ASN1_ALLOC_FUNCTIONS_fname(stname, itname, fname) - -#define IMPLEMENT_ASN1_ENCODE_FUNCTIONS_fname(stname, itname, fname) \ - stname *d2i_##fname(stname **a, const unsigned char **in, long len) \ - { \ - return (stname *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, ASN1_ITEM_rptr(itname));\ - } \ - int i2d_##fname(stname *a, unsigned char **out) \ - { \ - return ASN1_item_i2d((ASN1_VALUE *)a, out, ASN1_ITEM_rptr(itname));\ - } - -#define IMPLEMENT_ASN1_NDEF_FUNCTION(stname) \ - int i2d_##stname##_NDEF(stname *a, unsigned char **out) \ - { \ - return ASN1_item_ndef_i2d((ASN1_VALUE *)a, out, ASN1_ITEM_rptr(stname));\ - } - -/* This includes evil casts to remove const: they will go away when full - * ASN1 constification is done. - */ -#define IMPLEMENT_ASN1_ENCODE_FUNCTIONS_const_fname(stname, itname, fname) \ - stname *d2i_##fname(stname **a, const unsigned char **in, long len) \ - { \ - return (stname *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, ASN1_ITEM_rptr(itname));\ - } \ - int i2d_##fname(const stname *a, unsigned char **out) \ - { \ - return ASN1_item_i2d((ASN1_VALUE *)a, out, ASN1_ITEM_rptr(itname));\ - } - -#define IMPLEMENT_ASN1_DUP_FUNCTION(stname) \ - stname * stname##_dup(stname *x) \ - { \ - return ASN1_item_dup(ASN1_ITEM_rptr(stname), x); \ - } - -#define IMPLEMENT_ASN1_PRINT_FUNCTION(stname) \ - IMPLEMENT_ASN1_PRINT_FUNCTION_fname(stname, stname, stname) - -#define IMPLEMENT_ASN1_PRINT_FUNCTION_fname(stname, itname, fname) \ - int fname##_print_ctx(BIO *out, stname *x, int indent, \ - const ASN1_PCTX *pctx) \ - { \ - return ASN1_item_print(out, (ASN1_VALUE *)x, indent, \ - ASN1_ITEM_rptr(itname), pctx); \ - } - -#define IMPLEMENT_ASN1_FUNCTIONS_const(name) \ - IMPLEMENT_ASN1_FUNCTIONS_const_fname(name, name, name) - -#define IMPLEMENT_ASN1_FUNCTIONS_const_fname(stname, itname, fname) \ - IMPLEMENT_ASN1_ENCODE_FUNCTIONS_const_fname(stname, itname, fname) \ - IMPLEMENT_ASN1_ALLOC_FUNCTIONS_fname(stname, itname, fname) - -/* external definitions for primitive types */ - -DECLARE_ASN1_ITEM(ASN1_BOOLEAN) -DECLARE_ASN1_ITEM(ASN1_TBOOLEAN) -DECLARE_ASN1_ITEM(ASN1_FBOOLEAN) -DECLARE_ASN1_ITEM(ASN1_SEQUENCE) -DECLARE_ASN1_ITEM(CBIGNUM) -DECLARE_ASN1_ITEM(BIGNUM) -DECLARE_ASN1_ITEM(LONG) -DECLARE_ASN1_ITEM(ZLONG) - -DECLARE_STACK_OF(ASN1_VALUE) - -/* Functions used internally by the ASN1 code */ - -int ASN1_item_ex_new(ASN1_VALUE **pval, const ASN1_ITEM *it); -void ASN1_item_ex_free(ASN1_VALUE **pval, const ASN1_ITEM *it); -int ASN1_template_new(ASN1_VALUE **pval, const ASN1_TEMPLATE *tt); -int ASN1_primitive_new(ASN1_VALUE **pval, const ASN1_ITEM *it); - -void ASN1_template_free(ASN1_VALUE **pval, const ASN1_TEMPLATE *tt); -int ASN1_template_d2i(ASN1_VALUE **pval, const unsigned char **in, long len, const ASN1_TEMPLATE *tt); -int ASN1_item_ex_d2i(ASN1_VALUE **pval, const unsigned char **in, long len, const ASN1_ITEM *it, - int tag, int aclass, char opt, ASN1_TLC *ctx); - -int ASN1_item_ex_i2d(ASN1_VALUE **pval, unsigned char **out, const ASN1_ITEM *it, int tag, int aclass); -int ASN1_template_i2d(ASN1_VALUE **pval, unsigned char **out, const ASN1_TEMPLATE *tt); -void ASN1_primitive_free(ASN1_VALUE **pval, const ASN1_ITEM *it); - -int asn1_ex_i2c(ASN1_VALUE **pval, unsigned char *cont, int *putype, const ASN1_ITEM *it); -int asn1_ex_c2i(ASN1_VALUE **pval, const unsigned char *cont, int len, int utype, char *free_cont, const ASN1_ITEM *it); - -int asn1_get_choice_selector(ASN1_VALUE **pval, const ASN1_ITEM *it); -int asn1_set_choice_selector(ASN1_VALUE **pval, int value, const ASN1_ITEM *it); - -ASN1_VALUE ** asn1_get_field_ptr(ASN1_VALUE **pval, const ASN1_TEMPLATE *tt); - -const ASN1_TEMPLATE *asn1_do_adb(ASN1_VALUE **pval, const ASN1_TEMPLATE *tt, int nullerr); - -int asn1_do_lock(ASN1_VALUE **pval, int op, const ASN1_ITEM *it); - -void asn1_enc_init(ASN1_VALUE **pval, const ASN1_ITEM *it); -void asn1_enc_free(ASN1_VALUE **pval, const ASN1_ITEM *it); -int asn1_enc_restore(int *len, unsigned char **out, ASN1_VALUE **pval, const ASN1_ITEM *it); -int asn1_enc_save(ASN1_VALUE **pval, const unsigned char *in, int inlen, const ASN1_ITEM *it); - -#ifdef __cplusplus -} -#endif -#endif diff --git a/Pods/OpenSSL-Universal/include-osx/openssl/bio.h b/Pods/OpenSSL-Universal/include-osx/openssl/bio.h deleted file mode 100644 index 05699ab2..00000000 --- a/Pods/OpenSSL-Universal/include-osx/openssl/bio.h +++ /dev/null @@ -1,847 +0,0 @@ -/* crypto/bio/bio.h */ -/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) - * All rights reserved. - * - * This package is an SSL implementation written - * by Eric Young (eay@cryptsoft.com). - * The implementation was written so as to conform with Netscapes SSL. - * - * This library is free for commercial and non-commercial use as long as - * the following conditions are aheared to. The following conditions - * apply to all code found in this distribution, be it the RC4, RSA, - * lhash, DES, etc., code; not just the SSL code. The SSL documentation - * included with this distribution is covered by the same copyright terms - * except that the holder is Tim Hudson (tjh@cryptsoft.com). - * - * Copyright remains Eric Young's, and as such any Copyright notices in - * the code are not to be removed. - * If this package is used in a product, Eric Young should be given attribution - * as the author of the parts of the library used. - * This can be in the form of a textual message at program startup or - * in documentation (online or textual) provided with the package. - * - * Redistribution and use in source and binary forms, with or without - * modification, are permitted provided that the following conditions - * are met: - * 1. Redistributions of source code must retain the copyright - * notice, this list of conditions and the following disclaimer. - * 2. Redistributions in binary form must reproduce the above copyright - * notice, this list of conditions and the following disclaimer in the - * documentation and/or other materials provided with the distribution. - * 3. All advertising materials mentioning features or use of this software - * must display the following acknowledgement: - * "This product includes cryptographic software written by - * Eric Young (eay@cryptsoft.com)" - * The word 'cryptographic' can be left out if the rouines from the library - * being used are not cryptographic related :-). - * 4. If you include any Windows specific code (or a derivative thereof) from - * the apps directory (application code) you must include an acknowledgement: - * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" - * - * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND - * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE - * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE - * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE - * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL - * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS - * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) - * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT - * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY - * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF - * SUCH DAMAGE. - * - * The licence and distribution terms for any publically available version or - * derivative of this code cannot be changed. i.e. this code cannot simply be - * copied and put under another distribution licence - * [including the GNU Public Licence.] - */ - -#ifndef HEADER_BIO_H -#define HEADER_BIO_H - -#include - -#ifndef OPENSSL_NO_FP_API -# include -#endif -#include - -#include - -#ifndef OPENSSL_NO_SCTP -# ifndef OPENSSL_SYS_VMS -# include -# else -# include -# endif -#endif - -#ifdef __cplusplus -extern "C" { -#endif - -/* These are the 'types' of BIOs */ -#define BIO_TYPE_NONE 0 -#define BIO_TYPE_MEM (1|0x0400) -#define BIO_TYPE_FILE (2|0x0400) - -#define BIO_TYPE_FD (4|0x0400|0x0100) -#define BIO_TYPE_SOCKET (5|0x0400|0x0100) -#define BIO_TYPE_NULL (6|0x0400) -#define BIO_TYPE_SSL (7|0x0200) -#define BIO_TYPE_MD (8|0x0200) /* passive filter */ -#define BIO_TYPE_BUFFER (9|0x0200) /* filter */ -#define BIO_TYPE_CIPHER (10|0x0200) /* filter */ -#define BIO_TYPE_BASE64 (11|0x0200) /* filter */ -#define BIO_TYPE_CONNECT (12|0x0400|0x0100) /* socket - connect */ -#define BIO_TYPE_ACCEPT (13|0x0400|0x0100) /* socket for accept */ -#define BIO_TYPE_PROXY_CLIENT (14|0x0200) /* client proxy BIO */ -#define BIO_TYPE_PROXY_SERVER (15|0x0200) /* server proxy BIO */ -#define BIO_TYPE_NBIO_TEST (16|0x0200) /* server proxy BIO */ -#define BIO_TYPE_NULL_FILTER (17|0x0200) -#define BIO_TYPE_BER (18|0x0200) /* BER -> bin filter */ -#define BIO_TYPE_BIO (19|0x0400) /* (half a) BIO pair */ -#define BIO_TYPE_LINEBUFFER (20|0x0200) /* filter */ -#define BIO_TYPE_DGRAM (21|0x0400|0x0100) -#ifndef OPENSSL_NO_SCTP -#define BIO_TYPE_DGRAM_SCTP (24|0x0400|0x0100) -#endif -#define BIO_TYPE_ASN1 (22|0x0200) /* filter */ -#define BIO_TYPE_COMP (23|0x0200) /* filter */ - -#define BIO_TYPE_DESCRIPTOR 0x0100 /* socket, fd, connect or accept */ -#define BIO_TYPE_FILTER 0x0200 -#define BIO_TYPE_SOURCE_SINK 0x0400 - -/* BIO_FILENAME_READ|BIO_CLOSE to open or close on free. - * BIO_set_fp(in,stdin,BIO_NOCLOSE); */ -#define BIO_NOCLOSE 0x00 -#define BIO_CLOSE 0x01 - -/* These are used in the following macros and are passed to - * BIO_ctrl() */ -#define BIO_CTRL_RESET 1 /* opt - rewind/zero etc */ -#define BIO_CTRL_EOF 2 /* opt - are we at the eof */ -#define BIO_CTRL_INFO 3 /* opt - extra tit-bits */ -#define BIO_CTRL_SET 4 /* man - set the 'IO' type */ -#define BIO_CTRL_GET 5 /* man - get the 'IO' type */ -#define BIO_CTRL_PUSH 6 /* opt - internal, used to signify change */ -#define BIO_CTRL_POP 7 /* opt - internal, used to signify change */ -#define BIO_CTRL_GET_CLOSE 8 /* man - set the 'close' on free */ -#define BIO_CTRL_SET_CLOSE 9 /* man - set the 'close' on free */ -#define BIO_CTRL_PENDING 10 /* opt - is their more data buffered */ -#define BIO_CTRL_FLUSH 11 /* opt - 'flush' buffered output */ -#define BIO_CTRL_DUP 12 /* man - extra stuff for 'duped' BIO */ -#define BIO_CTRL_WPENDING 13 /* opt - number of bytes still to write */ -/* callback is int cb(BIO *bio,state,ret); */ -#define BIO_CTRL_SET_CALLBACK 14 /* opt - set callback function */ -#define BIO_CTRL_GET_CALLBACK 15 /* opt - set callback function */ - -#define BIO_CTRL_SET_FILENAME 30 /* BIO_s_file special */ - -/* dgram BIO stuff */ -#define BIO_CTRL_DGRAM_CONNECT 31 /* BIO dgram special */ -#define BIO_CTRL_DGRAM_SET_CONNECTED 32 /* allow for an externally - * connected socket to be - * passed in */ -#define BIO_CTRL_DGRAM_SET_RECV_TIMEOUT 33 /* setsockopt, essentially */ -#define BIO_CTRL_DGRAM_GET_RECV_TIMEOUT 34 /* getsockopt, essentially */ -#define BIO_CTRL_DGRAM_SET_SEND_TIMEOUT 35 /* setsockopt, essentially */ -#define BIO_CTRL_DGRAM_GET_SEND_TIMEOUT 36 /* getsockopt, essentially */ - -#define BIO_CTRL_DGRAM_GET_RECV_TIMER_EXP 37 /* flag whether the last */ -#define BIO_CTRL_DGRAM_GET_SEND_TIMER_EXP 38 /* I/O operation tiemd out */ - -/* #ifdef IP_MTU_DISCOVER */ -#define BIO_CTRL_DGRAM_MTU_DISCOVER 39 /* set DF bit on egress packets */ -/* #endif */ - -#define BIO_CTRL_DGRAM_QUERY_MTU 40 /* as kernel for current MTU */ -#define BIO_CTRL_DGRAM_GET_FALLBACK_MTU 47 -#define BIO_CTRL_DGRAM_GET_MTU 41 /* get cached value for MTU */ -#define BIO_CTRL_DGRAM_SET_MTU 42 /* set cached value for - * MTU. want to use this - * if asking the kernel - * fails */ - -#define BIO_CTRL_DGRAM_MTU_EXCEEDED 43 /* check whether the MTU - * was exceed in the - * previous write - * operation */ - -#define BIO_CTRL_DGRAM_GET_PEER 46 -#define BIO_CTRL_DGRAM_SET_PEER 44 /* Destination for the data */ - -#define BIO_CTRL_DGRAM_SET_NEXT_TIMEOUT 45 /* Next DTLS handshake timeout to - * adjust socket timeouts */ - -#ifndef OPENSSL_NO_SCTP -/* SCTP stuff */ -#define BIO_CTRL_DGRAM_SCTP_SET_IN_HANDSHAKE 50 -#define BIO_CTRL_DGRAM_SCTP_ADD_AUTH_KEY 51 -#define BIO_CTRL_DGRAM_SCTP_NEXT_AUTH_KEY 52 -#define BIO_CTRL_DGRAM_SCTP_AUTH_CCS_RCVD 53 -#define BIO_CTRL_DGRAM_SCTP_GET_SNDINFO 60 -#define BIO_CTRL_DGRAM_SCTP_SET_SNDINFO 61 -#define BIO_CTRL_DGRAM_SCTP_GET_RCVINFO 62 -#define BIO_CTRL_DGRAM_SCTP_SET_RCVINFO 63 -#define BIO_CTRL_DGRAM_SCTP_GET_PRINFO 64 -#define BIO_CTRL_DGRAM_SCTP_SET_PRINFO 65 -#define BIO_CTRL_DGRAM_SCTP_SAVE_SHUTDOWN 70 -#endif - -/* modifiers */ -#define BIO_FP_READ 0x02 -#define BIO_FP_WRITE 0x04 -#define BIO_FP_APPEND 0x08 -#define BIO_FP_TEXT 0x10 - -#define BIO_FLAGS_READ 0x01 -#define BIO_FLAGS_WRITE 0x02 -#define BIO_FLAGS_IO_SPECIAL 0x04 -#define BIO_FLAGS_RWS (BIO_FLAGS_READ|BIO_FLAGS_WRITE|BIO_FLAGS_IO_SPECIAL) -#define BIO_FLAGS_SHOULD_RETRY 0x08 -#ifndef BIO_FLAGS_UPLINK -/* "UPLINK" flag denotes file descriptors provided by application. - It defaults to 0, as most platforms don't require UPLINK interface. */ -#define BIO_FLAGS_UPLINK 0 -#endif - -/* Used in BIO_gethostbyname() */ -#define BIO_GHBN_CTRL_HITS 1 -#define BIO_GHBN_CTRL_MISSES 2 -#define BIO_GHBN_CTRL_CACHE_SIZE 3 -#define BIO_GHBN_CTRL_GET_ENTRY 4 -#define BIO_GHBN_CTRL_FLUSH 5 - -/* Mostly used in the SSL BIO */ -/* Not used anymore - * #define BIO_FLAGS_PROTOCOL_DELAYED_READ 0x10 - * #define BIO_FLAGS_PROTOCOL_DELAYED_WRITE 0x20 - * #define BIO_FLAGS_PROTOCOL_STARTUP 0x40 - */ - -#define BIO_FLAGS_BASE64_NO_NL 0x100 - -/* This is used with memory BIOs: it means we shouldn't free up or change the - * data in any way. - */ -#define BIO_FLAGS_MEM_RDONLY 0x200 - -typedef struct bio_st BIO; - -void BIO_set_flags(BIO *b, int flags); -int BIO_test_flags(const BIO *b, int flags); -void BIO_clear_flags(BIO *b, int flags); - -#define BIO_get_flags(b) BIO_test_flags(b, ~(0x0)) -#define BIO_set_retry_special(b) \ - BIO_set_flags(b, (BIO_FLAGS_IO_SPECIAL|BIO_FLAGS_SHOULD_RETRY)) -#define BIO_set_retry_read(b) \ - BIO_set_flags(b, (BIO_FLAGS_READ|BIO_FLAGS_SHOULD_RETRY)) -#define BIO_set_retry_write(b) \ - BIO_set_flags(b, (BIO_FLAGS_WRITE|BIO_FLAGS_SHOULD_RETRY)) - -/* These are normally used internally in BIOs */ -#define BIO_clear_retry_flags(b) \ - BIO_clear_flags(b, (BIO_FLAGS_RWS|BIO_FLAGS_SHOULD_RETRY)) -#define BIO_get_retry_flags(b) \ - BIO_test_flags(b, (BIO_FLAGS_RWS|BIO_FLAGS_SHOULD_RETRY)) - -/* These should be used by the application to tell why we should retry */ -#define BIO_should_read(a) BIO_test_flags(a, BIO_FLAGS_READ) -#define BIO_should_write(a) BIO_test_flags(a, BIO_FLAGS_WRITE) -#define BIO_should_io_special(a) BIO_test_flags(a, BIO_FLAGS_IO_SPECIAL) -#define BIO_retry_type(a) BIO_test_flags(a, BIO_FLAGS_RWS) -#define BIO_should_retry(a) BIO_test_flags(a, BIO_FLAGS_SHOULD_RETRY) - -/* The next three are used in conjunction with the - * BIO_should_io_special() condition. After this returns true, - * BIO *BIO_get_retry_BIO(BIO *bio, int *reason); will walk the BIO - * stack and return the 'reason' for the special and the offending BIO. - * Given a BIO, BIO_get_retry_reason(bio) will return the code. */ -/* Returned from the SSL bio when the certificate retrieval code had an error */ -#define BIO_RR_SSL_X509_LOOKUP 0x01 -/* Returned from the connect BIO when a connect would have blocked */ -#define BIO_RR_CONNECT 0x02 -/* Returned from the accept BIO when an accept would have blocked */ -#define BIO_RR_ACCEPT 0x03 - -/* These are passed by the BIO callback */ -#define BIO_CB_FREE 0x01 -#define BIO_CB_READ 0x02 -#define BIO_CB_WRITE 0x03 -#define BIO_CB_PUTS 0x04 -#define BIO_CB_GETS 0x05 -#define BIO_CB_CTRL 0x06 - -/* The callback is called before and after the underling operation, - * The BIO_CB_RETURN flag indicates if it is after the call */ -#define BIO_CB_RETURN 0x80 -#define BIO_CB_return(a) ((a)|BIO_CB_RETURN)) -#define BIO_cb_pre(a) (!((a)&BIO_CB_RETURN)) -#define BIO_cb_post(a) ((a)&BIO_CB_RETURN) - -long (*BIO_get_callback(const BIO *b)) (struct bio_st *,int,const char *,int, long,long); -void BIO_set_callback(BIO *b, - long (*callback)(struct bio_st *,int,const char *,int, long,long)); -char *BIO_get_callback_arg(const BIO *b); -void BIO_set_callback_arg(BIO *b, char *arg); - -const char * BIO_method_name(const BIO *b); -int BIO_method_type(const BIO *b); - -typedef void bio_info_cb(struct bio_st *, int, const char *, int, long, long); - -typedef struct bio_method_st - { - int type; - const char *name; - int (*bwrite)(BIO *, const char *, int); - int (*bread)(BIO *, char *, int); - int (*bputs)(BIO *, const char *); - int (*bgets)(BIO *, char *, int); - long (*ctrl)(BIO *, int, long, void *); - int (*create)(BIO *); - int (*destroy)(BIO *); - long (*callback_ctrl)(BIO *, int, bio_info_cb *); - } BIO_METHOD; - -struct bio_st - { - BIO_METHOD *method; - /* bio, mode, argp, argi, argl, ret */ - long (*callback)(struct bio_st *,int,const char *,int, long,long); - char *cb_arg; /* first argument for the callback */ - - int init; - int shutdown; - int flags; /* extra storage */ - int retry_reason; - int num; - void *ptr; - struct bio_st *next_bio; /* used by filter BIOs */ - struct bio_st *prev_bio; /* used by filter BIOs */ - int references; - unsigned long num_read; - unsigned long num_write; - - CRYPTO_EX_DATA ex_data; - }; - -DECLARE_STACK_OF(BIO) - -typedef struct bio_f_buffer_ctx_struct - { - /* Buffers are setup like this: - * - * <---------------------- size -----------------------> - * +---------------------------------------------------+ - * | consumed | remaining | free space | - * +---------------------------------------------------+ - * <-- off --><------- len -------> - */ - - /* BIO *bio; */ /* this is now in the BIO struct */ - int ibuf_size; /* how big is the input buffer */ - int obuf_size; /* how big is the output buffer */ - - char *ibuf; /* the char array */ - int ibuf_len; /* how many bytes are in it */ - int ibuf_off; /* write/read offset */ - - char *obuf; /* the char array */ - int obuf_len; /* how many bytes are in it */ - int obuf_off; /* write/read offset */ - } BIO_F_BUFFER_CTX; - -/* Prefix and suffix callback in ASN1 BIO */ -typedef int asn1_ps_func(BIO *b, unsigned char **pbuf, int *plen, void *parg); - -#ifndef OPENSSL_NO_SCTP -/* SCTP parameter structs */ -struct bio_dgram_sctp_sndinfo - { - uint16_t snd_sid; - uint16_t snd_flags; - uint32_t snd_ppid; - uint32_t snd_context; - }; - -struct bio_dgram_sctp_rcvinfo - { - uint16_t rcv_sid; - uint16_t rcv_ssn; - uint16_t rcv_flags; - uint32_t rcv_ppid; - uint32_t rcv_tsn; - uint32_t rcv_cumtsn; - uint32_t rcv_context; - }; - -struct bio_dgram_sctp_prinfo - { - uint16_t pr_policy; - uint32_t pr_value; - }; -#endif - -/* connect BIO stuff */ -#define BIO_CONN_S_BEFORE 1 -#define BIO_CONN_S_GET_IP 2 -#define BIO_CONN_S_GET_PORT 3 -#define BIO_CONN_S_CREATE_SOCKET 4 -#define BIO_CONN_S_CONNECT 5 -#define BIO_CONN_S_OK 6 -#define BIO_CONN_S_BLOCKED_CONNECT 7 -#define BIO_CONN_S_NBIO 8 -/*#define BIO_CONN_get_param_hostname BIO_ctrl */ - -#define BIO_C_SET_CONNECT 100 -#define BIO_C_DO_STATE_MACHINE 101 -#define BIO_C_SET_NBIO 102 -#define BIO_C_SET_PROXY_PARAM 103 -#define BIO_C_SET_FD 104 -#define BIO_C_GET_FD 105 -#define BIO_C_SET_FILE_PTR 106 -#define BIO_C_GET_FILE_PTR 107 -#define BIO_C_SET_FILENAME 108 -#define BIO_C_SET_SSL 109 -#define BIO_C_GET_SSL 110 -#define BIO_C_SET_MD 111 -#define BIO_C_GET_MD 112 -#define BIO_C_GET_CIPHER_STATUS 113 -#define BIO_C_SET_BUF_MEM 114 -#define BIO_C_GET_BUF_MEM_PTR 115 -#define BIO_C_GET_BUFF_NUM_LINES 116 -#define BIO_C_SET_BUFF_SIZE 117 -#define BIO_C_SET_ACCEPT 118 -#define BIO_C_SSL_MODE 119 -#define BIO_C_GET_MD_CTX 120 -#define BIO_C_GET_PROXY_PARAM 121 -#define BIO_C_SET_BUFF_READ_DATA 122 /* data to read first */ -#define BIO_C_GET_CONNECT 123 -#define BIO_C_GET_ACCEPT 124 -#define BIO_C_SET_SSL_RENEGOTIATE_BYTES 125 -#define BIO_C_GET_SSL_NUM_RENEGOTIATES 126 -#define BIO_C_SET_SSL_RENEGOTIATE_TIMEOUT 127 -#define BIO_C_FILE_SEEK 128 -#define BIO_C_GET_CIPHER_CTX 129 -#define BIO_C_SET_BUF_MEM_EOF_RETURN 130/*return end of input value*/ -#define BIO_C_SET_BIND_MODE 131 -#define BIO_C_GET_BIND_MODE 132 -#define BIO_C_FILE_TELL 133 -#define BIO_C_GET_SOCKS 134 -#define BIO_C_SET_SOCKS 135 - -#define BIO_C_SET_WRITE_BUF_SIZE 136/* for BIO_s_bio */ -#define BIO_C_GET_WRITE_BUF_SIZE 137 -#define BIO_C_MAKE_BIO_PAIR 138 -#define BIO_C_DESTROY_BIO_PAIR 139 -#define BIO_C_GET_WRITE_GUARANTEE 140 -#define BIO_C_GET_READ_REQUEST 141 -#define BIO_C_SHUTDOWN_WR 142 -#define BIO_C_NREAD0 143 -#define BIO_C_NREAD 144 -#define BIO_C_NWRITE0 145 -#define BIO_C_NWRITE 146 -#define BIO_C_RESET_READ_REQUEST 147 -#define BIO_C_SET_MD_CTX 148 - -#define BIO_C_SET_PREFIX 149 -#define BIO_C_GET_PREFIX 150 -#define BIO_C_SET_SUFFIX 151 -#define BIO_C_GET_SUFFIX 152 - -#define BIO_C_SET_EX_ARG 153 -#define BIO_C_GET_EX_ARG 154 - -#define BIO_set_app_data(s,arg) BIO_set_ex_data(s,0,arg) -#define BIO_get_app_data(s) BIO_get_ex_data(s,0) - -/* BIO_s_connect() and BIO_s_socks4a_connect() */ -#define BIO_set_conn_hostname(b,name) BIO_ctrl(b,BIO_C_SET_CONNECT,0,(char *)name) -#define BIO_set_conn_port(b,port) BIO_ctrl(b,BIO_C_SET_CONNECT,1,(char *)port) -#define BIO_set_conn_ip(b,ip) BIO_ctrl(b,BIO_C_SET_CONNECT,2,(char *)ip) -#define BIO_set_conn_int_port(b,port) BIO_ctrl(b,BIO_C_SET_CONNECT,3,(char *)port) -#define BIO_get_conn_hostname(b) BIO_ptr_ctrl(b,BIO_C_GET_CONNECT,0) -#define BIO_get_conn_port(b) BIO_ptr_ctrl(b,BIO_C_GET_CONNECT,1) -#define BIO_get_conn_ip(b) BIO_ptr_ctrl(b,BIO_C_GET_CONNECT,2) -#define BIO_get_conn_int_port(b) BIO_int_ctrl(b,BIO_C_GET_CONNECT,3,0) - - -#define BIO_set_nbio(b,n) BIO_ctrl(b,BIO_C_SET_NBIO,(n),NULL) - -/* BIO_s_accept_socket() */ -#define BIO_set_accept_port(b,name) BIO_ctrl(b,BIO_C_SET_ACCEPT,0,(char *)name) -#define BIO_get_accept_port(b) BIO_ptr_ctrl(b,BIO_C_GET_ACCEPT,0) -/* #define BIO_set_nbio(b,n) BIO_ctrl(b,BIO_C_SET_NBIO,(n),NULL) */ -#define BIO_set_nbio_accept(b,n) BIO_ctrl(b,BIO_C_SET_ACCEPT,1,(n)?(void *)"a":NULL) -#define BIO_set_accept_bios(b,bio) BIO_ctrl(b,BIO_C_SET_ACCEPT,2,(char *)bio) - -#define BIO_BIND_NORMAL 0 -#define BIO_BIND_REUSEADDR_IF_UNUSED 1 -#define BIO_BIND_REUSEADDR 2 -#define BIO_set_bind_mode(b,mode) BIO_ctrl(b,BIO_C_SET_BIND_MODE,mode,NULL) -#define BIO_get_bind_mode(b,mode) BIO_ctrl(b,BIO_C_GET_BIND_MODE,0,NULL) - -#define BIO_do_connect(b) BIO_do_handshake(b) -#define BIO_do_accept(b) BIO_do_handshake(b) -#define BIO_do_handshake(b) BIO_ctrl(b,BIO_C_DO_STATE_MACHINE,0,NULL) - -/* BIO_s_proxy_client() */ -#define BIO_set_url(b,url) BIO_ctrl(b,BIO_C_SET_PROXY_PARAM,0,(char *)(url)) -#define BIO_set_proxies(b,p) BIO_ctrl(b,BIO_C_SET_PROXY_PARAM,1,(char *)(p)) -/* BIO_set_nbio(b,n) */ -#define BIO_set_filter_bio(b,s) BIO_ctrl(b,BIO_C_SET_PROXY_PARAM,2,(char *)(s)) -/* BIO *BIO_get_filter_bio(BIO *bio); */ -#define BIO_set_proxy_cb(b,cb) BIO_callback_ctrl(b,BIO_C_SET_PROXY_PARAM,3,(void *(*cb)())) -#define BIO_set_proxy_header(b,sk) BIO_ctrl(b,BIO_C_SET_PROXY_PARAM,4,(char *)sk) -#define BIO_set_no_connect_return(b,bool) BIO_int_ctrl(b,BIO_C_SET_PROXY_PARAM,5,bool) - -#define BIO_get_proxy_header(b,skp) BIO_ctrl(b,BIO_C_GET_PROXY_PARAM,0,(char *)skp) -#define BIO_get_proxies(b,pxy_p) BIO_ctrl(b,BIO_C_GET_PROXY_PARAM,1,(char *)(pxy_p)) -#define BIO_get_url(b,url) BIO_ctrl(b,BIO_C_GET_PROXY_PARAM,2,(char *)(url)) -#define BIO_get_no_connect_return(b) BIO_ctrl(b,BIO_C_GET_PROXY_PARAM,5,NULL) - -#define BIO_set_fd(b,fd,c) BIO_int_ctrl(b,BIO_C_SET_FD,c,fd) -#define BIO_get_fd(b,c) BIO_ctrl(b,BIO_C_GET_FD,0,(char *)c) - -#define BIO_set_fp(b,fp,c) BIO_ctrl(b,BIO_C_SET_FILE_PTR,c,(char *)fp) -#define BIO_get_fp(b,fpp) BIO_ctrl(b,BIO_C_GET_FILE_PTR,0,(char *)fpp) - -#define BIO_seek(b,ofs) (int)BIO_ctrl(b,BIO_C_FILE_SEEK,ofs,NULL) -#define BIO_tell(b) (int)BIO_ctrl(b,BIO_C_FILE_TELL,0,NULL) - -/* name is cast to lose const, but might be better to route through a function - so we can do it safely */ -#ifdef CONST_STRICT -/* If you are wondering why this isn't defined, its because CONST_STRICT is - * purely a compile-time kludge to allow const to be checked. - */ -int BIO_read_filename(BIO *b,const char *name); -#else -#define BIO_read_filename(b,name) BIO_ctrl(b,BIO_C_SET_FILENAME, \ - BIO_CLOSE|BIO_FP_READ,(char *)name) -#endif -#define BIO_write_filename(b,name) BIO_ctrl(b,BIO_C_SET_FILENAME, \ - BIO_CLOSE|BIO_FP_WRITE,name) -#define BIO_append_filename(b,name) BIO_ctrl(b,BIO_C_SET_FILENAME, \ - BIO_CLOSE|BIO_FP_APPEND,name) -#define BIO_rw_filename(b,name) BIO_ctrl(b,BIO_C_SET_FILENAME, \ - BIO_CLOSE|BIO_FP_READ|BIO_FP_WRITE,name) - -/* WARNING WARNING, this ups the reference count on the read bio of the - * SSL structure. This is because the ssl read BIO is now pointed to by - * the next_bio field in the bio. So when you free the BIO, make sure - * you are doing a BIO_free_all() to catch the underlying BIO. */ -#define BIO_set_ssl(b,ssl,c) BIO_ctrl(b,BIO_C_SET_SSL,c,(char *)ssl) -#define BIO_get_ssl(b,sslp) BIO_ctrl(b,BIO_C_GET_SSL,0,(char *)sslp) -#define BIO_set_ssl_mode(b,client) BIO_ctrl(b,BIO_C_SSL_MODE,client,NULL) -#define BIO_set_ssl_renegotiate_bytes(b,num) \ - BIO_ctrl(b,BIO_C_SET_SSL_RENEGOTIATE_BYTES,num,NULL); -#define BIO_get_num_renegotiates(b) \ - BIO_ctrl(b,BIO_C_GET_SSL_NUM_RENEGOTIATES,0,NULL); -#define BIO_set_ssl_renegotiate_timeout(b,seconds) \ - BIO_ctrl(b,BIO_C_SET_SSL_RENEGOTIATE_TIMEOUT,seconds,NULL); - -/* defined in evp.h */ -/* #define BIO_set_md(b,md) BIO_ctrl(b,BIO_C_SET_MD,1,(char *)md) */ - -#define BIO_get_mem_data(b,pp) BIO_ctrl(b,BIO_CTRL_INFO,0,(char *)pp) -#define BIO_set_mem_buf(b,bm,c) BIO_ctrl(b,BIO_C_SET_BUF_MEM,c,(char *)bm) -#define BIO_get_mem_ptr(b,pp) BIO_ctrl(b,BIO_C_GET_BUF_MEM_PTR,0,(char *)pp) -#define BIO_set_mem_eof_return(b,v) \ - BIO_ctrl(b,BIO_C_SET_BUF_MEM_EOF_RETURN,v,NULL) - -/* For the BIO_f_buffer() type */ -#define BIO_get_buffer_num_lines(b) BIO_ctrl(b,BIO_C_GET_BUFF_NUM_LINES,0,NULL) -#define BIO_set_buffer_size(b,size) BIO_ctrl(b,BIO_C_SET_BUFF_SIZE,size,NULL) -#define BIO_set_read_buffer_size(b,size) BIO_int_ctrl(b,BIO_C_SET_BUFF_SIZE,size,0) -#define BIO_set_write_buffer_size(b,size) BIO_int_ctrl(b,BIO_C_SET_BUFF_SIZE,size,1) -#define BIO_set_buffer_read_data(b,buf,num) BIO_ctrl(b,BIO_C_SET_BUFF_READ_DATA,num,buf) - -/* Don't use the next one unless you know what you are doing :-) */ -#define BIO_dup_state(b,ret) BIO_ctrl(b,BIO_CTRL_DUP,0,(char *)(ret)) - -#define BIO_reset(b) (int)BIO_ctrl(b,BIO_CTRL_RESET,0,NULL) -#define BIO_eof(b) (int)BIO_ctrl(b,BIO_CTRL_EOF,0,NULL) -#define BIO_set_close(b,c) (int)BIO_ctrl(b,BIO_CTRL_SET_CLOSE,(c),NULL) -#define BIO_get_close(b) (int)BIO_ctrl(b,BIO_CTRL_GET_CLOSE,0,NULL) -#define BIO_pending(b) (int)BIO_ctrl(b,BIO_CTRL_PENDING,0,NULL) -#define BIO_wpending(b) (int)BIO_ctrl(b,BIO_CTRL_WPENDING,0,NULL) -/* ...pending macros have inappropriate return type */ -size_t BIO_ctrl_pending(BIO *b); -size_t BIO_ctrl_wpending(BIO *b); -#define BIO_flush(b) (int)BIO_ctrl(b,BIO_CTRL_FLUSH,0,NULL) -#define BIO_get_info_callback(b,cbp) (int)BIO_ctrl(b,BIO_CTRL_GET_CALLBACK,0, \ - cbp) -#define BIO_set_info_callback(b,cb) (int)BIO_callback_ctrl(b,BIO_CTRL_SET_CALLBACK,cb) - -/* For the BIO_f_buffer() type */ -#define BIO_buffer_get_num_lines(b) BIO_ctrl(b,BIO_CTRL_GET,0,NULL) - -/* For BIO_s_bio() */ -#define BIO_set_write_buf_size(b,size) (int)BIO_ctrl(b,BIO_C_SET_WRITE_BUF_SIZE,size,NULL) -#define BIO_get_write_buf_size(b,size) (size_t)BIO_ctrl(b,BIO_C_GET_WRITE_BUF_SIZE,size,NULL) -#define BIO_make_bio_pair(b1,b2) (int)BIO_ctrl(b1,BIO_C_MAKE_BIO_PAIR,0,b2) -#define BIO_destroy_bio_pair(b) (int)BIO_ctrl(b,BIO_C_DESTROY_BIO_PAIR,0,NULL) -#define BIO_shutdown_wr(b) (int)BIO_ctrl(b, BIO_C_SHUTDOWN_WR, 0, NULL) -/* macros with inappropriate type -- but ...pending macros use int too: */ -#define BIO_get_write_guarantee(b) (int)BIO_ctrl(b,BIO_C_GET_WRITE_GUARANTEE,0,NULL) -#define BIO_get_read_request(b) (int)BIO_ctrl(b,BIO_C_GET_READ_REQUEST,0,NULL) -size_t BIO_ctrl_get_write_guarantee(BIO *b); -size_t BIO_ctrl_get_read_request(BIO *b); -int BIO_ctrl_reset_read_request(BIO *b); - -/* ctrl macros for dgram */ -#define BIO_ctrl_dgram_connect(b,peer) \ - (int)BIO_ctrl(b,BIO_CTRL_DGRAM_CONNECT,0, (char *)peer) -#define BIO_ctrl_set_connected(b, state, peer) \ - (int)BIO_ctrl(b, BIO_CTRL_DGRAM_SET_CONNECTED, state, (char *)peer) -#define BIO_dgram_recv_timedout(b) \ - (int)BIO_ctrl(b, BIO_CTRL_DGRAM_GET_RECV_TIMER_EXP, 0, NULL) -#define BIO_dgram_send_timedout(b) \ - (int)BIO_ctrl(b, BIO_CTRL_DGRAM_GET_SEND_TIMER_EXP, 0, NULL) -#define BIO_dgram_get_peer(b,peer) \ - (int)BIO_ctrl(b, BIO_CTRL_DGRAM_GET_PEER, 0, (char *)peer) -#define BIO_dgram_set_peer(b,peer) \ - (int)BIO_ctrl(b, BIO_CTRL_DGRAM_SET_PEER, 0, (char *)peer) - -/* These two aren't currently implemented */ -/* int BIO_get_ex_num(BIO *bio); */ -/* void BIO_set_ex_free_func(BIO *bio,int idx,void (*cb)()); */ -int BIO_set_ex_data(BIO *bio,int idx,void *data); -void *BIO_get_ex_data(BIO *bio,int idx); -int BIO_get_ex_new_index(long argl, void *argp, CRYPTO_EX_new *new_func, - CRYPTO_EX_dup *dup_func, CRYPTO_EX_free *free_func); -unsigned long BIO_number_read(BIO *bio); -unsigned long BIO_number_written(BIO *bio); - -/* For BIO_f_asn1() */ -int BIO_asn1_set_prefix(BIO *b, asn1_ps_func *prefix, - asn1_ps_func *prefix_free); -int BIO_asn1_get_prefix(BIO *b, asn1_ps_func **pprefix, - asn1_ps_func **pprefix_free); -int BIO_asn1_set_suffix(BIO *b, asn1_ps_func *suffix, - asn1_ps_func *suffix_free); -int BIO_asn1_get_suffix(BIO *b, asn1_ps_func **psuffix, - asn1_ps_func **psuffix_free); - -# ifndef OPENSSL_NO_FP_API -BIO_METHOD *BIO_s_file(void ); -BIO *BIO_new_file(const char *filename, const char *mode); -BIO *BIO_new_fp(FILE *stream, int close_flag); -# define BIO_s_file_internal BIO_s_file -# endif -BIO * BIO_new(BIO_METHOD *type); -int BIO_set(BIO *a,BIO_METHOD *type); -int BIO_free(BIO *a); -void BIO_vfree(BIO *a); -int BIO_read(BIO *b, void *data, int len); -int BIO_gets(BIO *bp,char *buf, int size); -int BIO_write(BIO *b, const void *data, int len); -int BIO_puts(BIO *bp,const char *buf); -int BIO_indent(BIO *b,int indent,int max); -long BIO_ctrl(BIO *bp,int cmd,long larg,void *parg); -long BIO_callback_ctrl(BIO *b, int cmd, void (*fp)(struct bio_st *, int, const char *, int, long, long)); -char * BIO_ptr_ctrl(BIO *bp,int cmd,long larg); -long BIO_int_ctrl(BIO *bp,int cmd,long larg,int iarg); -BIO * BIO_push(BIO *b,BIO *append); -BIO * BIO_pop(BIO *b); -void BIO_free_all(BIO *a); -BIO * BIO_find_type(BIO *b,int bio_type); -BIO * BIO_next(BIO *b); -BIO * BIO_get_retry_BIO(BIO *bio, int *reason); -int BIO_get_retry_reason(BIO *bio); -BIO * BIO_dup_chain(BIO *in); - -int BIO_nread0(BIO *bio, char **buf); -int BIO_nread(BIO *bio, char **buf, int num); -int BIO_nwrite0(BIO *bio, char **buf); -int BIO_nwrite(BIO *bio, char **buf, int num); - -long BIO_debug_callback(BIO *bio,int cmd,const char *argp,int argi, - long argl,long ret); - -BIO_METHOD *BIO_s_mem(void); -BIO *BIO_new_mem_buf(void *buf, int len); -BIO_METHOD *BIO_s_socket(void); -BIO_METHOD *BIO_s_connect(void); -BIO_METHOD *BIO_s_accept(void); -BIO_METHOD *BIO_s_fd(void); -#ifndef OPENSSL_SYS_OS2 -BIO_METHOD *BIO_s_log(void); -#endif -BIO_METHOD *BIO_s_bio(void); -BIO_METHOD *BIO_s_null(void); -BIO_METHOD *BIO_f_null(void); -BIO_METHOD *BIO_f_buffer(void); -#ifdef OPENSSL_SYS_VMS -BIO_METHOD *BIO_f_linebuffer(void); -#endif -BIO_METHOD *BIO_f_nbio_test(void); -#ifndef OPENSSL_NO_DGRAM -BIO_METHOD *BIO_s_datagram(void); -#ifndef OPENSSL_NO_SCTP -BIO_METHOD *BIO_s_datagram_sctp(void); -#endif -#endif - -/* BIO_METHOD *BIO_f_ber(void); */ - -int BIO_sock_should_retry(int i); -int BIO_sock_non_fatal_error(int error); -int BIO_dgram_non_fatal_error(int error); - -int BIO_fd_should_retry(int i); -int BIO_fd_non_fatal_error(int error); -int BIO_dump_cb(int (*cb)(const void *data, size_t len, void *u), - void *u, const char *s, int len); -int BIO_dump_indent_cb(int (*cb)(const void *data, size_t len, void *u), - void *u, const char *s, int len, int indent); -int BIO_dump(BIO *b,const char *bytes,int len); -int BIO_dump_indent(BIO *b,const char *bytes,int len,int indent); -#ifndef OPENSSL_NO_FP_API -int BIO_dump_fp(FILE *fp, const char *s, int len); -int BIO_dump_indent_fp(FILE *fp, const char *s, int len, int indent); -#endif -struct hostent *BIO_gethostbyname(const char *name); -/* We might want a thread-safe interface too: - * struct hostent *BIO_gethostbyname_r(const char *name, - * struct hostent *result, void *buffer, size_t buflen); - * or something similar (caller allocates a struct hostent, - * pointed to by "result", and additional buffer space for the various - * substructures; if the buffer does not suffice, NULL is returned - * and an appropriate error code is set). - */ -int BIO_sock_error(int sock); -int BIO_socket_ioctl(int fd, long type, void *arg); -int BIO_socket_nbio(int fd,int mode); -int BIO_get_port(const char *str, unsigned short *port_ptr); -int BIO_get_host_ip(const char *str, unsigned char *ip); -int BIO_get_accept_socket(char *host_port,int mode); -int BIO_accept(int sock,char **ip_port); -int BIO_sock_init(void ); -void BIO_sock_cleanup(void); -int BIO_set_tcp_ndelay(int sock,int turn_on); - -BIO *BIO_new_socket(int sock, int close_flag); -BIO *BIO_new_dgram(int fd, int close_flag); -#ifndef OPENSSL_NO_SCTP -BIO *BIO_new_dgram_sctp(int fd, int close_flag); -int BIO_dgram_is_sctp(BIO *bio); -int BIO_dgram_sctp_notification_cb(BIO *b, - void (*handle_notifications)(BIO *bio, void *context, void *buf), - void *context); -int BIO_dgram_sctp_wait_for_dry(BIO *b); -int BIO_dgram_sctp_msg_waiting(BIO *b); -#endif -BIO *BIO_new_fd(int fd, int close_flag); -BIO *BIO_new_connect(char *host_port); -BIO *BIO_new_accept(char *host_port); - -int BIO_new_bio_pair(BIO **bio1, size_t writebuf1, - BIO **bio2, size_t writebuf2); -/* If successful, returns 1 and in *bio1, *bio2 two BIO pair endpoints. - * Otherwise returns 0 and sets *bio1 and *bio2 to NULL. - * Size 0 uses default value. - */ - -void BIO_copy_next_retry(BIO *b); - -/*long BIO_ghbn_ctrl(int cmd,int iarg,char *parg);*/ - -#ifdef __GNUC__ -# define __bio_h__attr__ __attribute__ -#else -# define __bio_h__attr__(x) -#endif -int BIO_printf(BIO *bio, const char *format, ...) - __bio_h__attr__((__format__(__printf__,2,3))); -int BIO_vprintf(BIO *bio, const char *format, va_list args) - __bio_h__attr__((__format__(__printf__,2,0))); -int BIO_snprintf(char *buf, size_t n, const char *format, ...) - __bio_h__attr__((__format__(__printf__,3,4))); -int BIO_vsnprintf(char *buf, size_t n, const char *format, va_list args) - __bio_h__attr__((__format__(__printf__,3,0))); -#undef __bio_h__attr__ - -/* BEGIN ERROR CODES */ -/* The following lines are auto generated by the script mkerr.pl. Any changes - * made after this point may be overwritten when the script is next run. - */ -void ERR_load_BIO_strings(void); - -/* Error codes for the BIO functions. */ - -/* Function codes. */ -#define BIO_F_ACPT_STATE 100 -#define BIO_F_BIO_ACCEPT 101 -#define BIO_F_BIO_BER_GET_HEADER 102 -#define BIO_F_BIO_CALLBACK_CTRL 131 -#define BIO_F_BIO_CTRL 103 -#define BIO_F_BIO_GETHOSTBYNAME 120 -#define BIO_F_BIO_GETS 104 -#define BIO_F_BIO_GET_ACCEPT_SOCKET 105 -#define BIO_F_BIO_GET_HOST_IP 106 -#define BIO_F_BIO_GET_PORT 107 -#define BIO_F_BIO_MAKE_PAIR 121 -#define BIO_F_BIO_NEW 108 -#define BIO_F_BIO_NEW_FILE 109 -#define BIO_F_BIO_NEW_MEM_BUF 126 -#define BIO_F_BIO_NREAD 123 -#define BIO_F_BIO_NREAD0 124 -#define BIO_F_BIO_NWRITE 125 -#define BIO_F_BIO_NWRITE0 122 -#define BIO_F_BIO_PUTS 110 -#define BIO_F_BIO_READ 111 -#define BIO_F_BIO_SOCK_INIT 112 -#define BIO_F_BIO_WRITE 113 -#define BIO_F_BUFFER_CTRL 114 -#define BIO_F_CONN_CTRL 127 -#define BIO_F_CONN_STATE 115 -#define BIO_F_DGRAM_SCTP_READ 132 -#define BIO_F_FILE_CTRL 116 -#define BIO_F_FILE_READ 130 -#define BIO_F_LINEBUFFER_CTRL 129 -#define BIO_F_MEM_READ 128 -#define BIO_F_MEM_WRITE 117 -#define BIO_F_SSL_NEW 118 -#define BIO_F_WSASTARTUP 119 - -/* Reason codes. */ -#define BIO_R_ACCEPT_ERROR 100 -#define BIO_R_BAD_FOPEN_MODE 101 -#define BIO_R_BAD_HOSTNAME_LOOKUP 102 -#define BIO_R_BROKEN_PIPE 124 -#define BIO_R_CONNECT_ERROR 103 -#define BIO_R_EOF_ON_MEMORY_BIO 127 -#define BIO_R_ERROR_SETTING_NBIO 104 -#define BIO_R_ERROR_SETTING_NBIO_ON_ACCEPTED_SOCKET 105 -#define BIO_R_ERROR_SETTING_NBIO_ON_ACCEPT_SOCKET 106 -#define BIO_R_GETHOSTBYNAME_ADDR_IS_NOT_AF_INET 107 -#define BIO_R_INVALID_ARGUMENT 125 -#define BIO_R_INVALID_IP_ADDRESS 108 -#define BIO_R_IN_USE 123 -#define BIO_R_KEEPALIVE 109 -#define BIO_R_NBIO_CONNECT_ERROR 110 -#define BIO_R_NO_ACCEPT_PORT_SPECIFIED 111 -#define BIO_R_NO_HOSTNAME_SPECIFIED 112 -#define BIO_R_NO_PORT_DEFINED 113 -#define BIO_R_NO_PORT_SPECIFIED 114 -#define BIO_R_NO_SUCH_FILE 128 -#define BIO_R_NULL_PARAMETER 115 -#define BIO_R_TAG_MISMATCH 116 -#define BIO_R_UNABLE_TO_BIND_SOCKET 117 -#define BIO_R_UNABLE_TO_CREATE_SOCKET 118 -#define BIO_R_UNABLE_TO_LISTEN_SOCKET 119 -#define BIO_R_UNINITIALIZED 120 -#define BIO_R_UNSUPPORTED_METHOD 121 -#define BIO_R_WRITE_TO_READ_ONLY_BIO 126 -#define BIO_R_WSASTARTUP 122 - -#ifdef __cplusplus -} -#endif -#endif diff --git a/Pods/OpenSSL-Universal/include-osx/openssl/blowfish.h b/Pods/OpenSSL-Universal/include-osx/openssl/blowfish.h deleted file mode 100644 index 4b6c8920..00000000 --- a/Pods/OpenSSL-Universal/include-osx/openssl/blowfish.h +++ /dev/null @@ -1,129 +0,0 @@ -/* crypto/bf/blowfish.h */ -/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) - * All rights reserved. - * - * This package is an SSL implementation written - * by Eric Young (eay@cryptsoft.com). - * The implementation was written so as to conform with Netscapes SSL. - * - * This library is free for commercial and non-commercial use as long as - * the following conditions are aheared to. The following conditions - * apply to all code found in this distribution, be it the RC4, RSA, - * lhash, DES, etc., code; not just the SSL code. The SSL documentation - * included with this distribution is covered by the same copyright terms - * except that the holder is Tim Hudson (tjh@cryptsoft.com). - * - * Copyright remains Eric Young's, and as such any Copyright notices in - * the code are not to be removed. - * If this package is used in a product, Eric Young should be given attribution - * as the author of the parts of the library used. - * This can be in the form of a textual message at program startup or - * in documentation (online or textual) provided with the package. - * - * Redistribution and use in source and binary forms, with or without - * modification, are permitted provided that the following conditions - * are met: - * 1. Redistributions of source code must retain the copyright - * notice, this list of conditions and the following disclaimer. - * 2. Redistributions in binary form must reproduce the above copyright - * notice, this list of conditions and the following disclaimer in the - * documentation and/or other materials provided with the distribution. - * 3. All advertising materials mentioning features or use of this software - * must display the following acknowledgement: - * "This product includes cryptographic software written by - * Eric Young (eay@cryptsoft.com)" - * The word 'cryptographic' can be left out if the rouines from the library - * being used are not cryptographic related :-). - * 4. If you include any Windows specific code (or a derivative thereof) from - * the apps directory (application code) you must include an acknowledgement: - * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" - * - * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND - * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE - * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE - * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE - * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL - * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS - * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) - * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT - * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY - * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF - * SUCH DAMAGE. - * - * The licence and distribution terms for any publically available version or - * derivative of this code cannot be changed. i.e. this code cannot simply be - * copied and put under another distribution licence - * [including the GNU Public Licence.] - */ - -#ifndef HEADER_BLOWFISH_H -#define HEADER_BLOWFISH_H - -#include - -#ifdef __cplusplus -extern "C" { -#endif - -#ifdef OPENSSL_NO_BF -#error BF is disabled. -#endif - -#define BF_ENCRYPT 1 -#define BF_DECRYPT 0 - -/* - * !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! - * ! BF_LONG has to be at least 32 bits wide. If it's wider, then ! - * ! BF_LONG_LOG2 has to be defined along. ! - * !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! - */ - -#if defined(__LP32__) -#define BF_LONG unsigned long -#elif defined(OPENSSL_SYS_CRAY) || defined(__ILP64__) -#define BF_LONG unsigned long -#define BF_LONG_LOG2 3 -/* - * _CRAY note. I could declare short, but I have no idea what impact - * does it have on performance on none-T3E machines. I could declare - * int, but at least on C90 sizeof(int) can be chosen at compile time. - * So I've chosen long... - * - */ -#else -#define BF_LONG unsigned int -#endif - -#define BF_ROUNDS 16 -#define BF_BLOCK 8 - -typedef struct bf_key_st - { - BF_LONG P[BF_ROUNDS+2]; - BF_LONG S[4*256]; - } BF_KEY; - -#ifdef OPENSSL_FIPS -void private_BF_set_key(BF_KEY *key, int len, const unsigned char *data); -#endif -void BF_set_key(BF_KEY *key, int len, const unsigned char *data); - -void BF_encrypt(BF_LONG *data,const BF_KEY *key); -void BF_decrypt(BF_LONG *data,const BF_KEY *key); - -void BF_ecb_encrypt(const unsigned char *in, unsigned char *out, - const BF_KEY *key, int enc); -void BF_cbc_encrypt(const unsigned char *in, unsigned char *out, long length, - const BF_KEY *schedule, unsigned char *ivec, int enc); -void BF_cfb64_encrypt(const unsigned char *in, unsigned char *out, long length, - const BF_KEY *schedule, unsigned char *ivec, int *num, int enc); -void BF_ofb64_encrypt(const unsigned char *in, unsigned char *out, long length, - const BF_KEY *schedule, unsigned char *ivec, int *num); -const char *BF_options(void); - -#ifdef __cplusplus -} -#endif - -#endif diff --git a/Pods/OpenSSL-Universal/include-osx/openssl/bn.h b/Pods/OpenSSL-Universal/include-osx/openssl/bn.h deleted file mode 100644 index 21a1a3fe..00000000 --- a/Pods/OpenSSL-Universal/include-osx/openssl/bn.h +++ /dev/null @@ -1,902 +0,0 @@ -/* crypto/bn/bn.h */ -/* Copyright (C) 1995-1997 Eric Young (eay@cryptsoft.com) - * All rights reserved. - * - * This package is an SSL implementation written - * by Eric Young (eay@cryptsoft.com). - * The implementation was written so as to conform with Netscapes SSL. - * - * This library is free for commercial and non-commercial use as long as - * the following conditions are aheared to. The following conditions - * apply to all code found in this distribution, be it the RC4, RSA, - * lhash, DES, etc., code; not just the SSL code. The SSL documentation - * included with this distribution is covered by the same copyright terms - * except that the holder is Tim Hudson (tjh@cryptsoft.com). - * - * Copyright remains Eric Young's, and as such any Copyright notices in - * the code are not to be removed. - * If this package is used in a product, Eric Young should be given attribution - * as the author of the parts of the library used. - * This can be in the form of a textual message at program startup or - * in documentation (online or textual) provided with the package. - * - * Redistribution and use in source and binary forms, with or without - * modification, are permitted provided that the following conditions - * are met: - * 1. Redistributions of source code must retain the copyright - * notice, this list of conditions and the following disclaimer. - * 2. Redistributions in binary form must reproduce the above copyright - * notice, this list of conditions and the following disclaimer in the - * documentation and/or other materials provided with the distribution. - * 3. All advertising materials mentioning features or use of this software - * must display the following acknowledgement: - * "This product includes cryptographic software written by - * Eric Young (eay@cryptsoft.com)" - * The word 'cryptographic' can be left out if the rouines from the library - * being used are not cryptographic related :-). - * 4. If you include any Windows specific code (or a derivative thereof) from - * the apps directory (application code) you must include an acknowledgement: - * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" - * - * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND - * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE - * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE - * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE - * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL - * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS - * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) - * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT - * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY - * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF - * SUCH DAMAGE. - * - * The licence and distribution terms for any publically available version or - * derivative of this code cannot be changed. i.e. this code cannot simply be - * copied and put under another distribution licence - * [including the GNU Public Licence.] - */ -/* ==================================================================== - * Copyright (c) 1998-2006 The OpenSSL Project. All rights reserved. - * - * Redistribution and use in source and binary forms, with or without - * modification, are permitted provided that the following conditions - * are met: - * - * 1. Redistributions of source code must retain the above copyright - * notice, this list of conditions and the following disclaimer. - * - * 2. Redistributions in binary form must reproduce the above copyright - * notice, this list of conditions and the following disclaimer in - * the documentation and/or other materials provided with the - * distribution. - * - * 3. All advertising materials mentioning features or use of this - * software must display the following acknowledgment: - * "This product includes software developed by the OpenSSL Project - * for use in the OpenSSL Toolkit. (http://www.openssl.org/)" - * - * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to - * endorse or promote products derived from this software without - * prior written permission. For written permission, please contact - * openssl-core@openssl.org. - * - * 5. Products derived from this software may not be called "OpenSSL" - * nor may "OpenSSL" appear in their names without prior written - * permission of the OpenSSL Project. - * - * 6. Redistributions of any form whatsoever must retain the following - * acknowledgment: - * "This product includes software developed by the OpenSSL Project - * for use in the OpenSSL Toolkit (http://www.openssl.org/)" - * - * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY - * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE - * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR - * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR - * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, - * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT - * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; - * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) - * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, - * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) - * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED - * OF THE POSSIBILITY OF SUCH DAMAGE. - * ==================================================================== - * - * This product includes cryptographic software written by Eric Young - * (eay@cryptsoft.com). This product includes software written by Tim - * Hudson (tjh@cryptsoft.com). - * - */ -/* ==================================================================== - * Copyright 2002 Sun Microsystems, Inc. ALL RIGHTS RESERVED. - * - * Portions of the attached software ("Contribution") are developed by - * SUN MICROSYSTEMS, INC., and are contributed to the OpenSSL project. - * - * The Contribution is licensed pursuant to the Eric Young open source - * license provided above. - * - * The binary polynomial arithmetic software is originally written by - * Sheueling Chang Shantz and Douglas Stebila of Sun Microsystems Laboratories. - * - */ - -#ifndef HEADER_BN_H -#define HEADER_BN_H - -#include -#ifndef OPENSSL_NO_FP_API -#include /* FILE */ -#endif -#include -#include - -#ifdef __cplusplus -extern "C" { -#endif - -/* These preprocessor symbols control various aspects of the bignum headers and - * library code. They're not defined by any "normal" configuration, as they are - * intended for development and testing purposes. NB: defining all three can be - * useful for debugging application code as well as openssl itself. - * - * BN_DEBUG - turn on various debugging alterations to the bignum code - * BN_DEBUG_RAND - uses random poisoning of unused words to trip up - * mismanagement of bignum internals. You must also define BN_DEBUG. - */ -/* #define BN_DEBUG */ -/* #define BN_DEBUG_RAND */ - -#ifndef OPENSSL_SMALL_FOOTPRINT -#define BN_MUL_COMBA -#define BN_SQR_COMBA -#define BN_RECURSION -#endif - -/* This next option uses the C libraries (2 word)/(1 word) function. - * If it is not defined, I use my C version (which is slower). - * The reason for this flag is that when the particular C compiler - * library routine is used, and the library is linked with a different - * compiler, the library is missing. This mostly happens when the - * library is built with gcc and then linked using normal cc. This would - * be a common occurrence because gcc normally produces code that is - * 2 times faster than system compilers for the big number stuff. - * For machines with only one compiler (or shared libraries), this should - * be on. Again this in only really a problem on machines - * using "long long's", are 32bit, and are not using my assembler code. */ -#if defined(OPENSSL_SYS_MSDOS) || defined(OPENSSL_SYS_WINDOWS) || \ - defined(OPENSSL_SYS_WIN32) || defined(linux) -# ifndef BN_DIV2W -# define BN_DIV2W -# endif -#endif - -/* assuming long is 64bit - this is the DEC Alpha - * unsigned long long is only 64 bits :-(, don't define - * BN_LLONG for the DEC Alpha */ -#ifdef SIXTY_FOUR_BIT_LONG -#define BN_ULLONG unsigned long long -#define BN_ULONG unsigned long -#define BN_LONG long -#define BN_BITS 128 -#define BN_BYTES 8 -#define BN_BITS2 64 -#define BN_BITS4 32 -#define BN_MASK (0xffffffffffffffffffffffffffffffffLL) -#define BN_MASK2 (0xffffffffffffffffL) -#define BN_MASK2l (0xffffffffL) -#define BN_MASK2h (0xffffffff00000000L) -#define BN_MASK2h1 (0xffffffff80000000L) -#define BN_TBIT (0x8000000000000000L) -#define BN_DEC_CONV (10000000000000000000UL) -#define BN_DEC_FMT1 "%lu" -#define BN_DEC_FMT2 "%019lu" -#define BN_DEC_NUM 19 -#define BN_HEX_FMT1 "%lX" -#define BN_HEX_FMT2 "%016lX" -#endif - -/* This is where the long long data type is 64 bits, but long is 32. - * For machines where there are 64bit registers, this is the mode to use. - * IRIX, on R4000 and above should use this mode, along with the relevant - * assembler code :-). Do NOT define BN_LLONG. - */ -#ifdef SIXTY_FOUR_BIT -#undef BN_LLONG -#undef BN_ULLONG -#define BN_ULONG unsigned long long -#define BN_LONG long long -#define BN_BITS 128 -#define BN_BYTES 8 -#define BN_BITS2 64 -#define BN_BITS4 32 -#define BN_MASK2 (0xffffffffffffffffLL) -#define BN_MASK2l (0xffffffffL) -#define BN_MASK2h (0xffffffff00000000LL) -#define BN_MASK2h1 (0xffffffff80000000LL) -#define BN_TBIT (0x8000000000000000LL) -#define BN_DEC_CONV (10000000000000000000ULL) -#define BN_DEC_FMT1 "%llu" -#define BN_DEC_FMT2 "%019llu" -#define BN_DEC_NUM 19 -#define BN_HEX_FMT1 "%llX" -#define BN_HEX_FMT2 "%016llX" -#endif - -#ifdef THIRTY_TWO_BIT -#ifdef BN_LLONG -# if defined(_WIN32) && !defined(__GNUC__) -# define BN_ULLONG unsigned __int64 -# define BN_MASK (0xffffffffffffffffI64) -# else -# define BN_ULLONG unsigned long long -# define BN_MASK (0xffffffffffffffffLL) -# endif -#endif -#define BN_ULONG unsigned int -#define BN_LONG int -#define BN_BITS 64 -#define BN_BYTES 4 -#define BN_BITS2 32 -#define BN_BITS4 16 -#define BN_MASK2 (0xffffffffL) -#define BN_MASK2l (0xffff) -#define BN_MASK2h1 (0xffff8000L) -#define BN_MASK2h (0xffff0000L) -#define BN_TBIT (0x80000000L) -#define BN_DEC_CONV (1000000000L) -#define BN_DEC_FMT1 "%u" -#define BN_DEC_FMT2 "%09u" -#define BN_DEC_NUM 9 -#define BN_HEX_FMT1 "%X" -#define BN_HEX_FMT2 "%08X" -#endif - -/* 2011-02-22 SMS. - * In various places, a size_t variable or a type cast to size_t was - * used to perform integer-only operations on pointers. This failed on - * VMS with 64-bit pointers (CC /POINTER_SIZE = 64) because size_t is - * still only 32 bits. What's needed in these cases is an integer type - * with the same size as a pointer, which size_t is not certain to be. - * The only fix here is VMS-specific. - */ -#if defined(OPENSSL_SYS_VMS) -# if __INITIAL_POINTER_SIZE == 64 -# define PTR_SIZE_INT long long -# else /* __INITIAL_POINTER_SIZE == 64 */ -# define PTR_SIZE_INT int -# endif /* __INITIAL_POINTER_SIZE == 64 [else] */ -#else /* defined(OPENSSL_SYS_VMS) */ -# define PTR_SIZE_INT size_t -#endif /* defined(OPENSSL_SYS_VMS) [else] */ - -#define BN_DEFAULT_BITS 1280 - -#define BN_FLG_MALLOCED 0x01 -#define BN_FLG_STATIC_DATA 0x02 -#define BN_FLG_CONSTTIME 0x04 /* avoid leaking exponent information through timing, - * BN_mod_exp_mont() will call BN_mod_exp_mont_consttime, - * BN_div() will call BN_div_no_branch, - * BN_mod_inverse() will call BN_mod_inverse_no_branch. - */ - -#ifndef OPENSSL_NO_DEPRECATED -#define BN_FLG_EXP_CONSTTIME BN_FLG_CONSTTIME /* deprecated name for the flag */ - /* avoid leaking exponent information through timings - * (BN_mod_exp_mont() will call BN_mod_exp_mont_consttime) */ -#endif - -#ifndef OPENSSL_NO_DEPRECATED -#define BN_FLG_FREE 0x8000 /* used for debuging */ -#endif -#define BN_set_flags(b,n) ((b)->flags|=(n)) -#define BN_get_flags(b,n) ((b)->flags&(n)) - -/* get a clone of a BIGNUM with changed flags, for *temporary* use only - * (the two BIGNUMs cannot not be used in parallel!) */ -#define BN_with_flags(dest,b,n) ((dest)->d=(b)->d, \ - (dest)->top=(b)->top, \ - (dest)->dmax=(b)->dmax, \ - (dest)->neg=(b)->neg, \ - (dest)->flags=(((dest)->flags & BN_FLG_MALLOCED) \ - | ((b)->flags & ~BN_FLG_MALLOCED) \ - | BN_FLG_STATIC_DATA \ - | (n))) - -/* Already declared in ossl_typ.h */ -#if 0 -typedef struct bignum_st BIGNUM; -/* Used for temp variables (declaration hidden in bn_lcl.h) */ -typedef struct bignum_ctx BN_CTX; -typedef struct bn_blinding_st BN_BLINDING; -typedef struct bn_mont_ctx_st BN_MONT_CTX; -typedef struct bn_recp_ctx_st BN_RECP_CTX; -typedef struct bn_gencb_st BN_GENCB; -#endif - -struct bignum_st - { - BN_ULONG *d; /* Pointer to an array of 'BN_BITS2' bit chunks. */ - int top; /* Index of last used d +1. */ - /* The next are internal book keeping for bn_expand. */ - int dmax; /* Size of the d array. */ - int neg; /* one if the number is negative */ - int flags; - }; - -/* Used for montgomery multiplication */ -struct bn_mont_ctx_st - { - int ri; /* number of bits in R */ - BIGNUM RR; /* used to convert to montgomery form */ - BIGNUM N; /* The modulus */ - BIGNUM Ni; /* R*(1/R mod N) - N*Ni = 1 - * (Ni is only stored for bignum algorithm) */ - BN_ULONG n0[2];/* least significant word(s) of Ni; - (type changed with 0.9.9, was "BN_ULONG n0;" before) */ - int flags; - }; - -/* Used for reciprocal division/mod functions - * It cannot be shared between threads - */ -struct bn_recp_ctx_st - { - BIGNUM N; /* the divisor */ - BIGNUM Nr; /* the reciprocal */ - int num_bits; - int shift; - int flags; - }; - -/* Used for slow "generation" functions. */ -struct bn_gencb_st - { - unsigned int ver; /* To handle binary (in)compatibility */ - void *arg; /* callback-specific data */ - union - { - /* if(ver==1) - handles old style callbacks */ - void (*cb_1)(int, int, void *); - /* if(ver==2) - new callback style */ - int (*cb_2)(int, int, BN_GENCB *); - } cb; - }; -/* Wrapper function to make using BN_GENCB easier, */ -int BN_GENCB_call(BN_GENCB *cb, int a, int b); -/* Macro to populate a BN_GENCB structure with an "old"-style callback */ -#define BN_GENCB_set_old(gencb, callback, cb_arg) { \ - BN_GENCB *tmp_gencb = (gencb); \ - tmp_gencb->ver = 1; \ - tmp_gencb->arg = (cb_arg); \ - tmp_gencb->cb.cb_1 = (callback); } -/* Macro to populate a BN_GENCB structure with a "new"-style callback */ -#define BN_GENCB_set(gencb, callback, cb_arg) { \ - BN_GENCB *tmp_gencb = (gencb); \ - tmp_gencb->ver = 2; \ - tmp_gencb->arg = (cb_arg); \ - tmp_gencb->cb.cb_2 = (callback); } - -#define BN_prime_checks 0 /* default: select number of iterations - based on the size of the number */ - -/* number of Miller-Rabin iterations for an error rate of less than 2^-80 - * for random 'b'-bit input, b >= 100 (taken from table 4.4 in the Handbook - * of Applied Cryptography [Menezes, van Oorschot, Vanstone; CRC Press 1996]; - * original paper: Damgaard, Landrock, Pomerance: Average case error estimates - * for the strong probable prime test. -- Math. Comp. 61 (1993) 177-194) */ -#define BN_prime_checks_for_size(b) ((b) >= 1300 ? 2 : \ - (b) >= 850 ? 3 : \ - (b) >= 650 ? 4 : \ - (b) >= 550 ? 5 : \ - (b) >= 450 ? 6 : \ - (b) >= 400 ? 7 : \ - (b) >= 350 ? 8 : \ - (b) >= 300 ? 9 : \ - (b) >= 250 ? 12 : \ - (b) >= 200 ? 15 : \ - (b) >= 150 ? 18 : \ - /* b >= 100 */ 27) - -#define BN_num_bytes(a) ((BN_num_bits(a)+7)/8) - -/* Note that BN_abs_is_word didn't work reliably for w == 0 until 0.9.8 */ -#define BN_abs_is_word(a,w) ((((a)->top == 1) && ((a)->d[0] == (BN_ULONG)(w))) || \ - (((w) == 0) && ((a)->top == 0))) -#define BN_is_zero(a) ((a)->top == 0) -#define BN_is_one(a) (BN_abs_is_word((a),1) && !(a)->neg) -#define BN_is_word(a,w) (BN_abs_is_word((a),(w)) && (!(w) || !(a)->neg)) -#define BN_is_odd(a) (((a)->top > 0) && ((a)->d[0] & 1)) - -#define BN_one(a) (BN_set_word((a),1)) -#define BN_zero_ex(a) \ - do { \ - BIGNUM *_tmp_bn = (a); \ - _tmp_bn->top = 0; \ - _tmp_bn->neg = 0; \ - } while(0) -#ifdef OPENSSL_NO_DEPRECATED -#define BN_zero(a) BN_zero_ex(a) -#else -#define BN_zero(a) (BN_set_word((a),0)) -#endif - -const BIGNUM *BN_value_one(void); -char * BN_options(void); -BN_CTX *BN_CTX_new(void); -#ifndef OPENSSL_NO_DEPRECATED -void BN_CTX_init(BN_CTX *c); -#endif -void BN_CTX_free(BN_CTX *c); -void BN_CTX_start(BN_CTX *ctx); -BIGNUM *BN_CTX_get(BN_CTX *ctx); -void BN_CTX_end(BN_CTX *ctx); -int BN_rand(BIGNUM *rnd, int bits, int top,int bottom); -int BN_pseudo_rand(BIGNUM *rnd, int bits, int top,int bottom); -int BN_rand_range(BIGNUM *rnd, const BIGNUM *range); -int BN_pseudo_rand_range(BIGNUM *rnd, const BIGNUM *range); -int BN_num_bits(const BIGNUM *a); -int BN_num_bits_word(BN_ULONG); -BIGNUM *BN_new(void); -void BN_init(BIGNUM *); -void BN_clear_free(BIGNUM *a); -BIGNUM *BN_copy(BIGNUM *a, const BIGNUM *b); -void BN_swap(BIGNUM *a, BIGNUM *b); -BIGNUM *BN_bin2bn(const unsigned char *s,int len,BIGNUM *ret); -int BN_bn2bin(const BIGNUM *a, unsigned char *to); -BIGNUM *BN_mpi2bn(const unsigned char *s,int len,BIGNUM *ret); -int BN_bn2mpi(const BIGNUM *a, unsigned char *to); -int BN_sub(BIGNUM *r, const BIGNUM *a, const BIGNUM *b); -int BN_usub(BIGNUM *r, const BIGNUM *a, const BIGNUM *b); -int BN_uadd(BIGNUM *r, const BIGNUM *a, const BIGNUM *b); -int BN_add(BIGNUM *r, const BIGNUM *a, const BIGNUM *b); -int BN_mul(BIGNUM *r, const BIGNUM *a, const BIGNUM *b, BN_CTX *ctx); -int BN_sqr(BIGNUM *r, const BIGNUM *a,BN_CTX *ctx); -/** BN_set_negative sets sign of a BIGNUM - * \param b pointer to the BIGNUM object - * \param n 0 if the BIGNUM b should be positive and a value != 0 otherwise - */ -void BN_set_negative(BIGNUM *b, int n); -/** BN_is_negative returns 1 if the BIGNUM is negative - * \param a pointer to the BIGNUM object - * \return 1 if a < 0 and 0 otherwise - */ -#define BN_is_negative(a) ((a)->neg != 0) - -int BN_div(BIGNUM *dv, BIGNUM *rem, const BIGNUM *m, const BIGNUM *d, - BN_CTX *ctx); -#define BN_mod(rem,m,d,ctx) BN_div(NULL,(rem),(m),(d),(ctx)) -int BN_nnmod(BIGNUM *r, const BIGNUM *m, const BIGNUM *d, BN_CTX *ctx); -int BN_mod_add(BIGNUM *r, const BIGNUM *a, const BIGNUM *b, const BIGNUM *m, BN_CTX *ctx); -int BN_mod_add_quick(BIGNUM *r, const BIGNUM *a, const BIGNUM *b, const BIGNUM *m); -int BN_mod_sub(BIGNUM *r, const BIGNUM *a, const BIGNUM *b, const BIGNUM *m, BN_CTX *ctx); -int BN_mod_sub_quick(BIGNUM *r, const BIGNUM *a, const BIGNUM *b, const BIGNUM *m); -int BN_mod_mul(BIGNUM *r, const BIGNUM *a, const BIGNUM *b, - const BIGNUM *m, BN_CTX *ctx); -int BN_mod_sqr(BIGNUM *r, const BIGNUM *a, const BIGNUM *m, BN_CTX *ctx); -int BN_mod_lshift1(BIGNUM *r, const BIGNUM *a, const BIGNUM *m, BN_CTX *ctx); -int BN_mod_lshift1_quick(BIGNUM *r, const BIGNUM *a, const BIGNUM *m); -int BN_mod_lshift(BIGNUM *r, const BIGNUM *a, int n, const BIGNUM *m, BN_CTX *ctx); -int BN_mod_lshift_quick(BIGNUM *r, const BIGNUM *a, int n, const BIGNUM *m); - -BN_ULONG BN_mod_word(const BIGNUM *a, BN_ULONG w); -BN_ULONG BN_div_word(BIGNUM *a, BN_ULONG w); -int BN_mul_word(BIGNUM *a, BN_ULONG w); -int BN_add_word(BIGNUM *a, BN_ULONG w); -int BN_sub_word(BIGNUM *a, BN_ULONG w); -int BN_set_word(BIGNUM *a, BN_ULONG w); -BN_ULONG BN_get_word(const BIGNUM *a); - -int BN_cmp(const BIGNUM *a, const BIGNUM *b); -void BN_free(BIGNUM *a); -int BN_is_bit_set(const BIGNUM *a, int n); -int BN_lshift(BIGNUM *r, const BIGNUM *a, int n); -int BN_lshift1(BIGNUM *r, const BIGNUM *a); -int BN_exp(BIGNUM *r, const BIGNUM *a, const BIGNUM *p,BN_CTX *ctx); - -int BN_mod_exp(BIGNUM *r, const BIGNUM *a, const BIGNUM *p, - const BIGNUM *m,BN_CTX *ctx); -int BN_mod_exp_mont(BIGNUM *r, const BIGNUM *a, const BIGNUM *p, - const BIGNUM *m, BN_CTX *ctx, BN_MONT_CTX *m_ctx); -int BN_mod_exp_mont_consttime(BIGNUM *rr, const BIGNUM *a, const BIGNUM *p, - const BIGNUM *m, BN_CTX *ctx, BN_MONT_CTX *in_mont); -int BN_mod_exp_mont_word(BIGNUM *r, BN_ULONG a, const BIGNUM *p, - const BIGNUM *m, BN_CTX *ctx, BN_MONT_CTX *m_ctx); -int BN_mod_exp2_mont(BIGNUM *r, const BIGNUM *a1, const BIGNUM *p1, - const BIGNUM *a2, const BIGNUM *p2,const BIGNUM *m, - BN_CTX *ctx,BN_MONT_CTX *m_ctx); -int BN_mod_exp_simple(BIGNUM *r, const BIGNUM *a, const BIGNUM *p, - const BIGNUM *m,BN_CTX *ctx); - -int BN_mask_bits(BIGNUM *a,int n); -#ifndef OPENSSL_NO_FP_API -int BN_print_fp(FILE *fp, const BIGNUM *a); -#endif -#ifdef HEADER_BIO_H -int BN_print(BIO *fp, const BIGNUM *a); -#else -int BN_print(void *fp, const BIGNUM *a); -#endif -int BN_reciprocal(BIGNUM *r, const BIGNUM *m, int len, BN_CTX *ctx); -int BN_rshift(BIGNUM *r, const BIGNUM *a, int n); -int BN_rshift1(BIGNUM *r, const BIGNUM *a); -void BN_clear(BIGNUM *a); -BIGNUM *BN_dup(const BIGNUM *a); -int BN_ucmp(const BIGNUM *a, const BIGNUM *b); -int BN_set_bit(BIGNUM *a, int n); -int BN_clear_bit(BIGNUM *a, int n); -char * BN_bn2hex(const BIGNUM *a); -char * BN_bn2dec(const BIGNUM *a); -int BN_hex2bn(BIGNUM **a, const char *str); -int BN_dec2bn(BIGNUM **a, const char *str); -int BN_asc2bn(BIGNUM **a, const char *str); -int BN_gcd(BIGNUM *r,const BIGNUM *a,const BIGNUM *b,BN_CTX *ctx); -int BN_kronecker(const BIGNUM *a,const BIGNUM *b,BN_CTX *ctx); /* returns -2 for error */ -BIGNUM *BN_mod_inverse(BIGNUM *ret, - const BIGNUM *a, const BIGNUM *n,BN_CTX *ctx); -BIGNUM *BN_mod_sqrt(BIGNUM *ret, - const BIGNUM *a, const BIGNUM *n,BN_CTX *ctx); - -void BN_consttime_swap(BN_ULONG swap, BIGNUM *a, BIGNUM *b, int nwords); - -/* Deprecated versions */ -#ifndef OPENSSL_NO_DEPRECATED -BIGNUM *BN_generate_prime(BIGNUM *ret,int bits,int safe, - const BIGNUM *add, const BIGNUM *rem, - void (*callback)(int,int,void *),void *cb_arg); -int BN_is_prime(const BIGNUM *p,int nchecks, - void (*callback)(int,int,void *), - BN_CTX *ctx,void *cb_arg); -int BN_is_prime_fasttest(const BIGNUM *p,int nchecks, - void (*callback)(int,int,void *),BN_CTX *ctx,void *cb_arg, - int do_trial_division); -#endif /* !defined(OPENSSL_NO_DEPRECATED) */ - -/* Newer versions */ -int BN_generate_prime_ex(BIGNUM *ret,int bits,int safe, const BIGNUM *add, - const BIGNUM *rem, BN_GENCB *cb); -int BN_is_prime_ex(const BIGNUM *p,int nchecks, BN_CTX *ctx, BN_GENCB *cb); -int BN_is_prime_fasttest_ex(const BIGNUM *p,int nchecks, BN_CTX *ctx, - int do_trial_division, BN_GENCB *cb); - -int BN_X931_generate_Xpq(BIGNUM *Xp, BIGNUM *Xq, int nbits, BN_CTX *ctx); - -int BN_X931_derive_prime_ex(BIGNUM *p, BIGNUM *p1, BIGNUM *p2, - const BIGNUM *Xp, const BIGNUM *Xp1, const BIGNUM *Xp2, - const BIGNUM *e, BN_CTX *ctx, BN_GENCB *cb); -int BN_X931_generate_prime_ex(BIGNUM *p, BIGNUM *p1, BIGNUM *p2, - BIGNUM *Xp1, BIGNUM *Xp2, - const BIGNUM *Xp, - const BIGNUM *e, BN_CTX *ctx, - BN_GENCB *cb); - -BN_MONT_CTX *BN_MONT_CTX_new(void ); -void BN_MONT_CTX_init(BN_MONT_CTX *ctx); -int BN_mod_mul_montgomery(BIGNUM *r,const BIGNUM *a,const BIGNUM *b, - BN_MONT_CTX *mont, BN_CTX *ctx); -#define BN_to_montgomery(r,a,mont,ctx) BN_mod_mul_montgomery(\ - (r),(a),&((mont)->RR),(mont),(ctx)) -int BN_from_montgomery(BIGNUM *r,const BIGNUM *a, - BN_MONT_CTX *mont, BN_CTX *ctx); -void BN_MONT_CTX_free(BN_MONT_CTX *mont); -int BN_MONT_CTX_set(BN_MONT_CTX *mont,const BIGNUM *mod,BN_CTX *ctx); -BN_MONT_CTX *BN_MONT_CTX_copy(BN_MONT_CTX *to,BN_MONT_CTX *from); -BN_MONT_CTX *BN_MONT_CTX_set_locked(BN_MONT_CTX **pmont, int lock, - const BIGNUM *mod, BN_CTX *ctx); - -/* BN_BLINDING flags */ -#define BN_BLINDING_NO_UPDATE 0x00000001 -#define BN_BLINDING_NO_RECREATE 0x00000002 - -BN_BLINDING *BN_BLINDING_new(const BIGNUM *A, const BIGNUM *Ai, BIGNUM *mod); -void BN_BLINDING_free(BN_BLINDING *b); -int BN_BLINDING_update(BN_BLINDING *b,BN_CTX *ctx); -int BN_BLINDING_convert(BIGNUM *n, BN_BLINDING *b, BN_CTX *ctx); -int BN_BLINDING_invert(BIGNUM *n, BN_BLINDING *b, BN_CTX *ctx); -int BN_BLINDING_convert_ex(BIGNUM *n, BIGNUM *r, BN_BLINDING *b, BN_CTX *); -int BN_BLINDING_invert_ex(BIGNUM *n, const BIGNUM *r, BN_BLINDING *b, BN_CTX *); -#ifndef OPENSSL_NO_DEPRECATED -unsigned long BN_BLINDING_get_thread_id(const BN_BLINDING *); -void BN_BLINDING_set_thread_id(BN_BLINDING *, unsigned long); -#endif -CRYPTO_THREADID *BN_BLINDING_thread_id(BN_BLINDING *); -unsigned long BN_BLINDING_get_flags(const BN_BLINDING *); -void BN_BLINDING_set_flags(BN_BLINDING *, unsigned long); -BN_BLINDING *BN_BLINDING_create_param(BN_BLINDING *b, - const BIGNUM *e, BIGNUM *m, BN_CTX *ctx, - int (*bn_mod_exp)(BIGNUM *r, const BIGNUM *a, const BIGNUM *p, - const BIGNUM *m, BN_CTX *ctx, BN_MONT_CTX *m_ctx), - BN_MONT_CTX *m_ctx); - -#ifndef OPENSSL_NO_DEPRECATED -void BN_set_params(int mul,int high,int low,int mont); -int BN_get_params(int which); /* 0, mul, 1 high, 2 low, 3 mont */ -#endif - -void BN_RECP_CTX_init(BN_RECP_CTX *recp); -BN_RECP_CTX *BN_RECP_CTX_new(void); -void BN_RECP_CTX_free(BN_RECP_CTX *recp); -int BN_RECP_CTX_set(BN_RECP_CTX *recp,const BIGNUM *rdiv,BN_CTX *ctx); -int BN_mod_mul_reciprocal(BIGNUM *r, const BIGNUM *x, const BIGNUM *y, - BN_RECP_CTX *recp,BN_CTX *ctx); -int BN_mod_exp_recp(BIGNUM *r, const BIGNUM *a, const BIGNUM *p, - const BIGNUM *m, BN_CTX *ctx); -int BN_div_recp(BIGNUM *dv, BIGNUM *rem, const BIGNUM *m, - BN_RECP_CTX *recp, BN_CTX *ctx); - -#ifndef OPENSSL_NO_EC2M - -/* Functions for arithmetic over binary polynomials represented by BIGNUMs. - * - * The BIGNUM::neg property of BIGNUMs representing binary polynomials is - * ignored. - * - * Note that input arguments are not const so that their bit arrays can - * be expanded to the appropriate size if needed. - */ - -int BN_GF2m_add(BIGNUM *r, const BIGNUM *a, const BIGNUM *b); /*r = a + b*/ -#define BN_GF2m_sub(r, a, b) BN_GF2m_add(r, a, b) -int BN_GF2m_mod(BIGNUM *r, const BIGNUM *a, const BIGNUM *p); /*r=a mod p*/ -int BN_GF2m_mod_mul(BIGNUM *r, const BIGNUM *a, const BIGNUM *b, - const BIGNUM *p, BN_CTX *ctx); /* r = (a * b) mod p */ -int BN_GF2m_mod_sqr(BIGNUM *r, const BIGNUM *a, const BIGNUM *p, - BN_CTX *ctx); /* r = (a * a) mod p */ -int BN_GF2m_mod_inv(BIGNUM *r, const BIGNUM *b, const BIGNUM *p, - BN_CTX *ctx); /* r = (1 / b) mod p */ -int BN_GF2m_mod_div(BIGNUM *r, const BIGNUM *a, const BIGNUM *b, - const BIGNUM *p, BN_CTX *ctx); /* r = (a / b) mod p */ -int BN_GF2m_mod_exp(BIGNUM *r, const BIGNUM *a, const BIGNUM *b, - const BIGNUM *p, BN_CTX *ctx); /* r = (a ^ b) mod p */ -int BN_GF2m_mod_sqrt(BIGNUM *r, const BIGNUM *a, const BIGNUM *p, - BN_CTX *ctx); /* r = sqrt(a) mod p */ -int BN_GF2m_mod_solve_quad(BIGNUM *r, const BIGNUM *a, const BIGNUM *p, - BN_CTX *ctx); /* r^2 + r = a mod p */ -#define BN_GF2m_cmp(a, b) BN_ucmp((a), (b)) -/* Some functions allow for representation of the irreducible polynomials - * as an unsigned int[], say p. The irreducible f(t) is then of the form: - * t^p[0] + t^p[1] + ... + t^p[k] - * where m = p[0] > p[1] > ... > p[k] = 0. - */ -int BN_GF2m_mod_arr(BIGNUM *r, const BIGNUM *a, const int p[]); - /* r = a mod p */ -int BN_GF2m_mod_mul_arr(BIGNUM *r, const BIGNUM *a, const BIGNUM *b, - const int p[], BN_CTX *ctx); /* r = (a * b) mod p */ -int BN_GF2m_mod_sqr_arr(BIGNUM *r, const BIGNUM *a, const int p[], - BN_CTX *ctx); /* r = (a * a) mod p */ -int BN_GF2m_mod_inv_arr(BIGNUM *r, const BIGNUM *b, const int p[], - BN_CTX *ctx); /* r = (1 / b) mod p */ -int BN_GF2m_mod_div_arr(BIGNUM *r, const BIGNUM *a, const BIGNUM *b, - const int p[], BN_CTX *ctx); /* r = (a / b) mod p */ -int BN_GF2m_mod_exp_arr(BIGNUM *r, const BIGNUM *a, const BIGNUM *b, - const int p[], BN_CTX *ctx); /* r = (a ^ b) mod p */ -int BN_GF2m_mod_sqrt_arr(BIGNUM *r, const BIGNUM *a, - const int p[], BN_CTX *ctx); /* r = sqrt(a) mod p */ -int BN_GF2m_mod_solve_quad_arr(BIGNUM *r, const BIGNUM *a, - const int p[], BN_CTX *ctx); /* r^2 + r = a mod p */ -int BN_GF2m_poly2arr(const BIGNUM *a, int p[], int max); -int BN_GF2m_arr2poly(const int p[], BIGNUM *a); - -#endif - -/* faster mod functions for the 'NIST primes' - * 0 <= a < p^2 */ -int BN_nist_mod_192(BIGNUM *r, const BIGNUM *a, const BIGNUM *p, BN_CTX *ctx); -int BN_nist_mod_224(BIGNUM *r, const BIGNUM *a, const BIGNUM *p, BN_CTX *ctx); -int BN_nist_mod_256(BIGNUM *r, const BIGNUM *a, const BIGNUM *p, BN_CTX *ctx); -int BN_nist_mod_384(BIGNUM *r, const BIGNUM *a, const BIGNUM *p, BN_CTX *ctx); -int BN_nist_mod_521(BIGNUM *r, const BIGNUM *a, const BIGNUM *p, BN_CTX *ctx); - -const BIGNUM *BN_get0_nist_prime_192(void); -const BIGNUM *BN_get0_nist_prime_224(void); -const BIGNUM *BN_get0_nist_prime_256(void); -const BIGNUM *BN_get0_nist_prime_384(void); -const BIGNUM *BN_get0_nist_prime_521(void); - -/* library internal functions */ - -#define bn_expand(a,bits) ((((((bits+BN_BITS2-1))/BN_BITS2)) <= (a)->dmax)?\ - (a):bn_expand2((a),(bits+BN_BITS2-1)/BN_BITS2)) -#define bn_wexpand(a,words) (((words) <= (a)->dmax)?(a):bn_expand2((a),(words))) -BIGNUM *bn_expand2(BIGNUM *a, int words); -#ifndef OPENSSL_NO_DEPRECATED -BIGNUM *bn_dup_expand(const BIGNUM *a, int words); /* unused */ -#endif - -/* Bignum consistency macros - * There is one "API" macro, bn_fix_top(), for stripping leading zeroes from - * bignum data after direct manipulations on the data. There is also an - * "internal" macro, bn_check_top(), for verifying that there are no leading - * zeroes. Unfortunately, some auditing is required due to the fact that - * bn_fix_top() has become an overabused duct-tape because bignum data is - * occasionally passed around in an inconsistent state. So the following - * changes have been made to sort this out; - * - bn_fix_top()s implementation has been moved to bn_correct_top() - * - if BN_DEBUG isn't defined, bn_fix_top() maps to bn_correct_top(), and - * bn_check_top() is as before. - * - if BN_DEBUG *is* defined; - * - bn_check_top() tries to pollute unused words even if the bignum 'top' is - * consistent. (ed: only if BN_DEBUG_RAND is defined) - * - bn_fix_top() maps to bn_check_top() rather than "fixing" anything. - * The idea is to have debug builds flag up inconsistent bignums when they - * occur. If that occurs in a bn_fix_top(), we examine the code in question; if - * the use of bn_fix_top() was appropriate (ie. it follows directly after code - * that manipulates the bignum) it is converted to bn_correct_top(), and if it - * was not appropriate, we convert it permanently to bn_check_top() and track - * down the cause of the bug. Eventually, no internal code should be using the - * bn_fix_top() macro. External applications and libraries should try this with - * their own code too, both in terms of building against the openssl headers - * with BN_DEBUG defined *and* linking with a version of OpenSSL built with it - * defined. This not only improves external code, it provides more test - * coverage for openssl's own code. - */ - -#ifdef BN_DEBUG - -/* We only need assert() when debugging */ -#include - -#ifdef BN_DEBUG_RAND -/* To avoid "make update" cvs wars due to BN_DEBUG, use some tricks */ -#ifndef RAND_pseudo_bytes -int RAND_pseudo_bytes(unsigned char *buf,int num); -#define BN_DEBUG_TRIX -#endif -#define bn_pollute(a) \ - do { \ - const BIGNUM *_bnum1 = (a); \ - if(_bnum1->top < _bnum1->dmax) { \ - unsigned char _tmp_char; \ - /* We cast away const without the compiler knowing, any \ - * *genuinely* constant variables that aren't mutable \ - * wouldn't be constructed with top!=dmax. */ \ - BN_ULONG *_not_const; \ - memcpy(&_not_const, &_bnum1->d, sizeof(BN_ULONG*)); \ - RAND_pseudo_bytes(&_tmp_char, 1); \ - memset((unsigned char *)(_not_const + _bnum1->top), _tmp_char, \ - (_bnum1->dmax - _bnum1->top) * sizeof(BN_ULONG)); \ - } \ - } while(0) -#ifdef BN_DEBUG_TRIX -#undef RAND_pseudo_bytes -#endif -#else -#define bn_pollute(a) -#endif -#define bn_check_top(a) \ - do { \ - const BIGNUM *_bnum2 = (a); \ - if (_bnum2 != NULL) { \ - assert((_bnum2->top == 0) || \ - (_bnum2->d[_bnum2->top - 1] != 0)); \ - bn_pollute(_bnum2); \ - } \ - } while(0) - -#define bn_fix_top(a) bn_check_top(a) - -#define bn_check_size(bn, bits) bn_wcheck_size(bn, ((bits+BN_BITS2-1))/BN_BITS2) -#define bn_wcheck_size(bn, words) \ - do { \ - const BIGNUM *_bnum2 = (bn); \ - assert(words <= (_bnum2)->dmax && words >= (_bnum2)->top); \ - } while(0) - -#else /* !BN_DEBUG */ - -#define bn_pollute(a) -#define bn_check_top(a) -#define bn_fix_top(a) bn_correct_top(a) -#define bn_check_size(bn, bits) -#define bn_wcheck_size(bn, words) - -#endif - -#define bn_correct_top(a) \ - { \ - BN_ULONG *ftl; \ - int tmp_top = (a)->top; \ - if (tmp_top > 0) \ - { \ - for (ftl= &((a)->d[tmp_top-1]); tmp_top > 0; tmp_top--) \ - if (*(ftl--)) break; \ - (a)->top = tmp_top; \ - } \ - bn_pollute(a); \ - } - -BN_ULONG bn_mul_add_words(BN_ULONG *rp, const BN_ULONG *ap, int num, BN_ULONG w); -BN_ULONG bn_mul_words(BN_ULONG *rp, const BN_ULONG *ap, int num, BN_ULONG w); -void bn_sqr_words(BN_ULONG *rp, const BN_ULONG *ap, int num); -BN_ULONG bn_div_words(BN_ULONG h, BN_ULONG l, BN_ULONG d); -BN_ULONG bn_add_words(BN_ULONG *rp, const BN_ULONG *ap, const BN_ULONG *bp,int num); -BN_ULONG bn_sub_words(BN_ULONG *rp, const BN_ULONG *ap, const BN_ULONG *bp,int num); - -/* Primes from RFC 2409 */ -BIGNUM *get_rfc2409_prime_768(BIGNUM *bn); -BIGNUM *get_rfc2409_prime_1024(BIGNUM *bn); - -/* Primes from RFC 3526 */ -BIGNUM *get_rfc3526_prime_1536(BIGNUM *bn); -BIGNUM *get_rfc3526_prime_2048(BIGNUM *bn); -BIGNUM *get_rfc3526_prime_3072(BIGNUM *bn); -BIGNUM *get_rfc3526_prime_4096(BIGNUM *bn); -BIGNUM *get_rfc3526_prime_6144(BIGNUM *bn); -BIGNUM *get_rfc3526_prime_8192(BIGNUM *bn); - -int BN_bntest_rand(BIGNUM *rnd, int bits, int top,int bottom); - -/* BEGIN ERROR CODES */ -/* The following lines are auto generated by the script mkerr.pl. Any changes - * made after this point may be overwritten when the script is next run. - */ -void ERR_load_BN_strings(void); - -/* Error codes for the BN functions. */ - -/* Function codes. */ -#define BN_F_BNRAND 127 -#define BN_F_BN_BLINDING_CONVERT_EX 100 -#define BN_F_BN_BLINDING_CREATE_PARAM 128 -#define BN_F_BN_BLINDING_INVERT_EX 101 -#define BN_F_BN_BLINDING_NEW 102 -#define BN_F_BN_BLINDING_UPDATE 103 -#define BN_F_BN_BN2DEC 104 -#define BN_F_BN_BN2HEX 105 -#define BN_F_BN_CTX_GET 116 -#define BN_F_BN_CTX_NEW 106 -#define BN_F_BN_CTX_START 129 -#define BN_F_BN_DIV 107 -#define BN_F_BN_DIV_NO_BRANCH 138 -#define BN_F_BN_DIV_RECP 130 -#define BN_F_BN_EXP 123 -#define BN_F_BN_EXPAND2 108 -#define BN_F_BN_EXPAND_INTERNAL 120 -#define BN_F_BN_GF2M_MOD 131 -#define BN_F_BN_GF2M_MOD_EXP 132 -#define BN_F_BN_GF2M_MOD_MUL 133 -#define BN_F_BN_GF2M_MOD_SOLVE_QUAD 134 -#define BN_F_BN_GF2M_MOD_SOLVE_QUAD_ARR 135 -#define BN_F_BN_GF2M_MOD_SQR 136 -#define BN_F_BN_GF2M_MOD_SQRT 137 -#define BN_F_BN_MOD_EXP2_MONT 118 -#define BN_F_BN_MOD_EXP_MONT 109 -#define BN_F_BN_MOD_EXP_MONT_CONSTTIME 124 -#define BN_F_BN_MOD_EXP_MONT_WORD 117 -#define BN_F_BN_MOD_EXP_RECP 125 -#define BN_F_BN_MOD_EXP_SIMPLE 126 -#define BN_F_BN_MOD_INVERSE 110 -#define BN_F_BN_MOD_INVERSE_NO_BRANCH 139 -#define BN_F_BN_MOD_LSHIFT_QUICK 119 -#define BN_F_BN_MOD_MUL_RECIPROCAL 111 -#define BN_F_BN_MOD_SQRT 121 -#define BN_F_BN_MPI2BN 112 -#define BN_F_BN_NEW 113 -#define BN_F_BN_RAND 114 -#define BN_F_BN_RAND_RANGE 122 -#define BN_F_BN_USUB 115 - -/* Reason codes. */ -#define BN_R_ARG2_LT_ARG3 100 -#define BN_R_BAD_RECIPROCAL 101 -#define BN_R_BIGNUM_TOO_LONG 114 -#define BN_R_CALLED_WITH_EVEN_MODULUS 102 -#define BN_R_DIV_BY_ZERO 103 -#define BN_R_ENCODING_ERROR 104 -#define BN_R_EXPAND_ON_STATIC_BIGNUM_DATA 105 -#define BN_R_INPUT_NOT_REDUCED 110 -#define BN_R_INVALID_LENGTH 106 -#define BN_R_INVALID_RANGE 115 -#define BN_R_NOT_A_SQUARE 111 -#define BN_R_NOT_INITIALIZED 107 -#define BN_R_NO_INVERSE 108 -#define BN_R_NO_SOLUTION 116 -#define BN_R_P_IS_NOT_PRIME 112 -#define BN_R_TOO_MANY_ITERATIONS 113 -#define BN_R_TOO_MANY_TEMPORARY_VARIABLES 109 - -#ifdef __cplusplus -} -#endif -#endif diff --git a/Pods/OpenSSL-Universal/include-osx/openssl/buffer.h b/Pods/OpenSSL-Universal/include-osx/openssl/buffer.h deleted file mode 100644 index f8da32b4..00000000 --- a/Pods/OpenSSL-Universal/include-osx/openssl/buffer.h +++ /dev/null @@ -1,119 +0,0 @@ -/* crypto/buffer/buffer.h */ -/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) - * All rights reserved. - * - * This package is an SSL implementation written - * by Eric Young (eay@cryptsoft.com). - * The implementation was written so as to conform with Netscapes SSL. - * - * This library is free for commercial and non-commercial use as long as - * the following conditions are aheared to. The following conditions - * apply to all code found in this distribution, be it the RC4, RSA, - * lhash, DES, etc., code; not just the SSL code. The SSL documentation - * included with this distribution is covered by the same copyright terms - * except that the holder is Tim Hudson (tjh@cryptsoft.com). - * - * Copyright remains Eric Young's, and as such any Copyright notices in - * the code are not to be removed. - * If this package is used in a product, Eric Young should be given attribution - * as the author of the parts of the library used. - * This can be in the form of a textual message at program startup or - * in documentation (online or textual) provided with the package. - * - * Redistribution and use in source and binary forms, with or without - * modification, are permitted provided that the following conditions - * are met: - * 1. Redistributions of source code must retain the copyright - * notice, this list of conditions and the following disclaimer. - * 2. Redistributions in binary form must reproduce the above copyright - * notice, this list of conditions and the following disclaimer in the - * documentation and/or other materials provided with the distribution. - * 3. All advertising materials mentioning features or use of this software - * must display the following acknowledgement: - * "This product includes cryptographic software written by - * Eric Young (eay@cryptsoft.com)" - * The word 'cryptographic' can be left out if the rouines from the library - * being used are not cryptographic related :-). - * 4. If you include any Windows specific code (or a derivative thereof) from - * the apps directory (application code) you must include an acknowledgement: - * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" - * - * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND - * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE - * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE - * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE - * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL - * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS - * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) - * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT - * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY - * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF - * SUCH DAMAGE. - * - * The licence and distribution terms for any publically available version or - * derivative of this code cannot be changed. i.e. this code cannot simply be - * copied and put under another distribution licence - * [including the GNU Public Licence.] - */ - -#ifndef HEADER_BUFFER_H -#define HEADER_BUFFER_H - -#include - -#ifdef __cplusplus -extern "C" { -#endif - -#include - -#if !defined(NO_SYS_TYPES_H) -#include -#endif - -/* Already declared in ossl_typ.h */ -/* typedef struct buf_mem_st BUF_MEM; */ - -struct buf_mem_st - { - size_t length; /* current number of bytes */ - char *data; - size_t max; /* size of buffer */ - }; - -BUF_MEM *BUF_MEM_new(void); -void BUF_MEM_free(BUF_MEM *a); -int BUF_MEM_grow(BUF_MEM *str, size_t len); -int BUF_MEM_grow_clean(BUF_MEM *str, size_t len); -char * BUF_strdup(const char *str); -char * BUF_strndup(const char *str, size_t siz); -void * BUF_memdup(const void *data, size_t siz); -void BUF_reverse(unsigned char *out, const unsigned char *in, size_t siz); - -/* safe string functions */ -size_t BUF_strlcpy(char *dst,const char *src,size_t siz); -size_t BUF_strlcat(char *dst,const char *src,size_t siz); - - -/* BEGIN ERROR CODES */ -/* The following lines are auto generated by the script mkerr.pl. Any changes - * made after this point may be overwritten when the script is next run. - */ -void ERR_load_BUF_strings(void); - -/* Error codes for the BUF functions. */ - -/* Function codes. */ -#define BUF_F_BUF_MEMDUP 103 -#define BUF_F_BUF_MEM_GROW 100 -#define BUF_F_BUF_MEM_GROW_CLEAN 105 -#define BUF_F_BUF_MEM_NEW 101 -#define BUF_F_BUF_STRDUP 102 -#define BUF_F_BUF_STRNDUP 104 - -/* Reason codes. */ - -#ifdef __cplusplus -} -#endif -#endif diff --git a/Pods/OpenSSL-Universal/include-osx/openssl/camellia.h b/Pods/OpenSSL-Universal/include-osx/openssl/camellia.h deleted file mode 100644 index 67911e0a..00000000 --- a/Pods/OpenSSL-Universal/include-osx/openssl/camellia.h +++ /dev/null @@ -1,130 +0,0 @@ -/* crypto/camellia/camellia.h -*- mode:C; c-file-style: "eay" -*- */ -/* ==================================================================== - * Copyright (c) 2006 The OpenSSL Project. All rights reserved. - * - * Redistribution and use in source and binary forms, with or without - * modification, are permitted provided that the following conditions - * are met: - * - * 1. Redistributions of source code must retain the above copyright - * notice, this list of conditions and the following disclaimer. - * - * 2. Redistributions in binary form must reproduce the above copyright - * notice, this list of conditions and the following disclaimer in - * the documentation and/or other materials provided with the - * distribution. - * - * 3. All advertising materials mentioning features or use of this - * software must display the following acknowledgment: - * "This product includes software developed by the OpenSSL Project - * for use in the OpenSSL Toolkit. (http://www.openssl.org/)" - * - * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to - * endorse or promote products derived from this software without - * prior written permission. For written permission, please contact - * openssl-core@openssl.org. - * - * 5. Products derived from this software may not be called "OpenSSL" - * nor may "OpenSSL" appear in their names without prior written - * permission of the OpenSSL Project. - * - * 6. Redistributions of any form whatsoever must retain the following - * acknowledgment: - * "This product includes software developed by the OpenSSL Project - * for use in the OpenSSL Toolkit (http://www.openssl.org/)" - * - * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY - * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE - * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR - * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR - * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, - * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT - * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; - * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) - * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, - * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) - * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED - * OF THE POSSIBILITY OF SUCH DAMAGE. - * ==================================================================== - * - */ - -#ifndef HEADER_CAMELLIA_H -#define HEADER_CAMELLIA_H - -#include - -#ifdef OPENSSL_NO_CAMELLIA -#error CAMELLIA is disabled. -#endif - -#include - -#define CAMELLIA_ENCRYPT 1 -#define CAMELLIA_DECRYPT 0 - -/* Because array size can't be a const in C, the following two are macros. - Both sizes are in bytes. */ - -#ifdef __cplusplus -extern "C" { -#endif - -/* This should be a hidden type, but EVP requires that the size be known */ - -#define CAMELLIA_BLOCK_SIZE 16 -#define CAMELLIA_TABLE_BYTE_LEN 272 -#define CAMELLIA_TABLE_WORD_LEN (CAMELLIA_TABLE_BYTE_LEN / 4) - -typedef unsigned int KEY_TABLE_TYPE[CAMELLIA_TABLE_WORD_LEN]; /* to match with WORD */ - -struct camellia_key_st - { - union { - double d; /* ensures 64-bit align */ - KEY_TABLE_TYPE rd_key; - } u; - int grand_rounds; - }; -typedef struct camellia_key_st CAMELLIA_KEY; - -#ifdef OPENSSL_FIPS -int private_Camellia_set_key(const unsigned char *userKey, const int bits, - CAMELLIA_KEY *key); -#endif -int Camellia_set_key(const unsigned char *userKey, const int bits, - CAMELLIA_KEY *key); - -void Camellia_encrypt(const unsigned char *in, unsigned char *out, - const CAMELLIA_KEY *key); -void Camellia_decrypt(const unsigned char *in, unsigned char *out, - const CAMELLIA_KEY *key); - -void Camellia_ecb_encrypt(const unsigned char *in, unsigned char *out, - const CAMELLIA_KEY *key, const int enc); -void Camellia_cbc_encrypt(const unsigned char *in, unsigned char *out, - size_t length, const CAMELLIA_KEY *key, - unsigned char *ivec, const int enc); -void Camellia_cfb128_encrypt(const unsigned char *in, unsigned char *out, - size_t length, const CAMELLIA_KEY *key, - unsigned char *ivec, int *num, const int enc); -void Camellia_cfb1_encrypt(const unsigned char *in, unsigned char *out, - size_t length, const CAMELLIA_KEY *key, - unsigned char *ivec, int *num, const int enc); -void Camellia_cfb8_encrypt(const unsigned char *in, unsigned char *out, - size_t length, const CAMELLIA_KEY *key, - unsigned char *ivec, int *num, const int enc); -void Camellia_ofb128_encrypt(const unsigned char *in, unsigned char *out, - size_t length, const CAMELLIA_KEY *key, - unsigned char *ivec, int *num); -void Camellia_ctr128_encrypt(const unsigned char *in, unsigned char *out, - size_t length, const CAMELLIA_KEY *key, - unsigned char ivec[CAMELLIA_BLOCK_SIZE], - unsigned char ecount_buf[CAMELLIA_BLOCK_SIZE], - unsigned int *num); - -#ifdef __cplusplus -} -#endif - -#endif /* !HEADER_Camellia_H */ diff --git a/Pods/OpenSSL-Universal/include-osx/openssl/cast.h b/Pods/OpenSSL-Universal/include-osx/openssl/cast.h deleted file mode 100644 index 203922ea..00000000 --- a/Pods/OpenSSL-Universal/include-osx/openssl/cast.h +++ /dev/null @@ -1,107 +0,0 @@ -/* crypto/cast/cast.h */ -/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) - * All rights reserved. - * - * This package is an SSL implementation written - * by Eric Young (eay@cryptsoft.com). - * The implementation was written so as to conform with Netscapes SSL. - * - * This library is free for commercial and non-commercial use as long as - * the following conditions are aheared to. The following conditions - * apply to all code found in this distribution, be it the RC4, RSA, - * lhash, DES, etc., code; not just the SSL code. The SSL documentation - * included with this distribution is covered by the same copyright terms - * except that the holder is Tim Hudson (tjh@cryptsoft.com). - * - * Copyright remains Eric Young's, and as such any Copyright notices in - * the code are not to be removed. - * If this package is used in a product, Eric Young should be given attribution - * as the author of the parts of the library used. - * This can be in the form of a textual message at program startup or - * in documentation (online or textual) provided with the package. - * - * Redistribution and use in source and binary forms, with or without - * modification, are permitted provided that the following conditions - * are met: - * 1. Redistributions of source code must retain the copyright - * notice, this list of conditions and the following disclaimer. - * 2. Redistributions in binary form must reproduce the above copyright - * notice, this list of conditions and the following disclaimer in the - * documentation and/or other materials provided with the distribution. - * 3. All advertising materials mentioning features or use of this software - * must display the following acknowledgement: - * "This product includes cryptographic software written by - * Eric Young (eay@cryptsoft.com)" - * The word 'cryptographic' can be left out if the rouines from the library - * being used are not cryptographic related :-). - * 4. If you include any Windows specific code (or a derivative thereof) from - * the apps directory (application code) you must include an acknowledgement: - * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" - * - * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND - * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE - * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE - * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE - * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL - * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS - * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) - * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT - * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY - * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF - * SUCH DAMAGE. - * - * The licence and distribution terms for any publically available version or - * derivative of this code cannot be changed. i.e. this code cannot simply be - * copied and put under another distribution licence - * [including the GNU Public Licence.] - */ - -#ifndef HEADER_CAST_H -#define HEADER_CAST_H - -#ifdef __cplusplus -extern "C" { -#endif - -#include - -#ifdef OPENSSL_NO_CAST -#error CAST is disabled. -#endif - -#define CAST_ENCRYPT 1 -#define CAST_DECRYPT 0 - -#define CAST_LONG unsigned int - -#define CAST_BLOCK 8 -#define CAST_KEY_LENGTH 16 - -typedef struct cast_key_st - { - CAST_LONG data[32]; - int short_key; /* Use reduced rounds for short key */ - } CAST_KEY; - -#ifdef OPENSSL_FIPS -void private_CAST_set_key(CAST_KEY *key, int len, const unsigned char *data); -#endif -void CAST_set_key(CAST_KEY *key, int len, const unsigned char *data); -void CAST_ecb_encrypt(const unsigned char *in, unsigned char *out, const CAST_KEY *key, - int enc); -void CAST_encrypt(CAST_LONG *data, const CAST_KEY *key); -void CAST_decrypt(CAST_LONG *data, const CAST_KEY *key); -void CAST_cbc_encrypt(const unsigned char *in, unsigned char *out, long length, - const CAST_KEY *ks, unsigned char *iv, int enc); -void CAST_cfb64_encrypt(const unsigned char *in, unsigned char *out, - long length, const CAST_KEY *schedule, unsigned char *ivec, - int *num, int enc); -void CAST_ofb64_encrypt(const unsigned char *in, unsigned char *out, - long length, const CAST_KEY *schedule, unsigned char *ivec, - int *num); - -#ifdef __cplusplus -} -#endif - -#endif diff --git a/Pods/OpenSSL-Universal/include-osx/openssl/cmac.h b/Pods/OpenSSL-Universal/include-osx/openssl/cmac.h deleted file mode 100644 index 712e92dc..00000000 --- a/Pods/OpenSSL-Universal/include-osx/openssl/cmac.h +++ /dev/null @@ -1,82 +0,0 @@ -/* crypto/cmac/cmac.h */ -/* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL - * project. - */ -/* ==================================================================== - * Copyright (c) 2010 The OpenSSL Project. All rights reserved. - * - * Redistribution and use in source and binary forms, with or without - * modification, are permitted provided that the following conditions - * are met: - * - * 1. Redistributions of source code must retain the above copyright - * notice, this list of conditions and the following disclaimer. - * - * 2. Redistributions in binary form must reproduce the above copyright - * notice, this list of conditions and the following disclaimer in - * the documentation and/or other materials provided with the - * distribution. - * - * 3. All advertising materials mentioning features or use of this - * software must display the following acknowledgment: - * "This product includes software developed by the OpenSSL Project - * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)" - * - * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to - * endorse or promote products derived from this software without - * prior written permission. For written permission, please contact - * licensing@OpenSSL.org. - * - * 5. Products derived from this software may not be called "OpenSSL" - * nor may "OpenSSL" appear in their names without prior written - * permission of the OpenSSL Project. - * - * 6. Redistributions of any form whatsoever must retain the following - * acknowledgment: - * "This product includes software developed by the OpenSSL Project - * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)" - * - * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY - * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE - * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR - * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR - * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, - * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT - * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; - * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) - * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, - * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) - * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED - * OF THE POSSIBILITY OF SUCH DAMAGE. - * ==================================================================== - */ - - -#ifndef HEADER_CMAC_H -#define HEADER_CMAC_H - -#ifdef __cplusplus -extern "C" { -#endif - -#include - -/* Opaque */ -typedef struct CMAC_CTX_st CMAC_CTX; - -CMAC_CTX *CMAC_CTX_new(void); -void CMAC_CTX_cleanup(CMAC_CTX *ctx); -void CMAC_CTX_free(CMAC_CTX *ctx); -EVP_CIPHER_CTX *CMAC_CTX_get0_cipher_ctx(CMAC_CTX *ctx); -int CMAC_CTX_copy(CMAC_CTX *out, const CMAC_CTX *in); - -int CMAC_Init(CMAC_CTX *ctx, const void *key, size_t keylen, - const EVP_CIPHER *cipher, ENGINE *impl); -int CMAC_Update(CMAC_CTX *ctx, const void *data, size_t dlen); -int CMAC_Final(CMAC_CTX *ctx, unsigned char *out, size_t *poutlen); -int CMAC_resume(CMAC_CTX *ctx); - -#ifdef __cplusplus -} -#endif -#endif diff --git a/Pods/OpenSSL-Universal/include-osx/openssl/cms.h b/Pods/OpenSSL-Universal/include-osx/openssl/cms.h deleted file mode 100644 index 36994fa6..00000000 --- a/Pods/OpenSSL-Universal/include-osx/openssl/cms.h +++ /dev/null @@ -1,501 +0,0 @@ -/* crypto/cms/cms.h */ -/* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL - * project. - */ -/* ==================================================================== - * Copyright (c) 2008 The OpenSSL Project. All rights reserved. - * - * Redistribution and use in source and binary forms, with or without - * modification, are permitted provided that the following conditions - * are met: - * - * 1. Redistributions of source code must retain the above copyright - * notice, this list of conditions and the following disclaimer. - * - * 2. Redistributions in binary form must reproduce the above copyright - * notice, this list of conditions and the following disclaimer in - * the documentation and/or other materials provided with the - * distribution. - * - * 3. All advertising materials mentioning features or use of this - * software must display the following acknowledgment: - * "This product includes software developed by the OpenSSL Project - * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)" - * - * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to - * endorse or promote products derived from this software without - * prior written permission. For written permission, please contact - * licensing@OpenSSL.org. - * - * 5. Products derived from this software may not be called "OpenSSL" - * nor may "OpenSSL" appear in their names without prior written - * permission of the OpenSSL Project. - * - * 6. Redistributions of any form whatsoever must retain the following - * acknowledgment: - * "This product includes software developed by the OpenSSL Project - * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)" - * - * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY - * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE - * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR - * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR - * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, - * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT - * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; - * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) - * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, - * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) - * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED - * OF THE POSSIBILITY OF SUCH DAMAGE. - * ==================================================================== - */ - - -#ifndef HEADER_CMS_H -#define HEADER_CMS_H - -#include - -#ifdef OPENSSL_NO_CMS -#error CMS is disabled. -#endif - -#ifdef __cplusplus -extern "C" { -#endif - - -typedef struct CMS_ContentInfo_st CMS_ContentInfo; -typedef struct CMS_SignerInfo_st CMS_SignerInfo; -typedef struct CMS_CertificateChoices CMS_CertificateChoices; -typedef struct CMS_RevocationInfoChoice_st CMS_RevocationInfoChoice; -typedef struct CMS_RecipientInfo_st CMS_RecipientInfo; -typedef struct CMS_ReceiptRequest_st CMS_ReceiptRequest; -typedef struct CMS_Receipt_st CMS_Receipt; - -DECLARE_STACK_OF(CMS_SignerInfo) -DECLARE_STACK_OF(GENERAL_NAMES) -DECLARE_ASN1_FUNCTIONS(CMS_ContentInfo) -DECLARE_ASN1_FUNCTIONS(CMS_ReceiptRequest) -DECLARE_ASN1_PRINT_FUNCTION(CMS_ContentInfo) - -#define CMS_SIGNERINFO_ISSUER_SERIAL 0 -#define CMS_SIGNERINFO_KEYIDENTIFIER 1 - -#define CMS_RECIPINFO_TRANS 0 -#define CMS_RECIPINFO_AGREE 1 -#define CMS_RECIPINFO_KEK 2 -#define CMS_RECIPINFO_PASS 3 -#define CMS_RECIPINFO_OTHER 4 - -/* S/MIME related flags */ - -#define CMS_TEXT 0x1 -#define CMS_NOCERTS 0x2 -#define CMS_NO_CONTENT_VERIFY 0x4 -#define CMS_NO_ATTR_VERIFY 0x8 -#define CMS_NOSIGS \ - (CMS_NO_CONTENT_VERIFY|CMS_NO_ATTR_VERIFY) -#define CMS_NOINTERN 0x10 -#define CMS_NO_SIGNER_CERT_VERIFY 0x20 -#define CMS_NOVERIFY 0x20 -#define CMS_DETACHED 0x40 -#define CMS_BINARY 0x80 -#define CMS_NOATTR 0x100 -#define CMS_NOSMIMECAP 0x200 -#define CMS_NOOLDMIMETYPE 0x400 -#define CMS_CRLFEOL 0x800 -#define CMS_STREAM 0x1000 -#define CMS_NOCRL 0x2000 -#define CMS_PARTIAL 0x4000 -#define CMS_REUSE_DIGEST 0x8000 -#define CMS_USE_KEYID 0x10000 -#define CMS_DEBUG_DECRYPT 0x20000 - -const ASN1_OBJECT *CMS_get0_type(CMS_ContentInfo *cms); - -BIO *CMS_dataInit(CMS_ContentInfo *cms, BIO *icont); -int CMS_dataFinal(CMS_ContentInfo *cms, BIO *bio); - -ASN1_OCTET_STRING **CMS_get0_content(CMS_ContentInfo *cms); -int CMS_is_detached(CMS_ContentInfo *cms); -int CMS_set_detached(CMS_ContentInfo *cms, int detached); - -#ifdef HEADER_PEM_H -DECLARE_PEM_rw_const(CMS, CMS_ContentInfo) -#endif - -int CMS_stream(unsigned char ***boundary, CMS_ContentInfo *cms); -CMS_ContentInfo *d2i_CMS_bio(BIO *bp, CMS_ContentInfo **cms); -int i2d_CMS_bio(BIO *bp, CMS_ContentInfo *cms); - -BIO *BIO_new_CMS(BIO *out, CMS_ContentInfo *cms); -int i2d_CMS_bio_stream(BIO *out, CMS_ContentInfo *cms, BIO *in, int flags); -int PEM_write_bio_CMS_stream(BIO *out, CMS_ContentInfo *cms, BIO *in, int flags); -CMS_ContentInfo *SMIME_read_CMS(BIO *bio, BIO **bcont); -int SMIME_write_CMS(BIO *bio, CMS_ContentInfo *cms, BIO *data, int flags); - -int CMS_final(CMS_ContentInfo *cms, BIO *data, BIO *dcont, unsigned int flags); - -CMS_ContentInfo *CMS_sign(X509 *signcert, EVP_PKEY *pkey, STACK_OF(X509) *certs, - BIO *data, unsigned int flags); - -CMS_ContentInfo *CMS_sign_receipt(CMS_SignerInfo *si, - X509 *signcert, EVP_PKEY *pkey, - STACK_OF(X509) *certs, - unsigned int flags); - -int CMS_data(CMS_ContentInfo *cms, BIO *out, unsigned int flags); -CMS_ContentInfo *CMS_data_create(BIO *in, unsigned int flags); - -int CMS_digest_verify(CMS_ContentInfo *cms, BIO *dcont, BIO *out, - unsigned int flags); -CMS_ContentInfo *CMS_digest_create(BIO *in, const EVP_MD *md, - unsigned int flags); - -int CMS_EncryptedData_decrypt(CMS_ContentInfo *cms, - const unsigned char *key, size_t keylen, - BIO *dcont, BIO *out, unsigned int flags); - -CMS_ContentInfo *CMS_EncryptedData_encrypt(BIO *in, const EVP_CIPHER *cipher, - const unsigned char *key, size_t keylen, - unsigned int flags); - -int CMS_EncryptedData_set1_key(CMS_ContentInfo *cms, const EVP_CIPHER *ciph, - const unsigned char *key, size_t keylen); - -int CMS_verify(CMS_ContentInfo *cms, STACK_OF(X509) *certs, - X509_STORE *store, BIO *dcont, BIO *out, unsigned int flags); - -int CMS_verify_receipt(CMS_ContentInfo *rcms, CMS_ContentInfo *ocms, - STACK_OF(X509) *certs, - X509_STORE *store, unsigned int flags); - -STACK_OF(X509) *CMS_get0_signers(CMS_ContentInfo *cms); - -CMS_ContentInfo *CMS_encrypt(STACK_OF(X509) *certs, BIO *in, - const EVP_CIPHER *cipher, unsigned int flags); - -int CMS_decrypt(CMS_ContentInfo *cms, EVP_PKEY *pkey, X509 *cert, - BIO *dcont, BIO *out, - unsigned int flags); - -int CMS_decrypt_set1_pkey(CMS_ContentInfo *cms, EVP_PKEY *pk, X509 *cert); -int CMS_decrypt_set1_key(CMS_ContentInfo *cms, - unsigned char *key, size_t keylen, - unsigned char *id, size_t idlen); -int CMS_decrypt_set1_password(CMS_ContentInfo *cms, - unsigned char *pass, ossl_ssize_t passlen); - -STACK_OF(CMS_RecipientInfo) *CMS_get0_RecipientInfos(CMS_ContentInfo *cms); -int CMS_RecipientInfo_type(CMS_RecipientInfo *ri); -CMS_ContentInfo *CMS_EnvelopedData_create(const EVP_CIPHER *cipher); -CMS_RecipientInfo *CMS_add1_recipient_cert(CMS_ContentInfo *cms, - X509 *recip, unsigned int flags); -int CMS_RecipientInfo_set0_pkey(CMS_RecipientInfo *ri, EVP_PKEY *pkey); -int CMS_RecipientInfo_ktri_cert_cmp(CMS_RecipientInfo *ri, X509 *cert); -int CMS_RecipientInfo_ktri_get0_algs(CMS_RecipientInfo *ri, - EVP_PKEY **pk, X509 **recip, - X509_ALGOR **palg); -int CMS_RecipientInfo_ktri_get0_signer_id(CMS_RecipientInfo *ri, - ASN1_OCTET_STRING **keyid, - X509_NAME **issuer, ASN1_INTEGER **sno); - -CMS_RecipientInfo *CMS_add0_recipient_key(CMS_ContentInfo *cms, int nid, - unsigned char *key, size_t keylen, - unsigned char *id, size_t idlen, - ASN1_GENERALIZEDTIME *date, - ASN1_OBJECT *otherTypeId, - ASN1_TYPE *otherType); - -int CMS_RecipientInfo_kekri_get0_id(CMS_RecipientInfo *ri, - X509_ALGOR **palg, - ASN1_OCTET_STRING **pid, - ASN1_GENERALIZEDTIME **pdate, - ASN1_OBJECT **potherid, - ASN1_TYPE **pothertype); - -int CMS_RecipientInfo_set0_key(CMS_RecipientInfo *ri, - unsigned char *key, size_t keylen); - -int CMS_RecipientInfo_kekri_id_cmp(CMS_RecipientInfo *ri, - const unsigned char *id, size_t idlen); - -int CMS_RecipientInfo_set0_password(CMS_RecipientInfo *ri, - unsigned char *pass, - ossl_ssize_t passlen); - -CMS_RecipientInfo *CMS_add0_recipient_password(CMS_ContentInfo *cms, - int iter, int wrap_nid, int pbe_nid, - unsigned char *pass, - ossl_ssize_t passlen, - const EVP_CIPHER *kekciph); - -int CMS_RecipientInfo_decrypt(CMS_ContentInfo *cms, CMS_RecipientInfo *ri); - -int CMS_uncompress(CMS_ContentInfo *cms, BIO *dcont, BIO *out, - unsigned int flags); -CMS_ContentInfo *CMS_compress(BIO *in, int comp_nid, unsigned int flags); - -int CMS_set1_eContentType(CMS_ContentInfo *cms, const ASN1_OBJECT *oid); -const ASN1_OBJECT *CMS_get0_eContentType(CMS_ContentInfo *cms); - -CMS_CertificateChoices *CMS_add0_CertificateChoices(CMS_ContentInfo *cms); -int CMS_add0_cert(CMS_ContentInfo *cms, X509 *cert); -int CMS_add1_cert(CMS_ContentInfo *cms, X509 *cert); -STACK_OF(X509) *CMS_get1_certs(CMS_ContentInfo *cms); - -CMS_RevocationInfoChoice *CMS_add0_RevocationInfoChoice(CMS_ContentInfo *cms); -int CMS_add0_crl(CMS_ContentInfo *cms, X509_CRL *crl); -int CMS_add1_crl(CMS_ContentInfo *cms, X509_CRL *crl); -STACK_OF(X509_CRL) *CMS_get1_crls(CMS_ContentInfo *cms); - -int CMS_SignedData_init(CMS_ContentInfo *cms); -CMS_SignerInfo *CMS_add1_signer(CMS_ContentInfo *cms, - X509 *signer, EVP_PKEY *pk, const EVP_MD *md, - unsigned int flags); -STACK_OF(CMS_SignerInfo) *CMS_get0_SignerInfos(CMS_ContentInfo *cms); - -void CMS_SignerInfo_set1_signer_cert(CMS_SignerInfo *si, X509 *signer); -int CMS_SignerInfo_get0_signer_id(CMS_SignerInfo *si, - ASN1_OCTET_STRING **keyid, - X509_NAME **issuer, ASN1_INTEGER **sno); -int CMS_SignerInfo_cert_cmp(CMS_SignerInfo *si, X509 *cert); -int CMS_set1_signers_certs(CMS_ContentInfo *cms, STACK_OF(X509) *certs, - unsigned int flags); -void CMS_SignerInfo_get0_algs(CMS_SignerInfo *si, EVP_PKEY **pk, X509 **signer, - X509_ALGOR **pdig, X509_ALGOR **psig); -int CMS_SignerInfo_sign(CMS_SignerInfo *si); -int CMS_SignerInfo_verify(CMS_SignerInfo *si); -int CMS_SignerInfo_verify_content(CMS_SignerInfo *si, BIO *chain); - -int CMS_add_smimecap(CMS_SignerInfo *si, STACK_OF(X509_ALGOR) *algs); -int CMS_add_simple_smimecap(STACK_OF(X509_ALGOR) **algs, - int algnid, int keysize); -int CMS_add_standard_smimecap(STACK_OF(X509_ALGOR) **smcap); - -int CMS_signed_get_attr_count(const CMS_SignerInfo *si); -int CMS_signed_get_attr_by_NID(const CMS_SignerInfo *si, int nid, - int lastpos); -int CMS_signed_get_attr_by_OBJ(const CMS_SignerInfo *si, ASN1_OBJECT *obj, - int lastpos); -X509_ATTRIBUTE *CMS_signed_get_attr(const CMS_SignerInfo *si, int loc); -X509_ATTRIBUTE *CMS_signed_delete_attr(CMS_SignerInfo *si, int loc); -int CMS_signed_add1_attr(CMS_SignerInfo *si, X509_ATTRIBUTE *attr); -int CMS_signed_add1_attr_by_OBJ(CMS_SignerInfo *si, - const ASN1_OBJECT *obj, int type, - const void *bytes, int len); -int CMS_signed_add1_attr_by_NID(CMS_SignerInfo *si, - int nid, int type, - const void *bytes, int len); -int CMS_signed_add1_attr_by_txt(CMS_SignerInfo *si, - const char *attrname, int type, - const void *bytes, int len); -void *CMS_signed_get0_data_by_OBJ(CMS_SignerInfo *si, ASN1_OBJECT *oid, - int lastpos, int type); - -int CMS_unsigned_get_attr_count(const CMS_SignerInfo *si); -int CMS_unsigned_get_attr_by_NID(const CMS_SignerInfo *si, int nid, - int lastpos); -int CMS_unsigned_get_attr_by_OBJ(const CMS_SignerInfo *si, ASN1_OBJECT *obj, - int lastpos); -X509_ATTRIBUTE *CMS_unsigned_get_attr(const CMS_SignerInfo *si, int loc); -X509_ATTRIBUTE *CMS_unsigned_delete_attr(CMS_SignerInfo *si, int loc); -int CMS_unsigned_add1_attr(CMS_SignerInfo *si, X509_ATTRIBUTE *attr); -int CMS_unsigned_add1_attr_by_OBJ(CMS_SignerInfo *si, - const ASN1_OBJECT *obj, int type, - const void *bytes, int len); -int CMS_unsigned_add1_attr_by_NID(CMS_SignerInfo *si, - int nid, int type, - const void *bytes, int len); -int CMS_unsigned_add1_attr_by_txt(CMS_SignerInfo *si, - const char *attrname, int type, - const void *bytes, int len); -void *CMS_unsigned_get0_data_by_OBJ(CMS_SignerInfo *si, ASN1_OBJECT *oid, - int lastpos, int type); - -#ifdef HEADER_X509V3_H - -int CMS_get1_ReceiptRequest(CMS_SignerInfo *si, CMS_ReceiptRequest **prr); -CMS_ReceiptRequest *CMS_ReceiptRequest_create0(unsigned char *id, int idlen, - int allorfirst, - STACK_OF(GENERAL_NAMES) *receiptList, - STACK_OF(GENERAL_NAMES) *receiptsTo); -int CMS_add1_ReceiptRequest(CMS_SignerInfo *si, CMS_ReceiptRequest *rr); -void CMS_ReceiptRequest_get0_values(CMS_ReceiptRequest *rr, - ASN1_STRING **pcid, - int *pallorfirst, - STACK_OF(GENERAL_NAMES) **plist, - STACK_OF(GENERAL_NAMES) **prto); - -#endif - -/* BEGIN ERROR CODES */ -/* The following lines are auto generated by the script mkerr.pl. Any changes - * made after this point may be overwritten when the script is next run. - */ -void ERR_load_CMS_strings(void); - -/* Error codes for the CMS functions. */ - -/* Function codes. */ -#define CMS_F_CHECK_CONTENT 99 -#define CMS_F_CMS_ADD0_CERT 164 -#define CMS_F_CMS_ADD0_RECIPIENT_KEY 100 -#define CMS_F_CMS_ADD0_RECIPIENT_PASSWORD 165 -#define CMS_F_CMS_ADD1_RECEIPTREQUEST 158 -#define CMS_F_CMS_ADD1_RECIPIENT_CERT 101 -#define CMS_F_CMS_ADD1_SIGNER 102 -#define CMS_F_CMS_ADD1_SIGNINGTIME 103 -#define CMS_F_CMS_COMPRESS 104 -#define CMS_F_CMS_COMPRESSEDDATA_CREATE 105 -#define CMS_F_CMS_COMPRESSEDDATA_INIT_BIO 106 -#define CMS_F_CMS_COPY_CONTENT 107 -#define CMS_F_CMS_COPY_MESSAGEDIGEST 108 -#define CMS_F_CMS_DATA 109 -#define CMS_F_CMS_DATAFINAL 110 -#define CMS_F_CMS_DATAINIT 111 -#define CMS_F_CMS_DECRYPT 112 -#define CMS_F_CMS_DECRYPT_SET1_KEY 113 -#define CMS_F_CMS_DECRYPT_SET1_PASSWORD 166 -#define CMS_F_CMS_DECRYPT_SET1_PKEY 114 -#define CMS_F_CMS_DIGESTALGORITHM_FIND_CTX 115 -#define CMS_F_CMS_DIGESTALGORITHM_INIT_BIO 116 -#define CMS_F_CMS_DIGESTEDDATA_DO_FINAL 117 -#define CMS_F_CMS_DIGEST_VERIFY 118 -#define CMS_F_CMS_ENCODE_RECEIPT 161 -#define CMS_F_CMS_ENCRYPT 119 -#define CMS_F_CMS_ENCRYPTEDCONTENT_INIT_BIO 120 -#define CMS_F_CMS_ENCRYPTEDDATA_DECRYPT 121 -#define CMS_F_CMS_ENCRYPTEDDATA_ENCRYPT 122 -#define CMS_F_CMS_ENCRYPTEDDATA_SET1_KEY 123 -#define CMS_F_CMS_ENVELOPEDDATA_CREATE 124 -#define CMS_F_CMS_ENVELOPEDDATA_INIT_BIO 125 -#define CMS_F_CMS_ENVELOPED_DATA_INIT 126 -#define CMS_F_CMS_FINAL 127 -#define CMS_F_CMS_GET0_CERTIFICATE_CHOICES 128 -#define CMS_F_CMS_GET0_CONTENT 129 -#define CMS_F_CMS_GET0_ECONTENT_TYPE 130 -#define CMS_F_CMS_GET0_ENVELOPED 131 -#define CMS_F_CMS_GET0_REVOCATION_CHOICES 132 -#define CMS_F_CMS_GET0_SIGNED 133 -#define CMS_F_CMS_MSGSIGDIGEST_ADD1 162 -#define CMS_F_CMS_RECEIPTREQUEST_CREATE0 159 -#define CMS_F_CMS_RECEIPT_VERIFY 160 -#define CMS_F_CMS_RECIPIENTINFO_DECRYPT 134 -#define CMS_F_CMS_RECIPIENTINFO_KEKRI_DECRYPT 135 -#define CMS_F_CMS_RECIPIENTINFO_KEKRI_ENCRYPT 136 -#define CMS_F_CMS_RECIPIENTINFO_KEKRI_GET0_ID 137 -#define CMS_F_CMS_RECIPIENTINFO_KEKRI_ID_CMP 138 -#define CMS_F_CMS_RECIPIENTINFO_KTRI_CERT_CMP 139 -#define CMS_F_CMS_RECIPIENTINFO_KTRI_DECRYPT 140 -#define CMS_F_CMS_RECIPIENTINFO_KTRI_ENCRYPT 141 -#define CMS_F_CMS_RECIPIENTINFO_KTRI_GET0_ALGS 142 -#define CMS_F_CMS_RECIPIENTINFO_KTRI_GET0_SIGNER_ID 143 -#define CMS_F_CMS_RECIPIENTINFO_PWRI_CRYPT 167 -#define CMS_F_CMS_RECIPIENTINFO_SET0_KEY 144 -#define CMS_F_CMS_RECIPIENTINFO_SET0_PASSWORD 168 -#define CMS_F_CMS_RECIPIENTINFO_SET0_PKEY 145 -#define CMS_F_CMS_SET1_SIGNERIDENTIFIER 146 -#define CMS_F_CMS_SET_DETACHED 147 -#define CMS_F_CMS_SIGN 148 -#define CMS_F_CMS_SIGNED_DATA_INIT 149 -#define CMS_F_CMS_SIGNERINFO_CONTENT_SIGN 150 -#define CMS_F_CMS_SIGNERINFO_SIGN 151 -#define CMS_F_CMS_SIGNERINFO_VERIFY 152 -#define CMS_F_CMS_SIGNERINFO_VERIFY_CERT 153 -#define CMS_F_CMS_SIGNERINFO_VERIFY_CONTENT 154 -#define CMS_F_CMS_SIGN_RECEIPT 163 -#define CMS_F_CMS_STREAM 155 -#define CMS_F_CMS_UNCOMPRESS 156 -#define CMS_F_CMS_VERIFY 157 - -/* Reason codes. */ -#define CMS_R_ADD_SIGNER_ERROR 99 -#define CMS_R_CERTIFICATE_ALREADY_PRESENT 175 -#define CMS_R_CERTIFICATE_HAS_NO_KEYID 160 -#define CMS_R_CERTIFICATE_VERIFY_ERROR 100 -#define CMS_R_CIPHER_INITIALISATION_ERROR 101 -#define CMS_R_CIPHER_PARAMETER_INITIALISATION_ERROR 102 -#define CMS_R_CMS_DATAFINAL_ERROR 103 -#define CMS_R_CMS_LIB 104 -#define CMS_R_CONTENTIDENTIFIER_MISMATCH 170 -#define CMS_R_CONTENT_NOT_FOUND 105 -#define CMS_R_CONTENT_TYPE_MISMATCH 171 -#define CMS_R_CONTENT_TYPE_NOT_COMPRESSED_DATA 106 -#define CMS_R_CONTENT_TYPE_NOT_ENVELOPED_DATA 107 -#define CMS_R_CONTENT_TYPE_NOT_SIGNED_DATA 108 -#define CMS_R_CONTENT_VERIFY_ERROR 109 -#define CMS_R_CTRL_ERROR 110 -#define CMS_R_CTRL_FAILURE 111 -#define CMS_R_DECRYPT_ERROR 112 -#define CMS_R_DIGEST_ERROR 161 -#define CMS_R_ERROR_GETTING_PUBLIC_KEY 113 -#define CMS_R_ERROR_READING_MESSAGEDIGEST_ATTRIBUTE 114 -#define CMS_R_ERROR_SETTING_KEY 115 -#define CMS_R_ERROR_SETTING_RECIPIENTINFO 116 -#define CMS_R_INVALID_ENCRYPTED_KEY_LENGTH 117 -#define CMS_R_INVALID_KEY_ENCRYPTION_PARAMETER 176 -#define CMS_R_INVALID_KEY_LENGTH 118 -#define CMS_R_MD_BIO_INIT_ERROR 119 -#define CMS_R_MESSAGEDIGEST_ATTRIBUTE_WRONG_LENGTH 120 -#define CMS_R_MESSAGEDIGEST_WRONG_LENGTH 121 -#define CMS_R_MSGSIGDIGEST_ERROR 172 -#define CMS_R_MSGSIGDIGEST_VERIFICATION_FAILURE 162 -#define CMS_R_MSGSIGDIGEST_WRONG_LENGTH 163 -#define CMS_R_NEED_ONE_SIGNER 164 -#define CMS_R_NOT_A_SIGNED_RECEIPT 165 -#define CMS_R_NOT_ENCRYPTED_DATA 122 -#define CMS_R_NOT_KEK 123 -#define CMS_R_NOT_KEY_TRANSPORT 124 -#define CMS_R_NOT_PWRI 177 -#define CMS_R_NOT_SUPPORTED_FOR_THIS_KEY_TYPE 125 -#define CMS_R_NO_CIPHER 126 -#define CMS_R_NO_CONTENT 127 -#define CMS_R_NO_CONTENT_TYPE 173 -#define CMS_R_NO_DEFAULT_DIGEST 128 -#define CMS_R_NO_DIGEST_SET 129 -#define CMS_R_NO_KEY 130 -#define CMS_R_NO_KEY_OR_CERT 174 -#define CMS_R_NO_MATCHING_DIGEST 131 -#define CMS_R_NO_MATCHING_RECIPIENT 132 -#define CMS_R_NO_MATCHING_SIGNATURE 166 -#define CMS_R_NO_MSGSIGDIGEST 167 -#define CMS_R_NO_PASSWORD 178 -#define CMS_R_NO_PRIVATE_KEY 133 -#define CMS_R_NO_PUBLIC_KEY 134 -#define CMS_R_NO_RECEIPT_REQUEST 168 -#define CMS_R_NO_SIGNERS 135 -#define CMS_R_PRIVATE_KEY_DOES_NOT_MATCH_CERTIFICATE 136 -#define CMS_R_RECEIPT_DECODE_ERROR 169 -#define CMS_R_RECIPIENT_ERROR 137 -#define CMS_R_SIGNER_CERTIFICATE_NOT_FOUND 138 -#define CMS_R_SIGNFINAL_ERROR 139 -#define CMS_R_SMIME_TEXT_ERROR 140 -#define CMS_R_STORE_INIT_ERROR 141 -#define CMS_R_TYPE_NOT_COMPRESSED_DATA 142 -#define CMS_R_TYPE_NOT_DATA 143 -#define CMS_R_TYPE_NOT_DIGESTED_DATA 144 -#define CMS_R_TYPE_NOT_ENCRYPTED_DATA 145 -#define CMS_R_TYPE_NOT_ENVELOPED_DATA 146 -#define CMS_R_UNABLE_TO_FINALIZE_CONTEXT 147 -#define CMS_R_UNKNOWN_CIPHER 148 -#define CMS_R_UNKNOWN_DIGEST_ALGORIHM 149 -#define CMS_R_UNKNOWN_ID 150 -#define CMS_R_UNSUPPORTED_COMPRESSION_ALGORITHM 151 -#define CMS_R_UNSUPPORTED_CONTENT_TYPE 152 -#define CMS_R_UNSUPPORTED_KEK_ALGORITHM 153 -#define CMS_R_UNSUPPORTED_KEY_ENCRYPTION_ALGORITHM 179 -#define CMS_R_UNSUPPORTED_RECIPIENT_TYPE 154 -#define CMS_R_UNSUPPORTED_RECPIENTINFO_TYPE 155 -#define CMS_R_UNSUPPORTED_TYPE 156 -#define CMS_R_UNWRAP_ERROR 157 -#define CMS_R_UNWRAP_FAILURE 180 -#define CMS_R_VERIFICATION_FAILURE 158 -#define CMS_R_WRAP_ERROR 159 - -#ifdef __cplusplus -} -#endif -#endif diff --git a/Pods/OpenSSL-Universal/include-osx/openssl/comp.h b/Pods/OpenSSL-Universal/include-osx/openssl/comp.h deleted file mode 100644 index 4b405c7d..00000000 --- a/Pods/OpenSSL-Universal/include-osx/openssl/comp.h +++ /dev/null @@ -1,80 +0,0 @@ - -#ifndef HEADER_COMP_H -#define HEADER_COMP_H - -#include - -#ifdef __cplusplus -extern "C" { -#endif - -typedef struct comp_ctx_st COMP_CTX; - -typedef struct comp_method_st - { - int type; /* NID for compression library */ - const char *name; /* A text string to identify the library */ - int (*init)(COMP_CTX *ctx); - void (*finish)(COMP_CTX *ctx); - int (*compress)(COMP_CTX *ctx, - unsigned char *out, unsigned int olen, - unsigned char *in, unsigned int ilen); - int (*expand)(COMP_CTX *ctx, - unsigned char *out, unsigned int olen, - unsigned char *in, unsigned int ilen); - /* The following two do NOTHING, but are kept for backward compatibility */ - long (*ctrl)(void); - long (*callback_ctrl)(void); - } COMP_METHOD; - -struct comp_ctx_st - { - COMP_METHOD *meth; - unsigned long compress_in; - unsigned long compress_out; - unsigned long expand_in; - unsigned long expand_out; - - CRYPTO_EX_DATA ex_data; - }; - - -COMP_CTX *COMP_CTX_new(COMP_METHOD *meth); -void COMP_CTX_free(COMP_CTX *ctx); -int COMP_compress_block(COMP_CTX *ctx, unsigned char *out, int olen, - unsigned char *in, int ilen); -int COMP_expand_block(COMP_CTX *ctx, unsigned char *out, int olen, - unsigned char *in, int ilen); -COMP_METHOD *COMP_rle(void ); -COMP_METHOD *COMP_zlib(void ); -void COMP_zlib_cleanup(void); - -#ifdef HEADER_BIO_H -#ifdef ZLIB -BIO_METHOD *BIO_f_zlib(void); -#endif -#endif - -/* BEGIN ERROR CODES */ -/* The following lines are auto generated by the script mkerr.pl. Any changes - * made after this point may be overwritten when the script is next run. - */ -void ERR_load_COMP_strings(void); - -/* Error codes for the COMP functions. */ - -/* Function codes. */ -#define COMP_F_BIO_ZLIB_FLUSH 99 -#define COMP_F_BIO_ZLIB_NEW 100 -#define COMP_F_BIO_ZLIB_READ 101 -#define COMP_F_BIO_ZLIB_WRITE 102 - -/* Reason codes. */ -#define COMP_R_ZLIB_DEFLATE_ERROR 99 -#define COMP_R_ZLIB_INFLATE_ERROR 100 -#define COMP_R_ZLIB_NOT_SUPPORTED 101 - -#ifdef __cplusplus -} -#endif -#endif diff --git a/Pods/OpenSSL-Universal/include-osx/openssl/conf.h b/Pods/OpenSSL-Universal/include-osx/openssl/conf.h deleted file mode 100644 index c2199978..00000000 --- a/Pods/OpenSSL-Universal/include-osx/openssl/conf.h +++ /dev/null @@ -1,263 +0,0 @@ -/* crypto/conf/conf.h */ -/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) - * All rights reserved. - * - * This package is an SSL implementation written - * by Eric Young (eay@cryptsoft.com). - * The implementation was written so as to conform with Netscapes SSL. - * - * This library is free for commercial and non-commercial use as long as - * the following conditions are aheared to. The following conditions - * apply to all code found in this distribution, be it the RC4, RSA, - * lhash, DES, etc., code; not just the SSL code. The SSL documentation - * included with this distribution is covered by the same copyright terms - * except that the holder is Tim Hudson (tjh@cryptsoft.com). - * - * Copyright remains Eric Young's, and as such any Copyright notices in - * the code are not to be removed. - * If this package is used in a product, Eric Young should be given attribution - * as the author of the parts of the library used. - * This can be in the form of a textual message at program startup or - * in documentation (online or textual) provided with the package. - * - * Redistribution and use in source and binary forms, with or without - * modification, are permitted provided that the following conditions - * are met: - * 1. Redistributions of source code must retain the copyright - * notice, this list of conditions and the following disclaimer. - * 2. Redistributions in binary form must reproduce the above copyright - * notice, this list of conditions and the following disclaimer in the - * documentation and/or other materials provided with the distribution. - * 3. All advertising materials mentioning features or use of this software - * must display the following acknowledgement: - * "This product includes cryptographic software written by - * Eric Young (eay@cryptsoft.com)" - * The word 'cryptographic' can be left out if the rouines from the library - * being used are not cryptographic related :-). - * 4. If you include any Windows specific code (or a derivative thereof) from - * the apps directory (application code) you must include an acknowledgement: - * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" - * - * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND - * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE - * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE - * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE - * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL - * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS - * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) - * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT - * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY - * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF - * SUCH DAMAGE. - * - * The licence and distribution terms for any publically available version or - * derivative of this code cannot be changed. i.e. this code cannot simply be - * copied and put under another distribution licence - * [including the GNU Public Licence.] - */ - -#ifndef HEADER_CONF_H -#define HEADER_CONF_H - -#include -#include -#include -#include -#include - -#include - -#ifdef __cplusplus -extern "C" { -#endif - -typedef struct - { - char *section; - char *name; - char *value; - } CONF_VALUE; - -DECLARE_STACK_OF(CONF_VALUE) -DECLARE_LHASH_OF(CONF_VALUE); - -struct conf_st; -struct conf_method_st; -typedef struct conf_method_st CONF_METHOD; - -struct conf_method_st - { - const char *name; - CONF *(*create)(CONF_METHOD *meth); - int (*init)(CONF *conf); - int (*destroy)(CONF *conf); - int (*destroy_data)(CONF *conf); - int (*load_bio)(CONF *conf, BIO *bp, long *eline); - int (*dump)(const CONF *conf, BIO *bp); - int (*is_number)(const CONF *conf, char c); - int (*to_int)(const CONF *conf, char c); - int (*load)(CONF *conf, const char *name, long *eline); - }; - -/* Module definitions */ - -typedef struct conf_imodule_st CONF_IMODULE; -typedef struct conf_module_st CONF_MODULE; - -DECLARE_STACK_OF(CONF_MODULE) -DECLARE_STACK_OF(CONF_IMODULE) - -/* DSO module function typedefs */ -typedef int conf_init_func(CONF_IMODULE *md, const CONF *cnf); -typedef void conf_finish_func(CONF_IMODULE *md); - -#define CONF_MFLAGS_IGNORE_ERRORS 0x1 -#define CONF_MFLAGS_IGNORE_RETURN_CODES 0x2 -#define CONF_MFLAGS_SILENT 0x4 -#define CONF_MFLAGS_NO_DSO 0x8 -#define CONF_MFLAGS_IGNORE_MISSING_FILE 0x10 -#define CONF_MFLAGS_DEFAULT_SECTION 0x20 - -int CONF_set_default_method(CONF_METHOD *meth); -void CONF_set_nconf(CONF *conf,LHASH_OF(CONF_VALUE) *hash); -LHASH_OF(CONF_VALUE) *CONF_load(LHASH_OF(CONF_VALUE) *conf,const char *file, - long *eline); -#ifndef OPENSSL_NO_FP_API -LHASH_OF(CONF_VALUE) *CONF_load_fp(LHASH_OF(CONF_VALUE) *conf, FILE *fp, - long *eline); -#endif -LHASH_OF(CONF_VALUE) *CONF_load_bio(LHASH_OF(CONF_VALUE) *conf, BIO *bp,long *eline); -STACK_OF(CONF_VALUE) *CONF_get_section(LHASH_OF(CONF_VALUE) *conf, - const char *section); -char *CONF_get_string(LHASH_OF(CONF_VALUE) *conf,const char *group, - const char *name); -long CONF_get_number(LHASH_OF(CONF_VALUE) *conf,const char *group, - const char *name); -void CONF_free(LHASH_OF(CONF_VALUE) *conf); -int CONF_dump_fp(LHASH_OF(CONF_VALUE) *conf, FILE *out); -int CONF_dump_bio(LHASH_OF(CONF_VALUE) *conf, BIO *out); - -void OPENSSL_config(const char *config_name); -void OPENSSL_no_config(void); - -/* New conf code. The semantics are different from the functions above. - If that wasn't the case, the above functions would have been replaced */ - -struct conf_st - { - CONF_METHOD *meth; - void *meth_data; - LHASH_OF(CONF_VALUE) *data; - }; - -CONF *NCONF_new(CONF_METHOD *meth); -CONF_METHOD *NCONF_default(void); -CONF_METHOD *NCONF_WIN32(void); -#if 0 /* Just to give you an idea of what I have in mind */ -CONF_METHOD *NCONF_XML(void); -#endif -void NCONF_free(CONF *conf); -void NCONF_free_data(CONF *conf); - -int NCONF_load(CONF *conf,const char *file,long *eline); -#ifndef OPENSSL_NO_FP_API -int NCONF_load_fp(CONF *conf, FILE *fp,long *eline); -#endif -int NCONF_load_bio(CONF *conf, BIO *bp,long *eline); -STACK_OF(CONF_VALUE) *NCONF_get_section(const CONF *conf,const char *section); -char *NCONF_get_string(const CONF *conf,const char *group,const char *name); -int NCONF_get_number_e(const CONF *conf,const char *group,const char *name, - long *result); -int NCONF_dump_fp(const CONF *conf, FILE *out); -int NCONF_dump_bio(const CONF *conf, BIO *out); - -#if 0 /* The following function has no error checking, - and should therefore be avoided */ -long NCONF_get_number(CONF *conf,char *group,char *name); -#else -#define NCONF_get_number(c,g,n,r) NCONF_get_number_e(c,g,n,r) -#endif - -/* Module functions */ - -int CONF_modules_load(const CONF *cnf, const char *appname, - unsigned long flags); -int CONF_modules_load_file(const char *filename, const char *appname, - unsigned long flags); -void CONF_modules_unload(int all); -void CONF_modules_finish(void); -void CONF_modules_free(void); -int CONF_module_add(const char *name, conf_init_func *ifunc, - conf_finish_func *ffunc); - -const char *CONF_imodule_get_name(const CONF_IMODULE *md); -const char *CONF_imodule_get_value(const CONF_IMODULE *md); -void *CONF_imodule_get_usr_data(const CONF_IMODULE *md); -void CONF_imodule_set_usr_data(CONF_IMODULE *md, void *usr_data); -CONF_MODULE *CONF_imodule_get_module(const CONF_IMODULE *md); -unsigned long CONF_imodule_get_flags(const CONF_IMODULE *md); -void CONF_imodule_set_flags(CONF_IMODULE *md, unsigned long flags); -void *CONF_module_get_usr_data(CONF_MODULE *pmod); -void CONF_module_set_usr_data(CONF_MODULE *pmod, void *usr_data); - -char *CONF_get1_default_config_file(void); - -int CONF_parse_list(const char *list, int sep, int nospc, - int (*list_cb)(const char *elem, int len, void *usr), void *arg); - -void OPENSSL_load_builtin_modules(void); - -/* BEGIN ERROR CODES */ -/* The following lines are auto generated by the script mkerr.pl. Any changes - * made after this point may be overwritten when the script is next run. - */ -void ERR_load_CONF_strings(void); - -/* Error codes for the CONF functions. */ - -/* Function codes. */ -#define CONF_F_CONF_DUMP_FP 104 -#define CONF_F_CONF_LOAD 100 -#define CONF_F_CONF_LOAD_BIO 102 -#define CONF_F_CONF_LOAD_FP 103 -#define CONF_F_CONF_MODULES_LOAD 116 -#define CONF_F_CONF_PARSE_LIST 119 -#define CONF_F_DEF_LOAD 120 -#define CONF_F_DEF_LOAD_BIO 121 -#define CONF_F_MODULE_INIT 115 -#define CONF_F_MODULE_LOAD_DSO 117 -#define CONF_F_MODULE_RUN 118 -#define CONF_F_NCONF_DUMP_BIO 105 -#define CONF_F_NCONF_DUMP_FP 106 -#define CONF_F_NCONF_GET_NUMBER 107 -#define CONF_F_NCONF_GET_NUMBER_E 112 -#define CONF_F_NCONF_GET_SECTION 108 -#define CONF_F_NCONF_GET_STRING 109 -#define CONF_F_NCONF_LOAD 113 -#define CONF_F_NCONF_LOAD_BIO 110 -#define CONF_F_NCONF_LOAD_FP 114 -#define CONF_F_NCONF_NEW 111 -#define CONF_F_STR_COPY 101 - -/* Reason codes. */ -#define CONF_R_ERROR_LOADING_DSO 110 -#define CONF_R_LIST_CANNOT_BE_NULL 115 -#define CONF_R_MISSING_CLOSE_SQUARE_BRACKET 100 -#define CONF_R_MISSING_EQUAL_SIGN 101 -#define CONF_R_MISSING_FINISH_FUNCTION 111 -#define CONF_R_MISSING_INIT_FUNCTION 112 -#define CONF_R_MODULE_INITIALIZATION_ERROR 109 -#define CONF_R_NO_CLOSE_BRACE 102 -#define CONF_R_NO_CONF 105 -#define CONF_R_NO_CONF_OR_ENVIRONMENT_VARIABLE 106 -#define CONF_R_NO_SECTION 107 -#define CONF_R_NO_SUCH_FILE 114 -#define CONF_R_NO_VALUE 108 -#define CONF_R_UNABLE_TO_CREATE_NEW_SECTION 103 -#define CONF_R_UNKNOWN_MODULE_NAME 113 -#define CONF_R_VARIABLE_HAS_NO_VALUE 104 - -#ifdef __cplusplus -} -#endif -#endif diff --git a/Pods/OpenSSL-Universal/include-osx/openssl/conf_api.h b/Pods/OpenSSL-Universal/include-osx/openssl/conf_api.h deleted file mode 100644 index 87a954af..00000000 --- a/Pods/OpenSSL-Universal/include-osx/openssl/conf_api.h +++ /dev/null @@ -1,89 +0,0 @@ -/* conf_api.h */ -/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) - * All rights reserved. - * - * This package is an SSL implementation written - * by Eric Young (eay@cryptsoft.com). - * The implementation was written so as to conform with Netscapes SSL. - * - * This library is free for commercial and non-commercial use as long as - * the following conditions are aheared to. The following conditions - * apply to all code found in this distribution, be it the RC4, RSA, - * lhash, DES, etc., code; not just the SSL code. The SSL documentation - * included with this distribution is covered by the same copyright terms - * except that the holder is Tim Hudson (tjh@cryptsoft.com). - * - * Copyright remains Eric Young's, and as such any Copyright notices in - * the code are not to be removed. - * If this package is used in a product, Eric Young should be given attribution - * as the author of the parts of the library used. - * This can be in the form of a textual message at program startup or - * in documentation (online or textual) provided with the package. - * - * Redistribution and use in source and binary forms, with or without - * modification, are permitted provided that the following conditions - * are met: - * 1. Redistributions of source code must retain the copyright - * notice, this list of conditions and the following disclaimer. - * 2. Redistributions in binary form must reproduce the above copyright - * notice, this list of conditions and the following disclaimer in the - * documentation and/or other materials provided with the distribution. - * 3. All advertising materials mentioning features or use of this software - * must display the following acknowledgement: - * "This product includes cryptographic software written by - * Eric Young (eay@cryptsoft.com)" - * The word 'cryptographic' can be left out if the rouines from the library - * being used are not cryptographic related :-). - * 4. If you include any Windows specific code (or a derivative thereof) from - * the apps directory (application code) you must include an acknowledgement: - * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" - * - * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND - * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE - * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE - * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE - * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL - * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS - * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) - * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT - * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY - * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF - * SUCH DAMAGE. - * - * The licence and distribution terms for any publically available version or - * derivative of this code cannot be changed. i.e. this code cannot simply be - * copied and put under another distribution licence - * [including the GNU Public Licence.] - */ - -#ifndef HEADER_CONF_API_H -#define HEADER_CONF_API_H - -#include -#include - -#ifdef __cplusplus -extern "C" { -#endif - -/* Up until OpenSSL 0.9.5a, this was new_section */ -CONF_VALUE *_CONF_new_section(CONF *conf, const char *section); -/* Up until OpenSSL 0.9.5a, this was get_section */ -CONF_VALUE *_CONF_get_section(const CONF *conf, const char *section); -/* Up until OpenSSL 0.9.5a, this was CONF_get_section */ -STACK_OF(CONF_VALUE) *_CONF_get_section_values(const CONF *conf, - const char *section); - -int _CONF_add_string(CONF *conf, CONF_VALUE *section, CONF_VALUE *value); -char *_CONF_get_string(const CONF *conf, const char *section, - const char *name); -long _CONF_get_number(const CONF *conf, const char *section, const char *name); - -int _CONF_new_data(CONF *conf); -void _CONF_free_data(CONF *conf); - -#ifdef __cplusplus -} -#endif -#endif - diff --git a/Pods/OpenSSL-Universal/include-osx/openssl/crypto.h b/Pods/OpenSSL-Universal/include-osx/openssl/crypto.h deleted file mode 100644 index f92fc518..00000000 --- a/Pods/OpenSSL-Universal/include-osx/openssl/crypto.h +++ /dev/null @@ -1,611 +0,0 @@ -/* crypto/crypto.h */ -/* ==================================================================== - * Copyright (c) 1998-2006 The OpenSSL Project. All rights reserved. - * - * Redistribution and use in source and binary forms, with or without - * modification, are permitted provided that the following conditions - * are met: - * - * 1. Redistributions of source code must retain the above copyright - * notice, this list of conditions and the following disclaimer. - * - * 2. Redistributions in binary form must reproduce the above copyright - * notice, this list of conditions and the following disclaimer in - * the documentation and/or other materials provided with the - * distribution. - * - * 3. All advertising materials mentioning features or use of this - * software must display the following acknowledgment: - * "This product includes software developed by the OpenSSL Project - * for use in the OpenSSL Toolkit. (http://www.openssl.org/)" - * - * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to - * endorse or promote products derived from this software without - * prior written permission. For written permission, please contact - * openssl-core@openssl.org. - * - * 5. Products derived from this software may not be called "OpenSSL" - * nor may "OpenSSL" appear in their names without prior written - * permission of the OpenSSL Project. - * - * 6. Redistributions of any form whatsoever must retain the following - * acknowledgment: - * "This product includes software developed by the OpenSSL Project - * for use in the OpenSSL Toolkit (http://www.openssl.org/)" - * - * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY - * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE - * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR - * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR - * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, - * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT - * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; - * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) - * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, - * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) - * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED - * OF THE POSSIBILITY OF SUCH DAMAGE. - * ==================================================================== - * - * This product includes cryptographic software written by Eric Young - * (eay@cryptsoft.com). This product includes software written by Tim - * Hudson (tjh@cryptsoft.com). - * - */ -/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) - * All rights reserved. - * - * This package is an SSL implementation written - * by Eric Young (eay@cryptsoft.com). - * The implementation was written so as to conform with Netscapes SSL. - * - * This library is free for commercial and non-commercial use as long as - * the following conditions are aheared to. The following conditions - * apply to all code found in this distribution, be it the RC4, RSA, - * lhash, DES, etc., code; not just the SSL code. The SSL documentation - * included with this distribution is covered by the same copyright terms - * except that the holder is Tim Hudson (tjh@cryptsoft.com). - * - * Copyright remains Eric Young's, and as such any Copyright notices in - * the code are not to be removed. - * If this package is used in a product, Eric Young should be given attribution - * as the author of the parts of the library used. - * This can be in the form of a textual message at program startup or - * in documentation (online or textual) provided with the package. - * - * Redistribution and use in source and binary forms, with or without - * modification, are permitted provided that the following conditions - * are met: - * 1. Redistributions of source code must retain the copyright - * notice, this list of conditions and the following disclaimer. - * 2. Redistributions in binary form must reproduce the above copyright - * notice, this list of conditions and the following disclaimer in the - * documentation and/or other materials provided with the distribution. - * 3. All advertising materials mentioning features or use of this software - * must display the following acknowledgement: - * "This product includes cryptographic software written by - * Eric Young (eay@cryptsoft.com)" - * The word 'cryptographic' can be left out if the rouines from the library - * being used are not cryptographic related :-). - * 4. If you include any Windows specific code (or a derivative thereof) from - * the apps directory (application code) you must include an acknowledgement: - * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" - * - * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND - * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE - * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE - * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE - * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL - * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS - * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) - * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT - * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY - * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF - * SUCH DAMAGE. - * - * The licence and distribution terms for any publically available version or - * derivative of this code cannot be changed. i.e. this code cannot simply be - * copied and put under another distribution licence - * [including the GNU Public Licence.] - */ -/* ==================================================================== - * Copyright 2002 Sun Microsystems, Inc. ALL RIGHTS RESERVED. - * ECDH support in OpenSSL originally developed by - * SUN MICROSYSTEMS, INC., and contributed to the OpenSSL project. - */ - -#ifndef HEADER_CRYPTO_H -#define HEADER_CRYPTO_H - -#include - -#include - -#ifndef OPENSSL_NO_FP_API -#include -#endif - -#include -#include -#include -#include - -#ifdef CHARSET_EBCDIC -#include -#endif - -/* Resolve problems on some operating systems with symbol names that clash - one way or another */ -#include - -#ifdef __cplusplus -extern "C" { -#endif - -/* Backward compatibility to SSLeay */ -/* This is more to be used to check the correct DLL is being used - * in the MS world. */ -#define SSLEAY_VERSION_NUMBER OPENSSL_VERSION_NUMBER -#define SSLEAY_VERSION 0 -/* #define SSLEAY_OPTIONS 1 no longer supported */ -#define SSLEAY_CFLAGS 2 -#define SSLEAY_BUILT_ON 3 -#define SSLEAY_PLATFORM 4 -#define SSLEAY_DIR 5 - -/* Already declared in ossl_typ.h */ -#if 0 -typedef struct crypto_ex_data_st CRYPTO_EX_DATA; -/* Called when a new object is created */ -typedef int CRYPTO_EX_new(void *parent, void *ptr, CRYPTO_EX_DATA *ad, - int idx, long argl, void *argp); -/* Called when an object is free()ed */ -typedef void CRYPTO_EX_free(void *parent, void *ptr, CRYPTO_EX_DATA *ad, - int idx, long argl, void *argp); -/* Called when we need to dup an object */ -typedef int CRYPTO_EX_dup(CRYPTO_EX_DATA *to, CRYPTO_EX_DATA *from, void *from_d, - int idx, long argl, void *argp); -#endif - -/* A generic structure to pass assorted data in a expandable way */ -typedef struct openssl_item_st - { - int code; - void *value; /* Not used for flag attributes */ - size_t value_size; /* Max size of value for output, length for input */ - size_t *value_length; /* Returned length of value for output */ - } OPENSSL_ITEM; - - -/* When changing the CRYPTO_LOCK_* list, be sure to maintin the text lock - * names in cryptlib.c - */ - -#define CRYPTO_LOCK_ERR 1 -#define CRYPTO_LOCK_EX_DATA 2 -#define CRYPTO_LOCK_X509 3 -#define CRYPTO_LOCK_X509_INFO 4 -#define CRYPTO_LOCK_X509_PKEY 5 -#define CRYPTO_LOCK_X509_CRL 6 -#define CRYPTO_LOCK_X509_REQ 7 -#define CRYPTO_LOCK_DSA 8 -#define CRYPTO_LOCK_RSA 9 -#define CRYPTO_LOCK_EVP_PKEY 10 -#define CRYPTO_LOCK_X509_STORE 11 -#define CRYPTO_LOCK_SSL_CTX 12 -#define CRYPTO_LOCK_SSL_CERT 13 -#define CRYPTO_LOCK_SSL_SESSION 14 -#define CRYPTO_LOCK_SSL_SESS_CERT 15 -#define CRYPTO_LOCK_SSL 16 -#define CRYPTO_LOCK_SSL_METHOD 17 -#define CRYPTO_LOCK_RAND 18 -#define CRYPTO_LOCK_RAND2 19 -#define CRYPTO_LOCK_MALLOC 20 -#define CRYPTO_LOCK_BIO 21 -#define CRYPTO_LOCK_GETHOSTBYNAME 22 -#define CRYPTO_LOCK_GETSERVBYNAME 23 -#define CRYPTO_LOCK_READDIR 24 -#define CRYPTO_LOCK_RSA_BLINDING 25 -#define CRYPTO_LOCK_DH 26 -#define CRYPTO_LOCK_MALLOC2 27 -#define CRYPTO_LOCK_DSO 28 -#define CRYPTO_LOCK_DYNLOCK 29 -#define CRYPTO_LOCK_ENGINE 30 -#define CRYPTO_LOCK_UI 31 -#define CRYPTO_LOCK_ECDSA 32 -#define CRYPTO_LOCK_EC 33 -#define CRYPTO_LOCK_ECDH 34 -#define CRYPTO_LOCK_BN 35 -#define CRYPTO_LOCK_EC_PRE_COMP 36 -#define CRYPTO_LOCK_STORE 37 -#define CRYPTO_LOCK_COMP 38 -#define CRYPTO_LOCK_FIPS 39 -#define CRYPTO_LOCK_FIPS2 40 -#define CRYPTO_NUM_LOCKS 41 - -#define CRYPTO_LOCK 1 -#define CRYPTO_UNLOCK 2 -#define CRYPTO_READ 4 -#define CRYPTO_WRITE 8 - -#ifndef OPENSSL_NO_LOCKING -#ifndef CRYPTO_w_lock -#define CRYPTO_w_lock(type) \ - CRYPTO_lock(CRYPTO_LOCK|CRYPTO_WRITE,type,__FILE__,__LINE__) -#define CRYPTO_w_unlock(type) \ - CRYPTO_lock(CRYPTO_UNLOCK|CRYPTO_WRITE,type,__FILE__,__LINE__) -#define CRYPTO_r_lock(type) \ - CRYPTO_lock(CRYPTO_LOCK|CRYPTO_READ,type,__FILE__,__LINE__) -#define CRYPTO_r_unlock(type) \ - CRYPTO_lock(CRYPTO_UNLOCK|CRYPTO_READ,type,__FILE__,__LINE__) -#define CRYPTO_add(addr,amount,type) \ - CRYPTO_add_lock(addr,amount,type,__FILE__,__LINE__) -#endif -#else -#define CRYPTO_w_lock(a) -#define CRYPTO_w_unlock(a) -#define CRYPTO_r_lock(a) -#define CRYPTO_r_unlock(a) -#define CRYPTO_add(a,b,c) ((*(a))+=(b)) -#endif - -/* Some applications as well as some parts of OpenSSL need to allocate - and deallocate locks in a dynamic fashion. The following typedef - makes this possible in a type-safe manner. */ -/* struct CRYPTO_dynlock_value has to be defined by the application. */ -typedef struct - { - int references; - struct CRYPTO_dynlock_value *data; - } CRYPTO_dynlock; - - -/* The following can be used to detect memory leaks in the SSLeay library. - * It used, it turns on malloc checking */ - -#define CRYPTO_MEM_CHECK_OFF 0x0 /* an enume */ -#define CRYPTO_MEM_CHECK_ON 0x1 /* a bit */ -#define CRYPTO_MEM_CHECK_ENABLE 0x2 /* a bit */ -#define CRYPTO_MEM_CHECK_DISABLE 0x3 /* an enume */ - -/* The following are bit values to turn on or off options connected to the - * malloc checking functionality */ - -/* Adds time to the memory checking information */ -#define V_CRYPTO_MDEBUG_TIME 0x1 /* a bit */ -/* Adds thread number to the memory checking information */ -#define V_CRYPTO_MDEBUG_THREAD 0x2 /* a bit */ - -#define V_CRYPTO_MDEBUG_ALL (V_CRYPTO_MDEBUG_TIME | V_CRYPTO_MDEBUG_THREAD) - - -/* predec of the BIO type */ -typedef struct bio_st BIO_dummy; - -struct crypto_ex_data_st - { - STACK_OF(void) *sk; - int dummy; /* gcc is screwing up this data structure :-( */ - }; -DECLARE_STACK_OF(void) - -/* This stuff is basically class callback functions - * The current classes are SSL_CTX, SSL, SSL_SESSION, and a few more */ - -typedef struct crypto_ex_data_func_st - { - long argl; /* Arbitary long */ - void *argp; /* Arbitary void * */ - CRYPTO_EX_new *new_func; - CRYPTO_EX_free *free_func; - CRYPTO_EX_dup *dup_func; - } CRYPTO_EX_DATA_FUNCS; - -DECLARE_STACK_OF(CRYPTO_EX_DATA_FUNCS) - -/* Per class, we have a STACK of CRYPTO_EX_DATA_FUNCS for each CRYPTO_EX_DATA - * entry. - */ - -#define CRYPTO_EX_INDEX_BIO 0 -#define CRYPTO_EX_INDEX_SSL 1 -#define CRYPTO_EX_INDEX_SSL_CTX 2 -#define CRYPTO_EX_INDEX_SSL_SESSION 3 -#define CRYPTO_EX_INDEX_X509_STORE 4 -#define CRYPTO_EX_INDEX_X509_STORE_CTX 5 -#define CRYPTO_EX_INDEX_RSA 6 -#define CRYPTO_EX_INDEX_DSA 7 -#define CRYPTO_EX_INDEX_DH 8 -#define CRYPTO_EX_INDEX_ENGINE 9 -#define CRYPTO_EX_INDEX_X509 10 -#define CRYPTO_EX_INDEX_UI 11 -#define CRYPTO_EX_INDEX_ECDSA 12 -#define CRYPTO_EX_INDEX_ECDH 13 -#define CRYPTO_EX_INDEX_COMP 14 -#define CRYPTO_EX_INDEX_STORE 15 - -/* Dynamically assigned indexes start from this value (don't use directly, use - * via CRYPTO_ex_data_new_class). */ -#define CRYPTO_EX_INDEX_USER 100 - - -/* This is the default callbacks, but we can have others as well: - * this is needed in Win32 where the application malloc and the - * library malloc may not be the same. - */ -#define CRYPTO_malloc_init() CRYPTO_set_mem_functions(\ - malloc, realloc, free) - -#if defined CRYPTO_MDEBUG_ALL || defined CRYPTO_MDEBUG_TIME || defined CRYPTO_MDEBUG_THREAD -# ifndef CRYPTO_MDEBUG /* avoid duplicate #define */ -# define CRYPTO_MDEBUG -# endif -#endif - -/* Set standard debugging functions (not done by default - * unless CRYPTO_MDEBUG is defined) */ -#define CRYPTO_malloc_debug_init() do {\ - CRYPTO_set_mem_debug_functions(\ - CRYPTO_dbg_malloc,\ - CRYPTO_dbg_realloc,\ - CRYPTO_dbg_free,\ - CRYPTO_dbg_set_options,\ - CRYPTO_dbg_get_options);\ - } while(0) - -int CRYPTO_mem_ctrl(int mode); -int CRYPTO_is_mem_check_on(void); - -/* for applications */ -#define MemCheck_start() CRYPTO_mem_ctrl(CRYPTO_MEM_CHECK_ON) -#define MemCheck_stop() CRYPTO_mem_ctrl(CRYPTO_MEM_CHECK_OFF) - -/* for library-internal use */ -#define MemCheck_on() CRYPTO_mem_ctrl(CRYPTO_MEM_CHECK_ENABLE) -#define MemCheck_off() CRYPTO_mem_ctrl(CRYPTO_MEM_CHECK_DISABLE) -#define is_MemCheck_on() CRYPTO_is_mem_check_on() - -#define OPENSSL_malloc(num) CRYPTO_malloc((int)num,__FILE__,__LINE__) -#define OPENSSL_strdup(str) CRYPTO_strdup((str),__FILE__,__LINE__) -#define OPENSSL_realloc(addr,num) \ - CRYPTO_realloc((char *)addr,(int)num,__FILE__,__LINE__) -#define OPENSSL_realloc_clean(addr,old_num,num) \ - CRYPTO_realloc_clean(addr,old_num,num,__FILE__,__LINE__) -#define OPENSSL_remalloc(addr,num) \ - CRYPTO_remalloc((char **)addr,(int)num,__FILE__,__LINE__) -#define OPENSSL_freeFunc CRYPTO_free -#define OPENSSL_free(addr) CRYPTO_free(addr) - -#define OPENSSL_malloc_locked(num) \ - CRYPTO_malloc_locked((int)num,__FILE__,__LINE__) -#define OPENSSL_free_locked(addr) CRYPTO_free_locked(addr) - - -const char *SSLeay_version(int type); -unsigned long SSLeay(void); - -int OPENSSL_issetugid(void); - -/* An opaque type representing an implementation of "ex_data" support */ -typedef struct st_CRYPTO_EX_DATA_IMPL CRYPTO_EX_DATA_IMPL; -/* Return an opaque pointer to the current "ex_data" implementation */ -const CRYPTO_EX_DATA_IMPL *CRYPTO_get_ex_data_implementation(void); -/* Sets the "ex_data" implementation to be used (if it's not too late) */ -int CRYPTO_set_ex_data_implementation(const CRYPTO_EX_DATA_IMPL *i); -/* Get a new "ex_data" class, and return the corresponding "class_index" */ -int CRYPTO_ex_data_new_class(void); -/* Within a given class, get/register a new index */ -int CRYPTO_get_ex_new_index(int class_index, long argl, void *argp, - CRYPTO_EX_new *new_func, CRYPTO_EX_dup *dup_func, - CRYPTO_EX_free *free_func); -/* Initialise/duplicate/free CRYPTO_EX_DATA variables corresponding to a given - * class (invokes whatever per-class callbacks are applicable) */ -int CRYPTO_new_ex_data(int class_index, void *obj, CRYPTO_EX_DATA *ad); -int CRYPTO_dup_ex_data(int class_index, CRYPTO_EX_DATA *to, - CRYPTO_EX_DATA *from); -void CRYPTO_free_ex_data(int class_index, void *obj, CRYPTO_EX_DATA *ad); -/* Get/set data in a CRYPTO_EX_DATA variable corresponding to a particular index - * (relative to the class type involved) */ -int CRYPTO_set_ex_data(CRYPTO_EX_DATA *ad, int idx, void *val); -void *CRYPTO_get_ex_data(const CRYPTO_EX_DATA *ad,int idx); -/* This function cleans up all "ex_data" state. It mustn't be called under - * potential race-conditions. */ -void CRYPTO_cleanup_all_ex_data(void); - -int CRYPTO_get_new_lockid(char *name); - -int CRYPTO_num_locks(void); /* return CRYPTO_NUM_LOCKS (shared libs!) */ -void CRYPTO_lock(int mode, int type,const char *file,int line); -void CRYPTO_set_locking_callback(void (*func)(int mode,int type, - const char *file,int line)); -void (*CRYPTO_get_locking_callback(void))(int mode,int type,const char *file, - int line); -void CRYPTO_set_add_lock_callback(int (*func)(int *num,int mount,int type, - const char *file, int line)); -int (*CRYPTO_get_add_lock_callback(void))(int *num,int mount,int type, - const char *file,int line); - -/* Don't use this structure directly. */ -typedef struct crypto_threadid_st - { - void *ptr; - unsigned long val; - } CRYPTO_THREADID; -/* Only use CRYPTO_THREADID_set_[numeric|pointer]() within callbacks */ -void CRYPTO_THREADID_set_numeric(CRYPTO_THREADID *id, unsigned long val); -void CRYPTO_THREADID_set_pointer(CRYPTO_THREADID *id, void *ptr); -int CRYPTO_THREADID_set_callback(void (*threadid_func)(CRYPTO_THREADID *)); -void (*CRYPTO_THREADID_get_callback(void))(CRYPTO_THREADID *); -void CRYPTO_THREADID_current(CRYPTO_THREADID *id); -int CRYPTO_THREADID_cmp(const CRYPTO_THREADID *a, const CRYPTO_THREADID *b); -void CRYPTO_THREADID_cpy(CRYPTO_THREADID *dest, const CRYPTO_THREADID *src); -unsigned long CRYPTO_THREADID_hash(const CRYPTO_THREADID *id); -#ifndef OPENSSL_NO_DEPRECATED -void CRYPTO_set_id_callback(unsigned long (*func)(void)); -unsigned long (*CRYPTO_get_id_callback(void))(void); -unsigned long CRYPTO_thread_id(void); -#endif - -const char *CRYPTO_get_lock_name(int type); -int CRYPTO_add_lock(int *pointer,int amount,int type, const char *file, - int line); - -int CRYPTO_get_new_dynlockid(void); -void CRYPTO_destroy_dynlockid(int i); -struct CRYPTO_dynlock_value *CRYPTO_get_dynlock_value(int i); -void CRYPTO_set_dynlock_create_callback(struct CRYPTO_dynlock_value *(*dyn_create_function)(const char *file, int line)); -void CRYPTO_set_dynlock_lock_callback(void (*dyn_lock_function)(int mode, struct CRYPTO_dynlock_value *l, const char *file, int line)); -void CRYPTO_set_dynlock_destroy_callback(void (*dyn_destroy_function)(struct CRYPTO_dynlock_value *l, const char *file, int line)); -struct CRYPTO_dynlock_value *(*CRYPTO_get_dynlock_create_callback(void))(const char *file,int line); -void (*CRYPTO_get_dynlock_lock_callback(void))(int mode, struct CRYPTO_dynlock_value *l, const char *file,int line); -void (*CRYPTO_get_dynlock_destroy_callback(void))(struct CRYPTO_dynlock_value *l, const char *file,int line); - -/* CRYPTO_set_mem_functions includes CRYPTO_set_locked_mem_functions -- - * call the latter last if you need different functions */ -int CRYPTO_set_mem_functions(void *(*m)(size_t),void *(*r)(void *,size_t), void (*f)(void *)); -int CRYPTO_set_locked_mem_functions(void *(*m)(size_t), void (*free_func)(void *)); -int CRYPTO_set_mem_ex_functions(void *(*m)(size_t,const char *,int), - void *(*r)(void *,size_t,const char *,int), - void (*f)(void *)); -int CRYPTO_set_locked_mem_ex_functions(void *(*m)(size_t,const char *,int), - void (*free_func)(void *)); -int CRYPTO_set_mem_debug_functions(void (*m)(void *,int,const char *,int,int), - void (*r)(void *,void *,int,const char *,int,int), - void (*f)(void *,int), - void (*so)(long), - long (*go)(void)); -void CRYPTO_get_mem_functions(void *(**m)(size_t),void *(**r)(void *, size_t), void (**f)(void *)); -void CRYPTO_get_locked_mem_functions(void *(**m)(size_t), void (**f)(void *)); -void CRYPTO_get_mem_ex_functions(void *(**m)(size_t,const char *,int), - void *(**r)(void *, size_t,const char *,int), - void (**f)(void *)); -void CRYPTO_get_locked_mem_ex_functions(void *(**m)(size_t,const char *,int), - void (**f)(void *)); -void CRYPTO_get_mem_debug_functions(void (**m)(void *,int,const char *,int,int), - void (**r)(void *,void *,int,const char *,int,int), - void (**f)(void *,int), - void (**so)(long), - long (**go)(void)); - -void *CRYPTO_malloc_locked(int num, const char *file, int line); -void CRYPTO_free_locked(void *ptr); -void *CRYPTO_malloc(int num, const char *file, int line); -char *CRYPTO_strdup(const char *str, const char *file, int line); -void CRYPTO_free(void *ptr); -void *CRYPTO_realloc(void *addr,int num, const char *file, int line); -void *CRYPTO_realloc_clean(void *addr,int old_num,int num,const char *file, - int line); -void *CRYPTO_remalloc(void *addr,int num, const char *file, int line); - -void OPENSSL_cleanse(void *ptr, size_t len); - -void CRYPTO_set_mem_debug_options(long bits); -long CRYPTO_get_mem_debug_options(void); - -#define CRYPTO_push_info(info) \ - CRYPTO_push_info_(info, __FILE__, __LINE__); -int CRYPTO_push_info_(const char *info, const char *file, int line); -int CRYPTO_pop_info(void); -int CRYPTO_remove_all_info(void); - - -/* Default debugging functions (enabled by CRYPTO_malloc_debug_init() macro; - * used as default in CRYPTO_MDEBUG compilations): */ -/* The last argument has the following significance: - * - * 0: called before the actual memory allocation has taken place - * 1: called after the actual memory allocation has taken place - */ -void CRYPTO_dbg_malloc(void *addr,int num,const char *file,int line,int before_p); -void CRYPTO_dbg_realloc(void *addr1,void *addr2,int num,const char *file,int line,int before_p); -void CRYPTO_dbg_free(void *addr,int before_p); -/* Tell the debugging code about options. By default, the following values - * apply: - * - * 0: Clear all options. - * V_CRYPTO_MDEBUG_TIME (1): Set the "Show Time" option. - * V_CRYPTO_MDEBUG_THREAD (2): Set the "Show Thread Number" option. - * V_CRYPTO_MDEBUG_ALL (3): 1 + 2 - */ -void CRYPTO_dbg_set_options(long bits); -long CRYPTO_dbg_get_options(void); - - -#ifndef OPENSSL_NO_FP_API -void CRYPTO_mem_leaks_fp(FILE *); -#endif -void CRYPTO_mem_leaks(struct bio_st *bio); -/* unsigned long order, char *file, int line, int num_bytes, char *addr */ -typedef void *CRYPTO_MEM_LEAK_CB(unsigned long, const char *, int, int, void *); -void CRYPTO_mem_leaks_cb(CRYPTO_MEM_LEAK_CB *cb); - -/* die if we have to */ -void OpenSSLDie(const char *file,int line,const char *assertion); -#define OPENSSL_assert(e) (void)((e) ? 0 : (OpenSSLDie(__FILE__, __LINE__, #e),1)) - -unsigned long *OPENSSL_ia32cap_loc(void); -#define OPENSSL_ia32cap (*(OPENSSL_ia32cap_loc())) -int OPENSSL_isservice(void); - -int FIPS_mode(void); -int FIPS_mode_set(int r); - -void OPENSSL_init(void); - -#define fips_md_init(alg) fips_md_init_ctx(alg, alg) - -#ifdef OPENSSL_FIPS -#define fips_md_init_ctx(alg, cx) \ - int alg##_Init(cx##_CTX *c) \ - { \ - if (FIPS_mode()) OpenSSLDie(__FILE__, __LINE__, \ - "Low level API call to digest " #alg " forbidden in FIPS mode!"); \ - return private_##alg##_Init(c); \ - } \ - int private_##alg##_Init(cx##_CTX *c) - -#define fips_cipher_abort(alg) \ - if (FIPS_mode()) OpenSSLDie(__FILE__, __LINE__, \ - "Low level API call to cipher " #alg " forbidden in FIPS mode!") - -#else -#define fips_md_init_ctx(alg, cx) \ - int alg##_Init(cx##_CTX *c) -#define fips_cipher_abort(alg) while(0) -#endif - -/* CRYPTO_memcmp returns zero iff the |len| bytes at |a| and |b| are equal. It - * takes an amount of time dependent on |len|, but independent of the contents - * of |a| and |b|. Unlike memcmp, it cannot be used to put elements into a - * defined order as the return value when a != b is undefined, other than to be - * non-zero. */ -int CRYPTO_memcmp(const void *a, const void *b, size_t len); - -/* BEGIN ERROR CODES */ -/* The following lines are auto generated by the script mkerr.pl. Any changes - * made after this point may be overwritten when the script is next run. - */ -void ERR_load_CRYPTO_strings(void); - -/* Error codes for the CRYPTO functions. */ - -/* Function codes. */ -#define CRYPTO_F_CRYPTO_GET_EX_NEW_INDEX 100 -#define CRYPTO_F_CRYPTO_GET_NEW_DYNLOCKID 103 -#define CRYPTO_F_CRYPTO_GET_NEW_LOCKID 101 -#define CRYPTO_F_CRYPTO_SET_EX_DATA 102 -#define CRYPTO_F_DEF_ADD_INDEX 104 -#define CRYPTO_F_DEF_GET_CLASS 105 -#define CRYPTO_F_FIPS_MODE_SET 109 -#define CRYPTO_F_INT_DUP_EX_DATA 106 -#define CRYPTO_F_INT_FREE_EX_DATA 107 -#define CRYPTO_F_INT_NEW_EX_DATA 108 - -/* Reason codes. */ -#define CRYPTO_R_FIPS_MODE_NOT_SUPPORTED 101 -#define CRYPTO_R_NO_DYNLOCK_CREATE_CALLBACK 100 - -#ifdef __cplusplus -} -#endif -#endif diff --git a/Pods/OpenSSL-Universal/include-osx/openssl/des.h b/Pods/OpenSSL-Universal/include-osx/openssl/des.h deleted file mode 100644 index 1eaedcbd..00000000 --- a/Pods/OpenSSL-Universal/include-osx/openssl/des.h +++ /dev/null @@ -1,248 +0,0 @@ -/* crypto/des/des.h */ -/* Copyright (C) 1995-1997 Eric Young (eay@cryptsoft.com) - * All rights reserved. - * - * This package is an SSL implementation written - * by Eric Young (eay@cryptsoft.com). - * The implementation was written so as to conform with Netscapes SSL. - * - * This library is free for commercial and non-commercial use as long as - * the following conditions are aheared to. The following conditions - * apply to all code found in this distribution, be it the RC4, RSA, - * lhash, DES, etc., code; not just the SSL code. The SSL documentation - * included with this distribution is covered by the same copyright terms - * except that the holder is Tim Hudson (tjh@cryptsoft.com). - * - * Copyright remains Eric Young's, and as such any Copyright notices in - * the code are not to be removed. - * If this package is used in a product, Eric Young should be given attribution - * as the author of the parts of the library used. - * This can be in the form of a textual message at program startup or - * in documentation (online or textual) provided with the package. - * - * Redistribution and use in source and binary forms, with or without - * modification, are permitted provided that the following conditions - * are met: - * 1. Redistributions of source code must retain the copyright - * notice, this list of conditions and the following disclaimer. - * 2. Redistributions in binary form must reproduce the above copyright - * notice, this list of conditions and the following disclaimer in the - * documentation and/or other materials provided with the distribution. - * 3. All advertising materials mentioning features or use of this software - * must display the following acknowledgement: - * "This product includes cryptographic software written by - * Eric Young (eay@cryptsoft.com)" - * The word 'cryptographic' can be left out if the rouines from the library - * being used are not cryptographic related :-). - * 4. If you include any Windows specific code (or a derivative thereof) from - * the apps directory (application code) you must include an acknowledgement: - * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" - * - * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND - * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE - * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE - * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE - * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL - * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS - * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) - * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT - * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY - * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF - * SUCH DAMAGE. - * - * The licence and distribution terms for any publically available version or - * derivative of this code cannot be changed. i.e. this code cannot simply be - * copied and put under another distribution licence - * [including the GNU Public Licence.] - */ - -#ifndef HEADER_NEW_DES_H -#define HEADER_NEW_DES_H - -#include /* OPENSSL_EXTERN, OPENSSL_NO_DES, - DES_LONG (via openssl/opensslconf.h */ - -#ifdef OPENSSL_NO_DES -#error DES is disabled. -#endif - -#ifdef OPENSSL_BUILD_SHLIBCRYPTO -# undef OPENSSL_EXTERN -# define OPENSSL_EXTERN OPENSSL_EXPORT -#endif - -#ifdef __cplusplus -extern "C" { -#endif - -typedef unsigned char DES_cblock[8]; -typedef /* const */ unsigned char const_DES_cblock[8]; -/* With "const", gcc 2.8.1 on Solaris thinks that DES_cblock * - * and const_DES_cblock * are incompatible pointer types. */ - -typedef struct DES_ks - { - union - { - DES_cblock cblock; - /* make sure things are correct size on machines with - * 8 byte longs */ - DES_LONG deslong[2]; - } ks[16]; - } DES_key_schedule; - -#ifndef OPENSSL_DISABLE_OLD_DES_SUPPORT -# ifndef OPENSSL_ENABLE_OLD_DES_SUPPORT -# define OPENSSL_ENABLE_OLD_DES_SUPPORT -# endif -#endif - -#ifdef OPENSSL_ENABLE_OLD_DES_SUPPORT -# include -#endif - -#define DES_KEY_SZ (sizeof(DES_cblock)) -#define DES_SCHEDULE_SZ (sizeof(DES_key_schedule)) - -#define DES_ENCRYPT 1 -#define DES_DECRYPT 0 - -#define DES_CBC_MODE 0 -#define DES_PCBC_MODE 1 - -#define DES_ecb2_encrypt(i,o,k1,k2,e) \ - DES_ecb3_encrypt((i),(o),(k1),(k2),(k1),(e)) - -#define DES_ede2_cbc_encrypt(i,o,l,k1,k2,iv,e) \ - DES_ede3_cbc_encrypt((i),(o),(l),(k1),(k2),(k1),(iv),(e)) - -#define DES_ede2_cfb64_encrypt(i,o,l,k1,k2,iv,n,e) \ - DES_ede3_cfb64_encrypt((i),(o),(l),(k1),(k2),(k1),(iv),(n),(e)) - -#define DES_ede2_ofb64_encrypt(i,o,l,k1,k2,iv,n) \ - DES_ede3_ofb64_encrypt((i),(o),(l),(k1),(k2),(k1),(iv),(n)) - -OPENSSL_DECLARE_GLOBAL(int,DES_check_key); /* defaults to false */ -#define DES_check_key OPENSSL_GLOBAL_REF(DES_check_key) -OPENSSL_DECLARE_GLOBAL(int,DES_rw_mode); /* defaults to DES_PCBC_MODE */ -#define DES_rw_mode OPENSSL_GLOBAL_REF(DES_rw_mode) - -const char *DES_options(void); -void DES_ecb3_encrypt(const_DES_cblock *input, DES_cblock *output, - DES_key_schedule *ks1,DES_key_schedule *ks2, - DES_key_schedule *ks3, int enc); -DES_LONG DES_cbc_cksum(const unsigned char *input,DES_cblock *output, - long length,DES_key_schedule *schedule, - const_DES_cblock *ivec); -/* DES_cbc_encrypt does not update the IV! Use DES_ncbc_encrypt instead. */ -void DES_cbc_encrypt(const unsigned char *input,unsigned char *output, - long length,DES_key_schedule *schedule,DES_cblock *ivec, - int enc); -void DES_ncbc_encrypt(const unsigned char *input,unsigned char *output, - long length,DES_key_schedule *schedule,DES_cblock *ivec, - int enc); -void DES_xcbc_encrypt(const unsigned char *input,unsigned char *output, - long length,DES_key_schedule *schedule,DES_cblock *ivec, - const_DES_cblock *inw,const_DES_cblock *outw,int enc); -void DES_cfb_encrypt(const unsigned char *in,unsigned char *out,int numbits, - long length,DES_key_schedule *schedule,DES_cblock *ivec, - int enc); -void DES_ecb_encrypt(const_DES_cblock *input,DES_cblock *output, - DES_key_schedule *ks,int enc); - -/* This is the DES encryption function that gets called by just about - every other DES routine in the library. You should not use this - function except to implement 'modes' of DES. I say this because the - functions that call this routine do the conversion from 'char *' to - long, and this needs to be done to make sure 'non-aligned' memory - access do not occur. The characters are loaded 'little endian'. - Data is a pointer to 2 unsigned long's and ks is the - DES_key_schedule to use. enc, is non zero specifies encryption, - zero if decryption. */ -void DES_encrypt1(DES_LONG *data,DES_key_schedule *ks, int enc); - -/* This functions is the same as DES_encrypt1() except that the DES - initial permutation (IP) and final permutation (FP) have been left - out. As for DES_encrypt1(), you should not use this function. - It is used by the routines in the library that implement triple DES. - IP() DES_encrypt2() DES_encrypt2() DES_encrypt2() FP() is the same - as DES_encrypt1() DES_encrypt1() DES_encrypt1() except faster :-). */ -void DES_encrypt2(DES_LONG *data,DES_key_schedule *ks, int enc); - -void DES_encrypt3(DES_LONG *data, DES_key_schedule *ks1, - DES_key_schedule *ks2, DES_key_schedule *ks3); -void DES_decrypt3(DES_LONG *data, DES_key_schedule *ks1, - DES_key_schedule *ks2, DES_key_schedule *ks3); -void DES_ede3_cbc_encrypt(const unsigned char *input,unsigned char *output, - long length, - DES_key_schedule *ks1,DES_key_schedule *ks2, - DES_key_schedule *ks3,DES_cblock *ivec,int enc); -void DES_ede3_cbcm_encrypt(const unsigned char *in,unsigned char *out, - long length, - DES_key_schedule *ks1,DES_key_schedule *ks2, - DES_key_schedule *ks3, - DES_cblock *ivec1,DES_cblock *ivec2, - int enc); -void DES_ede3_cfb64_encrypt(const unsigned char *in,unsigned char *out, - long length,DES_key_schedule *ks1, - DES_key_schedule *ks2,DES_key_schedule *ks3, - DES_cblock *ivec,int *num,int enc); -void DES_ede3_cfb_encrypt(const unsigned char *in,unsigned char *out, - int numbits,long length,DES_key_schedule *ks1, - DES_key_schedule *ks2,DES_key_schedule *ks3, - DES_cblock *ivec,int enc); -void DES_ede3_ofb64_encrypt(const unsigned char *in,unsigned char *out, - long length,DES_key_schedule *ks1, - DES_key_schedule *ks2,DES_key_schedule *ks3, - DES_cblock *ivec,int *num); -#if 0 -void DES_xwhite_in2out(const_DES_cblock *DES_key,const_DES_cblock *in_white, - DES_cblock *out_white); -#endif - -int DES_enc_read(int fd,void *buf,int len,DES_key_schedule *sched, - DES_cblock *iv); -int DES_enc_write(int fd,const void *buf,int len,DES_key_schedule *sched, - DES_cblock *iv); -char *DES_fcrypt(const char *buf,const char *salt, char *ret); -char *DES_crypt(const char *buf,const char *salt); -void DES_ofb_encrypt(const unsigned char *in,unsigned char *out,int numbits, - long length,DES_key_schedule *schedule,DES_cblock *ivec); -void DES_pcbc_encrypt(const unsigned char *input,unsigned char *output, - long length,DES_key_schedule *schedule,DES_cblock *ivec, - int enc); -DES_LONG DES_quad_cksum(const unsigned char *input,DES_cblock output[], - long length,int out_count,DES_cblock *seed); -int DES_random_key(DES_cblock *ret); -void DES_set_odd_parity(DES_cblock *key); -int DES_check_key_parity(const_DES_cblock *key); -int DES_is_weak_key(const_DES_cblock *key); -/* DES_set_key (= set_key = DES_key_sched = key_sched) calls - * DES_set_key_checked if global variable DES_check_key is set, - * DES_set_key_unchecked otherwise. */ -int DES_set_key(const_DES_cblock *key,DES_key_schedule *schedule); -int DES_key_sched(const_DES_cblock *key,DES_key_schedule *schedule); -int DES_set_key_checked(const_DES_cblock *key,DES_key_schedule *schedule); -void DES_set_key_unchecked(const_DES_cblock *key,DES_key_schedule *schedule); -#ifdef OPENSSL_FIPS -void private_DES_set_key_unchecked(const_DES_cblock *key,DES_key_schedule *schedule); -#endif -void DES_string_to_key(const char *str,DES_cblock *key); -void DES_string_to_2keys(const char *str,DES_cblock *key1,DES_cblock *key2); -void DES_cfb64_encrypt(const unsigned char *in,unsigned char *out,long length, - DES_key_schedule *schedule,DES_cblock *ivec,int *num, - int enc); -void DES_ofb64_encrypt(const unsigned char *in,unsigned char *out,long length, - DES_key_schedule *schedule,DES_cblock *ivec,int *num); - -int DES_read_password(DES_cblock *key, const char *prompt, int verify); -int DES_read_2passwords(DES_cblock *key1, DES_cblock *key2, const char *prompt, - int verify); - -#define DES_fixup_key_parity DES_set_odd_parity - -#ifdef __cplusplus -} -#endif - -#endif diff --git a/Pods/OpenSSL-Universal/include-osx/openssl/des_old.h b/Pods/OpenSSL-Universal/include-osx/openssl/des_old.h deleted file mode 100644 index 2b2c3723..00000000 --- a/Pods/OpenSSL-Universal/include-osx/openssl/des_old.h +++ /dev/null @@ -1,446 +0,0 @@ -/* crypto/des/des_old.h -*- mode:C; c-file-style: "eay" -*- */ - -/* WARNING WARNING WARNING WARNING WARNING WARNING WARNING WARNING - * - * The function names in here are deprecated and are only present to - * provide an interface compatible with openssl 0.9.6 and older as - * well as libdes. OpenSSL now provides functions where "des_" has - * been replaced with "DES_" in the names, to make it possible to - * make incompatible changes that are needed for C type security and - * other stuff. - * - * This include files has two compatibility modes: - * - * - If OPENSSL_DES_LIBDES_COMPATIBILITY is defined, you get an API - * that is compatible with libdes and SSLeay. - * - If OPENSSL_DES_LIBDES_COMPATIBILITY isn't defined, you get an - * API that is compatible with OpenSSL 0.9.5x to 0.9.6x. - * - * Note that these modes break earlier snapshots of OpenSSL, where - * libdes compatibility was the only available mode or (later on) the - * prefered compatibility mode. However, after much consideration - * (and more or less violent discussions with external parties), it - * was concluded that OpenSSL should be compatible with earlier versions - * of itself before anything else. Also, in all honesty, libdes is - * an old beast that shouldn't really be used any more. - * - * Please consider starting to use the DES_ functions rather than the - * des_ ones. The des_ functions will disappear completely before - * OpenSSL 1.0! - * - * WARNING WARNING WARNING WARNING WARNING WARNING WARNING WARNING - */ - -/* Written by Richard Levitte (richard@levitte.org) for the OpenSSL - * project 2001. - */ -/* ==================================================================== - * Copyright (c) 1998-2002 The OpenSSL Project. All rights reserved. - * - * Redistribution and use in source and binary forms, with or without - * modification, are permitted provided that the following conditions - * are met: - * - * 1. Redistributions of source code must retain the above copyright - * notice, this list of conditions and the following disclaimer. - * - * 2. Redistributions in binary form must reproduce the above copyright - * notice, this list of conditions and the following disclaimer in - * the documentation and/or other materials provided with the - * distribution. - * - * 3. All advertising materials mentioning features or use of this - * software must display the following acknowledgment: - * "This product includes software developed by the OpenSSL Project - * for use in the OpenSSL Toolkit. (http://www.openssl.org/)" - * - * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to - * endorse or promote products derived from this software without - * prior written permission. For written permission, please contact - * openssl-core@openssl.org. - * - * 5. Products derived from this software may not be called "OpenSSL" - * nor may "OpenSSL" appear in their names without prior written - * permission of the OpenSSL Project. - * - * 6. Redistributions of any form whatsoever must retain the following - * acknowledgment: - * "This product includes software developed by the OpenSSL Project - * for use in the OpenSSL Toolkit (http://www.openssl.org/)" - * - * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY - * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE - * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR - * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR - * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, - * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT - * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; - * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) - * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, - * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) - * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED - * OF THE POSSIBILITY OF SUCH DAMAGE. - * ==================================================================== - * - * This product includes cryptographic software written by Eric Young - * (eay@cryptsoft.com). This product includes software written by Tim - * Hudson (tjh@cryptsoft.com). - * - */ - -#ifndef HEADER_DES_H -#define HEADER_DES_H - -#include /* OPENSSL_EXTERN, OPENSSL_NO_DES, DES_LONG */ - -#ifdef OPENSSL_NO_DES -#error DES is disabled. -#endif - -#ifndef HEADER_NEW_DES_H -#error You must include des.h, not des_old.h directly. -#endif - -#ifdef _KERBEROS_DES_H -#error replaces . -#endif - -#include - -#ifdef OPENSSL_BUILD_SHLIBCRYPTO -# undef OPENSSL_EXTERN -# define OPENSSL_EXTERN OPENSSL_EXPORT -#endif - -#ifdef __cplusplus -extern "C" { -#endif - -#ifdef _ -#undef _ -#endif - -typedef unsigned char _ossl_old_des_cblock[8]; -typedef struct _ossl_old_des_ks_struct - { - union { - _ossl_old_des_cblock _; - /* make sure things are correct size on machines with - * 8 byte longs */ - DES_LONG pad[2]; - } ks; - } _ossl_old_des_key_schedule[16]; - -#ifndef OPENSSL_DES_LIBDES_COMPATIBILITY -#define des_cblock DES_cblock -#define const_des_cblock const_DES_cblock -#define des_key_schedule DES_key_schedule -#define des_ecb3_encrypt(i,o,k1,k2,k3,e)\ - DES_ecb3_encrypt((i),(o),&(k1),&(k2),&(k3),(e)) -#define des_ede3_cbc_encrypt(i,o,l,k1,k2,k3,iv,e)\ - DES_ede3_cbc_encrypt((i),(o),(l),&(k1),&(k2),&(k3),(iv),(e)) -#define des_ede3_cbcm_encrypt(i,o,l,k1,k2,k3,iv1,iv2,e)\ - DES_ede3_cbcm_encrypt((i),(o),(l),&(k1),&(k2),&(k3),(iv1),(iv2),(e)) -#define des_ede3_cfb64_encrypt(i,o,l,k1,k2,k3,iv,n,e)\ - DES_ede3_cfb64_encrypt((i),(o),(l),&(k1),&(k2),&(k3),(iv),(n),(e)) -#define des_ede3_ofb64_encrypt(i,o,l,k1,k2,k3,iv,n)\ - DES_ede3_ofb64_encrypt((i),(o),(l),&(k1),&(k2),&(k3),(iv),(n)) -#define des_options()\ - DES_options() -#define des_cbc_cksum(i,o,l,k,iv)\ - DES_cbc_cksum((i),(o),(l),&(k),(iv)) -#define des_cbc_encrypt(i,o,l,k,iv,e)\ - DES_cbc_encrypt((i),(o),(l),&(k),(iv),(e)) -#define des_ncbc_encrypt(i,o,l,k,iv,e)\ - DES_ncbc_encrypt((i),(o),(l),&(k),(iv),(e)) -#define des_xcbc_encrypt(i,o,l,k,iv,inw,outw,e)\ - DES_xcbc_encrypt((i),(o),(l),&(k),(iv),(inw),(outw),(e)) -#define des_cfb_encrypt(i,o,n,l,k,iv,e)\ - DES_cfb_encrypt((i),(o),(n),(l),&(k),(iv),(e)) -#define des_ecb_encrypt(i,o,k,e)\ - DES_ecb_encrypt((i),(o),&(k),(e)) -#define des_encrypt1(d,k,e)\ - DES_encrypt1((d),&(k),(e)) -#define des_encrypt2(d,k,e)\ - DES_encrypt2((d),&(k),(e)) -#define des_encrypt3(d,k1,k2,k3)\ - DES_encrypt3((d),&(k1),&(k2),&(k3)) -#define des_decrypt3(d,k1,k2,k3)\ - DES_decrypt3((d),&(k1),&(k2),&(k3)) -#define des_xwhite_in2out(k,i,o)\ - DES_xwhite_in2out((k),(i),(o)) -#define des_enc_read(f,b,l,k,iv)\ - DES_enc_read((f),(b),(l),&(k),(iv)) -#define des_enc_write(f,b,l,k,iv)\ - DES_enc_write((f),(b),(l),&(k),(iv)) -#define des_fcrypt(b,s,r)\ - DES_fcrypt((b),(s),(r)) -#if 0 -#define des_crypt(b,s)\ - DES_crypt((b),(s)) -#if !defined(PERL5) && !defined(__FreeBSD__) && !defined(NeXT) && !defined(__OpenBSD__) -#define crypt(b,s)\ - DES_crypt((b),(s)) -#endif -#endif -#define des_ofb_encrypt(i,o,n,l,k,iv)\ - DES_ofb_encrypt((i),(o),(n),(l),&(k),(iv)) -#define des_pcbc_encrypt(i,o,l,k,iv,e)\ - DES_pcbc_encrypt((i),(o),(l),&(k),(iv),(e)) -#define des_quad_cksum(i,o,l,c,s)\ - DES_quad_cksum((i),(o),(l),(c),(s)) -#define des_random_seed(k)\ - _ossl_096_des_random_seed((k)) -#define des_random_key(r)\ - DES_random_key((r)) -#define des_read_password(k,p,v) \ - DES_read_password((k),(p),(v)) -#define des_read_2passwords(k1,k2,p,v) \ - DES_read_2passwords((k1),(k2),(p),(v)) -#define des_set_odd_parity(k)\ - DES_set_odd_parity((k)) -#define des_check_key_parity(k)\ - DES_check_key_parity((k)) -#define des_is_weak_key(k)\ - DES_is_weak_key((k)) -#define des_set_key(k,ks)\ - DES_set_key((k),&(ks)) -#define des_key_sched(k,ks)\ - DES_key_sched((k),&(ks)) -#define des_set_key_checked(k,ks)\ - DES_set_key_checked((k),&(ks)) -#define des_set_key_unchecked(k,ks)\ - DES_set_key_unchecked((k),&(ks)) -#define des_string_to_key(s,k)\ - DES_string_to_key((s),(k)) -#define des_string_to_2keys(s,k1,k2)\ - DES_string_to_2keys((s),(k1),(k2)) -#define des_cfb64_encrypt(i,o,l,ks,iv,n,e)\ - DES_cfb64_encrypt((i),(o),(l),&(ks),(iv),(n),(e)) -#define des_ofb64_encrypt(i,o,l,ks,iv,n)\ - DES_ofb64_encrypt((i),(o),(l),&(ks),(iv),(n)) - - -#define des_ecb2_encrypt(i,o,k1,k2,e) \ - des_ecb3_encrypt((i),(o),(k1),(k2),(k1),(e)) - -#define des_ede2_cbc_encrypt(i,o,l,k1,k2,iv,e) \ - des_ede3_cbc_encrypt((i),(o),(l),(k1),(k2),(k1),(iv),(e)) - -#define des_ede2_cfb64_encrypt(i,o,l,k1,k2,iv,n,e) \ - des_ede3_cfb64_encrypt((i),(o),(l),(k1),(k2),(k1),(iv),(n),(e)) - -#define des_ede2_ofb64_encrypt(i,o,l,k1,k2,iv,n) \ - des_ede3_ofb64_encrypt((i),(o),(l),(k1),(k2),(k1),(iv),(n)) - -#define des_check_key DES_check_key -#define des_rw_mode DES_rw_mode -#else /* libdes compatibility */ -/* Map all symbol names to _ossl_old_des_* form, so we avoid all - clashes with libdes */ -#define des_cblock _ossl_old_des_cblock -#define des_key_schedule _ossl_old_des_key_schedule -#define des_ecb3_encrypt(i,o,k1,k2,k3,e)\ - _ossl_old_des_ecb3_encrypt((i),(o),(k1),(k2),(k3),(e)) -#define des_ede3_cbc_encrypt(i,o,l,k1,k2,k3,iv,e)\ - _ossl_old_des_ede3_cbc_encrypt((i),(o),(l),(k1),(k2),(k3),(iv),(e)) -#define des_ede3_cfb64_encrypt(i,o,l,k1,k2,k3,iv,n,e)\ - _ossl_old_des_ede3_cfb64_encrypt((i),(o),(l),(k1),(k2),(k3),(iv),(n),(e)) -#define des_ede3_ofb64_encrypt(i,o,l,k1,k2,k3,iv,n)\ - _ossl_old_des_ede3_ofb64_encrypt((i),(o),(l),(k1),(k2),(k3),(iv),(n)) -#define des_options()\ - _ossl_old_des_options() -#define des_cbc_cksum(i,o,l,k,iv)\ - _ossl_old_des_cbc_cksum((i),(o),(l),(k),(iv)) -#define des_cbc_encrypt(i,o,l,k,iv,e)\ - _ossl_old_des_cbc_encrypt((i),(o),(l),(k),(iv),(e)) -#define des_ncbc_encrypt(i,o,l,k,iv,e)\ - _ossl_old_des_ncbc_encrypt((i),(o),(l),(k),(iv),(e)) -#define des_xcbc_encrypt(i,o,l,k,iv,inw,outw,e)\ - _ossl_old_des_xcbc_encrypt((i),(o),(l),(k),(iv),(inw),(outw),(e)) -#define des_cfb_encrypt(i,o,n,l,k,iv,e)\ - _ossl_old_des_cfb_encrypt((i),(o),(n),(l),(k),(iv),(e)) -#define des_ecb_encrypt(i,o,k,e)\ - _ossl_old_des_ecb_encrypt((i),(o),(k),(e)) -#define des_encrypt(d,k,e)\ - _ossl_old_des_encrypt((d),(k),(e)) -#define des_encrypt2(d,k,e)\ - _ossl_old_des_encrypt2((d),(k),(e)) -#define des_encrypt3(d,k1,k2,k3)\ - _ossl_old_des_encrypt3((d),(k1),(k2),(k3)) -#define des_decrypt3(d,k1,k2,k3)\ - _ossl_old_des_decrypt3((d),(k1),(k2),(k3)) -#define des_xwhite_in2out(k,i,o)\ - _ossl_old_des_xwhite_in2out((k),(i),(o)) -#define des_enc_read(f,b,l,k,iv)\ - _ossl_old_des_enc_read((f),(b),(l),(k),(iv)) -#define des_enc_write(f,b,l,k,iv)\ - _ossl_old_des_enc_write((f),(b),(l),(k),(iv)) -#define des_fcrypt(b,s,r)\ - _ossl_old_des_fcrypt((b),(s),(r)) -#define des_crypt(b,s)\ - _ossl_old_des_crypt((b),(s)) -#if 0 -#define crypt(b,s)\ - _ossl_old_crypt((b),(s)) -#endif -#define des_ofb_encrypt(i,o,n,l,k,iv)\ - _ossl_old_des_ofb_encrypt((i),(o),(n),(l),(k),(iv)) -#define des_pcbc_encrypt(i,o,l,k,iv,e)\ - _ossl_old_des_pcbc_encrypt((i),(o),(l),(k),(iv),(e)) -#define des_quad_cksum(i,o,l,c,s)\ - _ossl_old_des_quad_cksum((i),(o),(l),(c),(s)) -#define des_random_seed(k)\ - _ossl_old_des_random_seed((k)) -#define des_random_key(r)\ - _ossl_old_des_random_key((r)) -#define des_read_password(k,p,v) \ - _ossl_old_des_read_password((k),(p),(v)) -#define des_read_2passwords(k1,k2,p,v) \ - _ossl_old_des_read_2passwords((k1),(k2),(p),(v)) -#define des_set_odd_parity(k)\ - _ossl_old_des_set_odd_parity((k)) -#define des_is_weak_key(k)\ - _ossl_old_des_is_weak_key((k)) -#define des_set_key(k,ks)\ - _ossl_old_des_set_key((k),(ks)) -#define des_key_sched(k,ks)\ - _ossl_old_des_key_sched((k),(ks)) -#define des_string_to_key(s,k)\ - _ossl_old_des_string_to_key((s),(k)) -#define des_string_to_2keys(s,k1,k2)\ - _ossl_old_des_string_to_2keys((s),(k1),(k2)) -#define des_cfb64_encrypt(i,o,l,ks,iv,n,e)\ - _ossl_old_des_cfb64_encrypt((i),(o),(l),(ks),(iv),(n),(e)) -#define des_ofb64_encrypt(i,o,l,ks,iv,n)\ - _ossl_old_des_ofb64_encrypt((i),(o),(l),(ks),(iv),(n)) - - -#define des_ecb2_encrypt(i,o,k1,k2,e) \ - des_ecb3_encrypt((i),(o),(k1),(k2),(k1),(e)) - -#define des_ede2_cbc_encrypt(i,o,l,k1,k2,iv,e) \ - des_ede3_cbc_encrypt((i),(o),(l),(k1),(k2),(k1),(iv),(e)) - -#define des_ede2_cfb64_encrypt(i,o,l,k1,k2,iv,n,e) \ - des_ede3_cfb64_encrypt((i),(o),(l),(k1),(k2),(k1),(iv),(n),(e)) - -#define des_ede2_ofb64_encrypt(i,o,l,k1,k2,iv,n) \ - des_ede3_ofb64_encrypt((i),(o),(l),(k1),(k2),(k1),(iv),(n)) - -#define des_check_key DES_check_key -#define des_rw_mode DES_rw_mode -#endif - -const char *_ossl_old_des_options(void); -void _ossl_old_des_ecb3_encrypt(_ossl_old_des_cblock *input,_ossl_old_des_cblock *output, - _ossl_old_des_key_schedule ks1,_ossl_old_des_key_schedule ks2, - _ossl_old_des_key_schedule ks3, int enc); -DES_LONG _ossl_old_des_cbc_cksum(_ossl_old_des_cblock *input,_ossl_old_des_cblock *output, - long length,_ossl_old_des_key_schedule schedule,_ossl_old_des_cblock *ivec); -void _ossl_old_des_cbc_encrypt(_ossl_old_des_cblock *input,_ossl_old_des_cblock *output,long length, - _ossl_old_des_key_schedule schedule,_ossl_old_des_cblock *ivec,int enc); -void _ossl_old_des_ncbc_encrypt(_ossl_old_des_cblock *input,_ossl_old_des_cblock *output,long length, - _ossl_old_des_key_schedule schedule,_ossl_old_des_cblock *ivec,int enc); -void _ossl_old_des_xcbc_encrypt(_ossl_old_des_cblock *input,_ossl_old_des_cblock *output,long length, - _ossl_old_des_key_schedule schedule,_ossl_old_des_cblock *ivec, - _ossl_old_des_cblock *inw,_ossl_old_des_cblock *outw,int enc); -void _ossl_old_des_cfb_encrypt(unsigned char *in,unsigned char *out,int numbits, - long length,_ossl_old_des_key_schedule schedule,_ossl_old_des_cblock *ivec,int enc); -void _ossl_old_des_ecb_encrypt(_ossl_old_des_cblock *input,_ossl_old_des_cblock *output, - _ossl_old_des_key_schedule ks,int enc); -void _ossl_old_des_encrypt(DES_LONG *data,_ossl_old_des_key_schedule ks, int enc); -void _ossl_old_des_encrypt2(DES_LONG *data,_ossl_old_des_key_schedule ks, int enc); -void _ossl_old_des_encrypt3(DES_LONG *data, _ossl_old_des_key_schedule ks1, - _ossl_old_des_key_schedule ks2, _ossl_old_des_key_schedule ks3); -void _ossl_old_des_decrypt3(DES_LONG *data, _ossl_old_des_key_schedule ks1, - _ossl_old_des_key_schedule ks2, _ossl_old_des_key_schedule ks3); -void _ossl_old_des_ede3_cbc_encrypt(_ossl_old_des_cblock *input, _ossl_old_des_cblock *output, - long length, _ossl_old_des_key_schedule ks1, _ossl_old_des_key_schedule ks2, - _ossl_old_des_key_schedule ks3, _ossl_old_des_cblock *ivec, int enc); -void _ossl_old_des_ede3_cfb64_encrypt(unsigned char *in, unsigned char *out, - long length, _ossl_old_des_key_schedule ks1, _ossl_old_des_key_schedule ks2, - _ossl_old_des_key_schedule ks3, _ossl_old_des_cblock *ivec, int *num, int enc); -void _ossl_old_des_ede3_ofb64_encrypt(unsigned char *in, unsigned char *out, - long length, _ossl_old_des_key_schedule ks1, _ossl_old_des_key_schedule ks2, - _ossl_old_des_key_schedule ks3, _ossl_old_des_cblock *ivec, int *num); -#if 0 -void _ossl_old_des_xwhite_in2out(_ossl_old_des_cblock (*des_key), _ossl_old_des_cblock (*in_white), - _ossl_old_des_cblock (*out_white)); -#endif - -int _ossl_old_des_enc_read(int fd,char *buf,int len,_ossl_old_des_key_schedule sched, - _ossl_old_des_cblock *iv); -int _ossl_old_des_enc_write(int fd,char *buf,int len,_ossl_old_des_key_schedule sched, - _ossl_old_des_cblock *iv); -char *_ossl_old_des_fcrypt(const char *buf,const char *salt, char *ret); -char *_ossl_old_des_crypt(const char *buf,const char *salt); -#if !defined(PERL5) && !defined(NeXT) -char *_ossl_old_crypt(const char *buf,const char *salt); -#endif -void _ossl_old_des_ofb_encrypt(unsigned char *in,unsigned char *out, - int numbits,long length,_ossl_old_des_key_schedule schedule,_ossl_old_des_cblock *ivec); -void _ossl_old_des_pcbc_encrypt(_ossl_old_des_cblock *input,_ossl_old_des_cblock *output,long length, - _ossl_old_des_key_schedule schedule,_ossl_old_des_cblock *ivec,int enc); -DES_LONG _ossl_old_des_quad_cksum(_ossl_old_des_cblock *input,_ossl_old_des_cblock *output, - long length,int out_count,_ossl_old_des_cblock *seed); -void _ossl_old_des_random_seed(_ossl_old_des_cblock key); -void _ossl_old_des_random_key(_ossl_old_des_cblock ret); -int _ossl_old_des_read_password(_ossl_old_des_cblock *key,const char *prompt,int verify); -int _ossl_old_des_read_2passwords(_ossl_old_des_cblock *key1,_ossl_old_des_cblock *key2, - const char *prompt,int verify); -void _ossl_old_des_set_odd_parity(_ossl_old_des_cblock *key); -int _ossl_old_des_is_weak_key(_ossl_old_des_cblock *key); -int _ossl_old_des_set_key(_ossl_old_des_cblock *key,_ossl_old_des_key_schedule schedule); -int _ossl_old_des_key_sched(_ossl_old_des_cblock *key,_ossl_old_des_key_schedule schedule); -void _ossl_old_des_string_to_key(char *str,_ossl_old_des_cblock *key); -void _ossl_old_des_string_to_2keys(char *str,_ossl_old_des_cblock *key1,_ossl_old_des_cblock *key2); -void _ossl_old_des_cfb64_encrypt(unsigned char *in, unsigned char *out, long length, - _ossl_old_des_key_schedule schedule, _ossl_old_des_cblock *ivec, int *num, int enc); -void _ossl_old_des_ofb64_encrypt(unsigned char *in, unsigned char *out, long length, - _ossl_old_des_key_schedule schedule, _ossl_old_des_cblock *ivec, int *num); - -void _ossl_096_des_random_seed(des_cblock *key); - -/* The following definitions provide compatibility with the MIT Kerberos - * library. The _ossl_old_des_key_schedule structure is not binary compatible. */ - -#define _KERBEROS_DES_H - -#define KRBDES_ENCRYPT DES_ENCRYPT -#define KRBDES_DECRYPT DES_DECRYPT - -#ifdef KERBEROS -# define ENCRYPT DES_ENCRYPT -# define DECRYPT DES_DECRYPT -#endif - -#ifndef NCOMPAT -# define C_Block des_cblock -# define Key_schedule des_key_schedule -# define KEY_SZ DES_KEY_SZ -# define string_to_key des_string_to_key -# define read_pw_string des_read_pw_string -# define random_key des_random_key -# define pcbc_encrypt des_pcbc_encrypt -# define set_key des_set_key -# define key_sched des_key_sched -# define ecb_encrypt des_ecb_encrypt -# define cbc_encrypt des_cbc_encrypt -# define ncbc_encrypt des_ncbc_encrypt -# define xcbc_encrypt des_xcbc_encrypt -# define cbc_cksum des_cbc_cksum -# define quad_cksum des_quad_cksum -# define check_parity des_check_key_parity -#endif - -#define des_fixup_key_parity DES_fixup_key_parity - -#ifdef __cplusplus -} -#endif - -/* for DES_read_pw_string et al */ -#include - -#endif diff --git a/Pods/OpenSSL-Universal/include-osx/openssl/dh.h b/Pods/OpenSSL-Universal/include-osx/openssl/dh.h deleted file mode 100644 index ea59e610..00000000 --- a/Pods/OpenSSL-Universal/include-osx/openssl/dh.h +++ /dev/null @@ -1,280 +0,0 @@ -/* crypto/dh/dh.h */ -/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) - * All rights reserved. - * - * This package is an SSL implementation written - * by Eric Young (eay@cryptsoft.com). - * The implementation was written so as to conform with Netscapes SSL. - * - * This library is free for commercial and non-commercial use as long as - * the following conditions are aheared to. The following conditions - * apply to all code found in this distribution, be it the RC4, RSA, - * lhash, DES, etc., code; not just the SSL code. The SSL documentation - * included with this distribution is covered by the same copyright terms - * except that the holder is Tim Hudson (tjh@cryptsoft.com). - * - * Copyright remains Eric Young's, and as such any Copyright notices in - * the code are not to be removed. - * If this package is used in a product, Eric Young should be given attribution - * as the author of the parts of the library used. - * This can be in the form of a textual message at program startup or - * in documentation (online or textual) provided with the package. - * - * Redistribution and use in source and binary forms, with or without - * modification, are permitted provided that the following conditions - * are met: - * 1. Redistributions of source code must retain the copyright - * notice, this list of conditions and the following disclaimer. - * 2. Redistributions in binary form must reproduce the above copyright - * notice, this list of conditions and the following disclaimer in the - * documentation and/or other materials provided with the distribution. - * 3. All advertising materials mentioning features or use of this software - * must display the following acknowledgement: - * "This product includes cryptographic software written by - * Eric Young (eay@cryptsoft.com)" - * The word 'cryptographic' can be left out if the rouines from the library - * being used are not cryptographic related :-). - * 4. If you include any Windows specific code (or a derivative thereof) from - * the apps directory (application code) you must include an acknowledgement: - * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" - * - * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND - * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE - * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE - * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE - * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL - * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS - * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) - * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT - * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY - * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF - * SUCH DAMAGE. - * - * The licence and distribution terms for any publically available version or - * derivative of this code cannot be changed. i.e. this code cannot simply be - * copied and put under another distribution licence - * [including the GNU Public Licence.] - */ - -#ifndef HEADER_DH_H -#define HEADER_DH_H - -#include - -#ifdef OPENSSL_NO_DH -#error DH is disabled. -#endif - -#ifndef OPENSSL_NO_BIO -#include -#endif -#include -#ifndef OPENSSL_NO_DEPRECATED -#include -#endif - -#ifndef OPENSSL_DH_MAX_MODULUS_BITS -# define OPENSSL_DH_MAX_MODULUS_BITS 10000 -#endif - -#define DH_FLAG_CACHE_MONT_P 0x01 -#define DH_FLAG_NO_EXP_CONSTTIME 0x02 /* new with 0.9.7h; the built-in DH - * implementation now uses constant time - * modular exponentiation for secret exponents - * by default. This flag causes the - * faster variable sliding window method to - * be used for all exponents. - */ - -/* If this flag is set the DH method is FIPS compliant and can be used - * in FIPS mode. This is set in the validated module method. If an - * application sets this flag in its own methods it is its reposibility - * to ensure the result is compliant. - */ - -#define DH_FLAG_FIPS_METHOD 0x0400 - -/* If this flag is set the operations normally disabled in FIPS mode are - * permitted it is then the applications responsibility to ensure that the - * usage is compliant. - */ - -#define DH_FLAG_NON_FIPS_ALLOW 0x0400 - -#ifdef __cplusplus -extern "C" { -#endif - -/* Already defined in ossl_typ.h */ -/* typedef struct dh_st DH; */ -/* typedef struct dh_method DH_METHOD; */ - -struct dh_method - { - const char *name; - /* Methods here */ - int (*generate_key)(DH *dh); - int (*compute_key)(unsigned char *key,const BIGNUM *pub_key,DH *dh); - int (*bn_mod_exp)(const DH *dh, BIGNUM *r, const BIGNUM *a, - const BIGNUM *p, const BIGNUM *m, BN_CTX *ctx, - BN_MONT_CTX *m_ctx); /* Can be null */ - - int (*init)(DH *dh); - int (*finish)(DH *dh); - int flags; - char *app_data; - /* If this is non-NULL, it will be used to generate parameters */ - int (*generate_params)(DH *dh, int prime_len, int generator, BN_GENCB *cb); - }; - -struct dh_st - { - /* This first argument is used to pick up errors when - * a DH is passed instead of a EVP_PKEY */ - int pad; - int version; - BIGNUM *p; - BIGNUM *g; - long length; /* optional */ - BIGNUM *pub_key; /* g^x */ - BIGNUM *priv_key; /* x */ - - int flags; - BN_MONT_CTX *method_mont_p; - /* Place holders if we want to do X9.42 DH */ - BIGNUM *q; - BIGNUM *j; - unsigned char *seed; - int seedlen; - BIGNUM *counter; - - int references; - CRYPTO_EX_DATA ex_data; - const DH_METHOD *meth; - ENGINE *engine; - }; - -#define DH_GENERATOR_2 2 -/* #define DH_GENERATOR_3 3 */ -#define DH_GENERATOR_5 5 - -/* DH_check error codes */ -#define DH_CHECK_P_NOT_PRIME 0x01 -#define DH_CHECK_P_NOT_SAFE_PRIME 0x02 -#define DH_UNABLE_TO_CHECK_GENERATOR 0x04 -#define DH_NOT_SUITABLE_GENERATOR 0x08 - -/* DH_check_pub_key error codes */ -#define DH_CHECK_PUBKEY_TOO_SMALL 0x01 -#define DH_CHECK_PUBKEY_TOO_LARGE 0x02 - -/* primes p where (p-1)/2 is prime too are called "safe"; we define - this for backward compatibility: */ -#define DH_CHECK_P_NOT_STRONG_PRIME DH_CHECK_P_NOT_SAFE_PRIME - -#define d2i_DHparams_fp(fp,x) (DH *)ASN1_d2i_fp((char *(*)())DH_new, \ - (char *(*)())d2i_DHparams,(fp),(unsigned char **)(x)) -#define i2d_DHparams_fp(fp,x) ASN1_i2d_fp(i2d_DHparams,(fp), \ - (unsigned char *)(x)) -#define d2i_DHparams_bio(bp,x) ASN1_d2i_bio_of(DH,DH_new,d2i_DHparams,bp,x) -#define i2d_DHparams_bio(bp,x) ASN1_i2d_bio_of_const(DH,i2d_DHparams,bp,x) - -DH *DHparams_dup(DH *); - -const DH_METHOD *DH_OpenSSL(void); - -void DH_set_default_method(const DH_METHOD *meth); -const DH_METHOD *DH_get_default_method(void); -int DH_set_method(DH *dh, const DH_METHOD *meth); -DH *DH_new_method(ENGINE *engine); - -DH * DH_new(void); -void DH_free(DH *dh); -int DH_up_ref(DH *dh); -int DH_size(const DH *dh); -int DH_get_ex_new_index(long argl, void *argp, CRYPTO_EX_new *new_func, - CRYPTO_EX_dup *dup_func, CRYPTO_EX_free *free_func); -int DH_set_ex_data(DH *d, int idx, void *arg); -void *DH_get_ex_data(DH *d, int idx); - -/* Deprecated version */ -#ifndef OPENSSL_NO_DEPRECATED -DH * DH_generate_parameters(int prime_len,int generator, - void (*callback)(int,int,void *),void *cb_arg); -#endif /* !defined(OPENSSL_NO_DEPRECATED) */ - -/* New version */ -int DH_generate_parameters_ex(DH *dh, int prime_len,int generator, BN_GENCB *cb); - -int DH_check(const DH *dh,int *codes); -int DH_check_pub_key(const DH *dh,const BIGNUM *pub_key, int *codes); -int DH_generate_key(DH *dh); -int DH_compute_key(unsigned char *key,const BIGNUM *pub_key,DH *dh); -DH * d2i_DHparams(DH **a,const unsigned char **pp, long length); -int i2d_DHparams(const DH *a,unsigned char **pp); -#ifndef OPENSSL_NO_FP_API -int DHparams_print_fp(FILE *fp, const DH *x); -#endif -#ifndef OPENSSL_NO_BIO -int DHparams_print(BIO *bp, const DH *x); -#else -int DHparams_print(char *bp, const DH *x); -#endif - -#define EVP_PKEY_CTX_set_dh_paramgen_prime_len(ctx, len) \ - EVP_PKEY_CTX_ctrl(ctx, EVP_PKEY_DH, EVP_PKEY_OP_PARAMGEN, \ - EVP_PKEY_CTRL_DH_PARAMGEN_PRIME_LEN, len, NULL) - -#define EVP_PKEY_CTX_set_dh_paramgen_generator(ctx, gen) \ - EVP_PKEY_CTX_ctrl(ctx, EVP_PKEY_DH, EVP_PKEY_OP_PARAMGEN, \ - EVP_PKEY_CTRL_DH_PARAMGEN_GENERATOR, gen, NULL) - -#define EVP_PKEY_CTRL_DH_PARAMGEN_PRIME_LEN (EVP_PKEY_ALG_CTRL + 1) -#define EVP_PKEY_CTRL_DH_PARAMGEN_GENERATOR (EVP_PKEY_ALG_CTRL + 2) - - -/* BEGIN ERROR CODES */ -/* The following lines are auto generated by the script mkerr.pl. Any changes - * made after this point may be overwritten when the script is next run. - */ -void ERR_load_DH_strings(void); - -/* Error codes for the DH functions. */ - -/* Function codes. */ -#define DH_F_COMPUTE_KEY 102 -#define DH_F_DHPARAMS_PRINT_FP 101 -#define DH_F_DH_BUILTIN_GENPARAMS 106 -#define DH_F_DH_COMPUTE_KEY 114 -#define DH_F_DH_GENERATE_KEY 115 -#define DH_F_DH_GENERATE_PARAMETERS_EX 116 -#define DH_F_DH_NEW_METHOD 105 -#define DH_F_DH_PARAM_DECODE 107 -#define DH_F_DH_PRIV_DECODE 110 -#define DH_F_DH_PRIV_ENCODE 111 -#define DH_F_DH_PUB_DECODE 108 -#define DH_F_DH_PUB_ENCODE 109 -#define DH_F_DO_DH_PRINT 100 -#define DH_F_GENERATE_KEY 103 -#define DH_F_GENERATE_PARAMETERS 104 -#define DH_F_PKEY_DH_DERIVE 112 -#define DH_F_PKEY_DH_KEYGEN 113 - -/* Reason codes. */ -#define DH_R_BAD_GENERATOR 101 -#define DH_R_BN_DECODE_ERROR 109 -#define DH_R_BN_ERROR 106 -#define DH_R_DECODE_ERROR 104 -#define DH_R_INVALID_PUBKEY 102 -#define DH_R_KEYS_NOT_SET 108 -#define DH_R_KEY_SIZE_TOO_SMALL 110 -#define DH_R_MODULUS_TOO_LARGE 103 -#define DH_R_NON_FIPS_METHOD 111 -#define DH_R_NO_PARAMETERS_SET 107 -#define DH_R_NO_PRIVATE_VALUE 100 -#define DH_R_PARAMETER_ENCODING_ERROR 105 - -#ifdef __cplusplus -} -#endif -#endif diff --git a/Pods/OpenSSL-Universal/include-osx/openssl/dsa.h b/Pods/OpenSSL-Universal/include-osx/openssl/dsa.h deleted file mode 100644 index a6f6d0b0..00000000 --- a/Pods/OpenSSL-Universal/include-osx/openssl/dsa.h +++ /dev/null @@ -1,327 +0,0 @@ -/* crypto/dsa/dsa.h */ -/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) - * All rights reserved. - * - * This package is an SSL implementation written - * by Eric Young (eay@cryptsoft.com). - * The implementation was written so as to conform with Netscapes SSL. - * - * This library is free for commercial and non-commercial use as long as - * the following conditions are aheared to. The following conditions - * apply to all code found in this distribution, be it the RC4, RSA, - * lhash, DES, etc., code; not just the SSL code. The SSL documentation - * included with this distribution is covered by the same copyright terms - * except that the holder is Tim Hudson (tjh@cryptsoft.com). - * - * Copyright remains Eric Young's, and as such any Copyright notices in - * the code are not to be removed. - * If this package is used in a product, Eric Young should be given attribution - * as the author of the parts of the library used. - * This can be in the form of a textual message at program startup or - * in documentation (online or textual) provided with the package. - * - * Redistribution and use in source and binary forms, with or without - * modification, are permitted provided that the following conditions - * are met: - * 1. Redistributions of source code must retain the copyright - * notice, this list of conditions and the following disclaimer. - * 2. Redistributions in binary form must reproduce the above copyright - * notice, this list of conditions and the following disclaimer in the - * documentation and/or other materials provided with the distribution. - * 3. All advertising materials mentioning features or use of this software - * must display the following acknowledgement: - * "This product includes cryptographic software written by - * Eric Young (eay@cryptsoft.com)" - * The word 'cryptographic' can be left out if the rouines from the library - * being used are not cryptographic related :-). - * 4. If you include any Windows specific code (or a derivative thereof) from - * the apps directory (application code) you must include an acknowledgement: - * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" - * - * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND - * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE - * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE - * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE - * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL - * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS - * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) - * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT - * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY - * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF - * SUCH DAMAGE. - * - * The licence and distribution terms for any publically available version or - * derivative of this code cannot be changed. i.e. this code cannot simply be - * copied and put under another distribution licence - * [including the GNU Public Licence.] - */ - -/* - * The DSS routines are based on patches supplied by - * Steven Schoch . He basically did the - * work and I have just tweaked them a little to fit into my - * stylistic vision for SSLeay :-) */ - -#ifndef HEADER_DSA_H -#define HEADER_DSA_H - -#include - -#ifdef OPENSSL_NO_DSA -#error DSA is disabled. -#endif - -#ifndef OPENSSL_NO_BIO -#include -#endif -#include -#include - -#ifndef OPENSSL_NO_DEPRECATED -#include -#ifndef OPENSSL_NO_DH -# include -#endif -#endif - -#ifndef OPENSSL_DSA_MAX_MODULUS_BITS -# define OPENSSL_DSA_MAX_MODULUS_BITS 10000 -#endif - -#define DSA_FLAG_CACHE_MONT_P 0x01 -#define DSA_FLAG_NO_EXP_CONSTTIME 0x02 /* new with 0.9.7h; the built-in DSA - * implementation now uses constant time - * modular exponentiation for secret exponents - * by default. This flag causes the - * faster variable sliding window method to - * be used for all exponents. - */ - -/* If this flag is set the DSA method is FIPS compliant and can be used - * in FIPS mode. This is set in the validated module method. If an - * application sets this flag in its own methods it is its reposibility - * to ensure the result is compliant. - */ - -#define DSA_FLAG_FIPS_METHOD 0x0400 - -/* If this flag is set the operations normally disabled in FIPS mode are - * permitted it is then the applications responsibility to ensure that the - * usage is compliant. - */ - -#define DSA_FLAG_NON_FIPS_ALLOW 0x0400 - -#ifdef __cplusplus -extern "C" { -#endif - -/* Already defined in ossl_typ.h */ -/* typedef struct dsa_st DSA; */ -/* typedef struct dsa_method DSA_METHOD; */ - -typedef struct DSA_SIG_st - { - BIGNUM *r; - BIGNUM *s; - } DSA_SIG; - -struct dsa_method - { - const char *name; - DSA_SIG * (*dsa_do_sign)(const unsigned char *dgst, int dlen, DSA *dsa); - int (*dsa_sign_setup)(DSA *dsa, BN_CTX *ctx_in, BIGNUM **kinvp, - BIGNUM **rp); - int (*dsa_do_verify)(const unsigned char *dgst, int dgst_len, - DSA_SIG *sig, DSA *dsa); - int (*dsa_mod_exp)(DSA *dsa, BIGNUM *rr, BIGNUM *a1, BIGNUM *p1, - BIGNUM *a2, BIGNUM *p2, BIGNUM *m, BN_CTX *ctx, - BN_MONT_CTX *in_mont); - int (*bn_mod_exp)(DSA *dsa, BIGNUM *r, BIGNUM *a, const BIGNUM *p, - const BIGNUM *m, BN_CTX *ctx, - BN_MONT_CTX *m_ctx); /* Can be null */ - int (*init)(DSA *dsa); - int (*finish)(DSA *dsa); - int flags; - char *app_data; - /* If this is non-NULL, it is used to generate DSA parameters */ - int (*dsa_paramgen)(DSA *dsa, int bits, - const unsigned char *seed, int seed_len, - int *counter_ret, unsigned long *h_ret, - BN_GENCB *cb); - /* If this is non-NULL, it is used to generate DSA keys */ - int (*dsa_keygen)(DSA *dsa); - }; - -struct dsa_st - { - /* This first variable is used to pick up errors where - * a DSA is passed instead of of a EVP_PKEY */ - int pad; - long version; - int write_params; - BIGNUM *p; - BIGNUM *q; /* == 20 */ - BIGNUM *g; - - BIGNUM *pub_key; /* y public key */ - BIGNUM *priv_key; /* x private key */ - - BIGNUM *kinv; /* Signing pre-calc */ - BIGNUM *r; /* Signing pre-calc */ - - int flags; - /* Normally used to cache montgomery values */ - BN_MONT_CTX *method_mont_p; - int references; - CRYPTO_EX_DATA ex_data; - const DSA_METHOD *meth; - /* functional reference if 'meth' is ENGINE-provided */ - ENGINE *engine; - }; - -#define d2i_DSAparams_fp(fp,x) (DSA *)ASN1_d2i_fp((char *(*)())DSA_new, \ - (char *(*)())d2i_DSAparams,(fp),(unsigned char **)(x)) -#define i2d_DSAparams_fp(fp,x) ASN1_i2d_fp(i2d_DSAparams,(fp), \ - (unsigned char *)(x)) -#define d2i_DSAparams_bio(bp,x) ASN1_d2i_bio_of(DSA,DSA_new,d2i_DSAparams,bp,x) -#define i2d_DSAparams_bio(bp,x) ASN1_i2d_bio_of_const(DSA,i2d_DSAparams,bp,x) - - -DSA *DSAparams_dup(DSA *x); -DSA_SIG * DSA_SIG_new(void); -void DSA_SIG_free(DSA_SIG *a); -int i2d_DSA_SIG(const DSA_SIG *a, unsigned char **pp); -DSA_SIG * d2i_DSA_SIG(DSA_SIG **v, const unsigned char **pp, long length); - -DSA_SIG * DSA_do_sign(const unsigned char *dgst,int dlen,DSA *dsa); -int DSA_do_verify(const unsigned char *dgst,int dgst_len, - DSA_SIG *sig,DSA *dsa); - -const DSA_METHOD *DSA_OpenSSL(void); - -void DSA_set_default_method(const DSA_METHOD *); -const DSA_METHOD *DSA_get_default_method(void); -int DSA_set_method(DSA *dsa, const DSA_METHOD *); - -DSA * DSA_new(void); -DSA * DSA_new_method(ENGINE *engine); -void DSA_free (DSA *r); -/* "up" the DSA object's reference count */ -int DSA_up_ref(DSA *r); -int DSA_size(const DSA *); - /* next 4 return -1 on error */ -int DSA_sign_setup( DSA *dsa,BN_CTX *ctx_in,BIGNUM **kinvp,BIGNUM **rp); -int DSA_sign(int type,const unsigned char *dgst,int dlen, - unsigned char *sig, unsigned int *siglen, DSA *dsa); -int DSA_verify(int type,const unsigned char *dgst,int dgst_len, - const unsigned char *sigbuf, int siglen, DSA *dsa); -int DSA_get_ex_new_index(long argl, void *argp, CRYPTO_EX_new *new_func, - CRYPTO_EX_dup *dup_func, CRYPTO_EX_free *free_func); -int DSA_set_ex_data(DSA *d, int idx, void *arg); -void *DSA_get_ex_data(DSA *d, int idx); - -DSA * d2i_DSAPublicKey(DSA **a, const unsigned char **pp, long length); -DSA * d2i_DSAPrivateKey(DSA **a, const unsigned char **pp, long length); -DSA * d2i_DSAparams(DSA **a, const unsigned char **pp, long length); - -/* Deprecated version */ -#ifndef OPENSSL_NO_DEPRECATED -DSA * DSA_generate_parameters(int bits, - unsigned char *seed,int seed_len, - int *counter_ret, unsigned long *h_ret,void - (*callback)(int, int, void *),void *cb_arg); -#endif /* !defined(OPENSSL_NO_DEPRECATED) */ - -/* New version */ -int DSA_generate_parameters_ex(DSA *dsa, int bits, - const unsigned char *seed,int seed_len, - int *counter_ret, unsigned long *h_ret, BN_GENCB *cb); - -int DSA_generate_key(DSA *a); -int i2d_DSAPublicKey(const DSA *a, unsigned char **pp); -int i2d_DSAPrivateKey(const DSA *a, unsigned char **pp); -int i2d_DSAparams(const DSA *a,unsigned char **pp); - -#ifndef OPENSSL_NO_BIO -int DSAparams_print(BIO *bp, const DSA *x); -int DSA_print(BIO *bp, const DSA *x, int off); -#endif -#ifndef OPENSSL_NO_FP_API -int DSAparams_print_fp(FILE *fp, const DSA *x); -int DSA_print_fp(FILE *bp, const DSA *x, int off); -#endif - -#define DSS_prime_checks 50 -/* Primality test according to FIPS PUB 186[-1], Appendix 2.1: - * 50 rounds of Rabin-Miller */ -#define DSA_is_prime(n, callback, cb_arg) \ - BN_is_prime(n, DSS_prime_checks, callback, NULL, cb_arg) - -#ifndef OPENSSL_NO_DH -/* Convert DSA structure (key or just parameters) into DH structure - * (be careful to avoid small subgroup attacks when using this!) */ -DH *DSA_dup_DH(const DSA *r); -#endif - -#define EVP_PKEY_CTX_set_dsa_paramgen_bits(ctx, nbits) \ - EVP_PKEY_CTX_ctrl(ctx, EVP_PKEY_DSA, EVP_PKEY_OP_PARAMGEN, \ - EVP_PKEY_CTRL_DSA_PARAMGEN_BITS, nbits, NULL) - -#define EVP_PKEY_CTRL_DSA_PARAMGEN_BITS (EVP_PKEY_ALG_CTRL + 1) -#define EVP_PKEY_CTRL_DSA_PARAMGEN_Q_BITS (EVP_PKEY_ALG_CTRL + 2) -#define EVP_PKEY_CTRL_DSA_PARAMGEN_MD (EVP_PKEY_ALG_CTRL + 3) - -/* BEGIN ERROR CODES */ -/* The following lines are auto generated by the script mkerr.pl. Any changes - * made after this point may be overwritten when the script is next run. - */ -void ERR_load_DSA_strings(void); - -/* Error codes for the DSA functions. */ - -/* Function codes. */ -#define DSA_F_D2I_DSA_SIG 110 -#define DSA_F_DO_DSA_PRINT 104 -#define DSA_F_DSAPARAMS_PRINT 100 -#define DSA_F_DSAPARAMS_PRINT_FP 101 -#define DSA_F_DSA_DO_SIGN 112 -#define DSA_F_DSA_DO_VERIFY 113 -#define DSA_F_DSA_GENERATE_KEY 124 -#define DSA_F_DSA_GENERATE_PARAMETERS_EX 123 -#define DSA_F_DSA_NEW_METHOD 103 -#define DSA_F_DSA_PARAM_DECODE 119 -#define DSA_F_DSA_PRINT_FP 105 -#define DSA_F_DSA_PRIV_DECODE 115 -#define DSA_F_DSA_PRIV_ENCODE 116 -#define DSA_F_DSA_PUB_DECODE 117 -#define DSA_F_DSA_PUB_ENCODE 118 -#define DSA_F_DSA_SIGN 106 -#define DSA_F_DSA_SIGN_SETUP 107 -#define DSA_F_DSA_SIG_NEW 109 -#define DSA_F_DSA_SIG_PRINT 125 -#define DSA_F_DSA_VERIFY 108 -#define DSA_F_I2D_DSA_SIG 111 -#define DSA_F_OLD_DSA_PRIV_DECODE 122 -#define DSA_F_PKEY_DSA_CTRL 120 -#define DSA_F_PKEY_DSA_KEYGEN 121 -#define DSA_F_SIG_CB 114 - -/* Reason codes. */ -#define DSA_R_BAD_Q_VALUE 102 -#define DSA_R_BN_DECODE_ERROR 108 -#define DSA_R_BN_ERROR 109 -#define DSA_R_DATA_TOO_LARGE_FOR_KEY_SIZE 100 -#define DSA_R_DECODE_ERROR 104 -#define DSA_R_INVALID_DIGEST_TYPE 106 -#define DSA_R_MISSING_PARAMETERS 101 -#define DSA_R_MODULUS_TOO_LARGE 103 -#define DSA_R_NEED_NEW_SETUP_VALUES 110 -#define DSA_R_NON_FIPS_DSA_METHOD 111 -#define DSA_R_NO_PARAMETERS_SET 107 -#define DSA_R_PARAMETER_ENCODING_ERROR 105 - -#ifdef __cplusplus -} -#endif -#endif diff --git a/Pods/OpenSSL-Universal/include-osx/openssl/dso.h b/Pods/OpenSSL-Universal/include-osx/openssl/dso.h deleted file mode 100644 index 839f2e06..00000000 --- a/Pods/OpenSSL-Universal/include-osx/openssl/dso.h +++ /dev/null @@ -1,409 +0,0 @@ -/* dso.h -*- mode:C; c-file-style: "eay" -*- */ -/* Written by Geoff Thorpe (geoff@geoffthorpe.net) for the OpenSSL - * project 2000. - */ -/* ==================================================================== - * Copyright (c) 2000 The OpenSSL Project. All rights reserved. - * - * Redistribution and use in source and binary forms, with or without - * modification, are permitted provided that the following conditions - * are met: - * - * 1. Redistributions of source code must retain the above copyright - * notice, this list of conditions and the following disclaimer. - * - * 2. Redistributions in binary form must reproduce the above copyright - * notice, this list of conditions and the following disclaimer in - * the documentation and/or other materials provided with the - * distribution. - * - * 3. All advertising materials mentioning features or use of this - * software must display the following acknowledgment: - * "This product includes software developed by the OpenSSL Project - * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)" - * - * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to - * endorse or promote products derived from this software without - * prior written permission. For written permission, please contact - * licensing@OpenSSL.org. - * - * 5. Products derived from this software may not be called "OpenSSL" - * nor may "OpenSSL" appear in their names without prior written - * permission of the OpenSSL Project. - * - * 6. Redistributions of any form whatsoever must retain the following - * acknowledgment: - * "This product includes software developed by the OpenSSL Project - * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)" - * - * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY - * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE - * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR - * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR - * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, - * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT - * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; - * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) - * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, - * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) - * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED - * OF THE POSSIBILITY OF SUCH DAMAGE. - * ==================================================================== - * - * This product includes cryptographic software written by Eric Young - * (eay@cryptsoft.com). This product includes software written by Tim - * Hudson (tjh@cryptsoft.com). - * - */ - -#ifndef HEADER_DSO_H -#define HEADER_DSO_H - -#include - -#ifdef __cplusplus -extern "C" { -#endif - -/* These values are used as commands to DSO_ctrl() */ -#define DSO_CTRL_GET_FLAGS 1 -#define DSO_CTRL_SET_FLAGS 2 -#define DSO_CTRL_OR_FLAGS 3 - -/* By default, DSO_load() will translate the provided filename into a form - * typical for the platform (more specifically the DSO_METHOD) using the - * dso_name_converter function of the method. Eg. win32 will transform "blah" - * into "blah.dll", and dlfcn will transform it into "libblah.so". The - * behaviour can be overriden by setting the name_converter callback in the DSO - * object (using DSO_set_name_converter()). This callback could even utilise - * the DSO_METHOD's converter too if it only wants to override behaviour for - * one or two possible DSO methods. However, the following flag can be set in a - * DSO to prevent *any* native name-translation at all - eg. if the caller has - * prompted the user for a path to a driver library so the filename should be - * interpreted as-is. */ -#define DSO_FLAG_NO_NAME_TRANSLATION 0x01 -/* An extra flag to give if only the extension should be added as - * translation. This is obviously only of importance on Unix and - * other operating systems where the translation also may prefix - * the name with something, like 'lib', and ignored everywhere else. - * This flag is also ignored if DSO_FLAG_NO_NAME_TRANSLATION is used - * at the same time. */ -#define DSO_FLAG_NAME_TRANSLATION_EXT_ONLY 0x02 - -/* The following flag controls the translation of symbol names to upper - * case. This is currently only being implemented for OpenVMS. - */ -#define DSO_FLAG_UPCASE_SYMBOL 0x10 - -/* This flag loads the library with public symbols. - * Meaning: The exported symbols of this library are public - * to all libraries loaded after this library. - * At the moment only implemented in unix. - */ -#define DSO_FLAG_GLOBAL_SYMBOLS 0x20 - - -typedef void (*DSO_FUNC_TYPE)(void); - -typedef struct dso_st DSO; - -/* The function prototype used for method functions (or caller-provided - * callbacks) that transform filenames. They are passed a DSO structure pointer - * (or NULL if they are to be used independantly of a DSO object) and a - * filename to transform. They should either return NULL (if there is an error - * condition) or a newly allocated string containing the transformed form that - * the caller will need to free with OPENSSL_free() when done. */ -typedef char* (*DSO_NAME_CONVERTER_FUNC)(DSO *, const char *); -/* The function prototype used for method functions (or caller-provided - * callbacks) that merge two file specifications. They are passed a - * DSO structure pointer (or NULL if they are to be used independantly of - * a DSO object) and two file specifications to merge. They should - * either return NULL (if there is an error condition) or a newly allocated - * string containing the result of merging that the caller will need - * to free with OPENSSL_free() when done. - * Here, merging means that bits and pieces are taken from each of the - * file specifications and added together in whatever fashion that is - * sensible for the DSO method in question. The only rule that really - * applies is that if the two specification contain pieces of the same - * type, the copy from the first string takes priority. One could see - * it as the first specification is the one given by the user and the - * second being a bunch of defaults to add on if they're missing in the - * first. */ -typedef char* (*DSO_MERGER_FUNC)(DSO *, const char *, const char *); - -typedef struct dso_meth_st - { - const char *name; - /* Loads a shared library, NB: new DSO_METHODs must ensure that a - * successful load populates the loaded_filename field, and likewise a - * successful unload OPENSSL_frees and NULLs it out. */ - int (*dso_load)(DSO *dso); - /* Unloads a shared library */ - int (*dso_unload)(DSO *dso); - /* Binds a variable */ - void *(*dso_bind_var)(DSO *dso, const char *symname); - /* Binds a function - assumes a return type of DSO_FUNC_TYPE. - * This should be cast to the real function prototype by the - * caller. Platforms that don't have compatible representations - * for different prototypes (this is possible within ANSI C) - * are highly unlikely to have shared libraries at all, let - * alone a DSO_METHOD implemented for them. */ - DSO_FUNC_TYPE (*dso_bind_func)(DSO *dso, const char *symname); - -/* I don't think this would actually be used in any circumstances. */ -#if 0 - /* Unbinds a variable */ - int (*dso_unbind_var)(DSO *dso, char *symname, void *symptr); - /* Unbinds a function */ - int (*dso_unbind_func)(DSO *dso, char *symname, DSO_FUNC_TYPE symptr); -#endif - /* The generic (yuck) "ctrl()" function. NB: Negative return - * values (rather than zero) indicate errors. */ - long (*dso_ctrl)(DSO *dso, int cmd, long larg, void *parg); - /* The default DSO_METHOD-specific function for converting filenames to - * a canonical native form. */ - DSO_NAME_CONVERTER_FUNC dso_name_converter; - /* The default DSO_METHOD-specific function for converting filenames to - * a canonical native form. */ - DSO_MERGER_FUNC dso_merger; - - /* [De]Initialisation handlers. */ - int (*init)(DSO *dso); - int (*finish)(DSO *dso); - - /* Return pathname of the module containing location */ - int (*pathbyaddr)(void *addr,char *path,int sz); - /* Perform global symbol lookup, i.e. among *all* modules */ - void *(*globallookup)(const char *symname); - } DSO_METHOD; - -/**********************************************************************/ -/* The low-level handle type used to refer to a loaded shared library */ - -struct dso_st - { - DSO_METHOD *meth; - /* Standard dlopen uses a (void *). Win32 uses a HANDLE. VMS - * doesn't use anything but will need to cache the filename - * for use in the dso_bind handler. All in all, let each - * method control its own destiny. "Handles" and such go in - * a STACK. */ - STACK_OF(void) *meth_data; - int references; - int flags; - /* For use by applications etc ... use this for your bits'n'pieces, - * don't touch meth_data! */ - CRYPTO_EX_DATA ex_data; - /* If this callback function pointer is set to non-NULL, then it will - * be used in DSO_load() in place of meth->dso_name_converter. NB: This - * should normally set using DSO_set_name_converter(). */ - DSO_NAME_CONVERTER_FUNC name_converter; - /* If this callback function pointer is set to non-NULL, then it will - * be used in DSO_load() in place of meth->dso_merger. NB: This - * should normally set using DSO_set_merger(). */ - DSO_MERGER_FUNC merger; - /* This is populated with (a copy of) the platform-independant - * filename used for this DSO. */ - char *filename; - /* This is populated with (a copy of) the translated filename by which - * the DSO was actually loaded. It is NULL iff the DSO is not currently - * loaded. NB: This is here because the filename translation process - * may involve a callback being invoked more than once not only to - * convert to a platform-specific form, but also to try different - * filenames in the process of trying to perform a load. As such, this - * variable can be used to indicate (a) whether this DSO structure - * corresponds to a loaded library or not, and (b) the filename with - * which it was actually loaded. */ - char *loaded_filename; - }; - - -DSO * DSO_new(void); -DSO * DSO_new_method(DSO_METHOD *method); -int DSO_free(DSO *dso); -int DSO_flags(DSO *dso); -int DSO_up_ref(DSO *dso); -long DSO_ctrl(DSO *dso, int cmd, long larg, void *parg); - -/* This function sets the DSO's name_converter callback. If it is non-NULL, - * then it will be used instead of the associated DSO_METHOD's function. If - * oldcb is non-NULL then it is set to the function pointer value being - * replaced. Return value is non-zero for success. */ -int DSO_set_name_converter(DSO *dso, DSO_NAME_CONVERTER_FUNC cb, - DSO_NAME_CONVERTER_FUNC *oldcb); -/* These functions can be used to get/set the platform-independant filename - * used for a DSO. NB: set will fail if the DSO is already loaded. */ -const char *DSO_get_filename(DSO *dso); -int DSO_set_filename(DSO *dso, const char *filename); -/* This function will invoke the DSO's name_converter callback to translate a - * filename, or if the callback isn't set it will instead use the DSO_METHOD's - * converter. If "filename" is NULL, the "filename" in the DSO itself will be - * used. If the DSO_FLAG_NO_NAME_TRANSLATION flag is set, then the filename is - * simply duplicated. NB: This function is usually called from within a - * DSO_METHOD during the processing of a DSO_load() call, and is exposed so that - * caller-created DSO_METHODs can do the same thing. A non-NULL return value - * will need to be OPENSSL_free()'d. */ -char *DSO_convert_filename(DSO *dso, const char *filename); -/* This function will invoke the DSO's merger callback to merge two file - * specifications, or if the callback isn't set it will instead use the - * DSO_METHOD's merger. A non-NULL return value will need to be - * OPENSSL_free()'d. */ -char *DSO_merge(DSO *dso, const char *filespec1, const char *filespec2); -/* If the DSO is currently loaded, this returns the filename that it was loaded - * under, otherwise it returns NULL. So it is also useful as a test as to - * whether the DSO is currently loaded. NB: This will not necessarily return - * the same value as DSO_convert_filename(dso, dso->filename), because the - * DSO_METHOD's load function may have tried a variety of filenames (with - * and/or without the aid of the converters) before settling on the one it - * actually loaded. */ -const char *DSO_get_loaded_filename(DSO *dso); - -void DSO_set_default_method(DSO_METHOD *meth); -DSO_METHOD *DSO_get_default_method(void); -DSO_METHOD *DSO_get_method(DSO *dso); -DSO_METHOD *DSO_set_method(DSO *dso, DSO_METHOD *meth); - -/* The all-singing all-dancing load function, you normally pass NULL - * for the first and third parameters. Use DSO_up and DSO_free for - * subsequent reference count handling. Any flags passed in will be set - * in the constructed DSO after its init() function but before the - * load operation. If 'dso' is non-NULL, 'flags' is ignored. */ -DSO *DSO_load(DSO *dso, const char *filename, DSO_METHOD *meth, int flags); - -/* This function binds to a variable inside a shared library. */ -void *DSO_bind_var(DSO *dso, const char *symname); - -/* This function binds to a function inside a shared library. */ -DSO_FUNC_TYPE DSO_bind_func(DSO *dso, const char *symname); - -/* This method is the default, but will beg, borrow, or steal whatever - * method should be the default on any particular platform (including - * DSO_METH_null() if necessary). */ -DSO_METHOD *DSO_METHOD_openssl(void); - -/* This method is defined for all platforms - if a platform has no - * DSO support then this will be the only method! */ -DSO_METHOD *DSO_METHOD_null(void); - -/* If DSO_DLFCN is defined, the standard dlfcn.h-style functions - * (dlopen, dlclose, dlsym, etc) will be used and incorporated into - * this method. If not, this method will return NULL. */ -DSO_METHOD *DSO_METHOD_dlfcn(void); - -/* If DSO_DL is defined, the standard dl.h-style functions (shl_load, - * shl_unload, shl_findsym, etc) will be used and incorporated into - * this method. If not, this method will return NULL. */ -DSO_METHOD *DSO_METHOD_dl(void); - -/* If WIN32 is defined, use DLLs. If not, return NULL. */ -DSO_METHOD *DSO_METHOD_win32(void); - -/* If VMS is defined, use shared images. If not, return NULL. */ -DSO_METHOD *DSO_METHOD_vms(void); - -/* This function writes null-terminated pathname of DSO module - * containing 'addr' into 'sz' large caller-provided 'path' and - * returns the number of characters [including trailing zero] - * written to it. If 'sz' is 0 or negative, 'path' is ignored and - * required amount of charachers [including trailing zero] to - * accomodate pathname is returned. If 'addr' is NULL, then - * pathname of cryptolib itself is returned. Negative or zero - * return value denotes error. - */ -int DSO_pathbyaddr(void *addr,char *path,int sz); - -/* This function should be used with caution! It looks up symbols in - * *all* loaded modules and if module gets unloaded by somebody else - * attempt to dereference the pointer is doomed to have fatal - * consequences. Primary usage for this function is to probe *core* - * system functionality, e.g. check if getnameinfo(3) is available - * at run-time without bothering about OS-specific details such as - * libc.so.versioning or where does it actually reside: in libc - * itself or libsocket. */ -void *DSO_global_lookup(const char *name); - -/* If BeOS is defined, use shared images. If not, return NULL. */ -DSO_METHOD *DSO_METHOD_beos(void); - -/* BEGIN ERROR CODES */ -/* The following lines are auto generated by the script mkerr.pl. Any changes - * made after this point may be overwritten when the script is next run. - */ -void ERR_load_DSO_strings(void); - -/* Error codes for the DSO functions. */ - -/* Function codes. */ -#define DSO_F_BEOS_BIND_FUNC 144 -#define DSO_F_BEOS_BIND_VAR 145 -#define DSO_F_BEOS_LOAD 146 -#define DSO_F_BEOS_NAME_CONVERTER 147 -#define DSO_F_BEOS_UNLOAD 148 -#define DSO_F_DLFCN_BIND_FUNC 100 -#define DSO_F_DLFCN_BIND_VAR 101 -#define DSO_F_DLFCN_LOAD 102 -#define DSO_F_DLFCN_MERGER 130 -#define DSO_F_DLFCN_NAME_CONVERTER 123 -#define DSO_F_DLFCN_UNLOAD 103 -#define DSO_F_DL_BIND_FUNC 104 -#define DSO_F_DL_BIND_VAR 105 -#define DSO_F_DL_LOAD 106 -#define DSO_F_DL_MERGER 131 -#define DSO_F_DL_NAME_CONVERTER 124 -#define DSO_F_DL_UNLOAD 107 -#define DSO_F_DSO_BIND_FUNC 108 -#define DSO_F_DSO_BIND_VAR 109 -#define DSO_F_DSO_CONVERT_FILENAME 126 -#define DSO_F_DSO_CTRL 110 -#define DSO_F_DSO_FREE 111 -#define DSO_F_DSO_GET_FILENAME 127 -#define DSO_F_DSO_GET_LOADED_FILENAME 128 -#define DSO_F_DSO_GLOBAL_LOOKUP 139 -#define DSO_F_DSO_LOAD 112 -#define DSO_F_DSO_MERGE 132 -#define DSO_F_DSO_NEW_METHOD 113 -#define DSO_F_DSO_PATHBYADDR 140 -#define DSO_F_DSO_SET_FILENAME 129 -#define DSO_F_DSO_SET_NAME_CONVERTER 122 -#define DSO_F_DSO_UP_REF 114 -#define DSO_F_GLOBAL_LOOKUP_FUNC 138 -#define DSO_F_PATHBYADDR 137 -#define DSO_F_VMS_BIND_SYM 115 -#define DSO_F_VMS_LOAD 116 -#define DSO_F_VMS_MERGER 133 -#define DSO_F_VMS_UNLOAD 117 -#define DSO_F_WIN32_BIND_FUNC 118 -#define DSO_F_WIN32_BIND_VAR 119 -#define DSO_F_WIN32_GLOBALLOOKUP 142 -#define DSO_F_WIN32_GLOBALLOOKUP_FUNC 143 -#define DSO_F_WIN32_JOINER 135 -#define DSO_F_WIN32_LOAD 120 -#define DSO_F_WIN32_MERGER 134 -#define DSO_F_WIN32_NAME_CONVERTER 125 -#define DSO_F_WIN32_PATHBYADDR 141 -#define DSO_F_WIN32_SPLITTER 136 -#define DSO_F_WIN32_UNLOAD 121 - -/* Reason codes. */ -#define DSO_R_CTRL_FAILED 100 -#define DSO_R_DSO_ALREADY_LOADED 110 -#define DSO_R_EMPTY_FILE_STRUCTURE 113 -#define DSO_R_FAILURE 114 -#define DSO_R_FILENAME_TOO_BIG 101 -#define DSO_R_FINISH_FAILED 102 -#define DSO_R_INCORRECT_FILE_SYNTAX 115 -#define DSO_R_LOAD_FAILED 103 -#define DSO_R_NAME_TRANSLATION_FAILED 109 -#define DSO_R_NO_FILENAME 111 -#define DSO_R_NO_FILE_SPECIFICATION 116 -#define DSO_R_NULL_HANDLE 104 -#define DSO_R_SET_FILENAME_FAILED 112 -#define DSO_R_STACK_ERROR 105 -#define DSO_R_SYM_FAILURE 106 -#define DSO_R_UNLOAD_FAILED 107 -#define DSO_R_UNSUPPORTED 108 - -#ifdef __cplusplus -} -#endif -#endif diff --git a/Pods/OpenSSL-Universal/include-osx/openssl/dtls1.h b/Pods/OpenSSL-Universal/include-osx/openssl/dtls1.h deleted file mode 100644 index e65d5011..00000000 --- a/Pods/OpenSSL-Universal/include-osx/openssl/dtls1.h +++ /dev/null @@ -1,287 +0,0 @@ -/* ssl/dtls1.h */ -/* - * DTLS implementation written by Nagendra Modadugu - * (nagendra@cs.stanford.edu) for the OpenSSL project 2005. - */ -/* ==================================================================== - * Copyright (c) 1999-2005 The OpenSSL Project. All rights reserved. - * - * Redistribution and use in source and binary forms, with or without - * modification, are permitted provided that the following conditions - * are met: - * - * 1. Redistributions of source code must retain the above copyright - * notice, this list of conditions and the following disclaimer. - * - * 2. Redistributions in binary form must reproduce the above copyright - * notice, this list of conditions and the following disclaimer in - * the documentation and/or other materials provided with the - * distribution. - * - * 3. All advertising materials mentioning features or use of this - * software must display the following acknowledgment: - * "This product includes software developed by the OpenSSL Project - * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)" - * - * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to - * endorse or promote products derived from this software without - * prior written permission. For written permission, please contact - * openssl-core@OpenSSL.org. - * - * 5. Products derived from this software may not be called "OpenSSL" - * nor may "OpenSSL" appear in their names without prior written - * permission of the OpenSSL Project. - * - * 6. Redistributions of any form whatsoever must retain the following - * acknowledgment: - * "This product includes software developed by the OpenSSL Project - * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)" - * - * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY - * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE - * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR - * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR - * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, - * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT - * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; - * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) - * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, - * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) - * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED - * OF THE POSSIBILITY OF SUCH DAMAGE. - * ==================================================================== - * - * This product includes cryptographic software written by Eric Young - * (eay@cryptsoft.com). This product includes software written by Tim - * Hudson (tjh@cryptsoft.com). - * - */ - -#ifndef HEADER_DTLS1_H -#define HEADER_DTLS1_H - -#include -#include -#ifdef OPENSSL_SYS_VMS -#include -#include -#endif -#ifdef OPENSSL_SYS_WIN32 -/* Needed for struct timeval */ -#include -#elif defined(OPENSSL_SYS_NETWARE) && !defined(_WINSOCK2API_) -#include -#else -#if defined(OPENSSL_SYS_VXWORKS) -#include -#else -#include -#endif -#endif - -#ifdef __cplusplus -extern "C" { -#endif - -#define DTLS1_VERSION 0xFEFF -#define DTLS1_BAD_VER 0x0100 - -#if 0 -/* this alert description is not specified anywhere... */ -#define DTLS1_AD_MISSING_HANDSHAKE_MESSAGE 110 -#endif - -/* lengths of messages */ -#define DTLS1_COOKIE_LENGTH 256 - -#define DTLS1_RT_HEADER_LENGTH 13 - -#define DTLS1_HM_HEADER_LENGTH 12 - -#define DTLS1_HM_BAD_FRAGMENT -2 -#define DTLS1_HM_FRAGMENT_RETRY -3 - -#define DTLS1_CCS_HEADER_LENGTH 1 - -#ifdef DTLS1_AD_MISSING_HANDSHAKE_MESSAGE -#define DTLS1_AL_HEADER_LENGTH 7 -#else -#define DTLS1_AL_HEADER_LENGTH 2 -#endif - -#ifndef OPENSSL_NO_SSL_INTERN - -#ifndef OPENSSL_NO_SCTP -#define DTLS1_SCTP_AUTH_LABEL "EXPORTER_DTLS_OVER_SCTP" -#endif - -typedef struct dtls1_bitmap_st - { - unsigned long map; /* track 32 packets on 32-bit systems - and 64 - on 64-bit systems */ - unsigned char max_seq_num[8]; /* max record number seen so far, - 64-bit value in big-endian - encoding */ - } DTLS1_BITMAP; - -struct dtls1_retransmit_state - { - EVP_CIPHER_CTX *enc_write_ctx; /* cryptographic state */ - EVP_MD_CTX *write_hash; /* used for mac generation */ -#ifndef OPENSSL_NO_COMP - COMP_CTX *compress; /* compression */ -#else - char *compress; -#endif - SSL_SESSION *session; - unsigned short epoch; - }; - -struct hm_header_st - { - unsigned char type; - unsigned long msg_len; - unsigned short seq; - unsigned long frag_off; - unsigned long frag_len; - unsigned int is_ccs; - struct dtls1_retransmit_state saved_retransmit_state; - }; - -struct ccs_header_st - { - unsigned char type; - unsigned short seq; - }; - -struct dtls1_timeout_st - { - /* Number of read timeouts so far */ - unsigned int read_timeouts; - - /* Number of write timeouts so far */ - unsigned int write_timeouts; - - /* Number of alerts received so far */ - unsigned int num_alerts; - }; - -typedef struct record_pqueue_st - { - unsigned short epoch; - pqueue q; - } record_pqueue; - -typedef struct hm_fragment_st - { - struct hm_header_st msg_header; - unsigned char *fragment; - unsigned char *reassembly; - } hm_fragment; - -typedef struct dtls1_state_st - { - unsigned int send_cookie; - unsigned char cookie[DTLS1_COOKIE_LENGTH]; - unsigned char rcvd_cookie[DTLS1_COOKIE_LENGTH]; - unsigned int cookie_len; - - /* - * The current data and handshake epoch. This is initially - * undefined, and starts at zero once the initial handshake is - * completed - */ - unsigned short r_epoch; - unsigned short w_epoch; - - /* records being received in the current epoch */ - DTLS1_BITMAP bitmap; - - /* renegotiation starts a new set of sequence numbers */ - DTLS1_BITMAP next_bitmap; - - /* handshake message numbers */ - unsigned short handshake_write_seq; - unsigned short next_handshake_write_seq; - - unsigned short handshake_read_seq; - - /* save last sequence number for retransmissions */ - unsigned char last_write_sequence[8]; - - /* Received handshake records (processed and unprocessed) */ - record_pqueue unprocessed_rcds; - record_pqueue processed_rcds; - - /* Buffered handshake messages */ - pqueue buffered_messages; - - /* Buffered (sent) handshake records */ - pqueue sent_messages; - - /* Buffered application records. - * Only for records between CCS and Finished - * to prevent either protocol violation or - * unnecessary message loss. - */ - record_pqueue buffered_app_data; - - /* Is set when listening for new connections with dtls1_listen() */ - unsigned int listen; - - unsigned int mtu; /* max DTLS packet size */ - - struct hm_header_st w_msg_hdr; - struct hm_header_st r_msg_hdr; - - struct dtls1_timeout_st timeout; - - /* Indicates when the last handshake msg or heartbeat sent will timeout */ - struct timeval next_timeout; - - /* Timeout duration */ - unsigned short timeout_duration; - - /* storage for Alert/Handshake protocol data received but not - * yet processed by ssl3_read_bytes: */ - unsigned char alert_fragment[DTLS1_AL_HEADER_LENGTH]; - unsigned int alert_fragment_len; - unsigned char handshake_fragment[DTLS1_HM_HEADER_LENGTH]; - unsigned int handshake_fragment_len; - - unsigned int retransmitting; - unsigned int change_cipher_spec_ok; - -#ifndef OPENSSL_NO_SCTP - /* used when SSL_ST_XX_FLUSH is entered */ - int next_state; - - int shutdown_received; -#endif - - } DTLS1_STATE; - -typedef struct dtls1_record_data_st - { - unsigned char *packet; - unsigned int packet_length; - SSL3_BUFFER rbuf; - SSL3_RECORD rrec; -#ifndef OPENSSL_NO_SCTP - struct bio_dgram_sctp_rcvinfo recordinfo; -#endif - } DTLS1_RECORD_DATA; - -#endif - -/* Timeout multipliers (timeout slice is defined in apps/timeouts.h */ -#define DTLS1_TMO_READ_COUNT 2 -#define DTLS1_TMO_WRITE_COUNT 2 - -#define DTLS1_TMO_ALERT_COUNT 12 - -#ifdef __cplusplus -} -#endif -#endif - diff --git a/Pods/OpenSSL-Universal/include-osx/openssl/e_os2.h b/Pods/OpenSSL-Universal/include-osx/openssl/e_os2.h deleted file mode 100644 index d22c0368..00000000 --- a/Pods/OpenSSL-Universal/include-osx/openssl/e_os2.h +++ /dev/null @@ -1,315 +0,0 @@ -/* e_os2.h */ -/* ==================================================================== - * Copyright (c) 1998-2000 The OpenSSL Project. All rights reserved. - * - * Redistribution and use in source and binary forms, with or without - * modification, are permitted provided that the following conditions - * are met: - * - * 1. Redistributions of source code must retain the above copyright - * notice, this list of conditions and the following disclaimer. - * - * 2. Redistributions in binary form must reproduce the above copyright - * notice, this list of conditions and the following disclaimer in - * the documentation and/or other materials provided with the - * distribution. - * - * 3. All advertising materials mentioning features or use of this - * software must display the following acknowledgment: - * "This product includes software developed by the OpenSSL Project - * for use in the OpenSSL Toolkit. (http://www.openssl.org/)" - * - * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to - * endorse or promote products derived from this software without - * prior written permission. For written permission, please contact - * openssl-core@openssl.org. - * - * 5. Products derived from this software may not be called "OpenSSL" - * nor may "OpenSSL" appear in their names without prior written - * permission of the OpenSSL Project. - * - * 6. Redistributions of any form whatsoever must retain the following - * acknowledgment: - * "This product includes software developed by the OpenSSL Project - * for use in the OpenSSL Toolkit (http://www.openssl.org/)" - * - * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY - * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE - * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR - * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR - * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, - * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT - * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; - * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) - * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, - * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) - * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED - * OF THE POSSIBILITY OF SUCH DAMAGE. - * ==================================================================== - * - * This product includes cryptographic software written by Eric Young - * (eay@cryptsoft.com). This product includes software written by Tim - * Hudson (tjh@cryptsoft.com). - * - */ - -#include - -#ifndef HEADER_E_OS2_H -#define HEADER_E_OS2_H - -#ifdef __cplusplus -extern "C" { -#endif - -/****************************************************************************** - * Detect operating systems. This probably needs completing. - * The result is that at least one OPENSSL_SYS_os macro should be defined. - * However, if none is defined, Unix is assumed. - **/ - -#define OPENSSL_SYS_UNIX - -/* ----------------------- Macintosh, before MacOS X ----------------------- */ -#if defined(__MWERKS__) && defined(macintosh) || defined(OPENSSL_SYSNAME_MAC) -# undef OPENSSL_SYS_UNIX -# define OPENSSL_SYS_MACINTOSH_CLASSIC -#endif - -/* ----------------------- NetWare ----------------------------------------- */ -#if defined(NETWARE) || defined(OPENSSL_SYSNAME_NETWARE) -# undef OPENSSL_SYS_UNIX -# define OPENSSL_SYS_NETWARE -#endif - -/* ---------------------- Microsoft operating systems ---------------------- */ - -/* Note that MSDOS actually denotes 32-bit environments running on top of - MS-DOS, such as DJGPP one. */ -#if defined(OPENSSL_SYSNAME_MSDOS) -# undef OPENSSL_SYS_UNIX -# define OPENSSL_SYS_MSDOS -#endif - -/* For 32 bit environment, there seems to be the CygWin environment and then - all the others that try to do the same thing Microsoft does... */ -#if defined(OPENSSL_SYSNAME_UWIN) -# undef OPENSSL_SYS_UNIX -# define OPENSSL_SYS_WIN32_UWIN -#else -# if defined(__CYGWIN32__) || defined(OPENSSL_SYSNAME_CYGWIN32) -# undef OPENSSL_SYS_UNIX -# define OPENSSL_SYS_WIN32_CYGWIN -# else -# if defined(_WIN32) || defined(OPENSSL_SYSNAME_WIN32) -# undef OPENSSL_SYS_UNIX -# define OPENSSL_SYS_WIN32 -# endif -# if defined(OPENSSL_SYSNAME_WINNT) -# undef OPENSSL_SYS_UNIX -# define OPENSSL_SYS_WINNT -# endif -# if defined(OPENSSL_SYSNAME_WINCE) -# undef OPENSSL_SYS_UNIX -# define OPENSSL_SYS_WINCE -# endif -# endif -#endif - -/* Anything that tries to look like Microsoft is "Windows" */ -#if defined(OPENSSL_SYS_WIN32) || defined(OPENSSL_SYS_WINNT) || defined(OPENSSL_SYS_WINCE) -# undef OPENSSL_SYS_UNIX -# define OPENSSL_SYS_WINDOWS -# ifndef OPENSSL_SYS_MSDOS -# define OPENSSL_SYS_MSDOS -# endif -#endif - -/* DLL settings. This part is a bit tough, because it's up to the application - implementor how he or she will link the application, so it requires some - macro to be used. */ -#ifdef OPENSSL_SYS_WINDOWS -# ifndef OPENSSL_OPT_WINDLL -# if defined(_WINDLL) /* This is used when building OpenSSL to indicate that - DLL linkage should be used */ -# define OPENSSL_OPT_WINDLL -# endif -# endif -#endif - -/* -------------------------------- OpenVMS -------------------------------- */ -#if defined(__VMS) || defined(VMS) || defined(OPENSSL_SYSNAME_VMS) -# undef OPENSSL_SYS_UNIX -# define OPENSSL_SYS_VMS -# if defined(__DECC) -# define OPENSSL_SYS_VMS_DECC -# elif defined(__DECCXX) -# define OPENSSL_SYS_VMS_DECC -# define OPENSSL_SYS_VMS_DECCXX -# else -# define OPENSSL_SYS_VMS_NODECC -# endif -#endif - -/* --------------------------------- OS/2 ---------------------------------- */ -#if defined(__EMX__) || defined(__OS2__) -# undef OPENSSL_SYS_UNIX -# define OPENSSL_SYS_OS2 -#endif - -/* --------------------------------- Unix ---------------------------------- */ -#ifdef OPENSSL_SYS_UNIX -# if defined(linux) || defined(__linux__) || defined(OPENSSL_SYSNAME_LINUX) -# define OPENSSL_SYS_LINUX -# endif -# ifdef OPENSSL_SYSNAME_MPE -# define OPENSSL_SYS_MPE -# endif -# ifdef OPENSSL_SYSNAME_SNI -# define OPENSSL_SYS_SNI -# endif -# ifdef OPENSSL_SYSNAME_ULTRASPARC -# define OPENSSL_SYS_ULTRASPARC -# endif -# ifdef OPENSSL_SYSNAME_NEWS4 -# define OPENSSL_SYS_NEWS4 -# endif -# ifdef OPENSSL_SYSNAME_MACOSX -# define OPENSSL_SYS_MACOSX -# endif -# ifdef OPENSSL_SYSNAME_MACOSX_RHAPSODY -# define OPENSSL_SYS_MACOSX_RHAPSODY -# define OPENSSL_SYS_MACOSX -# endif -# ifdef OPENSSL_SYSNAME_SUNOS -# define OPENSSL_SYS_SUNOS -#endif -# if defined(_CRAY) || defined(OPENSSL_SYSNAME_CRAY) -# define OPENSSL_SYS_CRAY -# endif -# if defined(_AIX) || defined(OPENSSL_SYSNAME_AIX) -# define OPENSSL_SYS_AIX -# endif -#endif - -/* --------------------------------- VOS ----------------------------------- */ -#if defined(__VOS__) || defined(OPENSSL_SYSNAME_VOS) -# define OPENSSL_SYS_VOS -#ifdef __HPPA__ -# define OPENSSL_SYS_VOS_HPPA -#endif -#ifdef __IA32__ -# define OPENSSL_SYS_VOS_IA32 -#endif -#endif - -/* ------------------------------- VxWorks --------------------------------- */ -#ifdef OPENSSL_SYSNAME_VXWORKS -# define OPENSSL_SYS_VXWORKS -#endif - -/* --------------------------------- BeOS ---------------------------------- */ -#if defined(__BEOS__) -# define OPENSSL_SYS_BEOS -# include -# if defined(BONE_VERSION) -# define OPENSSL_SYS_BEOS_BONE -# else -# define OPENSSL_SYS_BEOS_R5 -# endif -#endif - -/** - * That's it for OS-specific stuff - *****************************************************************************/ - - -/* Specials for I/O an exit */ -#ifdef OPENSSL_SYS_MSDOS -# define OPENSSL_UNISTD_IO -# define OPENSSL_DECLARE_EXIT extern void exit(int); -#else -# define OPENSSL_UNISTD_IO OPENSSL_UNISTD -# define OPENSSL_DECLARE_EXIT /* declared in unistd.h */ -#endif - -/* Definitions of OPENSSL_GLOBAL and OPENSSL_EXTERN, to define and declare - certain global symbols that, with some compilers under VMS, have to be - defined and declared explicitely with globaldef and globalref. - Definitions of OPENSSL_EXPORT and OPENSSL_IMPORT, to define and declare - DLL exports and imports for compilers under Win32. These are a little - more complicated to use. Basically, for any library that exports some - global variables, the following code must be present in the header file - that declares them, before OPENSSL_EXTERN is used: - - #ifdef SOME_BUILD_FLAG_MACRO - # undef OPENSSL_EXTERN - # define OPENSSL_EXTERN OPENSSL_EXPORT - #endif - - The default is to have OPENSSL_EXPORT, OPENSSL_IMPORT and OPENSSL_GLOBAL - have some generally sensible values, and for OPENSSL_EXTERN to have the - value OPENSSL_IMPORT. -*/ - -#if defined(OPENSSL_SYS_VMS_NODECC) -# define OPENSSL_EXPORT globalref -# define OPENSSL_IMPORT globalref -# define OPENSSL_GLOBAL globaldef -#elif defined(OPENSSL_SYS_WINDOWS) && defined(OPENSSL_OPT_WINDLL) -# define OPENSSL_EXPORT extern __declspec(dllexport) -# define OPENSSL_IMPORT extern __declspec(dllimport) -# define OPENSSL_GLOBAL -#else -# define OPENSSL_EXPORT extern -# define OPENSSL_IMPORT extern -# define OPENSSL_GLOBAL -#endif -#define OPENSSL_EXTERN OPENSSL_IMPORT - -/* Macros to allow global variables to be reached through function calls when - required (if a shared library version requires it, for example. - The way it's done allows definitions like this: - - // in foobar.c - OPENSSL_IMPLEMENT_GLOBAL(int,foobar,0) - // in foobar.h - OPENSSL_DECLARE_GLOBAL(int,foobar); - #define foobar OPENSSL_GLOBAL_REF(foobar) -*/ -#ifdef OPENSSL_EXPORT_VAR_AS_FUNCTION -# define OPENSSL_IMPLEMENT_GLOBAL(type,name,value) \ - type *_shadow_##name(void) \ - { static type _hide_##name=value; return &_hide_##name; } -# define OPENSSL_DECLARE_GLOBAL(type,name) type *_shadow_##name(void) -# define OPENSSL_GLOBAL_REF(name) (*(_shadow_##name())) -#else -# define OPENSSL_IMPLEMENT_GLOBAL(type,name,value) OPENSSL_GLOBAL type _shadow_##name=value; -# define OPENSSL_DECLARE_GLOBAL(type,name) OPENSSL_EXPORT type _shadow_##name -# define OPENSSL_GLOBAL_REF(name) _shadow_##name -#endif - -#if defined(OPENSSL_SYS_MACINTOSH_CLASSIC) && macintosh==1 && !defined(MAC_OS_GUSI_SOURCE) -# define ossl_ssize_t long -#endif - -#ifdef OPENSSL_SYS_MSDOS -# define ossl_ssize_t long -#endif - -#if defined(NeXT) || defined(OPENSSL_SYS_NEWS4) || defined(OPENSSL_SYS_SUNOS) -# define ssize_t int -#endif - -#if defined(__ultrix) && !defined(ssize_t) -# define ossl_ssize_t int -#endif - -#ifndef ossl_ssize_t -# define ossl_ssize_t ssize_t -#endif - -#ifdef __cplusplus -} -#endif -#endif diff --git a/Pods/OpenSSL-Universal/include-osx/openssl/ebcdic.h b/Pods/OpenSSL-Universal/include-osx/openssl/ebcdic.h deleted file mode 100644 index 6d65afcf..00000000 --- a/Pods/OpenSSL-Universal/include-osx/openssl/ebcdic.h +++ /dev/null @@ -1,19 +0,0 @@ -/* crypto/ebcdic.h */ - -#ifndef HEADER_EBCDIC_H -#define HEADER_EBCDIC_H - -#include - -/* Avoid name clashes with other applications */ -#define os_toascii _openssl_os_toascii -#define os_toebcdic _openssl_os_toebcdic -#define ebcdic2ascii _openssl_ebcdic2ascii -#define ascii2ebcdic _openssl_ascii2ebcdic - -extern const unsigned char os_toascii[256]; -extern const unsigned char os_toebcdic[256]; -void *ebcdic2ascii(void *dest, const void *srce, size_t count); -void *ascii2ebcdic(void *dest, const void *srce, size_t count); - -#endif diff --git a/Pods/OpenSSL-Universal/include-osx/openssl/ec.h b/Pods/OpenSSL-Universal/include-osx/openssl/ec.h deleted file mode 100644 index dfe8710d..00000000 --- a/Pods/OpenSSL-Universal/include-osx/openssl/ec.h +++ /dev/null @@ -1,1167 +0,0 @@ -/* crypto/ec/ec.h */ -/* - * Originally written by Bodo Moeller for the OpenSSL project. - */ -/** - * \file crypto/ec/ec.h Include file for the OpenSSL EC functions - * \author Originally written by Bodo Moeller for the OpenSSL project - */ -/* ==================================================================== - * Copyright (c) 1998-2005 The OpenSSL Project. All rights reserved. - * - * Redistribution and use in source and binary forms, with or without - * modification, are permitted provided that the following conditions - * are met: - * - * 1. Redistributions of source code must retain the above copyright - * notice, this list of conditions and the following disclaimer. - * - * 2. Redistributions in binary form must reproduce the above copyright - * notice, this list of conditions and the following disclaimer in - * the documentation and/or other materials provided with the - * distribution. - * - * 3. All advertising materials mentioning features or use of this - * software must display the following acknowledgment: - * "This product includes software developed by the OpenSSL Project - * for use in the OpenSSL Toolkit. (http://www.openssl.org/)" - * - * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to - * endorse or promote products derived from this software without - * prior written permission. For written permission, please contact - * openssl-core@openssl.org. - * - * 5. Products derived from this software may not be called "OpenSSL" - * nor may "OpenSSL" appear in their names without prior written - * permission of the OpenSSL Project. - * - * 6. Redistributions of any form whatsoever must retain the following - * acknowledgment: - * "This product includes software developed by the OpenSSL Project - * for use in the OpenSSL Toolkit (http://www.openssl.org/)" - * - * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY - * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE - * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR - * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR - * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, - * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT - * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; - * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) - * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, - * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) - * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED - * OF THE POSSIBILITY OF SUCH DAMAGE. - * ==================================================================== - * - * This product includes cryptographic software written by Eric Young - * (eay@cryptsoft.com). This product includes software written by Tim - * Hudson (tjh@cryptsoft.com). - * - */ -/* ==================================================================== - * Copyright 2002 Sun Microsystems, Inc. ALL RIGHTS RESERVED. - * - * Portions of the attached software ("Contribution") are developed by - * SUN MICROSYSTEMS, INC., and are contributed to the OpenSSL project. - * - * The Contribution is licensed pursuant to the OpenSSL open source - * license provided above. - * - * The elliptic curve binary polynomial software is originally written by - * Sheueling Chang Shantz and Douglas Stebila of Sun Microsystems Laboratories. - * - */ - -#ifndef HEADER_EC_H -#define HEADER_EC_H - -#include - -#ifdef OPENSSL_NO_EC -#error EC is disabled. -#endif - -#include -#include -#ifndef OPENSSL_NO_DEPRECATED -#include -#endif - -#ifdef __cplusplus -extern "C" { -#elif defined(__SUNPRO_C) -# if __SUNPRO_C >= 0x520 -# pragma error_messages (off,E_ARRAY_OF_INCOMPLETE_NONAME,E_ARRAY_OF_INCOMPLETE) -# endif -#endif - - -#ifndef OPENSSL_ECC_MAX_FIELD_BITS -# define OPENSSL_ECC_MAX_FIELD_BITS 661 -#endif - -/** Enum for the point conversion form as defined in X9.62 (ECDSA) - * for the encoding of a elliptic curve point (x,y) */ -typedef enum { - /** the point is encoded as z||x, where the octet z specifies - * which solution of the quadratic equation y is */ - POINT_CONVERSION_COMPRESSED = 2, - /** the point is encoded as z||x||y, where z is the octet 0x02 */ - POINT_CONVERSION_UNCOMPRESSED = 4, - /** the point is encoded as z||x||y, where the octet z specifies - * which solution of the quadratic equation y is */ - POINT_CONVERSION_HYBRID = 6 -} point_conversion_form_t; - - -typedef struct ec_method_st EC_METHOD; - -typedef struct ec_group_st - /* - EC_METHOD *meth; - -- field definition - -- curve coefficients - -- optional generator with associated information (order, cofactor) - -- optional extra data (precomputed table for fast computation of multiples of generator) - -- ASN1 stuff - */ - EC_GROUP; - -typedef struct ec_point_st EC_POINT; - - -/********************************************************************/ -/* EC_METHODs for curves over GF(p) */ -/********************************************************************/ - -/** Returns the basic GFp ec methods which provides the basis for the - * optimized methods. - * \return EC_METHOD object - */ -const EC_METHOD *EC_GFp_simple_method(void); - -/** Returns GFp methods using montgomery multiplication. - * \return EC_METHOD object - */ -const EC_METHOD *EC_GFp_mont_method(void); - -/** Returns GFp methods using optimized methods for NIST recommended curves - * \return EC_METHOD object - */ -const EC_METHOD *EC_GFp_nist_method(void); - -#ifndef OPENSSL_NO_EC_NISTP_64_GCC_128 -/** Returns 64-bit optimized methods for nistp224 - * \return EC_METHOD object - */ -const EC_METHOD *EC_GFp_nistp224_method(void); - -/** Returns 64-bit optimized methods for nistp256 - * \return EC_METHOD object - */ -const EC_METHOD *EC_GFp_nistp256_method(void); - -/** Returns 64-bit optimized methods for nistp521 - * \return EC_METHOD object - */ -const EC_METHOD *EC_GFp_nistp521_method(void); -#endif - -#ifndef OPENSSL_NO_EC2M -/********************************************************************/ -/* EC_METHOD for curves over GF(2^m) */ -/********************************************************************/ - -/** Returns the basic GF2m ec method - * \return EC_METHOD object - */ -const EC_METHOD *EC_GF2m_simple_method(void); - -#endif - - -/********************************************************************/ -/* EC_GROUP functions */ -/********************************************************************/ - -/** Creates a new EC_GROUP object - * \param meth EC_METHOD to use - * \return newly created EC_GROUP object or NULL in case of an error. - */ -EC_GROUP *EC_GROUP_new(const EC_METHOD *meth); - -/** Frees a EC_GROUP object - * \param group EC_GROUP object to be freed. - */ -void EC_GROUP_free(EC_GROUP *group); - -/** Clears and frees a EC_GROUP object - * \param group EC_GROUP object to be cleared and freed. - */ -void EC_GROUP_clear_free(EC_GROUP *group); - -/** Copies EC_GROUP objects. Note: both EC_GROUPs must use the same EC_METHOD. - * \param dst destination EC_GROUP object - * \param src source EC_GROUP object - * \return 1 on success and 0 if an error occurred. - */ -int EC_GROUP_copy(EC_GROUP *dst, const EC_GROUP *src); - -/** Creates a new EC_GROUP object and copies the copies the content - * form src to the newly created EC_KEY object - * \param src source EC_GROUP object - * \return newly created EC_GROUP object or NULL in case of an error. - */ -EC_GROUP *EC_GROUP_dup(const EC_GROUP *src); - -/** Returns the EC_METHOD of the EC_GROUP object. - * \param group EC_GROUP object - * \return EC_METHOD used in this EC_GROUP object. - */ -const EC_METHOD *EC_GROUP_method_of(const EC_GROUP *group); - -/** Returns the field type of the EC_METHOD. - * \param meth EC_METHOD object - * \return NID of the underlying field type OID. - */ -int EC_METHOD_get_field_type(const EC_METHOD *meth); - -/** Sets the generator and it's order/cofactor of a EC_GROUP object. - * \param group EC_GROUP object - * \param generator EC_POINT object with the generator. - * \param order the order of the group generated by the generator. - * \param cofactor the index of the sub-group generated by the generator - * in the group of all points on the elliptic curve. - * \return 1 on success and 0 if an error occured - */ -int EC_GROUP_set_generator(EC_GROUP *group, const EC_POINT *generator, const BIGNUM *order, const BIGNUM *cofactor); - -/** Returns the generator of a EC_GROUP object. - * \param group EC_GROUP object - * \return the currently used generator (possibly NULL). - */ -const EC_POINT *EC_GROUP_get0_generator(const EC_GROUP *group); - -/** Gets the order of a EC_GROUP - * \param group EC_GROUP object - * \param order BIGNUM to which the order is copied - * \param ctx BN_CTX object (optional) - * \return 1 on success and 0 if an error occured - */ -int EC_GROUP_get_order(const EC_GROUP *group, BIGNUM *order, BN_CTX *ctx); - -/** Gets the cofactor of a EC_GROUP - * \param group EC_GROUP object - * \param cofactor BIGNUM to which the cofactor is copied - * \param ctx BN_CTX object (optional) - * \return 1 on success and 0 if an error occured - */ -int EC_GROUP_get_cofactor(const EC_GROUP *group, BIGNUM *cofactor, BN_CTX *ctx); - -/** Sets the name of a EC_GROUP object - * \param group EC_GROUP object - * \param nid NID of the curve name OID - */ -void EC_GROUP_set_curve_name(EC_GROUP *group, int nid); - -/** Returns the curve name of a EC_GROUP object - * \param group EC_GROUP object - * \return NID of the curve name OID or 0 if not set. - */ -int EC_GROUP_get_curve_name(const EC_GROUP *group); - -void EC_GROUP_set_asn1_flag(EC_GROUP *group, int flag); -int EC_GROUP_get_asn1_flag(const EC_GROUP *group); - -void EC_GROUP_set_point_conversion_form(EC_GROUP *group, point_conversion_form_t form); -point_conversion_form_t EC_GROUP_get_point_conversion_form(const EC_GROUP *); - -unsigned char *EC_GROUP_get0_seed(const EC_GROUP *x); -size_t EC_GROUP_get_seed_len(const EC_GROUP *); -size_t EC_GROUP_set_seed(EC_GROUP *, const unsigned char *, size_t len); - -/** Sets the parameter of a ec over GFp defined by y^2 = x^3 + a*x + b - * \param group EC_GROUP object - * \param p BIGNUM with the prime number - * \param a BIGNUM with parameter a of the equation - * \param b BIGNUM with parameter b of the equation - * \param ctx BN_CTX object (optional) - * \return 1 on success and 0 if an error occured - */ -int EC_GROUP_set_curve_GFp(EC_GROUP *group, const BIGNUM *p, const BIGNUM *a, const BIGNUM *b, BN_CTX *ctx); - -/** Gets the parameter of the ec over GFp defined by y^2 = x^3 + a*x + b - * \param group EC_GROUP object - * \param p BIGNUM for the prime number - * \param a BIGNUM for parameter a of the equation - * \param b BIGNUM for parameter b of the equation - * \param ctx BN_CTX object (optional) - * \return 1 on success and 0 if an error occured - */ -int EC_GROUP_get_curve_GFp(const EC_GROUP *group, BIGNUM *p, BIGNUM *a, BIGNUM *b, BN_CTX *ctx); - -#ifndef OPENSSL_NO_EC2M -/** Sets the parameter of a ec over GF2m defined by y^2 + x*y = x^3 + a*x^2 + b - * \param group EC_GROUP object - * \param p BIGNUM with the polynomial defining the underlying field - * \param a BIGNUM with parameter a of the equation - * \param b BIGNUM with parameter b of the equation - * \param ctx BN_CTX object (optional) - * \return 1 on success and 0 if an error occured - */ -int EC_GROUP_set_curve_GF2m(EC_GROUP *group, const BIGNUM *p, const BIGNUM *a, const BIGNUM *b, BN_CTX *ctx); - -/** Gets the parameter of the ec over GF2m defined by y^2 + x*y = x^3 + a*x^2 + b - * \param group EC_GROUP object - * \param p BIGNUM for the polynomial defining the underlying field - * \param a BIGNUM for parameter a of the equation - * \param b BIGNUM for parameter b of the equation - * \param ctx BN_CTX object (optional) - * \return 1 on success and 0 if an error occured - */ -int EC_GROUP_get_curve_GF2m(const EC_GROUP *group, BIGNUM *p, BIGNUM *a, BIGNUM *b, BN_CTX *ctx); -#endif -/** Returns the number of bits needed to represent a field element - * \param group EC_GROUP object - * \return number of bits needed to represent a field element - */ -int EC_GROUP_get_degree(const EC_GROUP *group); - -/** Checks whether the parameter in the EC_GROUP define a valid ec group - * \param group EC_GROUP object - * \param ctx BN_CTX object (optional) - * \return 1 if group is a valid ec group and 0 otherwise - */ -int EC_GROUP_check(const EC_GROUP *group, BN_CTX *ctx); - -/** Checks whether the discriminant of the elliptic curve is zero or not - * \param group EC_GROUP object - * \param ctx BN_CTX object (optional) - * \return 1 if the discriminant is not zero and 0 otherwise - */ -int EC_GROUP_check_discriminant(const EC_GROUP *group, BN_CTX *ctx); - -/** Compares two EC_GROUP objects - * \param a first EC_GROUP object - * \param b second EC_GROUP object - * \param ctx BN_CTX object (optional) - * \return 0 if both groups are equal and 1 otherwise - */ -int EC_GROUP_cmp(const EC_GROUP *a, const EC_GROUP *b, BN_CTX *ctx); - -/* EC_GROUP_new_GF*() calls EC_GROUP_new() and EC_GROUP_set_GF*() - * after choosing an appropriate EC_METHOD */ - -/** Creates a new EC_GROUP object with the specified parameters defined - * over GFp (defined by the equation y^2 = x^3 + a*x + b) - * \param p BIGNUM with the prime number - * \param a BIGNUM with the parameter a of the equation - * \param b BIGNUM with the parameter b of the equation - * \param ctx BN_CTX object (optional) - * \return newly created EC_GROUP object with the specified parameters - */ -EC_GROUP *EC_GROUP_new_curve_GFp(const BIGNUM *p, const BIGNUM *a, const BIGNUM *b, BN_CTX *ctx); -#ifndef OPENSSL_NO_EC2M -/** Creates a new EC_GROUP object with the specified parameters defined - * over GF2m (defined by the equation y^2 + x*y = x^3 + a*x^2 + b) - * \param p BIGNUM with the polynomial defining the underlying field - * \param a BIGNUM with the parameter a of the equation - * \param b BIGNUM with the parameter b of the equation - * \param ctx BN_CTX object (optional) - * \return newly created EC_GROUP object with the specified parameters - */ -EC_GROUP *EC_GROUP_new_curve_GF2m(const BIGNUM *p, const BIGNUM *a, const BIGNUM *b, BN_CTX *ctx); -#endif -/** Creates a EC_GROUP object with a curve specified by a NID - * \param nid NID of the OID of the curve name - * \return newly created EC_GROUP object with specified curve or NULL - * if an error occurred - */ -EC_GROUP *EC_GROUP_new_by_curve_name(int nid); - - -/********************************************************************/ -/* handling of internal curves */ -/********************************************************************/ - -typedef struct { - int nid; - const char *comment; - } EC_builtin_curve; - -/* EC_builtin_curves(EC_builtin_curve *r, size_t size) returns number - * of all available curves or zero if a error occurred. - * In case r ist not zero nitems EC_builtin_curve structures - * are filled with the data of the first nitems internal groups */ -size_t EC_get_builtin_curves(EC_builtin_curve *r, size_t nitems); - - -/********************************************************************/ -/* EC_POINT functions */ -/********************************************************************/ - -/** Creates a new EC_POINT object for the specified EC_GROUP - * \param group EC_GROUP the underlying EC_GROUP object - * \return newly created EC_POINT object or NULL if an error occurred - */ -EC_POINT *EC_POINT_new(const EC_GROUP *group); - -/** Frees a EC_POINT object - * \param point EC_POINT object to be freed - */ -void EC_POINT_free(EC_POINT *point); - -/** Clears and frees a EC_POINT object - * \param point EC_POINT object to be cleared and freed - */ -void EC_POINT_clear_free(EC_POINT *point); - -/** Copies EC_POINT object - * \param dst destination EC_POINT object - * \param src source EC_POINT object - * \return 1 on success and 0 if an error occured - */ -int EC_POINT_copy(EC_POINT *dst, const EC_POINT *src); - -/** Creates a new EC_POINT object and copies the content of the supplied - * EC_POINT - * \param src source EC_POINT object - * \param group underlying the EC_GROUP object - * \return newly created EC_POINT object or NULL if an error occurred - */ -EC_POINT *EC_POINT_dup(const EC_POINT *src, const EC_GROUP *group); - -/** Returns the EC_METHOD used in EC_POINT object - * \param point EC_POINT object - * \return the EC_METHOD used - */ -const EC_METHOD *EC_POINT_method_of(const EC_POINT *point); - -/** Sets a point to infinity (neutral element) - * \param group underlying EC_GROUP object - * \param point EC_POINT to set to infinity - * \return 1 on success and 0 if an error occured - */ -int EC_POINT_set_to_infinity(const EC_GROUP *group, EC_POINT *point); - -/** Sets the jacobian projective coordinates of a EC_POINT over GFp - * \param group underlying EC_GROUP object - * \param p EC_POINT object - * \param x BIGNUM with the x-coordinate - * \param y BIGNUM with the y-coordinate - * \param z BIGNUM with the z-coordinate - * \param ctx BN_CTX object (optional) - * \return 1 on success and 0 if an error occured - */ -int EC_POINT_set_Jprojective_coordinates_GFp(const EC_GROUP *group, EC_POINT *p, - const BIGNUM *x, const BIGNUM *y, const BIGNUM *z, BN_CTX *ctx); - -/** Gets the jacobian projective coordinates of a EC_POINT over GFp - * \param group underlying EC_GROUP object - * \param p EC_POINT object - * \param x BIGNUM for the x-coordinate - * \param y BIGNUM for the y-coordinate - * \param z BIGNUM for the z-coordinate - * \param ctx BN_CTX object (optional) - * \return 1 on success and 0 if an error occured - */ -int EC_POINT_get_Jprojective_coordinates_GFp(const EC_GROUP *group, - const EC_POINT *p, BIGNUM *x, BIGNUM *y, BIGNUM *z, BN_CTX *ctx); - -/** Sets the affine coordinates of a EC_POINT over GFp - * \param group underlying EC_GROUP object - * \param p EC_POINT object - * \param x BIGNUM with the x-coordinate - * \param y BIGNUM with the y-coordinate - * \param ctx BN_CTX object (optional) - * \return 1 on success and 0 if an error occured - */ -int EC_POINT_set_affine_coordinates_GFp(const EC_GROUP *group, EC_POINT *p, - const BIGNUM *x, const BIGNUM *y, BN_CTX *ctx); - -/** Gets the affine coordinates of a EC_POINT over GFp - * \param group underlying EC_GROUP object - * \param p EC_POINT object - * \param x BIGNUM for the x-coordinate - * \param y BIGNUM for the y-coordinate - * \param ctx BN_CTX object (optional) - * \return 1 on success and 0 if an error occured - */ -int EC_POINT_get_affine_coordinates_GFp(const EC_GROUP *group, - const EC_POINT *p, BIGNUM *x, BIGNUM *y, BN_CTX *ctx); - -/** Sets the x9.62 compressed coordinates of a EC_POINT over GFp - * \param group underlying EC_GROUP object - * \param p EC_POINT object - * \param x BIGNUM with x-coordinate - * \param y_bit integer with the y-Bit (either 0 or 1) - * \param ctx BN_CTX object (optional) - * \return 1 on success and 0 if an error occured - */ -int EC_POINT_set_compressed_coordinates_GFp(const EC_GROUP *group, EC_POINT *p, - const BIGNUM *x, int y_bit, BN_CTX *ctx); -#ifndef OPENSSL_NO_EC2M -/** Sets the affine coordinates of a EC_POINT over GF2m - * \param group underlying EC_GROUP object - * \param p EC_POINT object - * \param x BIGNUM with the x-coordinate - * \param y BIGNUM with the y-coordinate - * \param ctx BN_CTX object (optional) - * \return 1 on success and 0 if an error occured - */ -int EC_POINT_set_affine_coordinates_GF2m(const EC_GROUP *group, EC_POINT *p, - const BIGNUM *x, const BIGNUM *y, BN_CTX *ctx); - -/** Gets the affine coordinates of a EC_POINT over GF2m - * \param group underlying EC_GROUP object - * \param p EC_POINT object - * \param x BIGNUM for the x-coordinate - * \param y BIGNUM for the y-coordinate - * \param ctx BN_CTX object (optional) - * \return 1 on success and 0 if an error occured - */ -int EC_POINT_get_affine_coordinates_GF2m(const EC_GROUP *group, - const EC_POINT *p, BIGNUM *x, BIGNUM *y, BN_CTX *ctx); - -/** Sets the x9.62 compressed coordinates of a EC_POINT over GF2m - * \param group underlying EC_GROUP object - * \param p EC_POINT object - * \param x BIGNUM with x-coordinate - * \param y_bit integer with the y-Bit (either 0 or 1) - * \param ctx BN_CTX object (optional) - * \return 1 on success and 0 if an error occured - */ -int EC_POINT_set_compressed_coordinates_GF2m(const EC_GROUP *group, EC_POINT *p, - const BIGNUM *x, int y_bit, BN_CTX *ctx); -#endif -/** Encodes a EC_POINT object to a octet string - * \param group underlying EC_GROUP object - * \param p EC_POINT object - * \param form point conversion form - * \param buf memory buffer for the result. If NULL the function returns - * required buffer size. - * \param len length of the memory buffer - * \param ctx BN_CTX object (optional) - * \return the length of the encoded octet string or 0 if an error occurred - */ -size_t EC_POINT_point2oct(const EC_GROUP *group, const EC_POINT *p, - point_conversion_form_t form, - unsigned char *buf, size_t len, BN_CTX *ctx); - -/** Decodes a EC_POINT from a octet string - * \param group underlying EC_GROUP object - * \param p EC_POINT object - * \param buf memory buffer with the encoded ec point - * \param len length of the encoded ec point - * \param ctx BN_CTX object (optional) - * \return 1 on success and 0 if an error occured - */ -int EC_POINT_oct2point(const EC_GROUP *group, EC_POINT *p, - const unsigned char *buf, size_t len, BN_CTX *ctx); - -/* other interfaces to point2oct/oct2point: */ -BIGNUM *EC_POINT_point2bn(const EC_GROUP *, const EC_POINT *, - point_conversion_form_t form, BIGNUM *, BN_CTX *); -EC_POINT *EC_POINT_bn2point(const EC_GROUP *, const BIGNUM *, - EC_POINT *, BN_CTX *); -char *EC_POINT_point2hex(const EC_GROUP *, const EC_POINT *, - point_conversion_form_t form, BN_CTX *); -EC_POINT *EC_POINT_hex2point(const EC_GROUP *, const char *, - EC_POINT *, BN_CTX *); - - -/********************************************************************/ -/* functions for doing EC_POINT arithmetic */ -/********************************************************************/ - -/** Computes the sum of two EC_POINT - * \param group underlying EC_GROUP object - * \param r EC_POINT object for the result (r = a + b) - * \param a EC_POINT object with the first summand - * \param b EC_POINT object with the second summand - * \param ctx BN_CTX object (optional) - * \return 1 on success and 0 if an error occured - */ -int EC_POINT_add(const EC_GROUP *group, EC_POINT *r, const EC_POINT *a, const EC_POINT *b, BN_CTX *ctx); - -/** Computes the double of a EC_POINT - * \param group underlying EC_GROUP object - * \param r EC_POINT object for the result (r = 2 * a) - * \param a EC_POINT object - * \param ctx BN_CTX object (optional) - * \return 1 on success and 0 if an error occured - */ -int EC_POINT_dbl(const EC_GROUP *group, EC_POINT *r, const EC_POINT *a, BN_CTX *ctx); - -/** Computes the inverse of a EC_POINT - * \param group underlying EC_GROUP object - * \param a EC_POINT object to be inverted (it's used for the result as well) - * \param ctx BN_CTX object (optional) - * \return 1 on success and 0 if an error occured - */ -int EC_POINT_invert(const EC_GROUP *group, EC_POINT *a, BN_CTX *ctx); - -/** Checks whether the point is the neutral element of the group - * \param group the underlying EC_GROUP object - * \param p EC_POINT object - * \return 1 if the point is the neutral element and 0 otherwise - */ -int EC_POINT_is_at_infinity(const EC_GROUP *group, const EC_POINT *p); - -/** Checks whether the point is on the curve - * \param group underlying EC_GROUP object - * \param point EC_POINT object to check - * \param ctx BN_CTX object (optional) - * \return 1 if point if on the curve and 0 otherwise - */ -int EC_POINT_is_on_curve(const EC_GROUP *group, const EC_POINT *point, BN_CTX *ctx); - -/** Compares two EC_POINTs - * \param group underlying EC_GROUP object - * \param a first EC_POINT object - * \param b second EC_POINT object - * \param ctx BN_CTX object (optional) - * \return 0 if both points are equal and a value != 0 otherwise - */ -int EC_POINT_cmp(const EC_GROUP *group, const EC_POINT *a, const EC_POINT *b, BN_CTX *ctx); - -int EC_POINT_make_affine(const EC_GROUP *group, EC_POINT *point, BN_CTX *ctx); -int EC_POINTs_make_affine(const EC_GROUP *group, size_t num, EC_POINT *points[], BN_CTX *ctx); - -/** Computes r = generator * n sum_{i=0}^num p[i] * m[i] - * \param group underlying EC_GROUP object - * \param r EC_POINT object for the result - * \param n BIGNUM with the multiplier for the group generator (optional) - * \param num number futher summands - * \param p array of size num of EC_POINT objects - * \param m array of size num of BIGNUM objects - * \param ctx BN_CTX object (optional) - * \return 1 on success and 0 if an error occured - */ -int EC_POINTs_mul(const EC_GROUP *group, EC_POINT *r, const BIGNUM *n, size_t num, const EC_POINT *p[], const BIGNUM *m[], BN_CTX *ctx); - -/** Computes r = generator * n + q * m - * \param group underlying EC_GROUP object - * \param r EC_POINT object for the result - * \param n BIGNUM with the multiplier for the group generator (optional) - * \param q EC_POINT object with the first factor of the second summand - * \param m BIGNUM with the second factor of the second summand - * \param ctx BN_CTX object (optional) - * \return 1 on success and 0 if an error occured - */ -int EC_POINT_mul(const EC_GROUP *group, EC_POINT *r, const BIGNUM *n, const EC_POINT *q, const BIGNUM *m, BN_CTX *ctx); - -/** Stores multiples of generator for faster point multiplication - * \param group EC_GROUP object - * \param ctx BN_CTX object (optional) - * \return 1 on success and 0 if an error occured - */ -int EC_GROUP_precompute_mult(EC_GROUP *group, BN_CTX *ctx); - -/** Reports whether a precomputation has been done - * \param group EC_GROUP object - * \return 1 if a pre-computation has been done and 0 otherwise - */ -int EC_GROUP_have_precompute_mult(const EC_GROUP *group); - - -/********************************************************************/ -/* ASN1 stuff */ -/********************************************************************/ - -/* EC_GROUP_get_basis_type() returns the NID of the basis type - * used to represent the field elements */ -int EC_GROUP_get_basis_type(const EC_GROUP *); -#ifndef OPENSSL_NO_EC2M -int EC_GROUP_get_trinomial_basis(const EC_GROUP *, unsigned int *k); -int EC_GROUP_get_pentanomial_basis(const EC_GROUP *, unsigned int *k1, - unsigned int *k2, unsigned int *k3); -#endif - -#define OPENSSL_EC_NAMED_CURVE 0x001 - -typedef struct ecpk_parameters_st ECPKPARAMETERS; - -EC_GROUP *d2i_ECPKParameters(EC_GROUP **, const unsigned char **in, long len); -int i2d_ECPKParameters(const EC_GROUP *, unsigned char **out); - -#define d2i_ECPKParameters_bio(bp,x) ASN1_d2i_bio_of(EC_GROUP,NULL,d2i_ECPKParameters,bp,x) -#define i2d_ECPKParameters_bio(bp,x) ASN1_i2d_bio_of_const(EC_GROUP,i2d_ECPKParameters,bp,x) -#define d2i_ECPKParameters_fp(fp,x) (EC_GROUP *)ASN1_d2i_fp(NULL, \ - (char *(*)())d2i_ECPKParameters,(fp),(unsigned char **)(x)) -#define i2d_ECPKParameters_fp(fp,x) ASN1_i2d_fp(i2d_ECPKParameters,(fp), \ - (unsigned char *)(x)) - -#ifndef OPENSSL_NO_BIO -int ECPKParameters_print(BIO *bp, const EC_GROUP *x, int off); -#endif -#ifndef OPENSSL_NO_FP_API -int ECPKParameters_print_fp(FILE *fp, const EC_GROUP *x, int off); -#endif - - -/********************************************************************/ -/* EC_KEY functions */ -/********************************************************************/ - -typedef struct ec_key_st EC_KEY; - -/* some values for the encoding_flag */ -#define EC_PKEY_NO_PARAMETERS 0x001 -#define EC_PKEY_NO_PUBKEY 0x002 - -/* some values for the flags field */ -#define EC_FLAG_NON_FIPS_ALLOW 0x1 -#define EC_FLAG_FIPS_CHECKED 0x2 - -/** Creates a new EC_KEY object. - * \return EC_KEY object or NULL if an error occurred. - */ -EC_KEY *EC_KEY_new(void); - -int EC_KEY_get_flags(const EC_KEY *key); - -void EC_KEY_set_flags(EC_KEY *key, int flags); - -void EC_KEY_clear_flags(EC_KEY *key, int flags); - -/** Creates a new EC_KEY object using a named curve as underlying - * EC_GROUP object. - * \param nid NID of the named curve. - * \return EC_KEY object or NULL if an error occurred. - */ -EC_KEY *EC_KEY_new_by_curve_name(int nid); - -/** Frees a EC_KEY object. - * \param key EC_KEY object to be freed. - */ -void EC_KEY_free(EC_KEY *key); - -/** Copies a EC_KEY object. - * \param dst destination EC_KEY object - * \param src src EC_KEY object - * \return dst or NULL if an error occurred. - */ -EC_KEY *EC_KEY_copy(EC_KEY *dst, const EC_KEY *src); - -/** Creates a new EC_KEY object and copies the content from src to it. - * \param src the source EC_KEY object - * \return newly created EC_KEY object or NULL if an error occurred. - */ -EC_KEY *EC_KEY_dup(const EC_KEY *src); - -/** Increases the internal reference count of a EC_KEY object. - * \param key EC_KEY object - * \return 1 on success and 0 if an error occurred. - */ -int EC_KEY_up_ref(EC_KEY *key); - -/** Returns the EC_GROUP object of a EC_KEY object - * \param key EC_KEY object - * \return the EC_GROUP object (possibly NULL). - */ -const EC_GROUP *EC_KEY_get0_group(const EC_KEY *key); - -/** Sets the EC_GROUP of a EC_KEY object. - * \param key EC_KEY object - * \param group EC_GROUP to use in the EC_KEY object (note: the EC_KEY - * object will use an own copy of the EC_GROUP). - * \return 1 on success and 0 if an error occurred. - */ -int EC_KEY_set_group(EC_KEY *key, const EC_GROUP *group); - -/** Returns the private key of a EC_KEY object. - * \param key EC_KEY object - * \return a BIGNUM with the private key (possibly NULL). - */ -const BIGNUM *EC_KEY_get0_private_key(const EC_KEY *key); - -/** Sets the private key of a EC_KEY object. - * \param key EC_KEY object - * \param prv BIGNUM with the private key (note: the EC_KEY object - * will use an own copy of the BIGNUM). - * \return 1 on success and 0 if an error occurred. - */ -int EC_KEY_set_private_key(EC_KEY *key, const BIGNUM *prv); - -/** Returns the public key of a EC_KEY object. - * \param key the EC_KEY object - * \return a EC_POINT object with the public key (possibly NULL) - */ -const EC_POINT *EC_KEY_get0_public_key(const EC_KEY *key); - -/** Sets the public key of a EC_KEY object. - * \param key EC_KEY object - * \param pub EC_POINT object with the public key (note: the EC_KEY object - * will use an own copy of the EC_POINT object). - * \return 1 on success and 0 if an error occurred. - */ -int EC_KEY_set_public_key(EC_KEY *key, const EC_POINT *pub); - -unsigned EC_KEY_get_enc_flags(const EC_KEY *key); -void EC_KEY_set_enc_flags(EC_KEY *eckey, unsigned int flags); -point_conversion_form_t EC_KEY_get_conv_form(const EC_KEY *key); -void EC_KEY_set_conv_form(EC_KEY *eckey, point_conversion_form_t cform); -/* functions to set/get method specific data */ -void *EC_KEY_get_key_method_data(EC_KEY *key, - void *(*dup_func)(void *), void (*free_func)(void *), void (*clear_free_func)(void *)); -/** Sets the key method data of an EC_KEY object, if none has yet been set. - * \param key EC_KEY object - * \param data opaque data to install. - * \param dup_func a function that duplicates |data|. - * \param free_func a function that frees |data|. - * \param clear_free_func a function that wipes and frees |data|. - * \return the previously set data pointer, or NULL if |data| was inserted. - */ -void *EC_KEY_insert_key_method_data(EC_KEY *key, void *data, - void *(*dup_func)(void *), void (*free_func)(void *), void (*clear_free_func)(void *)); -/* wrapper functions for the underlying EC_GROUP object */ -void EC_KEY_set_asn1_flag(EC_KEY *eckey, int asn1_flag); - -/** Creates a table of pre-computed multiples of the generator to - * accelerate further EC_KEY operations. - * \param key EC_KEY object - * \param ctx BN_CTX object (optional) - * \return 1 on success and 0 if an error occurred. - */ -int EC_KEY_precompute_mult(EC_KEY *key, BN_CTX *ctx); - -/** Creates a new ec private (and optional a new public) key. - * \param key EC_KEY object - * \return 1 on success and 0 if an error occurred. - */ -int EC_KEY_generate_key(EC_KEY *key); - -/** Verifies that a private and/or public key is valid. - * \param key the EC_KEY object - * \return 1 on success and 0 otherwise. - */ -int EC_KEY_check_key(const EC_KEY *key); - -/** Sets a public key from affine coordindates performing - * neccessary NIST PKV tests. - * \param key the EC_KEY object - * \param x public key x coordinate - * \param y public key y coordinate - * \return 1 on success and 0 otherwise. - */ -int EC_KEY_set_public_key_affine_coordinates(EC_KEY *key, BIGNUM *x, BIGNUM *y); - - -/********************************************************************/ -/* de- and encoding functions for SEC1 ECPrivateKey */ -/********************************************************************/ - -/** Decodes a private key from a memory buffer. - * \param key a pointer to a EC_KEY object which should be used (or NULL) - * \param in pointer to memory with the DER encoded private key - * \param len length of the DER encoded private key - * \return the decoded private key or NULL if an error occurred. - */ -EC_KEY *d2i_ECPrivateKey(EC_KEY **key, const unsigned char **in, long len); - -/** Encodes a private key object and stores the result in a buffer. - * \param key the EC_KEY object to encode - * \param out the buffer for the result (if NULL the function returns number - * of bytes needed). - * \return 1 on success and 0 if an error occurred. - */ -int i2d_ECPrivateKey(EC_KEY *key, unsigned char **out); - - -/********************************************************************/ -/* de- and encoding functions for EC parameters */ -/********************************************************************/ - -/** Decodes ec parameter from a memory buffer. - * \param key a pointer to a EC_KEY object which should be used (or NULL) - * \param in pointer to memory with the DER encoded ec parameters - * \param len length of the DER encoded ec parameters - * \return a EC_KEY object with the decoded parameters or NULL if an error - * occurred. - */ -EC_KEY *d2i_ECParameters(EC_KEY **key, const unsigned char **in, long len); - -/** Encodes ec parameter and stores the result in a buffer. - * \param key the EC_KEY object with ec paramters to encode - * \param out the buffer for the result (if NULL the function returns number - * of bytes needed). - * \return 1 on success and 0 if an error occurred. - */ -int i2d_ECParameters(EC_KEY *key, unsigned char **out); - - -/********************************************************************/ -/* de- and encoding functions for EC public key */ -/* (octet string, not DER -- hence 'o2i' and 'i2o') */ -/********************************************************************/ - -/** Decodes a ec public key from a octet string. - * \param key a pointer to a EC_KEY object which should be used - * \param in memory buffer with the encoded public key - * \param len length of the encoded public key - * \return EC_KEY object with decoded public key or NULL if an error - * occurred. - */ -EC_KEY *o2i_ECPublicKey(EC_KEY **key, const unsigned char **in, long len); - -/** Encodes a ec public key in an octet string. - * \param key the EC_KEY object with the public key - * \param out the buffer for the result (if NULL the function returns number - * of bytes needed). - * \return 1 on success and 0 if an error occurred - */ -int i2o_ECPublicKey(EC_KEY *key, unsigned char **out); - -#ifndef OPENSSL_NO_BIO -/** Prints out the ec parameters on human readable form. - * \param bp BIO object to which the information is printed - * \param key EC_KEY object - * \return 1 on success and 0 if an error occurred - */ -int ECParameters_print(BIO *bp, const EC_KEY *key); - -/** Prints out the contents of a EC_KEY object - * \param bp BIO object to which the information is printed - * \param key EC_KEY object - * \param off line offset - * \return 1 on success and 0 if an error occurred - */ -int EC_KEY_print(BIO *bp, const EC_KEY *key, int off); - -#endif -#ifndef OPENSSL_NO_FP_API -/** Prints out the ec parameters on human readable form. - * \param fp file descriptor to which the information is printed - * \param key EC_KEY object - * \return 1 on success and 0 if an error occurred - */ -int ECParameters_print_fp(FILE *fp, const EC_KEY *key); - -/** Prints out the contents of a EC_KEY object - * \param fp file descriptor to which the information is printed - * \param key EC_KEY object - * \param off line offset - * \return 1 on success and 0 if an error occurred - */ -int EC_KEY_print_fp(FILE *fp, const EC_KEY *key, int off); - -#endif - -#define ECParameters_dup(x) ASN1_dup_of(EC_KEY,i2d_ECParameters,d2i_ECParameters,x) - -#ifndef __cplusplus -#if defined(__SUNPRO_C) -# if __SUNPRO_C >= 0x520 -# pragma error_messages (default,E_ARRAY_OF_INCOMPLETE_NONAME,E_ARRAY_OF_INCOMPLETE) -# endif -# endif -#endif - -#define EVP_PKEY_CTX_set_ec_paramgen_curve_nid(ctx, nid) \ - EVP_PKEY_CTX_ctrl(ctx, EVP_PKEY_EC, EVP_PKEY_OP_PARAMGEN, \ - EVP_PKEY_CTRL_EC_PARAMGEN_CURVE_NID, nid, NULL) - - -#define EVP_PKEY_CTRL_EC_PARAMGEN_CURVE_NID (EVP_PKEY_ALG_CTRL + 1) - -/* BEGIN ERROR CODES */ -/* The following lines are auto generated by the script mkerr.pl. Any changes - * made after this point may be overwritten when the script is next run. - */ -void ERR_load_EC_strings(void); - -/* Error codes for the EC functions. */ - -/* Function codes. */ -#define EC_F_BN_TO_FELEM 224 -#define EC_F_COMPUTE_WNAF 143 -#define EC_F_D2I_ECPARAMETERS 144 -#define EC_F_D2I_ECPKPARAMETERS 145 -#define EC_F_D2I_ECPRIVATEKEY 146 -#define EC_F_DO_EC_KEY_PRINT 221 -#define EC_F_ECKEY_PARAM2TYPE 223 -#define EC_F_ECKEY_PARAM_DECODE 212 -#define EC_F_ECKEY_PRIV_DECODE 213 -#define EC_F_ECKEY_PRIV_ENCODE 214 -#define EC_F_ECKEY_PUB_DECODE 215 -#define EC_F_ECKEY_PUB_ENCODE 216 -#define EC_F_ECKEY_TYPE2PARAM 220 -#define EC_F_ECPARAMETERS_PRINT 147 -#define EC_F_ECPARAMETERS_PRINT_FP 148 -#define EC_F_ECPKPARAMETERS_PRINT 149 -#define EC_F_ECPKPARAMETERS_PRINT_FP 150 -#define EC_F_ECP_NIST_MOD_192 203 -#define EC_F_ECP_NIST_MOD_224 204 -#define EC_F_ECP_NIST_MOD_256 205 -#define EC_F_ECP_NIST_MOD_521 206 -#define EC_F_EC_ASN1_GROUP2CURVE 153 -#define EC_F_EC_ASN1_GROUP2FIELDID 154 -#define EC_F_EC_ASN1_GROUP2PARAMETERS 155 -#define EC_F_EC_ASN1_GROUP2PKPARAMETERS 156 -#define EC_F_EC_ASN1_PARAMETERS2GROUP 157 -#define EC_F_EC_ASN1_PKPARAMETERS2GROUP 158 -#define EC_F_EC_EX_DATA_SET_DATA 211 -#define EC_F_EC_GF2M_MONTGOMERY_POINT_MULTIPLY 208 -#define EC_F_EC_GF2M_SIMPLE_GROUP_CHECK_DISCRIMINANT 159 -#define EC_F_EC_GF2M_SIMPLE_GROUP_SET_CURVE 195 -#define EC_F_EC_GF2M_SIMPLE_OCT2POINT 160 -#define EC_F_EC_GF2M_SIMPLE_POINT2OCT 161 -#define EC_F_EC_GF2M_SIMPLE_POINT_GET_AFFINE_COORDINATES 162 -#define EC_F_EC_GF2M_SIMPLE_POINT_SET_AFFINE_COORDINATES 163 -#define EC_F_EC_GF2M_SIMPLE_SET_COMPRESSED_COORDINATES 164 -#define EC_F_EC_GFP_MONT_FIELD_DECODE 133 -#define EC_F_EC_GFP_MONT_FIELD_ENCODE 134 -#define EC_F_EC_GFP_MONT_FIELD_MUL 131 -#define EC_F_EC_GFP_MONT_FIELD_SET_TO_ONE 209 -#define EC_F_EC_GFP_MONT_FIELD_SQR 132 -#define EC_F_EC_GFP_MONT_GROUP_SET_CURVE 189 -#define EC_F_EC_GFP_MONT_GROUP_SET_CURVE_GFP 135 -#define EC_F_EC_GFP_NISTP224_GROUP_SET_CURVE 225 -#define EC_F_EC_GFP_NISTP224_POINTS_MUL 228 -#define EC_F_EC_GFP_NISTP224_POINT_GET_AFFINE_COORDINATES 226 -#define EC_F_EC_GFP_NISTP256_GROUP_SET_CURVE 230 -#define EC_F_EC_GFP_NISTP256_POINTS_MUL 231 -#define EC_F_EC_GFP_NISTP256_POINT_GET_AFFINE_COORDINATES 232 -#define EC_F_EC_GFP_NISTP521_GROUP_SET_CURVE 233 -#define EC_F_EC_GFP_NISTP521_POINTS_MUL 234 -#define EC_F_EC_GFP_NISTP521_POINT_GET_AFFINE_COORDINATES 235 -#define EC_F_EC_GFP_NIST_FIELD_MUL 200 -#define EC_F_EC_GFP_NIST_FIELD_SQR 201 -#define EC_F_EC_GFP_NIST_GROUP_SET_CURVE 202 -#define EC_F_EC_GFP_SIMPLE_GROUP_CHECK_DISCRIMINANT 165 -#define EC_F_EC_GFP_SIMPLE_GROUP_SET_CURVE 166 -#define EC_F_EC_GFP_SIMPLE_GROUP_SET_CURVE_GFP 100 -#define EC_F_EC_GFP_SIMPLE_GROUP_SET_GENERATOR 101 -#define EC_F_EC_GFP_SIMPLE_MAKE_AFFINE 102 -#define EC_F_EC_GFP_SIMPLE_OCT2POINT 103 -#define EC_F_EC_GFP_SIMPLE_POINT2OCT 104 -#define EC_F_EC_GFP_SIMPLE_POINTS_MAKE_AFFINE 137 -#define EC_F_EC_GFP_SIMPLE_POINT_GET_AFFINE_COORDINATES 167 -#define EC_F_EC_GFP_SIMPLE_POINT_GET_AFFINE_COORDINATES_GFP 105 -#define EC_F_EC_GFP_SIMPLE_POINT_SET_AFFINE_COORDINATES 168 -#define EC_F_EC_GFP_SIMPLE_POINT_SET_AFFINE_COORDINATES_GFP 128 -#define EC_F_EC_GFP_SIMPLE_SET_COMPRESSED_COORDINATES 169 -#define EC_F_EC_GFP_SIMPLE_SET_COMPRESSED_COORDINATES_GFP 129 -#define EC_F_EC_GROUP_CHECK 170 -#define EC_F_EC_GROUP_CHECK_DISCRIMINANT 171 -#define EC_F_EC_GROUP_COPY 106 -#define EC_F_EC_GROUP_GET0_GENERATOR 139 -#define EC_F_EC_GROUP_GET_COFACTOR 140 -#define EC_F_EC_GROUP_GET_CURVE_GF2M 172 -#define EC_F_EC_GROUP_GET_CURVE_GFP 130 -#define EC_F_EC_GROUP_GET_DEGREE 173 -#define EC_F_EC_GROUP_GET_ORDER 141 -#define EC_F_EC_GROUP_GET_PENTANOMIAL_BASIS 193 -#define EC_F_EC_GROUP_GET_TRINOMIAL_BASIS 194 -#define EC_F_EC_GROUP_NEW 108 -#define EC_F_EC_GROUP_NEW_BY_CURVE_NAME 174 -#define EC_F_EC_GROUP_NEW_FROM_DATA 175 -#define EC_F_EC_GROUP_PRECOMPUTE_MULT 142 -#define EC_F_EC_GROUP_SET_CURVE_GF2M 176 -#define EC_F_EC_GROUP_SET_CURVE_GFP 109 -#define EC_F_EC_GROUP_SET_EXTRA_DATA 110 -#define EC_F_EC_GROUP_SET_GENERATOR 111 -#define EC_F_EC_KEY_CHECK_KEY 177 -#define EC_F_EC_KEY_COPY 178 -#define EC_F_EC_KEY_GENERATE_KEY 179 -#define EC_F_EC_KEY_NEW 182 -#define EC_F_EC_KEY_PRINT 180 -#define EC_F_EC_KEY_PRINT_FP 181 -#define EC_F_EC_KEY_SET_PUBLIC_KEY_AFFINE_COORDINATES 229 -#define EC_F_EC_POINTS_MAKE_AFFINE 136 -#define EC_F_EC_POINT_ADD 112 -#define EC_F_EC_POINT_CMP 113 -#define EC_F_EC_POINT_COPY 114 -#define EC_F_EC_POINT_DBL 115 -#define EC_F_EC_POINT_GET_AFFINE_COORDINATES_GF2M 183 -#define EC_F_EC_POINT_GET_AFFINE_COORDINATES_GFP 116 -#define EC_F_EC_POINT_GET_JPROJECTIVE_COORDINATES_GFP 117 -#define EC_F_EC_POINT_INVERT 210 -#define EC_F_EC_POINT_IS_AT_INFINITY 118 -#define EC_F_EC_POINT_IS_ON_CURVE 119 -#define EC_F_EC_POINT_MAKE_AFFINE 120 -#define EC_F_EC_POINT_MUL 184 -#define EC_F_EC_POINT_NEW 121 -#define EC_F_EC_POINT_OCT2POINT 122 -#define EC_F_EC_POINT_POINT2OCT 123 -#define EC_F_EC_POINT_SET_AFFINE_COORDINATES_GF2M 185 -#define EC_F_EC_POINT_SET_AFFINE_COORDINATES_GFP 124 -#define EC_F_EC_POINT_SET_COMPRESSED_COORDINATES_GF2M 186 -#define EC_F_EC_POINT_SET_COMPRESSED_COORDINATES_GFP 125 -#define EC_F_EC_POINT_SET_JPROJECTIVE_COORDINATES_GFP 126 -#define EC_F_EC_POINT_SET_TO_INFINITY 127 -#define EC_F_EC_PRE_COMP_DUP 207 -#define EC_F_EC_PRE_COMP_NEW 196 -#define EC_F_EC_WNAF_MUL 187 -#define EC_F_EC_WNAF_PRECOMPUTE_MULT 188 -#define EC_F_I2D_ECPARAMETERS 190 -#define EC_F_I2D_ECPKPARAMETERS 191 -#define EC_F_I2D_ECPRIVATEKEY 192 -#define EC_F_I2O_ECPUBLICKEY 151 -#define EC_F_NISTP224_PRE_COMP_NEW 227 -#define EC_F_NISTP256_PRE_COMP_NEW 236 -#define EC_F_NISTP521_PRE_COMP_NEW 237 -#define EC_F_O2I_ECPUBLICKEY 152 -#define EC_F_OLD_EC_PRIV_DECODE 222 -#define EC_F_PKEY_EC_CTRL 197 -#define EC_F_PKEY_EC_CTRL_STR 198 -#define EC_F_PKEY_EC_DERIVE 217 -#define EC_F_PKEY_EC_KEYGEN 199 -#define EC_F_PKEY_EC_PARAMGEN 219 -#define EC_F_PKEY_EC_SIGN 218 - -/* Reason codes. */ -#define EC_R_ASN1_ERROR 115 -#define EC_R_ASN1_UNKNOWN_FIELD 116 -#define EC_R_BIGNUM_OUT_OF_RANGE 144 -#define EC_R_BUFFER_TOO_SMALL 100 -#define EC_R_COORDINATES_OUT_OF_RANGE 146 -#define EC_R_D2I_ECPKPARAMETERS_FAILURE 117 -#define EC_R_DECODE_ERROR 142 -#define EC_R_DISCRIMINANT_IS_ZERO 118 -#define EC_R_EC_GROUP_NEW_BY_NAME_FAILURE 119 -#define EC_R_FIELD_TOO_LARGE 143 -#define EC_R_GF2M_NOT_SUPPORTED 147 -#define EC_R_GROUP2PKPARAMETERS_FAILURE 120 -#define EC_R_I2D_ECPKPARAMETERS_FAILURE 121 -#define EC_R_INCOMPATIBLE_OBJECTS 101 -#define EC_R_INVALID_ARGUMENT 112 -#define EC_R_INVALID_COMPRESSED_POINT 110 -#define EC_R_INVALID_COMPRESSION_BIT 109 -#define EC_R_INVALID_CURVE 141 -#define EC_R_INVALID_DIGEST_TYPE 138 -#define EC_R_INVALID_ENCODING 102 -#define EC_R_INVALID_FIELD 103 -#define EC_R_INVALID_FORM 104 -#define EC_R_INVALID_GROUP_ORDER 122 -#define EC_R_INVALID_PENTANOMIAL_BASIS 132 -#define EC_R_INVALID_PRIVATE_KEY 123 -#define EC_R_INVALID_TRINOMIAL_BASIS 137 -#define EC_R_KEYS_NOT_SET 140 -#define EC_R_MISSING_PARAMETERS 124 -#define EC_R_MISSING_PRIVATE_KEY 125 -#define EC_R_NOT_A_NIST_PRIME 135 -#define EC_R_NOT_A_SUPPORTED_NIST_PRIME 136 -#define EC_R_NOT_IMPLEMENTED 126 -#define EC_R_NOT_INITIALIZED 111 -#define EC_R_NO_FIELD_MOD 133 -#define EC_R_NO_PARAMETERS_SET 139 -#define EC_R_PASSED_NULL_PARAMETER 134 -#define EC_R_PKPARAMETERS2GROUP_FAILURE 127 -#define EC_R_POINT_AT_INFINITY 106 -#define EC_R_POINT_IS_NOT_ON_CURVE 107 -#define EC_R_SLOT_FULL 108 -#define EC_R_UNDEFINED_GENERATOR 113 -#define EC_R_UNDEFINED_ORDER 128 -#define EC_R_UNKNOWN_GROUP 129 -#define EC_R_UNKNOWN_ORDER 114 -#define EC_R_UNSUPPORTED_FIELD 131 -#define EC_R_WRONG_CURVE_PARAMETERS 145 -#define EC_R_WRONG_ORDER 130 - -#ifdef __cplusplus -} -#endif -#endif diff --git a/Pods/OpenSSL-Universal/include-osx/openssl/ecdh.h b/Pods/OpenSSL-Universal/include-osx/openssl/ecdh.h deleted file mode 100644 index 8887102c..00000000 --- a/Pods/OpenSSL-Universal/include-osx/openssl/ecdh.h +++ /dev/null @@ -1,125 +0,0 @@ -/* crypto/ecdh/ecdh.h */ -/* ==================================================================== - * Copyright 2002 Sun Microsystems, Inc. ALL RIGHTS RESERVED. - * - * The Elliptic Curve Public-Key Crypto Library (ECC Code) included - * herein is developed by SUN MICROSYSTEMS, INC., and is contributed - * to the OpenSSL project. - * - * The ECC Code is licensed pursuant to the OpenSSL open source - * license provided below. - * - * The ECDH software is originally written by Douglas Stebila of - * Sun Microsystems Laboratories. - * - */ -/* ==================================================================== - * Copyright (c) 2000-2002 The OpenSSL Project. All rights reserved. - * - * Redistribution and use in source and binary forms, with or without - * modification, are permitted provided that the following conditions - * are met: - * - * 1. Redistributions of source code must retain the above copyright - * notice, this list of conditions and the following disclaimer. - * - * 2. Redistributions in binary form must reproduce the above copyright - * notice, this list of conditions and the following disclaimer in - * the documentation and/or other materials provided with the - * distribution. - * - * 3. All advertising materials mentioning features or use of this - * software must display the following acknowledgment: - * "This product includes software developed by the OpenSSL Project - * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)" - * - * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to - * endorse or promote products derived from this software without - * prior written permission. For written permission, please contact - * licensing@OpenSSL.org. - * - * 5. Products derived from this software may not be called "OpenSSL" - * nor may "OpenSSL" appear in their names without prior written - * permission of the OpenSSL Project. - * - * 6. Redistributions of any form whatsoever must retain the following - * acknowledgment: - * "This product includes software developed by the OpenSSL Project - * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)" - * - * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY - * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE - * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR - * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR - * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, - * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT - * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; - * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) - * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, - * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) - * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED - * OF THE POSSIBILITY OF SUCH DAMAGE. - * ==================================================================== - * - * This product includes cryptographic software written by Eric Young - * (eay@cryptsoft.com). This product includes software written by Tim - * Hudson (tjh@cryptsoft.com). - * - */ -#ifndef HEADER_ECDH_H -#define HEADER_ECDH_H - -#include - -#ifdef OPENSSL_NO_ECDH -#error ECDH is disabled. -#endif - -#include -#include -#ifndef OPENSSL_NO_DEPRECATED -#include -#endif - -#ifdef __cplusplus -extern "C" { -#endif - -const ECDH_METHOD *ECDH_OpenSSL(void); - -void ECDH_set_default_method(const ECDH_METHOD *); -const ECDH_METHOD *ECDH_get_default_method(void); -int ECDH_set_method(EC_KEY *, const ECDH_METHOD *); - -int ECDH_compute_key(void *out, size_t outlen, const EC_POINT *pub_key, EC_KEY *ecdh, - void *(*KDF)(const void *in, size_t inlen, void *out, size_t *outlen)); - -int ECDH_get_ex_new_index(long argl, void *argp, CRYPTO_EX_new - *new_func, CRYPTO_EX_dup *dup_func, CRYPTO_EX_free *free_func); -int ECDH_set_ex_data(EC_KEY *d, int idx, void *arg); -void *ECDH_get_ex_data(EC_KEY *d, int idx); - - -/* BEGIN ERROR CODES */ -/* The following lines are auto generated by the script mkerr.pl. Any changes - * made after this point may be overwritten when the script is next run. - */ -void ERR_load_ECDH_strings(void); - -/* Error codes for the ECDH functions. */ - -/* Function codes. */ -#define ECDH_F_ECDH_CHECK 102 -#define ECDH_F_ECDH_COMPUTE_KEY 100 -#define ECDH_F_ECDH_DATA_NEW_METHOD 101 - -/* Reason codes. */ -#define ECDH_R_KDF_FAILED 102 -#define ECDH_R_NON_FIPS_METHOD 103 -#define ECDH_R_NO_PRIVATE_VALUE 100 -#define ECDH_R_POINT_ARITHMETIC_FAILURE 101 - -#ifdef __cplusplus -} -#endif -#endif diff --git a/Pods/OpenSSL-Universal/include-osx/openssl/ecdsa.h b/Pods/OpenSSL-Universal/include-osx/openssl/ecdsa.h deleted file mode 100644 index 7fb5254b..00000000 --- a/Pods/OpenSSL-Universal/include-osx/openssl/ecdsa.h +++ /dev/null @@ -1,260 +0,0 @@ -/* crypto/ecdsa/ecdsa.h */ -/** - * \file crypto/ecdsa/ecdsa.h Include file for the OpenSSL ECDSA functions - * \author Written by Nils Larsch for the OpenSSL project - */ -/* ==================================================================== - * Copyright (c) 2000-2005 The OpenSSL Project. All rights reserved. - * - * Redistribution and use in source and binary forms, with or without - * modification, are permitted provided that the following conditions - * are met: - * - * 1. Redistributions of source code must retain the above copyright - * notice, this list of conditions and the following disclaimer. - * - * 2. Redistributions in binary form must reproduce the above copyright - * notice, this list of conditions and the following disclaimer in - * the documentation and/or other materials provided with the - * distribution. - * - * 3. All advertising materials mentioning features or use of this - * software must display the following acknowledgment: - * "This product includes software developed by the OpenSSL Project - * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)" - * - * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to - * endorse or promote products derived from this software without - * prior written permission. For written permission, please contact - * licensing@OpenSSL.org. - * - * 5. Products derived from this software may not be called "OpenSSL" - * nor may "OpenSSL" appear in their names without prior written - * permission of the OpenSSL Project. - * - * 6. Redistributions of any form whatsoever must retain the following - * acknowledgment: - * "This product includes software developed by the OpenSSL Project - * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)" - * - * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY - * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE - * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR - * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR - * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, - * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT - * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; - * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) - * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, - * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) - * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED - * OF THE POSSIBILITY OF SUCH DAMAGE. - * ==================================================================== - * - * This product includes cryptographic software written by Eric Young - * (eay@cryptsoft.com). This product includes software written by Tim - * Hudson (tjh@cryptsoft.com). - * - */ -#ifndef HEADER_ECDSA_H -#define HEADER_ECDSA_H - -#include - -#ifdef OPENSSL_NO_ECDSA -#error ECDSA is disabled. -#endif - -#include -#include -#ifndef OPENSSL_NO_DEPRECATED -#include -#endif - -#ifdef __cplusplus -extern "C" { -#endif - -typedef struct ECDSA_SIG_st - { - BIGNUM *r; - BIGNUM *s; - } ECDSA_SIG; - -/** Allocates and initialize a ECDSA_SIG structure - * \return pointer to a ECDSA_SIG structure or NULL if an error occurred - */ -ECDSA_SIG *ECDSA_SIG_new(void); - -/** frees a ECDSA_SIG structure - * \param sig pointer to the ECDSA_SIG structure - */ -void ECDSA_SIG_free(ECDSA_SIG *sig); - -/** DER encode content of ECDSA_SIG object (note: this function modifies *pp - * (*pp += length of the DER encoded signature)). - * \param sig pointer to the ECDSA_SIG object - * \param pp pointer to a unsigned char pointer for the output or NULL - * \return the length of the DER encoded ECDSA_SIG object or 0 - */ -int i2d_ECDSA_SIG(const ECDSA_SIG *sig, unsigned char **pp); - -/** Decodes a DER encoded ECDSA signature (note: this function changes *pp - * (*pp += len)). - * \param sig pointer to ECDSA_SIG pointer (may be NULL) - * \param pp memory buffer with the DER encoded signature - * \param len length of the buffer - * \return pointer to the decoded ECDSA_SIG structure (or NULL) - */ -ECDSA_SIG *d2i_ECDSA_SIG(ECDSA_SIG **sig, const unsigned char **pp, long len); - -/** Computes the ECDSA signature of the given hash value using - * the supplied private key and returns the created signature. - * \param dgst pointer to the hash value - * \param dgst_len length of the hash value - * \param eckey EC_KEY object containing a private EC key - * \return pointer to a ECDSA_SIG structure or NULL if an error occurred - */ -ECDSA_SIG *ECDSA_do_sign(const unsigned char *dgst,int dgst_len,EC_KEY *eckey); - -/** Computes ECDSA signature of a given hash value using the supplied - * private key (note: sig must point to ECDSA_size(eckey) bytes of memory). - * \param dgst pointer to the hash value to sign - * \param dgstlen length of the hash value - * \param kinv BIGNUM with a pre-computed inverse k (optional) - * \param rp BIGNUM with a pre-computed rp value (optioanl), - * see ECDSA_sign_setup - * \param eckey EC_KEY object containing a private EC key - * \return pointer to a ECDSA_SIG structure or NULL if an error occurred - */ -ECDSA_SIG *ECDSA_do_sign_ex(const unsigned char *dgst, int dgstlen, - const BIGNUM *kinv, const BIGNUM *rp, EC_KEY *eckey); - -/** Verifies that the supplied signature is a valid ECDSA - * signature of the supplied hash value using the supplied public key. - * \param dgst pointer to the hash value - * \param dgst_len length of the hash value - * \param sig ECDSA_SIG structure - * \param eckey EC_KEY object containing a public EC key - * \return 1 if the signature is valid, 0 if the signature is invalid - * and -1 on error - */ -int ECDSA_do_verify(const unsigned char *dgst, int dgst_len, - const ECDSA_SIG *sig, EC_KEY* eckey); - -const ECDSA_METHOD *ECDSA_OpenSSL(void); - -/** Sets the default ECDSA method - * \param meth new default ECDSA_METHOD - */ -void ECDSA_set_default_method(const ECDSA_METHOD *meth); - -/** Returns the default ECDSA method - * \return pointer to ECDSA_METHOD structure containing the default method - */ -const ECDSA_METHOD *ECDSA_get_default_method(void); - -/** Sets method to be used for the ECDSA operations - * \param eckey EC_KEY object - * \param meth new method - * \return 1 on success and 0 otherwise - */ -int ECDSA_set_method(EC_KEY *eckey, const ECDSA_METHOD *meth); - -/** Returns the maximum length of the DER encoded signature - * \param eckey EC_KEY object - * \return numbers of bytes required for the DER encoded signature - */ -int ECDSA_size(const EC_KEY *eckey); - -/** Precompute parts of the signing operation - * \param eckey EC_KEY object containing a private EC key - * \param ctx BN_CTX object (optional) - * \param kinv BIGNUM pointer for the inverse of k - * \param rp BIGNUM pointer for x coordinate of k * generator - * \return 1 on success and 0 otherwise - */ -int ECDSA_sign_setup(EC_KEY *eckey, BN_CTX *ctx, BIGNUM **kinv, - BIGNUM **rp); - -/** Computes ECDSA signature of a given hash value using the supplied - * private key (note: sig must point to ECDSA_size(eckey) bytes of memory). - * \param type this parameter is ignored - * \param dgst pointer to the hash value to sign - * \param dgstlen length of the hash value - * \param sig memory for the DER encoded created signature - * \param siglen pointer to the length of the returned signature - * \param eckey EC_KEY object containing a private EC key - * \return 1 on success and 0 otherwise - */ -int ECDSA_sign(int type, const unsigned char *dgst, int dgstlen, - unsigned char *sig, unsigned int *siglen, EC_KEY *eckey); - - -/** Computes ECDSA signature of a given hash value using the supplied - * private key (note: sig must point to ECDSA_size(eckey) bytes of memory). - * \param type this parameter is ignored - * \param dgst pointer to the hash value to sign - * \param dgstlen length of the hash value - * \param sig buffer to hold the DER encoded signature - * \param siglen pointer to the length of the returned signature - * \param kinv BIGNUM with a pre-computed inverse k (optional) - * \param rp BIGNUM with a pre-computed rp value (optioanl), - * see ECDSA_sign_setup - * \param eckey EC_KEY object containing a private EC key - * \return 1 on success and 0 otherwise - */ -int ECDSA_sign_ex(int type, const unsigned char *dgst, int dgstlen, - unsigned char *sig, unsigned int *siglen, const BIGNUM *kinv, - const BIGNUM *rp, EC_KEY *eckey); - -/** Verifies that the given signature is valid ECDSA signature - * of the supplied hash value using the specified public key. - * \param type this parameter is ignored - * \param dgst pointer to the hash value - * \param dgstlen length of the hash value - * \param sig pointer to the DER encoded signature - * \param siglen length of the DER encoded signature - * \param eckey EC_KEY object containing a public EC key - * \return 1 if the signature is valid, 0 if the signature is invalid - * and -1 on error - */ -int ECDSA_verify(int type, const unsigned char *dgst, int dgstlen, - const unsigned char *sig, int siglen, EC_KEY *eckey); - -/* the standard ex_data functions */ -int ECDSA_get_ex_new_index(long argl, void *argp, CRYPTO_EX_new - *new_func, CRYPTO_EX_dup *dup_func, CRYPTO_EX_free *free_func); -int ECDSA_set_ex_data(EC_KEY *d, int idx, void *arg); -void *ECDSA_get_ex_data(EC_KEY *d, int idx); - - -/* BEGIN ERROR CODES */ -/* The following lines are auto generated by the script mkerr.pl. Any changes - * made after this point may be overwritten when the script is next run. - */ -void ERR_load_ECDSA_strings(void); - -/* Error codes for the ECDSA functions. */ - -/* Function codes. */ -#define ECDSA_F_ECDSA_CHECK 104 -#define ECDSA_F_ECDSA_DATA_NEW_METHOD 100 -#define ECDSA_F_ECDSA_DO_SIGN 101 -#define ECDSA_F_ECDSA_DO_VERIFY 102 -#define ECDSA_F_ECDSA_SIGN_SETUP 103 - -/* Reason codes. */ -#define ECDSA_R_BAD_SIGNATURE 100 -#define ECDSA_R_DATA_TOO_LARGE_FOR_KEY_SIZE 101 -#define ECDSA_R_ERR_EC_LIB 102 -#define ECDSA_R_MISSING_PARAMETERS 103 -#define ECDSA_R_NEED_NEW_SETUP_VALUES 106 -#define ECDSA_R_NON_FIPS_METHOD 107 -#define ECDSA_R_RANDOM_NUMBER_GENERATION_FAILED 104 -#define ECDSA_R_SIGNATURE_MALLOC_FAILED 105 - -#ifdef __cplusplus -} -#endif -#endif diff --git a/Pods/OpenSSL-Universal/include-osx/openssl/engine.h b/Pods/OpenSSL-Universal/include-osx/openssl/engine.h deleted file mode 100644 index f8be4977..00000000 --- a/Pods/OpenSSL-Universal/include-osx/openssl/engine.h +++ /dev/null @@ -1,842 +0,0 @@ -/* openssl/engine.h */ -/* Written by Geoff Thorpe (geoff@geoffthorpe.net) for the OpenSSL - * project 2000. - */ -/* ==================================================================== - * Copyright (c) 1999-2004 The OpenSSL Project. All rights reserved. - * - * Redistribution and use in source and binary forms, with or without - * modification, are permitted provided that the following conditions - * are met: - * - * 1. Redistributions of source code must retain the above copyright - * notice, this list of conditions and the following disclaimer. - * - * 2. Redistributions in binary form must reproduce the above copyright - * notice, this list of conditions and the following disclaimer in - * the documentation and/or other materials provided with the - * distribution. - * - * 3. All advertising materials mentioning features or use of this - * software must display the following acknowledgment: - * "This product includes software developed by the OpenSSL Project - * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)" - * - * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to - * endorse or promote products derived from this software without - * prior written permission. For written permission, please contact - * licensing@OpenSSL.org. - * - * 5. Products derived from this software may not be called "OpenSSL" - * nor may "OpenSSL" appear in their names without prior written - * permission of the OpenSSL Project. - * - * 6. Redistributions of any form whatsoever must retain the following - * acknowledgment: - * "This product includes software developed by the OpenSSL Project - * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)" - * - * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY - * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE - * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR - * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR - * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, - * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT - * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; - * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) - * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, - * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) - * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED - * OF THE POSSIBILITY OF SUCH DAMAGE. - * ==================================================================== - * - * This product includes cryptographic software written by Eric Young - * (eay@cryptsoft.com). This product includes software written by Tim - * Hudson (tjh@cryptsoft.com). - * - */ -/* ==================================================================== - * Copyright 2002 Sun Microsystems, Inc. ALL RIGHTS RESERVED. - * ECDH support in OpenSSL originally developed by - * SUN MICROSYSTEMS, INC., and contributed to the OpenSSL project. - */ - -#ifndef HEADER_ENGINE_H -#define HEADER_ENGINE_H - -#include - -#ifdef OPENSSL_NO_ENGINE -#error ENGINE is disabled. -#endif - -#ifndef OPENSSL_NO_DEPRECATED -#include -#ifndef OPENSSL_NO_RSA -#include -#endif -#ifndef OPENSSL_NO_DSA -#include -#endif -#ifndef OPENSSL_NO_DH -#include -#endif -#ifndef OPENSSL_NO_ECDH -#include -#endif -#ifndef OPENSSL_NO_ECDSA -#include -#endif -#include -#include -#include -#endif - -#include -#include - -#include - -#ifdef __cplusplus -extern "C" { -#endif - -/* These flags are used to control combinations of algorithm (methods) - * by bitwise "OR"ing. */ -#define ENGINE_METHOD_RSA (unsigned int)0x0001 -#define ENGINE_METHOD_DSA (unsigned int)0x0002 -#define ENGINE_METHOD_DH (unsigned int)0x0004 -#define ENGINE_METHOD_RAND (unsigned int)0x0008 -#define ENGINE_METHOD_ECDH (unsigned int)0x0010 -#define ENGINE_METHOD_ECDSA (unsigned int)0x0020 -#define ENGINE_METHOD_CIPHERS (unsigned int)0x0040 -#define ENGINE_METHOD_DIGESTS (unsigned int)0x0080 -#define ENGINE_METHOD_STORE (unsigned int)0x0100 -#define ENGINE_METHOD_PKEY_METHS (unsigned int)0x0200 -#define ENGINE_METHOD_PKEY_ASN1_METHS (unsigned int)0x0400 -/* Obvious all-or-nothing cases. */ -#define ENGINE_METHOD_ALL (unsigned int)0xFFFF -#define ENGINE_METHOD_NONE (unsigned int)0x0000 - -/* This(ese) flag(s) controls behaviour of the ENGINE_TABLE mechanism used - * internally to control registration of ENGINE implementations, and can be set - * by ENGINE_set_table_flags(). The "NOINIT" flag prevents attempts to - * initialise registered ENGINEs if they are not already initialised. */ -#define ENGINE_TABLE_FLAG_NOINIT (unsigned int)0x0001 - -/* ENGINE flags that can be set by ENGINE_set_flags(). */ -/* #define ENGINE_FLAGS_MALLOCED 0x0001 */ /* Not used */ - -/* This flag is for ENGINEs that wish to handle the various 'CMD'-related - * control commands on their own. Without this flag, ENGINE_ctrl() handles these - * control commands on behalf of the ENGINE using their "cmd_defns" data. */ -#define ENGINE_FLAGS_MANUAL_CMD_CTRL (int)0x0002 - -/* This flag is for ENGINEs who return new duplicate structures when found via - * "ENGINE_by_id()". When an ENGINE must store state (eg. if ENGINE_ctrl() - * commands are called in sequence as part of some stateful process like - * key-generation setup and execution), it can set this flag - then each attempt - * to obtain the ENGINE will result in it being copied into a new structure. - * Normally, ENGINEs don't declare this flag so ENGINE_by_id() just increments - * the existing ENGINE's structural reference count. */ -#define ENGINE_FLAGS_BY_ID_COPY (int)0x0004 - -/* This flag if for an ENGINE that does not want its methods registered as - * part of ENGINE_register_all_complete() for example if the methods are - * not usable as default methods. - */ - -#define ENGINE_FLAGS_NO_REGISTER_ALL (int)0x0008 - -/* ENGINEs can support their own command types, and these flags are used in - * ENGINE_CTRL_GET_CMD_FLAGS to indicate to the caller what kind of input each - * command expects. Currently only numeric and string input is supported. If a - * control command supports none of the _NUMERIC, _STRING, or _NO_INPUT options, - * then it is regarded as an "internal" control command - and not for use in - * config setting situations. As such, they're not available to the - * ENGINE_ctrl_cmd_string() function, only raw ENGINE_ctrl() access. Changes to - * this list of 'command types' should be reflected carefully in - * ENGINE_cmd_is_executable() and ENGINE_ctrl_cmd_string(). */ - -/* accepts a 'long' input value (3rd parameter to ENGINE_ctrl) */ -#define ENGINE_CMD_FLAG_NUMERIC (unsigned int)0x0001 -/* accepts string input (cast from 'void*' to 'const char *', 4th parameter to - * ENGINE_ctrl) */ -#define ENGINE_CMD_FLAG_STRING (unsigned int)0x0002 -/* Indicates that the control command takes *no* input. Ie. the control command - * is unparameterised. */ -#define ENGINE_CMD_FLAG_NO_INPUT (unsigned int)0x0004 -/* Indicates that the control command is internal. This control command won't - * be shown in any output, and is only usable through the ENGINE_ctrl_cmd() - * function. */ -#define ENGINE_CMD_FLAG_INTERNAL (unsigned int)0x0008 - -/* NB: These 3 control commands are deprecated and should not be used. ENGINEs - * relying on these commands should compile conditional support for - * compatibility (eg. if these symbols are defined) but should also migrate the - * same functionality to their own ENGINE-specific control functions that can be - * "discovered" by calling applications. The fact these control commands - * wouldn't be "executable" (ie. usable by text-based config) doesn't change the - * fact that application code can find and use them without requiring per-ENGINE - * hacking. */ - -/* These flags are used to tell the ctrl function what should be done. - * All command numbers are shared between all engines, even if some don't - * make sense to some engines. In such a case, they do nothing but return - * the error ENGINE_R_CTRL_COMMAND_NOT_IMPLEMENTED. */ -#define ENGINE_CTRL_SET_LOGSTREAM 1 -#define ENGINE_CTRL_SET_PASSWORD_CALLBACK 2 -#define ENGINE_CTRL_HUP 3 /* Close and reinitialise any - handles/connections etc. */ -#define ENGINE_CTRL_SET_USER_INTERFACE 4 /* Alternative to callback */ -#define ENGINE_CTRL_SET_CALLBACK_DATA 5 /* User-specific data, used - when calling the password - callback and the user - interface */ -#define ENGINE_CTRL_LOAD_CONFIGURATION 6 /* Load a configuration, given - a string that represents a - file name or so */ -#define ENGINE_CTRL_LOAD_SECTION 7 /* Load data from a given - section in the already loaded - configuration */ - -/* These control commands allow an application to deal with an arbitrary engine - * in a dynamic way. Warn: Negative return values indicate errors FOR THESE - * COMMANDS because zero is used to indicate 'end-of-list'. Other commands, - * including ENGINE-specific command types, return zero for an error. - * - * An ENGINE can choose to implement these ctrl functions, and can internally - * manage things however it chooses - it does so by setting the - * ENGINE_FLAGS_MANUAL_CMD_CTRL flag (using ENGINE_set_flags()). Otherwise the - * ENGINE_ctrl() code handles this on the ENGINE's behalf using the cmd_defns - * data (set using ENGINE_set_cmd_defns()). This means an ENGINE's ctrl() - * handler need only implement its own commands - the above "meta" commands will - * be taken care of. */ - -/* Returns non-zero if the supplied ENGINE has a ctrl() handler. If "not", then - * all the remaining control commands will return failure, so it is worth - * checking this first if the caller is trying to "discover" the engine's - * capabilities and doesn't want errors generated unnecessarily. */ -#define ENGINE_CTRL_HAS_CTRL_FUNCTION 10 -/* Returns a positive command number for the first command supported by the - * engine. Returns zero if no ctrl commands are supported. */ -#define ENGINE_CTRL_GET_FIRST_CMD_TYPE 11 -/* The 'long' argument specifies a command implemented by the engine, and the - * return value is the next command supported, or zero if there are no more. */ -#define ENGINE_CTRL_GET_NEXT_CMD_TYPE 12 -/* The 'void*' argument is a command name (cast from 'const char *'), and the - * return value is the command that corresponds to it. */ -#define ENGINE_CTRL_GET_CMD_FROM_NAME 13 -/* The next two allow a command to be converted into its corresponding string - * form. In each case, the 'long' argument supplies the command. In the NAME_LEN - * case, the return value is the length of the command name (not counting a - * trailing EOL). In the NAME case, the 'void*' argument must be a string buffer - * large enough, and it will be populated with the name of the command (WITH a - * trailing EOL). */ -#define ENGINE_CTRL_GET_NAME_LEN_FROM_CMD 14 -#define ENGINE_CTRL_GET_NAME_FROM_CMD 15 -/* The next two are similar but give a "short description" of a command. */ -#define ENGINE_CTRL_GET_DESC_LEN_FROM_CMD 16 -#define ENGINE_CTRL_GET_DESC_FROM_CMD 17 -/* With this command, the return value is the OR'd combination of - * ENGINE_CMD_FLAG_*** values that indicate what kind of input a given - * engine-specific ctrl command expects. */ -#define ENGINE_CTRL_GET_CMD_FLAGS 18 - -/* ENGINE implementations should start the numbering of their own control - * commands from this value. (ie. ENGINE_CMD_BASE, ENGINE_CMD_BASE + 1, etc). */ -#define ENGINE_CMD_BASE 200 - -/* NB: These 2 nCipher "chil" control commands are deprecated, and their - * functionality is now available through ENGINE-specific control commands - * (exposed through the above-mentioned 'CMD'-handling). Code using these 2 - * commands should be migrated to the more general command handling before these - * are removed. */ - -/* Flags specific to the nCipher "chil" engine */ -#define ENGINE_CTRL_CHIL_SET_FORKCHECK 100 - /* Depending on the value of the (long)i argument, this sets or - * unsets the SimpleForkCheck flag in the CHIL API to enable or - * disable checking and workarounds for applications that fork(). - */ -#define ENGINE_CTRL_CHIL_NO_LOCKING 101 - /* This prevents the initialisation function from providing mutex - * callbacks to the nCipher library. */ - -/* If an ENGINE supports its own specific control commands and wishes the - * framework to handle the above 'ENGINE_CMD_***'-manipulation commands on its - * behalf, it should supply a null-terminated array of ENGINE_CMD_DEFN entries - * to ENGINE_set_cmd_defns(). It should also implement a ctrl() handler that - * supports the stated commands (ie. the "cmd_num" entries as described by the - * array). NB: The array must be ordered in increasing order of cmd_num. - * "null-terminated" means that the last ENGINE_CMD_DEFN element has cmd_num set - * to zero and/or cmd_name set to NULL. */ -typedef struct ENGINE_CMD_DEFN_st - { - unsigned int cmd_num; /* The command number */ - const char *cmd_name; /* The command name itself */ - const char *cmd_desc; /* A short description of the command */ - unsigned int cmd_flags; /* The input the command expects */ - } ENGINE_CMD_DEFN; - -/* Generic function pointer */ -typedef int (*ENGINE_GEN_FUNC_PTR)(void); -/* Generic function pointer taking no arguments */ -typedef int (*ENGINE_GEN_INT_FUNC_PTR)(ENGINE *); -/* Specific control function pointer */ -typedef int (*ENGINE_CTRL_FUNC_PTR)(ENGINE *, int, long, void *, void (*f)(void)); -/* Generic load_key function pointer */ -typedef EVP_PKEY * (*ENGINE_LOAD_KEY_PTR)(ENGINE *, const char *, - UI_METHOD *ui_method, void *callback_data); -typedef int (*ENGINE_SSL_CLIENT_CERT_PTR)(ENGINE *, SSL *ssl, - STACK_OF(X509_NAME) *ca_dn, X509 **pcert, EVP_PKEY **pkey, - STACK_OF(X509) **pother, UI_METHOD *ui_method, void *callback_data); -/* These callback types are for an ENGINE's handler for cipher and digest logic. - * These handlers have these prototypes; - * int foo(ENGINE *e, const EVP_CIPHER **cipher, const int **nids, int nid); - * int foo(ENGINE *e, const EVP_MD **digest, const int **nids, int nid); - * Looking at how to implement these handlers in the case of cipher support, if - * the framework wants the EVP_CIPHER for 'nid', it will call; - * foo(e, &p_evp_cipher, NULL, nid); (return zero for failure) - * If the framework wants a list of supported 'nid's, it will call; - * foo(e, NULL, &p_nids, 0); (returns number of 'nids' or -1 for error) - */ -/* Returns to a pointer to the array of supported cipher 'nid's. If the second - * parameter is non-NULL it is set to the size of the returned array. */ -typedef int (*ENGINE_CIPHERS_PTR)(ENGINE *, const EVP_CIPHER **, const int **, int); -typedef int (*ENGINE_DIGESTS_PTR)(ENGINE *, const EVP_MD **, const int **, int); -typedef int (*ENGINE_PKEY_METHS_PTR)(ENGINE *, EVP_PKEY_METHOD **, const int **, int); -typedef int (*ENGINE_PKEY_ASN1_METHS_PTR)(ENGINE *, EVP_PKEY_ASN1_METHOD **, const int **, int); -/* STRUCTURE functions ... all of these functions deal with pointers to ENGINE - * structures where the pointers have a "structural reference". This means that - * their reference is to allowed access to the structure but it does not imply - * that the structure is functional. To simply increment or decrement the - * structural reference count, use ENGINE_by_id and ENGINE_free. NB: This is not - * required when iterating using ENGINE_get_next as it will automatically - * decrement the structural reference count of the "current" ENGINE and - * increment the structural reference count of the ENGINE it returns (unless it - * is NULL). */ - -/* Get the first/last "ENGINE" type available. */ -ENGINE *ENGINE_get_first(void); -ENGINE *ENGINE_get_last(void); -/* Iterate to the next/previous "ENGINE" type (NULL = end of the list). */ -ENGINE *ENGINE_get_next(ENGINE *e); -ENGINE *ENGINE_get_prev(ENGINE *e); -/* Add another "ENGINE" type into the array. */ -int ENGINE_add(ENGINE *e); -/* Remove an existing "ENGINE" type from the array. */ -int ENGINE_remove(ENGINE *e); -/* Retrieve an engine from the list by its unique "id" value. */ -ENGINE *ENGINE_by_id(const char *id); -/* Add all the built-in engines. */ -void ENGINE_load_openssl(void); -void ENGINE_load_dynamic(void); -#ifndef OPENSSL_NO_STATIC_ENGINE -void ENGINE_load_4758cca(void); -void ENGINE_load_aep(void); -void ENGINE_load_atalla(void); -void ENGINE_load_chil(void); -void ENGINE_load_cswift(void); -void ENGINE_load_nuron(void); -void ENGINE_load_sureware(void); -void ENGINE_load_ubsec(void); -void ENGINE_load_padlock(void); -void ENGINE_load_capi(void); -#ifndef OPENSSL_NO_GMP -void ENGINE_load_gmp(void); -#endif -#ifndef OPENSSL_NO_GOST -void ENGINE_load_gost(void); -#endif -#endif -void ENGINE_load_cryptodev(void); -void ENGINE_load_rsax(void); -void ENGINE_load_rdrand(void); -void ENGINE_load_builtin_engines(void); - -/* Get and set global flags (ENGINE_TABLE_FLAG_***) for the implementation - * "registry" handling. */ -unsigned int ENGINE_get_table_flags(void); -void ENGINE_set_table_flags(unsigned int flags); - -/* Manage registration of ENGINEs per "table". For each type, there are 3 - * functions; - * ENGINE_register_***(e) - registers the implementation from 'e' (if it has one) - * ENGINE_unregister_***(e) - unregister the implementation from 'e' - * ENGINE_register_all_***() - call ENGINE_register_***() for each 'e' in the list - * Cleanup is automatically registered from each table when required, so - * ENGINE_cleanup() will reverse any "register" operations. */ - -int ENGINE_register_RSA(ENGINE *e); -void ENGINE_unregister_RSA(ENGINE *e); -void ENGINE_register_all_RSA(void); - -int ENGINE_register_DSA(ENGINE *e); -void ENGINE_unregister_DSA(ENGINE *e); -void ENGINE_register_all_DSA(void); - -int ENGINE_register_ECDH(ENGINE *e); -void ENGINE_unregister_ECDH(ENGINE *e); -void ENGINE_register_all_ECDH(void); - -int ENGINE_register_ECDSA(ENGINE *e); -void ENGINE_unregister_ECDSA(ENGINE *e); -void ENGINE_register_all_ECDSA(void); - -int ENGINE_register_DH(ENGINE *e); -void ENGINE_unregister_DH(ENGINE *e); -void ENGINE_register_all_DH(void); - -int ENGINE_register_RAND(ENGINE *e); -void ENGINE_unregister_RAND(ENGINE *e); -void ENGINE_register_all_RAND(void); - -int ENGINE_register_STORE(ENGINE *e); -void ENGINE_unregister_STORE(ENGINE *e); -void ENGINE_register_all_STORE(void); - -int ENGINE_register_ciphers(ENGINE *e); -void ENGINE_unregister_ciphers(ENGINE *e); -void ENGINE_register_all_ciphers(void); - -int ENGINE_register_digests(ENGINE *e); -void ENGINE_unregister_digests(ENGINE *e); -void ENGINE_register_all_digests(void); - -int ENGINE_register_pkey_meths(ENGINE *e); -void ENGINE_unregister_pkey_meths(ENGINE *e); -void ENGINE_register_all_pkey_meths(void); - -int ENGINE_register_pkey_asn1_meths(ENGINE *e); -void ENGINE_unregister_pkey_asn1_meths(ENGINE *e); -void ENGINE_register_all_pkey_asn1_meths(void); - -/* These functions register all support from the above categories. Note, use of - * these functions can result in static linkage of code your application may not - * need. If you only need a subset of functionality, consider using more - * selective initialisation. */ -int ENGINE_register_complete(ENGINE *e); -int ENGINE_register_all_complete(void); - -/* Send parametrised control commands to the engine. The possibilities to send - * down an integer, a pointer to data or a function pointer are provided. Any of - * the parameters may or may not be NULL, depending on the command number. In - * actuality, this function only requires a structural (rather than functional) - * reference to an engine, but many control commands may require the engine be - * functional. The caller should be aware of trying commands that require an - * operational ENGINE, and only use functional references in such situations. */ -int ENGINE_ctrl(ENGINE *e, int cmd, long i, void *p, void (*f)(void)); - -/* This function tests if an ENGINE-specific command is usable as a "setting". - * Eg. in an application's config file that gets processed through - * ENGINE_ctrl_cmd_string(). If this returns zero, it is not available to - * ENGINE_ctrl_cmd_string(), only ENGINE_ctrl(). */ -int ENGINE_cmd_is_executable(ENGINE *e, int cmd); - -/* This function works like ENGINE_ctrl() with the exception of taking a - * command name instead of a command number, and can handle optional commands. - * See the comment on ENGINE_ctrl_cmd_string() for an explanation on how to - * use the cmd_name and cmd_optional. */ -int ENGINE_ctrl_cmd(ENGINE *e, const char *cmd_name, - long i, void *p, void (*f)(void), int cmd_optional); - -/* This function passes a command-name and argument to an ENGINE. The cmd_name - * is converted to a command number and the control command is called using - * 'arg' as an argument (unless the ENGINE doesn't support such a command, in - * which case no control command is called). The command is checked for input - * flags, and if necessary the argument will be converted to a numeric value. If - * cmd_optional is non-zero, then if the ENGINE doesn't support the given - * cmd_name the return value will be success anyway. This function is intended - * for applications to use so that users (or config files) can supply - * engine-specific config data to the ENGINE at run-time to control behaviour of - * specific engines. As such, it shouldn't be used for calling ENGINE_ctrl() - * functions that return data, deal with binary data, or that are otherwise - * supposed to be used directly through ENGINE_ctrl() in application code. Any - * "return" data from an ENGINE_ctrl() operation in this function will be lost - - * the return value is interpreted as failure if the return value is zero, - * success otherwise, and this function returns a boolean value as a result. In - * other words, vendors of 'ENGINE'-enabled devices should write ENGINE - * implementations with parameterisations that work in this scheme, so that - * compliant ENGINE-based applications can work consistently with the same - * configuration for the same ENGINE-enabled devices, across applications. */ -int ENGINE_ctrl_cmd_string(ENGINE *e, const char *cmd_name, const char *arg, - int cmd_optional); - -/* These functions are useful for manufacturing new ENGINE structures. They - * don't address reference counting at all - one uses them to populate an ENGINE - * structure with personalised implementations of things prior to using it - * directly or adding it to the builtin ENGINE list in OpenSSL. These are also - * here so that the ENGINE structure doesn't have to be exposed and break binary - * compatibility! */ -ENGINE *ENGINE_new(void); -int ENGINE_free(ENGINE *e); -int ENGINE_up_ref(ENGINE *e); -int ENGINE_set_id(ENGINE *e, const char *id); -int ENGINE_set_name(ENGINE *e, const char *name); -int ENGINE_set_RSA(ENGINE *e, const RSA_METHOD *rsa_meth); -int ENGINE_set_DSA(ENGINE *e, const DSA_METHOD *dsa_meth); -int ENGINE_set_ECDH(ENGINE *e, const ECDH_METHOD *ecdh_meth); -int ENGINE_set_ECDSA(ENGINE *e, const ECDSA_METHOD *ecdsa_meth); -int ENGINE_set_DH(ENGINE *e, const DH_METHOD *dh_meth); -int ENGINE_set_RAND(ENGINE *e, const RAND_METHOD *rand_meth); -int ENGINE_set_STORE(ENGINE *e, const STORE_METHOD *store_meth); -int ENGINE_set_destroy_function(ENGINE *e, ENGINE_GEN_INT_FUNC_PTR destroy_f); -int ENGINE_set_init_function(ENGINE *e, ENGINE_GEN_INT_FUNC_PTR init_f); -int ENGINE_set_finish_function(ENGINE *e, ENGINE_GEN_INT_FUNC_PTR finish_f); -int ENGINE_set_ctrl_function(ENGINE *e, ENGINE_CTRL_FUNC_PTR ctrl_f); -int ENGINE_set_load_privkey_function(ENGINE *e, ENGINE_LOAD_KEY_PTR loadpriv_f); -int ENGINE_set_load_pubkey_function(ENGINE *e, ENGINE_LOAD_KEY_PTR loadpub_f); -int ENGINE_set_load_ssl_client_cert_function(ENGINE *e, - ENGINE_SSL_CLIENT_CERT_PTR loadssl_f); -int ENGINE_set_ciphers(ENGINE *e, ENGINE_CIPHERS_PTR f); -int ENGINE_set_digests(ENGINE *e, ENGINE_DIGESTS_PTR f); -int ENGINE_set_pkey_meths(ENGINE *e, ENGINE_PKEY_METHS_PTR f); -int ENGINE_set_pkey_asn1_meths(ENGINE *e, ENGINE_PKEY_ASN1_METHS_PTR f); -int ENGINE_set_flags(ENGINE *e, int flags); -int ENGINE_set_cmd_defns(ENGINE *e, const ENGINE_CMD_DEFN *defns); -/* These functions allow control over any per-structure ENGINE data. */ -int ENGINE_get_ex_new_index(long argl, void *argp, CRYPTO_EX_new *new_func, - CRYPTO_EX_dup *dup_func, CRYPTO_EX_free *free_func); -int ENGINE_set_ex_data(ENGINE *e, int idx, void *arg); -void *ENGINE_get_ex_data(const ENGINE *e, int idx); - -/* This function cleans up anything that needs it. Eg. the ENGINE_add() function - * automatically ensures the list cleanup function is registered to be called - * from ENGINE_cleanup(). Similarly, all ENGINE_register_*** functions ensure - * ENGINE_cleanup() will clean up after them. */ -void ENGINE_cleanup(void); - -/* These return values from within the ENGINE structure. These can be useful - * with functional references as well as structural references - it depends - * which you obtained. Using the result for functional purposes if you only - * obtained a structural reference may be problematic! */ -const char *ENGINE_get_id(const ENGINE *e); -const char *ENGINE_get_name(const ENGINE *e); -const RSA_METHOD *ENGINE_get_RSA(const ENGINE *e); -const DSA_METHOD *ENGINE_get_DSA(const ENGINE *e); -const ECDH_METHOD *ENGINE_get_ECDH(const ENGINE *e); -const ECDSA_METHOD *ENGINE_get_ECDSA(const ENGINE *e); -const DH_METHOD *ENGINE_get_DH(const ENGINE *e); -const RAND_METHOD *ENGINE_get_RAND(const ENGINE *e); -const STORE_METHOD *ENGINE_get_STORE(const ENGINE *e); -ENGINE_GEN_INT_FUNC_PTR ENGINE_get_destroy_function(const ENGINE *e); -ENGINE_GEN_INT_FUNC_PTR ENGINE_get_init_function(const ENGINE *e); -ENGINE_GEN_INT_FUNC_PTR ENGINE_get_finish_function(const ENGINE *e); -ENGINE_CTRL_FUNC_PTR ENGINE_get_ctrl_function(const ENGINE *e); -ENGINE_LOAD_KEY_PTR ENGINE_get_load_privkey_function(const ENGINE *e); -ENGINE_LOAD_KEY_PTR ENGINE_get_load_pubkey_function(const ENGINE *e); -ENGINE_SSL_CLIENT_CERT_PTR ENGINE_get_ssl_client_cert_function(const ENGINE *e); -ENGINE_CIPHERS_PTR ENGINE_get_ciphers(const ENGINE *e); -ENGINE_DIGESTS_PTR ENGINE_get_digests(const ENGINE *e); -ENGINE_PKEY_METHS_PTR ENGINE_get_pkey_meths(const ENGINE *e); -ENGINE_PKEY_ASN1_METHS_PTR ENGINE_get_pkey_asn1_meths(const ENGINE *e); -const EVP_CIPHER *ENGINE_get_cipher(ENGINE *e, int nid); -const EVP_MD *ENGINE_get_digest(ENGINE *e, int nid); -const EVP_PKEY_METHOD *ENGINE_get_pkey_meth(ENGINE *e, int nid); -const EVP_PKEY_ASN1_METHOD *ENGINE_get_pkey_asn1_meth(ENGINE *e, int nid); -const EVP_PKEY_ASN1_METHOD *ENGINE_get_pkey_asn1_meth_str(ENGINE *e, - const char *str, int len); -const EVP_PKEY_ASN1_METHOD *ENGINE_pkey_asn1_find_str(ENGINE **pe, - const char *str, int len); -const ENGINE_CMD_DEFN *ENGINE_get_cmd_defns(const ENGINE *e); -int ENGINE_get_flags(const ENGINE *e); - -/* FUNCTIONAL functions. These functions deal with ENGINE structures - * that have (or will) be initialised for use. Broadly speaking, the - * structural functions are useful for iterating the list of available - * engine types, creating new engine types, and other "list" operations. - * These functions actually deal with ENGINEs that are to be used. As - * such these functions can fail (if applicable) when particular - * engines are unavailable - eg. if a hardware accelerator is not - * attached or not functioning correctly. Each ENGINE has 2 reference - * counts; structural and functional. Every time a functional reference - * is obtained or released, a corresponding structural reference is - * automatically obtained or released too. */ - -/* Initialise a engine type for use (or up its reference count if it's - * already in use). This will fail if the engine is not currently - * operational and cannot initialise. */ -int ENGINE_init(ENGINE *e); -/* Free a functional reference to a engine type. This does not require - * a corresponding call to ENGINE_free as it also releases a structural - * reference. */ -int ENGINE_finish(ENGINE *e); - -/* The following functions handle keys that are stored in some secondary - * location, handled by the engine. The storage may be on a card or - * whatever. */ -EVP_PKEY *ENGINE_load_private_key(ENGINE *e, const char *key_id, - UI_METHOD *ui_method, void *callback_data); -EVP_PKEY *ENGINE_load_public_key(ENGINE *e, const char *key_id, - UI_METHOD *ui_method, void *callback_data); -int ENGINE_load_ssl_client_cert(ENGINE *e, SSL *s, - STACK_OF(X509_NAME) *ca_dn, X509 **pcert, EVP_PKEY **ppkey, - STACK_OF(X509) **pother, - UI_METHOD *ui_method, void *callback_data); - -/* This returns a pointer for the current ENGINE structure that - * is (by default) performing any RSA operations. The value returned - * is an incremented reference, so it should be free'd (ENGINE_finish) - * before it is discarded. */ -ENGINE *ENGINE_get_default_RSA(void); -/* Same for the other "methods" */ -ENGINE *ENGINE_get_default_DSA(void); -ENGINE *ENGINE_get_default_ECDH(void); -ENGINE *ENGINE_get_default_ECDSA(void); -ENGINE *ENGINE_get_default_DH(void); -ENGINE *ENGINE_get_default_RAND(void); -/* These functions can be used to get a functional reference to perform - * ciphering or digesting corresponding to "nid". */ -ENGINE *ENGINE_get_cipher_engine(int nid); -ENGINE *ENGINE_get_digest_engine(int nid); -ENGINE *ENGINE_get_pkey_meth_engine(int nid); -ENGINE *ENGINE_get_pkey_asn1_meth_engine(int nid); - -/* This sets a new default ENGINE structure for performing RSA - * operations. If the result is non-zero (success) then the ENGINE - * structure will have had its reference count up'd so the caller - * should still free their own reference 'e'. */ -int ENGINE_set_default_RSA(ENGINE *e); -int ENGINE_set_default_string(ENGINE *e, const char *def_list); -/* Same for the other "methods" */ -int ENGINE_set_default_DSA(ENGINE *e); -int ENGINE_set_default_ECDH(ENGINE *e); -int ENGINE_set_default_ECDSA(ENGINE *e); -int ENGINE_set_default_DH(ENGINE *e); -int ENGINE_set_default_RAND(ENGINE *e); -int ENGINE_set_default_ciphers(ENGINE *e); -int ENGINE_set_default_digests(ENGINE *e); -int ENGINE_set_default_pkey_meths(ENGINE *e); -int ENGINE_set_default_pkey_asn1_meths(ENGINE *e); - -/* The combination "set" - the flags are bitwise "OR"d from the - * ENGINE_METHOD_*** defines above. As with the "ENGINE_register_complete()" - * function, this function can result in unnecessary static linkage. If your - * application requires only specific functionality, consider using more - * selective functions. */ -int ENGINE_set_default(ENGINE *e, unsigned int flags); - -void ENGINE_add_conf_module(void); - -/* Deprecated functions ... */ -/* int ENGINE_clear_defaults(void); */ - -/**************************/ -/* DYNAMIC ENGINE SUPPORT */ -/**************************/ - -/* Binary/behaviour compatibility levels */ -#define OSSL_DYNAMIC_VERSION (unsigned long)0x00020000 -/* Binary versions older than this are too old for us (whether we're a loader or - * a loadee) */ -#define OSSL_DYNAMIC_OLDEST (unsigned long)0x00020000 - -/* When compiling an ENGINE entirely as an external shared library, loadable by - * the "dynamic" ENGINE, these types are needed. The 'dynamic_fns' structure - * type provides the calling application's (or library's) error functionality - * and memory management function pointers to the loaded library. These should - * be used/set in the loaded library code so that the loading application's - * 'state' will be used/changed in all operations. The 'static_state' pointer - * allows the loaded library to know if it shares the same static data as the - * calling application (or library), and thus whether these callbacks need to be - * set or not. */ -typedef void *(*dyn_MEM_malloc_cb)(size_t); -typedef void *(*dyn_MEM_realloc_cb)(void *, size_t); -typedef void (*dyn_MEM_free_cb)(void *); -typedef struct st_dynamic_MEM_fns { - dyn_MEM_malloc_cb malloc_cb; - dyn_MEM_realloc_cb realloc_cb; - dyn_MEM_free_cb free_cb; - } dynamic_MEM_fns; -/* FIXME: Perhaps the memory and locking code (crypto.h) should declare and use - * these types so we (and any other dependant code) can simplify a bit?? */ -typedef void (*dyn_lock_locking_cb)(int,int,const char *,int); -typedef int (*dyn_lock_add_lock_cb)(int*,int,int,const char *,int); -typedef struct CRYPTO_dynlock_value *(*dyn_dynlock_create_cb)( - const char *,int); -typedef void (*dyn_dynlock_lock_cb)(int,struct CRYPTO_dynlock_value *, - const char *,int); -typedef void (*dyn_dynlock_destroy_cb)(struct CRYPTO_dynlock_value *, - const char *,int); -typedef struct st_dynamic_LOCK_fns { - dyn_lock_locking_cb lock_locking_cb; - dyn_lock_add_lock_cb lock_add_lock_cb; - dyn_dynlock_create_cb dynlock_create_cb; - dyn_dynlock_lock_cb dynlock_lock_cb; - dyn_dynlock_destroy_cb dynlock_destroy_cb; - } dynamic_LOCK_fns; -/* The top-level structure */ -typedef struct st_dynamic_fns { - void *static_state; - const ERR_FNS *err_fns; - const CRYPTO_EX_DATA_IMPL *ex_data_fns; - dynamic_MEM_fns mem_fns; - dynamic_LOCK_fns lock_fns; - } dynamic_fns; - -/* The version checking function should be of this prototype. NB: The - * ossl_version value passed in is the OSSL_DYNAMIC_VERSION of the loading code. - * If this function returns zero, it indicates a (potential) version - * incompatibility and the loaded library doesn't believe it can proceed. - * Otherwise, the returned value is the (latest) version supported by the - * loading library. The loader may still decide that the loaded code's version - * is unsatisfactory and could veto the load. The function is expected to - * be implemented with the symbol name "v_check", and a default implementation - * can be fully instantiated with IMPLEMENT_DYNAMIC_CHECK_FN(). */ -typedef unsigned long (*dynamic_v_check_fn)(unsigned long ossl_version); -#define IMPLEMENT_DYNAMIC_CHECK_FN() \ - OPENSSL_EXPORT unsigned long v_check(unsigned long v); \ - OPENSSL_EXPORT unsigned long v_check(unsigned long v) { \ - if(v >= OSSL_DYNAMIC_OLDEST) return OSSL_DYNAMIC_VERSION; \ - return 0; } - -/* This function is passed the ENGINE structure to initialise with its own - * function and command settings. It should not adjust the structural or - * functional reference counts. If this function returns zero, (a) the load will - * be aborted, (b) the previous ENGINE state will be memcpy'd back onto the - * structure, and (c) the shared library will be unloaded. So implementations - * should do their own internal cleanup in failure circumstances otherwise they - * could leak. The 'id' parameter, if non-NULL, represents the ENGINE id that - * the loader is looking for. If this is NULL, the shared library can choose to - * return failure or to initialise a 'default' ENGINE. If non-NULL, the shared - * library must initialise only an ENGINE matching the passed 'id'. The function - * is expected to be implemented with the symbol name "bind_engine". A standard - * implementation can be instantiated with IMPLEMENT_DYNAMIC_BIND_FN(fn) where - * the parameter 'fn' is a callback function that populates the ENGINE structure - * and returns an int value (zero for failure). 'fn' should have prototype; - * [static] int fn(ENGINE *e, const char *id); */ -typedef int (*dynamic_bind_engine)(ENGINE *e, const char *id, - const dynamic_fns *fns); -#define IMPLEMENT_DYNAMIC_BIND_FN(fn) \ - OPENSSL_EXPORT \ - int bind_engine(ENGINE *e, const char *id, const dynamic_fns *fns); \ - OPENSSL_EXPORT \ - int bind_engine(ENGINE *e, const char *id, const dynamic_fns *fns) { \ - if(ENGINE_get_static_state() == fns->static_state) goto skip_cbs; \ - if(!CRYPTO_set_mem_functions(fns->mem_fns.malloc_cb, \ - fns->mem_fns.realloc_cb, fns->mem_fns.free_cb)) \ - return 0; \ - CRYPTO_set_locking_callback(fns->lock_fns.lock_locking_cb); \ - CRYPTO_set_add_lock_callback(fns->lock_fns.lock_add_lock_cb); \ - CRYPTO_set_dynlock_create_callback(fns->lock_fns.dynlock_create_cb); \ - CRYPTO_set_dynlock_lock_callback(fns->lock_fns.dynlock_lock_cb); \ - CRYPTO_set_dynlock_destroy_callback(fns->lock_fns.dynlock_destroy_cb); \ - if(!CRYPTO_set_ex_data_implementation(fns->ex_data_fns)) \ - return 0; \ - if(!ERR_set_implementation(fns->err_fns)) return 0; \ - skip_cbs: \ - if(!fn(e,id)) return 0; \ - return 1; } - -/* If the loading application (or library) and the loaded ENGINE library share - * the same static data (eg. they're both dynamically linked to the same - * libcrypto.so) we need a way to avoid trying to set system callbacks - this - * would fail, and for the same reason that it's unnecessary to try. If the - * loaded ENGINE has (or gets from through the loader) its own copy of the - * libcrypto static data, we will need to set the callbacks. The easiest way to - * detect this is to have a function that returns a pointer to some static data - * and let the loading application and loaded ENGINE compare their respective - * values. */ -void *ENGINE_get_static_state(void); - -#if defined(__OpenBSD__) || defined(__FreeBSD__) || defined(HAVE_CRYPTODEV) -void ENGINE_setup_bsd_cryptodev(void); -#endif - -/* BEGIN ERROR CODES */ -/* The following lines are auto generated by the script mkerr.pl. Any changes - * made after this point may be overwritten when the script is next run. - */ -void ERR_load_ENGINE_strings(void); - -/* Error codes for the ENGINE functions. */ - -/* Function codes. */ -#define ENGINE_F_DYNAMIC_CTRL 180 -#define ENGINE_F_DYNAMIC_GET_DATA_CTX 181 -#define ENGINE_F_DYNAMIC_LOAD 182 -#define ENGINE_F_DYNAMIC_SET_DATA_CTX 183 -#define ENGINE_F_ENGINE_ADD 105 -#define ENGINE_F_ENGINE_BY_ID 106 -#define ENGINE_F_ENGINE_CMD_IS_EXECUTABLE 170 -#define ENGINE_F_ENGINE_CTRL 142 -#define ENGINE_F_ENGINE_CTRL_CMD 178 -#define ENGINE_F_ENGINE_CTRL_CMD_STRING 171 -#define ENGINE_F_ENGINE_FINISH 107 -#define ENGINE_F_ENGINE_FREE_UTIL 108 -#define ENGINE_F_ENGINE_GET_CIPHER 185 -#define ENGINE_F_ENGINE_GET_DEFAULT_TYPE 177 -#define ENGINE_F_ENGINE_GET_DIGEST 186 -#define ENGINE_F_ENGINE_GET_NEXT 115 -#define ENGINE_F_ENGINE_GET_PKEY_ASN1_METH 193 -#define ENGINE_F_ENGINE_GET_PKEY_METH 192 -#define ENGINE_F_ENGINE_GET_PREV 116 -#define ENGINE_F_ENGINE_INIT 119 -#define ENGINE_F_ENGINE_LIST_ADD 120 -#define ENGINE_F_ENGINE_LIST_REMOVE 121 -#define ENGINE_F_ENGINE_LOAD_PRIVATE_KEY 150 -#define ENGINE_F_ENGINE_LOAD_PUBLIC_KEY 151 -#define ENGINE_F_ENGINE_LOAD_SSL_CLIENT_CERT 194 -#define ENGINE_F_ENGINE_NEW 122 -#define ENGINE_F_ENGINE_REMOVE 123 -#define ENGINE_F_ENGINE_SET_DEFAULT_STRING 189 -#define ENGINE_F_ENGINE_SET_DEFAULT_TYPE 126 -#define ENGINE_F_ENGINE_SET_ID 129 -#define ENGINE_F_ENGINE_SET_NAME 130 -#define ENGINE_F_ENGINE_TABLE_REGISTER 184 -#define ENGINE_F_ENGINE_UNLOAD_KEY 152 -#define ENGINE_F_ENGINE_UNLOCKED_FINISH 191 -#define ENGINE_F_ENGINE_UP_REF 190 -#define ENGINE_F_INT_CTRL_HELPER 172 -#define ENGINE_F_INT_ENGINE_CONFIGURE 188 -#define ENGINE_F_INT_ENGINE_MODULE_INIT 187 -#define ENGINE_F_LOG_MESSAGE 141 - -/* Reason codes. */ -#define ENGINE_R_ALREADY_LOADED 100 -#define ENGINE_R_ARGUMENT_IS_NOT_A_NUMBER 133 -#define ENGINE_R_CMD_NOT_EXECUTABLE 134 -#define ENGINE_R_COMMAND_TAKES_INPUT 135 -#define ENGINE_R_COMMAND_TAKES_NO_INPUT 136 -#define ENGINE_R_CONFLICTING_ENGINE_ID 103 -#define ENGINE_R_CTRL_COMMAND_NOT_IMPLEMENTED 119 -#define ENGINE_R_DH_NOT_IMPLEMENTED 139 -#define ENGINE_R_DSA_NOT_IMPLEMENTED 140 -#define ENGINE_R_DSO_FAILURE 104 -#define ENGINE_R_DSO_NOT_FOUND 132 -#define ENGINE_R_ENGINES_SECTION_ERROR 148 -#define ENGINE_R_ENGINE_CONFIGURATION_ERROR 102 -#define ENGINE_R_ENGINE_IS_NOT_IN_LIST 105 -#define ENGINE_R_ENGINE_SECTION_ERROR 149 -#define ENGINE_R_FAILED_LOADING_PRIVATE_KEY 128 -#define ENGINE_R_FAILED_LOADING_PUBLIC_KEY 129 -#define ENGINE_R_FINISH_FAILED 106 -#define ENGINE_R_GET_HANDLE_FAILED 107 -#define ENGINE_R_ID_OR_NAME_MISSING 108 -#define ENGINE_R_INIT_FAILED 109 -#define ENGINE_R_INTERNAL_LIST_ERROR 110 -#define ENGINE_R_INVALID_ARGUMENT 143 -#define ENGINE_R_INVALID_CMD_NAME 137 -#define ENGINE_R_INVALID_CMD_NUMBER 138 -#define ENGINE_R_INVALID_INIT_VALUE 151 -#define ENGINE_R_INVALID_STRING 150 -#define ENGINE_R_NOT_INITIALISED 117 -#define ENGINE_R_NOT_LOADED 112 -#define ENGINE_R_NO_CONTROL_FUNCTION 120 -#define ENGINE_R_NO_INDEX 144 -#define ENGINE_R_NO_LOAD_FUNCTION 125 -#define ENGINE_R_NO_REFERENCE 130 -#define ENGINE_R_NO_SUCH_ENGINE 116 -#define ENGINE_R_NO_UNLOAD_FUNCTION 126 -#define ENGINE_R_PROVIDE_PARAMETERS 113 -#define ENGINE_R_RSA_NOT_IMPLEMENTED 141 -#define ENGINE_R_UNIMPLEMENTED_CIPHER 146 -#define ENGINE_R_UNIMPLEMENTED_DIGEST 147 -#define ENGINE_R_UNIMPLEMENTED_PUBLIC_KEY_METHOD 101 -#define ENGINE_R_VERSION_INCOMPATIBILITY 145 - -#ifdef __cplusplus -} -#endif -#endif diff --git a/Pods/OpenSSL-Universal/include-osx/openssl/err.h b/Pods/OpenSSL-Universal/include-osx/openssl/err.h deleted file mode 100644 index 974cc9cc..00000000 --- a/Pods/OpenSSL-Universal/include-osx/openssl/err.h +++ /dev/null @@ -1,386 +0,0 @@ -/* crypto/err/err.h */ -/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) - * All rights reserved. - * - * This package is an SSL implementation written - * by Eric Young (eay@cryptsoft.com). - * The implementation was written so as to conform with Netscapes SSL. - * - * This library is free for commercial and non-commercial use as long as - * the following conditions are aheared to. The following conditions - * apply to all code found in this distribution, be it the RC4, RSA, - * lhash, DES, etc., code; not just the SSL code. The SSL documentation - * included with this distribution is covered by the same copyright terms - * except that the holder is Tim Hudson (tjh@cryptsoft.com). - * - * Copyright remains Eric Young's, and as such any Copyright notices in - * the code are not to be removed. - * If this package is used in a product, Eric Young should be given attribution - * as the author of the parts of the library used. - * This can be in the form of a textual message at program startup or - * in documentation (online or textual) provided with the package. - * - * Redistribution and use in source and binary forms, with or without - * modification, are permitted provided that the following conditions - * are met: - * 1. Redistributions of source code must retain the copyright - * notice, this list of conditions and the following disclaimer. - * 2. Redistributions in binary form must reproduce the above copyright - * notice, this list of conditions and the following disclaimer in the - * documentation and/or other materials provided with the distribution. - * 3. All advertising materials mentioning features or use of this software - * must display the following acknowledgement: - * "This product includes cryptographic software written by - * Eric Young (eay@cryptsoft.com)" - * The word 'cryptographic' can be left out if the rouines from the library - * being used are not cryptographic related :-). - * 4. If you include any Windows specific code (or a derivative thereof) from - * the apps directory (application code) you must include an acknowledgement: - * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" - * - * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND - * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE - * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE - * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE - * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL - * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS - * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) - * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT - * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY - * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF - * SUCH DAMAGE. - * - * The licence and distribution terms for any publically available version or - * derivative of this code cannot be changed. i.e. this code cannot simply be - * copied and put under another distribution licence - * [including the GNU Public Licence.] - */ -/* ==================================================================== - * Copyright (c) 1998-2006 The OpenSSL Project. All rights reserved. - * - * Redistribution and use in source and binary forms, with or without - * modification, are permitted provided that the following conditions - * are met: - * - * 1. Redistributions of source code must retain the above copyright - * notice, this list of conditions and the following disclaimer. - * - * 2. Redistributions in binary form must reproduce the above copyright - * notice, this list of conditions and the following disclaimer in - * the documentation and/or other materials provided with the - * distribution. - * - * 3. All advertising materials mentioning features or use of this - * software must display the following acknowledgment: - * "This product includes software developed by the OpenSSL Project - * for use in the OpenSSL Toolkit. (http://www.openssl.org/)" - * - * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to - * endorse or promote products derived from this software without - * prior written permission. For written permission, please contact - * openssl-core@openssl.org. - * - * 5. Products derived from this software may not be called "OpenSSL" - * nor may "OpenSSL" appear in their names without prior written - * permission of the OpenSSL Project. - * - * 6. Redistributions of any form whatsoever must retain the following - * acknowledgment: - * "This product includes software developed by the OpenSSL Project - * for use in the OpenSSL Toolkit (http://www.openssl.org/)" - * - * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY - * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE - * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR - * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR - * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, - * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT - * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; - * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) - * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, - * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) - * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED - * OF THE POSSIBILITY OF SUCH DAMAGE. - * ==================================================================== - * - * This product includes cryptographic software written by Eric Young - * (eay@cryptsoft.com). This product includes software written by Tim - * Hudson (tjh@cryptsoft.com). - * - */ - -#ifndef HEADER_ERR_H -#define HEADER_ERR_H - -#include - -#ifndef OPENSSL_NO_FP_API -#include -#include -#endif - -#include -#ifndef OPENSSL_NO_BIO -#include -#endif -#ifndef OPENSSL_NO_LHASH -#include -#endif - -#ifdef __cplusplus -extern "C" { -#endif - -#ifndef OPENSSL_NO_ERR -#define ERR_PUT_error(a,b,c,d,e) ERR_put_error(a,b,c,d,e) -#else -#define ERR_PUT_error(a,b,c,d,e) ERR_put_error(a,b,c,NULL,0) -#endif - -#include - -#define ERR_TXT_MALLOCED 0x01 -#define ERR_TXT_STRING 0x02 - -#define ERR_FLAG_MARK 0x01 - -#define ERR_NUM_ERRORS 16 -typedef struct err_state_st - { - CRYPTO_THREADID tid; - int err_flags[ERR_NUM_ERRORS]; - unsigned long err_buffer[ERR_NUM_ERRORS]; - char *err_data[ERR_NUM_ERRORS]; - int err_data_flags[ERR_NUM_ERRORS]; - const char *err_file[ERR_NUM_ERRORS]; - int err_line[ERR_NUM_ERRORS]; - int top,bottom; - } ERR_STATE; - -/* library */ -#define ERR_LIB_NONE 1 -#define ERR_LIB_SYS 2 -#define ERR_LIB_BN 3 -#define ERR_LIB_RSA 4 -#define ERR_LIB_DH 5 -#define ERR_LIB_EVP 6 -#define ERR_LIB_BUF 7 -#define ERR_LIB_OBJ 8 -#define ERR_LIB_PEM 9 -#define ERR_LIB_DSA 10 -#define ERR_LIB_X509 11 -/* #define ERR_LIB_METH 12 */ -#define ERR_LIB_ASN1 13 -#define ERR_LIB_CONF 14 -#define ERR_LIB_CRYPTO 15 -#define ERR_LIB_EC 16 -#define ERR_LIB_SSL 20 -/* #define ERR_LIB_SSL23 21 */ -/* #define ERR_LIB_SSL2 22 */ -/* #define ERR_LIB_SSL3 23 */ -/* #define ERR_LIB_RSAREF 30 */ -/* #define ERR_LIB_PROXY 31 */ -#define ERR_LIB_BIO 32 -#define ERR_LIB_PKCS7 33 -#define ERR_LIB_X509V3 34 -#define ERR_LIB_PKCS12 35 -#define ERR_LIB_RAND 36 -#define ERR_LIB_DSO 37 -#define ERR_LIB_ENGINE 38 -#define ERR_LIB_OCSP 39 -#define ERR_LIB_UI 40 -#define ERR_LIB_COMP 41 -#define ERR_LIB_ECDSA 42 -#define ERR_LIB_ECDH 43 -#define ERR_LIB_STORE 44 -#define ERR_LIB_FIPS 45 -#define ERR_LIB_CMS 46 -#define ERR_LIB_TS 47 -#define ERR_LIB_HMAC 48 -#define ERR_LIB_JPAKE 49 - -#define ERR_LIB_USER 128 - -#define SYSerr(f,r) ERR_PUT_error(ERR_LIB_SYS,(f),(r),__FILE__,__LINE__) -#define BNerr(f,r) ERR_PUT_error(ERR_LIB_BN,(f),(r),__FILE__,__LINE__) -#define RSAerr(f,r) ERR_PUT_error(ERR_LIB_RSA,(f),(r),__FILE__,__LINE__) -#define DHerr(f,r) ERR_PUT_error(ERR_LIB_DH,(f),(r),__FILE__,__LINE__) -#define EVPerr(f,r) ERR_PUT_error(ERR_LIB_EVP,(f),(r),__FILE__,__LINE__) -#define BUFerr(f,r) ERR_PUT_error(ERR_LIB_BUF,(f),(r),__FILE__,__LINE__) -#define OBJerr(f,r) ERR_PUT_error(ERR_LIB_OBJ,(f),(r),__FILE__,__LINE__) -#define PEMerr(f,r) ERR_PUT_error(ERR_LIB_PEM,(f),(r),__FILE__,__LINE__) -#define DSAerr(f,r) ERR_PUT_error(ERR_LIB_DSA,(f),(r),__FILE__,__LINE__) -#define X509err(f,r) ERR_PUT_error(ERR_LIB_X509,(f),(r),__FILE__,__LINE__) -#define ASN1err(f,r) ERR_PUT_error(ERR_LIB_ASN1,(f),(r),__FILE__,__LINE__) -#define CONFerr(f,r) ERR_PUT_error(ERR_LIB_CONF,(f),(r),__FILE__,__LINE__) -#define CRYPTOerr(f,r) ERR_PUT_error(ERR_LIB_CRYPTO,(f),(r),__FILE__,__LINE__) -#define ECerr(f,r) ERR_PUT_error(ERR_LIB_EC,(f),(r),__FILE__,__LINE__) -#define SSLerr(f,r) ERR_PUT_error(ERR_LIB_SSL,(f),(r),__FILE__,__LINE__) -#define BIOerr(f,r) ERR_PUT_error(ERR_LIB_BIO,(f),(r),__FILE__,__LINE__) -#define PKCS7err(f,r) ERR_PUT_error(ERR_LIB_PKCS7,(f),(r),__FILE__,__LINE__) -#define X509V3err(f,r) ERR_PUT_error(ERR_LIB_X509V3,(f),(r),__FILE__,__LINE__) -#define PKCS12err(f,r) ERR_PUT_error(ERR_LIB_PKCS12,(f),(r),__FILE__,__LINE__) -#define RANDerr(f,r) ERR_PUT_error(ERR_LIB_RAND,(f),(r),__FILE__,__LINE__) -#define DSOerr(f,r) ERR_PUT_error(ERR_LIB_DSO,(f),(r),__FILE__,__LINE__) -#define ENGINEerr(f,r) ERR_PUT_error(ERR_LIB_ENGINE,(f),(r),__FILE__,__LINE__) -#define OCSPerr(f,r) ERR_PUT_error(ERR_LIB_OCSP,(f),(r),__FILE__,__LINE__) -#define UIerr(f,r) ERR_PUT_error(ERR_LIB_UI,(f),(r),__FILE__,__LINE__) -#define COMPerr(f,r) ERR_PUT_error(ERR_LIB_COMP,(f),(r),__FILE__,__LINE__) -#define ECDSAerr(f,r) ERR_PUT_error(ERR_LIB_ECDSA,(f),(r),__FILE__,__LINE__) -#define ECDHerr(f,r) ERR_PUT_error(ERR_LIB_ECDH,(f),(r),__FILE__,__LINE__) -#define STOREerr(f,r) ERR_PUT_error(ERR_LIB_STORE,(f),(r),__FILE__,__LINE__) -#define FIPSerr(f,r) ERR_PUT_error(ERR_LIB_FIPS,(f),(r),__FILE__,__LINE__) -#define CMSerr(f,r) ERR_PUT_error(ERR_LIB_CMS,(f),(r),__FILE__,__LINE__) -#define TSerr(f,r) ERR_PUT_error(ERR_LIB_TS,(f),(r),__FILE__,__LINE__) -#define HMACerr(f,r) ERR_PUT_error(ERR_LIB_HMAC,(f),(r),__FILE__,__LINE__) -#define JPAKEerr(f,r) ERR_PUT_error(ERR_LIB_JPAKE,(f),(r),__FILE__,__LINE__) - -/* Borland C seems too stupid to be able to shift and do longs in - * the pre-processor :-( */ -#define ERR_PACK(l,f,r) (((((unsigned long)l)&0xffL)*0x1000000)| \ - ((((unsigned long)f)&0xfffL)*0x1000)| \ - ((((unsigned long)r)&0xfffL))) -#define ERR_GET_LIB(l) (int)((((unsigned long)l)>>24L)&0xffL) -#define ERR_GET_FUNC(l) (int)((((unsigned long)l)>>12L)&0xfffL) -#define ERR_GET_REASON(l) (int)((l)&0xfffL) -#define ERR_FATAL_ERROR(l) (int)((l)&ERR_R_FATAL) - - -/* OS functions */ -#define SYS_F_FOPEN 1 -#define SYS_F_CONNECT 2 -#define SYS_F_GETSERVBYNAME 3 -#define SYS_F_SOCKET 4 -#define SYS_F_IOCTLSOCKET 5 -#define SYS_F_BIND 6 -#define SYS_F_LISTEN 7 -#define SYS_F_ACCEPT 8 -#define SYS_F_WSASTARTUP 9 /* Winsock stuff */ -#define SYS_F_OPENDIR 10 -#define SYS_F_FREAD 11 - - -/* reasons */ -#define ERR_R_SYS_LIB ERR_LIB_SYS /* 2 */ -#define ERR_R_BN_LIB ERR_LIB_BN /* 3 */ -#define ERR_R_RSA_LIB ERR_LIB_RSA /* 4 */ -#define ERR_R_DH_LIB ERR_LIB_DH /* 5 */ -#define ERR_R_EVP_LIB ERR_LIB_EVP /* 6 */ -#define ERR_R_BUF_LIB ERR_LIB_BUF /* 7 */ -#define ERR_R_OBJ_LIB ERR_LIB_OBJ /* 8 */ -#define ERR_R_PEM_LIB ERR_LIB_PEM /* 9 */ -#define ERR_R_DSA_LIB ERR_LIB_DSA /* 10 */ -#define ERR_R_X509_LIB ERR_LIB_X509 /* 11 */ -#define ERR_R_ASN1_LIB ERR_LIB_ASN1 /* 13 */ -#define ERR_R_CONF_LIB ERR_LIB_CONF /* 14 */ -#define ERR_R_CRYPTO_LIB ERR_LIB_CRYPTO /* 15 */ -#define ERR_R_EC_LIB ERR_LIB_EC /* 16 */ -#define ERR_R_SSL_LIB ERR_LIB_SSL /* 20 */ -#define ERR_R_BIO_LIB ERR_LIB_BIO /* 32 */ -#define ERR_R_PKCS7_LIB ERR_LIB_PKCS7 /* 33 */ -#define ERR_R_X509V3_LIB ERR_LIB_X509V3 /* 34 */ -#define ERR_R_PKCS12_LIB ERR_LIB_PKCS12 /* 35 */ -#define ERR_R_RAND_LIB ERR_LIB_RAND /* 36 */ -#define ERR_R_DSO_LIB ERR_LIB_DSO /* 37 */ -#define ERR_R_ENGINE_LIB ERR_LIB_ENGINE /* 38 */ -#define ERR_R_OCSP_LIB ERR_LIB_OCSP /* 39 */ -#define ERR_R_UI_LIB ERR_LIB_UI /* 40 */ -#define ERR_R_COMP_LIB ERR_LIB_COMP /* 41 */ -#define ERR_R_ECDSA_LIB ERR_LIB_ECDSA /* 42 */ -#define ERR_R_ECDH_LIB ERR_LIB_ECDH /* 43 */ -#define ERR_R_STORE_LIB ERR_LIB_STORE /* 44 */ -#define ERR_R_TS_LIB ERR_LIB_TS /* 45 */ - -#define ERR_R_NESTED_ASN1_ERROR 58 -#define ERR_R_BAD_ASN1_OBJECT_HEADER 59 -#define ERR_R_BAD_GET_ASN1_OBJECT_CALL 60 -#define ERR_R_EXPECTING_AN_ASN1_SEQUENCE 61 -#define ERR_R_ASN1_LENGTH_MISMATCH 62 -#define ERR_R_MISSING_ASN1_EOS 63 - -/* fatal error */ -#define ERR_R_FATAL 64 -#define ERR_R_MALLOC_FAILURE (1|ERR_R_FATAL) -#define ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED (2|ERR_R_FATAL) -#define ERR_R_PASSED_NULL_PARAMETER (3|ERR_R_FATAL) -#define ERR_R_INTERNAL_ERROR (4|ERR_R_FATAL) -#define ERR_R_DISABLED (5|ERR_R_FATAL) - -/* 99 is the maximum possible ERR_R_... code, higher values - * are reserved for the individual libraries */ - - -typedef struct ERR_string_data_st - { - unsigned long error; - const char *string; - } ERR_STRING_DATA; - -void ERR_put_error(int lib, int func,int reason,const char *file,int line); -void ERR_set_error_data(char *data,int flags); - -unsigned long ERR_get_error(void); -unsigned long ERR_get_error_line(const char **file,int *line); -unsigned long ERR_get_error_line_data(const char **file,int *line, - const char **data, int *flags); -unsigned long ERR_peek_error(void); -unsigned long ERR_peek_error_line(const char **file,int *line); -unsigned long ERR_peek_error_line_data(const char **file,int *line, - const char **data,int *flags); -unsigned long ERR_peek_last_error(void); -unsigned long ERR_peek_last_error_line(const char **file,int *line); -unsigned long ERR_peek_last_error_line_data(const char **file,int *line, - const char **data,int *flags); -void ERR_clear_error(void ); -char *ERR_error_string(unsigned long e,char *buf); -void ERR_error_string_n(unsigned long e, char *buf, size_t len); -const char *ERR_lib_error_string(unsigned long e); -const char *ERR_func_error_string(unsigned long e); -const char *ERR_reason_error_string(unsigned long e); -void ERR_print_errors_cb(int (*cb)(const char *str, size_t len, void *u), - void *u); -#ifndef OPENSSL_NO_FP_API -void ERR_print_errors_fp(FILE *fp); -#endif -#ifndef OPENSSL_NO_BIO -void ERR_print_errors(BIO *bp); -#endif -void ERR_add_error_data(int num, ...); -void ERR_add_error_vdata(int num, va_list args); -void ERR_load_strings(int lib,ERR_STRING_DATA str[]); -void ERR_unload_strings(int lib,ERR_STRING_DATA str[]); -void ERR_load_ERR_strings(void); -void ERR_load_crypto_strings(void); -void ERR_free_strings(void); - -void ERR_remove_thread_state(const CRYPTO_THREADID *tid); -#ifndef OPENSSL_NO_DEPRECATED -void ERR_remove_state(unsigned long pid); /* if zero we look it up */ -#endif -ERR_STATE *ERR_get_state(void); - -#ifndef OPENSSL_NO_LHASH -LHASH_OF(ERR_STRING_DATA) *ERR_get_string_table(void); -LHASH_OF(ERR_STATE) *ERR_get_err_state_table(void); -void ERR_release_err_state_table(LHASH_OF(ERR_STATE) **hash); -#endif - -int ERR_get_next_error_library(void); - -int ERR_set_mark(void); -int ERR_pop_to_mark(void); - -/* Already defined in ossl_typ.h */ -/* typedef struct st_ERR_FNS ERR_FNS; */ -/* An application can use this function and provide the return value to loaded - * modules that should use the application's ERR state/functionality */ -const ERR_FNS *ERR_get_implementation(void); -/* A loaded module should call this function prior to any ERR operations using - * the application's "ERR_FNS". */ -int ERR_set_implementation(const ERR_FNS *fns); - -#ifdef __cplusplus -} -#endif - -#endif diff --git a/Pods/OpenSSL-Universal/include-osx/openssl/evp.h b/Pods/OpenSSL-Universal/include-osx/openssl/evp.h deleted file mode 100644 index faeb3c24..00000000 --- a/Pods/OpenSSL-Universal/include-osx/openssl/evp.h +++ /dev/null @@ -1,1409 +0,0 @@ -/* crypto/evp/evp.h */ -/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) - * All rights reserved. - * - * This package is an SSL implementation written - * by Eric Young (eay@cryptsoft.com). - * The implementation was written so as to conform with Netscapes SSL. - * - * This library is free for commercial and non-commercial use as long as - * the following conditions are aheared to. The following conditions - * apply to all code found in this distribution, be it the RC4, RSA, - * lhash, DES, etc., code; not just the SSL code. The SSL documentation - * included with this distribution is covered by the same copyright terms - * except that the holder is Tim Hudson (tjh@cryptsoft.com). - * - * Copyright remains Eric Young's, and as such any Copyright notices in - * the code are not to be removed. - * If this package is used in a product, Eric Young should be given attribution - * as the author of the parts of the library used. - * This can be in the form of a textual message at program startup or - * in documentation (online or textual) provided with the package. - * - * Redistribution and use in source and binary forms, with or without - * modification, are permitted provided that the following conditions - * are met: - * 1. Redistributions of source code must retain the copyright - * notice, this list of conditions and the following disclaimer. - * 2. Redistributions in binary form must reproduce the above copyright - * notice, this list of conditions and the following disclaimer in the - * documentation and/or other materials provided with the distribution. - * 3. All advertising materials mentioning features or use of this software - * must display the following acknowledgement: - * "This product includes cryptographic software written by - * Eric Young (eay@cryptsoft.com)" - * The word 'cryptographic' can be left out if the rouines from the library - * being used are not cryptographic related :-). - * 4. If you include any Windows specific code (or a derivative thereof) from - * the apps directory (application code) you must include an acknowledgement: - * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" - * - * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND - * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE - * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE - * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE - * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL - * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS - * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) - * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT - * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY - * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF - * SUCH DAMAGE. - * - * The licence and distribution terms for any publically available version or - * derivative of this code cannot be changed. i.e. this code cannot simply be - * copied and put under another distribution licence - * [including the GNU Public Licence.] - */ - -#ifndef HEADER_ENVELOPE_H -#define HEADER_ENVELOPE_H - -#ifdef OPENSSL_ALGORITHM_DEFINES -# include -#else -# define OPENSSL_ALGORITHM_DEFINES -# include -# undef OPENSSL_ALGORITHM_DEFINES -#endif - -#include - -#include - -#ifndef OPENSSL_NO_BIO -#include -#endif - -/* -#define EVP_RC2_KEY_SIZE 16 -#define EVP_RC4_KEY_SIZE 16 -#define EVP_BLOWFISH_KEY_SIZE 16 -#define EVP_CAST5_KEY_SIZE 16 -#define EVP_RC5_32_12_16_KEY_SIZE 16 -*/ -#define EVP_MAX_MD_SIZE 64 /* longest known is SHA512 */ -#define EVP_MAX_KEY_LENGTH 64 -#define EVP_MAX_IV_LENGTH 16 -#define EVP_MAX_BLOCK_LENGTH 32 - -#define PKCS5_SALT_LEN 8 -/* Default PKCS#5 iteration count */ -#define PKCS5_DEFAULT_ITER 2048 - -#include - -#define EVP_PK_RSA 0x0001 -#define EVP_PK_DSA 0x0002 -#define EVP_PK_DH 0x0004 -#define EVP_PK_EC 0x0008 -#define EVP_PKT_SIGN 0x0010 -#define EVP_PKT_ENC 0x0020 -#define EVP_PKT_EXCH 0x0040 -#define EVP_PKS_RSA 0x0100 -#define EVP_PKS_DSA 0x0200 -#define EVP_PKS_EC 0x0400 -#define EVP_PKT_EXP 0x1000 /* <= 512 bit key */ - -#define EVP_PKEY_NONE NID_undef -#define EVP_PKEY_RSA NID_rsaEncryption -#define EVP_PKEY_RSA2 NID_rsa -#define EVP_PKEY_DSA NID_dsa -#define EVP_PKEY_DSA1 NID_dsa_2 -#define EVP_PKEY_DSA2 NID_dsaWithSHA -#define EVP_PKEY_DSA3 NID_dsaWithSHA1 -#define EVP_PKEY_DSA4 NID_dsaWithSHA1_2 -#define EVP_PKEY_DH NID_dhKeyAgreement -#define EVP_PKEY_EC NID_X9_62_id_ecPublicKey -#define EVP_PKEY_HMAC NID_hmac -#define EVP_PKEY_CMAC NID_cmac - -#ifdef __cplusplus -extern "C" { -#endif - -/* Type needs to be a bit field - * Sub-type needs to be for variations on the method, as in, can it do - * arbitrary encryption.... */ -struct evp_pkey_st - { - int type; - int save_type; - int references; - const EVP_PKEY_ASN1_METHOD *ameth; - ENGINE *engine; - union { - char *ptr; -#ifndef OPENSSL_NO_RSA - struct rsa_st *rsa; /* RSA */ -#endif -#ifndef OPENSSL_NO_DSA - struct dsa_st *dsa; /* DSA */ -#endif -#ifndef OPENSSL_NO_DH - struct dh_st *dh; /* DH */ -#endif -#ifndef OPENSSL_NO_EC - struct ec_key_st *ec; /* ECC */ -#endif - } pkey; - int save_parameters; - STACK_OF(X509_ATTRIBUTE) *attributes; /* [ 0 ] */ - } /* EVP_PKEY */; - -#define EVP_PKEY_MO_SIGN 0x0001 -#define EVP_PKEY_MO_VERIFY 0x0002 -#define EVP_PKEY_MO_ENCRYPT 0x0004 -#define EVP_PKEY_MO_DECRYPT 0x0008 - -#ifndef EVP_MD -struct env_md_st - { - int type; - int pkey_type; - int md_size; - unsigned long flags; - int (*init)(EVP_MD_CTX *ctx); - int (*update)(EVP_MD_CTX *ctx,const void *data,size_t count); - int (*final)(EVP_MD_CTX *ctx,unsigned char *md); - int (*copy)(EVP_MD_CTX *to,const EVP_MD_CTX *from); - int (*cleanup)(EVP_MD_CTX *ctx); - - /* FIXME: prototype these some day */ - int (*sign)(int type, const unsigned char *m, unsigned int m_length, - unsigned char *sigret, unsigned int *siglen, void *key); - int (*verify)(int type, const unsigned char *m, unsigned int m_length, - const unsigned char *sigbuf, unsigned int siglen, - void *key); - int required_pkey_type[5]; /*EVP_PKEY_xxx */ - int block_size; - int ctx_size; /* how big does the ctx->md_data need to be */ - /* control function */ - int (*md_ctrl)(EVP_MD_CTX *ctx, int cmd, int p1, void *p2); - } /* EVP_MD */; - -typedef int evp_sign_method(int type,const unsigned char *m, - unsigned int m_length,unsigned char *sigret, - unsigned int *siglen, void *key); -typedef int evp_verify_method(int type,const unsigned char *m, - unsigned int m_length,const unsigned char *sigbuf, - unsigned int siglen, void *key); - -#define EVP_MD_FLAG_ONESHOT 0x0001 /* digest can only handle a single - * block */ - -#define EVP_MD_FLAG_PKEY_DIGEST 0x0002 /* digest is a "clone" digest used - * which is a copy of an existing - * one for a specific public key type. - * EVP_dss1() etc */ - -/* Digest uses EVP_PKEY_METHOD for signing instead of MD specific signing */ - -#define EVP_MD_FLAG_PKEY_METHOD_SIGNATURE 0x0004 - -/* DigestAlgorithmIdentifier flags... */ - -#define EVP_MD_FLAG_DIGALGID_MASK 0x0018 - -/* NULL or absent parameter accepted. Use NULL */ - -#define EVP_MD_FLAG_DIGALGID_NULL 0x0000 - -/* NULL or absent parameter accepted. Use NULL for PKCS#1 otherwise absent */ - -#define EVP_MD_FLAG_DIGALGID_ABSENT 0x0008 - -/* Custom handling via ctrl */ - -#define EVP_MD_FLAG_DIGALGID_CUSTOM 0x0018 - -#define EVP_MD_FLAG_FIPS 0x0400 /* Note if suitable for use in FIPS mode */ - -/* Digest ctrls */ - -#define EVP_MD_CTRL_DIGALGID 0x1 -#define EVP_MD_CTRL_MICALG 0x2 - -/* Minimum Algorithm specific ctrl value */ - -#define EVP_MD_CTRL_ALG_CTRL 0x1000 - -#define EVP_PKEY_NULL_method NULL,NULL,{0,0,0,0} - -#ifndef OPENSSL_NO_DSA -#define EVP_PKEY_DSA_method (evp_sign_method *)DSA_sign, \ - (evp_verify_method *)DSA_verify, \ - {EVP_PKEY_DSA,EVP_PKEY_DSA2,EVP_PKEY_DSA3, \ - EVP_PKEY_DSA4,0} -#else -#define EVP_PKEY_DSA_method EVP_PKEY_NULL_method -#endif - -#ifndef OPENSSL_NO_ECDSA -#define EVP_PKEY_ECDSA_method (evp_sign_method *)ECDSA_sign, \ - (evp_verify_method *)ECDSA_verify, \ - {EVP_PKEY_EC,0,0,0} -#else -#define EVP_PKEY_ECDSA_method EVP_PKEY_NULL_method -#endif - -#ifndef OPENSSL_NO_RSA -#define EVP_PKEY_RSA_method (evp_sign_method *)RSA_sign, \ - (evp_verify_method *)RSA_verify, \ - {EVP_PKEY_RSA,EVP_PKEY_RSA2,0,0} -#define EVP_PKEY_RSA_ASN1_OCTET_STRING_method \ - (evp_sign_method *)RSA_sign_ASN1_OCTET_STRING, \ - (evp_verify_method *)RSA_verify_ASN1_OCTET_STRING, \ - {EVP_PKEY_RSA,EVP_PKEY_RSA2,0,0} -#else -#define EVP_PKEY_RSA_method EVP_PKEY_NULL_method -#define EVP_PKEY_RSA_ASN1_OCTET_STRING_method EVP_PKEY_NULL_method -#endif - -#endif /* !EVP_MD */ - -struct env_md_ctx_st - { - const EVP_MD *digest; - ENGINE *engine; /* functional reference if 'digest' is ENGINE-provided */ - unsigned long flags; - void *md_data; - /* Public key context for sign/verify */ - EVP_PKEY_CTX *pctx; - /* Update function: usually copied from EVP_MD */ - int (*update)(EVP_MD_CTX *ctx,const void *data,size_t count); - } /* EVP_MD_CTX */; - -/* values for EVP_MD_CTX flags */ - -#define EVP_MD_CTX_FLAG_ONESHOT 0x0001 /* digest update will be called - * once only */ -#define EVP_MD_CTX_FLAG_CLEANED 0x0002 /* context has already been - * cleaned */ -#define EVP_MD_CTX_FLAG_REUSE 0x0004 /* Don't free up ctx->md_data - * in EVP_MD_CTX_cleanup */ -/* FIPS and pad options are ignored in 1.0.0, definitions are here - * so we don't accidentally reuse the values for other purposes. - */ - -#define EVP_MD_CTX_FLAG_NON_FIPS_ALLOW 0x0008 /* Allow use of non FIPS digest - * in FIPS mode */ - -/* The following PAD options are also currently ignored in 1.0.0, digest - * parameters are handled through EVP_DigestSign*() and EVP_DigestVerify*() - * instead. - */ -#define EVP_MD_CTX_FLAG_PAD_MASK 0xF0 /* RSA mode to use */ -#define EVP_MD_CTX_FLAG_PAD_PKCS1 0x00 /* PKCS#1 v1.5 mode */ -#define EVP_MD_CTX_FLAG_PAD_X931 0x10 /* X9.31 mode */ -#define EVP_MD_CTX_FLAG_PAD_PSS 0x20 /* PSS mode */ - -#define EVP_MD_CTX_FLAG_NO_INIT 0x0100 /* Don't initialize md_data */ - -struct evp_cipher_st - { - int nid; - int block_size; - int key_len; /* Default value for variable length ciphers */ - int iv_len; - unsigned long flags; /* Various flags */ - int (*init)(EVP_CIPHER_CTX *ctx, const unsigned char *key, - const unsigned char *iv, int enc); /* init key */ - int (*do_cipher)(EVP_CIPHER_CTX *ctx, unsigned char *out, - const unsigned char *in, size_t inl);/* encrypt/decrypt data */ - int (*cleanup)(EVP_CIPHER_CTX *); /* cleanup ctx */ - int ctx_size; /* how big ctx->cipher_data needs to be */ - int (*set_asn1_parameters)(EVP_CIPHER_CTX *, ASN1_TYPE *); /* Populate a ASN1_TYPE with parameters */ - int (*get_asn1_parameters)(EVP_CIPHER_CTX *, ASN1_TYPE *); /* Get parameters from a ASN1_TYPE */ - int (*ctrl)(EVP_CIPHER_CTX *, int type, int arg, void *ptr); /* Miscellaneous operations */ - void *app_data; /* Application data */ - } /* EVP_CIPHER */; - -/* Values for cipher flags */ - -/* Modes for ciphers */ - -#define EVP_CIPH_STREAM_CIPHER 0x0 -#define EVP_CIPH_ECB_MODE 0x1 -#define EVP_CIPH_CBC_MODE 0x2 -#define EVP_CIPH_CFB_MODE 0x3 -#define EVP_CIPH_OFB_MODE 0x4 -#define EVP_CIPH_CTR_MODE 0x5 -#define EVP_CIPH_GCM_MODE 0x6 -#define EVP_CIPH_CCM_MODE 0x7 -#define EVP_CIPH_XTS_MODE 0x10001 -#define EVP_CIPH_MODE 0xF0007 -/* Set if variable length cipher */ -#define EVP_CIPH_VARIABLE_LENGTH 0x8 -/* Set if the iv handling should be done by the cipher itself */ -#define EVP_CIPH_CUSTOM_IV 0x10 -/* Set if the cipher's init() function should be called if key is NULL */ -#define EVP_CIPH_ALWAYS_CALL_INIT 0x20 -/* Call ctrl() to init cipher parameters */ -#define EVP_CIPH_CTRL_INIT 0x40 -/* Don't use standard key length function */ -#define EVP_CIPH_CUSTOM_KEY_LENGTH 0x80 -/* Don't use standard block padding */ -#define EVP_CIPH_NO_PADDING 0x100 -/* cipher handles random key generation */ -#define EVP_CIPH_RAND_KEY 0x200 -/* cipher has its own additional copying logic */ -#define EVP_CIPH_CUSTOM_COPY 0x400 -/* Allow use default ASN1 get/set iv */ -#define EVP_CIPH_FLAG_DEFAULT_ASN1 0x1000 -/* Buffer length in bits not bytes: CFB1 mode only */ -#define EVP_CIPH_FLAG_LENGTH_BITS 0x2000 -/* Note if suitable for use in FIPS mode */ -#define EVP_CIPH_FLAG_FIPS 0x4000 -/* Allow non FIPS cipher in FIPS mode */ -#define EVP_CIPH_FLAG_NON_FIPS_ALLOW 0x8000 -/* Cipher handles any and all padding logic as well - * as finalisation. - */ -#define EVP_CIPH_FLAG_CUSTOM_CIPHER 0x100000 -#define EVP_CIPH_FLAG_AEAD_CIPHER 0x200000 - -/* ctrl() values */ - -#define EVP_CTRL_INIT 0x0 -#define EVP_CTRL_SET_KEY_LENGTH 0x1 -#define EVP_CTRL_GET_RC2_KEY_BITS 0x2 -#define EVP_CTRL_SET_RC2_KEY_BITS 0x3 -#define EVP_CTRL_GET_RC5_ROUNDS 0x4 -#define EVP_CTRL_SET_RC5_ROUNDS 0x5 -#define EVP_CTRL_RAND_KEY 0x6 -#define EVP_CTRL_PBE_PRF_NID 0x7 -#define EVP_CTRL_COPY 0x8 -#define EVP_CTRL_GCM_SET_IVLEN 0x9 -#define EVP_CTRL_GCM_GET_TAG 0x10 -#define EVP_CTRL_GCM_SET_TAG 0x11 -#define EVP_CTRL_GCM_SET_IV_FIXED 0x12 -#define EVP_CTRL_GCM_IV_GEN 0x13 -#define EVP_CTRL_CCM_SET_IVLEN EVP_CTRL_GCM_SET_IVLEN -#define EVP_CTRL_CCM_GET_TAG EVP_CTRL_GCM_GET_TAG -#define EVP_CTRL_CCM_SET_TAG EVP_CTRL_GCM_SET_TAG -#define EVP_CTRL_CCM_SET_L 0x14 -#define EVP_CTRL_CCM_SET_MSGLEN 0x15 -/* AEAD cipher deduces payload length and returns number of bytes - * required to store MAC and eventual padding. Subsequent call to - * EVP_Cipher even appends/verifies MAC. - */ -#define EVP_CTRL_AEAD_TLS1_AAD 0x16 -/* Used by composite AEAD ciphers, no-op in GCM, CCM... */ -#define EVP_CTRL_AEAD_SET_MAC_KEY 0x17 -/* Set the GCM invocation field, decrypt only */ -#define EVP_CTRL_GCM_SET_IV_INV 0x18 - -/* GCM TLS constants */ -/* Length of fixed part of IV derived from PRF */ -#define EVP_GCM_TLS_FIXED_IV_LEN 4 -/* Length of explicit part of IV part of TLS records */ -#define EVP_GCM_TLS_EXPLICIT_IV_LEN 8 -/* Length of tag for TLS */ -#define EVP_GCM_TLS_TAG_LEN 16 - -typedef struct evp_cipher_info_st - { - const EVP_CIPHER *cipher; - unsigned char iv[EVP_MAX_IV_LENGTH]; - } EVP_CIPHER_INFO; - -struct evp_cipher_ctx_st - { - const EVP_CIPHER *cipher; - ENGINE *engine; /* functional reference if 'cipher' is ENGINE-provided */ - int encrypt; /* encrypt or decrypt */ - int buf_len; /* number we have left */ - - unsigned char oiv[EVP_MAX_IV_LENGTH]; /* original iv */ - unsigned char iv[EVP_MAX_IV_LENGTH]; /* working iv */ - unsigned char buf[EVP_MAX_BLOCK_LENGTH];/* saved partial block */ - int num; /* used by cfb/ofb/ctr mode */ - - void *app_data; /* application stuff */ - int key_len; /* May change for variable length cipher */ - unsigned long flags; /* Various flags */ - void *cipher_data; /* per EVP data */ - int final_used; - int block_mask; - unsigned char final[EVP_MAX_BLOCK_LENGTH];/* possible final block */ - } /* EVP_CIPHER_CTX */; - -typedef struct evp_Encode_Ctx_st - { - int num; /* number saved in a partial encode/decode */ - int length; /* The length is either the output line length - * (in input bytes) or the shortest input line - * length that is ok. Once decoding begins, - * the length is adjusted up each time a longer - * line is decoded */ - unsigned char enc_data[80]; /* data to encode */ - int line_num; /* number read on current line */ - int expect_nl; - } EVP_ENCODE_CTX; - -/* Password based encryption function */ -typedef int (EVP_PBE_KEYGEN)(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, - ASN1_TYPE *param, const EVP_CIPHER *cipher, - const EVP_MD *md, int en_de); - -#ifndef OPENSSL_NO_RSA -#define EVP_PKEY_assign_RSA(pkey,rsa) EVP_PKEY_assign((pkey),EVP_PKEY_RSA,\ - (char *)(rsa)) -#endif - -#ifndef OPENSSL_NO_DSA -#define EVP_PKEY_assign_DSA(pkey,dsa) EVP_PKEY_assign((pkey),EVP_PKEY_DSA,\ - (char *)(dsa)) -#endif - -#ifndef OPENSSL_NO_DH -#define EVP_PKEY_assign_DH(pkey,dh) EVP_PKEY_assign((pkey),EVP_PKEY_DH,\ - (char *)(dh)) -#endif - -#ifndef OPENSSL_NO_EC -#define EVP_PKEY_assign_EC_KEY(pkey,eckey) EVP_PKEY_assign((pkey),EVP_PKEY_EC,\ - (char *)(eckey)) -#endif - -/* Add some extra combinations */ -#define EVP_get_digestbynid(a) EVP_get_digestbyname(OBJ_nid2sn(a)) -#define EVP_get_digestbyobj(a) EVP_get_digestbynid(OBJ_obj2nid(a)) -#define EVP_get_cipherbynid(a) EVP_get_cipherbyname(OBJ_nid2sn(a)) -#define EVP_get_cipherbyobj(a) EVP_get_cipherbynid(OBJ_obj2nid(a)) - -int EVP_MD_type(const EVP_MD *md); -#define EVP_MD_nid(e) EVP_MD_type(e) -#define EVP_MD_name(e) OBJ_nid2sn(EVP_MD_nid(e)) -int EVP_MD_pkey_type(const EVP_MD *md); -int EVP_MD_size(const EVP_MD *md); -int EVP_MD_block_size(const EVP_MD *md); -unsigned long EVP_MD_flags(const EVP_MD *md); - -const EVP_MD *EVP_MD_CTX_md(const EVP_MD_CTX *ctx); -#define EVP_MD_CTX_size(e) EVP_MD_size(EVP_MD_CTX_md(e)) -#define EVP_MD_CTX_block_size(e) EVP_MD_block_size(EVP_MD_CTX_md(e)) -#define EVP_MD_CTX_type(e) EVP_MD_type(EVP_MD_CTX_md(e)) - -int EVP_CIPHER_nid(const EVP_CIPHER *cipher); -#define EVP_CIPHER_name(e) OBJ_nid2sn(EVP_CIPHER_nid(e)) -int EVP_CIPHER_block_size(const EVP_CIPHER *cipher); -int EVP_CIPHER_key_length(const EVP_CIPHER *cipher); -int EVP_CIPHER_iv_length(const EVP_CIPHER *cipher); -unsigned long EVP_CIPHER_flags(const EVP_CIPHER *cipher); -#define EVP_CIPHER_mode(e) (EVP_CIPHER_flags(e) & EVP_CIPH_MODE) - -const EVP_CIPHER * EVP_CIPHER_CTX_cipher(const EVP_CIPHER_CTX *ctx); -int EVP_CIPHER_CTX_nid(const EVP_CIPHER_CTX *ctx); -int EVP_CIPHER_CTX_block_size(const EVP_CIPHER_CTX *ctx); -int EVP_CIPHER_CTX_key_length(const EVP_CIPHER_CTX *ctx); -int EVP_CIPHER_CTX_iv_length(const EVP_CIPHER_CTX *ctx); -int EVP_CIPHER_CTX_copy(EVP_CIPHER_CTX *out, const EVP_CIPHER_CTX *in); -void * EVP_CIPHER_CTX_get_app_data(const EVP_CIPHER_CTX *ctx); -void EVP_CIPHER_CTX_set_app_data(EVP_CIPHER_CTX *ctx, void *data); -#define EVP_CIPHER_CTX_type(c) EVP_CIPHER_type(EVP_CIPHER_CTX_cipher(c)) -unsigned long EVP_CIPHER_CTX_flags(const EVP_CIPHER_CTX *ctx); -#define EVP_CIPHER_CTX_mode(e) (EVP_CIPHER_CTX_flags(e) & EVP_CIPH_MODE) - -#define EVP_ENCODE_LENGTH(l) (((l+2)/3*4)+(l/48+1)*2+80) -#define EVP_DECODE_LENGTH(l) ((l+3)/4*3+80) - -#define EVP_SignInit_ex(a,b,c) EVP_DigestInit_ex(a,b,c) -#define EVP_SignInit(a,b) EVP_DigestInit(a,b) -#define EVP_SignUpdate(a,b,c) EVP_DigestUpdate(a,b,c) -#define EVP_VerifyInit_ex(a,b,c) EVP_DigestInit_ex(a,b,c) -#define EVP_VerifyInit(a,b) EVP_DigestInit(a,b) -#define EVP_VerifyUpdate(a,b,c) EVP_DigestUpdate(a,b,c) -#define EVP_OpenUpdate(a,b,c,d,e) EVP_DecryptUpdate(a,b,c,d,e) -#define EVP_SealUpdate(a,b,c,d,e) EVP_EncryptUpdate(a,b,c,d,e) -#define EVP_DigestSignUpdate(a,b,c) EVP_DigestUpdate(a,b,c) -#define EVP_DigestVerifyUpdate(a,b,c) EVP_DigestUpdate(a,b,c) - -#ifdef CONST_STRICT -void BIO_set_md(BIO *,const EVP_MD *md); -#else -# define BIO_set_md(b,md) BIO_ctrl(b,BIO_C_SET_MD,0,(char *)md) -#endif -#define BIO_get_md(b,mdp) BIO_ctrl(b,BIO_C_GET_MD,0,(char *)mdp) -#define BIO_get_md_ctx(b,mdcp) BIO_ctrl(b,BIO_C_GET_MD_CTX,0,(char *)mdcp) -#define BIO_set_md_ctx(b,mdcp) BIO_ctrl(b,BIO_C_SET_MD_CTX,0,(char *)mdcp) -#define BIO_get_cipher_status(b) BIO_ctrl(b,BIO_C_GET_CIPHER_STATUS,0,NULL) -#define BIO_get_cipher_ctx(b,c_pp) BIO_ctrl(b,BIO_C_GET_CIPHER_CTX,0,(char *)c_pp) - -int EVP_Cipher(EVP_CIPHER_CTX *c, - unsigned char *out, - const unsigned char *in, - unsigned int inl); - -#define EVP_add_cipher_alias(n,alias) \ - OBJ_NAME_add((alias),OBJ_NAME_TYPE_CIPHER_METH|OBJ_NAME_ALIAS,(n)) -#define EVP_add_digest_alias(n,alias) \ - OBJ_NAME_add((alias),OBJ_NAME_TYPE_MD_METH|OBJ_NAME_ALIAS,(n)) -#define EVP_delete_cipher_alias(alias) \ - OBJ_NAME_remove(alias,OBJ_NAME_TYPE_CIPHER_METH|OBJ_NAME_ALIAS); -#define EVP_delete_digest_alias(alias) \ - OBJ_NAME_remove(alias,OBJ_NAME_TYPE_MD_METH|OBJ_NAME_ALIAS); - -void EVP_MD_CTX_init(EVP_MD_CTX *ctx); -int EVP_MD_CTX_cleanup(EVP_MD_CTX *ctx); -EVP_MD_CTX *EVP_MD_CTX_create(void); -void EVP_MD_CTX_destroy(EVP_MD_CTX *ctx); -int EVP_MD_CTX_copy_ex(EVP_MD_CTX *out,const EVP_MD_CTX *in); -void EVP_MD_CTX_set_flags(EVP_MD_CTX *ctx, int flags); -void EVP_MD_CTX_clear_flags(EVP_MD_CTX *ctx, int flags); -int EVP_MD_CTX_test_flags(const EVP_MD_CTX *ctx,int flags); -int EVP_DigestInit_ex(EVP_MD_CTX *ctx, const EVP_MD *type, ENGINE *impl); -int EVP_DigestUpdate(EVP_MD_CTX *ctx,const void *d, - size_t cnt); -int EVP_DigestFinal_ex(EVP_MD_CTX *ctx,unsigned char *md,unsigned int *s); -int EVP_Digest(const void *data, size_t count, - unsigned char *md, unsigned int *size, const EVP_MD *type, ENGINE *impl); - -int EVP_MD_CTX_copy(EVP_MD_CTX *out,const EVP_MD_CTX *in); -int EVP_DigestInit(EVP_MD_CTX *ctx, const EVP_MD *type); -int EVP_DigestFinal(EVP_MD_CTX *ctx,unsigned char *md,unsigned int *s); - -int EVP_read_pw_string(char *buf,int length,const char *prompt,int verify); -int EVP_read_pw_string_min(char *buf,int minlen,int maxlen,const char *prompt,int verify); -void EVP_set_pw_prompt(const char *prompt); -char * EVP_get_pw_prompt(void); - -int EVP_BytesToKey(const EVP_CIPHER *type,const EVP_MD *md, - const unsigned char *salt, const unsigned char *data, - int datal, int count, unsigned char *key,unsigned char *iv); - -void EVP_CIPHER_CTX_set_flags(EVP_CIPHER_CTX *ctx, int flags); -void EVP_CIPHER_CTX_clear_flags(EVP_CIPHER_CTX *ctx, int flags); -int EVP_CIPHER_CTX_test_flags(const EVP_CIPHER_CTX *ctx,int flags); - -int EVP_EncryptInit(EVP_CIPHER_CTX *ctx,const EVP_CIPHER *cipher, - const unsigned char *key, const unsigned char *iv); -int EVP_EncryptInit_ex(EVP_CIPHER_CTX *ctx,const EVP_CIPHER *cipher, ENGINE *impl, - const unsigned char *key, const unsigned char *iv); -int EVP_EncryptUpdate(EVP_CIPHER_CTX *ctx, unsigned char *out, - int *outl, const unsigned char *in, int inl); -int EVP_EncryptFinal_ex(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl); -int EVP_EncryptFinal(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl); - -int EVP_DecryptInit(EVP_CIPHER_CTX *ctx,const EVP_CIPHER *cipher, - const unsigned char *key, const unsigned char *iv); -int EVP_DecryptInit_ex(EVP_CIPHER_CTX *ctx,const EVP_CIPHER *cipher, ENGINE *impl, - const unsigned char *key, const unsigned char *iv); -int EVP_DecryptUpdate(EVP_CIPHER_CTX *ctx, unsigned char *out, - int *outl, const unsigned char *in, int inl); -int EVP_DecryptFinal(EVP_CIPHER_CTX *ctx, unsigned char *outm, int *outl); -int EVP_DecryptFinal_ex(EVP_CIPHER_CTX *ctx, unsigned char *outm, int *outl); - -int EVP_CipherInit(EVP_CIPHER_CTX *ctx,const EVP_CIPHER *cipher, - const unsigned char *key,const unsigned char *iv, - int enc); -int EVP_CipherInit_ex(EVP_CIPHER_CTX *ctx,const EVP_CIPHER *cipher, ENGINE *impl, - const unsigned char *key,const unsigned char *iv, - int enc); -int EVP_CipherUpdate(EVP_CIPHER_CTX *ctx, unsigned char *out, - int *outl, const unsigned char *in, int inl); -int EVP_CipherFinal(EVP_CIPHER_CTX *ctx, unsigned char *outm, int *outl); -int EVP_CipherFinal_ex(EVP_CIPHER_CTX *ctx, unsigned char *outm, int *outl); - -int EVP_SignFinal(EVP_MD_CTX *ctx,unsigned char *md,unsigned int *s, - EVP_PKEY *pkey); - -int EVP_VerifyFinal(EVP_MD_CTX *ctx,const unsigned char *sigbuf, - unsigned int siglen,EVP_PKEY *pkey); - -int EVP_DigestSignInit(EVP_MD_CTX *ctx, EVP_PKEY_CTX **pctx, - const EVP_MD *type, ENGINE *e, EVP_PKEY *pkey); -int EVP_DigestSignFinal(EVP_MD_CTX *ctx, - unsigned char *sigret, size_t *siglen); - -int EVP_DigestVerifyInit(EVP_MD_CTX *ctx, EVP_PKEY_CTX **pctx, - const EVP_MD *type, ENGINE *e, EVP_PKEY *pkey); -int EVP_DigestVerifyFinal(EVP_MD_CTX *ctx, - unsigned char *sig, size_t siglen); - -int EVP_OpenInit(EVP_CIPHER_CTX *ctx,const EVP_CIPHER *type, - const unsigned char *ek, int ekl, const unsigned char *iv, - EVP_PKEY *priv); -int EVP_OpenFinal(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl); - -int EVP_SealInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *type, - unsigned char **ek, int *ekl, unsigned char *iv, - EVP_PKEY **pubk, int npubk); -int EVP_SealFinal(EVP_CIPHER_CTX *ctx,unsigned char *out,int *outl); - -void EVP_EncodeInit(EVP_ENCODE_CTX *ctx); -void EVP_EncodeUpdate(EVP_ENCODE_CTX *ctx,unsigned char *out,int *outl, - const unsigned char *in,int inl); -void EVP_EncodeFinal(EVP_ENCODE_CTX *ctx,unsigned char *out,int *outl); -int EVP_EncodeBlock(unsigned char *t, const unsigned char *f, int n); - -void EVP_DecodeInit(EVP_ENCODE_CTX *ctx); -int EVP_DecodeUpdate(EVP_ENCODE_CTX *ctx,unsigned char *out,int *outl, - const unsigned char *in, int inl); -int EVP_DecodeFinal(EVP_ENCODE_CTX *ctx, unsigned - char *out, int *outl); -int EVP_DecodeBlock(unsigned char *t, const unsigned char *f, int n); - -void EVP_CIPHER_CTX_init(EVP_CIPHER_CTX *a); -int EVP_CIPHER_CTX_cleanup(EVP_CIPHER_CTX *a); -EVP_CIPHER_CTX *EVP_CIPHER_CTX_new(void); -void EVP_CIPHER_CTX_free(EVP_CIPHER_CTX *a); -int EVP_CIPHER_CTX_set_key_length(EVP_CIPHER_CTX *x, int keylen); -int EVP_CIPHER_CTX_set_padding(EVP_CIPHER_CTX *c, int pad); -int EVP_CIPHER_CTX_ctrl(EVP_CIPHER_CTX *ctx, int type, int arg, void *ptr); -int EVP_CIPHER_CTX_rand_key(EVP_CIPHER_CTX *ctx, unsigned char *key); - -#ifndef OPENSSL_NO_BIO -BIO_METHOD *BIO_f_md(void); -BIO_METHOD *BIO_f_base64(void); -BIO_METHOD *BIO_f_cipher(void); -BIO_METHOD *BIO_f_reliable(void); -void BIO_set_cipher(BIO *b,const EVP_CIPHER *c,const unsigned char *k, - const unsigned char *i, int enc); -#endif - -const EVP_MD *EVP_md_null(void); -#ifndef OPENSSL_NO_MD2 -const EVP_MD *EVP_md2(void); -#endif -#ifndef OPENSSL_NO_MD4 -const EVP_MD *EVP_md4(void); -#endif -#ifndef OPENSSL_NO_MD5 -const EVP_MD *EVP_md5(void); -#endif -#ifndef OPENSSL_NO_SHA -const EVP_MD *EVP_sha(void); -const EVP_MD *EVP_sha1(void); -const EVP_MD *EVP_dss(void); -const EVP_MD *EVP_dss1(void); -const EVP_MD *EVP_ecdsa(void); -#endif -#ifndef OPENSSL_NO_SHA256 -const EVP_MD *EVP_sha224(void); -const EVP_MD *EVP_sha256(void); -#endif -#ifndef OPENSSL_NO_SHA512 -const EVP_MD *EVP_sha384(void); -const EVP_MD *EVP_sha512(void); -#endif -#ifndef OPENSSL_NO_MDC2 -const EVP_MD *EVP_mdc2(void); -#endif -#ifndef OPENSSL_NO_RIPEMD -const EVP_MD *EVP_ripemd160(void); -#endif -#ifndef OPENSSL_NO_WHIRLPOOL -const EVP_MD *EVP_whirlpool(void); -#endif -const EVP_CIPHER *EVP_enc_null(void); /* does nothing :-) */ -#ifndef OPENSSL_NO_DES -const EVP_CIPHER *EVP_des_ecb(void); -const EVP_CIPHER *EVP_des_ede(void); -const EVP_CIPHER *EVP_des_ede3(void); -const EVP_CIPHER *EVP_des_ede_ecb(void); -const EVP_CIPHER *EVP_des_ede3_ecb(void); -const EVP_CIPHER *EVP_des_cfb64(void); -# define EVP_des_cfb EVP_des_cfb64 -const EVP_CIPHER *EVP_des_cfb1(void); -const EVP_CIPHER *EVP_des_cfb8(void); -const EVP_CIPHER *EVP_des_ede_cfb64(void); -# define EVP_des_ede_cfb EVP_des_ede_cfb64 -#if 0 -const EVP_CIPHER *EVP_des_ede_cfb1(void); -const EVP_CIPHER *EVP_des_ede_cfb8(void); -#endif -const EVP_CIPHER *EVP_des_ede3_cfb64(void); -# define EVP_des_ede3_cfb EVP_des_ede3_cfb64 -const EVP_CIPHER *EVP_des_ede3_cfb1(void); -const EVP_CIPHER *EVP_des_ede3_cfb8(void); -const EVP_CIPHER *EVP_des_ofb(void); -const EVP_CIPHER *EVP_des_ede_ofb(void); -const EVP_CIPHER *EVP_des_ede3_ofb(void); -const EVP_CIPHER *EVP_des_cbc(void); -const EVP_CIPHER *EVP_des_ede_cbc(void); -const EVP_CIPHER *EVP_des_ede3_cbc(void); -const EVP_CIPHER *EVP_desx_cbc(void); -/* This should now be supported through the dev_crypto ENGINE. But also, why are - * rc4 and md5 declarations made here inside a "NO_DES" precompiler branch? */ -#if 0 -# ifdef OPENSSL_OPENBSD_DEV_CRYPTO -const EVP_CIPHER *EVP_dev_crypto_des_ede3_cbc(void); -const EVP_CIPHER *EVP_dev_crypto_rc4(void); -const EVP_MD *EVP_dev_crypto_md5(void); -# endif -#endif -#endif -#ifndef OPENSSL_NO_RC4 -const EVP_CIPHER *EVP_rc4(void); -const EVP_CIPHER *EVP_rc4_40(void); -#ifndef OPENSSL_NO_MD5 -const EVP_CIPHER *EVP_rc4_hmac_md5(void); -#endif -#endif -#ifndef OPENSSL_NO_IDEA -const EVP_CIPHER *EVP_idea_ecb(void); -const EVP_CIPHER *EVP_idea_cfb64(void); -# define EVP_idea_cfb EVP_idea_cfb64 -const EVP_CIPHER *EVP_idea_ofb(void); -const EVP_CIPHER *EVP_idea_cbc(void); -#endif -#ifndef OPENSSL_NO_RC2 -const EVP_CIPHER *EVP_rc2_ecb(void); -const EVP_CIPHER *EVP_rc2_cbc(void); -const EVP_CIPHER *EVP_rc2_40_cbc(void); -const EVP_CIPHER *EVP_rc2_64_cbc(void); -const EVP_CIPHER *EVP_rc2_cfb64(void); -# define EVP_rc2_cfb EVP_rc2_cfb64 -const EVP_CIPHER *EVP_rc2_ofb(void); -#endif -#ifndef OPENSSL_NO_BF -const EVP_CIPHER *EVP_bf_ecb(void); -const EVP_CIPHER *EVP_bf_cbc(void); -const EVP_CIPHER *EVP_bf_cfb64(void); -# define EVP_bf_cfb EVP_bf_cfb64 -const EVP_CIPHER *EVP_bf_ofb(void); -#endif -#ifndef OPENSSL_NO_CAST -const EVP_CIPHER *EVP_cast5_ecb(void); -const EVP_CIPHER *EVP_cast5_cbc(void); -const EVP_CIPHER *EVP_cast5_cfb64(void); -# define EVP_cast5_cfb EVP_cast5_cfb64 -const EVP_CIPHER *EVP_cast5_ofb(void); -#endif -#ifndef OPENSSL_NO_RC5 -const EVP_CIPHER *EVP_rc5_32_12_16_cbc(void); -const EVP_CIPHER *EVP_rc5_32_12_16_ecb(void); -const EVP_CIPHER *EVP_rc5_32_12_16_cfb64(void); -# define EVP_rc5_32_12_16_cfb EVP_rc5_32_12_16_cfb64 -const EVP_CIPHER *EVP_rc5_32_12_16_ofb(void); -#endif -#ifndef OPENSSL_NO_AES -const EVP_CIPHER *EVP_aes_128_ecb(void); -const EVP_CIPHER *EVP_aes_128_cbc(void); -const EVP_CIPHER *EVP_aes_128_cfb1(void); -const EVP_CIPHER *EVP_aes_128_cfb8(void); -const EVP_CIPHER *EVP_aes_128_cfb128(void); -# define EVP_aes_128_cfb EVP_aes_128_cfb128 -const EVP_CIPHER *EVP_aes_128_ofb(void); -const EVP_CIPHER *EVP_aes_128_ctr(void); -const EVP_CIPHER *EVP_aes_128_ccm(void); -const EVP_CIPHER *EVP_aes_128_gcm(void); -const EVP_CIPHER *EVP_aes_128_xts(void); -const EVP_CIPHER *EVP_aes_192_ecb(void); -const EVP_CIPHER *EVP_aes_192_cbc(void); -const EVP_CIPHER *EVP_aes_192_cfb1(void); -const EVP_CIPHER *EVP_aes_192_cfb8(void); -const EVP_CIPHER *EVP_aes_192_cfb128(void); -# define EVP_aes_192_cfb EVP_aes_192_cfb128 -const EVP_CIPHER *EVP_aes_192_ofb(void); -const EVP_CIPHER *EVP_aes_192_ctr(void); -const EVP_CIPHER *EVP_aes_192_ccm(void); -const EVP_CIPHER *EVP_aes_192_gcm(void); -const EVP_CIPHER *EVP_aes_256_ecb(void); -const EVP_CIPHER *EVP_aes_256_cbc(void); -const EVP_CIPHER *EVP_aes_256_cfb1(void); -const EVP_CIPHER *EVP_aes_256_cfb8(void); -const EVP_CIPHER *EVP_aes_256_cfb128(void); -# define EVP_aes_256_cfb EVP_aes_256_cfb128 -const EVP_CIPHER *EVP_aes_256_ofb(void); -const EVP_CIPHER *EVP_aes_256_ctr(void); -const EVP_CIPHER *EVP_aes_256_ccm(void); -const EVP_CIPHER *EVP_aes_256_gcm(void); -const EVP_CIPHER *EVP_aes_256_xts(void); -#if !defined(OPENSSL_NO_SHA) && !defined(OPENSSL_NO_SHA1) -const EVP_CIPHER *EVP_aes_128_cbc_hmac_sha1(void); -const EVP_CIPHER *EVP_aes_256_cbc_hmac_sha1(void); -#endif -#endif -#ifndef OPENSSL_NO_CAMELLIA -const EVP_CIPHER *EVP_camellia_128_ecb(void); -const EVP_CIPHER *EVP_camellia_128_cbc(void); -const EVP_CIPHER *EVP_camellia_128_cfb1(void); -const EVP_CIPHER *EVP_camellia_128_cfb8(void); -const EVP_CIPHER *EVP_camellia_128_cfb128(void); -# define EVP_camellia_128_cfb EVP_camellia_128_cfb128 -const EVP_CIPHER *EVP_camellia_128_ofb(void); -const EVP_CIPHER *EVP_camellia_192_ecb(void); -const EVP_CIPHER *EVP_camellia_192_cbc(void); -const EVP_CIPHER *EVP_camellia_192_cfb1(void); -const EVP_CIPHER *EVP_camellia_192_cfb8(void); -const EVP_CIPHER *EVP_camellia_192_cfb128(void); -# define EVP_camellia_192_cfb EVP_camellia_192_cfb128 -const EVP_CIPHER *EVP_camellia_192_ofb(void); -const EVP_CIPHER *EVP_camellia_256_ecb(void); -const EVP_CIPHER *EVP_camellia_256_cbc(void); -const EVP_CIPHER *EVP_camellia_256_cfb1(void); -const EVP_CIPHER *EVP_camellia_256_cfb8(void); -const EVP_CIPHER *EVP_camellia_256_cfb128(void); -# define EVP_camellia_256_cfb EVP_camellia_256_cfb128 -const EVP_CIPHER *EVP_camellia_256_ofb(void); -#endif - -#ifndef OPENSSL_NO_SEED -const EVP_CIPHER *EVP_seed_ecb(void); -const EVP_CIPHER *EVP_seed_cbc(void); -const EVP_CIPHER *EVP_seed_cfb128(void); -# define EVP_seed_cfb EVP_seed_cfb128 -const EVP_CIPHER *EVP_seed_ofb(void); -#endif - -void OPENSSL_add_all_algorithms_noconf(void); -void OPENSSL_add_all_algorithms_conf(void); - -#ifdef OPENSSL_LOAD_CONF -#define OpenSSL_add_all_algorithms() \ - OPENSSL_add_all_algorithms_conf() -#else -#define OpenSSL_add_all_algorithms() \ - OPENSSL_add_all_algorithms_noconf() -#endif - -void OpenSSL_add_all_ciphers(void); -void OpenSSL_add_all_digests(void); -#define SSLeay_add_all_algorithms() OpenSSL_add_all_algorithms() -#define SSLeay_add_all_ciphers() OpenSSL_add_all_ciphers() -#define SSLeay_add_all_digests() OpenSSL_add_all_digests() - -int EVP_add_cipher(const EVP_CIPHER *cipher); -int EVP_add_digest(const EVP_MD *digest); - -const EVP_CIPHER *EVP_get_cipherbyname(const char *name); -const EVP_MD *EVP_get_digestbyname(const char *name); -void EVP_cleanup(void); - -void EVP_CIPHER_do_all(void (*fn)(const EVP_CIPHER *ciph, - const char *from, const char *to, void *x), void *arg); -void EVP_CIPHER_do_all_sorted(void (*fn)(const EVP_CIPHER *ciph, - const char *from, const char *to, void *x), void *arg); - -void EVP_MD_do_all(void (*fn)(const EVP_MD *ciph, - const char *from, const char *to, void *x), void *arg); -void EVP_MD_do_all_sorted(void (*fn)(const EVP_MD *ciph, - const char *from, const char *to, void *x), void *arg); - -int EVP_PKEY_decrypt_old(unsigned char *dec_key, - const unsigned char *enc_key,int enc_key_len, - EVP_PKEY *private_key); -int EVP_PKEY_encrypt_old(unsigned char *enc_key, - const unsigned char *key,int key_len, - EVP_PKEY *pub_key); -int EVP_PKEY_type(int type); -int EVP_PKEY_id(const EVP_PKEY *pkey); -int EVP_PKEY_base_id(const EVP_PKEY *pkey); -int EVP_PKEY_bits(EVP_PKEY *pkey); -int EVP_PKEY_size(EVP_PKEY *pkey); -int EVP_PKEY_set_type(EVP_PKEY *pkey,int type); -int EVP_PKEY_set_type_str(EVP_PKEY *pkey, const char *str, int len); -int EVP_PKEY_assign(EVP_PKEY *pkey,int type,void *key); -void * EVP_PKEY_get0(EVP_PKEY *pkey); - -#ifndef OPENSSL_NO_RSA -struct rsa_st; -int EVP_PKEY_set1_RSA(EVP_PKEY *pkey,struct rsa_st *key); -struct rsa_st *EVP_PKEY_get1_RSA(EVP_PKEY *pkey); -#endif -#ifndef OPENSSL_NO_DSA -struct dsa_st; -int EVP_PKEY_set1_DSA(EVP_PKEY *pkey,struct dsa_st *key); -struct dsa_st *EVP_PKEY_get1_DSA(EVP_PKEY *pkey); -#endif -#ifndef OPENSSL_NO_DH -struct dh_st; -int EVP_PKEY_set1_DH(EVP_PKEY *pkey,struct dh_st *key); -struct dh_st *EVP_PKEY_get1_DH(EVP_PKEY *pkey); -#endif -#ifndef OPENSSL_NO_EC -struct ec_key_st; -int EVP_PKEY_set1_EC_KEY(EVP_PKEY *pkey,struct ec_key_st *key); -struct ec_key_st *EVP_PKEY_get1_EC_KEY(EVP_PKEY *pkey); -#endif - -EVP_PKEY * EVP_PKEY_new(void); -void EVP_PKEY_free(EVP_PKEY *pkey); - -EVP_PKEY * d2i_PublicKey(int type,EVP_PKEY **a, const unsigned char **pp, - long length); -int i2d_PublicKey(EVP_PKEY *a, unsigned char **pp); - -EVP_PKEY * d2i_PrivateKey(int type,EVP_PKEY **a, const unsigned char **pp, - long length); -EVP_PKEY * d2i_AutoPrivateKey(EVP_PKEY **a, const unsigned char **pp, - long length); -int i2d_PrivateKey(EVP_PKEY *a, unsigned char **pp); - -int EVP_PKEY_copy_parameters(EVP_PKEY *to, const EVP_PKEY *from); -int EVP_PKEY_missing_parameters(const EVP_PKEY *pkey); -int EVP_PKEY_save_parameters(EVP_PKEY *pkey,int mode); -int EVP_PKEY_cmp_parameters(const EVP_PKEY *a, const EVP_PKEY *b); - -int EVP_PKEY_cmp(const EVP_PKEY *a, const EVP_PKEY *b); - -int EVP_PKEY_print_public(BIO *out, const EVP_PKEY *pkey, - int indent, ASN1_PCTX *pctx); -int EVP_PKEY_print_private(BIO *out, const EVP_PKEY *pkey, - int indent, ASN1_PCTX *pctx); -int EVP_PKEY_print_params(BIO *out, const EVP_PKEY *pkey, - int indent, ASN1_PCTX *pctx); - -int EVP_PKEY_get_default_digest_nid(EVP_PKEY *pkey, int *pnid); - -int EVP_CIPHER_type(const EVP_CIPHER *ctx); - -/* calls methods */ -int EVP_CIPHER_param_to_asn1(EVP_CIPHER_CTX *c, ASN1_TYPE *type); -int EVP_CIPHER_asn1_to_param(EVP_CIPHER_CTX *c, ASN1_TYPE *type); - -/* These are used by EVP_CIPHER methods */ -int EVP_CIPHER_set_asn1_iv(EVP_CIPHER_CTX *c,ASN1_TYPE *type); -int EVP_CIPHER_get_asn1_iv(EVP_CIPHER_CTX *c,ASN1_TYPE *type); - -/* PKCS5 password based encryption */ -int PKCS5_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, - ASN1_TYPE *param, const EVP_CIPHER *cipher, const EVP_MD *md, - int en_de); -int PKCS5_PBKDF2_HMAC_SHA1(const char *pass, int passlen, - const unsigned char *salt, int saltlen, int iter, - int keylen, unsigned char *out); -int PKCS5_PBKDF2_HMAC(const char *pass, int passlen, - const unsigned char *salt, int saltlen, int iter, - const EVP_MD *digest, - int keylen, unsigned char *out); -int PKCS5_v2_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, - ASN1_TYPE *param, const EVP_CIPHER *cipher, const EVP_MD *md, - int en_de); - -void PKCS5_PBE_add(void); - -int EVP_PBE_CipherInit (ASN1_OBJECT *pbe_obj, const char *pass, int passlen, - ASN1_TYPE *param, EVP_CIPHER_CTX *ctx, int en_de); - -/* PBE type */ - -/* Can appear as the outermost AlgorithmIdentifier */ -#define EVP_PBE_TYPE_OUTER 0x0 -/* Is an PRF type OID */ -#define EVP_PBE_TYPE_PRF 0x1 - -int EVP_PBE_alg_add_type(int pbe_type, int pbe_nid, int cipher_nid, int md_nid, - EVP_PBE_KEYGEN *keygen); -int EVP_PBE_alg_add(int nid, const EVP_CIPHER *cipher, const EVP_MD *md, - EVP_PBE_KEYGEN *keygen); -int EVP_PBE_find(int type, int pbe_nid, - int *pcnid, int *pmnid, EVP_PBE_KEYGEN **pkeygen); -void EVP_PBE_cleanup(void); - -#define ASN1_PKEY_ALIAS 0x1 -#define ASN1_PKEY_DYNAMIC 0x2 -#define ASN1_PKEY_SIGPARAM_NULL 0x4 - -#define ASN1_PKEY_CTRL_PKCS7_SIGN 0x1 -#define ASN1_PKEY_CTRL_PKCS7_ENCRYPT 0x2 -#define ASN1_PKEY_CTRL_DEFAULT_MD_NID 0x3 -#define ASN1_PKEY_CTRL_CMS_SIGN 0x5 -#define ASN1_PKEY_CTRL_CMS_ENVELOPE 0x7 - -int EVP_PKEY_asn1_get_count(void); -const EVP_PKEY_ASN1_METHOD *EVP_PKEY_asn1_get0(int idx); -const EVP_PKEY_ASN1_METHOD *EVP_PKEY_asn1_find(ENGINE **pe, int type); -const EVP_PKEY_ASN1_METHOD *EVP_PKEY_asn1_find_str(ENGINE **pe, - const char *str, int len); -int EVP_PKEY_asn1_add0(const EVP_PKEY_ASN1_METHOD *ameth); -int EVP_PKEY_asn1_add_alias(int to, int from); -int EVP_PKEY_asn1_get0_info(int *ppkey_id, int *pkey_base_id, int *ppkey_flags, - const char **pinfo, const char **ppem_str, - const EVP_PKEY_ASN1_METHOD *ameth); - -const EVP_PKEY_ASN1_METHOD* EVP_PKEY_get0_asn1(EVP_PKEY *pkey); -EVP_PKEY_ASN1_METHOD* EVP_PKEY_asn1_new(int id, int flags, - const char *pem_str, const char *info); -void EVP_PKEY_asn1_copy(EVP_PKEY_ASN1_METHOD *dst, - const EVP_PKEY_ASN1_METHOD *src); -void EVP_PKEY_asn1_free(EVP_PKEY_ASN1_METHOD *ameth); -void EVP_PKEY_asn1_set_public(EVP_PKEY_ASN1_METHOD *ameth, - int (*pub_decode)(EVP_PKEY *pk, X509_PUBKEY *pub), - int (*pub_encode)(X509_PUBKEY *pub, const EVP_PKEY *pk), - int (*pub_cmp)(const EVP_PKEY *a, const EVP_PKEY *b), - int (*pub_print)(BIO *out, const EVP_PKEY *pkey, int indent, - ASN1_PCTX *pctx), - int (*pkey_size)(const EVP_PKEY *pk), - int (*pkey_bits)(const EVP_PKEY *pk)); -void EVP_PKEY_asn1_set_private(EVP_PKEY_ASN1_METHOD *ameth, - int (*priv_decode)(EVP_PKEY *pk, PKCS8_PRIV_KEY_INFO *p8inf), - int (*priv_encode)(PKCS8_PRIV_KEY_INFO *p8, const EVP_PKEY *pk), - int (*priv_print)(BIO *out, const EVP_PKEY *pkey, int indent, - ASN1_PCTX *pctx)); -void EVP_PKEY_asn1_set_param(EVP_PKEY_ASN1_METHOD *ameth, - int (*param_decode)(EVP_PKEY *pkey, - const unsigned char **pder, int derlen), - int (*param_encode)(const EVP_PKEY *pkey, unsigned char **pder), - int (*param_missing)(const EVP_PKEY *pk), - int (*param_copy)(EVP_PKEY *to, const EVP_PKEY *from), - int (*param_cmp)(const EVP_PKEY *a, const EVP_PKEY *b), - int (*param_print)(BIO *out, const EVP_PKEY *pkey, int indent, - ASN1_PCTX *pctx)); - -void EVP_PKEY_asn1_set_free(EVP_PKEY_ASN1_METHOD *ameth, - void (*pkey_free)(EVP_PKEY *pkey)); -void EVP_PKEY_asn1_set_ctrl(EVP_PKEY_ASN1_METHOD *ameth, - int (*pkey_ctrl)(EVP_PKEY *pkey, int op, - long arg1, void *arg2)); - - -#define EVP_PKEY_OP_UNDEFINED 0 -#define EVP_PKEY_OP_PARAMGEN (1<<1) -#define EVP_PKEY_OP_KEYGEN (1<<2) -#define EVP_PKEY_OP_SIGN (1<<3) -#define EVP_PKEY_OP_VERIFY (1<<4) -#define EVP_PKEY_OP_VERIFYRECOVER (1<<5) -#define EVP_PKEY_OP_SIGNCTX (1<<6) -#define EVP_PKEY_OP_VERIFYCTX (1<<7) -#define EVP_PKEY_OP_ENCRYPT (1<<8) -#define EVP_PKEY_OP_DECRYPT (1<<9) -#define EVP_PKEY_OP_DERIVE (1<<10) - -#define EVP_PKEY_OP_TYPE_SIG \ - (EVP_PKEY_OP_SIGN | EVP_PKEY_OP_VERIFY | EVP_PKEY_OP_VERIFYRECOVER \ - | EVP_PKEY_OP_SIGNCTX | EVP_PKEY_OP_VERIFYCTX) - -#define EVP_PKEY_OP_TYPE_CRYPT \ - (EVP_PKEY_OP_ENCRYPT | EVP_PKEY_OP_DECRYPT) - -#define EVP_PKEY_OP_TYPE_NOGEN \ - (EVP_PKEY_OP_SIG | EVP_PKEY_OP_CRYPT | EVP_PKEY_OP_DERIVE) - -#define EVP_PKEY_OP_TYPE_GEN \ - (EVP_PKEY_OP_PARAMGEN | EVP_PKEY_OP_KEYGEN) - -#define EVP_PKEY_CTX_set_signature_md(ctx, md) \ - EVP_PKEY_CTX_ctrl(ctx, -1, EVP_PKEY_OP_TYPE_SIG, \ - EVP_PKEY_CTRL_MD, 0, (void *)md) - -#define EVP_PKEY_CTRL_MD 1 -#define EVP_PKEY_CTRL_PEER_KEY 2 - -#define EVP_PKEY_CTRL_PKCS7_ENCRYPT 3 -#define EVP_PKEY_CTRL_PKCS7_DECRYPT 4 - -#define EVP_PKEY_CTRL_PKCS7_SIGN 5 - -#define EVP_PKEY_CTRL_SET_MAC_KEY 6 - -#define EVP_PKEY_CTRL_DIGESTINIT 7 - -/* Used by GOST key encryption in TLS */ -#define EVP_PKEY_CTRL_SET_IV 8 - -#define EVP_PKEY_CTRL_CMS_ENCRYPT 9 -#define EVP_PKEY_CTRL_CMS_DECRYPT 10 -#define EVP_PKEY_CTRL_CMS_SIGN 11 - -#define EVP_PKEY_CTRL_CIPHER 12 - -#define EVP_PKEY_ALG_CTRL 0x1000 - - -#define EVP_PKEY_FLAG_AUTOARGLEN 2 -/* Method handles all operations: don't assume any digest related - * defaults. - */ -#define EVP_PKEY_FLAG_SIGCTX_CUSTOM 4 - -const EVP_PKEY_METHOD *EVP_PKEY_meth_find(int type); -EVP_PKEY_METHOD* EVP_PKEY_meth_new(int id, int flags); -void EVP_PKEY_meth_get0_info(int *ppkey_id, int *pflags, - const EVP_PKEY_METHOD *meth); -void EVP_PKEY_meth_copy(EVP_PKEY_METHOD *dst, const EVP_PKEY_METHOD *src); -void EVP_PKEY_meth_free(EVP_PKEY_METHOD *pmeth); -int EVP_PKEY_meth_add0(const EVP_PKEY_METHOD *pmeth); - -EVP_PKEY_CTX *EVP_PKEY_CTX_new(EVP_PKEY *pkey, ENGINE *e); -EVP_PKEY_CTX *EVP_PKEY_CTX_new_id(int id, ENGINE *e); -EVP_PKEY_CTX *EVP_PKEY_CTX_dup(EVP_PKEY_CTX *ctx); -void EVP_PKEY_CTX_free(EVP_PKEY_CTX *ctx); - -int EVP_PKEY_CTX_ctrl(EVP_PKEY_CTX *ctx, int keytype, int optype, - int cmd, int p1, void *p2); -int EVP_PKEY_CTX_ctrl_str(EVP_PKEY_CTX *ctx, const char *type, - const char *value); - -int EVP_PKEY_CTX_get_operation(EVP_PKEY_CTX *ctx); -void EVP_PKEY_CTX_set0_keygen_info(EVP_PKEY_CTX *ctx, int *dat, int datlen); - -EVP_PKEY *EVP_PKEY_new_mac_key(int type, ENGINE *e, - const unsigned char *key, int keylen); - -void EVP_PKEY_CTX_set_data(EVP_PKEY_CTX *ctx, void *data); -void *EVP_PKEY_CTX_get_data(EVP_PKEY_CTX *ctx); -EVP_PKEY *EVP_PKEY_CTX_get0_pkey(EVP_PKEY_CTX *ctx); - -EVP_PKEY *EVP_PKEY_CTX_get0_peerkey(EVP_PKEY_CTX *ctx); - -void EVP_PKEY_CTX_set_app_data(EVP_PKEY_CTX *ctx, void *data); -void *EVP_PKEY_CTX_get_app_data(EVP_PKEY_CTX *ctx); - -int EVP_PKEY_sign_init(EVP_PKEY_CTX *ctx); -int EVP_PKEY_sign(EVP_PKEY_CTX *ctx, - unsigned char *sig, size_t *siglen, - const unsigned char *tbs, size_t tbslen); -int EVP_PKEY_verify_init(EVP_PKEY_CTX *ctx); -int EVP_PKEY_verify(EVP_PKEY_CTX *ctx, - const unsigned char *sig, size_t siglen, - const unsigned char *tbs, size_t tbslen); -int EVP_PKEY_verify_recover_init(EVP_PKEY_CTX *ctx); -int EVP_PKEY_verify_recover(EVP_PKEY_CTX *ctx, - unsigned char *rout, size_t *routlen, - const unsigned char *sig, size_t siglen); -int EVP_PKEY_encrypt_init(EVP_PKEY_CTX *ctx); -int EVP_PKEY_encrypt(EVP_PKEY_CTX *ctx, - unsigned char *out, size_t *outlen, - const unsigned char *in, size_t inlen); -int EVP_PKEY_decrypt_init(EVP_PKEY_CTX *ctx); -int EVP_PKEY_decrypt(EVP_PKEY_CTX *ctx, - unsigned char *out, size_t *outlen, - const unsigned char *in, size_t inlen); - -int EVP_PKEY_derive_init(EVP_PKEY_CTX *ctx); -int EVP_PKEY_derive_set_peer(EVP_PKEY_CTX *ctx, EVP_PKEY *peer); -int EVP_PKEY_derive(EVP_PKEY_CTX *ctx, unsigned char *key, size_t *keylen); - -typedef int EVP_PKEY_gen_cb(EVP_PKEY_CTX *ctx); - -int EVP_PKEY_paramgen_init(EVP_PKEY_CTX *ctx); -int EVP_PKEY_paramgen(EVP_PKEY_CTX *ctx, EVP_PKEY **ppkey); -int EVP_PKEY_keygen_init(EVP_PKEY_CTX *ctx); -int EVP_PKEY_keygen(EVP_PKEY_CTX *ctx, EVP_PKEY **ppkey); - -void EVP_PKEY_CTX_set_cb(EVP_PKEY_CTX *ctx, EVP_PKEY_gen_cb *cb); -EVP_PKEY_gen_cb *EVP_PKEY_CTX_get_cb(EVP_PKEY_CTX *ctx); - -int EVP_PKEY_CTX_get_keygen_info(EVP_PKEY_CTX *ctx, int idx); - -void EVP_PKEY_meth_set_init(EVP_PKEY_METHOD *pmeth, - int (*init)(EVP_PKEY_CTX *ctx)); - -void EVP_PKEY_meth_set_copy(EVP_PKEY_METHOD *pmeth, - int (*copy)(EVP_PKEY_CTX *dst, EVP_PKEY_CTX *src)); - -void EVP_PKEY_meth_set_cleanup(EVP_PKEY_METHOD *pmeth, - void (*cleanup)(EVP_PKEY_CTX *ctx)); - -void EVP_PKEY_meth_set_paramgen(EVP_PKEY_METHOD *pmeth, - int (*paramgen_init)(EVP_PKEY_CTX *ctx), - int (*paramgen)(EVP_PKEY_CTX *ctx, EVP_PKEY *pkey)); - -void EVP_PKEY_meth_set_keygen(EVP_PKEY_METHOD *pmeth, - int (*keygen_init)(EVP_PKEY_CTX *ctx), - int (*keygen)(EVP_PKEY_CTX *ctx, EVP_PKEY *pkey)); - -void EVP_PKEY_meth_set_sign(EVP_PKEY_METHOD *pmeth, - int (*sign_init)(EVP_PKEY_CTX *ctx), - int (*sign)(EVP_PKEY_CTX *ctx, unsigned char *sig, size_t *siglen, - const unsigned char *tbs, size_t tbslen)); - -void EVP_PKEY_meth_set_verify(EVP_PKEY_METHOD *pmeth, - int (*verify_init)(EVP_PKEY_CTX *ctx), - int (*verify)(EVP_PKEY_CTX *ctx, const unsigned char *sig, size_t siglen, - const unsigned char *tbs, size_t tbslen)); - -void EVP_PKEY_meth_set_verify_recover(EVP_PKEY_METHOD *pmeth, - int (*verify_recover_init)(EVP_PKEY_CTX *ctx), - int (*verify_recover)(EVP_PKEY_CTX *ctx, - unsigned char *sig, size_t *siglen, - const unsigned char *tbs, size_t tbslen)); - -void EVP_PKEY_meth_set_signctx(EVP_PKEY_METHOD *pmeth, - int (*signctx_init)(EVP_PKEY_CTX *ctx, EVP_MD_CTX *mctx), - int (*signctx)(EVP_PKEY_CTX *ctx, unsigned char *sig, size_t *siglen, - EVP_MD_CTX *mctx)); - -void EVP_PKEY_meth_set_verifyctx(EVP_PKEY_METHOD *pmeth, - int (*verifyctx_init)(EVP_PKEY_CTX *ctx, EVP_MD_CTX *mctx), - int (*verifyctx)(EVP_PKEY_CTX *ctx, const unsigned char *sig,int siglen, - EVP_MD_CTX *mctx)); - -void EVP_PKEY_meth_set_encrypt(EVP_PKEY_METHOD *pmeth, - int (*encrypt_init)(EVP_PKEY_CTX *ctx), - int (*encryptfn)(EVP_PKEY_CTX *ctx, unsigned char *out, size_t *outlen, - const unsigned char *in, size_t inlen)); - -void EVP_PKEY_meth_set_decrypt(EVP_PKEY_METHOD *pmeth, - int (*decrypt_init)(EVP_PKEY_CTX *ctx), - int (*decrypt)(EVP_PKEY_CTX *ctx, unsigned char *out, size_t *outlen, - const unsigned char *in, size_t inlen)); - -void EVP_PKEY_meth_set_derive(EVP_PKEY_METHOD *pmeth, - int (*derive_init)(EVP_PKEY_CTX *ctx), - int (*derive)(EVP_PKEY_CTX *ctx, unsigned char *key, size_t *keylen)); - -void EVP_PKEY_meth_set_ctrl(EVP_PKEY_METHOD *pmeth, - int (*ctrl)(EVP_PKEY_CTX *ctx, int type, int p1, void *p2), - int (*ctrl_str)(EVP_PKEY_CTX *ctx, - const char *type, const char *value)); - -void EVP_add_alg_module(void); - -/* BEGIN ERROR CODES */ -/* The following lines are auto generated by the script mkerr.pl. Any changes - * made after this point may be overwritten when the script is next run. - */ -void ERR_load_EVP_strings(void); - -/* Error codes for the EVP functions. */ - -/* Function codes. */ -#define EVP_F_AESNI_INIT_KEY 165 -#define EVP_F_AESNI_XTS_CIPHER 176 -#define EVP_F_AES_INIT_KEY 133 -#define EVP_F_AES_XTS 172 -#define EVP_F_AES_XTS_CIPHER 175 -#define EVP_F_ALG_MODULE_INIT 177 -#define EVP_F_CAMELLIA_INIT_KEY 159 -#define EVP_F_CMAC_INIT 173 -#define EVP_F_D2I_PKEY 100 -#define EVP_F_DO_SIGVER_INIT 161 -#define EVP_F_DSAPKEY2PKCS8 134 -#define EVP_F_DSA_PKEY2PKCS8 135 -#define EVP_F_ECDSA_PKEY2PKCS8 129 -#define EVP_F_ECKEY_PKEY2PKCS8 132 -#define EVP_F_EVP_CIPHERINIT_EX 123 -#define EVP_F_EVP_CIPHER_CTX_COPY 163 -#define EVP_F_EVP_CIPHER_CTX_CTRL 124 -#define EVP_F_EVP_CIPHER_CTX_SET_KEY_LENGTH 122 -#define EVP_F_EVP_DECRYPTFINAL_EX 101 -#define EVP_F_EVP_DIGESTINIT_EX 128 -#define EVP_F_EVP_ENCRYPTFINAL_EX 127 -#define EVP_F_EVP_MD_CTX_COPY_EX 110 -#define EVP_F_EVP_MD_SIZE 162 -#define EVP_F_EVP_OPENINIT 102 -#define EVP_F_EVP_PBE_ALG_ADD 115 -#define EVP_F_EVP_PBE_ALG_ADD_TYPE 160 -#define EVP_F_EVP_PBE_CIPHERINIT 116 -#define EVP_F_EVP_PKCS82PKEY 111 -#define EVP_F_EVP_PKCS82PKEY_BROKEN 136 -#define EVP_F_EVP_PKEY2PKCS8_BROKEN 113 -#define EVP_F_EVP_PKEY_COPY_PARAMETERS 103 -#define EVP_F_EVP_PKEY_CTX_CTRL 137 -#define EVP_F_EVP_PKEY_CTX_CTRL_STR 150 -#define EVP_F_EVP_PKEY_CTX_DUP 156 -#define EVP_F_EVP_PKEY_DECRYPT 104 -#define EVP_F_EVP_PKEY_DECRYPT_INIT 138 -#define EVP_F_EVP_PKEY_DECRYPT_OLD 151 -#define EVP_F_EVP_PKEY_DERIVE 153 -#define EVP_F_EVP_PKEY_DERIVE_INIT 154 -#define EVP_F_EVP_PKEY_DERIVE_SET_PEER 155 -#define EVP_F_EVP_PKEY_ENCRYPT 105 -#define EVP_F_EVP_PKEY_ENCRYPT_INIT 139 -#define EVP_F_EVP_PKEY_ENCRYPT_OLD 152 -#define EVP_F_EVP_PKEY_GET1_DH 119 -#define EVP_F_EVP_PKEY_GET1_DSA 120 -#define EVP_F_EVP_PKEY_GET1_ECDSA 130 -#define EVP_F_EVP_PKEY_GET1_EC_KEY 131 -#define EVP_F_EVP_PKEY_GET1_RSA 121 -#define EVP_F_EVP_PKEY_KEYGEN 146 -#define EVP_F_EVP_PKEY_KEYGEN_INIT 147 -#define EVP_F_EVP_PKEY_NEW 106 -#define EVP_F_EVP_PKEY_PARAMGEN 148 -#define EVP_F_EVP_PKEY_PARAMGEN_INIT 149 -#define EVP_F_EVP_PKEY_SIGN 140 -#define EVP_F_EVP_PKEY_SIGN_INIT 141 -#define EVP_F_EVP_PKEY_VERIFY 142 -#define EVP_F_EVP_PKEY_VERIFY_INIT 143 -#define EVP_F_EVP_PKEY_VERIFY_RECOVER 144 -#define EVP_F_EVP_PKEY_VERIFY_RECOVER_INIT 145 -#define EVP_F_EVP_RIJNDAEL 126 -#define EVP_F_EVP_SIGNFINAL 107 -#define EVP_F_EVP_VERIFYFINAL 108 -#define EVP_F_FIPS_CIPHERINIT 166 -#define EVP_F_FIPS_CIPHER_CTX_COPY 170 -#define EVP_F_FIPS_CIPHER_CTX_CTRL 167 -#define EVP_F_FIPS_CIPHER_CTX_SET_KEY_LENGTH 171 -#define EVP_F_FIPS_DIGESTINIT 168 -#define EVP_F_FIPS_MD_CTX_COPY 169 -#define EVP_F_HMAC_INIT_EX 174 -#define EVP_F_INT_CTX_NEW 157 -#define EVP_F_PKCS5_PBE_KEYIVGEN 117 -#define EVP_F_PKCS5_V2_PBE_KEYIVGEN 118 -#define EVP_F_PKCS5_V2_PBKDF2_KEYIVGEN 164 -#define EVP_F_PKCS8_SET_BROKEN 112 -#define EVP_F_PKEY_SET_TYPE 158 -#define EVP_F_RC2_MAGIC_TO_METH 109 -#define EVP_F_RC5_CTRL 125 - -/* Reason codes. */ -#define EVP_R_AES_IV_SETUP_FAILED 162 -#define EVP_R_AES_KEY_SETUP_FAILED 143 -#define EVP_R_ASN1_LIB 140 -#define EVP_R_BAD_BLOCK_LENGTH 136 -#define EVP_R_BAD_DECRYPT 100 -#define EVP_R_BAD_KEY_LENGTH 137 -#define EVP_R_BN_DECODE_ERROR 112 -#define EVP_R_BN_PUBKEY_ERROR 113 -#define EVP_R_BUFFER_TOO_SMALL 155 -#define EVP_R_CAMELLIA_KEY_SETUP_FAILED 157 -#define EVP_R_CIPHER_PARAMETER_ERROR 122 -#define EVP_R_COMMAND_NOT_SUPPORTED 147 -#define EVP_R_CTRL_NOT_IMPLEMENTED 132 -#define EVP_R_CTRL_OPERATION_NOT_IMPLEMENTED 133 -#define EVP_R_DATA_NOT_MULTIPLE_OF_BLOCK_LENGTH 138 -#define EVP_R_DECODE_ERROR 114 -#define EVP_R_DIFFERENT_KEY_TYPES 101 -#define EVP_R_DIFFERENT_PARAMETERS 153 -#define EVP_R_DISABLED_FOR_FIPS 163 -#define EVP_R_ENCODE_ERROR 115 -#define EVP_R_ERROR_LOADING_SECTION 165 -#define EVP_R_ERROR_SETTING_FIPS_MODE 166 -#define EVP_R_EVP_PBE_CIPHERINIT_ERROR 119 -#define EVP_R_EXPECTING_AN_RSA_KEY 127 -#define EVP_R_EXPECTING_A_DH_KEY 128 -#define EVP_R_EXPECTING_A_DSA_KEY 129 -#define EVP_R_EXPECTING_A_ECDSA_KEY 141 -#define EVP_R_EXPECTING_A_EC_KEY 142 -#define EVP_R_FIPS_MODE_NOT_SUPPORTED 167 -#define EVP_R_INITIALIZATION_ERROR 134 -#define EVP_R_INPUT_NOT_INITIALIZED 111 -#define EVP_R_INVALID_DIGEST 152 -#define EVP_R_INVALID_FIPS_MODE 168 -#define EVP_R_INVALID_KEY_LENGTH 130 -#define EVP_R_INVALID_OPERATION 148 -#define EVP_R_IV_TOO_LARGE 102 -#define EVP_R_KEYGEN_FAILURE 120 -#define EVP_R_MESSAGE_DIGEST_IS_NULL 159 -#define EVP_R_METHOD_NOT_SUPPORTED 144 -#define EVP_R_MISSING_PARAMETERS 103 -#define EVP_R_NO_CIPHER_SET 131 -#define EVP_R_NO_DEFAULT_DIGEST 158 -#define EVP_R_NO_DIGEST_SET 139 -#define EVP_R_NO_DSA_PARAMETERS 116 -#define EVP_R_NO_KEY_SET 154 -#define EVP_R_NO_OPERATION_SET 149 -#define EVP_R_NO_SIGN_FUNCTION_CONFIGURED 104 -#define EVP_R_NO_VERIFY_FUNCTION_CONFIGURED 105 -#define EVP_R_OPERATION_NOT_SUPPORTED_FOR_THIS_KEYTYPE 150 -#define EVP_R_OPERATON_NOT_INITIALIZED 151 -#define EVP_R_PKCS8_UNKNOWN_BROKEN_TYPE 117 -#define EVP_R_PRIVATE_KEY_DECODE_ERROR 145 -#define EVP_R_PRIVATE_KEY_ENCODE_ERROR 146 -#define EVP_R_PUBLIC_KEY_NOT_RSA 106 -#define EVP_R_TOO_LARGE 164 -#define EVP_R_UNKNOWN_CIPHER 160 -#define EVP_R_UNKNOWN_DIGEST 161 -#define EVP_R_UNKNOWN_OPTION 169 -#define EVP_R_UNKNOWN_PBE_ALGORITHM 121 -#define EVP_R_UNSUPORTED_NUMBER_OF_ROUNDS 135 -#define EVP_R_UNSUPPORTED_ALGORITHM 156 -#define EVP_R_UNSUPPORTED_CIPHER 107 -#define EVP_R_UNSUPPORTED_KEYLENGTH 123 -#define EVP_R_UNSUPPORTED_KEY_DERIVATION_FUNCTION 124 -#define EVP_R_UNSUPPORTED_KEY_SIZE 108 -#define EVP_R_UNSUPPORTED_PRF 125 -#define EVP_R_UNSUPPORTED_PRIVATE_KEY_ALGORITHM 118 -#define EVP_R_UNSUPPORTED_SALT_TYPE 126 -#define EVP_R_WRONG_FINAL_BLOCK_LENGTH 109 -#define EVP_R_WRONG_PUBLIC_KEY_TYPE 110 - -#ifdef __cplusplus -} -#endif -#endif diff --git a/Pods/OpenSSL-Universal/include-osx/openssl/hmac.h b/Pods/OpenSSL-Universal/include-osx/openssl/hmac.h deleted file mode 100644 index 1be00221..00000000 --- a/Pods/OpenSSL-Universal/include-osx/openssl/hmac.h +++ /dev/null @@ -1,110 +0,0 @@ -/* crypto/hmac/hmac.h */ -/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) - * All rights reserved. - * - * This package is an SSL implementation written - * by Eric Young (eay@cryptsoft.com). - * The implementation was written so as to conform with Netscapes SSL. - * - * This library is free for commercial and non-commercial use as long as - * the following conditions are aheared to. The following conditions - * apply to all code found in this distribution, be it the RC4, RSA, - * lhash, DES, etc., code; not just the SSL code. The SSL documentation - * included with this distribution is covered by the same copyright terms - * except that the holder is Tim Hudson (tjh@cryptsoft.com). - * - * Copyright remains Eric Young's, and as such any Copyright notices in - * the code are not to be removed. - * If this package is used in a product, Eric Young should be given attribution - * as the author of the parts of the library used. - * This can be in the form of a textual message at program startup or - * in documentation (online or textual) provided with the package. - * - * Redistribution and use in source and binary forms, with or without - * modification, are permitted provided that the following conditions - * are met: - * 1. Redistributions of source code must retain the copyright - * notice, this list of conditions and the following disclaimer. - * 2. Redistributions in binary form must reproduce the above copyright - * notice, this list of conditions and the following disclaimer in the - * documentation and/or other materials provided with the distribution. - * 3. All advertising materials mentioning features or use of this software - * must display the following acknowledgement: - * "This product includes cryptographic software written by - * Eric Young (eay@cryptsoft.com)" - * The word 'cryptographic' can be left out if the rouines from the library - * being used are not cryptographic related :-). - * 4. If you include any Windows specific code (or a derivative thereof) from - * the apps directory (application code) you must include an acknowledgement: - * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" - * - * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND - * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE - * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE - * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE - * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL - * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS - * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) - * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT - * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY - * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF - * SUCH DAMAGE. - * - * The licence and distribution terms for any publically available version or - * derivative of this code cannot be changed. i.e. this code cannot simply be - * copied and put under another distribution licence - * [including the GNU Public Licence.] - */ -#ifndef HEADER_HMAC_H -#define HEADER_HMAC_H - -#include - -#ifdef OPENSSL_NO_HMAC -#error HMAC is disabled. -#endif - -#include - -#define HMAC_MAX_MD_CBLOCK 128 /* largest known is SHA512 */ - -#ifdef __cplusplus -extern "C" { -#endif - -typedef struct hmac_ctx_st - { - const EVP_MD *md; - EVP_MD_CTX md_ctx; - EVP_MD_CTX i_ctx; - EVP_MD_CTX o_ctx; - unsigned int key_length; - unsigned char key[HMAC_MAX_MD_CBLOCK]; - } HMAC_CTX; - -#define HMAC_size(e) (EVP_MD_size((e)->md)) - - -void HMAC_CTX_init(HMAC_CTX *ctx); -void HMAC_CTX_cleanup(HMAC_CTX *ctx); - -#define HMAC_cleanup(ctx) HMAC_CTX_cleanup(ctx) /* deprecated */ - -int HMAC_Init(HMAC_CTX *ctx, const void *key, int len, - const EVP_MD *md); /* deprecated */ -int HMAC_Init_ex(HMAC_CTX *ctx, const void *key, int len, - const EVP_MD *md, ENGINE *impl); -int HMAC_Update(HMAC_CTX *ctx, const unsigned char *data, size_t len); -int HMAC_Final(HMAC_CTX *ctx, unsigned char *md, unsigned int *len); -unsigned char *HMAC(const EVP_MD *evp_md, const void *key, int key_len, - const unsigned char *d, size_t n, unsigned char *md, - unsigned int *md_len); -int HMAC_CTX_copy(HMAC_CTX *dctx, HMAC_CTX *sctx); - -void HMAC_CTX_set_flags(HMAC_CTX *ctx, unsigned long flags); - -#ifdef __cplusplus -} -#endif - -#endif diff --git a/Pods/OpenSSL-Universal/include-osx/openssl/idea.h b/Pods/OpenSSL-Universal/include-osx/openssl/idea.h deleted file mode 100644 index e9a1e7f1..00000000 --- a/Pods/OpenSSL-Universal/include-osx/openssl/idea.h +++ /dev/null @@ -1,103 +0,0 @@ -/* crypto/idea/idea.h */ -/* Copyright (C) 1995-1997 Eric Young (eay@cryptsoft.com) - * All rights reserved. - * - * This package is an SSL implementation written - * by Eric Young (eay@cryptsoft.com). - * The implementation was written so as to conform with Netscapes SSL. - * - * This library is free for commercial and non-commercial use as long as - * the following conditions are aheared to. The following conditions - * apply to all code found in this distribution, be it the RC4, RSA, - * lhash, DES, etc., code; not just the SSL code. The SSL documentation - * included with this distribution is covered by the same copyright terms - * except that the holder is Tim Hudson (tjh@cryptsoft.com). - * - * Copyright remains Eric Young's, and as such any Copyright notices in - * the code are not to be removed. - * If this package is used in a product, Eric Young should be given attribution - * as the author of the parts of the library used. - * This can be in the form of a textual message at program startup or - * in documentation (online or textual) provided with the package. - * - * Redistribution and use in source and binary forms, with or without - * modification, are permitted provided that the following conditions - * are met: - * 1. Redistributions of source code must retain the copyright - * notice, this list of conditions and the following disclaimer. - * 2. Redistributions in binary form must reproduce the above copyright - * notice, this list of conditions and the following disclaimer in the - * documentation and/or other materials provided with the distribution. - * 3. All advertising materials mentioning features or use of this software - * must display the following acknowledgement: - * "This product includes cryptographic software written by - * Eric Young (eay@cryptsoft.com)" - * The word 'cryptographic' can be left out if the rouines from the library - * being used are not cryptographic related :-). - * 4. If you include any Windows specific code (or a derivative thereof) from - * the apps directory (application code) you must include an acknowledgement: - * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" - * - * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND - * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE - * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE - * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE - * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL - * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS - * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) - * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT - * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY - * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF - * SUCH DAMAGE. - * - * The licence and distribution terms for any publically available version or - * derivative of this code cannot be changed. i.e. this code cannot simply be - * copied and put under another distribution licence - * [including the GNU Public Licence.] - */ - -#ifndef HEADER_IDEA_H -#define HEADER_IDEA_H - -#include /* IDEA_INT, OPENSSL_NO_IDEA */ - -#ifdef OPENSSL_NO_IDEA -#error IDEA is disabled. -#endif - -#define IDEA_ENCRYPT 1 -#define IDEA_DECRYPT 0 - -#define IDEA_BLOCK 8 -#define IDEA_KEY_LENGTH 16 - -#ifdef __cplusplus -extern "C" { -#endif - -typedef struct idea_key_st - { - IDEA_INT data[9][6]; - } IDEA_KEY_SCHEDULE; - -const char *idea_options(void); -void idea_ecb_encrypt(const unsigned char *in, unsigned char *out, - IDEA_KEY_SCHEDULE *ks); -#ifdef OPENSSL_FIPS -void private_idea_set_encrypt_key(const unsigned char *key, IDEA_KEY_SCHEDULE *ks); -#endif -void idea_set_encrypt_key(const unsigned char *key, IDEA_KEY_SCHEDULE *ks); -void idea_set_decrypt_key(IDEA_KEY_SCHEDULE *ek, IDEA_KEY_SCHEDULE *dk); -void idea_cbc_encrypt(const unsigned char *in, unsigned char *out, - long length, IDEA_KEY_SCHEDULE *ks, unsigned char *iv,int enc); -void idea_cfb64_encrypt(const unsigned char *in, unsigned char *out, - long length, IDEA_KEY_SCHEDULE *ks, unsigned char *iv, - int *num,int enc); -void idea_ofb64_encrypt(const unsigned char *in, unsigned char *out, - long length, IDEA_KEY_SCHEDULE *ks, unsigned char *iv, int *num); -void idea_encrypt(unsigned long *in, IDEA_KEY_SCHEDULE *ks); -#ifdef __cplusplus -} -#endif - -#endif diff --git a/Pods/OpenSSL-Universal/include-osx/openssl/krb5_asn.h b/Pods/OpenSSL-Universal/include-osx/openssl/krb5_asn.h deleted file mode 100644 index 41725d0d..00000000 --- a/Pods/OpenSSL-Universal/include-osx/openssl/krb5_asn.h +++ /dev/null @@ -1,256 +0,0 @@ -/* krb5_asn.h */ -/* Written by Vern Staats for the OpenSSL project, -** using ocsp/{*.h,*asn*.c} as a starting point -*/ - -/* ==================================================================== - * Copyright (c) 1998-2000 The OpenSSL Project. All rights reserved. - * - * Redistribution and use in source and binary forms, with or without - * modification, are permitted provided that the following conditions - * are met: - * - * 1. Redistributions of source code must retain the above copyright - * notice, this list of conditions and the following disclaimer. - * - * 2. Redistributions in binary form must reproduce the above copyright - * notice, this list of conditions and the following disclaimer in - * the documentation and/or other materials provided with the - * distribution. - * - * 3. All advertising materials mentioning features or use of this - * software must display the following acknowledgment: - * "This product includes software developed by the OpenSSL Project - * for use in the OpenSSL Toolkit. (http://www.openssl.org/)" - * - * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to - * endorse or promote products derived from this software without - * prior written permission. For written permission, please contact - * openssl-core@openssl.org. - * - * 5. Products derived from this software may not be called "OpenSSL" - * nor may "OpenSSL" appear in their names without prior written - * permission of the OpenSSL Project. - * - * 6. Redistributions of any form whatsoever must retain the following - * acknowledgment: - * "This product includes software developed by the OpenSSL Project - * for use in the OpenSSL Toolkit (http://www.openssl.org/)" - * - * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY - * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE - * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR - * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR - * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, - * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT - * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; - * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) - * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, - * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) - * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED - * OF THE POSSIBILITY OF SUCH DAMAGE. - * ==================================================================== - * - * This product includes cryptographic software written by Eric Young - * (eay@cryptsoft.com). This product includes software written by Tim - * Hudson (tjh@cryptsoft.com). - * - */ - -#ifndef HEADER_KRB5_ASN_H -#define HEADER_KRB5_ASN_H - -/* -#include -*/ -#include - -#ifdef __cplusplus -extern "C" { -#endif - - -/* ASN.1 from Kerberos RFC 1510 -*/ - -/* EncryptedData ::= SEQUENCE { -** etype[0] INTEGER, -- EncryptionType -** kvno[1] INTEGER OPTIONAL, -** cipher[2] OCTET STRING -- ciphertext -** } -*/ -typedef struct krb5_encdata_st - { - ASN1_INTEGER *etype; - ASN1_INTEGER *kvno; - ASN1_OCTET_STRING *cipher; - } KRB5_ENCDATA; - -DECLARE_STACK_OF(KRB5_ENCDATA) - -/* PrincipalName ::= SEQUENCE { -** name-type[0] INTEGER, -** name-string[1] SEQUENCE OF GeneralString -** } -*/ -typedef struct krb5_princname_st - { - ASN1_INTEGER *nametype; - STACK_OF(ASN1_GENERALSTRING) *namestring; - } KRB5_PRINCNAME; - -DECLARE_STACK_OF(KRB5_PRINCNAME) - - -/* Ticket ::= [APPLICATION 1] SEQUENCE { -** tkt-vno[0] INTEGER, -** realm[1] Realm, -** sname[2] PrincipalName, -** enc-part[3] EncryptedData -** } -*/ -typedef struct krb5_tktbody_st - { - ASN1_INTEGER *tktvno; - ASN1_GENERALSTRING *realm; - KRB5_PRINCNAME *sname; - KRB5_ENCDATA *encdata; - } KRB5_TKTBODY; - -typedef STACK_OF(KRB5_TKTBODY) KRB5_TICKET; -DECLARE_STACK_OF(KRB5_TKTBODY) - - -/* AP-REQ ::= [APPLICATION 14] SEQUENCE { -** pvno[0] INTEGER, -** msg-type[1] INTEGER, -** ap-options[2] APOptions, -** ticket[3] Ticket, -** authenticator[4] EncryptedData -** } -** -** APOptions ::= BIT STRING { -** reserved(0), use-session-key(1), mutual-required(2) } -*/ -typedef struct krb5_ap_req_st - { - ASN1_INTEGER *pvno; - ASN1_INTEGER *msgtype; - ASN1_BIT_STRING *apoptions; - KRB5_TICKET *ticket; - KRB5_ENCDATA *authenticator; - } KRB5_APREQBODY; - -typedef STACK_OF(KRB5_APREQBODY) KRB5_APREQ; -DECLARE_STACK_OF(KRB5_APREQBODY) - - -/* Authenticator Stuff */ - - -/* Checksum ::= SEQUENCE { -** cksumtype[0] INTEGER, -** checksum[1] OCTET STRING -** } -*/ -typedef struct krb5_checksum_st - { - ASN1_INTEGER *ctype; - ASN1_OCTET_STRING *checksum; - } KRB5_CHECKSUM; - -DECLARE_STACK_OF(KRB5_CHECKSUM) - - -/* EncryptionKey ::= SEQUENCE { -** keytype[0] INTEGER, -** keyvalue[1] OCTET STRING -** } -*/ -typedef struct krb5_encryptionkey_st - { - ASN1_INTEGER *ktype; - ASN1_OCTET_STRING *keyvalue; - } KRB5_ENCKEY; - -DECLARE_STACK_OF(KRB5_ENCKEY) - - -/* AuthorizationData ::= SEQUENCE OF SEQUENCE { -** ad-type[0] INTEGER, -** ad-data[1] OCTET STRING -** } -*/ -typedef struct krb5_authorization_st - { - ASN1_INTEGER *adtype; - ASN1_OCTET_STRING *addata; - } KRB5_AUTHDATA; - -DECLARE_STACK_OF(KRB5_AUTHDATA) - - -/* -- Unencrypted authenticator -** Authenticator ::= [APPLICATION 2] SEQUENCE { -** authenticator-vno[0] INTEGER, -** crealm[1] Realm, -** cname[2] PrincipalName, -** cksum[3] Checksum OPTIONAL, -** cusec[4] INTEGER, -** ctime[5] KerberosTime, -** subkey[6] EncryptionKey OPTIONAL, -** seq-number[7] INTEGER OPTIONAL, -** authorization-data[8] AuthorizationData OPTIONAL -** } -*/ -typedef struct krb5_authenticator_st - { - ASN1_INTEGER *avno; - ASN1_GENERALSTRING *crealm; - KRB5_PRINCNAME *cname; - KRB5_CHECKSUM *cksum; - ASN1_INTEGER *cusec; - ASN1_GENERALIZEDTIME *ctime; - KRB5_ENCKEY *subkey; - ASN1_INTEGER *seqnum; - KRB5_AUTHDATA *authorization; - } KRB5_AUTHENTBODY; - -typedef STACK_OF(KRB5_AUTHENTBODY) KRB5_AUTHENT; -DECLARE_STACK_OF(KRB5_AUTHENTBODY) - - -/* DECLARE_ASN1_FUNCTIONS(type) = DECLARE_ASN1_FUNCTIONS_name(type, type) = -** type *name##_new(void); -** void name##_free(type *a); -** DECLARE_ASN1_ENCODE_FUNCTIONS(type, name, name) = -** DECLARE_ASN1_ENCODE_FUNCTIONS(type, itname, name) = -** type *d2i_##name(type **a, const unsigned char **in, long len); -** int i2d_##name(type *a, unsigned char **out); -** DECLARE_ASN1_ITEM(itname) = OPENSSL_EXTERN const ASN1_ITEM itname##_it -*/ - -DECLARE_ASN1_FUNCTIONS(KRB5_ENCDATA) -DECLARE_ASN1_FUNCTIONS(KRB5_PRINCNAME) -DECLARE_ASN1_FUNCTIONS(KRB5_TKTBODY) -DECLARE_ASN1_FUNCTIONS(KRB5_APREQBODY) -DECLARE_ASN1_FUNCTIONS(KRB5_TICKET) -DECLARE_ASN1_FUNCTIONS(KRB5_APREQ) - -DECLARE_ASN1_FUNCTIONS(KRB5_CHECKSUM) -DECLARE_ASN1_FUNCTIONS(KRB5_ENCKEY) -DECLARE_ASN1_FUNCTIONS(KRB5_AUTHDATA) -DECLARE_ASN1_FUNCTIONS(KRB5_AUTHENTBODY) -DECLARE_ASN1_FUNCTIONS(KRB5_AUTHENT) - - -/* BEGIN ERROR CODES */ -/* The following lines are auto generated by the script mkerr.pl. Any changes - * made after this point may be overwritten when the script is next run. - */ - -#ifdef __cplusplus -} -#endif -#endif - diff --git a/Pods/OpenSSL-Universal/include-osx/openssl/kssl.h b/Pods/OpenSSL-Universal/include-osx/openssl/kssl.h deleted file mode 100644 index e4df8430..00000000 --- a/Pods/OpenSSL-Universal/include-osx/openssl/kssl.h +++ /dev/null @@ -1,192 +0,0 @@ -/* ssl/kssl.h -*- mode: C; c-file-style: "eay" -*- */ -/* Written by Vern Staats for the OpenSSL project 2000. - * project 2000. - */ -/* ==================================================================== - * Copyright (c) 2000 The OpenSSL Project. All rights reserved. - * - * Redistribution and use in source and binary forms, with or without - * modification, are permitted provided that the following conditions - * are met: - * - * 1. Redistributions of source code must retain the above copyright - * notice, this list of conditions and the following disclaimer. - * - * 2. Redistributions in binary form must reproduce the above copyright - * notice, this list of conditions and the following disclaimer in - * the documentation and/or other materials provided with the - * distribution. - * - * 3. All advertising materials mentioning features or use of this - * software must display the following acknowledgment: - * "This product includes software developed by the OpenSSL Project - * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)" - * - * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to - * endorse or promote products derived from this software without - * prior written permission. For written permission, please contact - * licensing@OpenSSL.org. - * - * 5. Products derived from this software may not be called "OpenSSL" - * nor may "OpenSSL" appear in their names without prior written - * permission of the OpenSSL Project. - * - * 6. Redistributions of any form whatsoever must retain the following - * acknowledgment: - * "This product includes software developed by the OpenSSL Project - * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)" - * - * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY - * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE - * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR - * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR - * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, - * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT - * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; - * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) - * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, - * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) - * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED - * OF THE POSSIBILITY OF SUCH DAMAGE. - * ==================================================================== - * - * This product includes cryptographic software written by Eric Young - * (eay@cryptsoft.com). This product includes software written by Tim - * Hudson (tjh@cryptsoft.com). - * - */ - -/* -** 19990701 VRS Started. -*/ - -#ifndef KSSL_H -#define KSSL_H - -#include - -#ifndef OPENSSL_NO_KRB5 - -#include -#include -#include -#ifdef OPENSSL_SYS_WIN32 -/* These can sometimes get redefined indirectly by krb5 header files - * after they get undefed in ossl_typ.h - */ -#undef X509_NAME -#undef X509_EXTENSIONS -#undef OCSP_REQUEST -#undef OCSP_RESPONSE -#endif - -#ifdef __cplusplus -extern "C" { -#endif - -/* -** Depending on which KRB5 implementation used, some types from -** the other may be missing. Resolve that here and now -*/ -#ifdef KRB5_HEIMDAL -typedef unsigned char krb5_octet; -#define FAR -#else - -#ifndef FAR -#define FAR -#endif - -#endif - -/* Uncomment this to debug kssl problems or -** to trace usage of the Kerberos session key -** -** #define KSSL_DEBUG -*/ - -#ifndef KRB5SVC -#define KRB5SVC "host" -#endif - -#ifndef KRB5KEYTAB -#define KRB5KEYTAB "/etc/krb5.keytab" -#endif - -#ifndef KRB5SENDAUTH -#define KRB5SENDAUTH 1 -#endif - -#ifndef KRB5CHECKAUTH -#define KRB5CHECKAUTH 1 -#endif - -#ifndef KSSL_CLOCKSKEW -#define KSSL_CLOCKSKEW 300; -#endif - -#define KSSL_ERR_MAX 255 -typedef struct kssl_err_st { - int reason; - char text[KSSL_ERR_MAX+1]; - } KSSL_ERR; - - -/* Context for passing -** (1) Kerberos session key to SSL, and -** (2) Config data between application and SSL lib -*/ -typedef struct kssl_ctx_st - { - /* used by: disposition: */ - char *service_name; /* C,S default ok (kssl) */ - char *service_host; /* C input, REQUIRED */ - char *client_princ; /* S output from krb5 ticket */ - char *keytab_file; /* S NULL (/etc/krb5.keytab) */ - char *cred_cache; /* C NULL (default) */ - krb5_enctype enctype; - int length; - krb5_octet FAR *key; - } KSSL_CTX; - -#define KSSL_CLIENT 1 -#define KSSL_SERVER 2 -#define KSSL_SERVICE 3 -#define KSSL_KEYTAB 4 - -#define KSSL_CTX_OK 0 -#define KSSL_CTX_ERR 1 -#define KSSL_NOMEM 2 - -/* Public (for use by applications that use OpenSSL with Kerberos 5 support */ -krb5_error_code kssl_ctx_setstring(KSSL_CTX *kssl_ctx, int which, char *text); -KSSL_CTX *kssl_ctx_new(void); -KSSL_CTX *kssl_ctx_free(KSSL_CTX *kssl_ctx); -void kssl_ctx_show(KSSL_CTX *kssl_ctx); -krb5_error_code kssl_ctx_setprinc(KSSL_CTX *kssl_ctx, int which, - krb5_data *realm, krb5_data *entity, int nentities); -krb5_error_code kssl_cget_tkt(KSSL_CTX *kssl_ctx, krb5_data **enc_tktp, - krb5_data *authenp, KSSL_ERR *kssl_err); -krb5_error_code kssl_sget_tkt(KSSL_CTX *kssl_ctx, krb5_data *indata, - krb5_ticket_times *ttimes, KSSL_ERR *kssl_err); -krb5_error_code kssl_ctx_setkey(KSSL_CTX *kssl_ctx, krb5_keyblock *session); -void kssl_err_set(KSSL_ERR *kssl_err, int reason, char *text); -void kssl_krb5_free_data_contents(krb5_context context, krb5_data *data); -krb5_error_code kssl_build_principal_2(krb5_context context, - krb5_principal *princ, int rlen, const char *realm, - int slen, const char *svc, int hlen, const char *host); -krb5_error_code kssl_validate_times(krb5_timestamp atime, - krb5_ticket_times *ttimes); -krb5_error_code kssl_check_authent(KSSL_CTX *kssl_ctx, krb5_data *authentp, - krb5_timestamp *atimep, KSSL_ERR *kssl_err); -unsigned char *kssl_skip_confound(krb5_enctype enctype, unsigned char *authn); - -void SSL_set0_kssl_ctx(SSL *s, KSSL_CTX *kctx); -KSSL_CTX * SSL_get0_kssl_ctx(SSL *s); -char *kssl_ctx_get0_client_princ(KSSL_CTX *kctx); - -#ifdef __cplusplus -} -#endif -#endif /* OPENSSL_NO_KRB5 */ -#endif /* KSSL_H */ diff --git a/Pods/OpenSSL-Universal/include-osx/openssl/lhash.h b/Pods/OpenSSL-Universal/include-osx/openssl/lhash.h deleted file mode 100644 index e7d87635..00000000 --- a/Pods/OpenSSL-Universal/include-osx/openssl/lhash.h +++ /dev/null @@ -1,241 +0,0 @@ -/* crypto/lhash/lhash.h */ -/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) - * All rights reserved. - * - * This package is an SSL implementation written - * by Eric Young (eay@cryptsoft.com). - * The implementation was written so as to conform with Netscapes SSL. - * - * This library is free for commercial and non-commercial use as long as - * the following conditions are aheared to. The following conditions - * apply to all code found in this distribution, be it the RC4, RSA, - * lhash, DES, etc., code; not just the SSL code. The SSL documentation - * included with this distribution is covered by the same copyright terms - * except that the holder is Tim Hudson (tjh@cryptsoft.com). - * - * Copyright remains Eric Young's, and as such any Copyright notices in - * the code are not to be removed. - * If this package is used in a product, Eric Young should be given attribution - * as the author of the parts of the library used. - * This can be in the form of a textual message at program startup or - * in documentation (online or textual) provided with the package. - * - * Redistribution and use in source and binary forms, with or without - * modification, are permitted provided that the following conditions - * are met: - * 1. Redistributions of source code must retain the copyright - * notice, this list of conditions and the following disclaimer. - * 2. Redistributions in binary form must reproduce the above copyright - * notice, this list of conditions and the following disclaimer in the - * documentation and/or other materials provided with the distribution. - * 3. All advertising materials mentioning features or use of this software - * must display the following acknowledgement: - * "This product includes cryptographic software written by - * Eric Young (eay@cryptsoft.com)" - * The word 'cryptographic' can be left out if the rouines from the library - * being used are not cryptographic related :-). - * 4. If you include any Windows specific code (or a derivative thereof) from - * the apps directory (application code) you must include an acknowledgement: - * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" - * - * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND - * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE - * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE - * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE - * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL - * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS - * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) - * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT - * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY - * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF - * SUCH DAMAGE. - * - * The licence and distribution terms for any publically available version or - * derivative of this code cannot be changed. i.e. this code cannot simply be - * copied and put under another distribution licence - * [including the GNU Public Licence.] - */ - -/* Header for dynamic hash table routines - * Author - Eric Young - */ - -#ifndef HEADER_LHASH_H -#define HEADER_LHASH_H - -#include -#ifndef OPENSSL_NO_FP_API -#include -#endif - -#ifndef OPENSSL_NO_BIO -#include -#endif - -#ifdef __cplusplus -extern "C" { -#endif - -typedef struct lhash_node_st - { - void *data; - struct lhash_node_st *next; -#ifndef OPENSSL_NO_HASH_COMP - unsigned long hash; -#endif - } LHASH_NODE; - -typedef int (*LHASH_COMP_FN_TYPE)(const void *, const void *); -typedef unsigned long (*LHASH_HASH_FN_TYPE)(const void *); -typedef void (*LHASH_DOALL_FN_TYPE)(void *); -typedef void (*LHASH_DOALL_ARG_FN_TYPE)(void *, void *); - -/* Macros for declaring and implementing type-safe wrappers for LHASH callbacks. - * This way, callbacks can be provided to LHASH structures without function - * pointer casting and the macro-defined callbacks provide per-variable casting - * before deferring to the underlying type-specific callbacks. NB: It is - * possible to place a "static" in front of both the DECLARE and IMPLEMENT - * macros if the functions are strictly internal. */ - -/* First: "hash" functions */ -#define DECLARE_LHASH_HASH_FN(name, o_type) \ - unsigned long name##_LHASH_HASH(const void *); -#define IMPLEMENT_LHASH_HASH_FN(name, o_type) \ - unsigned long name##_LHASH_HASH(const void *arg) { \ - const o_type *a = arg; \ - return name##_hash(a); } -#define LHASH_HASH_FN(name) name##_LHASH_HASH - -/* Second: "compare" functions */ -#define DECLARE_LHASH_COMP_FN(name, o_type) \ - int name##_LHASH_COMP(const void *, const void *); -#define IMPLEMENT_LHASH_COMP_FN(name, o_type) \ - int name##_LHASH_COMP(const void *arg1, const void *arg2) { \ - const o_type *a = arg1; \ - const o_type *b = arg2; \ - return name##_cmp(a,b); } -#define LHASH_COMP_FN(name) name##_LHASH_COMP - -/* Third: "doall" functions */ -#define DECLARE_LHASH_DOALL_FN(name, o_type) \ - void name##_LHASH_DOALL(void *); -#define IMPLEMENT_LHASH_DOALL_FN(name, o_type) \ - void name##_LHASH_DOALL(void *arg) { \ - o_type *a = arg; \ - name##_doall(a); } -#define LHASH_DOALL_FN(name) name##_LHASH_DOALL - -/* Fourth: "doall_arg" functions */ -#define DECLARE_LHASH_DOALL_ARG_FN(name, o_type, a_type) \ - void name##_LHASH_DOALL_ARG(void *, void *); -#define IMPLEMENT_LHASH_DOALL_ARG_FN(name, o_type, a_type) \ - void name##_LHASH_DOALL_ARG(void *arg1, void *arg2) { \ - o_type *a = arg1; \ - a_type *b = arg2; \ - name##_doall_arg(a, b); } -#define LHASH_DOALL_ARG_FN(name) name##_LHASH_DOALL_ARG - -typedef struct lhash_st - { - LHASH_NODE **b; - LHASH_COMP_FN_TYPE comp; - LHASH_HASH_FN_TYPE hash; - unsigned int num_nodes; - unsigned int num_alloc_nodes; - unsigned int p; - unsigned int pmax; - unsigned long up_load; /* load times 256 */ - unsigned long down_load; /* load times 256 */ - unsigned long num_items; - - unsigned long num_expands; - unsigned long num_expand_reallocs; - unsigned long num_contracts; - unsigned long num_contract_reallocs; - unsigned long num_hash_calls; - unsigned long num_comp_calls; - unsigned long num_insert; - unsigned long num_replace; - unsigned long num_delete; - unsigned long num_no_delete; - unsigned long num_retrieve; - unsigned long num_retrieve_miss; - unsigned long num_hash_comps; - - int error; - } _LHASH; /* Do not use _LHASH directly, use LHASH_OF - * and friends */ - -#define LH_LOAD_MULT 256 - -/* Indicates a malloc() error in the last call, this is only bad - * in lh_insert(). */ -#define lh_error(lh) ((lh)->error) - -_LHASH *lh_new(LHASH_HASH_FN_TYPE h, LHASH_COMP_FN_TYPE c); -void lh_free(_LHASH *lh); -void *lh_insert(_LHASH *lh, void *data); -void *lh_delete(_LHASH *lh, const void *data); -void *lh_retrieve(_LHASH *lh, const void *data); -void lh_doall(_LHASH *lh, LHASH_DOALL_FN_TYPE func); -void lh_doall_arg(_LHASH *lh, LHASH_DOALL_ARG_FN_TYPE func, void *arg); -unsigned long lh_strhash(const char *c); -unsigned long lh_num_items(const _LHASH *lh); - -#ifndef OPENSSL_NO_FP_API -void lh_stats(const _LHASH *lh, FILE *out); -void lh_node_stats(const _LHASH *lh, FILE *out); -void lh_node_usage_stats(const _LHASH *lh, FILE *out); -#endif - -#ifndef OPENSSL_NO_BIO -void lh_stats_bio(const _LHASH *lh, BIO *out); -void lh_node_stats_bio(const _LHASH *lh, BIO *out); -void lh_node_usage_stats_bio(const _LHASH *lh, BIO *out); -#endif - -/* Type checking... */ - -#define LHASH_OF(type) struct lhash_st_##type - -#define DECLARE_LHASH_OF(type) LHASH_OF(type) { int dummy; } - -#define CHECKED_LHASH_OF(type,lh) \ - ((_LHASH *)CHECKED_PTR_OF(LHASH_OF(type),lh)) - -/* Define wrapper functions. */ -#define LHM_lh_new(type, name) \ - ((LHASH_OF(type) *)lh_new(LHASH_HASH_FN(name), LHASH_COMP_FN(name))) -#define LHM_lh_error(type, lh) \ - lh_error(CHECKED_LHASH_OF(type,lh)) -#define LHM_lh_insert(type, lh, inst) \ - ((type *)lh_insert(CHECKED_LHASH_OF(type, lh), \ - CHECKED_PTR_OF(type, inst))) -#define LHM_lh_retrieve(type, lh, inst) \ - ((type *)lh_retrieve(CHECKED_LHASH_OF(type, lh), \ - CHECKED_PTR_OF(type, inst))) -#define LHM_lh_delete(type, lh, inst) \ - ((type *)lh_delete(CHECKED_LHASH_OF(type, lh), \ - CHECKED_PTR_OF(type, inst))) -#define LHM_lh_doall(type, lh,fn) lh_doall(CHECKED_LHASH_OF(type, lh), fn) -#define LHM_lh_doall_arg(type, lh, fn, arg_type, arg) \ - lh_doall_arg(CHECKED_LHASH_OF(type, lh), fn, CHECKED_PTR_OF(arg_type, arg)) -#define LHM_lh_num_items(type, lh) lh_num_items(CHECKED_LHASH_OF(type, lh)) -#define LHM_lh_down_load(type, lh) (CHECKED_LHASH_OF(type, lh)->down_load) -#define LHM_lh_node_stats_bio(type, lh, out) \ - lh_node_stats_bio(CHECKED_LHASH_OF(type, lh), out) -#define LHM_lh_node_usage_stats_bio(type, lh, out) \ - lh_node_usage_stats_bio(CHECKED_LHASH_OF(type, lh), out) -#define LHM_lh_stats_bio(type, lh, out) \ - lh_stats_bio(CHECKED_LHASH_OF(type, lh), out) -#define LHM_lh_free(type, lh) lh_free(CHECKED_LHASH_OF(type, lh)) - -DECLARE_LHASH_OF(OPENSSL_STRING); -DECLARE_LHASH_OF(OPENSSL_CSTRING); - -#ifdef __cplusplus -} -#endif - -#endif - diff --git a/Pods/OpenSSL-Universal/include-osx/openssl/md4.h b/Pods/OpenSSL-Universal/include-osx/openssl/md4.h deleted file mode 100644 index a55368a7..00000000 --- a/Pods/OpenSSL-Universal/include-osx/openssl/md4.h +++ /dev/null @@ -1,120 +0,0 @@ -/* crypto/md4/md4.h */ -/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) - * All rights reserved. - * - * This package is an SSL implementation written - * by Eric Young (eay@cryptsoft.com). - * The implementation was written so as to conform with Netscapes SSL. - * - * This library is free for commercial and non-commercial use as long as - * the following conditions are aheared to. The following conditions - * apply to all code found in this distribution, be it the RC4, RSA, - * lhash, DES, etc., code; not just the SSL code. The SSL documentation - * included with this distribution is covered by the same copyright terms - * except that the holder is Tim Hudson (tjh@cryptsoft.com). - * - * Copyright remains Eric Young's, and as such any Copyright notices in - * the code are not to be removed. - * If this package is used in a product, Eric Young should be given attribution - * as the author of the parts of the library used. - * This can be in the form of a textual message at program startup or - * in documentation (online or textual) provided with the package. - * - * Redistribution and use in source and binary forms, with or without - * modification, are permitted provided that the following conditions - * are met: - * 1. Redistributions of source code must retain the copyright - * notice, this list of conditions and the following disclaimer. - * 2. Redistributions in binary form must reproduce the above copyright - * notice, this list of conditions and the following disclaimer in the - * documentation and/or other materials provided with the distribution. - * 3. All advertising materials mentioning features or use of this software - * must display the following acknowledgement: - * "This product includes cryptographic software written by - * Eric Young (eay@cryptsoft.com)" - * The word 'cryptographic' can be left out if the rouines from the library - * being used are not cryptographic related :-). - * 4. If you include any Windows specific code (or a derivative thereof) from - * the apps directory (application code) you must include an acknowledgement: - * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" - * - * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND - * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE - * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE - * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE - * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL - * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS - * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) - * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT - * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY - * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF - * SUCH DAMAGE. - * - * The licence and distribution terms for any publically available version or - * derivative of this code cannot be changed. i.e. this code cannot simply be - * copied and put under another distribution licence - * [including the GNU Public Licence.] - */ - -#ifndef HEADER_MD4_H -#define HEADER_MD4_H - -#include -#include - -#ifdef __cplusplus -extern "C" { -#endif - -#ifdef OPENSSL_NO_MD4 -#error MD4 is disabled. -#endif - -/* - * !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! - * ! MD4_LONG has to be at least 32 bits wide. If it's wider, then ! - * ! MD4_LONG_LOG2 has to be defined along. ! - * !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! - */ - -#if defined(__LP32__) -#define MD4_LONG unsigned long -#elif defined(OPENSSL_SYS_CRAY) || defined(__ILP64__) -#define MD4_LONG unsigned long -#define MD4_LONG_LOG2 3 -/* - * _CRAY note. I could declare short, but I have no idea what impact - * does it have on performance on none-T3E machines. I could declare - * int, but at least on C90 sizeof(int) can be chosen at compile time. - * So I've chosen long... - * - */ -#else -#define MD4_LONG unsigned int -#endif - -#define MD4_CBLOCK 64 -#define MD4_LBLOCK (MD4_CBLOCK/4) -#define MD4_DIGEST_LENGTH 16 - -typedef struct MD4state_st - { - MD4_LONG A,B,C,D; - MD4_LONG Nl,Nh; - MD4_LONG data[MD4_LBLOCK]; - unsigned int num; - } MD4_CTX; - -#ifdef OPENSSL_FIPS -int private_MD4_Init(MD4_CTX *c); -#endif -int MD4_Init(MD4_CTX *c); -int MD4_Update(MD4_CTX *c, const void *data, size_t len); -int MD4_Final(unsigned char *md, MD4_CTX *c); -unsigned char *MD4(const unsigned char *d, size_t n, unsigned char *md); -void MD4_Transform(MD4_CTX *c, const unsigned char *b); -#ifdef __cplusplus -} -#endif - -#endif diff --git a/Pods/OpenSSL-Universal/include-osx/openssl/md5.h b/Pods/OpenSSL-Universal/include-osx/openssl/md5.h deleted file mode 100644 index 541cc925..00000000 --- a/Pods/OpenSSL-Universal/include-osx/openssl/md5.h +++ /dev/null @@ -1,120 +0,0 @@ -/* crypto/md5/md5.h */ -/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) - * All rights reserved. - * - * This package is an SSL implementation written - * by Eric Young (eay@cryptsoft.com). - * The implementation was written so as to conform with Netscapes SSL. - * - * This library is free for commercial and non-commercial use as long as - * the following conditions are aheared to. The following conditions - * apply to all code found in this distribution, be it the RC4, RSA, - * lhash, DES, etc., code; not just the SSL code. The SSL documentation - * included with this distribution is covered by the same copyright terms - * except that the holder is Tim Hudson (tjh@cryptsoft.com). - * - * Copyright remains Eric Young's, and as such any Copyright notices in - * the code are not to be removed. - * If this package is used in a product, Eric Young should be given attribution - * as the author of the parts of the library used. - * This can be in the form of a textual message at program startup or - * in documentation (online or textual) provided with the package. - * - * Redistribution and use in source and binary forms, with or without - * modification, are permitted provided that the following conditions - * are met: - * 1. Redistributions of source code must retain the copyright - * notice, this list of conditions and the following disclaimer. - * 2. Redistributions in binary form must reproduce the above copyright - * notice, this list of conditions and the following disclaimer in the - * documentation and/or other materials provided with the distribution. - * 3. All advertising materials mentioning features or use of this software - * must display the following acknowledgement: - * "This product includes cryptographic software written by - * Eric Young (eay@cryptsoft.com)" - * The word 'cryptographic' can be left out if the rouines from the library - * being used are not cryptographic related :-). - * 4. If you include any Windows specific code (or a derivative thereof) from - * the apps directory (application code) you must include an acknowledgement: - * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" - * - * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND - * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE - * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE - * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE - * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL - * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS - * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) - * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT - * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY - * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF - * SUCH DAMAGE. - * - * The licence and distribution terms for any publically available version or - * derivative of this code cannot be changed. i.e. this code cannot simply be - * copied and put under another distribution licence - * [including the GNU Public Licence.] - */ - -#ifndef HEADER_MD5_H -#define HEADER_MD5_H - -#include -#include - -#ifdef __cplusplus -extern "C" { -#endif - -#ifdef OPENSSL_NO_MD5 -#error MD5 is disabled. -#endif - -/* - * !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! - * ! MD5_LONG has to be at least 32 bits wide. If it's wider, then ! - * ! MD5_LONG_LOG2 has to be defined along. ! - * !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! - */ - -#if defined(__LP32__) -#define MD5_LONG unsigned long -#elif defined(OPENSSL_SYS_CRAY) || defined(__ILP64__) -#define MD5_LONG unsigned long -#define MD5_LONG_LOG2 3 -/* - * _CRAY note. I could declare short, but I have no idea what impact - * does it have on performance on none-T3E machines. I could declare - * int, but at least on C90 sizeof(int) can be chosen at compile time. - * So I've chosen long... - * - */ -#else -#define MD5_LONG unsigned int -#endif - -#define MD5_CBLOCK 64 -#define MD5_LBLOCK (MD5_CBLOCK/4) -#define MD5_DIGEST_LENGTH 16 - -typedef struct MD5state_st - { - MD5_LONG A,B,C,D; - MD5_LONG Nl,Nh; - MD5_LONG data[MD5_LBLOCK]; - unsigned int num; - } MD5_CTX; - -#ifdef OPENSSL_FIPS -int private_MD5_Init(MD5_CTX *c); -#endif -int MD5_Init(MD5_CTX *c); -int MD5_Update(MD5_CTX *c, const void *data, size_t len); -int MD5_Final(unsigned char *md, MD5_CTX *c); -unsigned char *MD5(const unsigned char *d, size_t n, unsigned char *md); -void MD5_Transform(MD5_CTX *c, const unsigned char *b); -#ifdef __cplusplus -} -#endif - -#endif diff --git a/Pods/OpenSSL-Universal/include-osx/openssl/mdc2.h b/Pods/OpenSSL-Universal/include-osx/openssl/mdc2.h deleted file mode 100644 index f3e8e579..00000000 --- a/Pods/OpenSSL-Universal/include-osx/openssl/mdc2.h +++ /dev/null @@ -1,98 +0,0 @@ -/* crypto/mdc2/mdc2.h */ -/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) - * All rights reserved. - * - * This package is an SSL implementation written - * by Eric Young (eay@cryptsoft.com). - * The implementation was written so as to conform with Netscapes SSL. - * - * This library is free for commercial and non-commercial use as long as - * the following conditions are aheared to. The following conditions - * apply to all code found in this distribution, be it the RC4, RSA, - * lhash, DES, etc., code; not just the SSL code. The SSL documentation - * included with this distribution is covered by the same copyright terms - * except that the holder is Tim Hudson (tjh@cryptsoft.com). - * - * Copyright remains Eric Young's, and as such any Copyright notices in - * the code are not to be removed. - * If this package is used in a product, Eric Young should be given attribution - * as the author of the parts of the library used. - * This can be in the form of a textual message at program startup or - * in documentation (online or textual) provided with the package. - * - * Redistribution and use in source and binary forms, with or without - * modification, are permitted provided that the following conditions - * are met: - * 1. Redistributions of source code must retain the copyright - * notice, this list of conditions and the following disclaimer. - * 2. Redistributions in binary form must reproduce the above copyright - * notice, this list of conditions and the following disclaimer in the - * documentation and/or other materials provided with the distribution. - * 3. All advertising materials mentioning features or use of this software - * must display the following acknowledgement: - * "This product includes cryptographic software written by - * Eric Young (eay@cryptsoft.com)" - * The word 'cryptographic' can be left out if the rouines from the library - * being used are not cryptographic related :-). - * 4. If you include any Windows specific code (or a derivative thereof) from - * the apps directory (application code) you must include an acknowledgement: - * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" - * - * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND - * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE - * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE - * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE - * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL - * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS - * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) - * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT - * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY - * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF - * SUCH DAMAGE. - * - * The licence and distribution terms for any publically available version or - * derivative of this code cannot be changed. i.e. this code cannot simply be - * copied and put under another distribution licence - * [including the GNU Public Licence.] - */ - -#ifndef HEADER_MDC2_H -#define HEADER_MDC2_H - -#include - -#ifdef __cplusplus -extern "C" { -#endif - -#ifdef OPENSSL_NO_MDC2 -#error MDC2 is disabled. -#endif - -#define MDC2_BLOCK 8 -#define MDC2_DIGEST_LENGTH 16 - -typedef struct mdc2_ctx_st - { - unsigned int num; - unsigned char data[MDC2_BLOCK]; - DES_cblock h,hh; - int pad_type; /* either 1 or 2, default 1 */ - } MDC2_CTX; - - -#ifdef OPENSSL_FIPS -int private_MDC2_Init(MDC2_CTX *c); -#endif -int MDC2_Init(MDC2_CTX *c); -int MDC2_Update(MDC2_CTX *c, const unsigned char *data, size_t len); -int MDC2_Final(unsigned char *md, MDC2_CTX *c); -unsigned char *MDC2(const unsigned char *d, size_t n, - unsigned char *md); - -#ifdef __cplusplus -} -#endif - -#endif - diff --git a/Pods/OpenSSL-Universal/include-osx/openssl/modes.h b/Pods/OpenSSL-Universal/include-osx/openssl/modes.h deleted file mode 100644 index f18215bb..00000000 --- a/Pods/OpenSSL-Universal/include-osx/openssl/modes.h +++ /dev/null @@ -1,135 +0,0 @@ -/* ==================================================================== - * Copyright (c) 2008 The OpenSSL Project. All rights reserved. - * - * Rights for redistribution and usage in source and binary - * forms are granted according to the OpenSSL license. - */ - -#include - -typedef void (*block128_f)(const unsigned char in[16], - unsigned char out[16], - const void *key); - -typedef void (*cbc128_f)(const unsigned char *in, unsigned char *out, - size_t len, const void *key, - unsigned char ivec[16], int enc); - -typedef void (*ctr128_f)(const unsigned char *in, unsigned char *out, - size_t blocks, const void *key, - const unsigned char ivec[16]); - -typedef void (*ccm128_f)(const unsigned char *in, unsigned char *out, - size_t blocks, const void *key, - const unsigned char ivec[16],unsigned char cmac[16]); - -void CRYPTO_cbc128_encrypt(const unsigned char *in, unsigned char *out, - size_t len, const void *key, - unsigned char ivec[16], block128_f block); -void CRYPTO_cbc128_decrypt(const unsigned char *in, unsigned char *out, - size_t len, const void *key, - unsigned char ivec[16], block128_f block); - -void CRYPTO_ctr128_encrypt(const unsigned char *in, unsigned char *out, - size_t len, const void *key, - unsigned char ivec[16], unsigned char ecount_buf[16], - unsigned int *num, block128_f block); - -void CRYPTO_ctr128_encrypt_ctr32(const unsigned char *in, unsigned char *out, - size_t len, const void *key, - unsigned char ivec[16], unsigned char ecount_buf[16], - unsigned int *num, ctr128_f ctr); - -void CRYPTO_ofb128_encrypt(const unsigned char *in, unsigned char *out, - size_t len, const void *key, - unsigned char ivec[16], int *num, - block128_f block); - -void CRYPTO_cfb128_encrypt(const unsigned char *in, unsigned char *out, - size_t len, const void *key, - unsigned char ivec[16], int *num, - int enc, block128_f block); -void CRYPTO_cfb128_8_encrypt(const unsigned char *in, unsigned char *out, - size_t length, const void *key, - unsigned char ivec[16], int *num, - int enc, block128_f block); -void CRYPTO_cfb128_1_encrypt(const unsigned char *in, unsigned char *out, - size_t bits, const void *key, - unsigned char ivec[16], int *num, - int enc, block128_f block); - -size_t CRYPTO_cts128_encrypt_block(const unsigned char *in, unsigned char *out, - size_t len, const void *key, - unsigned char ivec[16], block128_f block); -size_t CRYPTO_cts128_encrypt(const unsigned char *in, unsigned char *out, - size_t len, const void *key, - unsigned char ivec[16], cbc128_f cbc); -size_t CRYPTO_cts128_decrypt_block(const unsigned char *in, unsigned char *out, - size_t len, const void *key, - unsigned char ivec[16], block128_f block); -size_t CRYPTO_cts128_decrypt(const unsigned char *in, unsigned char *out, - size_t len, const void *key, - unsigned char ivec[16], cbc128_f cbc); - -size_t CRYPTO_nistcts128_encrypt_block(const unsigned char *in, unsigned char *out, - size_t len, const void *key, - unsigned char ivec[16], block128_f block); -size_t CRYPTO_nistcts128_encrypt(const unsigned char *in, unsigned char *out, - size_t len, const void *key, - unsigned char ivec[16], cbc128_f cbc); -size_t CRYPTO_nistcts128_decrypt_block(const unsigned char *in, unsigned char *out, - size_t len, const void *key, - unsigned char ivec[16], block128_f block); -size_t CRYPTO_nistcts128_decrypt(const unsigned char *in, unsigned char *out, - size_t len, const void *key, - unsigned char ivec[16], cbc128_f cbc); - -typedef struct gcm128_context GCM128_CONTEXT; - -GCM128_CONTEXT *CRYPTO_gcm128_new(void *key, block128_f block); -void CRYPTO_gcm128_init(GCM128_CONTEXT *ctx,void *key,block128_f block); -void CRYPTO_gcm128_setiv(GCM128_CONTEXT *ctx, const unsigned char *iv, - size_t len); -int CRYPTO_gcm128_aad(GCM128_CONTEXT *ctx, const unsigned char *aad, - size_t len); -int CRYPTO_gcm128_encrypt(GCM128_CONTEXT *ctx, - const unsigned char *in, unsigned char *out, - size_t len); -int CRYPTO_gcm128_decrypt(GCM128_CONTEXT *ctx, - const unsigned char *in, unsigned char *out, - size_t len); -int CRYPTO_gcm128_encrypt_ctr32(GCM128_CONTEXT *ctx, - const unsigned char *in, unsigned char *out, - size_t len, ctr128_f stream); -int CRYPTO_gcm128_decrypt_ctr32(GCM128_CONTEXT *ctx, - const unsigned char *in, unsigned char *out, - size_t len, ctr128_f stream); -int CRYPTO_gcm128_finish(GCM128_CONTEXT *ctx,const unsigned char *tag, - size_t len); -void CRYPTO_gcm128_tag(GCM128_CONTEXT *ctx, unsigned char *tag, size_t len); -void CRYPTO_gcm128_release(GCM128_CONTEXT *ctx); - -typedef struct ccm128_context CCM128_CONTEXT; - -void CRYPTO_ccm128_init(CCM128_CONTEXT *ctx, - unsigned int M, unsigned int L, void *key,block128_f block); -int CRYPTO_ccm128_setiv(CCM128_CONTEXT *ctx, - const unsigned char *nonce, size_t nlen, size_t mlen); -void CRYPTO_ccm128_aad(CCM128_CONTEXT *ctx, - const unsigned char *aad, size_t alen); -int CRYPTO_ccm128_encrypt(CCM128_CONTEXT *ctx, - const unsigned char *inp, unsigned char *out, size_t len); -int CRYPTO_ccm128_decrypt(CCM128_CONTEXT *ctx, - const unsigned char *inp, unsigned char *out, size_t len); -int CRYPTO_ccm128_encrypt_ccm64(CCM128_CONTEXT *ctx, - const unsigned char *inp, unsigned char *out, size_t len, - ccm128_f stream); -int CRYPTO_ccm128_decrypt_ccm64(CCM128_CONTEXT *ctx, - const unsigned char *inp, unsigned char *out, size_t len, - ccm128_f stream); -size_t CRYPTO_ccm128_tag(CCM128_CONTEXT *ctx, unsigned char *tag, size_t len); - -typedef struct xts128_context XTS128_CONTEXT; - -int CRYPTO_xts128_encrypt(const XTS128_CONTEXT *ctx, const unsigned char iv[16], - const unsigned char *inp, unsigned char *out, size_t len, int enc); diff --git a/Pods/OpenSSL-Universal/include-osx/openssl/obj_mac.h b/Pods/OpenSSL-Universal/include-osx/openssl/obj_mac.h deleted file mode 100644 index b5ea7cda..00000000 --- a/Pods/OpenSSL-Universal/include-osx/openssl/obj_mac.h +++ /dev/null @@ -1,4032 +0,0 @@ -/* crypto/objects/obj_mac.h */ - -/* THIS FILE IS GENERATED FROM objects.txt by objects.pl via the - * following command: - * perl objects.pl objects.txt obj_mac.num obj_mac.h - */ - -/* Copyright (C) 1995-1997 Eric Young (eay@cryptsoft.com) - * All rights reserved. - * - * This package is an SSL implementation written - * by Eric Young (eay@cryptsoft.com). - * The implementation was written so as to conform with Netscapes SSL. - * - * This library is free for commercial and non-commercial use as long as - * the following conditions are aheared to. The following conditions - * apply to all code found in this distribution, be it the RC4, RSA, - * lhash, DES, etc., code; not just the SSL code. The SSL documentation - * included with this distribution is covered by the same copyright terms - * except that the holder is Tim Hudson (tjh@cryptsoft.com). - * - * Copyright remains Eric Young's, and as such any Copyright notices in - * the code are not to be removed. - * If this package is used in a product, Eric Young should be given attribution - * as the author of the parts of the library used. - * This can be in the form of a textual message at program startup or - * in documentation (online or textual) provided with the package. - * - * Redistribution and use in source and binary forms, with or without - * modification, are permitted provided that the following conditions - * are met: - * 1. Redistributions of source code must retain the copyright - * notice, this list of conditions and the following disclaimer. - * 2. Redistributions in binary form must reproduce the above copyright - * notice, this list of conditions and the following disclaimer in the - * documentation and/or other materials provided with the distribution. - * 3. All advertising materials mentioning features or use of this software - * must display the following acknowledgement: - * "This product includes cryptographic software written by - * Eric Young (eay@cryptsoft.com)" - * The word 'cryptographic' can be left out if the rouines from the library - * being used are not cryptographic related :-). - * 4. If you include any Windows specific code (or a derivative thereof) from - * the apps directory (application code) you must include an acknowledgement: - * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" - * - * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND - * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE - * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE - * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE - * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL - * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS - * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) - * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT - * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY - * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF - * SUCH DAMAGE. - * - * The licence and distribution terms for any publically available version or - * derivative of this code cannot be changed. i.e. this code cannot simply be - * copied and put under another distribution licence - * [including the GNU Public Licence.] - */ - -#define SN_undef "UNDEF" -#define LN_undef "undefined" -#define NID_undef 0 -#define OBJ_undef 0L - -#define SN_itu_t "ITU-T" -#define LN_itu_t "itu-t" -#define NID_itu_t 645 -#define OBJ_itu_t 0L - -#define NID_ccitt 404 -#define OBJ_ccitt OBJ_itu_t - -#define SN_iso "ISO" -#define LN_iso "iso" -#define NID_iso 181 -#define OBJ_iso 1L - -#define SN_joint_iso_itu_t "JOINT-ISO-ITU-T" -#define LN_joint_iso_itu_t "joint-iso-itu-t" -#define NID_joint_iso_itu_t 646 -#define OBJ_joint_iso_itu_t 2L - -#define NID_joint_iso_ccitt 393 -#define OBJ_joint_iso_ccitt OBJ_joint_iso_itu_t - -#define SN_member_body "member-body" -#define LN_member_body "ISO Member Body" -#define NID_member_body 182 -#define OBJ_member_body OBJ_iso,2L - -#define SN_identified_organization "identified-organization" -#define NID_identified_organization 676 -#define OBJ_identified_organization OBJ_iso,3L - -#define SN_hmac_md5 "HMAC-MD5" -#define LN_hmac_md5 "hmac-md5" -#define NID_hmac_md5 780 -#define OBJ_hmac_md5 OBJ_identified_organization,6L,1L,5L,5L,8L,1L,1L - -#define SN_hmac_sha1 "HMAC-SHA1" -#define LN_hmac_sha1 "hmac-sha1" -#define NID_hmac_sha1 781 -#define OBJ_hmac_sha1 OBJ_identified_organization,6L,1L,5L,5L,8L,1L,2L - -#define SN_certicom_arc "certicom-arc" -#define NID_certicom_arc 677 -#define OBJ_certicom_arc OBJ_identified_organization,132L - -#define SN_international_organizations "international-organizations" -#define LN_international_organizations "International Organizations" -#define NID_international_organizations 647 -#define OBJ_international_organizations OBJ_joint_iso_itu_t,23L - -#define SN_wap "wap" -#define NID_wap 678 -#define OBJ_wap OBJ_international_organizations,43L - -#define SN_wap_wsg "wap-wsg" -#define NID_wap_wsg 679 -#define OBJ_wap_wsg OBJ_wap,1L - -#define SN_selected_attribute_types "selected-attribute-types" -#define LN_selected_attribute_types "Selected Attribute Types" -#define NID_selected_attribute_types 394 -#define OBJ_selected_attribute_types OBJ_joint_iso_itu_t,5L,1L,5L - -#define SN_clearance "clearance" -#define NID_clearance 395 -#define OBJ_clearance OBJ_selected_attribute_types,55L - -#define SN_ISO_US "ISO-US" -#define LN_ISO_US "ISO US Member Body" -#define NID_ISO_US 183 -#define OBJ_ISO_US OBJ_member_body,840L - -#define SN_X9_57 "X9-57" -#define LN_X9_57 "X9.57" -#define NID_X9_57 184 -#define OBJ_X9_57 OBJ_ISO_US,10040L - -#define SN_X9cm "X9cm" -#define LN_X9cm "X9.57 CM ?" -#define NID_X9cm 185 -#define OBJ_X9cm OBJ_X9_57,4L - -#define SN_dsa "DSA" -#define LN_dsa "dsaEncryption" -#define NID_dsa 116 -#define OBJ_dsa OBJ_X9cm,1L - -#define SN_dsaWithSHA1 "DSA-SHA1" -#define LN_dsaWithSHA1 "dsaWithSHA1" -#define NID_dsaWithSHA1 113 -#define OBJ_dsaWithSHA1 OBJ_X9cm,3L - -#define SN_ansi_X9_62 "ansi-X9-62" -#define LN_ansi_X9_62 "ANSI X9.62" -#define NID_ansi_X9_62 405 -#define OBJ_ansi_X9_62 OBJ_ISO_US,10045L - -#define OBJ_X9_62_id_fieldType OBJ_ansi_X9_62,1L - -#define SN_X9_62_prime_field "prime-field" -#define NID_X9_62_prime_field 406 -#define OBJ_X9_62_prime_field OBJ_X9_62_id_fieldType,1L - -#define SN_X9_62_characteristic_two_field "characteristic-two-field" -#define NID_X9_62_characteristic_two_field 407 -#define OBJ_X9_62_characteristic_two_field OBJ_X9_62_id_fieldType,2L - -#define SN_X9_62_id_characteristic_two_basis "id-characteristic-two-basis" -#define NID_X9_62_id_characteristic_two_basis 680 -#define OBJ_X9_62_id_characteristic_two_basis OBJ_X9_62_characteristic_two_field,3L - -#define SN_X9_62_onBasis "onBasis" -#define NID_X9_62_onBasis 681 -#define OBJ_X9_62_onBasis OBJ_X9_62_id_characteristic_two_basis,1L - -#define SN_X9_62_tpBasis "tpBasis" -#define NID_X9_62_tpBasis 682 -#define OBJ_X9_62_tpBasis OBJ_X9_62_id_characteristic_two_basis,2L - -#define SN_X9_62_ppBasis "ppBasis" -#define NID_X9_62_ppBasis 683 -#define OBJ_X9_62_ppBasis OBJ_X9_62_id_characteristic_two_basis,3L - -#define OBJ_X9_62_id_publicKeyType OBJ_ansi_X9_62,2L - -#define SN_X9_62_id_ecPublicKey "id-ecPublicKey" -#define NID_X9_62_id_ecPublicKey 408 -#define OBJ_X9_62_id_ecPublicKey OBJ_X9_62_id_publicKeyType,1L - -#define OBJ_X9_62_ellipticCurve OBJ_ansi_X9_62,3L - -#define OBJ_X9_62_c_TwoCurve OBJ_X9_62_ellipticCurve,0L - -#define SN_X9_62_c2pnb163v1 "c2pnb163v1" -#define NID_X9_62_c2pnb163v1 684 -#define OBJ_X9_62_c2pnb163v1 OBJ_X9_62_c_TwoCurve,1L - -#define SN_X9_62_c2pnb163v2 "c2pnb163v2" -#define NID_X9_62_c2pnb163v2 685 -#define OBJ_X9_62_c2pnb163v2 OBJ_X9_62_c_TwoCurve,2L - -#define SN_X9_62_c2pnb163v3 "c2pnb163v3" -#define NID_X9_62_c2pnb163v3 686 -#define OBJ_X9_62_c2pnb163v3 OBJ_X9_62_c_TwoCurve,3L - -#define SN_X9_62_c2pnb176v1 "c2pnb176v1" -#define NID_X9_62_c2pnb176v1 687 -#define OBJ_X9_62_c2pnb176v1 OBJ_X9_62_c_TwoCurve,4L - -#define SN_X9_62_c2tnb191v1 "c2tnb191v1" -#define NID_X9_62_c2tnb191v1 688 -#define OBJ_X9_62_c2tnb191v1 OBJ_X9_62_c_TwoCurve,5L - -#define SN_X9_62_c2tnb191v2 "c2tnb191v2" -#define NID_X9_62_c2tnb191v2 689 -#define OBJ_X9_62_c2tnb191v2 OBJ_X9_62_c_TwoCurve,6L - -#define SN_X9_62_c2tnb191v3 "c2tnb191v3" -#define NID_X9_62_c2tnb191v3 690 -#define OBJ_X9_62_c2tnb191v3 OBJ_X9_62_c_TwoCurve,7L - -#define SN_X9_62_c2onb191v4 "c2onb191v4" -#define NID_X9_62_c2onb191v4 691 -#define OBJ_X9_62_c2onb191v4 OBJ_X9_62_c_TwoCurve,8L - -#define SN_X9_62_c2onb191v5 "c2onb191v5" -#define NID_X9_62_c2onb191v5 692 -#define OBJ_X9_62_c2onb191v5 OBJ_X9_62_c_TwoCurve,9L - -#define SN_X9_62_c2pnb208w1 "c2pnb208w1" -#define NID_X9_62_c2pnb208w1 693 -#define OBJ_X9_62_c2pnb208w1 OBJ_X9_62_c_TwoCurve,10L - -#define SN_X9_62_c2tnb239v1 "c2tnb239v1" -#define NID_X9_62_c2tnb239v1 694 -#define OBJ_X9_62_c2tnb239v1 OBJ_X9_62_c_TwoCurve,11L - -#define SN_X9_62_c2tnb239v2 "c2tnb239v2" -#define NID_X9_62_c2tnb239v2 695 -#define OBJ_X9_62_c2tnb239v2 OBJ_X9_62_c_TwoCurve,12L - -#define SN_X9_62_c2tnb239v3 "c2tnb239v3" -#define NID_X9_62_c2tnb239v3 696 -#define OBJ_X9_62_c2tnb239v3 OBJ_X9_62_c_TwoCurve,13L - -#define SN_X9_62_c2onb239v4 "c2onb239v4" -#define NID_X9_62_c2onb239v4 697 -#define OBJ_X9_62_c2onb239v4 OBJ_X9_62_c_TwoCurve,14L - -#define SN_X9_62_c2onb239v5 "c2onb239v5" -#define NID_X9_62_c2onb239v5 698 -#define OBJ_X9_62_c2onb239v5 OBJ_X9_62_c_TwoCurve,15L - -#define SN_X9_62_c2pnb272w1 "c2pnb272w1" -#define NID_X9_62_c2pnb272w1 699 -#define OBJ_X9_62_c2pnb272w1 OBJ_X9_62_c_TwoCurve,16L - -#define SN_X9_62_c2pnb304w1 "c2pnb304w1" -#define NID_X9_62_c2pnb304w1 700 -#define OBJ_X9_62_c2pnb304w1 OBJ_X9_62_c_TwoCurve,17L - -#define SN_X9_62_c2tnb359v1 "c2tnb359v1" -#define NID_X9_62_c2tnb359v1 701 -#define OBJ_X9_62_c2tnb359v1 OBJ_X9_62_c_TwoCurve,18L - -#define SN_X9_62_c2pnb368w1 "c2pnb368w1" -#define NID_X9_62_c2pnb368w1 702 -#define OBJ_X9_62_c2pnb368w1 OBJ_X9_62_c_TwoCurve,19L - -#define SN_X9_62_c2tnb431r1 "c2tnb431r1" -#define NID_X9_62_c2tnb431r1 703 -#define OBJ_X9_62_c2tnb431r1 OBJ_X9_62_c_TwoCurve,20L - -#define OBJ_X9_62_primeCurve OBJ_X9_62_ellipticCurve,1L - -#define SN_X9_62_prime192v1 "prime192v1" -#define NID_X9_62_prime192v1 409 -#define OBJ_X9_62_prime192v1 OBJ_X9_62_primeCurve,1L - -#define SN_X9_62_prime192v2 "prime192v2" -#define NID_X9_62_prime192v2 410 -#define OBJ_X9_62_prime192v2 OBJ_X9_62_primeCurve,2L - -#define SN_X9_62_prime192v3 "prime192v3" -#define NID_X9_62_prime192v3 411 -#define OBJ_X9_62_prime192v3 OBJ_X9_62_primeCurve,3L - -#define SN_X9_62_prime239v1 "prime239v1" -#define NID_X9_62_prime239v1 412 -#define OBJ_X9_62_prime239v1 OBJ_X9_62_primeCurve,4L - -#define SN_X9_62_prime239v2 "prime239v2" -#define NID_X9_62_prime239v2 413 -#define OBJ_X9_62_prime239v2 OBJ_X9_62_primeCurve,5L - -#define SN_X9_62_prime239v3 "prime239v3" -#define NID_X9_62_prime239v3 414 -#define OBJ_X9_62_prime239v3 OBJ_X9_62_primeCurve,6L - -#define SN_X9_62_prime256v1 "prime256v1" -#define NID_X9_62_prime256v1 415 -#define OBJ_X9_62_prime256v1 OBJ_X9_62_primeCurve,7L - -#define OBJ_X9_62_id_ecSigType OBJ_ansi_X9_62,4L - -#define SN_ecdsa_with_SHA1 "ecdsa-with-SHA1" -#define NID_ecdsa_with_SHA1 416 -#define OBJ_ecdsa_with_SHA1 OBJ_X9_62_id_ecSigType,1L - -#define SN_ecdsa_with_Recommended "ecdsa-with-Recommended" -#define NID_ecdsa_with_Recommended 791 -#define OBJ_ecdsa_with_Recommended OBJ_X9_62_id_ecSigType,2L - -#define SN_ecdsa_with_Specified "ecdsa-with-Specified" -#define NID_ecdsa_with_Specified 792 -#define OBJ_ecdsa_with_Specified OBJ_X9_62_id_ecSigType,3L - -#define SN_ecdsa_with_SHA224 "ecdsa-with-SHA224" -#define NID_ecdsa_with_SHA224 793 -#define OBJ_ecdsa_with_SHA224 OBJ_ecdsa_with_Specified,1L - -#define SN_ecdsa_with_SHA256 "ecdsa-with-SHA256" -#define NID_ecdsa_with_SHA256 794 -#define OBJ_ecdsa_with_SHA256 OBJ_ecdsa_with_Specified,2L - -#define SN_ecdsa_with_SHA384 "ecdsa-with-SHA384" -#define NID_ecdsa_with_SHA384 795 -#define OBJ_ecdsa_with_SHA384 OBJ_ecdsa_with_Specified,3L - -#define SN_ecdsa_with_SHA512 "ecdsa-with-SHA512" -#define NID_ecdsa_with_SHA512 796 -#define OBJ_ecdsa_with_SHA512 OBJ_ecdsa_with_Specified,4L - -#define OBJ_secg_ellipticCurve OBJ_certicom_arc,0L - -#define SN_secp112r1 "secp112r1" -#define NID_secp112r1 704 -#define OBJ_secp112r1 OBJ_secg_ellipticCurve,6L - -#define SN_secp112r2 "secp112r2" -#define NID_secp112r2 705 -#define OBJ_secp112r2 OBJ_secg_ellipticCurve,7L - -#define SN_secp128r1 "secp128r1" -#define NID_secp128r1 706 -#define OBJ_secp128r1 OBJ_secg_ellipticCurve,28L - -#define SN_secp128r2 "secp128r2" -#define NID_secp128r2 707 -#define OBJ_secp128r2 OBJ_secg_ellipticCurve,29L - -#define SN_secp160k1 "secp160k1" -#define NID_secp160k1 708 -#define OBJ_secp160k1 OBJ_secg_ellipticCurve,9L - -#define SN_secp160r1 "secp160r1" -#define NID_secp160r1 709 -#define OBJ_secp160r1 OBJ_secg_ellipticCurve,8L - -#define SN_secp160r2 "secp160r2" -#define NID_secp160r2 710 -#define OBJ_secp160r2 OBJ_secg_ellipticCurve,30L - -#define SN_secp192k1 "secp192k1" -#define NID_secp192k1 711 -#define OBJ_secp192k1 OBJ_secg_ellipticCurve,31L - -#define SN_secp224k1 "secp224k1" -#define NID_secp224k1 712 -#define OBJ_secp224k1 OBJ_secg_ellipticCurve,32L - -#define SN_secp224r1 "secp224r1" -#define NID_secp224r1 713 -#define OBJ_secp224r1 OBJ_secg_ellipticCurve,33L - -#define SN_secp256k1 "secp256k1" -#define NID_secp256k1 714 -#define OBJ_secp256k1 OBJ_secg_ellipticCurve,10L - -#define SN_secp384r1 "secp384r1" -#define NID_secp384r1 715 -#define OBJ_secp384r1 OBJ_secg_ellipticCurve,34L - -#define SN_secp521r1 "secp521r1" -#define NID_secp521r1 716 -#define OBJ_secp521r1 OBJ_secg_ellipticCurve,35L - -#define SN_sect113r1 "sect113r1" -#define NID_sect113r1 717 -#define OBJ_sect113r1 OBJ_secg_ellipticCurve,4L - -#define SN_sect113r2 "sect113r2" -#define NID_sect113r2 718 -#define OBJ_sect113r2 OBJ_secg_ellipticCurve,5L - -#define SN_sect131r1 "sect131r1" -#define NID_sect131r1 719 -#define OBJ_sect131r1 OBJ_secg_ellipticCurve,22L - -#define SN_sect131r2 "sect131r2" -#define NID_sect131r2 720 -#define OBJ_sect131r2 OBJ_secg_ellipticCurve,23L - -#define SN_sect163k1 "sect163k1" -#define NID_sect163k1 721 -#define OBJ_sect163k1 OBJ_secg_ellipticCurve,1L - -#define SN_sect163r1 "sect163r1" -#define NID_sect163r1 722 -#define OBJ_sect163r1 OBJ_secg_ellipticCurve,2L - -#define SN_sect163r2 "sect163r2" -#define NID_sect163r2 723 -#define OBJ_sect163r2 OBJ_secg_ellipticCurve,15L - -#define SN_sect193r1 "sect193r1" -#define NID_sect193r1 724 -#define OBJ_sect193r1 OBJ_secg_ellipticCurve,24L - -#define SN_sect193r2 "sect193r2" -#define NID_sect193r2 725 -#define OBJ_sect193r2 OBJ_secg_ellipticCurve,25L - -#define SN_sect233k1 "sect233k1" -#define NID_sect233k1 726 -#define OBJ_sect233k1 OBJ_secg_ellipticCurve,26L - -#define SN_sect233r1 "sect233r1" -#define NID_sect233r1 727 -#define OBJ_sect233r1 OBJ_secg_ellipticCurve,27L - -#define SN_sect239k1 "sect239k1" -#define NID_sect239k1 728 -#define OBJ_sect239k1 OBJ_secg_ellipticCurve,3L - -#define SN_sect283k1 "sect283k1" -#define NID_sect283k1 729 -#define OBJ_sect283k1 OBJ_secg_ellipticCurve,16L - -#define SN_sect283r1 "sect283r1" -#define NID_sect283r1 730 -#define OBJ_sect283r1 OBJ_secg_ellipticCurve,17L - -#define SN_sect409k1 "sect409k1" -#define NID_sect409k1 731 -#define OBJ_sect409k1 OBJ_secg_ellipticCurve,36L - -#define SN_sect409r1 "sect409r1" -#define NID_sect409r1 732 -#define OBJ_sect409r1 OBJ_secg_ellipticCurve,37L - -#define SN_sect571k1 "sect571k1" -#define NID_sect571k1 733 -#define OBJ_sect571k1 OBJ_secg_ellipticCurve,38L - -#define SN_sect571r1 "sect571r1" -#define NID_sect571r1 734 -#define OBJ_sect571r1 OBJ_secg_ellipticCurve,39L - -#define OBJ_wap_wsg_idm_ecid OBJ_wap_wsg,4L - -#define SN_wap_wsg_idm_ecid_wtls1 "wap-wsg-idm-ecid-wtls1" -#define NID_wap_wsg_idm_ecid_wtls1 735 -#define OBJ_wap_wsg_idm_ecid_wtls1 OBJ_wap_wsg_idm_ecid,1L - -#define SN_wap_wsg_idm_ecid_wtls3 "wap-wsg-idm-ecid-wtls3" -#define NID_wap_wsg_idm_ecid_wtls3 736 -#define OBJ_wap_wsg_idm_ecid_wtls3 OBJ_wap_wsg_idm_ecid,3L - -#define SN_wap_wsg_idm_ecid_wtls4 "wap-wsg-idm-ecid-wtls4" -#define NID_wap_wsg_idm_ecid_wtls4 737 -#define OBJ_wap_wsg_idm_ecid_wtls4 OBJ_wap_wsg_idm_ecid,4L - -#define SN_wap_wsg_idm_ecid_wtls5 "wap-wsg-idm-ecid-wtls5" -#define NID_wap_wsg_idm_ecid_wtls5 738 -#define OBJ_wap_wsg_idm_ecid_wtls5 OBJ_wap_wsg_idm_ecid,5L - -#define SN_wap_wsg_idm_ecid_wtls6 "wap-wsg-idm-ecid-wtls6" -#define NID_wap_wsg_idm_ecid_wtls6 739 -#define OBJ_wap_wsg_idm_ecid_wtls6 OBJ_wap_wsg_idm_ecid,6L - -#define SN_wap_wsg_idm_ecid_wtls7 "wap-wsg-idm-ecid-wtls7" -#define NID_wap_wsg_idm_ecid_wtls7 740 -#define OBJ_wap_wsg_idm_ecid_wtls7 OBJ_wap_wsg_idm_ecid,7L - -#define SN_wap_wsg_idm_ecid_wtls8 "wap-wsg-idm-ecid-wtls8" -#define NID_wap_wsg_idm_ecid_wtls8 741 -#define OBJ_wap_wsg_idm_ecid_wtls8 OBJ_wap_wsg_idm_ecid,8L - -#define SN_wap_wsg_idm_ecid_wtls9 "wap-wsg-idm-ecid-wtls9" -#define NID_wap_wsg_idm_ecid_wtls9 742 -#define OBJ_wap_wsg_idm_ecid_wtls9 OBJ_wap_wsg_idm_ecid,9L - -#define SN_wap_wsg_idm_ecid_wtls10 "wap-wsg-idm-ecid-wtls10" -#define NID_wap_wsg_idm_ecid_wtls10 743 -#define OBJ_wap_wsg_idm_ecid_wtls10 OBJ_wap_wsg_idm_ecid,10L - -#define SN_wap_wsg_idm_ecid_wtls11 "wap-wsg-idm-ecid-wtls11" -#define NID_wap_wsg_idm_ecid_wtls11 744 -#define OBJ_wap_wsg_idm_ecid_wtls11 OBJ_wap_wsg_idm_ecid,11L - -#define SN_wap_wsg_idm_ecid_wtls12 "wap-wsg-idm-ecid-wtls12" -#define NID_wap_wsg_idm_ecid_wtls12 745 -#define OBJ_wap_wsg_idm_ecid_wtls12 OBJ_wap_wsg_idm_ecid,12L - -#define SN_cast5_cbc "CAST5-CBC" -#define LN_cast5_cbc "cast5-cbc" -#define NID_cast5_cbc 108 -#define OBJ_cast5_cbc OBJ_ISO_US,113533L,7L,66L,10L - -#define SN_cast5_ecb "CAST5-ECB" -#define LN_cast5_ecb "cast5-ecb" -#define NID_cast5_ecb 109 - -#define SN_cast5_cfb64 "CAST5-CFB" -#define LN_cast5_cfb64 "cast5-cfb" -#define NID_cast5_cfb64 110 - -#define SN_cast5_ofb64 "CAST5-OFB" -#define LN_cast5_ofb64 "cast5-ofb" -#define NID_cast5_ofb64 111 - -#define LN_pbeWithMD5AndCast5_CBC "pbeWithMD5AndCast5CBC" -#define NID_pbeWithMD5AndCast5_CBC 112 -#define OBJ_pbeWithMD5AndCast5_CBC OBJ_ISO_US,113533L,7L,66L,12L - -#define SN_id_PasswordBasedMAC "id-PasswordBasedMAC" -#define LN_id_PasswordBasedMAC "password based MAC" -#define NID_id_PasswordBasedMAC 782 -#define OBJ_id_PasswordBasedMAC OBJ_ISO_US,113533L,7L,66L,13L - -#define SN_id_DHBasedMac "id-DHBasedMac" -#define LN_id_DHBasedMac "Diffie-Hellman based MAC" -#define NID_id_DHBasedMac 783 -#define OBJ_id_DHBasedMac OBJ_ISO_US,113533L,7L,66L,30L - -#define SN_rsadsi "rsadsi" -#define LN_rsadsi "RSA Data Security, Inc." -#define NID_rsadsi 1 -#define OBJ_rsadsi OBJ_ISO_US,113549L - -#define SN_pkcs "pkcs" -#define LN_pkcs "RSA Data Security, Inc. PKCS" -#define NID_pkcs 2 -#define OBJ_pkcs OBJ_rsadsi,1L - -#define SN_pkcs1 "pkcs1" -#define NID_pkcs1 186 -#define OBJ_pkcs1 OBJ_pkcs,1L - -#define LN_rsaEncryption "rsaEncryption" -#define NID_rsaEncryption 6 -#define OBJ_rsaEncryption OBJ_pkcs1,1L - -#define SN_md2WithRSAEncryption "RSA-MD2" -#define LN_md2WithRSAEncryption "md2WithRSAEncryption" -#define NID_md2WithRSAEncryption 7 -#define OBJ_md2WithRSAEncryption OBJ_pkcs1,2L - -#define SN_md4WithRSAEncryption "RSA-MD4" -#define LN_md4WithRSAEncryption "md4WithRSAEncryption" -#define NID_md4WithRSAEncryption 396 -#define OBJ_md4WithRSAEncryption OBJ_pkcs1,3L - -#define SN_md5WithRSAEncryption "RSA-MD5" -#define LN_md5WithRSAEncryption "md5WithRSAEncryption" -#define NID_md5WithRSAEncryption 8 -#define OBJ_md5WithRSAEncryption OBJ_pkcs1,4L - -#define SN_sha1WithRSAEncryption "RSA-SHA1" -#define LN_sha1WithRSAEncryption "sha1WithRSAEncryption" -#define NID_sha1WithRSAEncryption 65 -#define OBJ_sha1WithRSAEncryption OBJ_pkcs1,5L - -#define SN_rsaesOaep "RSAES-OAEP" -#define LN_rsaesOaep "rsaesOaep" -#define NID_rsaesOaep 919 -#define OBJ_rsaesOaep OBJ_pkcs1,7L - -#define SN_mgf1 "MGF1" -#define LN_mgf1 "mgf1" -#define NID_mgf1 911 -#define OBJ_mgf1 OBJ_pkcs1,8L - -#define SN_rsassaPss "RSASSA-PSS" -#define LN_rsassaPss "rsassaPss" -#define NID_rsassaPss 912 -#define OBJ_rsassaPss OBJ_pkcs1,10L - -#define SN_sha256WithRSAEncryption "RSA-SHA256" -#define LN_sha256WithRSAEncryption "sha256WithRSAEncryption" -#define NID_sha256WithRSAEncryption 668 -#define OBJ_sha256WithRSAEncryption OBJ_pkcs1,11L - -#define SN_sha384WithRSAEncryption "RSA-SHA384" -#define LN_sha384WithRSAEncryption "sha384WithRSAEncryption" -#define NID_sha384WithRSAEncryption 669 -#define OBJ_sha384WithRSAEncryption OBJ_pkcs1,12L - -#define SN_sha512WithRSAEncryption "RSA-SHA512" -#define LN_sha512WithRSAEncryption "sha512WithRSAEncryption" -#define NID_sha512WithRSAEncryption 670 -#define OBJ_sha512WithRSAEncryption OBJ_pkcs1,13L - -#define SN_sha224WithRSAEncryption "RSA-SHA224" -#define LN_sha224WithRSAEncryption "sha224WithRSAEncryption" -#define NID_sha224WithRSAEncryption 671 -#define OBJ_sha224WithRSAEncryption OBJ_pkcs1,14L - -#define SN_pkcs3 "pkcs3" -#define NID_pkcs3 27 -#define OBJ_pkcs3 OBJ_pkcs,3L - -#define LN_dhKeyAgreement "dhKeyAgreement" -#define NID_dhKeyAgreement 28 -#define OBJ_dhKeyAgreement OBJ_pkcs3,1L - -#define SN_pkcs5 "pkcs5" -#define NID_pkcs5 187 -#define OBJ_pkcs5 OBJ_pkcs,5L - -#define SN_pbeWithMD2AndDES_CBC "PBE-MD2-DES" -#define LN_pbeWithMD2AndDES_CBC "pbeWithMD2AndDES-CBC" -#define NID_pbeWithMD2AndDES_CBC 9 -#define OBJ_pbeWithMD2AndDES_CBC OBJ_pkcs5,1L - -#define SN_pbeWithMD5AndDES_CBC "PBE-MD5-DES" -#define LN_pbeWithMD5AndDES_CBC "pbeWithMD5AndDES-CBC" -#define NID_pbeWithMD5AndDES_CBC 10 -#define OBJ_pbeWithMD5AndDES_CBC OBJ_pkcs5,3L - -#define SN_pbeWithMD2AndRC2_CBC "PBE-MD2-RC2-64" -#define LN_pbeWithMD2AndRC2_CBC "pbeWithMD2AndRC2-CBC" -#define NID_pbeWithMD2AndRC2_CBC 168 -#define OBJ_pbeWithMD2AndRC2_CBC OBJ_pkcs5,4L - -#define SN_pbeWithMD5AndRC2_CBC "PBE-MD5-RC2-64" -#define LN_pbeWithMD5AndRC2_CBC "pbeWithMD5AndRC2-CBC" -#define NID_pbeWithMD5AndRC2_CBC 169 -#define OBJ_pbeWithMD5AndRC2_CBC OBJ_pkcs5,6L - -#define SN_pbeWithSHA1AndDES_CBC "PBE-SHA1-DES" -#define LN_pbeWithSHA1AndDES_CBC "pbeWithSHA1AndDES-CBC" -#define NID_pbeWithSHA1AndDES_CBC 170 -#define OBJ_pbeWithSHA1AndDES_CBC OBJ_pkcs5,10L - -#define SN_pbeWithSHA1AndRC2_CBC "PBE-SHA1-RC2-64" -#define LN_pbeWithSHA1AndRC2_CBC "pbeWithSHA1AndRC2-CBC" -#define NID_pbeWithSHA1AndRC2_CBC 68 -#define OBJ_pbeWithSHA1AndRC2_CBC OBJ_pkcs5,11L - -#define LN_id_pbkdf2 "PBKDF2" -#define NID_id_pbkdf2 69 -#define OBJ_id_pbkdf2 OBJ_pkcs5,12L - -#define LN_pbes2 "PBES2" -#define NID_pbes2 161 -#define OBJ_pbes2 OBJ_pkcs5,13L - -#define LN_pbmac1 "PBMAC1" -#define NID_pbmac1 162 -#define OBJ_pbmac1 OBJ_pkcs5,14L - -#define SN_pkcs7 "pkcs7" -#define NID_pkcs7 20 -#define OBJ_pkcs7 OBJ_pkcs,7L - -#define LN_pkcs7_data "pkcs7-data" -#define NID_pkcs7_data 21 -#define OBJ_pkcs7_data OBJ_pkcs7,1L - -#define LN_pkcs7_signed "pkcs7-signedData" -#define NID_pkcs7_signed 22 -#define OBJ_pkcs7_signed OBJ_pkcs7,2L - -#define LN_pkcs7_enveloped "pkcs7-envelopedData" -#define NID_pkcs7_enveloped 23 -#define OBJ_pkcs7_enveloped OBJ_pkcs7,3L - -#define LN_pkcs7_signedAndEnveloped "pkcs7-signedAndEnvelopedData" -#define NID_pkcs7_signedAndEnveloped 24 -#define OBJ_pkcs7_signedAndEnveloped OBJ_pkcs7,4L - -#define LN_pkcs7_digest "pkcs7-digestData" -#define NID_pkcs7_digest 25 -#define OBJ_pkcs7_digest OBJ_pkcs7,5L - -#define LN_pkcs7_encrypted "pkcs7-encryptedData" -#define NID_pkcs7_encrypted 26 -#define OBJ_pkcs7_encrypted OBJ_pkcs7,6L - -#define SN_pkcs9 "pkcs9" -#define NID_pkcs9 47 -#define OBJ_pkcs9 OBJ_pkcs,9L - -#define LN_pkcs9_emailAddress "emailAddress" -#define NID_pkcs9_emailAddress 48 -#define OBJ_pkcs9_emailAddress OBJ_pkcs9,1L - -#define LN_pkcs9_unstructuredName "unstructuredName" -#define NID_pkcs9_unstructuredName 49 -#define OBJ_pkcs9_unstructuredName OBJ_pkcs9,2L - -#define LN_pkcs9_contentType "contentType" -#define NID_pkcs9_contentType 50 -#define OBJ_pkcs9_contentType OBJ_pkcs9,3L - -#define LN_pkcs9_messageDigest "messageDigest" -#define NID_pkcs9_messageDigest 51 -#define OBJ_pkcs9_messageDigest OBJ_pkcs9,4L - -#define LN_pkcs9_signingTime "signingTime" -#define NID_pkcs9_signingTime 52 -#define OBJ_pkcs9_signingTime OBJ_pkcs9,5L - -#define LN_pkcs9_countersignature "countersignature" -#define NID_pkcs9_countersignature 53 -#define OBJ_pkcs9_countersignature OBJ_pkcs9,6L - -#define LN_pkcs9_challengePassword "challengePassword" -#define NID_pkcs9_challengePassword 54 -#define OBJ_pkcs9_challengePassword OBJ_pkcs9,7L - -#define LN_pkcs9_unstructuredAddress "unstructuredAddress" -#define NID_pkcs9_unstructuredAddress 55 -#define OBJ_pkcs9_unstructuredAddress OBJ_pkcs9,8L - -#define LN_pkcs9_extCertAttributes "extendedCertificateAttributes" -#define NID_pkcs9_extCertAttributes 56 -#define OBJ_pkcs9_extCertAttributes OBJ_pkcs9,9L - -#define SN_ext_req "extReq" -#define LN_ext_req "Extension Request" -#define NID_ext_req 172 -#define OBJ_ext_req OBJ_pkcs9,14L - -#define SN_SMIMECapabilities "SMIME-CAPS" -#define LN_SMIMECapabilities "S/MIME Capabilities" -#define NID_SMIMECapabilities 167 -#define OBJ_SMIMECapabilities OBJ_pkcs9,15L - -#define SN_SMIME "SMIME" -#define LN_SMIME "S/MIME" -#define NID_SMIME 188 -#define OBJ_SMIME OBJ_pkcs9,16L - -#define SN_id_smime_mod "id-smime-mod" -#define NID_id_smime_mod 189 -#define OBJ_id_smime_mod OBJ_SMIME,0L - -#define SN_id_smime_ct "id-smime-ct" -#define NID_id_smime_ct 190 -#define OBJ_id_smime_ct OBJ_SMIME,1L - -#define SN_id_smime_aa "id-smime-aa" -#define NID_id_smime_aa 191 -#define OBJ_id_smime_aa OBJ_SMIME,2L - -#define SN_id_smime_alg "id-smime-alg" -#define NID_id_smime_alg 192 -#define OBJ_id_smime_alg OBJ_SMIME,3L - -#define SN_id_smime_cd "id-smime-cd" -#define NID_id_smime_cd 193 -#define OBJ_id_smime_cd OBJ_SMIME,4L - -#define SN_id_smime_spq "id-smime-spq" -#define NID_id_smime_spq 194 -#define OBJ_id_smime_spq OBJ_SMIME,5L - -#define SN_id_smime_cti "id-smime-cti" -#define NID_id_smime_cti 195 -#define OBJ_id_smime_cti OBJ_SMIME,6L - -#define SN_id_smime_mod_cms "id-smime-mod-cms" -#define NID_id_smime_mod_cms 196 -#define OBJ_id_smime_mod_cms OBJ_id_smime_mod,1L - -#define SN_id_smime_mod_ess "id-smime-mod-ess" -#define NID_id_smime_mod_ess 197 -#define OBJ_id_smime_mod_ess OBJ_id_smime_mod,2L - -#define SN_id_smime_mod_oid "id-smime-mod-oid" -#define NID_id_smime_mod_oid 198 -#define OBJ_id_smime_mod_oid OBJ_id_smime_mod,3L - -#define SN_id_smime_mod_msg_v3 "id-smime-mod-msg-v3" -#define NID_id_smime_mod_msg_v3 199 -#define OBJ_id_smime_mod_msg_v3 OBJ_id_smime_mod,4L - -#define SN_id_smime_mod_ets_eSignature_88 "id-smime-mod-ets-eSignature-88" -#define NID_id_smime_mod_ets_eSignature_88 200 -#define OBJ_id_smime_mod_ets_eSignature_88 OBJ_id_smime_mod,5L - -#define SN_id_smime_mod_ets_eSignature_97 "id-smime-mod-ets-eSignature-97" -#define NID_id_smime_mod_ets_eSignature_97 201 -#define OBJ_id_smime_mod_ets_eSignature_97 OBJ_id_smime_mod,6L - -#define SN_id_smime_mod_ets_eSigPolicy_88 "id-smime-mod-ets-eSigPolicy-88" -#define NID_id_smime_mod_ets_eSigPolicy_88 202 -#define OBJ_id_smime_mod_ets_eSigPolicy_88 OBJ_id_smime_mod,7L - -#define SN_id_smime_mod_ets_eSigPolicy_97 "id-smime-mod-ets-eSigPolicy-97" -#define NID_id_smime_mod_ets_eSigPolicy_97 203 -#define OBJ_id_smime_mod_ets_eSigPolicy_97 OBJ_id_smime_mod,8L - -#define SN_id_smime_ct_receipt "id-smime-ct-receipt" -#define NID_id_smime_ct_receipt 204 -#define OBJ_id_smime_ct_receipt OBJ_id_smime_ct,1L - -#define SN_id_smime_ct_authData "id-smime-ct-authData" -#define NID_id_smime_ct_authData 205 -#define OBJ_id_smime_ct_authData OBJ_id_smime_ct,2L - -#define SN_id_smime_ct_publishCert "id-smime-ct-publishCert" -#define NID_id_smime_ct_publishCert 206 -#define OBJ_id_smime_ct_publishCert OBJ_id_smime_ct,3L - -#define SN_id_smime_ct_TSTInfo "id-smime-ct-TSTInfo" -#define NID_id_smime_ct_TSTInfo 207 -#define OBJ_id_smime_ct_TSTInfo OBJ_id_smime_ct,4L - -#define SN_id_smime_ct_TDTInfo "id-smime-ct-TDTInfo" -#define NID_id_smime_ct_TDTInfo 208 -#define OBJ_id_smime_ct_TDTInfo OBJ_id_smime_ct,5L - -#define SN_id_smime_ct_contentInfo "id-smime-ct-contentInfo" -#define NID_id_smime_ct_contentInfo 209 -#define OBJ_id_smime_ct_contentInfo OBJ_id_smime_ct,6L - -#define SN_id_smime_ct_DVCSRequestData "id-smime-ct-DVCSRequestData" -#define NID_id_smime_ct_DVCSRequestData 210 -#define OBJ_id_smime_ct_DVCSRequestData OBJ_id_smime_ct,7L - -#define SN_id_smime_ct_DVCSResponseData "id-smime-ct-DVCSResponseData" -#define NID_id_smime_ct_DVCSResponseData 211 -#define OBJ_id_smime_ct_DVCSResponseData OBJ_id_smime_ct,8L - -#define SN_id_smime_ct_compressedData "id-smime-ct-compressedData" -#define NID_id_smime_ct_compressedData 786 -#define OBJ_id_smime_ct_compressedData OBJ_id_smime_ct,9L - -#define SN_id_ct_asciiTextWithCRLF "id-ct-asciiTextWithCRLF" -#define NID_id_ct_asciiTextWithCRLF 787 -#define OBJ_id_ct_asciiTextWithCRLF OBJ_id_smime_ct,27L - -#define SN_id_smime_aa_receiptRequest "id-smime-aa-receiptRequest" -#define NID_id_smime_aa_receiptRequest 212 -#define OBJ_id_smime_aa_receiptRequest OBJ_id_smime_aa,1L - -#define SN_id_smime_aa_securityLabel "id-smime-aa-securityLabel" -#define NID_id_smime_aa_securityLabel 213 -#define OBJ_id_smime_aa_securityLabel OBJ_id_smime_aa,2L - -#define SN_id_smime_aa_mlExpandHistory "id-smime-aa-mlExpandHistory" -#define NID_id_smime_aa_mlExpandHistory 214 -#define OBJ_id_smime_aa_mlExpandHistory OBJ_id_smime_aa,3L - -#define SN_id_smime_aa_contentHint "id-smime-aa-contentHint" -#define NID_id_smime_aa_contentHint 215 -#define OBJ_id_smime_aa_contentHint OBJ_id_smime_aa,4L - -#define SN_id_smime_aa_msgSigDigest "id-smime-aa-msgSigDigest" -#define NID_id_smime_aa_msgSigDigest 216 -#define OBJ_id_smime_aa_msgSigDigest OBJ_id_smime_aa,5L - -#define SN_id_smime_aa_encapContentType "id-smime-aa-encapContentType" -#define NID_id_smime_aa_encapContentType 217 -#define OBJ_id_smime_aa_encapContentType OBJ_id_smime_aa,6L - -#define SN_id_smime_aa_contentIdentifier "id-smime-aa-contentIdentifier" -#define NID_id_smime_aa_contentIdentifier 218 -#define OBJ_id_smime_aa_contentIdentifier OBJ_id_smime_aa,7L - -#define SN_id_smime_aa_macValue "id-smime-aa-macValue" -#define NID_id_smime_aa_macValue 219 -#define OBJ_id_smime_aa_macValue OBJ_id_smime_aa,8L - -#define SN_id_smime_aa_equivalentLabels "id-smime-aa-equivalentLabels" -#define NID_id_smime_aa_equivalentLabels 220 -#define OBJ_id_smime_aa_equivalentLabels OBJ_id_smime_aa,9L - -#define SN_id_smime_aa_contentReference "id-smime-aa-contentReference" -#define NID_id_smime_aa_contentReference 221 -#define OBJ_id_smime_aa_contentReference OBJ_id_smime_aa,10L - -#define SN_id_smime_aa_encrypKeyPref "id-smime-aa-encrypKeyPref" -#define NID_id_smime_aa_encrypKeyPref 222 -#define OBJ_id_smime_aa_encrypKeyPref OBJ_id_smime_aa,11L - -#define SN_id_smime_aa_signingCertificate "id-smime-aa-signingCertificate" -#define NID_id_smime_aa_signingCertificate 223 -#define OBJ_id_smime_aa_signingCertificate OBJ_id_smime_aa,12L - -#define SN_id_smime_aa_smimeEncryptCerts "id-smime-aa-smimeEncryptCerts" -#define NID_id_smime_aa_smimeEncryptCerts 224 -#define OBJ_id_smime_aa_smimeEncryptCerts OBJ_id_smime_aa,13L - -#define SN_id_smime_aa_timeStampToken "id-smime-aa-timeStampToken" -#define NID_id_smime_aa_timeStampToken 225 -#define OBJ_id_smime_aa_timeStampToken OBJ_id_smime_aa,14L - -#define SN_id_smime_aa_ets_sigPolicyId "id-smime-aa-ets-sigPolicyId" -#define NID_id_smime_aa_ets_sigPolicyId 226 -#define OBJ_id_smime_aa_ets_sigPolicyId OBJ_id_smime_aa,15L - -#define SN_id_smime_aa_ets_commitmentType "id-smime-aa-ets-commitmentType" -#define NID_id_smime_aa_ets_commitmentType 227 -#define OBJ_id_smime_aa_ets_commitmentType OBJ_id_smime_aa,16L - -#define SN_id_smime_aa_ets_signerLocation "id-smime-aa-ets-signerLocation" -#define NID_id_smime_aa_ets_signerLocation 228 -#define OBJ_id_smime_aa_ets_signerLocation OBJ_id_smime_aa,17L - -#define SN_id_smime_aa_ets_signerAttr "id-smime-aa-ets-signerAttr" -#define NID_id_smime_aa_ets_signerAttr 229 -#define OBJ_id_smime_aa_ets_signerAttr OBJ_id_smime_aa,18L - -#define SN_id_smime_aa_ets_otherSigCert "id-smime-aa-ets-otherSigCert" -#define NID_id_smime_aa_ets_otherSigCert 230 -#define OBJ_id_smime_aa_ets_otherSigCert OBJ_id_smime_aa,19L - -#define SN_id_smime_aa_ets_contentTimestamp "id-smime-aa-ets-contentTimestamp" -#define NID_id_smime_aa_ets_contentTimestamp 231 -#define OBJ_id_smime_aa_ets_contentTimestamp OBJ_id_smime_aa,20L - -#define SN_id_smime_aa_ets_CertificateRefs "id-smime-aa-ets-CertificateRefs" -#define NID_id_smime_aa_ets_CertificateRefs 232 -#define OBJ_id_smime_aa_ets_CertificateRefs OBJ_id_smime_aa,21L - -#define SN_id_smime_aa_ets_RevocationRefs "id-smime-aa-ets-RevocationRefs" -#define NID_id_smime_aa_ets_RevocationRefs 233 -#define OBJ_id_smime_aa_ets_RevocationRefs OBJ_id_smime_aa,22L - -#define SN_id_smime_aa_ets_certValues "id-smime-aa-ets-certValues" -#define NID_id_smime_aa_ets_certValues 234 -#define OBJ_id_smime_aa_ets_certValues OBJ_id_smime_aa,23L - -#define SN_id_smime_aa_ets_revocationValues "id-smime-aa-ets-revocationValues" -#define NID_id_smime_aa_ets_revocationValues 235 -#define OBJ_id_smime_aa_ets_revocationValues OBJ_id_smime_aa,24L - -#define SN_id_smime_aa_ets_escTimeStamp "id-smime-aa-ets-escTimeStamp" -#define NID_id_smime_aa_ets_escTimeStamp 236 -#define OBJ_id_smime_aa_ets_escTimeStamp OBJ_id_smime_aa,25L - -#define SN_id_smime_aa_ets_certCRLTimestamp "id-smime-aa-ets-certCRLTimestamp" -#define NID_id_smime_aa_ets_certCRLTimestamp 237 -#define OBJ_id_smime_aa_ets_certCRLTimestamp OBJ_id_smime_aa,26L - -#define SN_id_smime_aa_ets_archiveTimeStamp "id-smime-aa-ets-archiveTimeStamp" -#define NID_id_smime_aa_ets_archiveTimeStamp 238 -#define OBJ_id_smime_aa_ets_archiveTimeStamp OBJ_id_smime_aa,27L - -#define SN_id_smime_aa_signatureType "id-smime-aa-signatureType" -#define NID_id_smime_aa_signatureType 239 -#define OBJ_id_smime_aa_signatureType OBJ_id_smime_aa,28L - -#define SN_id_smime_aa_dvcs_dvc "id-smime-aa-dvcs-dvc" -#define NID_id_smime_aa_dvcs_dvc 240 -#define OBJ_id_smime_aa_dvcs_dvc OBJ_id_smime_aa,29L - -#define SN_id_smime_alg_ESDHwith3DES "id-smime-alg-ESDHwith3DES" -#define NID_id_smime_alg_ESDHwith3DES 241 -#define OBJ_id_smime_alg_ESDHwith3DES OBJ_id_smime_alg,1L - -#define SN_id_smime_alg_ESDHwithRC2 "id-smime-alg-ESDHwithRC2" -#define NID_id_smime_alg_ESDHwithRC2 242 -#define OBJ_id_smime_alg_ESDHwithRC2 OBJ_id_smime_alg,2L - -#define SN_id_smime_alg_3DESwrap "id-smime-alg-3DESwrap" -#define NID_id_smime_alg_3DESwrap 243 -#define OBJ_id_smime_alg_3DESwrap OBJ_id_smime_alg,3L - -#define SN_id_smime_alg_RC2wrap "id-smime-alg-RC2wrap" -#define NID_id_smime_alg_RC2wrap 244 -#define OBJ_id_smime_alg_RC2wrap OBJ_id_smime_alg,4L - -#define SN_id_smime_alg_ESDH "id-smime-alg-ESDH" -#define NID_id_smime_alg_ESDH 245 -#define OBJ_id_smime_alg_ESDH OBJ_id_smime_alg,5L - -#define SN_id_smime_alg_CMS3DESwrap "id-smime-alg-CMS3DESwrap" -#define NID_id_smime_alg_CMS3DESwrap 246 -#define OBJ_id_smime_alg_CMS3DESwrap OBJ_id_smime_alg,6L - -#define SN_id_smime_alg_CMSRC2wrap "id-smime-alg-CMSRC2wrap" -#define NID_id_smime_alg_CMSRC2wrap 247 -#define OBJ_id_smime_alg_CMSRC2wrap OBJ_id_smime_alg,7L - -#define SN_id_alg_PWRI_KEK "id-alg-PWRI-KEK" -#define NID_id_alg_PWRI_KEK 893 -#define OBJ_id_alg_PWRI_KEK OBJ_id_smime_alg,9L - -#define SN_id_smime_cd_ldap "id-smime-cd-ldap" -#define NID_id_smime_cd_ldap 248 -#define OBJ_id_smime_cd_ldap OBJ_id_smime_cd,1L - -#define SN_id_smime_spq_ets_sqt_uri "id-smime-spq-ets-sqt-uri" -#define NID_id_smime_spq_ets_sqt_uri 249 -#define OBJ_id_smime_spq_ets_sqt_uri OBJ_id_smime_spq,1L - -#define SN_id_smime_spq_ets_sqt_unotice "id-smime-spq-ets-sqt-unotice" -#define NID_id_smime_spq_ets_sqt_unotice 250 -#define OBJ_id_smime_spq_ets_sqt_unotice OBJ_id_smime_spq,2L - -#define SN_id_smime_cti_ets_proofOfOrigin "id-smime-cti-ets-proofOfOrigin" -#define NID_id_smime_cti_ets_proofOfOrigin 251 -#define OBJ_id_smime_cti_ets_proofOfOrigin OBJ_id_smime_cti,1L - -#define SN_id_smime_cti_ets_proofOfReceipt "id-smime-cti-ets-proofOfReceipt" -#define NID_id_smime_cti_ets_proofOfReceipt 252 -#define OBJ_id_smime_cti_ets_proofOfReceipt OBJ_id_smime_cti,2L - -#define SN_id_smime_cti_ets_proofOfDelivery "id-smime-cti-ets-proofOfDelivery" -#define NID_id_smime_cti_ets_proofOfDelivery 253 -#define OBJ_id_smime_cti_ets_proofOfDelivery OBJ_id_smime_cti,3L - -#define SN_id_smime_cti_ets_proofOfSender "id-smime-cti-ets-proofOfSender" -#define NID_id_smime_cti_ets_proofOfSender 254 -#define OBJ_id_smime_cti_ets_proofOfSender OBJ_id_smime_cti,4L - -#define SN_id_smime_cti_ets_proofOfApproval "id-smime-cti-ets-proofOfApproval" -#define NID_id_smime_cti_ets_proofOfApproval 255 -#define OBJ_id_smime_cti_ets_proofOfApproval OBJ_id_smime_cti,5L - -#define SN_id_smime_cti_ets_proofOfCreation "id-smime-cti-ets-proofOfCreation" -#define NID_id_smime_cti_ets_proofOfCreation 256 -#define OBJ_id_smime_cti_ets_proofOfCreation OBJ_id_smime_cti,6L - -#define LN_friendlyName "friendlyName" -#define NID_friendlyName 156 -#define OBJ_friendlyName OBJ_pkcs9,20L - -#define LN_localKeyID "localKeyID" -#define NID_localKeyID 157 -#define OBJ_localKeyID OBJ_pkcs9,21L - -#define SN_ms_csp_name "CSPName" -#define LN_ms_csp_name "Microsoft CSP Name" -#define NID_ms_csp_name 417 -#define OBJ_ms_csp_name 1L,3L,6L,1L,4L,1L,311L,17L,1L - -#define SN_LocalKeySet "LocalKeySet" -#define LN_LocalKeySet "Microsoft Local Key set" -#define NID_LocalKeySet 856 -#define OBJ_LocalKeySet 1L,3L,6L,1L,4L,1L,311L,17L,2L - -#define OBJ_certTypes OBJ_pkcs9,22L - -#define LN_x509Certificate "x509Certificate" -#define NID_x509Certificate 158 -#define OBJ_x509Certificate OBJ_certTypes,1L - -#define LN_sdsiCertificate "sdsiCertificate" -#define NID_sdsiCertificate 159 -#define OBJ_sdsiCertificate OBJ_certTypes,2L - -#define OBJ_crlTypes OBJ_pkcs9,23L - -#define LN_x509Crl "x509Crl" -#define NID_x509Crl 160 -#define OBJ_x509Crl OBJ_crlTypes,1L - -#define OBJ_pkcs12 OBJ_pkcs,12L - -#define OBJ_pkcs12_pbeids OBJ_pkcs12,1L - -#define SN_pbe_WithSHA1And128BitRC4 "PBE-SHA1-RC4-128" -#define LN_pbe_WithSHA1And128BitRC4 "pbeWithSHA1And128BitRC4" -#define NID_pbe_WithSHA1And128BitRC4 144 -#define OBJ_pbe_WithSHA1And128BitRC4 OBJ_pkcs12_pbeids,1L - -#define SN_pbe_WithSHA1And40BitRC4 "PBE-SHA1-RC4-40" -#define LN_pbe_WithSHA1And40BitRC4 "pbeWithSHA1And40BitRC4" -#define NID_pbe_WithSHA1And40BitRC4 145 -#define OBJ_pbe_WithSHA1And40BitRC4 OBJ_pkcs12_pbeids,2L - -#define SN_pbe_WithSHA1And3_Key_TripleDES_CBC "PBE-SHA1-3DES" -#define LN_pbe_WithSHA1And3_Key_TripleDES_CBC "pbeWithSHA1And3-KeyTripleDES-CBC" -#define NID_pbe_WithSHA1And3_Key_TripleDES_CBC 146 -#define OBJ_pbe_WithSHA1And3_Key_TripleDES_CBC OBJ_pkcs12_pbeids,3L - -#define SN_pbe_WithSHA1And2_Key_TripleDES_CBC "PBE-SHA1-2DES" -#define LN_pbe_WithSHA1And2_Key_TripleDES_CBC "pbeWithSHA1And2-KeyTripleDES-CBC" -#define NID_pbe_WithSHA1And2_Key_TripleDES_CBC 147 -#define OBJ_pbe_WithSHA1And2_Key_TripleDES_CBC OBJ_pkcs12_pbeids,4L - -#define SN_pbe_WithSHA1And128BitRC2_CBC "PBE-SHA1-RC2-128" -#define LN_pbe_WithSHA1And128BitRC2_CBC "pbeWithSHA1And128BitRC2-CBC" -#define NID_pbe_WithSHA1And128BitRC2_CBC 148 -#define OBJ_pbe_WithSHA1And128BitRC2_CBC OBJ_pkcs12_pbeids,5L - -#define SN_pbe_WithSHA1And40BitRC2_CBC "PBE-SHA1-RC2-40" -#define LN_pbe_WithSHA1And40BitRC2_CBC "pbeWithSHA1And40BitRC2-CBC" -#define NID_pbe_WithSHA1And40BitRC2_CBC 149 -#define OBJ_pbe_WithSHA1And40BitRC2_CBC OBJ_pkcs12_pbeids,6L - -#define OBJ_pkcs12_Version1 OBJ_pkcs12,10L - -#define OBJ_pkcs12_BagIds OBJ_pkcs12_Version1,1L - -#define LN_keyBag "keyBag" -#define NID_keyBag 150 -#define OBJ_keyBag OBJ_pkcs12_BagIds,1L - -#define LN_pkcs8ShroudedKeyBag "pkcs8ShroudedKeyBag" -#define NID_pkcs8ShroudedKeyBag 151 -#define OBJ_pkcs8ShroudedKeyBag OBJ_pkcs12_BagIds,2L - -#define LN_certBag "certBag" -#define NID_certBag 152 -#define OBJ_certBag OBJ_pkcs12_BagIds,3L - -#define LN_crlBag "crlBag" -#define NID_crlBag 153 -#define OBJ_crlBag OBJ_pkcs12_BagIds,4L - -#define LN_secretBag "secretBag" -#define NID_secretBag 154 -#define OBJ_secretBag OBJ_pkcs12_BagIds,5L - -#define LN_safeContentsBag "safeContentsBag" -#define NID_safeContentsBag 155 -#define OBJ_safeContentsBag OBJ_pkcs12_BagIds,6L - -#define SN_md2 "MD2" -#define LN_md2 "md2" -#define NID_md2 3 -#define OBJ_md2 OBJ_rsadsi,2L,2L - -#define SN_md4 "MD4" -#define LN_md4 "md4" -#define NID_md4 257 -#define OBJ_md4 OBJ_rsadsi,2L,4L - -#define SN_md5 "MD5" -#define LN_md5 "md5" -#define NID_md5 4 -#define OBJ_md5 OBJ_rsadsi,2L,5L - -#define SN_md5_sha1 "MD5-SHA1" -#define LN_md5_sha1 "md5-sha1" -#define NID_md5_sha1 114 - -#define LN_hmacWithMD5 "hmacWithMD5" -#define NID_hmacWithMD5 797 -#define OBJ_hmacWithMD5 OBJ_rsadsi,2L,6L - -#define LN_hmacWithSHA1 "hmacWithSHA1" -#define NID_hmacWithSHA1 163 -#define OBJ_hmacWithSHA1 OBJ_rsadsi,2L,7L - -#define LN_hmacWithSHA224 "hmacWithSHA224" -#define NID_hmacWithSHA224 798 -#define OBJ_hmacWithSHA224 OBJ_rsadsi,2L,8L - -#define LN_hmacWithSHA256 "hmacWithSHA256" -#define NID_hmacWithSHA256 799 -#define OBJ_hmacWithSHA256 OBJ_rsadsi,2L,9L - -#define LN_hmacWithSHA384 "hmacWithSHA384" -#define NID_hmacWithSHA384 800 -#define OBJ_hmacWithSHA384 OBJ_rsadsi,2L,10L - -#define LN_hmacWithSHA512 "hmacWithSHA512" -#define NID_hmacWithSHA512 801 -#define OBJ_hmacWithSHA512 OBJ_rsadsi,2L,11L - -#define SN_rc2_cbc "RC2-CBC" -#define LN_rc2_cbc "rc2-cbc" -#define NID_rc2_cbc 37 -#define OBJ_rc2_cbc OBJ_rsadsi,3L,2L - -#define SN_rc2_ecb "RC2-ECB" -#define LN_rc2_ecb "rc2-ecb" -#define NID_rc2_ecb 38 - -#define SN_rc2_cfb64 "RC2-CFB" -#define LN_rc2_cfb64 "rc2-cfb" -#define NID_rc2_cfb64 39 - -#define SN_rc2_ofb64 "RC2-OFB" -#define LN_rc2_ofb64 "rc2-ofb" -#define NID_rc2_ofb64 40 - -#define SN_rc2_40_cbc "RC2-40-CBC" -#define LN_rc2_40_cbc "rc2-40-cbc" -#define NID_rc2_40_cbc 98 - -#define SN_rc2_64_cbc "RC2-64-CBC" -#define LN_rc2_64_cbc "rc2-64-cbc" -#define NID_rc2_64_cbc 166 - -#define SN_rc4 "RC4" -#define LN_rc4 "rc4" -#define NID_rc4 5 -#define OBJ_rc4 OBJ_rsadsi,3L,4L - -#define SN_rc4_40 "RC4-40" -#define LN_rc4_40 "rc4-40" -#define NID_rc4_40 97 - -#define SN_des_ede3_cbc "DES-EDE3-CBC" -#define LN_des_ede3_cbc "des-ede3-cbc" -#define NID_des_ede3_cbc 44 -#define OBJ_des_ede3_cbc OBJ_rsadsi,3L,7L - -#define SN_rc5_cbc "RC5-CBC" -#define LN_rc5_cbc "rc5-cbc" -#define NID_rc5_cbc 120 -#define OBJ_rc5_cbc OBJ_rsadsi,3L,8L - -#define SN_rc5_ecb "RC5-ECB" -#define LN_rc5_ecb "rc5-ecb" -#define NID_rc5_ecb 121 - -#define SN_rc5_cfb64 "RC5-CFB" -#define LN_rc5_cfb64 "rc5-cfb" -#define NID_rc5_cfb64 122 - -#define SN_rc5_ofb64 "RC5-OFB" -#define LN_rc5_ofb64 "rc5-ofb" -#define NID_rc5_ofb64 123 - -#define SN_ms_ext_req "msExtReq" -#define LN_ms_ext_req "Microsoft Extension Request" -#define NID_ms_ext_req 171 -#define OBJ_ms_ext_req 1L,3L,6L,1L,4L,1L,311L,2L,1L,14L - -#define SN_ms_code_ind "msCodeInd" -#define LN_ms_code_ind "Microsoft Individual Code Signing" -#define NID_ms_code_ind 134 -#define OBJ_ms_code_ind 1L,3L,6L,1L,4L,1L,311L,2L,1L,21L - -#define SN_ms_code_com "msCodeCom" -#define LN_ms_code_com "Microsoft Commercial Code Signing" -#define NID_ms_code_com 135 -#define OBJ_ms_code_com 1L,3L,6L,1L,4L,1L,311L,2L,1L,22L - -#define SN_ms_ctl_sign "msCTLSign" -#define LN_ms_ctl_sign "Microsoft Trust List Signing" -#define NID_ms_ctl_sign 136 -#define OBJ_ms_ctl_sign 1L,3L,6L,1L,4L,1L,311L,10L,3L,1L - -#define SN_ms_sgc "msSGC" -#define LN_ms_sgc "Microsoft Server Gated Crypto" -#define NID_ms_sgc 137 -#define OBJ_ms_sgc 1L,3L,6L,1L,4L,1L,311L,10L,3L,3L - -#define SN_ms_efs "msEFS" -#define LN_ms_efs "Microsoft Encrypted File System" -#define NID_ms_efs 138 -#define OBJ_ms_efs 1L,3L,6L,1L,4L,1L,311L,10L,3L,4L - -#define SN_ms_smartcard_login "msSmartcardLogin" -#define LN_ms_smartcard_login "Microsoft Smartcardlogin" -#define NID_ms_smartcard_login 648 -#define OBJ_ms_smartcard_login 1L,3L,6L,1L,4L,1L,311L,20L,2L,2L - -#define SN_ms_upn "msUPN" -#define LN_ms_upn "Microsoft Universal Principal Name" -#define NID_ms_upn 649 -#define OBJ_ms_upn 1L,3L,6L,1L,4L,1L,311L,20L,2L,3L - -#define SN_idea_cbc "IDEA-CBC" -#define LN_idea_cbc "idea-cbc" -#define NID_idea_cbc 34 -#define OBJ_idea_cbc 1L,3L,6L,1L,4L,1L,188L,7L,1L,1L,2L - -#define SN_idea_ecb "IDEA-ECB" -#define LN_idea_ecb "idea-ecb" -#define NID_idea_ecb 36 - -#define SN_idea_cfb64 "IDEA-CFB" -#define LN_idea_cfb64 "idea-cfb" -#define NID_idea_cfb64 35 - -#define SN_idea_ofb64 "IDEA-OFB" -#define LN_idea_ofb64 "idea-ofb" -#define NID_idea_ofb64 46 - -#define SN_bf_cbc "BF-CBC" -#define LN_bf_cbc "bf-cbc" -#define NID_bf_cbc 91 -#define OBJ_bf_cbc 1L,3L,6L,1L,4L,1L,3029L,1L,2L - -#define SN_bf_ecb "BF-ECB" -#define LN_bf_ecb "bf-ecb" -#define NID_bf_ecb 92 - -#define SN_bf_cfb64 "BF-CFB" -#define LN_bf_cfb64 "bf-cfb" -#define NID_bf_cfb64 93 - -#define SN_bf_ofb64 "BF-OFB" -#define LN_bf_ofb64 "bf-ofb" -#define NID_bf_ofb64 94 - -#define SN_id_pkix "PKIX" -#define NID_id_pkix 127 -#define OBJ_id_pkix 1L,3L,6L,1L,5L,5L,7L - -#define SN_id_pkix_mod "id-pkix-mod" -#define NID_id_pkix_mod 258 -#define OBJ_id_pkix_mod OBJ_id_pkix,0L - -#define SN_id_pe "id-pe" -#define NID_id_pe 175 -#define OBJ_id_pe OBJ_id_pkix,1L - -#define SN_id_qt "id-qt" -#define NID_id_qt 259 -#define OBJ_id_qt OBJ_id_pkix,2L - -#define SN_id_kp "id-kp" -#define NID_id_kp 128 -#define OBJ_id_kp OBJ_id_pkix,3L - -#define SN_id_it "id-it" -#define NID_id_it 260 -#define OBJ_id_it OBJ_id_pkix,4L - -#define SN_id_pkip "id-pkip" -#define NID_id_pkip 261 -#define OBJ_id_pkip OBJ_id_pkix,5L - -#define SN_id_alg "id-alg" -#define NID_id_alg 262 -#define OBJ_id_alg OBJ_id_pkix,6L - -#define SN_id_cmc "id-cmc" -#define NID_id_cmc 263 -#define OBJ_id_cmc OBJ_id_pkix,7L - -#define SN_id_on "id-on" -#define NID_id_on 264 -#define OBJ_id_on OBJ_id_pkix,8L - -#define SN_id_pda "id-pda" -#define NID_id_pda 265 -#define OBJ_id_pda OBJ_id_pkix,9L - -#define SN_id_aca "id-aca" -#define NID_id_aca 266 -#define OBJ_id_aca OBJ_id_pkix,10L - -#define SN_id_qcs "id-qcs" -#define NID_id_qcs 267 -#define OBJ_id_qcs OBJ_id_pkix,11L - -#define SN_id_cct "id-cct" -#define NID_id_cct 268 -#define OBJ_id_cct OBJ_id_pkix,12L - -#define SN_id_ppl "id-ppl" -#define NID_id_ppl 662 -#define OBJ_id_ppl OBJ_id_pkix,21L - -#define SN_id_ad "id-ad" -#define NID_id_ad 176 -#define OBJ_id_ad OBJ_id_pkix,48L - -#define SN_id_pkix1_explicit_88 "id-pkix1-explicit-88" -#define NID_id_pkix1_explicit_88 269 -#define OBJ_id_pkix1_explicit_88 OBJ_id_pkix_mod,1L - -#define SN_id_pkix1_implicit_88 "id-pkix1-implicit-88" -#define NID_id_pkix1_implicit_88 270 -#define OBJ_id_pkix1_implicit_88 OBJ_id_pkix_mod,2L - -#define SN_id_pkix1_explicit_93 "id-pkix1-explicit-93" -#define NID_id_pkix1_explicit_93 271 -#define OBJ_id_pkix1_explicit_93 OBJ_id_pkix_mod,3L - -#define SN_id_pkix1_implicit_93 "id-pkix1-implicit-93" -#define NID_id_pkix1_implicit_93 272 -#define OBJ_id_pkix1_implicit_93 OBJ_id_pkix_mod,4L - -#define SN_id_mod_crmf "id-mod-crmf" -#define NID_id_mod_crmf 273 -#define OBJ_id_mod_crmf OBJ_id_pkix_mod,5L - -#define SN_id_mod_cmc "id-mod-cmc" -#define NID_id_mod_cmc 274 -#define OBJ_id_mod_cmc OBJ_id_pkix_mod,6L - -#define SN_id_mod_kea_profile_88 "id-mod-kea-profile-88" -#define NID_id_mod_kea_profile_88 275 -#define OBJ_id_mod_kea_profile_88 OBJ_id_pkix_mod,7L - -#define SN_id_mod_kea_profile_93 "id-mod-kea-profile-93" -#define NID_id_mod_kea_profile_93 276 -#define OBJ_id_mod_kea_profile_93 OBJ_id_pkix_mod,8L - -#define SN_id_mod_cmp "id-mod-cmp" -#define NID_id_mod_cmp 277 -#define OBJ_id_mod_cmp OBJ_id_pkix_mod,9L - -#define SN_id_mod_qualified_cert_88 "id-mod-qualified-cert-88" -#define NID_id_mod_qualified_cert_88 278 -#define OBJ_id_mod_qualified_cert_88 OBJ_id_pkix_mod,10L - -#define SN_id_mod_qualified_cert_93 "id-mod-qualified-cert-93" -#define NID_id_mod_qualified_cert_93 279 -#define OBJ_id_mod_qualified_cert_93 OBJ_id_pkix_mod,11L - -#define SN_id_mod_attribute_cert "id-mod-attribute-cert" -#define NID_id_mod_attribute_cert 280 -#define OBJ_id_mod_attribute_cert OBJ_id_pkix_mod,12L - -#define SN_id_mod_timestamp_protocol "id-mod-timestamp-protocol" -#define NID_id_mod_timestamp_protocol 281 -#define OBJ_id_mod_timestamp_protocol OBJ_id_pkix_mod,13L - -#define SN_id_mod_ocsp "id-mod-ocsp" -#define NID_id_mod_ocsp 282 -#define OBJ_id_mod_ocsp OBJ_id_pkix_mod,14L - -#define SN_id_mod_dvcs "id-mod-dvcs" -#define NID_id_mod_dvcs 283 -#define OBJ_id_mod_dvcs OBJ_id_pkix_mod,15L - -#define SN_id_mod_cmp2000 "id-mod-cmp2000" -#define NID_id_mod_cmp2000 284 -#define OBJ_id_mod_cmp2000 OBJ_id_pkix_mod,16L - -#define SN_info_access "authorityInfoAccess" -#define LN_info_access "Authority Information Access" -#define NID_info_access 177 -#define OBJ_info_access OBJ_id_pe,1L - -#define SN_biometricInfo "biometricInfo" -#define LN_biometricInfo "Biometric Info" -#define NID_biometricInfo 285 -#define OBJ_biometricInfo OBJ_id_pe,2L - -#define SN_qcStatements "qcStatements" -#define NID_qcStatements 286 -#define OBJ_qcStatements OBJ_id_pe,3L - -#define SN_ac_auditEntity "ac-auditEntity" -#define NID_ac_auditEntity 287 -#define OBJ_ac_auditEntity OBJ_id_pe,4L - -#define SN_ac_targeting "ac-targeting" -#define NID_ac_targeting 288 -#define OBJ_ac_targeting OBJ_id_pe,5L - -#define SN_aaControls "aaControls" -#define NID_aaControls 289 -#define OBJ_aaControls OBJ_id_pe,6L - -#define SN_sbgp_ipAddrBlock "sbgp-ipAddrBlock" -#define NID_sbgp_ipAddrBlock 290 -#define OBJ_sbgp_ipAddrBlock OBJ_id_pe,7L - -#define SN_sbgp_autonomousSysNum "sbgp-autonomousSysNum" -#define NID_sbgp_autonomousSysNum 291 -#define OBJ_sbgp_autonomousSysNum OBJ_id_pe,8L - -#define SN_sbgp_routerIdentifier "sbgp-routerIdentifier" -#define NID_sbgp_routerIdentifier 292 -#define OBJ_sbgp_routerIdentifier OBJ_id_pe,9L - -#define SN_ac_proxying "ac-proxying" -#define NID_ac_proxying 397 -#define OBJ_ac_proxying OBJ_id_pe,10L - -#define SN_sinfo_access "subjectInfoAccess" -#define LN_sinfo_access "Subject Information Access" -#define NID_sinfo_access 398 -#define OBJ_sinfo_access OBJ_id_pe,11L - -#define SN_proxyCertInfo "proxyCertInfo" -#define LN_proxyCertInfo "Proxy Certificate Information" -#define NID_proxyCertInfo 663 -#define OBJ_proxyCertInfo OBJ_id_pe,14L - -#define SN_id_qt_cps "id-qt-cps" -#define LN_id_qt_cps "Policy Qualifier CPS" -#define NID_id_qt_cps 164 -#define OBJ_id_qt_cps OBJ_id_qt,1L - -#define SN_id_qt_unotice "id-qt-unotice" -#define LN_id_qt_unotice "Policy Qualifier User Notice" -#define NID_id_qt_unotice 165 -#define OBJ_id_qt_unotice OBJ_id_qt,2L - -#define SN_textNotice "textNotice" -#define NID_textNotice 293 -#define OBJ_textNotice OBJ_id_qt,3L - -#define SN_server_auth "serverAuth" -#define LN_server_auth "TLS Web Server Authentication" -#define NID_server_auth 129 -#define OBJ_server_auth OBJ_id_kp,1L - -#define SN_client_auth "clientAuth" -#define LN_client_auth "TLS Web Client Authentication" -#define NID_client_auth 130 -#define OBJ_client_auth OBJ_id_kp,2L - -#define SN_code_sign "codeSigning" -#define LN_code_sign "Code Signing" -#define NID_code_sign 131 -#define OBJ_code_sign OBJ_id_kp,3L - -#define SN_email_protect "emailProtection" -#define LN_email_protect "E-mail Protection" -#define NID_email_protect 132 -#define OBJ_email_protect OBJ_id_kp,4L - -#define SN_ipsecEndSystem "ipsecEndSystem" -#define LN_ipsecEndSystem "IPSec End System" -#define NID_ipsecEndSystem 294 -#define OBJ_ipsecEndSystem OBJ_id_kp,5L - -#define SN_ipsecTunnel "ipsecTunnel" -#define LN_ipsecTunnel "IPSec Tunnel" -#define NID_ipsecTunnel 295 -#define OBJ_ipsecTunnel OBJ_id_kp,6L - -#define SN_ipsecUser "ipsecUser" -#define LN_ipsecUser "IPSec User" -#define NID_ipsecUser 296 -#define OBJ_ipsecUser OBJ_id_kp,7L - -#define SN_time_stamp "timeStamping" -#define LN_time_stamp "Time Stamping" -#define NID_time_stamp 133 -#define OBJ_time_stamp OBJ_id_kp,8L - -#define SN_OCSP_sign "OCSPSigning" -#define LN_OCSP_sign "OCSP Signing" -#define NID_OCSP_sign 180 -#define OBJ_OCSP_sign OBJ_id_kp,9L - -#define SN_dvcs "DVCS" -#define LN_dvcs "dvcs" -#define NID_dvcs 297 -#define OBJ_dvcs OBJ_id_kp,10L - -#define SN_id_it_caProtEncCert "id-it-caProtEncCert" -#define NID_id_it_caProtEncCert 298 -#define OBJ_id_it_caProtEncCert OBJ_id_it,1L - -#define SN_id_it_signKeyPairTypes "id-it-signKeyPairTypes" -#define NID_id_it_signKeyPairTypes 299 -#define OBJ_id_it_signKeyPairTypes OBJ_id_it,2L - -#define SN_id_it_encKeyPairTypes "id-it-encKeyPairTypes" -#define NID_id_it_encKeyPairTypes 300 -#define OBJ_id_it_encKeyPairTypes OBJ_id_it,3L - -#define SN_id_it_preferredSymmAlg "id-it-preferredSymmAlg" -#define NID_id_it_preferredSymmAlg 301 -#define OBJ_id_it_preferredSymmAlg OBJ_id_it,4L - -#define SN_id_it_caKeyUpdateInfo "id-it-caKeyUpdateInfo" -#define NID_id_it_caKeyUpdateInfo 302 -#define OBJ_id_it_caKeyUpdateInfo OBJ_id_it,5L - -#define SN_id_it_currentCRL "id-it-currentCRL" -#define NID_id_it_currentCRL 303 -#define OBJ_id_it_currentCRL OBJ_id_it,6L - -#define SN_id_it_unsupportedOIDs "id-it-unsupportedOIDs" -#define NID_id_it_unsupportedOIDs 304 -#define OBJ_id_it_unsupportedOIDs OBJ_id_it,7L - -#define SN_id_it_subscriptionRequest "id-it-subscriptionRequest" -#define NID_id_it_subscriptionRequest 305 -#define OBJ_id_it_subscriptionRequest OBJ_id_it,8L - -#define SN_id_it_subscriptionResponse "id-it-subscriptionResponse" -#define NID_id_it_subscriptionResponse 306 -#define OBJ_id_it_subscriptionResponse OBJ_id_it,9L - -#define SN_id_it_keyPairParamReq "id-it-keyPairParamReq" -#define NID_id_it_keyPairParamReq 307 -#define OBJ_id_it_keyPairParamReq OBJ_id_it,10L - -#define SN_id_it_keyPairParamRep "id-it-keyPairParamRep" -#define NID_id_it_keyPairParamRep 308 -#define OBJ_id_it_keyPairParamRep OBJ_id_it,11L - -#define SN_id_it_revPassphrase "id-it-revPassphrase" -#define NID_id_it_revPassphrase 309 -#define OBJ_id_it_revPassphrase OBJ_id_it,12L - -#define SN_id_it_implicitConfirm "id-it-implicitConfirm" -#define NID_id_it_implicitConfirm 310 -#define OBJ_id_it_implicitConfirm OBJ_id_it,13L - -#define SN_id_it_confirmWaitTime "id-it-confirmWaitTime" -#define NID_id_it_confirmWaitTime 311 -#define OBJ_id_it_confirmWaitTime OBJ_id_it,14L - -#define SN_id_it_origPKIMessage "id-it-origPKIMessage" -#define NID_id_it_origPKIMessage 312 -#define OBJ_id_it_origPKIMessage OBJ_id_it,15L - -#define SN_id_it_suppLangTags "id-it-suppLangTags" -#define NID_id_it_suppLangTags 784 -#define OBJ_id_it_suppLangTags OBJ_id_it,16L - -#define SN_id_regCtrl "id-regCtrl" -#define NID_id_regCtrl 313 -#define OBJ_id_regCtrl OBJ_id_pkip,1L - -#define SN_id_regInfo "id-regInfo" -#define NID_id_regInfo 314 -#define OBJ_id_regInfo OBJ_id_pkip,2L - -#define SN_id_regCtrl_regToken "id-regCtrl-regToken" -#define NID_id_regCtrl_regToken 315 -#define OBJ_id_regCtrl_regToken OBJ_id_regCtrl,1L - -#define SN_id_regCtrl_authenticator "id-regCtrl-authenticator" -#define NID_id_regCtrl_authenticator 316 -#define OBJ_id_regCtrl_authenticator OBJ_id_regCtrl,2L - -#define SN_id_regCtrl_pkiPublicationInfo "id-regCtrl-pkiPublicationInfo" -#define NID_id_regCtrl_pkiPublicationInfo 317 -#define OBJ_id_regCtrl_pkiPublicationInfo OBJ_id_regCtrl,3L - -#define SN_id_regCtrl_pkiArchiveOptions "id-regCtrl-pkiArchiveOptions" -#define NID_id_regCtrl_pkiArchiveOptions 318 -#define OBJ_id_regCtrl_pkiArchiveOptions OBJ_id_regCtrl,4L - -#define SN_id_regCtrl_oldCertID "id-regCtrl-oldCertID" -#define NID_id_regCtrl_oldCertID 319 -#define OBJ_id_regCtrl_oldCertID OBJ_id_regCtrl,5L - -#define SN_id_regCtrl_protocolEncrKey "id-regCtrl-protocolEncrKey" -#define NID_id_regCtrl_protocolEncrKey 320 -#define OBJ_id_regCtrl_protocolEncrKey OBJ_id_regCtrl,6L - -#define SN_id_regInfo_utf8Pairs "id-regInfo-utf8Pairs" -#define NID_id_regInfo_utf8Pairs 321 -#define OBJ_id_regInfo_utf8Pairs OBJ_id_regInfo,1L - -#define SN_id_regInfo_certReq "id-regInfo-certReq" -#define NID_id_regInfo_certReq 322 -#define OBJ_id_regInfo_certReq OBJ_id_regInfo,2L - -#define SN_id_alg_des40 "id-alg-des40" -#define NID_id_alg_des40 323 -#define OBJ_id_alg_des40 OBJ_id_alg,1L - -#define SN_id_alg_noSignature "id-alg-noSignature" -#define NID_id_alg_noSignature 324 -#define OBJ_id_alg_noSignature OBJ_id_alg,2L - -#define SN_id_alg_dh_sig_hmac_sha1 "id-alg-dh-sig-hmac-sha1" -#define NID_id_alg_dh_sig_hmac_sha1 325 -#define OBJ_id_alg_dh_sig_hmac_sha1 OBJ_id_alg,3L - -#define SN_id_alg_dh_pop "id-alg-dh-pop" -#define NID_id_alg_dh_pop 326 -#define OBJ_id_alg_dh_pop OBJ_id_alg,4L - -#define SN_id_cmc_statusInfo "id-cmc-statusInfo" -#define NID_id_cmc_statusInfo 327 -#define OBJ_id_cmc_statusInfo OBJ_id_cmc,1L - -#define SN_id_cmc_identification "id-cmc-identification" -#define NID_id_cmc_identification 328 -#define OBJ_id_cmc_identification OBJ_id_cmc,2L - -#define SN_id_cmc_identityProof "id-cmc-identityProof" -#define NID_id_cmc_identityProof 329 -#define OBJ_id_cmc_identityProof OBJ_id_cmc,3L - -#define SN_id_cmc_dataReturn "id-cmc-dataReturn" -#define NID_id_cmc_dataReturn 330 -#define OBJ_id_cmc_dataReturn OBJ_id_cmc,4L - -#define SN_id_cmc_transactionId "id-cmc-transactionId" -#define NID_id_cmc_transactionId 331 -#define OBJ_id_cmc_transactionId OBJ_id_cmc,5L - -#define SN_id_cmc_senderNonce "id-cmc-senderNonce" -#define NID_id_cmc_senderNonce 332 -#define OBJ_id_cmc_senderNonce OBJ_id_cmc,6L - -#define SN_id_cmc_recipientNonce "id-cmc-recipientNonce" -#define NID_id_cmc_recipientNonce 333 -#define OBJ_id_cmc_recipientNonce OBJ_id_cmc,7L - -#define SN_id_cmc_addExtensions "id-cmc-addExtensions" -#define NID_id_cmc_addExtensions 334 -#define OBJ_id_cmc_addExtensions OBJ_id_cmc,8L - -#define SN_id_cmc_encryptedPOP "id-cmc-encryptedPOP" -#define NID_id_cmc_encryptedPOP 335 -#define OBJ_id_cmc_encryptedPOP OBJ_id_cmc,9L - -#define SN_id_cmc_decryptedPOP "id-cmc-decryptedPOP" -#define NID_id_cmc_decryptedPOP 336 -#define OBJ_id_cmc_decryptedPOP OBJ_id_cmc,10L - -#define SN_id_cmc_lraPOPWitness "id-cmc-lraPOPWitness" -#define NID_id_cmc_lraPOPWitness 337 -#define OBJ_id_cmc_lraPOPWitness OBJ_id_cmc,11L - -#define SN_id_cmc_getCert "id-cmc-getCert" -#define NID_id_cmc_getCert 338 -#define OBJ_id_cmc_getCert OBJ_id_cmc,15L - -#define SN_id_cmc_getCRL "id-cmc-getCRL" -#define NID_id_cmc_getCRL 339 -#define OBJ_id_cmc_getCRL OBJ_id_cmc,16L - -#define SN_id_cmc_revokeRequest "id-cmc-revokeRequest" -#define NID_id_cmc_revokeRequest 340 -#define OBJ_id_cmc_revokeRequest OBJ_id_cmc,17L - -#define SN_id_cmc_regInfo "id-cmc-regInfo" -#define NID_id_cmc_regInfo 341 -#define OBJ_id_cmc_regInfo OBJ_id_cmc,18L - -#define SN_id_cmc_responseInfo "id-cmc-responseInfo" -#define NID_id_cmc_responseInfo 342 -#define OBJ_id_cmc_responseInfo OBJ_id_cmc,19L - -#define SN_id_cmc_queryPending "id-cmc-queryPending" -#define NID_id_cmc_queryPending 343 -#define OBJ_id_cmc_queryPending OBJ_id_cmc,21L - -#define SN_id_cmc_popLinkRandom "id-cmc-popLinkRandom" -#define NID_id_cmc_popLinkRandom 344 -#define OBJ_id_cmc_popLinkRandom OBJ_id_cmc,22L - -#define SN_id_cmc_popLinkWitness "id-cmc-popLinkWitness" -#define NID_id_cmc_popLinkWitness 345 -#define OBJ_id_cmc_popLinkWitness OBJ_id_cmc,23L - -#define SN_id_cmc_confirmCertAcceptance "id-cmc-confirmCertAcceptance" -#define NID_id_cmc_confirmCertAcceptance 346 -#define OBJ_id_cmc_confirmCertAcceptance OBJ_id_cmc,24L - -#define SN_id_on_personalData "id-on-personalData" -#define NID_id_on_personalData 347 -#define OBJ_id_on_personalData OBJ_id_on,1L - -#define SN_id_on_permanentIdentifier "id-on-permanentIdentifier" -#define LN_id_on_permanentIdentifier "Permanent Identifier" -#define NID_id_on_permanentIdentifier 858 -#define OBJ_id_on_permanentIdentifier OBJ_id_on,3L - -#define SN_id_pda_dateOfBirth "id-pda-dateOfBirth" -#define NID_id_pda_dateOfBirth 348 -#define OBJ_id_pda_dateOfBirth OBJ_id_pda,1L - -#define SN_id_pda_placeOfBirth "id-pda-placeOfBirth" -#define NID_id_pda_placeOfBirth 349 -#define OBJ_id_pda_placeOfBirth OBJ_id_pda,2L - -#define SN_id_pda_gender "id-pda-gender" -#define NID_id_pda_gender 351 -#define OBJ_id_pda_gender OBJ_id_pda,3L - -#define SN_id_pda_countryOfCitizenship "id-pda-countryOfCitizenship" -#define NID_id_pda_countryOfCitizenship 352 -#define OBJ_id_pda_countryOfCitizenship OBJ_id_pda,4L - -#define SN_id_pda_countryOfResidence "id-pda-countryOfResidence" -#define NID_id_pda_countryOfResidence 353 -#define OBJ_id_pda_countryOfResidence OBJ_id_pda,5L - -#define SN_id_aca_authenticationInfo "id-aca-authenticationInfo" -#define NID_id_aca_authenticationInfo 354 -#define OBJ_id_aca_authenticationInfo OBJ_id_aca,1L - -#define SN_id_aca_accessIdentity "id-aca-accessIdentity" -#define NID_id_aca_accessIdentity 355 -#define OBJ_id_aca_accessIdentity OBJ_id_aca,2L - -#define SN_id_aca_chargingIdentity "id-aca-chargingIdentity" -#define NID_id_aca_chargingIdentity 356 -#define OBJ_id_aca_chargingIdentity OBJ_id_aca,3L - -#define SN_id_aca_group "id-aca-group" -#define NID_id_aca_group 357 -#define OBJ_id_aca_group OBJ_id_aca,4L - -#define SN_id_aca_role "id-aca-role" -#define NID_id_aca_role 358 -#define OBJ_id_aca_role OBJ_id_aca,5L - -#define SN_id_aca_encAttrs "id-aca-encAttrs" -#define NID_id_aca_encAttrs 399 -#define OBJ_id_aca_encAttrs OBJ_id_aca,6L - -#define SN_id_qcs_pkixQCSyntax_v1 "id-qcs-pkixQCSyntax-v1" -#define NID_id_qcs_pkixQCSyntax_v1 359 -#define OBJ_id_qcs_pkixQCSyntax_v1 OBJ_id_qcs,1L - -#define SN_id_cct_crs "id-cct-crs" -#define NID_id_cct_crs 360 -#define OBJ_id_cct_crs OBJ_id_cct,1L - -#define SN_id_cct_PKIData "id-cct-PKIData" -#define NID_id_cct_PKIData 361 -#define OBJ_id_cct_PKIData OBJ_id_cct,2L - -#define SN_id_cct_PKIResponse "id-cct-PKIResponse" -#define NID_id_cct_PKIResponse 362 -#define OBJ_id_cct_PKIResponse OBJ_id_cct,3L - -#define SN_id_ppl_anyLanguage "id-ppl-anyLanguage" -#define LN_id_ppl_anyLanguage "Any language" -#define NID_id_ppl_anyLanguage 664 -#define OBJ_id_ppl_anyLanguage OBJ_id_ppl,0L - -#define SN_id_ppl_inheritAll "id-ppl-inheritAll" -#define LN_id_ppl_inheritAll "Inherit all" -#define NID_id_ppl_inheritAll 665 -#define OBJ_id_ppl_inheritAll OBJ_id_ppl,1L - -#define SN_Independent "id-ppl-independent" -#define LN_Independent "Independent" -#define NID_Independent 667 -#define OBJ_Independent OBJ_id_ppl,2L - -#define SN_ad_OCSP "OCSP" -#define LN_ad_OCSP "OCSP" -#define NID_ad_OCSP 178 -#define OBJ_ad_OCSP OBJ_id_ad,1L - -#define SN_ad_ca_issuers "caIssuers" -#define LN_ad_ca_issuers "CA Issuers" -#define NID_ad_ca_issuers 179 -#define OBJ_ad_ca_issuers OBJ_id_ad,2L - -#define SN_ad_timeStamping "ad_timestamping" -#define LN_ad_timeStamping "AD Time Stamping" -#define NID_ad_timeStamping 363 -#define OBJ_ad_timeStamping OBJ_id_ad,3L - -#define SN_ad_dvcs "AD_DVCS" -#define LN_ad_dvcs "ad dvcs" -#define NID_ad_dvcs 364 -#define OBJ_ad_dvcs OBJ_id_ad,4L - -#define SN_caRepository "caRepository" -#define LN_caRepository "CA Repository" -#define NID_caRepository 785 -#define OBJ_caRepository OBJ_id_ad,5L - -#define OBJ_id_pkix_OCSP OBJ_ad_OCSP - -#define SN_id_pkix_OCSP_basic "basicOCSPResponse" -#define LN_id_pkix_OCSP_basic "Basic OCSP Response" -#define NID_id_pkix_OCSP_basic 365 -#define OBJ_id_pkix_OCSP_basic OBJ_id_pkix_OCSP,1L - -#define SN_id_pkix_OCSP_Nonce "Nonce" -#define LN_id_pkix_OCSP_Nonce "OCSP Nonce" -#define NID_id_pkix_OCSP_Nonce 366 -#define OBJ_id_pkix_OCSP_Nonce OBJ_id_pkix_OCSP,2L - -#define SN_id_pkix_OCSP_CrlID "CrlID" -#define LN_id_pkix_OCSP_CrlID "OCSP CRL ID" -#define NID_id_pkix_OCSP_CrlID 367 -#define OBJ_id_pkix_OCSP_CrlID OBJ_id_pkix_OCSP,3L - -#define SN_id_pkix_OCSP_acceptableResponses "acceptableResponses" -#define LN_id_pkix_OCSP_acceptableResponses "Acceptable OCSP Responses" -#define NID_id_pkix_OCSP_acceptableResponses 368 -#define OBJ_id_pkix_OCSP_acceptableResponses OBJ_id_pkix_OCSP,4L - -#define SN_id_pkix_OCSP_noCheck "noCheck" -#define LN_id_pkix_OCSP_noCheck "OCSP No Check" -#define NID_id_pkix_OCSP_noCheck 369 -#define OBJ_id_pkix_OCSP_noCheck OBJ_id_pkix_OCSP,5L - -#define SN_id_pkix_OCSP_archiveCutoff "archiveCutoff" -#define LN_id_pkix_OCSP_archiveCutoff "OCSP Archive Cutoff" -#define NID_id_pkix_OCSP_archiveCutoff 370 -#define OBJ_id_pkix_OCSP_archiveCutoff OBJ_id_pkix_OCSP,6L - -#define SN_id_pkix_OCSP_serviceLocator "serviceLocator" -#define LN_id_pkix_OCSP_serviceLocator "OCSP Service Locator" -#define NID_id_pkix_OCSP_serviceLocator 371 -#define OBJ_id_pkix_OCSP_serviceLocator OBJ_id_pkix_OCSP,7L - -#define SN_id_pkix_OCSP_extendedStatus "extendedStatus" -#define LN_id_pkix_OCSP_extendedStatus "Extended OCSP Status" -#define NID_id_pkix_OCSP_extendedStatus 372 -#define OBJ_id_pkix_OCSP_extendedStatus OBJ_id_pkix_OCSP,8L - -#define SN_id_pkix_OCSP_valid "valid" -#define NID_id_pkix_OCSP_valid 373 -#define OBJ_id_pkix_OCSP_valid OBJ_id_pkix_OCSP,9L - -#define SN_id_pkix_OCSP_path "path" -#define NID_id_pkix_OCSP_path 374 -#define OBJ_id_pkix_OCSP_path OBJ_id_pkix_OCSP,10L - -#define SN_id_pkix_OCSP_trustRoot "trustRoot" -#define LN_id_pkix_OCSP_trustRoot "Trust Root" -#define NID_id_pkix_OCSP_trustRoot 375 -#define OBJ_id_pkix_OCSP_trustRoot OBJ_id_pkix_OCSP,11L - -#define SN_algorithm "algorithm" -#define LN_algorithm "algorithm" -#define NID_algorithm 376 -#define OBJ_algorithm 1L,3L,14L,3L,2L - -#define SN_md5WithRSA "RSA-NP-MD5" -#define LN_md5WithRSA "md5WithRSA" -#define NID_md5WithRSA 104 -#define OBJ_md5WithRSA OBJ_algorithm,3L - -#define SN_des_ecb "DES-ECB" -#define LN_des_ecb "des-ecb" -#define NID_des_ecb 29 -#define OBJ_des_ecb OBJ_algorithm,6L - -#define SN_des_cbc "DES-CBC" -#define LN_des_cbc "des-cbc" -#define NID_des_cbc 31 -#define OBJ_des_cbc OBJ_algorithm,7L - -#define SN_des_ofb64 "DES-OFB" -#define LN_des_ofb64 "des-ofb" -#define NID_des_ofb64 45 -#define OBJ_des_ofb64 OBJ_algorithm,8L - -#define SN_des_cfb64 "DES-CFB" -#define LN_des_cfb64 "des-cfb" -#define NID_des_cfb64 30 -#define OBJ_des_cfb64 OBJ_algorithm,9L - -#define SN_rsaSignature "rsaSignature" -#define NID_rsaSignature 377 -#define OBJ_rsaSignature OBJ_algorithm,11L - -#define SN_dsa_2 "DSA-old" -#define LN_dsa_2 "dsaEncryption-old" -#define NID_dsa_2 67 -#define OBJ_dsa_2 OBJ_algorithm,12L - -#define SN_dsaWithSHA "DSA-SHA" -#define LN_dsaWithSHA "dsaWithSHA" -#define NID_dsaWithSHA 66 -#define OBJ_dsaWithSHA OBJ_algorithm,13L - -#define SN_shaWithRSAEncryption "RSA-SHA" -#define LN_shaWithRSAEncryption "shaWithRSAEncryption" -#define NID_shaWithRSAEncryption 42 -#define OBJ_shaWithRSAEncryption OBJ_algorithm,15L - -#define SN_des_ede_ecb "DES-EDE" -#define LN_des_ede_ecb "des-ede" -#define NID_des_ede_ecb 32 -#define OBJ_des_ede_ecb OBJ_algorithm,17L - -#define SN_des_ede3_ecb "DES-EDE3" -#define LN_des_ede3_ecb "des-ede3" -#define NID_des_ede3_ecb 33 - -#define SN_des_ede_cbc "DES-EDE-CBC" -#define LN_des_ede_cbc "des-ede-cbc" -#define NID_des_ede_cbc 43 - -#define SN_des_ede_cfb64 "DES-EDE-CFB" -#define LN_des_ede_cfb64 "des-ede-cfb" -#define NID_des_ede_cfb64 60 - -#define SN_des_ede3_cfb64 "DES-EDE3-CFB" -#define LN_des_ede3_cfb64 "des-ede3-cfb" -#define NID_des_ede3_cfb64 61 - -#define SN_des_ede_ofb64 "DES-EDE-OFB" -#define LN_des_ede_ofb64 "des-ede-ofb" -#define NID_des_ede_ofb64 62 - -#define SN_des_ede3_ofb64 "DES-EDE3-OFB" -#define LN_des_ede3_ofb64 "des-ede3-ofb" -#define NID_des_ede3_ofb64 63 - -#define SN_desx_cbc "DESX-CBC" -#define LN_desx_cbc "desx-cbc" -#define NID_desx_cbc 80 - -#define SN_sha "SHA" -#define LN_sha "sha" -#define NID_sha 41 -#define OBJ_sha OBJ_algorithm,18L - -#define SN_sha1 "SHA1" -#define LN_sha1 "sha1" -#define NID_sha1 64 -#define OBJ_sha1 OBJ_algorithm,26L - -#define SN_dsaWithSHA1_2 "DSA-SHA1-old" -#define LN_dsaWithSHA1_2 "dsaWithSHA1-old" -#define NID_dsaWithSHA1_2 70 -#define OBJ_dsaWithSHA1_2 OBJ_algorithm,27L - -#define SN_sha1WithRSA "RSA-SHA1-2" -#define LN_sha1WithRSA "sha1WithRSA" -#define NID_sha1WithRSA 115 -#define OBJ_sha1WithRSA OBJ_algorithm,29L - -#define SN_ripemd160 "RIPEMD160" -#define LN_ripemd160 "ripemd160" -#define NID_ripemd160 117 -#define OBJ_ripemd160 1L,3L,36L,3L,2L,1L - -#define SN_ripemd160WithRSA "RSA-RIPEMD160" -#define LN_ripemd160WithRSA "ripemd160WithRSA" -#define NID_ripemd160WithRSA 119 -#define OBJ_ripemd160WithRSA 1L,3L,36L,3L,3L,1L,2L - -#define SN_sxnet "SXNetID" -#define LN_sxnet "Strong Extranet ID" -#define NID_sxnet 143 -#define OBJ_sxnet 1L,3L,101L,1L,4L,1L - -#define SN_X500 "X500" -#define LN_X500 "directory services (X.500)" -#define NID_X500 11 -#define OBJ_X500 2L,5L - -#define SN_X509 "X509" -#define NID_X509 12 -#define OBJ_X509 OBJ_X500,4L - -#define SN_commonName "CN" -#define LN_commonName "commonName" -#define NID_commonName 13 -#define OBJ_commonName OBJ_X509,3L - -#define SN_surname "SN" -#define LN_surname "surname" -#define NID_surname 100 -#define OBJ_surname OBJ_X509,4L - -#define LN_serialNumber "serialNumber" -#define NID_serialNumber 105 -#define OBJ_serialNumber OBJ_X509,5L - -#define SN_countryName "C" -#define LN_countryName "countryName" -#define NID_countryName 14 -#define OBJ_countryName OBJ_X509,6L - -#define SN_localityName "L" -#define LN_localityName "localityName" -#define NID_localityName 15 -#define OBJ_localityName OBJ_X509,7L - -#define SN_stateOrProvinceName "ST" -#define LN_stateOrProvinceName "stateOrProvinceName" -#define NID_stateOrProvinceName 16 -#define OBJ_stateOrProvinceName OBJ_X509,8L - -#define SN_streetAddress "street" -#define LN_streetAddress "streetAddress" -#define NID_streetAddress 660 -#define OBJ_streetAddress OBJ_X509,9L - -#define SN_organizationName "O" -#define LN_organizationName "organizationName" -#define NID_organizationName 17 -#define OBJ_organizationName OBJ_X509,10L - -#define SN_organizationalUnitName "OU" -#define LN_organizationalUnitName "organizationalUnitName" -#define NID_organizationalUnitName 18 -#define OBJ_organizationalUnitName OBJ_X509,11L - -#define SN_title "title" -#define LN_title "title" -#define NID_title 106 -#define OBJ_title OBJ_X509,12L - -#define LN_description "description" -#define NID_description 107 -#define OBJ_description OBJ_X509,13L - -#define LN_searchGuide "searchGuide" -#define NID_searchGuide 859 -#define OBJ_searchGuide OBJ_X509,14L - -#define LN_businessCategory "businessCategory" -#define NID_businessCategory 860 -#define OBJ_businessCategory OBJ_X509,15L - -#define LN_postalAddress "postalAddress" -#define NID_postalAddress 861 -#define OBJ_postalAddress OBJ_X509,16L - -#define LN_postalCode "postalCode" -#define NID_postalCode 661 -#define OBJ_postalCode OBJ_X509,17L - -#define LN_postOfficeBox "postOfficeBox" -#define NID_postOfficeBox 862 -#define OBJ_postOfficeBox OBJ_X509,18L - -#define LN_physicalDeliveryOfficeName "physicalDeliveryOfficeName" -#define NID_physicalDeliveryOfficeName 863 -#define OBJ_physicalDeliveryOfficeName OBJ_X509,19L - -#define LN_telephoneNumber "telephoneNumber" -#define NID_telephoneNumber 864 -#define OBJ_telephoneNumber OBJ_X509,20L - -#define LN_telexNumber "telexNumber" -#define NID_telexNumber 865 -#define OBJ_telexNumber OBJ_X509,21L - -#define LN_teletexTerminalIdentifier "teletexTerminalIdentifier" -#define NID_teletexTerminalIdentifier 866 -#define OBJ_teletexTerminalIdentifier OBJ_X509,22L - -#define LN_facsimileTelephoneNumber "facsimileTelephoneNumber" -#define NID_facsimileTelephoneNumber 867 -#define OBJ_facsimileTelephoneNumber OBJ_X509,23L - -#define LN_x121Address "x121Address" -#define NID_x121Address 868 -#define OBJ_x121Address OBJ_X509,24L - -#define LN_internationaliSDNNumber "internationaliSDNNumber" -#define NID_internationaliSDNNumber 869 -#define OBJ_internationaliSDNNumber OBJ_X509,25L - -#define LN_registeredAddress "registeredAddress" -#define NID_registeredAddress 870 -#define OBJ_registeredAddress OBJ_X509,26L - -#define LN_destinationIndicator "destinationIndicator" -#define NID_destinationIndicator 871 -#define OBJ_destinationIndicator OBJ_X509,27L - -#define LN_preferredDeliveryMethod "preferredDeliveryMethod" -#define NID_preferredDeliveryMethod 872 -#define OBJ_preferredDeliveryMethod OBJ_X509,28L - -#define LN_presentationAddress "presentationAddress" -#define NID_presentationAddress 873 -#define OBJ_presentationAddress OBJ_X509,29L - -#define LN_supportedApplicationContext "supportedApplicationContext" -#define NID_supportedApplicationContext 874 -#define OBJ_supportedApplicationContext OBJ_X509,30L - -#define SN_member "member" -#define NID_member 875 -#define OBJ_member OBJ_X509,31L - -#define SN_owner "owner" -#define NID_owner 876 -#define OBJ_owner OBJ_X509,32L - -#define LN_roleOccupant "roleOccupant" -#define NID_roleOccupant 877 -#define OBJ_roleOccupant OBJ_X509,33L - -#define SN_seeAlso "seeAlso" -#define NID_seeAlso 878 -#define OBJ_seeAlso OBJ_X509,34L - -#define LN_userPassword "userPassword" -#define NID_userPassword 879 -#define OBJ_userPassword OBJ_X509,35L - -#define LN_userCertificate "userCertificate" -#define NID_userCertificate 880 -#define OBJ_userCertificate OBJ_X509,36L - -#define LN_cACertificate "cACertificate" -#define NID_cACertificate 881 -#define OBJ_cACertificate OBJ_X509,37L - -#define LN_authorityRevocationList "authorityRevocationList" -#define NID_authorityRevocationList 882 -#define OBJ_authorityRevocationList OBJ_X509,38L - -#define LN_certificateRevocationList "certificateRevocationList" -#define NID_certificateRevocationList 883 -#define OBJ_certificateRevocationList OBJ_X509,39L - -#define LN_crossCertificatePair "crossCertificatePair" -#define NID_crossCertificatePair 884 -#define OBJ_crossCertificatePair OBJ_X509,40L - -#define SN_name "name" -#define LN_name "name" -#define NID_name 173 -#define OBJ_name OBJ_X509,41L - -#define SN_givenName "GN" -#define LN_givenName "givenName" -#define NID_givenName 99 -#define OBJ_givenName OBJ_X509,42L - -#define SN_initials "initials" -#define LN_initials "initials" -#define NID_initials 101 -#define OBJ_initials OBJ_X509,43L - -#define LN_generationQualifier "generationQualifier" -#define NID_generationQualifier 509 -#define OBJ_generationQualifier OBJ_X509,44L - -#define LN_x500UniqueIdentifier "x500UniqueIdentifier" -#define NID_x500UniqueIdentifier 503 -#define OBJ_x500UniqueIdentifier OBJ_X509,45L - -#define SN_dnQualifier "dnQualifier" -#define LN_dnQualifier "dnQualifier" -#define NID_dnQualifier 174 -#define OBJ_dnQualifier OBJ_X509,46L - -#define LN_enhancedSearchGuide "enhancedSearchGuide" -#define NID_enhancedSearchGuide 885 -#define OBJ_enhancedSearchGuide OBJ_X509,47L - -#define LN_protocolInformation "protocolInformation" -#define NID_protocolInformation 886 -#define OBJ_protocolInformation OBJ_X509,48L - -#define LN_distinguishedName "distinguishedName" -#define NID_distinguishedName 887 -#define OBJ_distinguishedName OBJ_X509,49L - -#define LN_uniqueMember "uniqueMember" -#define NID_uniqueMember 888 -#define OBJ_uniqueMember OBJ_X509,50L - -#define LN_houseIdentifier "houseIdentifier" -#define NID_houseIdentifier 889 -#define OBJ_houseIdentifier OBJ_X509,51L - -#define LN_supportedAlgorithms "supportedAlgorithms" -#define NID_supportedAlgorithms 890 -#define OBJ_supportedAlgorithms OBJ_X509,52L - -#define LN_deltaRevocationList "deltaRevocationList" -#define NID_deltaRevocationList 891 -#define OBJ_deltaRevocationList OBJ_X509,53L - -#define SN_dmdName "dmdName" -#define NID_dmdName 892 -#define OBJ_dmdName OBJ_X509,54L - -#define LN_pseudonym "pseudonym" -#define NID_pseudonym 510 -#define OBJ_pseudonym OBJ_X509,65L - -#define SN_role "role" -#define LN_role "role" -#define NID_role 400 -#define OBJ_role OBJ_X509,72L - -#define SN_X500algorithms "X500algorithms" -#define LN_X500algorithms "directory services - algorithms" -#define NID_X500algorithms 378 -#define OBJ_X500algorithms OBJ_X500,8L - -#define SN_rsa "RSA" -#define LN_rsa "rsa" -#define NID_rsa 19 -#define OBJ_rsa OBJ_X500algorithms,1L,1L - -#define SN_mdc2WithRSA "RSA-MDC2" -#define LN_mdc2WithRSA "mdc2WithRSA" -#define NID_mdc2WithRSA 96 -#define OBJ_mdc2WithRSA OBJ_X500algorithms,3L,100L - -#define SN_mdc2 "MDC2" -#define LN_mdc2 "mdc2" -#define NID_mdc2 95 -#define OBJ_mdc2 OBJ_X500algorithms,3L,101L - -#define SN_id_ce "id-ce" -#define NID_id_ce 81 -#define OBJ_id_ce OBJ_X500,29L - -#define SN_subject_directory_attributes "subjectDirectoryAttributes" -#define LN_subject_directory_attributes "X509v3 Subject Directory Attributes" -#define NID_subject_directory_attributes 769 -#define OBJ_subject_directory_attributes OBJ_id_ce,9L - -#define SN_subject_key_identifier "subjectKeyIdentifier" -#define LN_subject_key_identifier "X509v3 Subject Key Identifier" -#define NID_subject_key_identifier 82 -#define OBJ_subject_key_identifier OBJ_id_ce,14L - -#define SN_key_usage "keyUsage" -#define LN_key_usage "X509v3 Key Usage" -#define NID_key_usage 83 -#define OBJ_key_usage OBJ_id_ce,15L - -#define SN_private_key_usage_period "privateKeyUsagePeriod" -#define LN_private_key_usage_period "X509v3 Private Key Usage Period" -#define NID_private_key_usage_period 84 -#define OBJ_private_key_usage_period OBJ_id_ce,16L - -#define SN_subject_alt_name "subjectAltName" -#define LN_subject_alt_name "X509v3 Subject Alternative Name" -#define NID_subject_alt_name 85 -#define OBJ_subject_alt_name OBJ_id_ce,17L - -#define SN_issuer_alt_name "issuerAltName" -#define LN_issuer_alt_name "X509v3 Issuer Alternative Name" -#define NID_issuer_alt_name 86 -#define OBJ_issuer_alt_name OBJ_id_ce,18L - -#define SN_basic_constraints "basicConstraints" -#define LN_basic_constraints "X509v3 Basic Constraints" -#define NID_basic_constraints 87 -#define OBJ_basic_constraints OBJ_id_ce,19L - -#define SN_crl_number "crlNumber" -#define LN_crl_number "X509v3 CRL Number" -#define NID_crl_number 88 -#define OBJ_crl_number OBJ_id_ce,20L - -#define SN_crl_reason "CRLReason" -#define LN_crl_reason "X509v3 CRL Reason Code" -#define NID_crl_reason 141 -#define OBJ_crl_reason OBJ_id_ce,21L - -#define SN_invalidity_date "invalidityDate" -#define LN_invalidity_date "Invalidity Date" -#define NID_invalidity_date 142 -#define OBJ_invalidity_date OBJ_id_ce,24L - -#define SN_delta_crl "deltaCRL" -#define LN_delta_crl "X509v3 Delta CRL Indicator" -#define NID_delta_crl 140 -#define OBJ_delta_crl OBJ_id_ce,27L - -#define SN_issuing_distribution_point "issuingDistributionPoint" -#define LN_issuing_distribution_point "X509v3 Issuing Distrubution Point" -#define NID_issuing_distribution_point 770 -#define OBJ_issuing_distribution_point OBJ_id_ce,28L - -#define SN_certificate_issuer "certificateIssuer" -#define LN_certificate_issuer "X509v3 Certificate Issuer" -#define NID_certificate_issuer 771 -#define OBJ_certificate_issuer OBJ_id_ce,29L - -#define SN_name_constraints "nameConstraints" -#define LN_name_constraints "X509v3 Name Constraints" -#define NID_name_constraints 666 -#define OBJ_name_constraints OBJ_id_ce,30L - -#define SN_crl_distribution_points "crlDistributionPoints" -#define LN_crl_distribution_points "X509v3 CRL Distribution Points" -#define NID_crl_distribution_points 103 -#define OBJ_crl_distribution_points OBJ_id_ce,31L - -#define SN_certificate_policies "certificatePolicies" -#define LN_certificate_policies "X509v3 Certificate Policies" -#define NID_certificate_policies 89 -#define OBJ_certificate_policies OBJ_id_ce,32L - -#define SN_any_policy "anyPolicy" -#define LN_any_policy "X509v3 Any Policy" -#define NID_any_policy 746 -#define OBJ_any_policy OBJ_certificate_policies,0L - -#define SN_policy_mappings "policyMappings" -#define LN_policy_mappings "X509v3 Policy Mappings" -#define NID_policy_mappings 747 -#define OBJ_policy_mappings OBJ_id_ce,33L - -#define SN_authority_key_identifier "authorityKeyIdentifier" -#define LN_authority_key_identifier "X509v3 Authority Key Identifier" -#define NID_authority_key_identifier 90 -#define OBJ_authority_key_identifier OBJ_id_ce,35L - -#define SN_policy_constraints "policyConstraints" -#define LN_policy_constraints "X509v3 Policy Constraints" -#define NID_policy_constraints 401 -#define OBJ_policy_constraints OBJ_id_ce,36L - -#define SN_ext_key_usage "extendedKeyUsage" -#define LN_ext_key_usage "X509v3 Extended Key Usage" -#define NID_ext_key_usage 126 -#define OBJ_ext_key_usage OBJ_id_ce,37L - -#define SN_freshest_crl "freshestCRL" -#define LN_freshest_crl "X509v3 Freshest CRL" -#define NID_freshest_crl 857 -#define OBJ_freshest_crl OBJ_id_ce,46L - -#define SN_inhibit_any_policy "inhibitAnyPolicy" -#define LN_inhibit_any_policy "X509v3 Inhibit Any Policy" -#define NID_inhibit_any_policy 748 -#define OBJ_inhibit_any_policy OBJ_id_ce,54L - -#define SN_target_information "targetInformation" -#define LN_target_information "X509v3 AC Targeting" -#define NID_target_information 402 -#define OBJ_target_information OBJ_id_ce,55L - -#define SN_no_rev_avail "noRevAvail" -#define LN_no_rev_avail "X509v3 No Revocation Available" -#define NID_no_rev_avail 403 -#define OBJ_no_rev_avail OBJ_id_ce,56L - -#define SN_anyExtendedKeyUsage "anyExtendedKeyUsage" -#define LN_anyExtendedKeyUsage "Any Extended Key Usage" -#define NID_anyExtendedKeyUsage 910 -#define OBJ_anyExtendedKeyUsage OBJ_ext_key_usage,0L - -#define SN_netscape "Netscape" -#define LN_netscape "Netscape Communications Corp." -#define NID_netscape 57 -#define OBJ_netscape 2L,16L,840L,1L,113730L - -#define SN_netscape_cert_extension "nsCertExt" -#define LN_netscape_cert_extension "Netscape Certificate Extension" -#define NID_netscape_cert_extension 58 -#define OBJ_netscape_cert_extension OBJ_netscape,1L - -#define SN_netscape_data_type "nsDataType" -#define LN_netscape_data_type "Netscape Data Type" -#define NID_netscape_data_type 59 -#define OBJ_netscape_data_type OBJ_netscape,2L - -#define SN_netscape_cert_type "nsCertType" -#define LN_netscape_cert_type "Netscape Cert Type" -#define NID_netscape_cert_type 71 -#define OBJ_netscape_cert_type OBJ_netscape_cert_extension,1L - -#define SN_netscape_base_url "nsBaseUrl" -#define LN_netscape_base_url "Netscape Base Url" -#define NID_netscape_base_url 72 -#define OBJ_netscape_base_url OBJ_netscape_cert_extension,2L - -#define SN_netscape_revocation_url "nsRevocationUrl" -#define LN_netscape_revocation_url "Netscape Revocation Url" -#define NID_netscape_revocation_url 73 -#define OBJ_netscape_revocation_url OBJ_netscape_cert_extension,3L - -#define SN_netscape_ca_revocation_url "nsCaRevocationUrl" -#define LN_netscape_ca_revocation_url "Netscape CA Revocation Url" -#define NID_netscape_ca_revocation_url 74 -#define OBJ_netscape_ca_revocation_url OBJ_netscape_cert_extension,4L - -#define SN_netscape_renewal_url "nsRenewalUrl" -#define LN_netscape_renewal_url "Netscape Renewal Url" -#define NID_netscape_renewal_url 75 -#define OBJ_netscape_renewal_url OBJ_netscape_cert_extension,7L - -#define SN_netscape_ca_policy_url "nsCaPolicyUrl" -#define LN_netscape_ca_policy_url "Netscape CA Policy Url" -#define NID_netscape_ca_policy_url 76 -#define OBJ_netscape_ca_policy_url OBJ_netscape_cert_extension,8L - -#define SN_netscape_ssl_server_name "nsSslServerName" -#define LN_netscape_ssl_server_name "Netscape SSL Server Name" -#define NID_netscape_ssl_server_name 77 -#define OBJ_netscape_ssl_server_name OBJ_netscape_cert_extension,12L - -#define SN_netscape_comment "nsComment" -#define LN_netscape_comment "Netscape Comment" -#define NID_netscape_comment 78 -#define OBJ_netscape_comment OBJ_netscape_cert_extension,13L - -#define SN_netscape_cert_sequence "nsCertSequence" -#define LN_netscape_cert_sequence "Netscape Certificate Sequence" -#define NID_netscape_cert_sequence 79 -#define OBJ_netscape_cert_sequence OBJ_netscape_data_type,5L - -#define SN_ns_sgc "nsSGC" -#define LN_ns_sgc "Netscape Server Gated Crypto" -#define NID_ns_sgc 139 -#define OBJ_ns_sgc OBJ_netscape,4L,1L - -#define SN_org "ORG" -#define LN_org "org" -#define NID_org 379 -#define OBJ_org OBJ_iso,3L - -#define SN_dod "DOD" -#define LN_dod "dod" -#define NID_dod 380 -#define OBJ_dod OBJ_org,6L - -#define SN_iana "IANA" -#define LN_iana "iana" -#define NID_iana 381 -#define OBJ_iana OBJ_dod,1L - -#define OBJ_internet OBJ_iana - -#define SN_Directory "directory" -#define LN_Directory "Directory" -#define NID_Directory 382 -#define OBJ_Directory OBJ_internet,1L - -#define SN_Management "mgmt" -#define LN_Management "Management" -#define NID_Management 383 -#define OBJ_Management OBJ_internet,2L - -#define SN_Experimental "experimental" -#define LN_Experimental "Experimental" -#define NID_Experimental 384 -#define OBJ_Experimental OBJ_internet,3L - -#define SN_Private "private" -#define LN_Private "Private" -#define NID_Private 385 -#define OBJ_Private OBJ_internet,4L - -#define SN_Security "security" -#define LN_Security "Security" -#define NID_Security 386 -#define OBJ_Security OBJ_internet,5L - -#define SN_SNMPv2 "snmpv2" -#define LN_SNMPv2 "SNMPv2" -#define NID_SNMPv2 387 -#define OBJ_SNMPv2 OBJ_internet,6L - -#define LN_Mail "Mail" -#define NID_Mail 388 -#define OBJ_Mail OBJ_internet,7L - -#define SN_Enterprises "enterprises" -#define LN_Enterprises "Enterprises" -#define NID_Enterprises 389 -#define OBJ_Enterprises OBJ_Private,1L - -#define SN_dcObject "dcobject" -#define LN_dcObject "dcObject" -#define NID_dcObject 390 -#define OBJ_dcObject OBJ_Enterprises,1466L,344L - -#define SN_mime_mhs "mime-mhs" -#define LN_mime_mhs "MIME MHS" -#define NID_mime_mhs 504 -#define OBJ_mime_mhs OBJ_Mail,1L - -#define SN_mime_mhs_headings "mime-mhs-headings" -#define LN_mime_mhs_headings "mime-mhs-headings" -#define NID_mime_mhs_headings 505 -#define OBJ_mime_mhs_headings OBJ_mime_mhs,1L - -#define SN_mime_mhs_bodies "mime-mhs-bodies" -#define LN_mime_mhs_bodies "mime-mhs-bodies" -#define NID_mime_mhs_bodies 506 -#define OBJ_mime_mhs_bodies OBJ_mime_mhs,2L - -#define SN_id_hex_partial_message "id-hex-partial-message" -#define LN_id_hex_partial_message "id-hex-partial-message" -#define NID_id_hex_partial_message 507 -#define OBJ_id_hex_partial_message OBJ_mime_mhs_headings,1L - -#define SN_id_hex_multipart_message "id-hex-multipart-message" -#define LN_id_hex_multipart_message "id-hex-multipart-message" -#define NID_id_hex_multipart_message 508 -#define OBJ_id_hex_multipart_message OBJ_mime_mhs_headings,2L - -#define SN_rle_compression "RLE" -#define LN_rle_compression "run length compression" -#define NID_rle_compression 124 -#define OBJ_rle_compression 1L,1L,1L,1L,666L,1L - -#define SN_zlib_compression "ZLIB" -#define LN_zlib_compression "zlib compression" -#define NID_zlib_compression 125 -#define OBJ_zlib_compression OBJ_id_smime_alg,8L - -#define OBJ_csor 2L,16L,840L,1L,101L,3L - -#define OBJ_nistAlgorithms OBJ_csor,4L - -#define OBJ_aes OBJ_nistAlgorithms,1L - -#define SN_aes_128_ecb "AES-128-ECB" -#define LN_aes_128_ecb "aes-128-ecb" -#define NID_aes_128_ecb 418 -#define OBJ_aes_128_ecb OBJ_aes,1L - -#define SN_aes_128_cbc "AES-128-CBC" -#define LN_aes_128_cbc "aes-128-cbc" -#define NID_aes_128_cbc 419 -#define OBJ_aes_128_cbc OBJ_aes,2L - -#define SN_aes_128_ofb128 "AES-128-OFB" -#define LN_aes_128_ofb128 "aes-128-ofb" -#define NID_aes_128_ofb128 420 -#define OBJ_aes_128_ofb128 OBJ_aes,3L - -#define SN_aes_128_cfb128 "AES-128-CFB" -#define LN_aes_128_cfb128 "aes-128-cfb" -#define NID_aes_128_cfb128 421 -#define OBJ_aes_128_cfb128 OBJ_aes,4L - -#define SN_id_aes128_wrap "id-aes128-wrap" -#define NID_id_aes128_wrap 788 -#define OBJ_id_aes128_wrap OBJ_aes,5L - -#define SN_aes_128_gcm "id-aes128-GCM" -#define LN_aes_128_gcm "aes-128-gcm" -#define NID_aes_128_gcm 895 -#define OBJ_aes_128_gcm OBJ_aes,6L - -#define SN_aes_128_ccm "id-aes128-CCM" -#define LN_aes_128_ccm "aes-128-ccm" -#define NID_aes_128_ccm 896 -#define OBJ_aes_128_ccm OBJ_aes,7L - -#define SN_id_aes128_wrap_pad "id-aes128-wrap-pad" -#define NID_id_aes128_wrap_pad 897 -#define OBJ_id_aes128_wrap_pad OBJ_aes,8L - -#define SN_aes_192_ecb "AES-192-ECB" -#define LN_aes_192_ecb "aes-192-ecb" -#define NID_aes_192_ecb 422 -#define OBJ_aes_192_ecb OBJ_aes,21L - -#define SN_aes_192_cbc "AES-192-CBC" -#define LN_aes_192_cbc "aes-192-cbc" -#define NID_aes_192_cbc 423 -#define OBJ_aes_192_cbc OBJ_aes,22L - -#define SN_aes_192_ofb128 "AES-192-OFB" -#define LN_aes_192_ofb128 "aes-192-ofb" -#define NID_aes_192_ofb128 424 -#define OBJ_aes_192_ofb128 OBJ_aes,23L - -#define SN_aes_192_cfb128 "AES-192-CFB" -#define LN_aes_192_cfb128 "aes-192-cfb" -#define NID_aes_192_cfb128 425 -#define OBJ_aes_192_cfb128 OBJ_aes,24L - -#define SN_id_aes192_wrap "id-aes192-wrap" -#define NID_id_aes192_wrap 789 -#define OBJ_id_aes192_wrap OBJ_aes,25L - -#define SN_aes_192_gcm "id-aes192-GCM" -#define LN_aes_192_gcm "aes-192-gcm" -#define NID_aes_192_gcm 898 -#define OBJ_aes_192_gcm OBJ_aes,26L - -#define SN_aes_192_ccm "id-aes192-CCM" -#define LN_aes_192_ccm "aes-192-ccm" -#define NID_aes_192_ccm 899 -#define OBJ_aes_192_ccm OBJ_aes,27L - -#define SN_id_aes192_wrap_pad "id-aes192-wrap-pad" -#define NID_id_aes192_wrap_pad 900 -#define OBJ_id_aes192_wrap_pad OBJ_aes,28L - -#define SN_aes_256_ecb "AES-256-ECB" -#define LN_aes_256_ecb "aes-256-ecb" -#define NID_aes_256_ecb 426 -#define OBJ_aes_256_ecb OBJ_aes,41L - -#define SN_aes_256_cbc "AES-256-CBC" -#define LN_aes_256_cbc "aes-256-cbc" -#define NID_aes_256_cbc 427 -#define OBJ_aes_256_cbc OBJ_aes,42L - -#define SN_aes_256_ofb128 "AES-256-OFB" -#define LN_aes_256_ofb128 "aes-256-ofb" -#define NID_aes_256_ofb128 428 -#define OBJ_aes_256_ofb128 OBJ_aes,43L - -#define SN_aes_256_cfb128 "AES-256-CFB" -#define LN_aes_256_cfb128 "aes-256-cfb" -#define NID_aes_256_cfb128 429 -#define OBJ_aes_256_cfb128 OBJ_aes,44L - -#define SN_id_aes256_wrap "id-aes256-wrap" -#define NID_id_aes256_wrap 790 -#define OBJ_id_aes256_wrap OBJ_aes,45L - -#define SN_aes_256_gcm "id-aes256-GCM" -#define LN_aes_256_gcm "aes-256-gcm" -#define NID_aes_256_gcm 901 -#define OBJ_aes_256_gcm OBJ_aes,46L - -#define SN_aes_256_ccm "id-aes256-CCM" -#define LN_aes_256_ccm "aes-256-ccm" -#define NID_aes_256_ccm 902 -#define OBJ_aes_256_ccm OBJ_aes,47L - -#define SN_id_aes256_wrap_pad "id-aes256-wrap-pad" -#define NID_id_aes256_wrap_pad 903 -#define OBJ_id_aes256_wrap_pad OBJ_aes,48L - -#define SN_aes_128_cfb1 "AES-128-CFB1" -#define LN_aes_128_cfb1 "aes-128-cfb1" -#define NID_aes_128_cfb1 650 - -#define SN_aes_192_cfb1 "AES-192-CFB1" -#define LN_aes_192_cfb1 "aes-192-cfb1" -#define NID_aes_192_cfb1 651 - -#define SN_aes_256_cfb1 "AES-256-CFB1" -#define LN_aes_256_cfb1 "aes-256-cfb1" -#define NID_aes_256_cfb1 652 - -#define SN_aes_128_cfb8 "AES-128-CFB8" -#define LN_aes_128_cfb8 "aes-128-cfb8" -#define NID_aes_128_cfb8 653 - -#define SN_aes_192_cfb8 "AES-192-CFB8" -#define LN_aes_192_cfb8 "aes-192-cfb8" -#define NID_aes_192_cfb8 654 - -#define SN_aes_256_cfb8 "AES-256-CFB8" -#define LN_aes_256_cfb8 "aes-256-cfb8" -#define NID_aes_256_cfb8 655 - -#define SN_aes_128_ctr "AES-128-CTR" -#define LN_aes_128_ctr "aes-128-ctr" -#define NID_aes_128_ctr 904 - -#define SN_aes_192_ctr "AES-192-CTR" -#define LN_aes_192_ctr "aes-192-ctr" -#define NID_aes_192_ctr 905 - -#define SN_aes_256_ctr "AES-256-CTR" -#define LN_aes_256_ctr "aes-256-ctr" -#define NID_aes_256_ctr 906 - -#define SN_aes_128_xts "AES-128-XTS" -#define LN_aes_128_xts "aes-128-xts" -#define NID_aes_128_xts 913 - -#define SN_aes_256_xts "AES-256-XTS" -#define LN_aes_256_xts "aes-256-xts" -#define NID_aes_256_xts 914 - -#define SN_des_cfb1 "DES-CFB1" -#define LN_des_cfb1 "des-cfb1" -#define NID_des_cfb1 656 - -#define SN_des_cfb8 "DES-CFB8" -#define LN_des_cfb8 "des-cfb8" -#define NID_des_cfb8 657 - -#define SN_des_ede3_cfb1 "DES-EDE3-CFB1" -#define LN_des_ede3_cfb1 "des-ede3-cfb1" -#define NID_des_ede3_cfb1 658 - -#define SN_des_ede3_cfb8 "DES-EDE3-CFB8" -#define LN_des_ede3_cfb8 "des-ede3-cfb8" -#define NID_des_ede3_cfb8 659 - -#define OBJ_nist_hashalgs OBJ_nistAlgorithms,2L - -#define SN_sha256 "SHA256" -#define LN_sha256 "sha256" -#define NID_sha256 672 -#define OBJ_sha256 OBJ_nist_hashalgs,1L - -#define SN_sha384 "SHA384" -#define LN_sha384 "sha384" -#define NID_sha384 673 -#define OBJ_sha384 OBJ_nist_hashalgs,2L - -#define SN_sha512 "SHA512" -#define LN_sha512 "sha512" -#define NID_sha512 674 -#define OBJ_sha512 OBJ_nist_hashalgs,3L - -#define SN_sha224 "SHA224" -#define LN_sha224 "sha224" -#define NID_sha224 675 -#define OBJ_sha224 OBJ_nist_hashalgs,4L - -#define OBJ_dsa_with_sha2 OBJ_nistAlgorithms,3L - -#define SN_dsa_with_SHA224 "dsa_with_SHA224" -#define NID_dsa_with_SHA224 802 -#define OBJ_dsa_with_SHA224 OBJ_dsa_with_sha2,1L - -#define SN_dsa_with_SHA256 "dsa_with_SHA256" -#define NID_dsa_with_SHA256 803 -#define OBJ_dsa_with_SHA256 OBJ_dsa_with_sha2,2L - -#define SN_hold_instruction_code "holdInstructionCode" -#define LN_hold_instruction_code "Hold Instruction Code" -#define NID_hold_instruction_code 430 -#define OBJ_hold_instruction_code OBJ_id_ce,23L - -#define OBJ_holdInstruction OBJ_X9_57,2L - -#define SN_hold_instruction_none "holdInstructionNone" -#define LN_hold_instruction_none "Hold Instruction None" -#define NID_hold_instruction_none 431 -#define OBJ_hold_instruction_none OBJ_holdInstruction,1L - -#define SN_hold_instruction_call_issuer "holdInstructionCallIssuer" -#define LN_hold_instruction_call_issuer "Hold Instruction Call Issuer" -#define NID_hold_instruction_call_issuer 432 -#define OBJ_hold_instruction_call_issuer OBJ_holdInstruction,2L - -#define SN_hold_instruction_reject "holdInstructionReject" -#define LN_hold_instruction_reject "Hold Instruction Reject" -#define NID_hold_instruction_reject 433 -#define OBJ_hold_instruction_reject OBJ_holdInstruction,3L - -#define SN_data "data" -#define NID_data 434 -#define OBJ_data OBJ_itu_t,9L - -#define SN_pss "pss" -#define NID_pss 435 -#define OBJ_pss OBJ_data,2342L - -#define SN_ucl "ucl" -#define NID_ucl 436 -#define OBJ_ucl OBJ_pss,19200300L - -#define SN_pilot "pilot" -#define NID_pilot 437 -#define OBJ_pilot OBJ_ucl,100L - -#define LN_pilotAttributeType "pilotAttributeType" -#define NID_pilotAttributeType 438 -#define OBJ_pilotAttributeType OBJ_pilot,1L - -#define LN_pilotAttributeSyntax "pilotAttributeSyntax" -#define NID_pilotAttributeSyntax 439 -#define OBJ_pilotAttributeSyntax OBJ_pilot,3L - -#define LN_pilotObjectClass "pilotObjectClass" -#define NID_pilotObjectClass 440 -#define OBJ_pilotObjectClass OBJ_pilot,4L - -#define LN_pilotGroups "pilotGroups" -#define NID_pilotGroups 441 -#define OBJ_pilotGroups OBJ_pilot,10L - -#define LN_iA5StringSyntax "iA5StringSyntax" -#define NID_iA5StringSyntax 442 -#define OBJ_iA5StringSyntax OBJ_pilotAttributeSyntax,4L - -#define LN_caseIgnoreIA5StringSyntax "caseIgnoreIA5StringSyntax" -#define NID_caseIgnoreIA5StringSyntax 443 -#define OBJ_caseIgnoreIA5StringSyntax OBJ_pilotAttributeSyntax,5L - -#define LN_pilotObject "pilotObject" -#define NID_pilotObject 444 -#define OBJ_pilotObject OBJ_pilotObjectClass,3L - -#define LN_pilotPerson "pilotPerson" -#define NID_pilotPerson 445 -#define OBJ_pilotPerson OBJ_pilotObjectClass,4L - -#define SN_account "account" -#define NID_account 446 -#define OBJ_account OBJ_pilotObjectClass,5L - -#define SN_document "document" -#define NID_document 447 -#define OBJ_document OBJ_pilotObjectClass,6L - -#define SN_room "room" -#define NID_room 448 -#define OBJ_room OBJ_pilotObjectClass,7L - -#define LN_documentSeries "documentSeries" -#define NID_documentSeries 449 -#define OBJ_documentSeries OBJ_pilotObjectClass,9L - -#define SN_Domain "domain" -#define LN_Domain "Domain" -#define NID_Domain 392 -#define OBJ_Domain OBJ_pilotObjectClass,13L - -#define LN_rFC822localPart "rFC822localPart" -#define NID_rFC822localPart 450 -#define OBJ_rFC822localPart OBJ_pilotObjectClass,14L - -#define LN_dNSDomain "dNSDomain" -#define NID_dNSDomain 451 -#define OBJ_dNSDomain OBJ_pilotObjectClass,15L - -#define LN_domainRelatedObject "domainRelatedObject" -#define NID_domainRelatedObject 452 -#define OBJ_domainRelatedObject OBJ_pilotObjectClass,17L - -#define LN_friendlyCountry "friendlyCountry" -#define NID_friendlyCountry 453 -#define OBJ_friendlyCountry OBJ_pilotObjectClass,18L - -#define LN_simpleSecurityObject "simpleSecurityObject" -#define NID_simpleSecurityObject 454 -#define OBJ_simpleSecurityObject OBJ_pilotObjectClass,19L - -#define LN_pilotOrganization "pilotOrganization" -#define NID_pilotOrganization 455 -#define OBJ_pilotOrganization OBJ_pilotObjectClass,20L - -#define LN_pilotDSA "pilotDSA" -#define NID_pilotDSA 456 -#define OBJ_pilotDSA OBJ_pilotObjectClass,21L - -#define LN_qualityLabelledData "qualityLabelledData" -#define NID_qualityLabelledData 457 -#define OBJ_qualityLabelledData OBJ_pilotObjectClass,22L - -#define SN_userId "UID" -#define LN_userId "userId" -#define NID_userId 458 -#define OBJ_userId OBJ_pilotAttributeType,1L - -#define LN_textEncodedORAddress "textEncodedORAddress" -#define NID_textEncodedORAddress 459 -#define OBJ_textEncodedORAddress OBJ_pilotAttributeType,2L - -#define SN_rfc822Mailbox "mail" -#define LN_rfc822Mailbox "rfc822Mailbox" -#define NID_rfc822Mailbox 460 -#define OBJ_rfc822Mailbox OBJ_pilotAttributeType,3L - -#define SN_info "info" -#define NID_info 461 -#define OBJ_info OBJ_pilotAttributeType,4L - -#define LN_favouriteDrink "favouriteDrink" -#define NID_favouriteDrink 462 -#define OBJ_favouriteDrink OBJ_pilotAttributeType,5L - -#define LN_roomNumber "roomNumber" -#define NID_roomNumber 463 -#define OBJ_roomNumber OBJ_pilotAttributeType,6L - -#define SN_photo "photo" -#define NID_photo 464 -#define OBJ_photo OBJ_pilotAttributeType,7L - -#define LN_userClass "userClass" -#define NID_userClass 465 -#define OBJ_userClass OBJ_pilotAttributeType,8L - -#define SN_host "host" -#define NID_host 466 -#define OBJ_host OBJ_pilotAttributeType,9L - -#define SN_manager "manager" -#define NID_manager 467 -#define OBJ_manager OBJ_pilotAttributeType,10L - -#define LN_documentIdentifier "documentIdentifier" -#define NID_documentIdentifier 468 -#define OBJ_documentIdentifier OBJ_pilotAttributeType,11L - -#define LN_documentTitle "documentTitle" -#define NID_documentTitle 469 -#define OBJ_documentTitle OBJ_pilotAttributeType,12L - -#define LN_documentVersion "documentVersion" -#define NID_documentVersion 470 -#define OBJ_documentVersion OBJ_pilotAttributeType,13L - -#define LN_documentAuthor "documentAuthor" -#define NID_documentAuthor 471 -#define OBJ_documentAuthor OBJ_pilotAttributeType,14L - -#define LN_documentLocation "documentLocation" -#define NID_documentLocation 472 -#define OBJ_documentLocation OBJ_pilotAttributeType,15L - -#define LN_homeTelephoneNumber "homeTelephoneNumber" -#define NID_homeTelephoneNumber 473 -#define OBJ_homeTelephoneNumber OBJ_pilotAttributeType,20L - -#define SN_secretary "secretary" -#define NID_secretary 474 -#define OBJ_secretary OBJ_pilotAttributeType,21L - -#define LN_otherMailbox "otherMailbox" -#define NID_otherMailbox 475 -#define OBJ_otherMailbox OBJ_pilotAttributeType,22L - -#define LN_lastModifiedTime "lastModifiedTime" -#define NID_lastModifiedTime 476 -#define OBJ_lastModifiedTime OBJ_pilotAttributeType,23L - -#define LN_lastModifiedBy "lastModifiedBy" -#define NID_lastModifiedBy 477 -#define OBJ_lastModifiedBy OBJ_pilotAttributeType,24L - -#define SN_domainComponent "DC" -#define LN_domainComponent "domainComponent" -#define NID_domainComponent 391 -#define OBJ_domainComponent OBJ_pilotAttributeType,25L - -#define LN_aRecord "aRecord" -#define NID_aRecord 478 -#define OBJ_aRecord OBJ_pilotAttributeType,26L - -#define LN_pilotAttributeType27 "pilotAttributeType27" -#define NID_pilotAttributeType27 479 -#define OBJ_pilotAttributeType27 OBJ_pilotAttributeType,27L - -#define LN_mXRecord "mXRecord" -#define NID_mXRecord 480 -#define OBJ_mXRecord OBJ_pilotAttributeType,28L - -#define LN_nSRecord "nSRecord" -#define NID_nSRecord 481 -#define OBJ_nSRecord OBJ_pilotAttributeType,29L - -#define LN_sOARecord "sOARecord" -#define NID_sOARecord 482 -#define OBJ_sOARecord OBJ_pilotAttributeType,30L - -#define LN_cNAMERecord "cNAMERecord" -#define NID_cNAMERecord 483 -#define OBJ_cNAMERecord OBJ_pilotAttributeType,31L - -#define LN_associatedDomain "associatedDomain" -#define NID_associatedDomain 484 -#define OBJ_associatedDomain OBJ_pilotAttributeType,37L - -#define LN_associatedName "associatedName" -#define NID_associatedName 485 -#define OBJ_associatedName OBJ_pilotAttributeType,38L - -#define LN_homePostalAddress "homePostalAddress" -#define NID_homePostalAddress 486 -#define OBJ_homePostalAddress OBJ_pilotAttributeType,39L - -#define LN_personalTitle "personalTitle" -#define NID_personalTitle 487 -#define OBJ_personalTitle OBJ_pilotAttributeType,40L - -#define LN_mobileTelephoneNumber "mobileTelephoneNumber" -#define NID_mobileTelephoneNumber 488 -#define OBJ_mobileTelephoneNumber OBJ_pilotAttributeType,41L - -#define LN_pagerTelephoneNumber "pagerTelephoneNumber" -#define NID_pagerTelephoneNumber 489 -#define OBJ_pagerTelephoneNumber OBJ_pilotAttributeType,42L - -#define LN_friendlyCountryName "friendlyCountryName" -#define NID_friendlyCountryName 490 -#define OBJ_friendlyCountryName OBJ_pilotAttributeType,43L - -#define LN_organizationalStatus "organizationalStatus" -#define NID_organizationalStatus 491 -#define OBJ_organizationalStatus OBJ_pilotAttributeType,45L - -#define LN_janetMailbox "janetMailbox" -#define NID_janetMailbox 492 -#define OBJ_janetMailbox OBJ_pilotAttributeType,46L - -#define LN_mailPreferenceOption "mailPreferenceOption" -#define NID_mailPreferenceOption 493 -#define OBJ_mailPreferenceOption OBJ_pilotAttributeType,47L - -#define LN_buildingName "buildingName" -#define NID_buildingName 494 -#define OBJ_buildingName OBJ_pilotAttributeType,48L - -#define LN_dSAQuality "dSAQuality" -#define NID_dSAQuality 495 -#define OBJ_dSAQuality OBJ_pilotAttributeType,49L - -#define LN_singleLevelQuality "singleLevelQuality" -#define NID_singleLevelQuality 496 -#define OBJ_singleLevelQuality OBJ_pilotAttributeType,50L - -#define LN_subtreeMinimumQuality "subtreeMinimumQuality" -#define NID_subtreeMinimumQuality 497 -#define OBJ_subtreeMinimumQuality OBJ_pilotAttributeType,51L - -#define LN_subtreeMaximumQuality "subtreeMaximumQuality" -#define NID_subtreeMaximumQuality 498 -#define OBJ_subtreeMaximumQuality OBJ_pilotAttributeType,52L - -#define LN_personalSignature "personalSignature" -#define NID_personalSignature 499 -#define OBJ_personalSignature OBJ_pilotAttributeType,53L - -#define LN_dITRedirect "dITRedirect" -#define NID_dITRedirect 500 -#define OBJ_dITRedirect OBJ_pilotAttributeType,54L - -#define SN_audio "audio" -#define NID_audio 501 -#define OBJ_audio OBJ_pilotAttributeType,55L - -#define LN_documentPublisher "documentPublisher" -#define NID_documentPublisher 502 -#define OBJ_documentPublisher OBJ_pilotAttributeType,56L - -#define SN_id_set "id-set" -#define LN_id_set "Secure Electronic Transactions" -#define NID_id_set 512 -#define OBJ_id_set OBJ_international_organizations,42L - -#define SN_set_ctype "set-ctype" -#define LN_set_ctype "content types" -#define NID_set_ctype 513 -#define OBJ_set_ctype OBJ_id_set,0L - -#define SN_set_msgExt "set-msgExt" -#define LN_set_msgExt "message extensions" -#define NID_set_msgExt 514 -#define OBJ_set_msgExt OBJ_id_set,1L - -#define SN_set_attr "set-attr" -#define NID_set_attr 515 -#define OBJ_set_attr OBJ_id_set,3L - -#define SN_set_policy "set-policy" -#define NID_set_policy 516 -#define OBJ_set_policy OBJ_id_set,5L - -#define SN_set_certExt "set-certExt" -#define LN_set_certExt "certificate extensions" -#define NID_set_certExt 517 -#define OBJ_set_certExt OBJ_id_set,7L - -#define SN_set_brand "set-brand" -#define NID_set_brand 518 -#define OBJ_set_brand OBJ_id_set,8L - -#define SN_setct_PANData "setct-PANData" -#define NID_setct_PANData 519 -#define OBJ_setct_PANData OBJ_set_ctype,0L - -#define SN_setct_PANToken "setct-PANToken" -#define NID_setct_PANToken 520 -#define OBJ_setct_PANToken OBJ_set_ctype,1L - -#define SN_setct_PANOnly "setct-PANOnly" -#define NID_setct_PANOnly 521 -#define OBJ_setct_PANOnly OBJ_set_ctype,2L - -#define SN_setct_OIData "setct-OIData" -#define NID_setct_OIData 522 -#define OBJ_setct_OIData OBJ_set_ctype,3L - -#define SN_setct_PI "setct-PI" -#define NID_setct_PI 523 -#define OBJ_setct_PI OBJ_set_ctype,4L - -#define SN_setct_PIData "setct-PIData" -#define NID_setct_PIData 524 -#define OBJ_setct_PIData OBJ_set_ctype,5L - -#define SN_setct_PIDataUnsigned "setct-PIDataUnsigned" -#define NID_setct_PIDataUnsigned 525 -#define OBJ_setct_PIDataUnsigned OBJ_set_ctype,6L - -#define SN_setct_HODInput "setct-HODInput" -#define NID_setct_HODInput 526 -#define OBJ_setct_HODInput OBJ_set_ctype,7L - -#define SN_setct_AuthResBaggage "setct-AuthResBaggage" -#define NID_setct_AuthResBaggage 527 -#define OBJ_setct_AuthResBaggage OBJ_set_ctype,8L - -#define SN_setct_AuthRevReqBaggage "setct-AuthRevReqBaggage" -#define NID_setct_AuthRevReqBaggage 528 -#define OBJ_setct_AuthRevReqBaggage OBJ_set_ctype,9L - -#define SN_setct_AuthRevResBaggage "setct-AuthRevResBaggage" -#define NID_setct_AuthRevResBaggage 529 -#define OBJ_setct_AuthRevResBaggage OBJ_set_ctype,10L - -#define SN_setct_CapTokenSeq "setct-CapTokenSeq" -#define NID_setct_CapTokenSeq 530 -#define OBJ_setct_CapTokenSeq OBJ_set_ctype,11L - -#define SN_setct_PInitResData "setct-PInitResData" -#define NID_setct_PInitResData 531 -#define OBJ_setct_PInitResData OBJ_set_ctype,12L - -#define SN_setct_PI_TBS "setct-PI-TBS" -#define NID_setct_PI_TBS 532 -#define OBJ_setct_PI_TBS OBJ_set_ctype,13L - -#define SN_setct_PResData "setct-PResData" -#define NID_setct_PResData 533 -#define OBJ_setct_PResData OBJ_set_ctype,14L - -#define SN_setct_AuthReqTBS "setct-AuthReqTBS" -#define NID_setct_AuthReqTBS 534 -#define OBJ_setct_AuthReqTBS OBJ_set_ctype,16L - -#define SN_setct_AuthResTBS "setct-AuthResTBS" -#define NID_setct_AuthResTBS 535 -#define OBJ_setct_AuthResTBS OBJ_set_ctype,17L - -#define SN_setct_AuthResTBSX "setct-AuthResTBSX" -#define NID_setct_AuthResTBSX 536 -#define OBJ_setct_AuthResTBSX OBJ_set_ctype,18L - -#define SN_setct_AuthTokenTBS "setct-AuthTokenTBS" -#define NID_setct_AuthTokenTBS 537 -#define OBJ_setct_AuthTokenTBS OBJ_set_ctype,19L - -#define SN_setct_CapTokenData "setct-CapTokenData" -#define NID_setct_CapTokenData 538 -#define OBJ_setct_CapTokenData OBJ_set_ctype,20L - -#define SN_setct_CapTokenTBS "setct-CapTokenTBS" -#define NID_setct_CapTokenTBS 539 -#define OBJ_setct_CapTokenTBS OBJ_set_ctype,21L - -#define SN_setct_AcqCardCodeMsg "setct-AcqCardCodeMsg" -#define NID_setct_AcqCardCodeMsg 540 -#define OBJ_setct_AcqCardCodeMsg OBJ_set_ctype,22L - -#define SN_setct_AuthRevReqTBS "setct-AuthRevReqTBS" -#define NID_setct_AuthRevReqTBS 541 -#define OBJ_setct_AuthRevReqTBS OBJ_set_ctype,23L - -#define SN_setct_AuthRevResData "setct-AuthRevResData" -#define NID_setct_AuthRevResData 542 -#define OBJ_setct_AuthRevResData OBJ_set_ctype,24L - -#define SN_setct_AuthRevResTBS "setct-AuthRevResTBS" -#define NID_setct_AuthRevResTBS 543 -#define OBJ_setct_AuthRevResTBS OBJ_set_ctype,25L - -#define SN_setct_CapReqTBS "setct-CapReqTBS" -#define NID_setct_CapReqTBS 544 -#define OBJ_setct_CapReqTBS OBJ_set_ctype,26L - -#define SN_setct_CapReqTBSX "setct-CapReqTBSX" -#define NID_setct_CapReqTBSX 545 -#define OBJ_setct_CapReqTBSX OBJ_set_ctype,27L - -#define SN_setct_CapResData "setct-CapResData" -#define NID_setct_CapResData 546 -#define OBJ_setct_CapResData OBJ_set_ctype,28L - -#define SN_setct_CapRevReqTBS "setct-CapRevReqTBS" -#define NID_setct_CapRevReqTBS 547 -#define OBJ_setct_CapRevReqTBS OBJ_set_ctype,29L - -#define SN_setct_CapRevReqTBSX "setct-CapRevReqTBSX" -#define NID_setct_CapRevReqTBSX 548 -#define OBJ_setct_CapRevReqTBSX OBJ_set_ctype,30L - -#define SN_setct_CapRevResData "setct-CapRevResData" -#define NID_setct_CapRevResData 549 -#define OBJ_setct_CapRevResData OBJ_set_ctype,31L - -#define SN_setct_CredReqTBS "setct-CredReqTBS" -#define NID_setct_CredReqTBS 550 -#define OBJ_setct_CredReqTBS OBJ_set_ctype,32L - -#define SN_setct_CredReqTBSX "setct-CredReqTBSX" -#define NID_setct_CredReqTBSX 551 -#define OBJ_setct_CredReqTBSX OBJ_set_ctype,33L - -#define SN_setct_CredResData "setct-CredResData" -#define NID_setct_CredResData 552 -#define OBJ_setct_CredResData OBJ_set_ctype,34L - -#define SN_setct_CredRevReqTBS "setct-CredRevReqTBS" -#define NID_setct_CredRevReqTBS 553 -#define OBJ_setct_CredRevReqTBS OBJ_set_ctype,35L - -#define SN_setct_CredRevReqTBSX "setct-CredRevReqTBSX" -#define NID_setct_CredRevReqTBSX 554 -#define OBJ_setct_CredRevReqTBSX OBJ_set_ctype,36L - -#define SN_setct_CredRevResData "setct-CredRevResData" -#define NID_setct_CredRevResData 555 -#define OBJ_setct_CredRevResData OBJ_set_ctype,37L - -#define SN_setct_PCertReqData "setct-PCertReqData" -#define NID_setct_PCertReqData 556 -#define OBJ_setct_PCertReqData OBJ_set_ctype,38L - -#define SN_setct_PCertResTBS "setct-PCertResTBS" -#define NID_setct_PCertResTBS 557 -#define OBJ_setct_PCertResTBS OBJ_set_ctype,39L - -#define SN_setct_BatchAdminReqData "setct-BatchAdminReqData" -#define NID_setct_BatchAdminReqData 558 -#define OBJ_setct_BatchAdminReqData OBJ_set_ctype,40L - -#define SN_setct_BatchAdminResData "setct-BatchAdminResData" -#define NID_setct_BatchAdminResData 559 -#define OBJ_setct_BatchAdminResData OBJ_set_ctype,41L - -#define SN_setct_CardCInitResTBS "setct-CardCInitResTBS" -#define NID_setct_CardCInitResTBS 560 -#define OBJ_setct_CardCInitResTBS OBJ_set_ctype,42L - -#define SN_setct_MeAqCInitResTBS "setct-MeAqCInitResTBS" -#define NID_setct_MeAqCInitResTBS 561 -#define OBJ_setct_MeAqCInitResTBS OBJ_set_ctype,43L - -#define SN_setct_RegFormResTBS "setct-RegFormResTBS" -#define NID_setct_RegFormResTBS 562 -#define OBJ_setct_RegFormResTBS OBJ_set_ctype,44L - -#define SN_setct_CertReqData "setct-CertReqData" -#define NID_setct_CertReqData 563 -#define OBJ_setct_CertReqData OBJ_set_ctype,45L - -#define SN_setct_CertReqTBS "setct-CertReqTBS" -#define NID_setct_CertReqTBS 564 -#define OBJ_setct_CertReqTBS OBJ_set_ctype,46L - -#define SN_setct_CertResData "setct-CertResData" -#define NID_setct_CertResData 565 -#define OBJ_setct_CertResData OBJ_set_ctype,47L - -#define SN_setct_CertInqReqTBS "setct-CertInqReqTBS" -#define NID_setct_CertInqReqTBS 566 -#define OBJ_setct_CertInqReqTBS OBJ_set_ctype,48L - -#define SN_setct_ErrorTBS "setct-ErrorTBS" -#define NID_setct_ErrorTBS 567 -#define OBJ_setct_ErrorTBS OBJ_set_ctype,49L - -#define SN_setct_PIDualSignedTBE "setct-PIDualSignedTBE" -#define NID_setct_PIDualSignedTBE 568 -#define OBJ_setct_PIDualSignedTBE OBJ_set_ctype,50L - -#define SN_setct_PIUnsignedTBE "setct-PIUnsignedTBE" -#define NID_setct_PIUnsignedTBE 569 -#define OBJ_setct_PIUnsignedTBE OBJ_set_ctype,51L - -#define SN_setct_AuthReqTBE "setct-AuthReqTBE" -#define NID_setct_AuthReqTBE 570 -#define OBJ_setct_AuthReqTBE OBJ_set_ctype,52L - -#define SN_setct_AuthResTBE "setct-AuthResTBE" -#define NID_setct_AuthResTBE 571 -#define OBJ_setct_AuthResTBE OBJ_set_ctype,53L - -#define SN_setct_AuthResTBEX "setct-AuthResTBEX" -#define NID_setct_AuthResTBEX 572 -#define OBJ_setct_AuthResTBEX OBJ_set_ctype,54L - -#define SN_setct_AuthTokenTBE "setct-AuthTokenTBE" -#define NID_setct_AuthTokenTBE 573 -#define OBJ_setct_AuthTokenTBE OBJ_set_ctype,55L - -#define SN_setct_CapTokenTBE "setct-CapTokenTBE" -#define NID_setct_CapTokenTBE 574 -#define OBJ_setct_CapTokenTBE OBJ_set_ctype,56L - -#define SN_setct_CapTokenTBEX "setct-CapTokenTBEX" -#define NID_setct_CapTokenTBEX 575 -#define OBJ_setct_CapTokenTBEX OBJ_set_ctype,57L - -#define SN_setct_AcqCardCodeMsgTBE "setct-AcqCardCodeMsgTBE" -#define NID_setct_AcqCardCodeMsgTBE 576 -#define OBJ_setct_AcqCardCodeMsgTBE OBJ_set_ctype,58L - -#define SN_setct_AuthRevReqTBE "setct-AuthRevReqTBE" -#define NID_setct_AuthRevReqTBE 577 -#define OBJ_setct_AuthRevReqTBE OBJ_set_ctype,59L - -#define SN_setct_AuthRevResTBE "setct-AuthRevResTBE" -#define NID_setct_AuthRevResTBE 578 -#define OBJ_setct_AuthRevResTBE OBJ_set_ctype,60L - -#define SN_setct_AuthRevResTBEB "setct-AuthRevResTBEB" -#define NID_setct_AuthRevResTBEB 579 -#define OBJ_setct_AuthRevResTBEB OBJ_set_ctype,61L - -#define SN_setct_CapReqTBE "setct-CapReqTBE" -#define NID_setct_CapReqTBE 580 -#define OBJ_setct_CapReqTBE OBJ_set_ctype,62L - -#define SN_setct_CapReqTBEX "setct-CapReqTBEX" -#define NID_setct_CapReqTBEX 581 -#define OBJ_setct_CapReqTBEX OBJ_set_ctype,63L - -#define SN_setct_CapResTBE "setct-CapResTBE" -#define NID_setct_CapResTBE 582 -#define OBJ_setct_CapResTBE OBJ_set_ctype,64L - -#define SN_setct_CapRevReqTBE "setct-CapRevReqTBE" -#define NID_setct_CapRevReqTBE 583 -#define OBJ_setct_CapRevReqTBE OBJ_set_ctype,65L - -#define SN_setct_CapRevReqTBEX "setct-CapRevReqTBEX" -#define NID_setct_CapRevReqTBEX 584 -#define OBJ_setct_CapRevReqTBEX OBJ_set_ctype,66L - -#define SN_setct_CapRevResTBE "setct-CapRevResTBE" -#define NID_setct_CapRevResTBE 585 -#define OBJ_setct_CapRevResTBE OBJ_set_ctype,67L - -#define SN_setct_CredReqTBE "setct-CredReqTBE" -#define NID_setct_CredReqTBE 586 -#define OBJ_setct_CredReqTBE OBJ_set_ctype,68L - -#define SN_setct_CredReqTBEX "setct-CredReqTBEX" -#define NID_setct_CredReqTBEX 587 -#define OBJ_setct_CredReqTBEX OBJ_set_ctype,69L - -#define SN_setct_CredResTBE "setct-CredResTBE" -#define NID_setct_CredResTBE 588 -#define OBJ_setct_CredResTBE OBJ_set_ctype,70L - -#define SN_setct_CredRevReqTBE "setct-CredRevReqTBE" -#define NID_setct_CredRevReqTBE 589 -#define OBJ_setct_CredRevReqTBE OBJ_set_ctype,71L - -#define SN_setct_CredRevReqTBEX "setct-CredRevReqTBEX" -#define NID_setct_CredRevReqTBEX 590 -#define OBJ_setct_CredRevReqTBEX OBJ_set_ctype,72L - -#define SN_setct_CredRevResTBE "setct-CredRevResTBE" -#define NID_setct_CredRevResTBE 591 -#define OBJ_setct_CredRevResTBE OBJ_set_ctype,73L - -#define SN_setct_BatchAdminReqTBE "setct-BatchAdminReqTBE" -#define NID_setct_BatchAdminReqTBE 592 -#define OBJ_setct_BatchAdminReqTBE OBJ_set_ctype,74L - -#define SN_setct_BatchAdminResTBE "setct-BatchAdminResTBE" -#define NID_setct_BatchAdminResTBE 593 -#define OBJ_setct_BatchAdminResTBE OBJ_set_ctype,75L - -#define SN_setct_RegFormReqTBE "setct-RegFormReqTBE" -#define NID_setct_RegFormReqTBE 594 -#define OBJ_setct_RegFormReqTBE OBJ_set_ctype,76L - -#define SN_setct_CertReqTBE "setct-CertReqTBE" -#define NID_setct_CertReqTBE 595 -#define OBJ_setct_CertReqTBE OBJ_set_ctype,77L - -#define SN_setct_CertReqTBEX "setct-CertReqTBEX" -#define NID_setct_CertReqTBEX 596 -#define OBJ_setct_CertReqTBEX OBJ_set_ctype,78L - -#define SN_setct_CertResTBE "setct-CertResTBE" -#define NID_setct_CertResTBE 597 -#define OBJ_setct_CertResTBE OBJ_set_ctype,79L - -#define SN_setct_CRLNotificationTBS "setct-CRLNotificationTBS" -#define NID_setct_CRLNotificationTBS 598 -#define OBJ_setct_CRLNotificationTBS OBJ_set_ctype,80L - -#define SN_setct_CRLNotificationResTBS "setct-CRLNotificationResTBS" -#define NID_setct_CRLNotificationResTBS 599 -#define OBJ_setct_CRLNotificationResTBS OBJ_set_ctype,81L - -#define SN_setct_BCIDistributionTBS "setct-BCIDistributionTBS" -#define NID_setct_BCIDistributionTBS 600 -#define OBJ_setct_BCIDistributionTBS OBJ_set_ctype,82L - -#define SN_setext_genCrypt "setext-genCrypt" -#define LN_setext_genCrypt "generic cryptogram" -#define NID_setext_genCrypt 601 -#define OBJ_setext_genCrypt OBJ_set_msgExt,1L - -#define SN_setext_miAuth "setext-miAuth" -#define LN_setext_miAuth "merchant initiated auth" -#define NID_setext_miAuth 602 -#define OBJ_setext_miAuth OBJ_set_msgExt,3L - -#define SN_setext_pinSecure "setext-pinSecure" -#define NID_setext_pinSecure 603 -#define OBJ_setext_pinSecure OBJ_set_msgExt,4L - -#define SN_setext_pinAny "setext-pinAny" -#define NID_setext_pinAny 604 -#define OBJ_setext_pinAny OBJ_set_msgExt,5L - -#define SN_setext_track2 "setext-track2" -#define NID_setext_track2 605 -#define OBJ_setext_track2 OBJ_set_msgExt,7L - -#define SN_setext_cv "setext-cv" -#define LN_setext_cv "additional verification" -#define NID_setext_cv 606 -#define OBJ_setext_cv OBJ_set_msgExt,8L - -#define SN_set_policy_root "set-policy-root" -#define NID_set_policy_root 607 -#define OBJ_set_policy_root OBJ_set_policy,0L - -#define SN_setCext_hashedRoot "setCext-hashedRoot" -#define NID_setCext_hashedRoot 608 -#define OBJ_setCext_hashedRoot OBJ_set_certExt,0L - -#define SN_setCext_certType "setCext-certType" -#define NID_setCext_certType 609 -#define OBJ_setCext_certType OBJ_set_certExt,1L - -#define SN_setCext_merchData "setCext-merchData" -#define NID_setCext_merchData 610 -#define OBJ_setCext_merchData OBJ_set_certExt,2L - -#define SN_setCext_cCertRequired "setCext-cCertRequired" -#define NID_setCext_cCertRequired 611 -#define OBJ_setCext_cCertRequired OBJ_set_certExt,3L - -#define SN_setCext_tunneling "setCext-tunneling" -#define NID_setCext_tunneling 612 -#define OBJ_setCext_tunneling OBJ_set_certExt,4L - -#define SN_setCext_setExt "setCext-setExt" -#define NID_setCext_setExt 613 -#define OBJ_setCext_setExt OBJ_set_certExt,5L - -#define SN_setCext_setQualf "setCext-setQualf" -#define NID_setCext_setQualf 614 -#define OBJ_setCext_setQualf OBJ_set_certExt,6L - -#define SN_setCext_PGWYcapabilities "setCext-PGWYcapabilities" -#define NID_setCext_PGWYcapabilities 615 -#define OBJ_setCext_PGWYcapabilities OBJ_set_certExt,7L - -#define SN_setCext_TokenIdentifier "setCext-TokenIdentifier" -#define NID_setCext_TokenIdentifier 616 -#define OBJ_setCext_TokenIdentifier OBJ_set_certExt,8L - -#define SN_setCext_Track2Data "setCext-Track2Data" -#define NID_setCext_Track2Data 617 -#define OBJ_setCext_Track2Data OBJ_set_certExt,9L - -#define SN_setCext_TokenType "setCext-TokenType" -#define NID_setCext_TokenType 618 -#define OBJ_setCext_TokenType OBJ_set_certExt,10L - -#define SN_setCext_IssuerCapabilities "setCext-IssuerCapabilities" -#define NID_setCext_IssuerCapabilities 619 -#define OBJ_setCext_IssuerCapabilities OBJ_set_certExt,11L - -#define SN_setAttr_Cert "setAttr-Cert" -#define NID_setAttr_Cert 620 -#define OBJ_setAttr_Cert OBJ_set_attr,0L - -#define SN_setAttr_PGWYcap "setAttr-PGWYcap" -#define LN_setAttr_PGWYcap "payment gateway capabilities" -#define NID_setAttr_PGWYcap 621 -#define OBJ_setAttr_PGWYcap OBJ_set_attr,1L - -#define SN_setAttr_TokenType "setAttr-TokenType" -#define NID_setAttr_TokenType 622 -#define OBJ_setAttr_TokenType OBJ_set_attr,2L - -#define SN_setAttr_IssCap "setAttr-IssCap" -#define LN_setAttr_IssCap "issuer capabilities" -#define NID_setAttr_IssCap 623 -#define OBJ_setAttr_IssCap OBJ_set_attr,3L - -#define SN_set_rootKeyThumb "set-rootKeyThumb" -#define NID_set_rootKeyThumb 624 -#define OBJ_set_rootKeyThumb OBJ_setAttr_Cert,0L - -#define SN_set_addPolicy "set-addPolicy" -#define NID_set_addPolicy 625 -#define OBJ_set_addPolicy OBJ_setAttr_Cert,1L - -#define SN_setAttr_Token_EMV "setAttr-Token-EMV" -#define NID_setAttr_Token_EMV 626 -#define OBJ_setAttr_Token_EMV OBJ_setAttr_TokenType,1L - -#define SN_setAttr_Token_B0Prime "setAttr-Token-B0Prime" -#define NID_setAttr_Token_B0Prime 627 -#define OBJ_setAttr_Token_B0Prime OBJ_setAttr_TokenType,2L - -#define SN_setAttr_IssCap_CVM "setAttr-IssCap-CVM" -#define NID_setAttr_IssCap_CVM 628 -#define OBJ_setAttr_IssCap_CVM OBJ_setAttr_IssCap,3L - -#define SN_setAttr_IssCap_T2 "setAttr-IssCap-T2" -#define NID_setAttr_IssCap_T2 629 -#define OBJ_setAttr_IssCap_T2 OBJ_setAttr_IssCap,4L - -#define SN_setAttr_IssCap_Sig "setAttr-IssCap-Sig" -#define NID_setAttr_IssCap_Sig 630 -#define OBJ_setAttr_IssCap_Sig OBJ_setAttr_IssCap,5L - -#define SN_setAttr_GenCryptgrm "setAttr-GenCryptgrm" -#define LN_setAttr_GenCryptgrm "generate cryptogram" -#define NID_setAttr_GenCryptgrm 631 -#define OBJ_setAttr_GenCryptgrm OBJ_setAttr_IssCap_CVM,1L - -#define SN_setAttr_T2Enc "setAttr-T2Enc" -#define LN_setAttr_T2Enc "encrypted track 2" -#define NID_setAttr_T2Enc 632 -#define OBJ_setAttr_T2Enc OBJ_setAttr_IssCap_T2,1L - -#define SN_setAttr_T2cleartxt "setAttr-T2cleartxt" -#define LN_setAttr_T2cleartxt "cleartext track 2" -#define NID_setAttr_T2cleartxt 633 -#define OBJ_setAttr_T2cleartxt OBJ_setAttr_IssCap_T2,2L - -#define SN_setAttr_TokICCsig "setAttr-TokICCsig" -#define LN_setAttr_TokICCsig "ICC or token signature" -#define NID_setAttr_TokICCsig 634 -#define OBJ_setAttr_TokICCsig OBJ_setAttr_IssCap_Sig,1L - -#define SN_setAttr_SecDevSig "setAttr-SecDevSig" -#define LN_setAttr_SecDevSig "secure device signature" -#define NID_setAttr_SecDevSig 635 -#define OBJ_setAttr_SecDevSig OBJ_setAttr_IssCap_Sig,2L - -#define SN_set_brand_IATA_ATA "set-brand-IATA-ATA" -#define NID_set_brand_IATA_ATA 636 -#define OBJ_set_brand_IATA_ATA OBJ_set_brand,1L - -#define SN_set_brand_Diners "set-brand-Diners" -#define NID_set_brand_Diners 637 -#define OBJ_set_brand_Diners OBJ_set_brand,30L - -#define SN_set_brand_AmericanExpress "set-brand-AmericanExpress" -#define NID_set_brand_AmericanExpress 638 -#define OBJ_set_brand_AmericanExpress OBJ_set_brand,34L - -#define SN_set_brand_JCB "set-brand-JCB" -#define NID_set_brand_JCB 639 -#define OBJ_set_brand_JCB OBJ_set_brand,35L - -#define SN_set_brand_Visa "set-brand-Visa" -#define NID_set_brand_Visa 640 -#define OBJ_set_brand_Visa OBJ_set_brand,4L - -#define SN_set_brand_MasterCard "set-brand-MasterCard" -#define NID_set_brand_MasterCard 641 -#define OBJ_set_brand_MasterCard OBJ_set_brand,5L - -#define SN_set_brand_Novus "set-brand-Novus" -#define NID_set_brand_Novus 642 -#define OBJ_set_brand_Novus OBJ_set_brand,6011L - -#define SN_des_cdmf "DES-CDMF" -#define LN_des_cdmf "des-cdmf" -#define NID_des_cdmf 643 -#define OBJ_des_cdmf OBJ_rsadsi,3L,10L - -#define SN_rsaOAEPEncryptionSET "rsaOAEPEncryptionSET" -#define NID_rsaOAEPEncryptionSET 644 -#define OBJ_rsaOAEPEncryptionSET OBJ_rsadsi,1L,1L,6L - -#define SN_ipsec3 "Oakley-EC2N-3" -#define LN_ipsec3 "ipsec3" -#define NID_ipsec3 749 - -#define SN_ipsec4 "Oakley-EC2N-4" -#define LN_ipsec4 "ipsec4" -#define NID_ipsec4 750 - -#define SN_whirlpool "whirlpool" -#define NID_whirlpool 804 -#define OBJ_whirlpool OBJ_iso,0L,10118L,3L,0L,55L - -#define SN_cryptopro "cryptopro" -#define NID_cryptopro 805 -#define OBJ_cryptopro OBJ_member_body,643L,2L,2L - -#define SN_cryptocom "cryptocom" -#define NID_cryptocom 806 -#define OBJ_cryptocom OBJ_member_body,643L,2L,9L - -#define SN_id_GostR3411_94_with_GostR3410_2001 "id-GostR3411-94-with-GostR3410-2001" -#define LN_id_GostR3411_94_with_GostR3410_2001 "GOST R 34.11-94 with GOST R 34.10-2001" -#define NID_id_GostR3411_94_with_GostR3410_2001 807 -#define OBJ_id_GostR3411_94_with_GostR3410_2001 OBJ_cryptopro,3L - -#define SN_id_GostR3411_94_with_GostR3410_94 "id-GostR3411-94-with-GostR3410-94" -#define LN_id_GostR3411_94_with_GostR3410_94 "GOST R 34.11-94 with GOST R 34.10-94" -#define NID_id_GostR3411_94_with_GostR3410_94 808 -#define OBJ_id_GostR3411_94_with_GostR3410_94 OBJ_cryptopro,4L - -#define SN_id_GostR3411_94 "md_gost94" -#define LN_id_GostR3411_94 "GOST R 34.11-94" -#define NID_id_GostR3411_94 809 -#define OBJ_id_GostR3411_94 OBJ_cryptopro,9L - -#define SN_id_HMACGostR3411_94 "id-HMACGostR3411-94" -#define LN_id_HMACGostR3411_94 "HMAC GOST 34.11-94" -#define NID_id_HMACGostR3411_94 810 -#define OBJ_id_HMACGostR3411_94 OBJ_cryptopro,10L - -#define SN_id_GostR3410_2001 "gost2001" -#define LN_id_GostR3410_2001 "GOST R 34.10-2001" -#define NID_id_GostR3410_2001 811 -#define OBJ_id_GostR3410_2001 OBJ_cryptopro,19L - -#define SN_id_GostR3410_94 "gost94" -#define LN_id_GostR3410_94 "GOST R 34.10-94" -#define NID_id_GostR3410_94 812 -#define OBJ_id_GostR3410_94 OBJ_cryptopro,20L - -#define SN_id_Gost28147_89 "gost89" -#define LN_id_Gost28147_89 "GOST 28147-89" -#define NID_id_Gost28147_89 813 -#define OBJ_id_Gost28147_89 OBJ_cryptopro,21L - -#define SN_gost89_cnt "gost89-cnt" -#define NID_gost89_cnt 814 - -#define SN_id_Gost28147_89_MAC "gost-mac" -#define LN_id_Gost28147_89_MAC "GOST 28147-89 MAC" -#define NID_id_Gost28147_89_MAC 815 -#define OBJ_id_Gost28147_89_MAC OBJ_cryptopro,22L - -#define SN_id_GostR3411_94_prf "prf-gostr3411-94" -#define LN_id_GostR3411_94_prf "GOST R 34.11-94 PRF" -#define NID_id_GostR3411_94_prf 816 -#define OBJ_id_GostR3411_94_prf OBJ_cryptopro,23L - -#define SN_id_GostR3410_2001DH "id-GostR3410-2001DH" -#define LN_id_GostR3410_2001DH "GOST R 34.10-2001 DH" -#define NID_id_GostR3410_2001DH 817 -#define OBJ_id_GostR3410_2001DH OBJ_cryptopro,98L - -#define SN_id_GostR3410_94DH "id-GostR3410-94DH" -#define LN_id_GostR3410_94DH "GOST R 34.10-94 DH" -#define NID_id_GostR3410_94DH 818 -#define OBJ_id_GostR3410_94DH OBJ_cryptopro,99L - -#define SN_id_Gost28147_89_CryptoPro_KeyMeshing "id-Gost28147-89-CryptoPro-KeyMeshing" -#define NID_id_Gost28147_89_CryptoPro_KeyMeshing 819 -#define OBJ_id_Gost28147_89_CryptoPro_KeyMeshing OBJ_cryptopro,14L,1L - -#define SN_id_Gost28147_89_None_KeyMeshing "id-Gost28147-89-None-KeyMeshing" -#define NID_id_Gost28147_89_None_KeyMeshing 820 -#define OBJ_id_Gost28147_89_None_KeyMeshing OBJ_cryptopro,14L,0L - -#define SN_id_GostR3411_94_TestParamSet "id-GostR3411-94-TestParamSet" -#define NID_id_GostR3411_94_TestParamSet 821 -#define OBJ_id_GostR3411_94_TestParamSet OBJ_cryptopro,30L,0L - -#define SN_id_GostR3411_94_CryptoProParamSet "id-GostR3411-94-CryptoProParamSet" -#define NID_id_GostR3411_94_CryptoProParamSet 822 -#define OBJ_id_GostR3411_94_CryptoProParamSet OBJ_cryptopro,30L,1L - -#define SN_id_Gost28147_89_TestParamSet "id-Gost28147-89-TestParamSet" -#define NID_id_Gost28147_89_TestParamSet 823 -#define OBJ_id_Gost28147_89_TestParamSet OBJ_cryptopro,31L,0L - -#define SN_id_Gost28147_89_CryptoPro_A_ParamSet "id-Gost28147-89-CryptoPro-A-ParamSet" -#define NID_id_Gost28147_89_CryptoPro_A_ParamSet 824 -#define OBJ_id_Gost28147_89_CryptoPro_A_ParamSet OBJ_cryptopro,31L,1L - -#define SN_id_Gost28147_89_CryptoPro_B_ParamSet "id-Gost28147-89-CryptoPro-B-ParamSet" -#define NID_id_Gost28147_89_CryptoPro_B_ParamSet 825 -#define OBJ_id_Gost28147_89_CryptoPro_B_ParamSet OBJ_cryptopro,31L,2L - -#define SN_id_Gost28147_89_CryptoPro_C_ParamSet "id-Gost28147-89-CryptoPro-C-ParamSet" -#define NID_id_Gost28147_89_CryptoPro_C_ParamSet 826 -#define OBJ_id_Gost28147_89_CryptoPro_C_ParamSet OBJ_cryptopro,31L,3L - -#define SN_id_Gost28147_89_CryptoPro_D_ParamSet "id-Gost28147-89-CryptoPro-D-ParamSet" -#define NID_id_Gost28147_89_CryptoPro_D_ParamSet 827 -#define OBJ_id_Gost28147_89_CryptoPro_D_ParamSet OBJ_cryptopro,31L,4L - -#define SN_id_Gost28147_89_CryptoPro_Oscar_1_1_ParamSet "id-Gost28147-89-CryptoPro-Oscar-1-1-ParamSet" -#define NID_id_Gost28147_89_CryptoPro_Oscar_1_1_ParamSet 828 -#define OBJ_id_Gost28147_89_CryptoPro_Oscar_1_1_ParamSet OBJ_cryptopro,31L,5L - -#define SN_id_Gost28147_89_CryptoPro_Oscar_1_0_ParamSet "id-Gost28147-89-CryptoPro-Oscar-1-0-ParamSet" -#define NID_id_Gost28147_89_CryptoPro_Oscar_1_0_ParamSet 829 -#define OBJ_id_Gost28147_89_CryptoPro_Oscar_1_0_ParamSet OBJ_cryptopro,31L,6L - -#define SN_id_Gost28147_89_CryptoPro_RIC_1_ParamSet "id-Gost28147-89-CryptoPro-RIC-1-ParamSet" -#define NID_id_Gost28147_89_CryptoPro_RIC_1_ParamSet 830 -#define OBJ_id_Gost28147_89_CryptoPro_RIC_1_ParamSet OBJ_cryptopro,31L,7L - -#define SN_id_GostR3410_94_TestParamSet "id-GostR3410-94-TestParamSet" -#define NID_id_GostR3410_94_TestParamSet 831 -#define OBJ_id_GostR3410_94_TestParamSet OBJ_cryptopro,32L,0L - -#define SN_id_GostR3410_94_CryptoPro_A_ParamSet "id-GostR3410-94-CryptoPro-A-ParamSet" -#define NID_id_GostR3410_94_CryptoPro_A_ParamSet 832 -#define OBJ_id_GostR3410_94_CryptoPro_A_ParamSet OBJ_cryptopro,32L,2L - -#define SN_id_GostR3410_94_CryptoPro_B_ParamSet "id-GostR3410-94-CryptoPro-B-ParamSet" -#define NID_id_GostR3410_94_CryptoPro_B_ParamSet 833 -#define OBJ_id_GostR3410_94_CryptoPro_B_ParamSet OBJ_cryptopro,32L,3L - -#define SN_id_GostR3410_94_CryptoPro_C_ParamSet "id-GostR3410-94-CryptoPro-C-ParamSet" -#define NID_id_GostR3410_94_CryptoPro_C_ParamSet 834 -#define OBJ_id_GostR3410_94_CryptoPro_C_ParamSet OBJ_cryptopro,32L,4L - -#define SN_id_GostR3410_94_CryptoPro_D_ParamSet "id-GostR3410-94-CryptoPro-D-ParamSet" -#define NID_id_GostR3410_94_CryptoPro_D_ParamSet 835 -#define OBJ_id_GostR3410_94_CryptoPro_D_ParamSet OBJ_cryptopro,32L,5L - -#define SN_id_GostR3410_94_CryptoPro_XchA_ParamSet "id-GostR3410-94-CryptoPro-XchA-ParamSet" -#define NID_id_GostR3410_94_CryptoPro_XchA_ParamSet 836 -#define OBJ_id_GostR3410_94_CryptoPro_XchA_ParamSet OBJ_cryptopro,33L,1L - -#define SN_id_GostR3410_94_CryptoPro_XchB_ParamSet "id-GostR3410-94-CryptoPro-XchB-ParamSet" -#define NID_id_GostR3410_94_CryptoPro_XchB_ParamSet 837 -#define OBJ_id_GostR3410_94_CryptoPro_XchB_ParamSet OBJ_cryptopro,33L,2L - -#define SN_id_GostR3410_94_CryptoPro_XchC_ParamSet "id-GostR3410-94-CryptoPro-XchC-ParamSet" -#define NID_id_GostR3410_94_CryptoPro_XchC_ParamSet 838 -#define OBJ_id_GostR3410_94_CryptoPro_XchC_ParamSet OBJ_cryptopro,33L,3L - -#define SN_id_GostR3410_2001_TestParamSet "id-GostR3410-2001-TestParamSet" -#define NID_id_GostR3410_2001_TestParamSet 839 -#define OBJ_id_GostR3410_2001_TestParamSet OBJ_cryptopro,35L,0L - -#define SN_id_GostR3410_2001_CryptoPro_A_ParamSet "id-GostR3410-2001-CryptoPro-A-ParamSet" -#define NID_id_GostR3410_2001_CryptoPro_A_ParamSet 840 -#define OBJ_id_GostR3410_2001_CryptoPro_A_ParamSet OBJ_cryptopro,35L,1L - -#define SN_id_GostR3410_2001_CryptoPro_B_ParamSet "id-GostR3410-2001-CryptoPro-B-ParamSet" -#define NID_id_GostR3410_2001_CryptoPro_B_ParamSet 841 -#define OBJ_id_GostR3410_2001_CryptoPro_B_ParamSet OBJ_cryptopro,35L,2L - -#define SN_id_GostR3410_2001_CryptoPro_C_ParamSet "id-GostR3410-2001-CryptoPro-C-ParamSet" -#define NID_id_GostR3410_2001_CryptoPro_C_ParamSet 842 -#define OBJ_id_GostR3410_2001_CryptoPro_C_ParamSet OBJ_cryptopro,35L,3L - -#define SN_id_GostR3410_2001_CryptoPro_XchA_ParamSet "id-GostR3410-2001-CryptoPro-XchA-ParamSet" -#define NID_id_GostR3410_2001_CryptoPro_XchA_ParamSet 843 -#define OBJ_id_GostR3410_2001_CryptoPro_XchA_ParamSet OBJ_cryptopro,36L,0L - -#define SN_id_GostR3410_2001_CryptoPro_XchB_ParamSet "id-GostR3410-2001-CryptoPro-XchB-ParamSet" -#define NID_id_GostR3410_2001_CryptoPro_XchB_ParamSet 844 -#define OBJ_id_GostR3410_2001_CryptoPro_XchB_ParamSet OBJ_cryptopro,36L,1L - -#define SN_id_GostR3410_94_a "id-GostR3410-94-a" -#define NID_id_GostR3410_94_a 845 -#define OBJ_id_GostR3410_94_a OBJ_id_GostR3410_94,1L - -#define SN_id_GostR3410_94_aBis "id-GostR3410-94-aBis" -#define NID_id_GostR3410_94_aBis 846 -#define OBJ_id_GostR3410_94_aBis OBJ_id_GostR3410_94,2L - -#define SN_id_GostR3410_94_b "id-GostR3410-94-b" -#define NID_id_GostR3410_94_b 847 -#define OBJ_id_GostR3410_94_b OBJ_id_GostR3410_94,3L - -#define SN_id_GostR3410_94_bBis "id-GostR3410-94-bBis" -#define NID_id_GostR3410_94_bBis 848 -#define OBJ_id_GostR3410_94_bBis OBJ_id_GostR3410_94,4L - -#define SN_id_Gost28147_89_cc "id-Gost28147-89-cc" -#define LN_id_Gost28147_89_cc "GOST 28147-89 Cryptocom ParamSet" -#define NID_id_Gost28147_89_cc 849 -#define OBJ_id_Gost28147_89_cc OBJ_cryptocom,1L,6L,1L - -#define SN_id_GostR3410_94_cc "gost94cc" -#define LN_id_GostR3410_94_cc "GOST 34.10-94 Cryptocom" -#define NID_id_GostR3410_94_cc 850 -#define OBJ_id_GostR3410_94_cc OBJ_cryptocom,1L,5L,3L - -#define SN_id_GostR3410_2001_cc "gost2001cc" -#define LN_id_GostR3410_2001_cc "GOST 34.10-2001 Cryptocom" -#define NID_id_GostR3410_2001_cc 851 -#define OBJ_id_GostR3410_2001_cc OBJ_cryptocom,1L,5L,4L - -#define SN_id_GostR3411_94_with_GostR3410_94_cc "id-GostR3411-94-with-GostR3410-94-cc" -#define LN_id_GostR3411_94_with_GostR3410_94_cc "GOST R 34.11-94 with GOST R 34.10-94 Cryptocom" -#define NID_id_GostR3411_94_with_GostR3410_94_cc 852 -#define OBJ_id_GostR3411_94_with_GostR3410_94_cc OBJ_cryptocom,1L,3L,3L - -#define SN_id_GostR3411_94_with_GostR3410_2001_cc "id-GostR3411-94-with-GostR3410-2001-cc" -#define LN_id_GostR3411_94_with_GostR3410_2001_cc "GOST R 34.11-94 with GOST R 34.10-2001 Cryptocom" -#define NID_id_GostR3411_94_with_GostR3410_2001_cc 853 -#define OBJ_id_GostR3411_94_with_GostR3410_2001_cc OBJ_cryptocom,1L,3L,4L - -#define SN_id_GostR3410_2001_ParamSet_cc "id-GostR3410-2001-ParamSet-cc" -#define LN_id_GostR3410_2001_ParamSet_cc "GOST R 3410-2001 Parameter Set Cryptocom" -#define NID_id_GostR3410_2001_ParamSet_cc 854 -#define OBJ_id_GostR3410_2001_ParamSet_cc OBJ_cryptocom,1L,8L,1L - -#define SN_camellia_128_cbc "CAMELLIA-128-CBC" -#define LN_camellia_128_cbc "camellia-128-cbc" -#define NID_camellia_128_cbc 751 -#define OBJ_camellia_128_cbc 1L,2L,392L,200011L,61L,1L,1L,1L,2L - -#define SN_camellia_192_cbc "CAMELLIA-192-CBC" -#define LN_camellia_192_cbc "camellia-192-cbc" -#define NID_camellia_192_cbc 752 -#define OBJ_camellia_192_cbc 1L,2L,392L,200011L,61L,1L,1L,1L,3L - -#define SN_camellia_256_cbc "CAMELLIA-256-CBC" -#define LN_camellia_256_cbc "camellia-256-cbc" -#define NID_camellia_256_cbc 753 -#define OBJ_camellia_256_cbc 1L,2L,392L,200011L,61L,1L,1L,1L,4L - -#define SN_id_camellia128_wrap "id-camellia128-wrap" -#define NID_id_camellia128_wrap 907 -#define OBJ_id_camellia128_wrap 1L,2L,392L,200011L,61L,1L,1L,3L,2L - -#define SN_id_camellia192_wrap "id-camellia192-wrap" -#define NID_id_camellia192_wrap 908 -#define OBJ_id_camellia192_wrap 1L,2L,392L,200011L,61L,1L,1L,3L,3L - -#define SN_id_camellia256_wrap "id-camellia256-wrap" -#define NID_id_camellia256_wrap 909 -#define OBJ_id_camellia256_wrap 1L,2L,392L,200011L,61L,1L,1L,3L,4L - -#define OBJ_ntt_ds 0L,3L,4401L,5L - -#define OBJ_camellia OBJ_ntt_ds,3L,1L,9L - -#define SN_camellia_128_ecb "CAMELLIA-128-ECB" -#define LN_camellia_128_ecb "camellia-128-ecb" -#define NID_camellia_128_ecb 754 -#define OBJ_camellia_128_ecb OBJ_camellia,1L - -#define SN_camellia_128_ofb128 "CAMELLIA-128-OFB" -#define LN_camellia_128_ofb128 "camellia-128-ofb" -#define NID_camellia_128_ofb128 766 -#define OBJ_camellia_128_ofb128 OBJ_camellia,3L - -#define SN_camellia_128_cfb128 "CAMELLIA-128-CFB" -#define LN_camellia_128_cfb128 "camellia-128-cfb" -#define NID_camellia_128_cfb128 757 -#define OBJ_camellia_128_cfb128 OBJ_camellia,4L - -#define SN_camellia_192_ecb "CAMELLIA-192-ECB" -#define LN_camellia_192_ecb "camellia-192-ecb" -#define NID_camellia_192_ecb 755 -#define OBJ_camellia_192_ecb OBJ_camellia,21L - -#define SN_camellia_192_ofb128 "CAMELLIA-192-OFB" -#define LN_camellia_192_ofb128 "camellia-192-ofb" -#define NID_camellia_192_ofb128 767 -#define OBJ_camellia_192_ofb128 OBJ_camellia,23L - -#define SN_camellia_192_cfb128 "CAMELLIA-192-CFB" -#define LN_camellia_192_cfb128 "camellia-192-cfb" -#define NID_camellia_192_cfb128 758 -#define OBJ_camellia_192_cfb128 OBJ_camellia,24L - -#define SN_camellia_256_ecb "CAMELLIA-256-ECB" -#define LN_camellia_256_ecb "camellia-256-ecb" -#define NID_camellia_256_ecb 756 -#define OBJ_camellia_256_ecb OBJ_camellia,41L - -#define SN_camellia_256_ofb128 "CAMELLIA-256-OFB" -#define LN_camellia_256_ofb128 "camellia-256-ofb" -#define NID_camellia_256_ofb128 768 -#define OBJ_camellia_256_ofb128 OBJ_camellia,43L - -#define SN_camellia_256_cfb128 "CAMELLIA-256-CFB" -#define LN_camellia_256_cfb128 "camellia-256-cfb" -#define NID_camellia_256_cfb128 759 -#define OBJ_camellia_256_cfb128 OBJ_camellia,44L - -#define SN_camellia_128_cfb1 "CAMELLIA-128-CFB1" -#define LN_camellia_128_cfb1 "camellia-128-cfb1" -#define NID_camellia_128_cfb1 760 - -#define SN_camellia_192_cfb1 "CAMELLIA-192-CFB1" -#define LN_camellia_192_cfb1 "camellia-192-cfb1" -#define NID_camellia_192_cfb1 761 - -#define SN_camellia_256_cfb1 "CAMELLIA-256-CFB1" -#define LN_camellia_256_cfb1 "camellia-256-cfb1" -#define NID_camellia_256_cfb1 762 - -#define SN_camellia_128_cfb8 "CAMELLIA-128-CFB8" -#define LN_camellia_128_cfb8 "camellia-128-cfb8" -#define NID_camellia_128_cfb8 763 - -#define SN_camellia_192_cfb8 "CAMELLIA-192-CFB8" -#define LN_camellia_192_cfb8 "camellia-192-cfb8" -#define NID_camellia_192_cfb8 764 - -#define SN_camellia_256_cfb8 "CAMELLIA-256-CFB8" -#define LN_camellia_256_cfb8 "camellia-256-cfb8" -#define NID_camellia_256_cfb8 765 - -#define SN_kisa "KISA" -#define LN_kisa "kisa" -#define NID_kisa 773 -#define OBJ_kisa OBJ_member_body,410L,200004L - -#define SN_seed_ecb "SEED-ECB" -#define LN_seed_ecb "seed-ecb" -#define NID_seed_ecb 776 -#define OBJ_seed_ecb OBJ_kisa,1L,3L - -#define SN_seed_cbc "SEED-CBC" -#define LN_seed_cbc "seed-cbc" -#define NID_seed_cbc 777 -#define OBJ_seed_cbc OBJ_kisa,1L,4L - -#define SN_seed_cfb128 "SEED-CFB" -#define LN_seed_cfb128 "seed-cfb" -#define NID_seed_cfb128 779 -#define OBJ_seed_cfb128 OBJ_kisa,1L,5L - -#define SN_seed_ofb128 "SEED-OFB" -#define LN_seed_ofb128 "seed-ofb" -#define NID_seed_ofb128 778 -#define OBJ_seed_ofb128 OBJ_kisa,1L,6L - -#define SN_hmac "HMAC" -#define LN_hmac "hmac" -#define NID_hmac 855 - -#define SN_cmac "CMAC" -#define LN_cmac "cmac" -#define NID_cmac 894 - -#define SN_rc4_hmac_md5 "RC4-HMAC-MD5" -#define LN_rc4_hmac_md5 "rc4-hmac-md5" -#define NID_rc4_hmac_md5 915 - -#define SN_aes_128_cbc_hmac_sha1 "AES-128-CBC-HMAC-SHA1" -#define LN_aes_128_cbc_hmac_sha1 "aes-128-cbc-hmac-sha1" -#define NID_aes_128_cbc_hmac_sha1 916 - -#define SN_aes_192_cbc_hmac_sha1 "AES-192-CBC-HMAC-SHA1" -#define LN_aes_192_cbc_hmac_sha1 "aes-192-cbc-hmac-sha1" -#define NID_aes_192_cbc_hmac_sha1 917 - -#define SN_aes_256_cbc_hmac_sha1 "AES-256-CBC-HMAC-SHA1" -#define LN_aes_256_cbc_hmac_sha1 "aes-256-cbc-hmac-sha1" -#define NID_aes_256_cbc_hmac_sha1 918 - diff --git a/Pods/OpenSSL-Universal/include-osx/openssl/objects.h b/Pods/OpenSSL-Universal/include-osx/openssl/objects.h deleted file mode 100644 index bd0ee52f..00000000 --- a/Pods/OpenSSL-Universal/include-osx/openssl/objects.h +++ /dev/null @@ -1,1138 +0,0 @@ -/* crypto/objects/objects.h */ -/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) - * All rights reserved. - * - * This package is an SSL implementation written - * by Eric Young (eay@cryptsoft.com). - * The implementation was written so as to conform with Netscapes SSL. - * - * This library is free for commercial and non-commercial use as long as - * the following conditions are aheared to. The following conditions - * apply to all code found in this distribution, be it the RC4, RSA, - * lhash, DES, etc., code; not just the SSL code. The SSL documentation - * included with this distribution is covered by the same copyright terms - * except that the holder is Tim Hudson (tjh@cryptsoft.com). - * - * Copyright remains Eric Young's, and as such any Copyright notices in - * the code are not to be removed. - * If this package is used in a product, Eric Young should be given attribution - * as the author of the parts of the library used. - * This can be in the form of a textual message at program startup or - * in documentation (online or textual) provided with the package. - * - * Redistribution and use in source and binary forms, with or without - * modification, are permitted provided that the following conditions - * are met: - * 1. Redistributions of source code must retain the copyright - * notice, this list of conditions and the following disclaimer. - * 2. Redistributions in binary form must reproduce the above copyright - * notice, this list of conditions and the following disclaimer in the - * documentation and/or other materials provided with the distribution. - * 3. All advertising materials mentioning features or use of this software - * must display the following acknowledgement: - * "This product includes cryptographic software written by - * Eric Young (eay@cryptsoft.com)" - * The word 'cryptographic' can be left out if the rouines from the library - * being used are not cryptographic related :-). - * 4. If you include any Windows specific code (or a derivative thereof) from - * the apps directory (application code) you must include an acknowledgement: - * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" - * - * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND - * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE - * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE - * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE - * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL - * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS - * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) - * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT - * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY - * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF - * SUCH DAMAGE. - * - * The licence and distribution terms for any publically available version or - * derivative of this code cannot be changed. i.e. this code cannot simply be - * copied and put under another distribution licence - * [including the GNU Public Licence.] - */ - -#ifndef HEADER_OBJECTS_H -#define HEADER_OBJECTS_H - -#define USE_OBJ_MAC - -#ifdef USE_OBJ_MAC -#include -#else -#define SN_undef "UNDEF" -#define LN_undef "undefined" -#define NID_undef 0 -#define OBJ_undef 0L - -#define SN_Algorithm "Algorithm" -#define LN_algorithm "algorithm" -#define NID_algorithm 38 -#define OBJ_algorithm 1L,3L,14L,3L,2L - -#define LN_rsadsi "rsadsi" -#define NID_rsadsi 1 -#define OBJ_rsadsi 1L,2L,840L,113549L - -#define LN_pkcs "pkcs" -#define NID_pkcs 2 -#define OBJ_pkcs OBJ_rsadsi,1L - -#define SN_md2 "MD2" -#define LN_md2 "md2" -#define NID_md2 3 -#define OBJ_md2 OBJ_rsadsi,2L,2L - -#define SN_md5 "MD5" -#define LN_md5 "md5" -#define NID_md5 4 -#define OBJ_md5 OBJ_rsadsi,2L,5L - -#define SN_rc4 "RC4" -#define LN_rc4 "rc4" -#define NID_rc4 5 -#define OBJ_rc4 OBJ_rsadsi,3L,4L - -#define LN_rsaEncryption "rsaEncryption" -#define NID_rsaEncryption 6 -#define OBJ_rsaEncryption OBJ_pkcs,1L,1L - -#define SN_md2WithRSAEncryption "RSA-MD2" -#define LN_md2WithRSAEncryption "md2WithRSAEncryption" -#define NID_md2WithRSAEncryption 7 -#define OBJ_md2WithRSAEncryption OBJ_pkcs,1L,2L - -#define SN_md5WithRSAEncryption "RSA-MD5" -#define LN_md5WithRSAEncryption "md5WithRSAEncryption" -#define NID_md5WithRSAEncryption 8 -#define OBJ_md5WithRSAEncryption OBJ_pkcs,1L,4L - -#define SN_pbeWithMD2AndDES_CBC "PBE-MD2-DES" -#define LN_pbeWithMD2AndDES_CBC "pbeWithMD2AndDES-CBC" -#define NID_pbeWithMD2AndDES_CBC 9 -#define OBJ_pbeWithMD2AndDES_CBC OBJ_pkcs,5L,1L - -#define SN_pbeWithMD5AndDES_CBC "PBE-MD5-DES" -#define LN_pbeWithMD5AndDES_CBC "pbeWithMD5AndDES-CBC" -#define NID_pbeWithMD5AndDES_CBC 10 -#define OBJ_pbeWithMD5AndDES_CBC OBJ_pkcs,5L,3L - -#define LN_X500 "X500" -#define NID_X500 11 -#define OBJ_X500 2L,5L - -#define LN_X509 "X509" -#define NID_X509 12 -#define OBJ_X509 OBJ_X500,4L - -#define SN_commonName "CN" -#define LN_commonName "commonName" -#define NID_commonName 13 -#define OBJ_commonName OBJ_X509,3L - -#define SN_countryName "C" -#define LN_countryName "countryName" -#define NID_countryName 14 -#define OBJ_countryName OBJ_X509,6L - -#define SN_localityName "L" -#define LN_localityName "localityName" -#define NID_localityName 15 -#define OBJ_localityName OBJ_X509,7L - -/* Postal Address? PA */ - -/* should be "ST" (rfc1327) but MS uses 'S' */ -#define SN_stateOrProvinceName "ST" -#define LN_stateOrProvinceName "stateOrProvinceName" -#define NID_stateOrProvinceName 16 -#define OBJ_stateOrProvinceName OBJ_X509,8L - -#define SN_organizationName "O" -#define LN_organizationName "organizationName" -#define NID_organizationName 17 -#define OBJ_organizationName OBJ_X509,10L - -#define SN_organizationalUnitName "OU" -#define LN_organizationalUnitName "organizationalUnitName" -#define NID_organizationalUnitName 18 -#define OBJ_organizationalUnitName OBJ_X509,11L - -#define SN_rsa "RSA" -#define LN_rsa "rsa" -#define NID_rsa 19 -#define OBJ_rsa OBJ_X500,8L,1L,1L - -#define LN_pkcs7 "pkcs7" -#define NID_pkcs7 20 -#define OBJ_pkcs7 OBJ_pkcs,7L - -#define LN_pkcs7_data "pkcs7-data" -#define NID_pkcs7_data 21 -#define OBJ_pkcs7_data OBJ_pkcs7,1L - -#define LN_pkcs7_signed "pkcs7-signedData" -#define NID_pkcs7_signed 22 -#define OBJ_pkcs7_signed OBJ_pkcs7,2L - -#define LN_pkcs7_enveloped "pkcs7-envelopedData" -#define NID_pkcs7_enveloped 23 -#define OBJ_pkcs7_enveloped OBJ_pkcs7,3L - -#define LN_pkcs7_signedAndEnveloped "pkcs7-signedAndEnvelopedData" -#define NID_pkcs7_signedAndEnveloped 24 -#define OBJ_pkcs7_signedAndEnveloped OBJ_pkcs7,4L - -#define LN_pkcs7_digest "pkcs7-digestData" -#define NID_pkcs7_digest 25 -#define OBJ_pkcs7_digest OBJ_pkcs7,5L - -#define LN_pkcs7_encrypted "pkcs7-encryptedData" -#define NID_pkcs7_encrypted 26 -#define OBJ_pkcs7_encrypted OBJ_pkcs7,6L - -#define LN_pkcs3 "pkcs3" -#define NID_pkcs3 27 -#define OBJ_pkcs3 OBJ_pkcs,3L - -#define LN_dhKeyAgreement "dhKeyAgreement" -#define NID_dhKeyAgreement 28 -#define OBJ_dhKeyAgreement OBJ_pkcs3,1L - -#define SN_des_ecb "DES-ECB" -#define LN_des_ecb "des-ecb" -#define NID_des_ecb 29 -#define OBJ_des_ecb OBJ_algorithm,6L - -#define SN_des_cfb64 "DES-CFB" -#define LN_des_cfb64 "des-cfb" -#define NID_des_cfb64 30 -/* IV + num */ -#define OBJ_des_cfb64 OBJ_algorithm,9L - -#define SN_des_cbc "DES-CBC" -#define LN_des_cbc "des-cbc" -#define NID_des_cbc 31 -/* IV */ -#define OBJ_des_cbc OBJ_algorithm,7L - -#define SN_des_ede "DES-EDE" -#define LN_des_ede "des-ede" -#define NID_des_ede 32 -/* ?? */ -#define OBJ_des_ede OBJ_algorithm,17L - -#define SN_des_ede3 "DES-EDE3" -#define LN_des_ede3 "des-ede3" -#define NID_des_ede3 33 - -#define SN_idea_cbc "IDEA-CBC" -#define LN_idea_cbc "idea-cbc" -#define NID_idea_cbc 34 -#define OBJ_idea_cbc 1L,3L,6L,1L,4L,1L,188L,7L,1L,1L,2L - -#define SN_idea_cfb64 "IDEA-CFB" -#define LN_idea_cfb64 "idea-cfb" -#define NID_idea_cfb64 35 - -#define SN_idea_ecb "IDEA-ECB" -#define LN_idea_ecb "idea-ecb" -#define NID_idea_ecb 36 - -#define SN_rc2_cbc "RC2-CBC" -#define LN_rc2_cbc "rc2-cbc" -#define NID_rc2_cbc 37 -#define OBJ_rc2_cbc OBJ_rsadsi,3L,2L - -#define SN_rc2_ecb "RC2-ECB" -#define LN_rc2_ecb "rc2-ecb" -#define NID_rc2_ecb 38 - -#define SN_rc2_cfb64 "RC2-CFB" -#define LN_rc2_cfb64 "rc2-cfb" -#define NID_rc2_cfb64 39 - -#define SN_rc2_ofb64 "RC2-OFB" -#define LN_rc2_ofb64 "rc2-ofb" -#define NID_rc2_ofb64 40 - -#define SN_sha "SHA" -#define LN_sha "sha" -#define NID_sha 41 -#define OBJ_sha OBJ_algorithm,18L - -#define SN_shaWithRSAEncryption "RSA-SHA" -#define LN_shaWithRSAEncryption "shaWithRSAEncryption" -#define NID_shaWithRSAEncryption 42 -#define OBJ_shaWithRSAEncryption OBJ_algorithm,15L - -#define SN_des_ede_cbc "DES-EDE-CBC" -#define LN_des_ede_cbc "des-ede-cbc" -#define NID_des_ede_cbc 43 - -#define SN_des_ede3_cbc "DES-EDE3-CBC" -#define LN_des_ede3_cbc "des-ede3-cbc" -#define NID_des_ede3_cbc 44 -#define OBJ_des_ede3_cbc OBJ_rsadsi,3L,7L - -#define SN_des_ofb64 "DES-OFB" -#define LN_des_ofb64 "des-ofb" -#define NID_des_ofb64 45 -#define OBJ_des_ofb64 OBJ_algorithm,8L - -#define SN_idea_ofb64 "IDEA-OFB" -#define LN_idea_ofb64 "idea-ofb" -#define NID_idea_ofb64 46 - -#define LN_pkcs9 "pkcs9" -#define NID_pkcs9 47 -#define OBJ_pkcs9 OBJ_pkcs,9L - -#define SN_pkcs9_emailAddress "Email" -#define LN_pkcs9_emailAddress "emailAddress" -#define NID_pkcs9_emailAddress 48 -#define OBJ_pkcs9_emailAddress OBJ_pkcs9,1L - -#define LN_pkcs9_unstructuredName "unstructuredName" -#define NID_pkcs9_unstructuredName 49 -#define OBJ_pkcs9_unstructuredName OBJ_pkcs9,2L - -#define LN_pkcs9_contentType "contentType" -#define NID_pkcs9_contentType 50 -#define OBJ_pkcs9_contentType OBJ_pkcs9,3L - -#define LN_pkcs9_messageDigest "messageDigest" -#define NID_pkcs9_messageDigest 51 -#define OBJ_pkcs9_messageDigest OBJ_pkcs9,4L - -#define LN_pkcs9_signingTime "signingTime" -#define NID_pkcs9_signingTime 52 -#define OBJ_pkcs9_signingTime OBJ_pkcs9,5L - -#define LN_pkcs9_countersignature "countersignature" -#define NID_pkcs9_countersignature 53 -#define OBJ_pkcs9_countersignature OBJ_pkcs9,6L - -#define LN_pkcs9_challengePassword "challengePassword" -#define NID_pkcs9_challengePassword 54 -#define OBJ_pkcs9_challengePassword OBJ_pkcs9,7L - -#define LN_pkcs9_unstructuredAddress "unstructuredAddress" -#define NID_pkcs9_unstructuredAddress 55 -#define OBJ_pkcs9_unstructuredAddress OBJ_pkcs9,8L - -#define LN_pkcs9_extCertAttributes "extendedCertificateAttributes" -#define NID_pkcs9_extCertAttributes 56 -#define OBJ_pkcs9_extCertAttributes OBJ_pkcs9,9L - -#define SN_netscape "Netscape" -#define LN_netscape "Netscape Communications Corp." -#define NID_netscape 57 -#define OBJ_netscape 2L,16L,840L,1L,113730L - -#define SN_netscape_cert_extension "nsCertExt" -#define LN_netscape_cert_extension "Netscape Certificate Extension" -#define NID_netscape_cert_extension 58 -#define OBJ_netscape_cert_extension OBJ_netscape,1L - -#define SN_netscape_data_type "nsDataType" -#define LN_netscape_data_type "Netscape Data Type" -#define NID_netscape_data_type 59 -#define OBJ_netscape_data_type OBJ_netscape,2L - -#define SN_des_ede_cfb64 "DES-EDE-CFB" -#define LN_des_ede_cfb64 "des-ede-cfb" -#define NID_des_ede_cfb64 60 - -#define SN_des_ede3_cfb64 "DES-EDE3-CFB" -#define LN_des_ede3_cfb64 "des-ede3-cfb" -#define NID_des_ede3_cfb64 61 - -#define SN_des_ede_ofb64 "DES-EDE-OFB" -#define LN_des_ede_ofb64 "des-ede-ofb" -#define NID_des_ede_ofb64 62 - -#define SN_des_ede3_ofb64 "DES-EDE3-OFB" -#define LN_des_ede3_ofb64 "des-ede3-ofb" -#define NID_des_ede3_ofb64 63 - -/* I'm not sure about the object ID */ -#define SN_sha1 "SHA1" -#define LN_sha1 "sha1" -#define NID_sha1 64 -#define OBJ_sha1 OBJ_algorithm,26L -/* 28 Jun 1996 - eay */ -/* #define OBJ_sha1 1L,3L,14L,2L,26L,05L <- wrong */ - -#define SN_sha1WithRSAEncryption "RSA-SHA1" -#define LN_sha1WithRSAEncryption "sha1WithRSAEncryption" -#define NID_sha1WithRSAEncryption 65 -#define OBJ_sha1WithRSAEncryption OBJ_pkcs,1L,5L - -#define SN_dsaWithSHA "DSA-SHA" -#define LN_dsaWithSHA "dsaWithSHA" -#define NID_dsaWithSHA 66 -#define OBJ_dsaWithSHA OBJ_algorithm,13L - -#define SN_dsa_2 "DSA-old" -#define LN_dsa_2 "dsaEncryption-old" -#define NID_dsa_2 67 -#define OBJ_dsa_2 OBJ_algorithm,12L - -/* proposed by microsoft to RSA */ -#define SN_pbeWithSHA1AndRC2_CBC "PBE-SHA1-RC2-64" -#define LN_pbeWithSHA1AndRC2_CBC "pbeWithSHA1AndRC2-CBC" -#define NID_pbeWithSHA1AndRC2_CBC 68 -#define OBJ_pbeWithSHA1AndRC2_CBC OBJ_pkcs,5L,11L - -/* proposed by microsoft to RSA as pbeWithSHA1AndRC4: it is now - * defined explicitly in PKCS#5 v2.0 as id-PBKDF2 which is something - * completely different. - */ -#define LN_id_pbkdf2 "PBKDF2" -#define NID_id_pbkdf2 69 -#define OBJ_id_pbkdf2 OBJ_pkcs,5L,12L - -#define SN_dsaWithSHA1_2 "DSA-SHA1-old" -#define LN_dsaWithSHA1_2 "dsaWithSHA1-old" -#define NID_dsaWithSHA1_2 70 -/* Got this one from 'sdn706r20.pdf' which is actually an NSA document :-) */ -#define OBJ_dsaWithSHA1_2 OBJ_algorithm,27L - -#define SN_netscape_cert_type "nsCertType" -#define LN_netscape_cert_type "Netscape Cert Type" -#define NID_netscape_cert_type 71 -#define OBJ_netscape_cert_type OBJ_netscape_cert_extension,1L - -#define SN_netscape_base_url "nsBaseUrl" -#define LN_netscape_base_url "Netscape Base Url" -#define NID_netscape_base_url 72 -#define OBJ_netscape_base_url OBJ_netscape_cert_extension,2L - -#define SN_netscape_revocation_url "nsRevocationUrl" -#define LN_netscape_revocation_url "Netscape Revocation Url" -#define NID_netscape_revocation_url 73 -#define OBJ_netscape_revocation_url OBJ_netscape_cert_extension,3L - -#define SN_netscape_ca_revocation_url "nsCaRevocationUrl" -#define LN_netscape_ca_revocation_url "Netscape CA Revocation Url" -#define NID_netscape_ca_revocation_url 74 -#define OBJ_netscape_ca_revocation_url OBJ_netscape_cert_extension,4L - -#define SN_netscape_renewal_url "nsRenewalUrl" -#define LN_netscape_renewal_url "Netscape Renewal Url" -#define NID_netscape_renewal_url 75 -#define OBJ_netscape_renewal_url OBJ_netscape_cert_extension,7L - -#define SN_netscape_ca_policy_url "nsCaPolicyUrl" -#define LN_netscape_ca_policy_url "Netscape CA Policy Url" -#define NID_netscape_ca_policy_url 76 -#define OBJ_netscape_ca_policy_url OBJ_netscape_cert_extension,8L - -#define SN_netscape_ssl_server_name "nsSslServerName" -#define LN_netscape_ssl_server_name "Netscape SSL Server Name" -#define NID_netscape_ssl_server_name 77 -#define OBJ_netscape_ssl_server_name OBJ_netscape_cert_extension,12L - -#define SN_netscape_comment "nsComment" -#define LN_netscape_comment "Netscape Comment" -#define NID_netscape_comment 78 -#define OBJ_netscape_comment OBJ_netscape_cert_extension,13L - -#define SN_netscape_cert_sequence "nsCertSequence" -#define LN_netscape_cert_sequence "Netscape Certificate Sequence" -#define NID_netscape_cert_sequence 79 -#define OBJ_netscape_cert_sequence OBJ_netscape_data_type,5L - -#define SN_desx_cbc "DESX-CBC" -#define LN_desx_cbc "desx-cbc" -#define NID_desx_cbc 80 - -#define SN_id_ce "id-ce" -#define NID_id_ce 81 -#define OBJ_id_ce 2L,5L,29L - -#define SN_subject_key_identifier "subjectKeyIdentifier" -#define LN_subject_key_identifier "X509v3 Subject Key Identifier" -#define NID_subject_key_identifier 82 -#define OBJ_subject_key_identifier OBJ_id_ce,14L - -#define SN_key_usage "keyUsage" -#define LN_key_usage "X509v3 Key Usage" -#define NID_key_usage 83 -#define OBJ_key_usage OBJ_id_ce,15L - -#define SN_private_key_usage_period "privateKeyUsagePeriod" -#define LN_private_key_usage_period "X509v3 Private Key Usage Period" -#define NID_private_key_usage_period 84 -#define OBJ_private_key_usage_period OBJ_id_ce,16L - -#define SN_subject_alt_name "subjectAltName" -#define LN_subject_alt_name "X509v3 Subject Alternative Name" -#define NID_subject_alt_name 85 -#define OBJ_subject_alt_name OBJ_id_ce,17L - -#define SN_issuer_alt_name "issuerAltName" -#define LN_issuer_alt_name "X509v3 Issuer Alternative Name" -#define NID_issuer_alt_name 86 -#define OBJ_issuer_alt_name OBJ_id_ce,18L - -#define SN_basic_constraints "basicConstraints" -#define LN_basic_constraints "X509v3 Basic Constraints" -#define NID_basic_constraints 87 -#define OBJ_basic_constraints OBJ_id_ce,19L - -#define SN_crl_number "crlNumber" -#define LN_crl_number "X509v3 CRL Number" -#define NID_crl_number 88 -#define OBJ_crl_number OBJ_id_ce,20L - -#define SN_certificate_policies "certificatePolicies" -#define LN_certificate_policies "X509v3 Certificate Policies" -#define NID_certificate_policies 89 -#define OBJ_certificate_policies OBJ_id_ce,32L - -#define SN_authority_key_identifier "authorityKeyIdentifier" -#define LN_authority_key_identifier "X509v3 Authority Key Identifier" -#define NID_authority_key_identifier 90 -#define OBJ_authority_key_identifier OBJ_id_ce,35L - -#define SN_bf_cbc "BF-CBC" -#define LN_bf_cbc "bf-cbc" -#define NID_bf_cbc 91 -#define OBJ_bf_cbc 1L,3L,6L,1L,4L,1L,3029L,1L,2L - -#define SN_bf_ecb "BF-ECB" -#define LN_bf_ecb "bf-ecb" -#define NID_bf_ecb 92 - -#define SN_bf_cfb64 "BF-CFB" -#define LN_bf_cfb64 "bf-cfb" -#define NID_bf_cfb64 93 - -#define SN_bf_ofb64 "BF-OFB" -#define LN_bf_ofb64 "bf-ofb" -#define NID_bf_ofb64 94 - -#define SN_mdc2 "MDC2" -#define LN_mdc2 "mdc2" -#define NID_mdc2 95 -#define OBJ_mdc2 2L,5L,8L,3L,101L -/* An alternative? 1L,3L,14L,3L,2L,19L */ - -#define SN_mdc2WithRSA "RSA-MDC2" -#define LN_mdc2WithRSA "mdc2withRSA" -#define NID_mdc2WithRSA 96 -#define OBJ_mdc2WithRSA 2L,5L,8L,3L,100L - -#define SN_rc4_40 "RC4-40" -#define LN_rc4_40 "rc4-40" -#define NID_rc4_40 97 - -#define SN_rc2_40_cbc "RC2-40-CBC" -#define LN_rc2_40_cbc "rc2-40-cbc" -#define NID_rc2_40_cbc 98 - -#define SN_givenName "G" -#define LN_givenName "givenName" -#define NID_givenName 99 -#define OBJ_givenName OBJ_X509,42L - -#define SN_surname "S" -#define LN_surname "surname" -#define NID_surname 100 -#define OBJ_surname OBJ_X509,4L - -#define SN_initials "I" -#define LN_initials "initials" -#define NID_initials 101 -#define OBJ_initials OBJ_X509,43L - -#define SN_uniqueIdentifier "UID" -#define LN_uniqueIdentifier "uniqueIdentifier" -#define NID_uniqueIdentifier 102 -#define OBJ_uniqueIdentifier OBJ_X509,45L - -#define SN_crl_distribution_points "crlDistributionPoints" -#define LN_crl_distribution_points "X509v3 CRL Distribution Points" -#define NID_crl_distribution_points 103 -#define OBJ_crl_distribution_points OBJ_id_ce,31L - -#define SN_md5WithRSA "RSA-NP-MD5" -#define LN_md5WithRSA "md5WithRSA" -#define NID_md5WithRSA 104 -#define OBJ_md5WithRSA OBJ_algorithm,3L - -#define SN_serialNumber "SN" -#define LN_serialNumber "serialNumber" -#define NID_serialNumber 105 -#define OBJ_serialNumber OBJ_X509,5L - -#define SN_title "T" -#define LN_title "title" -#define NID_title 106 -#define OBJ_title OBJ_X509,12L - -#define SN_description "D" -#define LN_description "description" -#define NID_description 107 -#define OBJ_description OBJ_X509,13L - -/* CAST5 is CAST-128, I'm just sticking with the documentation */ -#define SN_cast5_cbc "CAST5-CBC" -#define LN_cast5_cbc "cast5-cbc" -#define NID_cast5_cbc 108 -#define OBJ_cast5_cbc 1L,2L,840L,113533L,7L,66L,10L - -#define SN_cast5_ecb "CAST5-ECB" -#define LN_cast5_ecb "cast5-ecb" -#define NID_cast5_ecb 109 - -#define SN_cast5_cfb64 "CAST5-CFB" -#define LN_cast5_cfb64 "cast5-cfb" -#define NID_cast5_cfb64 110 - -#define SN_cast5_ofb64 "CAST5-OFB" -#define LN_cast5_ofb64 "cast5-ofb" -#define NID_cast5_ofb64 111 - -#define LN_pbeWithMD5AndCast5_CBC "pbeWithMD5AndCast5CBC" -#define NID_pbeWithMD5AndCast5_CBC 112 -#define OBJ_pbeWithMD5AndCast5_CBC 1L,2L,840L,113533L,7L,66L,12L - -/* This is one sun will soon be using :-( - * id-dsa-with-sha1 ID ::= { - * iso(1) member-body(2) us(840) x9-57 (10040) x9cm(4) 3 } - */ -#define SN_dsaWithSHA1 "DSA-SHA1" -#define LN_dsaWithSHA1 "dsaWithSHA1" -#define NID_dsaWithSHA1 113 -#define OBJ_dsaWithSHA1 1L,2L,840L,10040L,4L,3L - -#define NID_md5_sha1 114 -#define SN_md5_sha1 "MD5-SHA1" -#define LN_md5_sha1 "md5-sha1" - -#define SN_sha1WithRSA "RSA-SHA1-2" -#define LN_sha1WithRSA "sha1WithRSA" -#define NID_sha1WithRSA 115 -#define OBJ_sha1WithRSA OBJ_algorithm,29L - -#define SN_dsa "DSA" -#define LN_dsa "dsaEncryption" -#define NID_dsa 116 -#define OBJ_dsa 1L,2L,840L,10040L,4L,1L - -#define SN_ripemd160 "RIPEMD160" -#define LN_ripemd160 "ripemd160" -#define NID_ripemd160 117 -#define OBJ_ripemd160 1L,3L,36L,3L,2L,1L - -/* The name should actually be rsaSignatureWithripemd160, but I'm going - * to continue using the convention I'm using with the other ciphers */ -#define SN_ripemd160WithRSA "RSA-RIPEMD160" -#define LN_ripemd160WithRSA "ripemd160WithRSA" -#define NID_ripemd160WithRSA 119 -#define OBJ_ripemd160WithRSA 1L,3L,36L,3L,3L,1L,2L - -/* Taken from rfc2040 - * RC5_CBC_Parameters ::= SEQUENCE { - * version INTEGER (v1_0(16)), - * rounds INTEGER (8..127), - * blockSizeInBits INTEGER (64, 128), - * iv OCTET STRING OPTIONAL - * } - */ -#define SN_rc5_cbc "RC5-CBC" -#define LN_rc5_cbc "rc5-cbc" -#define NID_rc5_cbc 120 -#define OBJ_rc5_cbc OBJ_rsadsi,3L,8L - -#define SN_rc5_ecb "RC5-ECB" -#define LN_rc5_ecb "rc5-ecb" -#define NID_rc5_ecb 121 - -#define SN_rc5_cfb64 "RC5-CFB" -#define LN_rc5_cfb64 "rc5-cfb" -#define NID_rc5_cfb64 122 - -#define SN_rc5_ofb64 "RC5-OFB" -#define LN_rc5_ofb64 "rc5-ofb" -#define NID_rc5_ofb64 123 - -#define SN_rle_compression "RLE" -#define LN_rle_compression "run length compression" -#define NID_rle_compression 124 -#define OBJ_rle_compression 1L,1L,1L,1L,666L,1L - -#define SN_zlib_compression "ZLIB" -#define LN_zlib_compression "zlib compression" -#define NID_zlib_compression 125 -#define OBJ_zlib_compression 1L,1L,1L,1L,666L,2L - -#define SN_ext_key_usage "extendedKeyUsage" -#define LN_ext_key_usage "X509v3 Extended Key Usage" -#define NID_ext_key_usage 126 -#define OBJ_ext_key_usage OBJ_id_ce,37 - -#define SN_id_pkix "PKIX" -#define NID_id_pkix 127 -#define OBJ_id_pkix 1L,3L,6L,1L,5L,5L,7L - -#define SN_id_kp "id-kp" -#define NID_id_kp 128 -#define OBJ_id_kp OBJ_id_pkix,3L - -/* PKIX extended key usage OIDs */ - -#define SN_server_auth "serverAuth" -#define LN_server_auth "TLS Web Server Authentication" -#define NID_server_auth 129 -#define OBJ_server_auth OBJ_id_kp,1L - -#define SN_client_auth "clientAuth" -#define LN_client_auth "TLS Web Client Authentication" -#define NID_client_auth 130 -#define OBJ_client_auth OBJ_id_kp,2L - -#define SN_code_sign "codeSigning" -#define LN_code_sign "Code Signing" -#define NID_code_sign 131 -#define OBJ_code_sign OBJ_id_kp,3L - -#define SN_email_protect "emailProtection" -#define LN_email_protect "E-mail Protection" -#define NID_email_protect 132 -#define OBJ_email_protect OBJ_id_kp,4L - -#define SN_time_stamp "timeStamping" -#define LN_time_stamp "Time Stamping" -#define NID_time_stamp 133 -#define OBJ_time_stamp OBJ_id_kp,8L - -/* Additional extended key usage OIDs: Microsoft */ - -#define SN_ms_code_ind "msCodeInd" -#define LN_ms_code_ind "Microsoft Individual Code Signing" -#define NID_ms_code_ind 134 -#define OBJ_ms_code_ind 1L,3L,6L,1L,4L,1L,311L,2L,1L,21L - -#define SN_ms_code_com "msCodeCom" -#define LN_ms_code_com "Microsoft Commercial Code Signing" -#define NID_ms_code_com 135 -#define OBJ_ms_code_com 1L,3L,6L,1L,4L,1L,311L,2L,1L,22L - -#define SN_ms_ctl_sign "msCTLSign" -#define LN_ms_ctl_sign "Microsoft Trust List Signing" -#define NID_ms_ctl_sign 136 -#define OBJ_ms_ctl_sign 1L,3L,6L,1L,4L,1L,311L,10L,3L,1L - -#define SN_ms_sgc "msSGC" -#define LN_ms_sgc "Microsoft Server Gated Crypto" -#define NID_ms_sgc 137 -#define OBJ_ms_sgc 1L,3L,6L,1L,4L,1L,311L,10L,3L,3L - -#define SN_ms_efs "msEFS" -#define LN_ms_efs "Microsoft Encrypted File System" -#define NID_ms_efs 138 -#define OBJ_ms_efs 1L,3L,6L,1L,4L,1L,311L,10L,3L,4L - -/* Additional usage: Netscape */ - -#define SN_ns_sgc "nsSGC" -#define LN_ns_sgc "Netscape Server Gated Crypto" -#define NID_ns_sgc 139 -#define OBJ_ns_sgc OBJ_netscape,4L,1L - -#define SN_delta_crl "deltaCRL" -#define LN_delta_crl "X509v3 Delta CRL Indicator" -#define NID_delta_crl 140 -#define OBJ_delta_crl OBJ_id_ce,27L - -#define SN_crl_reason "CRLReason" -#define LN_crl_reason "CRL Reason Code" -#define NID_crl_reason 141 -#define OBJ_crl_reason OBJ_id_ce,21L - -#define SN_invalidity_date "invalidityDate" -#define LN_invalidity_date "Invalidity Date" -#define NID_invalidity_date 142 -#define OBJ_invalidity_date OBJ_id_ce,24L - -#define SN_sxnet "SXNetID" -#define LN_sxnet "Strong Extranet ID" -#define NID_sxnet 143 -#define OBJ_sxnet 1L,3L,101L,1L,4L,1L - -/* PKCS12 and related OBJECT IDENTIFIERS */ - -#define OBJ_pkcs12 OBJ_pkcs,12L -#define OBJ_pkcs12_pbeids OBJ_pkcs12, 1 - -#define SN_pbe_WithSHA1And128BitRC4 "PBE-SHA1-RC4-128" -#define LN_pbe_WithSHA1And128BitRC4 "pbeWithSHA1And128BitRC4" -#define NID_pbe_WithSHA1And128BitRC4 144 -#define OBJ_pbe_WithSHA1And128BitRC4 OBJ_pkcs12_pbeids, 1L - -#define SN_pbe_WithSHA1And40BitRC4 "PBE-SHA1-RC4-40" -#define LN_pbe_WithSHA1And40BitRC4 "pbeWithSHA1And40BitRC4" -#define NID_pbe_WithSHA1And40BitRC4 145 -#define OBJ_pbe_WithSHA1And40BitRC4 OBJ_pkcs12_pbeids, 2L - -#define SN_pbe_WithSHA1And3_Key_TripleDES_CBC "PBE-SHA1-3DES" -#define LN_pbe_WithSHA1And3_Key_TripleDES_CBC "pbeWithSHA1And3-KeyTripleDES-CBC" -#define NID_pbe_WithSHA1And3_Key_TripleDES_CBC 146 -#define OBJ_pbe_WithSHA1And3_Key_TripleDES_CBC OBJ_pkcs12_pbeids, 3L - -#define SN_pbe_WithSHA1And2_Key_TripleDES_CBC "PBE-SHA1-2DES" -#define LN_pbe_WithSHA1And2_Key_TripleDES_CBC "pbeWithSHA1And2-KeyTripleDES-CBC" -#define NID_pbe_WithSHA1And2_Key_TripleDES_CBC 147 -#define OBJ_pbe_WithSHA1And2_Key_TripleDES_CBC OBJ_pkcs12_pbeids, 4L - -#define SN_pbe_WithSHA1And128BitRC2_CBC "PBE-SHA1-RC2-128" -#define LN_pbe_WithSHA1And128BitRC2_CBC "pbeWithSHA1And128BitRC2-CBC" -#define NID_pbe_WithSHA1And128BitRC2_CBC 148 -#define OBJ_pbe_WithSHA1And128BitRC2_CBC OBJ_pkcs12_pbeids, 5L - -#define SN_pbe_WithSHA1And40BitRC2_CBC "PBE-SHA1-RC2-40" -#define LN_pbe_WithSHA1And40BitRC2_CBC "pbeWithSHA1And40BitRC2-CBC" -#define NID_pbe_WithSHA1And40BitRC2_CBC 149 -#define OBJ_pbe_WithSHA1And40BitRC2_CBC OBJ_pkcs12_pbeids, 6L - -#define OBJ_pkcs12_Version1 OBJ_pkcs12, 10L - -#define OBJ_pkcs12_BagIds OBJ_pkcs12_Version1, 1L - -#define LN_keyBag "keyBag" -#define NID_keyBag 150 -#define OBJ_keyBag OBJ_pkcs12_BagIds, 1L - -#define LN_pkcs8ShroudedKeyBag "pkcs8ShroudedKeyBag" -#define NID_pkcs8ShroudedKeyBag 151 -#define OBJ_pkcs8ShroudedKeyBag OBJ_pkcs12_BagIds, 2L - -#define LN_certBag "certBag" -#define NID_certBag 152 -#define OBJ_certBag OBJ_pkcs12_BagIds, 3L - -#define LN_crlBag "crlBag" -#define NID_crlBag 153 -#define OBJ_crlBag OBJ_pkcs12_BagIds, 4L - -#define LN_secretBag "secretBag" -#define NID_secretBag 154 -#define OBJ_secretBag OBJ_pkcs12_BagIds, 5L - -#define LN_safeContentsBag "safeContentsBag" -#define NID_safeContentsBag 155 -#define OBJ_safeContentsBag OBJ_pkcs12_BagIds, 6L - -#define LN_friendlyName "friendlyName" -#define NID_friendlyName 156 -#define OBJ_friendlyName OBJ_pkcs9, 20L - -#define LN_localKeyID "localKeyID" -#define NID_localKeyID 157 -#define OBJ_localKeyID OBJ_pkcs9, 21L - -#define OBJ_certTypes OBJ_pkcs9, 22L - -#define LN_x509Certificate "x509Certificate" -#define NID_x509Certificate 158 -#define OBJ_x509Certificate OBJ_certTypes, 1L - -#define LN_sdsiCertificate "sdsiCertificate" -#define NID_sdsiCertificate 159 -#define OBJ_sdsiCertificate OBJ_certTypes, 2L - -#define OBJ_crlTypes OBJ_pkcs9, 23L - -#define LN_x509Crl "x509Crl" -#define NID_x509Crl 160 -#define OBJ_x509Crl OBJ_crlTypes, 1L - -/* PKCS#5 v2 OIDs */ - -#define LN_pbes2 "PBES2" -#define NID_pbes2 161 -#define OBJ_pbes2 OBJ_pkcs,5L,13L - -#define LN_pbmac1 "PBMAC1" -#define NID_pbmac1 162 -#define OBJ_pbmac1 OBJ_pkcs,5L,14L - -#define LN_hmacWithSHA1 "hmacWithSHA1" -#define NID_hmacWithSHA1 163 -#define OBJ_hmacWithSHA1 OBJ_rsadsi,2L,7L - -/* Policy Qualifier Ids */ - -#define LN_id_qt_cps "Policy Qualifier CPS" -#define SN_id_qt_cps "id-qt-cps" -#define NID_id_qt_cps 164 -#define OBJ_id_qt_cps OBJ_id_pkix,2L,1L - -#define LN_id_qt_unotice "Policy Qualifier User Notice" -#define SN_id_qt_unotice "id-qt-unotice" -#define NID_id_qt_unotice 165 -#define OBJ_id_qt_unotice OBJ_id_pkix,2L,2L - -#define SN_rc2_64_cbc "RC2-64-CBC" -#define LN_rc2_64_cbc "rc2-64-cbc" -#define NID_rc2_64_cbc 166 - -#define SN_SMIMECapabilities "SMIME-CAPS" -#define LN_SMIMECapabilities "S/MIME Capabilities" -#define NID_SMIMECapabilities 167 -#define OBJ_SMIMECapabilities OBJ_pkcs9,15L - -#define SN_pbeWithMD2AndRC2_CBC "PBE-MD2-RC2-64" -#define LN_pbeWithMD2AndRC2_CBC "pbeWithMD2AndRC2-CBC" -#define NID_pbeWithMD2AndRC2_CBC 168 -#define OBJ_pbeWithMD2AndRC2_CBC OBJ_pkcs,5L,4L - -#define SN_pbeWithMD5AndRC2_CBC "PBE-MD5-RC2-64" -#define LN_pbeWithMD5AndRC2_CBC "pbeWithMD5AndRC2-CBC" -#define NID_pbeWithMD5AndRC2_CBC 169 -#define OBJ_pbeWithMD5AndRC2_CBC OBJ_pkcs,5L,6L - -#define SN_pbeWithSHA1AndDES_CBC "PBE-SHA1-DES" -#define LN_pbeWithSHA1AndDES_CBC "pbeWithSHA1AndDES-CBC" -#define NID_pbeWithSHA1AndDES_CBC 170 -#define OBJ_pbeWithSHA1AndDES_CBC OBJ_pkcs,5L,10L - -/* Extension request OIDs */ - -#define LN_ms_ext_req "Microsoft Extension Request" -#define SN_ms_ext_req "msExtReq" -#define NID_ms_ext_req 171 -#define OBJ_ms_ext_req 1L,3L,6L,1L,4L,1L,311L,2L,1L,14L - -#define LN_ext_req "Extension Request" -#define SN_ext_req "extReq" -#define NID_ext_req 172 -#define OBJ_ext_req OBJ_pkcs9,14L - -#define SN_name "name" -#define LN_name "name" -#define NID_name 173 -#define OBJ_name OBJ_X509,41L - -#define SN_dnQualifier "dnQualifier" -#define LN_dnQualifier "dnQualifier" -#define NID_dnQualifier 174 -#define OBJ_dnQualifier OBJ_X509,46L - -#define SN_id_pe "id-pe" -#define NID_id_pe 175 -#define OBJ_id_pe OBJ_id_pkix,1L - -#define SN_id_ad "id-ad" -#define NID_id_ad 176 -#define OBJ_id_ad OBJ_id_pkix,48L - -#define SN_info_access "authorityInfoAccess" -#define LN_info_access "Authority Information Access" -#define NID_info_access 177 -#define OBJ_info_access OBJ_id_pe,1L - -#define SN_ad_OCSP "OCSP" -#define LN_ad_OCSP "OCSP" -#define NID_ad_OCSP 178 -#define OBJ_ad_OCSP OBJ_id_ad,1L - -#define SN_ad_ca_issuers "caIssuers" -#define LN_ad_ca_issuers "CA Issuers" -#define NID_ad_ca_issuers 179 -#define OBJ_ad_ca_issuers OBJ_id_ad,2L - -#define SN_OCSP_sign "OCSPSigning" -#define LN_OCSP_sign "OCSP Signing" -#define NID_OCSP_sign 180 -#define OBJ_OCSP_sign OBJ_id_kp,9L -#endif /* USE_OBJ_MAC */ - -#include -#include - -#define OBJ_NAME_TYPE_UNDEF 0x00 -#define OBJ_NAME_TYPE_MD_METH 0x01 -#define OBJ_NAME_TYPE_CIPHER_METH 0x02 -#define OBJ_NAME_TYPE_PKEY_METH 0x03 -#define OBJ_NAME_TYPE_COMP_METH 0x04 -#define OBJ_NAME_TYPE_NUM 0x05 - -#define OBJ_NAME_ALIAS 0x8000 - -#define OBJ_BSEARCH_VALUE_ON_NOMATCH 0x01 -#define OBJ_BSEARCH_FIRST_VALUE_ON_MATCH 0x02 - - -#ifdef __cplusplus -extern "C" { -#endif - -typedef struct obj_name_st - { - int type; - int alias; - const char *name; - const char *data; - } OBJ_NAME; - -#define OBJ_create_and_add_object(a,b,c) OBJ_create(a,b,c) - - -int OBJ_NAME_init(void); -int OBJ_NAME_new_index(unsigned long (*hash_func)(const char *), - int (*cmp_func)(const char *, const char *), - void (*free_func)(const char *, int, const char *)); -const char *OBJ_NAME_get(const char *name,int type); -int OBJ_NAME_add(const char *name,int type,const char *data); -int OBJ_NAME_remove(const char *name,int type); -void OBJ_NAME_cleanup(int type); /* -1 for everything */ -void OBJ_NAME_do_all(int type,void (*fn)(const OBJ_NAME *,void *arg), - void *arg); -void OBJ_NAME_do_all_sorted(int type,void (*fn)(const OBJ_NAME *,void *arg), - void *arg); - -ASN1_OBJECT * OBJ_dup(const ASN1_OBJECT *o); -ASN1_OBJECT * OBJ_nid2obj(int n); -const char * OBJ_nid2ln(int n); -const char * OBJ_nid2sn(int n); -int OBJ_obj2nid(const ASN1_OBJECT *o); -ASN1_OBJECT * OBJ_txt2obj(const char *s, int no_name); -int OBJ_obj2txt(char *buf, int buf_len, const ASN1_OBJECT *a, int no_name); -int OBJ_txt2nid(const char *s); -int OBJ_ln2nid(const char *s); -int OBJ_sn2nid(const char *s); -int OBJ_cmp(const ASN1_OBJECT *a,const ASN1_OBJECT *b); -const void * OBJ_bsearch_(const void *key,const void *base,int num,int size, - int (*cmp)(const void *, const void *)); -const void * OBJ_bsearch_ex_(const void *key,const void *base,int num, - int size, - int (*cmp)(const void *, const void *), - int flags); - -#define _DECLARE_OBJ_BSEARCH_CMP_FN(scope, type1, type2, nm) \ - static int nm##_cmp_BSEARCH_CMP_FN(const void *, const void *); \ - static int nm##_cmp(type1 const *, type2 const *); \ - scope type2 * OBJ_bsearch_##nm(type1 *key, type2 const *base, int num) - -#define DECLARE_OBJ_BSEARCH_CMP_FN(type1, type2, cmp) \ - _DECLARE_OBJ_BSEARCH_CMP_FN(static, type1, type2, cmp) -#define DECLARE_OBJ_BSEARCH_GLOBAL_CMP_FN(type1, type2, nm) \ - type2 * OBJ_bsearch_##nm(type1 *key, type2 const *base, int num) - -/* - * Unsolved problem: if a type is actually a pointer type, like - * nid_triple is, then its impossible to get a const where you need - * it. Consider: - * - * typedef int nid_triple[3]; - * const void *a_; - * const nid_triple const *a = a_; - * - * The assignement discards a const because what you really want is: - * - * const int const * const *a = a_; - * - * But if you do that, you lose the fact that a is an array of 3 ints, - * which breaks comparison functions. - * - * Thus we end up having to cast, sadly, or unpack the - * declarations. Or, as I finally did in this case, delcare nid_triple - * to be a struct, which it should have been in the first place. - * - * Ben, August 2008. - * - * Also, strictly speaking not all types need be const, but handling - * the non-constness means a lot of complication, and in practice - * comparison routines do always not touch their arguments. - */ - -#define IMPLEMENT_OBJ_BSEARCH_CMP_FN(type1, type2, nm) \ - static int nm##_cmp_BSEARCH_CMP_FN(const void *a_, const void *b_) \ - { \ - type1 const *a = a_; \ - type2 const *b = b_; \ - return nm##_cmp(a,b); \ - } \ - static type2 *OBJ_bsearch_##nm(type1 *key, type2 const *base, int num) \ - { \ - return (type2 *)OBJ_bsearch_(key, base, num, sizeof(type2), \ - nm##_cmp_BSEARCH_CMP_FN); \ - } \ - extern void dummy_prototype(void) - -#define IMPLEMENT_OBJ_BSEARCH_GLOBAL_CMP_FN(type1, type2, nm) \ - static int nm##_cmp_BSEARCH_CMP_FN(const void *a_, const void *b_) \ - { \ - type1 const *a = a_; \ - type2 const *b = b_; \ - return nm##_cmp(a,b); \ - } \ - type2 *OBJ_bsearch_##nm(type1 *key, type2 const *base, int num) \ - { \ - return (type2 *)OBJ_bsearch_(key, base, num, sizeof(type2), \ - nm##_cmp_BSEARCH_CMP_FN); \ - } \ - extern void dummy_prototype(void) - -#define OBJ_bsearch(type1,key,type2,base,num,cmp) \ - ((type2 *)OBJ_bsearch_(CHECKED_PTR_OF(type1,key),CHECKED_PTR_OF(type2,base), \ - num,sizeof(type2), \ - ((void)CHECKED_PTR_OF(type1,cmp##_type_1), \ - (void)CHECKED_PTR_OF(type2,cmp##_type_2), \ - cmp##_BSEARCH_CMP_FN))) - -#define OBJ_bsearch_ex(type1,key,type2,base,num,cmp,flags) \ - ((type2 *)OBJ_bsearch_ex_(CHECKED_PTR_OF(type1,key),CHECKED_PTR_OF(type2,base), \ - num,sizeof(type2), \ - ((void)CHECKED_PTR_OF(type1,cmp##_type_1), \ - (void)type_2=CHECKED_PTR_OF(type2,cmp##_type_2), \ - cmp##_BSEARCH_CMP_FN)),flags) - -int OBJ_new_nid(int num); -int OBJ_add_object(const ASN1_OBJECT *obj); -int OBJ_create(const char *oid,const char *sn,const char *ln); -void OBJ_cleanup(void ); -int OBJ_create_objects(BIO *in); - -int OBJ_find_sigid_algs(int signid, int *pdig_nid, int *ppkey_nid); -int OBJ_find_sigid_by_algs(int *psignid, int dig_nid, int pkey_nid); -int OBJ_add_sigid(int signid, int dig_id, int pkey_id); -void OBJ_sigid_free(void); - -extern int obj_cleanup_defer; -void check_defer(int nid); - -/* BEGIN ERROR CODES */ -/* The following lines are auto generated by the script mkerr.pl. Any changes - * made after this point may be overwritten when the script is next run. - */ -void ERR_load_OBJ_strings(void); - -/* Error codes for the OBJ functions. */ - -/* Function codes. */ -#define OBJ_F_OBJ_ADD_OBJECT 105 -#define OBJ_F_OBJ_CREATE 100 -#define OBJ_F_OBJ_DUP 101 -#define OBJ_F_OBJ_NAME_NEW_INDEX 106 -#define OBJ_F_OBJ_NID2LN 102 -#define OBJ_F_OBJ_NID2OBJ 103 -#define OBJ_F_OBJ_NID2SN 104 - -/* Reason codes. */ -#define OBJ_R_MALLOC_FAILURE 100 -#define OBJ_R_UNKNOWN_NID 101 - -#ifdef __cplusplus -} -#endif -#endif diff --git a/Pods/OpenSSL-Universal/include-osx/openssl/ocsp.h b/Pods/OpenSSL-Universal/include-osx/openssl/ocsp.h deleted file mode 100644 index 31e45744..00000000 --- a/Pods/OpenSSL-Universal/include-osx/openssl/ocsp.h +++ /dev/null @@ -1,623 +0,0 @@ -/* ocsp.h */ -/* Written by Tom Titchener for the OpenSSL - * project. */ - -/* History: - This file was transfered to Richard Levitte from CertCo by Kathy - Weinhold in mid-spring 2000 to be included in OpenSSL or released - as a patch kit. */ - -/* ==================================================================== - * Copyright (c) 1998-2000 The OpenSSL Project. All rights reserved. - * - * Redistribution and use in source and binary forms, with or without - * modification, are permitted provided that the following conditions - * are met: - * - * 1. Redistributions of source code must retain the above copyright - * notice, this list of conditions and the following disclaimer. - * - * 2. Redistributions in binary form must reproduce the above copyright - * notice, this list of conditions and the following disclaimer in - * the documentation and/or other materials provided with the - * distribution. - * - * 3. All advertising materials mentioning features or use of this - * software must display the following acknowledgment: - * "This product includes software developed by the OpenSSL Project - * for use in the OpenSSL Toolkit. (http://www.openssl.org/)" - * - * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to - * endorse or promote products derived from this software without - * prior written permission. For written permission, please contact - * openssl-core@openssl.org. - * - * 5. Products derived from this software may not be called "OpenSSL" - * nor may "OpenSSL" appear in their names without prior written - * permission of the OpenSSL Project. - * - * 6. Redistributions of any form whatsoever must retain the following - * acknowledgment: - * "This product includes software developed by the OpenSSL Project - * for use in the OpenSSL Toolkit (http://www.openssl.org/)" - * - * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY - * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE - * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR - * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR - * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, - * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT - * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; - * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) - * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, - * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) - * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED - * OF THE POSSIBILITY OF SUCH DAMAGE. - * ==================================================================== - * - * This product includes cryptographic software written by Eric Young - * (eay@cryptsoft.com). This product includes software written by Tim - * Hudson (tjh@cryptsoft.com). - * - */ - -#ifndef HEADER_OCSP_H -#define HEADER_OCSP_H - -#include -#include -#include -#include - -#ifdef __cplusplus -extern "C" { -#endif - -/* Various flags and values */ - -#define OCSP_DEFAULT_NONCE_LENGTH 16 - -#define OCSP_NOCERTS 0x1 -#define OCSP_NOINTERN 0x2 -#define OCSP_NOSIGS 0x4 -#define OCSP_NOCHAIN 0x8 -#define OCSP_NOVERIFY 0x10 -#define OCSP_NOEXPLICIT 0x20 -#define OCSP_NOCASIGN 0x40 -#define OCSP_NODELEGATED 0x80 -#define OCSP_NOCHECKS 0x100 -#define OCSP_TRUSTOTHER 0x200 -#define OCSP_RESPID_KEY 0x400 -#define OCSP_NOTIME 0x800 - -/* CertID ::= SEQUENCE { - * hashAlgorithm AlgorithmIdentifier, - * issuerNameHash OCTET STRING, -- Hash of Issuer's DN - * issuerKeyHash OCTET STRING, -- Hash of Issuers public key (excluding the tag & length fields) - * serialNumber CertificateSerialNumber } - */ -typedef struct ocsp_cert_id_st - { - X509_ALGOR *hashAlgorithm; - ASN1_OCTET_STRING *issuerNameHash; - ASN1_OCTET_STRING *issuerKeyHash; - ASN1_INTEGER *serialNumber; - } OCSP_CERTID; - -DECLARE_STACK_OF(OCSP_CERTID) - -/* Request ::= SEQUENCE { - * reqCert CertID, - * singleRequestExtensions [0] EXPLICIT Extensions OPTIONAL } - */ -typedef struct ocsp_one_request_st - { - OCSP_CERTID *reqCert; - STACK_OF(X509_EXTENSION) *singleRequestExtensions; - } OCSP_ONEREQ; - -DECLARE_STACK_OF(OCSP_ONEREQ) -DECLARE_ASN1_SET_OF(OCSP_ONEREQ) - - -/* TBSRequest ::= SEQUENCE { - * version [0] EXPLICIT Version DEFAULT v1, - * requestorName [1] EXPLICIT GeneralName OPTIONAL, - * requestList SEQUENCE OF Request, - * requestExtensions [2] EXPLICIT Extensions OPTIONAL } - */ -typedef struct ocsp_req_info_st - { - ASN1_INTEGER *version; - GENERAL_NAME *requestorName; - STACK_OF(OCSP_ONEREQ) *requestList; - STACK_OF(X509_EXTENSION) *requestExtensions; - } OCSP_REQINFO; - -/* Signature ::= SEQUENCE { - * signatureAlgorithm AlgorithmIdentifier, - * signature BIT STRING, - * certs [0] EXPLICIT SEQUENCE OF Certificate OPTIONAL } - */ -typedef struct ocsp_signature_st - { - X509_ALGOR *signatureAlgorithm; - ASN1_BIT_STRING *signature; - STACK_OF(X509) *certs; - } OCSP_SIGNATURE; - -/* OCSPRequest ::= SEQUENCE { - * tbsRequest TBSRequest, - * optionalSignature [0] EXPLICIT Signature OPTIONAL } - */ -typedef struct ocsp_request_st - { - OCSP_REQINFO *tbsRequest; - OCSP_SIGNATURE *optionalSignature; /* OPTIONAL */ - } OCSP_REQUEST; - -/* OCSPResponseStatus ::= ENUMERATED { - * successful (0), --Response has valid confirmations - * malformedRequest (1), --Illegal confirmation request - * internalError (2), --Internal error in issuer - * tryLater (3), --Try again later - * --(4) is not used - * sigRequired (5), --Must sign the request - * unauthorized (6) --Request unauthorized - * } - */ -#define OCSP_RESPONSE_STATUS_SUCCESSFUL 0 -#define OCSP_RESPONSE_STATUS_MALFORMEDREQUEST 1 -#define OCSP_RESPONSE_STATUS_INTERNALERROR 2 -#define OCSP_RESPONSE_STATUS_TRYLATER 3 -#define OCSP_RESPONSE_STATUS_SIGREQUIRED 5 -#define OCSP_RESPONSE_STATUS_UNAUTHORIZED 6 - -/* ResponseBytes ::= SEQUENCE { - * responseType OBJECT IDENTIFIER, - * response OCTET STRING } - */ -typedef struct ocsp_resp_bytes_st - { - ASN1_OBJECT *responseType; - ASN1_OCTET_STRING *response; - } OCSP_RESPBYTES; - -/* OCSPResponse ::= SEQUENCE { - * responseStatus OCSPResponseStatus, - * responseBytes [0] EXPLICIT ResponseBytes OPTIONAL } - */ -struct ocsp_response_st - { - ASN1_ENUMERATED *responseStatus; - OCSP_RESPBYTES *responseBytes; - }; - -/* ResponderID ::= CHOICE { - * byName [1] Name, - * byKey [2] KeyHash } - */ -#define V_OCSP_RESPID_NAME 0 -#define V_OCSP_RESPID_KEY 1 -struct ocsp_responder_id_st - { - int type; - union { - X509_NAME* byName; - ASN1_OCTET_STRING *byKey; - } value; - }; - -DECLARE_STACK_OF(OCSP_RESPID) -DECLARE_ASN1_FUNCTIONS(OCSP_RESPID) - -/* KeyHash ::= OCTET STRING --SHA-1 hash of responder's public key - * --(excluding the tag and length fields) - */ - -/* RevokedInfo ::= SEQUENCE { - * revocationTime GeneralizedTime, - * revocationReason [0] EXPLICIT CRLReason OPTIONAL } - */ -typedef struct ocsp_revoked_info_st - { - ASN1_GENERALIZEDTIME *revocationTime; - ASN1_ENUMERATED *revocationReason; - } OCSP_REVOKEDINFO; - -/* CertStatus ::= CHOICE { - * good [0] IMPLICIT NULL, - * revoked [1] IMPLICIT RevokedInfo, - * unknown [2] IMPLICIT UnknownInfo } - */ -#define V_OCSP_CERTSTATUS_GOOD 0 -#define V_OCSP_CERTSTATUS_REVOKED 1 -#define V_OCSP_CERTSTATUS_UNKNOWN 2 -typedef struct ocsp_cert_status_st - { - int type; - union { - ASN1_NULL *good; - OCSP_REVOKEDINFO *revoked; - ASN1_NULL *unknown; - } value; - } OCSP_CERTSTATUS; - -/* SingleResponse ::= SEQUENCE { - * certID CertID, - * certStatus CertStatus, - * thisUpdate GeneralizedTime, - * nextUpdate [0] EXPLICIT GeneralizedTime OPTIONAL, - * singleExtensions [1] EXPLICIT Extensions OPTIONAL } - */ -typedef struct ocsp_single_response_st - { - OCSP_CERTID *certId; - OCSP_CERTSTATUS *certStatus; - ASN1_GENERALIZEDTIME *thisUpdate; - ASN1_GENERALIZEDTIME *nextUpdate; - STACK_OF(X509_EXTENSION) *singleExtensions; - } OCSP_SINGLERESP; - -DECLARE_STACK_OF(OCSP_SINGLERESP) -DECLARE_ASN1_SET_OF(OCSP_SINGLERESP) - -/* ResponseData ::= SEQUENCE { - * version [0] EXPLICIT Version DEFAULT v1, - * responderID ResponderID, - * producedAt GeneralizedTime, - * responses SEQUENCE OF SingleResponse, - * responseExtensions [1] EXPLICIT Extensions OPTIONAL } - */ -typedef struct ocsp_response_data_st - { - ASN1_INTEGER *version; - OCSP_RESPID *responderId; - ASN1_GENERALIZEDTIME *producedAt; - STACK_OF(OCSP_SINGLERESP) *responses; - STACK_OF(X509_EXTENSION) *responseExtensions; - } OCSP_RESPDATA; - -/* BasicOCSPResponse ::= SEQUENCE { - * tbsResponseData ResponseData, - * signatureAlgorithm AlgorithmIdentifier, - * signature BIT STRING, - * certs [0] EXPLICIT SEQUENCE OF Certificate OPTIONAL } - */ - /* Note 1: - The value for "signature" is specified in the OCSP rfc2560 as follows: - "The value for the signature SHALL be computed on the hash of the DER - encoding ResponseData." This means that you must hash the DER-encoded - tbsResponseData, and then run it through a crypto-signing function, which - will (at least w/RSA) do a hash-'n'-private-encrypt operation. This seems - a bit odd, but that's the spec. Also note that the data structures do not - leave anywhere to independently specify the algorithm used for the initial - hash. So, we look at the signature-specification algorithm, and try to do - something intelligent. -- Kathy Weinhold, CertCo */ - /* Note 2: - It seems that the mentioned passage from RFC 2560 (section 4.2.1) is open - for interpretation. I've done tests against another responder, and found - that it doesn't do the double hashing that the RFC seems to say one - should. Therefore, all relevant functions take a flag saying which - variant should be used. -- Richard Levitte, OpenSSL team and CeloCom */ -typedef struct ocsp_basic_response_st - { - OCSP_RESPDATA *tbsResponseData; - X509_ALGOR *signatureAlgorithm; - ASN1_BIT_STRING *signature; - STACK_OF(X509) *certs; - } OCSP_BASICRESP; - -/* - * CRLReason ::= ENUMERATED { - * unspecified (0), - * keyCompromise (1), - * cACompromise (2), - * affiliationChanged (3), - * superseded (4), - * cessationOfOperation (5), - * certificateHold (6), - * removeFromCRL (8) } - */ -#define OCSP_REVOKED_STATUS_NOSTATUS -1 -#define OCSP_REVOKED_STATUS_UNSPECIFIED 0 -#define OCSP_REVOKED_STATUS_KEYCOMPROMISE 1 -#define OCSP_REVOKED_STATUS_CACOMPROMISE 2 -#define OCSP_REVOKED_STATUS_AFFILIATIONCHANGED 3 -#define OCSP_REVOKED_STATUS_SUPERSEDED 4 -#define OCSP_REVOKED_STATUS_CESSATIONOFOPERATION 5 -#define OCSP_REVOKED_STATUS_CERTIFICATEHOLD 6 -#define OCSP_REVOKED_STATUS_REMOVEFROMCRL 8 - -/* CrlID ::= SEQUENCE { - * crlUrl [0] EXPLICIT IA5String OPTIONAL, - * crlNum [1] EXPLICIT INTEGER OPTIONAL, - * crlTime [2] EXPLICIT GeneralizedTime OPTIONAL } - */ -typedef struct ocsp_crl_id_st - { - ASN1_IA5STRING *crlUrl; - ASN1_INTEGER *crlNum; - ASN1_GENERALIZEDTIME *crlTime; - } OCSP_CRLID; - -/* ServiceLocator ::= SEQUENCE { - * issuer Name, - * locator AuthorityInfoAccessSyntax OPTIONAL } - */ -typedef struct ocsp_service_locator_st - { - X509_NAME* issuer; - STACK_OF(ACCESS_DESCRIPTION) *locator; - } OCSP_SERVICELOC; - -#define PEM_STRING_OCSP_REQUEST "OCSP REQUEST" -#define PEM_STRING_OCSP_RESPONSE "OCSP RESPONSE" - -#define d2i_OCSP_REQUEST_bio(bp,p) ASN1_d2i_bio_of(OCSP_REQUEST,OCSP_REQUEST_new,d2i_OCSP_REQUEST,bp,p) - -#define d2i_OCSP_RESPONSE_bio(bp,p) ASN1_d2i_bio_of(OCSP_RESPONSE,OCSP_RESPONSE_new,d2i_OCSP_RESPONSE,bp,p) - -#define PEM_read_bio_OCSP_REQUEST(bp,x,cb) (OCSP_REQUEST *)PEM_ASN1_read_bio( \ - (char *(*)())d2i_OCSP_REQUEST,PEM_STRING_OCSP_REQUEST,bp,(char **)x,cb,NULL) - -#define PEM_read_bio_OCSP_RESPONSE(bp,x,cb)(OCSP_RESPONSE *)PEM_ASN1_read_bio(\ - (char *(*)())d2i_OCSP_RESPONSE,PEM_STRING_OCSP_RESPONSE,bp,(char **)x,cb,NULL) - -#define PEM_write_bio_OCSP_REQUEST(bp,o) \ - PEM_ASN1_write_bio((int (*)())i2d_OCSP_REQUEST,PEM_STRING_OCSP_REQUEST,\ - bp,(char *)o, NULL,NULL,0,NULL,NULL) - -#define PEM_write_bio_OCSP_RESPONSE(bp,o) \ - PEM_ASN1_write_bio((int (*)())i2d_OCSP_RESPONSE,PEM_STRING_OCSP_RESPONSE,\ - bp,(char *)o, NULL,NULL,0,NULL,NULL) - -#define i2d_OCSP_RESPONSE_bio(bp,o) ASN1_i2d_bio_of(OCSP_RESPONSE,i2d_OCSP_RESPONSE,bp,o) - -#define i2d_OCSP_REQUEST_bio(bp,o) ASN1_i2d_bio_of(OCSP_REQUEST,i2d_OCSP_REQUEST,bp,o) - -#define OCSP_REQUEST_sign(o,pkey,md) \ - ASN1_item_sign(ASN1_ITEM_rptr(OCSP_REQINFO),\ - o->optionalSignature->signatureAlgorithm,NULL,\ - o->optionalSignature->signature,o->tbsRequest,pkey,md) - -#define OCSP_BASICRESP_sign(o,pkey,md,d) \ - ASN1_item_sign(ASN1_ITEM_rptr(OCSP_RESPDATA),o->signatureAlgorithm,NULL,\ - o->signature,o->tbsResponseData,pkey,md) - -#define OCSP_REQUEST_verify(a,r) ASN1_item_verify(ASN1_ITEM_rptr(OCSP_REQINFO),\ - a->optionalSignature->signatureAlgorithm,\ - a->optionalSignature->signature,a->tbsRequest,r) - -#define OCSP_BASICRESP_verify(a,r,d) ASN1_item_verify(ASN1_ITEM_rptr(OCSP_RESPDATA),\ - a->signatureAlgorithm,a->signature,a->tbsResponseData,r) - -#define ASN1_BIT_STRING_digest(data,type,md,len) \ - ASN1_item_digest(ASN1_ITEM_rptr(ASN1_BIT_STRING),type,data,md,len) - -#define OCSP_CERTSTATUS_dup(cs)\ - (OCSP_CERTSTATUS*)ASN1_dup((int(*)())i2d_OCSP_CERTSTATUS,\ - (char *(*)())d2i_OCSP_CERTSTATUS,(char *)(cs)) - -OCSP_CERTID *OCSP_CERTID_dup(OCSP_CERTID *id); - -OCSP_RESPONSE *OCSP_sendreq_bio(BIO *b, char *path, OCSP_REQUEST *req); -OCSP_REQ_CTX *OCSP_sendreq_new(BIO *io, char *path, OCSP_REQUEST *req, - int maxline); -int OCSP_sendreq_nbio(OCSP_RESPONSE **presp, OCSP_REQ_CTX *rctx); -void OCSP_REQ_CTX_free(OCSP_REQ_CTX *rctx); -int OCSP_REQ_CTX_set1_req(OCSP_REQ_CTX *rctx, OCSP_REQUEST *req); -int OCSP_REQ_CTX_add1_header(OCSP_REQ_CTX *rctx, - const char *name, const char *value); - -OCSP_CERTID *OCSP_cert_to_id(const EVP_MD *dgst, X509 *subject, X509 *issuer); - -OCSP_CERTID *OCSP_cert_id_new(const EVP_MD *dgst, - X509_NAME *issuerName, - ASN1_BIT_STRING* issuerKey, - ASN1_INTEGER *serialNumber); - -OCSP_ONEREQ *OCSP_request_add0_id(OCSP_REQUEST *req, OCSP_CERTID *cid); - -int OCSP_request_add1_nonce(OCSP_REQUEST *req, unsigned char *val, int len); -int OCSP_basic_add1_nonce(OCSP_BASICRESP *resp, unsigned char *val, int len); -int OCSP_check_nonce(OCSP_REQUEST *req, OCSP_BASICRESP *bs); -int OCSP_copy_nonce(OCSP_BASICRESP *resp, OCSP_REQUEST *req); - -int OCSP_request_set1_name(OCSP_REQUEST *req, X509_NAME *nm); -int OCSP_request_add1_cert(OCSP_REQUEST *req, X509 *cert); - -int OCSP_request_sign(OCSP_REQUEST *req, - X509 *signer, - EVP_PKEY *key, - const EVP_MD *dgst, - STACK_OF(X509) *certs, - unsigned long flags); - -int OCSP_response_status(OCSP_RESPONSE *resp); -OCSP_BASICRESP *OCSP_response_get1_basic(OCSP_RESPONSE *resp); - -int OCSP_resp_count(OCSP_BASICRESP *bs); -OCSP_SINGLERESP *OCSP_resp_get0(OCSP_BASICRESP *bs, int idx); -int OCSP_resp_find(OCSP_BASICRESP *bs, OCSP_CERTID *id, int last); -int OCSP_single_get0_status(OCSP_SINGLERESP *single, int *reason, - ASN1_GENERALIZEDTIME **revtime, - ASN1_GENERALIZEDTIME **thisupd, - ASN1_GENERALIZEDTIME **nextupd); -int OCSP_resp_find_status(OCSP_BASICRESP *bs, OCSP_CERTID *id, int *status, - int *reason, - ASN1_GENERALIZEDTIME **revtime, - ASN1_GENERALIZEDTIME **thisupd, - ASN1_GENERALIZEDTIME **nextupd); -int OCSP_check_validity(ASN1_GENERALIZEDTIME *thisupd, - ASN1_GENERALIZEDTIME *nextupd, - long sec, long maxsec); - -int OCSP_request_verify(OCSP_REQUEST *req, STACK_OF(X509) *certs, X509_STORE *store, unsigned long flags); - -int OCSP_parse_url(char *url, char **phost, char **pport, char **ppath, int *pssl); - -int OCSP_id_issuer_cmp(OCSP_CERTID *a, OCSP_CERTID *b); -int OCSP_id_cmp(OCSP_CERTID *a, OCSP_CERTID *b); - -int OCSP_request_onereq_count(OCSP_REQUEST *req); -OCSP_ONEREQ *OCSP_request_onereq_get0(OCSP_REQUEST *req, int i); -OCSP_CERTID *OCSP_onereq_get0_id(OCSP_ONEREQ *one); -int OCSP_id_get0_info(ASN1_OCTET_STRING **piNameHash, ASN1_OBJECT **pmd, - ASN1_OCTET_STRING **pikeyHash, - ASN1_INTEGER **pserial, OCSP_CERTID *cid); -int OCSP_request_is_signed(OCSP_REQUEST *req); -OCSP_RESPONSE *OCSP_response_create(int status, OCSP_BASICRESP *bs); -OCSP_SINGLERESP *OCSP_basic_add1_status(OCSP_BASICRESP *rsp, - OCSP_CERTID *cid, - int status, int reason, - ASN1_TIME *revtime, - ASN1_TIME *thisupd, ASN1_TIME *nextupd); -int OCSP_basic_add1_cert(OCSP_BASICRESP *resp, X509 *cert); -int OCSP_basic_sign(OCSP_BASICRESP *brsp, - X509 *signer, EVP_PKEY *key, const EVP_MD *dgst, - STACK_OF(X509) *certs, unsigned long flags); - -X509_EXTENSION *OCSP_crlID_new(char *url, long *n, char *tim); - -X509_EXTENSION *OCSP_accept_responses_new(char **oids); - -X509_EXTENSION *OCSP_archive_cutoff_new(char* tim); - -X509_EXTENSION *OCSP_url_svcloc_new(X509_NAME* issuer, char **urls); - -int OCSP_REQUEST_get_ext_count(OCSP_REQUEST *x); -int OCSP_REQUEST_get_ext_by_NID(OCSP_REQUEST *x, int nid, int lastpos); -int OCSP_REQUEST_get_ext_by_OBJ(OCSP_REQUEST *x, ASN1_OBJECT *obj, int lastpos); -int OCSP_REQUEST_get_ext_by_critical(OCSP_REQUEST *x, int crit, int lastpos); -X509_EXTENSION *OCSP_REQUEST_get_ext(OCSP_REQUEST *x, int loc); -X509_EXTENSION *OCSP_REQUEST_delete_ext(OCSP_REQUEST *x, int loc); -void *OCSP_REQUEST_get1_ext_d2i(OCSP_REQUEST *x, int nid, int *crit, int *idx); -int OCSP_REQUEST_add1_ext_i2d(OCSP_REQUEST *x, int nid, void *value, int crit, - unsigned long flags); -int OCSP_REQUEST_add_ext(OCSP_REQUEST *x, X509_EXTENSION *ex, int loc); - -int OCSP_ONEREQ_get_ext_count(OCSP_ONEREQ *x); -int OCSP_ONEREQ_get_ext_by_NID(OCSP_ONEREQ *x, int nid, int lastpos); -int OCSP_ONEREQ_get_ext_by_OBJ(OCSP_ONEREQ *x, ASN1_OBJECT *obj, int lastpos); -int OCSP_ONEREQ_get_ext_by_critical(OCSP_ONEREQ *x, int crit, int lastpos); -X509_EXTENSION *OCSP_ONEREQ_get_ext(OCSP_ONEREQ *x, int loc); -X509_EXTENSION *OCSP_ONEREQ_delete_ext(OCSP_ONEREQ *x, int loc); -void *OCSP_ONEREQ_get1_ext_d2i(OCSP_ONEREQ *x, int nid, int *crit, int *idx); -int OCSP_ONEREQ_add1_ext_i2d(OCSP_ONEREQ *x, int nid, void *value, int crit, - unsigned long flags); -int OCSP_ONEREQ_add_ext(OCSP_ONEREQ *x, X509_EXTENSION *ex, int loc); - -int OCSP_BASICRESP_get_ext_count(OCSP_BASICRESP *x); -int OCSP_BASICRESP_get_ext_by_NID(OCSP_BASICRESP *x, int nid, int lastpos); -int OCSP_BASICRESP_get_ext_by_OBJ(OCSP_BASICRESP *x, ASN1_OBJECT *obj, int lastpos); -int OCSP_BASICRESP_get_ext_by_critical(OCSP_BASICRESP *x, int crit, int lastpos); -X509_EXTENSION *OCSP_BASICRESP_get_ext(OCSP_BASICRESP *x, int loc); -X509_EXTENSION *OCSP_BASICRESP_delete_ext(OCSP_BASICRESP *x, int loc); -void *OCSP_BASICRESP_get1_ext_d2i(OCSP_BASICRESP *x, int nid, int *crit, int *idx); -int OCSP_BASICRESP_add1_ext_i2d(OCSP_BASICRESP *x, int nid, void *value, int crit, - unsigned long flags); -int OCSP_BASICRESP_add_ext(OCSP_BASICRESP *x, X509_EXTENSION *ex, int loc); - -int OCSP_SINGLERESP_get_ext_count(OCSP_SINGLERESP *x); -int OCSP_SINGLERESP_get_ext_by_NID(OCSP_SINGLERESP *x, int nid, int lastpos); -int OCSP_SINGLERESP_get_ext_by_OBJ(OCSP_SINGLERESP *x, ASN1_OBJECT *obj, int lastpos); -int OCSP_SINGLERESP_get_ext_by_critical(OCSP_SINGLERESP *x, int crit, int lastpos); -X509_EXTENSION *OCSP_SINGLERESP_get_ext(OCSP_SINGLERESP *x, int loc); -X509_EXTENSION *OCSP_SINGLERESP_delete_ext(OCSP_SINGLERESP *x, int loc); -void *OCSP_SINGLERESP_get1_ext_d2i(OCSP_SINGLERESP *x, int nid, int *crit, int *idx); -int OCSP_SINGLERESP_add1_ext_i2d(OCSP_SINGLERESP *x, int nid, void *value, int crit, - unsigned long flags); -int OCSP_SINGLERESP_add_ext(OCSP_SINGLERESP *x, X509_EXTENSION *ex, int loc); - -DECLARE_ASN1_FUNCTIONS(OCSP_SINGLERESP) -DECLARE_ASN1_FUNCTIONS(OCSP_CERTSTATUS) -DECLARE_ASN1_FUNCTIONS(OCSP_REVOKEDINFO) -DECLARE_ASN1_FUNCTIONS(OCSP_BASICRESP) -DECLARE_ASN1_FUNCTIONS(OCSP_RESPDATA) -DECLARE_ASN1_FUNCTIONS(OCSP_RESPID) -DECLARE_ASN1_FUNCTIONS(OCSP_RESPONSE) -DECLARE_ASN1_FUNCTIONS(OCSP_RESPBYTES) -DECLARE_ASN1_FUNCTIONS(OCSP_ONEREQ) -DECLARE_ASN1_FUNCTIONS(OCSP_CERTID) -DECLARE_ASN1_FUNCTIONS(OCSP_REQUEST) -DECLARE_ASN1_FUNCTIONS(OCSP_SIGNATURE) -DECLARE_ASN1_FUNCTIONS(OCSP_REQINFO) -DECLARE_ASN1_FUNCTIONS(OCSP_CRLID) -DECLARE_ASN1_FUNCTIONS(OCSP_SERVICELOC) - -const char *OCSP_response_status_str(long s); -const char *OCSP_cert_status_str(long s); -const char *OCSP_crl_reason_str(long s); - -int OCSP_REQUEST_print(BIO *bp, OCSP_REQUEST* a, unsigned long flags); -int OCSP_RESPONSE_print(BIO *bp, OCSP_RESPONSE* o, unsigned long flags); - -int OCSP_basic_verify(OCSP_BASICRESP *bs, STACK_OF(X509) *certs, - X509_STORE *st, unsigned long flags); - -/* BEGIN ERROR CODES */ -/* The following lines are auto generated by the script mkerr.pl. Any changes - * made after this point may be overwritten when the script is next run. - */ -void ERR_load_OCSP_strings(void); - -/* Error codes for the OCSP functions. */ - -/* Function codes. */ -#define OCSP_F_ASN1_STRING_ENCODE 100 -#define OCSP_F_D2I_OCSP_NONCE 102 -#define OCSP_F_OCSP_BASIC_ADD1_STATUS 103 -#define OCSP_F_OCSP_BASIC_SIGN 104 -#define OCSP_F_OCSP_BASIC_VERIFY 105 -#define OCSP_F_OCSP_CERT_ID_NEW 101 -#define OCSP_F_OCSP_CHECK_DELEGATED 106 -#define OCSP_F_OCSP_CHECK_IDS 107 -#define OCSP_F_OCSP_CHECK_ISSUER 108 -#define OCSP_F_OCSP_CHECK_VALIDITY 115 -#define OCSP_F_OCSP_MATCH_ISSUERID 109 -#define OCSP_F_OCSP_PARSE_URL 114 -#define OCSP_F_OCSP_REQUEST_SIGN 110 -#define OCSP_F_OCSP_REQUEST_VERIFY 116 -#define OCSP_F_OCSP_RESPONSE_GET1_BASIC 111 -#define OCSP_F_OCSP_SENDREQ_BIO 112 -#define OCSP_F_OCSP_SENDREQ_NBIO 117 -#define OCSP_F_PARSE_HTTP_LINE1 118 -#define OCSP_F_REQUEST_VERIFY 113 - -/* Reason codes. */ -#define OCSP_R_BAD_DATA 100 -#define OCSP_R_CERTIFICATE_VERIFY_ERROR 101 -#define OCSP_R_DIGEST_ERR 102 -#define OCSP_R_ERROR_IN_NEXTUPDATE_FIELD 122 -#define OCSP_R_ERROR_IN_THISUPDATE_FIELD 123 -#define OCSP_R_ERROR_PARSING_URL 121 -#define OCSP_R_MISSING_OCSPSIGNING_USAGE 103 -#define OCSP_R_NEXTUPDATE_BEFORE_THISUPDATE 124 -#define OCSP_R_NOT_BASIC_RESPONSE 104 -#define OCSP_R_NO_CERTIFICATES_IN_CHAIN 105 -#define OCSP_R_NO_CONTENT 106 -#define OCSP_R_NO_PUBLIC_KEY 107 -#define OCSP_R_NO_RESPONSE_DATA 108 -#define OCSP_R_NO_REVOKED_TIME 109 -#define OCSP_R_PRIVATE_KEY_DOES_NOT_MATCH_CERTIFICATE 110 -#define OCSP_R_REQUEST_NOT_SIGNED 128 -#define OCSP_R_RESPONSE_CONTAINS_NO_REVOCATION_DATA 111 -#define OCSP_R_ROOT_CA_NOT_TRUSTED 112 -#define OCSP_R_SERVER_READ_ERROR 113 -#define OCSP_R_SERVER_RESPONSE_ERROR 114 -#define OCSP_R_SERVER_RESPONSE_PARSE_ERROR 115 -#define OCSP_R_SERVER_WRITE_ERROR 116 -#define OCSP_R_SIGNATURE_FAILURE 117 -#define OCSP_R_SIGNER_CERTIFICATE_NOT_FOUND 118 -#define OCSP_R_STATUS_EXPIRED 125 -#define OCSP_R_STATUS_NOT_YET_VALID 126 -#define OCSP_R_STATUS_TOO_OLD 127 -#define OCSP_R_UNKNOWN_MESSAGE_DIGEST 119 -#define OCSP_R_UNKNOWN_NID 120 -#define OCSP_R_UNSUPPORTED_REQUESTORNAME_TYPE 129 - -#ifdef __cplusplus -} -#endif -#endif diff --git a/Pods/OpenSSL-Universal/include-osx/openssl/opensslconf.h b/Pods/OpenSSL-Universal/include-osx/openssl/opensslconf.h deleted file mode 100644 index 38b9914a..00000000 --- a/Pods/OpenSSL-Universal/include-osx/openssl/opensslconf.h +++ /dev/null @@ -1,237 +0,0 @@ -/* opensslconf.h */ -/* WARNING: Generated automatically from opensslconf.h.in by Configure. */ - -/* OpenSSL was configured with the following options: */ -#ifndef OPENSSL_SYSNAME_MACOSX -# define OPENSSL_SYSNAME_MACOSX -#endif -#ifndef OPENSSL_DOING_MAKEDEPEND - - -#ifndef OPENSSL_NO_EC_NISTP_64_GCC_128 -# define OPENSSL_NO_EC_NISTP_64_GCC_128 -#endif -#ifndef OPENSSL_NO_GMP -# define OPENSSL_NO_GMP -#endif -#ifndef OPENSSL_NO_JPAKE -# define OPENSSL_NO_JPAKE -#endif -#ifndef OPENSSL_NO_KRB5 -# define OPENSSL_NO_KRB5 -#endif -#ifndef OPENSSL_NO_MD2 -# define OPENSSL_NO_MD2 -#endif -#ifndef OPENSSL_NO_RC5 -# define OPENSSL_NO_RC5 -#endif -#ifndef OPENSSL_NO_RFC3779 -# define OPENSSL_NO_RFC3779 -#endif -#ifndef OPENSSL_NO_SCTP -# define OPENSSL_NO_SCTP -#endif -#ifndef OPENSSL_NO_STORE -# define OPENSSL_NO_STORE -#endif - -#endif /* OPENSSL_DOING_MAKEDEPEND */ - -#ifndef OPENSSL_THREADS -# define OPENSSL_THREADS -#endif -#ifndef OPENSSL_NO_DYNAMIC_ENGINE -# define OPENSSL_NO_DYNAMIC_ENGINE -#endif - -/* The OPENSSL_NO_* macros are also defined as NO_* if the application - asks for it. This is a transient feature that is provided for those - who haven't had the time to do the appropriate changes in their - applications. */ -#ifdef OPENSSL_ALGORITHM_DEFINES -# if defined(OPENSSL_NO_EC_NISTP_64_GCC_128) && !defined(NO_EC_NISTP_64_GCC_128) -# define NO_EC_NISTP_64_GCC_128 -# endif -# if defined(OPENSSL_NO_GMP) && !defined(NO_GMP) -# define NO_GMP -# endif -# if defined(OPENSSL_NO_JPAKE) && !defined(NO_JPAKE) -# define NO_JPAKE -# endif -# if defined(OPENSSL_NO_KRB5) && !defined(NO_KRB5) -# define NO_KRB5 -# endif -# if defined(OPENSSL_NO_MD2) && !defined(NO_MD2) -# define NO_MD2 -# endif -# if defined(OPENSSL_NO_RC5) && !defined(NO_RC5) -# define NO_RC5 -# endif -# if defined(OPENSSL_NO_RFC3779) && !defined(NO_RFC3779) -# define NO_RFC3779 -# endif -# if defined(OPENSSL_NO_SCTP) && !defined(NO_SCTP) -# define NO_SCTP -# endif -# if defined(OPENSSL_NO_STORE) && !defined(NO_STORE) -# define NO_STORE -# endif -#endif - -#define OPENSSL_CPUID_OBJ - -/* crypto/opensslconf.h.in */ - -/* Generate 80386 code? */ -#undef I386_ONLY - -#if !(defined(VMS) || defined(__VMS)) /* VMS uses logical names instead */ -#if defined(HEADER_CRYPTLIB_H) && !defined(OPENSSLDIR) -#define ENGINESDIR "/tmp/openssl-1.0.1h-i386/lib/engines" -#define OPENSSLDIR "/tmp/openssl-1.0.1h-i386" -#endif -#endif - -#undef OPENSSL_UNISTD -#define OPENSSL_UNISTD - -#undef OPENSSL_EXPORT_VAR_AS_FUNCTION - -#if defined(HEADER_IDEA_H) && !defined(IDEA_INT) -#define IDEA_INT unsigned int -#endif - -#if defined(HEADER_MD2_H) && !defined(MD2_INT) -#define MD2_INT unsigned int -#endif - -#if defined(HEADER_RC2_H) && !defined(RC2_INT) -/* I need to put in a mod for the alpha - eay */ -#define RC2_INT unsigned int -#endif - -#if defined(HEADER_RC4_H) -#if !defined(RC4_INT) -/* using int types make the structure larger but make the code faster - * on most boxes I have tested - up to %20 faster. */ -/* - * I don't know what does "most" mean, but declaring "int" is a must on: - * - Intel P6 because partial register stalls are very expensive; - * - elder Alpha because it lacks byte load/store instructions; - */ -#define RC4_INT unsigned int -#endif -#if !defined(RC4_CHUNK) -/* - * This enables code handling data aligned at natural CPU word - * boundary. See crypto/rc4/rc4_enc.c for further details. - */ -#define RC4_CHUNK unsigned long -#endif -#endif - -#if (defined(HEADER_NEW_DES_H) || defined(HEADER_DES_H)) && !defined(DES_LONG) -/* If this is set to 'unsigned int' on a DEC Alpha, this gives about a - * %20 speed up (longs are 8 bytes, int's are 4). */ -#ifndef DES_LONG -#define DES_LONG unsigned long -#endif -#endif - -#if defined(HEADER_BN_H) && !defined(CONFIG_HEADER_BN_H) -#define CONFIG_HEADER_BN_H -#define BN_LLONG - -/* Should we define BN_DIV2W here? */ - -/* Only one for the following should be defined */ -#undef SIXTY_FOUR_BIT_LONG -#undef SIXTY_FOUR_BIT -#define THIRTY_TWO_BIT -#endif - -#if defined(HEADER_RC4_LOCL_H) && !defined(CONFIG_HEADER_RC4_LOCL_H) -#define CONFIG_HEADER_RC4_LOCL_H -/* if this is defined data[i] is used instead of *data, this is a %20 - * speedup on x86 */ -#undef RC4_INDEX -#endif - -#if defined(HEADER_BF_LOCL_H) && !defined(CONFIG_HEADER_BF_LOCL_H) -#define CONFIG_HEADER_BF_LOCL_H -#define BF_PTR -#endif /* HEADER_BF_LOCL_H */ - -#if defined(HEADER_DES_LOCL_H) && !defined(CONFIG_HEADER_DES_LOCL_H) -#define CONFIG_HEADER_DES_LOCL_H -#ifndef DES_DEFAULT_OPTIONS -/* the following is tweaked from a config script, that is why it is a - * protected undef/define */ -#ifndef DES_PTR -#undef DES_PTR -#endif - -/* This helps C compiler generate the correct code for multiple functional - * units. It reduces register dependancies at the expense of 2 more - * registers */ -#ifndef DES_RISC1 -#undef DES_RISC1 -#endif - -#ifndef DES_RISC2 -#undef DES_RISC2 -#endif - -#if defined(DES_RISC1) && defined(DES_RISC2) -YOU SHOULD NOT HAVE BOTH DES_RISC1 AND DES_RISC2 DEFINED!!!!! -#endif - -/* Unroll the inner loop, this sometimes helps, sometimes hinders. - * Very mucy CPU dependant */ -#ifndef DES_UNROLL -#define DES_UNROLL -#endif - -/* These default values were supplied by - * Peter Gutman - * They are only used if nothing else has been defined */ -#if !defined(DES_PTR) && !defined(DES_RISC1) && !defined(DES_RISC2) && !defined(DES_UNROLL) -/* Special defines which change the way the code is built depending on the - CPU and OS. For SGI machines you can use _MIPS_SZLONG (32 or 64) to find - even newer MIPS CPU's, but at the moment one size fits all for - optimization options. Older Sparc's work better with only UNROLL, but - there's no way to tell at compile time what it is you're running on */ - -#if defined( sun ) /* Newer Sparc's */ -# define DES_PTR -# define DES_RISC1 -# define DES_UNROLL -#elif defined( __ultrix ) /* Older MIPS */ -# define DES_PTR -# define DES_RISC2 -# define DES_UNROLL -#elif defined( __osf1__ ) /* Alpha */ -# define DES_PTR -# define DES_RISC2 -#elif defined ( _AIX ) /* RS6000 */ - /* Unknown */ -#elif defined( __hpux ) /* HP-PA */ - /* Unknown */ -#elif defined( __aux ) /* 68K */ - /* Unknown */ -#elif defined( __dgux ) /* 88K (but P6 in latest boxes) */ -# define DES_UNROLL -#elif defined( __sgi ) /* Newer MIPS */ -# define DES_PTR -# define DES_RISC2 -# define DES_UNROLL -#elif defined(i386) || defined(__i386__) /* x86 boxes, should be gcc */ -# define DES_PTR -# define DES_RISC1 -# define DES_UNROLL -#endif /* Systems-specific speed defines */ -#endif - -#endif /* DES_DEFAULT_OPTIONS */ -#endif /* HEADER_DES_LOCL_H */ diff --git a/Pods/OpenSSL-Universal/include-osx/openssl/opensslv.h b/Pods/OpenSSL-Universal/include-osx/openssl/opensslv.h deleted file mode 100644 index c3b6acec..00000000 --- a/Pods/OpenSSL-Universal/include-osx/openssl/opensslv.h +++ /dev/null @@ -1,89 +0,0 @@ -#ifndef HEADER_OPENSSLV_H -#define HEADER_OPENSSLV_H - -/* Numeric release version identifier: - * MNNFFPPS: major minor fix patch status - * The status nibble has one of the values 0 for development, 1 to e for betas - * 1 to 14, and f for release. The patch level is exactly that. - * For example: - * 0.9.3-dev 0x00903000 - * 0.9.3-beta1 0x00903001 - * 0.9.3-beta2-dev 0x00903002 - * 0.9.3-beta2 0x00903002 (same as ...beta2-dev) - * 0.9.3 0x0090300f - * 0.9.3a 0x0090301f - * 0.9.4 0x0090400f - * 1.2.3z 0x102031af - * - * For continuity reasons (because 0.9.5 is already out, and is coded - * 0x00905100), between 0.9.5 and 0.9.6 the coding of the patch level - * part is slightly different, by setting the highest bit. This means - * that 0.9.5a looks like this: 0x0090581f. At 0.9.6, we can start - * with 0x0090600S... - * - * (Prior to 0.9.3-dev a different scheme was used: 0.9.2b is 0x0922.) - * (Prior to 0.9.5a beta1, a different scheme was used: MMNNFFRBB for - * major minor fix final patch/beta) - */ -#define OPENSSL_VERSION_NUMBER 0x1000108fL -#ifdef OPENSSL_FIPS -#define OPENSSL_VERSION_TEXT "OpenSSL 1.0.1h-fips 5 Jun 2014" -#else -#define OPENSSL_VERSION_TEXT "OpenSSL 1.0.1h 5 Jun 2014" -#endif -#define OPENSSL_VERSION_PTEXT " part of " OPENSSL_VERSION_TEXT - - -/* The macros below are to be used for shared library (.so, .dll, ...) - * versioning. That kind of versioning works a bit differently between - * operating systems. The most usual scheme is to set a major and a minor - * number, and have the runtime loader check that the major number is equal - * to what it was at application link time, while the minor number has to - * be greater or equal to what it was at application link time. With this - * scheme, the version number is usually part of the file name, like this: - * - * libcrypto.so.0.9 - * - * Some unixen also make a softlink with the major verson number only: - * - * libcrypto.so.0 - * - * On Tru64 and IRIX 6.x it works a little bit differently. There, the - * shared library version is stored in the file, and is actually a series - * of versions, separated by colons. The rightmost version present in the - * library when linking an application is stored in the application to be - * matched at run time. When the application is run, a check is done to - * see if the library version stored in the application matches any of the - * versions in the version string of the library itself. - * This version string can be constructed in any way, depending on what - * kind of matching is desired. However, to implement the same scheme as - * the one used in the other unixen, all compatible versions, from lowest - * to highest, should be part of the string. Consecutive builds would - * give the following versions strings: - * - * 3.0 - * 3.0:3.1 - * 3.0:3.1:3.2 - * 4.0 - * 4.0:4.1 - * - * Notice how version 4 is completely incompatible with version, and - * therefore give the breach you can see. - * - * There may be other schemes as well that I haven't yet discovered. - * - * So, here's the way it works here: first of all, the library version - * number doesn't need at all to match the overall OpenSSL version. - * However, it's nice and more understandable if it actually does. - * The current library version is stored in the macro SHLIB_VERSION_NUMBER, - * which is just a piece of text in the format "M.m.e" (Major, minor, edit). - * For the sake of Tru64, IRIX, and any other OS that behaves in similar ways, - * we need to keep a history of version numbers, which is done in the - * macro SHLIB_VERSION_HISTORY. The numbers are separated by colons and - * should only keep the versions that are binary compatible with the current. - */ -#define SHLIB_VERSION_HISTORY "" -#define SHLIB_VERSION_NUMBER "1.0.0" - - -#endif /* HEADER_OPENSSLV_H */ diff --git a/Pods/OpenSSL-Universal/include-osx/openssl/ossl_typ.h b/Pods/OpenSSL-Universal/include-osx/openssl/ossl_typ.h deleted file mode 100644 index ea9227f6..00000000 --- a/Pods/OpenSSL-Universal/include-osx/openssl/ossl_typ.h +++ /dev/null @@ -1,202 +0,0 @@ -/* ==================================================================== - * Copyright (c) 1998-2001 The OpenSSL Project. All rights reserved. - * - * Redistribution and use in source and binary forms, with or without - * modification, are permitted provided that the following conditions - * are met: - * - * 1. Redistributions of source code must retain the above copyright - * notice, this list of conditions and the following disclaimer. - * - * 2. Redistributions in binary form must reproduce the above copyright - * notice, this list of conditions and the following disclaimer in - * the documentation and/or other materials provided with the - * distribution. - * - * 3. All advertising materials mentioning features or use of this - * software must display the following acknowledgment: - * "This product includes software developed by the OpenSSL Project - * for use in the OpenSSL Toolkit. (http://www.openssl.org/)" - * - * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to - * endorse or promote products derived from this software without - * prior written permission. For written permission, please contact - * openssl-core@openssl.org. - * - * 5. Products derived from this software may not be called "OpenSSL" - * nor may "OpenSSL" appear in their names without prior written - * permission of the OpenSSL Project. - * - * 6. Redistributions of any form whatsoever must retain the following - * acknowledgment: - * "This product includes software developed by the OpenSSL Project - * for use in the OpenSSL Toolkit (http://www.openssl.org/)" - * - * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY - * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE - * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR - * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR - * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, - * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT - * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; - * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) - * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, - * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) - * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED - * OF THE POSSIBILITY OF SUCH DAMAGE. - * ==================================================================== - * - * This product includes cryptographic software written by Eric Young - * (eay@cryptsoft.com). This product includes software written by Tim - * Hudson (tjh@cryptsoft.com). - * - */ - -#ifndef HEADER_OPENSSL_TYPES_H -#define HEADER_OPENSSL_TYPES_H - -#include - -#ifdef NO_ASN1_TYPEDEFS -#define ASN1_INTEGER ASN1_STRING -#define ASN1_ENUMERATED ASN1_STRING -#define ASN1_BIT_STRING ASN1_STRING -#define ASN1_OCTET_STRING ASN1_STRING -#define ASN1_PRINTABLESTRING ASN1_STRING -#define ASN1_T61STRING ASN1_STRING -#define ASN1_IA5STRING ASN1_STRING -#define ASN1_UTCTIME ASN1_STRING -#define ASN1_GENERALIZEDTIME ASN1_STRING -#define ASN1_TIME ASN1_STRING -#define ASN1_GENERALSTRING ASN1_STRING -#define ASN1_UNIVERSALSTRING ASN1_STRING -#define ASN1_BMPSTRING ASN1_STRING -#define ASN1_VISIBLESTRING ASN1_STRING -#define ASN1_UTF8STRING ASN1_STRING -#define ASN1_BOOLEAN int -#define ASN1_NULL int -#else -typedef struct asn1_string_st ASN1_INTEGER; -typedef struct asn1_string_st ASN1_ENUMERATED; -typedef struct asn1_string_st ASN1_BIT_STRING; -typedef struct asn1_string_st ASN1_OCTET_STRING; -typedef struct asn1_string_st ASN1_PRINTABLESTRING; -typedef struct asn1_string_st ASN1_T61STRING; -typedef struct asn1_string_st ASN1_IA5STRING; -typedef struct asn1_string_st ASN1_GENERALSTRING; -typedef struct asn1_string_st ASN1_UNIVERSALSTRING; -typedef struct asn1_string_st ASN1_BMPSTRING; -typedef struct asn1_string_st ASN1_UTCTIME; -typedef struct asn1_string_st ASN1_TIME; -typedef struct asn1_string_st ASN1_GENERALIZEDTIME; -typedef struct asn1_string_st ASN1_VISIBLESTRING; -typedef struct asn1_string_st ASN1_UTF8STRING; -typedef struct asn1_string_st ASN1_STRING; -typedef int ASN1_BOOLEAN; -typedef int ASN1_NULL; -#endif - -typedef struct ASN1_ITEM_st ASN1_ITEM; -typedef struct asn1_pctx_st ASN1_PCTX; - -#ifdef OPENSSL_SYS_WIN32 -#undef X509_NAME -#undef X509_EXTENSIONS -#undef X509_CERT_PAIR -#undef PKCS7_ISSUER_AND_SERIAL -#undef OCSP_REQUEST -#undef OCSP_RESPONSE -#endif - -#ifdef BIGNUM -#undef BIGNUM -#endif -typedef struct bignum_st BIGNUM; -typedef struct bignum_ctx BN_CTX; -typedef struct bn_blinding_st BN_BLINDING; -typedef struct bn_mont_ctx_st BN_MONT_CTX; -typedef struct bn_recp_ctx_st BN_RECP_CTX; -typedef struct bn_gencb_st BN_GENCB; - -typedef struct buf_mem_st BUF_MEM; - -typedef struct evp_cipher_st EVP_CIPHER; -typedef struct evp_cipher_ctx_st EVP_CIPHER_CTX; -typedef struct env_md_st EVP_MD; -typedef struct env_md_ctx_st EVP_MD_CTX; -typedef struct evp_pkey_st EVP_PKEY; - -typedef struct evp_pkey_asn1_method_st EVP_PKEY_ASN1_METHOD; - -typedef struct evp_pkey_method_st EVP_PKEY_METHOD; -typedef struct evp_pkey_ctx_st EVP_PKEY_CTX; - -typedef struct dh_st DH; -typedef struct dh_method DH_METHOD; - -typedef struct dsa_st DSA; -typedef struct dsa_method DSA_METHOD; - -typedef struct rsa_st RSA; -typedef struct rsa_meth_st RSA_METHOD; - -typedef struct rand_meth_st RAND_METHOD; - -typedef struct ecdh_method ECDH_METHOD; -typedef struct ecdsa_method ECDSA_METHOD; - -typedef struct x509_st X509; -typedef struct X509_algor_st X509_ALGOR; -typedef struct X509_crl_st X509_CRL; -typedef struct x509_crl_method_st X509_CRL_METHOD; -typedef struct x509_revoked_st X509_REVOKED; -typedef struct X509_name_st X509_NAME; -typedef struct X509_pubkey_st X509_PUBKEY; -typedef struct x509_store_st X509_STORE; -typedef struct x509_store_ctx_st X509_STORE_CTX; - -typedef struct pkcs8_priv_key_info_st PKCS8_PRIV_KEY_INFO; - -typedef struct v3_ext_ctx X509V3_CTX; -typedef struct conf_st CONF; - -typedef struct store_st STORE; -typedef struct store_method_st STORE_METHOD; - -typedef struct ui_st UI; -typedef struct ui_method_st UI_METHOD; - -typedef struct st_ERR_FNS ERR_FNS; - -typedef struct engine_st ENGINE; -typedef struct ssl_st SSL; -typedef struct ssl_ctx_st SSL_CTX; - -typedef struct X509_POLICY_NODE_st X509_POLICY_NODE; -typedef struct X509_POLICY_LEVEL_st X509_POLICY_LEVEL; -typedef struct X509_POLICY_TREE_st X509_POLICY_TREE; -typedef struct X509_POLICY_CACHE_st X509_POLICY_CACHE; - -typedef struct AUTHORITY_KEYID_st AUTHORITY_KEYID; -typedef struct DIST_POINT_st DIST_POINT; -typedef struct ISSUING_DIST_POINT_st ISSUING_DIST_POINT; -typedef struct NAME_CONSTRAINTS_st NAME_CONSTRAINTS; - - /* If placed in pkcs12.h, we end up with a circular depency with pkcs7.h */ -#define DECLARE_PKCS12_STACK_OF(type) /* Nothing */ -#define IMPLEMENT_PKCS12_STACK_OF(type) /* Nothing */ - -typedef struct crypto_ex_data_st CRYPTO_EX_DATA; -/* Callback types for crypto.h */ -typedef int CRYPTO_EX_new(void *parent, void *ptr, CRYPTO_EX_DATA *ad, - int idx, long argl, void *argp); -typedef void CRYPTO_EX_free(void *parent, void *ptr, CRYPTO_EX_DATA *ad, - int idx, long argl, void *argp); -typedef int CRYPTO_EX_dup(CRYPTO_EX_DATA *to, CRYPTO_EX_DATA *from, void *from_d, - int idx, long argl, void *argp); - -typedef struct ocsp_req_ctx_st OCSP_REQ_CTX; -typedef struct ocsp_response_st OCSP_RESPONSE; -typedef struct ocsp_responder_id_st OCSP_RESPID; - -#endif /* def HEADER_OPENSSL_TYPES_H */ diff --git a/Pods/OpenSSL-Universal/include-osx/openssl/pem.h b/Pods/OpenSSL-Universal/include-osx/openssl/pem.h deleted file mode 100644 index 8a6ababe..00000000 --- a/Pods/OpenSSL-Universal/include-osx/openssl/pem.h +++ /dev/null @@ -1,641 +0,0 @@ -/* crypto/pem/pem.h */ -/* Copyright (C) 1995-1997 Eric Young (eay@cryptsoft.com) - * All rights reserved. - * - * This package is an SSL implementation written - * by Eric Young (eay@cryptsoft.com). - * The implementation was written so as to conform with Netscapes SSL. - * - * This library is free for commercial and non-commercial use as long as - * the following conditions are aheared to. The following conditions - * apply to all code found in this distribution, be it the RC4, RSA, - * lhash, DES, etc., code; not just the SSL code. The SSL documentation - * included with this distribution is covered by the same copyright terms - * except that the holder is Tim Hudson (tjh@cryptsoft.com). - * - * Copyright remains Eric Young's, and as such any Copyright notices in - * the code are not to be removed. - * If this package is used in a product, Eric Young should be given attribution - * as the author of the parts of the library used. - * This can be in the form of a textual message at program startup or - * in documentation (online or textual) provided with the package. - * - * Redistribution and use in source and binary forms, with or without - * modification, are permitted provided that the following conditions - * are met: - * 1. Redistributions of source code must retain the copyright - * notice, this list of conditions and the following disclaimer. - * 2. Redistributions in binary form must reproduce the above copyright - * notice, this list of conditions and the following disclaimer in the - * documentation and/or other materials provided with the distribution. - * 3. All advertising materials mentioning features or use of this software - * must display the following acknowledgement: - * "This product includes cryptographic software written by - * Eric Young (eay@cryptsoft.com)" - * The word 'cryptographic' can be left out if the rouines from the library - * being used are not cryptographic related :-). - * 4. If you include any Windows specific code (or a derivative thereof) from - * the apps directory (application code) you must include an acknowledgement: - * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" - * - * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND - * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE - * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE - * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE - * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL - * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS - * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) - * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT - * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY - * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF - * SUCH DAMAGE. - * - * The licence and distribution terms for any publically available version or - * derivative of this code cannot be changed. i.e. this code cannot simply be - * copied and put under another distribution licence - * [including the GNU Public Licence.] - */ - -#ifndef HEADER_PEM_H -#define HEADER_PEM_H - -#include -#ifndef OPENSSL_NO_BIO -#include -#endif -#ifndef OPENSSL_NO_STACK -#include -#endif -#include -#include -#include - -#ifdef __cplusplus -extern "C" { -#endif - -#define PEM_BUFSIZE 1024 - -#define PEM_OBJ_UNDEF 0 -#define PEM_OBJ_X509 1 -#define PEM_OBJ_X509_REQ 2 -#define PEM_OBJ_CRL 3 -#define PEM_OBJ_SSL_SESSION 4 -#define PEM_OBJ_PRIV_KEY 10 -#define PEM_OBJ_PRIV_RSA 11 -#define PEM_OBJ_PRIV_DSA 12 -#define PEM_OBJ_PRIV_DH 13 -#define PEM_OBJ_PUB_RSA 14 -#define PEM_OBJ_PUB_DSA 15 -#define PEM_OBJ_PUB_DH 16 -#define PEM_OBJ_DHPARAMS 17 -#define PEM_OBJ_DSAPARAMS 18 -#define PEM_OBJ_PRIV_RSA_PUBLIC 19 -#define PEM_OBJ_PRIV_ECDSA 20 -#define PEM_OBJ_PUB_ECDSA 21 -#define PEM_OBJ_ECPARAMETERS 22 - -#define PEM_ERROR 30 -#define PEM_DEK_DES_CBC 40 -#define PEM_DEK_IDEA_CBC 45 -#define PEM_DEK_DES_EDE 50 -#define PEM_DEK_DES_ECB 60 -#define PEM_DEK_RSA 70 -#define PEM_DEK_RSA_MD2 80 -#define PEM_DEK_RSA_MD5 90 - -#define PEM_MD_MD2 NID_md2 -#define PEM_MD_MD5 NID_md5 -#define PEM_MD_SHA NID_sha -#define PEM_MD_MD2_RSA NID_md2WithRSAEncryption -#define PEM_MD_MD5_RSA NID_md5WithRSAEncryption -#define PEM_MD_SHA_RSA NID_sha1WithRSAEncryption - -#define PEM_STRING_X509_OLD "X509 CERTIFICATE" -#define PEM_STRING_X509 "CERTIFICATE" -#define PEM_STRING_X509_PAIR "CERTIFICATE PAIR" -#define PEM_STRING_X509_TRUSTED "TRUSTED CERTIFICATE" -#define PEM_STRING_X509_REQ_OLD "NEW CERTIFICATE REQUEST" -#define PEM_STRING_X509_REQ "CERTIFICATE REQUEST" -#define PEM_STRING_X509_CRL "X509 CRL" -#define PEM_STRING_EVP_PKEY "ANY PRIVATE KEY" -#define PEM_STRING_PUBLIC "PUBLIC KEY" -#define PEM_STRING_RSA "RSA PRIVATE KEY" -#define PEM_STRING_RSA_PUBLIC "RSA PUBLIC KEY" -#define PEM_STRING_DSA "DSA PRIVATE KEY" -#define PEM_STRING_DSA_PUBLIC "DSA PUBLIC KEY" -#define PEM_STRING_PKCS7 "PKCS7" -#define PEM_STRING_PKCS7_SIGNED "PKCS #7 SIGNED DATA" -#define PEM_STRING_PKCS8 "ENCRYPTED PRIVATE KEY" -#define PEM_STRING_PKCS8INF "PRIVATE KEY" -#define PEM_STRING_DHPARAMS "DH PARAMETERS" -#define PEM_STRING_SSL_SESSION "SSL SESSION PARAMETERS" -#define PEM_STRING_DSAPARAMS "DSA PARAMETERS" -#define PEM_STRING_ECDSA_PUBLIC "ECDSA PUBLIC KEY" -#define PEM_STRING_ECPARAMETERS "EC PARAMETERS" -#define PEM_STRING_ECPRIVATEKEY "EC PRIVATE KEY" -#define PEM_STRING_PARAMETERS "PARAMETERS" -#define PEM_STRING_CMS "CMS" - - /* Note that this structure is initialised by PEM_SealInit and cleaned up - by PEM_SealFinal (at least for now) */ -typedef struct PEM_Encode_Seal_st - { - EVP_ENCODE_CTX encode; - EVP_MD_CTX md; - EVP_CIPHER_CTX cipher; - } PEM_ENCODE_SEAL_CTX; - -/* enc_type is one off */ -#define PEM_TYPE_ENCRYPTED 10 -#define PEM_TYPE_MIC_ONLY 20 -#define PEM_TYPE_MIC_CLEAR 30 -#define PEM_TYPE_CLEAR 40 - -typedef struct pem_recip_st - { - char *name; - X509_NAME *dn; - - int cipher; - int key_enc; - /* char iv[8]; unused and wrong size */ - } PEM_USER; - -typedef struct pem_ctx_st - { - int type; /* what type of object */ - - struct { - int version; - int mode; - } proc_type; - - char *domain; - - struct { - int cipher; - /* unused, and wrong size - unsigned char iv[8]; */ - } DEK_info; - - PEM_USER *originator; - - int num_recipient; - PEM_USER **recipient; - - /* XXX(ben): don#t think this is used! - STACK *x509_chain; / * certificate chain */ - EVP_MD *md; /* signature type */ - - int md_enc; /* is the md encrypted or not? */ - int md_len; /* length of md_data */ - char *md_data; /* message digest, could be pkey encrypted */ - - EVP_CIPHER *dec; /* date encryption cipher */ - int key_len; /* key length */ - unsigned char *key; /* key */ - /* unused, and wrong size - unsigned char iv[8]; */ - - - int data_enc; /* is the data encrypted */ - int data_len; - unsigned char *data; - } PEM_CTX; - -/* These macros make the PEM_read/PEM_write functions easier to maintain and - * write. Now they are all implemented with either: - * IMPLEMENT_PEM_rw(...) or IMPLEMENT_PEM_rw_cb(...) - */ - -#ifdef OPENSSL_NO_FP_API - -#define IMPLEMENT_PEM_read_fp(name, type, str, asn1) /**/ -#define IMPLEMENT_PEM_write_fp(name, type, str, asn1) /**/ -#define IMPLEMENT_PEM_write_fp_const(name, type, str, asn1) /**/ -#define IMPLEMENT_PEM_write_cb_fp(name, type, str, asn1) /**/ -#define IMPLEMENT_PEM_write_cb_fp_const(name, type, str, asn1) /**/ - -#else - -#define IMPLEMENT_PEM_read_fp(name, type, str, asn1) \ -type *PEM_read_##name(FILE *fp, type **x, pem_password_cb *cb, void *u)\ -{ \ -return PEM_ASN1_read((d2i_of_void *)d2i_##asn1, str,fp,(void **)x,cb,u); \ -} - -#define IMPLEMENT_PEM_write_fp(name, type, str, asn1) \ -int PEM_write_##name(FILE *fp, type *x) \ -{ \ -return PEM_ASN1_write((i2d_of_void *)i2d_##asn1,str,fp,x,NULL,NULL,0,NULL,NULL); \ -} - -#define IMPLEMENT_PEM_write_fp_const(name, type, str, asn1) \ -int PEM_write_##name(FILE *fp, const type *x) \ -{ \ -return PEM_ASN1_write((i2d_of_void *)i2d_##asn1,str,fp,(void *)x,NULL,NULL,0,NULL,NULL); \ -} - -#define IMPLEMENT_PEM_write_cb_fp(name, type, str, asn1) \ -int PEM_write_##name(FILE *fp, type *x, const EVP_CIPHER *enc, \ - unsigned char *kstr, int klen, pem_password_cb *cb, \ - void *u) \ - { \ - return PEM_ASN1_write((i2d_of_void *)i2d_##asn1,str,fp,x,enc,kstr,klen,cb,u); \ - } - -#define IMPLEMENT_PEM_write_cb_fp_const(name, type, str, asn1) \ -int PEM_write_##name(FILE *fp, type *x, const EVP_CIPHER *enc, \ - unsigned char *kstr, int klen, pem_password_cb *cb, \ - void *u) \ - { \ - return PEM_ASN1_write((i2d_of_void *)i2d_##asn1,str,fp,x,enc,kstr,klen,cb,u); \ - } - -#endif - -#define IMPLEMENT_PEM_read_bio(name, type, str, asn1) \ -type *PEM_read_bio_##name(BIO *bp, type **x, pem_password_cb *cb, void *u)\ -{ \ -return PEM_ASN1_read_bio((d2i_of_void *)d2i_##asn1, str,bp,(void **)x,cb,u); \ -} - -#define IMPLEMENT_PEM_write_bio(name, type, str, asn1) \ -int PEM_write_bio_##name(BIO *bp, type *x) \ -{ \ -return PEM_ASN1_write_bio((i2d_of_void *)i2d_##asn1,str,bp,x,NULL,NULL,0,NULL,NULL); \ -} - -#define IMPLEMENT_PEM_write_bio_const(name, type, str, asn1) \ -int PEM_write_bio_##name(BIO *bp, const type *x) \ -{ \ -return PEM_ASN1_write_bio((i2d_of_void *)i2d_##asn1,str,bp,(void *)x,NULL,NULL,0,NULL,NULL); \ -} - -#define IMPLEMENT_PEM_write_cb_bio(name, type, str, asn1) \ -int PEM_write_bio_##name(BIO *bp, type *x, const EVP_CIPHER *enc, \ - unsigned char *kstr, int klen, pem_password_cb *cb, void *u) \ - { \ - return PEM_ASN1_write_bio((i2d_of_void *)i2d_##asn1,str,bp,x,enc,kstr,klen,cb,u); \ - } - -#define IMPLEMENT_PEM_write_cb_bio_const(name, type, str, asn1) \ -int PEM_write_bio_##name(BIO *bp, type *x, const EVP_CIPHER *enc, \ - unsigned char *kstr, int klen, pem_password_cb *cb, void *u) \ - { \ - return PEM_ASN1_write_bio((i2d_of_void *)i2d_##asn1,str,bp,(void *)x,enc,kstr,klen,cb,u); \ - } - -#define IMPLEMENT_PEM_write(name, type, str, asn1) \ - IMPLEMENT_PEM_write_bio(name, type, str, asn1) \ - IMPLEMENT_PEM_write_fp(name, type, str, asn1) - -#define IMPLEMENT_PEM_write_const(name, type, str, asn1) \ - IMPLEMENT_PEM_write_bio_const(name, type, str, asn1) \ - IMPLEMENT_PEM_write_fp_const(name, type, str, asn1) - -#define IMPLEMENT_PEM_write_cb(name, type, str, asn1) \ - IMPLEMENT_PEM_write_cb_bio(name, type, str, asn1) \ - IMPLEMENT_PEM_write_cb_fp(name, type, str, asn1) - -#define IMPLEMENT_PEM_write_cb_const(name, type, str, asn1) \ - IMPLEMENT_PEM_write_cb_bio_const(name, type, str, asn1) \ - IMPLEMENT_PEM_write_cb_fp_const(name, type, str, asn1) - -#define IMPLEMENT_PEM_read(name, type, str, asn1) \ - IMPLEMENT_PEM_read_bio(name, type, str, asn1) \ - IMPLEMENT_PEM_read_fp(name, type, str, asn1) - -#define IMPLEMENT_PEM_rw(name, type, str, asn1) \ - IMPLEMENT_PEM_read(name, type, str, asn1) \ - IMPLEMENT_PEM_write(name, type, str, asn1) - -#define IMPLEMENT_PEM_rw_const(name, type, str, asn1) \ - IMPLEMENT_PEM_read(name, type, str, asn1) \ - IMPLEMENT_PEM_write_const(name, type, str, asn1) - -#define IMPLEMENT_PEM_rw_cb(name, type, str, asn1) \ - IMPLEMENT_PEM_read(name, type, str, asn1) \ - IMPLEMENT_PEM_write_cb(name, type, str, asn1) - -/* These are the same except they are for the declarations */ - -#if defined(OPENSSL_NO_FP_API) - -#define DECLARE_PEM_read_fp(name, type) /**/ -#define DECLARE_PEM_write_fp(name, type) /**/ -#define DECLARE_PEM_write_cb_fp(name, type) /**/ - -#else - -#define DECLARE_PEM_read_fp(name, type) \ - type *PEM_read_##name(FILE *fp, type **x, pem_password_cb *cb, void *u); - -#define DECLARE_PEM_write_fp(name, type) \ - int PEM_write_##name(FILE *fp, type *x); - -#define DECLARE_PEM_write_fp_const(name, type) \ - int PEM_write_##name(FILE *fp, const type *x); - -#define DECLARE_PEM_write_cb_fp(name, type) \ - int PEM_write_##name(FILE *fp, type *x, const EVP_CIPHER *enc, \ - unsigned char *kstr, int klen, pem_password_cb *cb, void *u); - -#endif - -#ifndef OPENSSL_NO_BIO -#define DECLARE_PEM_read_bio(name, type) \ - type *PEM_read_bio_##name(BIO *bp, type **x, pem_password_cb *cb, void *u); - -#define DECLARE_PEM_write_bio(name, type) \ - int PEM_write_bio_##name(BIO *bp, type *x); - -#define DECLARE_PEM_write_bio_const(name, type) \ - int PEM_write_bio_##name(BIO *bp, const type *x); - -#define DECLARE_PEM_write_cb_bio(name, type) \ - int PEM_write_bio_##name(BIO *bp, type *x, const EVP_CIPHER *enc, \ - unsigned char *kstr, int klen, pem_password_cb *cb, void *u); - -#else - -#define DECLARE_PEM_read_bio(name, type) /**/ -#define DECLARE_PEM_write_bio(name, type) /**/ -#define DECLARE_PEM_write_bio_const(name, type) /**/ -#define DECLARE_PEM_write_cb_bio(name, type) /**/ - -#endif - -#define DECLARE_PEM_write(name, type) \ - DECLARE_PEM_write_bio(name, type) \ - DECLARE_PEM_write_fp(name, type) - -#define DECLARE_PEM_write_const(name, type) \ - DECLARE_PEM_write_bio_const(name, type) \ - DECLARE_PEM_write_fp_const(name, type) - -#define DECLARE_PEM_write_cb(name, type) \ - DECLARE_PEM_write_cb_bio(name, type) \ - DECLARE_PEM_write_cb_fp(name, type) - -#define DECLARE_PEM_read(name, type) \ - DECLARE_PEM_read_bio(name, type) \ - DECLARE_PEM_read_fp(name, type) - -#define DECLARE_PEM_rw(name, type) \ - DECLARE_PEM_read(name, type) \ - DECLARE_PEM_write(name, type) - -#define DECLARE_PEM_rw_const(name, type) \ - DECLARE_PEM_read(name, type) \ - DECLARE_PEM_write_const(name, type) - -#define DECLARE_PEM_rw_cb(name, type) \ - DECLARE_PEM_read(name, type) \ - DECLARE_PEM_write_cb(name, type) - -#if 1 -/* "userdata": new with OpenSSL 0.9.4 */ -typedef int pem_password_cb(char *buf, int size, int rwflag, void *userdata); -#else -/* OpenSSL 0.9.3, 0.9.3a */ -typedef int pem_password_cb(char *buf, int size, int rwflag); -#endif - -int PEM_get_EVP_CIPHER_INFO(char *header, EVP_CIPHER_INFO *cipher); -int PEM_do_header (EVP_CIPHER_INFO *cipher, unsigned char *data,long *len, - pem_password_cb *callback,void *u); - -#ifndef OPENSSL_NO_BIO -int PEM_read_bio(BIO *bp, char **name, char **header, - unsigned char **data,long *len); -int PEM_write_bio(BIO *bp,const char *name,char *hdr,unsigned char *data, - long len); -int PEM_bytes_read_bio(unsigned char **pdata, long *plen, char **pnm, const char *name, BIO *bp, - pem_password_cb *cb, void *u); -void * PEM_ASN1_read_bio(d2i_of_void *d2i, const char *name, BIO *bp, - void **x, pem_password_cb *cb, void *u); -int PEM_ASN1_write_bio(i2d_of_void *i2d,const char *name,BIO *bp, void *x, - const EVP_CIPHER *enc,unsigned char *kstr,int klen, - pem_password_cb *cb, void *u); - -STACK_OF(X509_INFO) * PEM_X509_INFO_read_bio(BIO *bp, STACK_OF(X509_INFO) *sk, pem_password_cb *cb, void *u); -int PEM_X509_INFO_write_bio(BIO *bp,X509_INFO *xi, EVP_CIPHER *enc, - unsigned char *kstr, int klen, pem_password_cb *cd, void *u); -#endif - -int PEM_read(FILE *fp, char **name, char **header, - unsigned char **data,long *len); -int PEM_write(FILE *fp,char *name,char *hdr,unsigned char *data,long len); -void * PEM_ASN1_read(d2i_of_void *d2i, const char *name, FILE *fp, void **x, - pem_password_cb *cb, void *u); -int PEM_ASN1_write(i2d_of_void *i2d,const char *name,FILE *fp, - void *x,const EVP_CIPHER *enc,unsigned char *kstr, - int klen,pem_password_cb *callback, void *u); -STACK_OF(X509_INFO) * PEM_X509_INFO_read(FILE *fp, STACK_OF(X509_INFO) *sk, - pem_password_cb *cb, void *u); - -int PEM_SealInit(PEM_ENCODE_SEAL_CTX *ctx, EVP_CIPHER *type, - EVP_MD *md_type, unsigned char **ek, int *ekl, - unsigned char *iv, EVP_PKEY **pubk, int npubk); -void PEM_SealUpdate(PEM_ENCODE_SEAL_CTX *ctx, unsigned char *out, int *outl, - unsigned char *in, int inl); -int PEM_SealFinal(PEM_ENCODE_SEAL_CTX *ctx, unsigned char *sig,int *sigl, - unsigned char *out, int *outl, EVP_PKEY *priv); - -void PEM_SignInit(EVP_MD_CTX *ctx, EVP_MD *type); -void PEM_SignUpdate(EVP_MD_CTX *ctx,unsigned char *d,unsigned int cnt); -int PEM_SignFinal(EVP_MD_CTX *ctx, unsigned char *sigret, - unsigned int *siglen, EVP_PKEY *pkey); - -int PEM_def_callback(char *buf, int num, int w, void *key); -void PEM_proc_type(char *buf, int type); -void PEM_dek_info(char *buf, const char *type, int len, char *str); - - -#include - -DECLARE_PEM_rw(X509, X509) - -DECLARE_PEM_rw(X509_AUX, X509) - -DECLARE_PEM_rw(X509_CERT_PAIR, X509_CERT_PAIR) - -DECLARE_PEM_rw(X509_REQ, X509_REQ) -DECLARE_PEM_write(X509_REQ_NEW, X509_REQ) - -DECLARE_PEM_rw(X509_CRL, X509_CRL) - -DECLARE_PEM_rw(PKCS7, PKCS7) - -DECLARE_PEM_rw(NETSCAPE_CERT_SEQUENCE, NETSCAPE_CERT_SEQUENCE) - -DECLARE_PEM_rw(PKCS8, X509_SIG) - -DECLARE_PEM_rw(PKCS8_PRIV_KEY_INFO, PKCS8_PRIV_KEY_INFO) - -#ifndef OPENSSL_NO_RSA - -DECLARE_PEM_rw_cb(RSAPrivateKey, RSA) - -DECLARE_PEM_rw_const(RSAPublicKey, RSA) -DECLARE_PEM_rw(RSA_PUBKEY, RSA) - -#endif - -#ifndef OPENSSL_NO_DSA - -DECLARE_PEM_rw_cb(DSAPrivateKey, DSA) - -DECLARE_PEM_rw(DSA_PUBKEY, DSA) - -DECLARE_PEM_rw_const(DSAparams, DSA) - -#endif - -#ifndef OPENSSL_NO_EC -DECLARE_PEM_rw_const(ECPKParameters, EC_GROUP) -DECLARE_PEM_rw_cb(ECPrivateKey, EC_KEY) -DECLARE_PEM_rw(EC_PUBKEY, EC_KEY) -#endif - -#ifndef OPENSSL_NO_DH - -DECLARE_PEM_rw_const(DHparams, DH) - -#endif - -DECLARE_PEM_rw_cb(PrivateKey, EVP_PKEY) - -DECLARE_PEM_rw(PUBKEY, EVP_PKEY) - -int PEM_write_bio_PKCS8PrivateKey_nid(BIO *bp, EVP_PKEY *x, int nid, - char *kstr, int klen, - pem_password_cb *cb, void *u); -int PEM_write_bio_PKCS8PrivateKey(BIO *, EVP_PKEY *, const EVP_CIPHER *, - char *, int, pem_password_cb *, void *); -int i2d_PKCS8PrivateKey_bio(BIO *bp, EVP_PKEY *x, const EVP_CIPHER *enc, - char *kstr, int klen, - pem_password_cb *cb, void *u); -int i2d_PKCS8PrivateKey_nid_bio(BIO *bp, EVP_PKEY *x, int nid, - char *kstr, int klen, - pem_password_cb *cb, void *u); -EVP_PKEY *d2i_PKCS8PrivateKey_bio(BIO *bp, EVP_PKEY **x, pem_password_cb *cb, void *u); - -int i2d_PKCS8PrivateKey_fp(FILE *fp, EVP_PKEY *x, const EVP_CIPHER *enc, - char *kstr, int klen, - pem_password_cb *cb, void *u); -int i2d_PKCS8PrivateKey_nid_fp(FILE *fp, EVP_PKEY *x, int nid, - char *kstr, int klen, - pem_password_cb *cb, void *u); -int PEM_write_PKCS8PrivateKey_nid(FILE *fp, EVP_PKEY *x, int nid, - char *kstr, int klen, - pem_password_cb *cb, void *u); - -EVP_PKEY *d2i_PKCS8PrivateKey_fp(FILE *fp, EVP_PKEY **x, pem_password_cb *cb, void *u); - -int PEM_write_PKCS8PrivateKey(FILE *fp,EVP_PKEY *x,const EVP_CIPHER *enc, - char *kstr,int klen, pem_password_cb *cd, void *u); - -EVP_PKEY *PEM_read_bio_Parameters(BIO *bp, EVP_PKEY **x); -int PEM_write_bio_Parameters(BIO *bp, EVP_PKEY *x); - - -EVP_PKEY *b2i_PrivateKey(const unsigned char **in, long length); -EVP_PKEY *b2i_PublicKey(const unsigned char **in, long length); -EVP_PKEY *b2i_PrivateKey_bio(BIO *in); -EVP_PKEY *b2i_PublicKey_bio(BIO *in); -int i2b_PrivateKey_bio(BIO *out, EVP_PKEY *pk); -int i2b_PublicKey_bio(BIO *out, EVP_PKEY *pk); -#ifndef OPENSSL_NO_RC4 -EVP_PKEY *b2i_PVK_bio(BIO *in, pem_password_cb *cb, void *u); -int i2b_PVK_bio(BIO *out, EVP_PKEY *pk, int enclevel, - pem_password_cb *cb, void *u); -#endif - - -/* BEGIN ERROR CODES */ -/* The following lines are auto generated by the script mkerr.pl. Any changes - * made after this point may be overwritten when the script is next run. - */ -void ERR_load_PEM_strings(void); - -/* Error codes for the PEM functions. */ - -/* Function codes. */ -#define PEM_F_B2I_DSS 127 -#define PEM_F_B2I_PVK_BIO 128 -#define PEM_F_B2I_RSA 129 -#define PEM_F_CHECK_BITLEN_DSA 130 -#define PEM_F_CHECK_BITLEN_RSA 131 -#define PEM_F_D2I_PKCS8PRIVATEKEY_BIO 120 -#define PEM_F_D2I_PKCS8PRIVATEKEY_FP 121 -#define PEM_F_DO_B2I 132 -#define PEM_F_DO_B2I_BIO 133 -#define PEM_F_DO_BLOB_HEADER 134 -#define PEM_F_DO_PK8PKEY 126 -#define PEM_F_DO_PK8PKEY_FP 125 -#define PEM_F_DO_PVK_BODY 135 -#define PEM_F_DO_PVK_HEADER 136 -#define PEM_F_I2B_PVK 137 -#define PEM_F_I2B_PVK_BIO 138 -#define PEM_F_LOAD_IV 101 -#define PEM_F_PEM_ASN1_READ 102 -#define PEM_F_PEM_ASN1_READ_BIO 103 -#define PEM_F_PEM_ASN1_WRITE 104 -#define PEM_F_PEM_ASN1_WRITE_BIO 105 -#define PEM_F_PEM_DEF_CALLBACK 100 -#define PEM_F_PEM_DO_HEADER 106 -#define PEM_F_PEM_F_PEM_WRITE_PKCS8PRIVATEKEY 118 -#define PEM_F_PEM_GET_EVP_CIPHER_INFO 107 -#define PEM_F_PEM_PK8PKEY 119 -#define PEM_F_PEM_READ 108 -#define PEM_F_PEM_READ_BIO 109 -#define PEM_F_PEM_READ_BIO_PARAMETERS 140 -#define PEM_F_PEM_READ_BIO_PRIVATEKEY 123 -#define PEM_F_PEM_READ_PRIVATEKEY 124 -#define PEM_F_PEM_SEALFINAL 110 -#define PEM_F_PEM_SEALINIT 111 -#define PEM_F_PEM_SIGNFINAL 112 -#define PEM_F_PEM_WRITE 113 -#define PEM_F_PEM_WRITE_BIO 114 -#define PEM_F_PEM_WRITE_PRIVATEKEY 139 -#define PEM_F_PEM_X509_INFO_READ 115 -#define PEM_F_PEM_X509_INFO_READ_BIO 116 -#define PEM_F_PEM_X509_INFO_WRITE_BIO 117 - -/* Reason codes. */ -#define PEM_R_BAD_BASE64_DECODE 100 -#define PEM_R_BAD_DECRYPT 101 -#define PEM_R_BAD_END_LINE 102 -#define PEM_R_BAD_IV_CHARS 103 -#define PEM_R_BAD_MAGIC_NUMBER 116 -#define PEM_R_BAD_PASSWORD_READ 104 -#define PEM_R_BAD_VERSION_NUMBER 117 -#define PEM_R_BIO_WRITE_FAILURE 118 -#define PEM_R_CIPHER_IS_NULL 127 -#define PEM_R_ERROR_CONVERTING_PRIVATE_KEY 115 -#define PEM_R_EXPECTING_PRIVATE_KEY_BLOB 119 -#define PEM_R_EXPECTING_PUBLIC_KEY_BLOB 120 -#define PEM_R_INCONSISTENT_HEADER 121 -#define PEM_R_KEYBLOB_HEADER_PARSE_ERROR 122 -#define PEM_R_KEYBLOB_TOO_SHORT 123 -#define PEM_R_NOT_DEK_INFO 105 -#define PEM_R_NOT_ENCRYPTED 106 -#define PEM_R_NOT_PROC_TYPE 107 -#define PEM_R_NO_START_LINE 108 -#define PEM_R_PROBLEMS_GETTING_PASSWORD 109 -#define PEM_R_PUBLIC_KEY_NO_RSA 110 -#define PEM_R_PVK_DATA_TOO_SHORT 124 -#define PEM_R_PVK_TOO_SHORT 125 -#define PEM_R_READ_KEY 111 -#define PEM_R_SHORT_HEADER 112 -#define PEM_R_UNSUPPORTED_CIPHER 113 -#define PEM_R_UNSUPPORTED_ENCRYPTION 114 -#define PEM_R_UNSUPPORTED_KEY_COMPONENTS 126 - -#ifdef __cplusplus -} -#endif -#endif diff --git a/Pods/OpenSSL-Universal/include-osx/openssl/pem2.h b/Pods/OpenSSL-Universal/include-osx/openssl/pem2.h deleted file mode 100644 index f31790d6..00000000 --- a/Pods/OpenSSL-Universal/include-osx/openssl/pem2.h +++ /dev/null @@ -1,70 +0,0 @@ -/* ==================================================================== - * Copyright (c) 1999 The OpenSSL Project. All rights reserved. - * - * Redistribution and use in source and binary forms, with or without - * modification, are permitted provided that the following conditions - * are met: - * - * 1. Redistributions of source code must retain the above copyright - * notice, this list of conditions and the following disclaimer. - * - * 2. Redistributions in binary form must reproduce the above copyright - * notice, this list of conditions and the following disclaimer in - * the documentation and/or other materials provided with the - * distribution. - * - * 3. All advertising materials mentioning features or use of this - * software must display the following acknowledgment: - * "This product includes software developed by the OpenSSL Project - * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)" - * - * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to - * endorse or promote products derived from this software without - * prior written permission. For written permission, please contact - * licensing@OpenSSL.org. - * - * 5. Products derived from this software may not be called "OpenSSL" - * nor may "OpenSSL" appear in their names without prior written - * permission of the OpenSSL Project. - * - * 6. Redistributions of any form whatsoever must retain the following - * acknowledgment: - * "This product includes software developed by the OpenSSL Project - * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)" - * - * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY - * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE - * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR - * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR - * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, - * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT - * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; - * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) - * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, - * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) - * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED - * OF THE POSSIBILITY OF SUCH DAMAGE. - * ==================================================================== - * - * This product includes cryptographic software written by Eric Young - * (eay@cryptsoft.com). This product includes software written by Tim - * Hudson (tjh@cryptsoft.com). - * - */ - -/* - * This header only exists to break a circular dependency between pem and err - * Ben 30 Jan 1999. - */ - -#ifdef __cplusplus -extern "C" { -#endif - -#ifndef HEADER_PEM_H -void ERR_load_PEM_strings(void); -#endif - -#ifdef __cplusplus -} -#endif diff --git a/Pods/OpenSSL-Universal/include-osx/openssl/pkcs12.h b/Pods/OpenSSL-Universal/include-osx/openssl/pkcs12.h deleted file mode 100644 index b17eb9f4..00000000 --- a/Pods/OpenSSL-Universal/include-osx/openssl/pkcs12.h +++ /dev/null @@ -1,331 +0,0 @@ -/* pkcs12.h */ -/* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL - * project 1999. - */ -/* ==================================================================== - * Copyright (c) 1999 The OpenSSL Project. All rights reserved. - * - * Redistribution and use in source and binary forms, with or without - * modification, are permitted provided that the following conditions - * are met: - * - * 1. Redistributions of source code must retain the above copyright - * notice, this list of conditions and the following disclaimer. - * - * 2. Redistributions in binary form must reproduce the above copyright - * notice, this list of conditions and the following disclaimer in - * the documentation and/or other materials provided with the - * distribution. - * - * 3. All advertising materials mentioning features or use of this - * software must display the following acknowledgment: - * "This product includes software developed by the OpenSSL Project - * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)" - * - * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to - * endorse or promote products derived from this software without - * prior written permission. For written permission, please contact - * licensing@OpenSSL.org. - * - * 5. Products derived from this software may not be called "OpenSSL" - * nor may "OpenSSL" appear in their names without prior written - * permission of the OpenSSL Project. - * - * 6. Redistributions of any form whatsoever must retain the following - * acknowledgment: - * "This product includes software developed by the OpenSSL Project - * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)" - * - * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY - * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE - * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR - * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR - * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, - * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT - * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; - * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) - * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, - * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) - * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED - * OF THE POSSIBILITY OF SUCH DAMAGE. - * ==================================================================== - * - * This product includes cryptographic software written by Eric Young - * (eay@cryptsoft.com). This product includes software written by Tim - * Hudson (tjh@cryptsoft.com). - * - */ - -#ifndef HEADER_PKCS12_H -#define HEADER_PKCS12_H - -#include -#include - -#ifdef __cplusplus -extern "C" { -#endif - -#define PKCS12_KEY_ID 1 -#define PKCS12_IV_ID 2 -#define PKCS12_MAC_ID 3 - -/* Default iteration count */ -#ifndef PKCS12_DEFAULT_ITER -#define PKCS12_DEFAULT_ITER PKCS5_DEFAULT_ITER -#endif - -#define PKCS12_MAC_KEY_LENGTH 20 - -#define PKCS12_SALT_LEN 8 - -/* Uncomment out next line for unicode password and names, otherwise ASCII */ - -/*#define PBE_UNICODE*/ - -#ifdef PBE_UNICODE -#define PKCS12_key_gen PKCS12_key_gen_uni -#define PKCS12_add_friendlyname PKCS12_add_friendlyname_uni -#else -#define PKCS12_key_gen PKCS12_key_gen_asc -#define PKCS12_add_friendlyname PKCS12_add_friendlyname_asc -#endif - -/* MS key usage constants */ - -#define KEY_EX 0x10 -#define KEY_SIG 0x80 - -typedef struct { -X509_SIG *dinfo; -ASN1_OCTET_STRING *salt; -ASN1_INTEGER *iter; /* defaults to 1 */ -} PKCS12_MAC_DATA; - -typedef struct { -ASN1_INTEGER *version; -PKCS12_MAC_DATA *mac; -PKCS7 *authsafes; -} PKCS12; - -typedef struct { -ASN1_OBJECT *type; -union { - struct pkcs12_bag_st *bag; /* secret, crl and certbag */ - struct pkcs8_priv_key_info_st *keybag; /* keybag */ - X509_SIG *shkeybag; /* shrouded key bag */ - STACK_OF(PKCS12_SAFEBAG) *safes; - ASN1_TYPE *other; -}value; -STACK_OF(X509_ATTRIBUTE) *attrib; -} PKCS12_SAFEBAG; - -DECLARE_STACK_OF(PKCS12_SAFEBAG) -DECLARE_ASN1_SET_OF(PKCS12_SAFEBAG) -DECLARE_PKCS12_STACK_OF(PKCS12_SAFEBAG) - -typedef struct pkcs12_bag_st { -ASN1_OBJECT *type; -union { - ASN1_OCTET_STRING *x509cert; - ASN1_OCTET_STRING *x509crl; - ASN1_OCTET_STRING *octet; - ASN1_IA5STRING *sdsicert; - ASN1_TYPE *other; /* Secret or other bag */ -}value; -} PKCS12_BAGS; - -#define PKCS12_ERROR 0 -#define PKCS12_OK 1 - -/* Compatibility macros */ - -#define M_PKCS12_x5092certbag PKCS12_x5092certbag -#define M_PKCS12_x509crl2certbag PKCS12_x509crl2certbag - -#define M_PKCS12_certbag2x509 PKCS12_certbag2x509 -#define M_PKCS12_certbag2x509crl PKCS12_certbag2x509crl - -#define M_PKCS12_unpack_p7data PKCS12_unpack_p7data -#define M_PKCS12_pack_authsafes PKCS12_pack_authsafes -#define M_PKCS12_unpack_authsafes PKCS12_unpack_authsafes -#define M_PKCS12_unpack_p7encdata PKCS12_unpack_p7encdata - -#define M_PKCS12_decrypt_skey PKCS12_decrypt_skey -#define M_PKCS8_decrypt PKCS8_decrypt - -#define M_PKCS12_bag_type(bg) OBJ_obj2nid((bg)->type) -#define M_PKCS12_cert_bag_type(bg) OBJ_obj2nid((bg)->value.bag->type) -#define M_PKCS12_crl_bag_type M_PKCS12_cert_bag_type - -#define PKCS12_get_attr(bag, attr_nid) \ - PKCS12_get_attr_gen(bag->attrib, attr_nid) - -#define PKCS8_get_attr(p8, attr_nid) \ - PKCS12_get_attr_gen(p8->attributes, attr_nid) - -#define PKCS12_mac_present(p12) ((p12)->mac ? 1 : 0) - - -PKCS12_SAFEBAG *PKCS12_x5092certbag(X509 *x509); -PKCS12_SAFEBAG *PKCS12_x509crl2certbag(X509_CRL *crl); -X509 *PKCS12_certbag2x509(PKCS12_SAFEBAG *bag); -X509_CRL *PKCS12_certbag2x509crl(PKCS12_SAFEBAG *bag); - -PKCS12_SAFEBAG *PKCS12_item_pack_safebag(void *obj, const ASN1_ITEM *it, int nid1, - int nid2); -PKCS12_SAFEBAG *PKCS12_MAKE_KEYBAG(PKCS8_PRIV_KEY_INFO *p8); -PKCS8_PRIV_KEY_INFO *PKCS8_decrypt(X509_SIG *p8, const char *pass, int passlen); -PKCS8_PRIV_KEY_INFO *PKCS12_decrypt_skey(PKCS12_SAFEBAG *bag, const char *pass, - int passlen); -X509_SIG *PKCS8_encrypt(int pbe_nid, const EVP_CIPHER *cipher, - const char *pass, int passlen, - unsigned char *salt, int saltlen, int iter, - PKCS8_PRIV_KEY_INFO *p8); -PKCS12_SAFEBAG *PKCS12_MAKE_SHKEYBAG(int pbe_nid, const char *pass, - int passlen, unsigned char *salt, - int saltlen, int iter, - PKCS8_PRIV_KEY_INFO *p8); -PKCS7 *PKCS12_pack_p7data(STACK_OF(PKCS12_SAFEBAG) *sk); -STACK_OF(PKCS12_SAFEBAG) *PKCS12_unpack_p7data(PKCS7 *p7); -PKCS7 *PKCS12_pack_p7encdata(int pbe_nid, const char *pass, int passlen, - unsigned char *salt, int saltlen, int iter, - STACK_OF(PKCS12_SAFEBAG) *bags); -STACK_OF(PKCS12_SAFEBAG) *PKCS12_unpack_p7encdata(PKCS7 *p7, const char *pass, int passlen); - -int PKCS12_pack_authsafes(PKCS12 *p12, STACK_OF(PKCS7) *safes); -STACK_OF(PKCS7) *PKCS12_unpack_authsafes(PKCS12 *p12); - -int PKCS12_add_localkeyid(PKCS12_SAFEBAG *bag, unsigned char *name, int namelen); -int PKCS12_add_friendlyname_asc(PKCS12_SAFEBAG *bag, const char *name, - int namelen); -int PKCS12_add_CSPName_asc(PKCS12_SAFEBAG *bag, const char *name, - int namelen); -int PKCS12_add_friendlyname_uni(PKCS12_SAFEBAG *bag, const unsigned char *name, - int namelen); -int PKCS8_add_keyusage(PKCS8_PRIV_KEY_INFO *p8, int usage); -ASN1_TYPE *PKCS12_get_attr_gen(STACK_OF(X509_ATTRIBUTE) *attrs, int attr_nid); -char *PKCS12_get_friendlyname(PKCS12_SAFEBAG *bag); -unsigned char *PKCS12_pbe_crypt(X509_ALGOR *algor, const char *pass, - int passlen, unsigned char *in, int inlen, - unsigned char **data, int *datalen, int en_de); -void * PKCS12_item_decrypt_d2i(X509_ALGOR *algor, const ASN1_ITEM *it, - const char *pass, int passlen, ASN1_OCTET_STRING *oct, int zbuf); -ASN1_OCTET_STRING *PKCS12_item_i2d_encrypt(X509_ALGOR *algor, const ASN1_ITEM *it, - const char *pass, int passlen, - void *obj, int zbuf); -PKCS12 *PKCS12_init(int mode); -int PKCS12_key_gen_asc(const char *pass, int passlen, unsigned char *salt, - int saltlen, int id, int iter, int n, - unsigned char *out, const EVP_MD *md_type); -int PKCS12_key_gen_uni(unsigned char *pass, int passlen, unsigned char *salt, int saltlen, int id, int iter, int n, unsigned char *out, const EVP_MD *md_type); -int PKCS12_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, - ASN1_TYPE *param, const EVP_CIPHER *cipher, const EVP_MD *md_type, - int en_de); -int PKCS12_gen_mac(PKCS12 *p12, const char *pass, int passlen, - unsigned char *mac, unsigned int *maclen); -int PKCS12_verify_mac(PKCS12 *p12, const char *pass, int passlen); -int PKCS12_set_mac(PKCS12 *p12, const char *pass, int passlen, - unsigned char *salt, int saltlen, int iter, - const EVP_MD *md_type); -int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt, - int saltlen, const EVP_MD *md_type); -unsigned char *OPENSSL_asc2uni(const char *asc, int asclen, unsigned char **uni, int *unilen); -char *OPENSSL_uni2asc(unsigned char *uni, int unilen); - -DECLARE_ASN1_FUNCTIONS(PKCS12) -DECLARE_ASN1_FUNCTIONS(PKCS12_MAC_DATA) -DECLARE_ASN1_FUNCTIONS(PKCS12_SAFEBAG) -DECLARE_ASN1_FUNCTIONS(PKCS12_BAGS) - -DECLARE_ASN1_ITEM(PKCS12_SAFEBAGS) -DECLARE_ASN1_ITEM(PKCS12_AUTHSAFES) - -void PKCS12_PBE_add(void); -int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert, - STACK_OF(X509) **ca); -PKCS12 *PKCS12_create(char *pass, char *name, EVP_PKEY *pkey, X509 *cert, - STACK_OF(X509) *ca, int nid_key, int nid_cert, int iter, - int mac_iter, int keytype); - -PKCS12_SAFEBAG *PKCS12_add_cert(STACK_OF(PKCS12_SAFEBAG) **pbags, X509 *cert); -PKCS12_SAFEBAG *PKCS12_add_key(STACK_OF(PKCS12_SAFEBAG) **pbags, EVP_PKEY *key, - int key_usage, int iter, - int key_nid, char *pass); -int PKCS12_add_safe(STACK_OF(PKCS7) **psafes, STACK_OF(PKCS12_SAFEBAG) *bags, - int safe_nid, int iter, char *pass); -PKCS12 *PKCS12_add_safes(STACK_OF(PKCS7) *safes, int p7_nid); - -int i2d_PKCS12_bio(BIO *bp, PKCS12 *p12); -int i2d_PKCS12_fp(FILE *fp, PKCS12 *p12); -PKCS12 *d2i_PKCS12_bio(BIO *bp, PKCS12 **p12); -PKCS12 *d2i_PKCS12_fp(FILE *fp, PKCS12 **p12); -int PKCS12_newpass(PKCS12 *p12, char *oldpass, char *newpass); - -/* BEGIN ERROR CODES */ -/* The following lines are auto generated by the script mkerr.pl. Any changes - * made after this point may be overwritten when the script is next run. - */ -void ERR_load_PKCS12_strings(void); - -/* Error codes for the PKCS12 functions. */ - -/* Function codes. */ -#define PKCS12_F_PARSE_BAG 129 -#define PKCS12_F_PARSE_BAGS 103 -#define PKCS12_F_PKCS12_ADD_FRIENDLYNAME 100 -#define PKCS12_F_PKCS12_ADD_FRIENDLYNAME_ASC 127 -#define PKCS12_F_PKCS12_ADD_FRIENDLYNAME_UNI 102 -#define PKCS12_F_PKCS12_ADD_LOCALKEYID 104 -#define PKCS12_F_PKCS12_CREATE 105 -#define PKCS12_F_PKCS12_GEN_MAC 107 -#define PKCS12_F_PKCS12_INIT 109 -#define PKCS12_F_PKCS12_ITEM_DECRYPT_D2I 106 -#define PKCS12_F_PKCS12_ITEM_I2D_ENCRYPT 108 -#define PKCS12_F_PKCS12_ITEM_PACK_SAFEBAG 117 -#define PKCS12_F_PKCS12_KEY_GEN_ASC 110 -#define PKCS12_F_PKCS12_KEY_GEN_UNI 111 -#define PKCS12_F_PKCS12_MAKE_KEYBAG 112 -#define PKCS12_F_PKCS12_MAKE_SHKEYBAG 113 -#define PKCS12_F_PKCS12_NEWPASS 128 -#define PKCS12_F_PKCS12_PACK_P7DATA 114 -#define PKCS12_F_PKCS12_PACK_P7ENCDATA 115 -#define PKCS12_F_PKCS12_PARSE 118 -#define PKCS12_F_PKCS12_PBE_CRYPT 119 -#define PKCS12_F_PKCS12_PBE_KEYIVGEN 120 -#define PKCS12_F_PKCS12_SETUP_MAC 122 -#define PKCS12_F_PKCS12_SET_MAC 123 -#define PKCS12_F_PKCS12_UNPACK_AUTHSAFES 130 -#define PKCS12_F_PKCS12_UNPACK_P7DATA 131 -#define PKCS12_F_PKCS12_VERIFY_MAC 126 -#define PKCS12_F_PKCS8_ADD_KEYUSAGE 124 -#define PKCS12_F_PKCS8_ENCRYPT 125 - -/* Reason codes. */ -#define PKCS12_R_CANT_PACK_STRUCTURE 100 -#define PKCS12_R_CONTENT_TYPE_NOT_DATA 121 -#define PKCS12_R_DECODE_ERROR 101 -#define PKCS12_R_ENCODE_ERROR 102 -#define PKCS12_R_ENCRYPT_ERROR 103 -#define PKCS12_R_ERROR_SETTING_ENCRYPTED_DATA_TYPE 120 -#define PKCS12_R_INVALID_NULL_ARGUMENT 104 -#define PKCS12_R_INVALID_NULL_PKCS12_POINTER 105 -#define PKCS12_R_IV_GEN_ERROR 106 -#define PKCS12_R_KEY_GEN_ERROR 107 -#define PKCS12_R_MAC_ABSENT 108 -#define PKCS12_R_MAC_GENERATION_ERROR 109 -#define PKCS12_R_MAC_SETUP_ERROR 110 -#define PKCS12_R_MAC_STRING_SET_ERROR 111 -#define PKCS12_R_MAC_VERIFY_ERROR 112 -#define PKCS12_R_MAC_VERIFY_FAILURE 113 -#define PKCS12_R_PARSE_ERROR 114 -#define PKCS12_R_PKCS12_ALGOR_CIPHERINIT_ERROR 115 -#define PKCS12_R_PKCS12_CIPHERFINAL_ERROR 116 -#define PKCS12_R_PKCS12_PBE_CRYPT_ERROR 117 -#define PKCS12_R_UNKNOWN_DIGEST_ALGORITHM 118 -#define PKCS12_R_UNSUPPORTED_PKCS12_MODE 119 - -#ifdef __cplusplus -} -#endif -#endif diff --git a/Pods/OpenSSL-Universal/include-osx/openssl/pkcs7.h b/Pods/OpenSSL-Universal/include-osx/openssl/pkcs7.h deleted file mode 100644 index 04f60379..00000000 --- a/Pods/OpenSSL-Universal/include-osx/openssl/pkcs7.h +++ /dev/null @@ -1,500 +0,0 @@ -/* crypto/pkcs7/pkcs7.h */ -/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) - * All rights reserved. - * - * This package is an SSL implementation written - * by Eric Young (eay@cryptsoft.com). - * The implementation was written so as to conform with Netscapes SSL. - * - * This library is free for commercial and non-commercial use as long as - * the following conditions are aheared to. The following conditions - * apply to all code found in this distribution, be it the RC4, RSA, - * lhash, DES, etc., code; not just the SSL code. The SSL documentation - * included with this distribution is covered by the same copyright terms - * except that the holder is Tim Hudson (tjh@cryptsoft.com). - * - * Copyright remains Eric Young's, and as such any Copyright notices in - * the code are not to be removed. - * If this package is used in a product, Eric Young should be given attribution - * as the author of the parts of the library used. - * This can be in the form of a textual message at program startup or - * in documentation (online or textual) provided with the package. - * - * Redistribution and use in source and binary forms, with or without - * modification, are permitted provided that the following conditions - * are met: - * 1. Redistributions of source code must retain the copyright - * notice, this list of conditions and the following disclaimer. - * 2. Redistributions in binary form must reproduce the above copyright - * notice, this list of conditions and the following disclaimer in the - * documentation and/or other materials provided with the distribution. - * 3. All advertising materials mentioning features or use of this software - * must display the following acknowledgement: - * "This product includes cryptographic software written by - * Eric Young (eay@cryptsoft.com)" - * The word 'cryptographic' can be left out if the rouines from the library - * being used are not cryptographic related :-). - * 4. If you include any Windows specific code (or a derivative thereof) from - * the apps directory (application code) you must include an acknowledgement: - * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" - * - * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND - * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE - * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE - * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE - * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL - * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS - * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) - * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT - * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY - * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF - * SUCH DAMAGE. - * - * The licence and distribution terms for any publically available version or - * derivative of this code cannot be changed. i.e. this code cannot simply be - * copied and put under another distribution licence - * [including the GNU Public Licence.] - */ - -#ifndef HEADER_PKCS7_H -#define HEADER_PKCS7_H - -#include -#include -#include - -#include -#include - -#ifdef __cplusplus -extern "C" { -#endif - -#ifdef OPENSSL_SYS_WIN32 -/* Under Win32 thes are defined in wincrypt.h */ -#undef PKCS7_ISSUER_AND_SERIAL -#undef PKCS7_SIGNER_INFO -#endif - -/* -Encryption_ID DES-CBC -Digest_ID MD5 -Digest_Encryption_ID rsaEncryption -Key_Encryption_ID rsaEncryption -*/ - -typedef struct pkcs7_issuer_and_serial_st - { - X509_NAME *issuer; - ASN1_INTEGER *serial; - } PKCS7_ISSUER_AND_SERIAL; - -typedef struct pkcs7_signer_info_st - { - ASN1_INTEGER *version; /* version 1 */ - PKCS7_ISSUER_AND_SERIAL *issuer_and_serial; - X509_ALGOR *digest_alg; - STACK_OF(X509_ATTRIBUTE) *auth_attr; /* [ 0 ] */ - X509_ALGOR *digest_enc_alg; - ASN1_OCTET_STRING *enc_digest; - STACK_OF(X509_ATTRIBUTE) *unauth_attr; /* [ 1 ] */ - - /* The private key to sign with */ - EVP_PKEY *pkey; - } PKCS7_SIGNER_INFO; - -DECLARE_STACK_OF(PKCS7_SIGNER_INFO) -DECLARE_ASN1_SET_OF(PKCS7_SIGNER_INFO) - -typedef struct pkcs7_recip_info_st - { - ASN1_INTEGER *version; /* version 0 */ - PKCS7_ISSUER_AND_SERIAL *issuer_and_serial; - X509_ALGOR *key_enc_algor; - ASN1_OCTET_STRING *enc_key; - X509 *cert; /* get the pub-key from this */ - } PKCS7_RECIP_INFO; - -DECLARE_STACK_OF(PKCS7_RECIP_INFO) -DECLARE_ASN1_SET_OF(PKCS7_RECIP_INFO) - -typedef struct pkcs7_signed_st - { - ASN1_INTEGER *version; /* version 1 */ - STACK_OF(X509_ALGOR) *md_algs; /* md used */ - STACK_OF(X509) *cert; /* [ 0 ] */ - STACK_OF(X509_CRL) *crl; /* [ 1 ] */ - STACK_OF(PKCS7_SIGNER_INFO) *signer_info; - - struct pkcs7_st *contents; - } PKCS7_SIGNED; -/* The above structure is very very similar to PKCS7_SIGN_ENVELOPE. - * How about merging the two */ - -typedef struct pkcs7_enc_content_st - { - ASN1_OBJECT *content_type; - X509_ALGOR *algorithm; - ASN1_OCTET_STRING *enc_data; /* [ 0 ] */ - const EVP_CIPHER *cipher; - } PKCS7_ENC_CONTENT; - -typedef struct pkcs7_enveloped_st - { - ASN1_INTEGER *version; /* version 0 */ - STACK_OF(PKCS7_RECIP_INFO) *recipientinfo; - PKCS7_ENC_CONTENT *enc_data; - } PKCS7_ENVELOPE; - -typedef struct pkcs7_signedandenveloped_st - { - ASN1_INTEGER *version; /* version 1 */ - STACK_OF(X509_ALGOR) *md_algs; /* md used */ - STACK_OF(X509) *cert; /* [ 0 ] */ - STACK_OF(X509_CRL) *crl; /* [ 1 ] */ - STACK_OF(PKCS7_SIGNER_INFO) *signer_info; - - PKCS7_ENC_CONTENT *enc_data; - STACK_OF(PKCS7_RECIP_INFO) *recipientinfo; - } PKCS7_SIGN_ENVELOPE; - -typedef struct pkcs7_digest_st - { - ASN1_INTEGER *version; /* version 0 */ - X509_ALGOR *md; /* md used */ - struct pkcs7_st *contents; - ASN1_OCTET_STRING *digest; - } PKCS7_DIGEST; - -typedef struct pkcs7_encrypted_st - { - ASN1_INTEGER *version; /* version 0 */ - PKCS7_ENC_CONTENT *enc_data; - } PKCS7_ENCRYPT; - -typedef struct pkcs7_st - { - /* The following is non NULL if it contains ASN1 encoding of - * this structure */ - unsigned char *asn1; - long length; - -#define PKCS7_S_HEADER 0 -#define PKCS7_S_BODY 1 -#define PKCS7_S_TAIL 2 - int state; /* used during processing */ - - int detached; - - ASN1_OBJECT *type; - /* content as defined by the type */ - /* all encryption/message digests are applied to the 'contents', - * leaving out the 'type' field. */ - union { - char *ptr; - - /* NID_pkcs7_data */ - ASN1_OCTET_STRING *data; - - /* NID_pkcs7_signed */ - PKCS7_SIGNED *sign; - - /* NID_pkcs7_enveloped */ - PKCS7_ENVELOPE *enveloped; - - /* NID_pkcs7_signedAndEnveloped */ - PKCS7_SIGN_ENVELOPE *signed_and_enveloped; - - /* NID_pkcs7_digest */ - PKCS7_DIGEST *digest; - - /* NID_pkcs7_encrypted */ - PKCS7_ENCRYPT *encrypted; - - /* Anything else */ - ASN1_TYPE *other; - } d; - } PKCS7; - -DECLARE_STACK_OF(PKCS7) -DECLARE_ASN1_SET_OF(PKCS7) -DECLARE_PKCS12_STACK_OF(PKCS7) - -#define PKCS7_OP_SET_DETACHED_SIGNATURE 1 -#define PKCS7_OP_GET_DETACHED_SIGNATURE 2 - -#define PKCS7_get_signed_attributes(si) ((si)->auth_attr) -#define PKCS7_get_attributes(si) ((si)->unauth_attr) - -#define PKCS7_type_is_signed(a) (OBJ_obj2nid((a)->type) == NID_pkcs7_signed) -#define PKCS7_type_is_encrypted(a) (OBJ_obj2nid((a)->type) == NID_pkcs7_encrypted) -#define PKCS7_type_is_enveloped(a) (OBJ_obj2nid((a)->type) == NID_pkcs7_enveloped) -#define PKCS7_type_is_signedAndEnveloped(a) \ - (OBJ_obj2nid((a)->type) == NID_pkcs7_signedAndEnveloped) -#define PKCS7_type_is_data(a) (OBJ_obj2nid((a)->type) == NID_pkcs7_data) -#define PKCS7_type_is_digest(a) (OBJ_obj2nid((a)->type) == NID_pkcs7_digest) -#define PKCS7_type_is_encrypted(a) \ - (OBJ_obj2nid((a)->type) == NID_pkcs7_encrypted) - -#define PKCS7_type_is_digest(a) (OBJ_obj2nid((a)->type) == NID_pkcs7_digest) - -#define PKCS7_set_detached(p,v) \ - PKCS7_ctrl(p,PKCS7_OP_SET_DETACHED_SIGNATURE,v,NULL) -#define PKCS7_get_detached(p) \ - PKCS7_ctrl(p,PKCS7_OP_GET_DETACHED_SIGNATURE,0,NULL) - -#define PKCS7_is_detached(p7) (PKCS7_type_is_signed(p7) && PKCS7_get_detached(p7)) - -/* S/MIME related flags */ - -#define PKCS7_TEXT 0x1 -#define PKCS7_NOCERTS 0x2 -#define PKCS7_NOSIGS 0x4 -#define PKCS7_NOCHAIN 0x8 -#define PKCS7_NOINTERN 0x10 -#define PKCS7_NOVERIFY 0x20 -#define PKCS7_DETACHED 0x40 -#define PKCS7_BINARY 0x80 -#define PKCS7_NOATTR 0x100 -#define PKCS7_NOSMIMECAP 0x200 -#define PKCS7_NOOLDMIMETYPE 0x400 -#define PKCS7_CRLFEOL 0x800 -#define PKCS7_STREAM 0x1000 -#define PKCS7_NOCRL 0x2000 -#define PKCS7_PARTIAL 0x4000 -#define PKCS7_REUSE_DIGEST 0x8000 - -/* Flags: for compatibility with older code */ - -#define SMIME_TEXT PKCS7_TEXT -#define SMIME_NOCERTS PKCS7_NOCERTS -#define SMIME_NOSIGS PKCS7_NOSIGS -#define SMIME_NOCHAIN PKCS7_NOCHAIN -#define SMIME_NOINTERN PKCS7_NOINTERN -#define SMIME_NOVERIFY PKCS7_NOVERIFY -#define SMIME_DETACHED PKCS7_DETACHED -#define SMIME_BINARY PKCS7_BINARY -#define SMIME_NOATTR PKCS7_NOATTR - -DECLARE_ASN1_FUNCTIONS(PKCS7_ISSUER_AND_SERIAL) - -int PKCS7_ISSUER_AND_SERIAL_digest(PKCS7_ISSUER_AND_SERIAL *data,const EVP_MD *type, - unsigned char *md,unsigned int *len); -#ifndef OPENSSL_NO_FP_API -PKCS7 *d2i_PKCS7_fp(FILE *fp,PKCS7 **p7); -int i2d_PKCS7_fp(FILE *fp,PKCS7 *p7); -#endif -PKCS7 *PKCS7_dup(PKCS7 *p7); -PKCS7 *d2i_PKCS7_bio(BIO *bp,PKCS7 **p7); -int i2d_PKCS7_bio(BIO *bp,PKCS7 *p7); -int i2d_PKCS7_bio_stream(BIO *out, PKCS7 *p7, BIO *in, int flags); -int PEM_write_bio_PKCS7_stream(BIO *out, PKCS7 *p7, BIO *in, int flags); - -DECLARE_ASN1_FUNCTIONS(PKCS7_SIGNER_INFO) -DECLARE_ASN1_FUNCTIONS(PKCS7_RECIP_INFO) -DECLARE_ASN1_FUNCTIONS(PKCS7_SIGNED) -DECLARE_ASN1_FUNCTIONS(PKCS7_ENC_CONTENT) -DECLARE_ASN1_FUNCTIONS(PKCS7_ENVELOPE) -DECLARE_ASN1_FUNCTIONS(PKCS7_SIGN_ENVELOPE) -DECLARE_ASN1_FUNCTIONS(PKCS7_DIGEST) -DECLARE_ASN1_FUNCTIONS(PKCS7_ENCRYPT) -DECLARE_ASN1_FUNCTIONS(PKCS7) - -DECLARE_ASN1_ITEM(PKCS7_ATTR_SIGN) -DECLARE_ASN1_ITEM(PKCS7_ATTR_VERIFY) - -DECLARE_ASN1_NDEF_FUNCTION(PKCS7) -DECLARE_ASN1_PRINT_FUNCTION(PKCS7) - -long PKCS7_ctrl(PKCS7 *p7, int cmd, long larg, char *parg); - -int PKCS7_set_type(PKCS7 *p7, int type); -int PKCS7_set0_type_other(PKCS7 *p7, int type, ASN1_TYPE *other); -int PKCS7_set_content(PKCS7 *p7, PKCS7 *p7_data); -int PKCS7_SIGNER_INFO_set(PKCS7_SIGNER_INFO *p7i, X509 *x509, EVP_PKEY *pkey, - const EVP_MD *dgst); -int PKCS7_SIGNER_INFO_sign(PKCS7_SIGNER_INFO *si); -int PKCS7_add_signer(PKCS7 *p7, PKCS7_SIGNER_INFO *p7i); -int PKCS7_add_certificate(PKCS7 *p7, X509 *x509); -int PKCS7_add_crl(PKCS7 *p7, X509_CRL *x509); -int PKCS7_content_new(PKCS7 *p7, int nid); -int PKCS7_dataVerify(X509_STORE *cert_store, X509_STORE_CTX *ctx, - BIO *bio, PKCS7 *p7, PKCS7_SIGNER_INFO *si); -int PKCS7_signatureVerify(BIO *bio, PKCS7 *p7, PKCS7_SIGNER_INFO *si, - X509 *x509); - -BIO *PKCS7_dataInit(PKCS7 *p7, BIO *bio); -int PKCS7_dataFinal(PKCS7 *p7, BIO *bio); -BIO *PKCS7_dataDecode(PKCS7 *p7, EVP_PKEY *pkey, BIO *in_bio, X509 *pcert); - - -PKCS7_SIGNER_INFO *PKCS7_add_signature(PKCS7 *p7, X509 *x509, - EVP_PKEY *pkey, const EVP_MD *dgst); -X509 *PKCS7_cert_from_signer_info(PKCS7 *p7, PKCS7_SIGNER_INFO *si); -int PKCS7_set_digest(PKCS7 *p7, const EVP_MD *md); -STACK_OF(PKCS7_SIGNER_INFO) *PKCS7_get_signer_info(PKCS7 *p7); - -PKCS7_RECIP_INFO *PKCS7_add_recipient(PKCS7 *p7, X509 *x509); -void PKCS7_SIGNER_INFO_get0_algs(PKCS7_SIGNER_INFO *si, EVP_PKEY **pk, - X509_ALGOR **pdig, X509_ALGOR **psig); -void PKCS7_RECIP_INFO_get0_alg(PKCS7_RECIP_INFO *ri, X509_ALGOR **penc); -int PKCS7_add_recipient_info(PKCS7 *p7, PKCS7_RECIP_INFO *ri); -int PKCS7_RECIP_INFO_set(PKCS7_RECIP_INFO *p7i, X509 *x509); -int PKCS7_set_cipher(PKCS7 *p7, const EVP_CIPHER *cipher); -int PKCS7_stream(unsigned char ***boundary, PKCS7 *p7); - -PKCS7_ISSUER_AND_SERIAL *PKCS7_get_issuer_and_serial(PKCS7 *p7, int idx); -ASN1_OCTET_STRING *PKCS7_digest_from_attributes(STACK_OF(X509_ATTRIBUTE) *sk); -int PKCS7_add_signed_attribute(PKCS7_SIGNER_INFO *p7si,int nid,int type, - void *data); -int PKCS7_add_attribute (PKCS7_SIGNER_INFO *p7si, int nid, int atrtype, - void *value); -ASN1_TYPE *PKCS7_get_attribute(PKCS7_SIGNER_INFO *si, int nid); -ASN1_TYPE *PKCS7_get_signed_attribute(PKCS7_SIGNER_INFO *si, int nid); -int PKCS7_set_signed_attributes(PKCS7_SIGNER_INFO *p7si, - STACK_OF(X509_ATTRIBUTE) *sk); -int PKCS7_set_attributes(PKCS7_SIGNER_INFO *p7si,STACK_OF(X509_ATTRIBUTE) *sk); - - -PKCS7 *PKCS7_sign(X509 *signcert, EVP_PKEY *pkey, STACK_OF(X509) *certs, - BIO *data, int flags); - -PKCS7_SIGNER_INFO *PKCS7_sign_add_signer(PKCS7 *p7, - X509 *signcert, EVP_PKEY *pkey, const EVP_MD *md, - int flags); - -int PKCS7_final(PKCS7 *p7, BIO *data, int flags); -int PKCS7_verify(PKCS7 *p7, STACK_OF(X509) *certs, X509_STORE *store, - BIO *indata, BIO *out, int flags); -STACK_OF(X509) *PKCS7_get0_signers(PKCS7 *p7, STACK_OF(X509) *certs, int flags); -PKCS7 *PKCS7_encrypt(STACK_OF(X509) *certs, BIO *in, const EVP_CIPHER *cipher, - int flags); -int PKCS7_decrypt(PKCS7 *p7, EVP_PKEY *pkey, X509 *cert, BIO *data, int flags); - -int PKCS7_add_attrib_smimecap(PKCS7_SIGNER_INFO *si, - STACK_OF(X509_ALGOR) *cap); -STACK_OF(X509_ALGOR) *PKCS7_get_smimecap(PKCS7_SIGNER_INFO *si); -int PKCS7_simple_smimecap(STACK_OF(X509_ALGOR) *sk, int nid, int arg); - -int PKCS7_add_attrib_content_type(PKCS7_SIGNER_INFO *si, ASN1_OBJECT *coid); -int PKCS7_add0_attrib_signing_time(PKCS7_SIGNER_INFO *si, ASN1_TIME *t); -int PKCS7_add1_attrib_digest(PKCS7_SIGNER_INFO *si, - const unsigned char *md, int mdlen); - -int SMIME_write_PKCS7(BIO *bio, PKCS7 *p7, BIO *data, int flags); -PKCS7 *SMIME_read_PKCS7(BIO *bio, BIO **bcont); - -BIO *BIO_new_PKCS7(BIO *out, PKCS7 *p7); - - -/* BEGIN ERROR CODES */ -/* The following lines are auto generated by the script mkerr.pl. Any changes - * made after this point may be overwritten when the script is next run. - */ -void ERR_load_PKCS7_strings(void); - -/* Error codes for the PKCS7 functions. */ - -/* Function codes. */ -#define PKCS7_F_B64_READ_PKCS7 120 -#define PKCS7_F_B64_WRITE_PKCS7 121 -#define PKCS7_F_DO_PKCS7_SIGNED_ATTRIB 136 -#define PKCS7_F_I2D_PKCS7_BIO_STREAM 140 -#define PKCS7_F_PKCS7_ADD0_ATTRIB_SIGNING_TIME 135 -#define PKCS7_F_PKCS7_ADD_ATTRIB_SMIMECAP 118 -#define PKCS7_F_PKCS7_ADD_CERTIFICATE 100 -#define PKCS7_F_PKCS7_ADD_CRL 101 -#define PKCS7_F_PKCS7_ADD_RECIPIENT_INFO 102 -#define PKCS7_F_PKCS7_ADD_SIGNATURE 131 -#define PKCS7_F_PKCS7_ADD_SIGNER 103 -#define PKCS7_F_PKCS7_BIO_ADD_DIGEST 125 -#define PKCS7_F_PKCS7_COPY_EXISTING_DIGEST 138 -#define PKCS7_F_PKCS7_CTRL 104 -#define PKCS7_F_PKCS7_DATADECODE 112 -#define PKCS7_F_PKCS7_DATAFINAL 128 -#define PKCS7_F_PKCS7_DATAINIT 105 -#define PKCS7_F_PKCS7_DATASIGN 106 -#define PKCS7_F_PKCS7_DATAVERIFY 107 -#define PKCS7_F_PKCS7_DECRYPT 114 -#define PKCS7_F_PKCS7_DECRYPT_RINFO 133 -#define PKCS7_F_PKCS7_ENCODE_RINFO 132 -#define PKCS7_F_PKCS7_ENCRYPT 115 -#define PKCS7_F_PKCS7_FINAL 134 -#define PKCS7_F_PKCS7_FIND_DIGEST 127 -#define PKCS7_F_PKCS7_GET0_SIGNERS 124 -#define PKCS7_F_PKCS7_RECIP_INFO_SET 130 -#define PKCS7_F_PKCS7_SET_CIPHER 108 -#define PKCS7_F_PKCS7_SET_CONTENT 109 -#define PKCS7_F_PKCS7_SET_DIGEST 126 -#define PKCS7_F_PKCS7_SET_TYPE 110 -#define PKCS7_F_PKCS7_SIGN 116 -#define PKCS7_F_PKCS7_SIGNATUREVERIFY 113 -#define PKCS7_F_PKCS7_SIGNER_INFO_SET 129 -#define PKCS7_F_PKCS7_SIGNER_INFO_SIGN 139 -#define PKCS7_F_PKCS7_SIGN_ADD_SIGNER 137 -#define PKCS7_F_PKCS7_SIMPLE_SMIMECAP 119 -#define PKCS7_F_PKCS7_VERIFY 117 -#define PKCS7_F_SMIME_READ_PKCS7 122 -#define PKCS7_F_SMIME_TEXT 123 - -/* Reason codes. */ -#define PKCS7_R_CERTIFICATE_VERIFY_ERROR 117 -#define PKCS7_R_CIPHER_HAS_NO_OBJECT_IDENTIFIER 144 -#define PKCS7_R_CIPHER_NOT_INITIALIZED 116 -#define PKCS7_R_CONTENT_AND_DATA_PRESENT 118 -#define PKCS7_R_CTRL_ERROR 152 -#define PKCS7_R_DECODE_ERROR 130 -#define PKCS7_R_DECRYPTED_KEY_IS_WRONG_LENGTH 100 -#define PKCS7_R_DECRYPT_ERROR 119 -#define PKCS7_R_DIGEST_FAILURE 101 -#define PKCS7_R_ENCRYPTION_CTRL_FAILURE 149 -#define PKCS7_R_ENCRYPTION_NOT_SUPPORTED_FOR_THIS_KEY_TYPE 150 -#define PKCS7_R_ERROR_ADDING_RECIPIENT 120 -#define PKCS7_R_ERROR_SETTING_CIPHER 121 -#define PKCS7_R_INVALID_MIME_TYPE 131 -#define PKCS7_R_INVALID_NULL_POINTER 143 -#define PKCS7_R_INVALID_SIGNED_DATA_TYPE 155 -#define PKCS7_R_MIME_NO_CONTENT_TYPE 132 -#define PKCS7_R_MIME_PARSE_ERROR 133 -#define PKCS7_R_MIME_SIG_PARSE_ERROR 134 -#define PKCS7_R_MISSING_CERIPEND_INFO 103 -#define PKCS7_R_NO_CONTENT 122 -#define PKCS7_R_NO_CONTENT_TYPE 135 -#define PKCS7_R_NO_DEFAULT_DIGEST 151 -#define PKCS7_R_NO_MATCHING_DIGEST_TYPE_FOUND 154 -#define PKCS7_R_NO_MULTIPART_BODY_FAILURE 136 -#define PKCS7_R_NO_MULTIPART_BOUNDARY 137 -#define PKCS7_R_NO_RECIPIENT_MATCHES_CERTIFICATE 115 -#define PKCS7_R_NO_RECIPIENT_MATCHES_KEY 146 -#define PKCS7_R_NO_SIGNATURES_ON_DATA 123 -#define PKCS7_R_NO_SIGNERS 142 -#define PKCS7_R_NO_SIG_CONTENT_TYPE 138 -#define PKCS7_R_OPERATION_NOT_SUPPORTED_ON_THIS_TYPE 104 -#define PKCS7_R_PKCS7_ADD_SIGNATURE_ERROR 124 -#define PKCS7_R_PKCS7_ADD_SIGNER_ERROR 153 -#define PKCS7_R_PKCS7_DATAFINAL 126 -#define PKCS7_R_PKCS7_DATAFINAL_ERROR 125 -#define PKCS7_R_PKCS7_DATASIGN 145 -#define PKCS7_R_PKCS7_PARSE_ERROR 139 -#define PKCS7_R_PKCS7_SIG_PARSE_ERROR 140 -#define PKCS7_R_PRIVATE_KEY_DOES_NOT_MATCH_CERTIFICATE 127 -#define PKCS7_R_SIGNATURE_FAILURE 105 -#define PKCS7_R_SIGNER_CERTIFICATE_NOT_FOUND 128 -#define PKCS7_R_SIGNING_CTRL_FAILURE 147 -#define PKCS7_R_SIGNING_NOT_SUPPORTED_FOR_THIS_KEY_TYPE 148 -#define PKCS7_R_SIG_INVALID_MIME_TYPE 141 -#define PKCS7_R_SMIME_TEXT_ERROR 129 -#define PKCS7_R_UNABLE_TO_FIND_CERTIFICATE 106 -#define PKCS7_R_UNABLE_TO_FIND_MEM_BIO 107 -#define PKCS7_R_UNABLE_TO_FIND_MESSAGE_DIGEST 108 -#define PKCS7_R_UNKNOWN_DIGEST_TYPE 109 -#define PKCS7_R_UNKNOWN_OPERATION 110 -#define PKCS7_R_UNSUPPORTED_CIPHER_TYPE 111 -#define PKCS7_R_UNSUPPORTED_CONTENT_TYPE 112 -#define PKCS7_R_WRONG_CONTENT_TYPE 113 -#define PKCS7_R_WRONG_PKCS7_TYPE 114 - -#ifdef __cplusplus -} -#endif -#endif diff --git a/Pods/OpenSSL-Universal/include-osx/openssl/pqueue.h b/Pods/OpenSSL-Universal/include-osx/openssl/pqueue.h deleted file mode 100644 index 87fc9037..00000000 --- a/Pods/OpenSSL-Universal/include-osx/openssl/pqueue.h +++ /dev/null @@ -1,94 +0,0 @@ -/* crypto/pqueue/pqueue.h */ -/* - * DTLS implementation written by Nagendra Modadugu - * (nagendra@cs.stanford.edu) for the OpenSSL project 2005. - */ -/* ==================================================================== - * Copyright (c) 1999-2005 The OpenSSL Project. All rights reserved. - * - * Redistribution and use in source and binary forms, with or without - * modification, are permitted provided that the following conditions - * are met: - * - * 1. Redistributions of source code must retain the above copyright - * notice, this list of conditions and the following disclaimer. - * - * 2. Redistributions in binary form must reproduce the above copyright - * notice, this list of conditions and the following disclaimer in - * the documentation and/or other materials provided with the - * distribution. - * - * 3. All advertising materials mentioning features or use of this - * software must display the following acknowledgment: - * "This product includes software developed by the OpenSSL Project - * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)" - * - * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to - * endorse or promote products derived from this software without - * prior written permission. For written permission, please contact - * openssl-core@OpenSSL.org. - * - * 5. Products derived from this software may not be called "OpenSSL" - * nor may "OpenSSL" appear in their names without prior written - * permission of the OpenSSL Project. - * - * 6. Redistributions of any form whatsoever must retain the following - * acknowledgment: - * "This product includes software developed by the OpenSSL Project - * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)" - * - * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY - * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE - * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR - * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR - * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, - * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT - * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; - * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) - * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, - * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) - * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED - * OF THE POSSIBILITY OF SUCH DAMAGE. - * ==================================================================== - * - * This product includes cryptographic software written by Eric Young - * (eay@cryptsoft.com). This product includes software written by Tim - * Hudson (tjh@cryptsoft.com). - * - */ - -#ifndef HEADER_PQUEUE_H -#define HEADER_PQUEUE_H - -#include -#include -#include - -typedef struct _pqueue *pqueue; - -typedef struct _pitem - { - unsigned char priority[8]; /* 64-bit value in big-endian encoding */ - void *data; - struct _pitem *next; - } pitem; - -typedef struct _pitem *piterator; - -pitem *pitem_new(unsigned char *prio64be, void *data); -void pitem_free(pitem *item); - -pqueue pqueue_new(void); -void pqueue_free(pqueue pq); - -pitem *pqueue_insert(pqueue pq, pitem *item); -pitem *pqueue_peek(pqueue pq); -pitem *pqueue_pop(pqueue pq); -pitem *pqueue_find(pqueue pq, unsigned char *prio64be); -pitem *pqueue_iterator(pqueue pq); -pitem *pqueue_next(piterator *iter); - -void pqueue_print(pqueue pq); -int pqueue_size(pqueue pq); - -#endif /* ! HEADER_PQUEUE_H */ diff --git a/Pods/OpenSSL-Universal/include-osx/openssl/rand.h b/Pods/OpenSSL-Universal/include-osx/openssl/rand.h deleted file mode 100644 index bb5520e8..00000000 --- a/Pods/OpenSSL-Universal/include-osx/openssl/rand.h +++ /dev/null @@ -1,150 +0,0 @@ -/* crypto/rand/rand.h */ -/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) - * All rights reserved. - * - * This package is an SSL implementation written - * by Eric Young (eay@cryptsoft.com). - * The implementation was written so as to conform with Netscapes SSL. - * - * This library is free for commercial and non-commercial use as long as - * the following conditions are aheared to. The following conditions - * apply to all code found in this distribution, be it the RC4, RSA, - * lhash, DES, etc., code; not just the SSL code. The SSL documentation - * included with this distribution is covered by the same copyright terms - * except that the holder is Tim Hudson (tjh@cryptsoft.com). - * - * Copyright remains Eric Young's, and as such any Copyright notices in - * the code are not to be removed. - * If this package is used in a product, Eric Young should be given attribution - * as the author of the parts of the library used. - * This can be in the form of a textual message at program startup or - * in documentation (online or textual) provided with the package. - * - * Redistribution and use in source and binary forms, with or without - * modification, are permitted provided that the following conditions - * are met: - * 1. Redistributions of source code must retain the copyright - * notice, this list of conditions and the following disclaimer. - * 2. Redistributions in binary form must reproduce the above copyright - * notice, this list of conditions and the following disclaimer in the - * documentation and/or other materials provided with the distribution. - * 3. All advertising materials mentioning features or use of this software - * must display the following acknowledgement: - * "This product includes cryptographic software written by - * Eric Young (eay@cryptsoft.com)" - * The word 'cryptographic' can be left out if the rouines from the library - * being used are not cryptographic related :-). - * 4. If you include any Windows specific code (or a derivative thereof) from - * the apps directory (application code) you must include an acknowledgement: - * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" - * - * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND - * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE - * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE - * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE - * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL - * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS - * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) - * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT - * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY - * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF - * SUCH DAMAGE. - * - * The licence and distribution terms for any publically available version or - * derivative of this code cannot be changed. i.e. this code cannot simply be - * copied and put under another distribution licence - * [including the GNU Public Licence.] - */ - -#ifndef HEADER_RAND_H -#define HEADER_RAND_H - -#include -#include -#include - -#if defined(OPENSSL_SYS_WINDOWS) -#include -#endif - -#ifdef __cplusplus -extern "C" { -#endif - -#if defined(OPENSSL_FIPS) -#define FIPS_RAND_SIZE_T size_t -#endif - -/* Already defined in ossl_typ.h */ -/* typedef struct rand_meth_st RAND_METHOD; */ - -struct rand_meth_st - { - void (*seed)(const void *buf, int num); - int (*bytes)(unsigned char *buf, int num); - void (*cleanup)(void); - void (*add)(const void *buf, int num, double entropy); - int (*pseudorand)(unsigned char *buf, int num); - int (*status)(void); - }; - -#ifdef BN_DEBUG -extern int rand_predictable; -#endif - -int RAND_set_rand_method(const RAND_METHOD *meth); -const RAND_METHOD *RAND_get_rand_method(void); -#ifndef OPENSSL_NO_ENGINE -int RAND_set_rand_engine(ENGINE *engine); -#endif -RAND_METHOD *RAND_SSLeay(void); -void RAND_cleanup(void ); -int RAND_bytes(unsigned char *buf,int num); -int RAND_pseudo_bytes(unsigned char *buf,int num); -void RAND_seed(const void *buf,int num); -void RAND_add(const void *buf,int num,double entropy); -int RAND_load_file(const char *file,long max_bytes); -int RAND_write_file(const char *file); -const char *RAND_file_name(char *file,size_t num); -int RAND_status(void); -int RAND_query_egd_bytes(const char *path, unsigned char *buf, int bytes); -int RAND_egd(const char *path); -int RAND_egd_bytes(const char *path,int bytes); -int RAND_poll(void); - -#if defined(OPENSSL_SYS_WINDOWS) || defined(OPENSSL_SYS_WIN32) - -void RAND_screen(void); -int RAND_event(UINT, WPARAM, LPARAM); - -#endif - -#ifdef OPENSSL_FIPS -void RAND_set_fips_drbg_type(int type, int flags); -int RAND_init_fips(void); -#endif - -/* BEGIN ERROR CODES */ -/* The following lines are auto generated by the script mkerr.pl. Any changes - * made after this point may be overwritten when the script is next run. - */ -void ERR_load_RAND_strings(void); - -/* Error codes for the RAND functions. */ - -/* Function codes. */ -#define RAND_F_RAND_GET_RAND_METHOD 101 -#define RAND_F_RAND_INIT_FIPS 102 -#define RAND_F_SSLEAY_RAND_BYTES 100 - -/* Reason codes. */ -#define RAND_R_DUAL_EC_DRBG_DISABLED 104 -#define RAND_R_ERROR_INITIALISING_DRBG 102 -#define RAND_R_ERROR_INSTANTIATING_DRBG 103 -#define RAND_R_NO_FIPS_RANDOM_METHOD_SET 101 -#define RAND_R_PRNG_NOT_SEEDED 100 - -#ifdef __cplusplus -} -#endif -#endif diff --git a/Pods/OpenSSL-Universal/include-osx/openssl/rc2.h b/Pods/OpenSSL-Universal/include-osx/openssl/rc2.h deleted file mode 100644 index e542ec94..00000000 --- a/Pods/OpenSSL-Universal/include-osx/openssl/rc2.h +++ /dev/null @@ -1,103 +0,0 @@ -/* crypto/rc2/rc2.h */ -/* Copyright (C) 1995-1997 Eric Young (eay@cryptsoft.com) - * All rights reserved. - * - * This package is an SSL implementation written - * by Eric Young (eay@cryptsoft.com). - * The implementation was written so as to conform with Netscapes SSL. - * - * This library is free for commercial and non-commercial use as long as - * the following conditions are aheared to. The following conditions - * apply to all code found in this distribution, be it the RC4, RSA, - * lhash, DES, etc., code; not just the SSL code. The SSL documentation - * included with this distribution is covered by the same copyright terms - * except that the holder is Tim Hudson (tjh@cryptsoft.com). - * - * Copyright remains Eric Young's, and as such any Copyright notices in - * the code are not to be removed. - * If this package is used in a product, Eric Young should be given attribution - * as the author of the parts of the library used. - * This can be in the form of a textual message at program startup or - * in documentation (online or textual) provided with the package. - * - * Redistribution and use in source and binary forms, with or without - * modification, are permitted provided that the following conditions - * are met: - * 1. Redistributions of source code must retain the copyright - * notice, this list of conditions and the following disclaimer. - * 2. Redistributions in binary form must reproduce the above copyright - * notice, this list of conditions and the following disclaimer in the - * documentation and/or other materials provided with the distribution. - * 3. All advertising materials mentioning features or use of this software - * must display the following acknowledgement: - * "This product includes cryptographic software written by - * Eric Young (eay@cryptsoft.com)" - * The word 'cryptographic' can be left out if the rouines from the library - * being used are not cryptographic related :-). - * 4. If you include any Windows specific code (or a derivative thereof) from - * the apps directory (application code) you must include an acknowledgement: - * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" - * - * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND - * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE - * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE - * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE - * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL - * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS - * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) - * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT - * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY - * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF - * SUCH DAMAGE. - * - * The licence and distribution terms for any publically available version or - * derivative of this code cannot be changed. i.e. this code cannot simply be - * copied and put under another distribution licence - * [including the GNU Public Licence.] - */ - -#ifndef HEADER_RC2_H -#define HEADER_RC2_H - -#include /* OPENSSL_NO_RC2, RC2_INT */ -#ifdef OPENSSL_NO_RC2 -#error RC2 is disabled. -#endif - -#define RC2_ENCRYPT 1 -#define RC2_DECRYPT 0 - -#define RC2_BLOCK 8 -#define RC2_KEY_LENGTH 16 - -#ifdef __cplusplus -extern "C" { -#endif - -typedef struct rc2_key_st - { - RC2_INT data[64]; - } RC2_KEY; - -#ifdef OPENSSL_FIPS -void private_RC2_set_key(RC2_KEY *key, int len, const unsigned char *data,int bits); -#endif -void RC2_set_key(RC2_KEY *key, int len, const unsigned char *data,int bits); -void RC2_ecb_encrypt(const unsigned char *in,unsigned char *out,RC2_KEY *key, - int enc); -void RC2_encrypt(unsigned long *data,RC2_KEY *key); -void RC2_decrypt(unsigned long *data,RC2_KEY *key); -void RC2_cbc_encrypt(const unsigned char *in, unsigned char *out, long length, - RC2_KEY *ks, unsigned char *iv, int enc); -void RC2_cfb64_encrypt(const unsigned char *in, unsigned char *out, - long length, RC2_KEY *schedule, unsigned char *ivec, - int *num, int enc); -void RC2_ofb64_encrypt(const unsigned char *in, unsigned char *out, - long length, RC2_KEY *schedule, unsigned char *ivec, - int *num); - -#ifdef __cplusplus -} -#endif - -#endif diff --git a/Pods/OpenSSL-Universal/include-osx/openssl/rc4.h b/Pods/OpenSSL-Universal/include-osx/openssl/rc4.h deleted file mode 100644 index 88ceb46b..00000000 --- a/Pods/OpenSSL-Universal/include-osx/openssl/rc4.h +++ /dev/null @@ -1,90 +0,0 @@ -/* crypto/rc4/rc4.h */ -/* Copyright (C) 1995-1997 Eric Young (eay@cryptsoft.com) - * All rights reserved. - * - * This package is an SSL implementation written - * by Eric Young (eay@cryptsoft.com). - * The implementation was written so as to conform with Netscapes SSL. - * - * This library is free for commercial and non-commercial use as long as - * the following conditions are aheared to. The following conditions - * apply to all code found in this distribution, be it the RC4, RSA, - * lhash, DES, etc., code; not just the SSL code. The SSL documentation - * included with this distribution is covered by the same copyright terms - * except that the holder is Tim Hudson (tjh@cryptsoft.com). - * - * Copyright remains Eric Young's, and as such any Copyright notices in - * the code are not to be removed. - * If this package is used in a product, Eric Young should be given attribution - * as the author of the parts of the library used. - * This can be in the form of a textual message at program startup or - * in documentation (online or textual) provided with the package. - * - * Redistribution and use in source and binary forms, with or without - * modification, are permitted provided that the following conditions - * are met: - * 1. Redistributions of source code must retain the copyright - * notice, this list of conditions and the following disclaimer. - * 2. Redistributions in binary form must reproduce the above copyright - * notice, this list of conditions and the following disclaimer in the - * documentation and/or other materials provided with the distribution. - * 3. All advertising materials mentioning features or use of this software - * must display the following acknowledgement: - * "This product includes cryptographic software written by - * Eric Young (eay@cryptsoft.com)" - * The word 'cryptographic' can be left out if the rouines from the library - * being used are not cryptographic related :-). - * 4. If you include any Windows specific code (or a derivative thereof) from - * the apps directory (application code) you must include an acknowledgement: - * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" - * - * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND - * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE - * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE - * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE - * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL - * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS - * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) - * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT - * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY - * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF - * SUCH DAMAGE. - * - * The licence and distribution terms for any publically available version or - * derivative of this code cannot be changed. i.e. this code cannot simply be - * copied and put under another distribution licence - * [including the GNU Public Licence.] - */ - -#ifndef HEADER_RC4_H -#define HEADER_RC4_H - -#include /* OPENSSL_NO_RC4, RC4_INT */ -#ifdef OPENSSL_NO_RC4 -#error RC4 is disabled. -#endif - -#include - -#ifdef __cplusplus -extern "C" { -#endif - -typedef struct rc4_key_st - { - RC4_INT x,y; - RC4_INT data[256]; - } RC4_KEY; - - -const char *RC4_options(void); -void RC4_set_key(RC4_KEY *key, int len, const unsigned char *data); -void private_RC4_set_key(RC4_KEY *key, int len, const unsigned char *data); -void RC4(RC4_KEY *key, size_t len, const unsigned char *indata, - unsigned char *outdata); - -#ifdef __cplusplus -} -#endif - -#endif diff --git a/Pods/OpenSSL-Universal/include-osx/openssl/ripemd.h b/Pods/OpenSSL-Universal/include-osx/openssl/ripemd.h deleted file mode 100644 index 189bd8c9..00000000 --- a/Pods/OpenSSL-Universal/include-osx/openssl/ripemd.h +++ /dev/null @@ -1,107 +0,0 @@ -/* crypto/ripemd/ripemd.h */ -/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) - * All rights reserved. - * - * This package is an SSL implementation written - * by Eric Young (eay@cryptsoft.com). - * The implementation was written so as to conform with Netscapes SSL. - * - * This library is free for commercial and non-commercial use as long as - * the following conditions are aheared to. The following conditions - * apply to all code found in this distribution, be it the RC4, RSA, - * lhash, DES, etc., code; not just the SSL code. The SSL documentation - * included with this distribution is covered by the same copyright terms - * except that the holder is Tim Hudson (tjh@cryptsoft.com). - * - * Copyright remains Eric Young's, and as such any Copyright notices in - * the code are not to be removed. - * If this package is used in a product, Eric Young should be given attribution - * as the author of the parts of the library used. - * This can be in the form of a textual message at program startup or - * in documentation (online or textual) provided with the package. - * - * Redistribution and use in source and binary forms, with or without - * modification, are permitted provided that the following conditions - * are met: - * 1. Redistributions of source code must retain the copyright - * notice, this list of conditions and the following disclaimer. - * 2. Redistributions in binary form must reproduce the above copyright - * notice, this list of conditions and the following disclaimer in the - * documentation and/or other materials provided with the distribution. - * 3. All advertising materials mentioning features or use of this software - * must display the following acknowledgement: - * "This product includes cryptographic software written by - * Eric Young (eay@cryptsoft.com)" - * The word 'cryptographic' can be left out if the rouines from the library - * being used are not cryptographic related :-). - * 4. If you include any Windows specific code (or a derivative thereof) from - * the apps directory (application code) you must include an acknowledgement: - * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" - * - * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND - * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE - * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE - * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE - * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL - * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS - * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) - * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT - * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY - * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF - * SUCH DAMAGE. - * - * The licence and distribution terms for any publically available version or - * derivative of this code cannot be changed. i.e. this code cannot simply be - * copied and put under another distribution licence - * [including the GNU Public Licence.] - */ - -#ifndef HEADER_RIPEMD_H -#define HEADER_RIPEMD_H - -#include -#include - -#ifdef __cplusplus -extern "C" { -#endif - -#ifdef OPENSSL_NO_RIPEMD -#error RIPEMD is disabled. -#endif - -#if defined(__LP32__) -#define RIPEMD160_LONG unsigned long -#elif defined(OPENSSL_SYS_CRAY) || defined(__ILP64__) -#define RIPEMD160_LONG unsigned long -#define RIPEMD160_LONG_LOG2 3 -#else -#define RIPEMD160_LONG unsigned int -#endif - -#define RIPEMD160_CBLOCK 64 -#define RIPEMD160_LBLOCK (RIPEMD160_CBLOCK/4) -#define RIPEMD160_DIGEST_LENGTH 20 - -typedef struct RIPEMD160state_st - { - RIPEMD160_LONG A,B,C,D,E; - RIPEMD160_LONG Nl,Nh; - RIPEMD160_LONG data[RIPEMD160_LBLOCK]; - unsigned int num; - } RIPEMD160_CTX; - -#ifdef OPENSSL_FIPS -int private_RIPEMD160_Init(RIPEMD160_CTX *c); -#endif -int RIPEMD160_Init(RIPEMD160_CTX *c); -int RIPEMD160_Update(RIPEMD160_CTX *c, const void *data, size_t len); -int RIPEMD160_Final(unsigned char *md, RIPEMD160_CTX *c); -unsigned char *RIPEMD160(const unsigned char *d, size_t n, - unsigned char *md); -void RIPEMD160_Transform(RIPEMD160_CTX *c, const unsigned char *b); -#ifdef __cplusplus -} -#endif - -#endif diff --git a/Pods/OpenSSL-Universal/include-osx/openssl/rsa.h b/Pods/OpenSSL-Universal/include-osx/openssl/rsa.h deleted file mode 100644 index 5f269e57..00000000 --- a/Pods/OpenSSL-Universal/include-osx/openssl/rsa.h +++ /dev/null @@ -1,582 +0,0 @@ -/* crypto/rsa/rsa.h */ -/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) - * All rights reserved. - * - * This package is an SSL implementation written - * by Eric Young (eay@cryptsoft.com). - * The implementation was written so as to conform with Netscapes SSL. - * - * This library is free for commercial and non-commercial use as long as - * the following conditions are aheared to. The following conditions - * apply to all code found in this distribution, be it the RC4, RSA, - * lhash, DES, etc., code; not just the SSL code. The SSL documentation - * included with this distribution is covered by the same copyright terms - * except that the holder is Tim Hudson (tjh@cryptsoft.com). - * - * Copyright remains Eric Young's, and as such any Copyright notices in - * the code are not to be removed. - * If this package is used in a product, Eric Young should be given attribution - * as the author of the parts of the library used. - * This can be in the form of a textual message at program startup or - * in documentation (online or textual) provided with the package. - * - * Redistribution and use in source and binary forms, with or without - * modification, are permitted provided that the following conditions - * are met: - * 1. Redistributions of source code must retain the copyright - * notice, this list of conditions and the following disclaimer. - * 2. Redistributions in binary form must reproduce the above copyright - * notice, this list of conditions and the following disclaimer in the - * documentation and/or other materials provided with the distribution. - * 3. All advertising materials mentioning features or use of this software - * must display the following acknowledgement: - * "This product includes cryptographic software written by - * Eric Young (eay@cryptsoft.com)" - * The word 'cryptographic' can be left out if the rouines from the library - * being used are not cryptographic related :-). - * 4. If you include any Windows specific code (or a derivative thereof) from - * the apps directory (application code) you must include an acknowledgement: - * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" - * - * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND - * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE - * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE - * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE - * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL - * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS - * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) - * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT - * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY - * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF - * SUCH DAMAGE. - * - * The licence and distribution terms for any publically available version or - * derivative of this code cannot be changed. i.e. this code cannot simply be - * copied and put under another distribution licence - * [including the GNU Public Licence.] - */ - -#ifndef HEADER_RSA_H -#define HEADER_RSA_H - -#include - -#ifndef OPENSSL_NO_BIO -#include -#endif -#include -#include -#ifndef OPENSSL_NO_DEPRECATED -#include -#endif - -#ifdef OPENSSL_NO_RSA -#error RSA is disabled. -#endif - -#ifdef __cplusplus -extern "C" { -#endif - -/* Declared already in ossl_typ.h */ -/* typedef struct rsa_st RSA; */ -/* typedef struct rsa_meth_st RSA_METHOD; */ - -struct rsa_meth_st - { - const char *name; - int (*rsa_pub_enc)(int flen,const unsigned char *from, - unsigned char *to, - RSA *rsa,int padding); - int (*rsa_pub_dec)(int flen,const unsigned char *from, - unsigned char *to, - RSA *rsa,int padding); - int (*rsa_priv_enc)(int flen,const unsigned char *from, - unsigned char *to, - RSA *rsa,int padding); - int (*rsa_priv_dec)(int flen,const unsigned char *from, - unsigned char *to, - RSA *rsa,int padding); - int (*rsa_mod_exp)(BIGNUM *r0,const BIGNUM *I,RSA *rsa,BN_CTX *ctx); /* Can be null */ - int (*bn_mod_exp)(BIGNUM *r, const BIGNUM *a, const BIGNUM *p, - const BIGNUM *m, BN_CTX *ctx, - BN_MONT_CTX *m_ctx); /* Can be null */ - int (*init)(RSA *rsa); /* called at new */ - int (*finish)(RSA *rsa); /* called at free */ - int flags; /* RSA_METHOD_FLAG_* things */ - char *app_data; /* may be needed! */ -/* New sign and verify functions: some libraries don't allow arbitrary data - * to be signed/verified: this allows them to be used. Note: for this to work - * the RSA_public_decrypt() and RSA_private_encrypt() should *NOT* be used - * RSA_sign(), RSA_verify() should be used instead. Note: for backwards - * compatibility this functionality is only enabled if the RSA_FLAG_SIGN_VER - * option is set in 'flags'. - */ - int (*rsa_sign)(int type, - const unsigned char *m, unsigned int m_length, - unsigned char *sigret, unsigned int *siglen, const RSA *rsa); - int (*rsa_verify)(int dtype, - const unsigned char *m, unsigned int m_length, - const unsigned char *sigbuf, unsigned int siglen, - const RSA *rsa); -/* If this callback is NULL, the builtin software RSA key-gen will be used. This - * is for behavioural compatibility whilst the code gets rewired, but one day - * it would be nice to assume there are no such things as "builtin software" - * implementations. */ - int (*rsa_keygen)(RSA *rsa, int bits, BIGNUM *e, BN_GENCB *cb); - }; - -struct rsa_st - { - /* The first parameter is used to pickup errors where - * this is passed instead of aEVP_PKEY, it is set to 0 */ - int pad; - long version; - const RSA_METHOD *meth; - /* functional reference if 'meth' is ENGINE-provided */ - ENGINE *engine; - BIGNUM *n; - BIGNUM *e; - BIGNUM *d; - BIGNUM *p; - BIGNUM *q; - BIGNUM *dmp1; - BIGNUM *dmq1; - BIGNUM *iqmp; - /* be careful using this if the RSA structure is shared */ - CRYPTO_EX_DATA ex_data; - int references; - int flags; - - /* Used to cache montgomery values */ - BN_MONT_CTX *_method_mod_n; - BN_MONT_CTX *_method_mod_p; - BN_MONT_CTX *_method_mod_q; - - /* all BIGNUM values are actually in the following data, if it is not - * NULL */ - char *bignum_data; - BN_BLINDING *blinding; - BN_BLINDING *mt_blinding; - }; - -#ifndef OPENSSL_RSA_MAX_MODULUS_BITS -# define OPENSSL_RSA_MAX_MODULUS_BITS 16384 -#endif - -#ifndef OPENSSL_RSA_SMALL_MODULUS_BITS -# define OPENSSL_RSA_SMALL_MODULUS_BITS 3072 -#endif -#ifndef OPENSSL_RSA_MAX_PUBEXP_BITS -# define OPENSSL_RSA_MAX_PUBEXP_BITS 64 /* exponent limit enforced for "large" modulus only */ -#endif - -#define RSA_3 0x3L -#define RSA_F4 0x10001L - -#define RSA_METHOD_FLAG_NO_CHECK 0x0001 /* don't check pub/private match */ - -#define RSA_FLAG_CACHE_PUBLIC 0x0002 -#define RSA_FLAG_CACHE_PRIVATE 0x0004 -#define RSA_FLAG_BLINDING 0x0008 -#define RSA_FLAG_THREAD_SAFE 0x0010 -/* This flag means the private key operations will be handled by rsa_mod_exp - * and that they do not depend on the private key components being present: - * for example a key stored in external hardware. Without this flag bn_mod_exp - * gets called when private key components are absent. - */ -#define RSA_FLAG_EXT_PKEY 0x0020 - -/* This flag in the RSA_METHOD enables the new rsa_sign, rsa_verify functions. - */ -#define RSA_FLAG_SIGN_VER 0x0040 - -#define RSA_FLAG_NO_BLINDING 0x0080 /* new with 0.9.6j and 0.9.7b; the built-in - * RSA implementation now uses blinding by - * default (ignoring RSA_FLAG_BLINDING), - * but other engines might not need it - */ -#define RSA_FLAG_NO_CONSTTIME 0x0100 /* new with 0.9.8f; the built-in RSA - * implementation now uses constant time - * operations by default in private key operations, - * e.g., constant time modular exponentiation, - * modular inverse without leaking branches, - * division without leaking branches. This - * flag disables these constant time - * operations and results in faster RSA - * private key operations. - */ -#ifndef OPENSSL_NO_DEPRECATED -#define RSA_FLAG_NO_EXP_CONSTTIME RSA_FLAG_NO_CONSTTIME /* deprecated name for the flag*/ - /* new with 0.9.7h; the built-in RSA - * implementation now uses constant time - * modular exponentiation for secret exponents - * by default. This flag causes the - * faster variable sliding window method to - * be used for all exponents. - */ -#endif - - -#define EVP_PKEY_CTX_set_rsa_padding(ctx, pad) \ - EVP_PKEY_CTX_ctrl(ctx, EVP_PKEY_RSA, -1, EVP_PKEY_CTRL_RSA_PADDING, \ - pad, NULL) - -#define EVP_PKEY_CTX_get_rsa_padding(ctx, ppad) \ - EVP_PKEY_CTX_ctrl(ctx, EVP_PKEY_RSA, -1, \ - EVP_PKEY_CTRL_GET_RSA_PADDING, 0, ppad) - -#define EVP_PKEY_CTX_set_rsa_pss_saltlen(ctx, len) \ - EVP_PKEY_CTX_ctrl(ctx, EVP_PKEY_RSA, \ - (EVP_PKEY_OP_SIGN|EVP_PKEY_OP_VERIFY), \ - EVP_PKEY_CTRL_RSA_PSS_SALTLEN, \ - len, NULL) - -#define EVP_PKEY_CTX_get_rsa_pss_saltlen(ctx, plen) \ - EVP_PKEY_CTX_ctrl(ctx, EVP_PKEY_RSA, \ - (EVP_PKEY_OP_SIGN|EVP_PKEY_OP_VERIFY), \ - EVP_PKEY_CTRL_GET_RSA_PSS_SALTLEN, \ - 0, plen) - -#define EVP_PKEY_CTX_set_rsa_keygen_bits(ctx, bits) \ - EVP_PKEY_CTX_ctrl(ctx, EVP_PKEY_RSA, EVP_PKEY_OP_KEYGEN, \ - EVP_PKEY_CTRL_RSA_KEYGEN_BITS, bits, NULL) - -#define EVP_PKEY_CTX_set_rsa_keygen_pubexp(ctx, pubexp) \ - EVP_PKEY_CTX_ctrl(ctx, EVP_PKEY_RSA, EVP_PKEY_OP_KEYGEN, \ - EVP_PKEY_CTRL_RSA_KEYGEN_PUBEXP, 0, pubexp) - -#define EVP_PKEY_CTX_set_rsa_mgf1_md(ctx, md) \ - EVP_PKEY_CTX_ctrl(ctx, EVP_PKEY_RSA, EVP_PKEY_OP_TYPE_SIG, \ - EVP_PKEY_CTRL_RSA_MGF1_MD, 0, (void *)md) - -#define EVP_PKEY_CTX_get_rsa_mgf1_md(ctx, pmd) \ - EVP_PKEY_CTX_ctrl(ctx, EVP_PKEY_RSA, EVP_PKEY_OP_TYPE_SIG, \ - EVP_PKEY_CTRL_GET_RSA_MGF1_MD, 0, (void *)pmd) - -#define EVP_PKEY_CTRL_RSA_PADDING (EVP_PKEY_ALG_CTRL + 1) -#define EVP_PKEY_CTRL_RSA_PSS_SALTLEN (EVP_PKEY_ALG_CTRL + 2) - -#define EVP_PKEY_CTRL_RSA_KEYGEN_BITS (EVP_PKEY_ALG_CTRL + 3) -#define EVP_PKEY_CTRL_RSA_KEYGEN_PUBEXP (EVP_PKEY_ALG_CTRL + 4) -#define EVP_PKEY_CTRL_RSA_MGF1_MD (EVP_PKEY_ALG_CTRL + 5) - -#define EVP_PKEY_CTRL_GET_RSA_PADDING (EVP_PKEY_ALG_CTRL + 6) -#define EVP_PKEY_CTRL_GET_RSA_PSS_SALTLEN (EVP_PKEY_ALG_CTRL + 7) -#define EVP_PKEY_CTRL_GET_RSA_MGF1_MD (EVP_PKEY_ALG_CTRL + 8) - -#define RSA_PKCS1_PADDING 1 -#define RSA_SSLV23_PADDING 2 -#define RSA_NO_PADDING 3 -#define RSA_PKCS1_OAEP_PADDING 4 -#define RSA_X931_PADDING 5 -/* EVP_PKEY_ only */ -#define RSA_PKCS1_PSS_PADDING 6 - -#define RSA_PKCS1_PADDING_SIZE 11 - -#define RSA_set_app_data(s,arg) RSA_set_ex_data(s,0,arg) -#define RSA_get_app_data(s) RSA_get_ex_data(s,0) - -RSA * RSA_new(void); -RSA * RSA_new_method(ENGINE *engine); -int RSA_size(const RSA *rsa); - -/* Deprecated version */ -#ifndef OPENSSL_NO_DEPRECATED -RSA * RSA_generate_key(int bits, unsigned long e,void - (*callback)(int,int,void *),void *cb_arg); -#endif /* !defined(OPENSSL_NO_DEPRECATED) */ - -/* New version */ -int RSA_generate_key_ex(RSA *rsa, int bits, BIGNUM *e, BN_GENCB *cb); - -int RSA_check_key(const RSA *); - /* next 4 return -1 on error */ -int RSA_public_encrypt(int flen, const unsigned char *from, - unsigned char *to, RSA *rsa,int padding); -int RSA_private_encrypt(int flen, const unsigned char *from, - unsigned char *to, RSA *rsa,int padding); -int RSA_public_decrypt(int flen, const unsigned char *from, - unsigned char *to, RSA *rsa,int padding); -int RSA_private_decrypt(int flen, const unsigned char *from, - unsigned char *to, RSA *rsa,int padding); -void RSA_free (RSA *r); -/* "up" the RSA object's reference count */ -int RSA_up_ref(RSA *r); - -int RSA_flags(const RSA *r); - -void RSA_set_default_method(const RSA_METHOD *meth); -const RSA_METHOD *RSA_get_default_method(void); -const RSA_METHOD *RSA_get_method(const RSA *rsa); -int RSA_set_method(RSA *rsa, const RSA_METHOD *meth); - -/* This function needs the memory locking malloc callbacks to be installed */ -int RSA_memory_lock(RSA *r); - -/* these are the actual SSLeay RSA functions */ -const RSA_METHOD *RSA_PKCS1_SSLeay(void); - -const RSA_METHOD *RSA_null_method(void); - -DECLARE_ASN1_ENCODE_FUNCTIONS_const(RSA, RSAPublicKey) -DECLARE_ASN1_ENCODE_FUNCTIONS_const(RSA, RSAPrivateKey) - -typedef struct rsa_pss_params_st - { - X509_ALGOR *hashAlgorithm; - X509_ALGOR *maskGenAlgorithm; - ASN1_INTEGER *saltLength; - ASN1_INTEGER *trailerField; - } RSA_PSS_PARAMS; - -DECLARE_ASN1_FUNCTIONS(RSA_PSS_PARAMS) - -#ifndef OPENSSL_NO_FP_API -int RSA_print_fp(FILE *fp, const RSA *r,int offset); -#endif - -#ifndef OPENSSL_NO_BIO -int RSA_print(BIO *bp, const RSA *r,int offset); -#endif - -#ifndef OPENSSL_NO_RC4 -int i2d_RSA_NET(const RSA *a, unsigned char **pp, - int (*cb)(char *buf, int len, const char *prompt, int verify), - int sgckey); -RSA *d2i_RSA_NET(RSA **a, const unsigned char **pp, long length, - int (*cb)(char *buf, int len, const char *prompt, int verify), - int sgckey); - -int i2d_Netscape_RSA(const RSA *a, unsigned char **pp, - int (*cb)(char *buf, int len, const char *prompt, - int verify)); -RSA *d2i_Netscape_RSA(RSA **a, const unsigned char **pp, long length, - int (*cb)(char *buf, int len, const char *prompt, - int verify)); -#endif - -/* The following 2 functions sign and verify a X509_SIG ASN1 object - * inside PKCS#1 padded RSA encryption */ -int RSA_sign(int type, const unsigned char *m, unsigned int m_length, - unsigned char *sigret, unsigned int *siglen, RSA *rsa); -int RSA_verify(int type, const unsigned char *m, unsigned int m_length, - const unsigned char *sigbuf, unsigned int siglen, RSA *rsa); - -/* The following 2 function sign and verify a ASN1_OCTET_STRING - * object inside PKCS#1 padded RSA encryption */ -int RSA_sign_ASN1_OCTET_STRING(int type, - const unsigned char *m, unsigned int m_length, - unsigned char *sigret, unsigned int *siglen, RSA *rsa); -int RSA_verify_ASN1_OCTET_STRING(int type, - const unsigned char *m, unsigned int m_length, - unsigned char *sigbuf, unsigned int siglen, RSA *rsa); - -int RSA_blinding_on(RSA *rsa, BN_CTX *ctx); -void RSA_blinding_off(RSA *rsa); -BN_BLINDING *RSA_setup_blinding(RSA *rsa, BN_CTX *ctx); - -int RSA_padding_add_PKCS1_type_1(unsigned char *to,int tlen, - const unsigned char *f,int fl); -int RSA_padding_check_PKCS1_type_1(unsigned char *to,int tlen, - const unsigned char *f,int fl,int rsa_len); -int RSA_padding_add_PKCS1_type_2(unsigned char *to,int tlen, - const unsigned char *f,int fl); -int RSA_padding_check_PKCS1_type_2(unsigned char *to,int tlen, - const unsigned char *f,int fl,int rsa_len); -int PKCS1_MGF1(unsigned char *mask, long len, - const unsigned char *seed, long seedlen, const EVP_MD *dgst); -int RSA_padding_add_PKCS1_OAEP(unsigned char *to,int tlen, - const unsigned char *f,int fl, - const unsigned char *p,int pl); -int RSA_padding_check_PKCS1_OAEP(unsigned char *to,int tlen, - const unsigned char *f,int fl,int rsa_len, - const unsigned char *p,int pl); -int RSA_padding_add_SSLv23(unsigned char *to,int tlen, - const unsigned char *f,int fl); -int RSA_padding_check_SSLv23(unsigned char *to,int tlen, - const unsigned char *f,int fl,int rsa_len); -int RSA_padding_add_none(unsigned char *to,int tlen, - const unsigned char *f,int fl); -int RSA_padding_check_none(unsigned char *to,int tlen, - const unsigned char *f,int fl,int rsa_len); -int RSA_padding_add_X931(unsigned char *to,int tlen, - const unsigned char *f,int fl); -int RSA_padding_check_X931(unsigned char *to,int tlen, - const unsigned char *f,int fl,int rsa_len); -int RSA_X931_hash_id(int nid); - -int RSA_verify_PKCS1_PSS(RSA *rsa, const unsigned char *mHash, - const EVP_MD *Hash, const unsigned char *EM, int sLen); -int RSA_padding_add_PKCS1_PSS(RSA *rsa, unsigned char *EM, - const unsigned char *mHash, - const EVP_MD *Hash, int sLen); - -int RSA_verify_PKCS1_PSS_mgf1(RSA *rsa, const unsigned char *mHash, - const EVP_MD *Hash, const EVP_MD *mgf1Hash, - const unsigned char *EM, int sLen); - -int RSA_padding_add_PKCS1_PSS_mgf1(RSA *rsa, unsigned char *EM, - const unsigned char *mHash, - const EVP_MD *Hash, const EVP_MD *mgf1Hash, int sLen); - -int RSA_get_ex_new_index(long argl, void *argp, CRYPTO_EX_new *new_func, - CRYPTO_EX_dup *dup_func, CRYPTO_EX_free *free_func); -int RSA_set_ex_data(RSA *r,int idx,void *arg); -void *RSA_get_ex_data(const RSA *r, int idx); - -RSA *RSAPublicKey_dup(RSA *rsa); -RSA *RSAPrivateKey_dup(RSA *rsa); - -/* If this flag is set the RSA method is FIPS compliant and can be used - * in FIPS mode. This is set in the validated module method. If an - * application sets this flag in its own methods it is its responsibility - * to ensure the result is compliant. - */ - -#define RSA_FLAG_FIPS_METHOD 0x0400 - -/* If this flag is set the operations normally disabled in FIPS mode are - * permitted it is then the applications responsibility to ensure that the - * usage is compliant. - */ - -#define RSA_FLAG_NON_FIPS_ALLOW 0x0400 -/* Application has decided PRNG is good enough to generate a key: don't - * check. - */ -#define RSA_FLAG_CHECKED 0x0800 - -/* BEGIN ERROR CODES */ -/* The following lines are auto generated by the script mkerr.pl. Any changes - * made after this point may be overwritten when the script is next run. - */ -void ERR_load_RSA_strings(void); - -/* Error codes for the RSA functions. */ - -/* Function codes. */ -#define RSA_F_CHECK_PADDING_MD 140 -#define RSA_F_DO_RSA_PRINT 146 -#define RSA_F_INT_RSA_VERIFY 145 -#define RSA_F_MEMORY_LOCK 100 -#define RSA_F_OLD_RSA_PRIV_DECODE 147 -#define RSA_F_PKEY_RSA_CTRL 143 -#define RSA_F_PKEY_RSA_CTRL_STR 144 -#define RSA_F_PKEY_RSA_SIGN 142 -#define RSA_F_PKEY_RSA_VERIFY 154 -#define RSA_F_PKEY_RSA_VERIFYRECOVER 141 -#define RSA_F_RSA_BUILTIN_KEYGEN 129 -#define RSA_F_RSA_CHECK_KEY 123 -#define RSA_F_RSA_EAY_PRIVATE_DECRYPT 101 -#define RSA_F_RSA_EAY_PRIVATE_ENCRYPT 102 -#define RSA_F_RSA_EAY_PUBLIC_DECRYPT 103 -#define RSA_F_RSA_EAY_PUBLIC_ENCRYPT 104 -#define RSA_F_RSA_GENERATE_KEY 105 -#define RSA_F_RSA_GENERATE_KEY_EX 155 -#define RSA_F_RSA_ITEM_VERIFY 156 -#define RSA_F_RSA_MEMORY_LOCK 130 -#define RSA_F_RSA_NEW_METHOD 106 -#define RSA_F_RSA_NULL 124 -#define RSA_F_RSA_NULL_MOD_EXP 131 -#define RSA_F_RSA_NULL_PRIVATE_DECRYPT 132 -#define RSA_F_RSA_NULL_PRIVATE_ENCRYPT 133 -#define RSA_F_RSA_NULL_PUBLIC_DECRYPT 134 -#define RSA_F_RSA_NULL_PUBLIC_ENCRYPT 135 -#define RSA_F_RSA_PADDING_ADD_NONE 107 -#define RSA_F_RSA_PADDING_ADD_PKCS1_OAEP 121 -#define RSA_F_RSA_PADDING_ADD_PKCS1_PSS 125 -#define RSA_F_RSA_PADDING_ADD_PKCS1_PSS_MGF1 148 -#define RSA_F_RSA_PADDING_ADD_PKCS1_TYPE_1 108 -#define RSA_F_RSA_PADDING_ADD_PKCS1_TYPE_2 109 -#define RSA_F_RSA_PADDING_ADD_SSLV23 110 -#define RSA_F_RSA_PADDING_ADD_X931 127 -#define RSA_F_RSA_PADDING_CHECK_NONE 111 -#define RSA_F_RSA_PADDING_CHECK_PKCS1_OAEP 122 -#define RSA_F_RSA_PADDING_CHECK_PKCS1_TYPE_1 112 -#define RSA_F_RSA_PADDING_CHECK_PKCS1_TYPE_2 113 -#define RSA_F_RSA_PADDING_CHECK_SSLV23 114 -#define RSA_F_RSA_PADDING_CHECK_X931 128 -#define RSA_F_RSA_PRINT 115 -#define RSA_F_RSA_PRINT_FP 116 -#define RSA_F_RSA_PRIVATE_DECRYPT 150 -#define RSA_F_RSA_PRIVATE_ENCRYPT 151 -#define RSA_F_RSA_PRIV_DECODE 137 -#define RSA_F_RSA_PRIV_ENCODE 138 -#define RSA_F_RSA_PUBLIC_DECRYPT 152 -#define RSA_F_RSA_PUBLIC_ENCRYPT 153 -#define RSA_F_RSA_PUB_DECODE 139 -#define RSA_F_RSA_SETUP_BLINDING 136 -#define RSA_F_RSA_SIGN 117 -#define RSA_F_RSA_SIGN_ASN1_OCTET_STRING 118 -#define RSA_F_RSA_VERIFY 119 -#define RSA_F_RSA_VERIFY_ASN1_OCTET_STRING 120 -#define RSA_F_RSA_VERIFY_PKCS1_PSS 126 -#define RSA_F_RSA_VERIFY_PKCS1_PSS_MGF1 149 - -/* Reason codes. */ -#define RSA_R_ALGORITHM_MISMATCH 100 -#define RSA_R_BAD_E_VALUE 101 -#define RSA_R_BAD_FIXED_HEADER_DECRYPT 102 -#define RSA_R_BAD_PAD_BYTE_COUNT 103 -#define RSA_R_BAD_SIGNATURE 104 -#define RSA_R_BLOCK_TYPE_IS_NOT_01 106 -#define RSA_R_BLOCK_TYPE_IS_NOT_02 107 -#define RSA_R_DATA_GREATER_THAN_MOD_LEN 108 -#define RSA_R_DATA_TOO_LARGE 109 -#define RSA_R_DATA_TOO_LARGE_FOR_KEY_SIZE 110 -#define RSA_R_DATA_TOO_LARGE_FOR_MODULUS 132 -#define RSA_R_DATA_TOO_SMALL 111 -#define RSA_R_DATA_TOO_SMALL_FOR_KEY_SIZE 122 -#define RSA_R_DIGEST_TOO_BIG_FOR_RSA_KEY 112 -#define RSA_R_DMP1_NOT_CONGRUENT_TO_D 124 -#define RSA_R_DMQ1_NOT_CONGRUENT_TO_D 125 -#define RSA_R_D_E_NOT_CONGRUENT_TO_1 123 -#define RSA_R_FIRST_OCTET_INVALID 133 -#define RSA_R_ILLEGAL_OR_UNSUPPORTED_PADDING_MODE 144 -#define RSA_R_INVALID_DIGEST_LENGTH 143 -#define RSA_R_INVALID_HEADER 137 -#define RSA_R_INVALID_KEYBITS 145 -#define RSA_R_INVALID_MESSAGE_LENGTH 131 -#define RSA_R_INVALID_MGF1_MD 156 -#define RSA_R_INVALID_PADDING 138 -#define RSA_R_INVALID_PADDING_MODE 141 -#define RSA_R_INVALID_PSS_PARAMETERS 149 -#define RSA_R_INVALID_PSS_SALTLEN 146 -#define RSA_R_INVALID_SALT_LENGTH 150 -#define RSA_R_INVALID_TRAILER 139 -#define RSA_R_INVALID_X931_DIGEST 142 -#define RSA_R_IQMP_NOT_INVERSE_OF_Q 126 -#define RSA_R_KEY_SIZE_TOO_SMALL 120 -#define RSA_R_LAST_OCTET_INVALID 134 -#define RSA_R_MODULUS_TOO_LARGE 105 -#define RSA_R_NON_FIPS_RSA_METHOD 157 -#define RSA_R_NO_PUBLIC_EXPONENT 140 -#define RSA_R_NULL_BEFORE_BLOCK_MISSING 113 -#define RSA_R_N_DOES_NOT_EQUAL_P_Q 127 -#define RSA_R_OAEP_DECODING_ERROR 121 -#define RSA_R_OPERATION_NOT_ALLOWED_IN_FIPS_MODE 158 -#define RSA_R_OPERATION_NOT_SUPPORTED_FOR_THIS_KEYTYPE 148 -#define RSA_R_PADDING_CHECK_FAILED 114 -#define RSA_R_P_NOT_PRIME 128 -#define RSA_R_Q_NOT_PRIME 129 -#define RSA_R_RSA_OPERATIONS_NOT_SUPPORTED 130 -#define RSA_R_SLEN_CHECK_FAILED 136 -#define RSA_R_SLEN_RECOVERY_FAILED 135 -#define RSA_R_SSLV3_ROLLBACK_ATTACK 115 -#define RSA_R_THE_ASN1_OBJECT_IDENTIFIER_IS_NOT_KNOWN_FOR_THIS_MD 116 -#define RSA_R_UNKNOWN_ALGORITHM_TYPE 117 -#define RSA_R_UNKNOWN_MASK_DIGEST 151 -#define RSA_R_UNKNOWN_PADDING_TYPE 118 -#define RSA_R_UNKNOWN_PSS_DIGEST 152 -#define RSA_R_UNSUPPORTED_MASK_ALGORITHM 153 -#define RSA_R_UNSUPPORTED_MASK_PARAMETER 154 -#define RSA_R_UNSUPPORTED_SIGNATURE_TYPE 155 -#define RSA_R_VALUE_MISSING 147 -#define RSA_R_WRONG_SIGNATURE_LENGTH 119 - -#ifdef __cplusplus -} -#endif -#endif diff --git a/Pods/OpenSSL-Universal/include-osx/openssl/safestack.h b/Pods/OpenSSL-Universal/include-osx/openssl/safestack.h deleted file mode 100644 index ea3aa0d8..00000000 --- a/Pods/OpenSSL-Universal/include-osx/openssl/safestack.h +++ /dev/null @@ -1,2663 +0,0 @@ -/* ==================================================================== - * Copyright (c) 1999 The OpenSSL Project. All rights reserved. - * - * Redistribution and use in source and binary forms, with or without - * modification, are permitted provided that the following conditions - * are met: - * - * 1. Redistributions of source code must retain the above copyright - * notice, this list of conditions and the following disclaimer. - * - * 2. Redistributions in binary form must reproduce the above copyright - * notice, this list of conditions and the following disclaimer in - * the documentation and/or other materials provided with the - * distribution. - * - * 3. All advertising materials mentioning features or use of this - * software must display the following acknowledgment: - * "This product includes software developed by the OpenSSL Project - * for use in the OpenSSL Toolkit. (http://www.openssl.org/)" - * - * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to - * endorse or promote products derived from this software without - * prior written permission. For written permission, please contact - * openssl-core@openssl.org. - * - * 5. Products derived from this software may not be called "OpenSSL" - * nor may "OpenSSL" appear in their names without prior written - * permission of the OpenSSL Project. - * - * 6. Redistributions of any form whatsoever must retain the following - * acknowledgment: - * "This product includes software developed by the OpenSSL Project - * for use in the OpenSSL Toolkit (http://www.openssl.org/)" - * - * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY - * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE - * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR - * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR - * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, - * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT - * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; - * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) - * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, - * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) - * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED - * OF THE POSSIBILITY OF SUCH DAMAGE. - * ==================================================================== - * - * This product includes cryptographic software written by Eric Young - * (eay@cryptsoft.com). This product includes software written by Tim - * Hudson (tjh@cryptsoft.com). - * - */ - -#ifndef HEADER_SAFESTACK_H -#define HEADER_SAFESTACK_H - -#include - -#ifndef CHECKED_PTR_OF -#define CHECKED_PTR_OF(type, p) \ - ((void*) (1 ? p : (type*)0)) -#endif - -/* In C++ we get problems because an explicit cast is needed from (void *) - * we use CHECKED_STACK_OF to ensure the correct type is passed in the macros - * below. - */ - -#define CHECKED_STACK_OF(type, p) \ - ((_STACK*) (1 ? p : (STACK_OF(type)*)0)) - -#define CHECKED_SK_FREE_FUNC(type, p) \ - ((void (*)(void *)) ((1 ? p : (void (*)(type *))0))) - -#define CHECKED_SK_FREE_FUNC2(type, p) \ - ((void (*)(void *)) ((1 ? p : (void (*)(type))0))) - -#define CHECKED_SK_CMP_FUNC(type, p) \ - ((int (*)(const void *, const void *)) \ - ((1 ? p : (int (*)(const type * const *, const type * const *))0))) - -#define STACK_OF(type) struct stack_st_##type -#define PREDECLARE_STACK_OF(type) STACK_OF(type); - -#define DECLARE_STACK_OF(type) \ -STACK_OF(type) \ - { \ - _STACK stack; \ - }; -#define DECLARE_SPECIAL_STACK_OF(type, type2) \ -STACK_OF(type) \ - { \ - _STACK stack; \ - }; - -#define IMPLEMENT_STACK_OF(type) /* nada (obsolete in new safestack approach)*/ - - -/* Strings are special: normally an lhash entry will point to a single - * (somewhat) mutable object. In the case of strings: - * - * a) Instead of a single char, there is an array of chars, NUL-terminated. - * b) The string may have be immutable. - * - * So, they need their own declarations. Especially important for - * type-checking tools, such as Deputy. - * -o * In practice, however, it appears to be hard to have a const - * string. For now, I'm settling for dealing with the fact it is a - * string at all. - */ -typedef char *OPENSSL_STRING; - -typedef const char *OPENSSL_CSTRING; - -/* Confusingly, LHASH_OF(STRING) deals with char ** throughout, but - * STACK_OF(STRING) is really more like STACK_OF(char), only, as - * mentioned above, instead of a single char each entry is a - * NUL-terminated array of chars. So, we have to implement STRING - * specially for STACK_OF. This is dealt with in the autogenerated - * macros below. - */ - -DECLARE_SPECIAL_STACK_OF(OPENSSL_STRING, char) - -/* Similarly, we sometimes use a block of characters, NOT - * nul-terminated. These should also be distinguished from "normal" - * stacks. */ - -typedef void *OPENSSL_BLOCK; -DECLARE_SPECIAL_STACK_OF(OPENSSL_BLOCK, void) - -/* SKM_sk_... stack macros are internal to safestack.h: - * never use them directly, use sk__... instead */ -#define SKM_sk_new(type, cmp) \ - ((STACK_OF(type) *)sk_new(CHECKED_SK_CMP_FUNC(type, cmp))) -#define SKM_sk_new_null(type) \ - ((STACK_OF(type) *)sk_new_null()) -#define SKM_sk_free(type, st) \ - sk_free(CHECKED_STACK_OF(type, st)) -#define SKM_sk_num(type, st) \ - sk_num(CHECKED_STACK_OF(type, st)) -#define SKM_sk_value(type, st,i) \ - ((type *)sk_value(CHECKED_STACK_OF(type, st), i)) -#define SKM_sk_set(type, st,i,val) \ - sk_set(CHECKED_STACK_OF(type, st), i, CHECKED_PTR_OF(type, val)) -#define SKM_sk_zero(type, st) \ - sk_zero(CHECKED_STACK_OF(type, st)) -#define SKM_sk_push(type, st, val) \ - sk_push(CHECKED_STACK_OF(type, st), CHECKED_PTR_OF(type, val)) -#define SKM_sk_unshift(type, st, val) \ - sk_unshift(CHECKED_STACK_OF(type, st), CHECKED_PTR_OF(type, val)) -#define SKM_sk_find(type, st, val) \ - sk_find(CHECKED_STACK_OF(type, st), CHECKED_PTR_OF(type, val)) -#define SKM_sk_find_ex(type, st, val) \ - sk_find_ex(CHECKED_STACK_OF(type, st), \ - CHECKED_PTR_OF(type, val)) -#define SKM_sk_delete(type, st, i) \ - (type *)sk_delete(CHECKED_STACK_OF(type, st), i) -#define SKM_sk_delete_ptr(type, st, ptr) \ - (type *)sk_delete_ptr(CHECKED_STACK_OF(type, st), CHECKED_PTR_OF(type, ptr)) -#define SKM_sk_insert(type, st,val, i) \ - sk_insert(CHECKED_STACK_OF(type, st), CHECKED_PTR_OF(type, val), i) -#define SKM_sk_set_cmp_func(type, st, cmp) \ - ((int (*)(const type * const *,const type * const *)) \ - sk_set_cmp_func(CHECKED_STACK_OF(type, st), CHECKED_SK_CMP_FUNC(type, cmp))) -#define SKM_sk_dup(type, st) \ - (STACK_OF(type) *)sk_dup(CHECKED_STACK_OF(type, st)) -#define SKM_sk_pop_free(type, st, free_func) \ - sk_pop_free(CHECKED_STACK_OF(type, st), CHECKED_SK_FREE_FUNC(type, free_func)) -#define SKM_sk_shift(type, st) \ - (type *)sk_shift(CHECKED_STACK_OF(type, st)) -#define SKM_sk_pop(type, st) \ - (type *)sk_pop(CHECKED_STACK_OF(type, st)) -#define SKM_sk_sort(type, st) \ - sk_sort(CHECKED_STACK_OF(type, st)) -#define SKM_sk_is_sorted(type, st) \ - sk_is_sorted(CHECKED_STACK_OF(type, st)) - -#define SKM_ASN1_SET_OF_d2i(type, st, pp, length, d2i_func, free_func, ex_tag, ex_class) \ - (STACK_OF(type) *)d2i_ASN1_SET( \ - (STACK_OF(OPENSSL_BLOCK) **)CHECKED_PTR_OF(STACK_OF(type)*, st), \ - pp, length, \ - CHECKED_D2I_OF(type, d2i_func), \ - CHECKED_SK_FREE_FUNC(type, free_func), \ - ex_tag, ex_class) - -#define SKM_ASN1_SET_OF_i2d(type, st, pp, i2d_func, ex_tag, ex_class, is_set) \ - i2d_ASN1_SET((STACK_OF(OPENSSL_BLOCK) *)CHECKED_STACK_OF(type, st), pp, \ - CHECKED_I2D_OF(type, i2d_func), \ - ex_tag, ex_class, is_set) - -#define SKM_ASN1_seq_pack(type, st, i2d_func, buf, len) \ - ASN1_seq_pack(CHECKED_PTR_OF(STACK_OF(type), st), \ - CHECKED_I2D_OF(type, i2d_func), buf, len) - -#define SKM_ASN1_seq_unpack(type, buf, len, d2i_func, free_func) \ - (STACK_OF(type) *)ASN1_seq_unpack(buf, len, CHECKED_D2I_OF(type, d2i_func), CHECKED_SK_FREE_FUNC(type, free_func)) - -#define SKM_PKCS12_decrypt_d2i(type, algor, d2i_func, free_func, pass, passlen, oct, seq) \ - (STACK_OF(type) *)PKCS12_decrypt_d2i(algor, \ - CHECKED_D2I_OF(type, d2i_func), \ - CHECKED_SK_FREE_FUNC(type, free_func), \ - pass, passlen, oct, seq) - -/* This block of defines is updated by util/mkstack.pl, please do not touch! */ -#define sk_ACCESS_DESCRIPTION_new(cmp) SKM_sk_new(ACCESS_DESCRIPTION, (cmp)) -#define sk_ACCESS_DESCRIPTION_new_null() SKM_sk_new_null(ACCESS_DESCRIPTION) -#define sk_ACCESS_DESCRIPTION_free(st) SKM_sk_free(ACCESS_DESCRIPTION, (st)) -#define sk_ACCESS_DESCRIPTION_num(st) SKM_sk_num(ACCESS_DESCRIPTION, (st)) -#define sk_ACCESS_DESCRIPTION_value(st, i) SKM_sk_value(ACCESS_DESCRIPTION, (st), (i)) -#define sk_ACCESS_DESCRIPTION_set(st, i, val) SKM_sk_set(ACCESS_DESCRIPTION, (st), (i), (val)) -#define sk_ACCESS_DESCRIPTION_zero(st) SKM_sk_zero(ACCESS_DESCRIPTION, (st)) -#define sk_ACCESS_DESCRIPTION_push(st, val) SKM_sk_push(ACCESS_DESCRIPTION, (st), (val)) -#define sk_ACCESS_DESCRIPTION_unshift(st, val) SKM_sk_unshift(ACCESS_DESCRIPTION, (st), (val)) -#define sk_ACCESS_DESCRIPTION_find(st, val) SKM_sk_find(ACCESS_DESCRIPTION, (st), (val)) -#define sk_ACCESS_DESCRIPTION_find_ex(st, val) SKM_sk_find_ex(ACCESS_DESCRIPTION, (st), (val)) -#define sk_ACCESS_DESCRIPTION_delete(st, i) SKM_sk_delete(ACCESS_DESCRIPTION, (st), (i)) -#define sk_ACCESS_DESCRIPTION_delete_ptr(st, ptr) SKM_sk_delete_ptr(ACCESS_DESCRIPTION, (st), (ptr)) -#define sk_ACCESS_DESCRIPTION_insert(st, val, i) SKM_sk_insert(ACCESS_DESCRIPTION, (st), (val), (i)) -#define sk_ACCESS_DESCRIPTION_set_cmp_func(st, cmp) SKM_sk_set_cmp_func(ACCESS_DESCRIPTION, (st), (cmp)) -#define sk_ACCESS_DESCRIPTION_dup(st) SKM_sk_dup(ACCESS_DESCRIPTION, st) -#define sk_ACCESS_DESCRIPTION_pop_free(st, free_func) SKM_sk_pop_free(ACCESS_DESCRIPTION, (st), (free_func)) -#define sk_ACCESS_DESCRIPTION_shift(st) SKM_sk_shift(ACCESS_DESCRIPTION, (st)) -#define sk_ACCESS_DESCRIPTION_pop(st) SKM_sk_pop(ACCESS_DESCRIPTION, (st)) -#define sk_ACCESS_DESCRIPTION_sort(st) SKM_sk_sort(ACCESS_DESCRIPTION, (st)) -#define sk_ACCESS_DESCRIPTION_is_sorted(st) SKM_sk_is_sorted(ACCESS_DESCRIPTION, (st)) - -#define sk_ASIdOrRange_new(cmp) SKM_sk_new(ASIdOrRange, (cmp)) -#define sk_ASIdOrRange_new_null() SKM_sk_new_null(ASIdOrRange) -#define sk_ASIdOrRange_free(st) SKM_sk_free(ASIdOrRange, (st)) -#define sk_ASIdOrRange_num(st) SKM_sk_num(ASIdOrRange, (st)) -#define sk_ASIdOrRange_value(st, i) SKM_sk_value(ASIdOrRange, (st), (i)) -#define sk_ASIdOrRange_set(st, i, val) SKM_sk_set(ASIdOrRange, (st), (i), (val)) -#define sk_ASIdOrRange_zero(st) SKM_sk_zero(ASIdOrRange, (st)) -#define sk_ASIdOrRange_push(st, val) SKM_sk_push(ASIdOrRange, (st), (val)) -#define sk_ASIdOrRange_unshift(st, val) SKM_sk_unshift(ASIdOrRange, (st), (val)) -#define sk_ASIdOrRange_find(st, val) SKM_sk_find(ASIdOrRange, (st), (val)) -#define sk_ASIdOrRange_find_ex(st, val) SKM_sk_find_ex(ASIdOrRange, (st), (val)) -#define sk_ASIdOrRange_delete(st, i) SKM_sk_delete(ASIdOrRange, (st), (i)) -#define sk_ASIdOrRange_delete_ptr(st, ptr) SKM_sk_delete_ptr(ASIdOrRange, (st), (ptr)) -#define sk_ASIdOrRange_insert(st, val, i) SKM_sk_insert(ASIdOrRange, (st), (val), (i)) -#define sk_ASIdOrRange_set_cmp_func(st, cmp) SKM_sk_set_cmp_func(ASIdOrRange, (st), (cmp)) -#define sk_ASIdOrRange_dup(st) SKM_sk_dup(ASIdOrRange, st) -#define sk_ASIdOrRange_pop_free(st, free_func) SKM_sk_pop_free(ASIdOrRange, (st), (free_func)) -#define sk_ASIdOrRange_shift(st) SKM_sk_shift(ASIdOrRange, (st)) -#define sk_ASIdOrRange_pop(st) SKM_sk_pop(ASIdOrRange, (st)) -#define sk_ASIdOrRange_sort(st) SKM_sk_sort(ASIdOrRange, (st)) -#define sk_ASIdOrRange_is_sorted(st) SKM_sk_is_sorted(ASIdOrRange, (st)) - -#define sk_ASN1_GENERALSTRING_new(cmp) SKM_sk_new(ASN1_GENERALSTRING, (cmp)) -#define sk_ASN1_GENERALSTRING_new_null() SKM_sk_new_null(ASN1_GENERALSTRING) -#define sk_ASN1_GENERALSTRING_free(st) SKM_sk_free(ASN1_GENERALSTRING, (st)) -#define sk_ASN1_GENERALSTRING_num(st) SKM_sk_num(ASN1_GENERALSTRING, (st)) -#define sk_ASN1_GENERALSTRING_value(st, i) SKM_sk_value(ASN1_GENERALSTRING, (st), (i)) -#define sk_ASN1_GENERALSTRING_set(st, i, val) SKM_sk_set(ASN1_GENERALSTRING, (st), (i), (val)) -#define sk_ASN1_GENERALSTRING_zero(st) SKM_sk_zero(ASN1_GENERALSTRING, (st)) -#define sk_ASN1_GENERALSTRING_push(st, val) SKM_sk_push(ASN1_GENERALSTRING, (st), (val)) -#define sk_ASN1_GENERALSTRING_unshift(st, val) SKM_sk_unshift(ASN1_GENERALSTRING, (st), (val)) -#define sk_ASN1_GENERALSTRING_find(st, val) SKM_sk_find(ASN1_GENERALSTRING, (st), (val)) -#define sk_ASN1_GENERALSTRING_find_ex(st, val) SKM_sk_find_ex(ASN1_GENERALSTRING, (st), (val)) -#define sk_ASN1_GENERALSTRING_delete(st, i) SKM_sk_delete(ASN1_GENERALSTRING, (st), (i)) -#define sk_ASN1_GENERALSTRING_delete_ptr(st, ptr) SKM_sk_delete_ptr(ASN1_GENERALSTRING, (st), (ptr)) -#define sk_ASN1_GENERALSTRING_insert(st, val, i) SKM_sk_insert(ASN1_GENERALSTRING, (st), (val), (i)) -#define sk_ASN1_GENERALSTRING_set_cmp_func(st, cmp) SKM_sk_set_cmp_func(ASN1_GENERALSTRING, (st), (cmp)) -#define sk_ASN1_GENERALSTRING_dup(st) SKM_sk_dup(ASN1_GENERALSTRING, st) -#define sk_ASN1_GENERALSTRING_pop_free(st, free_func) SKM_sk_pop_free(ASN1_GENERALSTRING, (st), (free_func)) -#define sk_ASN1_GENERALSTRING_shift(st) SKM_sk_shift(ASN1_GENERALSTRING, (st)) -#define sk_ASN1_GENERALSTRING_pop(st) SKM_sk_pop(ASN1_GENERALSTRING, (st)) -#define sk_ASN1_GENERALSTRING_sort(st) SKM_sk_sort(ASN1_GENERALSTRING, (st)) -#define sk_ASN1_GENERALSTRING_is_sorted(st) SKM_sk_is_sorted(ASN1_GENERALSTRING, (st)) - -#define sk_ASN1_INTEGER_new(cmp) SKM_sk_new(ASN1_INTEGER, (cmp)) -#define sk_ASN1_INTEGER_new_null() SKM_sk_new_null(ASN1_INTEGER) -#define sk_ASN1_INTEGER_free(st) SKM_sk_free(ASN1_INTEGER, (st)) -#define sk_ASN1_INTEGER_num(st) SKM_sk_num(ASN1_INTEGER, (st)) -#define sk_ASN1_INTEGER_value(st, i) SKM_sk_value(ASN1_INTEGER, (st), (i)) -#define sk_ASN1_INTEGER_set(st, i, val) SKM_sk_set(ASN1_INTEGER, (st), (i), (val)) -#define sk_ASN1_INTEGER_zero(st) SKM_sk_zero(ASN1_INTEGER, (st)) -#define sk_ASN1_INTEGER_push(st, val) SKM_sk_push(ASN1_INTEGER, (st), (val)) -#define sk_ASN1_INTEGER_unshift(st, val) SKM_sk_unshift(ASN1_INTEGER, (st), (val)) -#define sk_ASN1_INTEGER_find(st, val) SKM_sk_find(ASN1_INTEGER, (st), (val)) -#define sk_ASN1_INTEGER_find_ex(st, val) SKM_sk_find_ex(ASN1_INTEGER, (st), (val)) -#define sk_ASN1_INTEGER_delete(st, i) SKM_sk_delete(ASN1_INTEGER, (st), (i)) -#define sk_ASN1_INTEGER_delete_ptr(st, ptr) SKM_sk_delete_ptr(ASN1_INTEGER, (st), (ptr)) -#define sk_ASN1_INTEGER_insert(st, val, i) SKM_sk_insert(ASN1_INTEGER, (st), (val), (i)) -#define sk_ASN1_INTEGER_set_cmp_func(st, cmp) SKM_sk_set_cmp_func(ASN1_INTEGER, (st), (cmp)) -#define sk_ASN1_INTEGER_dup(st) SKM_sk_dup(ASN1_INTEGER, st) -#define sk_ASN1_INTEGER_pop_free(st, free_func) SKM_sk_pop_free(ASN1_INTEGER, (st), (free_func)) -#define sk_ASN1_INTEGER_shift(st) SKM_sk_shift(ASN1_INTEGER, (st)) -#define sk_ASN1_INTEGER_pop(st) SKM_sk_pop(ASN1_INTEGER, (st)) -#define sk_ASN1_INTEGER_sort(st) SKM_sk_sort(ASN1_INTEGER, (st)) -#define sk_ASN1_INTEGER_is_sorted(st) SKM_sk_is_sorted(ASN1_INTEGER, (st)) - -#define sk_ASN1_OBJECT_new(cmp) SKM_sk_new(ASN1_OBJECT, (cmp)) -#define sk_ASN1_OBJECT_new_null() SKM_sk_new_null(ASN1_OBJECT) -#define sk_ASN1_OBJECT_free(st) SKM_sk_free(ASN1_OBJECT, (st)) -#define sk_ASN1_OBJECT_num(st) SKM_sk_num(ASN1_OBJECT, (st)) -#define sk_ASN1_OBJECT_value(st, i) SKM_sk_value(ASN1_OBJECT, (st), (i)) -#define sk_ASN1_OBJECT_set(st, i, val) SKM_sk_set(ASN1_OBJECT, (st), (i), (val)) -#define sk_ASN1_OBJECT_zero(st) SKM_sk_zero(ASN1_OBJECT, (st)) -#define sk_ASN1_OBJECT_push(st, val) SKM_sk_push(ASN1_OBJECT, (st), (val)) -#define sk_ASN1_OBJECT_unshift(st, val) SKM_sk_unshift(ASN1_OBJECT, (st), (val)) -#define sk_ASN1_OBJECT_find(st, val) SKM_sk_find(ASN1_OBJECT, (st), (val)) -#define sk_ASN1_OBJECT_find_ex(st, val) SKM_sk_find_ex(ASN1_OBJECT, (st), (val)) -#define sk_ASN1_OBJECT_delete(st, i) SKM_sk_delete(ASN1_OBJECT, (st), (i)) -#define sk_ASN1_OBJECT_delete_ptr(st, ptr) SKM_sk_delete_ptr(ASN1_OBJECT, (st), (ptr)) -#define sk_ASN1_OBJECT_insert(st, val, i) SKM_sk_insert(ASN1_OBJECT, (st), (val), (i)) -#define sk_ASN1_OBJECT_set_cmp_func(st, cmp) SKM_sk_set_cmp_func(ASN1_OBJECT, (st), (cmp)) -#define sk_ASN1_OBJECT_dup(st) SKM_sk_dup(ASN1_OBJECT, st) -#define sk_ASN1_OBJECT_pop_free(st, free_func) SKM_sk_pop_free(ASN1_OBJECT, (st), (free_func)) -#define sk_ASN1_OBJECT_shift(st) SKM_sk_shift(ASN1_OBJECT, (st)) -#define sk_ASN1_OBJECT_pop(st) SKM_sk_pop(ASN1_OBJECT, (st)) -#define sk_ASN1_OBJECT_sort(st) SKM_sk_sort(ASN1_OBJECT, (st)) -#define sk_ASN1_OBJECT_is_sorted(st) SKM_sk_is_sorted(ASN1_OBJECT, (st)) - -#define sk_ASN1_STRING_TABLE_new(cmp) SKM_sk_new(ASN1_STRING_TABLE, (cmp)) -#define sk_ASN1_STRING_TABLE_new_null() SKM_sk_new_null(ASN1_STRING_TABLE) -#define sk_ASN1_STRING_TABLE_free(st) SKM_sk_free(ASN1_STRING_TABLE, (st)) -#define sk_ASN1_STRING_TABLE_num(st) SKM_sk_num(ASN1_STRING_TABLE, (st)) -#define sk_ASN1_STRING_TABLE_value(st, i) SKM_sk_value(ASN1_STRING_TABLE, (st), (i)) -#define sk_ASN1_STRING_TABLE_set(st, i, val) SKM_sk_set(ASN1_STRING_TABLE, (st), (i), (val)) -#define sk_ASN1_STRING_TABLE_zero(st) SKM_sk_zero(ASN1_STRING_TABLE, (st)) -#define sk_ASN1_STRING_TABLE_push(st, val) SKM_sk_push(ASN1_STRING_TABLE, (st), (val)) -#define sk_ASN1_STRING_TABLE_unshift(st, val) SKM_sk_unshift(ASN1_STRING_TABLE, (st), (val)) -#define sk_ASN1_STRING_TABLE_find(st, val) SKM_sk_find(ASN1_STRING_TABLE, (st), (val)) -#define sk_ASN1_STRING_TABLE_find_ex(st, val) SKM_sk_find_ex(ASN1_STRING_TABLE, (st), (val)) -#define sk_ASN1_STRING_TABLE_delete(st, i) SKM_sk_delete(ASN1_STRING_TABLE, (st), (i)) -#define sk_ASN1_STRING_TABLE_delete_ptr(st, ptr) SKM_sk_delete_ptr(ASN1_STRING_TABLE, (st), (ptr)) -#define sk_ASN1_STRING_TABLE_insert(st, val, i) SKM_sk_insert(ASN1_STRING_TABLE, (st), (val), (i)) -#define sk_ASN1_STRING_TABLE_set_cmp_func(st, cmp) SKM_sk_set_cmp_func(ASN1_STRING_TABLE, (st), (cmp)) -#define sk_ASN1_STRING_TABLE_dup(st) SKM_sk_dup(ASN1_STRING_TABLE, st) -#define sk_ASN1_STRING_TABLE_pop_free(st, free_func) SKM_sk_pop_free(ASN1_STRING_TABLE, (st), (free_func)) -#define sk_ASN1_STRING_TABLE_shift(st) SKM_sk_shift(ASN1_STRING_TABLE, (st)) -#define sk_ASN1_STRING_TABLE_pop(st) SKM_sk_pop(ASN1_STRING_TABLE, (st)) -#define sk_ASN1_STRING_TABLE_sort(st) SKM_sk_sort(ASN1_STRING_TABLE, (st)) -#define sk_ASN1_STRING_TABLE_is_sorted(st) SKM_sk_is_sorted(ASN1_STRING_TABLE, (st)) - -#define sk_ASN1_TYPE_new(cmp) SKM_sk_new(ASN1_TYPE, (cmp)) -#define sk_ASN1_TYPE_new_null() SKM_sk_new_null(ASN1_TYPE) -#define sk_ASN1_TYPE_free(st) SKM_sk_free(ASN1_TYPE, (st)) -#define sk_ASN1_TYPE_num(st) SKM_sk_num(ASN1_TYPE, (st)) -#define sk_ASN1_TYPE_value(st, i) SKM_sk_value(ASN1_TYPE, (st), (i)) -#define sk_ASN1_TYPE_set(st, i, val) SKM_sk_set(ASN1_TYPE, (st), (i), (val)) -#define sk_ASN1_TYPE_zero(st) SKM_sk_zero(ASN1_TYPE, (st)) -#define sk_ASN1_TYPE_push(st, val) SKM_sk_push(ASN1_TYPE, (st), (val)) -#define sk_ASN1_TYPE_unshift(st, val) SKM_sk_unshift(ASN1_TYPE, (st), (val)) -#define sk_ASN1_TYPE_find(st, val) SKM_sk_find(ASN1_TYPE, (st), (val)) -#define sk_ASN1_TYPE_find_ex(st, val) SKM_sk_find_ex(ASN1_TYPE, (st), (val)) -#define sk_ASN1_TYPE_delete(st, i) SKM_sk_delete(ASN1_TYPE, (st), (i)) -#define sk_ASN1_TYPE_delete_ptr(st, ptr) SKM_sk_delete_ptr(ASN1_TYPE, (st), (ptr)) -#define sk_ASN1_TYPE_insert(st, val, i) SKM_sk_insert(ASN1_TYPE, (st), (val), (i)) -#define sk_ASN1_TYPE_set_cmp_func(st, cmp) SKM_sk_set_cmp_func(ASN1_TYPE, (st), (cmp)) -#define sk_ASN1_TYPE_dup(st) SKM_sk_dup(ASN1_TYPE, st) -#define sk_ASN1_TYPE_pop_free(st, free_func) SKM_sk_pop_free(ASN1_TYPE, (st), (free_func)) -#define sk_ASN1_TYPE_shift(st) SKM_sk_shift(ASN1_TYPE, (st)) -#define sk_ASN1_TYPE_pop(st) SKM_sk_pop(ASN1_TYPE, (st)) -#define sk_ASN1_TYPE_sort(st) SKM_sk_sort(ASN1_TYPE, (st)) -#define sk_ASN1_TYPE_is_sorted(st) SKM_sk_is_sorted(ASN1_TYPE, (st)) - -#define sk_ASN1_UTF8STRING_new(cmp) SKM_sk_new(ASN1_UTF8STRING, (cmp)) -#define sk_ASN1_UTF8STRING_new_null() SKM_sk_new_null(ASN1_UTF8STRING) -#define sk_ASN1_UTF8STRING_free(st) SKM_sk_free(ASN1_UTF8STRING, (st)) -#define sk_ASN1_UTF8STRING_num(st) SKM_sk_num(ASN1_UTF8STRING, (st)) -#define sk_ASN1_UTF8STRING_value(st, i) SKM_sk_value(ASN1_UTF8STRING, (st), (i)) -#define sk_ASN1_UTF8STRING_set(st, i, val) SKM_sk_set(ASN1_UTF8STRING, (st), (i), (val)) -#define sk_ASN1_UTF8STRING_zero(st) SKM_sk_zero(ASN1_UTF8STRING, (st)) -#define sk_ASN1_UTF8STRING_push(st, val) SKM_sk_push(ASN1_UTF8STRING, (st), (val)) -#define sk_ASN1_UTF8STRING_unshift(st, val) SKM_sk_unshift(ASN1_UTF8STRING, (st), (val)) -#define sk_ASN1_UTF8STRING_find(st, val) SKM_sk_find(ASN1_UTF8STRING, (st), (val)) -#define sk_ASN1_UTF8STRING_find_ex(st, val) SKM_sk_find_ex(ASN1_UTF8STRING, (st), (val)) -#define sk_ASN1_UTF8STRING_delete(st, i) SKM_sk_delete(ASN1_UTF8STRING, (st), (i)) -#define sk_ASN1_UTF8STRING_delete_ptr(st, ptr) SKM_sk_delete_ptr(ASN1_UTF8STRING, (st), (ptr)) -#define sk_ASN1_UTF8STRING_insert(st, val, i) SKM_sk_insert(ASN1_UTF8STRING, (st), (val), (i)) -#define sk_ASN1_UTF8STRING_set_cmp_func(st, cmp) SKM_sk_set_cmp_func(ASN1_UTF8STRING, (st), (cmp)) -#define sk_ASN1_UTF8STRING_dup(st) SKM_sk_dup(ASN1_UTF8STRING, st) -#define sk_ASN1_UTF8STRING_pop_free(st, free_func) SKM_sk_pop_free(ASN1_UTF8STRING, (st), (free_func)) -#define sk_ASN1_UTF8STRING_shift(st) SKM_sk_shift(ASN1_UTF8STRING, (st)) -#define sk_ASN1_UTF8STRING_pop(st) SKM_sk_pop(ASN1_UTF8STRING, (st)) -#define sk_ASN1_UTF8STRING_sort(st) SKM_sk_sort(ASN1_UTF8STRING, (st)) -#define sk_ASN1_UTF8STRING_is_sorted(st) SKM_sk_is_sorted(ASN1_UTF8STRING, (st)) - -#define sk_ASN1_VALUE_new(cmp) SKM_sk_new(ASN1_VALUE, (cmp)) -#define sk_ASN1_VALUE_new_null() SKM_sk_new_null(ASN1_VALUE) -#define sk_ASN1_VALUE_free(st) SKM_sk_free(ASN1_VALUE, (st)) -#define sk_ASN1_VALUE_num(st) SKM_sk_num(ASN1_VALUE, (st)) -#define sk_ASN1_VALUE_value(st, i) SKM_sk_value(ASN1_VALUE, (st), (i)) -#define sk_ASN1_VALUE_set(st, i, val) SKM_sk_set(ASN1_VALUE, (st), (i), (val)) -#define sk_ASN1_VALUE_zero(st) SKM_sk_zero(ASN1_VALUE, (st)) -#define sk_ASN1_VALUE_push(st, val) SKM_sk_push(ASN1_VALUE, (st), (val)) -#define sk_ASN1_VALUE_unshift(st, val) SKM_sk_unshift(ASN1_VALUE, (st), (val)) -#define sk_ASN1_VALUE_find(st, val) SKM_sk_find(ASN1_VALUE, (st), (val)) -#define sk_ASN1_VALUE_find_ex(st, val) SKM_sk_find_ex(ASN1_VALUE, (st), (val)) -#define sk_ASN1_VALUE_delete(st, i) SKM_sk_delete(ASN1_VALUE, (st), (i)) -#define sk_ASN1_VALUE_delete_ptr(st, ptr) SKM_sk_delete_ptr(ASN1_VALUE, (st), (ptr)) -#define sk_ASN1_VALUE_insert(st, val, i) SKM_sk_insert(ASN1_VALUE, (st), (val), (i)) -#define sk_ASN1_VALUE_set_cmp_func(st, cmp) SKM_sk_set_cmp_func(ASN1_VALUE, (st), (cmp)) -#define sk_ASN1_VALUE_dup(st) SKM_sk_dup(ASN1_VALUE, st) -#define sk_ASN1_VALUE_pop_free(st, free_func) SKM_sk_pop_free(ASN1_VALUE, (st), (free_func)) -#define sk_ASN1_VALUE_shift(st) SKM_sk_shift(ASN1_VALUE, (st)) -#define sk_ASN1_VALUE_pop(st) SKM_sk_pop(ASN1_VALUE, (st)) -#define sk_ASN1_VALUE_sort(st) SKM_sk_sort(ASN1_VALUE, (st)) -#define sk_ASN1_VALUE_is_sorted(st) SKM_sk_is_sorted(ASN1_VALUE, (st)) - -#define sk_BIO_new(cmp) SKM_sk_new(BIO, (cmp)) -#define sk_BIO_new_null() SKM_sk_new_null(BIO) -#define sk_BIO_free(st) SKM_sk_free(BIO, (st)) -#define sk_BIO_num(st) SKM_sk_num(BIO, (st)) -#define sk_BIO_value(st, i) SKM_sk_value(BIO, (st), (i)) -#define sk_BIO_set(st, i, val) SKM_sk_set(BIO, (st), (i), (val)) -#define sk_BIO_zero(st) SKM_sk_zero(BIO, (st)) -#define sk_BIO_push(st, val) SKM_sk_push(BIO, (st), (val)) -#define sk_BIO_unshift(st, val) SKM_sk_unshift(BIO, (st), (val)) -#define sk_BIO_find(st, val) SKM_sk_find(BIO, (st), (val)) -#define sk_BIO_find_ex(st, val) SKM_sk_find_ex(BIO, (st), (val)) -#define sk_BIO_delete(st, i) SKM_sk_delete(BIO, (st), (i)) -#define sk_BIO_delete_ptr(st, ptr) SKM_sk_delete_ptr(BIO, (st), (ptr)) -#define sk_BIO_insert(st, val, i) SKM_sk_insert(BIO, (st), (val), (i)) -#define sk_BIO_set_cmp_func(st, cmp) SKM_sk_set_cmp_func(BIO, (st), (cmp)) -#define sk_BIO_dup(st) SKM_sk_dup(BIO, st) -#define sk_BIO_pop_free(st, free_func) SKM_sk_pop_free(BIO, (st), (free_func)) -#define sk_BIO_shift(st) SKM_sk_shift(BIO, (st)) -#define sk_BIO_pop(st) SKM_sk_pop(BIO, (st)) -#define sk_BIO_sort(st) SKM_sk_sort(BIO, (st)) -#define sk_BIO_is_sorted(st) SKM_sk_is_sorted(BIO, (st)) - -#define sk_BY_DIR_ENTRY_new(cmp) SKM_sk_new(BY_DIR_ENTRY, (cmp)) -#define sk_BY_DIR_ENTRY_new_null() SKM_sk_new_null(BY_DIR_ENTRY) -#define sk_BY_DIR_ENTRY_free(st) SKM_sk_free(BY_DIR_ENTRY, (st)) -#define sk_BY_DIR_ENTRY_num(st) SKM_sk_num(BY_DIR_ENTRY, (st)) -#define sk_BY_DIR_ENTRY_value(st, i) SKM_sk_value(BY_DIR_ENTRY, (st), (i)) -#define sk_BY_DIR_ENTRY_set(st, i, val) SKM_sk_set(BY_DIR_ENTRY, (st), (i), (val)) -#define sk_BY_DIR_ENTRY_zero(st) SKM_sk_zero(BY_DIR_ENTRY, (st)) -#define sk_BY_DIR_ENTRY_push(st, val) SKM_sk_push(BY_DIR_ENTRY, (st), (val)) -#define sk_BY_DIR_ENTRY_unshift(st, val) SKM_sk_unshift(BY_DIR_ENTRY, (st), (val)) -#define sk_BY_DIR_ENTRY_find(st, val) SKM_sk_find(BY_DIR_ENTRY, (st), (val)) -#define sk_BY_DIR_ENTRY_find_ex(st, val) SKM_sk_find_ex(BY_DIR_ENTRY, (st), (val)) -#define sk_BY_DIR_ENTRY_delete(st, i) SKM_sk_delete(BY_DIR_ENTRY, (st), (i)) -#define sk_BY_DIR_ENTRY_delete_ptr(st, ptr) SKM_sk_delete_ptr(BY_DIR_ENTRY, (st), (ptr)) -#define sk_BY_DIR_ENTRY_insert(st, val, i) SKM_sk_insert(BY_DIR_ENTRY, (st), (val), (i)) -#define sk_BY_DIR_ENTRY_set_cmp_func(st, cmp) SKM_sk_set_cmp_func(BY_DIR_ENTRY, (st), (cmp)) -#define sk_BY_DIR_ENTRY_dup(st) SKM_sk_dup(BY_DIR_ENTRY, st) -#define sk_BY_DIR_ENTRY_pop_free(st, free_func) SKM_sk_pop_free(BY_DIR_ENTRY, (st), (free_func)) -#define sk_BY_DIR_ENTRY_shift(st) SKM_sk_shift(BY_DIR_ENTRY, (st)) -#define sk_BY_DIR_ENTRY_pop(st) SKM_sk_pop(BY_DIR_ENTRY, (st)) -#define sk_BY_DIR_ENTRY_sort(st) SKM_sk_sort(BY_DIR_ENTRY, (st)) -#define sk_BY_DIR_ENTRY_is_sorted(st) SKM_sk_is_sorted(BY_DIR_ENTRY, (st)) - -#define sk_BY_DIR_HASH_new(cmp) SKM_sk_new(BY_DIR_HASH, (cmp)) -#define sk_BY_DIR_HASH_new_null() SKM_sk_new_null(BY_DIR_HASH) -#define sk_BY_DIR_HASH_free(st) SKM_sk_free(BY_DIR_HASH, (st)) -#define sk_BY_DIR_HASH_num(st) SKM_sk_num(BY_DIR_HASH, (st)) -#define sk_BY_DIR_HASH_value(st, i) SKM_sk_value(BY_DIR_HASH, (st), (i)) -#define sk_BY_DIR_HASH_set(st, i, val) SKM_sk_set(BY_DIR_HASH, (st), (i), (val)) -#define sk_BY_DIR_HASH_zero(st) SKM_sk_zero(BY_DIR_HASH, (st)) -#define sk_BY_DIR_HASH_push(st, val) SKM_sk_push(BY_DIR_HASH, (st), (val)) -#define sk_BY_DIR_HASH_unshift(st, val) SKM_sk_unshift(BY_DIR_HASH, (st), (val)) -#define sk_BY_DIR_HASH_find(st, val) SKM_sk_find(BY_DIR_HASH, (st), (val)) -#define sk_BY_DIR_HASH_find_ex(st, val) SKM_sk_find_ex(BY_DIR_HASH, (st), (val)) -#define sk_BY_DIR_HASH_delete(st, i) SKM_sk_delete(BY_DIR_HASH, (st), (i)) -#define sk_BY_DIR_HASH_delete_ptr(st, ptr) SKM_sk_delete_ptr(BY_DIR_HASH, (st), (ptr)) -#define sk_BY_DIR_HASH_insert(st, val, i) SKM_sk_insert(BY_DIR_HASH, (st), (val), (i)) -#define sk_BY_DIR_HASH_set_cmp_func(st, cmp) SKM_sk_set_cmp_func(BY_DIR_HASH, (st), (cmp)) -#define sk_BY_DIR_HASH_dup(st) SKM_sk_dup(BY_DIR_HASH, st) -#define sk_BY_DIR_HASH_pop_free(st, free_func) SKM_sk_pop_free(BY_DIR_HASH, (st), (free_func)) -#define sk_BY_DIR_HASH_shift(st) SKM_sk_shift(BY_DIR_HASH, (st)) -#define sk_BY_DIR_HASH_pop(st) SKM_sk_pop(BY_DIR_HASH, (st)) -#define sk_BY_DIR_HASH_sort(st) SKM_sk_sort(BY_DIR_HASH, (st)) -#define sk_BY_DIR_HASH_is_sorted(st) SKM_sk_is_sorted(BY_DIR_HASH, (st)) - -#define sk_CMS_CertificateChoices_new(cmp) SKM_sk_new(CMS_CertificateChoices, (cmp)) -#define sk_CMS_CertificateChoices_new_null() SKM_sk_new_null(CMS_CertificateChoices) -#define sk_CMS_CertificateChoices_free(st) SKM_sk_free(CMS_CertificateChoices, (st)) -#define sk_CMS_CertificateChoices_num(st) SKM_sk_num(CMS_CertificateChoices, (st)) -#define sk_CMS_CertificateChoices_value(st, i) SKM_sk_value(CMS_CertificateChoices, (st), (i)) -#define sk_CMS_CertificateChoices_set(st, i, val) SKM_sk_set(CMS_CertificateChoices, (st), (i), (val)) -#define sk_CMS_CertificateChoices_zero(st) SKM_sk_zero(CMS_CertificateChoices, (st)) -#define sk_CMS_CertificateChoices_push(st, val) SKM_sk_push(CMS_CertificateChoices, (st), (val)) -#define sk_CMS_CertificateChoices_unshift(st, val) SKM_sk_unshift(CMS_CertificateChoices, (st), (val)) -#define sk_CMS_CertificateChoices_find(st, val) SKM_sk_find(CMS_CertificateChoices, (st), (val)) -#define sk_CMS_CertificateChoices_find_ex(st, val) SKM_sk_find_ex(CMS_CertificateChoices, (st), (val)) -#define sk_CMS_CertificateChoices_delete(st, i) SKM_sk_delete(CMS_CertificateChoices, (st), (i)) -#define sk_CMS_CertificateChoices_delete_ptr(st, ptr) SKM_sk_delete_ptr(CMS_CertificateChoices, (st), (ptr)) -#define sk_CMS_CertificateChoices_insert(st, val, i) SKM_sk_insert(CMS_CertificateChoices, (st), (val), (i)) -#define sk_CMS_CertificateChoices_set_cmp_func(st, cmp) SKM_sk_set_cmp_func(CMS_CertificateChoices, (st), (cmp)) -#define sk_CMS_CertificateChoices_dup(st) SKM_sk_dup(CMS_CertificateChoices, st) -#define sk_CMS_CertificateChoices_pop_free(st, free_func) SKM_sk_pop_free(CMS_CertificateChoices, (st), (free_func)) -#define sk_CMS_CertificateChoices_shift(st) SKM_sk_shift(CMS_CertificateChoices, (st)) -#define sk_CMS_CertificateChoices_pop(st) SKM_sk_pop(CMS_CertificateChoices, (st)) -#define sk_CMS_CertificateChoices_sort(st) SKM_sk_sort(CMS_CertificateChoices, (st)) -#define sk_CMS_CertificateChoices_is_sorted(st) SKM_sk_is_sorted(CMS_CertificateChoices, (st)) - -#define sk_CMS_RecipientInfo_new(cmp) SKM_sk_new(CMS_RecipientInfo, (cmp)) -#define sk_CMS_RecipientInfo_new_null() SKM_sk_new_null(CMS_RecipientInfo) -#define sk_CMS_RecipientInfo_free(st) SKM_sk_free(CMS_RecipientInfo, (st)) -#define sk_CMS_RecipientInfo_num(st) SKM_sk_num(CMS_RecipientInfo, (st)) -#define sk_CMS_RecipientInfo_value(st, i) SKM_sk_value(CMS_RecipientInfo, (st), (i)) -#define sk_CMS_RecipientInfo_set(st, i, val) SKM_sk_set(CMS_RecipientInfo, (st), (i), (val)) -#define sk_CMS_RecipientInfo_zero(st) SKM_sk_zero(CMS_RecipientInfo, (st)) -#define sk_CMS_RecipientInfo_push(st, val) SKM_sk_push(CMS_RecipientInfo, (st), (val)) -#define sk_CMS_RecipientInfo_unshift(st, val) SKM_sk_unshift(CMS_RecipientInfo, (st), (val)) -#define sk_CMS_RecipientInfo_find(st, val) SKM_sk_find(CMS_RecipientInfo, (st), (val)) -#define sk_CMS_RecipientInfo_find_ex(st, val) SKM_sk_find_ex(CMS_RecipientInfo, (st), (val)) -#define sk_CMS_RecipientInfo_delete(st, i) SKM_sk_delete(CMS_RecipientInfo, (st), (i)) -#define sk_CMS_RecipientInfo_delete_ptr(st, ptr) SKM_sk_delete_ptr(CMS_RecipientInfo, (st), (ptr)) -#define sk_CMS_RecipientInfo_insert(st, val, i) SKM_sk_insert(CMS_RecipientInfo, (st), (val), (i)) -#define sk_CMS_RecipientInfo_set_cmp_func(st, cmp) SKM_sk_set_cmp_func(CMS_RecipientInfo, (st), (cmp)) -#define sk_CMS_RecipientInfo_dup(st) SKM_sk_dup(CMS_RecipientInfo, st) -#define sk_CMS_RecipientInfo_pop_free(st, free_func) SKM_sk_pop_free(CMS_RecipientInfo, (st), (free_func)) -#define sk_CMS_RecipientInfo_shift(st) SKM_sk_shift(CMS_RecipientInfo, (st)) -#define sk_CMS_RecipientInfo_pop(st) SKM_sk_pop(CMS_RecipientInfo, (st)) -#define sk_CMS_RecipientInfo_sort(st) SKM_sk_sort(CMS_RecipientInfo, (st)) -#define sk_CMS_RecipientInfo_is_sorted(st) SKM_sk_is_sorted(CMS_RecipientInfo, (st)) - -#define sk_CMS_RevocationInfoChoice_new(cmp) SKM_sk_new(CMS_RevocationInfoChoice, (cmp)) -#define sk_CMS_RevocationInfoChoice_new_null() SKM_sk_new_null(CMS_RevocationInfoChoice) -#define sk_CMS_RevocationInfoChoice_free(st) SKM_sk_free(CMS_RevocationInfoChoice, (st)) -#define sk_CMS_RevocationInfoChoice_num(st) SKM_sk_num(CMS_RevocationInfoChoice, (st)) -#define sk_CMS_RevocationInfoChoice_value(st, i) SKM_sk_value(CMS_RevocationInfoChoice, (st), (i)) -#define sk_CMS_RevocationInfoChoice_set(st, i, val) SKM_sk_set(CMS_RevocationInfoChoice, (st), (i), (val)) -#define sk_CMS_RevocationInfoChoice_zero(st) SKM_sk_zero(CMS_RevocationInfoChoice, (st)) -#define sk_CMS_RevocationInfoChoice_push(st, val) SKM_sk_push(CMS_RevocationInfoChoice, (st), (val)) -#define sk_CMS_RevocationInfoChoice_unshift(st, val) SKM_sk_unshift(CMS_RevocationInfoChoice, (st), (val)) -#define sk_CMS_RevocationInfoChoice_find(st, val) SKM_sk_find(CMS_RevocationInfoChoice, (st), (val)) -#define sk_CMS_RevocationInfoChoice_find_ex(st, val) SKM_sk_find_ex(CMS_RevocationInfoChoice, (st), (val)) -#define sk_CMS_RevocationInfoChoice_delete(st, i) SKM_sk_delete(CMS_RevocationInfoChoice, (st), (i)) -#define sk_CMS_RevocationInfoChoice_delete_ptr(st, ptr) SKM_sk_delete_ptr(CMS_RevocationInfoChoice, (st), (ptr)) -#define sk_CMS_RevocationInfoChoice_insert(st, val, i) SKM_sk_insert(CMS_RevocationInfoChoice, (st), (val), (i)) -#define sk_CMS_RevocationInfoChoice_set_cmp_func(st, cmp) SKM_sk_set_cmp_func(CMS_RevocationInfoChoice, (st), (cmp)) -#define sk_CMS_RevocationInfoChoice_dup(st) SKM_sk_dup(CMS_RevocationInfoChoice, st) -#define sk_CMS_RevocationInfoChoice_pop_free(st, free_func) SKM_sk_pop_free(CMS_RevocationInfoChoice, (st), (free_func)) -#define sk_CMS_RevocationInfoChoice_shift(st) SKM_sk_shift(CMS_RevocationInfoChoice, (st)) -#define sk_CMS_RevocationInfoChoice_pop(st) SKM_sk_pop(CMS_RevocationInfoChoice, (st)) -#define sk_CMS_RevocationInfoChoice_sort(st) SKM_sk_sort(CMS_RevocationInfoChoice, (st)) -#define sk_CMS_RevocationInfoChoice_is_sorted(st) SKM_sk_is_sorted(CMS_RevocationInfoChoice, (st)) - -#define sk_CMS_SignerInfo_new(cmp) SKM_sk_new(CMS_SignerInfo, (cmp)) -#define sk_CMS_SignerInfo_new_null() SKM_sk_new_null(CMS_SignerInfo) -#define sk_CMS_SignerInfo_free(st) SKM_sk_free(CMS_SignerInfo, (st)) -#define sk_CMS_SignerInfo_num(st) SKM_sk_num(CMS_SignerInfo, (st)) -#define sk_CMS_SignerInfo_value(st, i) SKM_sk_value(CMS_SignerInfo, (st), (i)) -#define sk_CMS_SignerInfo_set(st, i, val) SKM_sk_set(CMS_SignerInfo, (st), (i), (val)) -#define sk_CMS_SignerInfo_zero(st) SKM_sk_zero(CMS_SignerInfo, (st)) -#define sk_CMS_SignerInfo_push(st, val) SKM_sk_push(CMS_SignerInfo, (st), (val)) -#define sk_CMS_SignerInfo_unshift(st, val) SKM_sk_unshift(CMS_SignerInfo, (st), (val)) -#define sk_CMS_SignerInfo_find(st, val) SKM_sk_find(CMS_SignerInfo, (st), (val)) -#define sk_CMS_SignerInfo_find_ex(st, val) SKM_sk_find_ex(CMS_SignerInfo, (st), (val)) -#define sk_CMS_SignerInfo_delete(st, i) SKM_sk_delete(CMS_SignerInfo, (st), (i)) -#define sk_CMS_SignerInfo_delete_ptr(st, ptr) SKM_sk_delete_ptr(CMS_SignerInfo, (st), (ptr)) -#define sk_CMS_SignerInfo_insert(st, val, i) SKM_sk_insert(CMS_SignerInfo, (st), (val), (i)) -#define sk_CMS_SignerInfo_set_cmp_func(st, cmp) SKM_sk_set_cmp_func(CMS_SignerInfo, (st), (cmp)) -#define sk_CMS_SignerInfo_dup(st) SKM_sk_dup(CMS_SignerInfo, st) -#define sk_CMS_SignerInfo_pop_free(st, free_func) SKM_sk_pop_free(CMS_SignerInfo, (st), (free_func)) -#define sk_CMS_SignerInfo_shift(st) SKM_sk_shift(CMS_SignerInfo, (st)) -#define sk_CMS_SignerInfo_pop(st) SKM_sk_pop(CMS_SignerInfo, (st)) -#define sk_CMS_SignerInfo_sort(st) SKM_sk_sort(CMS_SignerInfo, (st)) -#define sk_CMS_SignerInfo_is_sorted(st) SKM_sk_is_sorted(CMS_SignerInfo, (st)) - -#define sk_CONF_IMODULE_new(cmp) SKM_sk_new(CONF_IMODULE, (cmp)) -#define sk_CONF_IMODULE_new_null() SKM_sk_new_null(CONF_IMODULE) -#define sk_CONF_IMODULE_free(st) SKM_sk_free(CONF_IMODULE, (st)) -#define sk_CONF_IMODULE_num(st) SKM_sk_num(CONF_IMODULE, (st)) -#define sk_CONF_IMODULE_value(st, i) SKM_sk_value(CONF_IMODULE, (st), (i)) -#define sk_CONF_IMODULE_set(st, i, val) SKM_sk_set(CONF_IMODULE, (st), (i), (val)) -#define sk_CONF_IMODULE_zero(st) SKM_sk_zero(CONF_IMODULE, (st)) -#define sk_CONF_IMODULE_push(st, val) SKM_sk_push(CONF_IMODULE, (st), (val)) -#define sk_CONF_IMODULE_unshift(st, val) SKM_sk_unshift(CONF_IMODULE, (st), (val)) -#define sk_CONF_IMODULE_find(st, val) SKM_sk_find(CONF_IMODULE, (st), (val)) -#define sk_CONF_IMODULE_find_ex(st, val) SKM_sk_find_ex(CONF_IMODULE, (st), (val)) -#define sk_CONF_IMODULE_delete(st, i) SKM_sk_delete(CONF_IMODULE, (st), (i)) -#define sk_CONF_IMODULE_delete_ptr(st, ptr) SKM_sk_delete_ptr(CONF_IMODULE, (st), (ptr)) -#define sk_CONF_IMODULE_insert(st, val, i) SKM_sk_insert(CONF_IMODULE, (st), (val), (i)) -#define sk_CONF_IMODULE_set_cmp_func(st, cmp) SKM_sk_set_cmp_func(CONF_IMODULE, (st), (cmp)) -#define sk_CONF_IMODULE_dup(st) SKM_sk_dup(CONF_IMODULE, st) -#define sk_CONF_IMODULE_pop_free(st, free_func) SKM_sk_pop_free(CONF_IMODULE, (st), (free_func)) -#define sk_CONF_IMODULE_shift(st) SKM_sk_shift(CONF_IMODULE, (st)) -#define sk_CONF_IMODULE_pop(st) SKM_sk_pop(CONF_IMODULE, (st)) -#define sk_CONF_IMODULE_sort(st) SKM_sk_sort(CONF_IMODULE, (st)) -#define sk_CONF_IMODULE_is_sorted(st) SKM_sk_is_sorted(CONF_IMODULE, (st)) - -#define sk_CONF_MODULE_new(cmp) SKM_sk_new(CONF_MODULE, (cmp)) -#define sk_CONF_MODULE_new_null() SKM_sk_new_null(CONF_MODULE) -#define sk_CONF_MODULE_free(st) SKM_sk_free(CONF_MODULE, (st)) -#define sk_CONF_MODULE_num(st) SKM_sk_num(CONF_MODULE, (st)) -#define sk_CONF_MODULE_value(st, i) SKM_sk_value(CONF_MODULE, (st), (i)) -#define sk_CONF_MODULE_set(st, i, val) SKM_sk_set(CONF_MODULE, (st), (i), (val)) -#define sk_CONF_MODULE_zero(st) SKM_sk_zero(CONF_MODULE, (st)) -#define sk_CONF_MODULE_push(st, val) SKM_sk_push(CONF_MODULE, (st), (val)) -#define sk_CONF_MODULE_unshift(st, val) SKM_sk_unshift(CONF_MODULE, (st), (val)) -#define sk_CONF_MODULE_find(st, val) SKM_sk_find(CONF_MODULE, (st), (val)) -#define sk_CONF_MODULE_find_ex(st, val) SKM_sk_find_ex(CONF_MODULE, (st), (val)) -#define sk_CONF_MODULE_delete(st, i) SKM_sk_delete(CONF_MODULE, (st), (i)) -#define sk_CONF_MODULE_delete_ptr(st, ptr) SKM_sk_delete_ptr(CONF_MODULE, (st), (ptr)) -#define sk_CONF_MODULE_insert(st, val, i) SKM_sk_insert(CONF_MODULE, (st), (val), (i)) -#define sk_CONF_MODULE_set_cmp_func(st, cmp) SKM_sk_set_cmp_func(CONF_MODULE, (st), (cmp)) -#define sk_CONF_MODULE_dup(st) SKM_sk_dup(CONF_MODULE, st) -#define sk_CONF_MODULE_pop_free(st, free_func) SKM_sk_pop_free(CONF_MODULE, (st), (free_func)) -#define sk_CONF_MODULE_shift(st) SKM_sk_shift(CONF_MODULE, (st)) -#define sk_CONF_MODULE_pop(st) SKM_sk_pop(CONF_MODULE, (st)) -#define sk_CONF_MODULE_sort(st) SKM_sk_sort(CONF_MODULE, (st)) -#define sk_CONF_MODULE_is_sorted(st) SKM_sk_is_sorted(CONF_MODULE, (st)) - -#define sk_CONF_VALUE_new(cmp) SKM_sk_new(CONF_VALUE, (cmp)) -#define sk_CONF_VALUE_new_null() SKM_sk_new_null(CONF_VALUE) -#define sk_CONF_VALUE_free(st) SKM_sk_free(CONF_VALUE, (st)) -#define sk_CONF_VALUE_num(st) SKM_sk_num(CONF_VALUE, (st)) -#define sk_CONF_VALUE_value(st, i) SKM_sk_value(CONF_VALUE, (st), (i)) -#define sk_CONF_VALUE_set(st, i, val) SKM_sk_set(CONF_VALUE, (st), (i), (val)) -#define sk_CONF_VALUE_zero(st) SKM_sk_zero(CONF_VALUE, (st)) -#define sk_CONF_VALUE_push(st, val) SKM_sk_push(CONF_VALUE, (st), (val)) -#define sk_CONF_VALUE_unshift(st, val) SKM_sk_unshift(CONF_VALUE, (st), (val)) -#define sk_CONF_VALUE_find(st, val) SKM_sk_find(CONF_VALUE, (st), (val)) -#define sk_CONF_VALUE_find_ex(st, val) SKM_sk_find_ex(CONF_VALUE, (st), (val)) -#define sk_CONF_VALUE_delete(st, i) SKM_sk_delete(CONF_VALUE, (st), (i)) -#define sk_CONF_VALUE_delete_ptr(st, ptr) SKM_sk_delete_ptr(CONF_VALUE, (st), (ptr)) -#define sk_CONF_VALUE_insert(st, val, i) SKM_sk_insert(CONF_VALUE, (st), (val), (i)) -#define sk_CONF_VALUE_set_cmp_func(st, cmp) SKM_sk_set_cmp_func(CONF_VALUE, (st), (cmp)) -#define sk_CONF_VALUE_dup(st) SKM_sk_dup(CONF_VALUE, st) -#define sk_CONF_VALUE_pop_free(st, free_func) SKM_sk_pop_free(CONF_VALUE, (st), (free_func)) -#define sk_CONF_VALUE_shift(st) SKM_sk_shift(CONF_VALUE, (st)) -#define sk_CONF_VALUE_pop(st) SKM_sk_pop(CONF_VALUE, (st)) -#define sk_CONF_VALUE_sort(st) SKM_sk_sort(CONF_VALUE, (st)) -#define sk_CONF_VALUE_is_sorted(st) SKM_sk_is_sorted(CONF_VALUE, (st)) - -#define sk_CRYPTO_EX_DATA_FUNCS_new(cmp) SKM_sk_new(CRYPTO_EX_DATA_FUNCS, (cmp)) -#define sk_CRYPTO_EX_DATA_FUNCS_new_null() SKM_sk_new_null(CRYPTO_EX_DATA_FUNCS) -#define sk_CRYPTO_EX_DATA_FUNCS_free(st) SKM_sk_free(CRYPTO_EX_DATA_FUNCS, (st)) -#define sk_CRYPTO_EX_DATA_FUNCS_num(st) SKM_sk_num(CRYPTO_EX_DATA_FUNCS, (st)) -#define sk_CRYPTO_EX_DATA_FUNCS_value(st, i) SKM_sk_value(CRYPTO_EX_DATA_FUNCS, (st), (i)) -#define sk_CRYPTO_EX_DATA_FUNCS_set(st, i, val) SKM_sk_set(CRYPTO_EX_DATA_FUNCS, (st), (i), (val)) -#define sk_CRYPTO_EX_DATA_FUNCS_zero(st) SKM_sk_zero(CRYPTO_EX_DATA_FUNCS, (st)) -#define sk_CRYPTO_EX_DATA_FUNCS_push(st, val) SKM_sk_push(CRYPTO_EX_DATA_FUNCS, (st), (val)) -#define sk_CRYPTO_EX_DATA_FUNCS_unshift(st, val) SKM_sk_unshift(CRYPTO_EX_DATA_FUNCS, (st), (val)) -#define sk_CRYPTO_EX_DATA_FUNCS_find(st, val) SKM_sk_find(CRYPTO_EX_DATA_FUNCS, (st), (val)) -#define sk_CRYPTO_EX_DATA_FUNCS_find_ex(st, val) SKM_sk_find_ex(CRYPTO_EX_DATA_FUNCS, (st), (val)) -#define sk_CRYPTO_EX_DATA_FUNCS_delete(st, i) SKM_sk_delete(CRYPTO_EX_DATA_FUNCS, (st), (i)) -#define sk_CRYPTO_EX_DATA_FUNCS_delete_ptr(st, ptr) SKM_sk_delete_ptr(CRYPTO_EX_DATA_FUNCS, (st), (ptr)) -#define sk_CRYPTO_EX_DATA_FUNCS_insert(st, val, i) SKM_sk_insert(CRYPTO_EX_DATA_FUNCS, (st), (val), (i)) -#define sk_CRYPTO_EX_DATA_FUNCS_set_cmp_func(st, cmp) SKM_sk_set_cmp_func(CRYPTO_EX_DATA_FUNCS, (st), (cmp)) -#define sk_CRYPTO_EX_DATA_FUNCS_dup(st) SKM_sk_dup(CRYPTO_EX_DATA_FUNCS, st) -#define sk_CRYPTO_EX_DATA_FUNCS_pop_free(st, free_func) SKM_sk_pop_free(CRYPTO_EX_DATA_FUNCS, (st), (free_func)) -#define sk_CRYPTO_EX_DATA_FUNCS_shift(st) SKM_sk_shift(CRYPTO_EX_DATA_FUNCS, (st)) -#define sk_CRYPTO_EX_DATA_FUNCS_pop(st) SKM_sk_pop(CRYPTO_EX_DATA_FUNCS, (st)) -#define sk_CRYPTO_EX_DATA_FUNCS_sort(st) SKM_sk_sort(CRYPTO_EX_DATA_FUNCS, (st)) -#define sk_CRYPTO_EX_DATA_FUNCS_is_sorted(st) SKM_sk_is_sorted(CRYPTO_EX_DATA_FUNCS, (st)) - -#define sk_CRYPTO_dynlock_new(cmp) SKM_sk_new(CRYPTO_dynlock, (cmp)) -#define sk_CRYPTO_dynlock_new_null() SKM_sk_new_null(CRYPTO_dynlock) -#define sk_CRYPTO_dynlock_free(st) SKM_sk_free(CRYPTO_dynlock, (st)) -#define sk_CRYPTO_dynlock_num(st) SKM_sk_num(CRYPTO_dynlock, (st)) -#define sk_CRYPTO_dynlock_value(st, i) SKM_sk_value(CRYPTO_dynlock, (st), (i)) -#define sk_CRYPTO_dynlock_set(st, i, val) SKM_sk_set(CRYPTO_dynlock, (st), (i), (val)) -#define sk_CRYPTO_dynlock_zero(st) SKM_sk_zero(CRYPTO_dynlock, (st)) -#define sk_CRYPTO_dynlock_push(st, val) SKM_sk_push(CRYPTO_dynlock, (st), (val)) -#define sk_CRYPTO_dynlock_unshift(st, val) SKM_sk_unshift(CRYPTO_dynlock, (st), (val)) -#define sk_CRYPTO_dynlock_find(st, val) SKM_sk_find(CRYPTO_dynlock, (st), (val)) -#define sk_CRYPTO_dynlock_find_ex(st, val) SKM_sk_find_ex(CRYPTO_dynlock, (st), (val)) -#define sk_CRYPTO_dynlock_delete(st, i) SKM_sk_delete(CRYPTO_dynlock, (st), (i)) -#define sk_CRYPTO_dynlock_delete_ptr(st, ptr) SKM_sk_delete_ptr(CRYPTO_dynlock, (st), (ptr)) -#define sk_CRYPTO_dynlock_insert(st, val, i) SKM_sk_insert(CRYPTO_dynlock, (st), (val), (i)) -#define sk_CRYPTO_dynlock_set_cmp_func(st, cmp) SKM_sk_set_cmp_func(CRYPTO_dynlock, (st), (cmp)) -#define sk_CRYPTO_dynlock_dup(st) SKM_sk_dup(CRYPTO_dynlock, st) -#define sk_CRYPTO_dynlock_pop_free(st, free_func) SKM_sk_pop_free(CRYPTO_dynlock, (st), (free_func)) -#define sk_CRYPTO_dynlock_shift(st) SKM_sk_shift(CRYPTO_dynlock, (st)) -#define sk_CRYPTO_dynlock_pop(st) SKM_sk_pop(CRYPTO_dynlock, (st)) -#define sk_CRYPTO_dynlock_sort(st) SKM_sk_sort(CRYPTO_dynlock, (st)) -#define sk_CRYPTO_dynlock_is_sorted(st) SKM_sk_is_sorted(CRYPTO_dynlock, (st)) - -#define sk_DIST_POINT_new(cmp) SKM_sk_new(DIST_POINT, (cmp)) -#define sk_DIST_POINT_new_null() SKM_sk_new_null(DIST_POINT) -#define sk_DIST_POINT_free(st) SKM_sk_free(DIST_POINT, (st)) -#define sk_DIST_POINT_num(st) SKM_sk_num(DIST_POINT, (st)) -#define sk_DIST_POINT_value(st, i) SKM_sk_value(DIST_POINT, (st), (i)) -#define sk_DIST_POINT_set(st, i, val) SKM_sk_set(DIST_POINT, (st), (i), (val)) -#define sk_DIST_POINT_zero(st) SKM_sk_zero(DIST_POINT, (st)) -#define sk_DIST_POINT_push(st, val) SKM_sk_push(DIST_POINT, (st), (val)) -#define sk_DIST_POINT_unshift(st, val) SKM_sk_unshift(DIST_POINT, (st), (val)) -#define sk_DIST_POINT_find(st, val) SKM_sk_find(DIST_POINT, (st), (val)) -#define sk_DIST_POINT_find_ex(st, val) SKM_sk_find_ex(DIST_POINT, (st), (val)) -#define sk_DIST_POINT_delete(st, i) SKM_sk_delete(DIST_POINT, (st), (i)) -#define sk_DIST_POINT_delete_ptr(st, ptr) SKM_sk_delete_ptr(DIST_POINT, (st), (ptr)) -#define sk_DIST_POINT_insert(st, val, i) SKM_sk_insert(DIST_POINT, (st), (val), (i)) -#define sk_DIST_POINT_set_cmp_func(st, cmp) SKM_sk_set_cmp_func(DIST_POINT, (st), (cmp)) -#define sk_DIST_POINT_dup(st) SKM_sk_dup(DIST_POINT, st) -#define sk_DIST_POINT_pop_free(st, free_func) SKM_sk_pop_free(DIST_POINT, (st), (free_func)) -#define sk_DIST_POINT_shift(st) SKM_sk_shift(DIST_POINT, (st)) -#define sk_DIST_POINT_pop(st) SKM_sk_pop(DIST_POINT, (st)) -#define sk_DIST_POINT_sort(st) SKM_sk_sort(DIST_POINT, (st)) -#define sk_DIST_POINT_is_sorted(st) SKM_sk_is_sorted(DIST_POINT, (st)) - -#define sk_ENGINE_new(cmp) SKM_sk_new(ENGINE, (cmp)) -#define sk_ENGINE_new_null() SKM_sk_new_null(ENGINE) -#define sk_ENGINE_free(st) SKM_sk_free(ENGINE, (st)) -#define sk_ENGINE_num(st) SKM_sk_num(ENGINE, (st)) -#define sk_ENGINE_value(st, i) SKM_sk_value(ENGINE, (st), (i)) -#define sk_ENGINE_set(st, i, val) SKM_sk_set(ENGINE, (st), (i), (val)) -#define sk_ENGINE_zero(st) SKM_sk_zero(ENGINE, (st)) -#define sk_ENGINE_push(st, val) SKM_sk_push(ENGINE, (st), (val)) -#define sk_ENGINE_unshift(st, val) SKM_sk_unshift(ENGINE, (st), (val)) -#define sk_ENGINE_find(st, val) SKM_sk_find(ENGINE, (st), (val)) -#define sk_ENGINE_find_ex(st, val) SKM_sk_find_ex(ENGINE, (st), (val)) -#define sk_ENGINE_delete(st, i) SKM_sk_delete(ENGINE, (st), (i)) -#define sk_ENGINE_delete_ptr(st, ptr) SKM_sk_delete_ptr(ENGINE, (st), (ptr)) -#define sk_ENGINE_insert(st, val, i) SKM_sk_insert(ENGINE, (st), (val), (i)) -#define sk_ENGINE_set_cmp_func(st, cmp) SKM_sk_set_cmp_func(ENGINE, (st), (cmp)) -#define sk_ENGINE_dup(st) SKM_sk_dup(ENGINE, st) -#define sk_ENGINE_pop_free(st, free_func) SKM_sk_pop_free(ENGINE, (st), (free_func)) -#define sk_ENGINE_shift(st) SKM_sk_shift(ENGINE, (st)) -#define sk_ENGINE_pop(st) SKM_sk_pop(ENGINE, (st)) -#define sk_ENGINE_sort(st) SKM_sk_sort(ENGINE, (st)) -#define sk_ENGINE_is_sorted(st) SKM_sk_is_sorted(ENGINE, (st)) - -#define sk_ENGINE_CLEANUP_ITEM_new(cmp) SKM_sk_new(ENGINE_CLEANUP_ITEM, (cmp)) -#define sk_ENGINE_CLEANUP_ITEM_new_null() SKM_sk_new_null(ENGINE_CLEANUP_ITEM) -#define sk_ENGINE_CLEANUP_ITEM_free(st) SKM_sk_free(ENGINE_CLEANUP_ITEM, (st)) -#define sk_ENGINE_CLEANUP_ITEM_num(st) SKM_sk_num(ENGINE_CLEANUP_ITEM, (st)) -#define sk_ENGINE_CLEANUP_ITEM_value(st, i) SKM_sk_value(ENGINE_CLEANUP_ITEM, (st), (i)) -#define sk_ENGINE_CLEANUP_ITEM_set(st, i, val) SKM_sk_set(ENGINE_CLEANUP_ITEM, (st), (i), (val)) -#define sk_ENGINE_CLEANUP_ITEM_zero(st) SKM_sk_zero(ENGINE_CLEANUP_ITEM, (st)) -#define sk_ENGINE_CLEANUP_ITEM_push(st, val) SKM_sk_push(ENGINE_CLEANUP_ITEM, (st), (val)) -#define sk_ENGINE_CLEANUP_ITEM_unshift(st, val) SKM_sk_unshift(ENGINE_CLEANUP_ITEM, (st), (val)) -#define sk_ENGINE_CLEANUP_ITEM_find(st, val) SKM_sk_find(ENGINE_CLEANUP_ITEM, (st), (val)) -#define sk_ENGINE_CLEANUP_ITEM_find_ex(st, val) SKM_sk_find_ex(ENGINE_CLEANUP_ITEM, (st), (val)) -#define sk_ENGINE_CLEANUP_ITEM_delete(st, i) SKM_sk_delete(ENGINE_CLEANUP_ITEM, (st), (i)) -#define sk_ENGINE_CLEANUP_ITEM_delete_ptr(st, ptr) SKM_sk_delete_ptr(ENGINE_CLEANUP_ITEM, (st), (ptr)) -#define sk_ENGINE_CLEANUP_ITEM_insert(st, val, i) SKM_sk_insert(ENGINE_CLEANUP_ITEM, (st), (val), (i)) -#define sk_ENGINE_CLEANUP_ITEM_set_cmp_func(st, cmp) SKM_sk_set_cmp_func(ENGINE_CLEANUP_ITEM, (st), (cmp)) -#define sk_ENGINE_CLEANUP_ITEM_dup(st) SKM_sk_dup(ENGINE_CLEANUP_ITEM, st) -#define sk_ENGINE_CLEANUP_ITEM_pop_free(st, free_func) SKM_sk_pop_free(ENGINE_CLEANUP_ITEM, (st), (free_func)) -#define sk_ENGINE_CLEANUP_ITEM_shift(st) SKM_sk_shift(ENGINE_CLEANUP_ITEM, (st)) -#define sk_ENGINE_CLEANUP_ITEM_pop(st) SKM_sk_pop(ENGINE_CLEANUP_ITEM, (st)) -#define sk_ENGINE_CLEANUP_ITEM_sort(st) SKM_sk_sort(ENGINE_CLEANUP_ITEM, (st)) -#define sk_ENGINE_CLEANUP_ITEM_is_sorted(st) SKM_sk_is_sorted(ENGINE_CLEANUP_ITEM, (st)) - -#define sk_ESS_CERT_ID_new(cmp) SKM_sk_new(ESS_CERT_ID, (cmp)) -#define sk_ESS_CERT_ID_new_null() SKM_sk_new_null(ESS_CERT_ID) -#define sk_ESS_CERT_ID_free(st) SKM_sk_free(ESS_CERT_ID, (st)) -#define sk_ESS_CERT_ID_num(st) SKM_sk_num(ESS_CERT_ID, (st)) -#define sk_ESS_CERT_ID_value(st, i) SKM_sk_value(ESS_CERT_ID, (st), (i)) -#define sk_ESS_CERT_ID_set(st, i, val) SKM_sk_set(ESS_CERT_ID, (st), (i), (val)) -#define sk_ESS_CERT_ID_zero(st) SKM_sk_zero(ESS_CERT_ID, (st)) -#define sk_ESS_CERT_ID_push(st, val) SKM_sk_push(ESS_CERT_ID, (st), (val)) -#define sk_ESS_CERT_ID_unshift(st, val) SKM_sk_unshift(ESS_CERT_ID, (st), (val)) -#define sk_ESS_CERT_ID_find(st, val) SKM_sk_find(ESS_CERT_ID, (st), (val)) -#define sk_ESS_CERT_ID_find_ex(st, val) SKM_sk_find_ex(ESS_CERT_ID, (st), (val)) -#define sk_ESS_CERT_ID_delete(st, i) SKM_sk_delete(ESS_CERT_ID, (st), (i)) -#define sk_ESS_CERT_ID_delete_ptr(st, ptr) SKM_sk_delete_ptr(ESS_CERT_ID, (st), (ptr)) -#define sk_ESS_CERT_ID_insert(st, val, i) SKM_sk_insert(ESS_CERT_ID, (st), (val), (i)) -#define sk_ESS_CERT_ID_set_cmp_func(st, cmp) SKM_sk_set_cmp_func(ESS_CERT_ID, (st), (cmp)) -#define sk_ESS_CERT_ID_dup(st) SKM_sk_dup(ESS_CERT_ID, st) -#define sk_ESS_CERT_ID_pop_free(st, free_func) SKM_sk_pop_free(ESS_CERT_ID, (st), (free_func)) -#define sk_ESS_CERT_ID_shift(st) SKM_sk_shift(ESS_CERT_ID, (st)) -#define sk_ESS_CERT_ID_pop(st) SKM_sk_pop(ESS_CERT_ID, (st)) -#define sk_ESS_CERT_ID_sort(st) SKM_sk_sort(ESS_CERT_ID, (st)) -#define sk_ESS_CERT_ID_is_sorted(st) SKM_sk_is_sorted(ESS_CERT_ID, (st)) - -#define sk_EVP_MD_new(cmp) SKM_sk_new(EVP_MD, (cmp)) -#define sk_EVP_MD_new_null() SKM_sk_new_null(EVP_MD) -#define sk_EVP_MD_free(st) SKM_sk_free(EVP_MD, (st)) -#define sk_EVP_MD_num(st) SKM_sk_num(EVP_MD, (st)) -#define sk_EVP_MD_value(st, i) SKM_sk_value(EVP_MD, (st), (i)) -#define sk_EVP_MD_set(st, i, val) SKM_sk_set(EVP_MD, (st), (i), (val)) -#define sk_EVP_MD_zero(st) SKM_sk_zero(EVP_MD, (st)) -#define sk_EVP_MD_push(st, val) SKM_sk_push(EVP_MD, (st), (val)) -#define sk_EVP_MD_unshift(st, val) SKM_sk_unshift(EVP_MD, (st), (val)) -#define sk_EVP_MD_find(st, val) SKM_sk_find(EVP_MD, (st), (val)) -#define sk_EVP_MD_find_ex(st, val) SKM_sk_find_ex(EVP_MD, (st), (val)) -#define sk_EVP_MD_delete(st, i) SKM_sk_delete(EVP_MD, (st), (i)) -#define sk_EVP_MD_delete_ptr(st, ptr) SKM_sk_delete_ptr(EVP_MD, (st), (ptr)) -#define sk_EVP_MD_insert(st, val, i) SKM_sk_insert(EVP_MD, (st), (val), (i)) -#define sk_EVP_MD_set_cmp_func(st, cmp) SKM_sk_set_cmp_func(EVP_MD, (st), (cmp)) -#define sk_EVP_MD_dup(st) SKM_sk_dup(EVP_MD, st) -#define sk_EVP_MD_pop_free(st, free_func) SKM_sk_pop_free(EVP_MD, (st), (free_func)) -#define sk_EVP_MD_shift(st) SKM_sk_shift(EVP_MD, (st)) -#define sk_EVP_MD_pop(st) SKM_sk_pop(EVP_MD, (st)) -#define sk_EVP_MD_sort(st) SKM_sk_sort(EVP_MD, (st)) -#define sk_EVP_MD_is_sorted(st) SKM_sk_is_sorted(EVP_MD, (st)) - -#define sk_EVP_PBE_CTL_new(cmp) SKM_sk_new(EVP_PBE_CTL, (cmp)) -#define sk_EVP_PBE_CTL_new_null() SKM_sk_new_null(EVP_PBE_CTL) -#define sk_EVP_PBE_CTL_free(st) SKM_sk_free(EVP_PBE_CTL, (st)) -#define sk_EVP_PBE_CTL_num(st) SKM_sk_num(EVP_PBE_CTL, (st)) -#define sk_EVP_PBE_CTL_value(st, i) SKM_sk_value(EVP_PBE_CTL, (st), (i)) -#define sk_EVP_PBE_CTL_set(st, i, val) SKM_sk_set(EVP_PBE_CTL, (st), (i), (val)) -#define sk_EVP_PBE_CTL_zero(st) SKM_sk_zero(EVP_PBE_CTL, (st)) -#define sk_EVP_PBE_CTL_push(st, val) SKM_sk_push(EVP_PBE_CTL, (st), (val)) -#define sk_EVP_PBE_CTL_unshift(st, val) SKM_sk_unshift(EVP_PBE_CTL, (st), (val)) -#define sk_EVP_PBE_CTL_find(st, val) SKM_sk_find(EVP_PBE_CTL, (st), (val)) -#define sk_EVP_PBE_CTL_find_ex(st, val) SKM_sk_find_ex(EVP_PBE_CTL, (st), (val)) -#define sk_EVP_PBE_CTL_delete(st, i) SKM_sk_delete(EVP_PBE_CTL, (st), (i)) -#define sk_EVP_PBE_CTL_delete_ptr(st, ptr) SKM_sk_delete_ptr(EVP_PBE_CTL, (st), (ptr)) -#define sk_EVP_PBE_CTL_insert(st, val, i) SKM_sk_insert(EVP_PBE_CTL, (st), (val), (i)) -#define sk_EVP_PBE_CTL_set_cmp_func(st, cmp) SKM_sk_set_cmp_func(EVP_PBE_CTL, (st), (cmp)) -#define sk_EVP_PBE_CTL_dup(st) SKM_sk_dup(EVP_PBE_CTL, st) -#define sk_EVP_PBE_CTL_pop_free(st, free_func) SKM_sk_pop_free(EVP_PBE_CTL, (st), (free_func)) -#define sk_EVP_PBE_CTL_shift(st) SKM_sk_shift(EVP_PBE_CTL, (st)) -#define sk_EVP_PBE_CTL_pop(st) SKM_sk_pop(EVP_PBE_CTL, (st)) -#define sk_EVP_PBE_CTL_sort(st) SKM_sk_sort(EVP_PBE_CTL, (st)) -#define sk_EVP_PBE_CTL_is_sorted(st) SKM_sk_is_sorted(EVP_PBE_CTL, (st)) - -#define sk_EVP_PKEY_ASN1_METHOD_new(cmp) SKM_sk_new(EVP_PKEY_ASN1_METHOD, (cmp)) -#define sk_EVP_PKEY_ASN1_METHOD_new_null() SKM_sk_new_null(EVP_PKEY_ASN1_METHOD) -#define sk_EVP_PKEY_ASN1_METHOD_free(st) SKM_sk_free(EVP_PKEY_ASN1_METHOD, (st)) -#define sk_EVP_PKEY_ASN1_METHOD_num(st) SKM_sk_num(EVP_PKEY_ASN1_METHOD, (st)) -#define sk_EVP_PKEY_ASN1_METHOD_value(st, i) SKM_sk_value(EVP_PKEY_ASN1_METHOD, (st), (i)) -#define sk_EVP_PKEY_ASN1_METHOD_set(st, i, val) SKM_sk_set(EVP_PKEY_ASN1_METHOD, (st), (i), (val)) -#define sk_EVP_PKEY_ASN1_METHOD_zero(st) SKM_sk_zero(EVP_PKEY_ASN1_METHOD, (st)) -#define sk_EVP_PKEY_ASN1_METHOD_push(st, val) SKM_sk_push(EVP_PKEY_ASN1_METHOD, (st), (val)) -#define sk_EVP_PKEY_ASN1_METHOD_unshift(st, val) SKM_sk_unshift(EVP_PKEY_ASN1_METHOD, (st), (val)) -#define sk_EVP_PKEY_ASN1_METHOD_find(st, val) SKM_sk_find(EVP_PKEY_ASN1_METHOD, (st), (val)) -#define sk_EVP_PKEY_ASN1_METHOD_find_ex(st, val) SKM_sk_find_ex(EVP_PKEY_ASN1_METHOD, (st), (val)) -#define sk_EVP_PKEY_ASN1_METHOD_delete(st, i) SKM_sk_delete(EVP_PKEY_ASN1_METHOD, (st), (i)) -#define sk_EVP_PKEY_ASN1_METHOD_delete_ptr(st, ptr) SKM_sk_delete_ptr(EVP_PKEY_ASN1_METHOD, (st), (ptr)) -#define sk_EVP_PKEY_ASN1_METHOD_insert(st, val, i) SKM_sk_insert(EVP_PKEY_ASN1_METHOD, (st), (val), (i)) -#define sk_EVP_PKEY_ASN1_METHOD_set_cmp_func(st, cmp) SKM_sk_set_cmp_func(EVP_PKEY_ASN1_METHOD, (st), (cmp)) -#define sk_EVP_PKEY_ASN1_METHOD_dup(st) SKM_sk_dup(EVP_PKEY_ASN1_METHOD, st) -#define sk_EVP_PKEY_ASN1_METHOD_pop_free(st, free_func) SKM_sk_pop_free(EVP_PKEY_ASN1_METHOD, (st), (free_func)) -#define sk_EVP_PKEY_ASN1_METHOD_shift(st) SKM_sk_shift(EVP_PKEY_ASN1_METHOD, (st)) -#define sk_EVP_PKEY_ASN1_METHOD_pop(st) SKM_sk_pop(EVP_PKEY_ASN1_METHOD, (st)) -#define sk_EVP_PKEY_ASN1_METHOD_sort(st) SKM_sk_sort(EVP_PKEY_ASN1_METHOD, (st)) -#define sk_EVP_PKEY_ASN1_METHOD_is_sorted(st) SKM_sk_is_sorted(EVP_PKEY_ASN1_METHOD, (st)) - -#define sk_EVP_PKEY_METHOD_new(cmp) SKM_sk_new(EVP_PKEY_METHOD, (cmp)) -#define sk_EVP_PKEY_METHOD_new_null() SKM_sk_new_null(EVP_PKEY_METHOD) -#define sk_EVP_PKEY_METHOD_free(st) SKM_sk_free(EVP_PKEY_METHOD, (st)) -#define sk_EVP_PKEY_METHOD_num(st) SKM_sk_num(EVP_PKEY_METHOD, (st)) -#define sk_EVP_PKEY_METHOD_value(st, i) SKM_sk_value(EVP_PKEY_METHOD, (st), (i)) -#define sk_EVP_PKEY_METHOD_set(st, i, val) SKM_sk_set(EVP_PKEY_METHOD, (st), (i), (val)) -#define sk_EVP_PKEY_METHOD_zero(st) SKM_sk_zero(EVP_PKEY_METHOD, (st)) -#define sk_EVP_PKEY_METHOD_push(st, val) SKM_sk_push(EVP_PKEY_METHOD, (st), (val)) -#define sk_EVP_PKEY_METHOD_unshift(st, val) SKM_sk_unshift(EVP_PKEY_METHOD, (st), (val)) -#define sk_EVP_PKEY_METHOD_find(st, val) SKM_sk_find(EVP_PKEY_METHOD, (st), (val)) -#define sk_EVP_PKEY_METHOD_find_ex(st, val) SKM_sk_find_ex(EVP_PKEY_METHOD, (st), (val)) -#define sk_EVP_PKEY_METHOD_delete(st, i) SKM_sk_delete(EVP_PKEY_METHOD, (st), (i)) -#define sk_EVP_PKEY_METHOD_delete_ptr(st, ptr) SKM_sk_delete_ptr(EVP_PKEY_METHOD, (st), (ptr)) -#define sk_EVP_PKEY_METHOD_insert(st, val, i) SKM_sk_insert(EVP_PKEY_METHOD, (st), (val), (i)) -#define sk_EVP_PKEY_METHOD_set_cmp_func(st, cmp) SKM_sk_set_cmp_func(EVP_PKEY_METHOD, (st), (cmp)) -#define sk_EVP_PKEY_METHOD_dup(st) SKM_sk_dup(EVP_PKEY_METHOD, st) -#define sk_EVP_PKEY_METHOD_pop_free(st, free_func) SKM_sk_pop_free(EVP_PKEY_METHOD, (st), (free_func)) -#define sk_EVP_PKEY_METHOD_shift(st) SKM_sk_shift(EVP_PKEY_METHOD, (st)) -#define sk_EVP_PKEY_METHOD_pop(st) SKM_sk_pop(EVP_PKEY_METHOD, (st)) -#define sk_EVP_PKEY_METHOD_sort(st) SKM_sk_sort(EVP_PKEY_METHOD, (st)) -#define sk_EVP_PKEY_METHOD_is_sorted(st) SKM_sk_is_sorted(EVP_PKEY_METHOD, (st)) - -#define sk_GENERAL_NAME_new(cmp) SKM_sk_new(GENERAL_NAME, (cmp)) -#define sk_GENERAL_NAME_new_null() SKM_sk_new_null(GENERAL_NAME) -#define sk_GENERAL_NAME_free(st) SKM_sk_free(GENERAL_NAME, (st)) -#define sk_GENERAL_NAME_num(st) SKM_sk_num(GENERAL_NAME, (st)) -#define sk_GENERAL_NAME_value(st, i) SKM_sk_value(GENERAL_NAME, (st), (i)) -#define sk_GENERAL_NAME_set(st, i, val) SKM_sk_set(GENERAL_NAME, (st), (i), (val)) -#define sk_GENERAL_NAME_zero(st) SKM_sk_zero(GENERAL_NAME, (st)) -#define sk_GENERAL_NAME_push(st, val) SKM_sk_push(GENERAL_NAME, (st), (val)) -#define sk_GENERAL_NAME_unshift(st, val) SKM_sk_unshift(GENERAL_NAME, (st), (val)) -#define sk_GENERAL_NAME_find(st, val) SKM_sk_find(GENERAL_NAME, (st), (val)) -#define sk_GENERAL_NAME_find_ex(st, val) SKM_sk_find_ex(GENERAL_NAME, (st), (val)) -#define sk_GENERAL_NAME_delete(st, i) SKM_sk_delete(GENERAL_NAME, (st), (i)) -#define sk_GENERAL_NAME_delete_ptr(st, ptr) SKM_sk_delete_ptr(GENERAL_NAME, (st), (ptr)) -#define sk_GENERAL_NAME_insert(st, val, i) SKM_sk_insert(GENERAL_NAME, (st), (val), (i)) -#define sk_GENERAL_NAME_set_cmp_func(st, cmp) SKM_sk_set_cmp_func(GENERAL_NAME, (st), (cmp)) -#define sk_GENERAL_NAME_dup(st) SKM_sk_dup(GENERAL_NAME, st) -#define sk_GENERAL_NAME_pop_free(st, free_func) SKM_sk_pop_free(GENERAL_NAME, (st), (free_func)) -#define sk_GENERAL_NAME_shift(st) SKM_sk_shift(GENERAL_NAME, (st)) -#define sk_GENERAL_NAME_pop(st) SKM_sk_pop(GENERAL_NAME, (st)) -#define sk_GENERAL_NAME_sort(st) SKM_sk_sort(GENERAL_NAME, (st)) -#define sk_GENERAL_NAME_is_sorted(st) SKM_sk_is_sorted(GENERAL_NAME, (st)) - -#define sk_GENERAL_NAMES_new(cmp) SKM_sk_new(GENERAL_NAMES, (cmp)) -#define sk_GENERAL_NAMES_new_null() SKM_sk_new_null(GENERAL_NAMES) -#define sk_GENERAL_NAMES_free(st) SKM_sk_free(GENERAL_NAMES, (st)) -#define sk_GENERAL_NAMES_num(st) SKM_sk_num(GENERAL_NAMES, (st)) -#define sk_GENERAL_NAMES_value(st, i) SKM_sk_value(GENERAL_NAMES, (st), (i)) -#define sk_GENERAL_NAMES_set(st, i, val) SKM_sk_set(GENERAL_NAMES, (st), (i), (val)) -#define sk_GENERAL_NAMES_zero(st) SKM_sk_zero(GENERAL_NAMES, (st)) -#define sk_GENERAL_NAMES_push(st, val) SKM_sk_push(GENERAL_NAMES, (st), (val)) -#define sk_GENERAL_NAMES_unshift(st, val) SKM_sk_unshift(GENERAL_NAMES, (st), (val)) -#define sk_GENERAL_NAMES_find(st, val) SKM_sk_find(GENERAL_NAMES, (st), (val)) -#define sk_GENERAL_NAMES_find_ex(st, val) SKM_sk_find_ex(GENERAL_NAMES, (st), (val)) -#define sk_GENERAL_NAMES_delete(st, i) SKM_sk_delete(GENERAL_NAMES, (st), (i)) -#define sk_GENERAL_NAMES_delete_ptr(st, ptr) SKM_sk_delete_ptr(GENERAL_NAMES, (st), (ptr)) -#define sk_GENERAL_NAMES_insert(st, val, i) SKM_sk_insert(GENERAL_NAMES, (st), (val), (i)) -#define sk_GENERAL_NAMES_set_cmp_func(st, cmp) SKM_sk_set_cmp_func(GENERAL_NAMES, (st), (cmp)) -#define sk_GENERAL_NAMES_dup(st) SKM_sk_dup(GENERAL_NAMES, st) -#define sk_GENERAL_NAMES_pop_free(st, free_func) SKM_sk_pop_free(GENERAL_NAMES, (st), (free_func)) -#define sk_GENERAL_NAMES_shift(st) SKM_sk_shift(GENERAL_NAMES, (st)) -#define sk_GENERAL_NAMES_pop(st) SKM_sk_pop(GENERAL_NAMES, (st)) -#define sk_GENERAL_NAMES_sort(st) SKM_sk_sort(GENERAL_NAMES, (st)) -#define sk_GENERAL_NAMES_is_sorted(st) SKM_sk_is_sorted(GENERAL_NAMES, (st)) - -#define sk_GENERAL_SUBTREE_new(cmp) SKM_sk_new(GENERAL_SUBTREE, (cmp)) -#define sk_GENERAL_SUBTREE_new_null() SKM_sk_new_null(GENERAL_SUBTREE) -#define sk_GENERAL_SUBTREE_free(st) SKM_sk_free(GENERAL_SUBTREE, (st)) -#define sk_GENERAL_SUBTREE_num(st) SKM_sk_num(GENERAL_SUBTREE, (st)) -#define sk_GENERAL_SUBTREE_value(st, i) SKM_sk_value(GENERAL_SUBTREE, (st), (i)) -#define sk_GENERAL_SUBTREE_set(st, i, val) SKM_sk_set(GENERAL_SUBTREE, (st), (i), (val)) -#define sk_GENERAL_SUBTREE_zero(st) SKM_sk_zero(GENERAL_SUBTREE, (st)) -#define sk_GENERAL_SUBTREE_push(st, val) SKM_sk_push(GENERAL_SUBTREE, (st), (val)) -#define sk_GENERAL_SUBTREE_unshift(st, val) SKM_sk_unshift(GENERAL_SUBTREE, (st), (val)) -#define sk_GENERAL_SUBTREE_find(st, val) SKM_sk_find(GENERAL_SUBTREE, (st), (val)) -#define sk_GENERAL_SUBTREE_find_ex(st, val) SKM_sk_find_ex(GENERAL_SUBTREE, (st), (val)) -#define sk_GENERAL_SUBTREE_delete(st, i) SKM_sk_delete(GENERAL_SUBTREE, (st), (i)) -#define sk_GENERAL_SUBTREE_delete_ptr(st, ptr) SKM_sk_delete_ptr(GENERAL_SUBTREE, (st), (ptr)) -#define sk_GENERAL_SUBTREE_insert(st, val, i) SKM_sk_insert(GENERAL_SUBTREE, (st), (val), (i)) -#define sk_GENERAL_SUBTREE_set_cmp_func(st, cmp) SKM_sk_set_cmp_func(GENERAL_SUBTREE, (st), (cmp)) -#define sk_GENERAL_SUBTREE_dup(st) SKM_sk_dup(GENERAL_SUBTREE, st) -#define sk_GENERAL_SUBTREE_pop_free(st, free_func) SKM_sk_pop_free(GENERAL_SUBTREE, (st), (free_func)) -#define sk_GENERAL_SUBTREE_shift(st) SKM_sk_shift(GENERAL_SUBTREE, (st)) -#define sk_GENERAL_SUBTREE_pop(st) SKM_sk_pop(GENERAL_SUBTREE, (st)) -#define sk_GENERAL_SUBTREE_sort(st) SKM_sk_sort(GENERAL_SUBTREE, (st)) -#define sk_GENERAL_SUBTREE_is_sorted(st) SKM_sk_is_sorted(GENERAL_SUBTREE, (st)) - -#define sk_IPAddressFamily_new(cmp) SKM_sk_new(IPAddressFamily, (cmp)) -#define sk_IPAddressFamily_new_null() SKM_sk_new_null(IPAddressFamily) -#define sk_IPAddressFamily_free(st) SKM_sk_free(IPAddressFamily, (st)) -#define sk_IPAddressFamily_num(st) SKM_sk_num(IPAddressFamily, (st)) -#define sk_IPAddressFamily_value(st, i) SKM_sk_value(IPAddressFamily, (st), (i)) -#define sk_IPAddressFamily_set(st, i, val) SKM_sk_set(IPAddressFamily, (st), (i), (val)) -#define sk_IPAddressFamily_zero(st) SKM_sk_zero(IPAddressFamily, (st)) -#define sk_IPAddressFamily_push(st, val) SKM_sk_push(IPAddressFamily, (st), (val)) -#define sk_IPAddressFamily_unshift(st, val) SKM_sk_unshift(IPAddressFamily, (st), (val)) -#define sk_IPAddressFamily_find(st, val) SKM_sk_find(IPAddressFamily, (st), (val)) -#define sk_IPAddressFamily_find_ex(st, val) SKM_sk_find_ex(IPAddressFamily, (st), (val)) -#define sk_IPAddressFamily_delete(st, i) SKM_sk_delete(IPAddressFamily, (st), (i)) -#define sk_IPAddressFamily_delete_ptr(st, ptr) SKM_sk_delete_ptr(IPAddressFamily, (st), (ptr)) -#define sk_IPAddressFamily_insert(st, val, i) SKM_sk_insert(IPAddressFamily, (st), (val), (i)) -#define sk_IPAddressFamily_set_cmp_func(st, cmp) SKM_sk_set_cmp_func(IPAddressFamily, (st), (cmp)) -#define sk_IPAddressFamily_dup(st) SKM_sk_dup(IPAddressFamily, st) -#define sk_IPAddressFamily_pop_free(st, free_func) SKM_sk_pop_free(IPAddressFamily, (st), (free_func)) -#define sk_IPAddressFamily_shift(st) SKM_sk_shift(IPAddressFamily, (st)) -#define sk_IPAddressFamily_pop(st) SKM_sk_pop(IPAddressFamily, (st)) -#define sk_IPAddressFamily_sort(st) SKM_sk_sort(IPAddressFamily, (st)) -#define sk_IPAddressFamily_is_sorted(st) SKM_sk_is_sorted(IPAddressFamily, (st)) - -#define sk_IPAddressOrRange_new(cmp) SKM_sk_new(IPAddressOrRange, (cmp)) -#define sk_IPAddressOrRange_new_null() SKM_sk_new_null(IPAddressOrRange) -#define sk_IPAddressOrRange_free(st) SKM_sk_free(IPAddressOrRange, (st)) -#define sk_IPAddressOrRange_num(st) SKM_sk_num(IPAddressOrRange, (st)) -#define sk_IPAddressOrRange_value(st, i) SKM_sk_value(IPAddressOrRange, (st), (i)) -#define sk_IPAddressOrRange_set(st, i, val) SKM_sk_set(IPAddressOrRange, (st), (i), (val)) -#define sk_IPAddressOrRange_zero(st) SKM_sk_zero(IPAddressOrRange, (st)) -#define sk_IPAddressOrRange_push(st, val) SKM_sk_push(IPAddressOrRange, (st), (val)) -#define sk_IPAddressOrRange_unshift(st, val) SKM_sk_unshift(IPAddressOrRange, (st), (val)) -#define sk_IPAddressOrRange_find(st, val) SKM_sk_find(IPAddressOrRange, (st), (val)) -#define sk_IPAddressOrRange_find_ex(st, val) SKM_sk_find_ex(IPAddressOrRange, (st), (val)) -#define sk_IPAddressOrRange_delete(st, i) SKM_sk_delete(IPAddressOrRange, (st), (i)) -#define sk_IPAddressOrRange_delete_ptr(st, ptr) SKM_sk_delete_ptr(IPAddressOrRange, (st), (ptr)) -#define sk_IPAddressOrRange_insert(st, val, i) SKM_sk_insert(IPAddressOrRange, (st), (val), (i)) -#define sk_IPAddressOrRange_set_cmp_func(st, cmp) SKM_sk_set_cmp_func(IPAddressOrRange, (st), (cmp)) -#define sk_IPAddressOrRange_dup(st) SKM_sk_dup(IPAddressOrRange, st) -#define sk_IPAddressOrRange_pop_free(st, free_func) SKM_sk_pop_free(IPAddressOrRange, (st), (free_func)) -#define sk_IPAddressOrRange_shift(st) SKM_sk_shift(IPAddressOrRange, (st)) -#define sk_IPAddressOrRange_pop(st) SKM_sk_pop(IPAddressOrRange, (st)) -#define sk_IPAddressOrRange_sort(st) SKM_sk_sort(IPAddressOrRange, (st)) -#define sk_IPAddressOrRange_is_sorted(st) SKM_sk_is_sorted(IPAddressOrRange, (st)) - -#define sk_KRB5_APREQBODY_new(cmp) SKM_sk_new(KRB5_APREQBODY, (cmp)) -#define sk_KRB5_APREQBODY_new_null() SKM_sk_new_null(KRB5_APREQBODY) -#define sk_KRB5_APREQBODY_free(st) SKM_sk_free(KRB5_APREQBODY, (st)) -#define sk_KRB5_APREQBODY_num(st) SKM_sk_num(KRB5_APREQBODY, (st)) -#define sk_KRB5_APREQBODY_value(st, i) SKM_sk_value(KRB5_APREQBODY, (st), (i)) -#define sk_KRB5_APREQBODY_set(st, i, val) SKM_sk_set(KRB5_APREQBODY, (st), (i), (val)) -#define sk_KRB5_APREQBODY_zero(st) SKM_sk_zero(KRB5_APREQBODY, (st)) -#define sk_KRB5_APREQBODY_push(st, val) SKM_sk_push(KRB5_APREQBODY, (st), (val)) -#define sk_KRB5_APREQBODY_unshift(st, val) SKM_sk_unshift(KRB5_APREQBODY, (st), (val)) -#define sk_KRB5_APREQBODY_find(st, val) SKM_sk_find(KRB5_APREQBODY, (st), (val)) -#define sk_KRB5_APREQBODY_find_ex(st, val) SKM_sk_find_ex(KRB5_APREQBODY, (st), (val)) -#define sk_KRB5_APREQBODY_delete(st, i) SKM_sk_delete(KRB5_APREQBODY, (st), (i)) -#define sk_KRB5_APREQBODY_delete_ptr(st, ptr) SKM_sk_delete_ptr(KRB5_APREQBODY, (st), (ptr)) -#define sk_KRB5_APREQBODY_insert(st, val, i) SKM_sk_insert(KRB5_APREQBODY, (st), (val), (i)) -#define sk_KRB5_APREQBODY_set_cmp_func(st, cmp) SKM_sk_set_cmp_func(KRB5_APREQBODY, (st), (cmp)) -#define sk_KRB5_APREQBODY_dup(st) SKM_sk_dup(KRB5_APREQBODY, st) -#define sk_KRB5_APREQBODY_pop_free(st, free_func) SKM_sk_pop_free(KRB5_APREQBODY, (st), (free_func)) -#define sk_KRB5_APREQBODY_shift(st) SKM_sk_shift(KRB5_APREQBODY, (st)) -#define sk_KRB5_APREQBODY_pop(st) SKM_sk_pop(KRB5_APREQBODY, (st)) -#define sk_KRB5_APREQBODY_sort(st) SKM_sk_sort(KRB5_APREQBODY, (st)) -#define sk_KRB5_APREQBODY_is_sorted(st) SKM_sk_is_sorted(KRB5_APREQBODY, (st)) - -#define sk_KRB5_AUTHDATA_new(cmp) SKM_sk_new(KRB5_AUTHDATA, (cmp)) -#define sk_KRB5_AUTHDATA_new_null() SKM_sk_new_null(KRB5_AUTHDATA) -#define sk_KRB5_AUTHDATA_free(st) SKM_sk_free(KRB5_AUTHDATA, (st)) -#define sk_KRB5_AUTHDATA_num(st) SKM_sk_num(KRB5_AUTHDATA, (st)) -#define sk_KRB5_AUTHDATA_value(st, i) SKM_sk_value(KRB5_AUTHDATA, (st), (i)) -#define sk_KRB5_AUTHDATA_set(st, i, val) SKM_sk_set(KRB5_AUTHDATA, (st), (i), (val)) -#define sk_KRB5_AUTHDATA_zero(st) SKM_sk_zero(KRB5_AUTHDATA, (st)) -#define sk_KRB5_AUTHDATA_push(st, val) SKM_sk_push(KRB5_AUTHDATA, (st), (val)) -#define sk_KRB5_AUTHDATA_unshift(st, val) SKM_sk_unshift(KRB5_AUTHDATA, (st), (val)) -#define sk_KRB5_AUTHDATA_find(st, val) SKM_sk_find(KRB5_AUTHDATA, (st), (val)) -#define sk_KRB5_AUTHDATA_find_ex(st, val) SKM_sk_find_ex(KRB5_AUTHDATA, (st), (val)) -#define sk_KRB5_AUTHDATA_delete(st, i) SKM_sk_delete(KRB5_AUTHDATA, (st), (i)) -#define sk_KRB5_AUTHDATA_delete_ptr(st, ptr) SKM_sk_delete_ptr(KRB5_AUTHDATA, (st), (ptr)) -#define sk_KRB5_AUTHDATA_insert(st, val, i) SKM_sk_insert(KRB5_AUTHDATA, (st), (val), (i)) -#define sk_KRB5_AUTHDATA_set_cmp_func(st, cmp) SKM_sk_set_cmp_func(KRB5_AUTHDATA, (st), (cmp)) -#define sk_KRB5_AUTHDATA_dup(st) SKM_sk_dup(KRB5_AUTHDATA, st) -#define sk_KRB5_AUTHDATA_pop_free(st, free_func) SKM_sk_pop_free(KRB5_AUTHDATA, (st), (free_func)) -#define sk_KRB5_AUTHDATA_shift(st) SKM_sk_shift(KRB5_AUTHDATA, (st)) -#define sk_KRB5_AUTHDATA_pop(st) SKM_sk_pop(KRB5_AUTHDATA, (st)) -#define sk_KRB5_AUTHDATA_sort(st) SKM_sk_sort(KRB5_AUTHDATA, (st)) -#define sk_KRB5_AUTHDATA_is_sorted(st) SKM_sk_is_sorted(KRB5_AUTHDATA, (st)) - -#define sk_KRB5_AUTHENTBODY_new(cmp) SKM_sk_new(KRB5_AUTHENTBODY, (cmp)) -#define sk_KRB5_AUTHENTBODY_new_null() SKM_sk_new_null(KRB5_AUTHENTBODY) -#define sk_KRB5_AUTHENTBODY_free(st) SKM_sk_free(KRB5_AUTHENTBODY, (st)) -#define sk_KRB5_AUTHENTBODY_num(st) SKM_sk_num(KRB5_AUTHENTBODY, (st)) -#define sk_KRB5_AUTHENTBODY_value(st, i) SKM_sk_value(KRB5_AUTHENTBODY, (st), (i)) -#define sk_KRB5_AUTHENTBODY_set(st, i, val) SKM_sk_set(KRB5_AUTHENTBODY, (st), (i), (val)) -#define sk_KRB5_AUTHENTBODY_zero(st) SKM_sk_zero(KRB5_AUTHENTBODY, (st)) -#define sk_KRB5_AUTHENTBODY_push(st, val) SKM_sk_push(KRB5_AUTHENTBODY, (st), (val)) -#define sk_KRB5_AUTHENTBODY_unshift(st, val) SKM_sk_unshift(KRB5_AUTHENTBODY, (st), (val)) -#define sk_KRB5_AUTHENTBODY_find(st, val) SKM_sk_find(KRB5_AUTHENTBODY, (st), (val)) -#define sk_KRB5_AUTHENTBODY_find_ex(st, val) SKM_sk_find_ex(KRB5_AUTHENTBODY, (st), (val)) -#define sk_KRB5_AUTHENTBODY_delete(st, i) SKM_sk_delete(KRB5_AUTHENTBODY, (st), (i)) -#define sk_KRB5_AUTHENTBODY_delete_ptr(st, ptr) SKM_sk_delete_ptr(KRB5_AUTHENTBODY, (st), (ptr)) -#define sk_KRB5_AUTHENTBODY_insert(st, val, i) SKM_sk_insert(KRB5_AUTHENTBODY, (st), (val), (i)) -#define sk_KRB5_AUTHENTBODY_set_cmp_func(st, cmp) SKM_sk_set_cmp_func(KRB5_AUTHENTBODY, (st), (cmp)) -#define sk_KRB5_AUTHENTBODY_dup(st) SKM_sk_dup(KRB5_AUTHENTBODY, st) -#define sk_KRB5_AUTHENTBODY_pop_free(st, free_func) SKM_sk_pop_free(KRB5_AUTHENTBODY, (st), (free_func)) -#define sk_KRB5_AUTHENTBODY_shift(st) SKM_sk_shift(KRB5_AUTHENTBODY, (st)) -#define sk_KRB5_AUTHENTBODY_pop(st) SKM_sk_pop(KRB5_AUTHENTBODY, (st)) -#define sk_KRB5_AUTHENTBODY_sort(st) SKM_sk_sort(KRB5_AUTHENTBODY, (st)) -#define sk_KRB5_AUTHENTBODY_is_sorted(st) SKM_sk_is_sorted(KRB5_AUTHENTBODY, (st)) - -#define sk_KRB5_CHECKSUM_new(cmp) SKM_sk_new(KRB5_CHECKSUM, (cmp)) -#define sk_KRB5_CHECKSUM_new_null() SKM_sk_new_null(KRB5_CHECKSUM) -#define sk_KRB5_CHECKSUM_free(st) SKM_sk_free(KRB5_CHECKSUM, (st)) -#define sk_KRB5_CHECKSUM_num(st) SKM_sk_num(KRB5_CHECKSUM, (st)) -#define sk_KRB5_CHECKSUM_value(st, i) SKM_sk_value(KRB5_CHECKSUM, (st), (i)) -#define sk_KRB5_CHECKSUM_set(st, i, val) SKM_sk_set(KRB5_CHECKSUM, (st), (i), (val)) -#define sk_KRB5_CHECKSUM_zero(st) SKM_sk_zero(KRB5_CHECKSUM, (st)) -#define sk_KRB5_CHECKSUM_push(st, val) SKM_sk_push(KRB5_CHECKSUM, (st), (val)) -#define sk_KRB5_CHECKSUM_unshift(st, val) SKM_sk_unshift(KRB5_CHECKSUM, (st), (val)) -#define sk_KRB5_CHECKSUM_find(st, val) SKM_sk_find(KRB5_CHECKSUM, (st), (val)) -#define sk_KRB5_CHECKSUM_find_ex(st, val) SKM_sk_find_ex(KRB5_CHECKSUM, (st), (val)) -#define sk_KRB5_CHECKSUM_delete(st, i) SKM_sk_delete(KRB5_CHECKSUM, (st), (i)) -#define sk_KRB5_CHECKSUM_delete_ptr(st, ptr) SKM_sk_delete_ptr(KRB5_CHECKSUM, (st), (ptr)) -#define sk_KRB5_CHECKSUM_insert(st, val, i) SKM_sk_insert(KRB5_CHECKSUM, (st), (val), (i)) -#define sk_KRB5_CHECKSUM_set_cmp_func(st, cmp) SKM_sk_set_cmp_func(KRB5_CHECKSUM, (st), (cmp)) -#define sk_KRB5_CHECKSUM_dup(st) SKM_sk_dup(KRB5_CHECKSUM, st) -#define sk_KRB5_CHECKSUM_pop_free(st, free_func) SKM_sk_pop_free(KRB5_CHECKSUM, (st), (free_func)) -#define sk_KRB5_CHECKSUM_shift(st) SKM_sk_shift(KRB5_CHECKSUM, (st)) -#define sk_KRB5_CHECKSUM_pop(st) SKM_sk_pop(KRB5_CHECKSUM, (st)) -#define sk_KRB5_CHECKSUM_sort(st) SKM_sk_sort(KRB5_CHECKSUM, (st)) -#define sk_KRB5_CHECKSUM_is_sorted(st) SKM_sk_is_sorted(KRB5_CHECKSUM, (st)) - -#define sk_KRB5_ENCDATA_new(cmp) SKM_sk_new(KRB5_ENCDATA, (cmp)) -#define sk_KRB5_ENCDATA_new_null() SKM_sk_new_null(KRB5_ENCDATA) -#define sk_KRB5_ENCDATA_free(st) SKM_sk_free(KRB5_ENCDATA, (st)) -#define sk_KRB5_ENCDATA_num(st) SKM_sk_num(KRB5_ENCDATA, (st)) -#define sk_KRB5_ENCDATA_value(st, i) SKM_sk_value(KRB5_ENCDATA, (st), (i)) -#define sk_KRB5_ENCDATA_set(st, i, val) SKM_sk_set(KRB5_ENCDATA, (st), (i), (val)) -#define sk_KRB5_ENCDATA_zero(st) SKM_sk_zero(KRB5_ENCDATA, (st)) -#define sk_KRB5_ENCDATA_push(st, val) SKM_sk_push(KRB5_ENCDATA, (st), (val)) -#define sk_KRB5_ENCDATA_unshift(st, val) SKM_sk_unshift(KRB5_ENCDATA, (st), (val)) -#define sk_KRB5_ENCDATA_find(st, val) SKM_sk_find(KRB5_ENCDATA, (st), (val)) -#define sk_KRB5_ENCDATA_find_ex(st, val) SKM_sk_find_ex(KRB5_ENCDATA, (st), (val)) -#define sk_KRB5_ENCDATA_delete(st, i) SKM_sk_delete(KRB5_ENCDATA, (st), (i)) -#define sk_KRB5_ENCDATA_delete_ptr(st, ptr) SKM_sk_delete_ptr(KRB5_ENCDATA, (st), (ptr)) -#define sk_KRB5_ENCDATA_insert(st, val, i) SKM_sk_insert(KRB5_ENCDATA, (st), (val), (i)) -#define sk_KRB5_ENCDATA_set_cmp_func(st, cmp) SKM_sk_set_cmp_func(KRB5_ENCDATA, (st), (cmp)) -#define sk_KRB5_ENCDATA_dup(st) SKM_sk_dup(KRB5_ENCDATA, st) -#define sk_KRB5_ENCDATA_pop_free(st, free_func) SKM_sk_pop_free(KRB5_ENCDATA, (st), (free_func)) -#define sk_KRB5_ENCDATA_shift(st) SKM_sk_shift(KRB5_ENCDATA, (st)) -#define sk_KRB5_ENCDATA_pop(st) SKM_sk_pop(KRB5_ENCDATA, (st)) -#define sk_KRB5_ENCDATA_sort(st) SKM_sk_sort(KRB5_ENCDATA, (st)) -#define sk_KRB5_ENCDATA_is_sorted(st) SKM_sk_is_sorted(KRB5_ENCDATA, (st)) - -#define sk_KRB5_ENCKEY_new(cmp) SKM_sk_new(KRB5_ENCKEY, (cmp)) -#define sk_KRB5_ENCKEY_new_null() SKM_sk_new_null(KRB5_ENCKEY) -#define sk_KRB5_ENCKEY_free(st) SKM_sk_free(KRB5_ENCKEY, (st)) -#define sk_KRB5_ENCKEY_num(st) SKM_sk_num(KRB5_ENCKEY, (st)) -#define sk_KRB5_ENCKEY_value(st, i) SKM_sk_value(KRB5_ENCKEY, (st), (i)) -#define sk_KRB5_ENCKEY_set(st, i, val) SKM_sk_set(KRB5_ENCKEY, (st), (i), (val)) -#define sk_KRB5_ENCKEY_zero(st) SKM_sk_zero(KRB5_ENCKEY, (st)) -#define sk_KRB5_ENCKEY_push(st, val) SKM_sk_push(KRB5_ENCKEY, (st), (val)) -#define sk_KRB5_ENCKEY_unshift(st, val) SKM_sk_unshift(KRB5_ENCKEY, (st), (val)) -#define sk_KRB5_ENCKEY_find(st, val) SKM_sk_find(KRB5_ENCKEY, (st), (val)) -#define sk_KRB5_ENCKEY_find_ex(st, val) SKM_sk_find_ex(KRB5_ENCKEY, (st), (val)) -#define sk_KRB5_ENCKEY_delete(st, i) SKM_sk_delete(KRB5_ENCKEY, (st), (i)) -#define sk_KRB5_ENCKEY_delete_ptr(st, ptr) SKM_sk_delete_ptr(KRB5_ENCKEY, (st), (ptr)) -#define sk_KRB5_ENCKEY_insert(st, val, i) SKM_sk_insert(KRB5_ENCKEY, (st), (val), (i)) -#define sk_KRB5_ENCKEY_set_cmp_func(st, cmp) SKM_sk_set_cmp_func(KRB5_ENCKEY, (st), (cmp)) -#define sk_KRB5_ENCKEY_dup(st) SKM_sk_dup(KRB5_ENCKEY, st) -#define sk_KRB5_ENCKEY_pop_free(st, free_func) SKM_sk_pop_free(KRB5_ENCKEY, (st), (free_func)) -#define sk_KRB5_ENCKEY_shift(st) SKM_sk_shift(KRB5_ENCKEY, (st)) -#define sk_KRB5_ENCKEY_pop(st) SKM_sk_pop(KRB5_ENCKEY, (st)) -#define sk_KRB5_ENCKEY_sort(st) SKM_sk_sort(KRB5_ENCKEY, (st)) -#define sk_KRB5_ENCKEY_is_sorted(st) SKM_sk_is_sorted(KRB5_ENCKEY, (st)) - -#define sk_KRB5_PRINCNAME_new(cmp) SKM_sk_new(KRB5_PRINCNAME, (cmp)) -#define sk_KRB5_PRINCNAME_new_null() SKM_sk_new_null(KRB5_PRINCNAME) -#define sk_KRB5_PRINCNAME_free(st) SKM_sk_free(KRB5_PRINCNAME, (st)) -#define sk_KRB5_PRINCNAME_num(st) SKM_sk_num(KRB5_PRINCNAME, (st)) -#define sk_KRB5_PRINCNAME_value(st, i) SKM_sk_value(KRB5_PRINCNAME, (st), (i)) -#define sk_KRB5_PRINCNAME_set(st, i, val) SKM_sk_set(KRB5_PRINCNAME, (st), (i), (val)) -#define sk_KRB5_PRINCNAME_zero(st) SKM_sk_zero(KRB5_PRINCNAME, (st)) -#define sk_KRB5_PRINCNAME_push(st, val) SKM_sk_push(KRB5_PRINCNAME, (st), (val)) -#define sk_KRB5_PRINCNAME_unshift(st, val) SKM_sk_unshift(KRB5_PRINCNAME, (st), (val)) -#define sk_KRB5_PRINCNAME_find(st, val) SKM_sk_find(KRB5_PRINCNAME, (st), (val)) -#define sk_KRB5_PRINCNAME_find_ex(st, val) SKM_sk_find_ex(KRB5_PRINCNAME, (st), (val)) -#define sk_KRB5_PRINCNAME_delete(st, i) SKM_sk_delete(KRB5_PRINCNAME, (st), (i)) -#define sk_KRB5_PRINCNAME_delete_ptr(st, ptr) SKM_sk_delete_ptr(KRB5_PRINCNAME, (st), (ptr)) -#define sk_KRB5_PRINCNAME_insert(st, val, i) SKM_sk_insert(KRB5_PRINCNAME, (st), (val), (i)) -#define sk_KRB5_PRINCNAME_set_cmp_func(st, cmp) SKM_sk_set_cmp_func(KRB5_PRINCNAME, (st), (cmp)) -#define sk_KRB5_PRINCNAME_dup(st) SKM_sk_dup(KRB5_PRINCNAME, st) -#define sk_KRB5_PRINCNAME_pop_free(st, free_func) SKM_sk_pop_free(KRB5_PRINCNAME, (st), (free_func)) -#define sk_KRB5_PRINCNAME_shift(st) SKM_sk_shift(KRB5_PRINCNAME, (st)) -#define sk_KRB5_PRINCNAME_pop(st) SKM_sk_pop(KRB5_PRINCNAME, (st)) -#define sk_KRB5_PRINCNAME_sort(st) SKM_sk_sort(KRB5_PRINCNAME, (st)) -#define sk_KRB5_PRINCNAME_is_sorted(st) SKM_sk_is_sorted(KRB5_PRINCNAME, (st)) - -#define sk_KRB5_TKTBODY_new(cmp) SKM_sk_new(KRB5_TKTBODY, (cmp)) -#define sk_KRB5_TKTBODY_new_null() SKM_sk_new_null(KRB5_TKTBODY) -#define sk_KRB5_TKTBODY_free(st) SKM_sk_free(KRB5_TKTBODY, (st)) -#define sk_KRB5_TKTBODY_num(st) SKM_sk_num(KRB5_TKTBODY, (st)) -#define sk_KRB5_TKTBODY_value(st, i) SKM_sk_value(KRB5_TKTBODY, (st), (i)) -#define sk_KRB5_TKTBODY_set(st, i, val) SKM_sk_set(KRB5_TKTBODY, (st), (i), (val)) -#define sk_KRB5_TKTBODY_zero(st) SKM_sk_zero(KRB5_TKTBODY, (st)) -#define sk_KRB5_TKTBODY_push(st, val) SKM_sk_push(KRB5_TKTBODY, (st), (val)) -#define sk_KRB5_TKTBODY_unshift(st, val) SKM_sk_unshift(KRB5_TKTBODY, (st), (val)) -#define sk_KRB5_TKTBODY_find(st, val) SKM_sk_find(KRB5_TKTBODY, (st), (val)) -#define sk_KRB5_TKTBODY_find_ex(st, val) SKM_sk_find_ex(KRB5_TKTBODY, (st), (val)) -#define sk_KRB5_TKTBODY_delete(st, i) SKM_sk_delete(KRB5_TKTBODY, (st), (i)) -#define sk_KRB5_TKTBODY_delete_ptr(st, ptr) SKM_sk_delete_ptr(KRB5_TKTBODY, (st), (ptr)) -#define sk_KRB5_TKTBODY_insert(st, val, i) SKM_sk_insert(KRB5_TKTBODY, (st), (val), (i)) -#define sk_KRB5_TKTBODY_set_cmp_func(st, cmp) SKM_sk_set_cmp_func(KRB5_TKTBODY, (st), (cmp)) -#define sk_KRB5_TKTBODY_dup(st) SKM_sk_dup(KRB5_TKTBODY, st) -#define sk_KRB5_TKTBODY_pop_free(st, free_func) SKM_sk_pop_free(KRB5_TKTBODY, (st), (free_func)) -#define sk_KRB5_TKTBODY_shift(st) SKM_sk_shift(KRB5_TKTBODY, (st)) -#define sk_KRB5_TKTBODY_pop(st) SKM_sk_pop(KRB5_TKTBODY, (st)) -#define sk_KRB5_TKTBODY_sort(st) SKM_sk_sort(KRB5_TKTBODY, (st)) -#define sk_KRB5_TKTBODY_is_sorted(st) SKM_sk_is_sorted(KRB5_TKTBODY, (st)) - -#define sk_MEM_OBJECT_DATA_new(cmp) SKM_sk_new(MEM_OBJECT_DATA, (cmp)) -#define sk_MEM_OBJECT_DATA_new_null() SKM_sk_new_null(MEM_OBJECT_DATA) -#define sk_MEM_OBJECT_DATA_free(st) SKM_sk_free(MEM_OBJECT_DATA, (st)) -#define sk_MEM_OBJECT_DATA_num(st) SKM_sk_num(MEM_OBJECT_DATA, (st)) -#define sk_MEM_OBJECT_DATA_value(st, i) SKM_sk_value(MEM_OBJECT_DATA, (st), (i)) -#define sk_MEM_OBJECT_DATA_set(st, i, val) SKM_sk_set(MEM_OBJECT_DATA, (st), (i), (val)) -#define sk_MEM_OBJECT_DATA_zero(st) SKM_sk_zero(MEM_OBJECT_DATA, (st)) -#define sk_MEM_OBJECT_DATA_push(st, val) SKM_sk_push(MEM_OBJECT_DATA, (st), (val)) -#define sk_MEM_OBJECT_DATA_unshift(st, val) SKM_sk_unshift(MEM_OBJECT_DATA, (st), (val)) -#define sk_MEM_OBJECT_DATA_find(st, val) SKM_sk_find(MEM_OBJECT_DATA, (st), (val)) -#define sk_MEM_OBJECT_DATA_find_ex(st, val) SKM_sk_find_ex(MEM_OBJECT_DATA, (st), (val)) -#define sk_MEM_OBJECT_DATA_delete(st, i) SKM_sk_delete(MEM_OBJECT_DATA, (st), (i)) -#define sk_MEM_OBJECT_DATA_delete_ptr(st, ptr) SKM_sk_delete_ptr(MEM_OBJECT_DATA, (st), (ptr)) -#define sk_MEM_OBJECT_DATA_insert(st, val, i) SKM_sk_insert(MEM_OBJECT_DATA, (st), (val), (i)) -#define sk_MEM_OBJECT_DATA_set_cmp_func(st, cmp) SKM_sk_set_cmp_func(MEM_OBJECT_DATA, (st), (cmp)) -#define sk_MEM_OBJECT_DATA_dup(st) SKM_sk_dup(MEM_OBJECT_DATA, st) -#define sk_MEM_OBJECT_DATA_pop_free(st, free_func) SKM_sk_pop_free(MEM_OBJECT_DATA, (st), (free_func)) -#define sk_MEM_OBJECT_DATA_shift(st) SKM_sk_shift(MEM_OBJECT_DATA, (st)) -#define sk_MEM_OBJECT_DATA_pop(st) SKM_sk_pop(MEM_OBJECT_DATA, (st)) -#define sk_MEM_OBJECT_DATA_sort(st) SKM_sk_sort(MEM_OBJECT_DATA, (st)) -#define sk_MEM_OBJECT_DATA_is_sorted(st) SKM_sk_is_sorted(MEM_OBJECT_DATA, (st)) - -#define sk_MIME_HEADER_new(cmp) SKM_sk_new(MIME_HEADER, (cmp)) -#define sk_MIME_HEADER_new_null() SKM_sk_new_null(MIME_HEADER) -#define sk_MIME_HEADER_free(st) SKM_sk_free(MIME_HEADER, (st)) -#define sk_MIME_HEADER_num(st) SKM_sk_num(MIME_HEADER, (st)) -#define sk_MIME_HEADER_value(st, i) SKM_sk_value(MIME_HEADER, (st), (i)) -#define sk_MIME_HEADER_set(st, i, val) SKM_sk_set(MIME_HEADER, (st), (i), (val)) -#define sk_MIME_HEADER_zero(st) SKM_sk_zero(MIME_HEADER, (st)) -#define sk_MIME_HEADER_push(st, val) SKM_sk_push(MIME_HEADER, (st), (val)) -#define sk_MIME_HEADER_unshift(st, val) SKM_sk_unshift(MIME_HEADER, (st), (val)) -#define sk_MIME_HEADER_find(st, val) SKM_sk_find(MIME_HEADER, (st), (val)) -#define sk_MIME_HEADER_find_ex(st, val) SKM_sk_find_ex(MIME_HEADER, (st), (val)) -#define sk_MIME_HEADER_delete(st, i) SKM_sk_delete(MIME_HEADER, (st), (i)) -#define sk_MIME_HEADER_delete_ptr(st, ptr) SKM_sk_delete_ptr(MIME_HEADER, (st), (ptr)) -#define sk_MIME_HEADER_insert(st, val, i) SKM_sk_insert(MIME_HEADER, (st), (val), (i)) -#define sk_MIME_HEADER_set_cmp_func(st, cmp) SKM_sk_set_cmp_func(MIME_HEADER, (st), (cmp)) -#define sk_MIME_HEADER_dup(st) SKM_sk_dup(MIME_HEADER, st) -#define sk_MIME_HEADER_pop_free(st, free_func) SKM_sk_pop_free(MIME_HEADER, (st), (free_func)) -#define sk_MIME_HEADER_shift(st) SKM_sk_shift(MIME_HEADER, (st)) -#define sk_MIME_HEADER_pop(st) SKM_sk_pop(MIME_HEADER, (st)) -#define sk_MIME_HEADER_sort(st) SKM_sk_sort(MIME_HEADER, (st)) -#define sk_MIME_HEADER_is_sorted(st) SKM_sk_is_sorted(MIME_HEADER, (st)) - -#define sk_MIME_PARAM_new(cmp) SKM_sk_new(MIME_PARAM, (cmp)) -#define sk_MIME_PARAM_new_null() SKM_sk_new_null(MIME_PARAM) -#define sk_MIME_PARAM_free(st) SKM_sk_free(MIME_PARAM, (st)) -#define sk_MIME_PARAM_num(st) SKM_sk_num(MIME_PARAM, (st)) -#define sk_MIME_PARAM_value(st, i) SKM_sk_value(MIME_PARAM, (st), (i)) -#define sk_MIME_PARAM_set(st, i, val) SKM_sk_set(MIME_PARAM, (st), (i), (val)) -#define sk_MIME_PARAM_zero(st) SKM_sk_zero(MIME_PARAM, (st)) -#define sk_MIME_PARAM_push(st, val) SKM_sk_push(MIME_PARAM, (st), (val)) -#define sk_MIME_PARAM_unshift(st, val) SKM_sk_unshift(MIME_PARAM, (st), (val)) -#define sk_MIME_PARAM_find(st, val) SKM_sk_find(MIME_PARAM, (st), (val)) -#define sk_MIME_PARAM_find_ex(st, val) SKM_sk_find_ex(MIME_PARAM, (st), (val)) -#define sk_MIME_PARAM_delete(st, i) SKM_sk_delete(MIME_PARAM, (st), (i)) -#define sk_MIME_PARAM_delete_ptr(st, ptr) SKM_sk_delete_ptr(MIME_PARAM, (st), (ptr)) -#define sk_MIME_PARAM_insert(st, val, i) SKM_sk_insert(MIME_PARAM, (st), (val), (i)) -#define sk_MIME_PARAM_set_cmp_func(st, cmp) SKM_sk_set_cmp_func(MIME_PARAM, (st), (cmp)) -#define sk_MIME_PARAM_dup(st) SKM_sk_dup(MIME_PARAM, st) -#define sk_MIME_PARAM_pop_free(st, free_func) SKM_sk_pop_free(MIME_PARAM, (st), (free_func)) -#define sk_MIME_PARAM_shift(st) SKM_sk_shift(MIME_PARAM, (st)) -#define sk_MIME_PARAM_pop(st) SKM_sk_pop(MIME_PARAM, (st)) -#define sk_MIME_PARAM_sort(st) SKM_sk_sort(MIME_PARAM, (st)) -#define sk_MIME_PARAM_is_sorted(st) SKM_sk_is_sorted(MIME_PARAM, (st)) - -#define sk_NAME_FUNCS_new(cmp) SKM_sk_new(NAME_FUNCS, (cmp)) -#define sk_NAME_FUNCS_new_null() SKM_sk_new_null(NAME_FUNCS) -#define sk_NAME_FUNCS_free(st) SKM_sk_free(NAME_FUNCS, (st)) -#define sk_NAME_FUNCS_num(st) SKM_sk_num(NAME_FUNCS, (st)) -#define sk_NAME_FUNCS_value(st, i) SKM_sk_value(NAME_FUNCS, (st), (i)) -#define sk_NAME_FUNCS_set(st, i, val) SKM_sk_set(NAME_FUNCS, (st), (i), (val)) -#define sk_NAME_FUNCS_zero(st) SKM_sk_zero(NAME_FUNCS, (st)) -#define sk_NAME_FUNCS_push(st, val) SKM_sk_push(NAME_FUNCS, (st), (val)) -#define sk_NAME_FUNCS_unshift(st, val) SKM_sk_unshift(NAME_FUNCS, (st), (val)) -#define sk_NAME_FUNCS_find(st, val) SKM_sk_find(NAME_FUNCS, (st), (val)) -#define sk_NAME_FUNCS_find_ex(st, val) SKM_sk_find_ex(NAME_FUNCS, (st), (val)) -#define sk_NAME_FUNCS_delete(st, i) SKM_sk_delete(NAME_FUNCS, (st), (i)) -#define sk_NAME_FUNCS_delete_ptr(st, ptr) SKM_sk_delete_ptr(NAME_FUNCS, (st), (ptr)) -#define sk_NAME_FUNCS_insert(st, val, i) SKM_sk_insert(NAME_FUNCS, (st), (val), (i)) -#define sk_NAME_FUNCS_set_cmp_func(st, cmp) SKM_sk_set_cmp_func(NAME_FUNCS, (st), (cmp)) -#define sk_NAME_FUNCS_dup(st) SKM_sk_dup(NAME_FUNCS, st) -#define sk_NAME_FUNCS_pop_free(st, free_func) SKM_sk_pop_free(NAME_FUNCS, (st), (free_func)) -#define sk_NAME_FUNCS_shift(st) SKM_sk_shift(NAME_FUNCS, (st)) -#define sk_NAME_FUNCS_pop(st) SKM_sk_pop(NAME_FUNCS, (st)) -#define sk_NAME_FUNCS_sort(st) SKM_sk_sort(NAME_FUNCS, (st)) -#define sk_NAME_FUNCS_is_sorted(st) SKM_sk_is_sorted(NAME_FUNCS, (st)) - -#define sk_OCSP_CERTID_new(cmp) SKM_sk_new(OCSP_CERTID, (cmp)) -#define sk_OCSP_CERTID_new_null() SKM_sk_new_null(OCSP_CERTID) -#define sk_OCSP_CERTID_free(st) SKM_sk_free(OCSP_CERTID, (st)) -#define sk_OCSP_CERTID_num(st) SKM_sk_num(OCSP_CERTID, (st)) -#define sk_OCSP_CERTID_value(st, i) SKM_sk_value(OCSP_CERTID, (st), (i)) -#define sk_OCSP_CERTID_set(st, i, val) SKM_sk_set(OCSP_CERTID, (st), (i), (val)) -#define sk_OCSP_CERTID_zero(st) SKM_sk_zero(OCSP_CERTID, (st)) -#define sk_OCSP_CERTID_push(st, val) SKM_sk_push(OCSP_CERTID, (st), (val)) -#define sk_OCSP_CERTID_unshift(st, val) SKM_sk_unshift(OCSP_CERTID, (st), (val)) -#define sk_OCSP_CERTID_find(st, val) SKM_sk_find(OCSP_CERTID, (st), (val)) -#define sk_OCSP_CERTID_find_ex(st, val) SKM_sk_find_ex(OCSP_CERTID, (st), (val)) -#define sk_OCSP_CERTID_delete(st, i) SKM_sk_delete(OCSP_CERTID, (st), (i)) -#define sk_OCSP_CERTID_delete_ptr(st, ptr) SKM_sk_delete_ptr(OCSP_CERTID, (st), (ptr)) -#define sk_OCSP_CERTID_insert(st, val, i) SKM_sk_insert(OCSP_CERTID, (st), (val), (i)) -#define sk_OCSP_CERTID_set_cmp_func(st, cmp) SKM_sk_set_cmp_func(OCSP_CERTID, (st), (cmp)) -#define sk_OCSP_CERTID_dup(st) SKM_sk_dup(OCSP_CERTID, st) -#define sk_OCSP_CERTID_pop_free(st, free_func) SKM_sk_pop_free(OCSP_CERTID, (st), (free_func)) -#define sk_OCSP_CERTID_shift(st) SKM_sk_shift(OCSP_CERTID, (st)) -#define sk_OCSP_CERTID_pop(st) SKM_sk_pop(OCSP_CERTID, (st)) -#define sk_OCSP_CERTID_sort(st) SKM_sk_sort(OCSP_CERTID, (st)) -#define sk_OCSP_CERTID_is_sorted(st) SKM_sk_is_sorted(OCSP_CERTID, (st)) - -#define sk_OCSP_ONEREQ_new(cmp) SKM_sk_new(OCSP_ONEREQ, (cmp)) -#define sk_OCSP_ONEREQ_new_null() SKM_sk_new_null(OCSP_ONEREQ) -#define sk_OCSP_ONEREQ_free(st) SKM_sk_free(OCSP_ONEREQ, (st)) -#define sk_OCSP_ONEREQ_num(st) SKM_sk_num(OCSP_ONEREQ, (st)) -#define sk_OCSP_ONEREQ_value(st, i) SKM_sk_value(OCSP_ONEREQ, (st), (i)) -#define sk_OCSP_ONEREQ_set(st, i, val) SKM_sk_set(OCSP_ONEREQ, (st), (i), (val)) -#define sk_OCSP_ONEREQ_zero(st) SKM_sk_zero(OCSP_ONEREQ, (st)) -#define sk_OCSP_ONEREQ_push(st, val) SKM_sk_push(OCSP_ONEREQ, (st), (val)) -#define sk_OCSP_ONEREQ_unshift(st, val) SKM_sk_unshift(OCSP_ONEREQ, (st), (val)) -#define sk_OCSP_ONEREQ_find(st, val) SKM_sk_find(OCSP_ONEREQ, (st), (val)) -#define sk_OCSP_ONEREQ_find_ex(st, val) SKM_sk_find_ex(OCSP_ONEREQ, (st), (val)) -#define sk_OCSP_ONEREQ_delete(st, i) SKM_sk_delete(OCSP_ONEREQ, (st), (i)) -#define sk_OCSP_ONEREQ_delete_ptr(st, ptr) SKM_sk_delete_ptr(OCSP_ONEREQ, (st), (ptr)) -#define sk_OCSP_ONEREQ_insert(st, val, i) SKM_sk_insert(OCSP_ONEREQ, (st), (val), (i)) -#define sk_OCSP_ONEREQ_set_cmp_func(st, cmp) SKM_sk_set_cmp_func(OCSP_ONEREQ, (st), (cmp)) -#define sk_OCSP_ONEREQ_dup(st) SKM_sk_dup(OCSP_ONEREQ, st) -#define sk_OCSP_ONEREQ_pop_free(st, free_func) SKM_sk_pop_free(OCSP_ONEREQ, (st), (free_func)) -#define sk_OCSP_ONEREQ_shift(st) SKM_sk_shift(OCSP_ONEREQ, (st)) -#define sk_OCSP_ONEREQ_pop(st) SKM_sk_pop(OCSP_ONEREQ, (st)) -#define sk_OCSP_ONEREQ_sort(st) SKM_sk_sort(OCSP_ONEREQ, (st)) -#define sk_OCSP_ONEREQ_is_sorted(st) SKM_sk_is_sorted(OCSP_ONEREQ, (st)) - -#define sk_OCSP_RESPID_new(cmp) SKM_sk_new(OCSP_RESPID, (cmp)) -#define sk_OCSP_RESPID_new_null() SKM_sk_new_null(OCSP_RESPID) -#define sk_OCSP_RESPID_free(st) SKM_sk_free(OCSP_RESPID, (st)) -#define sk_OCSP_RESPID_num(st) SKM_sk_num(OCSP_RESPID, (st)) -#define sk_OCSP_RESPID_value(st, i) SKM_sk_value(OCSP_RESPID, (st), (i)) -#define sk_OCSP_RESPID_set(st, i, val) SKM_sk_set(OCSP_RESPID, (st), (i), (val)) -#define sk_OCSP_RESPID_zero(st) SKM_sk_zero(OCSP_RESPID, (st)) -#define sk_OCSP_RESPID_push(st, val) SKM_sk_push(OCSP_RESPID, (st), (val)) -#define sk_OCSP_RESPID_unshift(st, val) SKM_sk_unshift(OCSP_RESPID, (st), (val)) -#define sk_OCSP_RESPID_find(st, val) SKM_sk_find(OCSP_RESPID, (st), (val)) -#define sk_OCSP_RESPID_find_ex(st, val) SKM_sk_find_ex(OCSP_RESPID, (st), (val)) -#define sk_OCSP_RESPID_delete(st, i) SKM_sk_delete(OCSP_RESPID, (st), (i)) -#define sk_OCSP_RESPID_delete_ptr(st, ptr) SKM_sk_delete_ptr(OCSP_RESPID, (st), (ptr)) -#define sk_OCSP_RESPID_insert(st, val, i) SKM_sk_insert(OCSP_RESPID, (st), (val), (i)) -#define sk_OCSP_RESPID_set_cmp_func(st, cmp) SKM_sk_set_cmp_func(OCSP_RESPID, (st), (cmp)) -#define sk_OCSP_RESPID_dup(st) SKM_sk_dup(OCSP_RESPID, st) -#define sk_OCSP_RESPID_pop_free(st, free_func) SKM_sk_pop_free(OCSP_RESPID, (st), (free_func)) -#define sk_OCSP_RESPID_shift(st) SKM_sk_shift(OCSP_RESPID, (st)) -#define sk_OCSP_RESPID_pop(st) SKM_sk_pop(OCSP_RESPID, (st)) -#define sk_OCSP_RESPID_sort(st) SKM_sk_sort(OCSP_RESPID, (st)) -#define sk_OCSP_RESPID_is_sorted(st) SKM_sk_is_sorted(OCSP_RESPID, (st)) - -#define sk_OCSP_SINGLERESP_new(cmp) SKM_sk_new(OCSP_SINGLERESP, (cmp)) -#define sk_OCSP_SINGLERESP_new_null() SKM_sk_new_null(OCSP_SINGLERESP) -#define sk_OCSP_SINGLERESP_free(st) SKM_sk_free(OCSP_SINGLERESP, (st)) -#define sk_OCSP_SINGLERESP_num(st) SKM_sk_num(OCSP_SINGLERESP, (st)) -#define sk_OCSP_SINGLERESP_value(st, i) SKM_sk_value(OCSP_SINGLERESP, (st), (i)) -#define sk_OCSP_SINGLERESP_set(st, i, val) SKM_sk_set(OCSP_SINGLERESP, (st), (i), (val)) -#define sk_OCSP_SINGLERESP_zero(st) SKM_sk_zero(OCSP_SINGLERESP, (st)) -#define sk_OCSP_SINGLERESP_push(st, val) SKM_sk_push(OCSP_SINGLERESP, (st), (val)) -#define sk_OCSP_SINGLERESP_unshift(st, val) SKM_sk_unshift(OCSP_SINGLERESP, (st), (val)) -#define sk_OCSP_SINGLERESP_find(st, val) SKM_sk_find(OCSP_SINGLERESP, (st), (val)) -#define sk_OCSP_SINGLERESP_find_ex(st, val) SKM_sk_find_ex(OCSP_SINGLERESP, (st), (val)) -#define sk_OCSP_SINGLERESP_delete(st, i) SKM_sk_delete(OCSP_SINGLERESP, (st), (i)) -#define sk_OCSP_SINGLERESP_delete_ptr(st, ptr) SKM_sk_delete_ptr(OCSP_SINGLERESP, (st), (ptr)) -#define sk_OCSP_SINGLERESP_insert(st, val, i) SKM_sk_insert(OCSP_SINGLERESP, (st), (val), (i)) -#define sk_OCSP_SINGLERESP_set_cmp_func(st, cmp) SKM_sk_set_cmp_func(OCSP_SINGLERESP, (st), (cmp)) -#define sk_OCSP_SINGLERESP_dup(st) SKM_sk_dup(OCSP_SINGLERESP, st) -#define sk_OCSP_SINGLERESP_pop_free(st, free_func) SKM_sk_pop_free(OCSP_SINGLERESP, (st), (free_func)) -#define sk_OCSP_SINGLERESP_shift(st) SKM_sk_shift(OCSP_SINGLERESP, (st)) -#define sk_OCSP_SINGLERESP_pop(st) SKM_sk_pop(OCSP_SINGLERESP, (st)) -#define sk_OCSP_SINGLERESP_sort(st) SKM_sk_sort(OCSP_SINGLERESP, (st)) -#define sk_OCSP_SINGLERESP_is_sorted(st) SKM_sk_is_sorted(OCSP_SINGLERESP, (st)) - -#define sk_PKCS12_SAFEBAG_new(cmp) SKM_sk_new(PKCS12_SAFEBAG, (cmp)) -#define sk_PKCS12_SAFEBAG_new_null() SKM_sk_new_null(PKCS12_SAFEBAG) -#define sk_PKCS12_SAFEBAG_free(st) SKM_sk_free(PKCS12_SAFEBAG, (st)) -#define sk_PKCS12_SAFEBAG_num(st) SKM_sk_num(PKCS12_SAFEBAG, (st)) -#define sk_PKCS12_SAFEBAG_value(st, i) SKM_sk_value(PKCS12_SAFEBAG, (st), (i)) -#define sk_PKCS12_SAFEBAG_set(st, i, val) SKM_sk_set(PKCS12_SAFEBAG, (st), (i), (val)) -#define sk_PKCS12_SAFEBAG_zero(st) SKM_sk_zero(PKCS12_SAFEBAG, (st)) -#define sk_PKCS12_SAFEBAG_push(st, val) SKM_sk_push(PKCS12_SAFEBAG, (st), (val)) -#define sk_PKCS12_SAFEBAG_unshift(st, val) SKM_sk_unshift(PKCS12_SAFEBAG, (st), (val)) -#define sk_PKCS12_SAFEBAG_find(st, val) SKM_sk_find(PKCS12_SAFEBAG, (st), (val)) -#define sk_PKCS12_SAFEBAG_find_ex(st, val) SKM_sk_find_ex(PKCS12_SAFEBAG, (st), (val)) -#define sk_PKCS12_SAFEBAG_delete(st, i) SKM_sk_delete(PKCS12_SAFEBAG, (st), (i)) -#define sk_PKCS12_SAFEBAG_delete_ptr(st, ptr) SKM_sk_delete_ptr(PKCS12_SAFEBAG, (st), (ptr)) -#define sk_PKCS12_SAFEBAG_insert(st, val, i) SKM_sk_insert(PKCS12_SAFEBAG, (st), (val), (i)) -#define sk_PKCS12_SAFEBAG_set_cmp_func(st, cmp) SKM_sk_set_cmp_func(PKCS12_SAFEBAG, (st), (cmp)) -#define sk_PKCS12_SAFEBAG_dup(st) SKM_sk_dup(PKCS12_SAFEBAG, st) -#define sk_PKCS12_SAFEBAG_pop_free(st, free_func) SKM_sk_pop_free(PKCS12_SAFEBAG, (st), (free_func)) -#define sk_PKCS12_SAFEBAG_shift(st) SKM_sk_shift(PKCS12_SAFEBAG, (st)) -#define sk_PKCS12_SAFEBAG_pop(st) SKM_sk_pop(PKCS12_SAFEBAG, (st)) -#define sk_PKCS12_SAFEBAG_sort(st) SKM_sk_sort(PKCS12_SAFEBAG, (st)) -#define sk_PKCS12_SAFEBAG_is_sorted(st) SKM_sk_is_sorted(PKCS12_SAFEBAG, (st)) - -#define sk_PKCS7_new(cmp) SKM_sk_new(PKCS7, (cmp)) -#define sk_PKCS7_new_null() SKM_sk_new_null(PKCS7) -#define sk_PKCS7_free(st) SKM_sk_free(PKCS7, (st)) -#define sk_PKCS7_num(st) SKM_sk_num(PKCS7, (st)) -#define sk_PKCS7_value(st, i) SKM_sk_value(PKCS7, (st), (i)) -#define sk_PKCS7_set(st, i, val) SKM_sk_set(PKCS7, (st), (i), (val)) -#define sk_PKCS7_zero(st) SKM_sk_zero(PKCS7, (st)) -#define sk_PKCS7_push(st, val) SKM_sk_push(PKCS7, (st), (val)) -#define sk_PKCS7_unshift(st, val) SKM_sk_unshift(PKCS7, (st), (val)) -#define sk_PKCS7_find(st, val) SKM_sk_find(PKCS7, (st), (val)) -#define sk_PKCS7_find_ex(st, val) SKM_sk_find_ex(PKCS7, (st), (val)) -#define sk_PKCS7_delete(st, i) SKM_sk_delete(PKCS7, (st), (i)) -#define sk_PKCS7_delete_ptr(st, ptr) SKM_sk_delete_ptr(PKCS7, (st), (ptr)) -#define sk_PKCS7_insert(st, val, i) SKM_sk_insert(PKCS7, (st), (val), (i)) -#define sk_PKCS7_set_cmp_func(st, cmp) SKM_sk_set_cmp_func(PKCS7, (st), (cmp)) -#define sk_PKCS7_dup(st) SKM_sk_dup(PKCS7, st) -#define sk_PKCS7_pop_free(st, free_func) SKM_sk_pop_free(PKCS7, (st), (free_func)) -#define sk_PKCS7_shift(st) SKM_sk_shift(PKCS7, (st)) -#define sk_PKCS7_pop(st) SKM_sk_pop(PKCS7, (st)) -#define sk_PKCS7_sort(st) SKM_sk_sort(PKCS7, (st)) -#define sk_PKCS7_is_sorted(st) SKM_sk_is_sorted(PKCS7, (st)) - -#define sk_PKCS7_RECIP_INFO_new(cmp) SKM_sk_new(PKCS7_RECIP_INFO, (cmp)) -#define sk_PKCS7_RECIP_INFO_new_null() SKM_sk_new_null(PKCS7_RECIP_INFO) -#define sk_PKCS7_RECIP_INFO_free(st) SKM_sk_free(PKCS7_RECIP_INFO, (st)) -#define sk_PKCS7_RECIP_INFO_num(st) SKM_sk_num(PKCS7_RECIP_INFO, (st)) -#define sk_PKCS7_RECIP_INFO_value(st, i) SKM_sk_value(PKCS7_RECIP_INFO, (st), (i)) -#define sk_PKCS7_RECIP_INFO_set(st, i, val) SKM_sk_set(PKCS7_RECIP_INFO, (st), (i), (val)) -#define sk_PKCS7_RECIP_INFO_zero(st) SKM_sk_zero(PKCS7_RECIP_INFO, (st)) -#define sk_PKCS7_RECIP_INFO_push(st, val) SKM_sk_push(PKCS7_RECIP_INFO, (st), (val)) -#define sk_PKCS7_RECIP_INFO_unshift(st, val) SKM_sk_unshift(PKCS7_RECIP_INFO, (st), (val)) -#define sk_PKCS7_RECIP_INFO_find(st, val) SKM_sk_find(PKCS7_RECIP_INFO, (st), (val)) -#define sk_PKCS7_RECIP_INFO_find_ex(st, val) SKM_sk_find_ex(PKCS7_RECIP_INFO, (st), (val)) -#define sk_PKCS7_RECIP_INFO_delete(st, i) SKM_sk_delete(PKCS7_RECIP_INFO, (st), (i)) -#define sk_PKCS7_RECIP_INFO_delete_ptr(st, ptr) SKM_sk_delete_ptr(PKCS7_RECIP_INFO, (st), (ptr)) -#define sk_PKCS7_RECIP_INFO_insert(st, val, i) SKM_sk_insert(PKCS7_RECIP_INFO, (st), (val), (i)) -#define sk_PKCS7_RECIP_INFO_set_cmp_func(st, cmp) SKM_sk_set_cmp_func(PKCS7_RECIP_INFO, (st), (cmp)) -#define sk_PKCS7_RECIP_INFO_dup(st) SKM_sk_dup(PKCS7_RECIP_INFO, st) -#define sk_PKCS7_RECIP_INFO_pop_free(st, free_func) SKM_sk_pop_free(PKCS7_RECIP_INFO, (st), (free_func)) -#define sk_PKCS7_RECIP_INFO_shift(st) SKM_sk_shift(PKCS7_RECIP_INFO, (st)) -#define sk_PKCS7_RECIP_INFO_pop(st) SKM_sk_pop(PKCS7_RECIP_INFO, (st)) -#define sk_PKCS7_RECIP_INFO_sort(st) SKM_sk_sort(PKCS7_RECIP_INFO, (st)) -#define sk_PKCS7_RECIP_INFO_is_sorted(st) SKM_sk_is_sorted(PKCS7_RECIP_INFO, (st)) - -#define sk_PKCS7_SIGNER_INFO_new(cmp) SKM_sk_new(PKCS7_SIGNER_INFO, (cmp)) -#define sk_PKCS7_SIGNER_INFO_new_null() SKM_sk_new_null(PKCS7_SIGNER_INFO) -#define sk_PKCS7_SIGNER_INFO_free(st) SKM_sk_free(PKCS7_SIGNER_INFO, (st)) -#define sk_PKCS7_SIGNER_INFO_num(st) SKM_sk_num(PKCS7_SIGNER_INFO, (st)) -#define sk_PKCS7_SIGNER_INFO_value(st, i) SKM_sk_value(PKCS7_SIGNER_INFO, (st), (i)) -#define sk_PKCS7_SIGNER_INFO_set(st, i, val) SKM_sk_set(PKCS7_SIGNER_INFO, (st), (i), (val)) -#define sk_PKCS7_SIGNER_INFO_zero(st) SKM_sk_zero(PKCS7_SIGNER_INFO, (st)) -#define sk_PKCS7_SIGNER_INFO_push(st, val) SKM_sk_push(PKCS7_SIGNER_INFO, (st), (val)) -#define sk_PKCS7_SIGNER_INFO_unshift(st, val) SKM_sk_unshift(PKCS7_SIGNER_INFO, (st), (val)) -#define sk_PKCS7_SIGNER_INFO_find(st, val) SKM_sk_find(PKCS7_SIGNER_INFO, (st), (val)) -#define sk_PKCS7_SIGNER_INFO_find_ex(st, val) SKM_sk_find_ex(PKCS7_SIGNER_INFO, (st), (val)) -#define sk_PKCS7_SIGNER_INFO_delete(st, i) SKM_sk_delete(PKCS7_SIGNER_INFO, (st), (i)) -#define sk_PKCS7_SIGNER_INFO_delete_ptr(st, ptr) SKM_sk_delete_ptr(PKCS7_SIGNER_INFO, (st), (ptr)) -#define sk_PKCS7_SIGNER_INFO_insert(st, val, i) SKM_sk_insert(PKCS7_SIGNER_INFO, (st), (val), (i)) -#define sk_PKCS7_SIGNER_INFO_set_cmp_func(st, cmp) SKM_sk_set_cmp_func(PKCS7_SIGNER_INFO, (st), (cmp)) -#define sk_PKCS7_SIGNER_INFO_dup(st) SKM_sk_dup(PKCS7_SIGNER_INFO, st) -#define sk_PKCS7_SIGNER_INFO_pop_free(st, free_func) SKM_sk_pop_free(PKCS7_SIGNER_INFO, (st), (free_func)) -#define sk_PKCS7_SIGNER_INFO_shift(st) SKM_sk_shift(PKCS7_SIGNER_INFO, (st)) -#define sk_PKCS7_SIGNER_INFO_pop(st) SKM_sk_pop(PKCS7_SIGNER_INFO, (st)) -#define sk_PKCS7_SIGNER_INFO_sort(st) SKM_sk_sort(PKCS7_SIGNER_INFO, (st)) -#define sk_PKCS7_SIGNER_INFO_is_sorted(st) SKM_sk_is_sorted(PKCS7_SIGNER_INFO, (st)) - -#define sk_POLICYINFO_new(cmp) SKM_sk_new(POLICYINFO, (cmp)) -#define sk_POLICYINFO_new_null() SKM_sk_new_null(POLICYINFO) -#define sk_POLICYINFO_free(st) SKM_sk_free(POLICYINFO, (st)) -#define sk_POLICYINFO_num(st) SKM_sk_num(POLICYINFO, (st)) -#define sk_POLICYINFO_value(st, i) SKM_sk_value(POLICYINFO, (st), (i)) -#define sk_POLICYINFO_set(st, i, val) SKM_sk_set(POLICYINFO, (st), (i), (val)) -#define sk_POLICYINFO_zero(st) SKM_sk_zero(POLICYINFO, (st)) -#define sk_POLICYINFO_push(st, val) SKM_sk_push(POLICYINFO, (st), (val)) -#define sk_POLICYINFO_unshift(st, val) SKM_sk_unshift(POLICYINFO, (st), (val)) -#define sk_POLICYINFO_find(st, val) SKM_sk_find(POLICYINFO, (st), (val)) -#define sk_POLICYINFO_find_ex(st, val) SKM_sk_find_ex(POLICYINFO, (st), (val)) -#define sk_POLICYINFO_delete(st, i) SKM_sk_delete(POLICYINFO, (st), (i)) -#define sk_POLICYINFO_delete_ptr(st, ptr) SKM_sk_delete_ptr(POLICYINFO, (st), (ptr)) -#define sk_POLICYINFO_insert(st, val, i) SKM_sk_insert(POLICYINFO, (st), (val), (i)) -#define sk_POLICYINFO_set_cmp_func(st, cmp) SKM_sk_set_cmp_func(POLICYINFO, (st), (cmp)) -#define sk_POLICYINFO_dup(st) SKM_sk_dup(POLICYINFO, st) -#define sk_POLICYINFO_pop_free(st, free_func) SKM_sk_pop_free(POLICYINFO, (st), (free_func)) -#define sk_POLICYINFO_shift(st) SKM_sk_shift(POLICYINFO, (st)) -#define sk_POLICYINFO_pop(st) SKM_sk_pop(POLICYINFO, (st)) -#define sk_POLICYINFO_sort(st) SKM_sk_sort(POLICYINFO, (st)) -#define sk_POLICYINFO_is_sorted(st) SKM_sk_is_sorted(POLICYINFO, (st)) - -#define sk_POLICYQUALINFO_new(cmp) SKM_sk_new(POLICYQUALINFO, (cmp)) -#define sk_POLICYQUALINFO_new_null() SKM_sk_new_null(POLICYQUALINFO) -#define sk_POLICYQUALINFO_free(st) SKM_sk_free(POLICYQUALINFO, (st)) -#define sk_POLICYQUALINFO_num(st) SKM_sk_num(POLICYQUALINFO, (st)) -#define sk_POLICYQUALINFO_value(st, i) SKM_sk_value(POLICYQUALINFO, (st), (i)) -#define sk_POLICYQUALINFO_set(st, i, val) SKM_sk_set(POLICYQUALINFO, (st), (i), (val)) -#define sk_POLICYQUALINFO_zero(st) SKM_sk_zero(POLICYQUALINFO, (st)) -#define sk_POLICYQUALINFO_push(st, val) SKM_sk_push(POLICYQUALINFO, (st), (val)) -#define sk_POLICYQUALINFO_unshift(st, val) SKM_sk_unshift(POLICYQUALINFO, (st), (val)) -#define sk_POLICYQUALINFO_find(st, val) SKM_sk_find(POLICYQUALINFO, (st), (val)) -#define sk_POLICYQUALINFO_find_ex(st, val) SKM_sk_find_ex(POLICYQUALINFO, (st), (val)) -#define sk_POLICYQUALINFO_delete(st, i) SKM_sk_delete(POLICYQUALINFO, (st), (i)) -#define sk_POLICYQUALINFO_delete_ptr(st, ptr) SKM_sk_delete_ptr(POLICYQUALINFO, (st), (ptr)) -#define sk_POLICYQUALINFO_insert(st, val, i) SKM_sk_insert(POLICYQUALINFO, (st), (val), (i)) -#define sk_POLICYQUALINFO_set_cmp_func(st, cmp) SKM_sk_set_cmp_func(POLICYQUALINFO, (st), (cmp)) -#define sk_POLICYQUALINFO_dup(st) SKM_sk_dup(POLICYQUALINFO, st) -#define sk_POLICYQUALINFO_pop_free(st, free_func) SKM_sk_pop_free(POLICYQUALINFO, (st), (free_func)) -#define sk_POLICYQUALINFO_shift(st) SKM_sk_shift(POLICYQUALINFO, (st)) -#define sk_POLICYQUALINFO_pop(st) SKM_sk_pop(POLICYQUALINFO, (st)) -#define sk_POLICYQUALINFO_sort(st) SKM_sk_sort(POLICYQUALINFO, (st)) -#define sk_POLICYQUALINFO_is_sorted(st) SKM_sk_is_sorted(POLICYQUALINFO, (st)) - -#define sk_POLICY_MAPPING_new(cmp) SKM_sk_new(POLICY_MAPPING, (cmp)) -#define sk_POLICY_MAPPING_new_null() SKM_sk_new_null(POLICY_MAPPING) -#define sk_POLICY_MAPPING_free(st) SKM_sk_free(POLICY_MAPPING, (st)) -#define sk_POLICY_MAPPING_num(st) SKM_sk_num(POLICY_MAPPING, (st)) -#define sk_POLICY_MAPPING_value(st, i) SKM_sk_value(POLICY_MAPPING, (st), (i)) -#define sk_POLICY_MAPPING_set(st, i, val) SKM_sk_set(POLICY_MAPPING, (st), (i), (val)) -#define sk_POLICY_MAPPING_zero(st) SKM_sk_zero(POLICY_MAPPING, (st)) -#define sk_POLICY_MAPPING_push(st, val) SKM_sk_push(POLICY_MAPPING, (st), (val)) -#define sk_POLICY_MAPPING_unshift(st, val) SKM_sk_unshift(POLICY_MAPPING, (st), (val)) -#define sk_POLICY_MAPPING_find(st, val) SKM_sk_find(POLICY_MAPPING, (st), (val)) -#define sk_POLICY_MAPPING_find_ex(st, val) SKM_sk_find_ex(POLICY_MAPPING, (st), (val)) -#define sk_POLICY_MAPPING_delete(st, i) SKM_sk_delete(POLICY_MAPPING, (st), (i)) -#define sk_POLICY_MAPPING_delete_ptr(st, ptr) SKM_sk_delete_ptr(POLICY_MAPPING, (st), (ptr)) -#define sk_POLICY_MAPPING_insert(st, val, i) SKM_sk_insert(POLICY_MAPPING, (st), (val), (i)) -#define sk_POLICY_MAPPING_set_cmp_func(st, cmp) SKM_sk_set_cmp_func(POLICY_MAPPING, (st), (cmp)) -#define sk_POLICY_MAPPING_dup(st) SKM_sk_dup(POLICY_MAPPING, st) -#define sk_POLICY_MAPPING_pop_free(st, free_func) SKM_sk_pop_free(POLICY_MAPPING, (st), (free_func)) -#define sk_POLICY_MAPPING_shift(st) SKM_sk_shift(POLICY_MAPPING, (st)) -#define sk_POLICY_MAPPING_pop(st) SKM_sk_pop(POLICY_MAPPING, (st)) -#define sk_POLICY_MAPPING_sort(st) SKM_sk_sort(POLICY_MAPPING, (st)) -#define sk_POLICY_MAPPING_is_sorted(st) SKM_sk_is_sorted(POLICY_MAPPING, (st)) - -#define sk_SRP_gN_new(cmp) SKM_sk_new(SRP_gN, (cmp)) -#define sk_SRP_gN_new_null() SKM_sk_new_null(SRP_gN) -#define sk_SRP_gN_free(st) SKM_sk_free(SRP_gN, (st)) -#define sk_SRP_gN_num(st) SKM_sk_num(SRP_gN, (st)) -#define sk_SRP_gN_value(st, i) SKM_sk_value(SRP_gN, (st), (i)) -#define sk_SRP_gN_set(st, i, val) SKM_sk_set(SRP_gN, (st), (i), (val)) -#define sk_SRP_gN_zero(st) SKM_sk_zero(SRP_gN, (st)) -#define sk_SRP_gN_push(st, val) SKM_sk_push(SRP_gN, (st), (val)) -#define sk_SRP_gN_unshift(st, val) SKM_sk_unshift(SRP_gN, (st), (val)) -#define sk_SRP_gN_find(st, val) SKM_sk_find(SRP_gN, (st), (val)) -#define sk_SRP_gN_find_ex(st, val) SKM_sk_find_ex(SRP_gN, (st), (val)) -#define sk_SRP_gN_delete(st, i) SKM_sk_delete(SRP_gN, (st), (i)) -#define sk_SRP_gN_delete_ptr(st, ptr) SKM_sk_delete_ptr(SRP_gN, (st), (ptr)) -#define sk_SRP_gN_insert(st, val, i) SKM_sk_insert(SRP_gN, (st), (val), (i)) -#define sk_SRP_gN_set_cmp_func(st, cmp) SKM_sk_set_cmp_func(SRP_gN, (st), (cmp)) -#define sk_SRP_gN_dup(st) SKM_sk_dup(SRP_gN, st) -#define sk_SRP_gN_pop_free(st, free_func) SKM_sk_pop_free(SRP_gN, (st), (free_func)) -#define sk_SRP_gN_shift(st) SKM_sk_shift(SRP_gN, (st)) -#define sk_SRP_gN_pop(st) SKM_sk_pop(SRP_gN, (st)) -#define sk_SRP_gN_sort(st) SKM_sk_sort(SRP_gN, (st)) -#define sk_SRP_gN_is_sorted(st) SKM_sk_is_sorted(SRP_gN, (st)) - -#define sk_SRP_gN_cache_new(cmp) SKM_sk_new(SRP_gN_cache, (cmp)) -#define sk_SRP_gN_cache_new_null() SKM_sk_new_null(SRP_gN_cache) -#define sk_SRP_gN_cache_free(st) SKM_sk_free(SRP_gN_cache, (st)) -#define sk_SRP_gN_cache_num(st) SKM_sk_num(SRP_gN_cache, (st)) -#define sk_SRP_gN_cache_value(st, i) SKM_sk_value(SRP_gN_cache, (st), (i)) -#define sk_SRP_gN_cache_set(st, i, val) SKM_sk_set(SRP_gN_cache, (st), (i), (val)) -#define sk_SRP_gN_cache_zero(st) SKM_sk_zero(SRP_gN_cache, (st)) -#define sk_SRP_gN_cache_push(st, val) SKM_sk_push(SRP_gN_cache, (st), (val)) -#define sk_SRP_gN_cache_unshift(st, val) SKM_sk_unshift(SRP_gN_cache, (st), (val)) -#define sk_SRP_gN_cache_find(st, val) SKM_sk_find(SRP_gN_cache, (st), (val)) -#define sk_SRP_gN_cache_find_ex(st, val) SKM_sk_find_ex(SRP_gN_cache, (st), (val)) -#define sk_SRP_gN_cache_delete(st, i) SKM_sk_delete(SRP_gN_cache, (st), (i)) -#define sk_SRP_gN_cache_delete_ptr(st, ptr) SKM_sk_delete_ptr(SRP_gN_cache, (st), (ptr)) -#define sk_SRP_gN_cache_insert(st, val, i) SKM_sk_insert(SRP_gN_cache, (st), (val), (i)) -#define sk_SRP_gN_cache_set_cmp_func(st, cmp) SKM_sk_set_cmp_func(SRP_gN_cache, (st), (cmp)) -#define sk_SRP_gN_cache_dup(st) SKM_sk_dup(SRP_gN_cache, st) -#define sk_SRP_gN_cache_pop_free(st, free_func) SKM_sk_pop_free(SRP_gN_cache, (st), (free_func)) -#define sk_SRP_gN_cache_shift(st) SKM_sk_shift(SRP_gN_cache, (st)) -#define sk_SRP_gN_cache_pop(st) SKM_sk_pop(SRP_gN_cache, (st)) -#define sk_SRP_gN_cache_sort(st) SKM_sk_sort(SRP_gN_cache, (st)) -#define sk_SRP_gN_cache_is_sorted(st) SKM_sk_is_sorted(SRP_gN_cache, (st)) - -#define sk_SRP_user_pwd_new(cmp) SKM_sk_new(SRP_user_pwd, (cmp)) -#define sk_SRP_user_pwd_new_null() SKM_sk_new_null(SRP_user_pwd) -#define sk_SRP_user_pwd_free(st) SKM_sk_free(SRP_user_pwd, (st)) -#define sk_SRP_user_pwd_num(st) SKM_sk_num(SRP_user_pwd, (st)) -#define sk_SRP_user_pwd_value(st, i) SKM_sk_value(SRP_user_pwd, (st), (i)) -#define sk_SRP_user_pwd_set(st, i, val) SKM_sk_set(SRP_user_pwd, (st), (i), (val)) -#define sk_SRP_user_pwd_zero(st) SKM_sk_zero(SRP_user_pwd, (st)) -#define sk_SRP_user_pwd_push(st, val) SKM_sk_push(SRP_user_pwd, (st), (val)) -#define sk_SRP_user_pwd_unshift(st, val) SKM_sk_unshift(SRP_user_pwd, (st), (val)) -#define sk_SRP_user_pwd_find(st, val) SKM_sk_find(SRP_user_pwd, (st), (val)) -#define sk_SRP_user_pwd_find_ex(st, val) SKM_sk_find_ex(SRP_user_pwd, (st), (val)) -#define sk_SRP_user_pwd_delete(st, i) SKM_sk_delete(SRP_user_pwd, (st), (i)) -#define sk_SRP_user_pwd_delete_ptr(st, ptr) SKM_sk_delete_ptr(SRP_user_pwd, (st), (ptr)) -#define sk_SRP_user_pwd_insert(st, val, i) SKM_sk_insert(SRP_user_pwd, (st), (val), (i)) -#define sk_SRP_user_pwd_set_cmp_func(st, cmp) SKM_sk_set_cmp_func(SRP_user_pwd, (st), (cmp)) -#define sk_SRP_user_pwd_dup(st) SKM_sk_dup(SRP_user_pwd, st) -#define sk_SRP_user_pwd_pop_free(st, free_func) SKM_sk_pop_free(SRP_user_pwd, (st), (free_func)) -#define sk_SRP_user_pwd_shift(st) SKM_sk_shift(SRP_user_pwd, (st)) -#define sk_SRP_user_pwd_pop(st) SKM_sk_pop(SRP_user_pwd, (st)) -#define sk_SRP_user_pwd_sort(st) SKM_sk_sort(SRP_user_pwd, (st)) -#define sk_SRP_user_pwd_is_sorted(st) SKM_sk_is_sorted(SRP_user_pwd, (st)) - -#define sk_SRTP_PROTECTION_PROFILE_new(cmp) SKM_sk_new(SRTP_PROTECTION_PROFILE, (cmp)) -#define sk_SRTP_PROTECTION_PROFILE_new_null() SKM_sk_new_null(SRTP_PROTECTION_PROFILE) -#define sk_SRTP_PROTECTION_PROFILE_free(st) SKM_sk_free(SRTP_PROTECTION_PROFILE, (st)) -#define sk_SRTP_PROTECTION_PROFILE_num(st) SKM_sk_num(SRTP_PROTECTION_PROFILE, (st)) -#define sk_SRTP_PROTECTION_PROFILE_value(st, i) SKM_sk_value(SRTP_PROTECTION_PROFILE, (st), (i)) -#define sk_SRTP_PROTECTION_PROFILE_set(st, i, val) SKM_sk_set(SRTP_PROTECTION_PROFILE, (st), (i), (val)) -#define sk_SRTP_PROTECTION_PROFILE_zero(st) SKM_sk_zero(SRTP_PROTECTION_PROFILE, (st)) -#define sk_SRTP_PROTECTION_PROFILE_push(st, val) SKM_sk_push(SRTP_PROTECTION_PROFILE, (st), (val)) -#define sk_SRTP_PROTECTION_PROFILE_unshift(st, val) SKM_sk_unshift(SRTP_PROTECTION_PROFILE, (st), (val)) -#define sk_SRTP_PROTECTION_PROFILE_find(st, val) SKM_sk_find(SRTP_PROTECTION_PROFILE, (st), (val)) -#define sk_SRTP_PROTECTION_PROFILE_find_ex(st, val) SKM_sk_find_ex(SRTP_PROTECTION_PROFILE, (st), (val)) -#define sk_SRTP_PROTECTION_PROFILE_delete(st, i) SKM_sk_delete(SRTP_PROTECTION_PROFILE, (st), (i)) -#define sk_SRTP_PROTECTION_PROFILE_delete_ptr(st, ptr) SKM_sk_delete_ptr(SRTP_PROTECTION_PROFILE, (st), (ptr)) -#define sk_SRTP_PROTECTION_PROFILE_insert(st, val, i) SKM_sk_insert(SRTP_PROTECTION_PROFILE, (st), (val), (i)) -#define sk_SRTP_PROTECTION_PROFILE_set_cmp_func(st, cmp) SKM_sk_set_cmp_func(SRTP_PROTECTION_PROFILE, (st), (cmp)) -#define sk_SRTP_PROTECTION_PROFILE_dup(st) SKM_sk_dup(SRTP_PROTECTION_PROFILE, st) -#define sk_SRTP_PROTECTION_PROFILE_pop_free(st, free_func) SKM_sk_pop_free(SRTP_PROTECTION_PROFILE, (st), (free_func)) -#define sk_SRTP_PROTECTION_PROFILE_shift(st) SKM_sk_shift(SRTP_PROTECTION_PROFILE, (st)) -#define sk_SRTP_PROTECTION_PROFILE_pop(st) SKM_sk_pop(SRTP_PROTECTION_PROFILE, (st)) -#define sk_SRTP_PROTECTION_PROFILE_sort(st) SKM_sk_sort(SRTP_PROTECTION_PROFILE, (st)) -#define sk_SRTP_PROTECTION_PROFILE_is_sorted(st) SKM_sk_is_sorted(SRTP_PROTECTION_PROFILE, (st)) - -#define sk_SSL_CIPHER_new(cmp) SKM_sk_new(SSL_CIPHER, (cmp)) -#define sk_SSL_CIPHER_new_null() SKM_sk_new_null(SSL_CIPHER) -#define sk_SSL_CIPHER_free(st) SKM_sk_free(SSL_CIPHER, (st)) -#define sk_SSL_CIPHER_num(st) SKM_sk_num(SSL_CIPHER, (st)) -#define sk_SSL_CIPHER_value(st, i) SKM_sk_value(SSL_CIPHER, (st), (i)) -#define sk_SSL_CIPHER_set(st, i, val) SKM_sk_set(SSL_CIPHER, (st), (i), (val)) -#define sk_SSL_CIPHER_zero(st) SKM_sk_zero(SSL_CIPHER, (st)) -#define sk_SSL_CIPHER_push(st, val) SKM_sk_push(SSL_CIPHER, (st), (val)) -#define sk_SSL_CIPHER_unshift(st, val) SKM_sk_unshift(SSL_CIPHER, (st), (val)) -#define sk_SSL_CIPHER_find(st, val) SKM_sk_find(SSL_CIPHER, (st), (val)) -#define sk_SSL_CIPHER_find_ex(st, val) SKM_sk_find_ex(SSL_CIPHER, (st), (val)) -#define sk_SSL_CIPHER_delete(st, i) SKM_sk_delete(SSL_CIPHER, (st), (i)) -#define sk_SSL_CIPHER_delete_ptr(st, ptr) SKM_sk_delete_ptr(SSL_CIPHER, (st), (ptr)) -#define sk_SSL_CIPHER_insert(st, val, i) SKM_sk_insert(SSL_CIPHER, (st), (val), (i)) -#define sk_SSL_CIPHER_set_cmp_func(st, cmp) SKM_sk_set_cmp_func(SSL_CIPHER, (st), (cmp)) -#define sk_SSL_CIPHER_dup(st) SKM_sk_dup(SSL_CIPHER, st) -#define sk_SSL_CIPHER_pop_free(st, free_func) SKM_sk_pop_free(SSL_CIPHER, (st), (free_func)) -#define sk_SSL_CIPHER_shift(st) SKM_sk_shift(SSL_CIPHER, (st)) -#define sk_SSL_CIPHER_pop(st) SKM_sk_pop(SSL_CIPHER, (st)) -#define sk_SSL_CIPHER_sort(st) SKM_sk_sort(SSL_CIPHER, (st)) -#define sk_SSL_CIPHER_is_sorted(st) SKM_sk_is_sorted(SSL_CIPHER, (st)) - -#define sk_SSL_COMP_new(cmp) SKM_sk_new(SSL_COMP, (cmp)) -#define sk_SSL_COMP_new_null() SKM_sk_new_null(SSL_COMP) -#define sk_SSL_COMP_free(st) SKM_sk_free(SSL_COMP, (st)) -#define sk_SSL_COMP_num(st) SKM_sk_num(SSL_COMP, (st)) -#define sk_SSL_COMP_value(st, i) SKM_sk_value(SSL_COMP, (st), (i)) -#define sk_SSL_COMP_set(st, i, val) SKM_sk_set(SSL_COMP, (st), (i), (val)) -#define sk_SSL_COMP_zero(st) SKM_sk_zero(SSL_COMP, (st)) -#define sk_SSL_COMP_push(st, val) SKM_sk_push(SSL_COMP, (st), (val)) -#define sk_SSL_COMP_unshift(st, val) SKM_sk_unshift(SSL_COMP, (st), (val)) -#define sk_SSL_COMP_find(st, val) SKM_sk_find(SSL_COMP, (st), (val)) -#define sk_SSL_COMP_find_ex(st, val) SKM_sk_find_ex(SSL_COMP, (st), (val)) -#define sk_SSL_COMP_delete(st, i) SKM_sk_delete(SSL_COMP, (st), (i)) -#define sk_SSL_COMP_delete_ptr(st, ptr) SKM_sk_delete_ptr(SSL_COMP, (st), (ptr)) -#define sk_SSL_COMP_insert(st, val, i) SKM_sk_insert(SSL_COMP, (st), (val), (i)) -#define sk_SSL_COMP_set_cmp_func(st, cmp) SKM_sk_set_cmp_func(SSL_COMP, (st), (cmp)) -#define sk_SSL_COMP_dup(st) SKM_sk_dup(SSL_COMP, st) -#define sk_SSL_COMP_pop_free(st, free_func) SKM_sk_pop_free(SSL_COMP, (st), (free_func)) -#define sk_SSL_COMP_shift(st) SKM_sk_shift(SSL_COMP, (st)) -#define sk_SSL_COMP_pop(st) SKM_sk_pop(SSL_COMP, (st)) -#define sk_SSL_COMP_sort(st) SKM_sk_sort(SSL_COMP, (st)) -#define sk_SSL_COMP_is_sorted(st) SKM_sk_is_sorted(SSL_COMP, (st)) - -#define sk_STACK_OF_X509_NAME_ENTRY_new(cmp) SKM_sk_new(STACK_OF_X509_NAME_ENTRY, (cmp)) -#define sk_STACK_OF_X509_NAME_ENTRY_new_null() SKM_sk_new_null(STACK_OF_X509_NAME_ENTRY) -#define sk_STACK_OF_X509_NAME_ENTRY_free(st) SKM_sk_free(STACK_OF_X509_NAME_ENTRY, (st)) -#define sk_STACK_OF_X509_NAME_ENTRY_num(st) SKM_sk_num(STACK_OF_X509_NAME_ENTRY, (st)) -#define sk_STACK_OF_X509_NAME_ENTRY_value(st, i) SKM_sk_value(STACK_OF_X509_NAME_ENTRY, (st), (i)) -#define sk_STACK_OF_X509_NAME_ENTRY_set(st, i, val) SKM_sk_set(STACK_OF_X509_NAME_ENTRY, (st), (i), (val)) -#define sk_STACK_OF_X509_NAME_ENTRY_zero(st) SKM_sk_zero(STACK_OF_X509_NAME_ENTRY, (st)) -#define sk_STACK_OF_X509_NAME_ENTRY_push(st, val) SKM_sk_push(STACK_OF_X509_NAME_ENTRY, (st), (val)) -#define sk_STACK_OF_X509_NAME_ENTRY_unshift(st, val) SKM_sk_unshift(STACK_OF_X509_NAME_ENTRY, (st), (val)) -#define sk_STACK_OF_X509_NAME_ENTRY_find(st, val) SKM_sk_find(STACK_OF_X509_NAME_ENTRY, (st), (val)) -#define sk_STACK_OF_X509_NAME_ENTRY_find_ex(st, val) SKM_sk_find_ex(STACK_OF_X509_NAME_ENTRY, (st), (val)) -#define sk_STACK_OF_X509_NAME_ENTRY_delete(st, i) SKM_sk_delete(STACK_OF_X509_NAME_ENTRY, (st), (i)) -#define sk_STACK_OF_X509_NAME_ENTRY_delete_ptr(st, ptr) SKM_sk_delete_ptr(STACK_OF_X509_NAME_ENTRY, (st), (ptr)) -#define sk_STACK_OF_X509_NAME_ENTRY_insert(st, val, i) SKM_sk_insert(STACK_OF_X509_NAME_ENTRY, (st), (val), (i)) -#define sk_STACK_OF_X509_NAME_ENTRY_set_cmp_func(st, cmp) SKM_sk_set_cmp_func(STACK_OF_X509_NAME_ENTRY, (st), (cmp)) -#define sk_STACK_OF_X509_NAME_ENTRY_dup(st) SKM_sk_dup(STACK_OF_X509_NAME_ENTRY, st) -#define sk_STACK_OF_X509_NAME_ENTRY_pop_free(st, free_func) SKM_sk_pop_free(STACK_OF_X509_NAME_ENTRY, (st), (free_func)) -#define sk_STACK_OF_X509_NAME_ENTRY_shift(st) SKM_sk_shift(STACK_OF_X509_NAME_ENTRY, (st)) -#define sk_STACK_OF_X509_NAME_ENTRY_pop(st) SKM_sk_pop(STACK_OF_X509_NAME_ENTRY, (st)) -#define sk_STACK_OF_X509_NAME_ENTRY_sort(st) SKM_sk_sort(STACK_OF_X509_NAME_ENTRY, (st)) -#define sk_STACK_OF_X509_NAME_ENTRY_is_sorted(st) SKM_sk_is_sorted(STACK_OF_X509_NAME_ENTRY, (st)) - -#define sk_STORE_ATTR_INFO_new(cmp) SKM_sk_new(STORE_ATTR_INFO, (cmp)) -#define sk_STORE_ATTR_INFO_new_null() SKM_sk_new_null(STORE_ATTR_INFO) -#define sk_STORE_ATTR_INFO_free(st) SKM_sk_free(STORE_ATTR_INFO, (st)) -#define sk_STORE_ATTR_INFO_num(st) SKM_sk_num(STORE_ATTR_INFO, (st)) -#define sk_STORE_ATTR_INFO_value(st, i) SKM_sk_value(STORE_ATTR_INFO, (st), (i)) -#define sk_STORE_ATTR_INFO_set(st, i, val) SKM_sk_set(STORE_ATTR_INFO, (st), (i), (val)) -#define sk_STORE_ATTR_INFO_zero(st) SKM_sk_zero(STORE_ATTR_INFO, (st)) -#define sk_STORE_ATTR_INFO_push(st, val) SKM_sk_push(STORE_ATTR_INFO, (st), (val)) -#define sk_STORE_ATTR_INFO_unshift(st, val) SKM_sk_unshift(STORE_ATTR_INFO, (st), (val)) -#define sk_STORE_ATTR_INFO_find(st, val) SKM_sk_find(STORE_ATTR_INFO, (st), (val)) -#define sk_STORE_ATTR_INFO_find_ex(st, val) SKM_sk_find_ex(STORE_ATTR_INFO, (st), (val)) -#define sk_STORE_ATTR_INFO_delete(st, i) SKM_sk_delete(STORE_ATTR_INFO, (st), (i)) -#define sk_STORE_ATTR_INFO_delete_ptr(st, ptr) SKM_sk_delete_ptr(STORE_ATTR_INFO, (st), (ptr)) -#define sk_STORE_ATTR_INFO_insert(st, val, i) SKM_sk_insert(STORE_ATTR_INFO, (st), (val), (i)) -#define sk_STORE_ATTR_INFO_set_cmp_func(st, cmp) SKM_sk_set_cmp_func(STORE_ATTR_INFO, (st), (cmp)) -#define sk_STORE_ATTR_INFO_dup(st) SKM_sk_dup(STORE_ATTR_INFO, st) -#define sk_STORE_ATTR_INFO_pop_free(st, free_func) SKM_sk_pop_free(STORE_ATTR_INFO, (st), (free_func)) -#define sk_STORE_ATTR_INFO_shift(st) SKM_sk_shift(STORE_ATTR_INFO, (st)) -#define sk_STORE_ATTR_INFO_pop(st) SKM_sk_pop(STORE_ATTR_INFO, (st)) -#define sk_STORE_ATTR_INFO_sort(st) SKM_sk_sort(STORE_ATTR_INFO, (st)) -#define sk_STORE_ATTR_INFO_is_sorted(st) SKM_sk_is_sorted(STORE_ATTR_INFO, (st)) - -#define sk_STORE_OBJECT_new(cmp) SKM_sk_new(STORE_OBJECT, (cmp)) -#define sk_STORE_OBJECT_new_null() SKM_sk_new_null(STORE_OBJECT) -#define sk_STORE_OBJECT_free(st) SKM_sk_free(STORE_OBJECT, (st)) -#define sk_STORE_OBJECT_num(st) SKM_sk_num(STORE_OBJECT, (st)) -#define sk_STORE_OBJECT_value(st, i) SKM_sk_value(STORE_OBJECT, (st), (i)) -#define sk_STORE_OBJECT_set(st, i, val) SKM_sk_set(STORE_OBJECT, (st), (i), (val)) -#define sk_STORE_OBJECT_zero(st) SKM_sk_zero(STORE_OBJECT, (st)) -#define sk_STORE_OBJECT_push(st, val) SKM_sk_push(STORE_OBJECT, (st), (val)) -#define sk_STORE_OBJECT_unshift(st, val) SKM_sk_unshift(STORE_OBJECT, (st), (val)) -#define sk_STORE_OBJECT_find(st, val) SKM_sk_find(STORE_OBJECT, (st), (val)) -#define sk_STORE_OBJECT_find_ex(st, val) SKM_sk_find_ex(STORE_OBJECT, (st), (val)) -#define sk_STORE_OBJECT_delete(st, i) SKM_sk_delete(STORE_OBJECT, (st), (i)) -#define sk_STORE_OBJECT_delete_ptr(st, ptr) SKM_sk_delete_ptr(STORE_OBJECT, (st), (ptr)) -#define sk_STORE_OBJECT_insert(st, val, i) SKM_sk_insert(STORE_OBJECT, (st), (val), (i)) -#define sk_STORE_OBJECT_set_cmp_func(st, cmp) SKM_sk_set_cmp_func(STORE_OBJECT, (st), (cmp)) -#define sk_STORE_OBJECT_dup(st) SKM_sk_dup(STORE_OBJECT, st) -#define sk_STORE_OBJECT_pop_free(st, free_func) SKM_sk_pop_free(STORE_OBJECT, (st), (free_func)) -#define sk_STORE_OBJECT_shift(st) SKM_sk_shift(STORE_OBJECT, (st)) -#define sk_STORE_OBJECT_pop(st) SKM_sk_pop(STORE_OBJECT, (st)) -#define sk_STORE_OBJECT_sort(st) SKM_sk_sort(STORE_OBJECT, (st)) -#define sk_STORE_OBJECT_is_sorted(st) SKM_sk_is_sorted(STORE_OBJECT, (st)) - -#define sk_SXNETID_new(cmp) SKM_sk_new(SXNETID, (cmp)) -#define sk_SXNETID_new_null() SKM_sk_new_null(SXNETID) -#define sk_SXNETID_free(st) SKM_sk_free(SXNETID, (st)) -#define sk_SXNETID_num(st) SKM_sk_num(SXNETID, (st)) -#define sk_SXNETID_value(st, i) SKM_sk_value(SXNETID, (st), (i)) -#define sk_SXNETID_set(st, i, val) SKM_sk_set(SXNETID, (st), (i), (val)) -#define sk_SXNETID_zero(st) SKM_sk_zero(SXNETID, (st)) -#define sk_SXNETID_push(st, val) SKM_sk_push(SXNETID, (st), (val)) -#define sk_SXNETID_unshift(st, val) SKM_sk_unshift(SXNETID, (st), (val)) -#define sk_SXNETID_find(st, val) SKM_sk_find(SXNETID, (st), (val)) -#define sk_SXNETID_find_ex(st, val) SKM_sk_find_ex(SXNETID, (st), (val)) -#define sk_SXNETID_delete(st, i) SKM_sk_delete(SXNETID, (st), (i)) -#define sk_SXNETID_delete_ptr(st, ptr) SKM_sk_delete_ptr(SXNETID, (st), (ptr)) -#define sk_SXNETID_insert(st, val, i) SKM_sk_insert(SXNETID, (st), (val), (i)) -#define sk_SXNETID_set_cmp_func(st, cmp) SKM_sk_set_cmp_func(SXNETID, (st), (cmp)) -#define sk_SXNETID_dup(st) SKM_sk_dup(SXNETID, st) -#define sk_SXNETID_pop_free(st, free_func) SKM_sk_pop_free(SXNETID, (st), (free_func)) -#define sk_SXNETID_shift(st) SKM_sk_shift(SXNETID, (st)) -#define sk_SXNETID_pop(st) SKM_sk_pop(SXNETID, (st)) -#define sk_SXNETID_sort(st) SKM_sk_sort(SXNETID, (st)) -#define sk_SXNETID_is_sorted(st) SKM_sk_is_sorted(SXNETID, (st)) - -#define sk_UI_STRING_new(cmp) SKM_sk_new(UI_STRING, (cmp)) -#define sk_UI_STRING_new_null() SKM_sk_new_null(UI_STRING) -#define sk_UI_STRING_free(st) SKM_sk_free(UI_STRING, (st)) -#define sk_UI_STRING_num(st) SKM_sk_num(UI_STRING, (st)) -#define sk_UI_STRING_value(st, i) SKM_sk_value(UI_STRING, (st), (i)) -#define sk_UI_STRING_set(st, i, val) SKM_sk_set(UI_STRING, (st), (i), (val)) -#define sk_UI_STRING_zero(st) SKM_sk_zero(UI_STRING, (st)) -#define sk_UI_STRING_push(st, val) SKM_sk_push(UI_STRING, (st), (val)) -#define sk_UI_STRING_unshift(st, val) SKM_sk_unshift(UI_STRING, (st), (val)) -#define sk_UI_STRING_find(st, val) SKM_sk_find(UI_STRING, (st), (val)) -#define sk_UI_STRING_find_ex(st, val) SKM_sk_find_ex(UI_STRING, (st), (val)) -#define sk_UI_STRING_delete(st, i) SKM_sk_delete(UI_STRING, (st), (i)) -#define sk_UI_STRING_delete_ptr(st, ptr) SKM_sk_delete_ptr(UI_STRING, (st), (ptr)) -#define sk_UI_STRING_insert(st, val, i) SKM_sk_insert(UI_STRING, (st), (val), (i)) -#define sk_UI_STRING_set_cmp_func(st, cmp) SKM_sk_set_cmp_func(UI_STRING, (st), (cmp)) -#define sk_UI_STRING_dup(st) SKM_sk_dup(UI_STRING, st) -#define sk_UI_STRING_pop_free(st, free_func) SKM_sk_pop_free(UI_STRING, (st), (free_func)) -#define sk_UI_STRING_shift(st) SKM_sk_shift(UI_STRING, (st)) -#define sk_UI_STRING_pop(st) SKM_sk_pop(UI_STRING, (st)) -#define sk_UI_STRING_sort(st) SKM_sk_sort(UI_STRING, (st)) -#define sk_UI_STRING_is_sorted(st) SKM_sk_is_sorted(UI_STRING, (st)) - -#define sk_X509_new(cmp) SKM_sk_new(X509, (cmp)) -#define sk_X509_new_null() SKM_sk_new_null(X509) -#define sk_X509_free(st) SKM_sk_free(X509, (st)) -#define sk_X509_num(st) SKM_sk_num(X509, (st)) -#define sk_X509_value(st, i) SKM_sk_value(X509, (st), (i)) -#define sk_X509_set(st, i, val) SKM_sk_set(X509, (st), (i), (val)) -#define sk_X509_zero(st) SKM_sk_zero(X509, (st)) -#define sk_X509_push(st, val) SKM_sk_push(X509, (st), (val)) -#define sk_X509_unshift(st, val) SKM_sk_unshift(X509, (st), (val)) -#define sk_X509_find(st, val) SKM_sk_find(X509, (st), (val)) -#define sk_X509_find_ex(st, val) SKM_sk_find_ex(X509, (st), (val)) -#define sk_X509_delete(st, i) SKM_sk_delete(X509, (st), (i)) -#define sk_X509_delete_ptr(st, ptr) SKM_sk_delete_ptr(X509, (st), (ptr)) -#define sk_X509_insert(st, val, i) SKM_sk_insert(X509, (st), (val), (i)) -#define sk_X509_set_cmp_func(st, cmp) SKM_sk_set_cmp_func(X509, (st), (cmp)) -#define sk_X509_dup(st) SKM_sk_dup(X509, st) -#define sk_X509_pop_free(st, free_func) SKM_sk_pop_free(X509, (st), (free_func)) -#define sk_X509_shift(st) SKM_sk_shift(X509, (st)) -#define sk_X509_pop(st) SKM_sk_pop(X509, (st)) -#define sk_X509_sort(st) SKM_sk_sort(X509, (st)) -#define sk_X509_is_sorted(st) SKM_sk_is_sorted(X509, (st)) - -#define sk_X509V3_EXT_METHOD_new(cmp) SKM_sk_new(X509V3_EXT_METHOD, (cmp)) -#define sk_X509V3_EXT_METHOD_new_null() SKM_sk_new_null(X509V3_EXT_METHOD) -#define sk_X509V3_EXT_METHOD_free(st) SKM_sk_free(X509V3_EXT_METHOD, (st)) -#define sk_X509V3_EXT_METHOD_num(st) SKM_sk_num(X509V3_EXT_METHOD, (st)) -#define sk_X509V3_EXT_METHOD_value(st, i) SKM_sk_value(X509V3_EXT_METHOD, (st), (i)) -#define sk_X509V3_EXT_METHOD_set(st, i, val) SKM_sk_set(X509V3_EXT_METHOD, (st), (i), (val)) -#define sk_X509V3_EXT_METHOD_zero(st) SKM_sk_zero(X509V3_EXT_METHOD, (st)) -#define sk_X509V3_EXT_METHOD_push(st, val) SKM_sk_push(X509V3_EXT_METHOD, (st), (val)) -#define sk_X509V3_EXT_METHOD_unshift(st, val) SKM_sk_unshift(X509V3_EXT_METHOD, (st), (val)) -#define sk_X509V3_EXT_METHOD_find(st, val) SKM_sk_find(X509V3_EXT_METHOD, (st), (val)) -#define sk_X509V3_EXT_METHOD_find_ex(st, val) SKM_sk_find_ex(X509V3_EXT_METHOD, (st), (val)) -#define sk_X509V3_EXT_METHOD_delete(st, i) SKM_sk_delete(X509V3_EXT_METHOD, (st), (i)) -#define sk_X509V3_EXT_METHOD_delete_ptr(st, ptr) SKM_sk_delete_ptr(X509V3_EXT_METHOD, (st), (ptr)) -#define sk_X509V3_EXT_METHOD_insert(st, val, i) SKM_sk_insert(X509V3_EXT_METHOD, (st), (val), (i)) -#define sk_X509V3_EXT_METHOD_set_cmp_func(st, cmp) SKM_sk_set_cmp_func(X509V3_EXT_METHOD, (st), (cmp)) -#define sk_X509V3_EXT_METHOD_dup(st) SKM_sk_dup(X509V3_EXT_METHOD, st) -#define sk_X509V3_EXT_METHOD_pop_free(st, free_func) SKM_sk_pop_free(X509V3_EXT_METHOD, (st), (free_func)) -#define sk_X509V3_EXT_METHOD_shift(st) SKM_sk_shift(X509V3_EXT_METHOD, (st)) -#define sk_X509V3_EXT_METHOD_pop(st) SKM_sk_pop(X509V3_EXT_METHOD, (st)) -#define sk_X509V3_EXT_METHOD_sort(st) SKM_sk_sort(X509V3_EXT_METHOD, (st)) -#define sk_X509V3_EXT_METHOD_is_sorted(st) SKM_sk_is_sorted(X509V3_EXT_METHOD, (st)) - -#define sk_X509_ALGOR_new(cmp) SKM_sk_new(X509_ALGOR, (cmp)) -#define sk_X509_ALGOR_new_null() SKM_sk_new_null(X509_ALGOR) -#define sk_X509_ALGOR_free(st) SKM_sk_free(X509_ALGOR, (st)) -#define sk_X509_ALGOR_num(st) SKM_sk_num(X509_ALGOR, (st)) -#define sk_X509_ALGOR_value(st, i) SKM_sk_value(X509_ALGOR, (st), (i)) -#define sk_X509_ALGOR_set(st, i, val) SKM_sk_set(X509_ALGOR, (st), (i), (val)) -#define sk_X509_ALGOR_zero(st) SKM_sk_zero(X509_ALGOR, (st)) -#define sk_X509_ALGOR_push(st, val) SKM_sk_push(X509_ALGOR, (st), (val)) -#define sk_X509_ALGOR_unshift(st, val) SKM_sk_unshift(X509_ALGOR, (st), (val)) -#define sk_X509_ALGOR_find(st, val) SKM_sk_find(X509_ALGOR, (st), (val)) -#define sk_X509_ALGOR_find_ex(st, val) SKM_sk_find_ex(X509_ALGOR, (st), (val)) -#define sk_X509_ALGOR_delete(st, i) SKM_sk_delete(X509_ALGOR, (st), (i)) -#define sk_X509_ALGOR_delete_ptr(st, ptr) SKM_sk_delete_ptr(X509_ALGOR, (st), (ptr)) -#define sk_X509_ALGOR_insert(st, val, i) SKM_sk_insert(X509_ALGOR, (st), (val), (i)) -#define sk_X509_ALGOR_set_cmp_func(st, cmp) SKM_sk_set_cmp_func(X509_ALGOR, (st), (cmp)) -#define sk_X509_ALGOR_dup(st) SKM_sk_dup(X509_ALGOR, st) -#define sk_X509_ALGOR_pop_free(st, free_func) SKM_sk_pop_free(X509_ALGOR, (st), (free_func)) -#define sk_X509_ALGOR_shift(st) SKM_sk_shift(X509_ALGOR, (st)) -#define sk_X509_ALGOR_pop(st) SKM_sk_pop(X509_ALGOR, (st)) -#define sk_X509_ALGOR_sort(st) SKM_sk_sort(X509_ALGOR, (st)) -#define sk_X509_ALGOR_is_sorted(st) SKM_sk_is_sorted(X509_ALGOR, (st)) - -#define sk_X509_ATTRIBUTE_new(cmp) SKM_sk_new(X509_ATTRIBUTE, (cmp)) -#define sk_X509_ATTRIBUTE_new_null() SKM_sk_new_null(X509_ATTRIBUTE) -#define sk_X509_ATTRIBUTE_free(st) SKM_sk_free(X509_ATTRIBUTE, (st)) -#define sk_X509_ATTRIBUTE_num(st) SKM_sk_num(X509_ATTRIBUTE, (st)) -#define sk_X509_ATTRIBUTE_value(st, i) SKM_sk_value(X509_ATTRIBUTE, (st), (i)) -#define sk_X509_ATTRIBUTE_set(st, i, val) SKM_sk_set(X509_ATTRIBUTE, (st), (i), (val)) -#define sk_X509_ATTRIBUTE_zero(st) SKM_sk_zero(X509_ATTRIBUTE, (st)) -#define sk_X509_ATTRIBUTE_push(st, val) SKM_sk_push(X509_ATTRIBUTE, (st), (val)) -#define sk_X509_ATTRIBUTE_unshift(st, val) SKM_sk_unshift(X509_ATTRIBUTE, (st), (val)) -#define sk_X509_ATTRIBUTE_find(st, val) SKM_sk_find(X509_ATTRIBUTE, (st), (val)) -#define sk_X509_ATTRIBUTE_find_ex(st, val) SKM_sk_find_ex(X509_ATTRIBUTE, (st), (val)) -#define sk_X509_ATTRIBUTE_delete(st, i) SKM_sk_delete(X509_ATTRIBUTE, (st), (i)) -#define sk_X509_ATTRIBUTE_delete_ptr(st, ptr) SKM_sk_delete_ptr(X509_ATTRIBUTE, (st), (ptr)) -#define sk_X509_ATTRIBUTE_insert(st, val, i) SKM_sk_insert(X509_ATTRIBUTE, (st), (val), (i)) -#define sk_X509_ATTRIBUTE_set_cmp_func(st, cmp) SKM_sk_set_cmp_func(X509_ATTRIBUTE, (st), (cmp)) -#define sk_X509_ATTRIBUTE_dup(st) SKM_sk_dup(X509_ATTRIBUTE, st) -#define sk_X509_ATTRIBUTE_pop_free(st, free_func) SKM_sk_pop_free(X509_ATTRIBUTE, (st), (free_func)) -#define sk_X509_ATTRIBUTE_shift(st) SKM_sk_shift(X509_ATTRIBUTE, (st)) -#define sk_X509_ATTRIBUTE_pop(st) SKM_sk_pop(X509_ATTRIBUTE, (st)) -#define sk_X509_ATTRIBUTE_sort(st) SKM_sk_sort(X509_ATTRIBUTE, (st)) -#define sk_X509_ATTRIBUTE_is_sorted(st) SKM_sk_is_sorted(X509_ATTRIBUTE, (st)) - -#define sk_X509_CRL_new(cmp) SKM_sk_new(X509_CRL, (cmp)) -#define sk_X509_CRL_new_null() SKM_sk_new_null(X509_CRL) -#define sk_X509_CRL_free(st) SKM_sk_free(X509_CRL, (st)) -#define sk_X509_CRL_num(st) SKM_sk_num(X509_CRL, (st)) -#define sk_X509_CRL_value(st, i) SKM_sk_value(X509_CRL, (st), (i)) -#define sk_X509_CRL_set(st, i, val) SKM_sk_set(X509_CRL, (st), (i), (val)) -#define sk_X509_CRL_zero(st) SKM_sk_zero(X509_CRL, (st)) -#define sk_X509_CRL_push(st, val) SKM_sk_push(X509_CRL, (st), (val)) -#define sk_X509_CRL_unshift(st, val) SKM_sk_unshift(X509_CRL, (st), (val)) -#define sk_X509_CRL_find(st, val) SKM_sk_find(X509_CRL, (st), (val)) -#define sk_X509_CRL_find_ex(st, val) SKM_sk_find_ex(X509_CRL, (st), (val)) -#define sk_X509_CRL_delete(st, i) SKM_sk_delete(X509_CRL, (st), (i)) -#define sk_X509_CRL_delete_ptr(st, ptr) SKM_sk_delete_ptr(X509_CRL, (st), (ptr)) -#define sk_X509_CRL_insert(st, val, i) SKM_sk_insert(X509_CRL, (st), (val), (i)) -#define sk_X509_CRL_set_cmp_func(st, cmp) SKM_sk_set_cmp_func(X509_CRL, (st), (cmp)) -#define sk_X509_CRL_dup(st) SKM_sk_dup(X509_CRL, st) -#define sk_X509_CRL_pop_free(st, free_func) SKM_sk_pop_free(X509_CRL, (st), (free_func)) -#define sk_X509_CRL_shift(st) SKM_sk_shift(X509_CRL, (st)) -#define sk_X509_CRL_pop(st) SKM_sk_pop(X509_CRL, (st)) -#define sk_X509_CRL_sort(st) SKM_sk_sort(X509_CRL, (st)) -#define sk_X509_CRL_is_sorted(st) SKM_sk_is_sorted(X509_CRL, (st)) - -#define sk_X509_EXTENSION_new(cmp) SKM_sk_new(X509_EXTENSION, (cmp)) -#define sk_X509_EXTENSION_new_null() SKM_sk_new_null(X509_EXTENSION) -#define sk_X509_EXTENSION_free(st) SKM_sk_free(X509_EXTENSION, (st)) -#define sk_X509_EXTENSION_num(st) SKM_sk_num(X509_EXTENSION, (st)) -#define sk_X509_EXTENSION_value(st, i) SKM_sk_value(X509_EXTENSION, (st), (i)) -#define sk_X509_EXTENSION_set(st, i, val) SKM_sk_set(X509_EXTENSION, (st), (i), (val)) -#define sk_X509_EXTENSION_zero(st) SKM_sk_zero(X509_EXTENSION, (st)) -#define sk_X509_EXTENSION_push(st, val) SKM_sk_push(X509_EXTENSION, (st), (val)) -#define sk_X509_EXTENSION_unshift(st, val) SKM_sk_unshift(X509_EXTENSION, (st), (val)) -#define sk_X509_EXTENSION_find(st, val) SKM_sk_find(X509_EXTENSION, (st), (val)) -#define sk_X509_EXTENSION_find_ex(st, val) SKM_sk_find_ex(X509_EXTENSION, (st), (val)) -#define sk_X509_EXTENSION_delete(st, i) SKM_sk_delete(X509_EXTENSION, (st), (i)) -#define sk_X509_EXTENSION_delete_ptr(st, ptr) SKM_sk_delete_ptr(X509_EXTENSION, (st), (ptr)) -#define sk_X509_EXTENSION_insert(st, val, i) SKM_sk_insert(X509_EXTENSION, (st), (val), (i)) -#define sk_X509_EXTENSION_set_cmp_func(st, cmp) SKM_sk_set_cmp_func(X509_EXTENSION, (st), (cmp)) -#define sk_X509_EXTENSION_dup(st) SKM_sk_dup(X509_EXTENSION, st) -#define sk_X509_EXTENSION_pop_free(st, free_func) SKM_sk_pop_free(X509_EXTENSION, (st), (free_func)) -#define sk_X509_EXTENSION_shift(st) SKM_sk_shift(X509_EXTENSION, (st)) -#define sk_X509_EXTENSION_pop(st) SKM_sk_pop(X509_EXTENSION, (st)) -#define sk_X509_EXTENSION_sort(st) SKM_sk_sort(X509_EXTENSION, (st)) -#define sk_X509_EXTENSION_is_sorted(st) SKM_sk_is_sorted(X509_EXTENSION, (st)) - -#define sk_X509_INFO_new(cmp) SKM_sk_new(X509_INFO, (cmp)) -#define sk_X509_INFO_new_null() SKM_sk_new_null(X509_INFO) -#define sk_X509_INFO_free(st) SKM_sk_free(X509_INFO, (st)) -#define sk_X509_INFO_num(st) SKM_sk_num(X509_INFO, (st)) -#define sk_X509_INFO_value(st, i) SKM_sk_value(X509_INFO, (st), (i)) -#define sk_X509_INFO_set(st, i, val) SKM_sk_set(X509_INFO, (st), (i), (val)) -#define sk_X509_INFO_zero(st) SKM_sk_zero(X509_INFO, (st)) -#define sk_X509_INFO_push(st, val) SKM_sk_push(X509_INFO, (st), (val)) -#define sk_X509_INFO_unshift(st, val) SKM_sk_unshift(X509_INFO, (st), (val)) -#define sk_X509_INFO_find(st, val) SKM_sk_find(X509_INFO, (st), (val)) -#define sk_X509_INFO_find_ex(st, val) SKM_sk_find_ex(X509_INFO, (st), (val)) -#define sk_X509_INFO_delete(st, i) SKM_sk_delete(X509_INFO, (st), (i)) -#define sk_X509_INFO_delete_ptr(st, ptr) SKM_sk_delete_ptr(X509_INFO, (st), (ptr)) -#define sk_X509_INFO_insert(st, val, i) SKM_sk_insert(X509_INFO, (st), (val), (i)) -#define sk_X509_INFO_set_cmp_func(st, cmp) SKM_sk_set_cmp_func(X509_INFO, (st), (cmp)) -#define sk_X509_INFO_dup(st) SKM_sk_dup(X509_INFO, st) -#define sk_X509_INFO_pop_free(st, free_func) SKM_sk_pop_free(X509_INFO, (st), (free_func)) -#define sk_X509_INFO_shift(st) SKM_sk_shift(X509_INFO, (st)) -#define sk_X509_INFO_pop(st) SKM_sk_pop(X509_INFO, (st)) -#define sk_X509_INFO_sort(st) SKM_sk_sort(X509_INFO, (st)) -#define sk_X509_INFO_is_sorted(st) SKM_sk_is_sorted(X509_INFO, (st)) - -#define sk_X509_LOOKUP_new(cmp) SKM_sk_new(X509_LOOKUP, (cmp)) -#define sk_X509_LOOKUP_new_null() SKM_sk_new_null(X509_LOOKUP) -#define sk_X509_LOOKUP_free(st) SKM_sk_free(X509_LOOKUP, (st)) -#define sk_X509_LOOKUP_num(st) SKM_sk_num(X509_LOOKUP, (st)) -#define sk_X509_LOOKUP_value(st, i) SKM_sk_value(X509_LOOKUP, (st), (i)) -#define sk_X509_LOOKUP_set(st, i, val) SKM_sk_set(X509_LOOKUP, (st), (i), (val)) -#define sk_X509_LOOKUP_zero(st) SKM_sk_zero(X509_LOOKUP, (st)) -#define sk_X509_LOOKUP_push(st, val) SKM_sk_push(X509_LOOKUP, (st), (val)) -#define sk_X509_LOOKUP_unshift(st, val) SKM_sk_unshift(X509_LOOKUP, (st), (val)) -#define sk_X509_LOOKUP_find(st, val) SKM_sk_find(X509_LOOKUP, (st), (val)) -#define sk_X509_LOOKUP_find_ex(st, val) SKM_sk_find_ex(X509_LOOKUP, (st), (val)) -#define sk_X509_LOOKUP_delete(st, i) SKM_sk_delete(X509_LOOKUP, (st), (i)) -#define sk_X509_LOOKUP_delete_ptr(st, ptr) SKM_sk_delete_ptr(X509_LOOKUP, (st), (ptr)) -#define sk_X509_LOOKUP_insert(st, val, i) SKM_sk_insert(X509_LOOKUP, (st), (val), (i)) -#define sk_X509_LOOKUP_set_cmp_func(st, cmp) SKM_sk_set_cmp_func(X509_LOOKUP, (st), (cmp)) -#define sk_X509_LOOKUP_dup(st) SKM_sk_dup(X509_LOOKUP, st) -#define sk_X509_LOOKUP_pop_free(st, free_func) SKM_sk_pop_free(X509_LOOKUP, (st), (free_func)) -#define sk_X509_LOOKUP_shift(st) SKM_sk_shift(X509_LOOKUP, (st)) -#define sk_X509_LOOKUP_pop(st) SKM_sk_pop(X509_LOOKUP, (st)) -#define sk_X509_LOOKUP_sort(st) SKM_sk_sort(X509_LOOKUP, (st)) -#define sk_X509_LOOKUP_is_sorted(st) SKM_sk_is_sorted(X509_LOOKUP, (st)) - -#define sk_X509_NAME_new(cmp) SKM_sk_new(X509_NAME, (cmp)) -#define sk_X509_NAME_new_null() SKM_sk_new_null(X509_NAME) -#define sk_X509_NAME_free(st) SKM_sk_free(X509_NAME, (st)) -#define sk_X509_NAME_num(st) SKM_sk_num(X509_NAME, (st)) -#define sk_X509_NAME_value(st, i) SKM_sk_value(X509_NAME, (st), (i)) -#define sk_X509_NAME_set(st, i, val) SKM_sk_set(X509_NAME, (st), (i), (val)) -#define sk_X509_NAME_zero(st) SKM_sk_zero(X509_NAME, (st)) -#define sk_X509_NAME_push(st, val) SKM_sk_push(X509_NAME, (st), (val)) -#define sk_X509_NAME_unshift(st, val) SKM_sk_unshift(X509_NAME, (st), (val)) -#define sk_X509_NAME_find(st, val) SKM_sk_find(X509_NAME, (st), (val)) -#define sk_X509_NAME_find_ex(st, val) SKM_sk_find_ex(X509_NAME, (st), (val)) -#define sk_X509_NAME_delete(st, i) SKM_sk_delete(X509_NAME, (st), (i)) -#define sk_X509_NAME_delete_ptr(st, ptr) SKM_sk_delete_ptr(X509_NAME, (st), (ptr)) -#define sk_X509_NAME_insert(st, val, i) SKM_sk_insert(X509_NAME, (st), (val), (i)) -#define sk_X509_NAME_set_cmp_func(st, cmp) SKM_sk_set_cmp_func(X509_NAME, (st), (cmp)) -#define sk_X509_NAME_dup(st) SKM_sk_dup(X509_NAME, st) -#define sk_X509_NAME_pop_free(st, free_func) SKM_sk_pop_free(X509_NAME, (st), (free_func)) -#define sk_X509_NAME_shift(st) SKM_sk_shift(X509_NAME, (st)) -#define sk_X509_NAME_pop(st) SKM_sk_pop(X509_NAME, (st)) -#define sk_X509_NAME_sort(st) SKM_sk_sort(X509_NAME, (st)) -#define sk_X509_NAME_is_sorted(st) SKM_sk_is_sorted(X509_NAME, (st)) - -#define sk_X509_NAME_ENTRY_new(cmp) SKM_sk_new(X509_NAME_ENTRY, (cmp)) -#define sk_X509_NAME_ENTRY_new_null() SKM_sk_new_null(X509_NAME_ENTRY) -#define sk_X509_NAME_ENTRY_free(st) SKM_sk_free(X509_NAME_ENTRY, (st)) -#define sk_X509_NAME_ENTRY_num(st) SKM_sk_num(X509_NAME_ENTRY, (st)) -#define sk_X509_NAME_ENTRY_value(st, i) SKM_sk_value(X509_NAME_ENTRY, (st), (i)) -#define sk_X509_NAME_ENTRY_set(st, i, val) SKM_sk_set(X509_NAME_ENTRY, (st), (i), (val)) -#define sk_X509_NAME_ENTRY_zero(st) SKM_sk_zero(X509_NAME_ENTRY, (st)) -#define sk_X509_NAME_ENTRY_push(st, val) SKM_sk_push(X509_NAME_ENTRY, (st), (val)) -#define sk_X509_NAME_ENTRY_unshift(st, val) SKM_sk_unshift(X509_NAME_ENTRY, (st), (val)) -#define sk_X509_NAME_ENTRY_find(st, val) SKM_sk_find(X509_NAME_ENTRY, (st), (val)) -#define sk_X509_NAME_ENTRY_find_ex(st, val) SKM_sk_find_ex(X509_NAME_ENTRY, (st), (val)) -#define sk_X509_NAME_ENTRY_delete(st, i) SKM_sk_delete(X509_NAME_ENTRY, (st), (i)) -#define sk_X509_NAME_ENTRY_delete_ptr(st, ptr) SKM_sk_delete_ptr(X509_NAME_ENTRY, (st), (ptr)) -#define sk_X509_NAME_ENTRY_insert(st, val, i) SKM_sk_insert(X509_NAME_ENTRY, (st), (val), (i)) -#define sk_X509_NAME_ENTRY_set_cmp_func(st, cmp) SKM_sk_set_cmp_func(X509_NAME_ENTRY, (st), (cmp)) -#define sk_X509_NAME_ENTRY_dup(st) SKM_sk_dup(X509_NAME_ENTRY, st) -#define sk_X509_NAME_ENTRY_pop_free(st, free_func) SKM_sk_pop_free(X509_NAME_ENTRY, (st), (free_func)) -#define sk_X509_NAME_ENTRY_shift(st) SKM_sk_shift(X509_NAME_ENTRY, (st)) -#define sk_X509_NAME_ENTRY_pop(st) SKM_sk_pop(X509_NAME_ENTRY, (st)) -#define sk_X509_NAME_ENTRY_sort(st) SKM_sk_sort(X509_NAME_ENTRY, (st)) -#define sk_X509_NAME_ENTRY_is_sorted(st) SKM_sk_is_sorted(X509_NAME_ENTRY, (st)) - -#define sk_X509_OBJECT_new(cmp) SKM_sk_new(X509_OBJECT, (cmp)) -#define sk_X509_OBJECT_new_null() SKM_sk_new_null(X509_OBJECT) -#define sk_X509_OBJECT_free(st) SKM_sk_free(X509_OBJECT, (st)) -#define sk_X509_OBJECT_num(st) SKM_sk_num(X509_OBJECT, (st)) -#define sk_X509_OBJECT_value(st, i) SKM_sk_value(X509_OBJECT, (st), (i)) -#define sk_X509_OBJECT_set(st, i, val) SKM_sk_set(X509_OBJECT, (st), (i), (val)) -#define sk_X509_OBJECT_zero(st) SKM_sk_zero(X509_OBJECT, (st)) -#define sk_X509_OBJECT_push(st, val) SKM_sk_push(X509_OBJECT, (st), (val)) -#define sk_X509_OBJECT_unshift(st, val) SKM_sk_unshift(X509_OBJECT, (st), (val)) -#define sk_X509_OBJECT_find(st, val) SKM_sk_find(X509_OBJECT, (st), (val)) -#define sk_X509_OBJECT_find_ex(st, val) SKM_sk_find_ex(X509_OBJECT, (st), (val)) -#define sk_X509_OBJECT_delete(st, i) SKM_sk_delete(X509_OBJECT, (st), (i)) -#define sk_X509_OBJECT_delete_ptr(st, ptr) SKM_sk_delete_ptr(X509_OBJECT, (st), (ptr)) -#define sk_X509_OBJECT_insert(st, val, i) SKM_sk_insert(X509_OBJECT, (st), (val), (i)) -#define sk_X509_OBJECT_set_cmp_func(st, cmp) SKM_sk_set_cmp_func(X509_OBJECT, (st), (cmp)) -#define sk_X509_OBJECT_dup(st) SKM_sk_dup(X509_OBJECT, st) -#define sk_X509_OBJECT_pop_free(st, free_func) SKM_sk_pop_free(X509_OBJECT, (st), (free_func)) -#define sk_X509_OBJECT_shift(st) SKM_sk_shift(X509_OBJECT, (st)) -#define sk_X509_OBJECT_pop(st) SKM_sk_pop(X509_OBJECT, (st)) -#define sk_X509_OBJECT_sort(st) SKM_sk_sort(X509_OBJECT, (st)) -#define sk_X509_OBJECT_is_sorted(st) SKM_sk_is_sorted(X509_OBJECT, (st)) - -#define sk_X509_POLICY_DATA_new(cmp) SKM_sk_new(X509_POLICY_DATA, (cmp)) -#define sk_X509_POLICY_DATA_new_null() SKM_sk_new_null(X509_POLICY_DATA) -#define sk_X509_POLICY_DATA_free(st) SKM_sk_free(X509_POLICY_DATA, (st)) -#define sk_X509_POLICY_DATA_num(st) SKM_sk_num(X509_POLICY_DATA, (st)) -#define sk_X509_POLICY_DATA_value(st, i) SKM_sk_value(X509_POLICY_DATA, (st), (i)) -#define sk_X509_POLICY_DATA_set(st, i, val) SKM_sk_set(X509_POLICY_DATA, (st), (i), (val)) -#define sk_X509_POLICY_DATA_zero(st) SKM_sk_zero(X509_POLICY_DATA, (st)) -#define sk_X509_POLICY_DATA_push(st, val) SKM_sk_push(X509_POLICY_DATA, (st), (val)) -#define sk_X509_POLICY_DATA_unshift(st, val) SKM_sk_unshift(X509_POLICY_DATA, (st), (val)) -#define sk_X509_POLICY_DATA_find(st, val) SKM_sk_find(X509_POLICY_DATA, (st), (val)) -#define sk_X509_POLICY_DATA_find_ex(st, val) SKM_sk_find_ex(X509_POLICY_DATA, (st), (val)) -#define sk_X509_POLICY_DATA_delete(st, i) SKM_sk_delete(X509_POLICY_DATA, (st), (i)) -#define sk_X509_POLICY_DATA_delete_ptr(st, ptr) SKM_sk_delete_ptr(X509_POLICY_DATA, (st), (ptr)) -#define sk_X509_POLICY_DATA_insert(st, val, i) SKM_sk_insert(X509_POLICY_DATA, (st), (val), (i)) -#define sk_X509_POLICY_DATA_set_cmp_func(st, cmp) SKM_sk_set_cmp_func(X509_POLICY_DATA, (st), (cmp)) -#define sk_X509_POLICY_DATA_dup(st) SKM_sk_dup(X509_POLICY_DATA, st) -#define sk_X509_POLICY_DATA_pop_free(st, free_func) SKM_sk_pop_free(X509_POLICY_DATA, (st), (free_func)) -#define sk_X509_POLICY_DATA_shift(st) SKM_sk_shift(X509_POLICY_DATA, (st)) -#define sk_X509_POLICY_DATA_pop(st) SKM_sk_pop(X509_POLICY_DATA, (st)) -#define sk_X509_POLICY_DATA_sort(st) SKM_sk_sort(X509_POLICY_DATA, (st)) -#define sk_X509_POLICY_DATA_is_sorted(st) SKM_sk_is_sorted(X509_POLICY_DATA, (st)) - -#define sk_X509_POLICY_NODE_new(cmp) SKM_sk_new(X509_POLICY_NODE, (cmp)) -#define sk_X509_POLICY_NODE_new_null() SKM_sk_new_null(X509_POLICY_NODE) -#define sk_X509_POLICY_NODE_free(st) SKM_sk_free(X509_POLICY_NODE, (st)) -#define sk_X509_POLICY_NODE_num(st) SKM_sk_num(X509_POLICY_NODE, (st)) -#define sk_X509_POLICY_NODE_value(st, i) SKM_sk_value(X509_POLICY_NODE, (st), (i)) -#define sk_X509_POLICY_NODE_set(st, i, val) SKM_sk_set(X509_POLICY_NODE, (st), (i), (val)) -#define sk_X509_POLICY_NODE_zero(st) SKM_sk_zero(X509_POLICY_NODE, (st)) -#define sk_X509_POLICY_NODE_push(st, val) SKM_sk_push(X509_POLICY_NODE, (st), (val)) -#define sk_X509_POLICY_NODE_unshift(st, val) SKM_sk_unshift(X509_POLICY_NODE, (st), (val)) -#define sk_X509_POLICY_NODE_find(st, val) SKM_sk_find(X509_POLICY_NODE, (st), (val)) -#define sk_X509_POLICY_NODE_find_ex(st, val) SKM_sk_find_ex(X509_POLICY_NODE, (st), (val)) -#define sk_X509_POLICY_NODE_delete(st, i) SKM_sk_delete(X509_POLICY_NODE, (st), (i)) -#define sk_X509_POLICY_NODE_delete_ptr(st, ptr) SKM_sk_delete_ptr(X509_POLICY_NODE, (st), (ptr)) -#define sk_X509_POLICY_NODE_insert(st, val, i) SKM_sk_insert(X509_POLICY_NODE, (st), (val), (i)) -#define sk_X509_POLICY_NODE_set_cmp_func(st, cmp) SKM_sk_set_cmp_func(X509_POLICY_NODE, (st), (cmp)) -#define sk_X509_POLICY_NODE_dup(st) SKM_sk_dup(X509_POLICY_NODE, st) -#define sk_X509_POLICY_NODE_pop_free(st, free_func) SKM_sk_pop_free(X509_POLICY_NODE, (st), (free_func)) -#define sk_X509_POLICY_NODE_shift(st) SKM_sk_shift(X509_POLICY_NODE, (st)) -#define sk_X509_POLICY_NODE_pop(st) SKM_sk_pop(X509_POLICY_NODE, (st)) -#define sk_X509_POLICY_NODE_sort(st) SKM_sk_sort(X509_POLICY_NODE, (st)) -#define sk_X509_POLICY_NODE_is_sorted(st) SKM_sk_is_sorted(X509_POLICY_NODE, (st)) - -#define sk_X509_PURPOSE_new(cmp) SKM_sk_new(X509_PURPOSE, (cmp)) -#define sk_X509_PURPOSE_new_null() SKM_sk_new_null(X509_PURPOSE) -#define sk_X509_PURPOSE_free(st) SKM_sk_free(X509_PURPOSE, (st)) -#define sk_X509_PURPOSE_num(st) SKM_sk_num(X509_PURPOSE, (st)) -#define sk_X509_PURPOSE_value(st, i) SKM_sk_value(X509_PURPOSE, (st), (i)) -#define sk_X509_PURPOSE_set(st, i, val) SKM_sk_set(X509_PURPOSE, (st), (i), (val)) -#define sk_X509_PURPOSE_zero(st) SKM_sk_zero(X509_PURPOSE, (st)) -#define sk_X509_PURPOSE_push(st, val) SKM_sk_push(X509_PURPOSE, (st), (val)) -#define sk_X509_PURPOSE_unshift(st, val) SKM_sk_unshift(X509_PURPOSE, (st), (val)) -#define sk_X509_PURPOSE_find(st, val) SKM_sk_find(X509_PURPOSE, (st), (val)) -#define sk_X509_PURPOSE_find_ex(st, val) SKM_sk_find_ex(X509_PURPOSE, (st), (val)) -#define sk_X509_PURPOSE_delete(st, i) SKM_sk_delete(X509_PURPOSE, (st), (i)) -#define sk_X509_PURPOSE_delete_ptr(st, ptr) SKM_sk_delete_ptr(X509_PURPOSE, (st), (ptr)) -#define sk_X509_PURPOSE_insert(st, val, i) SKM_sk_insert(X509_PURPOSE, (st), (val), (i)) -#define sk_X509_PURPOSE_set_cmp_func(st, cmp) SKM_sk_set_cmp_func(X509_PURPOSE, (st), (cmp)) -#define sk_X509_PURPOSE_dup(st) SKM_sk_dup(X509_PURPOSE, st) -#define sk_X509_PURPOSE_pop_free(st, free_func) SKM_sk_pop_free(X509_PURPOSE, (st), (free_func)) -#define sk_X509_PURPOSE_shift(st) SKM_sk_shift(X509_PURPOSE, (st)) -#define sk_X509_PURPOSE_pop(st) SKM_sk_pop(X509_PURPOSE, (st)) -#define sk_X509_PURPOSE_sort(st) SKM_sk_sort(X509_PURPOSE, (st)) -#define sk_X509_PURPOSE_is_sorted(st) SKM_sk_is_sorted(X509_PURPOSE, (st)) - -#define sk_X509_REVOKED_new(cmp) SKM_sk_new(X509_REVOKED, (cmp)) -#define sk_X509_REVOKED_new_null() SKM_sk_new_null(X509_REVOKED) -#define sk_X509_REVOKED_free(st) SKM_sk_free(X509_REVOKED, (st)) -#define sk_X509_REVOKED_num(st) SKM_sk_num(X509_REVOKED, (st)) -#define sk_X509_REVOKED_value(st, i) SKM_sk_value(X509_REVOKED, (st), (i)) -#define sk_X509_REVOKED_set(st, i, val) SKM_sk_set(X509_REVOKED, (st), (i), (val)) -#define sk_X509_REVOKED_zero(st) SKM_sk_zero(X509_REVOKED, (st)) -#define sk_X509_REVOKED_push(st, val) SKM_sk_push(X509_REVOKED, (st), (val)) -#define sk_X509_REVOKED_unshift(st, val) SKM_sk_unshift(X509_REVOKED, (st), (val)) -#define sk_X509_REVOKED_find(st, val) SKM_sk_find(X509_REVOKED, (st), (val)) -#define sk_X509_REVOKED_find_ex(st, val) SKM_sk_find_ex(X509_REVOKED, (st), (val)) -#define sk_X509_REVOKED_delete(st, i) SKM_sk_delete(X509_REVOKED, (st), (i)) -#define sk_X509_REVOKED_delete_ptr(st, ptr) SKM_sk_delete_ptr(X509_REVOKED, (st), (ptr)) -#define sk_X509_REVOKED_insert(st, val, i) SKM_sk_insert(X509_REVOKED, (st), (val), (i)) -#define sk_X509_REVOKED_set_cmp_func(st, cmp) SKM_sk_set_cmp_func(X509_REVOKED, (st), (cmp)) -#define sk_X509_REVOKED_dup(st) SKM_sk_dup(X509_REVOKED, st) -#define sk_X509_REVOKED_pop_free(st, free_func) SKM_sk_pop_free(X509_REVOKED, (st), (free_func)) -#define sk_X509_REVOKED_shift(st) SKM_sk_shift(X509_REVOKED, (st)) -#define sk_X509_REVOKED_pop(st) SKM_sk_pop(X509_REVOKED, (st)) -#define sk_X509_REVOKED_sort(st) SKM_sk_sort(X509_REVOKED, (st)) -#define sk_X509_REVOKED_is_sorted(st) SKM_sk_is_sorted(X509_REVOKED, (st)) - -#define sk_X509_TRUST_new(cmp) SKM_sk_new(X509_TRUST, (cmp)) -#define sk_X509_TRUST_new_null() SKM_sk_new_null(X509_TRUST) -#define sk_X509_TRUST_free(st) SKM_sk_free(X509_TRUST, (st)) -#define sk_X509_TRUST_num(st) SKM_sk_num(X509_TRUST, (st)) -#define sk_X509_TRUST_value(st, i) SKM_sk_value(X509_TRUST, (st), (i)) -#define sk_X509_TRUST_set(st, i, val) SKM_sk_set(X509_TRUST, (st), (i), (val)) -#define sk_X509_TRUST_zero(st) SKM_sk_zero(X509_TRUST, (st)) -#define sk_X509_TRUST_push(st, val) SKM_sk_push(X509_TRUST, (st), (val)) -#define sk_X509_TRUST_unshift(st, val) SKM_sk_unshift(X509_TRUST, (st), (val)) -#define sk_X509_TRUST_find(st, val) SKM_sk_find(X509_TRUST, (st), (val)) -#define sk_X509_TRUST_find_ex(st, val) SKM_sk_find_ex(X509_TRUST, (st), (val)) -#define sk_X509_TRUST_delete(st, i) SKM_sk_delete(X509_TRUST, (st), (i)) -#define sk_X509_TRUST_delete_ptr(st, ptr) SKM_sk_delete_ptr(X509_TRUST, (st), (ptr)) -#define sk_X509_TRUST_insert(st, val, i) SKM_sk_insert(X509_TRUST, (st), (val), (i)) -#define sk_X509_TRUST_set_cmp_func(st, cmp) SKM_sk_set_cmp_func(X509_TRUST, (st), (cmp)) -#define sk_X509_TRUST_dup(st) SKM_sk_dup(X509_TRUST, st) -#define sk_X509_TRUST_pop_free(st, free_func) SKM_sk_pop_free(X509_TRUST, (st), (free_func)) -#define sk_X509_TRUST_shift(st) SKM_sk_shift(X509_TRUST, (st)) -#define sk_X509_TRUST_pop(st) SKM_sk_pop(X509_TRUST, (st)) -#define sk_X509_TRUST_sort(st) SKM_sk_sort(X509_TRUST, (st)) -#define sk_X509_TRUST_is_sorted(st) SKM_sk_is_sorted(X509_TRUST, (st)) - -#define sk_X509_VERIFY_PARAM_new(cmp) SKM_sk_new(X509_VERIFY_PARAM, (cmp)) -#define sk_X509_VERIFY_PARAM_new_null() SKM_sk_new_null(X509_VERIFY_PARAM) -#define sk_X509_VERIFY_PARAM_free(st) SKM_sk_free(X509_VERIFY_PARAM, (st)) -#define sk_X509_VERIFY_PARAM_num(st) SKM_sk_num(X509_VERIFY_PARAM, (st)) -#define sk_X509_VERIFY_PARAM_value(st, i) SKM_sk_value(X509_VERIFY_PARAM, (st), (i)) -#define sk_X509_VERIFY_PARAM_set(st, i, val) SKM_sk_set(X509_VERIFY_PARAM, (st), (i), (val)) -#define sk_X509_VERIFY_PARAM_zero(st) SKM_sk_zero(X509_VERIFY_PARAM, (st)) -#define sk_X509_VERIFY_PARAM_push(st, val) SKM_sk_push(X509_VERIFY_PARAM, (st), (val)) -#define sk_X509_VERIFY_PARAM_unshift(st, val) SKM_sk_unshift(X509_VERIFY_PARAM, (st), (val)) -#define sk_X509_VERIFY_PARAM_find(st, val) SKM_sk_find(X509_VERIFY_PARAM, (st), (val)) -#define sk_X509_VERIFY_PARAM_find_ex(st, val) SKM_sk_find_ex(X509_VERIFY_PARAM, (st), (val)) -#define sk_X509_VERIFY_PARAM_delete(st, i) SKM_sk_delete(X509_VERIFY_PARAM, (st), (i)) -#define sk_X509_VERIFY_PARAM_delete_ptr(st, ptr) SKM_sk_delete_ptr(X509_VERIFY_PARAM, (st), (ptr)) -#define sk_X509_VERIFY_PARAM_insert(st, val, i) SKM_sk_insert(X509_VERIFY_PARAM, (st), (val), (i)) -#define sk_X509_VERIFY_PARAM_set_cmp_func(st, cmp) SKM_sk_set_cmp_func(X509_VERIFY_PARAM, (st), (cmp)) -#define sk_X509_VERIFY_PARAM_dup(st) SKM_sk_dup(X509_VERIFY_PARAM, st) -#define sk_X509_VERIFY_PARAM_pop_free(st, free_func) SKM_sk_pop_free(X509_VERIFY_PARAM, (st), (free_func)) -#define sk_X509_VERIFY_PARAM_shift(st) SKM_sk_shift(X509_VERIFY_PARAM, (st)) -#define sk_X509_VERIFY_PARAM_pop(st) SKM_sk_pop(X509_VERIFY_PARAM, (st)) -#define sk_X509_VERIFY_PARAM_sort(st) SKM_sk_sort(X509_VERIFY_PARAM, (st)) -#define sk_X509_VERIFY_PARAM_is_sorted(st) SKM_sk_is_sorted(X509_VERIFY_PARAM, (st)) - -#define sk_nid_triple_new(cmp) SKM_sk_new(nid_triple, (cmp)) -#define sk_nid_triple_new_null() SKM_sk_new_null(nid_triple) -#define sk_nid_triple_free(st) SKM_sk_free(nid_triple, (st)) -#define sk_nid_triple_num(st) SKM_sk_num(nid_triple, (st)) -#define sk_nid_triple_value(st, i) SKM_sk_value(nid_triple, (st), (i)) -#define sk_nid_triple_set(st, i, val) SKM_sk_set(nid_triple, (st), (i), (val)) -#define sk_nid_triple_zero(st) SKM_sk_zero(nid_triple, (st)) -#define sk_nid_triple_push(st, val) SKM_sk_push(nid_triple, (st), (val)) -#define sk_nid_triple_unshift(st, val) SKM_sk_unshift(nid_triple, (st), (val)) -#define sk_nid_triple_find(st, val) SKM_sk_find(nid_triple, (st), (val)) -#define sk_nid_triple_find_ex(st, val) SKM_sk_find_ex(nid_triple, (st), (val)) -#define sk_nid_triple_delete(st, i) SKM_sk_delete(nid_triple, (st), (i)) -#define sk_nid_triple_delete_ptr(st, ptr) SKM_sk_delete_ptr(nid_triple, (st), (ptr)) -#define sk_nid_triple_insert(st, val, i) SKM_sk_insert(nid_triple, (st), (val), (i)) -#define sk_nid_triple_set_cmp_func(st, cmp) SKM_sk_set_cmp_func(nid_triple, (st), (cmp)) -#define sk_nid_triple_dup(st) SKM_sk_dup(nid_triple, st) -#define sk_nid_triple_pop_free(st, free_func) SKM_sk_pop_free(nid_triple, (st), (free_func)) -#define sk_nid_triple_shift(st) SKM_sk_shift(nid_triple, (st)) -#define sk_nid_triple_pop(st) SKM_sk_pop(nid_triple, (st)) -#define sk_nid_triple_sort(st) SKM_sk_sort(nid_triple, (st)) -#define sk_nid_triple_is_sorted(st) SKM_sk_is_sorted(nid_triple, (st)) - -#define sk_void_new(cmp) SKM_sk_new(void, (cmp)) -#define sk_void_new_null() SKM_sk_new_null(void) -#define sk_void_free(st) SKM_sk_free(void, (st)) -#define sk_void_num(st) SKM_sk_num(void, (st)) -#define sk_void_value(st, i) SKM_sk_value(void, (st), (i)) -#define sk_void_set(st, i, val) SKM_sk_set(void, (st), (i), (val)) -#define sk_void_zero(st) SKM_sk_zero(void, (st)) -#define sk_void_push(st, val) SKM_sk_push(void, (st), (val)) -#define sk_void_unshift(st, val) SKM_sk_unshift(void, (st), (val)) -#define sk_void_find(st, val) SKM_sk_find(void, (st), (val)) -#define sk_void_find_ex(st, val) SKM_sk_find_ex(void, (st), (val)) -#define sk_void_delete(st, i) SKM_sk_delete(void, (st), (i)) -#define sk_void_delete_ptr(st, ptr) SKM_sk_delete_ptr(void, (st), (ptr)) -#define sk_void_insert(st, val, i) SKM_sk_insert(void, (st), (val), (i)) -#define sk_void_set_cmp_func(st, cmp) SKM_sk_set_cmp_func(void, (st), (cmp)) -#define sk_void_dup(st) SKM_sk_dup(void, st) -#define sk_void_pop_free(st, free_func) SKM_sk_pop_free(void, (st), (free_func)) -#define sk_void_shift(st) SKM_sk_shift(void, (st)) -#define sk_void_pop(st) SKM_sk_pop(void, (st)) -#define sk_void_sort(st) SKM_sk_sort(void, (st)) -#define sk_void_is_sorted(st) SKM_sk_is_sorted(void, (st)) - -#define sk_OPENSSL_STRING_new(cmp) ((STACK_OF(OPENSSL_STRING) *)sk_new(CHECKED_SK_CMP_FUNC(char, cmp))) -#define sk_OPENSSL_STRING_new_null() ((STACK_OF(OPENSSL_STRING) *)sk_new_null()) -#define sk_OPENSSL_STRING_push(st, val) sk_push(CHECKED_STACK_OF(OPENSSL_STRING, st), CHECKED_PTR_OF(char, val)) -#define sk_OPENSSL_STRING_find(st, val) sk_find(CHECKED_STACK_OF(OPENSSL_STRING, st), CHECKED_PTR_OF(char, val)) -#define sk_OPENSSL_STRING_value(st, i) ((OPENSSL_STRING)sk_value(CHECKED_STACK_OF(OPENSSL_STRING, st), i)) -#define sk_OPENSSL_STRING_num(st) SKM_sk_num(OPENSSL_STRING, st) -#define sk_OPENSSL_STRING_pop_free(st, free_func) sk_pop_free(CHECKED_STACK_OF(OPENSSL_STRING, st), CHECKED_SK_FREE_FUNC2(OPENSSL_STRING, free_func)) -#define sk_OPENSSL_STRING_insert(st, val, i) sk_insert(CHECKED_STACK_OF(OPENSSL_STRING, st), CHECKED_PTR_OF(char, val), i) -#define sk_OPENSSL_STRING_free(st) SKM_sk_free(OPENSSL_STRING, st) -#define sk_OPENSSL_STRING_set(st, i, val) sk_set(CHECKED_STACK_OF(OPENSSL_STRING, st), i, CHECKED_PTR_OF(char, val)) -#define sk_OPENSSL_STRING_zero(st) SKM_sk_zero(OPENSSL_STRING, (st)) -#define sk_OPENSSL_STRING_unshift(st, val) sk_unshift(CHECKED_STACK_OF(OPENSSL_STRING, st), CHECKED_PTR_OF(char, val)) -#define sk_OPENSSL_STRING_find_ex(st, val) sk_find_ex((_STACK *)CHECKED_CONST_PTR_OF(STACK_OF(OPENSSL_STRING), st), CHECKED_CONST_PTR_OF(char, val)) -#define sk_OPENSSL_STRING_delete(st, i) SKM_sk_delete(OPENSSL_STRING, (st), (i)) -#define sk_OPENSSL_STRING_delete_ptr(st, ptr) (OPENSSL_STRING *)sk_delete_ptr(CHECKED_STACK_OF(OPENSSL_STRING, st), CHECKED_PTR_OF(char, ptr)) -#define sk_OPENSSL_STRING_set_cmp_func(st, cmp) \ - ((int (*)(const char * const *,const char * const *)) \ - sk_set_cmp_func(CHECKED_STACK_OF(OPENSSL_STRING, st), CHECKED_SK_CMP_FUNC(char, cmp))) -#define sk_OPENSSL_STRING_dup(st) SKM_sk_dup(OPENSSL_STRING, st) -#define sk_OPENSSL_STRING_shift(st) SKM_sk_shift(OPENSSL_STRING, (st)) -#define sk_OPENSSL_STRING_pop(st) (char *)sk_pop(CHECKED_STACK_OF(OPENSSL_STRING, st)) -#define sk_OPENSSL_STRING_sort(st) SKM_sk_sort(OPENSSL_STRING, (st)) -#define sk_OPENSSL_STRING_is_sorted(st) SKM_sk_is_sorted(OPENSSL_STRING, (st)) - - -#define sk_OPENSSL_BLOCK_new(cmp) ((STACK_OF(OPENSSL_BLOCK) *)sk_new(CHECKED_SK_CMP_FUNC(void, cmp))) -#define sk_OPENSSL_BLOCK_new_null() ((STACK_OF(OPENSSL_BLOCK) *)sk_new_null()) -#define sk_OPENSSL_BLOCK_push(st, val) sk_push(CHECKED_STACK_OF(OPENSSL_BLOCK, st), CHECKED_PTR_OF(void, val)) -#define sk_OPENSSL_BLOCK_find(st, val) sk_find(CHECKED_STACK_OF(OPENSSL_BLOCK, st), CHECKED_PTR_OF(void, val)) -#define sk_OPENSSL_BLOCK_value(st, i) ((OPENSSL_BLOCK)sk_value(CHECKED_STACK_OF(OPENSSL_BLOCK, st), i)) -#define sk_OPENSSL_BLOCK_num(st) SKM_sk_num(OPENSSL_BLOCK, st) -#define sk_OPENSSL_BLOCK_pop_free(st, free_func) sk_pop_free(CHECKED_STACK_OF(OPENSSL_BLOCK, st), CHECKED_SK_FREE_FUNC2(OPENSSL_BLOCK, free_func)) -#define sk_OPENSSL_BLOCK_insert(st, val, i) sk_insert(CHECKED_STACK_OF(OPENSSL_BLOCK, st), CHECKED_PTR_OF(void, val), i) -#define sk_OPENSSL_BLOCK_free(st) SKM_sk_free(OPENSSL_BLOCK, st) -#define sk_OPENSSL_BLOCK_set(st, i, val) sk_set(CHECKED_STACK_OF(OPENSSL_BLOCK, st), i, CHECKED_PTR_OF(void, val)) -#define sk_OPENSSL_BLOCK_zero(st) SKM_sk_zero(OPENSSL_BLOCK, (st)) -#define sk_OPENSSL_BLOCK_unshift(st, val) sk_unshift(CHECKED_STACK_OF(OPENSSL_BLOCK, st), CHECKED_PTR_OF(void, val)) -#define sk_OPENSSL_BLOCK_find_ex(st, val) sk_find_ex((_STACK *)CHECKED_CONST_PTR_OF(STACK_OF(OPENSSL_BLOCK), st), CHECKED_CONST_PTR_OF(void, val)) -#define sk_OPENSSL_BLOCK_delete(st, i) SKM_sk_delete(OPENSSL_BLOCK, (st), (i)) -#define sk_OPENSSL_BLOCK_delete_ptr(st, ptr) (OPENSSL_BLOCK *)sk_delete_ptr(CHECKED_STACK_OF(OPENSSL_BLOCK, st), CHECKED_PTR_OF(void, ptr)) -#define sk_OPENSSL_BLOCK_set_cmp_func(st, cmp) \ - ((int (*)(const void * const *,const void * const *)) \ - sk_set_cmp_func(CHECKED_STACK_OF(OPENSSL_BLOCK, st), CHECKED_SK_CMP_FUNC(void, cmp))) -#define sk_OPENSSL_BLOCK_dup(st) SKM_sk_dup(OPENSSL_BLOCK, st) -#define sk_OPENSSL_BLOCK_shift(st) SKM_sk_shift(OPENSSL_BLOCK, (st)) -#define sk_OPENSSL_BLOCK_pop(st) (void *)sk_pop(CHECKED_STACK_OF(OPENSSL_BLOCK, st)) -#define sk_OPENSSL_BLOCK_sort(st) SKM_sk_sort(OPENSSL_BLOCK, (st)) -#define sk_OPENSSL_BLOCK_is_sorted(st) SKM_sk_is_sorted(OPENSSL_BLOCK, (st)) - - -#define sk_OPENSSL_PSTRING_new(cmp) ((STACK_OF(OPENSSL_PSTRING) *)sk_new(CHECKED_SK_CMP_FUNC(OPENSSL_STRING, cmp))) -#define sk_OPENSSL_PSTRING_new_null() ((STACK_OF(OPENSSL_PSTRING) *)sk_new_null()) -#define sk_OPENSSL_PSTRING_push(st, val) sk_push(CHECKED_STACK_OF(OPENSSL_PSTRING, st), CHECKED_PTR_OF(OPENSSL_STRING, val)) -#define sk_OPENSSL_PSTRING_find(st, val) sk_find(CHECKED_STACK_OF(OPENSSL_PSTRING, st), CHECKED_PTR_OF(OPENSSL_STRING, val)) -#define sk_OPENSSL_PSTRING_value(st, i) ((OPENSSL_PSTRING)sk_value(CHECKED_STACK_OF(OPENSSL_PSTRING, st), i)) -#define sk_OPENSSL_PSTRING_num(st) SKM_sk_num(OPENSSL_PSTRING, st) -#define sk_OPENSSL_PSTRING_pop_free(st, free_func) sk_pop_free(CHECKED_STACK_OF(OPENSSL_PSTRING, st), CHECKED_SK_FREE_FUNC2(OPENSSL_PSTRING, free_func)) -#define sk_OPENSSL_PSTRING_insert(st, val, i) sk_insert(CHECKED_STACK_OF(OPENSSL_PSTRING, st), CHECKED_PTR_OF(OPENSSL_STRING, val), i) -#define sk_OPENSSL_PSTRING_free(st) SKM_sk_free(OPENSSL_PSTRING, st) -#define sk_OPENSSL_PSTRING_set(st, i, val) sk_set(CHECKED_STACK_OF(OPENSSL_PSTRING, st), i, CHECKED_PTR_OF(OPENSSL_STRING, val)) -#define sk_OPENSSL_PSTRING_zero(st) SKM_sk_zero(OPENSSL_PSTRING, (st)) -#define sk_OPENSSL_PSTRING_unshift(st, val) sk_unshift(CHECKED_STACK_OF(OPENSSL_PSTRING, st), CHECKED_PTR_OF(OPENSSL_STRING, val)) -#define sk_OPENSSL_PSTRING_find_ex(st, val) sk_find_ex((_STACK *)CHECKED_CONST_PTR_OF(STACK_OF(OPENSSL_PSTRING), st), CHECKED_CONST_PTR_OF(OPENSSL_STRING, val)) -#define sk_OPENSSL_PSTRING_delete(st, i) SKM_sk_delete(OPENSSL_PSTRING, (st), (i)) -#define sk_OPENSSL_PSTRING_delete_ptr(st, ptr) (OPENSSL_PSTRING *)sk_delete_ptr(CHECKED_STACK_OF(OPENSSL_PSTRING, st), CHECKED_PTR_OF(OPENSSL_STRING, ptr)) -#define sk_OPENSSL_PSTRING_set_cmp_func(st, cmp) \ - ((int (*)(const OPENSSL_STRING * const *,const OPENSSL_STRING * const *)) \ - sk_set_cmp_func(CHECKED_STACK_OF(OPENSSL_PSTRING, st), CHECKED_SK_CMP_FUNC(OPENSSL_STRING, cmp))) -#define sk_OPENSSL_PSTRING_dup(st) SKM_sk_dup(OPENSSL_PSTRING, st) -#define sk_OPENSSL_PSTRING_shift(st) SKM_sk_shift(OPENSSL_PSTRING, (st)) -#define sk_OPENSSL_PSTRING_pop(st) (OPENSSL_STRING *)sk_pop(CHECKED_STACK_OF(OPENSSL_PSTRING, st)) -#define sk_OPENSSL_PSTRING_sort(st) SKM_sk_sort(OPENSSL_PSTRING, (st)) -#define sk_OPENSSL_PSTRING_is_sorted(st) SKM_sk_is_sorted(OPENSSL_PSTRING, (st)) - - -#define d2i_ASN1_SET_OF_ACCESS_DESCRIPTION(st, pp, length, d2i_func, free_func, ex_tag, ex_class) \ - SKM_ASN1_SET_OF_d2i(ACCESS_DESCRIPTION, (st), (pp), (length), (d2i_func), (free_func), (ex_tag), (ex_class)) -#define i2d_ASN1_SET_OF_ACCESS_DESCRIPTION(st, pp, i2d_func, ex_tag, ex_class, is_set) \ - SKM_ASN1_SET_OF_i2d(ACCESS_DESCRIPTION, (st), (pp), (i2d_func), (ex_tag), (ex_class), (is_set)) -#define ASN1_seq_pack_ACCESS_DESCRIPTION(st, i2d_func, buf, len) \ - SKM_ASN1_seq_pack(ACCESS_DESCRIPTION, (st), (i2d_func), (buf), (len)) -#define ASN1_seq_unpack_ACCESS_DESCRIPTION(buf, len, d2i_func, free_func) \ - SKM_ASN1_seq_unpack(ACCESS_DESCRIPTION, (buf), (len), (d2i_func), (free_func)) - -#define d2i_ASN1_SET_OF_ASN1_INTEGER(st, pp, length, d2i_func, free_func, ex_tag, ex_class) \ - SKM_ASN1_SET_OF_d2i(ASN1_INTEGER, (st), (pp), (length), (d2i_func), (free_func), (ex_tag), (ex_class)) -#define i2d_ASN1_SET_OF_ASN1_INTEGER(st, pp, i2d_func, ex_tag, ex_class, is_set) \ - SKM_ASN1_SET_OF_i2d(ASN1_INTEGER, (st), (pp), (i2d_func), (ex_tag), (ex_class), (is_set)) -#define ASN1_seq_pack_ASN1_INTEGER(st, i2d_func, buf, len) \ - SKM_ASN1_seq_pack(ASN1_INTEGER, (st), (i2d_func), (buf), (len)) -#define ASN1_seq_unpack_ASN1_INTEGER(buf, len, d2i_func, free_func) \ - SKM_ASN1_seq_unpack(ASN1_INTEGER, (buf), (len), (d2i_func), (free_func)) - -#define d2i_ASN1_SET_OF_ASN1_OBJECT(st, pp, length, d2i_func, free_func, ex_tag, ex_class) \ - SKM_ASN1_SET_OF_d2i(ASN1_OBJECT, (st), (pp), (length), (d2i_func), (free_func), (ex_tag), (ex_class)) -#define i2d_ASN1_SET_OF_ASN1_OBJECT(st, pp, i2d_func, ex_tag, ex_class, is_set) \ - SKM_ASN1_SET_OF_i2d(ASN1_OBJECT, (st), (pp), (i2d_func), (ex_tag), (ex_class), (is_set)) -#define ASN1_seq_pack_ASN1_OBJECT(st, i2d_func, buf, len) \ - SKM_ASN1_seq_pack(ASN1_OBJECT, (st), (i2d_func), (buf), (len)) -#define ASN1_seq_unpack_ASN1_OBJECT(buf, len, d2i_func, free_func) \ - SKM_ASN1_seq_unpack(ASN1_OBJECT, (buf), (len), (d2i_func), (free_func)) - -#define d2i_ASN1_SET_OF_ASN1_TYPE(st, pp, length, d2i_func, free_func, ex_tag, ex_class) \ - SKM_ASN1_SET_OF_d2i(ASN1_TYPE, (st), (pp), (length), (d2i_func), (free_func), (ex_tag), (ex_class)) -#define i2d_ASN1_SET_OF_ASN1_TYPE(st, pp, i2d_func, ex_tag, ex_class, is_set) \ - SKM_ASN1_SET_OF_i2d(ASN1_TYPE, (st), (pp), (i2d_func), (ex_tag), (ex_class), (is_set)) -#define ASN1_seq_pack_ASN1_TYPE(st, i2d_func, buf, len) \ - SKM_ASN1_seq_pack(ASN1_TYPE, (st), (i2d_func), (buf), (len)) -#define ASN1_seq_unpack_ASN1_TYPE(buf, len, d2i_func, free_func) \ - SKM_ASN1_seq_unpack(ASN1_TYPE, (buf), (len), (d2i_func), (free_func)) - -#define d2i_ASN1_SET_OF_ASN1_UTF8STRING(st, pp, length, d2i_func, free_func, ex_tag, ex_class) \ - SKM_ASN1_SET_OF_d2i(ASN1_UTF8STRING, (st), (pp), (length), (d2i_func), (free_func), (ex_tag), (ex_class)) -#define i2d_ASN1_SET_OF_ASN1_UTF8STRING(st, pp, i2d_func, ex_tag, ex_class, is_set) \ - SKM_ASN1_SET_OF_i2d(ASN1_UTF8STRING, (st), (pp), (i2d_func), (ex_tag), (ex_class), (is_set)) -#define ASN1_seq_pack_ASN1_UTF8STRING(st, i2d_func, buf, len) \ - SKM_ASN1_seq_pack(ASN1_UTF8STRING, (st), (i2d_func), (buf), (len)) -#define ASN1_seq_unpack_ASN1_UTF8STRING(buf, len, d2i_func, free_func) \ - SKM_ASN1_seq_unpack(ASN1_UTF8STRING, (buf), (len), (d2i_func), (free_func)) - -#define d2i_ASN1_SET_OF_DIST_POINT(st, pp, length, d2i_func, free_func, ex_tag, ex_class) \ - SKM_ASN1_SET_OF_d2i(DIST_POINT, (st), (pp), (length), (d2i_func), (free_func), (ex_tag), (ex_class)) -#define i2d_ASN1_SET_OF_DIST_POINT(st, pp, i2d_func, ex_tag, ex_class, is_set) \ - SKM_ASN1_SET_OF_i2d(DIST_POINT, (st), (pp), (i2d_func), (ex_tag), (ex_class), (is_set)) -#define ASN1_seq_pack_DIST_POINT(st, i2d_func, buf, len) \ - SKM_ASN1_seq_pack(DIST_POINT, (st), (i2d_func), (buf), (len)) -#define ASN1_seq_unpack_DIST_POINT(buf, len, d2i_func, free_func) \ - SKM_ASN1_seq_unpack(DIST_POINT, (buf), (len), (d2i_func), (free_func)) - -#define d2i_ASN1_SET_OF_ESS_CERT_ID(st, pp, length, d2i_func, free_func, ex_tag, ex_class) \ - SKM_ASN1_SET_OF_d2i(ESS_CERT_ID, (st), (pp), (length), (d2i_func), (free_func), (ex_tag), (ex_class)) -#define i2d_ASN1_SET_OF_ESS_CERT_ID(st, pp, i2d_func, ex_tag, ex_class, is_set) \ - SKM_ASN1_SET_OF_i2d(ESS_CERT_ID, (st), (pp), (i2d_func), (ex_tag), (ex_class), (is_set)) -#define ASN1_seq_pack_ESS_CERT_ID(st, i2d_func, buf, len) \ - SKM_ASN1_seq_pack(ESS_CERT_ID, (st), (i2d_func), (buf), (len)) -#define ASN1_seq_unpack_ESS_CERT_ID(buf, len, d2i_func, free_func) \ - SKM_ASN1_seq_unpack(ESS_CERT_ID, (buf), (len), (d2i_func), (free_func)) - -#define d2i_ASN1_SET_OF_EVP_MD(st, pp, length, d2i_func, free_func, ex_tag, ex_class) \ - SKM_ASN1_SET_OF_d2i(EVP_MD, (st), (pp), (length), (d2i_func), (free_func), (ex_tag), (ex_class)) -#define i2d_ASN1_SET_OF_EVP_MD(st, pp, i2d_func, ex_tag, ex_class, is_set) \ - SKM_ASN1_SET_OF_i2d(EVP_MD, (st), (pp), (i2d_func), (ex_tag), (ex_class), (is_set)) -#define ASN1_seq_pack_EVP_MD(st, i2d_func, buf, len) \ - SKM_ASN1_seq_pack(EVP_MD, (st), (i2d_func), (buf), (len)) -#define ASN1_seq_unpack_EVP_MD(buf, len, d2i_func, free_func) \ - SKM_ASN1_seq_unpack(EVP_MD, (buf), (len), (d2i_func), (free_func)) - -#define d2i_ASN1_SET_OF_GENERAL_NAME(st, pp, length, d2i_func, free_func, ex_tag, ex_class) \ - SKM_ASN1_SET_OF_d2i(GENERAL_NAME, (st), (pp), (length), (d2i_func), (free_func), (ex_tag), (ex_class)) -#define i2d_ASN1_SET_OF_GENERAL_NAME(st, pp, i2d_func, ex_tag, ex_class, is_set) \ - SKM_ASN1_SET_OF_i2d(GENERAL_NAME, (st), (pp), (i2d_func), (ex_tag), (ex_class), (is_set)) -#define ASN1_seq_pack_GENERAL_NAME(st, i2d_func, buf, len) \ - SKM_ASN1_seq_pack(GENERAL_NAME, (st), (i2d_func), (buf), (len)) -#define ASN1_seq_unpack_GENERAL_NAME(buf, len, d2i_func, free_func) \ - SKM_ASN1_seq_unpack(GENERAL_NAME, (buf), (len), (d2i_func), (free_func)) - -#define d2i_ASN1_SET_OF_OCSP_ONEREQ(st, pp, length, d2i_func, free_func, ex_tag, ex_class) \ - SKM_ASN1_SET_OF_d2i(OCSP_ONEREQ, (st), (pp), (length), (d2i_func), (free_func), (ex_tag), (ex_class)) -#define i2d_ASN1_SET_OF_OCSP_ONEREQ(st, pp, i2d_func, ex_tag, ex_class, is_set) \ - SKM_ASN1_SET_OF_i2d(OCSP_ONEREQ, (st), (pp), (i2d_func), (ex_tag), (ex_class), (is_set)) -#define ASN1_seq_pack_OCSP_ONEREQ(st, i2d_func, buf, len) \ - SKM_ASN1_seq_pack(OCSP_ONEREQ, (st), (i2d_func), (buf), (len)) -#define ASN1_seq_unpack_OCSP_ONEREQ(buf, len, d2i_func, free_func) \ - SKM_ASN1_seq_unpack(OCSP_ONEREQ, (buf), (len), (d2i_func), (free_func)) - -#define d2i_ASN1_SET_OF_OCSP_SINGLERESP(st, pp, length, d2i_func, free_func, ex_tag, ex_class) \ - SKM_ASN1_SET_OF_d2i(OCSP_SINGLERESP, (st), (pp), (length), (d2i_func), (free_func), (ex_tag), (ex_class)) -#define i2d_ASN1_SET_OF_OCSP_SINGLERESP(st, pp, i2d_func, ex_tag, ex_class, is_set) \ - SKM_ASN1_SET_OF_i2d(OCSP_SINGLERESP, (st), (pp), (i2d_func), (ex_tag), (ex_class), (is_set)) -#define ASN1_seq_pack_OCSP_SINGLERESP(st, i2d_func, buf, len) \ - SKM_ASN1_seq_pack(OCSP_SINGLERESP, (st), (i2d_func), (buf), (len)) -#define ASN1_seq_unpack_OCSP_SINGLERESP(buf, len, d2i_func, free_func) \ - SKM_ASN1_seq_unpack(OCSP_SINGLERESP, (buf), (len), (d2i_func), (free_func)) - -#define d2i_ASN1_SET_OF_PKCS12_SAFEBAG(st, pp, length, d2i_func, free_func, ex_tag, ex_class) \ - SKM_ASN1_SET_OF_d2i(PKCS12_SAFEBAG, (st), (pp), (length), (d2i_func), (free_func), (ex_tag), (ex_class)) -#define i2d_ASN1_SET_OF_PKCS12_SAFEBAG(st, pp, i2d_func, ex_tag, ex_class, is_set) \ - SKM_ASN1_SET_OF_i2d(PKCS12_SAFEBAG, (st), (pp), (i2d_func), (ex_tag), (ex_class), (is_set)) -#define ASN1_seq_pack_PKCS12_SAFEBAG(st, i2d_func, buf, len) \ - SKM_ASN1_seq_pack(PKCS12_SAFEBAG, (st), (i2d_func), (buf), (len)) -#define ASN1_seq_unpack_PKCS12_SAFEBAG(buf, len, d2i_func, free_func) \ - SKM_ASN1_seq_unpack(PKCS12_SAFEBAG, (buf), (len), (d2i_func), (free_func)) - -#define d2i_ASN1_SET_OF_PKCS7(st, pp, length, d2i_func, free_func, ex_tag, ex_class) \ - SKM_ASN1_SET_OF_d2i(PKCS7, (st), (pp), (length), (d2i_func), (free_func), (ex_tag), (ex_class)) -#define i2d_ASN1_SET_OF_PKCS7(st, pp, i2d_func, ex_tag, ex_class, is_set) \ - SKM_ASN1_SET_OF_i2d(PKCS7, (st), (pp), (i2d_func), (ex_tag), (ex_class), (is_set)) -#define ASN1_seq_pack_PKCS7(st, i2d_func, buf, len) \ - SKM_ASN1_seq_pack(PKCS7, (st), (i2d_func), (buf), (len)) -#define ASN1_seq_unpack_PKCS7(buf, len, d2i_func, free_func) \ - SKM_ASN1_seq_unpack(PKCS7, (buf), (len), (d2i_func), (free_func)) - -#define d2i_ASN1_SET_OF_PKCS7_RECIP_INFO(st, pp, length, d2i_func, free_func, ex_tag, ex_class) \ - SKM_ASN1_SET_OF_d2i(PKCS7_RECIP_INFO, (st), (pp), (length), (d2i_func), (free_func), (ex_tag), (ex_class)) -#define i2d_ASN1_SET_OF_PKCS7_RECIP_INFO(st, pp, i2d_func, ex_tag, ex_class, is_set) \ - SKM_ASN1_SET_OF_i2d(PKCS7_RECIP_INFO, (st), (pp), (i2d_func), (ex_tag), (ex_class), (is_set)) -#define ASN1_seq_pack_PKCS7_RECIP_INFO(st, i2d_func, buf, len) \ - SKM_ASN1_seq_pack(PKCS7_RECIP_INFO, (st), (i2d_func), (buf), (len)) -#define ASN1_seq_unpack_PKCS7_RECIP_INFO(buf, len, d2i_func, free_func) \ - SKM_ASN1_seq_unpack(PKCS7_RECIP_INFO, (buf), (len), (d2i_func), (free_func)) - -#define d2i_ASN1_SET_OF_PKCS7_SIGNER_INFO(st, pp, length, d2i_func, free_func, ex_tag, ex_class) \ - SKM_ASN1_SET_OF_d2i(PKCS7_SIGNER_INFO, (st), (pp), (length), (d2i_func), (free_func), (ex_tag), (ex_class)) -#define i2d_ASN1_SET_OF_PKCS7_SIGNER_INFO(st, pp, i2d_func, ex_tag, ex_class, is_set) \ - SKM_ASN1_SET_OF_i2d(PKCS7_SIGNER_INFO, (st), (pp), (i2d_func), (ex_tag), (ex_class), (is_set)) -#define ASN1_seq_pack_PKCS7_SIGNER_INFO(st, i2d_func, buf, len) \ - SKM_ASN1_seq_pack(PKCS7_SIGNER_INFO, (st), (i2d_func), (buf), (len)) -#define ASN1_seq_unpack_PKCS7_SIGNER_INFO(buf, len, d2i_func, free_func) \ - SKM_ASN1_seq_unpack(PKCS7_SIGNER_INFO, (buf), (len), (d2i_func), (free_func)) - -#define d2i_ASN1_SET_OF_POLICYINFO(st, pp, length, d2i_func, free_func, ex_tag, ex_class) \ - SKM_ASN1_SET_OF_d2i(POLICYINFO, (st), (pp), (length), (d2i_func), (free_func), (ex_tag), (ex_class)) -#define i2d_ASN1_SET_OF_POLICYINFO(st, pp, i2d_func, ex_tag, ex_class, is_set) \ - SKM_ASN1_SET_OF_i2d(POLICYINFO, (st), (pp), (i2d_func), (ex_tag), (ex_class), (is_set)) -#define ASN1_seq_pack_POLICYINFO(st, i2d_func, buf, len) \ - SKM_ASN1_seq_pack(POLICYINFO, (st), (i2d_func), (buf), (len)) -#define ASN1_seq_unpack_POLICYINFO(buf, len, d2i_func, free_func) \ - SKM_ASN1_seq_unpack(POLICYINFO, (buf), (len), (d2i_func), (free_func)) - -#define d2i_ASN1_SET_OF_POLICYQUALINFO(st, pp, length, d2i_func, free_func, ex_tag, ex_class) \ - SKM_ASN1_SET_OF_d2i(POLICYQUALINFO, (st), (pp), (length), (d2i_func), (free_func), (ex_tag), (ex_class)) -#define i2d_ASN1_SET_OF_POLICYQUALINFO(st, pp, i2d_func, ex_tag, ex_class, is_set) \ - SKM_ASN1_SET_OF_i2d(POLICYQUALINFO, (st), (pp), (i2d_func), (ex_tag), (ex_class), (is_set)) -#define ASN1_seq_pack_POLICYQUALINFO(st, i2d_func, buf, len) \ - SKM_ASN1_seq_pack(POLICYQUALINFO, (st), (i2d_func), (buf), (len)) -#define ASN1_seq_unpack_POLICYQUALINFO(buf, len, d2i_func, free_func) \ - SKM_ASN1_seq_unpack(POLICYQUALINFO, (buf), (len), (d2i_func), (free_func)) - -#define d2i_ASN1_SET_OF_SXNETID(st, pp, length, d2i_func, free_func, ex_tag, ex_class) \ - SKM_ASN1_SET_OF_d2i(SXNETID, (st), (pp), (length), (d2i_func), (free_func), (ex_tag), (ex_class)) -#define i2d_ASN1_SET_OF_SXNETID(st, pp, i2d_func, ex_tag, ex_class, is_set) \ - SKM_ASN1_SET_OF_i2d(SXNETID, (st), (pp), (i2d_func), (ex_tag), (ex_class), (is_set)) -#define ASN1_seq_pack_SXNETID(st, i2d_func, buf, len) \ - SKM_ASN1_seq_pack(SXNETID, (st), (i2d_func), (buf), (len)) -#define ASN1_seq_unpack_SXNETID(buf, len, d2i_func, free_func) \ - SKM_ASN1_seq_unpack(SXNETID, (buf), (len), (d2i_func), (free_func)) - -#define d2i_ASN1_SET_OF_X509(st, pp, length, d2i_func, free_func, ex_tag, ex_class) \ - SKM_ASN1_SET_OF_d2i(X509, (st), (pp), (length), (d2i_func), (free_func), (ex_tag), (ex_class)) -#define i2d_ASN1_SET_OF_X509(st, pp, i2d_func, ex_tag, ex_class, is_set) \ - SKM_ASN1_SET_OF_i2d(X509, (st), (pp), (i2d_func), (ex_tag), (ex_class), (is_set)) -#define ASN1_seq_pack_X509(st, i2d_func, buf, len) \ - SKM_ASN1_seq_pack(X509, (st), (i2d_func), (buf), (len)) -#define ASN1_seq_unpack_X509(buf, len, d2i_func, free_func) \ - SKM_ASN1_seq_unpack(X509, (buf), (len), (d2i_func), (free_func)) - -#define d2i_ASN1_SET_OF_X509_ALGOR(st, pp, length, d2i_func, free_func, ex_tag, ex_class) \ - SKM_ASN1_SET_OF_d2i(X509_ALGOR, (st), (pp), (length), (d2i_func), (free_func), (ex_tag), (ex_class)) -#define i2d_ASN1_SET_OF_X509_ALGOR(st, pp, i2d_func, ex_tag, ex_class, is_set) \ - SKM_ASN1_SET_OF_i2d(X509_ALGOR, (st), (pp), (i2d_func), (ex_tag), (ex_class), (is_set)) -#define ASN1_seq_pack_X509_ALGOR(st, i2d_func, buf, len) \ - SKM_ASN1_seq_pack(X509_ALGOR, (st), (i2d_func), (buf), (len)) -#define ASN1_seq_unpack_X509_ALGOR(buf, len, d2i_func, free_func) \ - SKM_ASN1_seq_unpack(X509_ALGOR, (buf), (len), (d2i_func), (free_func)) - -#define d2i_ASN1_SET_OF_X509_ATTRIBUTE(st, pp, length, d2i_func, free_func, ex_tag, ex_class) \ - SKM_ASN1_SET_OF_d2i(X509_ATTRIBUTE, (st), (pp), (length), (d2i_func), (free_func), (ex_tag), (ex_class)) -#define i2d_ASN1_SET_OF_X509_ATTRIBUTE(st, pp, i2d_func, ex_tag, ex_class, is_set) \ - SKM_ASN1_SET_OF_i2d(X509_ATTRIBUTE, (st), (pp), (i2d_func), (ex_tag), (ex_class), (is_set)) -#define ASN1_seq_pack_X509_ATTRIBUTE(st, i2d_func, buf, len) \ - SKM_ASN1_seq_pack(X509_ATTRIBUTE, (st), (i2d_func), (buf), (len)) -#define ASN1_seq_unpack_X509_ATTRIBUTE(buf, len, d2i_func, free_func) \ - SKM_ASN1_seq_unpack(X509_ATTRIBUTE, (buf), (len), (d2i_func), (free_func)) - -#define d2i_ASN1_SET_OF_X509_CRL(st, pp, length, d2i_func, free_func, ex_tag, ex_class) \ - SKM_ASN1_SET_OF_d2i(X509_CRL, (st), (pp), (length), (d2i_func), (free_func), (ex_tag), (ex_class)) -#define i2d_ASN1_SET_OF_X509_CRL(st, pp, i2d_func, ex_tag, ex_class, is_set) \ - SKM_ASN1_SET_OF_i2d(X509_CRL, (st), (pp), (i2d_func), (ex_tag), (ex_class), (is_set)) -#define ASN1_seq_pack_X509_CRL(st, i2d_func, buf, len) \ - SKM_ASN1_seq_pack(X509_CRL, (st), (i2d_func), (buf), (len)) -#define ASN1_seq_unpack_X509_CRL(buf, len, d2i_func, free_func) \ - SKM_ASN1_seq_unpack(X509_CRL, (buf), (len), (d2i_func), (free_func)) - -#define d2i_ASN1_SET_OF_X509_EXTENSION(st, pp, length, d2i_func, free_func, ex_tag, ex_class) \ - SKM_ASN1_SET_OF_d2i(X509_EXTENSION, (st), (pp), (length), (d2i_func), (free_func), (ex_tag), (ex_class)) -#define i2d_ASN1_SET_OF_X509_EXTENSION(st, pp, i2d_func, ex_tag, ex_class, is_set) \ - SKM_ASN1_SET_OF_i2d(X509_EXTENSION, (st), (pp), (i2d_func), (ex_tag), (ex_class), (is_set)) -#define ASN1_seq_pack_X509_EXTENSION(st, i2d_func, buf, len) \ - SKM_ASN1_seq_pack(X509_EXTENSION, (st), (i2d_func), (buf), (len)) -#define ASN1_seq_unpack_X509_EXTENSION(buf, len, d2i_func, free_func) \ - SKM_ASN1_seq_unpack(X509_EXTENSION, (buf), (len), (d2i_func), (free_func)) - -#define d2i_ASN1_SET_OF_X509_NAME_ENTRY(st, pp, length, d2i_func, free_func, ex_tag, ex_class) \ - SKM_ASN1_SET_OF_d2i(X509_NAME_ENTRY, (st), (pp), (length), (d2i_func), (free_func), (ex_tag), (ex_class)) -#define i2d_ASN1_SET_OF_X509_NAME_ENTRY(st, pp, i2d_func, ex_tag, ex_class, is_set) \ - SKM_ASN1_SET_OF_i2d(X509_NAME_ENTRY, (st), (pp), (i2d_func), (ex_tag), (ex_class), (is_set)) -#define ASN1_seq_pack_X509_NAME_ENTRY(st, i2d_func, buf, len) \ - SKM_ASN1_seq_pack(X509_NAME_ENTRY, (st), (i2d_func), (buf), (len)) -#define ASN1_seq_unpack_X509_NAME_ENTRY(buf, len, d2i_func, free_func) \ - SKM_ASN1_seq_unpack(X509_NAME_ENTRY, (buf), (len), (d2i_func), (free_func)) - -#define d2i_ASN1_SET_OF_X509_REVOKED(st, pp, length, d2i_func, free_func, ex_tag, ex_class) \ - SKM_ASN1_SET_OF_d2i(X509_REVOKED, (st), (pp), (length), (d2i_func), (free_func), (ex_tag), (ex_class)) -#define i2d_ASN1_SET_OF_X509_REVOKED(st, pp, i2d_func, ex_tag, ex_class, is_set) \ - SKM_ASN1_SET_OF_i2d(X509_REVOKED, (st), (pp), (i2d_func), (ex_tag), (ex_class), (is_set)) -#define ASN1_seq_pack_X509_REVOKED(st, i2d_func, buf, len) \ - SKM_ASN1_seq_pack(X509_REVOKED, (st), (i2d_func), (buf), (len)) -#define ASN1_seq_unpack_X509_REVOKED(buf, len, d2i_func, free_func) \ - SKM_ASN1_seq_unpack(X509_REVOKED, (buf), (len), (d2i_func), (free_func)) - -#define PKCS12_decrypt_d2i_PKCS12_SAFEBAG(algor, d2i_func, free_func, pass, passlen, oct, seq) \ - SKM_PKCS12_decrypt_d2i(PKCS12_SAFEBAG, (algor), (d2i_func), (free_func), (pass), (passlen), (oct), (seq)) - -#define PKCS12_decrypt_d2i_PKCS7(algor, d2i_func, free_func, pass, passlen, oct, seq) \ - SKM_PKCS12_decrypt_d2i(PKCS7, (algor), (d2i_func), (free_func), (pass), (passlen), (oct), (seq)) - -#define lh_ADDED_OBJ_new() LHM_lh_new(ADDED_OBJ,added_obj) -#define lh_ADDED_OBJ_insert(lh,inst) LHM_lh_insert(ADDED_OBJ,lh,inst) -#define lh_ADDED_OBJ_retrieve(lh,inst) LHM_lh_retrieve(ADDED_OBJ,lh,inst) -#define lh_ADDED_OBJ_delete(lh,inst) LHM_lh_delete(ADDED_OBJ,lh,inst) -#define lh_ADDED_OBJ_doall(lh,fn) LHM_lh_doall(ADDED_OBJ,lh,fn) -#define lh_ADDED_OBJ_doall_arg(lh,fn,arg_type,arg) \ - LHM_lh_doall_arg(ADDED_OBJ,lh,fn,arg_type,arg) -#define lh_ADDED_OBJ_error(lh) LHM_lh_error(ADDED_OBJ,lh) -#define lh_ADDED_OBJ_num_items(lh) LHM_lh_num_items(ADDED_OBJ,lh) -#define lh_ADDED_OBJ_down_load(lh) LHM_lh_down_load(ADDED_OBJ,lh) -#define lh_ADDED_OBJ_node_stats_bio(lh,out) \ - LHM_lh_node_stats_bio(ADDED_OBJ,lh,out) -#define lh_ADDED_OBJ_node_usage_stats_bio(lh,out) \ - LHM_lh_node_usage_stats_bio(ADDED_OBJ,lh,out) -#define lh_ADDED_OBJ_stats_bio(lh,out) \ - LHM_lh_stats_bio(ADDED_OBJ,lh,out) -#define lh_ADDED_OBJ_free(lh) LHM_lh_free(ADDED_OBJ,lh) - -#define lh_APP_INFO_new() LHM_lh_new(APP_INFO,app_info) -#define lh_APP_INFO_insert(lh,inst) LHM_lh_insert(APP_INFO,lh,inst) -#define lh_APP_INFO_retrieve(lh,inst) LHM_lh_retrieve(APP_INFO,lh,inst) -#define lh_APP_INFO_delete(lh,inst) LHM_lh_delete(APP_INFO,lh,inst) -#define lh_APP_INFO_doall(lh,fn) LHM_lh_doall(APP_INFO,lh,fn) -#define lh_APP_INFO_doall_arg(lh,fn,arg_type,arg) \ - LHM_lh_doall_arg(APP_INFO,lh,fn,arg_type,arg) -#define lh_APP_INFO_error(lh) LHM_lh_error(APP_INFO,lh) -#define lh_APP_INFO_num_items(lh) LHM_lh_num_items(APP_INFO,lh) -#define lh_APP_INFO_down_load(lh) LHM_lh_down_load(APP_INFO,lh) -#define lh_APP_INFO_node_stats_bio(lh,out) \ - LHM_lh_node_stats_bio(APP_INFO,lh,out) -#define lh_APP_INFO_node_usage_stats_bio(lh,out) \ - LHM_lh_node_usage_stats_bio(APP_INFO,lh,out) -#define lh_APP_INFO_stats_bio(lh,out) \ - LHM_lh_stats_bio(APP_INFO,lh,out) -#define lh_APP_INFO_free(lh) LHM_lh_free(APP_INFO,lh) - -#define lh_CONF_VALUE_new() LHM_lh_new(CONF_VALUE,conf_value) -#define lh_CONF_VALUE_insert(lh,inst) LHM_lh_insert(CONF_VALUE,lh,inst) -#define lh_CONF_VALUE_retrieve(lh,inst) LHM_lh_retrieve(CONF_VALUE,lh,inst) -#define lh_CONF_VALUE_delete(lh,inst) LHM_lh_delete(CONF_VALUE,lh,inst) -#define lh_CONF_VALUE_doall(lh,fn) LHM_lh_doall(CONF_VALUE,lh,fn) -#define lh_CONF_VALUE_doall_arg(lh,fn,arg_type,arg) \ - LHM_lh_doall_arg(CONF_VALUE,lh,fn,arg_type,arg) -#define lh_CONF_VALUE_error(lh) LHM_lh_error(CONF_VALUE,lh) -#define lh_CONF_VALUE_num_items(lh) LHM_lh_num_items(CONF_VALUE,lh) -#define lh_CONF_VALUE_down_load(lh) LHM_lh_down_load(CONF_VALUE,lh) -#define lh_CONF_VALUE_node_stats_bio(lh,out) \ - LHM_lh_node_stats_bio(CONF_VALUE,lh,out) -#define lh_CONF_VALUE_node_usage_stats_bio(lh,out) \ - LHM_lh_node_usage_stats_bio(CONF_VALUE,lh,out) -#define lh_CONF_VALUE_stats_bio(lh,out) \ - LHM_lh_stats_bio(CONF_VALUE,lh,out) -#define lh_CONF_VALUE_free(lh) LHM_lh_free(CONF_VALUE,lh) - -#define lh_ENGINE_PILE_new() LHM_lh_new(ENGINE_PILE,engine_pile) -#define lh_ENGINE_PILE_insert(lh,inst) LHM_lh_insert(ENGINE_PILE,lh,inst) -#define lh_ENGINE_PILE_retrieve(lh,inst) LHM_lh_retrieve(ENGINE_PILE,lh,inst) -#define lh_ENGINE_PILE_delete(lh,inst) LHM_lh_delete(ENGINE_PILE,lh,inst) -#define lh_ENGINE_PILE_doall(lh,fn) LHM_lh_doall(ENGINE_PILE,lh,fn) -#define lh_ENGINE_PILE_doall_arg(lh,fn,arg_type,arg) \ - LHM_lh_doall_arg(ENGINE_PILE,lh,fn,arg_type,arg) -#define lh_ENGINE_PILE_error(lh) LHM_lh_error(ENGINE_PILE,lh) -#define lh_ENGINE_PILE_num_items(lh) LHM_lh_num_items(ENGINE_PILE,lh) -#define lh_ENGINE_PILE_down_load(lh) LHM_lh_down_load(ENGINE_PILE,lh) -#define lh_ENGINE_PILE_node_stats_bio(lh,out) \ - LHM_lh_node_stats_bio(ENGINE_PILE,lh,out) -#define lh_ENGINE_PILE_node_usage_stats_bio(lh,out) \ - LHM_lh_node_usage_stats_bio(ENGINE_PILE,lh,out) -#define lh_ENGINE_PILE_stats_bio(lh,out) \ - LHM_lh_stats_bio(ENGINE_PILE,lh,out) -#define lh_ENGINE_PILE_free(lh) LHM_lh_free(ENGINE_PILE,lh) - -#define lh_ERR_STATE_new() LHM_lh_new(ERR_STATE,err_state) -#define lh_ERR_STATE_insert(lh,inst) LHM_lh_insert(ERR_STATE,lh,inst) -#define lh_ERR_STATE_retrieve(lh,inst) LHM_lh_retrieve(ERR_STATE,lh,inst) -#define lh_ERR_STATE_delete(lh,inst) LHM_lh_delete(ERR_STATE,lh,inst) -#define lh_ERR_STATE_doall(lh,fn) LHM_lh_doall(ERR_STATE,lh,fn) -#define lh_ERR_STATE_doall_arg(lh,fn,arg_type,arg) \ - LHM_lh_doall_arg(ERR_STATE,lh,fn,arg_type,arg) -#define lh_ERR_STATE_error(lh) LHM_lh_error(ERR_STATE,lh) -#define lh_ERR_STATE_num_items(lh) LHM_lh_num_items(ERR_STATE,lh) -#define lh_ERR_STATE_down_load(lh) LHM_lh_down_load(ERR_STATE,lh) -#define lh_ERR_STATE_node_stats_bio(lh,out) \ - LHM_lh_node_stats_bio(ERR_STATE,lh,out) -#define lh_ERR_STATE_node_usage_stats_bio(lh,out) \ - LHM_lh_node_usage_stats_bio(ERR_STATE,lh,out) -#define lh_ERR_STATE_stats_bio(lh,out) \ - LHM_lh_stats_bio(ERR_STATE,lh,out) -#define lh_ERR_STATE_free(lh) LHM_lh_free(ERR_STATE,lh) - -#define lh_ERR_STRING_DATA_new() LHM_lh_new(ERR_STRING_DATA,err_string_data) -#define lh_ERR_STRING_DATA_insert(lh,inst) LHM_lh_insert(ERR_STRING_DATA,lh,inst) -#define lh_ERR_STRING_DATA_retrieve(lh,inst) LHM_lh_retrieve(ERR_STRING_DATA,lh,inst) -#define lh_ERR_STRING_DATA_delete(lh,inst) LHM_lh_delete(ERR_STRING_DATA,lh,inst) -#define lh_ERR_STRING_DATA_doall(lh,fn) LHM_lh_doall(ERR_STRING_DATA,lh,fn) -#define lh_ERR_STRING_DATA_doall_arg(lh,fn,arg_type,arg) \ - LHM_lh_doall_arg(ERR_STRING_DATA,lh,fn,arg_type,arg) -#define lh_ERR_STRING_DATA_error(lh) LHM_lh_error(ERR_STRING_DATA,lh) -#define lh_ERR_STRING_DATA_num_items(lh) LHM_lh_num_items(ERR_STRING_DATA,lh) -#define lh_ERR_STRING_DATA_down_load(lh) LHM_lh_down_load(ERR_STRING_DATA,lh) -#define lh_ERR_STRING_DATA_node_stats_bio(lh,out) \ - LHM_lh_node_stats_bio(ERR_STRING_DATA,lh,out) -#define lh_ERR_STRING_DATA_node_usage_stats_bio(lh,out) \ - LHM_lh_node_usage_stats_bio(ERR_STRING_DATA,lh,out) -#define lh_ERR_STRING_DATA_stats_bio(lh,out) \ - LHM_lh_stats_bio(ERR_STRING_DATA,lh,out) -#define lh_ERR_STRING_DATA_free(lh) LHM_lh_free(ERR_STRING_DATA,lh) - -#define lh_EX_CLASS_ITEM_new() LHM_lh_new(EX_CLASS_ITEM,ex_class_item) -#define lh_EX_CLASS_ITEM_insert(lh,inst) LHM_lh_insert(EX_CLASS_ITEM,lh,inst) -#define lh_EX_CLASS_ITEM_retrieve(lh,inst) LHM_lh_retrieve(EX_CLASS_ITEM,lh,inst) -#define lh_EX_CLASS_ITEM_delete(lh,inst) LHM_lh_delete(EX_CLASS_ITEM,lh,inst) -#define lh_EX_CLASS_ITEM_doall(lh,fn) LHM_lh_doall(EX_CLASS_ITEM,lh,fn) -#define lh_EX_CLASS_ITEM_doall_arg(lh,fn,arg_type,arg) \ - LHM_lh_doall_arg(EX_CLASS_ITEM,lh,fn,arg_type,arg) -#define lh_EX_CLASS_ITEM_error(lh) LHM_lh_error(EX_CLASS_ITEM,lh) -#define lh_EX_CLASS_ITEM_num_items(lh) LHM_lh_num_items(EX_CLASS_ITEM,lh) -#define lh_EX_CLASS_ITEM_down_load(lh) LHM_lh_down_load(EX_CLASS_ITEM,lh) -#define lh_EX_CLASS_ITEM_node_stats_bio(lh,out) \ - LHM_lh_node_stats_bio(EX_CLASS_ITEM,lh,out) -#define lh_EX_CLASS_ITEM_node_usage_stats_bio(lh,out) \ - LHM_lh_node_usage_stats_bio(EX_CLASS_ITEM,lh,out) -#define lh_EX_CLASS_ITEM_stats_bio(lh,out) \ - LHM_lh_stats_bio(EX_CLASS_ITEM,lh,out) -#define lh_EX_CLASS_ITEM_free(lh) LHM_lh_free(EX_CLASS_ITEM,lh) - -#define lh_FUNCTION_new() LHM_lh_new(FUNCTION,function) -#define lh_FUNCTION_insert(lh,inst) LHM_lh_insert(FUNCTION,lh,inst) -#define lh_FUNCTION_retrieve(lh,inst) LHM_lh_retrieve(FUNCTION,lh,inst) -#define lh_FUNCTION_delete(lh,inst) LHM_lh_delete(FUNCTION,lh,inst) -#define lh_FUNCTION_doall(lh,fn) LHM_lh_doall(FUNCTION,lh,fn) -#define lh_FUNCTION_doall_arg(lh,fn,arg_type,arg) \ - LHM_lh_doall_arg(FUNCTION,lh,fn,arg_type,arg) -#define lh_FUNCTION_error(lh) LHM_lh_error(FUNCTION,lh) -#define lh_FUNCTION_num_items(lh) LHM_lh_num_items(FUNCTION,lh) -#define lh_FUNCTION_down_load(lh) LHM_lh_down_load(FUNCTION,lh) -#define lh_FUNCTION_node_stats_bio(lh,out) \ - LHM_lh_node_stats_bio(FUNCTION,lh,out) -#define lh_FUNCTION_node_usage_stats_bio(lh,out) \ - LHM_lh_node_usage_stats_bio(FUNCTION,lh,out) -#define lh_FUNCTION_stats_bio(lh,out) \ - LHM_lh_stats_bio(FUNCTION,lh,out) -#define lh_FUNCTION_free(lh) LHM_lh_free(FUNCTION,lh) - -#define lh_MEM_new() LHM_lh_new(MEM,mem) -#define lh_MEM_insert(lh,inst) LHM_lh_insert(MEM,lh,inst) -#define lh_MEM_retrieve(lh,inst) LHM_lh_retrieve(MEM,lh,inst) -#define lh_MEM_delete(lh,inst) LHM_lh_delete(MEM,lh,inst) -#define lh_MEM_doall(lh,fn) LHM_lh_doall(MEM,lh,fn) -#define lh_MEM_doall_arg(lh,fn,arg_type,arg) \ - LHM_lh_doall_arg(MEM,lh,fn,arg_type,arg) -#define lh_MEM_error(lh) LHM_lh_error(MEM,lh) -#define lh_MEM_num_items(lh) LHM_lh_num_items(MEM,lh) -#define lh_MEM_down_load(lh) LHM_lh_down_load(MEM,lh) -#define lh_MEM_node_stats_bio(lh,out) \ - LHM_lh_node_stats_bio(MEM,lh,out) -#define lh_MEM_node_usage_stats_bio(lh,out) \ - LHM_lh_node_usage_stats_bio(MEM,lh,out) -#define lh_MEM_stats_bio(lh,out) \ - LHM_lh_stats_bio(MEM,lh,out) -#define lh_MEM_free(lh) LHM_lh_free(MEM,lh) - -#define lh_OBJ_NAME_new() LHM_lh_new(OBJ_NAME,obj_name) -#define lh_OBJ_NAME_insert(lh,inst) LHM_lh_insert(OBJ_NAME,lh,inst) -#define lh_OBJ_NAME_retrieve(lh,inst) LHM_lh_retrieve(OBJ_NAME,lh,inst) -#define lh_OBJ_NAME_delete(lh,inst) LHM_lh_delete(OBJ_NAME,lh,inst) -#define lh_OBJ_NAME_doall(lh,fn) LHM_lh_doall(OBJ_NAME,lh,fn) -#define lh_OBJ_NAME_doall_arg(lh,fn,arg_type,arg) \ - LHM_lh_doall_arg(OBJ_NAME,lh,fn,arg_type,arg) -#define lh_OBJ_NAME_error(lh) LHM_lh_error(OBJ_NAME,lh) -#define lh_OBJ_NAME_num_items(lh) LHM_lh_num_items(OBJ_NAME,lh) -#define lh_OBJ_NAME_down_load(lh) LHM_lh_down_load(OBJ_NAME,lh) -#define lh_OBJ_NAME_node_stats_bio(lh,out) \ - LHM_lh_node_stats_bio(OBJ_NAME,lh,out) -#define lh_OBJ_NAME_node_usage_stats_bio(lh,out) \ - LHM_lh_node_usage_stats_bio(OBJ_NAME,lh,out) -#define lh_OBJ_NAME_stats_bio(lh,out) \ - LHM_lh_stats_bio(OBJ_NAME,lh,out) -#define lh_OBJ_NAME_free(lh) LHM_lh_free(OBJ_NAME,lh) - -#define lh_OPENSSL_CSTRING_new() LHM_lh_new(OPENSSL_CSTRING,openssl_cstring) -#define lh_OPENSSL_CSTRING_insert(lh,inst) LHM_lh_insert(OPENSSL_CSTRING,lh,inst) -#define lh_OPENSSL_CSTRING_retrieve(lh,inst) LHM_lh_retrieve(OPENSSL_CSTRING,lh,inst) -#define lh_OPENSSL_CSTRING_delete(lh,inst) LHM_lh_delete(OPENSSL_CSTRING,lh,inst) -#define lh_OPENSSL_CSTRING_doall(lh,fn) LHM_lh_doall(OPENSSL_CSTRING,lh,fn) -#define lh_OPENSSL_CSTRING_doall_arg(lh,fn,arg_type,arg) \ - LHM_lh_doall_arg(OPENSSL_CSTRING,lh,fn,arg_type,arg) -#define lh_OPENSSL_CSTRING_error(lh) LHM_lh_error(OPENSSL_CSTRING,lh) -#define lh_OPENSSL_CSTRING_num_items(lh) LHM_lh_num_items(OPENSSL_CSTRING,lh) -#define lh_OPENSSL_CSTRING_down_load(lh) LHM_lh_down_load(OPENSSL_CSTRING,lh) -#define lh_OPENSSL_CSTRING_node_stats_bio(lh,out) \ - LHM_lh_node_stats_bio(OPENSSL_CSTRING,lh,out) -#define lh_OPENSSL_CSTRING_node_usage_stats_bio(lh,out) \ - LHM_lh_node_usage_stats_bio(OPENSSL_CSTRING,lh,out) -#define lh_OPENSSL_CSTRING_stats_bio(lh,out) \ - LHM_lh_stats_bio(OPENSSL_CSTRING,lh,out) -#define lh_OPENSSL_CSTRING_free(lh) LHM_lh_free(OPENSSL_CSTRING,lh) - -#define lh_OPENSSL_STRING_new() LHM_lh_new(OPENSSL_STRING,openssl_string) -#define lh_OPENSSL_STRING_insert(lh,inst) LHM_lh_insert(OPENSSL_STRING,lh,inst) -#define lh_OPENSSL_STRING_retrieve(lh,inst) LHM_lh_retrieve(OPENSSL_STRING,lh,inst) -#define lh_OPENSSL_STRING_delete(lh,inst) LHM_lh_delete(OPENSSL_STRING,lh,inst) -#define lh_OPENSSL_STRING_doall(lh,fn) LHM_lh_doall(OPENSSL_STRING,lh,fn) -#define lh_OPENSSL_STRING_doall_arg(lh,fn,arg_type,arg) \ - LHM_lh_doall_arg(OPENSSL_STRING,lh,fn,arg_type,arg) -#define lh_OPENSSL_STRING_error(lh) LHM_lh_error(OPENSSL_STRING,lh) -#define lh_OPENSSL_STRING_num_items(lh) LHM_lh_num_items(OPENSSL_STRING,lh) -#define lh_OPENSSL_STRING_down_load(lh) LHM_lh_down_load(OPENSSL_STRING,lh) -#define lh_OPENSSL_STRING_node_stats_bio(lh,out) \ - LHM_lh_node_stats_bio(OPENSSL_STRING,lh,out) -#define lh_OPENSSL_STRING_node_usage_stats_bio(lh,out) \ - LHM_lh_node_usage_stats_bio(OPENSSL_STRING,lh,out) -#define lh_OPENSSL_STRING_stats_bio(lh,out) \ - LHM_lh_stats_bio(OPENSSL_STRING,lh,out) -#define lh_OPENSSL_STRING_free(lh) LHM_lh_free(OPENSSL_STRING,lh) - -#define lh_SSL_SESSION_new() LHM_lh_new(SSL_SESSION,ssl_session) -#define lh_SSL_SESSION_insert(lh,inst) LHM_lh_insert(SSL_SESSION,lh,inst) -#define lh_SSL_SESSION_retrieve(lh,inst) LHM_lh_retrieve(SSL_SESSION,lh,inst) -#define lh_SSL_SESSION_delete(lh,inst) LHM_lh_delete(SSL_SESSION,lh,inst) -#define lh_SSL_SESSION_doall(lh,fn) LHM_lh_doall(SSL_SESSION,lh,fn) -#define lh_SSL_SESSION_doall_arg(lh,fn,arg_type,arg) \ - LHM_lh_doall_arg(SSL_SESSION,lh,fn,arg_type,arg) -#define lh_SSL_SESSION_error(lh) LHM_lh_error(SSL_SESSION,lh) -#define lh_SSL_SESSION_num_items(lh) LHM_lh_num_items(SSL_SESSION,lh) -#define lh_SSL_SESSION_down_load(lh) LHM_lh_down_load(SSL_SESSION,lh) -#define lh_SSL_SESSION_node_stats_bio(lh,out) \ - LHM_lh_node_stats_bio(SSL_SESSION,lh,out) -#define lh_SSL_SESSION_node_usage_stats_bio(lh,out) \ - LHM_lh_node_usage_stats_bio(SSL_SESSION,lh,out) -#define lh_SSL_SESSION_stats_bio(lh,out) \ - LHM_lh_stats_bio(SSL_SESSION,lh,out) -#define lh_SSL_SESSION_free(lh) LHM_lh_free(SSL_SESSION,lh) -/* End of util/mkstack.pl block, you may now edit :-) */ - -#endif /* !defined HEADER_SAFESTACK_H */ diff --git a/Pods/OpenSSL-Universal/include-osx/openssl/seed.h b/Pods/OpenSSL-Universal/include-osx/openssl/seed.h deleted file mode 100644 index c50fdd36..00000000 --- a/Pods/OpenSSL-Universal/include-osx/openssl/seed.h +++ /dev/null @@ -1,139 +0,0 @@ -/* - * Copyright (c) 2007 KISA(Korea Information Security Agency). All rights reserved. - * - * Redistribution and use in source and binary forms, with or without - * modification, are permitted provided that the following conditions - * are met: - * 1. Redistributions of source code must retain the above copyright - * notice, this list of conditions and the following disclaimer. - * 2. Neither the name of author nor the names of its contributors may - * be used to endorse or promote products derived from this software - * without specific prior written permission. - * - * THIS SOFTWARE IS PROVIDED BY AUTHOR AND CONTRIBUTORS ``AS IS'' AND - * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE - * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE - * ARE DISCLAIMED. IN NO EVENT SHALL AUTHOR OR CONTRIBUTORS BE LIABLE - * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL - * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS - * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) - * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT - * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY - * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF - * SUCH DAMAGE. - * - */ -/* ==================================================================== - * Copyright (c) 1998-2007 The OpenSSL Project. All rights reserved. - * - * Redistribution and use in source and binary forms, with or without - * modification, are permitted provided that the following conditions - * are met: - * - * 1. Redistributions of source code must retain the above copyright - * notice, this list of conditions and the following disclaimer. - * - * 2. Redistributions in binary form must reproduce the above copyright - * notice, this list of conditions and the following disclaimer in - * the documentation and/or other materials provided with the - * distribution. - * - * 3. All advertising materials mentioning features or use of this - * software must display the following acknowledgment: - * "This product includes software developed by the OpenSSL Project - * for use in the OpenSSL Toolkit. (http://www.openssl.org/)" - * - * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to - * endorse or promote products derived from this software without - * prior written permission. For written permission, please contact - * openssl-core@openssl.org. - * - * 5. Products derived from this software may not be called "OpenSSL" - * nor may "OpenSSL" appear in their names without prior written - * permission of the OpenSSL Project. - * - * 6. Redistributions of any form whatsoever must retain the following - * acknowledgment: - * "This product includes software developed by the OpenSSL Project - * for use in the OpenSSL Toolkit (http://www.openssl.org/)" - * - * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY - * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE - * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR - * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR - * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, - * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT - * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; - * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) - * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, - * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) - * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED - * OF THE POSSIBILITY OF SUCH DAMAGE. - * ==================================================================== - * - * This product includes cryptographic software written by Eric Young - * (eay@cryptsoft.com). This product includes software written by Tim - * Hudson (tjh@cryptsoft.com). - * - */ - - -#ifndef HEADER_SEED_H -#define HEADER_SEED_H - -#include -#include -#include - -#ifdef OPENSSL_NO_SEED -#error SEED is disabled. -#endif - -#ifdef AES_LONG /* look whether we need 'long' to get 32 bits */ -# ifndef SEED_LONG -# define SEED_LONG 1 -# endif -#endif - -#if !defined(NO_SYS_TYPES_H) -# include -#endif - -#define SEED_BLOCK_SIZE 16 -#define SEED_KEY_LENGTH 16 - - -#ifdef __cplusplus -extern "C" { -#endif - - -typedef struct seed_key_st { -#ifdef SEED_LONG - unsigned long data[32]; -#else - unsigned int data[32]; -#endif -} SEED_KEY_SCHEDULE; - -#ifdef OPENSSL_FIPS -void private_SEED_set_key(const unsigned char rawkey[SEED_KEY_LENGTH], SEED_KEY_SCHEDULE *ks); -#endif -void SEED_set_key(const unsigned char rawkey[SEED_KEY_LENGTH], SEED_KEY_SCHEDULE *ks); - -void SEED_encrypt(const unsigned char s[SEED_BLOCK_SIZE], unsigned char d[SEED_BLOCK_SIZE], const SEED_KEY_SCHEDULE *ks); -void SEED_decrypt(const unsigned char s[SEED_BLOCK_SIZE], unsigned char d[SEED_BLOCK_SIZE], const SEED_KEY_SCHEDULE *ks); - -void SEED_ecb_encrypt(const unsigned char *in, unsigned char *out, const SEED_KEY_SCHEDULE *ks, int enc); -void SEED_cbc_encrypt(const unsigned char *in, unsigned char *out, - size_t len, const SEED_KEY_SCHEDULE *ks, unsigned char ivec[SEED_BLOCK_SIZE], int enc); -void SEED_cfb128_encrypt(const unsigned char *in, unsigned char *out, - size_t len, const SEED_KEY_SCHEDULE *ks, unsigned char ivec[SEED_BLOCK_SIZE], int *num, int enc); -void SEED_ofb128_encrypt(const unsigned char *in, unsigned char *out, - size_t len, const SEED_KEY_SCHEDULE *ks, unsigned char ivec[SEED_BLOCK_SIZE], int *num); - -#ifdef __cplusplus -} -#endif - -#endif /* HEADER_SEED_H */ diff --git a/Pods/OpenSSL-Universal/include-osx/openssl/sha.h b/Pods/OpenSSL-Universal/include-osx/openssl/sha.h deleted file mode 100644 index 8a6bf4bb..00000000 --- a/Pods/OpenSSL-Universal/include-osx/openssl/sha.h +++ /dev/null @@ -1,214 +0,0 @@ -/* crypto/sha/sha.h */ -/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) - * All rights reserved. - * - * This package is an SSL implementation written - * by Eric Young (eay@cryptsoft.com). - * The implementation was written so as to conform with Netscapes SSL. - * - * This library is free for commercial and non-commercial use as long as - * the following conditions are aheared to. The following conditions - * apply to all code found in this distribution, be it the RC4, RSA, - * lhash, DES, etc., code; not just the SSL code. The SSL documentation - * included with this distribution is covered by the same copyright terms - * except that the holder is Tim Hudson (tjh@cryptsoft.com). - * - * Copyright remains Eric Young's, and as such any Copyright notices in - * the code are not to be removed. - * If this package is used in a product, Eric Young should be given attribution - * as the author of the parts of the library used. - * This can be in the form of a textual message at program startup or - * in documentation (online or textual) provided with the package. - * - * Redistribution and use in source and binary forms, with or without - * modification, are permitted provided that the following conditions - * are met: - * 1. Redistributions of source code must retain the copyright - * notice, this list of conditions and the following disclaimer. - * 2. Redistributions in binary form must reproduce the above copyright - * notice, this list of conditions and the following disclaimer in the - * documentation and/or other materials provided with the distribution. - * 3. All advertising materials mentioning features or use of this software - * must display the following acknowledgement: - * "This product includes cryptographic software written by - * Eric Young (eay@cryptsoft.com)" - * The word 'cryptographic' can be left out if the rouines from the library - * being used are not cryptographic related :-). - * 4. If you include any Windows specific code (or a derivative thereof) from - * the apps directory (application code) you must include an acknowledgement: - * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" - * - * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND - * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE - * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE - * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE - * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL - * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS - * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) - * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT - * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY - * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF - * SUCH DAMAGE. - * - * The licence and distribution terms for any publically available version or - * derivative of this code cannot be changed. i.e. this code cannot simply be - * copied and put under another distribution licence - * [including the GNU Public Licence.] - */ - -#ifndef HEADER_SHA_H -#define HEADER_SHA_H - -#include -#include - -#ifdef __cplusplus -extern "C" { -#endif - -#if defined(OPENSSL_NO_SHA) || (defined(OPENSSL_NO_SHA0) && defined(OPENSSL_NO_SHA1)) -#error SHA is disabled. -#endif - -#if defined(OPENSSL_FIPS) -#define FIPS_SHA_SIZE_T size_t -#endif - -/* - * !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! - * ! SHA_LONG has to be at least 32 bits wide. If it's wider, then ! - * ! SHA_LONG_LOG2 has to be defined along. ! - * !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! - */ - -#if defined(__LP32__) -#define SHA_LONG unsigned long -#elif defined(OPENSSL_SYS_CRAY) || defined(__ILP64__) -#define SHA_LONG unsigned long -#define SHA_LONG_LOG2 3 -#else -#define SHA_LONG unsigned int -#endif - -#define SHA_LBLOCK 16 -#define SHA_CBLOCK (SHA_LBLOCK*4) /* SHA treats input data as a - * contiguous array of 32 bit - * wide big-endian values. */ -#define SHA_LAST_BLOCK (SHA_CBLOCK-8) -#define SHA_DIGEST_LENGTH 20 - -typedef struct SHAstate_st - { - SHA_LONG h0,h1,h2,h3,h4; - SHA_LONG Nl,Nh; - SHA_LONG data[SHA_LBLOCK]; - unsigned int num; - } SHA_CTX; - -#ifndef OPENSSL_NO_SHA0 -#ifdef OPENSSL_FIPS -int private_SHA_Init(SHA_CTX *c); -#endif -int SHA_Init(SHA_CTX *c); -int SHA_Update(SHA_CTX *c, const void *data, size_t len); -int SHA_Final(unsigned char *md, SHA_CTX *c); -unsigned char *SHA(const unsigned char *d, size_t n, unsigned char *md); -void SHA_Transform(SHA_CTX *c, const unsigned char *data); -#endif -#ifndef OPENSSL_NO_SHA1 -#ifdef OPENSSL_FIPS -int private_SHA1_Init(SHA_CTX *c); -#endif -int SHA1_Init(SHA_CTX *c); -int SHA1_Update(SHA_CTX *c, const void *data, size_t len); -int SHA1_Final(unsigned char *md, SHA_CTX *c); -unsigned char *SHA1(const unsigned char *d, size_t n, unsigned char *md); -void SHA1_Transform(SHA_CTX *c, const unsigned char *data); -#endif - -#define SHA256_CBLOCK (SHA_LBLOCK*4) /* SHA-256 treats input data as a - * contiguous array of 32 bit - * wide big-endian values. */ -#define SHA224_DIGEST_LENGTH 28 -#define SHA256_DIGEST_LENGTH 32 - -typedef struct SHA256state_st - { - SHA_LONG h[8]; - SHA_LONG Nl,Nh; - SHA_LONG data[SHA_LBLOCK]; - unsigned int num,md_len; - } SHA256_CTX; - -#ifndef OPENSSL_NO_SHA256 -#ifdef OPENSSL_FIPS -int private_SHA224_Init(SHA256_CTX *c); -int private_SHA256_Init(SHA256_CTX *c); -#endif -int SHA224_Init(SHA256_CTX *c); -int SHA224_Update(SHA256_CTX *c, const void *data, size_t len); -int SHA224_Final(unsigned char *md, SHA256_CTX *c); -unsigned char *SHA224(const unsigned char *d, size_t n,unsigned char *md); -int SHA256_Init(SHA256_CTX *c); -int SHA256_Update(SHA256_CTX *c, const void *data, size_t len); -int SHA256_Final(unsigned char *md, SHA256_CTX *c); -unsigned char *SHA256(const unsigned char *d, size_t n,unsigned char *md); -void SHA256_Transform(SHA256_CTX *c, const unsigned char *data); -#endif - -#define SHA384_DIGEST_LENGTH 48 -#define SHA512_DIGEST_LENGTH 64 - -#ifndef OPENSSL_NO_SHA512 -/* - * Unlike 32-bit digest algorithms, SHA-512 *relies* on SHA_LONG64 - * being exactly 64-bit wide. See Implementation Notes in sha512.c - * for further details. - */ -#define SHA512_CBLOCK (SHA_LBLOCK*8) /* SHA-512 treats input data as a - * contiguous array of 64 bit - * wide big-endian values. */ -#if (defined(_WIN32) || defined(_WIN64)) && !defined(__MINGW32__) -#define SHA_LONG64 unsigned __int64 -#define U64(C) C##UI64 -#elif defined(__arch64__) -#define SHA_LONG64 unsigned long -#define U64(C) C##UL -#else -#define SHA_LONG64 unsigned long long -#define U64(C) C##ULL -#endif - -typedef struct SHA512state_st - { - SHA_LONG64 h[8]; - SHA_LONG64 Nl,Nh; - union { - SHA_LONG64 d[SHA_LBLOCK]; - unsigned char p[SHA512_CBLOCK]; - } u; - unsigned int num,md_len; - } SHA512_CTX; -#endif - -#ifndef OPENSSL_NO_SHA512 -#ifdef OPENSSL_FIPS -int private_SHA384_Init(SHA512_CTX *c); -int private_SHA512_Init(SHA512_CTX *c); -#endif -int SHA384_Init(SHA512_CTX *c); -int SHA384_Update(SHA512_CTX *c, const void *data, size_t len); -int SHA384_Final(unsigned char *md, SHA512_CTX *c); -unsigned char *SHA384(const unsigned char *d, size_t n,unsigned char *md); -int SHA512_Init(SHA512_CTX *c); -int SHA512_Update(SHA512_CTX *c, const void *data, size_t len); -int SHA512_Final(unsigned char *md, SHA512_CTX *c); -unsigned char *SHA512(const unsigned char *d, size_t n,unsigned char *md); -void SHA512_Transform(SHA512_CTX *c, const unsigned char *data); -#endif - -#ifdef __cplusplus -} -#endif - -#endif diff --git a/Pods/OpenSSL-Universal/include-osx/openssl/srp.h b/Pods/OpenSSL-Universal/include-osx/openssl/srp.h deleted file mode 100644 index 7ec7825c..00000000 --- a/Pods/OpenSSL-Universal/include-osx/openssl/srp.h +++ /dev/null @@ -1,172 +0,0 @@ -/* crypto/srp/srp.h */ -/* Written by Christophe Renou (christophe.renou@edelweb.fr) with - * the precious help of Peter Sylvester (peter.sylvester@edelweb.fr) - * for the EdelKey project and contributed to the OpenSSL project 2004. - */ -/* ==================================================================== - * Copyright (c) 2004 The OpenSSL Project. All rights reserved. - * - * Redistribution and use in source and binary forms, with or without - * modification, are permitted provided that the following conditions - * are met: - * - * 1. Redistributions of source code must retain the above copyright - * notice, this list of conditions and the following disclaimer. - * - * 2. Redistributions in binary form must reproduce the above copyright - * notice, this list of conditions and the following disclaimer in - * the documentation and/or other materials provided with the - * distribution. - * - * 3. All advertising materials mentioning features or use of this - * software must display the following acknowledgment: - * "This product includes software developed by the OpenSSL Project - * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)" - * - * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to - * endorse or promote products derived from this software without - * prior written permission. For written permission, please contact - * licensing@OpenSSL.org. - * - * 5. Products derived from this software may not be called "OpenSSL" - * nor may "OpenSSL" appear in their names without prior written - * permission of the OpenSSL Project. - * - * 6. Redistributions of any form whatsoever must retain the following - * acknowledgment: - * "This product includes software developed by the OpenSSL Project - * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)" - * - * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY - * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE - * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR - * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR - * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, - * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT - * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; - * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) - * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, - * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) - * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED - * OF THE POSSIBILITY OF SUCH DAMAGE. - * ==================================================================== - * - * This product includes cryptographic software written by Eric Young - * (eay@cryptsoft.com). This product includes software written by Tim - * Hudson (tjh@cryptsoft.com). - * - */ -#ifndef __SRP_H__ -#define __SRP_H__ - -#ifndef OPENSSL_NO_SRP - -#include -#include - -#ifdef __cplusplus -extern "C" { -#endif - -#include -#include -#include - -typedef struct SRP_gN_cache_st - { - char *b64_bn; - BIGNUM *bn; - } SRP_gN_cache; - - -DECLARE_STACK_OF(SRP_gN_cache) - -typedef struct SRP_user_pwd_st - { - char *id; - BIGNUM *s; - BIGNUM *v; - const BIGNUM *g; - const BIGNUM *N; - char *info; - } SRP_user_pwd; - -DECLARE_STACK_OF(SRP_user_pwd) - -typedef struct SRP_VBASE_st - { - STACK_OF(SRP_user_pwd) *users_pwd; - STACK_OF(SRP_gN_cache) *gN_cache; -/* to simulate a user */ - char *seed_key; - BIGNUM *default_g; - BIGNUM *default_N; - } SRP_VBASE; - - -/*Structure interne pour retenir les couples N et g*/ -typedef struct SRP_gN_st - { - char *id; - BIGNUM *g; - BIGNUM *N; - } SRP_gN; - -DECLARE_STACK_OF(SRP_gN) - -SRP_VBASE *SRP_VBASE_new(char *seed_key); -int SRP_VBASE_free(SRP_VBASE *vb); -int SRP_VBASE_init(SRP_VBASE *vb, char * verifier_file); -SRP_user_pwd *SRP_VBASE_get_by_user(SRP_VBASE *vb, char *username); -char *SRP_create_verifier(const char *user, const char *pass, char **salt, - char **verifier, const char *N, const char *g); -int SRP_create_verifier_BN(const char *user, const char *pass, BIGNUM **salt, BIGNUM **verifier, BIGNUM *N, BIGNUM *g); - - -#define SRP_NO_ERROR 0 -#define SRP_ERR_VBASE_INCOMPLETE_FILE 1 -#define SRP_ERR_VBASE_BN_LIB 2 -#define SRP_ERR_OPEN_FILE 3 -#define SRP_ERR_MEMORY 4 - -#define DB_srptype 0 -#define DB_srpverifier 1 -#define DB_srpsalt 2 -#define DB_srpid 3 -#define DB_srpgN 4 -#define DB_srpinfo 5 -#undef DB_NUMBER -#define DB_NUMBER 6 - -#define DB_SRP_INDEX 'I' -#define DB_SRP_VALID 'V' -#define DB_SRP_REVOKED 'R' -#define DB_SRP_MODIF 'v' - - -/* see srp.c */ -char * SRP_check_known_gN_param(BIGNUM* g, BIGNUM* N); -SRP_gN *SRP_get_default_gN(const char * id) ; - -/* server side .... */ -BIGNUM *SRP_Calc_server_key(BIGNUM *A, BIGNUM *v, BIGNUM *u, BIGNUM *b, BIGNUM *N); -BIGNUM *SRP_Calc_B(BIGNUM *b, BIGNUM *N, BIGNUM *g, BIGNUM *v); -int SRP_Verify_A_mod_N(BIGNUM *A, BIGNUM *N); -BIGNUM *SRP_Calc_u(BIGNUM *A, BIGNUM *B, BIGNUM *N) ; - - - -/* client side .... */ -BIGNUM *SRP_Calc_x(BIGNUM *s, const char *user, const char *pass); -BIGNUM *SRP_Calc_A(BIGNUM *a, BIGNUM *N, BIGNUM *g); -BIGNUM *SRP_Calc_client_key(BIGNUM *N, BIGNUM *B, BIGNUM *g, BIGNUM *x, BIGNUM *a, BIGNUM *u); -int SRP_Verify_B_mod_N(BIGNUM *B, BIGNUM *N); - -#define SRP_MINIMAL_N 1024 - -#ifdef __cplusplus -} -#endif - -#endif -#endif diff --git a/Pods/OpenSSL-Universal/include-osx/openssl/srtp.h b/Pods/OpenSSL-Universal/include-osx/openssl/srtp.h deleted file mode 100644 index c0cf33ef..00000000 --- a/Pods/OpenSSL-Universal/include-osx/openssl/srtp.h +++ /dev/null @@ -1,145 +0,0 @@ -/* ssl/tls1.h */ -/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) - * All rights reserved. - * - * This package is an SSL implementation written - * by Eric Young (eay@cryptsoft.com). - * The implementation was written so as to conform with Netscapes SSL. - * - * This library is free for commercial and non-commercial use as long as - * the following conditions are aheared to. The following conditions - * apply to all code found in this distribution, be it the RC4, RSA, - * lhash, DES, etc., code; not just the SSL code. The SSL documentation - * included with this distribution is covered by the same copyright terms - * except that the holder is Tim Hudson (tjh@cryptsoft.com). - * - * Copyright remains Eric Young's, and as such any Copyright notices in - * the code are not to be removed. - * If this package is used in a product, Eric Young should be given attribution - * as the author of the parts of the library used. - * This can be in the form of a textual message at program startup or - * in documentation (online or textual) provided with the package. - * - * Redistribution and use in source and binary forms, with or without - * modification, are permitted provided that the following conditions - * are met: - * 1. Redistributions of source code must retain the copyright - * notice, this list of conditions and the following disclaimer. - * 2. Redistributions in binary form must reproduce the above copyright - * notice, this list of conditions and the following disclaimer in the - * documentation and/or other materials provided with the distribution. - * 3. All advertising materials mentioning features or use of this software - * must display the following acknowledgement: - * "This product includes cryptographic software written by - * Eric Young (eay@cryptsoft.com)" - * The word 'cryptographic' can be left out if the rouines from the library - * being used are not cryptographic related :-). - * 4. If you include any Windows specific code (or a derivative thereof) from - * the apps directory (application code) you must include an acknowledgement: - * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" - * - * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND - * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE - * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE - * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE - * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL - * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS - * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) - * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT - * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY - * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF - * SUCH DAMAGE. - * - * The licence and distribution terms for any publically available version or - * derivative of this code cannot be changed. i.e. this code cannot simply be - * copied and put under another distribution licence - * [including the GNU Public Licence.] - */ -/* ==================================================================== - * Copyright (c) 1998-2006 The OpenSSL Project. All rights reserved. - * - * Redistribution and use in source and binary forms, with or without - * modification, are permitted provided that the following conditions - * are met: - * - * 1. Redistributions of source code must retain the above copyright - * notice, this list of conditions and the following disclaimer. - * - * 2. Redistributions in binary form must reproduce the above copyright - * notice, this list of conditions and the following disclaimer in - * the documentation and/or other materials provided with the - * distribution. - * - * 3. All advertising materials mentioning features or use of this - * software must display the following acknowledgment: - * "This product includes software developed by the OpenSSL Project - * for use in the OpenSSL Toolkit. (http://www.openssl.org/)" - * - * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to - * endorse or promote products derived from this software without - * prior written permission. For written permission, please contact - * openssl-core@openssl.org. - * - * 5. Products derived from this software may not be called "OpenSSL" - * nor may "OpenSSL" appear in their names without prior written - * permission of the OpenSSL Project. - * - * 6. Redistributions of any form whatsoever must retain the following - * acknowledgment: - * "This product includes software developed by the OpenSSL Project - * for use in the OpenSSL Toolkit (http://www.openssl.org/)" - * - * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY - * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE - * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR - * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR - * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, - * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT - * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; - * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) - * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, - * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) - * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED - * OF THE POSSIBILITY OF SUCH DAMAGE. - * ==================================================================== - * - * This product includes cryptographic software written by Eric Young - * (eay@cryptsoft.com). This product includes software written by Tim - * Hudson (tjh@cryptsoft.com). - * - */ -/* - DTLS code by Eric Rescorla - - Copyright (C) 2006, Network Resonance, Inc. - Copyright (C) 2011, RTFM, Inc. -*/ - -#ifndef HEADER_D1_SRTP_H -#define HEADER_D1_SRTP_H - -#ifdef __cplusplus -extern "C" { -#endif - - -#define SRTP_AES128_CM_SHA1_80 0x0001 -#define SRTP_AES128_CM_SHA1_32 0x0002 -#define SRTP_AES128_F8_SHA1_80 0x0003 -#define SRTP_AES128_F8_SHA1_32 0x0004 -#define SRTP_NULL_SHA1_80 0x0005 -#define SRTP_NULL_SHA1_32 0x0006 - -int SSL_CTX_set_tlsext_use_srtp(SSL_CTX *ctx, const char *profiles); -int SSL_set_tlsext_use_srtp(SSL *ctx, const char *profiles); -SRTP_PROTECTION_PROFILE *SSL_get_selected_srtp_profile(SSL *s); - -STACK_OF(SRTP_PROTECTION_PROFILE) *SSL_get_srtp_profiles(SSL *ssl); -SRTP_PROTECTION_PROFILE *SSL_get_selected_srtp_profile(SSL *s); - -#ifdef __cplusplus -} -#endif - -#endif - diff --git a/Pods/OpenSSL-Universal/include-osx/openssl/ssl.h b/Pods/OpenSSL-Universal/include-osx/openssl/ssl.h deleted file mode 100644 index 4c1242c9..00000000 --- a/Pods/OpenSSL-Universal/include-osx/openssl/ssl.h +++ /dev/null @@ -1,2590 +0,0 @@ -/* ssl/ssl.h */ -/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) - * All rights reserved. - * - * This package is an SSL implementation written - * by Eric Young (eay@cryptsoft.com). - * The implementation was written so as to conform with Netscapes SSL. - * - * This library is free for commercial and non-commercial use as long as - * the following conditions are aheared to. The following conditions - * apply to all code found in this distribution, be it the RC4, RSA, - * lhash, DES, etc., code; not just the SSL code. The SSL documentation - * included with this distribution is covered by the same copyright terms - * except that the holder is Tim Hudson (tjh@cryptsoft.com). - * - * Copyright remains Eric Young's, and as such any Copyright notices in - * the code are not to be removed. - * If this package is used in a product, Eric Young should be given attribution - * as the author of the parts of the library used. - * This can be in the form of a textual message at program startup or - * in documentation (online or textual) provided with the package. - * - * Redistribution and use in source and binary forms, with or without - * modification, are permitted provided that the following conditions - * are met: - * 1. Redistributions of source code must retain the copyright - * notice, this list of conditions and the following disclaimer. - * 2. Redistributions in binary form must reproduce the above copyright - * notice, this list of conditions and the following disclaimer in the - * documentation and/or other materials provided with the distribution. - * 3. All advertising materials mentioning features or use of this software - * must display the following acknowledgement: - * "This product includes cryptographic software written by - * Eric Young (eay@cryptsoft.com)" - * The word 'cryptographic' can be left out if the rouines from the library - * being used are not cryptographic related :-). - * 4. If you include any Windows specific code (or a derivative thereof) from - * the apps directory (application code) you must include an acknowledgement: - * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" - * - * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND - * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE - * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE - * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE - * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL - * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS - * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) - * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT - * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY - * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF - * SUCH DAMAGE. - * - * The licence and distribution terms for any publically available version or - * derivative of this code cannot be changed. i.e. this code cannot simply be - * copied and put under another distribution licence - * [including the GNU Public Licence.] - */ -/* ==================================================================== - * Copyright (c) 1998-2007 The OpenSSL Project. All rights reserved. - * - * Redistribution and use in source and binary forms, with or without - * modification, are permitted provided that the following conditions - * are met: - * - * 1. Redistributions of source code must retain the above copyright - * notice, this list of conditions and the following disclaimer. - * - * 2. Redistributions in binary form must reproduce the above copyright - * notice, this list of conditions and the following disclaimer in - * the documentation and/or other materials provided with the - * distribution. - * - * 3. All advertising materials mentioning features or use of this - * software must display the following acknowledgment: - * "This product includes software developed by the OpenSSL Project - * for use in the OpenSSL Toolkit. (http://www.openssl.org/)" - * - * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to - * endorse or promote products derived from this software without - * prior written permission. For written permission, please contact - * openssl-core@openssl.org. - * - * 5. Products derived from this software may not be called "OpenSSL" - * nor may "OpenSSL" appear in their names without prior written - * permission of the OpenSSL Project. - * - * 6. Redistributions of any form whatsoever must retain the following - * acknowledgment: - * "This product includes software developed by the OpenSSL Project - * for use in the OpenSSL Toolkit (http://www.openssl.org/)" - * - * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY - * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE - * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR - * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR - * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, - * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT - * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; - * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) - * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, - * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) - * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED - * OF THE POSSIBILITY OF SUCH DAMAGE. - * ==================================================================== - * - * This product includes cryptographic software written by Eric Young - * (eay@cryptsoft.com). This product includes software written by Tim - * Hudson (tjh@cryptsoft.com). - * - */ -/* ==================================================================== - * Copyright 2002 Sun Microsystems, Inc. ALL RIGHTS RESERVED. - * ECC cipher suite support in OpenSSL originally developed by - * SUN MICROSYSTEMS, INC., and contributed to the OpenSSL project. - */ -/* ==================================================================== - * Copyright 2005 Nokia. All rights reserved. - * - * The portions of the attached software ("Contribution") is developed by - * Nokia Corporation and is licensed pursuant to the OpenSSL open source - * license. - * - * The Contribution, originally written by Mika Kousa and Pasi Eronen of - * Nokia Corporation, consists of the "PSK" (Pre-Shared Key) ciphersuites - * support (see RFC 4279) to OpenSSL. - * - * No patent licenses or other rights except those expressly stated in - * the OpenSSL open source license shall be deemed granted or received - * expressly, by implication, estoppel, or otherwise. - * - * No assurances are provided by Nokia that the Contribution does not - * infringe the patent or other intellectual property rights of any third - * party or that the license provides you with all the necessary rights - * to make use of the Contribution. - * - * THE SOFTWARE IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. IN - * ADDITION TO THE DISCLAIMERS INCLUDED IN THE LICENSE, NOKIA - * SPECIFICALLY DISCLAIMS ANY LIABILITY FOR CLAIMS BROUGHT BY YOU OR ANY - * OTHER ENTITY BASED ON INFRINGEMENT OF INTELLECTUAL PROPERTY RIGHTS OR - * OTHERWISE. - */ - -#ifndef HEADER_SSL_H -#define HEADER_SSL_H - -#include - -#ifndef OPENSSL_NO_COMP -#include -#endif -#ifndef OPENSSL_NO_BIO -#include -#endif -#ifndef OPENSSL_NO_DEPRECATED -#ifndef OPENSSL_NO_X509 -#include -#endif -#include -#include -#include -#endif -#include -#include - -#include -#include -#include - -#ifdef __cplusplus -extern "C" { -#endif - -/* SSLeay version number for ASN.1 encoding of the session information */ -/* Version 0 - initial version - * Version 1 - added the optional peer certificate - */ -#define SSL_SESSION_ASN1_VERSION 0x0001 - -/* text strings for the ciphers */ -#define SSL_TXT_NULL_WITH_MD5 SSL2_TXT_NULL_WITH_MD5 -#define SSL_TXT_RC4_128_WITH_MD5 SSL2_TXT_RC4_128_WITH_MD5 -#define SSL_TXT_RC4_128_EXPORT40_WITH_MD5 SSL2_TXT_RC4_128_EXPORT40_WITH_MD5 -#define SSL_TXT_RC2_128_CBC_WITH_MD5 SSL2_TXT_RC2_128_CBC_WITH_MD5 -#define SSL_TXT_RC2_128_CBC_EXPORT40_WITH_MD5 SSL2_TXT_RC2_128_CBC_EXPORT40_WITH_MD5 -#define SSL_TXT_IDEA_128_CBC_WITH_MD5 SSL2_TXT_IDEA_128_CBC_WITH_MD5 -#define SSL_TXT_DES_64_CBC_WITH_MD5 SSL2_TXT_DES_64_CBC_WITH_MD5 -#define SSL_TXT_DES_64_CBC_WITH_SHA SSL2_TXT_DES_64_CBC_WITH_SHA -#define SSL_TXT_DES_192_EDE3_CBC_WITH_MD5 SSL2_TXT_DES_192_EDE3_CBC_WITH_MD5 -#define SSL_TXT_DES_192_EDE3_CBC_WITH_SHA SSL2_TXT_DES_192_EDE3_CBC_WITH_SHA - -/* VRS Additional Kerberos5 entries - */ -#define SSL_TXT_KRB5_DES_64_CBC_SHA SSL3_TXT_KRB5_DES_64_CBC_SHA -#define SSL_TXT_KRB5_DES_192_CBC3_SHA SSL3_TXT_KRB5_DES_192_CBC3_SHA -#define SSL_TXT_KRB5_RC4_128_SHA SSL3_TXT_KRB5_RC4_128_SHA -#define SSL_TXT_KRB5_IDEA_128_CBC_SHA SSL3_TXT_KRB5_IDEA_128_CBC_SHA -#define SSL_TXT_KRB5_DES_64_CBC_MD5 SSL3_TXT_KRB5_DES_64_CBC_MD5 -#define SSL_TXT_KRB5_DES_192_CBC3_MD5 SSL3_TXT_KRB5_DES_192_CBC3_MD5 -#define SSL_TXT_KRB5_RC4_128_MD5 SSL3_TXT_KRB5_RC4_128_MD5 -#define SSL_TXT_KRB5_IDEA_128_CBC_MD5 SSL3_TXT_KRB5_IDEA_128_CBC_MD5 - -#define SSL_TXT_KRB5_DES_40_CBC_SHA SSL3_TXT_KRB5_DES_40_CBC_SHA -#define SSL_TXT_KRB5_RC2_40_CBC_SHA SSL3_TXT_KRB5_RC2_40_CBC_SHA -#define SSL_TXT_KRB5_RC4_40_SHA SSL3_TXT_KRB5_RC4_40_SHA -#define SSL_TXT_KRB5_DES_40_CBC_MD5 SSL3_TXT_KRB5_DES_40_CBC_MD5 -#define SSL_TXT_KRB5_RC2_40_CBC_MD5 SSL3_TXT_KRB5_RC2_40_CBC_MD5 -#define SSL_TXT_KRB5_RC4_40_MD5 SSL3_TXT_KRB5_RC4_40_MD5 - -#define SSL_TXT_KRB5_DES_40_CBC_SHA SSL3_TXT_KRB5_DES_40_CBC_SHA -#define SSL_TXT_KRB5_DES_40_CBC_MD5 SSL3_TXT_KRB5_DES_40_CBC_MD5 -#define SSL_TXT_KRB5_DES_64_CBC_SHA SSL3_TXT_KRB5_DES_64_CBC_SHA -#define SSL_TXT_KRB5_DES_64_CBC_MD5 SSL3_TXT_KRB5_DES_64_CBC_MD5 -#define SSL_TXT_KRB5_DES_192_CBC3_SHA SSL3_TXT_KRB5_DES_192_CBC3_SHA -#define SSL_TXT_KRB5_DES_192_CBC3_MD5 SSL3_TXT_KRB5_DES_192_CBC3_MD5 -#define SSL_MAX_KRB5_PRINCIPAL_LENGTH 256 - -#define SSL_MAX_SSL_SESSION_ID_LENGTH 32 -#define SSL_MAX_SID_CTX_LENGTH 32 - -#define SSL_MIN_RSA_MODULUS_LENGTH_IN_BYTES (512/8) -#define SSL_MAX_KEY_ARG_LENGTH 8 -#define SSL_MAX_MASTER_KEY_LENGTH 48 - - -/* These are used to specify which ciphers to use and not to use */ - -#define SSL_TXT_EXP40 "EXPORT40" -#define SSL_TXT_EXP56 "EXPORT56" -#define SSL_TXT_LOW "LOW" -#define SSL_TXT_MEDIUM "MEDIUM" -#define SSL_TXT_HIGH "HIGH" -#define SSL_TXT_FIPS "FIPS" - -#define SSL_TXT_kFZA "kFZA" /* unused! */ -#define SSL_TXT_aFZA "aFZA" /* unused! */ -#define SSL_TXT_eFZA "eFZA" /* unused! */ -#define SSL_TXT_FZA "FZA" /* unused! */ - -#define SSL_TXT_aNULL "aNULL" -#define SSL_TXT_eNULL "eNULL" -#define SSL_TXT_NULL "NULL" - -#define SSL_TXT_kRSA "kRSA" -#define SSL_TXT_kDHr "kDHr" /* no such ciphersuites supported! */ -#define SSL_TXT_kDHd "kDHd" /* no such ciphersuites supported! */ -#define SSL_TXT_kDH "kDH" /* no such ciphersuites supported! */ -#define SSL_TXT_kEDH "kEDH" -#define SSL_TXT_kKRB5 "kKRB5" -#define SSL_TXT_kECDHr "kECDHr" -#define SSL_TXT_kECDHe "kECDHe" -#define SSL_TXT_kECDH "kECDH" -#define SSL_TXT_kEECDH "kEECDH" -#define SSL_TXT_kPSK "kPSK" -#define SSL_TXT_kGOST "kGOST" -#define SSL_TXT_kSRP "kSRP" - -#define SSL_TXT_aRSA "aRSA" -#define SSL_TXT_aDSS "aDSS" -#define SSL_TXT_aDH "aDH" /* no such ciphersuites supported! */ -#define SSL_TXT_aECDH "aECDH" -#define SSL_TXT_aKRB5 "aKRB5" -#define SSL_TXT_aECDSA "aECDSA" -#define SSL_TXT_aPSK "aPSK" -#define SSL_TXT_aGOST94 "aGOST94" -#define SSL_TXT_aGOST01 "aGOST01" -#define SSL_TXT_aGOST "aGOST" - -#define SSL_TXT_DSS "DSS" -#define SSL_TXT_DH "DH" -#define SSL_TXT_EDH "EDH" /* same as "kEDH:-ADH" */ -#define SSL_TXT_ADH "ADH" -#define SSL_TXT_RSA "RSA" -#define SSL_TXT_ECDH "ECDH" -#define SSL_TXT_EECDH "EECDH" /* same as "kEECDH:-AECDH" */ -#define SSL_TXT_AECDH "AECDH" -#define SSL_TXT_ECDSA "ECDSA" -#define SSL_TXT_KRB5 "KRB5" -#define SSL_TXT_PSK "PSK" -#define SSL_TXT_SRP "SRP" - -#define SSL_TXT_DES "DES" -#define SSL_TXT_3DES "3DES" -#define SSL_TXT_RC4 "RC4" -#define SSL_TXT_RC2 "RC2" -#define SSL_TXT_IDEA "IDEA" -#define SSL_TXT_SEED "SEED" -#define SSL_TXT_AES128 "AES128" -#define SSL_TXT_AES256 "AES256" -#define SSL_TXT_AES "AES" -#define SSL_TXT_AES_GCM "AESGCM" -#define SSL_TXT_CAMELLIA128 "CAMELLIA128" -#define SSL_TXT_CAMELLIA256 "CAMELLIA256" -#define SSL_TXT_CAMELLIA "CAMELLIA" - -#define SSL_TXT_MD5 "MD5" -#define SSL_TXT_SHA1 "SHA1" -#define SSL_TXT_SHA "SHA" /* same as "SHA1" */ -#define SSL_TXT_GOST94 "GOST94" -#define SSL_TXT_GOST89MAC "GOST89MAC" -#define SSL_TXT_SHA256 "SHA256" -#define SSL_TXT_SHA384 "SHA384" - -#define SSL_TXT_SSLV2 "SSLv2" -#define SSL_TXT_SSLV3 "SSLv3" -#define SSL_TXT_TLSV1 "TLSv1" -#define SSL_TXT_TLSV1_1 "TLSv1.1" -#define SSL_TXT_TLSV1_2 "TLSv1.2" - -#define SSL_TXT_EXP "EXP" -#define SSL_TXT_EXPORT "EXPORT" - -#define SSL_TXT_ALL "ALL" - -/* - * COMPLEMENTOF* definitions. These identifiers are used to (de-select) - * ciphers normally not being used. - * Example: "RC4" will activate all ciphers using RC4 including ciphers - * without authentication, which would normally disabled by DEFAULT (due - * the "!ADH" being part of default). Therefore "RC4:!COMPLEMENTOFDEFAULT" - * will make sure that it is also disabled in the specific selection. - * COMPLEMENTOF* identifiers are portable between version, as adjustments - * to the default cipher setup will also be included here. - * - * COMPLEMENTOFDEFAULT does not experience the same special treatment that - * DEFAULT gets, as only selection is being done and no sorting as needed - * for DEFAULT. - */ -#define SSL_TXT_CMPALL "COMPLEMENTOFALL" -#define SSL_TXT_CMPDEF "COMPLEMENTOFDEFAULT" - -/* The following cipher list is used by default. - * It also is substituted when an application-defined cipher list string - * starts with 'DEFAULT'. */ -#define SSL_DEFAULT_CIPHER_LIST "ALL:!aNULL:!eNULL:!SSLv2" -/* As of OpenSSL 1.0.0, ssl_create_cipher_list() in ssl/ssl_ciph.c always - * starts with a reasonable order, and all we have to do for DEFAULT is - * throwing out anonymous and unencrypted ciphersuites! - * (The latter are not actually enabled by ALL, but "ALL:RSA" would enable - * some of them.) - */ - -/* Used in SSL_set_shutdown()/SSL_get_shutdown(); */ -#define SSL_SENT_SHUTDOWN 1 -#define SSL_RECEIVED_SHUTDOWN 2 - -#ifdef __cplusplus -} -#endif - -#ifdef __cplusplus -extern "C" { -#endif - -#if (defined(OPENSSL_NO_RSA) || defined(OPENSSL_NO_MD5)) && !defined(OPENSSL_NO_SSL2) -#define OPENSSL_NO_SSL2 -#endif - -#define SSL_FILETYPE_ASN1 X509_FILETYPE_ASN1 -#define SSL_FILETYPE_PEM X509_FILETYPE_PEM - -/* This is needed to stop compilers complaining about the - * 'struct ssl_st *' function parameters used to prototype callbacks - * in SSL_CTX. */ -typedef struct ssl_st *ssl_crock_st; -typedef struct tls_session_ticket_ext_st TLS_SESSION_TICKET_EXT; -typedef struct ssl_method_st SSL_METHOD; -typedef struct ssl_cipher_st SSL_CIPHER; -typedef struct ssl_session_st SSL_SESSION; - -DECLARE_STACK_OF(SSL_CIPHER) - -/* SRTP protection profiles for use with the use_srtp extension (RFC 5764)*/ -typedef struct srtp_protection_profile_st - { - const char *name; - unsigned long id; - } SRTP_PROTECTION_PROFILE; - -DECLARE_STACK_OF(SRTP_PROTECTION_PROFILE) - -typedef int (*tls_session_ticket_ext_cb_fn)(SSL *s, const unsigned char *data, int len, void *arg); -typedef int (*tls_session_secret_cb_fn)(SSL *s, void *secret, int *secret_len, STACK_OF(SSL_CIPHER) *peer_ciphers, SSL_CIPHER **cipher, void *arg); - - -#ifndef OPENSSL_NO_SSL_INTERN - -/* used to hold info on the particular ciphers used */ -struct ssl_cipher_st - { - int valid; - const char *name; /* text name */ - unsigned long id; /* id, 4 bytes, first is version */ - - /* changed in 0.9.9: these four used to be portions of a single value 'algorithms' */ - unsigned long algorithm_mkey; /* key exchange algorithm */ - unsigned long algorithm_auth; /* server authentication */ - unsigned long algorithm_enc; /* symmetric encryption */ - unsigned long algorithm_mac; /* symmetric authentication */ - unsigned long algorithm_ssl; /* (major) protocol version */ - - unsigned long algo_strength; /* strength and export flags */ - unsigned long algorithm2; /* Extra flags */ - int strength_bits; /* Number of bits really used */ - int alg_bits; /* Number of bits for algorithm */ - }; - - -/* Used to hold functions for SSLv2 or SSLv3/TLSv1 functions */ -struct ssl_method_st - { - int version; - int (*ssl_new)(SSL *s); - void (*ssl_clear)(SSL *s); - void (*ssl_free)(SSL *s); - int (*ssl_accept)(SSL *s); - int (*ssl_connect)(SSL *s); - int (*ssl_read)(SSL *s,void *buf,int len); - int (*ssl_peek)(SSL *s,void *buf,int len); - int (*ssl_write)(SSL *s,const void *buf,int len); - int (*ssl_shutdown)(SSL *s); - int (*ssl_renegotiate)(SSL *s); - int (*ssl_renegotiate_check)(SSL *s); - long (*ssl_get_message)(SSL *s, int st1, int stn, int mt, long - max, int *ok); - int (*ssl_read_bytes)(SSL *s, int type, unsigned char *buf, int len, - int peek); - int (*ssl_write_bytes)(SSL *s, int type, const void *buf_, int len); - int (*ssl_dispatch_alert)(SSL *s); - long (*ssl_ctrl)(SSL *s,int cmd,long larg,void *parg); - long (*ssl_ctx_ctrl)(SSL_CTX *ctx,int cmd,long larg,void *parg); - const SSL_CIPHER *(*get_cipher_by_char)(const unsigned char *ptr); - int (*put_cipher_by_char)(const SSL_CIPHER *cipher,unsigned char *ptr); - int (*ssl_pending)(const SSL *s); - int (*num_ciphers)(void); - const SSL_CIPHER *(*get_cipher)(unsigned ncipher); - const struct ssl_method_st *(*get_ssl_method)(int version); - long (*get_timeout)(void); - struct ssl3_enc_method *ssl3_enc; /* Extra SSLv3/TLS stuff */ - int (*ssl_version)(void); - long (*ssl_callback_ctrl)(SSL *s, int cb_id, void (*fp)(void)); - long (*ssl_ctx_callback_ctrl)(SSL_CTX *s, int cb_id, void (*fp)(void)); - }; - -/* Lets make this into an ASN.1 type structure as follows - * SSL_SESSION_ID ::= SEQUENCE { - * version INTEGER, -- structure version number - * SSLversion INTEGER, -- SSL version number - * Cipher OCTET STRING, -- the 3 byte cipher ID - * Session_ID OCTET STRING, -- the Session ID - * Master_key OCTET STRING, -- the master key - * KRB5_principal OCTET STRING -- optional Kerberos principal - * Key_Arg [ 0 ] IMPLICIT OCTET STRING, -- the optional Key argument - * Time [ 1 ] EXPLICIT INTEGER, -- optional Start Time - * Timeout [ 2 ] EXPLICIT INTEGER, -- optional Timeout ins seconds - * Peer [ 3 ] EXPLICIT X509, -- optional Peer Certificate - * Session_ID_context [ 4 ] EXPLICIT OCTET STRING, -- the Session ID context - * Verify_result [ 5 ] EXPLICIT INTEGER, -- X509_V_... code for `Peer' - * HostName [ 6 ] EXPLICIT OCTET STRING, -- optional HostName from servername TLS extension - * PSK_identity_hint [ 7 ] EXPLICIT OCTET STRING, -- optional PSK identity hint - * PSK_identity [ 8 ] EXPLICIT OCTET STRING, -- optional PSK identity - * Ticket_lifetime_hint [9] EXPLICIT INTEGER, -- server's lifetime hint for session ticket - * Ticket [10] EXPLICIT OCTET STRING, -- session ticket (clients only) - * Compression_meth [11] EXPLICIT OCTET STRING, -- optional compression method - * SRP_username [ 12 ] EXPLICIT OCTET STRING -- optional SRP username - * } - * Look in ssl/ssl_asn1.c for more details - * I'm using EXPLICIT tags so I can read the damn things using asn1parse :-). - */ -struct ssl_session_st - { - int ssl_version; /* what ssl version session info is - * being kept in here? */ - - /* only really used in SSLv2 */ - unsigned int key_arg_length; - unsigned char key_arg[SSL_MAX_KEY_ARG_LENGTH]; - int master_key_length; - unsigned char master_key[SSL_MAX_MASTER_KEY_LENGTH]; - /* session_id - valid? */ - unsigned int session_id_length; - unsigned char session_id[SSL_MAX_SSL_SESSION_ID_LENGTH]; - /* this is used to determine whether the session is being reused in - * the appropriate context. It is up to the application to set this, - * via SSL_new */ - unsigned int sid_ctx_length; - unsigned char sid_ctx[SSL_MAX_SID_CTX_LENGTH]; - -#ifndef OPENSSL_NO_KRB5 - unsigned int krb5_client_princ_len; - unsigned char krb5_client_princ[SSL_MAX_KRB5_PRINCIPAL_LENGTH]; -#endif /* OPENSSL_NO_KRB5 */ -#ifndef OPENSSL_NO_PSK - char *psk_identity_hint; - char *psk_identity; -#endif - /* Used to indicate that session resumption is not allowed. - * Applications can also set this bit for a new session via - * not_resumable_session_cb to disable session caching and tickets. */ - int not_resumable; - - /* The cert is the certificate used to establish this connection */ - struct sess_cert_st /* SESS_CERT */ *sess_cert; - - /* This is the cert for the other end. - * On clients, it will be the same as sess_cert->peer_key->x509 - * (the latter is not enough as sess_cert is not retained - * in the external representation of sessions, see ssl_asn1.c). */ - X509 *peer; - /* when app_verify_callback accepts a session where the peer's certificate - * is not ok, we must remember the error for session reuse: */ - long verify_result; /* only for servers */ - - int references; - long timeout; - long time; - - unsigned int compress_meth; /* Need to lookup the method */ - - const SSL_CIPHER *cipher; - unsigned long cipher_id; /* when ASN.1 loaded, this - * needs to be used to load - * the 'cipher' structure */ - - STACK_OF(SSL_CIPHER) *ciphers; /* shared ciphers? */ - - CRYPTO_EX_DATA ex_data; /* application specific data */ - - /* These are used to make removal of session-ids more - * efficient and to implement a maximum cache size. */ - struct ssl_session_st *prev,*next; -#ifndef OPENSSL_NO_TLSEXT - char *tlsext_hostname; -#ifndef OPENSSL_NO_EC - size_t tlsext_ecpointformatlist_length; - unsigned char *tlsext_ecpointformatlist; /* peer's list */ - size_t tlsext_ellipticcurvelist_length; - unsigned char *tlsext_ellipticcurvelist; /* peer's list */ -#endif /* OPENSSL_NO_EC */ - /* RFC4507 info */ - unsigned char *tlsext_tick; /* Session ticket */ - size_t tlsext_ticklen; /* Session ticket length */ - long tlsext_tick_lifetime_hint; /* Session lifetime hint in seconds */ -#endif -#ifndef OPENSSL_NO_SRP - char *srp_username; -#endif - }; - -#endif - -#define SSL_OP_MICROSOFT_SESS_ID_BUG 0x00000001L -#define SSL_OP_NETSCAPE_CHALLENGE_BUG 0x00000002L -/* Allow initial connection to servers that don't support RI */ -#define SSL_OP_LEGACY_SERVER_CONNECT 0x00000004L -#define SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG 0x00000008L -#define SSL_OP_TLSEXT_PADDING 0x00000010L -#define SSL_OP_MICROSOFT_BIG_SSLV3_BUFFER 0x00000020L -#define SSL_OP_SAFARI_ECDHE_ECDSA_BUG 0x00000040L -#define SSL_OP_SSLEAY_080_CLIENT_DH_BUG 0x00000080L -#define SSL_OP_TLS_D5_BUG 0x00000100L -#define SSL_OP_TLS_BLOCK_PADDING_BUG 0x00000200L - -/* Hasn't done anything since OpenSSL 0.9.7h, retained for compatibility */ -#define SSL_OP_MSIE_SSLV2_RSA_PADDING 0x0 -/* Refers to ancient SSLREF and SSLv2, retained for compatibility */ -#define SSL_OP_SSLREF2_REUSE_CERT_TYPE_BUG 0x0 - -/* Disable SSL 3.0/TLS 1.0 CBC vulnerability workaround that was added - * in OpenSSL 0.9.6d. Usually (depending on the application protocol) - * the workaround is not needed. Unfortunately some broken SSL/TLS - * implementations cannot handle it at all, which is why we include - * it in SSL_OP_ALL. */ -#define SSL_OP_DONT_INSERT_EMPTY_FRAGMENTS 0x00000800L /* added in 0.9.6e */ - -/* SSL_OP_ALL: various bug workarounds that should be rather harmless. - * This used to be 0x000FFFFFL before 0.9.7. */ -#define SSL_OP_ALL 0x80000BFFL - -/* DTLS options */ -#define SSL_OP_NO_QUERY_MTU 0x00001000L -/* Turn on Cookie Exchange (on relevant for servers) */ -#define SSL_OP_COOKIE_EXCHANGE 0x00002000L -/* Don't use RFC4507 ticket extension */ -#define SSL_OP_NO_TICKET 0x00004000L -/* Use Cisco's "speshul" version of DTLS_BAD_VER (as client) */ -#define SSL_OP_CISCO_ANYCONNECT 0x00008000L - -/* As server, disallow session resumption on renegotiation */ -#define SSL_OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION 0x00010000L -/* Don't use compression even if supported */ -#define SSL_OP_NO_COMPRESSION 0x00020000L -/* Permit unsafe legacy renegotiation */ -#define SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION 0x00040000L -/* If set, always create a new key when using tmp_ecdh parameters */ -#define SSL_OP_SINGLE_ECDH_USE 0x00080000L -/* If set, always create a new key when using tmp_dh parameters */ -#define SSL_OP_SINGLE_DH_USE 0x00100000L -/* Set to always use the tmp_rsa key when doing RSA operations, - * even when this violates protocol specs */ -#define SSL_OP_EPHEMERAL_RSA 0x00200000L -/* Set on servers to choose the cipher according to the server's - * preferences */ -#define SSL_OP_CIPHER_SERVER_PREFERENCE 0x00400000L -/* If set, a server will allow a client to issue a SSLv3.0 version number - * as latest version supported in the premaster secret, even when TLSv1.0 - * (version 3.1) was announced in the client hello. Normally this is - * forbidden to prevent version rollback attacks. */ -#define SSL_OP_TLS_ROLLBACK_BUG 0x00800000L - -#define SSL_OP_NO_SSLv2 0x01000000L -#define SSL_OP_NO_SSLv3 0x02000000L -#define SSL_OP_NO_TLSv1 0x04000000L -#define SSL_OP_NO_TLSv1_2 0x08000000L -#define SSL_OP_NO_TLSv1_1 0x10000000L - -/* These next two were never actually used for anything since SSLeay - * zap so we have some more flags. - */ -/* The next flag deliberately changes the ciphertest, this is a check - * for the PKCS#1 attack */ -#define SSL_OP_PKCS1_CHECK_1 0x0 -#define SSL_OP_PKCS1_CHECK_2 0x0 - -#define SSL_OP_NETSCAPE_CA_DN_BUG 0x20000000L -#define SSL_OP_NETSCAPE_DEMO_CIPHER_CHANGE_BUG 0x40000000L -/* Make server add server-hello extension from early version of - * cryptopro draft, when GOST ciphersuite is negotiated. - * Required for interoperability with CryptoPro CSP 3.x - */ -#define SSL_OP_CRYPTOPRO_TLSEXT_BUG 0x80000000L - -/* Allow SSL_write(..., n) to return r with 0 < r < n (i.e. report success - * when just a single record has been written): */ -#define SSL_MODE_ENABLE_PARTIAL_WRITE 0x00000001L -/* Make it possible to retry SSL_write() with changed buffer location - * (buffer contents must stay the same!); this is not the default to avoid - * the misconception that non-blocking SSL_write() behaves like - * non-blocking write(): */ -#define SSL_MODE_ACCEPT_MOVING_WRITE_BUFFER 0x00000002L -/* Never bother the application with retries if the transport - * is blocking: */ -#define SSL_MODE_AUTO_RETRY 0x00000004L -/* Don't attempt to automatically build certificate chain */ -#define SSL_MODE_NO_AUTO_CHAIN 0x00000008L -/* Save RAM by releasing read and write buffers when they're empty. (SSL3 and - * TLS only.) "Released" buffers are put onto a free-list in the context - * or just freed (depending on the context's setting for freelist_max_len). */ -#define SSL_MODE_RELEASE_BUFFERS 0x00000010L -/* Send the current time in the Random fields of the ClientHello and - * ServerHello records for compatibility with hypothetical implementations - * that require it. - */ -#define SSL_MODE_SEND_CLIENTHELLO_TIME 0x00000020L -#define SSL_MODE_SEND_SERVERHELLO_TIME 0x00000040L - -/* Note: SSL[_CTX]_set_{options,mode} use |= op on the previous value, - * they cannot be used to clear bits. */ - -#define SSL_CTX_set_options(ctx,op) \ - SSL_CTX_ctrl((ctx),SSL_CTRL_OPTIONS,(op),NULL) -#define SSL_CTX_clear_options(ctx,op) \ - SSL_CTX_ctrl((ctx),SSL_CTRL_CLEAR_OPTIONS,(op),NULL) -#define SSL_CTX_get_options(ctx) \ - SSL_CTX_ctrl((ctx),SSL_CTRL_OPTIONS,0,NULL) -#define SSL_set_options(ssl,op) \ - SSL_ctrl((ssl),SSL_CTRL_OPTIONS,(op),NULL) -#define SSL_clear_options(ssl,op) \ - SSL_ctrl((ssl),SSL_CTRL_CLEAR_OPTIONS,(op),NULL) -#define SSL_get_options(ssl) \ - SSL_ctrl((ssl),SSL_CTRL_OPTIONS,0,NULL) - -#define SSL_CTX_set_mode(ctx,op) \ - SSL_CTX_ctrl((ctx),SSL_CTRL_MODE,(op),NULL) -#define SSL_CTX_clear_mode(ctx,op) \ - SSL_CTX_ctrl((ctx),SSL_CTRL_CLEAR_MODE,(op),NULL) -#define SSL_CTX_get_mode(ctx) \ - SSL_CTX_ctrl((ctx),SSL_CTRL_MODE,0,NULL) -#define SSL_clear_mode(ssl,op) \ - SSL_ctrl((ssl),SSL_CTRL_CLEAR_MODE,(op),NULL) -#define SSL_set_mode(ssl,op) \ - SSL_ctrl((ssl),SSL_CTRL_MODE,(op),NULL) -#define SSL_get_mode(ssl) \ - SSL_ctrl((ssl),SSL_CTRL_MODE,0,NULL) -#define SSL_set_mtu(ssl, mtu) \ - SSL_ctrl((ssl),SSL_CTRL_SET_MTU,(mtu),NULL) - -#define SSL_get_secure_renegotiation_support(ssl) \ - SSL_ctrl((ssl), SSL_CTRL_GET_RI_SUPPORT, 0, NULL) - -#ifndef OPENSSL_NO_HEARTBEATS -#define SSL_heartbeat(ssl) \ - SSL_ctrl((ssl),SSL_CTRL_TLS_EXT_SEND_HEARTBEAT,0,NULL) -#endif - -void SSL_CTX_set_msg_callback(SSL_CTX *ctx, void (*cb)(int write_p, int version, int content_type, const void *buf, size_t len, SSL *ssl, void *arg)); -void SSL_set_msg_callback(SSL *ssl, void (*cb)(int write_p, int version, int content_type, const void *buf, size_t len, SSL *ssl, void *arg)); -#define SSL_CTX_set_msg_callback_arg(ctx, arg) SSL_CTX_ctrl((ctx), SSL_CTRL_SET_MSG_CALLBACK_ARG, 0, (arg)) -#define SSL_set_msg_callback_arg(ssl, arg) SSL_ctrl((ssl), SSL_CTRL_SET_MSG_CALLBACK_ARG, 0, (arg)) - -#ifndef OPENSSL_NO_SRP - -#ifndef OPENSSL_NO_SSL_INTERN - -typedef struct srp_ctx_st - { - /* param for all the callbacks */ - void *SRP_cb_arg; - /* set client Hello login callback */ - int (*TLS_ext_srp_username_callback)(SSL *, int *, void *); - /* set SRP N/g param callback for verification */ - int (*SRP_verify_param_callback)(SSL *, void *); - /* set SRP client passwd callback */ - char *(*SRP_give_srp_client_pwd_callback)(SSL *, void *); - - char *login; - BIGNUM *N,*g,*s,*B,*A; - BIGNUM *a,*b,*v; - char *info; - int strength; - - unsigned long srp_Mask; - } SRP_CTX; - -#endif - -/* see tls_srp.c */ -int SSL_SRP_CTX_init(SSL *s); -int SSL_CTX_SRP_CTX_init(SSL_CTX *ctx); -int SSL_SRP_CTX_free(SSL *ctx); -int SSL_CTX_SRP_CTX_free(SSL_CTX *ctx); -int SSL_srp_server_param_with_username(SSL *s, int *ad); -int SRP_generate_server_master_secret(SSL *s,unsigned char *master_key); -int SRP_Calc_A_param(SSL *s); -int SRP_generate_client_master_secret(SSL *s,unsigned char *master_key); - -#endif - -#if defined(OPENSSL_SYS_MSDOS) && !defined(OPENSSL_SYS_WIN32) -#define SSL_MAX_CERT_LIST_DEFAULT 1024*30 /* 30k max cert list :-) */ -#else -#define SSL_MAX_CERT_LIST_DEFAULT 1024*100 /* 100k max cert list :-) */ -#endif - -#define SSL_SESSION_CACHE_MAX_SIZE_DEFAULT (1024*20) - -/* This callback type is used inside SSL_CTX, SSL, and in the functions that set - * them. It is used to override the generation of SSL/TLS session IDs in a - * server. Return value should be zero on an error, non-zero to proceed. Also, - * callbacks should themselves check if the id they generate is unique otherwise - * the SSL handshake will fail with an error - callbacks can do this using the - * 'ssl' value they're passed by; - * SSL_has_matching_session_id(ssl, id, *id_len) - * The length value passed in is set at the maximum size the session ID can be. - * In SSLv2 this is 16 bytes, whereas SSLv3/TLSv1 it is 32 bytes. The callback - * can alter this length to be less if desired, but under SSLv2 session IDs are - * supposed to be fixed at 16 bytes so the id will be padded after the callback - * returns in this case. It is also an error for the callback to set the size to - * zero. */ -typedef int (*GEN_SESSION_CB)(const SSL *ssl, unsigned char *id, - unsigned int *id_len); - -typedef struct ssl_comp_st SSL_COMP; - -#ifndef OPENSSL_NO_SSL_INTERN - -struct ssl_comp_st - { - int id; - const char *name; -#ifndef OPENSSL_NO_COMP - COMP_METHOD *method; -#else - char *method; -#endif - }; - -DECLARE_STACK_OF(SSL_COMP) -DECLARE_LHASH_OF(SSL_SESSION); - -struct ssl_ctx_st - { - const SSL_METHOD *method; - - STACK_OF(SSL_CIPHER) *cipher_list; - /* same as above but sorted for lookup */ - STACK_OF(SSL_CIPHER) *cipher_list_by_id; - - struct x509_store_st /* X509_STORE */ *cert_store; - LHASH_OF(SSL_SESSION) *sessions; - /* Most session-ids that will be cached, default is - * SSL_SESSION_CACHE_MAX_SIZE_DEFAULT. 0 is unlimited. */ - unsigned long session_cache_size; - struct ssl_session_st *session_cache_head; - struct ssl_session_st *session_cache_tail; - - /* This can have one of 2 values, ored together, - * SSL_SESS_CACHE_CLIENT, - * SSL_SESS_CACHE_SERVER, - * Default is SSL_SESSION_CACHE_SERVER, which means only - * SSL_accept which cache SSL_SESSIONS. */ - int session_cache_mode; - - /* If timeout is not 0, it is the default timeout value set - * when SSL_new() is called. This has been put in to make - * life easier to set things up */ - long session_timeout; - - /* If this callback is not null, it will be called each - * time a session id is added to the cache. If this function - * returns 1, it means that the callback will do a - * SSL_SESSION_free() when it has finished using it. Otherwise, - * on 0, it means the callback has finished with it. - * If remove_session_cb is not null, it will be called when - * a session-id is removed from the cache. After the call, - * OpenSSL will SSL_SESSION_free() it. */ - int (*new_session_cb)(struct ssl_st *ssl,SSL_SESSION *sess); - void (*remove_session_cb)(struct ssl_ctx_st *ctx,SSL_SESSION *sess); - SSL_SESSION *(*get_session_cb)(struct ssl_st *ssl, - unsigned char *data,int len,int *copy); - - struct - { - int sess_connect; /* SSL new conn - started */ - int sess_connect_renegotiate;/* SSL reneg - requested */ - int sess_connect_good; /* SSL new conne/reneg - finished */ - int sess_accept; /* SSL new accept - started */ - int sess_accept_renegotiate;/* SSL reneg - requested */ - int sess_accept_good; /* SSL accept/reneg - finished */ - int sess_miss; /* session lookup misses */ - int sess_timeout; /* reuse attempt on timeouted session */ - int sess_cache_full; /* session removed due to full cache */ - int sess_hit; /* session reuse actually done */ - int sess_cb_hit; /* session-id that was not - * in the cache was - * passed back via the callback. This - * indicates that the application is - * supplying session-id's from other - * processes - spooky :-) */ - } stats; - - int references; - - /* if defined, these override the X509_verify_cert() calls */ - int (*app_verify_callback)(X509_STORE_CTX *, void *); - void *app_verify_arg; - /* before OpenSSL 0.9.7, 'app_verify_arg' was ignored - * ('app_verify_callback' was called with just one argument) */ - - /* Default password callback. */ - pem_password_cb *default_passwd_callback; - - /* Default password callback user data. */ - void *default_passwd_callback_userdata; - - /* get client cert callback */ - int (*client_cert_cb)(SSL *ssl, X509 **x509, EVP_PKEY **pkey); - - /* cookie generate callback */ - int (*app_gen_cookie_cb)(SSL *ssl, unsigned char *cookie, - unsigned int *cookie_len); - - /* verify cookie callback */ - int (*app_verify_cookie_cb)(SSL *ssl, unsigned char *cookie, - unsigned int cookie_len); - - CRYPTO_EX_DATA ex_data; - - const EVP_MD *rsa_md5;/* For SSLv2 - name is 'ssl2-md5' */ - const EVP_MD *md5; /* For SSLv3/TLSv1 'ssl3-md5' */ - const EVP_MD *sha1; /* For SSLv3/TLSv1 'ssl3->sha1' */ - - STACK_OF(X509) *extra_certs; - STACK_OF(SSL_COMP) *comp_methods; /* stack of SSL_COMP, SSLv3/TLSv1 */ - - - /* Default values used when no per-SSL value is defined follow */ - - void (*info_callback)(const SSL *ssl,int type,int val); /* used if SSL's info_callback is NULL */ - - /* what we put in client cert requests */ - STACK_OF(X509_NAME) *client_CA; - - - /* Default values to use in SSL structures follow (these are copied by SSL_new) */ - - unsigned long options; - unsigned long mode; - long max_cert_list; - - struct cert_st /* CERT */ *cert; - int read_ahead; - - /* callback that allows applications to peek at protocol messages */ - void (*msg_callback)(int write_p, int version, int content_type, const void *buf, size_t len, SSL *ssl, void *arg); - void *msg_callback_arg; - - int verify_mode; - unsigned int sid_ctx_length; - unsigned char sid_ctx[SSL_MAX_SID_CTX_LENGTH]; - int (*default_verify_callback)(int ok,X509_STORE_CTX *ctx); /* called 'verify_callback' in the SSL */ - - /* Default generate session ID callback. */ - GEN_SESSION_CB generate_session_id; - - X509_VERIFY_PARAM *param; - -#if 0 - int purpose; /* Purpose setting */ - int trust; /* Trust setting */ -#endif - - int quiet_shutdown; - - /* Maximum amount of data to send in one fragment. - * actual record size can be more than this due to - * padding and MAC overheads. - */ - unsigned int max_send_fragment; - -#ifndef OPENSSL_NO_ENGINE - /* Engine to pass requests for client certs to - */ - ENGINE *client_cert_engine; -#endif - -#ifndef OPENSSL_NO_TLSEXT - /* TLS extensions servername callback */ - int (*tlsext_servername_callback)(SSL*, int *, void *); - void *tlsext_servername_arg; - /* RFC 4507 session ticket keys */ - unsigned char tlsext_tick_key_name[16]; - unsigned char tlsext_tick_hmac_key[16]; - unsigned char tlsext_tick_aes_key[16]; - /* Callback to support customisation of ticket key setting */ - int (*tlsext_ticket_key_cb)(SSL *ssl, - unsigned char *name, unsigned char *iv, - EVP_CIPHER_CTX *ectx, - HMAC_CTX *hctx, int enc); - - /* certificate status request info */ - /* Callback for status request */ - int (*tlsext_status_cb)(SSL *ssl, void *arg); - void *tlsext_status_arg; - - /* draft-rescorla-tls-opaque-prf-input-00.txt information */ - int (*tlsext_opaque_prf_input_callback)(SSL *, void *peerinput, size_t len, void *arg); - void *tlsext_opaque_prf_input_callback_arg; -#endif - -#ifndef OPENSSL_NO_PSK - char *psk_identity_hint; - unsigned int (*psk_client_callback)(SSL *ssl, const char *hint, char *identity, - unsigned int max_identity_len, unsigned char *psk, - unsigned int max_psk_len); - unsigned int (*psk_server_callback)(SSL *ssl, const char *identity, - unsigned char *psk, unsigned int max_psk_len); -#endif - -#ifndef OPENSSL_NO_BUF_FREELISTS -#define SSL_MAX_BUF_FREELIST_LEN_DEFAULT 32 - unsigned int freelist_max_len; - struct ssl3_buf_freelist_st *wbuf_freelist; - struct ssl3_buf_freelist_st *rbuf_freelist; -#endif -#ifndef OPENSSL_NO_SRP - SRP_CTX srp_ctx; /* ctx for SRP authentication */ -#endif - -#ifndef OPENSSL_NO_TLSEXT - -# ifndef OPENSSL_NO_NEXTPROTONEG - /* Next protocol negotiation information */ - /* (for experimental NPN extension). */ - - /* For a server, this contains a callback function by which the set of - * advertised protocols can be provided. */ - int (*next_protos_advertised_cb)(SSL *s, const unsigned char **buf, - unsigned int *len, void *arg); - void *next_protos_advertised_cb_arg; - /* For a client, this contains a callback function that selects the - * next protocol from the list provided by the server. */ - int (*next_proto_select_cb)(SSL *s, unsigned char **out, - unsigned char *outlen, - const unsigned char *in, - unsigned int inlen, - void *arg); - void *next_proto_select_cb_arg; -# endif - /* SRTP profiles we are willing to do from RFC 5764 */ - STACK_OF(SRTP_PROTECTION_PROFILE) *srtp_profiles; -#endif - }; - -#endif - -#define SSL_SESS_CACHE_OFF 0x0000 -#define SSL_SESS_CACHE_CLIENT 0x0001 -#define SSL_SESS_CACHE_SERVER 0x0002 -#define SSL_SESS_CACHE_BOTH (SSL_SESS_CACHE_CLIENT|SSL_SESS_CACHE_SERVER) -#define SSL_SESS_CACHE_NO_AUTO_CLEAR 0x0080 -/* enough comments already ... see SSL_CTX_set_session_cache_mode(3) */ -#define SSL_SESS_CACHE_NO_INTERNAL_LOOKUP 0x0100 -#define SSL_SESS_CACHE_NO_INTERNAL_STORE 0x0200 -#define SSL_SESS_CACHE_NO_INTERNAL \ - (SSL_SESS_CACHE_NO_INTERNAL_LOOKUP|SSL_SESS_CACHE_NO_INTERNAL_STORE) - -LHASH_OF(SSL_SESSION) *SSL_CTX_sessions(SSL_CTX *ctx); -#define SSL_CTX_sess_number(ctx) \ - SSL_CTX_ctrl(ctx,SSL_CTRL_SESS_NUMBER,0,NULL) -#define SSL_CTX_sess_connect(ctx) \ - SSL_CTX_ctrl(ctx,SSL_CTRL_SESS_CONNECT,0,NULL) -#define SSL_CTX_sess_connect_good(ctx) \ - SSL_CTX_ctrl(ctx,SSL_CTRL_SESS_CONNECT_GOOD,0,NULL) -#define SSL_CTX_sess_connect_renegotiate(ctx) \ - SSL_CTX_ctrl(ctx,SSL_CTRL_SESS_CONNECT_RENEGOTIATE,0,NULL) -#define SSL_CTX_sess_accept(ctx) \ - SSL_CTX_ctrl(ctx,SSL_CTRL_SESS_ACCEPT,0,NULL) -#define SSL_CTX_sess_accept_renegotiate(ctx) \ - SSL_CTX_ctrl(ctx,SSL_CTRL_SESS_ACCEPT_RENEGOTIATE,0,NULL) -#define SSL_CTX_sess_accept_good(ctx) \ - SSL_CTX_ctrl(ctx,SSL_CTRL_SESS_ACCEPT_GOOD,0,NULL) -#define SSL_CTX_sess_hits(ctx) \ - SSL_CTX_ctrl(ctx,SSL_CTRL_SESS_HIT,0,NULL) -#define SSL_CTX_sess_cb_hits(ctx) \ - SSL_CTX_ctrl(ctx,SSL_CTRL_SESS_CB_HIT,0,NULL) -#define SSL_CTX_sess_misses(ctx) \ - SSL_CTX_ctrl(ctx,SSL_CTRL_SESS_MISSES,0,NULL) -#define SSL_CTX_sess_timeouts(ctx) \ - SSL_CTX_ctrl(ctx,SSL_CTRL_SESS_TIMEOUTS,0,NULL) -#define SSL_CTX_sess_cache_full(ctx) \ - SSL_CTX_ctrl(ctx,SSL_CTRL_SESS_CACHE_FULL,0,NULL) - -void SSL_CTX_sess_set_new_cb(SSL_CTX *ctx, int (*new_session_cb)(struct ssl_st *ssl,SSL_SESSION *sess)); -int (*SSL_CTX_sess_get_new_cb(SSL_CTX *ctx))(struct ssl_st *ssl, SSL_SESSION *sess); -void SSL_CTX_sess_set_remove_cb(SSL_CTX *ctx, void (*remove_session_cb)(struct ssl_ctx_st *ctx,SSL_SESSION *sess)); -void (*SSL_CTX_sess_get_remove_cb(SSL_CTX *ctx))(struct ssl_ctx_st *ctx, SSL_SESSION *sess); -void SSL_CTX_sess_set_get_cb(SSL_CTX *ctx, SSL_SESSION *(*get_session_cb)(struct ssl_st *ssl, unsigned char *data,int len,int *copy)); -SSL_SESSION *(*SSL_CTX_sess_get_get_cb(SSL_CTX *ctx))(struct ssl_st *ssl, unsigned char *Data, int len, int *copy); -void SSL_CTX_set_info_callback(SSL_CTX *ctx, void (*cb)(const SSL *ssl,int type,int val)); -void (*SSL_CTX_get_info_callback(SSL_CTX *ctx))(const SSL *ssl,int type,int val); -void SSL_CTX_set_client_cert_cb(SSL_CTX *ctx, int (*client_cert_cb)(SSL *ssl, X509 **x509, EVP_PKEY **pkey)); -int (*SSL_CTX_get_client_cert_cb(SSL_CTX *ctx))(SSL *ssl, X509 **x509, EVP_PKEY **pkey); -#ifndef OPENSSL_NO_ENGINE -int SSL_CTX_set_client_cert_engine(SSL_CTX *ctx, ENGINE *e); -#endif -void SSL_CTX_set_cookie_generate_cb(SSL_CTX *ctx, int (*app_gen_cookie_cb)(SSL *ssl, unsigned char *cookie, unsigned int *cookie_len)); -void SSL_CTX_set_cookie_verify_cb(SSL_CTX *ctx, int (*app_verify_cookie_cb)(SSL *ssl, unsigned char *cookie, unsigned int cookie_len)); -#ifndef OPENSSL_NO_NEXTPROTONEG -void SSL_CTX_set_next_protos_advertised_cb(SSL_CTX *s, - int (*cb) (SSL *ssl, - const unsigned char **out, - unsigned int *outlen, - void *arg), - void *arg); -void SSL_CTX_set_next_proto_select_cb(SSL_CTX *s, - int (*cb) (SSL *ssl, - unsigned char **out, - unsigned char *outlen, - const unsigned char *in, - unsigned int inlen, - void *arg), - void *arg); - -int SSL_select_next_proto(unsigned char **out, unsigned char *outlen, - const unsigned char *in, unsigned int inlen, - const unsigned char *client, unsigned int client_len); -void SSL_get0_next_proto_negotiated(const SSL *s, - const unsigned char **data, unsigned *len); - -#define OPENSSL_NPN_UNSUPPORTED 0 -#define OPENSSL_NPN_NEGOTIATED 1 -#define OPENSSL_NPN_NO_OVERLAP 2 -#endif - -#ifndef OPENSSL_NO_PSK -/* the maximum length of the buffer given to callbacks containing the - * resulting identity/psk */ -#define PSK_MAX_IDENTITY_LEN 128 -#define PSK_MAX_PSK_LEN 256 -void SSL_CTX_set_psk_client_callback(SSL_CTX *ctx, - unsigned int (*psk_client_callback)(SSL *ssl, const char *hint, - char *identity, unsigned int max_identity_len, unsigned char *psk, - unsigned int max_psk_len)); -void SSL_set_psk_client_callback(SSL *ssl, - unsigned int (*psk_client_callback)(SSL *ssl, const char *hint, - char *identity, unsigned int max_identity_len, unsigned char *psk, - unsigned int max_psk_len)); -void SSL_CTX_set_psk_server_callback(SSL_CTX *ctx, - unsigned int (*psk_server_callback)(SSL *ssl, const char *identity, - unsigned char *psk, unsigned int max_psk_len)); -void SSL_set_psk_server_callback(SSL *ssl, - unsigned int (*psk_server_callback)(SSL *ssl, const char *identity, - unsigned char *psk, unsigned int max_psk_len)); -int SSL_CTX_use_psk_identity_hint(SSL_CTX *ctx, const char *identity_hint); -int SSL_use_psk_identity_hint(SSL *s, const char *identity_hint); -const char *SSL_get_psk_identity_hint(const SSL *s); -const char *SSL_get_psk_identity(const SSL *s); -#endif - -#define SSL_NOTHING 1 -#define SSL_WRITING 2 -#define SSL_READING 3 -#define SSL_X509_LOOKUP 4 - -/* These will only be used when doing non-blocking IO */ -#define SSL_want_nothing(s) (SSL_want(s) == SSL_NOTHING) -#define SSL_want_read(s) (SSL_want(s) == SSL_READING) -#define SSL_want_write(s) (SSL_want(s) == SSL_WRITING) -#define SSL_want_x509_lookup(s) (SSL_want(s) == SSL_X509_LOOKUP) - -#define SSL_MAC_FLAG_READ_MAC_STREAM 1 -#define SSL_MAC_FLAG_WRITE_MAC_STREAM 2 - -#ifndef OPENSSL_NO_SSL_INTERN - -struct ssl_st - { - /* protocol version - * (one of SSL2_VERSION, SSL3_VERSION, TLS1_VERSION, DTLS1_VERSION) - */ - int version; - int type; /* SSL_ST_CONNECT or SSL_ST_ACCEPT */ - - const SSL_METHOD *method; /* SSLv3 */ - - /* There are 2 BIO's even though they are normally both the - * same. This is so data can be read and written to different - * handlers */ - -#ifndef OPENSSL_NO_BIO - BIO *rbio; /* used by SSL_read */ - BIO *wbio; /* used by SSL_write */ - BIO *bbio; /* used during session-id reuse to concatenate - * messages */ -#else - char *rbio; /* used by SSL_read */ - char *wbio; /* used by SSL_write */ - char *bbio; -#endif - /* This holds a variable that indicates what we were doing - * when a 0 or -1 is returned. This is needed for - * non-blocking IO so we know what request needs re-doing when - * in SSL_accept or SSL_connect */ - int rwstate; - - /* true when we are actually in SSL_accept() or SSL_connect() */ - int in_handshake; - int (*handshake_func)(SSL *); - - /* Imagine that here's a boolean member "init" that is - * switched as soon as SSL_set_{accept/connect}_state - * is called for the first time, so that "state" and - * "handshake_func" are properly initialized. But as - * handshake_func is == 0 until then, we use this - * test instead of an "init" member. - */ - - int server; /* are we the server side? - mostly used by SSL_clear*/ - - int new_session;/* Generate a new session or reuse an old one. - * NB: For servers, the 'new' session may actually be a previously - * cached session or even the previous session unless - * SSL_OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION is set */ - int quiet_shutdown;/* don't send shutdown packets */ - int shutdown; /* we have shut things down, 0x01 sent, 0x02 - * for received */ - int state; /* where we are */ - int rstate; /* where we are when reading */ - - BUF_MEM *init_buf; /* buffer used during init */ - void *init_msg; /* pointer to handshake message body, set by ssl3_get_message() */ - int init_num; /* amount read/written */ - int init_off; /* amount read/written */ - - /* used internally to point at a raw packet */ - unsigned char *packet; - unsigned int packet_length; - - struct ssl2_state_st *s2; /* SSLv2 variables */ - struct ssl3_state_st *s3; /* SSLv3 variables */ - struct dtls1_state_st *d1; /* DTLSv1 variables */ - - int read_ahead; /* Read as many input bytes as possible - * (for non-blocking reads) */ - - /* callback that allows applications to peek at protocol messages */ - void (*msg_callback)(int write_p, int version, int content_type, const void *buf, size_t len, SSL *ssl, void *arg); - void *msg_callback_arg; - - int hit; /* reusing a previous session */ - - X509_VERIFY_PARAM *param; - -#if 0 - int purpose; /* Purpose setting */ - int trust; /* Trust setting */ -#endif - - /* crypto */ - STACK_OF(SSL_CIPHER) *cipher_list; - STACK_OF(SSL_CIPHER) *cipher_list_by_id; - - /* These are the ones being used, the ones in SSL_SESSION are - * the ones to be 'copied' into these ones */ - int mac_flags; - EVP_CIPHER_CTX *enc_read_ctx; /* cryptographic state */ - EVP_MD_CTX *read_hash; /* used for mac generation */ -#ifndef OPENSSL_NO_COMP - COMP_CTX *expand; /* uncompress */ -#else - char *expand; -#endif - - EVP_CIPHER_CTX *enc_write_ctx; /* cryptographic state */ - EVP_MD_CTX *write_hash; /* used for mac generation */ -#ifndef OPENSSL_NO_COMP - COMP_CTX *compress; /* compression */ -#else - char *compress; -#endif - - /* session info */ - - /* client cert? */ - /* This is used to hold the server certificate used */ - struct cert_st /* CERT */ *cert; - - /* the session_id_context is used to ensure sessions are only reused - * in the appropriate context */ - unsigned int sid_ctx_length; - unsigned char sid_ctx[SSL_MAX_SID_CTX_LENGTH]; - - /* This can also be in the session once a session is established */ - SSL_SESSION *session; - - /* Default generate session ID callback. */ - GEN_SESSION_CB generate_session_id; - - /* Used in SSL2 and SSL3 */ - int verify_mode; /* 0 don't care about verify failure. - * 1 fail if verify fails */ - int (*verify_callback)(int ok,X509_STORE_CTX *ctx); /* fail if callback returns 0 */ - - void (*info_callback)(const SSL *ssl,int type,int val); /* optional informational callback */ - - int error; /* error bytes to be written */ - int error_code; /* actual code */ - -#ifndef OPENSSL_NO_KRB5 - KSSL_CTX *kssl_ctx; /* Kerberos 5 context */ -#endif /* OPENSSL_NO_KRB5 */ - -#ifndef OPENSSL_NO_PSK - unsigned int (*psk_client_callback)(SSL *ssl, const char *hint, char *identity, - unsigned int max_identity_len, unsigned char *psk, - unsigned int max_psk_len); - unsigned int (*psk_server_callback)(SSL *ssl, const char *identity, - unsigned char *psk, unsigned int max_psk_len); -#endif - - SSL_CTX *ctx; - /* set this flag to 1 and a sleep(1) is put into all SSL_read() - * and SSL_write() calls, good for nbio debuging :-) */ - int debug; - - /* extra application data */ - long verify_result; - CRYPTO_EX_DATA ex_data; - - /* for server side, keep the list of CA_dn we can use */ - STACK_OF(X509_NAME) *client_CA; - - int references; - unsigned long options; /* protocol behaviour */ - unsigned long mode; /* API behaviour */ - long max_cert_list; - int first_packet; - int client_version; /* what was passed, used for - * SSLv3/TLS rollback check */ - unsigned int max_send_fragment; -#ifndef OPENSSL_NO_TLSEXT - /* TLS extension debug callback */ - void (*tlsext_debug_cb)(SSL *s, int client_server, int type, - unsigned char *data, int len, - void *arg); - void *tlsext_debug_arg; - char *tlsext_hostname; - int servername_done; /* no further mod of servername - 0 : call the servername extension callback. - 1 : prepare 2, allow last ack just after in server callback. - 2 : don't call servername callback, no ack in server hello - */ - /* certificate status request info */ - /* Status type or -1 if no status type */ - int tlsext_status_type; - /* Expect OCSP CertificateStatus message */ - int tlsext_status_expected; - /* OCSP status request only */ - STACK_OF(OCSP_RESPID) *tlsext_ocsp_ids; - X509_EXTENSIONS *tlsext_ocsp_exts; - /* OCSP response received or to be sent */ - unsigned char *tlsext_ocsp_resp; - int tlsext_ocsp_resplen; - - /* RFC4507 session ticket expected to be received or sent */ - int tlsext_ticket_expected; -#ifndef OPENSSL_NO_EC - size_t tlsext_ecpointformatlist_length; - unsigned char *tlsext_ecpointformatlist; /* our list */ - size_t tlsext_ellipticcurvelist_length; - unsigned char *tlsext_ellipticcurvelist; /* our list */ -#endif /* OPENSSL_NO_EC */ - - /* draft-rescorla-tls-opaque-prf-input-00.txt information to be used for handshakes */ - void *tlsext_opaque_prf_input; - size_t tlsext_opaque_prf_input_len; - - /* TLS Session Ticket extension override */ - TLS_SESSION_TICKET_EXT *tlsext_session_ticket; - - /* TLS Session Ticket extension callback */ - tls_session_ticket_ext_cb_fn tls_session_ticket_ext_cb; - void *tls_session_ticket_ext_cb_arg; - - /* TLS pre-shared secret session resumption */ - tls_session_secret_cb_fn tls_session_secret_cb; - void *tls_session_secret_cb_arg; - - SSL_CTX * initial_ctx; /* initial ctx, used to store sessions */ - -#ifndef OPENSSL_NO_NEXTPROTONEG - /* Next protocol negotiation. For the client, this is the protocol that - * we sent in NextProtocol and is set when handling ServerHello - * extensions. - * - * For a server, this is the client's selected_protocol from - * NextProtocol and is set when handling the NextProtocol message, - * before the Finished message. */ - unsigned char *next_proto_negotiated; - unsigned char next_proto_negotiated_len; -#endif - -#define session_ctx initial_ctx - - STACK_OF(SRTP_PROTECTION_PROFILE) *srtp_profiles; /* What we'll do */ - SRTP_PROTECTION_PROFILE *srtp_profile; /* What's been chosen */ - - unsigned int tlsext_heartbeat; /* Is use of the Heartbeat extension negotiated? - 0: disabled - 1: enabled - 2: enabled, but not allowed to send Requests - */ - unsigned int tlsext_hb_pending; /* Indicates if a HeartbeatRequest is in flight */ - unsigned int tlsext_hb_seq; /* HeartbeatRequest sequence number */ -#else -#define session_ctx ctx -#endif /* OPENSSL_NO_TLSEXT */ - - int renegotiate;/* 1 if we are renegotiating. - * 2 if we are a server and are inside a handshake - * (i.e. not just sending a HelloRequest) */ - -#ifndef OPENSSL_NO_SRP - SRP_CTX srp_ctx; /* ctx for SRP authentication */ -#endif - }; - -#endif - -#ifdef __cplusplus -} -#endif - -#include -#include -#include /* This is mostly sslv3 with a few tweaks */ -#include /* Datagram TLS */ -#include -#include /* Support for the use_srtp extension */ - -#ifdef __cplusplus -extern "C" { -#endif - -/* compatibility */ -#define SSL_set_app_data(s,arg) (SSL_set_ex_data(s,0,(char *)arg)) -#define SSL_get_app_data(s) (SSL_get_ex_data(s,0)) -#define SSL_SESSION_set_app_data(s,a) (SSL_SESSION_set_ex_data(s,0,(char *)a)) -#define SSL_SESSION_get_app_data(s) (SSL_SESSION_get_ex_data(s,0)) -#define SSL_CTX_get_app_data(ctx) (SSL_CTX_get_ex_data(ctx,0)) -#define SSL_CTX_set_app_data(ctx,arg) (SSL_CTX_set_ex_data(ctx,0,(char *)arg)) - -/* The following are the possible values for ssl->state are are - * used to indicate where we are up to in the SSL connection establishment. - * The macros that follow are about the only things you should need to use - * and even then, only when using non-blocking IO. - * It can also be useful to work out where you were when the connection - * failed */ - -#define SSL_ST_CONNECT 0x1000 -#define SSL_ST_ACCEPT 0x2000 -#define SSL_ST_MASK 0x0FFF -#define SSL_ST_INIT (SSL_ST_CONNECT|SSL_ST_ACCEPT) -#define SSL_ST_BEFORE 0x4000 -#define SSL_ST_OK 0x03 -#define SSL_ST_RENEGOTIATE (0x04|SSL_ST_INIT) - -#define SSL_CB_LOOP 0x01 -#define SSL_CB_EXIT 0x02 -#define SSL_CB_READ 0x04 -#define SSL_CB_WRITE 0x08 -#define SSL_CB_ALERT 0x4000 /* used in callback */ -#define SSL_CB_READ_ALERT (SSL_CB_ALERT|SSL_CB_READ) -#define SSL_CB_WRITE_ALERT (SSL_CB_ALERT|SSL_CB_WRITE) -#define SSL_CB_ACCEPT_LOOP (SSL_ST_ACCEPT|SSL_CB_LOOP) -#define SSL_CB_ACCEPT_EXIT (SSL_ST_ACCEPT|SSL_CB_EXIT) -#define SSL_CB_CONNECT_LOOP (SSL_ST_CONNECT|SSL_CB_LOOP) -#define SSL_CB_CONNECT_EXIT (SSL_ST_CONNECT|SSL_CB_EXIT) -#define SSL_CB_HANDSHAKE_START 0x10 -#define SSL_CB_HANDSHAKE_DONE 0x20 - -/* Is the SSL_connection established? */ -#define SSL_get_state(a) SSL_state(a) -#define SSL_is_init_finished(a) (SSL_state(a) == SSL_ST_OK) -#define SSL_in_init(a) (SSL_state(a)&SSL_ST_INIT) -#define SSL_in_before(a) (SSL_state(a)&SSL_ST_BEFORE) -#define SSL_in_connect_init(a) (SSL_state(a)&SSL_ST_CONNECT) -#define SSL_in_accept_init(a) (SSL_state(a)&SSL_ST_ACCEPT) - -/* The following 2 states are kept in ssl->rstate when reads fail, - * you should not need these */ -#define SSL_ST_READ_HEADER 0xF0 -#define SSL_ST_READ_BODY 0xF1 -#define SSL_ST_READ_DONE 0xF2 - -/* Obtain latest Finished message - * -- that we sent (SSL_get_finished) - * -- that we expected from peer (SSL_get_peer_finished). - * Returns length (0 == no Finished so far), copies up to 'count' bytes. */ -size_t SSL_get_finished(const SSL *s, void *buf, size_t count); -size_t SSL_get_peer_finished(const SSL *s, void *buf, size_t count); - -/* use either SSL_VERIFY_NONE or SSL_VERIFY_PEER, the last 2 options - * are 'ored' with SSL_VERIFY_PEER if they are desired */ -#define SSL_VERIFY_NONE 0x00 -#define SSL_VERIFY_PEER 0x01 -#define SSL_VERIFY_FAIL_IF_NO_PEER_CERT 0x02 -#define SSL_VERIFY_CLIENT_ONCE 0x04 - -#define OpenSSL_add_ssl_algorithms() SSL_library_init() -#define SSLeay_add_ssl_algorithms() SSL_library_init() - -/* this is for backward compatibility */ -#if 0 /* NEW_SSLEAY */ -#define SSL_CTX_set_default_verify(a,b,c) SSL_CTX_set_verify(a,b,c) -#define SSL_set_pref_cipher(c,n) SSL_set_cipher_list(c,n) -#define SSL_add_session(a,b) SSL_CTX_add_session((a),(b)) -#define SSL_remove_session(a,b) SSL_CTX_remove_session((a),(b)) -#define SSL_flush_sessions(a,b) SSL_CTX_flush_sessions((a),(b)) -#endif -/* More backward compatibility */ -#define SSL_get_cipher(s) \ - SSL_CIPHER_get_name(SSL_get_current_cipher(s)) -#define SSL_get_cipher_bits(s,np) \ - SSL_CIPHER_get_bits(SSL_get_current_cipher(s),np) -#define SSL_get_cipher_version(s) \ - SSL_CIPHER_get_version(SSL_get_current_cipher(s)) -#define SSL_get_cipher_name(s) \ - SSL_CIPHER_get_name(SSL_get_current_cipher(s)) -#define SSL_get_time(a) SSL_SESSION_get_time(a) -#define SSL_set_time(a,b) SSL_SESSION_set_time((a),(b)) -#define SSL_get_timeout(a) SSL_SESSION_get_timeout(a) -#define SSL_set_timeout(a,b) SSL_SESSION_set_timeout((a),(b)) - -#define d2i_SSL_SESSION_bio(bp,s_id) ASN1_d2i_bio_of(SSL_SESSION,SSL_SESSION_new,d2i_SSL_SESSION,bp,s_id) -#define i2d_SSL_SESSION_bio(bp,s_id) ASN1_i2d_bio_of(SSL_SESSION,i2d_SSL_SESSION,bp,s_id) - -DECLARE_PEM_rw(SSL_SESSION, SSL_SESSION) - -#define SSL_AD_REASON_OFFSET 1000 /* offset to get SSL_R_... value from SSL_AD_... */ - -/* These alert types are for SSLv3 and TLSv1 */ -#define SSL_AD_CLOSE_NOTIFY SSL3_AD_CLOSE_NOTIFY -#define SSL_AD_UNEXPECTED_MESSAGE SSL3_AD_UNEXPECTED_MESSAGE /* fatal */ -#define SSL_AD_BAD_RECORD_MAC SSL3_AD_BAD_RECORD_MAC /* fatal */ -#define SSL_AD_DECRYPTION_FAILED TLS1_AD_DECRYPTION_FAILED -#define SSL_AD_RECORD_OVERFLOW TLS1_AD_RECORD_OVERFLOW -#define SSL_AD_DECOMPRESSION_FAILURE SSL3_AD_DECOMPRESSION_FAILURE/* fatal */ -#define SSL_AD_HANDSHAKE_FAILURE SSL3_AD_HANDSHAKE_FAILURE/* fatal */ -#define SSL_AD_NO_CERTIFICATE SSL3_AD_NO_CERTIFICATE /* Not for TLS */ -#define SSL_AD_BAD_CERTIFICATE SSL3_AD_BAD_CERTIFICATE -#define SSL_AD_UNSUPPORTED_CERTIFICATE SSL3_AD_UNSUPPORTED_CERTIFICATE -#define SSL_AD_CERTIFICATE_REVOKED SSL3_AD_CERTIFICATE_REVOKED -#define SSL_AD_CERTIFICATE_EXPIRED SSL3_AD_CERTIFICATE_EXPIRED -#define SSL_AD_CERTIFICATE_UNKNOWN SSL3_AD_CERTIFICATE_UNKNOWN -#define SSL_AD_ILLEGAL_PARAMETER SSL3_AD_ILLEGAL_PARAMETER /* fatal */ -#define SSL_AD_UNKNOWN_CA TLS1_AD_UNKNOWN_CA /* fatal */ -#define SSL_AD_ACCESS_DENIED TLS1_AD_ACCESS_DENIED /* fatal */ -#define SSL_AD_DECODE_ERROR TLS1_AD_DECODE_ERROR /* fatal */ -#define SSL_AD_DECRYPT_ERROR TLS1_AD_DECRYPT_ERROR -#define SSL_AD_EXPORT_RESTRICTION TLS1_AD_EXPORT_RESTRICTION/* fatal */ -#define SSL_AD_PROTOCOL_VERSION TLS1_AD_PROTOCOL_VERSION /* fatal */ -#define SSL_AD_INSUFFICIENT_SECURITY TLS1_AD_INSUFFICIENT_SECURITY/* fatal */ -#define SSL_AD_INTERNAL_ERROR TLS1_AD_INTERNAL_ERROR /* fatal */ -#define SSL_AD_USER_CANCELLED TLS1_AD_USER_CANCELLED -#define SSL_AD_NO_RENEGOTIATION TLS1_AD_NO_RENEGOTIATION -#define SSL_AD_UNSUPPORTED_EXTENSION TLS1_AD_UNSUPPORTED_EXTENSION -#define SSL_AD_CERTIFICATE_UNOBTAINABLE TLS1_AD_CERTIFICATE_UNOBTAINABLE -#define SSL_AD_UNRECOGNIZED_NAME TLS1_AD_UNRECOGNIZED_NAME -#define SSL_AD_BAD_CERTIFICATE_STATUS_RESPONSE TLS1_AD_BAD_CERTIFICATE_STATUS_RESPONSE -#define SSL_AD_BAD_CERTIFICATE_HASH_VALUE TLS1_AD_BAD_CERTIFICATE_HASH_VALUE -#define SSL_AD_UNKNOWN_PSK_IDENTITY TLS1_AD_UNKNOWN_PSK_IDENTITY /* fatal */ - -#define SSL_ERROR_NONE 0 -#define SSL_ERROR_SSL 1 -#define SSL_ERROR_WANT_READ 2 -#define SSL_ERROR_WANT_WRITE 3 -#define SSL_ERROR_WANT_X509_LOOKUP 4 -#define SSL_ERROR_SYSCALL 5 /* look at error stack/return value/errno */ -#define SSL_ERROR_ZERO_RETURN 6 -#define SSL_ERROR_WANT_CONNECT 7 -#define SSL_ERROR_WANT_ACCEPT 8 - -#define SSL_CTRL_NEED_TMP_RSA 1 -#define SSL_CTRL_SET_TMP_RSA 2 -#define SSL_CTRL_SET_TMP_DH 3 -#define SSL_CTRL_SET_TMP_ECDH 4 -#define SSL_CTRL_SET_TMP_RSA_CB 5 -#define SSL_CTRL_SET_TMP_DH_CB 6 -#define SSL_CTRL_SET_TMP_ECDH_CB 7 - -#define SSL_CTRL_GET_SESSION_REUSED 8 -#define SSL_CTRL_GET_CLIENT_CERT_REQUEST 9 -#define SSL_CTRL_GET_NUM_RENEGOTIATIONS 10 -#define SSL_CTRL_CLEAR_NUM_RENEGOTIATIONS 11 -#define SSL_CTRL_GET_TOTAL_RENEGOTIATIONS 12 -#define SSL_CTRL_GET_FLAGS 13 -#define SSL_CTRL_EXTRA_CHAIN_CERT 14 - -#define SSL_CTRL_SET_MSG_CALLBACK 15 -#define SSL_CTRL_SET_MSG_CALLBACK_ARG 16 - -/* only applies to datagram connections */ -#define SSL_CTRL_SET_MTU 17 -/* Stats */ -#define SSL_CTRL_SESS_NUMBER 20 -#define SSL_CTRL_SESS_CONNECT 21 -#define SSL_CTRL_SESS_CONNECT_GOOD 22 -#define SSL_CTRL_SESS_CONNECT_RENEGOTIATE 23 -#define SSL_CTRL_SESS_ACCEPT 24 -#define SSL_CTRL_SESS_ACCEPT_GOOD 25 -#define SSL_CTRL_SESS_ACCEPT_RENEGOTIATE 26 -#define SSL_CTRL_SESS_HIT 27 -#define SSL_CTRL_SESS_CB_HIT 28 -#define SSL_CTRL_SESS_MISSES 29 -#define SSL_CTRL_SESS_TIMEOUTS 30 -#define SSL_CTRL_SESS_CACHE_FULL 31 -#define SSL_CTRL_OPTIONS 32 -#define SSL_CTRL_MODE 33 - -#define SSL_CTRL_GET_READ_AHEAD 40 -#define SSL_CTRL_SET_READ_AHEAD 41 -#define SSL_CTRL_SET_SESS_CACHE_SIZE 42 -#define SSL_CTRL_GET_SESS_CACHE_SIZE 43 -#define SSL_CTRL_SET_SESS_CACHE_MODE 44 -#define SSL_CTRL_GET_SESS_CACHE_MODE 45 - -#define SSL_CTRL_GET_MAX_CERT_LIST 50 -#define SSL_CTRL_SET_MAX_CERT_LIST 51 - -#define SSL_CTRL_SET_MAX_SEND_FRAGMENT 52 - -/* see tls1.h for macros based on these */ -#ifndef OPENSSL_NO_TLSEXT -#define SSL_CTRL_SET_TLSEXT_SERVERNAME_CB 53 -#define SSL_CTRL_SET_TLSEXT_SERVERNAME_ARG 54 -#define SSL_CTRL_SET_TLSEXT_HOSTNAME 55 -#define SSL_CTRL_SET_TLSEXT_DEBUG_CB 56 -#define SSL_CTRL_SET_TLSEXT_DEBUG_ARG 57 -#define SSL_CTRL_GET_TLSEXT_TICKET_KEYS 58 -#define SSL_CTRL_SET_TLSEXT_TICKET_KEYS 59 -#define SSL_CTRL_SET_TLSEXT_OPAQUE_PRF_INPUT 60 -#define SSL_CTRL_SET_TLSEXT_OPAQUE_PRF_INPUT_CB 61 -#define SSL_CTRL_SET_TLSEXT_OPAQUE_PRF_INPUT_CB_ARG 62 -#define SSL_CTRL_SET_TLSEXT_STATUS_REQ_CB 63 -#define SSL_CTRL_SET_TLSEXT_STATUS_REQ_CB_ARG 64 -#define SSL_CTRL_SET_TLSEXT_STATUS_REQ_TYPE 65 -#define SSL_CTRL_GET_TLSEXT_STATUS_REQ_EXTS 66 -#define SSL_CTRL_SET_TLSEXT_STATUS_REQ_EXTS 67 -#define SSL_CTRL_GET_TLSEXT_STATUS_REQ_IDS 68 -#define SSL_CTRL_SET_TLSEXT_STATUS_REQ_IDS 69 -#define SSL_CTRL_GET_TLSEXT_STATUS_REQ_OCSP_RESP 70 -#define SSL_CTRL_SET_TLSEXT_STATUS_REQ_OCSP_RESP 71 - -#define SSL_CTRL_SET_TLSEXT_TICKET_KEY_CB 72 - -#define SSL_CTRL_SET_TLS_EXT_SRP_USERNAME_CB 75 -#define SSL_CTRL_SET_SRP_VERIFY_PARAM_CB 76 -#define SSL_CTRL_SET_SRP_GIVE_CLIENT_PWD_CB 77 - -#define SSL_CTRL_SET_SRP_ARG 78 -#define SSL_CTRL_SET_TLS_EXT_SRP_USERNAME 79 -#define SSL_CTRL_SET_TLS_EXT_SRP_STRENGTH 80 -#define SSL_CTRL_SET_TLS_EXT_SRP_PASSWORD 81 -#ifndef OPENSSL_NO_HEARTBEATS -#define SSL_CTRL_TLS_EXT_SEND_HEARTBEAT 85 -#define SSL_CTRL_GET_TLS_EXT_HEARTBEAT_PENDING 86 -#define SSL_CTRL_SET_TLS_EXT_HEARTBEAT_NO_REQUESTS 87 -#endif -#endif - -#define DTLS_CTRL_GET_TIMEOUT 73 -#define DTLS_CTRL_HANDLE_TIMEOUT 74 -#define DTLS_CTRL_LISTEN 75 - -#define SSL_CTRL_GET_RI_SUPPORT 76 -#define SSL_CTRL_CLEAR_OPTIONS 77 -#define SSL_CTRL_CLEAR_MODE 78 - -#define SSL_CTRL_GET_EXTRA_CHAIN_CERTS 82 -#define SSL_CTRL_CLEAR_EXTRA_CHAIN_CERTS 83 - -#define DTLSv1_get_timeout(ssl, arg) \ - SSL_ctrl(ssl,DTLS_CTRL_GET_TIMEOUT,0, (void *)arg) -#define DTLSv1_handle_timeout(ssl) \ - SSL_ctrl(ssl,DTLS_CTRL_HANDLE_TIMEOUT,0, NULL) -#define DTLSv1_listen(ssl, peer) \ - SSL_ctrl(ssl,DTLS_CTRL_LISTEN,0, (void *)peer) - -#define SSL_session_reused(ssl) \ - SSL_ctrl((ssl),SSL_CTRL_GET_SESSION_REUSED,0,NULL) -#define SSL_num_renegotiations(ssl) \ - SSL_ctrl((ssl),SSL_CTRL_GET_NUM_RENEGOTIATIONS,0,NULL) -#define SSL_clear_num_renegotiations(ssl) \ - SSL_ctrl((ssl),SSL_CTRL_CLEAR_NUM_RENEGOTIATIONS,0,NULL) -#define SSL_total_renegotiations(ssl) \ - SSL_ctrl((ssl),SSL_CTRL_GET_TOTAL_RENEGOTIATIONS,0,NULL) - -#define SSL_CTX_need_tmp_RSA(ctx) \ - SSL_CTX_ctrl(ctx,SSL_CTRL_NEED_TMP_RSA,0,NULL) -#define SSL_CTX_set_tmp_rsa(ctx,rsa) \ - SSL_CTX_ctrl(ctx,SSL_CTRL_SET_TMP_RSA,0,(char *)rsa) -#define SSL_CTX_set_tmp_dh(ctx,dh) \ - SSL_CTX_ctrl(ctx,SSL_CTRL_SET_TMP_DH,0,(char *)dh) -#define SSL_CTX_set_tmp_ecdh(ctx,ecdh) \ - SSL_CTX_ctrl(ctx,SSL_CTRL_SET_TMP_ECDH,0,(char *)ecdh) - -#define SSL_need_tmp_RSA(ssl) \ - SSL_ctrl(ssl,SSL_CTRL_NEED_TMP_RSA,0,NULL) -#define SSL_set_tmp_rsa(ssl,rsa) \ - SSL_ctrl(ssl,SSL_CTRL_SET_TMP_RSA,0,(char *)rsa) -#define SSL_set_tmp_dh(ssl,dh) \ - SSL_ctrl(ssl,SSL_CTRL_SET_TMP_DH,0,(char *)dh) -#define SSL_set_tmp_ecdh(ssl,ecdh) \ - SSL_ctrl(ssl,SSL_CTRL_SET_TMP_ECDH,0,(char *)ecdh) - -#define SSL_CTX_add_extra_chain_cert(ctx,x509) \ - SSL_CTX_ctrl(ctx,SSL_CTRL_EXTRA_CHAIN_CERT,0,(char *)x509) -#define SSL_CTX_get_extra_chain_certs(ctx,px509) \ - SSL_CTX_ctrl(ctx,SSL_CTRL_GET_EXTRA_CHAIN_CERTS,0,px509) -#define SSL_CTX_clear_extra_chain_certs(ctx) \ - SSL_CTX_ctrl(ctx,SSL_CTRL_CLEAR_EXTRA_CHAIN_CERTS,0,NULL) - -#ifndef OPENSSL_NO_BIO -BIO_METHOD *BIO_f_ssl(void); -BIO *BIO_new_ssl(SSL_CTX *ctx,int client); -BIO *BIO_new_ssl_connect(SSL_CTX *ctx); -BIO *BIO_new_buffer_ssl_connect(SSL_CTX *ctx); -int BIO_ssl_copy_session_id(BIO *to,BIO *from); -void BIO_ssl_shutdown(BIO *ssl_bio); - -#endif - -int SSL_CTX_set_cipher_list(SSL_CTX *,const char *str); -SSL_CTX *SSL_CTX_new(const SSL_METHOD *meth); -void SSL_CTX_free(SSL_CTX *); -long SSL_CTX_set_timeout(SSL_CTX *ctx,long t); -long SSL_CTX_get_timeout(const SSL_CTX *ctx); -X509_STORE *SSL_CTX_get_cert_store(const SSL_CTX *); -void SSL_CTX_set_cert_store(SSL_CTX *,X509_STORE *); -int SSL_want(const SSL *s); -int SSL_clear(SSL *s); - -void SSL_CTX_flush_sessions(SSL_CTX *ctx,long tm); - -const SSL_CIPHER *SSL_get_current_cipher(const SSL *s); -int SSL_CIPHER_get_bits(const SSL_CIPHER *c,int *alg_bits); -char * SSL_CIPHER_get_version(const SSL_CIPHER *c); -const char * SSL_CIPHER_get_name(const SSL_CIPHER *c); -unsigned long SSL_CIPHER_get_id(const SSL_CIPHER *c); - -int SSL_get_fd(const SSL *s); -int SSL_get_rfd(const SSL *s); -int SSL_get_wfd(const SSL *s); -const char * SSL_get_cipher_list(const SSL *s,int n); -char * SSL_get_shared_ciphers(const SSL *s, char *buf, int len); -int SSL_get_read_ahead(const SSL * s); -int SSL_pending(const SSL *s); -#ifndef OPENSSL_NO_SOCK -int SSL_set_fd(SSL *s, int fd); -int SSL_set_rfd(SSL *s, int fd); -int SSL_set_wfd(SSL *s, int fd); -#endif -#ifndef OPENSSL_NO_BIO -void SSL_set_bio(SSL *s, BIO *rbio,BIO *wbio); -BIO * SSL_get_rbio(const SSL *s); -BIO * SSL_get_wbio(const SSL *s); -#endif -int SSL_set_cipher_list(SSL *s, const char *str); -void SSL_set_read_ahead(SSL *s, int yes); -int SSL_get_verify_mode(const SSL *s); -int SSL_get_verify_depth(const SSL *s); -int (*SSL_get_verify_callback(const SSL *s))(int,X509_STORE_CTX *); -void SSL_set_verify(SSL *s, int mode, - int (*callback)(int ok,X509_STORE_CTX *ctx)); -void SSL_set_verify_depth(SSL *s, int depth); -#ifndef OPENSSL_NO_RSA -int SSL_use_RSAPrivateKey(SSL *ssl, RSA *rsa); -#endif -int SSL_use_RSAPrivateKey_ASN1(SSL *ssl, unsigned char *d, long len); -int SSL_use_PrivateKey(SSL *ssl, EVP_PKEY *pkey); -int SSL_use_PrivateKey_ASN1(int pk,SSL *ssl, const unsigned char *d, long len); -int SSL_use_certificate(SSL *ssl, X509 *x); -int SSL_use_certificate_ASN1(SSL *ssl, const unsigned char *d, int len); - -#ifndef OPENSSL_NO_STDIO -int SSL_use_RSAPrivateKey_file(SSL *ssl, const char *file, int type); -int SSL_use_PrivateKey_file(SSL *ssl, const char *file, int type); -int SSL_use_certificate_file(SSL *ssl, const char *file, int type); -int SSL_CTX_use_RSAPrivateKey_file(SSL_CTX *ctx, const char *file, int type); -int SSL_CTX_use_PrivateKey_file(SSL_CTX *ctx, const char *file, int type); -int SSL_CTX_use_certificate_file(SSL_CTX *ctx, const char *file, int type); -int SSL_CTX_use_certificate_chain_file(SSL_CTX *ctx, const char *file); /* PEM type */ -STACK_OF(X509_NAME) *SSL_load_client_CA_file(const char *file); -int SSL_add_file_cert_subjects_to_stack(STACK_OF(X509_NAME) *stackCAs, - const char *file); -#ifndef OPENSSL_SYS_VMS -#ifndef OPENSSL_SYS_MACINTOSH_CLASSIC /* XXXXX: Better scheme needed! [was: #ifndef MAC_OS_pre_X] */ -int SSL_add_dir_cert_subjects_to_stack(STACK_OF(X509_NAME) *stackCAs, - const char *dir); -#endif -#endif - -#endif - -void SSL_load_error_strings(void ); -const char *SSL_state_string(const SSL *s); -const char *SSL_rstate_string(const SSL *s); -const char *SSL_state_string_long(const SSL *s); -const char *SSL_rstate_string_long(const SSL *s); -long SSL_SESSION_get_time(const SSL_SESSION *s); -long SSL_SESSION_set_time(SSL_SESSION *s, long t); -long SSL_SESSION_get_timeout(const SSL_SESSION *s); -long SSL_SESSION_set_timeout(SSL_SESSION *s, long t); -void SSL_copy_session_id(SSL *to,const SSL *from); -X509 *SSL_SESSION_get0_peer(SSL_SESSION *s); -int SSL_SESSION_set1_id_context(SSL_SESSION *s,const unsigned char *sid_ctx, - unsigned int sid_ctx_len); - -SSL_SESSION *SSL_SESSION_new(void); -const unsigned char *SSL_SESSION_get_id(const SSL_SESSION *s, - unsigned int *len); -unsigned int SSL_SESSION_get_compress_id(const SSL_SESSION *s); -#ifndef OPENSSL_NO_FP_API -int SSL_SESSION_print_fp(FILE *fp,const SSL_SESSION *ses); -#endif -#ifndef OPENSSL_NO_BIO -int SSL_SESSION_print(BIO *fp,const SSL_SESSION *ses); -#endif -void SSL_SESSION_free(SSL_SESSION *ses); -int i2d_SSL_SESSION(SSL_SESSION *in,unsigned char **pp); -int SSL_set_session(SSL *to, SSL_SESSION *session); -int SSL_CTX_add_session(SSL_CTX *s, SSL_SESSION *c); -int SSL_CTX_remove_session(SSL_CTX *,SSL_SESSION *c); -int SSL_CTX_set_generate_session_id(SSL_CTX *, GEN_SESSION_CB); -int SSL_set_generate_session_id(SSL *, GEN_SESSION_CB); -int SSL_has_matching_session_id(const SSL *ssl, const unsigned char *id, - unsigned int id_len); -SSL_SESSION *d2i_SSL_SESSION(SSL_SESSION **a,const unsigned char **pp, - long length); - -#ifdef HEADER_X509_H -X509 * SSL_get_peer_certificate(const SSL *s); -#endif - -STACK_OF(X509) *SSL_get_peer_cert_chain(const SSL *s); - -int SSL_CTX_get_verify_mode(const SSL_CTX *ctx); -int SSL_CTX_get_verify_depth(const SSL_CTX *ctx); -int (*SSL_CTX_get_verify_callback(const SSL_CTX *ctx))(int,X509_STORE_CTX *); -void SSL_CTX_set_verify(SSL_CTX *ctx,int mode, - int (*callback)(int, X509_STORE_CTX *)); -void SSL_CTX_set_verify_depth(SSL_CTX *ctx,int depth); -void SSL_CTX_set_cert_verify_callback(SSL_CTX *ctx, int (*cb)(X509_STORE_CTX *,void *), void *arg); -#ifndef OPENSSL_NO_RSA -int SSL_CTX_use_RSAPrivateKey(SSL_CTX *ctx, RSA *rsa); -#endif -int SSL_CTX_use_RSAPrivateKey_ASN1(SSL_CTX *ctx, const unsigned char *d, long len); -int SSL_CTX_use_PrivateKey(SSL_CTX *ctx, EVP_PKEY *pkey); -int SSL_CTX_use_PrivateKey_ASN1(int pk,SSL_CTX *ctx, - const unsigned char *d, long len); -int SSL_CTX_use_certificate(SSL_CTX *ctx, X509 *x); -int SSL_CTX_use_certificate_ASN1(SSL_CTX *ctx, int len, const unsigned char *d); - -void SSL_CTX_set_default_passwd_cb(SSL_CTX *ctx, pem_password_cb *cb); -void SSL_CTX_set_default_passwd_cb_userdata(SSL_CTX *ctx, void *u); - -int SSL_CTX_check_private_key(const SSL_CTX *ctx); -int SSL_check_private_key(const SSL *ctx); - -int SSL_CTX_set_session_id_context(SSL_CTX *ctx,const unsigned char *sid_ctx, - unsigned int sid_ctx_len); - -SSL * SSL_new(SSL_CTX *ctx); -int SSL_set_session_id_context(SSL *ssl,const unsigned char *sid_ctx, - unsigned int sid_ctx_len); - -int SSL_CTX_set_purpose(SSL_CTX *s, int purpose); -int SSL_set_purpose(SSL *s, int purpose); -int SSL_CTX_set_trust(SSL_CTX *s, int trust); -int SSL_set_trust(SSL *s, int trust); - -int SSL_CTX_set1_param(SSL_CTX *ctx, X509_VERIFY_PARAM *vpm); -int SSL_set1_param(SSL *ssl, X509_VERIFY_PARAM *vpm); - -#ifndef OPENSSL_NO_SRP -int SSL_CTX_set_srp_username(SSL_CTX *ctx,char *name); -int SSL_CTX_set_srp_password(SSL_CTX *ctx,char *password); -int SSL_CTX_set_srp_strength(SSL_CTX *ctx, int strength); -int SSL_CTX_set_srp_client_pwd_callback(SSL_CTX *ctx, - char *(*cb)(SSL *,void *)); -int SSL_CTX_set_srp_verify_param_callback(SSL_CTX *ctx, - int (*cb)(SSL *,void *)); -int SSL_CTX_set_srp_username_callback(SSL_CTX *ctx, - int (*cb)(SSL *,int *,void *)); -int SSL_CTX_set_srp_cb_arg(SSL_CTX *ctx, void *arg); - -int SSL_set_srp_server_param(SSL *s, const BIGNUM *N, const BIGNUM *g, - BIGNUM *sa, BIGNUM *v, char *info); -int SSL_set_srp_server_param_pw(SSL *s, const char *user, const char *pass, - const char *grp); - -BIGNUM *SSL_get_srp_g(SSL *s); -BIGNUM *SSL_get_srp_N(SSL *s); - -char *SSL_get_srp_username(SSL *s); -char *SSL_get_srp_userinfo(SSL *s); -#endif - -void SSL_free(SSL *ssl); -int SSL_accept(SSL *ssl); -int SSL_connect(SSL *ssl); -int SSL_read(SSL *ssl,void *buf,int num); -int SSL_peek(SSL *ssl,void *buf,int num); -int SSL_write(SSL *ssl,const void *buf,int num); -long SSL_ctrl(SSL *ssl,int cmd, long larg, void *parg); -long SSL_callback_ctrl(SSL *, int, void (*)(void)); -long SSL_CTX_ctrl(SSL_CTX *ctx,int cmd, long larg, void *parg); -long SSL_CTX_callback_ctrl(SSL_CTX *, int, void (*)(void)); - -int SSL_get_error(const SSL *s,int ret_code); -const char *SSL_get_version(const SSL *s); - -/* This sets the 'default' SSL version that SSL_new() will create */ -int SSL_CTX_set_ssl_version(SSL_CTX *ctx, const SSL_METHOD *meth); - -#ifndef OPENSSL_NO_SSL2 -const SSL_METHOD *SSLv2_method(void); /* SSLv2 */ -const SSL_METHOD *SSLv2_server_method(void); /* SSLv2 */ -const SSL_METHOD *SSLv2_client_method(void); /* SSLv2 */ -#endif - -const SSL_METHOD *SSLv3_method(void); /* SSLv3 */ -const SSL_METHOD *SSLv3_server_method(void); /* SSLv3 */ -const SSL_METHOD *SSLv3_client_method(void); /* SSLv3 */ - -const SSL_METHOD *SSLv23_method(void); /* SSLv3 but can rollback to v2 */ -const SSL_METHOD *SSLv23_server_method(void); /* SSLv3 but can rollback to v2 */ -const SSL_METHOD *SSLv23_client_method(void); /* SSLv3 but can rollback to v2 */ - -const SSL_METHOD *TLSv1_method(void); /* TLSv1.0 */ -const SSL_METHOD *TLSv1_server_method(void); /* TLSv1.0 */ -const SSL_METHOD *TLSv1_client_method(void); /* TLSv1.0 */ - -const SSL_METHOD *TLSv1_1_method(void); /* TLSv1.1 */ -const SSL_METHOD *TLSv1_1_server_method(void); /* TLSv1.1 */ -const SSL_METHOD *TLSv1_1_client_method(void); /* TLSv1.1 */ - -const SSL_METHOD *TLSv1_2_method(void); /* TLSv1.2 */ -const SSL_METHOD *TLSv1_2_server_method(void); /* TLSv1.2 */ -const SSL_METHOD *TLSv1_2_client_method(void); /* TLSv1.2 */ - - -const SSL_METHOD *DTLSv1_method(void); /* DTLSv1.0 */ -const SSL_METHOD *DTLSv1_server_method(void); /* DTLSv1.0 */ -const SSL_METHOD *DTLSv1_client_method(void); /* DTLSv1.0 */ - -STACK_OF(SSL_CIPHER) *SSL_get_ciphers(const SSL *s); - -int SSL_do_handshake(SSL *s); -int SSL_renegotiate(SSL *s); -int SSL_renegotiate_abbreviated(SSL *s); -int SSL_renegotiate_pending(SSL *s); -int SSL_shutdown(SSL *s); - -const SSL_METHOD *SSL_get_ssl_method(SSL *s); -int SSL_set_ssl_method(SSL *s, const SSL_METHOD *method); -const char *SSL_alert_type_string_long(int value); -const char *SSL_alert_type_string(int value); -const char *SSL_alert_desc_string_long(int value); -const char *SSL_alert_desc_string(int value); - -void SSL_set_client_CA_list(SSL *s, STACK_OF(X509_NAME) *name_list); -void SSL_CTX_set_client_CA_list(SSL_CTX *ctx, STACK_OF(X509_NAME) *name_list); -STACK_OF(X509_NAME) *SSL_get_client_CA_list(const SSL *s); -STACK_OF(X509_NAME) *SSL_CTX_get_client_CA_list(const SSL_CTX *s); -int SSL_add_client_CA(SSL *ssl,X509 *x); -int SSL_CTX_add_client_CA(SSL_CTX *ctx,X509 *x); - -void SSL_set_connect_state(SSL *s); -void SSL_set_accept_state(SSL *s); - -long SSL_get_default_timeout(const SSL *s); - -int SSL_library_init(void ); - -char *SSL_CIPHER_description(const SSL_CIPHER *,char *buf,int size); -STACK_OF(X509_NAME) *SSL_dup_CA_list(STACK_OF(X509_NAME) *sk); - -SSL *SSL_dup(SSL *ssl); - -X509 *SSL_get_certificate(const SSL *ssl); -/* EVP_PKEY */ struct evp_pkey_st *SSL_get_privatekey(SSL *ssl); - -void SSL_CTX_set_quiet_shutdown(SSL_CTX *ctx,int mode); -int SSL_CTX_get_quiet_shutdown(const SSL_CTX *ctx); -void SSL_set_quiet_shutdown(SSL *ssl,int mode); -int SSL_get_quiet_shutdown(const SSL *ssl); -void SSL_set_shutdown(SSL *ssl,int mode); -int SSL_get_shutdown(const SSL *ssl); -int SSL_version(const SSL *ssl); -int SSL_CTX_set_default_verify_paths(SSL_CTX *ctx); -int SSL_CTX_load_verify_locations(SSL_CTX *ctx, const char *CAfile, - const char *CApath); -#define SSL_get0_session SSL_get_session /* just peek at pointer */ -SSL_SESSION *SSL_get_session(const SSL *ssl); -SSL_SESSION *SSL_get1_session(SSL *ssl); /* obtain a reference count */ -SSL_CTX *SSL_get_SSL_CTX(const SSL *ssl); -SSL_CTX *SSL_set_SSL_CTX(SSL *ssl, SSL_CTX* ctx); -void SSL_set_info_callback(SSL *ssl, - void (*cb)(const SSL *ssl,int type,int val)); -void (*SSL_get_info_callback(const SSL *ssl))(const SSL *ssl,int type,int val); -int SSL_state(const SSL *ssl); -void SSL_set_state(SSL *ssl, int state); - -void SSL_set_verify_result(SSL *ssl,long v); -long SSL_get_verify_result(const SSL *ssl); - -int SSL_set_ex_data(SSL *ssl,int idx,void *data); -void *SSL_get_ex_data(const SSL *ssl,int idx); -int SSL_get_ex_new_index(long argl, void *argp, CRYPTO_EX_new *new_func, - CRYPTO_EX_dup *dup_func, CRYPTO_EX_free *free_func); - -int SSL_SESSION_set_ex_data(SSL_SESSION *ss,int idx,void *data); -void *SSL_SESSION_get_ex_data(const SSL_SESSION *ss,int idx); -int SSL_SESSION_get_ex_new_index(long argl, void *argp, CRYPTO_EX_new *new_func, - CRYPTO_EX_dup *dup_func, CRYPTO_EX_free *free_func); - -int SSL_CTX_set_ex_data(SSL_CTX *ssl,int idx,void *data); -void *SSL_CTX_get_ex_data(const SSL_CTX *ssl,int idx); -int SSL_CTX_get_ex_new_index(long argl, void *argp, CRYPTO_EX_new *new_func, - CRYPTO_EX_dup *dup_func, CRYPTO_EX_free *free_func); - -int SSL_get_ex_data_X509_STORE_CTX_idx(void ); - -#define SSL_CTX_sess_set_cache_size(ctx,t) \ - SSL_CTX_ctrl(ctx,SSL_CTRL_SET_SESS_CACHE_SIZE,t,NULL) -#define SSL_CTX_sess_get_cache_size(ctx) \ - SSL_CTX_ctrl(ctx,SSL_CTRL_GET_SESS_CACHE_SIZE,0,NULL) -#define SSL_CTX_set_session_cache_mode(ctx,m) \ - SSL_CTX_ctrl(ctx,SSL_CTRL_SET_SESS_CACHE_MODE,m,NULL) -#define SSL_CTX_get_session_cache_mode(ctx) \ - SSL_CTX_ctrl(ctx,SSL_CTRL_GET_SESS_CACHE_MODE,0,NULL) - -#define SSL_CTX_get_default_read_ahead(ctx) SSL_CTX_get_read_ahead(ctx) -#define SSL_CTX_set_default_read_ahead(ctx,m) SSL_CTX_set_read_ahead(ctx,m) -#define SSL_CTX_get_read_ahead(ctx) \ - SSL_CTX_ctrl(ctx,SSL_CTRL_GET_READ_AHEAD,0,NULL) -#define SSL_CTX_set_read_ahead(ctx,m) \ - SSL_CTX_ctrl(ctx,SSL_CTRL_SET_READ_AHEAD,m,NULL) -#define SSL_CTX_get_max_cert_list(ctx) \ - SSL_CTX_ctrl(ctx,SSL_CTRL_GET_MAX_CERT_LIST,0,NULL) -#define SSL_CTX_set_max_cert_list(ctx,m) \ - SSL_CTX_ctrl(ctx,SSL_CTRL_SET_MAX_CERT_LIST,m,NULL) -#define SSL_get_max_cert_list(ssl) \ - SSL_ctrl(ssl,SSL_CTRL_GET_MAX_CERT_LIST,0,NULL) -#define SSL_set_max_cert_list(ssl,m) \ - SSL_ctrl(ssl,SSL_CTRL_SET_MAX_CERT_LIST,m,NULL) - -#define SSL_CTX_set_max_send_fragment(ctx,m) \ - SSL_CTX_ctrl(ctx,SSL_CTRL_SET_MAX_SEND_FRAGMENT,m,NULL) -#define SSL_set_max_send_fragment(ssl,m) \ - SSL_ctrl(ssl,SSL_CTRL_SET_MAX_SEND_FRAGMENT,m,NULL) - - /* NB: the keylength is only applicable when is_export is true */ -#ifndef OPENSSL_NO_RSA -void SSL_CTX_set_tmp_rsa_callback(SSL_CTX *ctx, - RSA *(*cb)(SSL *ssl,int is_export, - int keylength)); - -void SSL_set_tmp_rsa_callback(SSL *ssl, - RSA *(*cb)(SSL *ssl,int is_export, - int keylength)); -#endif -#ifndef OPENSSL_NO_DH -void SSL_CTX_set_tmp_dh_callback(SSL_CTX *ctx, - DH *(*dh)(SSL *ssl,int is_export, - int keylength)); -void SSL_set_tmp_dh_callback(SSL *ssl, - DH *(*dh)(SSL *ssl,int is_export, - int keylength)); -#endif -#ifndef OPENSSL_NO_ECDH -void SSL_CTX_set_tmp_ecdh_callback(SSL_CTX *ctx, - EC_KEY *(*ecdh)(SSL *ssl,int is_export, - int keylength)); -void SSL_set_tmp_ecdh_callback(SSL *ssl, - EC_KEY *(*ecdh)(SSL *ssl,int is_export, - int keylength)); -#endif - -#ifndef OPENSSL_NO_COMP -const COMP_METHOD *SSL_get_current_compression(SSL *s); -const COMP_METHOD *SSL_get_current_expansion(SSL *s); -const char *SSL_COMP_get_name(const COMP_METHOD *comp); -STACK_OF(SSL_COMP) *SSL_COMP_get_compression_methods(void); -int SSL_COMP_add_compression_method(int id,COMP_METHOD *cm); -#else -const void *SSL_get_current_compression(SSL *s); -const void *SSL_get_current_expansion(SSL *s); -const char *SSL_COMP_get_name(const void *comp); -void *SSL_COMP_get_compression_methods(void); -int SSL_COMP_add_compression_method(int id,void *cm); -#endif - -/* TLS extensions functions */ -int SSL_set_session_ticket_ext(SSL *s, void *ext_data, int ext_len); - -int SSL_set_session_ticket_ext_cb(SSL *s, tls_session_ticket_ext_cb_fn cb, - void *arg); - -/* Pre-shared secret session resumption functions */ -int SSL_set_session_secret_cb(SSL *s, tls_session_secret_cb_fn tls_session_secret_cb, void *arg); - -void SSL_set_debug(SSL *s, int debug); -int SSL_cache_hit(SSL *s); - -/* BEGIN ERROR CODES */ -/* The following lines are auto generated by the script mkerr.pl. Any changes - * made after this point may be overwritten when the script is next run. - */ -void ERR_load_SSL_strings(void); - -/* Error codes for the SSL functions. */ - -/* Function codes. */ -#define SSL_F_CLIENT_CERTIFICATE 100 -#define SSL_F_CLIENT_FINISHED 167 -#define SSL_F_CLIENT_HELLO 101 -#define SSL_F_CLIENT_MASTER_KEY 102 -#define SSL_F_D2I_SSL_SESSION 103 -#define SSL_F_DO_DTLS1_WRITE 245 -#define SSL_F_DO_SSL3_WRITE 104 -#define SSL_F_DTLS1_ACCEPT 246 -#define SSL_F_DTLS1_ADD_CERT_TO_BUF 295 -#define SSL_F_DTLS1_BUFFER_RECORD 247 -#define SSL_F_DTLS1_CHECK_TIMEOUT_NUM 316 -#define SSL_F_DTLS1_CLIENT_HELLO 248 -#define SSL_F_DTLS1_CONNECT 249 -#define SSL_F_DTLS1_ENC 250 -#define SSL_F_DTLS1_GET_HELLO_VERIFY 251 -#define SSL_F_DTLS1_GET_MESSAGE 252 -#define SSL_F_DTLS1_GET_MESSAGE_FRAGMENT 253 -#define SSL_F_DTLS1_GET_RECORD 254 -#define SSL_F_DTLS1_HANDLE_TIMEOUT 297 -#define SSL_F_DTLS1_HEARTBEAT 305 -#define SSL_F_DTLS1_OUTPUT_CERT_CHAIN 255 -#define SSL_F_DTLS1_PREPROCESS_FRAGMENT 288 -#define SSL_F_DTLS1_PROCESS_OUT_OF_SEQ_MESSAGE 256 -#define SSL_F_DTLS1_PROCESS_RECORD 257 -#define SSL_F_DTLS1_READ_BYTES 258 -#define SSL_F_DTLS1_READ_FAILED 259 -#define SSL_F_DTLS1_SEND_CERTIFICATE_REQUEST 260 -#define SSL_F_DTLS1_SEND_CLIENT_CERTIFICATE 261 -#define SSL_F_DTLS1_SEND_CLIENT_KEY_EXCHANGE 262 -#define SSL_F_DTLS1_SEND_CLIENT_VERIFY 263 -#define SSL_F_DTLS1_SEND_HELLO_VERIFY_REQUEST 264 -#define SSL_F_DTLS1_SEND_SERVER_CERTIFICATE 265 -#define SSL_F_DTLS1_SEND_SERVER_HELLO 266 -#define SSL_F_DTLS1_SEND_SERVER_KEY_EXCHANGE 267 -#define SSL_F_DTLS1_WRITE_APP_DATA_BYTES 268 -#define SSL_F_GET_CLIENT_FINISHED 105 -#define SSL_F_GET_CLIENT_HELLO 106 -#define SSL_F_GET_CLIENT_MASTER_KEY 107 -#define SSL_F_GET_SERVER_FINISHED 108 -#define SSL_F_GET_SERVER_HELLO 109 -#define SSL_F_GET_SERVER_VERIFY 110 -#define SSL_F_I2D_SSL_SESSION 111 -#define SSL_F_READ_N 112 -#define SSL_F_REQUEST_CERTIFICATE 113 -#define SSL_F_SERVER_FINISH 239 -#define SSL_F_SERVER_HELLO 114 -#define SSL_F_SERVER_VERIFY 240 -#define SSL_F_SSL23_ACCEPT 115 -#define SSL_F_SSL23_CLIENT_HELLO 116 -#define SSL_F_SSL23_CONNECT 117 -#define SSL_F_SSL23_GET_CLIENT_HELLO 118 -#define SSL_F_SSL23_GET_SERVER_HELLO 119 -#define SSL_F_SSL23_PEEK 237 -#define SSL_F_SSL23_READ 120 -#define SSL_F_SSL23_WRITE 121 -#define SSL_F_SSL2_ACCEPT 122 -#define SSL_F_SSL2_CONNECT 123 -#define SSL_F_SSL2_ENC_INIT 124 -#define SSL_F_SSL2_GENERATE_KEY_MATERIAL 241 -#define SSL_F_SSL2_PEEK 234 -#define SSL_F_SSL2_READ 125 -#define SSL_F_SSL2_READ_INTERNAL 236 -#define SSL_F_SSL2_SET_CERTIFICATE 126 -#define SSL_F_SSL2_WRITE 127 -#define SSL_F_SSL3_ACCEPT 128 -#define SSL_F_SSL3_ADD_CERT_TO_BUF 296 -#define SSL_F_SSL3_CALLBACK_CTRL 233 -#define SSL_F_SSL3_CHANGE_CIPHER_STATE 129 -#define SSL_F_SSL3_CHECK_CERT_AND_ALGORITHM 130 -#define SSL_F_SSL3_CHECK_CLIENT_HELLO 304 -#define SSL_F_SSL3_CLIENT_HELLO 131 -#define SSL_F_SSL3_CONNECT 132 -#define SSL_F_SSL3_CTRL 213 -#define SSL_F_SSL3_CTX_CTRL 133 -#define SSL_F_SSL3_DIGEST_CACHED_RECORDS 293 -#define SSL_F_SSL3_DO_CHANGE_CIPHER_SPEC 292 -#define SSL_F_SSL3_ENC 134 -#define SSL_F_SSL3_GENERATE_KEY_BLOCK 238 -#define SSL_F_SSL3_GET_CERTIFICATE_REQUEST 135 -#define SSL_F_SSL3_GET_CERT_STATUS 289 -#define SSL_F_SSL3_GET_CERT_VERIFY 136 -#define SSL_F_SSL3_GET_CLIENT_CERTIFICATE 137 -#define SSL_F_SSL3_GET_CLIENT_HELLO 138 -#define SSL_F_SSL3_GET_CLIENT_KEY_EXCHANGE 139 -#define SSL_F_SSL3_GET_FINISHED 140 -#define SSL_F_SSL3_GET_KEY_EXCHANGE 141 -#define SSL_F_SSL3_GET_MESSAGE 142 -#define SSL_F_SSL3_GET_NEW_SESSION_TICKET 283 -#define SSL_F_SSL3_GET_NEXT_PROTO 306 -#define SSL_F_SSL3_GET_RECORD 143 -#define SSL_F_SSL3_GET_SERVER_CERTIFICATE 144 -#define SSL_F_SSL3_GET_SERVER_DONE 145 -#define SSL_F_SSL3_GET_SERVER_HELLO 146 -#define SSL_F_SSL3_HANDSHAKE_MAC 285 -#define SSL_F_SSL3_NEW_SESSION_TICKET 287 -#define SSL_F_SSL3_OUTPUT_CERT_CHAIN 147 -#define SSL_F_SSL3_PEEK 235 -#define SSL_F_SSL3_READ_BYTES 148 -#define SSL_F_SSL3_READ_N 149 -#define SSL_F_SSL3_SEND_CERTIFICATE_REQUEST 150 -#define SSL_F_SSL3_SEND_CLIENT_CERTIFICATE 151 -#define SSL_F_SSL3_SEND_CLIENT_KEY_EXCHANGE 152 -#define SSL_F_SSL3_SEND_CLIENT_VERIFY 153 -#define SSL_F_SSL3_SEND_SERVER_CERTIFICATE 154 -#define SSL_F_SSL3_SEND_SERVER_HELLO 242 -#define SSL_F_SSL3_SEND_SERVER_KEY_EXCHANGE 155 -#define SSL_F_SSL3_SETUP_KEY_BLOCK 157 -#define SSL_F_SSL3_SETUP_READ_BUFFER 156 -#define SSL_F_SSL3_SETUP_WRITE_BUFFER 291 -#define SSL_F_SSL3_WRITE_BYTES 158 -#define SSL_F_SSL3_WRITE_PENDING 159 -#define SSL_F_SSL_ADD_CLIENTHELLO_RENEGOTIATE_EXT 298 -#define SSL_F_SSL_ADD_CLIENTHELLO_TLSEXT 277 -#define SSL_F_SSL_ADD_CLIENTHELLO_USE_SRTP_EXT 307 -#define SSL_F_SSL_ADD_DIR_CERT_SUBJECTS_TO_STACK 215 -#define SSL_F_SSL_ADD_FILE_CERT_SUBJECTS_TO_STACK 216 -#define SSL_F_SSL_ADD_SERVERHELLO_RENEGOTIATE_EXT 299 -#define SSL_F_SSL_ADD_SERVERHELLO_TLSEXT 278 -#define SSL_F_SSL_ADD_SERVERHELLO_USE_SRTP_EXT 308 -#define SSL_F_SSL_BAD_METHOD 160 -#define SSL_F_SSL_BYTES_TO_CIPHER_LIST 161 -#define SSL_F_SSL_CERT_DUP 221 -#define SSL_F_SSL_CERT_INST 222 -#define SSL_F_SSL_CERT_INSTANTIATE 214 -#define SSL_F_SSL_CERT_NEW 162 -#define SSL_F_SSL_CHECK_PRIVATE_KEY 163 -#define SSL_F_SSL_CHECK_SERVERHELLO_TLSEXT 280 -#define SSL_F_SSL_CHECK_SRVR_ECC_CERT_AND_ALG 279 -#define SSL_F_SSL_CIPHER_PROCESS_RULESTR 230 -#define SSL_F_SSL_CIPHER_STRENGTH_SORT 231 -#define SSL_F_SSL_CLEAR 164 -#define SSL_F_SSL_COMP_ADD_COMPRESSION_METHOD 165 -#define SSL_F_SSL_CREATE_CIPHER_LIST 166 -#define SSL_F_SSL_CTRL 232 -#define SSL_F_SSL_CTX_CHECK_PRIVATE_KEY 168 -#define SSL_F_SSL_CTX_MAKE_PROFILES 309 -#define SSL_F_SSL_CTX_NEW 169 -#define SSL_F_SSL_CTX_SET_CIPHER_LIST 269 -#define SSL_F_SSL_CTX_SET_CLIENT_CERT_ENGINE 290 -#define SSL_F_SSL_CTX_SET_PURPOSE 226 -#define SSL_F_SSL_CTX_SET_SESSION_ID_CONTEXT 219 -#define SSL_F_SSL_CTX_SET_SSL_VERSION 170 -#define SSL_F_SSL_CTX_SET_TRUST 229 -#define SSL_F_SSL_CTX_USE_CERTIFICATE 171 -#define SSL_F_SSL_CTX_USE_CERTIFICATE_ASN1 172 -#define SSL_F_SSL_CTX_USE_CERTIFICATE_CHAIN_FILE 220 -#define SSL_F_SSL_CTX_USE_CERTIFICATE_FILE 173 -#define SSL_F_SSL_CTX_USE_PRIVATEKEY 174 -#define SSL_F_SSL_CTX_USE_PRIVATEKEY_ASN1 175 -#define SSL_F_SSL_CTX_USE_PRIVATEKEY_FILE 176 -#define SSL_F_SSL_CTX_USE_PSK_IDENTITY_HINT 272 -#define SSL_F_SSL_CTX_USE_RSAPRIVATEKEY 177 -#define SSL_F_SSL_CTX_USE_RSAPRIVATEKEY_ASN1 178 -#define SSL_F_SSL_CTX_USE_RSAPRIVATEKEY_FILE 179 -#define SSL_F_SSL_DO_HANDSHAKE 180 -#define SSL_F_SSL_GET_NEW_SESSION 181 -#define SSL_F_SSL_GET_PREV_SESSION 217 -#define SSL_F_SSL_GET_SERVER_SEND_CERT 182 -#define SSL_F_SSL_GET_SERVER_SEND_PKEY 317 -#define SSL_F_SSL_GET_SIGN_PKEY 183 -#define SSL_F_SSL_INIT_WBIO_BUFFER 184 -#define SSL_F_SSL_LOAD_CLIENT_CA_FILE 185 -#define SSL_F_SSL_NEW 186 -#define SSL_F_SSL_PARSE_CLIENTHELLO_RENEGOTIATE_EXT 300 -#define SSL_F_SSL_PARSE_CLIENTHELLO_TLSEXT 302 -#define SSL_F_SSL_PARSE_CLIENTHELLO_USE_SRTP_EXT 310 -#define SSL_F_SSL_PARSE_SERVERHELLO_RENEGOTIATE_EXT 301 -#define SSL_F_SSL_PARSE_SERVERHELLO_TLSEXT 303 -#define SSL_F_SSL_PARSE_SERVERHELLO_USE_SRTP_EXT 311 -#define SSL_F_SSL_PEEK 270 -#define SSL_F_SSL_PREPARE_CLIENTHELLO_TLSEXT 281 -#define SSL_F_SSL_PREPARE_SERVERHELLO_TLSEXT 282 -#define SSL_F_SSL_READ 223 -#define SSL_F_SSL_RSA_PRIVATE_DECRYPT 187 -#define SSL_F_SSL_RSA_PUBLIC_ENCRYPT 188 -#define SSL_F_SSL_SESSION_NEW 189 -#define SSL_F_SSL_SESSION_PRINT_FP 190 -#define SSL_F_SSL_SESSION_SET1_ID_CONTEXT 312 -#define SSL_F_SSL_SESS_CERT_NEW 225 -#define SSL_F_SSL_SET_CERT 191 -#define SSL_F_SSL_SET_CIPHER_LIST 271 -#define SSL_F_SSL_SET_FD 192 -#define SSL_F_SSL_SET_PKEY 193 -#define SSL_F_SSL_SET_PURPOSE 227 -#define SSL_F_SSL_SET_RFD 194 -#define SSL_F_SSL_SET_SESSION 195 -#define SSL_F_SSL_SET_SESSION_ID_CONTEXT 218 -#define SSL_F_SSL_SET_SESSION_TICKET_EXT 294 -#define SSL_F_SSL_SET_TRUST 228 -#define SSL_F_SSL_SET_WFD 196 -#define SSL_F_SSL_SHUTDOWN 224 -#define SSL_F_SSL_SRP_CTX_INIT 313 -#define SSL_F_SSL_UNDEFINED_CONST_FUNCTION 243 -#define SSL_F_SSL_UNDEFINED_FUNCTION 197 -#define SSL_F_SSL_UNDEFINED_VOID_FUNCTION 244 -#define SSL_F_SSL_USE_CERTIFICATE 198 -#define SSL_F_SSL_USE_CERTIFICATE_ASN1 199 -#define SSL_F_SSL_USE_CERTIFICATE_FILE 200 -#define SSL_F_SSL_USE_PRIVATEKEY 201 -#define SSL_F_SSL_USE_PRIVATEKEY_ASN1 202 -#define SSL_F_SSL_USE_PRIVATEKEY_FILE 203 -#define SSL_F_SSL_USE_PSK_IDENTITY_HINT 273 -#define SSL_F_SSL_USE_RSAPRIVATEKEY 204 -#define SSL_F_SSL_USE_RSAPRIVATEKEY_ASN1 205 -#define SSL_F_SSL_USE_RSAPRIVATEKEY_FILE 206 -#define SSL_F_SSL_VERIFY_CERT_CHAIN 207 -#define SSL_F_SSL_WRITE 208 -#define SSL_F_TLS1_CERT_VERIFY_MAC 286 -#define SSL_F_TLS1_CHANGE_CIPHER_STATE 209 -#define SSL_F_TLS1_CHECK_SERVERHELLO_TLSEXT 274 -#define SSL_F_TLS1_ENC 210 -#define SSL_F_TLS1_EXPORT_KEYING_MATERIAL 314 -#define SSL_F_TLS1_HEARTBEAT 315 -#define SSL_F_TLS1_PREPARE_CLIENTHELLO_TLSEXT 275 -#define SSL_F_TLS1_PREPARE_SERVERHELLO_TLSEXT 276 -#define SSL_F_TLS1_PRF 284 -#define SSL_F_TLS1_SETUP_KEY_BLOCK 211 -#define SSL_F_WRITE_PENDING 212 - -/* Reason codes. */ -#define SSL_R_APP_DATA_IN_HANDSHAKE 100 -#define SSL_R_ATTEMPT_TO_REUSE_SESSION_IN_DIFFERENT_CONTEXT 272 -#define SSL_R_BAD_ALERT_RECORD 101 -#define SSL_R_BAD_AUTHENTICATION_TYPE 102 -#define SSL_R_BAD_CHANGE_CIPHER_SPEC 103 -#define SSL_R_BAD_CHECKSUM 104 -#define SSL_R_BAD_DATA_RETURNED_BY_CALLBACK 106 -#define SSL_R_BAD_DECOMPRESSION 107 -#define SSL_R_BAD_DH_G_LENGTH 108 -#define SSL_R_BAD_DH_PUB_KEY_LENGTH 109 -#define SSL_R_BAD_DH_P_LENGTH 110 -#define SSL_R_BAD_DIGEST_LENGTH 111 -#define SSL_R_BAD_DSA_SIGNATURE 112 -#define SSL_R_BAD_ECC_CERT 304 -#define SSL_R_BAD_ECDSA_SIGNATURE 305 -#define SSL_R_BAD_ECPOINT 306 -#define SSL_R_BAD_HANDSHAKE_LENGTH 332 -#define SSL_R_BAD_HELLO_REQUEST 105 -#define SSL_R_BAD_LENGTH 271 -#define SSL_R_BAD_MAC_DECODE 113 -#define SSL_R_BAD_MAC_LENGTH 333 -#define SSL_R_BAD_MESSAGE_TYPE 114 -#define SSL_R_BAD_PACKET_LENGTH 115 -#define SSL_R_BAD_PROTOCOL_VERSION_NUMBER 116 -#define SSL_R_BAD_PSK_IDENTITY_HINT_LENGTH 316 -#define SSL_R_BAD_RESPONSE_ARGUMENT 117 -#define SSL_R_BAD_RSA_DECRYPT 118 -#define SSL_R_BAD_RSA_ENCRYPT 119 -#define SSL_R_BAD_RSA_E_LENGTH 120 -#define SSL_R_BAD_RSA_MODULUS_LENGTH 121 -#define SSL_R_BAD_RSA_SIGNATURE 122 -#define SSL_R_BAD_SIGNATURE 123 -#define SSL_R_BAD_SRP_A_LENGTH 347 -#define SSL_R_BAD_SRP_B_LENGTH 348 -#define SSL_R_BAD_SRP_G_LENGTH 349 -#define SSL_R_BAD_SRP_N_LENGTH 350 -#define SSL_R_BAD_SRP_S_LENGTH 351 -#define SSL_R_BAD_SRTP_MKI_VALUE 352 -#define SSL_R_BAD_SRTP_PROTECTION_PROFILE_LIST 353 -#define SSL_R_BAD_SSL_FILETYPE 124 -#define SSL_R_BAD_SSL_SESSION_ID_LENGTH 125 -#define SSL_R_BAD_STATE 126 -#define SSL_R_BAD_WRITE_RETRY 127 -#define SSL_R_BIO_NOT_SET 128 -#define SSL_R_BLOCK_CIPHER_PAD_IS_WRONG 129 -#define SSL_R_BN_LIB 130 -#define SSL_R_CA_DN_LENGTH_MISMATCH 131 -#define SSL_R_CA_DN_TOO_LONG 132 -#define SSL_R_CCS_RECEIVED_EARLY 133 -#define SSL_R_CERTIFICATE_VERIFY_FAILED 134 -#define SSL_R_CERT_LENGTH_MISMATCH 135 -#define SSL_R_CHALLENGE_IS_DIFFERENT 136 -#define SSL_R_CIPHER_CODE_WRONG_LENGTH 137 -#define SSL_R_CIPHER_OR_HASH_UNAVAILABLE 138 -#define SSL_R_CIPHER_TABLE_SRC_ERROR 139 -#define SSL_R_CLIENTHELLO_TLSEXT 226 -#define SSL_R_COMPRESSED_LENGTH_TOO_LONG 140 -#define SSL_R_COMPRESSION_DISABLED 343 -#define SSL_R_COMPRESSION_FAILURE 141 -#define SSL_R_COMPRESSION_ID_NOT_WITHIN_PRIVATE_RANGE 307 -#define SSL_R_COMPRESSION_LIBRARY_ERROR 142 -#define SSL_R_CONNECTION_ID_IS_DIFFERENT 143 -#define SSL_R_CONNECTION_TYPE_NOT_SET 144 -#define SSL_R_COOKIE_MISMATCH 308 -#define SSL_R_DATA_BETWEEN_CCS_AND_FINISHED 145 -#define SSL_R_DATA_LENGTH_TOO_LONG 146 -#define SSL_R_DECRYPTION_FAILED 147 -#define SSL_R_DECRYPTION_FAILED_OR_BAD_RECORD_MAC 281 -#define SSL_R_DH_PUBLIC_VALUE_LENGTH_IS_WRONG 148 -#define SSL_R_DIGEST_CHECK_FAILED 149 -#define SSL_R_DTLS_MESSAGE_TOO_BIG 334 -#define SSL_R_DUPLICATE_COMPRESSION_ID 309 -#define SSL_R_ECC_CERT_NOT_FOR_KEY_AGREEMENT 317 -#define SSL_R_ECC_CERT_NOT_FOR_SIGNING 318 -#define SSL_R_ECC_CERT_SHOULD_HAVE_RSA_SIGNATURE 322 -#define SSL_R_ECC_CERT_SHOULD_HAVE_SHA1_SIGNATURE 323 -#define SSL_R_ECGROUP_TOO_LARGE_FOR_CIPHER 310 -#define SSL_R_EMPTY_SRTP_PROTECTION_PROFILE_LIST 354 -#define SSL_R_ENCRYPTED_LENGTH_TOO_LONG 150 -#define SSL_R_ERROR_GENERATING_TMP_RSA_KEY 282 -#define SSL_R_ERROR_IN_RECEIVED_CIPHER_LIST 151 -#define SSL_R_EXCESSIVE_MESSAGE_SIZE 152 -#define SSL_R_EXTRA_DATA_IN_MESSAGE 153 -#define SSL_R_GOT_A_FIN_BEFORE_A_CCS 154 -#define SSL_R_GOT_NEXT_PROTO_BEFORE_A_CCS 355 -#define SSL_R_GOT_NEXT_PROTO_WITHOUT_EXTENSION 356 -#define SSL_R_HTTPS_PROXY_REQUEST 155 -#define SSL_R_HTTP_REQUEST 156 -#define SSL_R_ILLEGAL_PADDING 283 -#define SSL_R_INCONSISTENT_COMPRESSION 340 -#define SSL_R_INVALID_CHALLENGE_LENGTH 158 -#define SSL_R_INVALID_COMMAND 280 -#define SSL_R_INVALID_COMPRESSION_ALGORITHM 341 -#define SSL_R_INVALID_PURPOSE 278 -#define SSL_R_INVALID_SRP_USERNAME 357 -#define SSL_R_INVALID_STATUS_RESPONSE 328 -#define SSL_R_INVALID_TICKET_KEYS_LENGTH 325 -#define SSL_R_INVALID_TRUST 279 -#define SSL_R_KEY_ARG_TOO_LONG 284 -#define SSL_R_KRB5 285 -#define SSL_R_KRB5_C_CC_PRINC 286 -#define SSL_R_KRB5_C_GET_CRED 287 -#define SSL_R_KRB5_C_INIT 288 -#define SSL_R_KRB5_C_MK_REQ 289 -#define SSL_R_KRB5_S_BAD_TICKET 290 -#define SSL_R_KRB5_S_INIT 291 -#define SSL_R_KRB5_S_RD_REQ 292 -#define SSL_R_KRB5_S_TKT_EXPIRED 293 -#define SSL_R_KRB5_S_TKT_NYV 294 -#define SSL_R_KRB5_S_TKT_SKEW 295 -#define SSL_R_LENGTH_MISMATCH 159 -#define SSL_R_LENGTH_TOO_SHORT 160 -#define SSL_R_LIBRARY_BUG 274 -#define SSL_R_LIBRARY_HAS_NO_CIPHERS 161 -#define SSL_R_MESSAGE_TOO_LONG 296 -#define SSL_R_MISSING_DH_DSA_CERT 162 -#define SSL_R_MISSING_DH_KEY 163 -#define SSL_R_MISSING_DH_RSA_CERT 164 -#define SSL_R_MISSING_DSA_SIGNING_CERT 165 -#define SSL_R_MISSING_EXPORT_TMP_DH_KEY 166 -#define SSL_R_MISSING_EXPORT_TMP_RSA_KEY 167 -#define SSL_R_MISSING_RSA_CERTIFICATE 168 -#define SSL_R_MISSING_RSA_ENCRYPTING_CERT 169 -#define SSL_R_MISSING_RSA_SIGNING_CERT 170 -#define SSL_R_MISSING_SRP_PARAM 358 -#define SSL_R_MISSING_TMP_DH_KEY 171 -#define SSL_R_MISSING_TMP_ECDH_KEY 311 -#define SSL_R_MISSING_TMP_RSA_KEY 172 -#define SSL_R_MISSING_TMP_RSA_PKEY 173 -#define SSL_R_MISSING_VERIFY_MESSAGE 174 -#define SSL_R_MULTIPLE_SGC_RESTARTS 346 -#define SSL_R_NON_SSLV2_INITIAL_PACKET 175 -#define SSL_R_NO_CERTIFICATES_RETURNED 176 -#define SSL_R_NO_CERTIFICATE_ASSIGNED 177 -#define SSL_R_NO_CERTIFICATE_RETURNED 178 -#define SSL_R_NO_CERTIFICATE_SET 179 -#define SSL_R_NO_CERTIFICATE_SPECIFIED 180 -#define SSL_R_NO_CIPHERS_AVAILABLE 181 -#define SSL_R_NO_CIPHERS_PASSED 182 -#define SSL_R_NO_CIPHERS_SPECIFIED 183 -#define SSL_R_NO_CIPHER_LIST 184 -#define SSL_R_NO_CIPHER_MATCH 185 -#define SSL_R_NO_CLIENT_CERT_METHOD 331 -#define SSL_R_NO_CLIENT_CERT_RECEIVED 186 -#define SSL_R_NO_COMPRESSION_SPECIFIED 187 -#define SSL_R_NO_GOST_CERTIFICATE_SENT_BY_PEER 330 -#define SSL_R_NO_METHOD_SPECIFIED 188 -#define SSL_R_NO_PRIVATEKEY 189 -#define SSL_R_NO_PRIVATE_KEY_ASSIGNED 190 -#define SSL_R_NO_PROTOCOLS_AVAILABLE 191 -#define SSL_R_NO_PUBLICKEY 192 -#define SSL_R_NO_RENEGOTIATION 339 -#define SSL_R_NO_REQUIRED_DIGEST 324 -#define SSL_R_NO_SHARED_CIPHER 193 -#define SSL_R_NO_SRTP_PROFILES 359 -#define SSL_R_NO_VERIFY_CALLBACK 194 -#define SSL_R_NULL_SSL_CTX 195 -#define SSL_R_NULL_SSL_METHOD_PASSED 196 -#define SSL_R_OLD_SESSION_CIPHER_NOT_RETURNED 197 -#define SSL_R_OLD_SESSION_COMPRESSION_ALGORITHM_NOT_RETURNED 344 -#define SSL_R_ONLY_TLS_ALLOWED_IN_FIPS_MODE 297 -#define SSL_R_OPAQUE_PRF_INPUT_TOO_LONG 327 -#define SSL_R_PACKET_LENGTH_TOO_LONG 198 -#define SSL_R_PARSE_TLSEXT 227 -#define SSL_R_PATH_TOO_LONG 270 -#define SSL_R_PEER_DID_NOT_RETURN_A_CERTIFICATE 199 -#define SSL_R_PEER_ERROR 200 -#define SSL_R_PEER_ERROR_CERTIFICATE 201 -#define SSL_R_PEER_ERROR_NO_CERTIFICATE 202 -#define SSL_R_PEER_ERROR_NO_CIPHER 203 -#define SSL_R_PEER_ERROR_UNSUPPORTED_CERTIFICATE_TYPE 204 -#define SSL_R_PRE_MAC_LENGTH_TOO_LONG 205 -#define SSL_R_PROBLEMS_MAPPING_CIPHER_FUNCTIONS 206 -#define SSL_R_PROTOCOL_IS_SHUTDOWN 207 -#define SSL_R_PSK_IDENTITY_NOT_FOUND 223 -#define SSL_R_PSK_NO_CLIENT_CB 224 -#define SSL_R_PSK_NO_SERVER_CB 225 -#define SSL_R_PUBLIC_KEY_ENCRYPT_ERROR 208 -#define SSL_R_PUBLIC_KEY_IS_NOT_RSA 209 -#define SSL_R_PUBLIC_KEY_NOT_RSA 210 -#define SSL_R_READ_BIO_NOT_SET 211 -#define SSL_R_READ_TIMEOUT_EXPIRED 312 -#define SSL_R_READ_WRONG_PACKET_TYPE 212 -#define SSL_R_RECORD_LENGTH_MISMATCH 213 -#define SSL_R_RECORD_TOO_LARGE 214 -#define SSL_R_RECORD_TOO_SMALL 298 -#define SSL_R_RENEGOTIATE_EXT_TOO_LONG 335 -#define SSL_R_RENEGOTIATION_ENCODING_ERR 336 -#define SSL_R_RENEGOTIATION_MISMATCH 337 -#define SSL_R_REQUIRED_CIPHER_MISSING 215 -#define SSL_R_REQUIRED_COMPRESSSION_ALGORITHM_MISSING 342 -#define SSL_R_REUSE_CERT_LENGTH_NOT_ZERO 216 -#define SSL_R_REUSE_CERT_TYPE_NOT_ZERO 217 -#define SSL_R_REUSE_CIPHER_LIST_NOT_ZERO 218 -#define SSL_R_SCSV_RECEIVED_WHEN_RENEGOTIATING 345 -#define SSL_R_SERVERHELLO_TLSEXT 275 -#define SSL_R_SESSION_ID_CONTEXT_UNINITIALIZED 277 -#define SSL_R_SHORT_READ 219 -#define SSL_R_SIGNATURE_ALGORITHMS_ERROR 360 -#define SSL_R_SIGNATURE_FOR_NON_SIGNING_CERTIFICATE 220 -#define SSL_R_SRP_A_CALC 361 -#define SSL_R_SRTP_COULD_NOT_ALLOCATE_PROFILES 362 -#define SSL_R_SRTP_PROTECTION_PROFILE_LIST_TOO_LONG 363 -#define SSL_R_SRTP_UNKNOWN_PROTECTION_PROFILE 364 -#define SSL_R_SSL23_DOING_SESSION_ID_REUSE 221 -#define SSL_R_SSL2_CONNECTION_ID_TOO_LONG 299 -#define SSL_R_SSL3_EXT_INVALID_ECPOINTFORMAT 321 -#define SSL_R_SSL3_EXT_INVALID_SERVERNAME 319 -#define SSL_R_SSL3_EXT_INVALID_SERVERNAME_TYPE 320 -#define SSL_R_SSL3_SESSION_ID_TOO_LONG 300 -#define SSL_R_SSL3_SESSION_ID_TOO_SHORT 222 -#define SSL_R_SSLV3_ALERT_BAD_CERTIFICATE 1042 -#define SSL_R_SSLV3_ALERT_BAD_RECORD_MAC 1020 -#define SSL_R_SSLV3_ALERT_CERTIFICATE_EXPIRED 1045 -#define SSL_R_SSLV3_ALERT_CERTIFICATE_REVOKED 1044 -#define SSL_R_SSLV3_ALERT_CERTIFICATE_UNKNOWN 1046 -#define SSL_R_SSLV3_ALERT_DECOMPRESSION_FAILURE 1030 -#define SSL_R_SSLV3_ALERT_HANDSHAKE_FAILURE 1040 -#define SSL_R_SSLV3_ALERT_ILLEGAL_PARAMETER 1047 -#define SSL_R_SSLV3_ALERT_NO_CERTIFICATE 1041 -#define SSL_R_SSLV3_ALERT_UNEXPECTED_MESSAGE 1010 -#define SSL_R_SSLV3_ALERT_UNSUPPORTED_CERTIFICATE 1043 -#define SSL_R_SSL_CTX_HAS_NO_DEFAULT_SSL_VERSION 228 -#define SSL_R_SSL_HANDSHAKE_FAILURE 229 -#define SSL_R_SSL_LIBRARY_HAS_NO_CIPHERS 230 -#define SSL_R_SSL_SESSION_ID_CALLBACK_FAILED 301 -#define SSL_R_SSL_SESSION_ID_CONFLICT 302 -#define SSL_R_SSL_SESSION_ID_CONTEXT_TOO_LONG 273 -#define SSL_R_SSL_SESSION_ID_HAS_BAD_LENGTH 303 -#define SSL_R_SSL_SESSION_ID_IS_DIFFERENT 231 -#define SSL_R_TLSV1_ALERT_ACCESS_DENIED 1049 -#define SSL_R_TLSV1_ALERT_DECODE_ERROR 1050 -#define SSL_R_TLSV1_ALERT_DECRYPTION_FAILED 1021 -#define SSL_R_TLSV1_ALERT_DECRYPT_ERROR 1051 -#define SSL_R_TLSV1_ALERT_EXPORT_RESTRICTION 1060 -#define SSL_R_TLSV1_ALERT_INSUFFICIENT_SECURITY 1071 -#define SSL_R_TLSV1_ALERT_INTERNAL_ERROR 1080 -#define SSL_R_TLSV1_ALERT_NO_RENEGOTIATION 1100 -#define SSL_R_TLSV1_ALERT_PROTOCOL_VERSION 1070 -#define SSL_R_TLSV1_ALERT_RECORD_OVERFLOW 1022 -#define SSL_R_TLSV1_ALERT_UNKNOWN_CA 1048 -#define SSL_R_TLSV1_ALERT_USER_CANCELLED 1090 -#define SSL_R_TLSV1_BAD_CERTIFICATE_HASH_VALUE 1114 -#define SSL_R_TLSV1_BAD_CERTIFICATE_STATUS_RESPONSE 1113 -#define SSL_R_TLSV1_CERTIFICATE_UNOBTAINABLE 1111 -#define SSL_R_TLSV1_UNRECOGNIZED_NAME 1112 -#define SSL_R_TLSV1_UNSUPPORTED_EXTENSION 1110 -#define SSL_R_TLS_CLIENT_CERT_REQ_WITH_ANON_CIPHER 232 -#define SSL_R_TLS_HEARTBEAT_PEER_DOESNT_ACCEPT 365 -#define SSL_R_TLS_HEARTBEAT_PENDING 366 -#define SSL_R_TLS_ILLEGAL_EXPORTER_LABEL 367 -#define SSL_R_TLS_INVALID_ECPOINTFORMAT_LIST 157 -#define SSL_R_TLS_PEER_DID_NOT_RESPOND_WITH_CERTIFICATE_LIST 233 -#define SSL_R_TLS_RSA_ENCRYPTED_VALUE_LENGTH_IS_WRONG 234 -#define SSL_R_TRIED_TO_USE_UNSUPPORTED_CIPHER 235 -#define SSL_R_UNABLE_TO_DECODE_DH_CERTS 236 -#define SSL_R_UNABLE_TO_DECODE_ECDH_CERTS 313 -#define SSL_R_UNABLE_TO_EXTRACT_PUBLIC_KEY 237 -#define SSL_R_UNABLE_TO_FIND_DH_PARAMETERS 238 -#define SSL_R_UNABLE_TO_FIND_ECDH_PARAMETERS 314 -#define SSL_R_UNABLE_TO_FIND_PUBLIC_KEY_PARAMETERS 239 -#define SSL_R_UNABLE_TO_FIND_SSL_METHOD 240 -#define SSL_R_UNABLE_TO_LOAD_SSL2_MD5_ROUTINES 241 -#define SSL_R_UNABLE_TO_LOAD_SSL3_MD5_ROUTINES 242 -#define SSL_R_UNABLE_TO_LOAD_SSL3_SHA1_ROUTINES 243 -#define SSL_R_UNEXPECTED_MESSAGE 244 -#define SSL_R_UNEXPECTED_RECORD 245 -#define SSL_R_UNINITIALIZED 276 -#define SSL_R_UNKNOWN_ALERT_TYPE 246 -#define SSL_R_UNKNOWN_CERTIFICATE_TYPE 247 -#define SSL_R_UNKNOWN_CIPHER_RETURNED 248 -#define SSL_R_UNKNOWN_CIPHER_TYPE 249 -#define SSL_R_UNKNOWN_DIGEST 368 -#define SSL_R_UNKNOWN_KEY_EXCHANGE_TYPE 250 -#define SSL_R_UNKNOWN_PKEY_TYPE 251 -#define SSL_R_UNKNOWN_PROTOCOL 252 -#define SSL_R_UNKNOWN_REMOTE_ERROR_TYPE 253 -#define SSL_R_UNKNOWN_SSL_VERSION 254 -#define SSL_R_UNKNOWN_STATE 255 -#define SSL_R_UNSAFE_LEGACY_RENEGOTIATION_DISABLED 338 -#define SSL_R_UNSUPPORTED_CIPHER 256 -#define SSL_R_UNSUPPORTED_COMPRESSION_ALGORITHM 257 -#define SSL_R_UNSUPPORTED_DIGEST_TYPE 326 -#define SSL_R_UNSUPPORTED_ELLIPTIC_CURVE 315 -#define SSL_R_UNSUPPORTED_PROTOCOL 258 -#define SSL_R_UNSUPPORTED_SSL_VERSION 259 -#define SSL_R_UNSUPPORTED_STATUS_TYPE 329 -#define SSL_R_USE_SRTP_NOT_NEGOTIATED 369 -#define SSL_R_WRITE_BIO_NOT_SET 260 -#define SSL_R_WRONG_CIPHER_RETURNED 261 -#define SSL_R_WRONG_MESSAGE_TYPE 262 -#define SSL_R_WRONG_NUMBER_OF_KEY_BITS 263 -#define SSL_R_WRONG_SIGNATURE_LENGTH 264 -#define SSL_R_WRONG_SIGNATURE_SIZE 265 -#define SSL_R_WRONG_SIGNATURE_TYPE 370 -#define SSL_R_WRONG_SSL_VERSION 266 -#define SSL_R_WRONG_VERSION_NUMBER 267 -#define SSL_R_X509_LIB 268 -#define SSL_R_X509_VERIFICATION_SETUP_PROBLEMS 269 - -#ifdef __cplusplus -} -#endif -#endif diff --git a/Pods/OpenSSL-Universal/include-osx/openssl/ssl2.h b/Pods/OpenSSL-Universal/include-osx/openssl/ssl2.h deleted file mode 100644 index eb25dcb0..00000000 --- a/Pods/OpenSSL-Universal/include-osx/openssl/ssl2.h +++ /dev/null @@ -1,272 +0,0 @@ -/* ssl/ssl2.h */ -/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) - * All rights reserved. - * - * This package is an SSL implementation written - * by Eric Young (eay@cryptsoft.com). - * The implementation was written so as to conform with Netscapes SSL. - * - * This library is free for commercial and non-commercial use as long as - * the following conditions are aheared to. The following conditions - * apply to all code found in this distribution, be it the RC4, RSA, - * lhash, DES, etc., code; not just the SSL code. The SSL documentation - * included with this distribution is covered by the same copyright terms - * except that the holder is Tim Hudson (tjh@cryptsoft.com). - * - * Copyright remains Eric Young's, and as such any Copyright notices in - * the code are not to be removed. - * If this package is used in a product, Eric Young should be given attribution - * as the author of the parts of the library used. - * This can be in the form of a textual message at program startup or - * in documentation (online or textual) provided with the package. - * - * Redistribution and use in source and binary forms, with or without - * modification, are permitted provided that the following conditions - * are met: - * 1. Redistributions of source code must retain the copyright - * notice, this list of conditions and the following disclaimer. - * 2. Redistributions in binary form must reproduce the above copyright - * notice, this list of conditions and the following disclaimer in the - * documentation and/or other materials provided with the distribution. - * 3. All advertising materials mentioning features or use of this software - * must display the following acknowledgement: - * "This product includes cryptographic software written by - * Eric Young (eay@cryptsoft.com)" - * The word 'cryptographic' can be left out if the rouines from the library - * being used are not cryptographic related :-). - * 4. If you include any Windows specific code (or a derivative thereof) from - * the apps directory (application code) you must include an acknowledgement: - * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" - * - * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND - * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE - * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE - * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE - * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL - * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS - * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) - * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT - * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY - * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF - * SUCH DAMAGE. - * - * The licence and distribution terms for any publically available version or - * derivative of this code cannot be changed. i.e. this code cannot simply be - * copied and put under another distribution licence - * [including the GNU Public Licence.] - */ - -#ifndef HEADER_SSL2_H -#define HEADER_SSL2_H - -#ifdef __cplusplus -extern "C" { -#endif - -/* Protocol Version Codes */ -#define SSL2_VERSION 0x0002 -#define SSL2_VERSION_MAJOR 0x00 -#define SSL2_VERSION_MINOR 0x02 -/* #define SSL2_CLIENT_VERSION 0x0002 */ -/* #define SSL2_SERVER_VERSION 0x0002 */ - -/* Protocol Message Codes */ -#define SSL2_MT_ERROR 0 -#define SSL2_MT_CLIENT_HELLO 1 -#define SSL2_MT_CLIENT_MASTER_KEY 2 -#define SSL2_MT_CLIENT_FINISHED 3 -#define SSL2_MT_SERVER_HELLO 4 -#define SSL2_MT_SERVER_VERIFY 5 -#define SSL2_MT_SERVER_FINISHED 6 -#define SSL2_MT_REQUEST_CERTIFICATE 7 -#define SSL2_MT_CLIENT_CERTIFICATE 8 - -/* Error Message Codes */ -#define SSL2_PE_UNDEFINED_ERROR 0x0000 -#define SSL2_PE_NO_CIPHER 0x0001 -#define SSL2_PE_NO_CERTIFICATE 0x0002 -#define SSL2_PE_BAD_CERTIFICATE 0x0004 -#define SSL2_PE_UNSUPPORTED_CERTIFICATE_TYPE 0x0006 - -/* Cipher Kind Values */ -#define SSL2_CK_NULL_WITH_MD5 0x02000000 /* v3 */ -#define SSL2_CK_RC4_128_WITH_MD5 0x02010080 -#define SSL2_CK_RC4_128_EXPORT40_WITH_MD5 0x02020080 -#define SSL2_CK_RC2_128_CBC_WITH_MD5 0x02030080 -#define SSL2_CK_RC2_128_CBC_EXPORT40_WITH_MD5 0x02040080 -#define SSL2_CK_IDEA_128_CBC_WITH_MD5 0x02050080 -#define SSL2_CK_DES_64_CBC_WITH_MD5 0x02060040 -#define SSL2_CK_DES_64_CBC_WITH_SHA 0x02060140 /* v3 */ -#define SSL2_CK_DES_192_EDE3_CBC_WITH_MD5 0x020700c0 -#define SSL2_CK_DES_192_EDE3_CBC_WITH_SHA 0x020701c0 /* v3 */ -#define SSL2_CK_RC4_64_WITH_MD5 0x02080080 /* MS hack */ - -#define SSL2_CK_DES_64_CFB64_WITH_MD5_1 0x02ff0800 /* SSLeay */ -#define SSL2_CK_NULL 0x02ff0810 /* SSLeay */ - -#define SSL2_TXT_DES_64_CFB64_WITH_MD5_1 "DES-CFB-M1" -#define SSL2_TXT_NULL_WITH_MD5 "NULL-MD5" -#define SSL2_TXT_RC4_128_WITH_MD5 "RC4-MD5" -#define SSL2_TXT_RC4_128_EXPORT40_WITH_MD5 "EXP-RC4-MD5" -#define SSL2_TXT_RC2_128_CBC_WITH_MD5 "RC2-CBC-MD5" -#define SSL2_TXT_RC2_128_CBC_EXPORT40_WITH_MD5 "EXP-RC2-CBC-MD5" -#define SSL2_TXT_IDEA_128_CBC_WITH_MD5 "IDEA-CBC-MD5" -#define SSL2_TXT_DES_64_CBC_WITH_MD5 "DES-CBC-MD5" -#define SSL2_TXT_DES_64_CBC_WITH_SHA "DES-CBC-SHA" -#define SSL2_TXT_DES_192_EDE3_CBC_WITH_MD5 "DES-CBC3-MD5" -#define SSL2_TXT_DES_192_EDE3_CBC_WITH_SHA "DES-CBC3-SHA" -#define SSL2_TXT_RC4_64_WITH_MD5 "RC4-64-MD5" - -#define SSL2_TXT_NULL "NULL" - -/* Flags for the SSL_CIPHER.algorithm2 field */ -#define SSL2_CF_5_BYTE_ENC 0x01 -#define SSL2_CF_8_BYTE_ENC 0x02 - -/* Certificate Type Codes */ -#define SSL2_CT_X509_CERTIFICATE 0x01 - -/* Authentication Type Code */ -#define SSL2_AT_MD5_WITH_RSA_ENCRYPTION 0x01 - -#define SSL2_MAX_SSL_SESSION_ID_LENGTH 32 - -/* Upper/Lower Bounds */ -#define SSL2_MAX_MASTER_KEY_LENGTH_IN_BITS 256 -#ifdef OPENSSL_SYS_MPE -#define SSL2_MAX_RECORD_LENGTH_2_BYTE_HEADER 29998u -#else -#define SSL2_MAX_RECORD_LENGTH_2_BYTE_HEADER 32767u /* 2^15-1 */ -#endif -#define SSL2_MAX_RECORD_LENGTH_3_BYTE_HEADER 16383 /* 2^14-1 */ - -#define SSL2_CHALLENGE_LENGTH 16 -/*#define SSL2_CHALLENGE_LENGTH 32 */ -#define SSL2_MIN_CHALLENGE_LENGTH 16 -#define SSL2_MAX_CHALLENGE_LENGTH 32 -#define SSL2_CONNECTION_ID_LENGTH 16 -#define SSL2_MAX_CONNECTION_ID_LENGTH 16 -#define SSL2_SSL_SESSION_ID_LENGTH 16 -#define SSL2_MAX_CERT_CHALLENGE_LENGTH 32 -#define SSL2_MIN_CERT_CHALLENGE_LENGTH 16 -#define SSL2_MAX_KEY_MATERIAL_LENGTH 24 - -#ifndef HEADER_SSL_LOCL_H -#define CERT char -#endif - -#ifndef OPENSSL_NO_SSL_INTERN - -typedef struct ssl2_state_st - { - int three_byte_header; - int clear_text; /* clear text */ - int escape; /* not used in SSLv2 */ - int ssl2_rollback; /* used if SSLv23 rolled back to SSLv2 */ - - /* non-blocking io info, used to make sure the same - * args were passwd */ - unsigned int wnum; /* number of bytes sent so far */ - int wpend_tot; - const unsigned char *wpend_buf; - - int wpend_off; /* offset to data to write */ - int wpend_len; /* number of bytes passwd to write */ - int wpend_ret; /* number of bytes to return to caller */ - - /* buffer raw data */ - int rbuf_left; - int rbuf_offs; - unsigned char *rbuf; - unsigned char *wbuf; - - unsigned char *write_ptr;/* used to point to the start due to - * 2/3 byte header. */ - - unsigned int padding; - unsigned int rlength; /* passed to ssl2_enc */ - int ract_data_length; /* Set when things are encrypted. */ - unsigned int wlength; /* passed to ssl2_enc */ - int wact_data_length; /* Set when things are decrypted. */ - unsigned char *ract_data; - unsigned char *wact_data; - unsigned char *mac_data; - - unsigned char *read_key; - unsigned char *write_key; - - /* Stuff specifically to do with this SSL session */ - unsigned int challenge_length; - unsigned char challenge[SSL2_MAX_CHALLENGE_LENGTH]; - unsigned int conn_id_length; - unsigned char conn_id[SSL2_MAX_CONNECTION_ID_LENGTH]; - unsigned int key_material_length; - unsigned char key_material[SSL2_MAX_KEY_MATERIAL_LENGTH*2]; - - unsigned long read_sequence; - unsigned long write_sequence; - - struct { - unsigned int conn_id_length; - unsigned int cert_type; - unsigned int cert_length; - unsigned int csl; - unsigned int clear; - unsigned int enc; - unsigned char ccl[SSL2_MAX_CERT_CHALLENGE_LENGTH]; - unsigned int cipher_spec_length; - unsigned int session_id_length; - unsigned int clen; - unsigned int rlen; - } tmp; - } SSL2_STATE; - -#endif - -/* SSLv2 */ -/* client */ -#define SSL2_ST_SEND_CLIENT_HELLO_A (0x10|SSL_ST_CONNECT) -#define SSL2_ST_SEND_CLIENT_HELLO_B (0x11|SSL_ST_CONNECT) -#define SSL2_ST_GET_SERVER_HELLO_A (0x20|SSL_ST_CONNECT) -#define SSL2_ST_GET_SERVER_HELLO_B (0x21|SSL_ST_CONNECT) -#define SSL2_ST_SEND_CLIENT_MASTER_KEY_A (0x30|SSL_ST_CONNECT) -#define SSL2_ST_SEND_CLIENT_MASTER_KEY_B (0x31|SSL_ST_CONNECT) -#define SSL2_ST_SEND_CLIENT_FINISHED_A (0x40|SSL_ST_CONNECT) -#define SSL2_ST_SEND_CLIENT_FINISHED_B (0x41|SSL_ST_CONNECT) -#define SSL2_ST_SEND_CLIENT_CERTIFICATE_A (0x50|SSL_ST_CONNECT) -#define SSL2_ST_SEND_CLIENT_CERTIFICATE_B (0x51|SSL_ST_CONNECT) -#define SSL2_ST_SEND_CLIENT_CERTIFICATE_C (0x52|SSL_ST_CONNECT) -#define SSL2_ST_SEND_CLIENT_CERTIFICATE_D (0x53|SSL_ST_CONNECT) -#define SSL2_ST_GET_SERVER_VERIFY_A (0x60|SSL_ST_CONNECT) -#define SSL2_ST_GET_SERVER_VERIFY_B (0x61|SSL_ST_CONNECT) -#define SSL2_ST_GET_SERVER_FINISHED_A (0x70|SSL_ST_CONNECT) -#define SSL2_ST_GET_SERVER_FINISHED_B (0x71|SSL_ST_CONNECT) -#define SSL2_ST_CLIENT_START_ENCRYPTION (0x80|SSL_ST_CONNECT) -#define SSL2_ST_X509_GET_CLIENT_CERTIFICATE (0x90|SSL_ST_CONNECT) -/* server */ -#define SSL2_ST_GET_CLIENT_HELLO_A (0x10|SSL_ST_ACCEPT) -#define SSL2_ST_GET_CLIENT_HELLO_B (0x11|SSL_ST_ACCEPT) -#define SSL2_ST_GET_CLIENT_HELLO_C (0x12|SSL_ST_ACCEPT) -#define SSL2_ST_SEND_SERVER_HELLO_A (0x20|SSL_ST_ACCEPT) -#define SSL2_ST_SEND_SERVER_HELLO_B (0x21|SSL_ST_ACCEPT) -#define SSL2_ST_GET_CLIENT_MASTER_KEY_A (0x30|SSL_ST_ACCEPT) -#define SSL2_ST_GET_CLIENT_MASTER_KEY_B (0x31|SSL_ST_ACCEPT) -#define SSL2_ST_SEND_SERVER_VERIFY_A (0x40|SSL_ST_ACCEPT) -#define SSL2_ST_SEND_SERVER_VERIFY_B (0x41|SSL_ST_ACCEPT) -#define SSL2_ST_SEND_SERVER_VERIFY_C (0x42|SSL_ST_ACCEPT) -#define SSL2_ST_GET_CLIENT_FINISHED_A (0x50|SSL_ST_ACCEPT) -#define SSL2_ST_GET_CLIENT_FINISHED_B (0x51|SSL_ST_ACCEPT) -#define SSL2_ST_SEND_SERVER_FINISHED_A (0x60|SSL_ST_ACCEPT) -#define SSL2_ST_SEND_SERVER_FINISHED_B (0x61|SSL_ST_ACCEPT) -#define SSL2_ST_SEND_REQUEST_CERTIFICATE_A (0x70|SSL_ST_ACCEPT) -#define SSL2_ST_SEND_REQUEST_CERTIFICATE_B (0x71|SSL_ST_ACCEPT) -#define SSL2_ST_SEND_REQUEST_CERTIFICATE_C (0x72|SSL_ST_ACCEPT) -#define SSL2_ST_SEND_REQUEST_CERTIFICATE_D (0x73|SSL_ST_ACCEPT) -#define SSL2_ST_SERVER_START_ENCRYPTION (0x80|SSL_ST_ACCEPT) -#define SSL2_ST_X509_GET_SERVER_CERTIFICATE (0x90|SSL_ST_ACCEPT) - -#ifdef __cplusplus -} -#endif -#endif - diff --git a/Pods/OpenSSL-Universal/include-osx/openssl/ssl23.h b/Pods/OpenSSL-Universal/include-osx/openssl/ssl23.h deleted file mode 100644 index d3228983..00000000 --- a/Pods/OpenSSL-Universal/include-osx/openssl/ssl23.h +++ /dev/null @@ -1,83 +0,0 @@ -/* ssl/ssl23.h */ -/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) - * All rights reserved. - * - * This package is an SSL implementation written - * by Eric Young (eay@cryptsoft.com). - * The implementation was written so as to conform with Netscapes SSL. - * - * This library is free for commercial and non-commercial use as long as - * the following conditions are aheared to. The following conditions - * apply to all code found in this distribution, be it the RC4, RSA, - * lhash, DES, etc., code; not just the SSL code. The SSL documentation - * included with this distribution is covered by the same copyright terms - * except that the holder is Tim Hudson (tjh@cryptsoft.com). - * - * Copyright remains Eric Young's, and as such any Copyright notices in - * the code are not to be removed. - * If this package is used in a product, Eric Young should be given attribution - * as the author of the parts of the library used. - * This can be in the form of a textual message at program startup or - * in documentation (online or textual) provided with the package. - * - * Redistribution and use in source and binary forms, with or without - * modification, are permitted provided that the following conditions - * are met: - * 1. Redistributions of source code must retain the copyright - * notice, this list of conditions and the following disclaimer. - * 2. Redistributions in binary form must reproduce the above copyright - * notice, this list of conditions and the following disclaimer in the - * documentation and/or other materials provided with the distribution. - * 3. All advertising materials mentioning features or use of this software - * must display the following acknowledgement: - * "This product includes cryptographic software written by - * Eric Young (eay@cryptsoft.com)" - * The word 'cryptographic' can be left out if the rouines from the library - * being used are not cryptographic related :-). - * 4. If you include any Windows specific code (or a derivative thereof) from - * the apps directory (application code) you must include an acknowledgement: - * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" - * - * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND - * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE - * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE - * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE - * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL - * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS - * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) - * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT - * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY - * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF - * SUCH DAMAGE. - * - * The licence and distribution terms for any publically available version or - * derivative of this code cannot be changed. i.e. this code cannot simply be - * copied and put under another distribution licence - * [including the GNU Public Licence.] - */ - -#ifndef HEADER_SSL23_H -#define HEADER_SSL23_H - -#ifdef __cplusplus -extern "C" { -#endif - -/*client */ -/* write to server */ -#define SSL23_ST_CW_CLNT_HELLO_A (0x210|SSL_ST_CONNECT) -#define SSL23_ST_CW_CLNT_HELLO_B (0x211|SSL_ST_CONNECT) -/* read from server */ -#define SSL23_ST_CR_SRVR_HELLO_A (0x220|SSL_ST_CONNECT) -#define SSL23_ST_CR_SRVR_HELLO_B (0x221|SSL_ST_CONNECT) - -/* server */ -/* read from client */ -#define SSL23_ST_SR_CLNT_HELLO_A (0x210|SSL_ST_ACCEPT) -#define SSL23_ST_SR_CLNT_HELLO_B (0x211|SSL_ST_ACCEPT) - -#ifdef __cplusplus -} -#endif -#endif - diff --git a/Pods/OpenSSL-Universal/include-osx/openssl/ssl3.h b/Pods/OpenSSL-Universal/include-osx/openssl/ssl3.h deleted file mode 100644 index 37f19e3a..00000000 --- a/Pods/OpenSSL-Universal/include-osx/openssl/ssl3.h +++ /dev/null @@ -1,694 +0,0 @@ -/* ssl/ssl3.h */ -/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) - * All rights reserved. - * - * This package is an SSL implementation written - * by Eric Young (eay@cryptsoft.com). - * The implementation was written so as to conform with Netscapes SSL. - * - * This library is free for commercial and non-commercial use as long as - * the following conditions are aheared to. The following conditions - * apply to all code found in this distribution, be it the RC4, RSA, - * lhash, DES, etc., code; not just the SSL code. The SSL documentation - * included with this distribution is covered by the same copyright terms - * except that the holder is Tim Hudson (tjh@cryptsoft.com). - * - * Copyright remains Eric Young's, and as such any Copyright notices in - * the code are not to be removed. - * If this package is used in a product, Eric Young should be given attribution - * as the author of the parts of the library used. - * This can be in the form of a textual message at program startup or - * in documentation (online or textual) provided with the package. - * - * Redistribution and use in source and binary forms, with or without - * modification, are permitted provided that the following conditions - * are met: - * 1. Redistributions of source code must retain the copyright - * notice, this list of conditions and the following disclaimer. - * 2. Redistributions in binary form must reproduce the above copyright - * notice, this list of conditions and the following disclaimer in the - * documentation and/or other materials provided with the distribution. - * 3. All advertising materials mentioning features or use of this software - * must display the following acknowledgement: - * "This product includes cryptographic software written by - * Eric Young (eay@cryptsoft.com)" - * The word 'cryptographic' can be left out if the rouines from the library - * being used are not cryptographic related :-). - * 4. If you include any Windows specific code (or a derivative thereof) from - * the apps directory (application code) you must include an acknowledgement: - * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" - * - * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND - * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE - * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE - * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE - * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL - * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS - * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) - * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT - * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY - * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF - * SUCH DAMAGE. - * - * The licence and distribution terms for any publically available version or - * derivative of this code cannot be changed. i.e. this code cannot simply be - * copied and put under another distribution licence - * [including the GNU Public Licence.] - */ -/* ==================================================================== - * Copyright (c) 1998-2002 The OpenSSL Project. All rights reserved. - * - * Redistribution and use in source and binary forms, with or without - * modification, are permitted provided that the following conditions - * are met: - * - * 1. Redistributions of source code must retain the above copyright - * notice, this list of conditions and the following disclaimer. - * - * 2. Redistributions in binary form must reproduce the above copyright - * notice, this list of conditions and the following disclaimer in - * the documentation and/or other materials provided with the - * distribution. - * - * 3. All advertising materials mentioning features or use of this - * software must display the following acknowledgment: - * "This product includes software developed by the OpenSSL Project - * for use in the OpenSSL Toolkit. (http://www.openssl.org/)" - * - * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to - * endorse or promote products derived from this software without - * prior written permission. For written permission, please contact - * openssl-core@openssl.org. - * - * 5. Products derived from this software may not be called "OpenSSL" - * nor may "OpenSSL" appear in their names without prior written - * permission of the OpenSSL Project. - * - * 6. Redistributions of any form whatsoever must retain the following - * acknowledgment: - * "This product includes software developed by the OpenSSL Project - * for use in the OpenSSL Toolkit (http://www.openssl.org/)" - * - * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY - * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE - * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR - * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR - * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, - * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT - * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; - * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) - * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, - * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) - * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED - * OF THE POSSIBILITY OF SUCH DAMAGE. - * ==================================================================== - * - * This product includes cryptographic software written by Eric Young - * (eay@cryptsoft.com). This product includes software written by Tim - * Hudson (tjh@cryptsoft.com). - * - */ -/* ==================================================================== - * Copyright 2002 Sun Microsystems, Inc. ALL RIGHTS RESERVED. - * ECC cipher suite support in OpenSSL originally developed by - * SUN MICROSYSTEMS, INC., and contributed to the OpenSSL project. - */ - -#ifndef HEADER_SSL3_H -#define HEADER_SSL3_H - -#ifndef OPENSSL_NO_COMP -#include -#endif -#include -#include -#include - -#ifdef __cplusplus -extern "C" { -#endif - -/* Signalling cipher suite value: from draft-ietf-tls-renegotiation-03.txt */ -#define SSL3_CK_SCSV 0x030000FF - -#define SSL3_CK_RSA_NULL_MD5 0x03000001 -#define SSL3_CK_RSA_NULL_SHA 0x03000002 -#define SSL3_CK_RSA_RC4_40_MD5 0x03000003 -#define SSL3_CK_RSA_RC4_128_MD5 0x03000004 -#define SSL3_CK_RSA_RC4_128_SHA 0x03000005 -#define SSL3_CK_RSA_RC2_40_MD5 0x03000006 -#define SSL3_CK_RSA_IDEA_128_SHA 0x03000007 -#define SSL3_CK_RSA_DES_40_CBC_SHA 0x03000008 -#define SSL3_CK_RSA_DES_64_CBC_SHA 0x03000009 -#define SSL3_CK_RSA_DES_192_CBC3_SHA 0x0300000A - -#define SSL3_CK_DH_DSS_DES_40_CBC_SHA 0x0300000B -#define SSL3_CK_DH_DSS_DES_64_CBC_SHA 0x0300000C -#define SSL3_CK_DH_DSS_DES_192_CBC3_SHA 0x0300000D -#define SSL3_CK_DH_RSA_DES_40_CBC_SHA 0x0300000E -#define SSL3_CK_DH_RSA_DES_64_CBC_SHA 0x0300000F -#define SSL3_CK_DH_RSA_DES_192_CBC3_SHA 0x03000010 - -#define SSL3_CK_EDH_DSS_DES_40_CBC_SHA 0x03000011 -#define SSL3_CK_EDH_DSS_DES_64_CBC_SHA 0x03000012 -#define SSL3_CK_EDH_DSS_DES_192_CBC3_SHA 0x03000013 -#define SSL3_CK_EDH_RSA_DES_40_CBC_SHA 0x03000014 -#define SSL3_CK_EDH_RSA_DES_64_CBC_SHA 0x03000015 -#define SSL3_CK_EDH_RSA_DES_192_CBC3_SHA 0x03000016 - -#define SSL3_CK_ADH_RC4_40_MD5 0x03000017 -#define SSL3_CK_ADH_RC4_128_MD5 0x03000018 -#define SSL3_CK_ADH_DES_40_CBC_SHA 0x03000019 -#define SSL3_CK_ADH_DES_64_CBC_SHA 0x0300001A -#define SSL3_CK_ADH_DES_192_CBC_SHA 0x0300001B - -#if 0 - #define SSL3_CK_FZA_DMS_NULL_SHA 0x0300001C - #define SSL3_CK_FZA_DMS_FZA_SHA 0x0300001D - #if 0 /* Because it clashes with KRB5, is never used any more, and is safe - to remove according to David Hopwood - of the ietf-tls list */ - #define SSL3_CK_FZA_DMS_RC4_SHA 0x0300001E - #endif -#endif - -/* VRS Additional Kerberos5 entries - */ -#define SSL3_CK_KRB5_DES_64_CBC_SHA 0x0300001E -#define SSL3_CK_KRB5_DES_192_CBC3_SHA 0x0300001F -#define SSL3_CK_KRB5_RC4_128_SHA 0x03000020 -#define SSL3_CK_KRB5_IDEA_128_CBC_SHA 0x03000021 -#define SSL3_CK_KRB5_DES_64_CBC_MD5 0x03000022 -#define SSL3_CK_KRB5_DES_192_CBC3_MD5 0x03000023 -#define SSL3_CK_KRB5_RC4_128_MD5 0x03000024 -#define SSL3_CK_KRB5_IDEA_128_CBC_MD5 0x03000025 - -#define SSL3_CK_KRB5_DES_40_CBC_SHA 0x03000026 -#define SSL3_CK_KRB5_RC2_40_CBC_SHA 0x03000027 -#define SSL3_CK_KRB5_RC4_40_SHA 0x03000028 -#define SSL3_CK_KRB5_DES_40_CBC_MD5 0x03000029 -#define SSL3_CK_KRB5_RC2_40_CBC_MD5 0x0300002A -#define SSL3_CK_KRB5_RC4_40_MD5 0x0300002B - -#define SSL3_TXT_RSA_NULL_MD5 "NULL-MD5" -#define SSL3_TXT_RSA_NULL_SHA "NULL-SHA" -#define SSL3_TXT_RSA_RC4_40_MD5 "EXP-RC4-MD5" -#define SSL3_TXT_RSA_RC4_128_MD5 "RC4-MD5" -#define SSL3_TXT_RSA_RC4_128_SHA "RC4-SHA" -#define SSL3_TXT_RSA_RC2_40_MD5 "EXP-RC2-CBC-MD5" -#define SSL3_TXT_RSA_IDEA_128_SHA "IDEA-CBC-SHA" -#define SSL3_TXT_RSA_DES_40_CBC_SHA "EXP-DES-CBC-SHA" -#define SSL3_TXT_RSA_DES_64_CBC_SHA "DES-CBC-SHA" -#define SSL3_TXT_RSA_DES_192_CBC3_SHA "DES-CBC3-SHA" - -#define SSL3_TXT_DH_DSS_DES_40_CBC_SHA "EXP-DH-DSS-DES-CBC-SHA" -#define SSL3_TXT_DH_DSS_DES_64_CBC_SHA "DH-DSS-DES-CBC-SHA" -#define SSL3_TXT_DH_DSS_DES_192_CBC3_SHA "DH-DSS-DES-CBC3-SHA" -#define SSL3_TXT_DH_RSA_DES_40_CBC_SHA "EXP-DH-RSA-DES-CBC-SHA" -#define SSL3_TXT_DH_RSA_DES_64_CBC_SHA "DH-RSA-DES-CBC-SHA" -#define SSL3_TXT_DH_RSA_DES_192_CBC3_SHA "DH-RSA-DES-CBC3-SHA" - -#define SSL3_TXT_EDH_DSS_DES_40_CBC_SHA "EXP-EDH-DSS-DES-CBC-SHA" -#define SSL3_TXT_EDH_DSS_DES_64_CBC_SHA "EDH-DSS-DES-CBC-SHA" -#define SSL3_TXT_EDH_DSS_DES_192_CBC3_SHA "EDH-DSS-DES-CBC3-SHA" -#define SSL3_TXT_EDH_RSA_DES_40_CBC_SHA "EXP-EDH-RSA-DES-CBC-SHA" -#define SSL3_TXT_EDH_RSA_DES_64_CBC_SHA "EDH-RSA-DES-CBC-SHA" -#define SSL3_TXT_EDH_RSA_DES_192_CBC3_SHA "EDH-RSA-DES-CBC3-SHA" - -#define SSL3_TXT_ADH_RC4_40_MD5 "EXP-ADH-RC4-MD5" -#define SSL3_TXT_ADH_RC4_128_MD5 "ADH-RC4-MD5" -#define SSL3_TXT_ADH_DES_40_CBC_SHA "EXP-ADH-DES-CBC-SHA" -#define SSL3_TXT_ADH_DES_64_CBC_SHA "ADH-DES-CBC-SHA" -#define SSL3_TXT_ADH_DES_192_CBC_SHA "ADH-DES-CBC3-SHA" - -#if 0 - #define SSL3_TXT_FZA_DMS_NULL_SHA "FZA-NULL-SHA" - #define SSL3_TXT_FZA_DMS_FZA_SHA "FZA-FZA-CBC-SHA" - #define SSL3_TXT_FZA_DMS_RC4_SHA "FZA-RC4-SHA" -#endif - -#define SSL3_TXT_KRB5_DES_64_CBC_SHA "KRB5-DES-CBC-SHA" -#define SSL3_TXT_KRB5_DES_192_CBC3_SHA "KRB5-DES-CBC3-SHA" -#define SSL3_TXT_KRB5_RC4_128_SHA "KRB5-RC4-SHA" -#define SSL3_TXT_KRB5_IDEA_128_CBC_SHA "KRB5-IDEA-CBC-SHA" -#define SSL3_TXT_KRB5_DES_64_CBC_MD5 "KRB5-DES-CBC-MD5" -#define SSL3_TXT_KRB5_DES_192_CBC3_MD5 "KRB5-DES-CBC3-MD5" -#define SSL3_TXT_KRB5_RC4_128_MD5 "KRB5-RC4-MD5" -#define SSL3_TXT_KRB5_IDEA_128_CBC_MD5 "KRB5-IDEA-CBC-MD5" - -#define SSL3_TXT_KRB5_DES_40_CBC_SHA "EXP-KRB5-DES-CBC-SHA" -#define SSL3_TXT_KRB5_RC2_40_CBC_SHA "EXP-KRB5-RC2-CBC-SHA" -#define SSL3_TXT_KRB5_RC4_40_SHA "EXP-KRB5-RC4-SHA" -#define SSL3_TXT_KRB5_DES_40_CBC_MD5 "EXP-KRB5-DES-CBC-MD5" -#define SSL3_TXT_KRB5_RC2_40_CBC_MD5 "EXP-KRB5-RC2-CBC-MD5" -#define SSL3_TXT_KRB5_RC4_40_MD5 "EXP-KRB5-RC4-MD5" - -#define SSL3_SSL_SESSION_ID_LENGTH 32 -#define SSL3_MAX_SSL_SESSION_ID_LENGTH 32 - -#define SSL3_MASTER_SECRET_SIZE 48 -#define SSL3_RANDOM_SIZE 32 -#define SSL3_SESSION_ID_SIZE 32 -#define SSL3_RT_HEADER_LENGTH 5 - -#ifndef SSL3_ALIGN_PAYLOAD - /* Some will argue that this increases memory footprint, but it's - * not actually true. Point is that malloc has to return at least - * 64-bit aligned pointers, meaning that allocating 5 bytes wastes - * 3 bytes in either case. Suggested pre-gaping simply moves these - * wasted bytes from the end of allocated region to its front, - * but makes data payload aligned, which improves performance:-) */ -# define SSL3_ALIGN_PAYLOAD 8 -#else -# if (SSL3_ALIGN_PAYLOAD&(SSL3_ALIGN_PAYLOAD-1))!=0 -# error "insane SSL3_ALIGN_PAYLOAD" -# undef SSL3_ALIGN_PAYLOAD -# endif -#endif - -/* This is the maximum MAC (digest) size used by the SSL library. - * Currently maximum of 20 is used by SHA1, but we reserve for - * future extension for 512-bit hashes. - */ - -#define SSL3_RT_MAX_MD_SIZE 64 - -/* Maximum block size used in all ciphersuites. Currently 16 for AES. - */ - -#define SSL_RT_MAX_CIPHER_BLOCK_SIZE 16 - -#define SSL3_RT_MAX_EXTRA (16384) - -/* Maximum plaintext length: defined by SSL/TLS standards */ -#define SSL3_RT_MAX_PLAIN_LENGTH 16384 -/* Maximum compression overhead: defined by SSL/TLS standards */ -#define SSL3_RT_MAX_COMPRESSED_OVERHEAD 1024 - -/* The standards give a maximum encryption overhead of 1024 bytes. - * In practice the value is lower than this. The overhead is the maximum - * number of padding bytes (256) plus the mac size. - */ -#define SSL3_RT_MAX_ENCRYPTED_OVERHEAD (256 + SSL3_RT_MAX_MD_SIZE) - -/* OpenSSL currently only uses a padding length of at most one block so - * the send overhead is smaller. - */ - -#define SSL3_RT_SEND_MAX_ENCRYPTED_OVERHEAD \ - (SSL_RT_MAX_CIPHER_BLOCK_SIZE + SSL3_RT_MAX_MD_SIZE) - -/* If compression isn't used don't include the compression overhead */ - -#ifdef OPENSSL_NO_COMP -#define SSL3_RT_MAX_COMPRESSED_LENGTH SSL3_RT_MAX_PLAIN_LENGTH -#else -#define SSL3_RT_MAX_COMPRESSED_LENGTH \ - (SSL3_RT_MAX_PLAIN_LENGTH+SSL3_RT_MAX_COMPRESSED_OVERHEAD) -#endif -#define SSL3_RT_MAX_ENCRYPTED_LENGTH \ - (SSL3_RT_MAX_ENCRYPTED_OVERHEAD+SSL3_RT_MAX_COMPRESSED_LENGTH) -#define SSL3_RT_MAX_PACKET_SIZE \ - (SSL3_RT_MAX_ENCRYPTED_LENGTH+SSL3_RT_HEADER_LENGTH) - -#define SSL3_MD_CLIENT_FINISHED_CONST "\x43\x4C\x4E\x54" -#define SSL3_MD_SERVER_FINISHED_CONST "\x53\x52\x56\x52" - -#define SSL3_VERSION 0x0300 -#define SSL3_VERSION_MAJOR 0x03 -#define SSL3_VERSION_MINOR 0x00 - -#define SSL3_RT_CHANGE_CIPHER_SPEC 20 -#define SSL3_RT_ALERT 21 -#define SSL3_RT_HANDSHAKE 22 -#define SSL3_RT_APPLICATION_DATA 23 -#define TLS1_RT_HEARTBEAT 24 - -#define SSL3_AL_WARNING 1 -#define SSL3_AL_FATAL 2 - -#define SSL3_AD_CLOSE_NOTIFY 0 -#define SSL3_AD_UNEXPECTED_MESSAGE 10 /* fatal */ -#define SSL3_AD_BAD_RECORD_MAC 20 /* fatal */ -#define SSL3_AD_DECOMPRESSION_FAILURE 30 /* fatal */ -#define SSL3_AD_HANDSHAKE_FAILURE 40 /* fatal */ -#define SSL3_AD_NO_CERTIFICATE 41 -#define SSL3_AD_BAD_CERTIFICATE 42 -#define SSL3_AD_UNSUPPORTED_CERTIFICATE 43 -#define SSL3_AD_CERTIFICATE_REVOKED 44 -#define SSL3_AD_CERTIFICATE_EXPIRED 45 -#define SSL3_AD_CERTIFICATE_UNKNOWN 46 -#define SSL3_AD_ILLEGAL_PARAMETER 47 /* fatal */ - -#define TLS1_HB_REQUEST 1 -#define TLS1_HB_RESPONSE 2 - -#ifndef OPENSSL_NO_SSL_INTERN - -typedef struct ssl3_record_st - { -/*r */ int type; /* type of record */ -/*rw*/ unsigned int length; /* How many bytes available */ -/*r */ unsigned int off; /* read/write offset into 'buf' */ -/*rw*/ unsigned char *data; /* pointer to the record data */ -/*rw*/ unsigned char *input; /* where the decode bytes are */ -/*r */ unsigned char *comp; /* only used with decompression - malloc()ed */ -/*r */ unsigned long epoch; /* epoch number, needed by DTLS1 */ -/*r */ unsigned char seq_num[8]; /* sequence number, needed by DTLS1 */ - } SSL3_RECORD; - -typedef struct ssl3_buffer_st - { - unsigned char *buf; /* at least SSL3_RT_MAX_PACKET_SIZE bytes, - * see ssl3_setup_buffers() */ - size_t len; /* buffer size */ - int offset; /* where to 'copy from' */ - int left; /* how many bytes left */ - } SSL3_BUFFER; - -#endif - -#define SSL3_CT_RSA_SIGN 1 -#define SSL3_CT_DSS_SIGN 2 -#define SSL3_CT_RSA_FIXED_DH 3 -#define SSL3_CT_DSS_FIXED_DH 4 -#define SSL3_CT_RSA_EPHEMERAL_DH 5 -#define SSL3_CT_DSS_EPHEMERAL_DH 6 -#define SSL3_CT_FORTEZZA_DMS 20 -/* SSL3_CT_NUMBER is used to size arrays and it must be large - * enough to contain all of the cert types defined either for - * SSLv3 and TLSv1. - */ -#define SSL3_CT_NUMBER 9 - - -#define SSL3_FLAGS_NO_RENEGOTIATE_CIPHERS 0x0001 -#define SSL3_FLAGS_DELAY_CLIENT_FINISHED 0x0002 -#define SSL3_FLAGS_POP_BUFFER 0x0004 -#define TLS1_FLAGS_TLS_PADDING_BUG 0x0008 -#define TLS1_FLAGS_SKIP_CERT_VERIFY 0x0010 -#define TLS1_FLAGS_KEEP_HANDSHAKE 0x0020 -#define SSL3_FLAGS_CCS_OK 0x0080 - -/* SSL3_FLAGS_SGC_RESTART_DONE is set when we - * restart a handshake because of MS SGC and so prevents us - * from restarting the handshake in a loop. It's reset on a - * renegotiation, so effectively limits the client to one restart - * per negotiation. This limits the possibility of a DDoS - * attack where the client handshakes in a loop using SGC to - * restart. Servers which permit renegotiation can still be - * effected, but we can't prevent that. - */ -#define SSL3_FLAGS_SGC_RESTART_DONE 0x0040 - -#ifndef OPENSSL_NO_SSL_INTERN - -typedef struct ssl3_state_st - { - long flags; - int delay_buf_pop_ret; - - unsigned char read_sequence[8]; - int read_mac_secret_size; - unsigned char read_mac_secret[EVP_MAX_MD_SIZE]; - unsigned char write_sequence[8]; - int write_mac_secret_size; - unsigned char write_mac_secret[EVP_MAX_MD_SIZE]; - - unsigned char server_random[SSL3_RANDOM_SIZE]; - unsigned char client_random[SSL3_RANDOM_SIZE]; - - /* flags for countermeasure against known-IV weakness */ - int need_empty_fragments; - int empty_fragment_done; - - /* The value of 'extra' when the buffers were initialized */ - int init_extra; - - SSL3_BUFFER rbuf; /* read IO goes into here */ - SSL3_BUFFER wbuf; /* write IO goes into here */ - - SSL3_RECORD rrec; /* each decoded record goes in here */ - SSL3_RECORD wrec; /* goes out from here */ - - /* storage for Alert/Handshake protocol data received but not - * yet processed by ssl3_read_bytes: */ - unsigned char alert_fragment[2]; - unsigned int alert_fragment_len; - unsigned char handshake_fragment[4]; - unsigned int handshake_fragment_len; - - /* partial write - check the numbers match */ - unsigned int wnum; /* number of bytes sent so far */ - int wpend_tot; /* number bytes written */ - int wpend_type; - int wpend_ret; /* number of bytes submitted */ - const unsigned char *wpend_buf; - - /* used during startup, digest all incoming/outgoing packets */ - BIO *handshake_buffer; - /* When set of handshake digests is determined, buffer is hashed - * and freed and MD_CTX-es for all required digests are stored in - * this array */ - EVP_MD_CTX **handshake_dgst; - /* this is set whenerver we see a change_cipher_spec message - * come in when we are not looking for one */ - int change_cipher_spec; - - int warn_alert; - int fatal_alert; - /* we allow one fatal and one warning alert to be outstanding, - * send close alert via the warning alert */ - int alert_dispatch; - unsigned char send_alert[2]; - - /* This flag is set when we should renegotiate ASAP, basically when - * there is no more data in the read or write buffers */ - int renegotiate; - int total_renegotiations; - int num_renegotiations; - - int in_read_app_data; - - /* Opaque PRF input as used for the current handshake. - * These fields are used only if TLSEXT_TYPE_opaque_prf_input is defined - * (otherwise, they are merely present to improve binary compatibility) */ - void *client_opaque_prf_input; - size_t client_opaque_prf_input_len; - void *server_opaque_prf_input; - size_t server_opaque_prf_input_len; - - struct { - /* actually only needs to be 16+20 */ - unsigned char cert_verify_md[EVP_MAX_MD_SIZE*2]; - - /* actually only need to be 16+20 for SSLv3 and 12 for TLS */ - unsigned char finish_md[EVP_MAX_MD_SIZE*2]; - int finish_md_len; - unsigned char peer_finish_md[EVP_MAX_MD_SIZE*2]; - int peer_finish_md_len; - - unsigned long message_size; - int message_type; - - /* used to hold the new cipher we are going to use */ - const SSL_CIPHER *new_cipher; -#ifndef OPENSSL_NO_DH - DH *dh; -#endif - -#ifndef OPENSSL_NO_ECDH - EC_KEY *ecdh; /* holds short lived ECDH key */ -#endif - - /* used when SSL_ST_FLUSH_DATA is entered */ - int next_state; - - int reuse_message; - - /* used for certificate requests */ - int cert_req; - int ctype_num; - char ctype[SSL3_CT_NUMBER]; - STACK_OF(X509_NAME) *ca_names; - - int use_rsa_tmp; - - int key_block_length; - unsigned char *key_block; - - const EVP_CIPHER *new_sym_enc; - const EVP_MD *new_hash; - int new_mac_pkey_type; - int new_mac_secret_size; -#ifndef OPENSSL_NO_COMP - const SSL_COMP *new_compression; -#else - char *new_compression; -#endif - int cert_request; - } tmp; - - /* Connection binding to prevent renegotiation attacks */ - unsigned char previous_client_finished[EVP_MAX_MD_SIZE]; - unsigned char previous_client_finished_len; - unsigned char previous_server_finished[EVP_MAX_MD_SIZE]; - unsigned char previous_server_finished_len; - int send_connection_binding; /* TODOEKR */ - -#ifndef OPENSSL_NO_NEXTPROTONEG - /* Set if we saw the Next Protocol Negotiation extension from our peer. */ - int next_proto_neg_seen; -#endif - -#ifndef OPENSSL_NO_TLSEXT -#ifndef OPENSSL_NO_EC - /* This is set to true if we believe that this is a version of Safari - * running on OS X 10.6 or newer. We wish to know this because Safari - * on 10.8 .. 10.8.3 has broken ECDHE-ECDSA support. */ - char is_probably_safari; -#endif /* !OPENSSL_NO_EC */ -#endif /* !OPENSSL_NO_TLSEXT */ - } SSL3_STATE; - -#endif - -/* SSLv3 */ -/*client */ -/* extra state */ -#define SSL3_ST_CW_FLUSH (0x100|SSL_ST_CONNECT) -#ifndef OPENSSL_NO_SCTP -#define DTLS1_SCTP_ST_CW_WRITE_SOCK (0x310|SSL_ST_CONNECT) -#define DTLS1_SCTP_ST_CR_READ_SOCK (0x320|SSL_ST_CONNECT) -#endif -/* write to server */ -#define SSL3_ST_CW_CLNT_HELLO_A (0x110|SSL_ST_CONNECT) -#define SSL3_ST_CW_CLNT_HELLO_B (0x111|SSL_ST_CONNECT) -/* read from server */ -#define SSL3_ST_CR_SRVR_HELLO_A (0x120|SSL_ST_CONNECT) -#define SSL3_ST_CR_SRVR_HELLO_B (0x121|SSL_ST_CONNECT) -#define DTLS1_ST_CR_HELLO_VERIFY_REQUEST_A (0x126|SSL_ST_CONNECT) -#define DTLS1_ST_CR_HELLO_VERIFY_REQUEST_B (0x127|SSL_ST_CONNECT) -#define SSL3_ST_CR_CERT_A (0x130|SSL_ST_CONNECT) -#define SSL3_ST_CR_CERT_B (0x131|SSL_ST_CONNECT) -#define SSL3_ST_CR_KEY_EXCH_A (0x140|SSL_ST_CONNECT) -#define SSL3_ST_CR_KEY_EXCH_B (0x141|SSL_ST_CONNECT) -#define SSL3_ST_CR_CERT_REQ_A (0x150|SSL_ST_CONNECT) -#define SSL3_ST_CR_CERT_REQ_B (0x151|SSL_ST_CONNECT) -#define SSL3_ST_CR_SRVR_DONE_A (0x160|SSL_ST_CONNECT) -#define SSL3_ST_CR_SRVR_DONE_B (0x161|SSL_ST_CONNECT) -/* write to server */ -#define SSL3_ST_CW_CERT_A (0x170|SSL_ST_CONNECT) -#define SSL3_ST_CW_CERT_B (0x171|SSL_ST_CONNECT) -#define SSL3_ST_CW_CERT_C (0x172|SSL_ST_CONNECT) -#define SSL3_ST_CW_CERT_D (0x173|SSL_ST_CONNECT) -#define SSL3_ST_CW_KEY_EXCH_A (0x180|SSL_ST_CONNECT) -#define SSL3_ST_CW_KEY_EXCH_B (0x181|SSL_ST_CONNECT) -#define SSL3_ST_CW_CERT_VRFY_A (0x190|SSL_ST_CONNECT) -#define SSL3_ST_CW_CERT_VRFY_B (0x191|SSL_ST_CONNECT) -#define SSL3_ST_CW_CHANGE_A (0x1A0|SSL_ST_CONNECT) -#define SSL3_ST_CW_CHANGE_B (0x1A1|SSL_ST_CONNECT) -#ifndef OPENSSL_NO_NEXTPROTONEG -#define SSL3_ST_CW_NEXT_PROTO_A (0x200|SSL_ST_CONNECT) -#define SSL3_ST_CW_NEXT_PROTO_B (0x201|SSL_ST_CONNECT) -#endif -#define SSL3_ST_CW_FINISHED_A (0x1B0|SSL_ST_CONNECT) -#define SSL3_ST_CW_FINISHED_B (0x1B1|SSL_ST_CONNECT) -/* read from server */ -#define SSL3_ST_CR_CHANGE_A (0x1C0|SSL_ST_CONNECT) -#define SSL3_ST_CR_CHANGE_B (0x1C1|SSL_ST_CONNECT) -#define SSL3_ST_CR_FINISHED_A (0x1D0|SSL_ST_CONNECT) -#define SSL3_ST_CR_FINISHED_B (0x1D1|SSL_ST_CONNECT) -#define SSL3_ST_CR_SESSION_TICKET_A (0x1E0|SSL_ST_CONNECT) -#define SSL3_ST_CR_SESSION_TICKET_B (0x1E1|SSL_ST_CONNECT) -#define SSL3_ST_CR_CERT_STATUS_A (0x1F0|SSL_ST_CONNECT) -#define SSL3_ST_CR_CERT_STATUS_B (0x1F1|SSL_ST_CONNECT) - -/* server */ -/* extra state */ -#define SSL3_ST_SW_FLUSH (0x100|SSL_ST_ACCEPT) -#ifndef OPENSSL_NO_SCTP -#define DTLS1_SCTP_ST_SW_WRITE_SOCK (0x310|SSL_ST_ACCEPT) -#define DTLS1_SCTP_ST_SR_READ_SOCK (0x320|SSL_ST_ACCEPT) -#endif -/* read from client */ -/* Do not change the number values, they do matter */ -#define SSL3_ST_SR_CLNT_HELLO_A (0x110|SSL_ST_ACCEPT) -#define SSL3_ST_SR_CLNT_HELLO_B (0x111|SSL_ST_ACCEPT) -#define SSL3_ST_SR_CLNT_HELLO_C (0x112|SSL_ST_ACCEPT) -/* write to client */ -#define DTLS1_ST_SW_HELLO_VERIFY_REQUEST_A (0x113|SSL_ST_ACCEPT) -#define DTLS1_ST_SW_HELLO_VERIFY_REQUEST_B (0x114|SSL_ST_ACCEPT) -#define SSL3_ST_SW_HELLO_REQ_A (0x120|SSL_ST_ACCEPT) -#define SSL3_ST_SW_HELLO_REQ_B (0x121|SSL_ST_ACCEPT) -#define SSL3_ST_SW_HELLO_REQ_C (0x122|SSL_ST_ACCEPT) -#define SSL3_ST_SW_SRVR_HELLO_A (0x130|SSL_ST_ACCEPT) -#define SSL3_ST_SW_SRVR_HELLO_B (0x131|SSL_ST_ACCEPT) -#define SSL3_ST_SW_CERT_A (0x140|SSL_ST_ACCEPT) -#define SSL3_ST_SW_CERT_B (0x141|SSL_ST_ACCEPT) -#define SSL3_ST_SW_KEY_EXCH_A (0x150|SSL_ST_ACCEPT) -#define SSL3_ST_SW_KEY_EXCH_B (0x151|SSL_ST_ACCEPT) -#define SSL3_ST_SW_CERT_REQ_A (0x160|SSL_ST_ACCEPT) -#define SSL3_ST_SW_CERT_REQ_B (0x161|SSL_ST_ACCEPT) -#define SSL3_ST_SW_SRVR_DONE_A (0x170|SSL_ST_ACCEPT) -#define SSL3_ST_SW_SRVR_DONE_B (0x171|SSL_ST_ACCEPT) -/* read from client */ -#define SSL3_ST_SR_CERT_A (0x180|SSL_ST_ACCEPT) -#define SSL3_ST_SR_CERT_B (0x181|SSL_ST_ACCEPT) -#define SSL3_ST_SR_KEY_EXCH_A (0x190|SSL_ST_ACCEPT) -#define SSL3_ST_SR_KEY_EXCH_B (0x191|SSL_ST_ACCEPT) -#define SSL3_ST_SR_CERT_VRFY_A (0x1A0|SSL_ST_ACCEPT) -#define SSL3_ST_SR_CERT_VRFY_B (0x1A1|SSL_ST_ACCEPT) -#define SSL3_ST_SR_CHANGE_A (0x1B0|SSL_ST_ACCEPT) -#define SSL3_ST_SR_CHANGE_B (0x1B1|SSL_ST_ACCEPT) -#ifndef OPENSSL_NO_NEXTPROTONEG -#define SSL3_ST_SR_NEXT_PROTO_A (0x210|SSL_ST_ACCEPT) -#define SSL3_ST_SR_NEXT_PROTO_B (0x211|SSL_ST_ACCEPT) -#endif -#define SSL3_ST_SR_FINISHED_A (0x1C0|SSL_ST_ACCEPT) -#define SSL3_ST_SR_FINISHED_B (0x1C1|SSL_ST_ACCEPT) -/* write to client */ -#define SSL3_ST_SW_CHANGE_A (0x1D0|SSL_ST_ACCEPT) -#define SSL3_ST_SW_CHANGE_B (0x1D1|SSL_ST_ACCEPT) -#define SSL3_ST_SW_FINISHED_A (0x1E0|SSL_ST_ACCEPT) -#define SSL3_ST_SW_FINISHED_B (0x1E1|SSL_ST_ACCEPT) -#define SSL3_ST_SW_SESSION_TICKET_A (0x1F0|SSL_ST_ACCEPT) -#define SSL3_ST_SW_SESSION_TICKET_B (0x1F1|SSL_ST_ACCEPT) -#define SSL3_ST_SW_CERT_STATUS_A (0x200|SSL_ST_ACCEPT) -#define SSL3_ST_SW_CERT_STATUS_B (0x201|SSL_ST_ACCEPT) - -#define SSL3_MT_HELLO_REQUEST 0 -#define SSL3_MT_CLIENT_HELLO 1 -#define SSL3_MT_SERVER_HELLO 2 -#define SSL3_MT_NEWSESSION_TICKET 4 -#define SSL3_MT_CERTIFICATE 11 -#define SSL3_MT_SERVER_KEY_EXCHANGE 12 -#define SSL3_MT_CERTIFICATE_REQUEST 13 -#define SSL3_MT_SERVER_DONE 14 -#define SSL3_MT_CERTIFICATE_VERIFY 15 -#define SSL3_MT_CLIENT_KEY_EXCHANGE 16 -#define SSL3_MT_FINISHED 20 -#define SSL3_MT_CERTIFICATE_STATUS 22 -#ifndef OPENSSL_NO_NEXTPROTONEG -#define SSL3_MT_NEXT_PROTO 67 -#endif -#define DTLS1_MT_HELLO_VERIFY_REQUEST 3 - - -#define SSL3_MT_CCS 1 - -/* These are used when changing over to a new cipher */ -#define SSL3_CC_READ 0x01 -#define SSL3_CC_WRITE 0x02 -#define SSL3_CC_CLIENT 0x10 -#define SSL3_CC_SERVER 0x20 -#define SSL3_CHANGE_CIPHER_CLIENT_WRITE (SSL3_CC_CLIENT|SSL3_CC_WRITE) -#define SSL3_CHANGE_CIPHER_SERVER_READ (SSL3_CC_SERVER|SSL3_CC_READ) -#define SSL3_CHANGE_CIPHER_CLIENT_READ (SSL3_CC_CLIENT|SSL3_CC_READ) -#define SSL3_CHANGE_CIPHER_SERVER_WRITE (SSL3_CC_SERVER|SSL3_CC_WRITE) - -#ifdef __cplusplus -} -#endif -#endif - diff --git a/Pods/OpenSSL-Universal/include-osx/openssl/stack.h b/Pods/OpenSSL-Universal/include-osx/openssl/stack.h deleted file mode 100644 index ce35e554..00000000 --- a/Pods/OpenSSL-Universal/include-osx/openssl/stack.h +++ /dev/null @@ -1,108 +0,0 @@ -/* crypto/stack/stack.h */ -/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) - * All rights reserved. - * - * This package is an SSL implementation written - * by Eric Young (eay@cryptsoft.com). - * The implementation was written so as to conform with Netscapes SSL. - * - * This library is free for commercial and non-commercial use as long as - * the following conditions are aheared to. The following conditions - * apply to all code found in this distribution, be it the RC4, RSA, - * lhash, DES, etc., code; not just the SSL code. The SSL documentation - * included with this distribution is covered by the same copyright terms - * except that the holder is Tim Hudson (tjh@cryptsoft.com). - * - * Copyright remains Eric Young's, and as such any Copyright notices in - * the code are not to be removed. - * If this package is used in a product, Eric Young should be given attribution - * as the author of the parts of the library used. - * This can be in the form of a textual message at program startup or - * in documentation (online or textual) provided with the package. - * - * Redistribution and use in source and binary forms, with or without - * modification, are permitted provided that the following conditions - * are met: - * 1. Redistributions of source code must retain the copyright - * notice, this list of conditions and the following disclaimer. - * 2. Redistributions in binary form must reproduce the above copyright - * notice, this list of conditions and the following disclaimer in the - * documentation and/or other materials provided with the distribution. - * 3. All advertising materials mentioning features or use of this software - * must display the following acknowledgement: - * "This product includes cryptographic software written by - * Eric Young (eay@cryptsoft.com)" - * The word 'cryptographic' can be left out if the rouines from the library - * being used are not cryptographic related :-). - * 4. If you include any Windows specific code (or a derivative thereof) from - * the apps directory (application code) you must include an acknowledgement: - * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" - * - * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND - * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE - * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE - * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE - * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL - * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS - * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) - * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT - * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY - * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF - * SUCH DAMAGE. - * - * The licence and distribution terms for any publically available version or - * derivative of this code cannot be changed. i.e. this code cannot simply be - * copied and put under another distribution licence - * [including the GNU Public Licence.] - */ - -#ifndef HEADER_STACK_H -#define HEADER_STACK_H - -#ifdef __cplusplus -extern "C" { -#endif - -typedef struct stack_st - { - int num; - char **data; - int sorted; - - int num_alloc; - int (*comp)(const void *, const void *); - } _STACK; /* Use STACK_OF(...) instead */ - -#define M_sk_num(sk) ((sk) ? (sk)->num:-1) -#define M_sk_value(sk,n) ((sk) ? (sk)->data[n] : NULL) - -int sk_num(const _STACK *); -void *sk_value(const _STACK *, int); - -void *sk_set(_STACK *, int, void *); - -_STACK *sk_new(int (*cmp)(const void *, const void *)); -_STACK *sk_new_null(void); -void sk_free(_STACK *); -void sk_pop_free(_STACK *st, void (*func)(void *)); -int sk_insert(_STACK *sk, void *data, int where); -void *sk_delete(_STACK *st, int loc); -void *sk_delete_ptr(_STACK *st, void *p); -int sk_find(_STACK *st, void *data); -int sk_find_ex(_STACK *st, void *data); -int sk_push(_STACK *st, void *data); -int sk_unshift(_STACK *st, void *data); -void *sk_shift(_STACK *st); -void *sk_pop(_STACK *st); -void sk_zero(_STACK *st); -int (*sk_set_cmp_func(_STACK *sk, int (*c)(const void *, const void *))) - (const void *, const void *); -_STACK *sk_dup(_STACK *st); -void sk_sort(_STACK *st); -int sk_is_sorted(const _STACK *st); - -#ifdef __cplusplus -} -#endif - -#endif diff --git a/Pods/OpenSSL-Universal/include-osx/openssl/symhacks.h b/Pods/OpenSSL-Universal/include-osx/openssl/symhacks.h deleted file mode 100644 index bd2f000d..00000000 --- a/Pods/OpenSSL-Universal/include-osx/openssl/symhacks.h +++ /dev/null @@ -1,481 +0,0 @@ -/* ==================================================================== - * Copyright (c) 1999 The OpenSSL Project. All rights reserved. - * - * Redistribution and use in source and binary forms, with or without - * modification, are permitted provided that the following conditions - * are met: - * - * 1. Redistributions of source code must retain the above copyright - * notice, this list of conditions and the following disclaimer. - * - * 2. Redistributions in binary form must reproduce the above copyright - * notice, this list of conditions and the following disclaimer in - * the documentation and/or other materials provided with the - * distribution. - * - * 3. All advertising materials mentioning features or use of this - * software must display the following acknowledgment: - * "This product includes software developed by the OpenSSL Project - * for use in the OpenSSL Toolkit. (http://www.openssl.org/)" - * - * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to - * endorse or promote products derived from this software without - * prior written permission. For written permission, please contact - * openssl-core@openssl.org. - * - * 5. Products derived from this software may not be called "OpenSSL" - * nor may "OpenSSL" appear in their names without prior written - * permission of the OpenSSL Project. - * - * 6. Redistributions of any form whatsoever must retain the following - * acknowledgment: - * "This product includes software developed by the OpenSSL Project - * for use in the OpenSSL Toolkit (http://www.openssl.org/)" - * - * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY - * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE - * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR - * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR - * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, - * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT - * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; - * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) - * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, - * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) - * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED - * OF THE POSSIBILITY OF SUCH DAMAGE. - * ==================================================================== - * - * This product includes cryptographic software written by Eric Young - * (eay@cryptsoft.com). This product includes software written by Tim - * Hudson (tjh@cryptsoft.com). - * - */ - -#ifndef HEADER_SYMHACKS_H -#define HEADER_SYMHACKS_H - -#include - -/* Hacks to solve the problem with linkers incapable of handling very long - symbol names. In the case of VMS, the limit is 31 characters on VMS for - VAX. */ -/* Note that this affects util/libeay.num and util/ssleay.num... you may - change those manually, but that's not recommended, as those files are - controlled centrally and updated on Unix, and the central definition - may disagree with yours, which in turn may come with shareable library - incompatibilities. */ -#ifdef OPENSSL_SYS_VMS - -/* Hack a long name in crypto/ex_data.c */ -#undef CRYPTO_get_ex_data_implementation -#define CRYPTO_get_ex_data_implementation CRYPTO_get_ex_data_impl -#undef CRYPTO_set_ex_data_implementation -#define CRYPTO_set_ex_data_implementation CRYPTO_set_ex_data_impl - -/* Hack a long name in crypto/asn1/a_mbstr.c */ -#undef ASN1_STRING_set_default_mask_asc -#define ASN1_STRING_set_default_mask_asc ASN1_STRING_set_def_mask_asc - -#if 0 /* No longer needed, since safestack macro magic does the job */ -/* Hack the names created with DECLARE_ASN1_SET_OF(PKCS7_SIGNER_INFO) */ -#undef i2d_ASN1_SET_OF_PKCS7_SIGNER_INFO -#define i2d_ASN1_SET_OF_PKCS7_SIGNER_INFO i2d_ASN1_SET_OF_PKCS7_SIGINF -#undef d2i_ASN1_SET_OF_PKCS7_SIGNER_INFO -#define d2i_ASN1_SET_OF_PKCS7_SIGNER_INFO d2i_ASN1_SET_OF_PKCS7_SIGINF -#endif - -#if 0 /* No longer needed, since safestack macro magic does the job */ -/* Hack the names created with DECLARE_ASN1_SET_OF(PKCS7_RECIP_INFO) */ -#undef i2d_ASN1_SET_OF_PKCS7_RECIP_INFO -#define i2d_ASN1_SET_OF_PKCS7_RECIP_INFO i2d_ASN1_SET_OF_PKCS7_RECINF -#undef d2i_ASN1_SET_OF_PKCS7_RECIP_INFO -#define d2i_ASN1_SET_OF_PKCS7_RECIP_INFO d2i_ASN1_SET_OF_PKCS7_RECINF -#endif - -#if 0 /* No longer needed, since safestack macro magic does the job */ -/* Hack the names created with DECLARE_ASN1_SET_OF(ACCESS_DESCRIPTION) */ -#undef i2d_ASN1_SET_OF_ACCESS_DESCRIPTION -#define i2d_ASN1_SET_OF_ACCESS_DESCRIPTION i2d_ASN1_SET_OF_ACC_DESC -#undef d2i_ASN1_SET_OF_ACCESS_DESCRIPTION -#define d2i_ASN1_SET_OF_ACCESS_DESCRIPTION d2i_ASN1_SET_OF_ACC_DESC -#endif - -/* Hack the names created with DECLARE_PEM_rw(NETSCAPE_CERT_SEQUENCE) */ -#undef PEM_read_NETSCAPE_CERT_SEQUENCE -#define PEM_read_NETSCAPE_CERT_SEQUENCE PEM_read_NS_CERT_SEQ -#undef PEM_write_NETSCAPE_CERT_SEQUENCE -#define PEM_write_NETSCAPE_CERT_SEQUENCE PEM_write_NS_CERT_SEQ -#undef PEM_read_bio_NETSCAPE_CERT_SEQUENCE -#define PEM_read_bio_NETSCAPE_CERT_SEQUENCE PEM_read_bio_NS_CERT_SEQ -#undef PEM_write_bio_NETSCAPE_CERT_SEQUENCE -#define PEM_write_bio_NETSCAPE_CERT_SEQUENCE PEM_write_bio_NS_CERT_SEQ -#undef PEM_write_cb_bio_NETSCAPE_CERT_SEQUENCE -#define PEM_write_cb_bio_NETSCAPE_CERT_SEQUENCE PEM_write_cb_bio_NS_CERT_SEQ - -/* Hack the names created with DECLARE_PEM_rw(PKCS8_PRIV_KEY_INFO) */ -#undef PEM_read_PKCS8_PRIV_KEY_INFO -#define PEM_read_PKCS8_PRIV_KEY_INFO PEM_read_P8_PRIV_KEY_INFO -#undef PEM_write_PKCS8_PRIV_KEY_INFO -#define PEM_write_PKCS8_PRIV_KEY_INFO PEM_write_P8_PRIV_KEY_INFO -#undef PEM_read_bio_PKCS8_PRIV_KEY_INFO -#define PEM_read_bio_PKCS8_PRIV_KEY_INFO PEM_read_bio_P8_PRIV_KEY_INFO -#undef PEM_write_bio_PKCS8_PRIV_KEY_INFO -#define PEM_write_bio_PKCS8_PRIV_KEY_INFO PEM_write_bio_P8_PRIV_KEY_INFO -#undef PEM_write_cb_bio_PKCS8_PRIV_KEY_INFO -#define PEM_write_cb_bio_PKCS8_PRIV_KEY_INFO PEM_wrt_cb_bio_P8_PRIV_KEY_INFO - -/* Hack other PEM names */ -#undef PEM_write_bio_PKCS8PrivateKey_nid -#define PEM_write_bio_PKCS8PrivateKey_nid PEM_write_bio_PKCS8PrivKey_nid - -/* Hack some long X509 names */ -#undef X509_REVOKED_get_ext_by_critical -#define X509_REVOKED_get_ext_by_critical X509_REVOKED_get_ext_by_critic -#undef X509_policy_tree_get0_user_policies -#define X509_policy_tree_get0_user_policies X509_pcy_tree_get0_usr_policies -#undef X509_policy_node_get0_qualifiers -#define X509_policy_node_get0_qualifiers X509_pcy_node_get0_qualifiers -#undef X509_STORE_CTX_get_explicit_policy -#define X509_STORE_CTX_get_explicit_policy X509_STORE_CTX_get_expl_policy -#undef X509_STORE_CTX_get0_current_issuer -#define X509_STORE_CTX_get0_current_issuer X509_STORE_CTX_get0_cur_issuer - -/* Hack some long CRYPTO names */ -#undef CRYPTO_set_dynlock_destroy_callback -#define CRYPTO_set_dynlock_destroy_callback CRYPTO_set_dynlock_destroy_cb -#undef CRYPTO_set_dynlock_create_callback -#define CRYPTO_set_dynlock_create_callback CRYPTO_set_dynlock_create_cb -#undef CRYPTO_set_dynlock_lock_callback -#define CRYPTO_set_dynlock_lock_callback CRYPTO_set_dynlock_lock_cb -#undef CRYPTO_get_dynlock_lock_callback -#define CRYPTO_get_dynlock_lock_callback CRYPTO_get_dynlock_lock_cb -#undef CRYPTO_get_dynlock_destroy_callback -#define CRYPTO_get_dynlock_destroy_callback CRYPTO_get_dynlock_destroy_cb -#undef CRYPTO_get_dynlock_create_callback -#define CRYPTO_get_dynlock_create_callback CRYPTO_get_dynlock_create_cb -#undef CRYPTO_set_locked_mem_ex_functions -#define CRYPTO_set_locked_mem_ex_functions CRYPTO_set_locked_mem_ex_funcs -#undef CRYPTO_get_locked_mem_ex_functions -#define CRYPTO_get_locked_mem_ex_functions CRYPTO_get_locked_mem_ex_funcs - -/* Hack some long SSL names */ -#undef SSL_CTX_set_default_verify_paths -#define SSL_CTX_set_default_verify_paths SSL_CTX_set_def_verify_paths -#undef SSL_get_ex_data_X509_STORE_CTX_idx -#define SSL_get_ex_data_X509_STORE_CTX_idx SSL_get_ex_d_X509_STORE_CTX_idx -#undef SSL_add_file_cert_subjects_to_stack -#define SSL_add_file_cert_subjects_to_stack SSL_add_file_cert_subjs_to_stk -#undef SSL_add_dir_cert_subjects_to_stack -#define SSL_add_dir_cert_subjects_to_stack SSL_add_dir_cert_subjs_to_stk -#undef SSL_CTX_use_certificate_chain_file -#define SSL_CTX_use_certificate_chain_file SSL_CTX_use_cert_chain_file -#undef SSL_CTX_set_cert_verify_callback -#define SSL_CTX_set_cert_verify_callback SSL_CTX_set_cert_verify_cb -#undef SSL_CTX_set_default_passwd_cb_userdata -#define SSL_CTX_set_default_passwd_cb_userdata SSL_CTX_set_def_passwd_cb_ud -#undef SSL_COMP_get_compression_methods -#define SSL_COMP_get_compression_methods SSL_COMP_get_compress_methods -#undef ssl_add_clienthello_renegotiate_ext -#define ssl_add_clienthello_renegotiate_ext ssl_add_clienthello_reneg_ext -#undef ssl_add_serverhello_renegotiate_ext -#define ssl_add_serverhello_renegotiate_ext ssl_add_serverhello_reneg_ext -#undef ssl_parse_clienthello_renegotiate_ext -#define ssl_parse_clienthello_renegotiate_ext ssl_parse_clienthello_reneg_ext -#undef ssl_parse_serverhello_renegotiate_ext -#define ssl_parse_serverhello_renegotiate_ext ssl_parse_serverhello_reneg_ext -#undef SSL_srp_server_param_with_username -#define SSL_srp_server_param_with_username SSL_srp_server_param_with_un -#undef SSL_CTX_set_srp_client_pwd_callback -#define SSL_CTX_set_srp_client_pwd_callback SSL_CTX_set_srp_client_pwd_cb -#undef SSL_CTX_set_srp_verify_param_callback -#define SSL_CTX_set_srp_verify_param_callback SSL_CTX_set_srp_vfy_param_cb -#undef SSL_CTX_set_srp_username_callback -#define SSL_CTX_set_srp_username_callback SSL_CTX_set_srp_un_cb -#undef ssl_add_clienthello_use_srtp_ext -#define ssl_add_clienthello_use_srtp_ext ssl_add_clihello_use_srtp_ext -#undef ssl_add_serverhello_use_srtp_ext -#define ssl_add_serverhello_use_srtp_ext ssl_add_serhello_use_srtp_ext -#undef ssl_parse_clienthello_use_srtp_ext -#define ssl_parse_clienthello_use_srtp_ext ssl_parse_clihello_use_srtp_ext -#undef ssl_parse_serverhello_use_srtp_ext -#define ssl_parse_serverhello_use_srtp_ext ssl_parse_serhello_use_srtp_ext -#undef SSL_CTX_set_next_protos_advertised_cb -#define SSL_CTX_set_next_protos_advertised_cb SSL_CTX_set_next_protos_adv_cb -#undef SSL_CTX_set_next_proto_select_cb -#define SSL_CTX_set_next_proto_select_cb SSL_CTX_set_next_proto_sel_cb -#undef ssl3_cbc_record_digest_supported -#define ssl3_cbc_record_digest_supported ssl3_cbc_record_digest_support -#undef ssl_check_clienthello_tlsext_late -#define ssl_check_clienthello_tlsext_late ssl_check_clihello_tlsext_late -#undef ssl_check_clienthello_tlsext_early -#define ssl_check_clienthello_tlsext_early ssl_check_clihello_tlsext_early - -/* Hack some long ENGINE names */ -#undef ENGINE_get_default_BN_mod_exp_crt -#define ENGINE_get_default_BN_mod_exp_crt ENGINE_get_def_BN_mod_exp_crt -#undef ENGINE_set_default_BN_mod_exp_crt -#define ENGINE_set_default_BN_mod_exp_crt ENGINE_set_def_BN_mod_exp_crt -#undef ENGINE_set_load_privkey_function -#define ENGINE_set_load_privkey_function ENGINE_set_load_privkey_fn -#undef ENGINE_get_load_privkey_function -#define ENGINE_get_load_privkey_function ENGINE_get_load_privkey_fn -#undef ENGINE_unregister_pkey_asn1_meths -#define ENGINE_unregister_pkey_asn1_meths ENGINE_unreg_pkey_asn1_meths -#undef ENGINE_register_all_pkey_asn1_meths -#define ENGINE_register_all_pkey_asn1_meths ENGINE_reg_all_pkey_asn1_meths -#undef ENGINE_set_default_pkey_asn1_meths -#define ENGINE_set_default_pkey_asn1_meths ENGINE_set_def_pkey_asn1_meths -#undef ENGINE_get_pkey_asn1_meth_engine -#define ENGINE_get_pkey_asn1_meth_engine ENGINE_get_pkey_asn1_meth_eng -#undef ENGINE_set_load_ssl_client_cert_function -#define ENGINE_set_load_ssl_client_cert_function \ - ENGINE_set_ld_ssl_clnt_cert_fn -#undef ENGINE_get_ssl_client_cert_function -#define ENGINE_get_ssl_client_cert_function ENGINE_get_ssl_client_cert_fn - -/* Hack some long OCSP names */ -#undef OCSP_REQUEST_get_ext_by_critical -#define OCSP_REQUEST_get_ext_by_critical OCSP_REQUEST_get_ext_by_crit -#undef OCSP_BASICRESP_get_ext_by_critical -#define OCSP_BASICRESP_get_ext_by_critical OCSP_BASICRESP_get_ext_by_crit -#undef OCSP_SINGLERESP_get_ext_by_critical -#define OCSP_SINGLERESP_get_ext_by_critical OCSP_SINGLERESP_get_ext_by_crit - -/* Hack some long DES names */ -#undef _ossl_old_des_ede3_cfb64_encrypt -#define _ossl_old_des_ede3_cfb64_encrypt _ossl_odes_ede3_cfb64_encrypt -#undef _ossl_old_des_ede3_ofb64_encrypt -#define _ossl_old_des_ede3_ofb64_encrypt _ossl_odes_ede3_ofb64_encrypt - -/* Hack some long EVP names */ -#undef OPENSSL_add_all_algorithms_noconf -#define OPENSSL_add_all_algorithms_noconf OPENSSL_add_all_algo_noconf -#undef OPENSSL_add_all_algorithms_conf -#define OPENSSL_add_all_algorithms_conf OPENSSL_add_all_algo_conf -#undef EVP_PKEY_meth_set_verify_recover -#define EVP_PKEY_meth_set_verify_recover EVP_PKEY_meth_set_vrfy_recover - -/* Hack some long EC names */ -#undef EC_GROUP_set_point_conversion_form -#define EC_GROUP_set_point_conversion_form EC_GROUP_set_point_conv_form -#undef EC_GROUP_get_point_conversion_form -#define EC_GROUP_get_point_conversion_form EC_GROUP_get_point_conv_form -#undef EC_GROUP_clear_free_all_extra_data -#define EC_GROUP_clear_free_all_extra_data EC_GROUP_clr_free_all_xtra_data -#undef EC_KEY_set_public_key_affine_coordinates -#define EC_KEY_set_public_key_affine_coordinates \ - EC_KEY_set_pub_key_aff_coords -#undef EC_POINT_set_Jprojective_coordinates_GFp -#define EC_POINT_set_Jprojective_coordinates_GFp \ - EC_POINT_set_Jproj_coords_GFp -#undef EC_POINT_get_Jprojective_coordinates_GFp -#define EC_POINT_get_Jprojective_coordinates_GFp \ - EC_POINT_get_Jproj_coords_GFp -#undef EC_POINT_set_affine_coordinates_GFp -#define EC_POINT_set_affine_coordinates_GFp EC_POINT_set_affine_coords_GFp -#undef EC_POINT_get_affine_coordinates_GFp -#define EC_POINT_get_affine_coordinates_GFp EC_POINT_get_affine_coords_GFp -#undef EC_POINT_set_compressed_coordinates_GFp -#define EC_POINT_set_compressed_coordinates_GFp EC_POINT_set_compr_coords_GFp -#undef EC_POINT_set_affine_coordinates_GF2m -#define EC_POINT_set_affine_coordinates_GF2m EC_POINT_set_affine_coords_GF2m -#undef EC_POINT_get_affine_coordinates_GF2m -#define EC_POINT_get_affine_coordinates_GF2m EC_POINT_get_affine_coords_GF2m -#undef EC_POINT_set_compressed_coordinates_GF2m -#define EC_POINT_set_compressed_coordinates_GF2m \ - EC_POINT_set_compr_coords_GF2m -#undef ec_GF2m_simple_group_clear_finish -#define ec_GF2m_simple_group_clear_finish ec_GF2m_simple_grp_clr_finish -#undef ec_GF2m_simple_group_check_discriminant -#define ec_GF2m_simple_group_check_discriminant ec_GF2m_simple_grp_chk_discrim -#undef ec_GF2m_simple_point_clear_finish -#define ec_GF2m_simple_point_clear_finish ec_GF2m_simple_pt_clr_finish -#undef ec_GF2m_simple_point_set_to_infinity -#define ec_GF2m_simple_point_set_to_infinity ec_GF2m_simple_pt_set_to_inf -#undef ec_GF2m_simple_points_make_affine -#define ec_GF2m_simple_points_make_affine ec_GF2m_simple_pts_make_affine -#undef ec_GF2m_simple_point_set_affine_coordinates -#define ec_GF2m_simple_point_set_affine_coordinates \ - ec_GF2m_smp_pt_set_af_coords -#undef ec_GF2m_simple_point_get_affine_coordinates -#define ec_GF2m_simple_point_get_affine_coordinates \ - ec_GF2m_smp_pt_get_af_coords -#undef ec_GF2m_simple_set_compressed_coordinates -#define ec_GF2m_simple_set_compressed_coordinates \ - ec_GF2m_smp_set_compr_coords -#undef ec_GFp_simple_group_set_curve_GFp -#define ec_GFp_simple_group_set_curve_GFp ec_GFp_simple_grp_set_curve_GFp -#undef ec_GFp_simple_group_get_curve_GFp -#define ec_GFp_simple_group_get_curve_GFp ec_GFp_simple_grp_get_curve_GFp -#undef ec_GFp_simple_group_clear_finish -#define ec_GFp_simple_group_clear_finish ec_GFp_simple_grp_clear_finish -#undef ec_GFp_simple_group_set_generator -#define ec_GFp_simple_group_set_generator ec_GFp_simple_grp_set_generator -#undef ec_GFp_simple_group_get0_generator -#define ec_GFp_simple_group_get0_generator ec_GFp_simple_grp_gt0_generator -#undef ec_GFp_simple_group_get_cofactor -#define ec_GFp_simple_group_get_cofactor ec_GFp_simple_grp_get_cofactor -#undef ec_GFp_simple_point_clear_finish -#define ec_GFp_simple_point_clear_finish ec_GFp_simple_pt_clear_finish -#undef ec_GFp_simple_point_set_to_infinity -#define ec_GFp_simple_point_set_to_infinity ec_GFp_simple_pt_set_to_inf -#undef ec_GFp_simple_points_make_affine -#define ec_GFp_simple_points_make_affine ec_GFp_simple_pts_make_affine -#undef ec_GFp_simple_set_Jprojective_coordinates_GFp -#define ec_GFp_simple_set_Jprojective_coordinates_GFp \ - ec_GFp_smp_set_Jproj_coords_GFp -#undef ec_GFp_simple_get_Jprojective_coordinates_GFp -#define ec_GFp_simple_get_Jprojective_coordinates_GFp \ - ec_GFp_smp_get_Jproj_coords_GFp -#undef ec_GFp_simple_point_set_affine_coordinates_GFp -#define ec_GFp_simple_point_set_affine_coordinates_GFp \ - ec_GFp_smp_pt_set_af_coords_GFp -#undef ec_GFp_simple_point_get_affine_coordinates_GFp -#define ec_GFp_simple_point_get_affine_coordinates_GFp \ - ec_GFp_smp_pt_get_af_coords_GFp -#undef ec_GFp_simple_set_compressed_coordinates_GFp -#define ec_GFp_simple_set_compressed_coordinates_GFp \ - ec_GFp_smp_set_compr_coords_GFp -#undef ec_GFp_simple_point_set_affine_coordinates -#define ec_GFp_simple_point_set_affine_coordinates \ - ec_GFp_smp_pt_set_af_coords -#undef ec_GFp_simple_point_get_affine_coordinates -#define ec_GFp_simple_point_get_affine_coordinates \ - ec_GFp_smp_pt_get_af_coords -#undef ec_GFp_simple_set_compressed_coordinates -#define ec_GFp_simple_set_compressed_coordinates \ - ec_GFp_smp_set_compr_coords -#undef ec_GFp_simple_group_check_discriminant -#define ec_GFp_simple_group_check_discriminant ec_GFp_simple_grp_chk_discrim - -/* Hack som long STORE names */ -#undef STORE_method_set_initialise_function -#define STORE_method_set_initialise_function STORE_meth_set_initialise_fn -#undef STORE_method_set_cleanup_function -#define STORE_method_set_cleanup_function STORE_meth_set_cleanup_fn -#undef STORE_method_set_generate_function -#define STORE_method_set_generate_function STORE_meth_set_generate_fn -#undef STORE_method_set_modify_function -#define STORE_method_set_modify_function STORE_meth_set_modify_fn -#undef STORE_method_set_revoke_function -#define STORE_method_set_revoke_function STORE_meth_set_revoke_fn -#undef STORE_method_set_delete_function -#define STORE_method_set_delete_function STORE_meth_set_delete_fn -#undef STORE_method_set_list_start_function -#define STORE_method_set_list_start_function STORE_meth_set_list_start_fn -#undef STORE_method_set_list_next_function -#define STORE_method_set_list_next_function STORE_meth_set_list_next_fn -#undef STORE_method_set_list_end_function -#define STORE_method_set_list_end_function STORE_meth_set_list_end_fn -#undef STORE_method_set_update_store_function -#define STORE_method_set_update_store_function STORE_meth_set_update_store_fn -#undef STORE_method_set_lock_store_function -#define STORE_method_set_lock_store_function STORE_meth_set_lock_store_fn -#undef STORE_method_set_unlock_store_function -#define STORE_method_set_unlock_store_function STORE_meth_set_unlock_store_fn -#undef STORE_method_get_initialise_function -#define STORE_method_get_initialise_function STORE_meth_get_initialise_fn -#undef STORE_method_get_cleanup_function -#define STORE_method_get_cleanup_function STORE_meth_get_cleanup_fn -#undef STORE_method_get_generate_function -#define STORE_method_get_generate_function STORE_meth_get_generate_fn -#undef STORE_method_get_modify_function -#define STORE_method_get_modify_function STORE_meth_get_modify_fn -#undef STORE_method_get_revoke_function -#define STORE_method_get_revoke_function STORE_meth_get_revoke_fn -#undef STORE_method_get_delete_function -#define STORE_method_get_delete_function STORE_meth_get_delete_fn -#undef STORE_method_get_list_start_function -#define STORE_method_get_list_start_function STORE_meth_get_list_start_fn -#undef STORE_method_get_list_next_function -#define STORE_method_get_list_next_function STORE_meth_get_list_next_fn -#undef STORE_method_get_list_end_function -#define STORE_method_get_list_end_function STORE_meth_get_list_end_fn -#undef STORE_method_get_update_store_function -#define STORE_method_get_update_store_function STORE_meth_get_update_store_fn -#undef STORE_method_get_lock_store_function -#define STORE_method_get_lock_store_function STORE_meth_get_lock_store_fn -#undef STORE_method_get_unlock_store_function -#define STORE_method_get_unlock_store_function STORE_meth_get_unlock_store_fn - -/* Hack some long TS names */ -#undef TS_RESP_CTX_set_status_info_cond -#define TS_RESP_CTX_set_status_info_cond TS_RESP_CTX_set_stat_info_cond -#undef TS_RESP_CTX_set_clock_precision_digits -#define TS_RESP_CTX_set_clock_precision_digits TS_RESP_CTX_set_clk_prec_digits -#undef TS_CONF_set_clock_precision_digits -#define TS_CONF_set_clock_precision_digits TS_CONF_set_clk_prec_digits - -/* Hack some long CMS names */ -#undef CMS_RecipientInfo_ktri_get0_algs -#define CMS_RecipientInfo_ktri_get0_algs CMS_RecipInfo_ktri_get0_algs -#undef CMS_RecipientInfo_ktri_get0_signer_id -#define CMS_RecipientInfo_ktri_get0_signer_id CMS_RecipInfo_ktri_get0_sigr_id -#undef CMS_OtherRevocationInfoFormat_it -#define CMS_OtherRevocationInfoFormat_it CMS_OtherRevocInfoFormat_it -#undef CMS_KeyAgreeRecipientIdentifier_it -#define CMS_KeyAgreeRecipientIdentifier_it CMS_KeyAgreeRecipIdentifier_it -#undef CMS_OriginatorIdentifierOrKey_it -#define CMS_OriginatorIdentifierOrKey_it CMS_OriginatorIdOrKey_it -#undef cms_SignerIdentifier_get0_signer_id -#define cms_SignerIdentifier_get0_signer_id cms_SignerId_get0_signer_id - -/* Hack some long DTLS1 names */ -#undef dtls1_retransmit_buffered_messages -#define dtls1_retransmit_buffered_messages dtls1_retransmit_buffered_msgs - -/* Hack some long SRP names */ -#undef SRP_generate_server_master_secret -#define SRP_generate_server_master_secret SRP_gen_server_master_secret -#undef SRP_generate_client_master_secret -#define SRP_generate_client_master_secret SRP_gen_client_master_secret - -/* Hack some long UI names */ -#undef UI_method_get_prompt_constructor -#define UI_method_get_prompt_constructor UI_method_get_prompt_constructr -#undef UI_method_set_prompt_constructor -#define UI_method_set_prompt_constructor UI_method_set_prompt_constructr - -#endif /* defined OPENSSL_SYS_VMS */ - - -/* Case insensitive linking causes problems.... */ -#if defined(OPENSSL_SYS_VMS) || defined(OPENSSL_SYS_OS2) -#undef ERR_load_CRYPTO_strings -#define ERR_load_CRYPTO_strings ERR_load_CRYPTOlib_strings -#undef OCSP_crlID_new -#define OCSP_crlID_new OCSP_crlID2_new - -#undef d2i_ECPARAMETERS -#define d2i_ECPARAMETERS d2i_UC_ECPARAMETERS -#undef i2d_ECPARAMETERS -#define i2d_ECPARAMETERS i2d_UC_ECPARAMETERS -#undef d2i_ECPKPARAMETERS -#define d2i_ECPKPARAMETERS d2i_UC_ECPKPARAMETERS -#undef i2d_ECPKPARAMETERS -#define i2d_ECPKPARAMETERS i2d_UC_ECPKPARAMETERS - -/* These functions do not seem to exist! However, I'm paranoid... - Original command in x509v3.h: - These functions are being redefined in another directory, - and clash when the linker is case-insensitive, so let's - hide them a little, by giving them an extra 'o' at the - beginning of the name... */ -#undef X509v3_cleanup_extensions -#define X509v3_cleanup_extensions oX509v3_cleanup_extensions -#undef X509v3_add_extension -#define X509v3_add_extension oX509v3_add_extension -#undef X509v3_add_netscape_extensions -#define X509v3_add_netscape_extensions oX509v3_add_netscape_extensions -#undef X509v3_add_standard_extensions -#define X509v3_add_standard_extensions oX509v3_add_standard_extensions - -/* This one clashes with CMS_data_create */ -#undef cms_Data_create -#define cms_Data_create priv_cms_Data_create - -#endif - - -#endif /* ! defined HEADER_VMS_IDHACKS_H */ diff --git a/Pods/OpenSSL-Universal/include-osx/openssl/tls1.h b/Pods/OpenSSL-Universal/include-osx/openssl/tls1.h deleted file mode 100644 index c992091e..00000000 --- a/Pods/OpenSSL-Universal/include-osx/openssl/tls1.h +++ /dev/null @@ -1,741 +0,0 @@ -/* ssl/tls1.h */ -/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) - * All rights reserved. - * - * This package is an SSL implementation written - * by Eric Young (eay@cryptsoft.com). - * The implementation was written so as to conform with Netscapes SSL. - * - * This library is free for commercial and non-commercial use as long as - * the following conditions are aheared to. The following conditions - * apply to all code found in this distribution, be it the RC4, RSA, - * lhash, DES, etc., code; not just the SSL code. The SSL documentation - * included with this distribution is covered by the same copyright terms - * except that the holder is Tim Hudson (tjh@cryptsoft.com). - * - * Copyright remains Eric Young's, and as such any Copyright notices in - * the code are not to be removed. - * If this package is used in a product, Eric Young should be given attribution - * as the author of the parts of the library used. - * This can be in the form of a textual message at program startup or - * in documentation (online or textual) provided with the package. - * - * Redistribution and use in source and binary forms, with or without - * modification, are permitted provided that the following conditions - * are met: - * 1. Redistributions of source code must retain the copyright - * notice, this list of conditions and the following disclaimer. - * 2. Redistributions in binary form must reproduce the above copyright - * notice, this list of conditions and the following disclaimer in the - * documentation and/or other materials provided with the distribution. - * 3. All advertising materials mentioning features or use of this software - * must display the following acknowledgement: - * "This product includes cryptographic software written by - * Eric Young (eay@cryptsoft.com)" - * The word 'cryptographic' can be left out if the rouines from the library - * being used are not cryptographic related :-). - * 4. If you include any Windows specific code (or a derivative thereof) from - * the apps directory (application code) you must include an acknowledgement: - * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" - * - * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND - * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE - * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE - * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE - * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL - * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS - * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) - * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT - * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY - * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF - * SUCH DAMAGE. - * - * The licence and distribution terms for any publically available version or - * derivative of this code cannot be changed. i.e. this code cannot simply be - * copied and put under another distribution licence - * [including the GNU Public Licence.] - */ -/* ==================================================================== - * Copyright (c) 1998-2006 The OpenSSL Project. All rights reserved. - * - * Redistribution and use in source and binary forms, with or without - * modification, are permitted provided that the following conditions - * are met: - * - * 1. Redistributions of source code must retain the above copyright - * notice, this list of conditions and the following disclaimer. - * - * 2. Redistributions in binary form must reproduce the above copyright - * notice, this list of conditions and the following disclaimer in - * the documentation and/or other materials provided with the - * distribution. - * - * 3. All advertising materials mentioning features or use of this - * software must display the following acknowledgment: - * "This product includes software developed by the OpenSSL Project - * for use in the OpenSSL Toolkit. (http://www.openssl.org/)" - * - * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to - * endorse or promote products derived from this software without - * prior written permission. For written permission, please contact - * openssl-core@openssl.org. - * - * 5. Products derived from this software may not be called "OpenSSL" - * nor may "OpenSSL" appear in their names without prior written - * permission of the OpenSSL Project. - * - * 6. Redistributions of any form whatsoever must retain the following - * acknowledgment: - * "This product includes software developed by the OpenSSL Project - * for use in the OpenSSL Toolkit (http://www.openssl.org/)" - * - * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY - * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE - * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR - * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR - * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, - * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT - * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; - * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) - * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, - * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) - * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED - * OF THE POSSIBILITY OF SUCH DAMAGE. - * ==================================================================== - * - * This product includes cryptographic software written by Eric Young - * (eay@cryptsoft.com). This product includes software written by Tim - * Hudson (tjh@cryptsoft.com). - * - */ -/* ==================================================================== - * Copyright 2002 Sun Microsystems, Inc. ALL RIGHTS RESERVED. - * - * Portions of the attached software ("Contribution") are developed by - * SUN MICROSYSTEMS, INC., and are contributed to the OpenSSL project. - * - * The Contribution is licensed pursuant to the OpenSSL open source - * license provided above. - * - * ECC cipher suite support in OpenSSL originally written by - * Vipul Gupta and Sumit Gupta of Sun Microsystems Laboratories. - * - */ -/* ==================================================================== - * Copyright 2005 Nokia. All rights reserved. - * - * The portions of the attached software ("Contribution") is developed by - * Nokia Corporation and is licensed pursuant to the OpenSSL open source - * license. - * - * The Contribution, originally written by Mika Kousa and Pasi Eronen of - * Nokia Corporation, consists of the "PSK" (Pre-Shared Key) ciphersuites - * support (see RFC 4279) to OpenSSL. - * - * No patent licenses or other rights except those expressly stated in - * the OpenSSL open source license shall be deemed granted or received - * expressly, by implication, estoppel, or otherwise. - * - * No assurances are provided by Nokia that the Contribution does not - * infringe the patent or other intellectual property rights of any third - * party or that the license provides you with all the necessary rights - * to make use of the Contribution. - * - * THE SOFTWARE IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. IN - * ADDITION TO THE DISCLAIMERS INCLUDED IN THE LICENSE, NOKIA - * SPECIFICALLY DISCLAIMS ANY LIABILITY FOR CLAIMS BROUGHT BY YOU OR ANY - * OTHER ENTITY BASED ON INFRINGEMENT OF INTELLECTUAL PROPERTY RIGHTS OR - * OTHERWISE. - */ - -#ifndef HEADER_TLS1_H -#define HEADER_TLS1_H - -#include - -#ifdef __cplusplus -extern "C" { -#endif - -#define TLS1_ALLOW_EXPERIMENTAL_CIPHERSUITES 0 - -#define TLS1_2_VERSION 0x0303 -#define TLS1_2_VERSION_MAJOR 0x03 -#define TLS1_2_VERSION_MINOR 0x03 - -#define TLS1_1_VERSION 0x0302 -#define TLS1_1_VERSION_MAJOR 0x03 -#define TLS1_1_VERSION_MINOR 0x02 - -#define TLS1_VERSION 0x0301 -#define TLS1_VERSION_MAJOR 0x03 -#define TLS1_VERSION_MINOR 0x01 - -#define TLS1_get_version(s) \ - ((s->version >> 8) == TLS1_VERSION_MAJOR ? s->version : 0) - -#define TLS1_get_client_version(s) \ - ((s->client_version >> 8) == TLS1_VERSION_MAJOR ? s->client_version : 0) - -#define TLS1_AD_DECRYPTION_FAILED 21 -#define TLS1_AD_RECORD_OVERFLOW 22 -#define TLS1_AD_UNKNOWN_CA 48 /* fatal */ -#define TLS1_AD_ACCESS_DENIED 49 /* fatal */ -#define TLS1_AD_DECODE_ERROR 50 /* fatal */ -#define TLS1_AD_DECRYPT_ERROR 51 -#define TLS1_AD_EXPORT_RESTRICTION 60 /* fatal */ -#define TLS1_AD_PROTOCOL_VERSION 70 /* fatal */ -#define TLS1_AD_INSUFFICIENT_SECURITY 71 /* fatal */ -#define TLS1_AD_INTERNAL_ERROR 80 /* fatal */ -#define TLS1_AD_USER_CANCELLED 90 -#define TLS1_AD_NO_RENEGOTIATION 100 -/* codes 110-114 are from RFC3546 */ -#define TLS1_AD_UNSUPPORTED_EXTENSION 110 -#define TLS1_AD_CERTIFICATE_UNOBTAINABLE 111 -#define TLS1_AD_UNRECOGNIZED_NAME 112 -#define TLS1_AD_BAD_CERTIFICATE_STATUS_RESPONSE 113 -#define TLS1_AD_BAD_CERTIFICATE_HASH_VALUE 114 -#define TLS1_AD_UNKNOWN_PSK_IDENTITY 115 /* fatal */ - -/* ExtensionType values from RFC3546 / RFC4366 / RFC6066 */ -#define TLSEXT_TYPE_server_name 0 -#define TLSEXT_TYPE_max_fragment_length 1 -#define TLSEXT_TYPE_client_certificate_url 2 -#define TLSEXT_TYPE_trusted_ca_keys 3 -#define TLSEXT_TYPE_truncated_hmac 4 -#define TLSEXT_TYPE_status_request 5 -/* ExtensionType values from RFC4681 */ -#define TLSEXT_TYPE_user_mapping 6 - -/* ExtensionType values from RFC5878 */ -#define TLSEXT_TYPE_client_authz 7 -#define TLSEXT_TYPE_server_authz 8 - -/* ExtensionType values from RFC6091 */ -#define TLSEXT_TYPE_cert_type 9 - -/* ExtensionType values from RFC4492 */ -#define TLSEXT_TYPE_elliptic_curves 10 -#define TLSEXT_TYPE_ec_point_formats 11 - -/* ExtensionType value from RFC5054 */ -#define TLSEXT_TYPE_srp 12 - -/* ExtensionType values from RFC5246 */ -#define TLSEXT_TYPE_signature_algorithms 13 - -/* ExtensionType value from RFC5764 */ -#define TLSEXT_TYPE_use_srtp 14 - -/* ExtensionType value from RFC5620 */ -#define TLSEXT_TYPE_heartbeat 15 - -/* ExtensionType value for TLS padding extension. - * http://www.iana.org/assignments/tls-extensiontype-values/tls-extensiontype-values.xhtml - * http://tools.ietf.org/html/draft-agl-tls-padding-03 - */ -#define TLSEXT_TYPE_padding 21 - -/* ExtensionType value from RFC4507 */ -#define TLSEXT_TYPE_session_ticket 35 - -/* ExtensionType value from draft-rescorla-tls-opaque-prf-input-00.txt */ -#if 0 /* will have to be provided externally for now , - * i.e. build with -DTLSEXT_TYPE_opaque_prf_input=38183 - * using whatever extension number you'd like to try */ -# define TLSEXT_TYPE_opaque_prf_input ?? */ -#endif - -/* Temporary extension type */ -#define TLSEXT_TYPE_renegotiate 0xff01 - -#ifndef OPENSSL_NO_NEXTPROTONEG -/* This is not an IANA defined extension number */ -#define TLSEXT_TYPE_next_proto_neg 13172 -#endif - -/* NameType value from RFC 3546 */ -#define TLSEXT_NAMETYPE_host_name 0 -/* status request value from RFC 3546 */ -#define TLSEXT_STATUSTYPE_ocsp 1 - -/* ECPointFormat values from draft-ietf-tls-ecc-12 */ -#define TLSEXT_ECPOINTFORMAT_first 0 -#define TLSEXT_ECPOINTFORMAT_uncompressed 0 -#define TLSEXT_ECPOINTFORMAT_ansiX962_compressed_prime 1 -#define TLSEXT_ECPOINTFORMAT_ansiX962_compressed_char2 2 -#define TLSEXT_ECPOINTFORMAT_last 2 - -/* Signature and hash algorithms from RFC 5246 */ - -#define TLSEXT_signature_anonymous 0 -#define TLSEXT_signature_rsa 1 -#define TLSEXT_signature_dsa 2 -#define TLSEXT_signature_ecdsa 3 - -#define TLSEXT_hash_none 0 -#define TLSEXT_hash_md5 1 -#define TLSEXT_hash_sha1 2 -#define TLSEXT_hash_sha224 3 -#define TLSEXT_hash_sha256 4 -#define TLSEXT_hash_sha384 5 -#define TLSEXT_hash_sha512 6 - -#ifndef OPENSSL_NO_TLSEXT - -#define TLSEXT_MAXLEN_host_name 255 - -const char *SSL_get_servername(const SSL *s, const int type); -int SSL_get_servername_type(const SSL *s); -/* SSL_export_keying_material exports a value derived from the master secret, - * as specified in RFC 5705. It writes |olen| bytes to |out| given a label and - * optional context. (Since a zero length context is allowed, the |use_context| - * flag controls whether a context is included.) - * - * It returns 1 on success and zero otherwise. - */ -int SSL_export_keying_material(SSL *s, unsigned char *out, size_t olen, - const char *label, size_t llen, const unsigned char *p, size_t plen, - int use_context); - -#define SSL_set_tlsext_host_name(s,name) \ -SSL_ctrl(s,SSL_CTRL_SET_TLSEXT_HOSTNAME,TLSEXT_NAMETYPE_host_name,(char *)name) - -#define SSL_set_tlsext_debug_callback(ssl, cb) \ -SSL_callback_ctrl(ssl,SSL_CTRL_SET_TLSEXT_DEBUG_CB,(void (*)(void))cb) - -#define SSL_set_tlsext_debug_arg(ssl, arg) \ -SSL_ctrl(ssl,SSL_CTRL_SET_TLSEXT_DEBUG_ARG,0, (void *)arg) - -#define SSL_set_tlsext_status_type(ssl, type) \ -SSL_ctrl(ssl,SSL_CTRL_SET_TLSEXT_STATUS_REQ_TYPE,type, NULL) - -#define SSL_get_tlsext_status_exts(ssl, arg) \ -SSL_ctrl(ssl,SSL_CTRL_GET_TLSEXT_STATUS_REQ_EXTS,0, (void *)arg) - -#define SSL_set_tlsext_status_exts(ssl, arg) \ -SSL_ctrl(ssl,SSL_CTRL_SET_TLSEXT_STATUS_REQ_EXTS,0, (void *)arg) - -#define SSL_get_tlsext_status_ids(ssl, arg) \ -SSL_ctrl(ssl,SSL_CTRL_GET_TLSEXT_STATUS_REQ_IDS,0, (void *)arg) - -#define SSL_set_tlsext_status_ids(ssl, arg) \ -SSL_ctrl(ssl,SSL_CTRL_SET_TLSEXT_STATUS_REQ_IDS,0, (void *)arg) - -#define SSL_get_tlsext_status_ocsp_resp(ssl, arg) \ -SSL_ctrl(ssl,SSL_CTRL_GET_TLSEXT_STATUS_REQ_OCSP_RESP,0, (void *)arg) - -#define SSL_set_tlsext_status_ocsp_resp(ssl, arg, arglen) \ -SSL_ctrl(ssl,SSL_CTRL_SET_TLSEXT_STATUS_REQ_OCSP_RESP,arglen, (void *)arg) - -#define SSL_CTX_set_tlsext_servername_callback(ctx, cb) \ -SSL_CTX_callback_ctrl(ctx,SSL_CTRL_SET_TLSEXT_SERVERNAME_CB,(void (*)(void))cb) - -#define SSL_TLSEXT_ERR_OK 0 -#define SSL_TLSEXT_ERR_ALERT_WARNING 1 -#define SSL_TLSEXT_ERR_ALERT_FATAL 2 -#define SSL_TLSEXT_ERR_NOACK 3 - -#define SSL_CTX_set_tlsext_servername_arg(ctx, arg) \ -SSL_CTX_ctrl(ctx,SSL_CTRL_SET_TLSEXT_SERVERNAME_ARG,0, (void *)arg) - -#define SSL_CTX_get_tlsext_ticket_keys(ctx, keys, keylen) \ - SSL_CTX_ctrl((ctx),SSL_CTRL_GET_TLSEXT_TICKET_KEYS,(keylen),(keys)) -#define SSL_CTX_set_tlsext_ticket_keys(ctx, keys, keylen) \ - SSL_CTX_ctrl((ctx),SSL_CTRL_SET_TLSEXT_TICKET_KEYS,(keylen),(keys)) - -#define SSL_CTX_set_tlsext_status_cb(ssl, cb) \ -SSL_CTX_callback_ctrl(ssl,SSL_CTRL_SET_TLSEXT_STATUS_REQ_CB,(void (*)(void))cb) - -#define SSL_CTX_set_tlsext_status_arg(ssl, arg) \ -SSL_CTX_ctrl(ssl,SSL_CTRL_SET_TLSEXT_STATUS_REQ_CB_ARG,0, (void *)arg) - -#define SSL_set_tlsext_opaque_prf_input(s, src, len) \ -SSL_ctrl(s,SSL_CTRL_SET_TLSEXT_OPAQUE_PRF_INPUT, len, src) -#define SSL_CTX_set_tlsext_opaque_prf_input_callback(ctx, cb) \ -SSL_CTX_callback_ctrl(ctx,SSL_CTRL_SET_TLSEXT_OPAQUE_PRF_INPUT_CB, (void (*)(void))cb) -#define SSL_CTX_set_tlsext_opaque_prf_input_callback_arg(ctx, arg) \ -SSL_CTX_ctrl(ctx,SSL_CTRL_SET_TLSEXT_OPAQUE_PRF_INPUT_CB_ARG, 0, arg) - -#define SSL_CTX_set_tlsext_ticket_key_cb(ssl, cb) \ -SSL_CTX_callback_ctrl(ssl,SSL_CTRL_SET_TLSEXT_TICKET_KEY_CB,(void (*)(void))cb) - -#ifndef OPENSSL_NO_HEARTBEATS -#define SSL_TLSEXT_HB_ENABLED 0x01 -#define SSL_TLSEXT_HB_DONT_SEND_REQUESTS 0x02 -#define SSL_TLSEXT_HB_DONT_RECV_REQUESTS 0x04 - -#define SSL_get_tlsext_heartbeat_pending(ssl) \ - SSL_ctrl((ssl),SSL_CTRL_GET_TLS_EXT_HEARTBEAT_PENDING,0,NULL) -#define SSL_set_tlsext_heartbeat_no_requests(ssl, arg) \ - SSL_ctrl((ssl),SSL_CTRL_SET_TLS_EXT_HEARTBEAT_NO_REQUESTS,arg,NULL) -#endif -#endif - -/* PSK ciphersuites from 4279 */ -#define TLS1_CK_PSK_WITH_RC4_128_SHA 0x0300008A -#define TLS1_CK_PSK_WITH_3DES_EDE_CBC_SHA 0x0300008B -#define TLS1_CK_PSK_WITH_AES_128_CBC_SHA 0x0300008C -#define TLS1_CK_PSK_WITH_AES_256_CBC_SHA 0x0300008D - -/* Additional TLS ciphersuites from expired Internet Draft - * draft-ietf-tls-56-bit-ciphersuites-01.txt - * (available if TLS1_ALLOW_EXPERIMENTAL_CIPHERSUITES is defined, see - * s3_lib.c). We actually treat them like SSL 3.0 ciphers, which we probably - * shouldn't. Note that the first two are actually not in the IDs. */ -#define TLS1_CK_RSA_EXPORT1024_WITH_RC4_56_MD5 0x03000060 /* not in ID */ -#define TLS1_CK_RSA_EXPORT1024_WITH_RC2_CBC_56_MD5 0x03000061 /* not in ID */ -#define TLS1_CK_RSA_EXPORT1024_WITH_DES_CBC_SHA 0x03000062 -#define TLS1_CK_DHE_DSS_EXPORT1024_WITH_DES_CBC_SHA 0x03000063 -#define TLS1_CK_RSA_EXPORT1024_WITH_RC4_56_SHA 0x03000064 -#define TLS1_CK_DHE_DSS_EXPORT1024_WITH_RC4_56_SHA 0x03000065 -#define TLS1_CK_DHE_DSS_WITH_RC4_128_SHA 0x03000066 - -/* AES ciphersuites from RFC3268 */ - -#define TLS1_CK_RSA_WITH_AES_128_SHA 0x0300002F -#define TLS1_CK_DH_DSS_WITH_AES_128_SHA 0x03000030 -#define TLS1_CK_DH_RSA_WITH_AES_128_SHA 0x03000031 -#define TLS1_CK_DHE_DSS_WITH_AES_128_SHA 0x03000032 -#define TLS1_CK_DHE_RSA_WITH_AES_128_SHA 0x03000033 -#define TLS1_CK_ADH_WITH_AES_128_SHA 0x03000034 - -#define TLS1_CK_RSA_WITH_AES_256_SHA 0x03000035 -#define TLS1_CK_DH_DSS_WITH_AES_256_SHA 0x03000036 -#define TLS1_CK_DH_RSA_WITH_AES_256_SHA 0x03000037 -#define TLS1_CK_DHE_DSS_WITH_AES_256_SHA 0x03000038 -#define TLS1_CK_DHE_RSA_WITH_AES_256_SHA 0x03000039 -#define TLS1_CK_ADH_WITH_AES_256_SHA 0x0300003A - -/* TLS v1.2 ciphersuites */ -#define TLS1_CK_RSA_WITH_NULL_SHA256 0x0300003B -#define TLS1_CK_RSA_WITH_AES_128_SHA256 0x0300003C -#define TLS1_CK_RSA_WITH_AES_256_SHA256 0x0300003D -#define TLS1_CK_DH_DSS_WITH_AES_128_SHA256 0x0300003E -#define TLS1_CK_DH_RSA_WITH_AES_128_SHA256 0x0300003F -#define TLS1_CK_DHE_DSS_WITH_AES_128_SHA256 0x03000040 - -/* Camellia ciphersuites from RFC4132 */ -#define TLS1_CK_RSA_WITH_CAMELLIA_128_CBC_SHA 0x03000041 -#define TLS1_CK_DH_DSS_WITH_CAMELLIA_128_CBC_SHA 0x03000042 -#define TLS1_CK_DH_RSA_WITH_CAMELLIA_128_CBC_SHA 0x03000043 -#define TLS1_CK_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA 0x03000044 -#define TLS1_CK_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA 0x03000045 -#define TLS1_CK_ADH_WITH_CAMELLIA_128_CBC_SHA 0x03000046 - -/* TLS v1.2 ciphersuites */ -#define TLS1_CK_DHE_RSA_WITH_AES_128_SHA256 0x03000067 -#define TLS1_CK_DH_DSS_WITH_AES_256_SHA256 0x03000068 -#define TLS1_CK_DH_RSA_WITH_AES_256_SHA256 0x03000069 -#define TLS1_CK_DHE_DSS_WITH_AES_256_SHA256 0x0300006A -#define TLS1_CK_DHE_RSA_WITH_AES_256_SHA256 0x0300006B -#define TLS1_CK_ADH_WITH_AES_128_SHA256 0x0300006C -#define TLS1_CK_ADH_WITH_AES_256_SHA256 0x0300006D - -/* Camellia ciphersuites from RFC4132 */ -#define TLS1_CK_RSA_WITH_CAMELLIA_256_CBC_SHA 0x03000084 -#define TLS1_CK_DH_DSS_WITH_CAMELLIA_256_CBC_SHA 0x03000085 -#define TLS1_CK_DH_RSA_WITH_CAMELLIA_256_CBC_SHA 0x03000086 -#define TLS1_CK_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA 0x03000087 -#define TLS1_CK_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA 0x03000088 -#define TLS1_CK_ADH_WITH_CAMELLIA_256_CBC_SHA 0x03000089 - -/* SEED ciphersuites from RFC4162 */ -#define TLS1_CK_RSA_WITH_SEED_SHA 0x03000096 -#define TLS1_CK_DH_DSS_WITH_SEED_SHA 0x03000097 -#define TLS1_CK_DH_RSA_WITH_SEED_SHA 0x03000098 -#define TLS1_CK_DHE_DSS_WITH_SEED_SHA 0x03000099 -#define TLS1_CK_DHE_RSA_WITH_SEED_SHA 0x0300009A -#define TLS1_CK_ADH_WITH_SEED_SHA 0x0300009B - -/* TLS v1.2 GCM ciphersuites from RFC5288 */ -#define TLS1_CK_RSA_WITH_AES_128_GCM_SHA256 0x0300009C -#define TLS1_CK_RSA_WITH_AES_256_GCM_SHA384 0x0300009D -#define TLS1_CK_DHE_RSA_WITH_AES_128_GCM_SHA256 0x0300009E -#define TLS1_CK_DHE_RSA_WITH_AES_256_GCM_SHA384 0x0300009F -#define TLS1_CK_DH_RSA_WITH_AES_128_GCM_SHA256 0x030000A0 -#define TLS1_CK_DH_RSA_WITH_AES_256_GCM_SHA384 0x030000A1 -#define TLS1_CK_DHE_DSS_WITH_AES_128_GCM_SHA256 0x030000A2 -#define TLS1_CK_DHE_DSS_WITH_AES_256_GCM_SHA384 0x030000A3 -#define TLS1_CK_DH_DSS_WITH_AES_128_GCM_SHA256 0x030000A4 -#define TLS1_CK_DH_DSS_WITH_AES_256_GCM_SHA384 0x030000A5 -#define TLS1_CK_ADH_WITH_AES_128_GCM_SHA256 0x030000A6 -#define TLS1_CK_ADH_WITH_AES_256_GCM_SHA384 0x030000A7 - -/* ECC ciphersuites from draft-ietf-tls-ecc-12.txt with changes soon to be in draft 13 */ -#define TLS1_CK_ECDH_ECDSA_WITH_NULL_SHA 0x0300C001 -#define TLS1_CK_ECDH_ECDSA_WITH_RC4_128_SHA 0x0300C002 -#define TLS1_CK_ECDH_ECDSA_WITH_DES_192_CBC3_SHA 0x0300C003 -#define TLS1_CK_ECDH_ECDSA_WITH_AES_128_CBC_SHA 0x0300C004 -#define TLS1_CK_ECDH_ECDSA_WITH_AES_256_CBC_SHA 0x0300C005 - -#define TLS1_CK_ECDHE_ECDSA_WITH_NULL_SHA 0x0300C006 -#define TLS1_CK_ECDHE_ECDSA_WITH_RC4_128_SHA 0x0300C007 -#define TLS1_CK_ECDHE_ECDSA_WITH_DES_192_CBC3_SHA 0x0300C008 -#define TLS1_CK_ECDHE_ECDSA_WITH_AES_128_CBC_SHA 0x0300C009 -#define TLS1_CK_ECDHE_ECDSA_WITH_AES_256_CBC_SHA 0x0300C00A - -#define TLS1_CK_ECDH_RSA_WITH_NULL_SHA 0x0300C00B -#define TLS1_CK_ECDH_RSA_WITH_RC4_128_SHA 0x0300C00C -#define TLS1_CK_ECDH_RSA_WITH_DES_192_CBC3_SHA 0x0300C00D -#define TLS1_CK_ECDH_RSA_WITH_AES_128_CBC_SHA 0x0300C00E -#define TLS1_CK_ECDH_RSA_WITH_AES_256_CBC_SHA 0x0300C00F - -#define TLS1_CK_ECDHE_RSA_WITH_NULL_SHA 0x0300C010 -#define TLS1_CK_ECDHE_RSA_WITH_RC4_128_SHA 0x0300C011 -#define TLS1_CK_ECDHE_RSA_WITH_DES_192_CBC3_SHA 0x0300C012 -#define TLS1_CK_ECDHE_RSA_WITH_AES_128_CBC_SHA 0x0300C013 -#define TLS1_CK_ECDHE_RSA_WITH_AES_256_CBC_SHA 0x0300C014 - -#define TLS1_CK_ECDH_anon_WITH_NULL_SHA 0x0300C015 -#define TLS1_CK_ECDH_anon_WITH_RC4_128_SHA 0x0300C016 -#define TLS1_CK_ECDH_anon_WITH_DES_192_CBC3_SHA 0x0300C017 -#define TLS1_CK_ECDH_anon_WITH_AES_128_CBC_SHA 0x0300C018 -#define TLS1_CK_ECDH_anon_WITH_AES_256_CBC_SHA 0x0300C019 - -/* SRP ciphersuites from RFC 5054 */ -#define TLS1_CK_SRP_SHA_WITH_3DES_EDE_CBC_SHA 0x0300C01A -#define TLS1_CK_SRP_SHA_RSA_WITH_3DES_EDE_CBC_SHA 0x0300C01B -#define TLS1_CK_SRP_SHA_DSS_WITH_3DES_EDE_CBC_SHA 0x0300C01C -#define TLS1_CK_SRP_SHA_WITH_AES_128_CBC_SHA 0x0300C01D -#define TLS1_CK_SRP_SHA_RSA_WITH_AES_128_CBC_SHA 0x0300C01E -#define TLS1_CK_SRP_SHA_DSS_WITH_AES_128_CBC_SHA 0x0300C01F -#define TLS1_CK_SRP_SHA_WITH_AES_256_CBC_SHA 0x0300C020 -#define TLS1_CK_SRP_SHA_RSA_WITH_AES_256_CBC_SHA 0x0300C021 -#define TLS1_CK_SRP_SHA_DSS_WITH_AES_256_CBC_SHA 0x0300C022 - -/* ECDH HMAC based ciphersuites from RFC5289 */ - -#define TLS1_CK_ECDHE_ECDSA_WITH_AES_128_SHA256 0x0300C023 -#define TLS1_CK_ECDHE_ECDSA_WITH_AES_256_SHA384 0x0300C024 -#define TLS1_CK_ECDH_ECDSA_WITH_AES_128_SHA256 0x0300C025 -#define TLS1_CK_ECDH_ECDSA_WITH_AES_256_SHA384 0x0300C026 -#define TLS1_CK_ECDHE_RSA_WITH_AES_128_SHA256 0x0300C027 -#define TLS1_CK_ECDHE_RSA_WITH_AES_256_SHA384 0x0300C028 -#define TLS1_CK_ECDH_RSA_WITH_AES_128_SHA256 0x0300C029 -#define TLS1_CK_ECDH_RSA_WITH_AES_256_SHA384 0x0300C02A - -/* ECDH GCM based ciphersuites from RFC5289 */ -#define TLS1_CK_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 0x0300C02B -#define TLS1_CK_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 0x0300C02C -#define TLS1_CK_ECDH_ECDSA_WITH_AES_128_GCM_SHA256 0x0300C02D -#define TLS1_CK_ECDH_ECDSA_WITH_AES_256_GCM_SHA384 0x0300C02E -#define TLS1_CK_ECDHE_RSA_WITH_AES_128_GCM_SHA256 0x0300C02F -#define TLS1_CK_ECDHE_RSA_WITH_AES_256_GCM_SHA384 0x0300C030 -#define TLS1_CK_ECDH_RSA_WITH_AES_128_GCM_SHA256 0x0300C031 -#define TLS1_CK_ECDH_RSA_WITH_AES_256_GCM_SHA384 0x0300C032 - -/* XXX - * Inconsistency alert: - * The OpenSSL names of ciphers with ephemeral DH here include the string - * "DHE", while elsewhere it has always been "EDH". - * (The alias for the list of all such ciphers also is "EDH".) - * The specifications speak of "EDH"; maybe we should allow both forms - * for everything. */ -#define TLS1_TXT_RSA_EXPORT1024_WITH_RC4_56_MD5 "EXP1024-RC4-MD5" -#define TLS1_TXT_RSA_EXPORT1024_WITH_RC2_CBC_56_MD5 "EXP1024-RC2-CBC-MD5" -#define TLS1_TXT_RSA_EXPORT1024_WITH_DES_CBC_SHA "EXP1024-DES-CBC-SHA" -#define TLS1_TXT_DHE_DSS_EXPORT1024_WITH_DES_CBC_SHA "EXP1024-DHE-DSS-DES-CBC-SHA" -#define TLS1_TXT_RSA_EXPORT1024_WITH_RC4_56_SHA "EXP1024-RC4-SHA" -#define TLS1_TXT_DHE_DSS_EXPORT1024_WITH_RC4_56_SHA "EXP1024-DHE-DSS-RC4-SHA" -#define TLS1_TXT_DHE_DSS_WITH_RC4_128_SHA "DHE-DSS-RC4-SHA" - -/* AES ciphersuites from RFC3268 */ -#define TLS1_TXT_RSA_WITH_AES_128_SHA "AES128-SHA" -#define TLS1_TXT_DH_DSS_WITH_AES_128_SHA "DH-DSS-AES128-SHA" -#define TLS1_TXT_DH_RSA_WITH_AES_128_SHA "DH-RSA-AES128-SHA" -#define TLS1_TXT_DHE_DSS_WITH_AES_128_SHA "DHE-DSS-AES128-SHA" -#define TLS1_TXT_DHE_RSA_WITH_AES_128_SHA "DHE-RSA-AES128-SHA" -#define TLS1_TXT_ADH_WITH_AES_128_SHA "ADH-AES128-SHA" - -#define TLS1_TXT_RSA_WITH_AES_256_SHA "AES256-SHA" -#define TLS1_TXT_DH_DSS_WITH_AES_256_SHA "DH-DSS-AES256-SHA" -#define TLS1_TXT_DH_RSA_WITH_AES_256_SHA "DH-RSA-AES256-SHA" -#define TLS1_TXT_DHE_DSS_WITH_AES_256_SHA "DHE-DSS-AES256-SHA" -#define TLS1_TXT_DHE_RSA_WITH_AES_256_SHA "DHE-RSA-AES256-SHA" -#define TLS1_TXT_ADH_WITH_AES_256_SHA "ADH-AES256-SHA" - -/* ECC ciphersuites from draft-ietf-tls-ecc-01.txt (Mar 15, 2001) */ -#define TLS1_TXT_ECDH_ECDSA_WITH_NULL_SHA "ECDH-ECDSA-NULL-SHA" -#define TLS1_TXT_ECDH_ECDSA_WITH_RC4_128_SHA "ECDH-ECDSA-RC4-SHA" -#define TLS1_TXT_ECDH_ECDSA_WITH_DES_192_CBC3_SHA "ECDH-ECDSA-DES-CBC3-SHA" -#define TLS1_TXT_ECDH_ECDSA_WITH_AES_128_CBC_SHA "ECDH-ECDSA-AES128-SHA" -#define TLS1_TXT_ECDH_ECDSA_WITH_AES_256_CBC_SHA "ECDH-ECDSA-AES256-SHA" - -#define TLS1_TXT_ECDHE_ECDSA_WITH_NULL_SHA "ECDHE-ECDSA-NULL-SHA" -#define TLS1_TXT_ECDHE_ECDSA_WITH_RC4_128_SHA "ECDHE-ECDSA-RC4-SHA" -#define TLS1_TXT_ECDHE_ECDSA_WITH_DES_192_CBC3_SHA "ECDHE-ECDSA-DES-CBC3-SHA" -#define TLS1_TXT_ECDHE_ECDSA_WITH_AES_128_CBC_SHA "ECDHE-ECDSA-AES128-SHA" -#define TLS1_TXT_ECDHE_ECDSA_WITH_AES_256_CBC_SHA "ECDHE-ECDSA-AES256-SHA" - -#define TLS1_TXT_ECDH_RSA_WITH_NULL_SHA "ECDH-RSA-NULL-SHA" -#define TLS1_TXT_ECDH_RSA_WITH_RC4_128_SHA "ECDH-RSA-RC4-SHA" -#define TLS1_TXT_ECDH_RSA_WITH_DES_192_CBC3_SHA "ECDH-RSA-DES-CBC3-SHA" -#define TLS1_TXT_ECDH_RSA_WITH_AES_128_CBC_SHA "ECDH-RSA-AES128-SHA" -#define TLS1_TXT_ECDH_RSA_WITH_AES_256_CBC_SHA "ECDH-RSA-AES256-SHA" - -#define TLS1_TXT_ECDHE_RSA_WITH_NULL_SHA "ECDHE-RSA-NULL-SHA" -#define TLS1_TXT_ECDHE_RSA_WITH_RC4_128_SHA "ECDHE-RSA-RC4-SHA" -#define TLS1_TXT_ECDHE_RSA_WITH_DES_192_CBC3_SHA "ECDHE-RSA-DES-CBC3-SHA" -#define TLS1_TXT_ECDHE_RSA_WITH_AES_128_CBC_SHA "ECDHE-RSA-AES128-SHA" -#define TLS1_TXT_ECDHE_RSA_WITH_AES_256_CBC_SHA "ECDHE-RSA-AES256-SHA" - -#define TLS1_TXT_ECDH_anon_WITH_NULL_SHA "AECDH-NULL-SHA" -#define TLS1_TXT_ECDH_anon_WITH_RC4_128_SHA "AECDH-RC4-SHA" -#define TLS1_TXT_ECDH_anon_WITH_DES_192_CBC3_SHA "AECDH-DES-CBC3-SHA" -#define TLS1_TXT_ECDH_anon_WITH_AES_128_CBC_SHA "AECDH-AES128-SHA" -#define TLS1_TXT_ECDH_anon_WITH_AES_256_CBC_SHA "AECDH-AES256-SHA" - -/* PSK ciphersuites from RFC 4279 */ -#define TLS1_TXT_PSK_WITH_RC4_128_SHA "PSK-RC4-SHA" -#define TLS1_TXT_PSK_WITH_3DES_EDE_CBC_SHA "PSK-3DES-EDE-CBC-SHA" -#define TLS1_TXT_PSK_WITH_AES_128_CBC_SHA "PSK-AES128-CBC-SHA" -#define TLS1_TXT_PSK_WITH_AES_256_CBC_SHA "PSK-AES256-CBC-SHA" - -/* SRP ciphersuite from RFC 5054 */ -#define TLS1_TXT_SRP_SHA_WITH_3DES_EDE_CBC_SHA "SRP-3DES-EDE-CBC-SHA" -#define TLS1_TXT_SRP_SHA_RSA_WITH_3DES_EDE_CBC_SHA "SRP-RSA-3DES-EDE-CBC-SHA" -#define TLS1_TXT_SRP_SHA_DSS_WITH_3DES_EDE_CBC_SHA "SRP-DSS-3DES-EDE-CBC-SHA" -#define TLS1_TXT_SRP_SHA_WITH_AES_128_CBC_SHA "SRP-AES-128-CBC-SHA" -#define TLS1_TXT_SRP_SHA_RSA_WITH_AES_128_CBC_SHA "SRP-RSA-AES-128-CBC-SHA" -#define TLS1_TXT_SRP_SHA_DSS_WITH_AES_128_CBC_SHA "SRP-DSS-AES-128-CBC-SHA" -#define TLS1_TXT_SRP_SHA_WITH_AES_256_CBC_SHA "SRP-AES-256-CBC-SHA" -#define TLS1_TXT_SRP_SHA_RSA_WITH_AES_256_CBC_SHA "SRP-RSA-AES-256-CBC-SHA" -#define TLS1_TXT_SRP_SHA_DSS_WITH_AES_256_CBC_SHA "SRP-DSS-AES-256-CBC-SHA" - -/* Camellia ciphersuites from RFC4132 */ -#define TLS1_TXT_RSA_WITH_CAMELLIA_128_CBC_SHA "CAMELLIA128-SHA" -#define TLS1_TXT_DH_DSS_WITH_CAMELLIA_128_CBC_SHA "DH-DSS-CAMELLIA128-SHA" -#define TLS1_TXT_DH_RSA_WITH_CAMELLIA_128_CBC_SHA "DH-RSA-CAMELLIA128-SHA" -#define TLS1_TXT_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA "DHE-DSS-CAMELLIA128-SHA" -#define TLS1_TXT_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA "DHE-RSA-CAMELLIA128-SHA" -#define TLS1_TXT_ADH_WITH_CAMELLIA_128_CBC_SHA "ADH-CAMELLIA128-SHA" - -#define TLS1_TXT_RSA_WITH_CAMELLIA_256_CBC_SHA "CAMELLIA256-SHA" -#define TLS1_TXT_DH_DSS_WITH_CAMELLIA_256_CBC_SHA "DH-DSS-CAMELLIA256-SHA" -#define TLS1_TXT_DH_RSA_WITH_CAMELLIA_256_CBC_SHA "DH-RSA-CAMELLIA256-SHA" -#define TLS1_TXT_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA "DHE-DSS-CAMELLIA256-SHA" -#define TLS1_TXT_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA "DHE-RSA-CAMELLIA256-SHA" -#define TLS1_TXT_ADH_WITH_CAMELLIA_256_CBC_SHA "ADH-CAMELLIA256-SHA" - -/* SEED ciphersuites from RFC4162 */ -#define TLS1_TXT_RSA_WITH_SEED_SHA "SEED-SHA" -#define TLS1_TXT_DH_DSS_WITH_SEED_SHA "DH-DSS-SEED-SHA" -#define TLS1_TXT_DH_RSA_WITH_SEED_SHA "DH-RSA-SEED-SHA" -#define TLS1_TXT_DHE_DSS_WITH_SEED_SHA "DHE-DSS-SEED-SHA" -#define TLS1_TXT_DHE_RSA_WITH_SEED_SHA "DHE-RSA-SEED-SHA" -#define TLS1_TXT_ADH_WITH_SEED_SHA "ADH-SEED-SHA" - -/* TLS v1.2 ciphersuites */ -#define TLS1_TXT_RSA_WITH_NULL_SHA256 "NULL-SHA256" -#define TLS1_TXT_RSA_WITH_AES_128_SHA256 "AES128-SHA256" -#define TLS1_TXT_RSA_WITH_AES_256_SHA256 "AES256-SHA256" -#define TLS1_TXT_DH_DSS_WITH_AES_128_SHA256 "DH-DSS-AES128-SHA256" -#define TLS1_TXT_DH_RSA_WITH_AES_128_SHA256 "DH-RSA-AES128-SHA256" -#define TLS1_TXT_DHE_DSS_WITH_AES_128_SHA256 "DHE-DSS-AES128-SHA256" -#define TLS1_TXT_DHE_RSA_WITH_AES_128_SHA256 "DHE-RSA-AES128-SHA256" -#define TLS1_TXT_DH_DSS_WITH_AES_256_SHA256 "DH-DSS-AES256-SHA256" -#define TLS1_TXT_DH_RSA_WITH_AES_256_SHA256 "DH-RSA-AES256-SHA256" -#define TLS1_TXT_DHE_DSS_WITH_AES_256_SHA256 "DHE-DSS-AES256-SHA256" -#define TLS1_TXT_DHE_RSA_WITH_AES_256_SHA256 "DHE-RSA-AES256-SHA256" -#define TLS1_TXT_ADH_WITH_AES_128_SHA256 "ADH-AES128-SHA256" -#define TLS1_TXT_ADH_WITH_AES_256_SHA256 "ADH-AES256-SHA256" - -/* TLS v1.2 GCM ciphersuites from RFC5288 */ -#define TLS1_TXT_RSA_WITH_AES_128_GCM_SHA256 "AES128-GCM-SHA256" -#define TLS1_TXT_RSA_WITH_AES_256_GCM_SHA384 "AES256-GCM-SHA384" -#define TLS1_TXT_DHE_RSA_WITH_AES_128_GCM_SHA256 "DHE-RSA-AES128-GCM-SHA256" -#define TLS1_TXT_DHE_RSA_WITH_AES_256_GCM_SHA384 "DHE-RSA-AES256-GCM-SHA384" -#define TLS1_TXT_DH_RSA_WITH_AES_128_GCM_SHA256 "DH-RSA-AES128-GCM-SHA256" -#define TLS1_TXT_DH_RSA_WITH_AES_256_GCM_SHA384 "DH-RSA-AES256-GCM-SHA384" -#define TLS1_TXT_DHE_DSS_WITH_AES_128_GCM_SHA256 "DHE-DSS-AES128-GCM-SHA256" -#define TLS1_TXT_DHE_DSS_WITH_AES_256_GCM_SHA384 "DHE-DSS-AES256-GCM-SHA384" -#define TLS1_TXT_DH_DSS_WITH_AES_128_GCM_SHA256 "DH-DSS-AES128-GCM-SHA256" -#define TLS1_TXT_DH_DSS_WITH_AES_256_GCM_SHA384 "DH-DSS-AES256-GCM-SHA384" -#define TLS1_TXT_ADH_WITH_AES_128_GCM_SHA256 "ADH-AES128-GCM-SHA256" -#define TLS1_TXT_ADH_WITH_AES_256_GCM_SHA384 "ADH-AES256-GCM-SHA384" - -/* ECDH HMAC based ciphersuites from RFC5289 */ - -#define TLS1_TXT_ECDHE_ECDSA_WITH_AES_128_SHA256 "ECDHE-ECDSA-AES128-SHA256" -#define TLS1_TXT_ECDHE_ECDSA_WITH_AES_256_SHA384 "ECDHE-ECDSA-AES256-SHA384" -#define TLS1_TXT_ECDH_ECDSA_WITH_AES_128_SHA256 "ECDH-ECDSA-AES128-SHA256" -#define TLS1_TXT_ECDH_ECDSA_WITH_AES_256_SHA384 "ECDH-ECDSA-AES256-SHA384" -#define TLS1_TXT_ECDHE_RSA_WITH_AES_128_SHA256 "ECDHE-RSA-AES128-SHA256" -#define TLS1_TXT_ECDHE_RSA_WITH_AES_256_SHA384 "ECDHE-RSA-AES256-SHA384" -#define TLS1_TXT_ECDH_RSA_WITH_AES_128_SHA256 "ECDH-RSA-AES128-SHA256" -#define TLS1_TXT_ECDH_RSA_WITH_AES_256_SHA384 "ECDH-RSA-AES256-SHA384" - -/* ECDH GCM based ciphersuites from RFC5289 */ -#define TLS1_TXT_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 "ECDHE-ECDSA-AES128-GCM-SHA256" -#define TLS1_TXT_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 "ECDHE-ECDSA-AES256-GCM-SHA384" -#define TLS1_TXT_ECDH_ECDSA_WITH_AES_128_GCM_SHA256 "ECDH-ECDSA-AES128-GCM-SHA256" -#define TLS1_TXT_ECDH_ECDSA_WITH_AES_256_GCM_SHA384 "ECDH-ECDSA-AES256-GCM-SHA384" -#define TLS1_TXT_ECDHE_RSA_WITH_AES_128_GCM_SHA256 "ECDHE-RSA-AES128-GCM-SHA256" -#define TLS1_TXT_ECDHE_RSA_WITH_AES_256_GCM_SHA384 "ECDHE-RSA-AES256-GCM-SHA384" -#define TLS1_TXT_ECDH_RSA_WITH_AES_128_GCM_SHA256 "ECDH-RSA-AES128-GCM-SHA256" -#define TLS1_TXT_ECDH_RSA_WITH_AES_256_GCM_SHA384 "ECDH-RSA-AES256-GCM-SHA384" - -#define TLS_CT_RSA_SIGN 1 -#define TLS_CT_DSS_SIGN 2 -#define TLS_CT_RSA_FIXED_DH 3 -#define TLS_CT_DSS_FIXED_DH 4 -#define TLS_CT_ECDSA_SIGN 64 -#define TLS_CT_RSA_FIXED_ECDH 65 -#define TLS_CT_ECDSA_FIXED_ECDH 66 -#define TLS_CT_GOST94_SIGN 21 -#define TLS_CT_GOST01_SIGN 22 -/* when correcting this number, correct also SSL3_CT_NUMBER in ssl3.h (see - * comment there) */ -#define TLS_CT_NUMBER 9 - -#define TLS1_FINISH_MAC_LENGTH 12 - -#define TLS_MD_MAX_CONST_SIZE 20 -#define TLS_MD_CLIENT_FINISH_CONST "client finished" -#define TLS_MD_CLIENT_FINISH_CONST_SIZE 15 -#define TLS_MD_SERVER_FINISH_CONST "server finished" -#define TLS_MD_SERVER_FINISH_CONST_SIZE 15 -#define TLS_MD_SERVER_WRITE_KEY_CONST "server write key" -#define TLS_MD_SERVER_WRITE_KEY_CONST_SIZE 16 -#define TLS_MD_KEY_EXPANSION_CONST "key expansion" -#define TLS_MD_KEY_EXPANSION_CONST_SIZE 13 -#define TLS_MD_CLIENT_WRITE_KEY_CONST "client write key" -#define TLS_MD_CLIENT_WRITE_KEY_CONST_SIZE 16 -#define TLS_MD_SERVER_WRITE_KEY_CONST "server write key" -#define TLS_MD_SERVER_WRITE_KEY_CONST_SIZE 16 -#define TLS_MD_IV_BLOCK_CONST "IV block" -#define TLS_MD_IV_BLOCK_CONST_SIZE 8 -#define TLS_MD_MASTER_SECRET_CONST "master secret" -#define TLS_MD_MASTER_SECRET_CONST_SIZE 13 - -#ifdef CHARSET_EBCDIC -#undef TLS_MD_CLIENT_FINISH_CONST -#define TLS_MD_CLIENT_FINISH_CONST "\x63\x6c\x69\x65\x6e\x74\x20\x66\x69\x6e\x69\x73\x68\x65\x64" /*client finished*/ -#undef TLS_MD_SERVER_FINISH_CONST -#define TLS_MD_SERVER_FINISH_CONST "\x73\x65\x72\x76\x65\x72\x20\x66\x69\x6e\x69\x73\x68\x65\x64" /*server finished*/ -#undef TLS_MD_SERVER_WRITE_KEY_CONST -#define TLS_MD_SERVER_WRITE_KEY_CONST "\x73\x65\x72\x76\x65\x72\x20\x77\x72\x69\x74\x65\x20\x6b\x65\x79" /*server write key*/ -#undef TLS_MD_KEY_EXPANSION_CONST -#define TLS_MD_KEY_EXPANSION_CONST "\x6b\x65\x79\x20\x65\x78\x70\x61\x6e\x73\x69\x6f\x6e" /*key expansion*/ -#undef TLS_MD_CLIENT_WRITE_KEY_CONST -#define TLS_MD_CLIENT_WRITE_KEY_CONST "\x63\x6c\x69\x65\x6e\x74\x20\x77\x72\x69\x74\x65\x20\x6b\x65\x79" /*client write key*/ -#undef TLS_MD_SERVER_WRITE_KEY_CONST -#define TLS_MD_SERVER_WRITE_KEY_CONST "\x73\x65\x72\x76\x65\x72\x20\x77\x72\x69\x74\x65\x20\x6b\x65\x79" /*server write key*/ -#undef TLS_MD_IV_BLOCK_CONST -#define TLS_MD_IV_BLOCK_CONST "\x49\x56\x20\x62\x6c\x6f\x63\x6b" /*IV block*/ -#undef TLS_MD_MASTER_SECRET_CONST -#define TLS_MD_MASTER_SECRET_CONST "\x6d\x61\x73\x74\x65\x72\x20\x73\x65\x63\x72\x65\x74" /*master secret*/ -#endif - -/* TLS Session Ticket extension struct */ -struct tls_session_ticket_ext_st - { - unsigned short length; - void *data; - }; - -#ifdef __cplusplus -} -#endif -#endif diff --git a/Pods/OpenSSL-Universal/include-osx/openssl/ts.h b/Pods/OpenSSL-Universal/include-osx/openssl/ts.h deleted file mode 100644 index c2448e3c..00000000 --- a/Pods/OpenSSL-Universal/include-osx/openssl/ts.h +++ /dev/null @@ -1,858 +0,0 @@ -/* crypto/ts/ts.h */ -/* Written by Zoltan Glozik (zglozik@opentsa.org) for the OpenSSL - * project 2002, 2003, 2004. - */ -/* ==================================================================== - * Copyright (c) 2006 The OpenSSL Project. All rights reserved. - * - * Redistribution and use in source and binary forms, with or without - * modification, are permitted provided that the following conditions - * are met: - * - * 1. Redistributions of source code must retain the above copyright - * notice, this list of conditions and the following disclaimer. - * - * 2. Redistributions in binary form must reproduce the above copyright - * notice, this list of conditions and the following disclaimer in - * the documentation and/or other materials provided with the - * distribution. - * - * 3. All advertising materials mentioning features or use of this - * software must display the following acknowledgment: - * "This product includes software developed by the OpenSSL Project - * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)" - * - * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to - * endorse or promote products derived from this software without - * prior written permission. For written permission, please contact - * licensing@OpenSSL.org. - * - * 5. Products derived from this software may not be called "OpenSSL" - * nor may "OpenSSL" appear in their names without prior written - * permission of the OpenSSL Project. - * - * 6. Redistributions of any form whatsoever must retain the following - * acknowledgment: - * "This product includes software developed by the OpenSSL Project - * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)" - * - * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY - * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE - * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR - * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR - * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, - * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT - * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; - * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) - * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, - * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) - * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED - * OF THE POSSIBILITY OF SUCH DAMAGE. - * ==================================================================== - * - * This product includes cryptographic software written by Eric Young - * (eay@cryptsoft.com). This product includes software written by Tim - * Hudson (tjh@cryptsoft.com). - * - */ - -#ifndef HEADER_TS_H -#define HEADER_TS_H - -#include -#include -#ifndef OPENSSL_NO_BUFFER -#include -#endif -#ifndef OPENSSL_NO_EVP -#include -#endif -#ifndef OPENSSL_NO_BIO -#include -#endif -#include -#include -#include - -#ifndef OPENSSL_NO_RSA -#include -#endif - -#ifndef OPENSSL_NO_DSA -#include -#endif - -#ifndef OPENSSL_NO_DH -#include -#endif - -#ifdef __cplusplus -extern "C" { -#endif - -#ifdef WIN32 -/* Under Win32 this is defined in wincrypt.h */ -#undef X509_NAME -#endif - -#include -#include - -/* -MessageImprint ::= SEQUENCE { - hashAlgorithm AlgorithmIdentifier, - hashedMessage OCTET STRING } -*/ - -typedef struct TS_msg_imprint_st - { - X509_ALGOR *hash_algo; - ASN1_OCTET_STRING *hashed_msg; - } TS_MSG_IMPRINT; - -/* -TimeStampReq ::= SEQUENCE { - version INTEGER { v1(1) }, - messageImprint MessageImprint, - --a hash algorithm OID and the hash value of the data to be - --time-stamped - reqPolicy TSAPolicyId OPTIONAL, - nonce INTEGER OPTIONAL, - certReq BOOLEAN DEFAULT FALSE, - extensions [0] IMPLICIT Extensions OPTIONAL } -*/ - -typedef struct TS_req_st - { - ASN1_INTEGER *version; - TS_MSG_IMPRINT *msg_imprint; - ASN1_OBJECT *policy_id; /* OPTIONAL */ - ASN1_INTEGER *nonce; /* OPTIONAL */ - ASN1_BOOLEAN cert_req; /* DEFAULT FALSE */ - STACK_OF(X509_EXTENSION) *extensions; /* [0] OPTIONAL */ - } TS_REQ; - -/* -Accuracy ::= SEQUENCE { - seconds INTEGER OPTIONAL, - millis [0] INTEGER (1..999) OPTIONAL, - micros [1] INTEGER (1..999) OPTIONAL } -*/ - -typedef struct TS_accuracy_st - { - ASN1_INTEGER *seconds; - ASN1_INTEGER *millis; - ASN1_INTEGER *micros; - } TS_ACCURACY; - -/* -TSTInfo ::= SEQUENCE { - version INTEGER { v1(1) }, - policy TSAPolicyId, - messageImprint MessageImprint, - -- MUST have the same value as the similar field in - -- TimeStampReq - serialNumber INTEGER, - -- Time-Stamping users MUST be ready to accommodate integers - -- up to 160 bits. - genTime GeneralizedTime, - accuracy Accuracy OPTIONAL, - ordering BOOLEAN DEFAULT FALSE, - nonce INTEGER OPTIONAL, - -- MUST be present if the similar field was present - -- in TimeStampReq. In that case it MUST have the same value. - tsa [0] GeneralName OPTIONAL, - extensions [1] IMPLICIT Extensions OPTIONAL } -*/ - -typedef struct TS_tst_info_st - { - ASN1_INTEGER *version; - ASN1_OBJECT *policy_id; - TS_MSG_IMPRINT *msg_imprint; - ASN1_INTEGER *serial; - ASN1_GENERALIZEDTIME *time; - TS_ACCURACY *accuracy; - ASN1_BOOLEAN ordering; - ASN1_INTEGER *nonce; - GENERAL_NAME *tsa; - STACK_OF(X509_EXTENSION) *extensions; - } TS_TST_INFO; - -/* -PKIStatusInfo ::= SEQUENCE { - status PKIStatus, - statusString PKIFreeText OPTIONAL, - failInfo PKIFailureInfo OPTIONAL } - -From RFC 1510 - section 3.1.1: -PKIFreeText ::= SEQUENCE SIZE (1..MAX) OF UTF8String - -- text encoded as UTF-8 String (note: each UTF8String SHOULD - -- include an RFC 1766 language tag to indicate the language - -- of the contained text) -*/ - -/* Possible values for status. See ts_resp_print.c && ts_resp_verify.c. */ - -#define TS_STATUS_GRANTED 0 -#define TS_STATUS_GRANTED_WITH_MODS 1 -#define TS_STATUS_REJECTION 2 -#define TS_STATUS_WAITING 3 -#define TS_STATUS_REVOCATION_WARNING 4 -#define TS_STATUS_REVOCATION_NOTIFICATION 5 - -/* Possible values for failure_info. See ts_resp_print.c && ts_resp_verify.c */ - -#define TS_INFO_BAD_ALG 0 -#define TS_INFO_BAD_REQUEST 2 -#define TS_INFO_BAD_DATA_FORMAT 5 -#define TS_INFO_TIME_NOT_AVAILABLE 14 -#define TS_INFO_UNACCEPTED_POLICY 15 -#define TS_INFO_UNACCEPTED_EXTENSION 16 -#define TS_INFO_ADD_INFO_NOT_AVAILABLE 17 -#define TS_INFO_SYSTEM_FAILURE 25 - -typedef struct TS_status_info_st - { - ASN1_INTEGER *status; - STACK_OF(ASN1_UTF8STRING) *text; - ASN1_BIT_STRING *failure_info; - } TS_STATUS_INFO; - -DECLARE_STACK_OF(ASN1_UTF8STRING) -DECLARE_ASN1_SET_OF(ASN1_UTF8STRING) - -/* -TimeStampResp ::= SEQUENCE { - status PKIStatusInfo, - timeStampToken TimeStampToken OPTIONAL } -*/ - -typedef struct TS_resp_st - { - TS_STATUS_INFO *status_info; - PKCS7 *token; - TS_TST_INFO *tst_info; - } TS_RESP; - -/* The structure below would belong to the ESS component. */ - -/* -IssuerSerial ::= SEQUENCE { - issuer GeneralNames, - serialNumber CertificateSerialNumber - } -*/ - -typedef struct ESS_issuer_serial - { - STACK_OF(GENERAL_NAME) *issuer; - ASN1_INTEGER *serial; - } ESS_ISSUER_SERIAL; - -/* -ESSCertID ::= SEQUENCE { - certHash Hash, - issuerSerial IssuerSerial OPTIONAL -} -*/ - -typedef struct ESS_cert_id - { - ASN1_OCTET_STRING *hash; /* Always SHA-1 digest. */ - ESS_ISSUER_SERIAL *issuer_serial; - } ESS_CERT_ID; - -DECLARE_STACK_OF(ESS_CERT_ID) -DECLARE_ASN1_SET_OF(ESS_CERT_ID) - -/* -SigningCertificate ::= SEQUENCE { - certs SEQUENCE OF ESSCertID, - policies SEQUENCE OF PolicyInformation OPTIONAL -} -*/ - -typedef struct ESS_signing_cert - { - STACK_OF(ESS_CERT_ID) *cert_ids; - STACK_OF(POLICYINFO) *policy_info; - } ESS_SIGNING_CERT; - - -TS_REQ *TS_REQ_new(void); -void TS_REQ_free(TS_REQ *a); -int i2d_TS_REQ(const TS_REQ *a, unsigned char **pp); -TS_REQ *d2i_TS_REQ(TS_REQ **a, const unsigned char **pp, long length); - -TS_REQ *TS_REQ_dup(TS_REQ *a); - -TS_REQ *d2i_TS_REQ_fp(FILE *fp, TS_REQ **a); -int i2d_TS_REQ_fp(FILE *fp, TS_REQ *a); -TS_REQ *d2i_TS_REQ_bio(BIO *fp, TS_REQ **a); -int i2d_TS_REQ_bio(BIO *fp, TS_REQ *a); - -TS_MSG_IMPRINT *TS_MSG_IMPRINT_new(void); -void TS_MSG_IMPRINT_free(TS_MSG_IMPRINT *a); -int i2d_TS_MSG_IMPRINT(const TS_MSG_IMPRINT *a, unsigned char **pp); -TS_MSG_IMPRINT *d2i_TS_MSG_IMPRINT(TS_MSG_IMPRINT **a, - const unsigned char **pp, long length); - -TS_MSG_IMPRINT *TS_MSG_IMPRINT_dup(TS_MSG_IMPRINT *a); - -TS_MSG_IMPRINT *d2i_TS_MSG_IMPRINT_fp(FILE *fp, TS_MSG_IMPRINT **a); -int i2d_TS_MSG_IMPRINT_fp(FILE *fp, TS_MSG_IMPRINT *a); -TS_MSG_IMPRINT *d2i_TS_MSG_IMPRINT_bio(BIO *fp, TS_MSG_IMPRINT **a); -int i2d_TS_MSG_IMPRINT_bio(BIO *fp, TS_MSG_IMPRINT *a); - -TS_RESP *TS_RESP_new(void); -void TS_RESP_free(TS_RESP *a); -int i2d_TS_RESP(const TS_RESP *a, unsigned char **pp); -TS_RESP *d2i_TS_RESP(TS_RESP **a, const unsigned char **pp, long length); -TS_TST_INFO *PKCS7_to_TS_TST_INFO(PKCS7 *token); -TS_RESP *TS_RESP_dup(TS_RESP *a); - -TS_RESP *d2i_TS_RESP_fp(FILE *fp, TS_RESP **a); -int i2d_TS_RESP_fp(FILE *fp, TS_RESP *a); -TS_RESP *d2i_TS_RESP_bio(BIO *fp, TS_RESP **a); -int i2d_TS_RESP_bio(BIO *fp, TS_RESP *a); - -TS_STATUS_INFO *TS_STATUS_INFO_new(void); -void TS_STATUS_INFO_free(TS_STATUS_INFO *a); -int i2d_TS_STATUS_INFO(const TS_STATUS_INFO *a, unsigned char **pp); -TS_STATUS_INFO *d2i_TS_STATUS_INFO(TS_STATUS_INFO **a, - const unsigned char **pp, long length); -TS_STATUS_INFO *TS_STATUS_INFO_dup(TS_STATUS_INFO *a); - -TS_TST_INFO *TS_TST_INFO_new(void); -void TS_TST_INFO_free(TS_TST_INFO *a); -int i2d_TS_TST_INFO(const TS_TST_INFO *a, unsigned char **pp); -TS_TST_INFO *d2i_TS_TST_INFO(TS_TST_INFO **a, const unsigned char **pp, - long length); -TS_TST_INFO *TS_TST_INFO_dup(TS_TST_INFO *a); - -TS_TST_INFO *d2i_TS_TST_INFO_fp(FILE *fp, TS_TST_INFO **a); -int i2d_TS_TST_INFO_fp(FILE *fp, TS_TST_INFO *a); -TS_TST_INFO *d2i_TS_TST_INFO_bio(BIO *fp, TS_TST_INFO **a); -int i2d_TS_TST_INFO_bio(BIO *fp, TS_TST_INFO *a); - -TS_ACCURACY *TS_ACCURACY_new(void); -void TS_ACCURACY_free(TS_ACCURACY *a); -int i2d_TS_ACCURACY(const TS_ACCURACY *a, unsigned char **pp); -TS_ACCURACY *d2i_TS_ACCURACY(TS_ACCURACY **a, const unsigned char **pp, - long length); -TS_ACCURACY *TS_ACCURACY_dup(TS_ACCURACY *a); - -ESS_ISSUER_SERIAL *ESS_ISSUER_SERIAL_new(void); -void ESS_ISSUER_SERIAL_free(ESS_ISSUER_SERIAL *a); -int i2d_ESS_ISSUER_SERIAL(const ESS_ISSUER_SERIAL *a, - unsigned char **pp); -ESS_ISSUER_SERIAL *d2i_ESS_ISSUER_SERIAL(ESS_ISSUER_SERIAL **a, - const unsigned char **pp, long length); -ESS_ISSUER_SERIAL *ESS_ISSUER_SERIAL_dup(ESS_ISSUER_SERIAL *a); - -ESS_CERT_ID *ESS_CERT_ID_new(void); -void ESS_CERT_ID_free(ESS_CERT_ID *a); -int i2d_ESS_CERT_ID(const ESS_CERT_ID *a, unsigned char **pp); -ESS_CERT_ID *d2i_ESS_CERT_ID(ESS_CERT_ID **a, const unsigned char **pp, - long length); -ESS_CERT_ID *ESS_CERT_ID_dup(ESS_CERT_ID *a); - -ESS_SIGNING_CERT *ESS_SIGNING_CERT_new(void); -void ESS_SIGNING_CERT_free(ESS_SIGNING_CERT *a); -int i2d_ESS_SIGNING_CERT(const ESS_SIGNING_CERT *a, - unsigned char **pp); -ESS_SIGNING_CERT *d2i_ESS_SIGNING_CERT(ESS_SIGNING_CERT **a, - const unsigned char **pp, long length); -ESS_SIGNING_CERT *ESS_SIGNING_CERT_dup(ESS_SIGNING_CERT *a); - -void ERR_load_TS_strings(void); - -int TS_REQ_set_version(TS_REQ *a, long version); -long TS_REQ_get_version(const TS_REQ *a); - -int TS_REQ_set_msg_imprint(TS_REQ *a, TS_MSG_IMPRINT *msg_imprint); -TS_MSG_IMPRINT *TS_REQ_get_msg_imprint(TS_REQ *a); - -int TS_MSG_IMPRINT_set_algo(TS_MSG_IMPRINT *a, X509_ALGOR *alg); -X509_ALGOR *TS_MSG_IMPRINT_get_algo(TS_MSG_IMPRINT *a); - -int TS_MSG_IMPRINT_set_msg(TS_MSG_IMPRINT *a, unsigned char *d, int len); -ASN1_OCTET_STRING *TS_MSG_IMPRINT_get_msg(TS_MSG_IMPRINT *a); - -int TS_REQ_set_policy_id(TS_REQ *a, ASN1_OBJECT *policy); -ASN1_OBJECT *TS_REQ_get_policy_id(TS_REQ *a); - -int TS_REQ_set_nonce(TS_REQ *a, const ASN1_INTEGER *nonce); -const ASN1_INTEGER *TS_REQ_get_nonce(const TS_REQ *a); - -int TS_REQ_set_cert_req(TS_REQ *a, int cert_req); -int TS_REQ_get_cert_req(const TS_REQ *a); - -STACK_OF(X509_EXTENSION) *TS_REQ_get_exts(TS_REQ *a); -void TS_REQ_ext_free(TS_REQ *a); -int TS_REQ_get_ext_count(TS_REQ *a); -int TS_REQ_get_ext_by_NID(TS_REQ *a, int nid, int lastpos); -int TS_REQ_get_ext_by_OBJ(TS_REQ *a, ASN1_OBJECT *obj, int lastpos); -int TS_REQ_get_ext_by_critical(TS_REQ *a, int crit, int lastpos); -X509_EXTENSION *TS_REQ_get_ext(TS_REQ *a, int loc); -X509_EXTENSION *TS_REQ_delete_ext(TS_REQ *a, int loc); -int TS_REQ_add_ext(TS_REQ *a, X509_EXTENSION *ex, int loc); -void *TS_REQ_get_ext_d2i(TS_REQ *a, int nid, int *crit, int *idx); - -/* Function declarations for TS_REQ defined in ts/ts_req_print.c */ - -int TS_REQ_print_bio(BIO *bio, TS_REQ *a); - -/* Function declarations for TS_RESP defined in ts/ts_resp_utils.c */ - -int TS_RESP_set_status_info(TS_RESP *a, TS_STATUS_INFO *info); -TS_STATUS_INFO *TS_RESP_get_status_info(TS_RESP *a); - -/* Caller loses ownership of PKCS7 and TS_TST_INFO objects. */ -void TS_RESP_set_tst_info(TS_RESP *a, PKCS7 *p7, TS_TST_INFO *tst_info); -PKCS7 *TS_RESP_get_token(TS_RESP *a); -TS_TST_INFO *TS_RESP_get_tst_info(TS_RESP *a); - -int TS_TST_INFO_set_version(TS_TST_INFO *a, long version); -long TS_TST_INFO_get_version(const TS_TST_INFO *a); - -int TS_TST_INFO_set_policy_id(TS_TST_INFO *a, ASN1_OBJECT *policy_id); -ASN1_OBJECT *TS_TST_INFO_get_policy_id(TS_TST_INFO *a); - -int TS_TST_INFO_set_msg_imprint(TS_TST_INFO *a, TS_MSG_IMPRINT *msg_imprint); -TS_MSG_IMPRINT *TS_TST_INFO_get_msg_imprint(TS_TST_INFO *a); - -int TS_TST_INFO_set_serial(TS_TST_INFO *a, const ASN1_INTEGER *serial); -const ASN1_INTEGER *TS_TST_INFO_get_serial(const TS_TST_INFO *a); - -int TS_TST_INFO_set_time(TS_TST_INFO *a, const ASN1_GENERALIZEDTIME *gtime); -const ASN1_GENERALIZEDTIME *TS_TST_INFO_get_time(const TS_TST_INFO *a); - -int TS_TST_INFO_set_accuracy(TS_TST_INFO *a, TS_ACCURACY *accuracy); -TS_ACCURACY *TS_TST_INFO_get_accuracy(TS_TST_INFO *a); - -int TS_ACCURACY_set_seconds(TS_ACCURACY *a, const ASN1_INTEGER *seconds); -const ASN1_INTEGER *TS_ACCURACY_get_seconds(const TS_ACCURACY *a); - -int TS_ACCURACY_set_millis(TS_ACCURACY *a, const ASN1_INTEGER *millis); -const ASN1_INTEGER *TS_ACCURACY_get_millis(const TS_ACCURACY *a); - -int TS_ACCURACY_set_micros(TS_ACCURACY *a, const ASN1_INTEGER *micros); -const ASN1_INTEGER *TS_ACCURACY_get_micros(const TS_ACCURACY *a); - -int TS_TST_INFO_set_ordering(TS_TST_INFO *a, int ordering); -int TS_TST_INFO_get_ordering(const TS_TST_INFO *a); - -int TS_TST_INFO_set_nonce(TS_TST_INFO *a, const ASN1_INTEGER *nonce); -const ASN1_INTEGER *TS_TST_INFO_get_nonce(const TS_TST_INFO *a); - -int TS_TST_INFO_set_tsa(TS_TST_INFO *a, GENERAL_NAME *tsa); -GENERAL_NAME *TS_TST_INFO_get_tsa(TS_TST_INFO *a); - -STACK_OF(X509_EXTENSION) *TS_TST_INFO_get_exts(TS_TST_INFO *a); -void TS_TST_INFO_ext_free(TS_TST_INFO *a); -int TS_TST_INFO_get_ext_count(TS_TST_INFO *a); -int TS_TST_INFO_get_ext_by_NID(TS_TST_INFO *a, int nid, int lastpos); -int TS_TST_INFO_get_ext_by_OBJ(TS_TST_INFO *a, ASN1_OBJECT *obj, int lastpos); -int TS_TST_INFO_get_ext_by_critical(TS_TST_INFO *a, int crit, int lastpos); -X509_EXTENSION *TS_TST_INFO_get_ext(TS_TST_INFO *a, int loc); -X509_EXTENSION *TS_TST_INFO_delete_ext(TS_TST_INFO *a, int loc); -int TS_TST_INFO_add_ext(TS_TST_INFO *a, X509_EXTENSION *ex, int loc); -void *TS_TST_INFO_get_ext_d2i(TS_TST_INFO *a, int nid, int *crit, int *idx); - -/* Declarations related to response generation, defined in ts/ts_resp_sign.c. */ - -/* Optional flags for response generation. */ - -/* Don't include the TSA name in response. */ -#define TS_TSA_NAME 0x01 - -/* Set ordering to true in response. */ -#define TS_ORDERING 0x02 - -/* - * Include the signer certificate and the other specified certificates in - * the ESS signing certificate attribute beside the PKCS7 signed data. - * Only the signer certificates is included by default. - */ -#define TS_ESS_CERT_ID_CHAIN 0x04 - -/* Forward declaration. */ -struct TS_resp_ctx; - -/* This must return a unique number less than 160 bits long. */ -typedef ASN1_INTEGER *(*TS_serial_cb)(struct TS_resp_ctx *, void *); - -/* This must return the seconds and microseconds since Jan 1, 1970 in - the sec and usec variables allocated by the caller. - Return non-zero for success and zero for failure. */ -typedef int (*TS_time_cb)(struct TS_resp_ctx *, void *, long *sec, long *usec); - -/* This must process the given extension. - * It can modify the TS_TST_INFO object of the context. - * Return values: !0 (processed), 0 (error, it must set the - * status info/failure info of the response). - */ -typedef int (*TS_extension_cb)(struct TS_resp_ctx *, X509_EXTENSION *, void *); - -typedef struct TS_resp_ctx - { - X509 *signer_cert; - EVP_PKEY *signer_key; - STACK_OF(X509) *certs; /* Certs to include in signed data. */ - STACK_OF(ASN1_OBJECT) *policies; /* Acceptable policies. */ - ASN1_OBJECT *default_policy; /* It may appear in policies, too. */ - STACK_OF(EVP_MD) *mds; /* Acceptable message digests. */ - ASN1_INTEGER *seconds; /* accuracy, 0 means not specified. */ - ASN1_INTEGER *millis; /* accuracy, 0 means not specified. */ - ASN1_INTEGER *micros; /* accuracy, 0 means not specified. */ - unsigned clock_precision_digits; /* fraction of seconds in - time stamp token. */ - unsigned flags; /* Optional info, see values above. */ - - /* Callback functions. */ - TS_serial_cb serial_cb; - void *serial_cb_data; /* User data for serial_cb. */ - - TS_time_cb time_cb; - void *time_cb_data; /* User data for time_cb. */ - - TS_extension_cb extension_cb; - void *extension_cb_data; /* User data for extension_cb. */ - - /* These members are used only while creating the response. */ - TS_REQ *request; - TS_RESP *response; - TS_TST_INFO *tst_info; - } TS_RESP_CTX; - -DECLARE_STACK_OF(EVP_MD) -DECLARE_ASN1_SET_OF(EVP_MD) - -/* Creates a response context that can be used for generating responses. */ -TS_RESP_CTX *TS_RESP_CTX_new(void); -void TS_RESP_CTX_free(TS_RESP_CTX *ctx); - -/* This parameter must be set. */ -int TS_RESP_CTX_set_signer_cert(TS_RESP_CTX *ctx, X509 *signer); - -/* This parameter must be set. */ -int TS_RESP_CTX_set_signer_key(TS_RESP_CTX *ctx, EVP_PKEY *key); - -/* This parameter must be set. */ -int TS_RESP_CTX_set_def_policy(TS_RESP_CTX *ctx, ASN1_OBJECT *def_policy); - -/* No additional certs are included in the response by default. */ -int TS_RESP_CTX_set_certs(TS_RESP_CTX *ctx, STACK_OF(X509) *certs); - -/* Adds a new acceptable policy, only the default policy - is accepted by default. */ -int TS_RESP_CTX_add_policy(TS_RESP_CTX *ctx, ASN1_OBJECT *policy); - -/* Adds a new acceptable message digest. Note that no message digests - are accepted by default. The md argument is shared with the caller. */ -int TS_RESP_CTX_add_md(TS_RESP_CTX *ctx, const EVP_MD *md); - -/* Accuracy is not included by default. */ -int TS_RESP_CTX_set_accuracy(TS_RESP_CTX *ctx, - int secs, int millis, int micros); - -/* Clock precision digits, i.e. the number of decimal digits: - '0' means sec, '3' msec, '6' usec, and so on. Default is 0. */ -int TS_RESP_CTX_set_clock_precision_digits(TS_RESP_CTX *ctx, - unsigned clock_precision_digits); -/* At most we accept usec precision. */ -#define TS_MAX_CLOCK_PRECISION_DIGITS 6 - -/* No flags are set by default. */ -void TS_RESP_CTX_add_flags(TS_RESP_CTX *ctx, int flags); - -/* Default callback always returns a constant. */ -void TS_RESP_CTX_set_serial_cb(TS_RESP_CTX *ctx, TS_serial_cb cb, void *data); - -/* Default callback uses the gettimeofday() and gmtime() system calls. */ -void TS_RESP_CTX_set_time_cb(TS_RESP_CTX *ctx, TS_time_cb cb, void *data); - -/* Default callback rejects all extensions. The extension callback is called - * when the TS_TST_INFO object is already set up and not signed yet. */ -/* FIXME: extension handling is not tested yet. */ -void TS_RESP_CTX_set_extension_cb(TS_RESP_CTX *ctx, - TS_extension_cb cb, void *data); - -/* The following methods can be used in the callbacks. */ -int TS_RESP_CTX_set_status_info(TS_RESP_CTX *ctx, - int status, const char *text); - -/* Sets the status info only if it is still TS_STATUS_GRANTED. */ -int TS_RESP_CTX_set_status_info_cond(TS_RESP_CTX *ctx, - int status, const char *text); - -int TS_RESP_CTX_add_failure_info(TS_RESP_CTX *ctx, int failure); - -/* The get methods below can be used in the extension callback. */ -TS_REQ *TS_RESP_CTX_get_request(TS_RESP_CTX *ctx); - -TS_TST_INFO *TS_RESP_CTX_get_tst_info(TS_RESP_CTX *ctx); - -/* - * Creates the signed TS_TST_INFO and puts it in TS_RESP. - * In case of errors it sets the status info properly. - * Returns NULL only in case of memory allocation/fatal error. - */ -TS_RESP *TS_RESP_create_response(TS_RESP_CTX *ctx, BIO *req_bio); - -/* - * Declarations related to response verification, - * they are defined in ts/ts_resp_verify.c. - */ - -int TS_RESP_verify_signature(PKCS7 *token, STACK_OF(X509) *certs, - X509_STORE *store, X509 **signer_out); - -/* Context structure for the generic verify method. */ - -/* Verify the signer's certificate and the signature of the response. */ -#define TS_VFY_SIGNATURE (1u << 0) -/* Verify the version number of the response. */ -#define TS_VFY_VERSION (1u << 1) -/* Verify if the policy supplied by the user matches the policy of the TSA. */ -#define TS_VFY_POLICY (1u << 2) -/* Verify the message imprint provided by the user. This flag should not be - specified with TS_VFY_DATA. */ -#define TS_VFY_IMPRINT (1u << 3) -/* Verify the message imprint computed by the verify method from the user - provided data and the MD algorithm of the response. This flag should not be - specified with TS_VFY_IMPRINT. */ -#define TS_VFY_DATA (1u << 4) -/* Verify the nonce value. */ -#define TS_VFY_NONCE (1u << 5) -/* Verify if the TSA name field matches the signer certificate. */ -#define TS_VFY_SIGNER (1u << 6) -/* Verify if the TSA name field equals to the user provided name. */ -#define TS_VFY_TSA_NAME (1u << 7) - -/* You can use the following convenience constants. */ -#define TS_VFY_ALL_IMPRINT (TS_VFY_SIGNATURE \ - | TS_VFY_VERSION \ - | TS_VFY_POLICY \ - | TS_VFY_IMPRINT \ - | TS_VFY_NONCE \ - | TS_VFY_SIGNER \ - | TS_VFY_TSA_NAME) -#define TS_VFY_ALL_DATA (TS_VFY_SIGNATURE \ - | TS_VFY_VERSION \ - | TS_VFY_POLICY \ - | TS_VFY_DATA \ - | TS_VFY_NONCE \ - | TS_VFY_SIGNER \ - | TS_VFY_TSA_NAME) - -typedef struct TS_verify_ctx - { - /* Set this to the union of TS_VFY_... flags you want to carry out. */ - unsigned flags; - - /* Must be set only with TS_VFY_SIGNATURE. certs is optional. */ - X509_STORE *store; - STACK_OF(X509) *certs; - - /* Must be set only with TS_VFY_POLICY. */ - ASN1_OBJECT *policy; - - /* Must be set only with TS_VFY_IMPRINT. If md_alg is NULL, - the algorithm from the response is used. */ - X509_ALGOR *md_alg; - unsigned char *imprint; - unsigned imprint_len; - - /* Must be set only with TS_VFY_DATA. */ - BIO *data; - - /* Must be set only with TS_VFY_TSA_NAME. */ - ASN1_INTEGER *nonce; - - /* Must be set only with TS_VFY_TSA_NAME. */ - GENERAL_NAME *tsa_name; - } TS_VERIFY_CTX; - -int TS_RESP_verify_response(TS_VERIFY_CTX *ctx, TS_RESP *response); -int TS_RESP_verify_token(TS_VERIFY_CTX *ctx, PKCS7 *token); - -/* - * Declarations related to response verification context, - * they are defined in ts/ts_verify_ctx.c. - */ - -/* Set all fields to zero. */ -TS_VERIFY_CTX *TS_VERIFY_CTX_new(void); -void TS_VERIFY_CTX_init(TS_VERIFY_CTX *ctx); -void TS_VERIFY_CTX_free(TS_VERIFY_CTX *ctx); -void TS_VERIFY_CTX_cleanup(TS_VERIFY_CTX *ctx); - -/* - * If ctx is NULL, it allocates and returns a new object, otherwise - * it returns ctx. It initialises all the members as follows: - * flags = TS_VFY_ALL_IMPRINT & ~(TS_VFY_TSA_NAME | TS_VFY_SIGNATURE) - * certs = NULL - * store = NULL - * policy = policy from the request or NULL if absent (in this case - * TS_VFY_POLICY is cleared from flags as well) - * md_alg = MD algorithm from request - * imprint, imprint_len = imprint from request - * data = NULL - * nonce, nonce_len = nonce from the request or NULL if absent (in this case - * TS_VFY_NONCE is cleared from flags as well) - * tsa_name = NULL - * Important: after calling this method TS_VFY_SIGNATURE should be added! - */ -TS_VERIFY_CTX *TS_REQ_to_TS_VERIFY_CTX(TS_REQ *req, TS_VERIFY_CTX *ctx); - -/* Function declarations for TS_RESP defined in ts/ts_resp_print.c */ - -int TS_RESP_print_bio(BIO *bio, TS_RESP *a); -int TS_STATUS_INFO_print_bio(BIO *bio, TS_STATUS_INFO *a); -int TS_TST_INFO_print_bio(BIO *bio, TS_TST_INFO *a); - -/* Common utility functions defined in ts/ts_lib.c */ - -int TS_ASN1_INTEGER_print_bio(BIO *bio, const ASN1_INTEGER *num); -int TS_OBJ_print_bio(BIO *bio, const ASN1_OBJECT *obj); -int TS_ext_print_bio(BIO *bio, const STACK_OF(X509_EXTENSION) *extensions); -int TS_X509_ALGOR_print_bio(BIO *bio, const X509_ALGOR *alg); -int TS_MSG_IMPRINT_print_bio(BIO *bio, TS_MSG_IMPRINT *msg); - -/* Function declarations for handling configuration options, - defined in ts/ts_conf.c */ - -X509 *TS_CONF_load_cert(const char *file); -STACK_OF(X509) *TS_CONF_load_certs(const char *file); -EVP_PKEY *TS_CONF_load_key(const char *file, const char *pass); -const char *TS_CONF_get_tsa_section(CONF *conf, const char *section); -int TS_CONF_set_serial(CONF *conf, const char *section, TS_serial_cb cb, - TS_RESP_CTX *ctx); -int TS_CONF_set_crypto_device(CONF *conf, const char *section, - const char *device); -int TS_CONF_set_default_engine(const char *name); -int TS_CONF_set_signer_cert(CONF *conf, const char *section, - const char *cert, TS_RESP_CTX *ctx); -int TS_CONF_set_certs(CONF *conf, const char *section, const char *certs, - TS_RESP_CTX *ctx); -int TS_CONF_set_signer_key(CONF *conf, const char *section, - const char *key, const char *pass, TS_RESP_CTX *ctx); -int TS_CONF_set_def_policy(CONF *conf, const char *section, - const char *policy, TS_RESP_CTX *ctx); -int TS_CONF_set_policies(CONF *conf, const char *section, TS_RESP_CTX *ctx); -int TS_CONF_set_digests(CONF *conf, const char *section, TS_RESP_CTX *ctx); -int TS_CONF_set_accuracy(CONF *conf, const char *section, TS_RESP_CTX *ctx); -int TS_CONF_set_clock_precision_digits(CONF *conf, const char *section, - TS_RESP_CTX *ctx); -int TS_CONF_set_ordering(CONF *conf, const char *section, TS_RESP_CTX *ctx); -int TS_CONF_set_tsa_name(CONF *conf, const char *section, TS_RESP_CTX *ctx); -int TS_CONF_set_ess_cert_id_chain(CONF *conf, const char *section, - TS_RESP_CTX *ctx); - -/* -------------------------------------------------- */ -/* BEGIN ERROR CODES */ -/* The following lines are auto generated by the script mkerr.pl. Any changes - * made after this point may be overwritten when the script is next run. - */ -void ERR_load_TS_strings(void); - -/* Error codes for the TS functions. */ - -/* Function codes. */ -#define TS_F_D2I_TS_RESP 147 -#define TS_F_DEF_SERIAL_CB 110 -#define TS_F_DEF_TIME_CB 111 -#define TS_F_ESS_ADD_SIGNING_CERT 112 -#define TS_F_ESS_CERT_ID_NEW_INIT 113 -#define TS_F_ESS_SIGNING_CERT_NEW_INIT 114 -#define TS_F_INT_TS_RESP_VERIFY_TOKEN 149 -#define TS_F_PKCS7_TO_TS_TST_INFO 148 -#define TS_F_TS_ACCURACY_SET_MICROS 115 -#define TS_F_TS_ACCURACY_SET_MILLIS 116 -#define TS_F_TS_ACCURACY_SET_SECONDS 117 -#define TS_F_TS_CHECK_IMPRINTS 100 -#define TS_F_TS_CHECK_NONCES 101 -#define TS_F_TS_CHECK_POLICY 102 -#define TS_F_TS_CHECK_SIGNING_CERTS 103 -#define TS_F_TS_CHECK_STATUS_INFO 104 -#define TS_F_TS_COMPUTE_IMPRINT 145 -#define TS_F_TS_CONF_SET_DEFAULT_ENGINE 146 -#define TS_F_TS_GET_STATUS_TEXT 105 -#define TS_F_TS_MSG_IMPRINT_SET_ALGO 118 -#define TS_F_TS_REQ_SET_MSG_IMPRINT 119 -#define TS_F_TS_REQ_SET_NONCE 120 -#define TS_F_TS_REQ_SET_POLICY_ID 121 -#define TS_F_TS_RESP_CREATE_RESPONSE 122 -#define TS_F_TS_RESP_CREATE_TST_INFO 123 -#define TS_F_TS_RESP_CTX_ADD_FAILURE_INFO 124 -#define TS_F_TS_RESP_CTX_ADD_MD 125 -#define TS_F_TS_RESP_CTX_ADD_POLICY 126 -#define TS_F_TS_RESP_CTX_NEW 127 -#define TS_F_TS_RESP_CTX_SET_ACCURACY 128 -#define TS_F_TS_RESP_CTX_SET_CERTS 129 -#define TS_F_TS_RESP_CTX_SET_DEF_POLICY 130 -#define TS_F_TS_RESP_CTX_SET_SIGNER_CERT 131 -#define TS_F_TS_RESP_CTX_SET_STATUS_INFO 132 -#define TS_F_TS_RESP_GET_POLICY 133 -#define TS_F_TS_RESP_SET_GENTIME_WITH_PRECISION 134 -#define TS_F_TS_RESP_SET_STATUS_INFO 135 -#define TS_F_TS_RESP_SET_TST_INFO 150 -#define TS_F_TS_RESP_SIGN 136 -#define TS_F_TS_RESP_VERIFY_SIGNATURE 106 -#define TS_F_TS_RESP_VERIFY_TOKEN 107 -#define TS_F_TS_TST_INFO_SET_ACCURACY 137 -#define TS_F_TS_TST_INFO_SET_MSG_IMPRINT 138 -#define TS_F_TS_TST_INFO_SET_NONCE 139 -#define TS_F_TS_TST_INFO_SET_POLICY_ID 140 -#define TS_F_TS_TST_INFO_SET_SERIAL 141 -#define TS_F_TS_TST_INFO_SET_TIME 142 -#define TS_F_TS_TST_INFO_SET_TSA 143 -#define TS_F_TS_VERIFY 108 -#define TS_F_TS_VERIFY_CERT 109 -#define TS_F_TS_VERIFY_CTX_NEW 144 - -/* Reason codes. */ -#define TS_R_BAD_PKCS7_TYPE 132 -#define TS_R_BAD_TYPE 133 -#define TS_R_CERTIFICATE_VERIFY_ERROR 100 -#define TS_R_COULD_NOT_SET_ENGINE 127 -#define TS_R_COULD_NOT_SET_TIME 115 -#define TS_R_D2I_TS_RESP_INT_FAILED 128 -#define TS_R_DETACHED_CONTENT 134 -#define TS_R_ESS_ADD_SIGNING_CERT_ERROR 116 -#define TS_R_ESS_SIGNING_CERTIFICATE_ERROR 101 -#define TS_R_INVALID_NULL_POINTER 102 -#define TS_R_INVALID_SIGNER_CERTIFICATE_PURPOSE 117 -#define TS_R_MESSAGE_IMPRINT_MISMATCH 103 -#define TS_R_NONCE_MISMATCH 104 -#define TS_R_NONCE_NOT_RETURNED 105 -#define TS_R_NO_CONTENT 106 -#define TS_R_NO_TIME_STAMP_TOKEN 107 -#define TS_R_PKCS7_ADD_SIGNATURE_ERROR 118 -#define TS_R_PKCS7_ADD_SIGNED_ATTR_ERROR 119 -#define TS_R_PKCS7_TO_TS_TST_INFO_FAILED 129 -#define TS_R_POLICY_MISMATCH 108 -#define TS_R_PRIVATE_KEY_DOES_NOT_MATCH_CERTIFICATE 120 -#define TS_R_RESPONSE_SETUP_ERROR 121 -#define TS_R_SIGNATURE_FAILURE 109 -#define TS_R_THERE_MUST_BE_ONE_SIGNER 110 -#define TS_R_TIME_SYSCALL_ERROR 122 -#define TS_R_TOKEN_NOT_PRESENT 130 -#define TS_R_TOKEN_PRESENT 131 -#define TS_R_TSA_NAME_MISMATCH 111 -#define TS_R_TSA_UNTRUSTED 112 -#define TS_R_TST_INFO_SETUP_ERROR 123 -#define TS_R_TS_DATASIGN 124 -#define TS_R_UNACCEPTABLE_POLICY 125 -#define TS_R_UNSUPPORTED_MD_ALGORITHM 126 -#define TS_R_UNSUPPORTED_VERSION 113 -#define TS_R_WRONG_CONTENT_TYPE 114 - -#ifdef __cplusplus -} -#endif -#endif diff --git a/Pods/OpenSSL-Universal/include-osx/openssl/txt_db.h b/Pods/OpenSSL-Universal/include-osx/openssl/txt_db.h deleted file mode 100644 index 6abe435b..00000000 --- a/Pods/OpenSSL-Universal/include-osx/openssl/txt_db.h +++ /dev/null @@ -1,112 +0,0 @@ -/* crypto/txt_db/txt_db.h */ -/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) - * All rights reserved. - * - * This package is an SSL implementation written - * by Eric Young (eay@cryptsoft.com). - * The implementation was written so as to conform with Netscapes SSL. - * - * This library is free for commercial and non-commercial use as long as - * the following conditions are aheared to. The following conditions - * apply to all code found in this distribution, be it the RC4, RSA, - * lhash, DES, etc., code; not just the SSL code. The SSL documentation - * included with this distribution is covered by the same copyright terms - * except that the holder is Tim Hudson (tjh@cryptsoft.com). - * - * Copyright remains Eric Young's, and as such any Copyright notices in - * the code are not to be removed. - * If this package is used in a product, Eric Young should be given attribution - * as the author of the parts of the library used. - * This can be in the form of a textual message at program startup or - * in documentation (online or textual) provided with the package. - * - * Redistribution and use in source and binary forms, with or without - * modification, are permitted provided that the following conditions - * are met: - * 1. Redistributions of source code must retain the copyright - * notice, this list of conditions and the following disclaimer. - * 2. Redistributions in binary form must reproduce the above copyright - * notice, this list of conditions and the following disclaimer in the - * documentation and/or other materials provided with the distribution. - * 3. All advertising materials mentioning features or use of this software - * must display the following acknowledgement: - * "This product includes cryptographic software written by - * Eric Young (eay@cryptsoft.com)" - * The word 'cryptographic' can be left out if the rouines from the library - * being used are not cryptographic related :-). - * 4. If you include any Windows specific code (or a derivative thereof) from - * the apps directory (application code) you must include an acknowledgement: - * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" - * - * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND - * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE - * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE - * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE - * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL - * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS - * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) - * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT - * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY - * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF - * SUCH DAMAGE. - * - * The licence and distribution terms for any publically available version or - * derivative of this code cannot be changed. i.e. this code cannot simply be - * copied and put under another distribution licence - * [including the GNU Public Licence.] - */ - -#ifndef HEADER_TXT_DB_H -#define HEADER_TXT_DB_H - -#include -#ifndef OPENSSL_NO_BIO -#include -#endif -#include -#include - -#define DB_ERROR_OK 0 -#define DB_ERROR_MALLOC 1 -#define DB_ERROR_INDEX_CLASH 2 -#define DB_ERROR_INDEX_OUT_OF_RANGE 3 -#define DB_ERROR_NO_INDEX 4 -#define DB_ERROR_INSERT_INDEX_CLASH 5 - -#ifdef __cplusplus -extern "C" { -#endif - -typedef OPENSSL_STRING *OPENSSL_PSTRING; -DECLARE_SPECIAL_STACK_OF(OPENSSL_PSTRING, OPENSSL_STRING) - -typedef struct txt_db_st - { - int num_fields; - STACK_OF(OPENSSL_PSTRING) *data; - LHASH_OF(OPENSSL_STRING) **index; - int (**qual)(OPENSSL_STRING *); - long error; - long arg1; - long arg2; - OPENSSL_STRING *arg_row; - } TXT_DB; - -#ifndef OPENSSL_NO_BIO -TXT_DB *TXT_DB_read(BIO *in, int num); -long TXT_DB_write(BIO *out, TXT_DB *db); -#else -TXT_DB *TXT_DB_read(char *in, int num); -long TXT_DB_write(char *out, TXT_DB *db); -#endif -int TXT_DB_create_index(TXT_DB *db,int field,int (*qual)(OPENSSL_STRING *), - LHASH_HASH_FN_TYPE hash, LHASH_COMP_FN_TYPE cmp); -void TXT_DB_free(TXT_DB *db); -OPENSSL_STRING *TXT_DB_get_by_index(TXT_DB *db, int idx, OPENSSL_STRING *value); -int TXT_DB_insert(TXT_DB *db, OPENSSL_STRING *value); - -#ifdef __cplusplus -} -#endif - -#endif diff --git a/Pods/OpenSSL-Universal/include-osx/openssl/ui.h b/Pods/OpenSSL-Universal/include-osx/openssl/ui.h deleted file mode 100644 index bd78aa41..00000000 --- a/Pods/OpenSSL-Universal/include-osx/openssl/ui.h +++ /dev/null @@ -1,383 +0,0 @@ -/* crypto/ui/ui.h -*- mode:C; c-file-style: "eay" -*- */ -/* Written by Richard Levitte (richard@levitte.org) for the OpenSSL - * project 2001. - */ -/* ==================================================================== - * Copyright (c) 2001 The OpenSSL Project. All rights reserved. - * - * Redistribution and use in source and binary forms, with or without - * modification, are permitted provided that the following conditions - * are met: - * - * 1. Redistributions of source code must retain the above copyright - * notice, this list of conditions and the following disclaimer. - * - * 2. Redistributions in binary form must reproduce the above copyright - * notice, this list of conditions and the following disclaimer in - * the documentation and/or other materials provided with the - * distribution. - * - * 3. All advertising materials mentioning features or use of this - * software must display the following acknowledgment: - * "This product includes software developed by the OpenSSL Project - * for use in the OpenSSL Toolkit. (http://www.openssl.org/)" - * - * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to - * endorse or promote products derived from this software without - * prior written permission. For written permission, please contact - * openssl-core@openssl.org. - * - * 5. Products derived from this software may not be called "OpenSSL" - * nor may "OpenSSL" appear in their names without prior written - * permission of the OpenSSL Project. - * - * 6. Redistributions of any form whatsoever must retain the following - * acknowledgment: - * "This product includes software developed by the OpenSSL Project - * for use in the OpenSSL Toolkit (http://www.openssl.org/)" - * - * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY - * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE - * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR - * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR - * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, - * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT - * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; - * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) - * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, - * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) - * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED - * OF THE POSSIBILITY OF SUCH DAMAGE. - * ==================================================================== - * - * This product includes cryptographic software written by Eric Young - * (eay@cryptsoft.com). This product includes software written by Tim - * Hudson (tjh@cryptsoft.com). - * - */ - -#ifndef HEADER_UI_H -#define HEADER_UI_H - -#ifndef OPENSSL_NO_DEPRECATED -#include -#endif -#include -#include - -#ifdef __cplusplus -extern "C" { -#endif - -/* Declared already in ossl_typ.h */ -/* typedef struct ui_st UI; */ -/* typedef struct ui_method_st UI_METHOD; */ - - -/* All the following functions return -1 or NULL on error and in some cases - (UI_process()) -2 if interrupted or in some other way cancelled. - When everything is fine, they return 0, a positive value or a non-NULL - pointer, all depending on their purpose. */ - -/* Creators and destructor. */ -UI *UI_new(void); -UI *UI_new_method(const UI_METHOD *method); -void UI_free(UI *ui); - -/* The following functions are used to add strings to be printed and prompt - strings to prompt for data. The names are UI_{add,dup}__string - and UI_{add,dup}_input_boolean. - - UI_{add,dup}__string have the following meanings: - add add a text or prompt string. The pointers given to these - functions are used verbatim, no copying is done. - dup make a copy of the text or prompt string, then add the copy - to the collection of strings in the user interface. - - The function is a name for the functionality that the given - string shall be used for. It can be one of: - input use the string as data prompt. - verify use the string as verification prompt. This - is used to verify a previous input. - info use the string for informational output. - error use the string for error output. - Honestly, there's currently no difference between info and error for the - moment. - - UI_{add,dup}_input_boolean have the same semantics for "add" and "dup", - and are typically used when one wants to prompt for a yes/no response. - - - All of the functions in this group take a UI and a prompt string. - The string input and verify addition functions also take a flag argument, - a buffer for the result to end up with, a minimum input size and a maximum - input size (the result buffer MUST be large enough to be able to contain - the maximum number of characters). Additionally, the verify addition - functions takes another buffer to compare the result against. - The boolean input functions take an action description string (which should - be safe to ignore if the expected user action is obvious, for example with - a dialog box with an OK button and a Cancel button), a string of acceptable - characters to mean OK and to mean Cancel. The two last strings are checked - to make sure they don't have common characters. Additionally, the same - flag argument as for the string input is taken, as well as a result buffer. - The result buffer is required to be at least one byte long. Depending on - the answer, the first character from the OK or the Cancel character strings - will be stored in the first byte of the result buffer. No NUL will be - added, so the result is *not* a string. - - On success, the all return an index of the added information. That index - is usefull when retrieving results with UI_get0_result(). */ -int UI_add_input_string(UI *ui, const char *prompt, int flags, - char *result_buf, int minsize, int maxsize); -int UI_dup_input_string(UI *ui, const char *prompt, int flags, - char *result_buf, int minsize, int maxsize); -int UI_add_verify_string(UI *ui, const char *prompt, int flags, - char *result_buf, int minsize, int maxsize, const char *test_buf); -int UI_dup_verify_string(UI *ui, const char *prompt, int flags, - char *result_buf, int minsize, int maxsize, const char *test_buf); -int UI_add_input_boolean(UI *ui, const char *prompt, const char *action_desc, - const char *ok_chars, const char *cancel_chars, - int flags, char *result_buf); -int UI_dup_input_boolean(UI *ui, const char *prompt, const char *action_desc, - const char *ok_chars, const char *cancel_chars, - int flags, char *result_buf); -int UI_add_info_string(UI *ui, const char *text); -int UI_dup_info_string(UI *ui, const char *text); -int UI_add_error_string(UI *ui, const char *text); -int UI_dup_error_string(UI *ui, const char *text); - -/* These are the possible flags. They can be or'ed together. */ -/* Use to have echoing of input */ -#define UI_INPUT_FLAG_ECHO 0x01 -/* Use a default password. Where that password is found is completely - up to the application, it might for example be in the user data set - with UI_add_user_data(). It is not recommended to have more than - one input in each UI being marked with this flag, or the application - might get confused. */ -#define UI_INPUT_FLAG_DEFAULT_PWD 0x02 - -/* The user of these routines may want to define flags of their own. The core - UI won't look at those, but will pass them on to the method routines. They - must use higher bits so they don't get confused with the UI bits above. - UI_INPUT_FLAG_USER_BASE tells which is the lowest bit to use. A good - example of use is this: - - #define MY_UI_FLAG1 (0x01 << UI_INPUT_FLAG_USER_BASE) - -*/ -#define UI_INPUT_FLAG_USER_BASE 16 - - -/* The following function helps construct a prompt. object_desc is a - textual short description of the object, for example "pass phrase", - and object_name is the name of the object (might be a card name or - a file name. - The returned string shall always be allocated on the heap with - OPENSSL_malloc(), and need to be free'd with OPENSSL_free(). - - If the ui_method doesn't contain a pointer to a user-defined prompt - constructor, a default string is built, looking like this: - - "Enter {object_desc} for {object_name}:" - - So, if object_desc has the value "pass phrase" and object_name has - the value "foo.key", the resulting string is: - - "Enter pass phrase for foo.key:" -*/ -char *UI_construct_prompt(UI *ui_method, - const char *object_desc, const char *object_name); - - -/* The following function is used to store a pointer to user-specific data. - Any previous such pointer will be returned and replaced. - - For callback purposes, this function makes a lot more sense than using - ex_data, since the latter requires that different parts of OpenSSL or - applications share the same ex_data index. - - Note that the UI_OpenSSL() method completely ignores the user data. - Other methods may not, however. */ -void *UI_add_user_data(UI *ui, void *user_data); -/* We need a user data retrieving function as well. */ -void *UI_get0_user_data(UI *ui); - -/* Return the result associated with a prompt given with the index i. */ -const char *UI_get0_result(UI *ui, int i); - -/* When all strings have been added, process the whole thing. */ -int UI_process(UI *ui); - -/* Give a user interface parametrised control commands. This can be used to - send down an integer, a data pointer or a function pointer, as well as - be used to get information from a UI. */ -int UI_ctrl(UI *ui, int cmd, long i, void *p, void (*f)(void)); - -/* The commands */ -/* Use UI_CONTROL_PRINT_ERRORS with the value 1 to have UI_process print the - OpenSSL error stack before printing any info or added error messages and - before any prompting. */ -#define UI_CTRL_PRINT_ERRORS 1 -/* Check if a UI_process() is possible to do again with the same instance of - a user interface. This makes UI_ctrl() return 1 if it is redoable, and 0 - if not. */ -#define UI_CTRL_IS_REDOABLE 2 - - -/* Some methods may use extra data */ -#define UI_set_app_data(s,arg) UI_set_ex_data(s,0,arg) -#define UI_get_app_data(s) UI_get_ex_data(s,0) -int UI_get_ex_new_index(long argl, void *argp, CRYPTO_EX_new *new_func, - CRYPTO_EX_dup *dup_func, CRYPTO_EX_free *free_func); -int UI_set_ex_data(UI *r,int idx,void *arg); -void *UI_get_ex_data(UI *r, int idx); - -/* Use specific methods instead of the built-in one */ -void UI_set_default_method(const UI_METHOD *meth); -const UI_METHOD *UI_get_default_method(void); -const UI_METHOD *UI_get_method(UI *ui); -const UI_METHOD *UI_set_method(UI *ui, const UI_METHOD *meth); - -/* The method with all the built-in thingies */ -UI_METHOD *UI_OpenSSL(void); - - -/* ---------- For method writers ---------- */ -/* A method contains a number of functions that implement the low level - of the User Interface. The functions are: - - an opener This function starts a session, maybe by opening - a channel to a tty, or by opening a window. - a writer This function is called to write a given string, - maybe to the tty, maybe as a field label in a - window. - a flusher This function is called to flush everything that - has been output so far. It can be used to actually - display a dialog box after it has been built. - a reader This function is called to read a given prompt, - maybe from the tty, maybe from a field in a - window. Note that it's called wth all string - structures, not only the prompt ones, so it must - check such things itself. - a closer This function closes the session, maybe by closing - the channel to the tty, or closing the window. - - All these functions are expected to return: - - 0 on error. - 1 on success. - -1 on out-of-band events, for example if some prompting has - been canceled (by pressing Ctrl-C, for example). This is - only checked when returned by the flusher or the reader. - - The way this is used, the opener is first called, then the writer for all - strings, then the flusher, then the reader for all strings and finally the - closer. Note that if you want to prompt from a terminal or other command - line interface, the best is to have the reader also write the prompts - instead of having the writer do it. If you want to prompt from a dialog - box, the writer can be used to build up the contents of the box, and the - flusher to actually display the box and run the event loop until all data - has been given, after which the reader only grabs the given data and puts - them back into the UI strings. - - All method functions take a UI as argument. Additionally, the writer and - the reader take a UI_STRING. -*/ - -/* The UI_STRING type is the data structure that contains all the needed info - about a string or a prompt, including test data for a verification prompt. -*/ -typedef struct ui_string_st UI_STRING; -DECLARE_STACK_OF(UI_STRING) - -/* The different types of strings that are currently supported. - This is only needed by method authors. */ -enum UI_string_types - { - UIT_NONE=0, - UIT_PROMPT, /* Prompt for a string */ - UIT_VERIFY, /* Prompt for a string and verify */ - UIT_BOOLEAN, /* Prompt for a yes/no response */ - UIT_INFO, /* Send info to the user */ - UIT_ERROR /* Send an error message to the user */ - }; - -/* Create and manipulate methods */ -UI_METHOD *UI_create_method(char *name); -void UI_destroy_method(UI_METHOD *ui_method); -int UI_method_set_opener(UI_METHOD *method, int (*opener)(UI *ui)); -int UI_method_set_writer(UI_METHOD *method, int (*writer)(UI *ui, UI_STRING *uis)); -int UI_method_set_flusher(UI_METHOD *method, int (*flusher)(UI *ui)); -int UI_method_set_reader(UI_METHOD *method, int (*reader)(UI *ui, UI_STRING *uis)); -int UI_method_set_closer(UI_METHOD *method, int (*closer)(UI *ui)); -int UI_method_set_prompt_constructor(UI_METHOD *method, char *(*prompt_constructor)(UI* ui, const char* object_desc, const char* object_name)); -int (*UI_method_get_opener(UI_METHOD *method))(UI*); -int (*UI_method_get_writer(UI_METHOD *method))(UI*,UI_STRING*); -int (*UI_method_get_flusher(UI_METHOD *method))(UI*); -int (*UI_method_get_reader(UI_METHOD *method))(UI*,UI_STRING*); -int (*UI_method_get_closer(UI_METHOD *method))(UI*); -char * (*UI_method_get_prompt_constructor(UI_METHOD *method))(UI*, const char*, const char*); - -/* The following functions are helpers for method writers to access relevant - data from a UI_STRING. */ - -/* Return type of the UI_STRING */ -enum UI_string_types UI_get_string_type(UI_STRING *uis); -/* Return input flags of the UI_STRING */ -int UI_get_input_flags(UI_STRING *uis); -/* Return the actual string to output (the prompt, info or error) */ -const char *UI_get0_output_string(UI_STRING *uis); -/* Return the optional action string to output (the boolean promtp instruction) */ -const char *UI_get0_action_string(UI_STRING *uis); -/* Return the result of a prompt */ -const char *UI_get0_result_string(UI_STRING *uis); -/* Return the string to test the result against. Only useful with verifies. */ -const char *UI_get0_test_string(UI_STRING *uis); -/* Return the required minimum size of the result */ -int UI_get_result_minsize(UI_STRING *uis); -/* Return the required maximum size of the result */ -int UI_get_result_maxsize(UI_STRING *uis); -/* Set the result of a UI_STRING. */ -int UI_set_result(UI *ui, UI_STRING *uis, const char *result); - - -/* A couple of popular utility functions */ -int UI_UTIL_read_pw_string(char *buf,int length,const char *prompt,int verify); -int UI_UTIL_read_pw(char *buf,char *buff,int size,const char *prompt,int verify); - - -/* BEGIN ERROR CODES */ -/* The following lines are auto generated by the script mkerr.pl. Any changes - * made after this point may be overwritten when the script is next run. - */ -void ERR_load_UI_strings(void); - -/* Error codes for the UI functions. */ - -/* Function codes. */ -#define UI_F_GENERAL_ALLOCATE_BOOLEAN 108 -#define UI_F_GENERAL_ALLOCATE_PROMPT 109 -#define UI_F_GENERAL_ALLOCATE_STRING 100 -#define UI_F_UI_CTRL 111 -#define UI_F_UI_DUP_ERROR_STRING 101 -#define UI_F_UI_DUP_INFO_STRING 102 -#define UI_F_UI_DUP_INPUT_BOOLEAN 110 -#define UI_F_UI_DUP_INPUT_STRING 103 -#define UI_F_UI_DUP_VERIFY_STRING 106 -#define UI_F_UI_GET0_RESULT 107 -#define UI_F_UI_NEW_METHOD 104 -#define UI_F_UI_SET_RESULT 105 - -/* Reason codes. */ -#define UI_R_COMMON_OK_AND_CANCEL_CHARACTERS 104 -#define UI_R_INDEX_TOO_LARGE 102 -#define UI_R_INDEX_TOO_SMALL 103 -#define UI_R_NO_RESULT_BUFFER 105 -#define UI_R_RESULT_TOO_LARGE 100 -#define UI_R_RESULT_TOO_SMALL 101 -#define UI_R_UNKNOWN_CONTROL_COMMAND 106 - -#ifdef __cplusplus -} -#endif -#endif diff --git a/Pods/OpenSSL-Universal/include-osx/openssl/ui_compat.h b/Pods/OpenSSL-Universal/include-osx/openssl/ui_compat.h deleted file mode 100644 index b35c9bb7..00000000 --- a/Pods/OpenSSL-Universal/include-osx/openssl/ui_compat.h +++ /dev/null @@ -1,83 +0,0 @@ -/* crypto/ui/ui.h -*- mode:C; c-file-style: "eay" -*- */ -/* Written by Richard Levitte (richard@levitte.org) for the OpenSSL - * project 2001. - */ -/* ==================================================================== - * Copyright (c) 2001 The OpenSSL Project. All rights reserved. - * - * Redistribution and use in source and binary forms, with or without - * modification, are permitted provided that the following conditions - * are met: - * - * 1. Redistributions of source code must retain the above copyright - * notice, this list of conditions and the following disclaimer. - * - * 2. Redistributions in binary form must reproduce the above copyright - * notice, this list of conditions and the following disclaimer in - * the documentation and/or other materials provided with the - * distribution. - * - * 3. All advertising materials mentioning features or use of this - * software must display the following acknowledgment: - * "This product includes software developed by the OpenSSL Project - * for use in the OpenSSL Toolkit. (http://www.openssl.org/)" - * - * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to - * endorse or promote products derived from this software without - * prior written permission. For written permission, please contact - * openssl-core@openssl.org. - * - * 5. Products derived from this software may not be called "OpenSSL" - * nor may "OpenSSL" appear in their names without prior written - * permission of the OpenSSL Project. - * - * 6. Redistributions of any form whatsoever must retain the following - * acknowledgment: - * "This product includes software developed by the OpenSSL Project - * for use in the OpenSSL Toolkit (http://www.openssl.org/)" - * - * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY - * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE - * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR - * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR - * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, - * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT - * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; - * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) - * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, - * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) - * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED - * OF THE POSSIBILITY OF SUCH DAMAGE. - * ==================================================================== - * - * This product includes cryptographic software written by Eric Young - * (eay@cryptsoft.com). This product includes software written by Tim - * Hudson (tjh@cryptsoft.com). - * - */ - -#ifndef HEADER_UI_COMPAT_H -#define HEADER_UI_COMPAT_H - -#include -#include - -#ifdef __cplusplus -extern "C" { -#endif - -/* The following functions were previously part of the DES section, - and are provided here for backward compatibility reasons. */ - -#define des_read_pw_string(b,l,p,v) \ - _ossl_old_des_read_pw_string((b),(l),(p),(v)) -#define des_read_pw(b,bf,s,p,v) \ - _ossl_old_des_read_pw((b),(bf),(s),(p),(v)) - -int _ossl_old_des_read_pw_string(char *buf,int length,const char *prompt,int verify); -int _ossl_old_des_read_pw(char *buf,char *buff,int size,const char *prompt,int verify); - -#ifdef __cplusplus -} -#endif -#endif diff --git a/Pods/OpenSSL-Universal/include-osx/openssl/whrlpool.h b/Pods/OpenSSL-Universal/include-osx/openssl/whrlpool.h deleted file mode 100644 index 9e01f5b0..00000000 --- a/Pods/OpenSSL-Universal/include-osx/openssl/whrlpool.h +++ /dev/null @@ -1,41 +0,0 @@ -#ifndef HEADER_WHRLPOOL_H -#define HEADER_WHRLPOOL_H - -#include -#include - -#ifdef __cplusplus -extern "C" { -#endif - -#define WHIRLPOOL_DIGEST_LENGTH (512/8) -#define WHIRLPOOL_BBLOCK 512 -#define WHIRLPOOL_COUNTER (256/8) - -typedef struct { - union { - unsigned char c[WHIRLPOOL_DIGEST_LENGTH]; - /* double q is here to ensure 64-bit alignment */ - double q[WHIRLPOOL_DIGEST_LENGTH/sizeof(double)]; - } H; - unsigned char data[WHIRLPOOL_BBLOCK/8]; - unsigned int bitoff; - size_t bitlen[WHIRLPOOL_COUNTER/sizeof(size_t)]; - } WHIRLPOOL_CTX; - -#ifndef OPENSSL_NO_WHIRLPOOL -#ifdef OPENSSL_FIPS -int private_WHIRLPOOL_Init(WHIRLPOOL_CTX *c); -#endif -int WHIRLPOOL_Init (WHIRLPOOL_CTX *c); -int WHIRLPOOL_Update (WHIRLPOOL_CTX *c,const void *inp,size_t bytes); -void WHIRLPOOL_BitUpdate(WHIRLPOOL_CTX *c,const void *inp,size_t bits); -int WHIRLPOOL_Final (unsigned char *md,WHIRLPOOL_CTX *c); -unsigned char *WHIRLPOOL(const void *inp,size_t bytes,unsigned char *md); -#endif - -#ifdef __cplusplus -} -#endif - -#endif diff --git a/Pods/OpenSSL-Universal/include-osx/openssl/x509.h b/Pods/OpenSSL-Universal/include-osx/openssl/x509.h deleted file mode 100644 index 092dd745..00000000 --- a/Pods/OpenSSL-Universal/include-osx/openssl/x509.h +++ /dev/null @@ -1,1297 +0,0 @@ -/* crypto/x509/x509.h */ -/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) - * All rights reserved. - * - * This package is an SSL implementation written - * by Eric Young (eay@cryptsoft.com). - * The implementation was written so as to conform with Netscapes SSL. - * - * This library is free for commercial and non-commercial use as long as - * the following conditions are aheared to. The following conditions - * apply to all code found in this distribution, be it the RC4, RSA, - * lhash, DES, etc., code; not just the SSL code. The SSL documentation - * included with this distribution is covered by the same copyright terms - * except that the holder is Tim Hudson (tjh@cryptsoft.com). - * - * Copyright remains Eric Young's, and as such any Copyright notices in - * the code are not to be removed. - * If this package is used in a product, Eric Young should be given attribution - * as the author of the parts of the library used. - * This can be in the form of a textual message at program startup or - * in documentation (online or textual) provided with the package. - * - * Redistribution and use in source and binary forms, with or without - * modification, are permitted provided that the following conditions - * are met: - * 1. Redistributions of source code must retain the copyright - * notice, this list of conditions and the following disclaimer. - * 2. Redistributions in binary form must reproduce the above copyright - * notice, this list of conditions and the following disclaimer in the - * documentation and/or other materials provided with the distribution. - * 3. All advertising materials mentioning features or use of this software - * must display the following acknowledgement: - * "This product includes cryptographic software written by - * Eric Young (eay@cryptsoft.com)" - * The word 'cryptographic' can be left out if the rouines from the library - * being used are not cryptographic related :-). - * 4. If you include any Windows specific code (or a derivative thereof) from - * the apps directory (application code) you must include an acknowledgement: - * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" - * - * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND - * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE - * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE - * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE - * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL - * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS - * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) - * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT - * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY - * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF - * SUCH DAMAGE. - * - * The licence and distribution terms for any publically available version or - * derivative of this code cannot be changed. i.e. this code cannot simply be - * copied and put under another distribution licence - * [including the GNU Public Licence.] - */ -/* ==================================================================== - * Copyright 2002 Sun Microsystems, Inc. ALL RIGHTS RESERVED. - * ECDH support in OpenSSL originally developed by - * SUN MICROSYSTEMS, INC., and contributed to the OpenSSL project. - */ - -#ifndef HEADER_X509_H -#define HEADER_X509_H - -#include -#include -#ifndef OPENSSL_NO_BUFFER -#include -#endif -#ifndef OPENSSL_NO_EVP -#include -#endif -#ifndef OPENSSL_NO_BIO -#include -#endif -#include -#include -#include - -#ifndef OPENSSL_NO_EC -#include -#endif - -#ifndef OPENSSL_NO_ECDSA -#include -#endif - -#ifndef OPENSSL_NO_ECDH -#include -#endif - -#ifndef OPENSSL_NO_DEPRECATED -#ifndef OPENSSL_NO_RSA -#include -#endif -#ifndef OPENSSL_NO_DSA -#include -#endif -#ifndef OPENSSL_NO_DH -#include -#endif -#endif - -#ifndef OPENSSL_NO_SHA -#include -#endif -#include - -#ifdef __cplusplus -extern "C" { -#endif - -#ifdef OPENSSL_SYS_WIN32 -/* Under Win32 these are defined in wincrypt.h */ -#undef X509_NAME -#undef X509_CERT_PAIR -#undef X509_EXTENSIONS -#endif - -#define X509_FILETYPE_PEM 1 -#define X509_FILETYPE_ASN1 2 -#define X509_FILETYPE_DEFAULT 3 - -#define X509v3_KU_DIGITAL_SIGNATURE 0x0080 -#define X509v3_KU_NON_REPUDIATION 0x0040 -#define X509v3_KU_KEY_ENCIPHERMENT 0x0020 -#define X509v3_KU_DATA_ENCIPHERMENT 0x0010 -#define X509v3_KU_KEY_AGREEMENT 0x0008 -#define X509v3_KU_KEY_CERT_SIGN 0x0004 -#define X509v3_KU_CRL_SIGN 0x0002 -#define X509v3_KU_ENCIPHER_ONLY 0x0001 -#define X509v3_KU_DECIPHER_ONLY 0x8000 -#define X509v3_KU_UNDEF 0xffff - -typedef struct X509_objects_st - { - int nid; - int (*a2i)(void); - int (*i2a)(void); - } X509_OBJECTS; - -struct X509_algor_st - { - ASN1_OBJECT *algorithm; - ASN1_TYPE *parameter; - } /* X509_ALGOR */; - -DECLARE_ASN1_SET_OF(X509_ALGOR) - -typedef STACK_OF(X509_ALGOR) X509_ALGORS; - -typedef struct X509_val_st - { - ASN1_TIME *notBefore; - ASN1_TIME *notAfter; - } X509_VAL; - -struct X509_pubkey_st - { - X509_ALGOR *algor; - ASN1_BIT_STRING *public_key; - EVP_PKEY *pkey; - }; - -typedef struct X509_sig_st - { - X509_ALGOR *algor; - ASN1_OCTET_STRING *digest; - } X509_SIG; - -typedef struct X509_name_entry_st - { - ASN1_OBJECT *object; - ASN1_STRING *value; - int set; - int size; /* temp variable */ - } X509_NAME_ENTRY; - -DECLARE_STACK_OF(X509_NAME_ENTRY) -DECLARE_ASN1_SET_OF(X509_NAME_ENTRY) - -/* we always keep X509_NAMEs in 2 forms. */ -struct X509_name_st - { - STACK_OF(X509_NAME_ENTRY) *entries; - int modified; /* true if 'bytes' needs to be built */ -#ifndef OPENSSL_NO_BUFFER - BUF_MEM *bytes; -#else - char *bytes; -#endif -/* unsigned long hash; Keep the hash around for lookups */ - unsigned char *canon_enc; - int canon_enclen; - } /* X509_NAME */; - -DECLARE_STACK_OF(X509_NAME) - -#define X509_EX_V_NETSCAPE_HACK 0x8000 -#define X509_EX_V_INIT 0x0001 -typedef struct X509_extension_st - { - ASN1_OBJECT *object; - ASN1_BOOLEAN critical; - ASN1_OCTET_STRING *value; - } X509_EXTENSION; - -typedef STACK_OF(X509_EXTENSION) X509_EXTENSIONS; - -DECLARE_STACK_OF(X509_EXTENSION) -DECLARE_ASN1_SET_OF(X509_EXTENSION) - -/* a sequence of these are used */ -typedef struct x509_attributes_st - { - ASN1_OBJECT *object; - int single; /* 0 for a set, 1 for a single item (which is wrong) */ - union { - char *ptr; -/* 0 */ STACK_OF(ASN1_TYPE) *set; -/* 1 */ ASN1_TYPE *single; - } value; - } X509_ATTRIBUTE; - -DECLARE_STACK_OF(X509_ATTRIBUTE) -DECLARE_ASN1_SET_OF(X509_ATTRIBUTE) - - -typedef struct X509_req_info_st - { - ASN1_ENCODING enc; - ASN1_INTEGER *version; - X509_NAME *subject; - X509_PUBKEY *pubkey; - /* d=2 hl=2 l= 0 cons: cont: 00 */ - STACK_OF(X509_ATTRIBUTE) *attributes; /* [ 0 ] */ - } X509_REQ_INFO; - -typedef struct X509_req_st - { - X509_REQ_INFO *req_info; - X509_ALGOR *sig_alg; - ASN1_BIT_STRING *signature; - int references; - } X509_REQ; - -typedef struct x509_cinf_st - { - ASN1_INTEGER *version; /* [ 0 ] default of v1 */ - ASN1_INTEGER *serialNumber; - X509_ALGOR *signature; - X509_NAME *issuer; - X509_VAL *validity; - X509_NAME *subject; - X509_PUBKEY *key; - ASN1_BIT_STRING *issuerUID; /* [ 1 ] optional in v2 */ - ASN1_BIT_STRING *subjectUID; /* [ 2 ] optional in v2 */ - STACK_OF(X509_EXTENSION) *extensions; /* [ 3 ] optional in v3 */ - ASN1_ENCODING enc; - } X509_CINF; - -/* This stuff is certificate "auxiliary info" - * it contains details which are useful in certificate - * stores and databases. When used this is tagged onto - * the end of the certificate itself - */ - -typedef struct x509_cert_aux_st - { - STACK_OF(ASN1_OBJECT) *trust; /* trusted uses */ - STACK_OF(ASN1_OBJECT) *reject; /* rejected uses */ - ASN1_UTF8STRING *alias; /* "friendly name" */ - ASN1_OCTET_STRING *keyid; /* key id of private key */ - STACK_OF(X509_ALGOR) *other; /* other unspecified info */ - } X509_CERT_AUX; - -struct x509_st - { - X509_CINF *cert_info; - X509_ALGOR *sig_alg; - ASN1_BIT_STRING *signature; - int valid; - int references; - char *name; - CRYPTO_EX_DATA ex_data; - /* These contain copies of various extension values */ - long ex_pathlen; - long ex_pcpathlen; - unsigned long ex_flags; - unsigned long ex_kusage; - unsigned long ex_xkusage; - unsigned long ex_nscert; - ASN1_OCTET_STRING *skid; - AUTHORITY_KEYID *akid; - X509_POLICY_CACHE *policy_cache; - STACK_OF(DIST_POINT) *crldp; - STACK_OF(GENERAL_NAME) *altname; - NAME_CONSTRAINTS *nc; -#ifndef OPENSSL_NO_RFC3779 - STACK_OF(IPAddressFamily) *rfc3779_addr; - struct ASIdentifiers_st *rfc3779_asid; -#endif -#ifndef OPENSSL_NO_SHA - unsigned char sha1_hash[SHA_DIGEST_LENGTH]; -#endif - X509_CERT_AUX *aux; - } /* X509 */; - -DECLARE_STACK_OF(X509) -DECLARE_ASN1_SET_OF(X509) - -/* This is used for a table of trust checking functions */ - -typedef struct x509_trust_st { - int trust; - int flags; - int (*check_trust)(struct x509_trust_st *, X509 *, int); - char *name; - int arg1; - void *arg2; -} X509_TRUST; - -DECLARE_STACK_OF(X509_TRUST) - -typedef struct x509_cert_pair_st { - X509 *forward; - X509 *reverse; -} X509_CERT_PAIR; - -/* standard trust ids */ - -#define X509_TRUST_DEFAULT -1 /* Only valid in purpose settings */ - -#define X509_TRUST_COMPAT 1 -#define X509_TRUST_SSL_CLIENT 2 -#define X509_TRUST_SSL_SERVER 3 -#define X509_TRUST_EMAIL 4 -#define X509_TRUST_OBJECT_SIGN 5 -#define X509_TRUST_OCSP_SIGN 6 -#define X509_TRUST_OCSP_REQUEST 7 -#define X509_TRUST_TSA 8 - -/* Keep these up to date! */ -#define X509_TRUST_MIN 1 -#define X509_TRUST_MAX 8 - - -/* trust_flags values */ -#define X509_TRUST_DYNAMIC 1 -#define X509_TRUST_DYNAMIC_NAME 2 - -/* check_trust return codes */ - -#define X509_TRUST_TRUSTED 1 -#define X509_TRUST_REJECTED 2 -#define X509_TRUST_UNTRUSTED 3 - -/* Flags for X509_print_ex() */ - -#define X509_FLAG_COMPAT 0 -#define X509_FLAG_NO_HEADER 1L -#define X509_FLAG_NO_VERSION (1L << 1) -#define X509_FLAG_NO_SERIAL (1L << 2) -#define X509_FLAG_NO_SIGNAME (1L << 3) -#define X509_FLAG_NO_ISSUER (1L << 4) -#define X509_FLAG_NO_VALIDITY (1L << 5) -#define X509_FLAG_NO_SUBJECT (1L << 6) -#define X509_FLAG_NO_PUBKEY (1L << 7) -#define X509_FLAG_NO_EXTENSIONS (1L << 8) -#define X509_FLAG_NO_SIGDUMP (1L << 9) -#define X509_FLAG_NO_AUX (1L << 10) -#define X509_FLAG_NO_ATTRIBUTES (1L << 11) - -/* Flags specific to X509_NAME_print_ex() */ - -/* The field separator information */ - -#define XN_FLAG_SEP_MASK (0xf << 16) - -#define XN_FLAG_COMPAT 0 /* Traditional SSLeay: use old X509_NAME_print */ -#define XN_FLAG_SEP_COMMA_PLUS (1 << 16) /* RFC2253 ,+ */ -#define XN_FLAG_SEP_CPLUS_SPC (2 << 16) /* ,+ spaced: more readable */ -#define XN_FLAG_SEP_SPLUS_SPC (3 << 16) /* ;+ spaced */ -#define XN_FLAG_SEP_MULTILINE (4 << 16) /* One line per field */ - -#define XN_FLAG_DN_REV (1 << 20) /* Reverse DN order */ - -/* How the field name is shown */ - -#define XN_FLAG_FN_MASK (0x3 << 21) - -#define XN_FLAG_FN_SN 0 /* Object short name */ -#define XN_FLAG_FN_LN (1 << 21) /* Object long name */ -#define XN_FLAG_FN_OID (2 << 21) /* Always use OIDs */ -#define XN_FLAG_FN_NONE (3 << 21) /* No field names */ - -#define XN_FLAG_SPC_EQ (1 << 23) /* Put spaces round '=' */ - -/* This determines if we dump fields we don't recognise: - * RFC2253 requires this. - */ - -#define XN_FLAG_DUMP_UNKNOWN_FIELDS (1 << 24) - -#define XN_FLAG_FN_ALIGN (1 << 25) /* Align field names to 20 characters */ - -/* Complete set of RFC2253 flags */ - -#define XN_FLAG_RFC2253 (ASN1_STRFLGS_RFC2253 | \ - XN_FLAG_SEP_COMMA_PLUS | \ - XN_FLAG_DN_REV | \ - XN_FLAG_FN_SN | \ - XN_FLAG_DUMP_UNKNOWN_FIELDS) - -/* readable oneline form */ - -#define XN_FLAG_ONELINE (ASN1_STRFLGS_RFC2253 | \ - ASN1_STRFLGS_ESC_QUOTE | \ - XN_FLAG_SEP_CPLUS_SPC | \ - XN_FLAG_SPC_EQ | \ - XN_FLAG_FN_SN) - -/* readable multiline form */ - -#define XN_FLAG_MULTILINE (ASN1_STRFLGS_ESC_CTRL | \ - ASN1_STRFLGS_ESC_MSB | \ - XN_FLAG_SEP_MULTILINE | \ - XN_FLAG_SPC_EQ | \ - XN_FLAG_FN_LN | \ - XN_FLAG_FN_ALIGN) - -struct x509_revoked_st - { - ASN1_INTEGER *serialNumber; - ASN1_TIME *revocationDate; - STACK_OF(X509_EXTENSION) /* optional */ *extensions; - /* Set up if indirect CRL */ - STACK_OF(GENERAL_NAME) *issuer; - /* Revocation reason */ - int reason; - int sequence; /* load sequence */ - }; - -DECLARE_STACK_OF(X509_REVOKED) -DECLARE_ASN1_SET_OF(X509_REVOKED) - -typedef struct X509_crl_info_st - { - ASN1_INTEGER *version; - X509_ALGOR *sig_alg; - X509_NAME *issuer; - ASN1_TIME *lastUpdate; - ASN1_TIME *nextUpdate; - STACK_OF(X509_REVOKED) *revoked; - STACK_OF(X509_EXTENSION) /* [0] */ *extensions; - ASN1_ENCODING enc; - } X509_CRL_INFO; - -struct X509_crl_st - { - /* actual signature */ - X509_CRL_INFO *crl; - X509_ALGOR *sig_alg; - ASN1_BIT_STRING *signature; - int references; - int flags; - /* Copies of various extensions */ - AUTHORITY_KEYID *akid; - ISSUING_DIST_POINT *idp; - /* Convenient breakdown of IDP */ - int idp_flags; - int idp_reasons; - /* CRL and base CRL numbers for delta processing */ - ASN1_INTEGER *crl_number; - ASN1_INTEGER *base_crl_number; -#ifndef OPENSSL_NO_SHA - unsigned char sha1_hash[SHA_DIGEST_LENGTH]; -#endif - STACK_OF(GENERAL_NAMES) *issuers; - const X509_CRL_METHOD *meth; - void *meth_data; - } /* X509_CRL */; - -DECLARE_STACK_OF(X509_CRL) -DECLARE_ASN1_SET_OF(X509_CRL) - -typedef struct private_key_st - { - int version; - /* The PKCS#8 data types */ - X509_ALGOR *enc_algor; - ASN1_OCTET_STRING *enc_pkey; /* encrypted pub key */ - - /* When decrypted, the following will not be NULL */ - EVP_PKEY *dec_pkey; - - /* used to encrypt and decrypt */ - int key_length; - char *key_data; - int key_free; /* true if we should auto free key_data */ - - /* expanded version of 'enc_algor' */ - EVP_CIPHER_INFO cipher; - - int references; - } X509_PKEY; - -#ifndef OPENSSL_NO_EVP -typedef struct X509_info_st - { - X509 *x509; - X509_CRL *crl; - X509_PKEY *x_pkey; - - EVP_CIPHER_INFO enc_cipher; - int enc_len; - char *enc_data; - - int references; - } X509_INFO; - -DECLARE_STACK_OF(X509_INFO) -#endif - -/* The next 2 structures and their 8 routines were sent to me by - * Pat Richard and are used to manipulate - * Netscapes spki structures - useful if you are writing a CA web page - */ -typedef struct Netscape_spkac_st - { - X509_PUBKEY *pubkey; - ASN1_IA5STRING *challenge; /* challenge sent in atlas >= PR2 */ - } NETSCAPE_SPKAC; - -typedef struct Netscape_spki_st - { - NETSCAPE_SPKAC *spkac; /* signed public key and challenge */ - X509_ALGOR *sig_algor; - ASN1_BIT_STRING *signature; - } NETSCAPE_SPKI; - -/* Netscape certificate sequence structure */ -typedef struct Netscape_certificate_sequence - { - ASN1_OBJECT *type; - STACK_OF(X509) *certs; - } NETSCAPE_CERT_SEQUENCE; - -/* Unused (and iv length is wrong) -typedef struct CBCParameter_st - { - unsigned char iv[8]; - } CBC_PARAM; -*/ - -/* Password based encryption structure */ - -typedef struct PBEPARAM_st { -ASN1_OCTET_STRING *salt; -ASN1_INTEGER *iter; -} PBEPARAM; - -/* Password based encryption V2 structures */ - -typedef struct PBE2PARAM_st { -X509_ALGOR *keyfunc; -X509_ALGOR *encryption; -} PBE2PARAM; - -typedef struct PBKDF2PARAM_st { -ASN1_TYPE *salt; /* Usually OCTET STRING but could be anything */ -ASN1_INTEGER *iter; -ASN1_INTEGER *keylength; -X509_ALGOR *prf; -} PBKDF2PARAM; - - -/* PKCS#8 private key info structure */ - -struct pkcs8_priv_key_info_st - { - int broken; /* Flag for various broken formats */ -#define PKCS8_OK 0 -#define PKCS8_NO_OCTET 1 -#define PKCS8_EMBEDDED_PARAM 2 -#define PKCS8_NS_DB 3 -#define PKCS8_NEG_PRIVKEY 4 - ASN1_INTEGER *version; - X509_ALGOR *pkeyalg; - ASN1_TYPE *pkey; /* Should be OCTET STRING but some are broken */ - STACK_OF(X509_ATTRIBUTE) *attributes; - }; - -#ifdef __cplusplus -} -#endif - -#include -#include - -#ifdef __cplusplus -extern "C" { -#endif - -#define X509_EXT_PACK_UNKNOWN 1 -#define X509_EXT_PACK_STRING 2 - -#define X509_get_version(x) ASN1_INTEGER_get((x)->cert_info->version) -/* #define X509_get_serialNumber(x) ((x)->cert_info->serialNumber) */ -#define X509_get_notBefore(x) ((x)->cert_info->validity->notBefore) -#define X509_get_notAfter(x) ((x)->cert_info->validity->notAfter) -#define X509_extract_key(x) X509_get_pubkey(x) /*****/ -#define X509_REQ_get_version(x) ASN1_INTEGER_get((x)->req_info->version) -#define X509_REQ_get_subject_name(x) ((x)->req_info->subject) -#define X509_REQ_extract_key(a) X509_REQ_get_pubkey(a) -#define X509_name_cmp(a,b) X509_NAME_cmp((a),(b)) -#define X509_get_signature_type(x) EVP_PKEY_type(OBJ_obj2nid((x)->sig_alg->algorithm)) - -#define X509_CRL_get_version(x) ASN1_INTEGER_get((x)->crl->version) -#define X509_CRL_get_lastUpdate(x) ((x)->crl->lastUpdate) -#define X509_CRL_get_nextUpdate(x) ((x)->crl->nextUpdate) -#define X509_CRL_get_issuer(x) ((x)->crl->issuer) -#define X509_CRL_get_REVOKED(x) ((x)->crl->revoked) - -void X509_CRL_set_default_method(const X509_CRL_METHOD *meth); -X509_CRL_METHOD *X509_CRL_METHOD_new( - int (*crl_init)(X509_CRL *crl), - int (*crl_free)(X509_CRL *crl), - int (*crl_lookup)(X509_CRL *crl, X509_REVOKED **ret, - ASN1_INTEGER *ser, X509_NAME *issuer), - int (*crl_verify)(X509_CRL *crl, EVP_PKEY *pk)); -void X509_CRL_METHOD_free(X509_CRL_METHOD *m); - -void X509_CRL_set_meth_data(X509_CRL *crl, void *dat); -void *X509_CRL_get_meth_data(X509_CRL *crl); - -/* This one is only used so that a binary form can output, as in - * i2d_X509_NAME(X509_get_X509_PUBKEY(x),&buf) */ -#define X509_get_X509_PUBKEY(x) ((x)->cert_info->key) - - -const char *X509_verify_cert_error_string(long n); - -#ifndef OPENSSL_NO_EVP -int X509_verify(X509 *a, EVP_PKEY *r); - -int X509_REQ_verify(X509_REQ *a, EVP_PKEY *r); -int X509_CRL_verify(X509_CRL *a, EVP_PKEY *r); -int NETSCAPE_SPKI_verify(NETSCAPE_SPKI *a, EVP_PKEY *r); - -NETSCAPE_SPKI * NETSCAPE_SPKI_b64_decode(const char *str, int len); -char * NETSCAPE_SPKI_b64_encode(NETSCAPE_SPKI *x); -EVP_PKEY *NETSCAPE_SPKI_get_pubkey(NETSCAPE_SPKI *x); -int NETSCAPE_SPKI_set_pubkey(NETSCAPE_SPKI *x, EVP_PKEY *pkey); - -int NETSCAPE_SPKI_print(BIO *out, NETSCAPE_SPKI *spki); - -int X509_signature_dump(BIO *bp,const ASN1_STRING *sig, int indent); -int X509_signature_print(BIO *bp,X509_ALGOR *alg, ASN1_STRING *sig); - -int X509_sign(X509 *x, EVP_PKEY *pkey, const EVP_MD *md); -int X509_sign_ctx(X509 *x, EVP_MD_CTX *ctx); -int X509_REQ_sign(X509_REQ *x, EVP_PKEY *pkey, const EVP_MD *md); -int X509_REQ_sign_ctx(X509_REQ *x, EVP_MD_CTX *ctx); -int X509_CRL_sign(X509_CRL *x, EVP_PKEY *pkey, const EVP_MD *md); -int X509_CRL_sign_ctx(X509_CRL *x, EVP_MD_CTX *ctx); -int NETSCAPE_SPKI_sign(NETSCAPE_SPKI *x, EVP_PKEY *pkey, const EVP_MD *md); - -int X509_pubkey_digest(const X509 *data,const EVP_MD *type, - unsigned char *md, unsigned int *len); -int X509_digest(const X509 *data,const EVP_MD *type, - unsigned char *md, unsigned int *len); -int X509_CRL_digest(const X509_CRL *data,const EVP_MD *type, - unsigned char *md, unsigned int *len); -int X509_REQ_digest(const X509_REQ *data,const EVP_MD *type, - unsigned char *md, unsigned int *len); -int X509_NAME_digest(const X509_NAME *data,const EVP_MD *type, - unsigned char *md, unsigned int *len); -#endif - -#ifndef OPENSSL_NO_FP_API -X509 *d2i_X509_fp(FILE *fp, X509 **x509); -int i2d_X509_fp(FILE *fp,X509 *x509); -X509_CRL *d2i_X509_CRL_fp(FILE *fp,X509_CRL **crl); -int i2d_X509_CRL_fp(FILE *fp,X509_CRL *crl); -X509_REQ *d2i_X509_REQ_fp(FILE *fp,X509_REQ **req); -int i2d_X509_REQ_fp(FILE *fp,X509_REQ *req); -#ifndef OPENSSL_NO_RSA -RSA *d2i_RSAPrivateKey_fp(FILE *fp,RSA **rsa); -int i2d_RSAPrivateKey_fp(FILE *fp,RSA *rsa); -RSA *d2i_RSAPublicKey_fp(FILE *fp,RSA **rsa); -int i2d_RSAPublicKey_fp(FILE *fp,RSA *rsa); -RSA *d2i_RSA_PUBKEY_fp(FILE *fp,RSA **rsa); -int i2d_RSA_PUBKEY_fp(FILE *fp,RSA *rsa); -#endif -#ifndef OPENSSL_NO_DSA -DSA *d2i_DSA_PUBKEY_fp(FILE *fp, DSA **dsa); -int i2d_DSA_PUBKEY_fp(FILE *fp, DSA *dsa); -DSA *d2i_DSAPrivateKey_fp(FILE *fp, DSA **dsa); -int i2d_DSAPrivateKey_fp(FILE *fp, DSA *dsa); -#endif -#ifndef OPENSSL_NO_EC -EC_KEY *d2i_EC_PUBKEY_fp(FILE *fp, EC_KEY **eckey); -int i2d_EC_PUBKEY_fp(FILE *fp, EC_KEY *eckey); -EC_KEY *d2i_ECPrivateKey_fp(FILE *fp, EC_KEY **eckey); -int i2d_ECPrivateKey_fp(FILE *fp, EC_KEY *eckey); -#endif -X509_SIG *d2i_PKCS8_fp(FILE *fp,X509_SIG **p8); -int i2d_PKCS8_fp(FILE *fp,X509_SIG *p8); -PKCS8_PRIV_KEY_INFO *d2i_PKCS8_PRIV_KEY_INFO_fp(FILE *fp, - PKCS8_PRIV_KEY_INFO **p8inf); -int i2d_PKCS8_PRIV_KEY_INFO_fp(FILE *fp,PKCS8_PRIV_KEY_INFO *p8inf); -int i2d_PKCS8PrivateKeyInfo_fp(FILE *fp, EVP_PKEY *key); -int i2d_PrivateKey_fp(FILE *fp, EVP_PKEY *pkey); -EVP_PKEY *d2i_PrivateKey_fp(FILE *fp, EVP_PKEY **a); -int i2d_PUBKEY_fp(FILE *fp, EVP_PKEY *pkey); -EVP_PKEY *d2i_PUBKEY_fp(FILE *fp, EVP_PKEY **a); -#endif - -#ifndef OPENSSL_NO_BIO -X509 *d2i_X509_bio(BIO *bp,X509 **x509); -int i2d_X509_bio(BIO *bp,X509 *x509); -X509_CRL *d2i_X509_CRL_bio(BIO *bp,X509_CRL **crl); -int i2d_X509_CRL_bio(BIO *bp,X509_CRL *crl); -X509_REQ *d2i_X509_REQ_bio(BIO *bp,X509_REQ **req); -int i2d_X509_REQ_bio(BIO *bp,X509_REQ *req); -#ifndef OPENSSL_NO_RSA -RSA *d2i_RSAPrivateKey_bio(BIO *bp,RSA **rsa); -int i2d_RSAPrivateKey_bio(BIO *bp,RSA *rsa); -RSA *d2i_RSAPublicKey_bio(BIO *bp,RSA **rsa); -int i2d_RSAPublicKey_bio(BIO *bp,RSA *rsa); -RSA *d2i_RSA_PUBKEY_bio(BIO *bp,RSA **rsa); -int i2d_RSA_PUBKEY_bio(BIO *bp,RSA *rsa); -#endif -#ifndef OPENSSL_NO_DSA -DSA *d2i_DSA_PUBKEY_bio(BIO *bp, DSA **dsa); -int i2d_DSA_PUBKEY_bio(BIO *bp, DSA *dsa); -DSA *d2i_DSAPrivateKey_bio(BIO *bp, DSA **dsa); -int i2d_DSAPrivateKey_bio(BIO *bp, DSA *dsa); -#endif -#ifndef OPENSSL_NO_EC -EC_KEY *d2i_EC_PUBKEY_bio(BIO *bp, EC_KEY **eckey); -int i2d_EC_PUBKEY_bio(BIO *bp, EC_KEY *eckey); -EC_KEY *d2i_ECPrivateKey_bio(BIO *bp, EC_KEY **eckey); -int i2d_ECPrivateKey_bio(BIO *bp, EC_KEY *eckey); -#endif -X509_SIG *d2i_PKCS8_bio(BIO *bp,X509_SIG **p8); -int i2d_PKCS8_bio(BIO *bp,X509_SIG *p8); -PKCS8_PRIV_KEY_INFO *d2i_PKCS8_PRIV_KEY_INFO_bio(BIO *bp, - PKCS8_PRIV_KEY_INFO **p8inf); -int i2d_PKCS8_PRIV_KEY_INFO_bio(BIO *bp,PKCS8_PRIV_KEY_INFO *p8inf); -int i2d_PKCS8PrivateKeyInfo_bio(BIO *bp, EVP_PKEY *key); -int i2d_PrivateKey_bio(BIO *bp, EVP_PKEY *pkey); -EVP_PKEY *d2i_PrivateKey_bio(BIO *bp, EVP_PKEY **a); -int i2d_PUBKEY_bio(BIO *bp, EVP_PKEY *pkey); -EVP_PKEY *d2i_PUBKEY_bio(BIO *bp, EVP_PKEY **a); -#endif - -X509 *X509_dup(X509 *x509); -X509_ATTRIBUTE *X509_ATTRIBUTE_dup(X509_ATTRIBUTE *xa); -X509_EXTENSION *X509_EXTENSION_dup(X509_EXTENSION *ex); -X509_CRL *X509_CRL_dup(X509_CRL *crl); -X509_REQ *X509_REQ_dup(X509_REQ *req); -X509_ALGOR *X509_ALGOR_dup(X509_ALGOR *xn); -int X509_ALGOR_set0(X509_ALGOR *alg, ASN1_OBJECT *aobj, int ptype, void *pval); -void X509_ALGOR_get0(ASN1_OBJECT **paobj, int *pptype, void **ppval, - X509_ALGOR *algor); -void X509_ALGOR_set_md(X509_ALGOR *alg, const EVP_MD *md); - -X509_NAME *X509_NAME_dup(X509_NAME *xn); -X509_NAME_ENTRY *X509_NAME_ENTRY_dup(X509_NAME_ENTRY *ne); - -int X509_cmp_time(const ASN1_TIME *s, time_t *t); -int X509_cmp_current_time(const ASN1_TIME *s); -ASN1_TIME * X509_time_adj(ASN1_TIME *s, long adj, time_t *t); -ASN1_TIME * X509_time_adj_ex(ASN1_TIME *s, - int offset_day, long offset_sec, time_t *t); -ASN1_TIME * X509_gmtime_adj(ASN1_TIME *s, long adj); - -const char * X509_get_default_cert_area(void ); -const char * X509_get_default_cert_dir(void ); -const char * X509_get_default_cert_file(void ); -const char * X509_get_default_cert_dir_env(void ); -const char * X509_get_default_cert_file_env(void ); -const char * X509_get_default_private_dir(void ); - -X509_REQ * X509_to_X509_REQ(X509 *x, EVP_PKEY *pkey, const EVP_MD *md); -X509 * X509_REQ_to_X509(X509_REQ *r, int days,EVP_PKEY *pkey); - -DECLARE_ASN1_FUNCTIONS(X509_ALGOR) -DECLARE_ASN1_ENCODE_FUNCTIONS(X509_ALGORS, X509_ALGORS, X509_ALGORS) -DECLARE_ASN1_FUNCTIONS(X509_VAL) - -DECLARE_ASN1_FUNCTIONS(X509_PUBKEY) - -int X509_PUBKEY_set(X509_PUBKEY **x, EVP_PKEY *pkey); -EVP_PKEY * X509_PUBKEY_get(X509_PUBKEY *key); -int X509_get_pubkey_parameters(EVP_PKEY *pkey, - STACK_OF(X509) *chain); -int i2d_PUBKEY(EVP_PKEY *a,unsigned char **pp); -EVP_PKEY * d2i_PUBKEY(EVP_PKEY **a,const unsigned char **pp, - long length); -#ifndef OPENSSL_NO_RSA -int i2d_RSA_PUBKEY(RSA *a,unsigned char **pp); -RSA * d2i_RSA_PUBKEY(RSA **a,const unsigned char **pp, - long length); -#endif -#ifndef OPENSSL_NO_DSA -int i2d_DSA_PUBKEY(DSA *a,unsigned char **pp); -DSA * d2i_DSA_PUBKEY(DSA **a,const unsigned char **pp, - long length); -#endif -#ifndef OPENSSL_NO_EC -int i2d_EC_PUBKEY(EC_KEY *a, unsigned char **pp); -EC_KEY *d2i_EC_PUBKEY(EC_KEY **a, const unsigned char **pp, - long length); -#endif - -DECLARE_ASN1_FUNCTIONS(X509_SIG) -DECLARE_ASN1_FUNCTIONS(X509_REQ_INFO) -DECLARE_ASN1_FUNCTIONS(X509_REQ) - -DECLARE_ASN1_FUNCTIONS(X509_ATTRIBUTE) -X509_ATTRIBUTE *X509_ATTRIBUTE_create(int nid, int atrtype, void *value); - -DECLARE_ASN1_FUNCTIONS(X509_EXTENSION) -DECLARE_ASN1_ENCODE_FUNCTIONS(X509_EXTENSIONS, X509_EXTENSIONS, X509_EXTENSIONS) - -DECLARE_ASN1_FUNCTIONS(X509_NAME_ENTRY) - -DECLARE_ASN1_FUNCTIONS(X509_NAME) - -int X509_NAME_set(X509_NAME **xn, X509_NAME *name); - -DECLARE_ASN1_FUNCTIONS(X509_CINF) - -DECLARE_ASN1_FUNCTIONS(X509) -DECLARE_ASN1_FUNCTIONS(X509_CERT_AUX) - -DECLARE_ASN1_FUNCTIONS(X509_CERT_PAIR) - -int X509_get_ex_new_index(long argl, void *argp, CRYPTO_EX_new *new_func, - CRYPTO_EX_dup *dup_func, CRYPTO_EX_free *free_func); -int X509_set_ex_data(X509 *r, int idx, void *arg); -void *X509_get_ex_data(X509 *r, int idx); -int i2d_X509_AUX(X509 *a,unsigned char **pp); -X509 * d2i_X509_AUX(X509 **a,const unsigned char **pp,long length); - -int X509_alias_set1(X509 *x, unsigned char *name, int len); -int X509_keyid_set1(X509 *x, unsigned char *id, int len); -unsigned char * X509_alias_get0(X509 *x, int *len); -unsigned char * X509_keyid_get0(X509 *x, int *len); -int (*X509_TRUST_set_default(int (*trust)(int , X509 *, int)))(int, X509 *, int); -int X509_TRUST_set(int *t, int trust); -int X509_add1_trust_object(X509 *x, ASN1_OBJECT *obj); -int X509_add1_reject_object(X509 *x, ASN1_OBJECT *obj); -void X509_trust_clear(X509 *x); -void X509_reject_clear(X509 *x); - -DECLARE_ASN1_FUNCTIONS(X509_REVOKED) -DECLARE_ASN1_FUNCTIONS(X509_CRL_INFO) -DECLARE_ASN1_FUNCTIONS(X509_CRL) - -int X509_CRL_add0_revoked(X509_CRL *crl, X509_REVOKED *rev); -int X509_CRL_get0_by_serial(X509_CRL *crl, - X509_REVOKED **ret, ASN1_INTEGER *serial); -int X509_CRL_get0_by_cert(X509_CRL *crl, X509_REVOKED **ret, X509 *x); - -X509_PKEY * X509_PKEY_new(void ); -void X509_PKEY_free(X509_PKEY *a); -int i2d_X509_PKEY(X509_PKEY *a,unsigned char **pp); -X509_PKEY * d2i_X509_PKEY(X509_PKEY **a,const unsigned char **pp,long length); - -DECLARE_ASN1_FUNCTIONS(NETSCAPE_SPKI) -DECLARE_ASN1_FUNCTIONS(NETSCAPE_SPKAC) -DECLARE_ASN1_FUNCTIONS(NETSCAPE_CERT_SEQUENCE) - -#ifndef OPENSSL_NO_EVP -X509_INFO * X509_INFO_new(void); -void X509_INFO_free(X509_INFO *a); -char * X509_NAME_oneline(X509_NAME *a,char *buf,int size); - -int ASN1_verify(i2d_of_void *i2d, X509_ALGOR *algor1, - ASN1_BIT_STRING *signature,char *data,EVP_PKEY *pkey); - -int ASN1_digest(i2d_of_void *i2d,const EVP_MD *type,char *data, - unsigned char *md,unsigned int *len); - -int ASN1_sign(i2d_of_void *i2d, X509_ALGOR *algor1, - X509_ALGOR *algor2, ASN1_BIT_STRING *signature, - char *data,EVP_PKEY *pkey, const EVP_MD *type); - -int ASN1_item_digest(const ASN1_ITEM *it,const EVP_MD *type,void *data, - unsigned char *md,unsigned int *len); - -int ASN1_item_verify(const ASN1_ITEM *it, X509_ALGOR *algor1, - ASN1_BIT_STRING *signature,void *data,EVP_PKEY *pkey); - -int ASN1_item_sign(const ASN1_ITEM *it, X509_ALGOR *algor1, X509_ALGOR *algor2, - ASN1_BIT_STRING *signature, - void *data, EVP_PKEY *pkey, const EVP_MD *type); -int ASN1_item_sign_ctx(const ASN1_ITEM *it, - X509_ALGOR *algor1, X509_ALGOR *algor2, - ASN1_BIT_STRING *signature, void *asn, EVP_MD_CTX *ctx); -#endif - -int X509_set_version(X509 *x,long version); -int X509_set_serialNumber(X509 *x, ASN1_INTEGER *serial); -ASN1_INTEGER * X509_get_serialNumber(X509 *x); -int X509_set_issuer_name(X509 *x, X509_NAME *name); -X509_NAME * X509_get_issuer_name(X509 *a); -int X509_set_subject_name(X509 *x, X509_NAME *name); -X509_NAME * X509_get_subject_name(X509 *a); -int X509_set_notBefore(X509 *x, const ASN1_TIME *tm); -int X509_set_notAfter(X509 *x, const ASN1_TIME *tm); -int X509_set_pubkey(X509 *x, EVP_PKEY *pkey); -EVP_PKEY * X509_get_pubkey(X509 *x); -ASN1_BIT_STRING * X509_get0_pubkey_bitstr(const X509 *x); -int X509_certificate_type(X509 *x,EVP_PKEY *pubkey /* optional */); - -int X509_REQ_set_version(X509_REQ *x,long version); -int X509_REQ_set_subject_name(X509_REQ *req,X509_NAME *name); -int X509_REQ_set_pubkey(X509_REQ *x, EVP_PKEY *pkey); -EVP_PKEY * X509_REQ_get_pubkey(X509_REQ *req); -int X509_REQ_extension_nid(int nid); -int * X509_REQ_get_extension_nids(void); -void X509_REQ_set_extension_nids(int *nids); -STACK_OF(X509_EXTENSION) *X509_REQ_get_extensions(X509_REQ *req); -int X509_REQ_add_extensions_nid(X509_REQ *req, STACK_OF(X509_EXTENSION) *exts, - int nid); -int X509_REQ_add_extensions(X509_REQ *req, STACK_OF(X509_EXTENSION) *exts); -int X509_REQ_get_attr_count(const X509_REQ *req); -int X509_REQ_get_attr_by_NID(const X509_REQ *req, int nid, - int lastpos); -int X509_REQ_get_attr_by_OBJ(const X509_REQ *req, ASN1_OBJECT *obj, - int lastpos); -X509_ATTRIBUTE *X509_REQ_get_attr(const X509_REQ *req, int loc); -X509_ATTRIBUTE *X509_REQ_delete_attr(X509_REQ *req, int loc); -int X509_REQ_add1_attr(X509_REQ *req, X509_ATTRIBUTE *attr); -int X509_REQ_add1_attr_by_OBJ(X509_REQ *req, - const ASN1_OBJECT *obj, int type, - const unsigned char *bytes, int len); -int X509_REQ_add1_attr_by_NID(X509_REQ *req, - int nid, int type, - const unsigned char *bytes, int len); -int X509_REQ_add1_attr_by_txt(X509_REQ *req, - const char *attrname, int type, - const unsigned char *bytes, int len); - -int X509_CRL_set_version(X509_CRL *x, long version); -int X509_CRL_set_issuer_name(X509_CRL *x, X509_NAME *name); -int X509_CRL_set_lastUpdate(X509_CRL *x, const ASN1_TIME *tm); -int X509_CRL_set_nextUpdate(X509_CRL *x, const ASN1_TIME *tm); -int X509_CRL_sort(X509_CRL *crl); - -int X509_REVOKED_set_serialNumber(X509_REVOKED *x, ASN1_INTEGER *serial); -int X509_REVOKED_set_revocationDate(X509_REVOKED *r, ASN1_TIME *tm); - -int X509_REQ_check_private_key(X509_REQ *x509,EVP_PKEY *pkey); - -int X509_check_private_key(X509 *x509,EVP_PKEY *pkey); - -int X509_issuer_and_serial_cmp(const X509 *a, const X509 *b); -unsigned long X509_issuer_and_serial_hash(X509 *a); - -int X509_issuer_name_cmp(const X509 *a, const X509 *b); -unsigned long X509_issuer_name_hash(X509 *a); - -int X509_subject_name_cmp(const X509 *a, const X509 *b); -unsigned long X509_subject_name_hash(X509 *x); - -#ifndef OPENSSL_NO_MD5 -unsigned long X509_issuer_name_hash_old(X509 *a); -unsigned long X509_subject_name_hash_old(X509 *x); -#endif - -int X509_cmp(const X509 *a, const X509 *b); -int X509_NAME_cmp(const X509_NAME *a, const X509_NAME *b); -unsigned long X509_NAME_hash(X509_NAME *x); -unsigned long X509_NAME_hash_old(X509_NAME *x); - -int X509_CRL_cmp(const X509_CRL *a, const X509_CRL *b); -int X509_CRL_match(const X509_CRL *a, const X509_CRL *b); -#ifndef OPENSSL_NO_FP_API -int X509_print_ex_fp(FILE *bp,X509 *x, unsigned long nmflag, unsigned long cflag); -int X509_print_fp(FILE *bp,X509 *x); -int X509_CRL_print_fp(FILE *bp,X509_CRL *x); -int X509_REQ_print_fp(FILE *bp,X509_REQ *req); -int X509_NAME_print_ex_fp(FILE *fp, X509_NAME *nm, int indent, unsigned long flags); -#endif - -#ifndef OPENSSL_NO_BIO -int X509_NAME_print(BIO *bp, X509_NAME *name, int obase); -int X509_NAME_print_ex(BIO *out, X509_NAME *nm, int indent, unsigned long flags); -int X509_print_ex(BIO *bp,X509 *x, unsigned long nmflag, unsigned long cflag); -int X509_print(BIO *bp,X509 *x); -int X509_ocspid_print(BIO *bp,X509 *x); -int X509_CERT_AUX_print(BIO *bp,X509_CERT_AUX *x, int indent); -int X509_CRL_print(BIO *bp,X509_CRL *x); -int X509_REQ_print_ex(BIO *bp, X509_REQ *x, unsigned long nmflag, unsigned long cflag); -int X509_REQ_print(BIO *bp,X509_REQ *req); -#endif - -int X509_NAME_entry_count(X509_NAME *name); -int X509_NAME_get_text_by_NID(X509_NAME *name, int nid, - char *buf,int len); -int X509_NAME_get_text_by_OBJ(X509_NAME *name, ASN1_OBJECT *obj, - char *buf,int len); - -/* NOTE: you should be passsing -1, not 0 as lastpos. The functions that use - * lastpos, search after that position on. */ -int X509_NAME_get_index_by_NID(X509_NAME *name,int nid,int lastpos); -int X509_NAME_get_index_by_OBJ(X509_NAME *name,ASN1_OBJECT *obj, - int lastpos); -X509_NAME_ENTRY *X509_NAME_get_entry(X509_NAME *name, int loc); -X509_NAME_ENTRY *X509_NAME_delete_entry(X509_NAME *name, int loc); -int X509_NAME_add_entry(X509_NAME *name,X509_NAME_ENTRY *ne, - int loc, int set); -int X509_NAME_add_entry_by_OBJ(X509_NAME *name, ASN1_OBJECT *obj, int type, - unsigned char *bytes, int len, int loc, int set); -int X509_NAME_add_entry_by_NID(X509_NAME *name, int nid, int type, - unsigned char *bytes, int len, int loc, int set); -X509_NAME_ENTRY *X509_NAME_ENTRY_create_by_txt(X509_NAME_ENTRY **ne, - const char *field, int type, const unsigned char *bytes, int len); -X509_NAME_ENTRY *X509_NAME_ENTRY_create_by_NID(X509_NAME_ENTRY **ne, int nid, - int type,unsigned char *bytes, int len); -int X509_NAME_add_entry_by_txt(X509_NAME *name, const char *field, int type, - const unsigned char *bytes, int len, int loc, int set); -X509_NAME_ENTRY *X509_NAME_ENTRY_create_by_OBJ(X509_NAME_ENTRY **ne, - ASN1_OBJECT *obj, int type,const unsigned char *bytes, - int len); -int X509_NAME_ENTRY_set_object(X509_NAME_ENTRY *ne, - ASN1_OBJECT *obj); -int X509_NAME_ENTRY_set_data(X509_NAME_ENTRY *ne, int type, - const unsigned char *bytes, int len); -ASN1_OBJECT * X509_NAME_ENTRY_get_object(X509_NAME_ENTRY *ne); -ASN1_STRING * X509_NAME_ENTRY_get_data(X509_NAME_ENTRY *ne); - -int X509v3_get_ext_count(const STACK_OF(X509_EXTENSION) *x); -int X509v3_get_ext_by_NID(const STACK_OF(X509_EXTENSION) *x, - int nid, int lastpos); -int X509v3_get_ext_by_OBJ(const STACK_OF(X509_EXTENSION) *x, - ASN1_OBJECT *obj,int lastpos); -int X509v3_get_ext_by_critical(const STACK_OF(X509_EXTENSION) *x, - int crit, int lastpos); -X509_EXTENSION *X509v3_get_ext(const STACK_OF(X509_EXTENSION) *x, int loc); -X509_EXTENSION *X509v3_delete_ext(STACK_OF(X509_EXTENSION) *x, int loc); -STACK_OF(X509_EXTENSION) *X509v3_add_ext(STACK_OF(X509_EXTENSION) **x, - X509_EXTENSION *ex, int loc); - -int X509_get_ext_count(X509 *x); -int X509_get_ext_by_NID(X509 *x, int nid, int lastpos); -int X509_get_ext_by_OBJ(X509 *x,ASN1_OBJECT *obj,int lastpos); -int X509_get_ext_by_critical(X509 *x, int crit, int lastpos); -X509_EXTENSION *X509_get_ext(X509 *x, int loc); -X509_EXTENSION *X509_delete_ext(X509 *x, int loc); -int X509_add_ext(X509 *x, X509_EXTENSION *ex, int loc); -void * X509_get_ext_d2i(X509 *x, int nid, int *crit, int *idx); -int X509_add1_ext_i2d(X509 *x, int nid, void *value, int crit, - unsigned long flags); - -int X509_CRL_get_ext_count(X509_CRL *x); -int X509_CRL_get_ext_by_NID(X509_CRL *x, int nid, int lastpos); -int X509_CRL_get_ext_by_OBJ(X509_CRL *x,ASN1_OBJECT *obj,int lastpos); -int X509_CRL_get_ext_by_critical(X509_CRL *x, int crit, int lastpos); -X509_EXTENSION *X509_CRL_get_ext(X509_CRL *x, int loc); -X509_EXTENSION *X509_CRL_delete_ext(X509_CRL *x, int loc); -int X509_CRL_add_ext(X509_CRL *x, X509_EXTENSION *ex, int loc); -void * X509_CRL_get_ext_d2i(X509_CRL *x, int nid, int *crit, int *idx); -int X509_CRL_add1_ext_i2d(X509_CRL *x, int nid, void *value, int crit, - unsigned long flags); - -int X509_REVOKED_get_ext_count(X509_REVOKED *x); -int X509_REVOKED_get_ext_by_NID(X509_REVOKED *x, int nid, int lastpos); -int X509_REVOKED_get_ext_by_OBJ(X509_REVOKED *x,ASN1_OBJECT *obj,int lastpos); -int X509_REVOKED_get_ext_by_critical(X509_REVOKED *x, int crit, int lastpos); -X509_EXTENSION *X509_REVOKED_get_ext(X509_REVOKED *x, int loc); -X509_EXTENSION *X509_REVOKED_delete_ext(X509_REVOKED *x, int loc); -int X509_REVOKED_add_ext(X509_REVOKED *x, X509_EXTENSION *ex, int loc); -void * X509_REVOKED_get_ext_d2i(X509_REVOKED *x, int nid, int *crit, int *idx); -int X509_REVOKED_add1_ext_i2d(X509_REVOKED *x, int nid, void *value, int crit, - unsigned long flags); - -X509_EXTENSION *X509_EXTENSION_create_by_NID(X509_EXTENSION **ex, - int nid, int crit, ASN1_OCTET_STRING *data); -X509_EXTENSION *X509_EXTENSION_create_by_OBJ(X509_EXTENSION **ex, - ASN1_OBJECT *obj,int crit,ASN1_OCTET_STRING *data); -int X509_EXTENSION_set_object(X509_EXTENSION *ex,ASN1_OBJECT *obj); -int X509_EXTENSION_set_critical(X509_EXTENSION *ex, int crit); -int X509_EXTENSION_set_data(X509_EXTENSION *ex, - ASN1_OCTET_STRING *data); -ASN1_OBJECT * X509_EXTENSION_get_object(X509_EXTENSION *ex); -ASN1_OCTET_STRING *X509_EXTENSION_get_data(X509_EXTENSION *ne); -int X509_EXTENSION_get_critical(X509_EXTENSION *ex); - -int X509at_get_attr_count(const STACK_OF(X509_ATTRIBUTE) *x); -int X509at_get_attr_by_NID(const STACK_OF(X509_ATTRIBUTE) *x, int nid, - int lastpos); -int X509at_get_attr_by_OBJ(const STACK_OF(X509_ATTRIBUTE) *sk, ASN1_OBJECT *obj, - int lastpos); -X509_ATTRIBUTE *X509at_get_attr(const STACK_OF(X509_ATTRIBUTE) *x, int loc); -X509_ATTRIBUTE *X509at_delete_attr(STACK_OF(X509_ATTRIBUTE) *x, int loc); -STACK_OF(X509_ATTRIBUTE) *X509at_add1_attr(STACK_OF(X509_ATTRIBUTE) **x, - X509_ATTRIBUTE *attr); -STACK_OF(X509_ATTRIBUTE) *X509at_add1_attr_by_OBJ(STACK_OF(X509_ATTRIBUTE) **x, - const ASN1_OBJECT *obj, int type, - const unsigned char *bytes, int len); -STACK_OF(X509_ATTRIBUTE) *X509at_add1_attr_by_NID(STACK_OF(X509_ATTRIBUTE) **x, - int nid, int type, - const unsigned char *bytes, int len); -STACK_OF(X509_ATTRIBUTE) *X509at_add1_attr_by_txt(STACK_OF(X509_ATTRIBUTE) **x, - const char *attrname, int type, - const unsigned char *bytes, int len); -void *X509at_get0_data_by_OBJ(STACK_OF(X509_ATTRIBUTE) *x, - ASN1_OBJECT *obj, int lastpos, int type); -X509_ATTRIBUTE *X509_ATTRIBUTE_create_by_NID(X509_ATTRIBUTE **attr, int nid, - int atrtype, const void *data, int len); -X509_ATTRIBUTE *X509_ATTRIBUTE_create_by_OBJ(X509_ATTRIBUTE **attr, - const ASN1_OBJECT *obj, int atrtype, const void *data, int len); -X509_ATTRIBUTE *X509_ATTRIBUTE_create_by_txt(X509_ATTRIBUTE **attr, - const char *atrname, int type, const unsigned char *bytes, int len); -int X509_ATTRIBUTE_set1_object(X509_ATTRIBUTE *attr, const ASN1_OBJECT *obj); -int X509_ATTRIBUTE_set1_data(X509_ATTRIBUTE *attr, int attrtype, const void *data, int len); -void *X509_ATTRIBUTE_get0_data(X509_ATTRIBUTE *attr, int idx, - int atrtype, void *data); -int X509_ATTRIBUTE_count(X509_ATTRIBUTE *attr); -ASN1_OBJECT *X509_ATTRIBUTE_get0_object(X509_ATTRIBUTE *attr); -ASN1_TYPE *X509_ATTRIBUTE_get0_type(X509_ATTRIBUTE *attr, int idx); - -int EVP_PKEY_get_attr_count(const EVP_PKEY *key); -int EVP_PKEY_get_attr_by_NID(const EVP_PKEY *key, int nid, - int lastpos); -int EVP_PKEY_get_attr_by_OBJ(const EVP_PKEY *key, ASN1_OBJECT *obj, - int lastpos); -X509_ATTRIBUTE *EVP_PKEY_get_attr(const EVP_PKEY *key, int loc); -X509_ATTRIBUTE *EVP_PKEY_delete_attr(EVP_PKEY *key, int loc); -int EVP_PKEY_add1_attr(EVP_PKEY *key, X509_ATTRIBUTE *attr); -int EVP_PKEY_add1_attr_by_OBJ(EVP_PKEY *key, - const ASN1_OBJECT *obj, int type, - const unsigned char *bytes, int len); -int EVP_PKEY_add1_attr_by_NID(EVP_PKEY *key, - int nid, int type, - const unsigned char *bytes, int len); -int EVP_PKEY_add1_attr_by_txt(EVP_PKEY *key, - const char *attrname, int type, - const unsigned char *bytes, int len); - -int X509_verify_cert(X509_STORE_CTX *ctx); - -/* lookup a cert from a X509 STACK */ -X509 *X509_find_by_issuer_and_serial(STACK_OF(X509) *sk,X509_NAME *name, - ASN1_INTEGER *serial); -X509 *X509_find_by_subject(STACK_OF(X509) *sk,X509_NAME *name); - -DECLARE_ASN1_FUNCTIONS(PBEPARAM) -DECLARE_ASN1_FUNCTIONS(PBE2PARAM) -DECLARE_ASN1_FUNCTIONS(PBKDF2PARAM) - -int PKCS5_pbe_set0_algor(X509_ALGOR *algor, int alg, int iter, - const unsigned char *salt, int saltlen); - -X509_ALGOR *PKCS5_pbe_set(int alg, int iter, - const unsigned char *salt, int saltlen); -X509_ALGOR *PKCS5_pbe2_set(const EVP_CIPHER *cipher, int iter, - unsigned char *salt, int saltlen); -X509_ALGOR *PKCS5_pbe2_set_iv(const EVP_CIPHER *cipher, int iter, - unsigned char *salt, int saltlen, - unsigned char *aiv, int prf_nid); - -X509_ALGOR *PKCS5_pbkdf2_set(int iter, unsigned char *salt, int saltlen, - int prf_nid, int keylen); - -/* PKCS#8 utilities */ - -DECLARE_ASN1_FUNCTIONS(PKCS8_PRIV_KEY_INFO) - -EVP_PKEY *EVP_PKCS82PKEY(PKCS8_PRIV_KEY_INFO *p8); -PKCS8_PRIV_KEY_INFO *EVP_PKEY2PKCS8(EVP_PKEY *pkey); -PKCS8_PRIV_KEY_INFO *EVP_PKEY2PKCS8_broken(EVP_PKEY *pkey, int broken); -PKCS8_PRIV_KEY_INFO *PKCS8_set_broken(PKCS8_PRIV_KEY_INFO *p8, int broken); - -int PKCS8_pkey_set0(PKCS8_PRIV_KEY_INFO *priv, ASN1_OBJECT *aobj, - int version, int ptype, void *pval, - unsigned char *penc, int penclen); -int PKCS8_pkey_get0(ASN1_OBJECT **ppkalg, - const unsigned char **pk, int *ppklen, - X509_ALGOR **pa, - PKCS8_PRIV_KEY_INFO *p8); - -int X509_PUBKEY_set0_param(X509_PUBKEY *pub, ASN1_OBJECT *aobj, - int ptype, void *pval, - unsigned char *penc, int penclen); -int X509_PUBKEY_get0_param(ASN1_OBJECT **ppkalg, - const unsigned char **pk, int *ppklen, - X509_ALGOR **pa, - X509_PUBKEY *pub); - -int X509_check_trust(X509 *x, int id, int flags); -int X509_TRUST_get_count(void); -X509_TRUST * X509_TRUST_get0(int idx); -int X509_TRUST_get_by_id(int id); -int X509_TRUST_add(int id, int flags, int (*ck)(X509_TRUST *, X509 *, int), - char *name, int arg1, void *arg2); -void X509_TRUST_cleanup(void); -int X509_TRUST_get_flags(X509_TRUST *xp); -char *X509_TRUST_get0_name(X509_TRUST *xp); -int X509_TRUST_get_trust(X509_TRUST *xp); - -/* BEGIN ERROR CODES */ -/* The following lines are auto generated by the script mkerr.pl. Any changes - * made after this point may be overwritten when the script is next run. - */ -void ERR_load_X509_strings(void); - -/* Error codes for the X509 functions. */ - -/* Function codes. */ -#define X509_F_ADD_CERT_DIR 100 -#define X509_F_BY_FILE_CTRL 101 -#define X509_F_CHECK_POLICY 145 -#define X509_F_DIR_CTRL 102 -#define X509_F_GET_CERT_BY_SUBJECT 103 -#define X509_F_NETSCAPE_SPKI_B64_DECODE 129 -#define X509_F_NETSCAPE_SPKI_B64_ENCODE 130 -#define X509_F_X509AT_ADD1_ATTR 135 -#define X509_F_X509V3_ADD_EXT 104 -#define X509_F_X509_ATTRIBUTE_CREATE_BY_NID 136 -#define X509_F_X509_ATTRIBUTE_CREATE_BY_OBJ 137 -#define X509_F_X509_ATTRIBUTE_CREATE_BY_TXT 140 -#define X509_F_X509_ATTRIBUTE_GET0_DATA 139 -#define X509_F_X509_ATTRIBUTE_SET1_DATA 138 -#define X509_F_X509_CHECK_PRIVATE_KEY 128 -#define X509_F_X509_CRL_PRINT_FP 147 -#define X509_F_X509_EXTENSION_CREATE_BY_NID 108 -#define X509_F_X509_EXTENSION_CREATE_BY_OBJ 109 -#define X509_F_X509_GET_PUBKEY_PARAMETERS 110 -#define X509_F_X509_LOAD_CERT_CRL_FILE 132 -#define X509_F_X509_LOAD_CERT_FILE 111 -#define X509_F_X509_LOAD_CRL_FILE 112 -#define X509_F_X509_NAME_ADD_ENTRY 113 -#define X509_F_X509_NAME_ENTRY_CREATE_BY_NID 114 -#define X509_F_X509_NAME_ENTRY_CREATE_BY_TXT 131 -#define X509_F_X509_NAME_ENTRY_SET_OBJECT 115 -#define X509_F_X509_NAME_ONELINE 116 -#define X509_F_X509_NAME_PRINT 117 -#define X509_F_X509_PRINT_EX_FP 118 -#define X509_F_X509_PUBKEY_GET 119 -#define X509_F_X509_PUBKEY_SET 120 -#define X509_F_X509_REQ_CHECK_PRIVATE_KEY 144 -#define X509_F_X509_REQ_PRINT_EX 121 -#define X509_F_X509_REQ_PRINT_FP 122 -#define X509_F_X509_REQ_TO_X509 123 -#define X509_F_X509_STORE_ADD_CERT 124 -#define X509_F_X509_STORE_ADD_CRL 125 -#define X509_F_X509_STORE_CTX_GET1_ISSUER 146 -#define X509_F_X509_STORE_CTX_INIT 143 -#define X509_F_X509_STORE_CTX_NEW 142 -#define X509_F_X509_STORE_CTX_PURPOSE_INHERIT 134 -#define X509_F_X509_TO_X509_REQ 126 -#define X509_F_X509_TRUST_ADD 133 -#define X509_F_X509_TRUST_SET 141 -#define X509_F_X509_VERIFY_CERT 127 - -/* Reason codes. */ -#define X509_R_BAD_X509_FILETYPE 100 -#define X509_R_BASE64_DECODE_ERROR 118 -#define X509_R_CANT_CHECK_DH_KEY 114 -#define X509_R_CERT_ALREADY_IN_HASH_TABLE 101 -#define X509_R_ERR_ASN1_LIB 102 -#define X509_R_INVALID_DIRECTORY 113 -#define X509_R_INVALID_FIELD_NAME 119 -#define X509_R_INVALID_TRUST 123 -#define X509_R_KEY_TYPE_MISMATCH 115 -#define X509_R_KEY_VALUES_MISMATCH 116 -#define X509_R_LOADING_CERT_DIR 103 -#define X509_R_LOADING_DEFAULTS 104 -#define X509_R_METHOD_NOT_SUPPORTED 124 -#define X509_R_NO_CERT_SET_FOR_US_TO_VERIFY 105 -#define X509_R_PUBLIC_KEY_DECODE_ERROR 125 -#define X509_R_PUBLIC_KEY_ENCODE_ERROR 126 -#define X509_R_SHOULD_RETRY 106 -#define X509_R_UNABLE_TO_FIND_PARAMETERS_IN_CHAIN 107 -#define X509_R_UNABLE_TO_GET_CERTS_PUBLIC_KEY 108 -#define X509_R_UNKNOWN_KEY_TYPE 117 -#define X509_R_UNKNOWN_NID 109 -#define X509_R_UNKNOWN_PURPOSE_ID 121 -#define X509_R_UNKNOWN_TRUST_ID 120 -#define X509_R_UNSUPPORTED_ALGORITHM 111 -#define X509_R_WRONG_LOOKUP_TYPE 112 -#define X509_R_WRONG_TYPE 122 - -#ifdef __cplusplus -} -#endif -#endif diff --git a/Pods/OpenSSL-Universal/include-osx/openssl/x509_vfy.h b/Pods/OpenSSL-Universal/include-osx/openssl/x509_vfy.h deleted file mode 100644 index fe09b30a..00000000 --- a/Pods/OpenSSL-Universal/include-osx/openssl/x509_vfy.h +++ /dev/null @@ -1,567 +0,0 @@ -/* crypto/x509/x509_vfy.h */ -/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) - * All rights reserved. - * - * This package is an SSL implementation written - * by Eric Young (eay@cryptsoft.com). - * The implementation was written so as to conform with Netscapes SSL. - * - * This library is free for commercial and non-commercial use as long as - * the following conditions are aheared to. The following conditions - * apply to all code found in this distribution, be it the RC4, RSA, - * lhash, DES, etc., code; not just the SSL code. The SSL documentation - * included with this distribution is covered by the same copyright terms - * except that the holder is Tim Hudson (tjh@cryptsoft.com). - * - * Copyright remains Eric Young's, and as such any Copyright notices in - * the code are not to be removed. - * If this package is used in a product, Eric Young should be given attribution - * as the author of the parts of the library used. - * This can be in the form of a textual message at program startup or - * in documentation (online or textual) provided with the package. - * - * Redistribution and use in source and binary forms, with or without - * modification, are permitted provided that the following conditions - * are met: - * 1. Redistributions of source code must retain the copyright - * notice, this list of conditions and the following disclaimer. - * 2. Redistributions in binary form must reproduce the above copyright - * notice, this list of conditions and the following disclaimer in the - * documentation and/or other materials provided with the distribution. - * 3. All advertising materials mentioning features or use of this software - * must display the following acknowledgement: - * "This product includes cryptographic software written by - * Eric Young (eay@cryptsoft.com)" - * The word 'cryptographic' can be left out if the rouines from the library - * being used are not cryptographic related :-). - * 4. If you include any Windows specific code (or a derivative thereof) from - * the apps directory (application code) you must include an acknowledgement: - * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" - * - * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND - * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE - * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE - * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE - * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL - * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS - * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) - * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT - * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY - * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF - * SUCH DAMAGE. - * - * The licence and distribution terms for any publically available version or - * derivative of this code cannot be changed. i.e. this code cannot simply be - * copied and put under another distribution licence - * [including the GNU Public Licence.] - */ - -#ifndef HEADER_X509_H -#include -/* openssl/x509.h ends up #include-ing this file at about the only - * appropriate moment. */ -#endif - -#ifndef HEADER_X509_VFY_H -#define HEADER_X509_VFY_H - -#include -#ifndef OPENSSL_NO_LHASH -#include -#endif -#include -#include -#include - -#ifdef __cplusplus -extern "C" { -#endif - -#if 0 -/* Outer object */ -typedef struct x509_hash_dir_st - { - int num_dirs; - char **dirs; - int *dirs_type; - int num_dirs_alloced; - } X509_HASH_DIR_CTX; -#endif - -typedef struct x509_file_st - { - int num_paths; /* number of paths to files or directories */ - int num_alloced; - char **paths; /* the list of paths or directories */ - int *path_type; - } X509_CERT_FILE_CTX; - -/*******************************/ -/* -SSL_CTX -> X509_STORE - -> X509_LOOKUP - ->X509_LOOKUP_METHOD - -> X509_LOOKUP - ->X509_LOOKUP_METHOD - -SSL -> X509_STORE_CTX - ->X509_STORE - -The X509_STORE holds the tables etc for verification stuff. -A X509_STORE_CTX is used while validating a single certificate. -The X509_STORE has X509_LOOKUPs for looking up certs. -The X509_STORE then calls a function to actually verify the -certificate chain. -*/ - -#define X509_LU_RETRY -1 -#define X509_LU_FAIL 0 -#define X509_LU_X509 1 -#define X509_LU_CRL 2 -#define X509_LU_PKEY 3 - -typedef struct x509_object_st - { - /* one of the above types */ - int type; - union { - char *ptr; - X509 *x509; - X509_CRL *crl; - EVP_PKEY *pkey; - } data; - } X509_OBJECT; - -typedef struct x509_lookup_st X509_LOOKUP; - -DECLARE_STACK_OF(X509_LOOKUP) -DECLARE_STACK_OF(X509_OBJECT) - -/* This is a static that defines the function interface */ -typedef struct x509_lookup_method_st - { - const char *name; - int (*new_item)(X509_LOOKUP *ctx); - void (*free)(X509_LOOKUP *ctx); - int (*init)(X509_LOOKUP *ctx); - int (*shutdown)(X509_LOOKUP *ctx); - int (*ctrl)(X509_LOOKUP *ctx,int cmd,const char *argc,long argl, - char **ret); - int (*get_by_subject)(X509_LOOKUP *ctx,int type,X509_NAME *name, - X509_OBJECT *ret); - int (*get_by_issuer_serial)(X509_LOOKUP *ctx,int type,X509_NAME *name, - ASN1_INTEGER *serial,X509_OBJECT *ret); - int (*get_by_fingerprint)(X509_LOOKUP *ctx,int type, - unsigned char *bytes,int len, - X509_OBJECT *ret); - int (*get_by_alias)(X509_LOOKUP *ctx,int type,char *str,int len, - X509_OBJECT *ret); - } X509_LOOKUP_METHOD; - -/* This structure hold all parameters associated with a verify operation - * by including an X509_VERIFY_PARAM structure in related structures the - * parameters used can be customized - */ - -typedef struct X509_VERIFY_PARAM_st - { - char *name; - time_t check_time; /* Time to use */ - unsigned long inh_flags; /* Inheritance flags */ - unsigned long flags; /* Various verify flags */ - int purpose; /* purpose to check untrusted certificates */ - int trust; /* trust setting to check */ - int depth; /* Verify depth */ - STACK_OF(ASN1_OBJECT) *policies; /* Permissible policies */ - } X509_VERIFY_PARAM; - -DECLARE_STACK_OF(X509_VERIFY_PARAM) - -/* This is used to hold everything. It is used for all certificate - * validation. Once we have a certificate chain, the 'verify' - * function is then called to actually check the cert chain. */ -struct x509_store_st - { - /* The following is a cache of trusted certs */ - int cache; /* if true, stash any hits */ - STACK_OF(X509_OBJECT) *objs; /* Cache of all objects */ - - /* These are external lookup methods */ - STACK_OF(X509_LOOKUP) *get_cert_methods; - - X509_VERIFY_PARAM *param; - - /* Callbacks for various operations */ - int (*verify)(X509_STORE_CTX *ctx); /* called to verify a certificate */ - int (*verify_cb)(int ok,X509_STORE_CTX *ctx); /* error callback */ - int (*get_issuer)(X509 **issuer, X509_STORE_CTX *ctx, X509 *x); /* get issuers cert from ctx */ - int (*check_issued)(X509_STORE_CTX *ctx, X509 *x, X509 *issuer); /* check issued */ - int (*check_revocation)(X509_STORE_CTX *ctx); /* Check revocation status of chain */ - int (*get_crl)(X509_STORE_CTX *ctx, X509_CRL **crl, X509 *x); /* retrieve CRL */ - int (*check_crl)(X509_STORE_CTX *ctx, X509_CRL *crl); /* Check CRL validity */ - int (*cert_crl)(X509_STORE_CTX *ctx, X509_CRL *crl, X509 *x); /* Check certificate against CRL */ - STACK_OF(X509) * (*lookup_certs)(X509_STORE_CTX *ctx, X509_NAME *nm); - STACK_OF(X509_CRL) * (*lookup_crls)(X509_STORE_CTX *ctx, X509_NAME *nm); - int (*cleanup)(X509_STORE_CTX *ctx); - - CRYPTO_EX_DATA ex_data; - int references; - } /* X509_STORE */; - -int X509_STORE_set_depth(X509_STORE *store, int depth); - -#define X509_STORE_set_verify_cb_func(ctx,func) ((ctx)->verify_cb=(func)) -#define X509_STORE_set_verify_func(ctx,func) ((ctx)->verify=(func)) - -/* This is the functions plus an instance of the local variables. */ -struct x509_lookup_st - { - int init; /* have we been started */ - int skip; /* don't use us. */ - X509_LOOKUP_METHOD *method; /* the functions */ - char *method_data; /* method data */ - - X509_STORE *store_ctx; /* who owns us */ - } /* X509_LOOKUP */; - -/* This is a used when verifying cert chains. Since the - * gathering of the cert chain can take some time (and have to be - * 'retried', this needs to be kept and passed around. */ -struct x509_store_ctx_st /* X509_STORE_CTX */ - { - X509_STORE *ctx; - int current_method; /* used when looking up certs */ - - /* The following are set by the caller */ - X509 *cert; /* The cert to check */ - STACK_OF(X509) *untrusted; /* chain of X509s - untrusted - passed in */ - STACK_OF(X509_CRL) *crls; /* set of CRLs passed in */ - - X509_VERIFY_PARAM *param; - void *other_ctx; /* Other info for use with get_issuer() */ - - /* Callbacks for various operations */ - int (*verify)(X509_STORE_CTX *ctx); /* called to verify a certificate */ - int (*verify_cb)(int ok,X509_STORE_CTX *ctx); /* error callback */ - int (*get_issuer)(X509 **issuer, X509_STORE_CTX *ctx, X509 *x); /* get issuers cert from ctx */ - int (*check_issued)(X509_STORE_CTX *ctx, X509 *x, X509 *issuer); /* check issued */ - int (*check_revocation)(X509_STORE_CTX *ctx); /* Check revocation status of chain */ - int (*get_crl)(X509_STORE_CTX *ctx, X509_CRL **crl, X509 *x); /* retrieve CRL */ - int (*check_crl)(X509_STORE_CTX *ctx, X509_CRL *crl); /* Check CRL validity */ - int (*cert_crl)(X509_STORE_CTX *ctx, X509_CRL *crl, X509 *x); /* Check certificate against CRL */ - int (*check_policy)(X509_STORE_CTX *ctx); - STACK_OF(X509) * (*lookup_certs)(X509_STORE_CTX *ctx, X509_NAME *nm); - STACK_OF(X509_CRL) * (*lookup_crls)(X509_STORE_CTX *ctx, X509_NAME *nm); - int (*cleanup)(X509_STORE_CTX *ctx); - - /* The following is built up */ - int valid; /* if 0, rebuild chain */ - int last_untrusted; /* index of last untrusted cert */ - STACK_OF(X509) *chain; /* chain of X509s - built up and trusted */ - X509_POLICY_TREE *tree; /* Valid policy tree */ - - int explicit_policy; /* Require explicit policy value */ - - /* When something goes wrong, this is why */ - int error_depth; - int error; - X509 *current_cert; - X509 *current_issuer; /* cert currently being tested as valid issuer */ - X509_CRL *current_crl; /* current CRL */ - - int current_crl_score; /* score of current CRL */ - unsigned int current_reasons; /* Reason mask */ - - X509_STORE_CTX *parent; /* For CRL path validation: parent context */ - - CRYPTO_EX_DATA ex_data; - } /* X509_STORE_CTX */; - -void X509_STORE_CTX_set_depth(X509_STORE_CTX *ctx, int depth); - -#define X509_STORE_CTX_set_app_data(ctx,data) \ - X509_STORE_CTX_set_ex_data(ctx,0,data) -#define X509_STORE_CTX_get_app_data(ctx) \ - X509_STORE_CTX_get_ex_data(ctx,0) - -#define X509_L_FILE_LOAD 1 -#define X509_L_ADD_DIR 2 - -#define X509_LOOKUP_load_file(x,name,type) \ - X509_LOOKUP_ctrl((x),X509_L_FILE_LOAD,(name),(long)(type),NULL) - -#define X509_LOOKUP_add_dir(x,name,type) \ - X509_LOOKUP_ctrl((x),X509_L_ADD_DIR,(name),(long)(type),NULL) - -#define X509_V_OK 0 -/* illegal error (for uninitialized values, to avoid X509_V_OK): 1 */ - -#define X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT 2 -#define X509_V_ERR_UNABLE_TO_GET_CRL 3 -#define X509_V_ERR_UNABLE_TO_DECRYPT_CERT_SIGNATURE 4 -#define X509_V_ERR_UNABLE_TO_DECRYPT_CRL_SIGNATURE 5 -#define X509_V_ERR_UNABLE_TO_DECODE_ISSUER_PUBLIC_KEY 6 -#define X509_V_ERR_CERT_SIGNATURE_FAILURE 7 -#define X509_V_ERR_CRL_SIGNATURE_FAILURE 8 -#define X509_V_ERR_CERT_NOT_YET_VALID 9 -#define X509_V_ERR_CERT_HAS_EXPIRED 10 -#define X509_V_ERR_CRL_NOT_YET_VALID 11 -#define X509_V_ERR_CRL_HAS_EXPIRED 12 -#define X509_V_ERR_ERROR_IN_CERT_NOT_BEFORE_FIELD 13 -#define X509_V_ERR_ERROR_IN_CERT_NOT_AFTER_FIELD 14 -#define X509_V_ERR_ERROR_IN_CRL_LAST_UPDATE_FIELD 15 -#define X509_V_ERR_ERROR_IN_CRL_NEXT_UPDATE_FIELD 16 -#define X509_V_ERR_OUT_OF_MEM 17 -#define X509_V_ERR_DEPTH_ZERO_SELF_SIGNED_CERT 18 -#define X509_V_ERR_SELF_SIGNED_CERT_IN_CHAIN 19 -#define X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT_LOCALLY 20 -#define X509_V_ERR_UNABLE_TO_VERIFY_LEAF_SIGNATURE 21 -#define X509_V_ERR_CERT_CHAIN_TOO_LONG 22 -#define X509_V_ERR_CERT_REVOKED 23 -#define X509_V_ERR_INVALID_CA 24 -#define X509_V_ERR_PATH_LENGTH_EXCEEDED 25 -#define X509_V_ERR_INVALID_PURPOSE 26 -#define X509_V_ERR_CERT_UNTRUSTED 27 -#define X509_V_ERR_CERT_REJECTED 28 -/* These are 'informational' when looking for issuer cert */ -#define X509_V_ERR_SUBJECT_ISSUER_MISMATCH 29 -#define X509_V_ERR_AKID_SKID_MISMATCH 30 -#define X509_V_ERR_AKID_ISSUER_SERIAL_MISMATCH 31 -#define X509_V_ERR_KEYUSAGE_NO_CERTSIGN 32 - -#define X509_V_ERR_UNABLE_TO_GET_CRL_ISSUER 33 -#define X509_V_ERR_UNHANDLED_CRITICAL_EXTENSION 34 -#define X509_V_ERR_KEYUSAGE_NO_CRL_SIGN 35 -#define X509_V_ERR_UNHANDLED_CRITICAL_CRL_EXTENSION 36 -#define X509_V_ERR_INVALID_NON_CA 37 -#define X509_V_ERR_PROXY_PATH_LENGTH_EXCEEDED 38 -#define X509_V_ERR_KEYUSAGE_NO_DIGITAL_SIGNATURE 39 -#define X509_V_ERR_PROXY_CERTIFICATES_NOT_ALLOWED 40 - -#define X509_V_ERR_INVALID_EXTENSION 41 -#define X509_V_ERR_INVALID_POLICY_EXTENSION 42 -#define X509_V_ERR_NO_EXPLICIT_POLICY 43 -#define X509_V_ERR_DIFFERENT_CRL_SCOPE 44 -#define X509_V_ERR_UNSUPPORTED_EXTENSION_FEATURE 45 - -#define X509_V_ERR_UNNESTED_RESOURCE 46 - -#define X509_V_ERR_PERMITTED_VIOLATION 47 -#define X509_V_ERR_EXCLUDED_VIOLATION 48 -#define X509_V_ERR_SUBTREE_MINMAX 49 -#define X509_V_ERR_UNSUPPORTED_CONSTRAINT_TYPE 51 -#define X509_V_ERR_UNSUPPORTED_CONSTRAINT_SYNTAX 52 -#define X509_V_ERR_UNSUPPORTED_NAME_SYNTAX 53 -#define X509_V_ERR_CRL_PATH_VALIDATION_ERROR 54 - -/* The application is not happy */ -#define X509_V_ERR_APPLICATION_VERIFICATION 50 - -/* Certificate verify flags */ - -/* Send issuer+subject checks to verify_cb */ -#define X509_V_FLAG_CB_ISSUER_CHECK 0x1 -/* Use check time instead of current time */ -#define X509_V_FLAG_USE_CHECK_TIME 0x2 -/* Lookup CRLs */ -#define X509_V_FLAG_CRL_CHECK 0x4 -/* Lookup CRLs for whole chain */ -#define X509_V_FLAG_CRL_CHECK_ALL 0x8 -/* Ignore unhandled critical extensions */ -#define X509_V_FLAG_IGNORE_CRITICAL 0x10 -/* Disable workarounds for broken certificates */ -#define X509_V_FLAG_X509_STRICT 0x20 -/* Enable proxy certificate validation */ -#define X509_V_FLAG_ALLOW_PROXY_CERTS 0x40 -/* Enable policy checking */ -#define X509_V_FLAG_POLICY_CHECK 0x80 -/* Policy variable require-explicit-policy */ -#define X509_V_FLAG_EXPLICIT_POLICY 0x100 -/* Policy variable inhibit-any-policy */ -#define X509_V_FLAG_INHIBIT_ANY 0x200 -/* Policy variable inhibit-policy-mapping */ -#define X509_V_FLAG_INHIBIT_MAP 0x400 -/* Notify callback that policy is OK */ -#define X509_V_FLAG_NOTIFY_POLICY 0x800 -/* Extended CRL features such as indirect CRLs, alternate CRL signing keys */ -#define X509_V_FLAG_EXTENDED_CRL_SUPPORT 0x1000 -/* Delta CRL support */ -#define X509_V_FLAG_USE_DELTAS 0x2000 -/* Check selfsigned CA signature */ -#define X509_V_FLAG_CHECK_SS_SIGNATURE 0x4000 - - -#define X509_VP_FLAG_DEFAULT 0x1 -#define X509_VP_FLAG_OVERWRITE 0x2 -#define X509_VP_FLAG_RESET_FLAGS 0x4 -#define X509_VP_FLAG_LOCKED 0x8 -#define X509_VP_FLAG_ONCE 0x10 - -/* Internal use: mask of policy related options */ -#define X509_V_FLAG_POLICY_MASK (X509_V_FLAG_POLICY_CHECK \ - | X509_V_FLAG_EXPLICIT_POLICY \ - | X509_V_FLAG_INHIBIT_ANY \ - | X509_V_FLAG_INHIBIT_MAP) - -int X509_OBJECT_idx_by_subject(STACK_OF(X509_OBJECT) *h, int type, - X509_NAME *name); -X509_OBJECT *X509_OBJECT_retrieve_by_subject(STACK_OF(X509_OBJECT) *h,int type,X509_NAME *name); -X509_OBJECT *X509_OBJECT_retrieve_match(STACK_OF(X509_OBJECT) *h, X509_OBJECT *x); -void X509_OBJECT_up_ref_count(X509_OBJECT *a); -void X509_OBJECT_free_contents(X509_OBJECT *a); -X509_STORE *X509_STORE_new(void ); -void X509_STORE_free(X509_STORE *v); - -STACK_OF(X509)* X509_STORE_get1_certs(X509_STORE_CTX *st, X509_NAME *nm); -STACK_OF(X509_CRL)* X509_STORE_get1_crls(X509_STORE_CTX *st, X509_NAME *nm); -int X509_STORE_set_flags(X509_STORE *ctx, unsigned long flags); -int X509_STORE_set_purpose(X509_STORE *ctx, int purpose); -int X509_STORE_set_trust(X509_STORE *ctx, int trust); -int X509_STORE_set1_param(X509_STORE *ctx, X509_VERIFY_PARAM *pm); - -void X509_STORE_set_verify_cb(X509_STORE *ctx, - int (*verify_cb)(int, X509_STORE_CTX *)); - -X509_STORE_CTX *X509_STORE_CTX_new(void); - -int X509_STORE_CTX_get1_issuer(X509 **issuer, X509_STORE_CTX *ctx, X509 *x); - -void X509_STORE_CTX_free(X509_STORE_CTX *ctx); -int X509_STORE_CTX_init(X509_STORE_CTX *ctx, X509_STORE *store, - X509 *x509, STACK_OF(X509) *chain); -void X509_STORE_CTX_trusted_stack(X509_STORE_CTX *ctx, STACK_OF(X509) *sk); -void X509_STORE_CTX_cleanup(X509_STORE_CTX *ctx); - -X509_LOOKUP *X509_STORE_add_lookup(X509_STORE *v, X509_LOOKUP_METHOD *m); - -X509_LOOKUP_METHOD *X509_LOOKUP_hash_dir(void); -X509_LOOKUP_METHOD *X509_LOOKUP_file(void); - -int X509_STORE_add_cert(X509_STORE *ctx, X509 *x); -int X509_STORE_add_crl(X509_STORE *ctx, X509_CRL *x); - -int X509_STORE_get_by_subject(X509_STORE_CTX *vs,int type,X509_NAME *name, - X509_OBJECT *ret); - -int X509_LOOKUP_ctrl(X509_LOOKUP *ctx, int cmd, const char *argc, - long argl, char **ret); - -#ifndef OPENSSL_NO_STDIO -int X509_load_cert_file(X509_LOOKUP *ctx, const char *file, int type); -int X509_load_crl_file(X509_LOOKUP *ctx, const char *file, int type); -int X509_load_cert_crl_file(X509_LOOKUP *ctx, const char *file, int type); -#endif - - -X509_LOOKUP *X509_LOOKUP_new(X509_LOOKUP_METHOD *method); -void X509_LOOKUP_free(X509_LOOKUP *ctx); -int X509_LOOKUP_init(X509_LOOKUP *ctx); -int X509_LOOKUP_by_subject(X509_LOOKUP *ctx, int type, X509_NAME *name, - X509_OBJECT *ret); -int X509_LOOKUP_by_issuer_serial(X509_LOOKUP *ctx, int type, X509_NAME *name, - ASN1_INTEGER *serial, X509_OBJECT *ret); -int X509_LOOKUP_by_fingerprint(X509_LOOKUP *ctx, int type, - unsigned char *bytes, int len, X509_OBJECT *ret); -int X509_LOOKUP_by_alias(X509_LOOKUP *ctx, int type, char *str, - int len, X509_OBJECT *ret); -int X509_LOOKUP_shutdown(X509_LOOKUP *ctx); - -#ifndef OPENSSL_NO_STDIO -int X509_STORE_load_locations (X509_STORE *ctx, - const char *file, const char *dir); -int X509_STORE_set_default_paths(X509_STORE *ctx); -#endif - -int X509_STORE_CTX_get_ex_new_index(long argl, void *argp, CRYPTO_EX_new *new_func, - CRYPTO_EX_dup *dup_func, CRYPTO_EX_free *free_func); -int X509_STORE_CTX_set_ex_data(X509_STORE_CTX *ctx,int idx,void *data); -void * X509_STORE_CTX_get_ex_data(X509_STORE_CTX *ctx,int idx); -int X509_STORE_CTX_get_error(X509_STORE_CTX *ctx); -void X509_STORE_CTX_set_error(X509_STORE_CTX *ctx,int s); -int X509_STORE_CTX_get_error_depth(X509_STORE_CTX *ctx); -X509 * X509_STORE_CTX_get_current_cert(X509_STORE_CTX *ctx); -X509 *X509_STORE_CTX_get0_current_issuer(X509_STORE_CTX *ctx); -X509_CRL *X509_STORE_CTX_get0_current_crl(X509_STORE_CTX *ctx); -X509_STORE_CTX *X509_STORE_CTX_get0_parent_ctx(X509_STORE_CTX *ctx); -STACK_OF(X509) *X509_STORE_CTX_get_chain(X509_STORE_CTX *ctx); -STACK_OF(X509) *X509_STORE_CTX_get1_chain(X509_STORE_CTX *ctx); -void X509_STORE_CTX_set_cert(X509_STORE_CTX *c,X509 *x); -void X509_STORE_CTX_set_chain(X509_STORE_CTX *c,STACK_OF(X509) *sk); -void X509_STORE_CTX_set0_crls(X509_STORE_CTX *c,STACK_OF(X509_CRL) *sk); -int X509_STORE_CTX_set_purpose(X509_STORE_CTX *ctx, int purpose); -int X509_STORE_CTX_set_trust(X509_STORE_CTX *ctx, int trust); -int X509_STORE_CTX_purpose_inherit(X509_STORE_CTX *ctx, int def_purpose, - int purpose, int trust); -void X509_STORE_CTX_set_flags(X509_STORE_CTX *ctx, unsigned long flags); -void X509_STORE_CTX_set_time(X509_STORE_CTX *ctx, unsigned long flags, - time_t t); -void X509_STORE_CTX_set_verify_cb(X509_STORE_CTX *ctx, - int (*verify_cb)(int, X509_STORE_CTX *)); - -X509_POLICY_TREE *X509_STORE_CTX_get0_policy_tree(X509_STORE_CTX *ctx); -int X509_STORE_CTX_get_explicit_policy(X509_STORE_CTX *ctx); - -X509_VERIFY_PARAM *X509_STORE_CTX_get0_param(X509_STORE_CTX *ctx); -void X509_STORE_CTX_set0_param(X509_STORE_CTX *ctx, X509_VERIFY_PARAM *param); -int X509_STORE_CTX_set_default(X509_STORE_CTX *ctx, const char *name); - -/* X509_VERIFY_PARAM functions */ - -X509_VERIFY_PARAM *X509_VERIFY_PARAM_new(void); -void X509_VERIFY_PARAM_free(X509_VERIFY_PARAM *param); -int X509_VERIFY_PARAM_inherit(X509_VERIFY_PARAM *to, - const X509_VERIFY_PARAM *from); -int X509_VERIFY_PARAM_set1(X509_VERIFY_PARAM *to, - const X509_VERIFY_PARAM *from); -int X509_VERIFY_PARAM_set1_name(X509_VERIFY_PARAM *param, const char *name); -int X509_VERIFY_PARAM_set_flags(X509_VERIFY_PARAM *param, unsigned long flags); -int X509_VERIFY_PARAM_clear_flags(X509_VERIFY_PARAM *param, - unsigned long flags); -unsigned long X509_VERIFY_PARAM_get_flags(X509_VERIFY_PARAM *param); -int X509_VERIFY_PARAM_set_purpose(X509_VERIFY_PARAM *param, int purpose); -int X509_VERIFY_PARAM_set_trust(X509_VERIFY_PARAM *param, int trust); -void X509_VERIFY_PARAM_set_depth(X509_VERIFY_PARAM *param, int depth); -void X509_VERIFY_PARAM_set_time(X509_VERIFY_PARAM *param, time_t t); -int X509_VERIFY_PARAM_add0_policy(X509_VERIFY_PARAM *param, - ASN1_OBJECT *policy); -int X509_VERIFY_PARAM_set1_policies(X509_VERIFY_PARAM *param, - STACK_OF(ASN1_OBJECT) *policies); -int X509_VERIFY_PARAM_get_depth(const X509_VERIFY_PARAM *param); - -int X509_VERIFY_PARAM_add0_table(X509_VERIFY_PARAM *param); -const X509_VERIFY_PARAM *X509_VERIFY_PARAM_lookup(const char *name); -void X509_VERIFY_PARAM_table_cleanup(void); - -int X509_policy_check(X509_POLICY_TREE **ptree, int *pexplicit_policy, - STACK_OF(X509) *certs, - STACK_OF(ASN1_OBJECT) *policy_oids, - unsigned int flags); - -void X509_policy_tree_free(X509_POLICY_TREE *tree); - -int X509_policy_tree_level_count(const X509_POLICY_TREE *tree); -X509_POLICY_LEVEL * - X509_policy_tree_get0_level(const X509_POLICY_TREE *tree, int i); - -STACK_OF(X509_POLICY_NODE) * - X509_policy_tree_get0_policies(const X509_POLICY_TREE *tree); - -STACK_OF(X509_POLICY_NODE) * - X509_policy_tree_get0_user_policies(const X509_POLICY_TREE *tree); - -int X509_policy_level_node_count(X509_POLICY_LEVEL *level); - -X509_POLICY_NODE *X509_policy_level_get0_node(X509_POLICY_LEVEL *level, int i); - -const ASN1_OBJECT *X509_policy_node_get0_policy(const X509_POLICY_NODE *node); - -STACK_OF(POLICYQUALINFO) * - X509_policy_node_get0_qualifiers(const X509_POLICY_NODE *node); -const X509_POLICY_NODE * - X509_policy_node_get0_parent(const X509_POLICY_NODE *node); - -#ifdef __cplusplus -} -#endif -#endif - diff --git a/Pods/OpenSSL-Universal/include-osx/openssl/x509v3.h b/Pods/OpenSSL-Universal/include-osx/openssl/x509v3.h deleted file mode 100644 index b308abe7..00000000 --- a/Pods/OpenSSL-Universal/include-osx/openssl/x509v3.h +++ /dev/null @@ -1,1007 +0,0 @@ -/* x509v3.h */ -/* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL - * project 1999. - */ -/* ==================================================================== - * Copyright (c) 1999-2004 The OpenSSL Project. All rights reserved. - * - * Redistribution and use in source and binary forms, with or without - * modification, are permitted provided that the following conditions - * are met: - * - * 1. Redistributions of source code must retain the above copyright - * notice, this list of conditions and the following disclaimer. - * - * 2. Redistributions in binary form must reproduce the above copyright - * notice, this list of conditions and the following disclaimer in - * the documentation and/or other materials provided with the - * distribution. - * - * 3. All advertising materials mentioning features or use of this - * software must display the following acknowledgment: - * "This product includes software developed by the OpenSSL Project - * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)" - * - * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to - * endorse or promote products derived from this software without - * prior written permission. For written permission, please contact - * licensing@OpenSSL.org. - * - * 5. Products derived from this software may not be called "OpenSSL" - * nor may "OpenSSL" appear in their names without prior written - * permission of the OpenSSL Project. - * - * 6. Redistributions of any form whatsoever must retain the following - * acknowledgment: - * "This product includes software developed by the OpenSSL Project - * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)" - * - * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY - * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE - * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR - * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR - * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, - * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT - * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; - * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) - * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, - * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) - * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED - * OF THE POSSIBILITY OF SUCH DAMAGE. - * ==================================================================== - * - * This product includes cryptographic software written by Eric Young - * (eay@cryptsoft.com). This product includes software written by Tim - * Hudson (tjh@cryptsoft.com). - * - */ -#ifndef HEADER_X509V3_H -#define HEADER_X509V3_H - -#include -#include -#include - -#ifdef __cplusplus -extern "C" { -#endif - -/* Forward reference */ -struct v3_ext_method; -struct v3_ext_ctx; - -/* Useful typedefs */ - -typedef void * (*X509V3_EXT_NEW)(void); -typedef void (*X509V3_EXT_FREE)(void *); -typedef void * (*X509V3_EXT_D2I)(void *, const unsigned char ** , long); -typedef int (*X509V3_EXT_I2D)(void *, unsigned char **); -typedef STACK_OF(CONF_VALUE) * - (*X509V3_EXT_I2V)(const struct v3_ext_method *method, void *ext, - STACK_OF(CONF_VALUE) *extlist); -typedef void * (*X509V3_EXT_V2I)(const struct v3_ext_method *method, - struct v3_ext_ctx *ctx, - STACK_OF(CONF_VALUE) *values); -typedef char * (*X509V3_EXT_I2S)(const struct v3_ext_method *method, void *ext); -typedef void * (*X509V3_EXT_S2I)(const struct v3_ext_method *method, - struct v3_ext_ctx *ctx, const char *str); -typedef int (*X509V3_EXT_I2R)(const struct v3_ext_method *method, void *ext, - BIO *out, int indent); -typedef void * (*X509V3_EXT_R2I)(const struct v3_ext_method *method, - struct v3_ext_ctx *ctx, const char *str); - -/* V3 extension structure */ - -struct v3_ext_method { -int ext_nid; -int ext_flags; -/* If this is set the following four fields are ignored */ -ASN1_ITEM_EXP *it; -/* Old style ASN1 calls */ -X509V3_EXT_NEW ext_new; -X509V3_EXT_FREE ext_free; -X509V3_EXT_D2I d2i; -X509V3_EXT_I2D i2d; - -/* The following pair is used for string extensions */ -X509V3_EXT_I2S i2s; -X509V3_EXT_S2I s2i; - -/* The following pair is used for multi-valued extensions */ -X509V3_EXT_I2V i2v; -X509V3_EXT_V2I v2i; - -/* The following are used for raw extensions */ -X509V3_EXT_I2R i2r; -X509V3_EXT_R2I r2i; - -void *usr_data; /* Any extension specific data */ -}; - -typedef struct X509V3_CONF_METHOD_st { -char * (*get_string)(void *db, char *section, char *value); -STACK_OF(CONF_VALUE) * (*get_section)(void *db, char *section); -void (*free_string)(void *db, char * string); -void (*free_section)(void *db, STACK_OF(CONF_VALUE) *section); -} X509V3_CONF_METHOD; - -/* Context specific info */ -struct v3_ext_ctx { -#define CTX_TEST 0x1 -int flags; -X509 *issuer_cert; -X509 *subject_cert; -X509_REQ *subject_req; -X509_CRL *crl; -X509V3_CONF_METHOD *db_meth; -void *db; -/* Maybe more here */ -}; - -typedef struct v3_ext_method X509V3_EXT_METHOD; - -DECLARE_STACK_OF(X509V3_EXT_METHOD) - -/* ext_flags values */ -#define X509V3_EXT_DYNAMIC 0x1 -#define X509V3_EXT_CTX_DEP 0x2 -#define X509V3_EXT_MULTILINE 0x4 - -typedef BIT_STRING_BITNAME ENUMERATED_NAMES; - -typedef struct BASIC_CONSTRAINTS_st { -int ca; -ASN1_INTEGER *pathlen; -} BASIC_CONSTRAINTS; - - -typedef struct PKEY_USAGE_PERIOD_st { -ASN1_GENERALIZEDTIME *notBefore; -ASN1_GENERALIZEDTIME *notAfter; -} PKEY_USAGE_PERIOD; - -typedef struct otherName_st { -ASN1_OBJECT *type_id; -ASN1_TYPE *value; -} OTHERNAME; - -typedef struct EDIPartyName_st { - ASN1_STRING *nameAssigner; - ASN1_STRING *partyName; -} EDIPARTYNAME; - -typedef struct GENERAL_NAME_st { - -#define GEN_OTHERNAME 0 -#define GEN_EMAIL 1 -#define GEN_DNS 2 -#define GEN_X400 3 -#define GEN_DIRNAME 4 -#define GEN_EDIPARTY 5 -#define GEN_URI 6 -#define GEN_IPADD 7 -#define GEN_RID 8 - -int type; -union { - char *ptr; - OTHERNAME *otherName; /* otherName */ - ASN1_IA5STRING *rfc822Name; - ASN1_IA5STRING *dNSName; - ASN1_TYPE *x400Address; - X509_NAME *directoryName; - EDIPARTYNAME *ediPartyName; - ASN1_IA5STRING *uniformResourceIdentifier; - ASN1_OCTET_STRING *iPAddress; - ASN1_OBJECT *registeredID; - - /* Old names */ - ASN1_OCTET_STRING *ip; /* iPAddress */ - X509_NAME *dirn; /* dirn */ - ASN1_IA5STRING *ia5;/* rfc822Name, dNSName, uniformResourceIdentifier */ - ASN1_OBJECT *rid; /* registeredID */ - ASN1_TYPE *other; /* x400Address */ -} d; -} GENERAL_NAME; - -typedef STACK_OF(GENERAL_NAME) GENERAL_NAMES; - -typedef struct ACCESS_DESCRIPTION_st { - ASN1_OBJECT *method; - GENERAL_NAME *location; -} ACCESS_DESCRIPTION; - -typedef STACK_OF(ACCESS_DESCRIPTION) AUTHORITY_INFO_ACCESS; - -typedef STACK_OF(ASN1_OBJECT) EXTENDED_KEY_USAGE; - -DECLARE_STACK_OF(GENERAL_NAME) -DECLARE_ASN1_SET_OF(GENERAL_NAME) - -DECLARE_STACK_OF(ACCESS_DESCRIPTION) -DECLARE_ASN1_SET_OF(ACCESS_DESCRIPTION) - -typedef struct DIST_POINT_NAME_st { -int type; -union { - GENERAL_NAMES *fullname; - STACK_OF(X509_NAME_ENTRY) *relativename; -} name; -/* If relativename then this contains the full distribution point name */ -X509_NAME *dpname; -} DIST_POINT_NAME; -/* All existing reasons */ -#define CRLDP_ALL_REASONS 0x807f - -#define CRL_REASON_NONE -1 -#define CRL_REASON_UNSPECIFIED 0 -#define CRL_REASON_KEY_COMPROMISE 1 -#define CRL_REASON_CA_COMPROMISE 2 -#define CRL_REASON_AFFILIATION_CHANGED 3 -#define CRL_REASON_SUPERSEDED 4 -#define CRL_REASON_CESSATION_OF_OPERATION 5 -#define CRL_REASON_CERTIFICATE_HOLD 6 -#define CRL_REASON_REMOVE_FROM_CRL 8 -#define CRL_REASON_PRIVILEGE_WITHDRAWN 9 -#define CRL_REASON_AA_COMPROMISE 10 - -struct DIST_POINT_st { -DIST_POINT_NAME *distpoint; -ASN1_BIT_STRING *reasons; -GENERAL_NAMES *CRLissuer; -int dp_reasons; -}; - -typedef STACK_OF(DIST_POINT) CRL_DIST_POINTS; - -DECLARE_STACK_OF(DIST_POINT) -DECLARE_ASN1_SET_OF(DIST_POINT) - -struct AUTHORITY_KEYID_st { -ASN1_OCTET_STRING *keyid; -GENERAL_NAMES *issuer; -ASN1_INTEGER *serial; -}; - -/* Strong extranet structures */ - -typedef struct SXNET_ID_st { - ASN1_INTEGER *zone; - ASN1_OCTET_STRING *user; -} SXNETID; - -DECLARE_STACK_OF(SXNETID) -DECLARE_ASN1_SET_OF(SXNETID) - -typedef struct SXNET_st { - ASN1_INTEGER *version; - STACK_OF(SXNETID) *ids; -} SXNET; - -typedef struct NOTICEREF_st { - ASN1_STRING *organization; - STACK_OF(ASN1_INTEGER) *noticenos; -} NOTICEREF; - -typedef struct USERNOTICE_st { - NOTICEREF *noticeref; - ASN1_STRING *exptext; -} USERNOTICE; - -typedef struct POLICYQUALINFO_st { - ASN1_OBJECT *pqualid; - union { - ASN1_IA5STRING *cpsuri; - USERNOTICE *usernotice; - ASN1_TYPE *other; - } d; -} POLICYQUALINFO; - -DECLARE_STACK_OF(POLICYQUALINFO) -DECLARE_ASN1_SET_OF(POLICYQUALINFO) - -typedef struct POLICYINFO_st { - ASN1_OBJECT *policyid; - STACK_OF(POLICYQUALINFO) *qualifiers; -} POLICYINFO; - -typedef STACK_OF(POLICYINFO) CERTIFICATEPOLICIES; - -DECLARE_STACK_OF(POLICYINFO) -DECLARE_ASN1_SET_OF(POLICYINFO) - -typedef struct POLICY_MAPPING_st { - ASN1_OBJECT *issuerDomainPolicy; - ASN1_OBJECT *subjectDomainPolicy; -} POLICY_MAPPING; - -DECLARE_STACK_OF(POLICY_MAPPING) - -typedef STACK_OF(POLICY_MAPPING) POLICY_MAPPINGS; - -typedef struct GENERAL_SUBTREE_st { - GENERAL_NAME *base; - ASN1_INTEGER *minimum; - ASN1_INTEGER *maximum; -} GENERAL_SUBTREE; - -DECLARE_STACK_OF(GENERAL_SUBTREE) - -struct NAME_CONSTRAINTS_st { - STACK_OF(GENERAL_SUBTREE) *permittedSubtrees; - STACK_OF(GENERAL_SUBTREE) *excludedSubtrees; -}; - -typedef struct POLICY_CONSTRAINTS_st { - ASN1_INTEGER *requireExplicitPolicy; - ASN1_INTEGER *inhibitPolicyMapping; -} POLICY_CONSTRAINTS; - -/* Proxy certificate structures, see RFC 3820 */ -typedef struct PROXY_POLICY_st - { - ASN1_OBJECT *policyLanguage; - ASN1_OCTET_STRING *policy; - } PROXY_POLICY; - -typedef struct PROXY_CERT_INFO_EXTENSION_st - { - ASN1_INTEGER *pcPathLengthConstraint; - PROXY_POLICY *proxyPolicy; - } PROXY_CERT_INFO_EXTENSION; - -DECLARE_ASN1_FUNCTIONS(PROXY_POLICY) -DECLARE_ASN1_FUNCTIONS(PROXY_CERT_INFO_EXTENSION) - -struct ISSUING_DIST_POINT_st - { - DIST_POINT_NAME *distpoint; - int onlyuser; - int onlyCA; - ASN1_BIT_STRING *onlysomereasons; - int indirectCRL; - int onlyattr; - }; - -/* Values in idp_flags field */ -/* IDP present */ -#define IDP_PRESENT 0x1 -/* IDP values inconsistent */ -#define IDP_INVALID 0x2 -/* onlyuser true */ -#define IDP_ONLYUSER 0x4 -/* onlyCA true */ -#define IDP_ONLYCA 0x8 -/* onlyattr true */ -#define IDP_ONLYATTR 0x10 -/* indirectCRL true */ -#define IDP_INDIRECT 0x20 -/* onlysomereasons present */ -#define IDP_REASONS 0x40 - -#define X509V3_conf_err(val) ERR_add_error_data(6, "section:", val->section, \ -",name:", val->name, ",value:", val->value); - -#define X509V3_set_ctx_test(ctx) \ - X509V3_set_ctx(ctx, NULL, NULL, NULL, NULL, CTX_TEST) -#define X509V3_set_ctx_nodb(ctx) (ctx)->db = NULL; - -#define EXT_BITSTRING(nid, table) { nid, 0, ASN1_ITEM_ref(ASN1_BIT_STRING), \ - 0,0,0,0, \ - 0,0, \ - (X509V3_EXT_I2V)i2v_ASN1_BIT_STRING, \ - (X509V3_EXT_V2I)v2i_ASN1_BIT_STRING, \ - NULL, NULL, \ - table} - -#define EXT_IA5STRING(nid) { nid, 0, ASN1_ITEM_ref(ASN1_IA5STRING), \ - 0,0,0,0, \ - (X509V3_EXT_I2S)i2s_ASN1_IA5STRING, \ - (X509V3_EXT_S2I)s2i_ASN1_IA5STRING, \ - 0,0,0,0, \ - NULL} - -#define EXT_END { -1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0} - - -/* X509_PURPOSE stuff */ - -#define EXFLAG_BCONS 0x1 -#define EXFLAG_KUSAGE 0x2 -#define EXFLAG_XKUSAGE 0x4 -#define EXFLAG_NSCERT 0x8 - -#define EXFLAG_CA 0x10 -/* Really self issued not necessarily self signed */ -#define EXFLAG_SI 0x20 -#define EXFLAG_SS 0x20 -#define EXFLAG_V1 0x40 -#define EXFLAG_INVALID 0x80 -#define EXFLAG_SET 0x100 -#define EXFLAG_CRITICAL 0x200 -#define EXFLAG_PROXY 0x400 - -#define EXFLAG_INVALID_POLICY 0x800 -#define EXFLAG_FRESHEST 0x1000 - -#define KU_DIGITAL_SIGNATURE 0x0080 -#define KU_NON_REPUDIATION 0x0040 -#define KU_KEY_ENCIPHERMENT 0x0020 -#define KU_DATA_ENCIPHERMENT 0x0010 -#define KU_KEY_AGREEMENT 0x0008 -#define KU_KEY_CERT_SIGN 0x0004 -#define KU_CRL_SIGN 0x0002 -#define KU_ENCIPHER_ONLY 0x0001 -#define KU_DECIPHER_ONLY 0x8000 - -#define NS_SSL_CLIENT 0x80 -#define NS_SSL_SERVER 0x40 -#define NS_SMIME 0x20 -#define NS_OBJSIGN 0x10 -#define NS_SSL_CA 0x04 -#define NS_SMIME_CA 0x02 -#define NS_OBJSIGN_CA 0x01 -#define NS_ANY_CA (NS_SSL_CA|NS_SMIME_CA|NS_OBJSIGN_CA) - -#define XKU_SSL_SERVER 0x1 -#define XKU_SSL_CLIENT 0x2 -#define XKU_SMIME 0x4 -#define XKU_CODE_SIGN 0x8 -#define XKU_SGC 0x10 -#define XKU_OCSP_SIGN 0x20 -#define XKU_TIMESTAMP 0x40 -#define XKU_DVCS 0x80 - -#define X509_PURPOSE_DYNAMIC 0x1 -#define X509_PURPOSE_DYNAMIC_NAME 0x2 - -typedef struct x509_purpose_st { - int purpose; - int trust; /* Default trust ID */ - int flags; - int (*check_purpose)(const struct x509_purpose_st *, - const X509 *, int); - char *name; - char *sname; - void *usr_data; -} X509_PURPOSE; - -#define X509_PURPOSE_SSL_CLIENT 1 -#define X509_PURPOSE_SSL_SERVER 2 -#define X509_PURPOSE_NS_SSL_SERVER 3 -#define X509_PURPOSE_SMIME_SIGN 4 -#define X509_PURPOSE_SMIME_ENCRYPT 5 -#define X509_PURPOSE_CRL_SIGN 6 -#define X509_PURPOSE_ANY 7 -#define X509_PURPOSE_OCSP_HELPER 8 -#define X509_PURPOSE_TIMESTAMP_SIGN 9 - -#define X509_PURPOSE_MIN 1 -#define X509_PURPOSE_MAX 9 - -/* Flags for X509V3_EXT_print() */ - -#define X509V3_EXT_UNKNOWN_MASK (0xfL << 16) -/* Return error for unknown extensions */ -#define X509V3_EXT_DEFAULT 0 -/* Print error for unknown extensions */ -#define X509V3_EXT_ERROR_UNKNOWN (1L << 16) -/* ASN1 parse unknown extensions */ -#define X509V3_EXT_PARSE_UNKNOWN (2L << 16) -/* BIO_dump unknown extensions */ -#define X509V3_EXT_DUMP_UNKNOWN (3L << 16) - -/* Flags for X509V3_add1_i2d */ - -#define X509V3_ADD_OP_MASK 0xfL -#define X509V3_ADD_DEFAULT 0L -#define X509V3_ADD_APPEND 1L -#define X509V3_ADD_REPLACE 2L -#define X509V3_ADD_REPLACE_EXISTING 3L -#define X509V3_ADD_KEEP_EXISTING 4L -#define X509V3_ADD_DELETE 5L -#define X509V3_ADD_SILENT 0x10 - -DECLARE_STACK_OF(X509_PURPOSE) - -DECLARE_ASN1_FUNCTIONS(BASIC_CONSTRAINTS) - -DECLARE_ASN1_FUNCTIONS(SXNET) -DECLARE_ASN1_FUNCTIONS(SXNETID) - -int SXNET_add_id_asc(SXNET **psx, char *zone, char *user, int userlen); -int SXNET_add_id_ulong(SXNET **psx, unsigned long lzone, char *user, int userlen); -int SXNET_add_id_INTEGER(SXNET **psx, ASN1_INTEGER *izone, char *user, int userlen); - -ASN1_OCTET_STRING *SXNET_get_id_asc(SXNET *sx, char *zone); -ASN1_OCTET_STRING *SXNET_get_id_ulong(SXNET *sx, unsigned long lzone); -ASN1_OCTET_STRING *SXNET_get_id_INTEGER(SXNET *sx, ASN1_INTEGER *zone); - -DECLARE_ASN1_FUNCTIONS(AUTHORITY_KEYID) - -DECLARE_ASN1_FUNCTIONS(PKEY_USAGE_PERIOD) - -DECLARE_ASN1_FUNCTIONS(GENERAL_NAME) -GENERAL_NAME *GENERAL_NAME_dup(GENERAL_NAME *a); -int GENERAL_NAME_cmp(GENERAL_NAME *a, GENERAL_NAME *b); - - - -ASN1_BIT_STRING *v2i_ASN1_BIT_STRING(X509V3_EXT_METHOD *method, - X509V3_CTX *ctx, STACK_OF(CONF_VALUE) *nval); -STACK_OF(CONF_VALUE) *i2v_ASN1_BIT_STRING(X509V3_EXT_METHOD *method, - ASN1_BIT_STRING *bits, - STACK_OF(CONF_VALUE) *extlist); - -STACK_OF(CONF_VALUE) *i2v_GENERAL_NAME(X509V3_EXT_METHOD *method, GENERAL_NAME *gen, STACK_OF(CONF_VALUE) *ret); -int GENERAL_NAME_print(BIO *out, GENERAL_NAME *gen); - -DECLARE_ASN1_FUNCTIONS(GENERAL_NAMES) - -STACK_OF(CONF_VALUE) *i2v_GENERAL_NAMES(X509V3_EXT_METHOD *method, - GENERAL_NAMES *gen, STACK_OF(CONF_VALUE) *extlist); -GENERAL_NAMES *v2i_GENERAL_NAMES(const X509V3_EXT_METHOD *method, - X509V3_CTX *ctx, STACK_OF(CONF_VALUE) *nval); - -DECLARE_ASN1_FUNCTIONS(OTHERNAME) -DECLARE_ASN1_FUNCTIONS(EDIPARTYNAME) -int OTHERNAME_cmp(OTHERNAME *a, OTHERNAME *b); -void GENERAL_NAME_set0_value(GENERAL_NAME *a, int type, void *value); -void *GENERAL_NAME_get0_value(GENERAL_NAME *a, int *ptype); -int GENERAL_NAME_set0_othername(GENERAL_NAME *gen, - ASN1_OBJECT *oid, ASN1_TYPE *value); -int GENERAL_NAME_get0_otherName(GENERAL_NAME *gen, - ASN1_OBJECT **poid, ASN1_TYPE **pvalue); - -char *i2s_ASN1_OCTET_STRING(X509V3_EXT_METHOD *method, ASN1_OCTET_STRING *ia5); -ASN1_OCTET_STRING *s2i_ASN1_OCTET_STRING(X509V3_EXT_METHOD *method, X509V3_CTX *ctx, char *str); - -DECLARE_ASN1_FUNCTIONS(EXTENDED_KEY_USAGE) -int i2a_ACCESS_DESCRIPTION(BIO *bp, ACCESS_DESCRIPTION* a); - -DECLARE_ASN1_FUNCTIONS(CERTIFICATEPOLICIES) -DECLARE_ASN1_FUNCTIONS(POLICYINFO) -DECLARE_ASN1_FUNCTIONS(POLICYQUALINFO) -DECLARE_ASN1_FUNCTIONS(USERNOTICE) -DECLARE_ASN1_FUNCTIONS(NOTICEREF) - -DECLARE_ASN1_FUNCTIONS(CRL_DIST_POINTS) -DECLARE_ASN1_FUNCTIONS(DIST_POINT) -DECLARE_ASN1_FUNCTIONS(DIST_POINT_NAME) -DECLARE_ASN1_FUNCTIONS(ISSUING_DIST_POINT) - -int DIST_POINT_set_dpname(DIST_POINT_NAME *dpn, X509_NAME *iname); - -int NAME_CONSTRAINTS_check(X509 *x, NAME_CONSTRAINTS *nc); - -DECLARE_ASN1_FUNCTIONS(ACCESS_DESCRIPTION) -DECLARE_ASN1_FUNCTIONS(AUTHORITY_INFO_ACCESS) - -DECLARE_ASN1_ITEM(POLICY_MAPPING) -DECLARE_ASN1_ALLOC_FUNCTIONS(POLICY_MAPPING) -DECLARE_ASN1_ITEM(POLICY_MAPPINGS) - -DECLARE_ASN1_ITEM(GENERAL_SUBTREE) -DECLARE_ASN1_ALLOC_FUNCTIONS(GENERAL_SUBTREE) - -DECLARE_ASN1_ITEM(NAME_CONSTRAINTS) -DECLARE_ASN1_ALLOC_FUNCTIONS(NAME_CONSTRAINTS) - -DECLARE_ASN1_ALLOC_FUNCTIONS(POLICY_CONSTRAINTS) -DECLARE_ASN1_ITEM(POLICY_CONSTRAINTS) - -GENERAL_NAME *a2i_GENERAL_NAME(GENERAL_NAME *out, - const X509V3_EXT_METHOD *method, X509V3_CTX *ctx, - int gen_type, char *value, int is_nc); - -#ifdef HEADER_CONF_H -GENERAL_NAME *v2i_GENERAL_NAME(const X509V3_EXT_METHOD *method, X509V3_CTX *ctx, - CONF_VALUE *cnf); -GENERAL_NAME *v2i_GENERAL_NAME_ex(GENERAL_NAME *out, - const X509V3_EXT_METHOD *method, - X509V3_CTX *ctx, CONF_VALUE *cnf, int is_nc); -void X509V3_conf_free(CONF_VALUE *val); - -X509_EXTENSION *X509V3_EXT_nconf_nid(CONF *conf, X509V3_CTX *ctx, int ext_nid, char *value); -X509_EXTENSION *X509V3_EXT_nconf(CONF *conf, X509V3_CTX *ctx, char *name, char *value); -int X509V3_EXT_add_nconf_sk(CONF *conf, X509V3_CTX *ctx, char *section, STACK_OF(X509_EXTENSION) **sk); -int X509V3_EXT_add_nconf(CONF *conf, X509V3_CTX *ctx, char *section, X509 *cert); -int X509V3_EXT_REQ_add_nconf(CONF *conf, X509V3_CTX *ctx, char *section, X509_REQ *req); -int X509V3_EXT_CRL_add_nconf(CONF *conf, X509V3_CTX *ctx, char *section, X509_CRL *crl); - -X509_EXTENSION *X509V3_EXT_conf_nid(LHASH_OF(CONF_VALUE) *conf, X509V3_CTX *ctx, - int ext_nid, char *value); -X509_EXTENSION *X509V3_EXT_conf(LHASH_OF(CONF_VALUE) *conf, X509V3_CTX *ctx, - char *name, char *value); -int X509V3_EXT_add_conf(LHASH_OF(CONF_VALUE) *conf, X509V3_CTX *ctx, - char *section, X509 *cert); -int X509V3_EXT_REQ_add_conf(LHASH_OF(CONF_VALUE) *conf, X509V3_CTX *ctx, - char *section, X509_REQ *req); -int X509V3_EXT_CRL_add_conf(LHASH_OF(CONF_VALUE) *conf, X509V3_CTX *ctx, - char *section, X509_CRL *crl); - -int X509V3_add_value_bool_nf(char *name, int asn1_bool, - STACK_OF(CONF_VALUE) **extlist); -int X509V3_get_value_bool(CONF_VALUE *value, int *asn1_bool); -int X509V3_get_value_int(CONF_VALUE *value, ASN1_INTEGER **aint); -void X509V3_set_nconf(X509V3_CTX *ctx, CONF *conf); -void X509V3_set_conf_lhash(X509V3_CTX *ctx, LHASH_OF(CONF_VALUE) *lhash); -#endif - -char * X509V3_get_string(X509V3_CTX *ctx, char *name, char *section); -STACK_OF(CONF_VALUE) * X509V3_get_section(X509V3_CTX *ctx, char *section); -void X509V3_string_free(X509V3_CTX *ctx, char *str); -void X509V3_section_free( X509V3_CTX *ctx, STACK_OF(CONF_VALUE) *section); -void X509V3_set_ctx(X509V3_CTX *ctx, X509 *issuer, X509 *subject, - X509_REQ *req, X509_CRL *crl, int flags); - -int X509V3_add_value(const char *name, const char *value, - STACK_OF(CONF_VALUE) **extlist); -int X509V3_add_value_uchar(const char *name, const unsigned char *value, - STACK_OF(CONF_VALUE) **extlist); -int X509V3_add_value_bool(const char *name, int asn1_bool, - STACK_OF(CONF_VALUE) **extlist); -int X509V3_add_value_int(const char *name, ASN1_INTEGER *aint, - STACK_OF(CONF_VALUE) **extlist); -char * i2s_ASN1_INTEGER(X509V3_EXT_METHOD *meth, ASN1_INTEGER *aint); -ASN1_INTEGER * s2i_ASN1_INTEGER(X509V3_EXT_METHOD *meth, char *value); -char * i2s_ASN1_ENUMERATED(X509V3_EXT_METHOD *meth, ASN1_ENUMERATED *aint); -char * i2s_ASN1_ENUMERATED_TABLE(X509V3_EXT_METHOD *meth, ASN1_ENUMERATED *aint); -int X509V3_EXT_add(X509V3_EXT_METHOD *ext); -int X509V3_EXT_add_list(X509V3_EXT_METHOD *extlist); -int X509V3_EXT_add_alias(int nid_to, int nid_from); -void X509V3_EXT_cleanup(void); - -const X509V3_EXT_METHOD *X509V3_EXT_get(X509_EXTENSION *ext); -const X509V3_EXT_METHOD *X509V3_EXT_get_nid(int nid); -int X509V3_add_standard_extensions(void); -STACK_OF(CONF_VALUE) *X509V3_parse_list(const char *line); -void *X509V3_EXT_d2i(X509_EXTENSION *ext); -void *X509V3_get_d2i(STACK_OF(X509_EXTENSION) *x, int nid, int *crit, int *idx); - - -X509_EXTENSION *X509V3_EXT_i2d(int ext_nid, int crit, void *ext_struc); -int X509V3_add1_i2d(STACK_OF(X509_EXTENSION) **x, int nid, void *value, int crit, unsigned long flags); - -char *hex_to_string(const unsigned char *buffer, long len); -unsigned char *string_to_hex(const char *str, long *len); -int name_cmp(const char *name, const char *cmp); - -void X509V3_EXT_val_prn(BIO *out, STACK_OF(CONF_VALUE) *val, int indent, - int ml); -int X509V3_EXT_print(BIO *out, X509_EXTENSION *ext, unsigned long flag, int indent); -int X509V3_EXT_print_fp(FILE *out, X509_EXTENSION *ext, int flag, int indent); - -int X509V3_extensions_print(BIO *out, char *title, STACK_OF(X509_EXTENSION) *exts, unsigned long flag, int indent); - -int X509_check_ca(X509 *x); -int X509_check_purpose(X509 *x, int id, int ca); -int X509_supported_extension(X509_EXTENSION *ex); -int X509_PURPOSE_set(int *p, int purpose); -int X509_check_issued(X509 *issuer, X509 *subject); -int X509_check_akid(X509 *issuer, AUTHORITY_KEYID *akid); -int X509_PURPOSE_get_count(void); -X509_PURPOSE * X509_PURPOSE_get0(int idx); -int X509_PURPOSE_get_by_sname(char *sname); -int X509_PURPOSE_get_by_id(int id); -int X509_PURPOSE_add(int id, int trust, int flags, - int (*ck)(const X509_PURPOSE *, const X509 *, int), - char *name, char *sname, void *arg); -char *X509_PURPOSE_get0_name(X509_PURPOSE *xp); -char *X509_PURPOSE_get0_sname(X509_PURPOSE *xp); -int X509_PURPOSE_get_trust(X509_PURPOSE *xp); -void X509_PURPOSE_cleanup(void); -int X509_PURPOSE_get_id(X509_PURPOSE *); - -STACK_OF(OPENSSL_STRING) *X509_get1_email(X509 *x); -STACK_OF(OPENSSL_STRING) *X509_REQ_get1_email(X509_REQ *x); -void X509_email_free(STACK_OF(OPENSSL_STRING) *sk); -STACK_OF(OPENSSL_STRING) *X509_get1_ocsp(X509 *x); - -ASN1_OCTET_STRING *a2i_IPADDRESS(const char *ipasc); -ASN1_OCTET_STRING *a2i_IPADDRESS_NC(const char *ipasc); -int a2i_ipadd(unsigned char *ipout, const char *ipasc); -int X509V3_NAME_from_section(X509_NAME *nm, STACK_OF(CONF_VALUE)*dn_sk, - unsigned long chtype); - -void X509_POLICY_NODE_print(BIO *out, X509_POLICY_NODE *node, int indent); -DECLARE_STACK_OF(X509_POLICY_NODE) - -#ifndef OPENSSL_NO_RFC3779 - -typedef struct ASRange_st { - ASN1_INTEGER *min, *max; -} ASRange; - -#define ASIdOrRange_id 0 -#define ASIdOrRange_range 1 - -typedef struct ASIdOrRange_st { - int type; - union { - ASN1_INTEGER *id; - ASRange *range; - } u; -} ASIdOrRange; - -typedef STACK_OF(ASIdOrRange) ASIdOrRanges; -DECLARE_STACK_OF(ASIdOrRange) - -#define ASIdentifierChoice_inherit 0 -#define ASIdentifierChoice_asIdsOrRanges 1 - -typedef struct ASIdentifierChoice_st { - int type; - union { - ASN1_NULL *inherit; - ASIdOrRanges *asIdsOrRanges; - } u; -} ASIdentifierChoice; - -typedef struct ASIdentifiers_st { - ASIdentifierChoice *asnum, *rdi; -} ASIdentifiers; - -DECLARE_ASN1_FUNCTIONS(ASRange) -DECLARE_ASN1_FUNCTIONS(ASIdOrRange) -DECLARE_ASN1_FUNCTIONS(ASIdentifierChoice) -DECLARE_ASN1_FUNCTIONS(ASIdentifiers) - - -typedef struct IPAddressRange_st { - ASN1_BIT_STRING *min, *max; -} IPAddressRange; - -#define IPAddressOrRange_addressPrefix 0 -#define IPAddressOrRange_addressRange 1 - -typedef struct IPAddressOrRange_st { - int type; - union { - ASN1_BIT_STRING *addressPrefix; - IPAddressRange *addressRange; - } u; -} IPAddressOrRange; - -typedef STACK_OF(IPAddressOrRange) IPAddressOrRanges; -DECLARE_STACK_OF(IPAddressOrRange) - -#define IPAddressChoice_inherit 0 -#define IPAddressChoice_addressesOrRanges 1 - -typedef struct IPAddressChoice_st { - int type; - union { - ASN1_NULL *inherit; - IPAddressOrRanges *addressesOrRanges; - } u; -} IPAddressChoice; - -typedef struct IPAddressFamily_st { - ASN1_OCTET_STRING *addressFamily; - IPAddressChoice *ipAddressChoice; -} IPAddressFamily; - -typedef STACK_OF(IPAddressFamily) IPAddrBlocks; -DECLARE_STACK_OF(IPAddressFamily) - -DECLARE_ASN1_FUNCTIONS(IPAddressRange) -DECLARE_ASN1_FUNCTIONS(IPAddressOrRange) -DECLARE_ASN1_FUNCTIONS(IPAddressChoice) -DECLARE_ASN1_FUNCTIONS(IPAddressFamily) - -/* - * API tag for elements of the ASIdentifer SEQUENCE. - */ -#define V3_ASID_ASNUM 0 -#define V3_ASID_RDI 1 - -/* - * AFI values, assigned by IANA. It'd be nice to make the AFI - * handling code totally generic, but there are too many little things - * that would need to be defined for other address families for it to - * be worth the trouble. - */ -#define IANA_AFI_IPV4 1 -#define IANA_AFI_IPV6 2 - -/* - * Utilities to construct and extract values from RFC3779 extensions, - * since some of the encodings (particularly for IP address prefixes - * and ranges) are a bit tedious to work with directly. - */ -int v3_asid_add_inherit(ASIdentifiers *asid, int which); -int v3_asid_add_id_or_range(ASIdentifiers *asid, int which, - ASN1_INTEGER *min, ASN1_INTEGER *max); -int v3_addr_add_inherit(IPAddrBlocks *addr, - const unsigned afi, const unsigned *safi); -int v3_addr_add_prefix(IPAddrBlocks *addr, - const unsigned afi, const unsigned *safi, - unsigned char *a, const int prefixlen); -int v3_addr_add_range(IPAddrBlocks *addr, - const unsigned afi, const unsigned *safi, - unsigned char *min, unsigned char *max); -unsigned v3_addr_get_afi(const IPAddressFamily *f); -int v3_addr_get_range(IPAddressOrRange *aor, const unsigned afi, - unsigned char *min, unsigned char *max, - const int length); - -/* - * Canonical forms. - */ -int v3_asid_is_canonical(ASIdentifiers *asid); -int v3_addr_is_canonical(IPAddrBlocks *addr); -int v3_asid_canonize(ASIdentifiers *asid); -int v3_addr_canonize(IPAddrBlocks *addr); - -/* - * Tests for inheritance and containment. - */ -int v3_asid_inherits(ASIdentifiers *asid); -int v3_addr_inherits(IPAddrBlocks *addr); -int v3_asid_subset(ASIdentifiers *a, ASIdentifiers *b); -int v3_addr_subset(IPAddrBlocks *a, IPAddrBlocks *b); - -/* - * Check whether RFC 3779 extensions nest properly in chains. - */ -int v3_asid_validate_path(X509_STORE_CTX *); -int v3_addr_validate_path(X509_STORE_CTX *); -int v3_asid_validate_resource_set(STACK_OF(X509) *chain, - ASIdentifiers *ext, - int allow_inheritance); -int v3_addr_validate_resource_set(STACK_OF(X509) *chain, - IPAddrBlocks *ext, - int allow_inheritance); - -#endif /* OPENSSL_NO_RFC3779 */ - -/* BEGIN ERROR CODES */ -/* The following lines are auto generated by the script mkerr.pl. Any changes - * made after this point may be overwritten when the script is next run. - */ -void ERR_load_X509V3_strings(void); - -/* Error codes for the X509V3 functions. */ - -/* Function codes. */ -#define X509V3_F_A2I_GENERAL_NAME 164 -#define X509V3_F_ASIDENTIFIERCHOICE_CANONIZE 161 -#define X509V3_F_ASIDENTIFIERCHOICE_IS_CANONICAL 162 -#define X509V3_F_COPY_EMAIL 122 -#define X509V3_F_COPY_ISSUER 123 -#define X509V3_F_DO_DIRNAME 144 -#define X509V3_F_DO_EXT_CONF 124 -#define X509V3_F_DO_EXT_I2D 135 -#define X509V3_F_DO_EXT_NCONF 151 -#define X509V3_F_DO_I2V_NAME_CONSTRAINTS 148 -#define X509V3_F_GNAMES_FROM_SECTNAME 156 -#define X509V3_F_HEX_TO_STRING 111 -#define X509V3_F_I2S_ASN1_ENUMERATED 121 -#define X509V3_F_I2S_ASN1_IA5STRING 149 -#define X509V3_F_I2S_ASN1_INTEGER 120 -#define X509V3_F_I2V_AUTHORITY_INFO_ACCESS 138 -#define X509V3_F_NOTICE_SECTION 132 -#define X509V3_F_NREF_NOS 133 -#define X509V3_F_POLICY_SECTION 131 -#define X509V3_F_PROCESS_PCI_VALUE 150 -#define X509V3_F_R2I_CERTPOL 130 -#define X509V3_F_R2I_PCI 155 -#define X509V3_F_S2I_ASN1_IA5STRING 100 -#define X509V3_F_S2I_ASN1_INTEGER 108 -#define X509V3_F_S2I_ASN1_OCTET_STRING 112 -#define X509V3_F_S2I_ASN1_SKEY_ID 114 -#define X509V3_F_S2I_SKEY_ID 115 -#define X509V3_F_SET_DIST_POINT_NAME 158 -#define X509V3_F_STRING_TO_HEX 113 -#define X509V3_F_SXNET_ADD_ID_ASC 125 -#define X509V3_F_SXNET_ADD_ID_INTEGER 126 -#define X509V3_F_SXNET_ADD_ID_ULONG 127 -#define X509V3_F_SXNET_GET_ID_ASC 128 -#define X509V3_F_SXNET_GET_ID_ULONG 129 -#define X509V3_F_V2I_ASIDENTIFIERS 163 -#define X509V3_F_V2I_ASN1_BIT_STRING 101 -#define X509V3_F_V2I_AUTHORITY_INFO_ACCESS 139 -#define X509V3_F_V2I_AUTHORITY_KEYID 119 -#define X509V3_F_V2I_BASIC_CONSTRAINTS 102 -#define X509V3_F_V2I_CRLD 134 -#define X509V3_F_V2I_EXTENDED_KEY_USAGE 103 -#define X509V3_F_V2I_GENERAL_NAMES 118 -#define X509V3_F_V2I_GENERAL_NAME_EX 117 -#define X509V3_F_V2I_IDP 157 -#define X509V3_F_V2I_IPADDRBLOCKS 159 -#define X509V3_F_V2I_ISSUER_ALT 153 -#define X509V3_F_V2I_NAME_CONSTRAINTS 147 -#define X509V3_F_V2I_POLICY_CONSTRAINTS 146 -#define X509V3_F_V2I_POLICY_MAPPINGS 145 -#define X509V3_F_V2I_SUBJECT_ALT 154 -#define X509V3_F_V3_ADDR_VALIDATE_PATH_INTERNAL 160 -#define X509V3_F_V3_GENERIC_EXTENSION 116 -#define X509V3_F_X509V3_ADD1_I2D 140 -#define X509V3_F_X509V3_ADD_VALUE 105 -#define X509V3_F_X509V3_EXT_ADD 104 -#define X509V3_F_X509V3_EXT_ADD_ALIAS 106 -#define X509V3_F_X509V3_EXT_CONF 107 -#define X509V3_F_X509V3_EXT_I2D 136 -#define X509V3_F_X509V3_EXT_NCONF 152 -#define X509V3_F_X509V3_GET_SECTION 142 -#define X509V3_F_X509V3_GET_STRING 143 -#define X509V3_F_X509V3_GET_VALUE_BOOL 110 -#define X509V3_F_X509V3_PARSE_LIST 109 -#define X509V3_F_X509_PURPOSE_ADD 137 -#define X509V3_F_X509_PURPOSE_SET 141 - -/* Reason codes. */ -#define X509V3_R_BAD_IP_ADDRESS 118 -#define X509V3_R_BAD_OBJECT 119 -#define X509V3_R_BN_DEC2BN_ERROR 100 -#define X509V3_R_BN_TO_ASN1_INTEGER_ERROR 101 -#define X509V3_R_DIRNAME_ERROR 149 -#define X509V3_R_DISTPOINT_ALREADY_SET 160 -#define X509V3_R_DUPLICATE_ZONE_ID 133 -#define X509V3_R_ERROR_CONVERTING_ZONE 131 -#define X509V3_R_ERROR_CREATING_EXTENSION 144 -#define X509V3_R_ERROR_IN_EXTENSION 128 -#define X509V3_R_EXPECTED_A_SECTION_NAME 137 -#define X509V3_R_EXTENSION_EXISTS 145 -#define X509V3_R_EXTENSION_NAME_ERROR 115 -#define X509V3_R_EXTENSION_NOT_FOUND 102 -#define X509V3_R_EXTENSION_SETTING_NOT_SUPPORTED 103 -#define X509V3_R_EXTENSION_VALUE_ERROR 116 -#define X509V3_R_ILLEGAL_EMPTY_EXTENSION 151 -#define X509V3_R_ILLEGAL_HEX_DIGIT 113 -#define X509V3_R_INCORRECT_POLICY_SYNTAX_TAG 152 -#define X509V3_R_INVALID_MULTIPLE_RDNS 161 -#define X509V3_R_INVALID_ASNUMBER 162 -#define X509V3_R_INVALID_ASRANGE 163 -#define X509V3_R_INVALID_BOOLEAN_STRING 104 -#define X509V3_R_INVALID_EXTENSION_STRING 105 -#define X509V3_R_INVALID_INHERITANCE 165 -#define X509V3_R_INVALID_IPADDRESS 166 -#define X509V3_R_INVALID_NAME 106 -#define X509V3_R_INVALID_NULL_ARGUMENT 107 -#define X509V3_R_INVALID_NULL_NAME 108 -#define X509V3_R_INVALID_NULL_VALUE 109 -#define X509V3_R_INVALID_NUMBER 140 -#define X509V3_R_INVALID_NUMBERS 141 -#define X509V3_R_INVALID_OBJECT_IDENTIFIER 110 -#define X509V3_R_INVALID_OPTION 138 -#define X509V3_R_INVALID_POLICY_IDENTIFIER 134 -#define X509V3_R_INVALID_PROXY_POLICY_SETTING 153 -#define X509V3_R_INVALID_PURPOSE 146 -#define X509V3_R_INVALID_SAFI 164 -#define X509V3_R_INVALID_SECTION 135 -#define X509V3_R_INVALID_SYNTAX 143 -#define X509V3_R_ISSUER_DECODE_ERROR 126 -#define X509V3_R_MISSING_VALUE 124 -#define X509V3_R_NEED_ORGANIZATION_AND_NUMBERS 142 -#define X509V3_R_NO_CONFIG_DATABASE 136 -#define X509V3_R_NO_ISSUER_CERTIFICATE 121 -#define X509V3_R_NO_ISSUER_DETAILS 127 -#define X509V3_R_NO_POLICY_IDENTIFIER 139 -#define X509V3_R_NO_PROXY_CERT_POLICY_LANGUAGE_DEFINED 154 -#define X509V3_R_NO_PUBLIC_KEY 114 -#define X509V3_R_NO_SUBJECT_DETAILS 125 -#define X509V3_R_ODD_NUMBER_OF_DIGITS 112 -#define X509V3_R_OPERATION_NOT_DEFINED 148 -#define X509V3_R_OTHERNAME_ERROR 147 -#define X509V3_R_POLICY_LANGUAGE_ALREADY_DEFINED 155 -#define X509V3_R_POLICY_PATH_LENGTH 156 -#define X509V3_R_POLICY_PATH_LENGTH_ALREADY_DEFINED 157 -#define X509V3_R_POLICY_SYNTAX_NOT_CURRENTLY_SUPPORTED 158 -#define X509V3_R_POLICY_WHEN_PROXY_LANGUAGE_REQUIRES_NO_POLICY 159 -#define X509V3_R_SECTION_NOT_FOUND 150 -#define X509V3_R_UNABLE_TO_GET_ISSUER_DETAILS 122 -#define X509V3_R_UNABLE_TO_GET_ISSUER_KEYID 123 -#define X509V3_R_UNKNOWN_BIT_STRING_ARGUMENT 111 -#define X509V3_R_UNKNOWN_EXTENSION 129 -#define X509V3_R_UNKNOWN_EXTENSION_NAME 130 -#define X509V3_R_UNKNOWN_OPTION 120 -#define X509V3_R_UNSUPPORTED_OPTION 117 -#define X509V3_R_UNSUPPORTED_TYPE 167 -#define X509V3_R_USER_TOO_LONG 132 - -#ifdef __cplusplus -} -#endif -#endif diff --git a/Pods/OpenSSL-Universal/lib-ios/libcrypto.a b/Pods/OpenSSL-Universal/lib-ios/libcrypto.a index d15cd2c4..74f4d212 100644 Binary files a/Pods/OpenSSL-Universal/lib-ios/libcrypto.a and b/Pods/OpenSSL-Universal/lib-ios/libcrypto.a differ diff --git a/Pods/OpenSSL-Universal/lib-ios/libssl.a b/Pods/OpenSSL-Universal/lib-ios/libssl.a index f62f9927..343dfa71 100644 Binary files a/Pods/OpenSSL-Universal/lib-ios/libssl.a and b/Pods/OpenSSL-Universal/lib-ios/libssl.a differ diff --git a/Pods/OpenSSL-Universal/lib-osx/libcrypto.a b/Pods/OpenSSL-Universal/lib-osx/libcrypto.a deleted file mode 100644 index 973b132d..00000000 Binary files a/Pods/OpenSSL-Universal/lib-osx/libcrypto.a and /dev/null differ diff --git a/Pods/OpenSSL-Universal/lib-osx/libssl.a b/Pods/OpenSSL-Universal/lib-osx/libssl.a deleted file mode 100644 index 2256678e..00000000 Binary files a/Pods/OpenSSL-Universal/lib-osx/libssl.a and /dev/null differ diff --git a/Pods/Pods-ObjectivePGP-OpenSSL-Universal-Private.xcconfig b/Pods/Pods-ObjectivePGP-OpenSSL-Universal-Private.xcconfig deleted file mode 100644 index 961583eb..00000000 --- a/Pods/Pods-ObjectivePGP-OpenSSL-Universal-Private.xcconfig +++ /dev/null @@ -1,6 +0,0 @@ -#include "Pods-ObjectivePGP-OpenSSL-Universal.xcconfig" -GCC_PREPROCESSOR_DEFINITIONS = COCOAPODS=1 -HEADER_SEARCH_PATHS = "${PODS_ROOT}/BuildHeaders" "${PODS_ROOT}/BuildHeaders/OpenSSL-Universal" "${PODS_ROOT}/BuildHeaders/OpenSSL-Universal/openssl" "${PODS_ROOT}/Headers" "${PODS_ROOT}/Headers/OpenSSL-Universal" "${PODS_ROOT}/Headers/OpenSSL-Universal/openssl" -LIBRARY_SEARCH_PATHS = ${PODS_OBJECTIVEPGP_OPENSSL_UNIVERSAL_LIBRARY_SEARCH_PATHS} -OTHER_LDFLAGS = -ObjC ${PODS_OBJECTIVEPGP_OPENSSL_UNIVERSAL_OTHER_LDFLAGS} -PODS_ROOT = ${SRCROOT} \ No newline at end of file diff --git a/Pods/Pods-ObjectivePGP.xcconfig b/Pods/Pods-ObjectivePGP.xcconfig deleted file mode 100644 index b58d4848..00000000 --- a/Pods/Pods-ObjectivePGP.xcconfig +++ /dev/null @@ -1,6 +0,0 @@ -GCC_PREPROCESSOR_DEFINITIONS = $(inherited) COCOAPODS=1 -HEADER_SEARCH_PATHS = "${PODS_ROOT}/Headers" "${PODS_ROOT}/Headers/OpenSSL-Universal" "${PODS_ROOT}/Headers/OpenSSL-Universal/openssl" -LIBRARY_SEARCH_PATHS = "$(PODS_ROOT)/OpenSSL-Universal/lib-ios" "$(PODS_ROOT)/OpenSSL-Universal/lib-ios" -OTHER_CFLAGS = $(inherited) -isystem "${PODS_ROOT}/Headers" -isystem "${PODS_ROOT}/Headers/OpenSSL-Universal" -isystem "${PODS_ROOT}/Headers/OpenSSL-Universal/openssl" -OTHER_LDFLAGS = -ObjC -lcrypto -lssl -PODS_ROOT = ${SRCROOT}/Pods \ No newline at end of file diff --git a/Pods/Pods-ObjectivePGPOSX-OpenSSL-Universal-Private.xcconfig b/Pods/Pods-ObjectivePGPOSX-OpenSSL-Universal-Private.xcconfig deleted file mode 100644 index 2e7c5cef..00000000 --- a/Pods/Pods-ObjectivePGPOSX-OpenSSL-Universal-Private.xcconfig +++ /dev/null @@ -1,6 +0,0 @@ -#include "Pods-ObjectivePGPOSX-OpenSSL-Universal.xcconfig" -GCC_PREPROCESSOR_DEFINITIONS = COCOAPODS=1 -HEADER_SEARCH_PATHS = "${PODS_ROOT}/BuildHeaders" "${PODS_ROOT}/BuildHeaders/OpenSSL-Universal" "${PODS_ROOT}/BuildHeaders/OpenSSL-Universal/openssl" "${PODS_ROOT}/Headers" "${PODS_ROOT}/Headers/OpenSSL-Universal" "${PODS_ROOT}/Headers/OpenSSL-Universal/openssl" -LIBRARY_SEARCH_PATHS = ${PODS_OBJECTIVEPGPOSX_OPENSSL_UNIVERSAL_LIBRARY_SEARCH_PATHS} -OTHER_LDFLAGS = -ObjC ${PODS_OBJECTIVEPGPOSX_OPENSSL_UNIVERSAL_OTHER_LDFLAGS} -PODS_ROOT = ${SRCROOT} \ No newline at end of file diff --git a/Pods/Pods-ObjectivePGPOSX-OpenSSL-Universal-dummy.m b/Pods/Pods-ObjectivePGPOSX-OpenSSL-Universal-dummy.m deleted file mode 100644 index e6a5f96b..00000000 --- a/Pods/Pods-ObjectivePGPOSX-OpenSSL-Universal-dummy.m +++ /dev/null @@ -1,5 +0,0 @@ -#import -@interface PodsDummy_Pods_ObjectivePGPOSX_OpenSSL_Universal : NSObject -@end -@implementation PodsDummy_Pods_ObjectivePGPOSX_OpenSSL_Universal -@end diff --git a/Pods/Pods-ObjectivePGPOSX-OpenSSL-Universal-prefix.pch b/Pods/Pods-ObjectivePGPOSX-OpenSSL-Universal-prefix.pch deleted file mode 100644 index 9d59f471..00000000 --- a/Pods/Pods-ObjectivePGPOSX-OpenSSL-Universal-prefix.pch +++ /dev/null @@ -1,5 +0,0 @@ -#ifdef __OBJC__ -#import -#endif - -#import "Pods-ObjectivePGPOSX-environment.h" diff --git a/Pods/Pods-ObjectivePGPOSX-OpenSSL-Universal.xcconfig b/Pods/Pods-ObjectivePGPOSX-OpenSSL-Universal.xcconfig deleted file mode 100644 index f896400d..00000000 --- a/Pods/Pods-ObjectivePGPOSX-OpenSSL-Universal.xcconfig +++ /dev/null @@ -1,2 +0,0 @@ -PODS_OBJECTIVEPGPOSX_OPENSSL_UNIVERSAL_LIBRARY_SEARCH_PATHS = "$(PODS_ROOT)/OpenSSL-Universal/lib-osx" "$(PODS_ROOT)/OpenSSL-Universal/lib-osx" -PODS_OBJECTIVEPGPOSX_OPENSSL_UNIVERSAL_OTHER_LDFLAGS = -lcrypto -lssl \ No newline at end of file diff --git a/Pods/Pods-ObjectivePGPOSX-acknowledgements.markdown b/Pods/Pods-ObjectivePGPOSX-acknowledgements.markdown deleted file mode 100644 index ff3b143d..00000000 --- a/Pods/Pods-ObjectivePGPOSX-acknowledgements.markdown +++ /dev/null @@ -1,134 +0,0 @@ -# Acknowledgements -This application makes use of the following third party libraries: - -## OpenSSL-Universal - - - LICENSE ISSUES - ============== - - The OpenSSL toolkit stays under a dual license, i.e. both the conditions of - the OpenSSL License and the original SSLeay license apply to the toolkit. - See below for the actual license texts. Actually both licenses are BSD-style - Open Source licenses. In case of any license issues related to OpenSSL - please contact openssl-core@openssl.org. - - OpenSSL License - --------------- - -/* ==================================================================== - * Copyright (c) 1998-2008 The OpenSSL Project. All rights reserved. - * - * Redistribution and use in source and binary forms, with or without - * modification, are permitted provided that the following conditions - * are met: - * - * 1. Redistributions of source code must retain the above copyright - * notice, this list of conditions and the following disclaimer. - * - * 2. Redistributions in binary form must reproduce the above copyright - * notice, this list of conditions and the following disclaimer in - * the documentation and/or other materials provided with the - * distribution. - * - * 3. All advertising materials mentioning features or use of this - * software must display the following acknowledgment: - * "This product includes software developed by the OpenSSL Project - * for use in the OpenSSL Toolkit. (http://www.openssl.org/)" - * - * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to - * endorse or promote products derived from this software without - * prior written permission. For written permission, please contact - * openssl-core@openssl.org. - * - * 5. Products derived from this software may not be called "OpenSSL" - * nor may "OpenSSL" appear in their names without prior written - * permission of the OpenSSL Project. - * - * 6. Redistributions of any form whatsoever must retain the following - * acknowledgment: - * "This product includes software developed by the OpenSSL Project - * for use in the OpenSSL Toolkit (http://www.openssl.org/)" - * - * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY - * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE - * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR - * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR - * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, - * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT - * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; - * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) - * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, - * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) - * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED - * OF THE POSSIBILITY OF SUCH DAMAGE. - * ==================================================================== - * - * This product includes cryptographic software written by Eric Young - * (eay@cryptsoft.com). This product includes software written by Tim - * Hudson (tjh@cryptsoft.com). - * - */ - - Original SSLeay License - ----------------------- - -/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) - * All rights reserved. - * - * This package is an SSL implementation written - * by Eric Young (eay@cryptsoft.com). - * The implementation was written so as to conform with Netscapes SSL. - * - * This library is free for commercial and non-commercial use as long as - * the following conditions are aheared to. The following conditions - * apply to all code found in this distribution, be it the RC4, RSA, - * lhash, DES, etc., code; not just the SSL code. The SSL documentation - * included with this distribution is covered by the same copyright terms - * except that the holder is Tim Hudson (tjh@cryptsoft.com). - * - * Copyright remains Eric Young's, and as such any Copyright notices in - * the code are not to be removed. - * If this package is used in a product, Eric Young should be given attribution - * as the author of the parts of the library used. - * This can be in the form of a textual message at program startup or - * in documentation (online or textual) provided with the package. - * - * Redistribution and use in source and binary forms, with or without - * modification, are permitted provided that the following conditions - * are met: - * 1. Redistributions of source code must retain the copyright - * notice, this list of conditions and the following disclaimer. - * 2. Redistributions in binary form must reproduce the above copyright - * notice, this list of conditions and the following disclaimer in the - * documentation and/or other materials provided with the distribution. - * 3. All advertising materials mentioning features or use of this software - * must display the following acknowledgement: - * "This product includes cryptographic software written by - * Eric Young (eay@cryptsoft.com)" - * The word 'cryptographic' can be left out if the rouines from the library - * being used are not cryptographic related :-). - * 4. If you include any Windows specific code (or a derivative thereof) from - * the apps directory (application code) you must include an acknowledgement: - * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" - * - * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND - * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE - * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE - * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE - * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL - * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS - * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) - * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT - * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY - * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF - * SUCH DAMAGE. - * - * The licence and distribution terms for any publically available version or - * derivative of this code cannot be changed. i.e. this code cannot simply be - * copied and put under another distribution licence - * [including the GNU Public Licence.] - */ - - -Generated by CocoaPods - http://cocoapods.org diff --git a/Pods/Pods-ObjectivePGPOSX-acknowledgements.plist b/Pods/Pods-ObjectivePGPOSX-acknowledgements.plist deleted file mode 100644 index 832789f1..00000000 --- a/Pods/Pods-ObjectivePGPOSX-acknowledgements.plist +++ /dev/null @@ -1,164 +0,0 @@ - - - - - PreferenceSpecifiers - - - FooterText - This application makes use of the following third party libraries: - Title - Acknowledgements - Type - PSGroupSpecifier - - - FooterText - - LICENSE ISSUES - ============== - - The OpenSSL toolkit stays under a dual license, i.e. both the conditions of - the OpenSSL License and the original SSLeay license apply to the toolkit. - See below for the actual license texts. Actually both licenses are BSD-style - Open Source licenses. In case of any license issues related to OpenSSL - please contact openssl-core@openssl.org. - - OpenSSL License - --------------- - -/* ==================================================================== - * Copyright (c) 1998-2008 The OpenSSL Project. All rights reserved. - * - * Redistribution and use in source and binary forms, with or without - * modification, are permitted provided that the following conditions - * are met: - * - * 1. Redistributions of source code must retain the above copyright - * notice, this list of conditions and the following disclaimer. - * - * 2. Redistributions in binary form must reproduce the above copyright - * notice, this list of conditions and the following disclaimer in - * the documentation and/or other materials provided with the - * distribution. - * - * 3. All advertising materials mentioning features or use of this - * software must display the following acknowledgment: - * "This product includes software developed by the OpenSSL Project - * for use in the OpenSSL Toolkit. (http://www.openssl.org/)" - * - * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to - * endorse or promote products derived from this software without - * prior written permission. For written permission, please contact - * openssl-core@openssl.org. - * - * 5. Products derived from this software may not be called "OpenSSL" - * nor may "OpenSSL" appear in their names without prior written - * permission of the OpenSSL Project. - * - * 6. Redistributions of any form whatsoever must retain the following - * acknowledgment: - * "This product includes software developed by the OpenSSL Project - * for use in the OpenSSL Toolkit (http://www.openssl.org/)" - * - * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY - * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE - * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR - * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR - * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, - * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT - * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; - * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) - * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, - * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) - * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED - * OF THE POSSIBILITY OF SUCH DAMAGE. - * ==================================================================== - * - * This product includes cryptographic software written by Eric Young - * (eay@cryptsoft.com). This product includes software written by Tim - * Hudson (tjh@cryptsoft.com). - * - */ - - Original SSLeay License - ----------------------- - -/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) - * All rights reserved. - * - * This package is an SSL implementation written - * by Eric Young (eay@cryptsoft.com). - * The implementation was written so as to conform with Netscapes SSL. - * - * This library is free for commercial and non-commercial use as long as - * the following conditions are aheared to. The following conditions - * apply to all code found in this distribution, be it the RC4, RSA, - * lhash, DES, etc., code; not just the SSL code. The SSL documentation - * included with this distribution is covered by the same copyright terms - * except that the holder is Tim Hudson (tjh@cryptsoft.com). - * - * Copyright remains Eric Young's, and as such any Copyright notices in - * the code are not to be removed. - * If this package is used in a product, Eric Young should be given attribution - * as the author of the parts of the library used. - * This can be in the form of a textual message at program startup or - * in documentation (online or textual) provided with the package. - * - * Redistribution and use in source and binary forms, with or without - * modification, are permitted provided that the following conditions - * are met: - * 1. Redistributions of source code must retain the copyright - * notice, this list of conditions and the following disclaimer. - * 2. Redistributions in binary form must reproduce the above copyright - * notice, this list of conditions and the following disclaimer in the - * documentation and/or other materials provided with the distribution. - * 3. All advertising materials mentioning features or use of this software - * must display the following acknowledgement: - * "This product includes cryptographic software written by - * Eric Young (eay@cryptsoft.com)" - * The word 'cryptographic' can be left out if the rouines from the library - * being used are not cryptographic related :-). - * 4. If you include any Windows specific code (or a derivative thereof) from - * the apps directory (application code) you must include an acknowledgement: - * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" - * - * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND - * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE - * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE - * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE - * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL - * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS - * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) - * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT - * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY - * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF - * SUCH DAMAGE. - * - * The licence and distribution terms for any publically available version or - * derivative of this code cannot be changed. i.e. this code cannot simply be - * copied and put under another distribution licence - * [including the GNU Public Licence.] - */ - - - Title - OpenSSL-Universal - Type - PSGroupSpecifier - - - FooterText - Generated by CocoaPods - http://cocoapods.org - Title - - Type - PSGroupSpecifier - - - StringsTable - Acknowledgements - Title - Acknowledgements - - diff --git a/Pods/Pods-ObjectivePGPOSX-dummy.m b/Pods/Pods-ObjectivePGPOSX-dummy.m deleted file mode 100644 index 08d88f30..00000000 --- a/Pods/Pods-ObjectivePGPOSX-dummy.m +++ /dev/null @@ -1,5 +0,0 @@ -#import -@interface PodsDummy_Pods_ObjectivePGPOSX : NSObject -@end -@implementation PodsDummy_Pods_ObjectivePGPOSX -@end diff --git a/Pods/Pods-ObjectivePGPOSX-environment.h b/Pods/Pods-ObjectivePGPOSX-environment.h deleted file mode 100644 index 0f3626dd..00000000 --- a/Pods/Pods-ObjectivePGPOSX-environment.h +++ /dev/null @@ -1,15 +0,0 @@ - -// To check if a library is compiled with CocoaPods you -// can use the `COCOAPODS` macro definition which is -// defined in the xcconfigs so it is available in -// headers also when they are imported in the client -// project. - - -// OpenSSL-Universal -#define COCOAPODS_POD_AVAILABLE_OpenSSL_Universal -// This library does not follow semantic-versioning, -// so we were not able to define version macros. -// Please contact the author. -// Version: 1.0.1.h. - diff --git a/Pods/Pods-ObjectivePGPOSX-resources.sh b/Pods/Pods-ObjectivePGPOSX-resources.sh deleted file mode 100755 index 6fff7a09..00000000 --- a/Pods/Pods-ObjectivePGPOSX-resources.sh +++ /dev/null @@ -1,68 +0,0 @@ -#!/bin/sh -set -e - -RESOURCES_TO_COPY=${PODS_ROOT}/resources-to-copy-${TARGETNAME}.txt -> "$RESOURCES_TO_COPY" - -install_resource() -{ - case $1 in - *.storyboard) - echo "ibtool --errors --warnings --notices --output-format human-readable-text --compile ${CONFIGURATION_BUILD_DIR}/${UNLOCALIZED_RESOURCES_FOLDER_PATH}/`basename \"$1\" .storyboard`.storyboardc ${PODS_ROOT}/$1 --sdk ${SDKROOT}" - ibtool --errors --warnings --notices --output-format human-readable-text --compile "${CONFIGURATION_BUILD_DIR}/${UNLOCALIZED_RESOURCES_FOLDER_PATH}/`basename \"$1\" .storyboard`.storyboardc" "${PODS_ROOT}/$1" --sdk "${SDKROOT}" - ;; - *.xib) - echo "ibtool --errors --warnings --notices --output-format human-readable-text --compile ${CONFIGURATION_BUILD_DIR}/${UNLOCALIZED_RESOURCES_FOLDER_PATH}/`basename \"$1\" .xib`.nib ${PODS_ROOT}/$1 --sdk ${SDKROOT}" - ibtool --errors --warnings --notices --output-format human-readable-text --compile "${CONFIGURATION_BUILD_DIR}/${UNLOCALIZED_RESOURCES_FOLDER_PATH}/`basename \"$1\" .xib`.nib" "${PODS_ROOT}/$1" --sdk "${SDKROOT}" - ;; - *.framework) - echo "mkdir -p ${CONFIGURATION_BUILD_DIR}/${FRAMEWORKS_FOLDER_PATH}" - mkdir -p "${CONFIGURATION_BUILD_DIR}/${FRAMEWORKS_FOLDER_PATH}" - echo "rsync -av ${PODS_ROOT}/$1 ${CONFIGURATION_BUILD_DIR}/${FRAMEWORKS_FOLDER_PATH}" - rsync -av "${PODS_ROOT}/$1" "${CONFIGURATION_BUILD_DIR}/${FRAMEWORKS_FOLDER_PATH}" - ;; - *.xcdatamodel) - echo "xcrun momc \"${PODS_ROOT}/$1\" \"${CONFIGURATION_BUILD_DIR}/${UNLOCALIZED_RESOURCES_FOLDER_PATH}/`basename "$1"`.mom\"" - xcrun momc "${PODS_ROOT}/$1" "${CONFIGURATION_BUILD_DIR}/${UNLOCALIZED_RESOURCES_FOLDER_PATH}/`basename "$1" .xcdatamodel`.mom" - ;; - *.xcdatamodeld) - echo "xcrun momc \"${PODS_ROOT}/$1\" \"${CONFIGURATION_BUILD_DIR}/${UNLOCALIZED_RESOURCES_FOLDER_PATH}/`basename "$1" .xcdatamodeld`.momd\"" - xcrun momc "${PODS_ROOT}/$1" "${CONFIGURATION_BUILD_DIR}/${UNLOCALIZED_RESOURCES_FOLDER_PATH}/`basename "$1" .xcdatamodeld`.momd" - ;; - *.xcassets) - ;; - /*) - echo "$1" - echo "$1" >> "$RESOURCES_TO_COPY" - ;; - *) - echo "${PODS_ROOT}/$1" - echo "${PODS_ROOT}/$1" >> "$RESOURCES_TO_COPY" - ;; - esac -} - -rsync -avr --copy-links --no-relative --exclude '*/.svn/*' --files-from="$RESOURCES_TO_COPY" / "${CONFIGURATION_BUILD_DIR}/${UNLOCALIZED_RESOURCES_FOLDER_PATH}" -if [[ "${ACTION}" == "install" ]]; then - rsync -avr --copy-links --no-relative --exclude '*/.svn/*' --files-from="$RESOURCES_TO_COPY" / "${INSTALL_DIR}/${UNLOCALIZED_RESOURCES_FOLDER_PATH}" -fi -rm -f "$RESOURCES_TO_COPY" - -if [[ -n "${WRAPPER_EXTENSION}" ]] && [ `xcrun --find actool` ] && [ `find . -name '*.xcassets' | wc -l` -ne 0 ] -then - case "${TARGETED_DEVICE_FAMILY}" in - 1,2) - TARGET_DEVICE_ARGS="--target-device ipad --target-device iphone" - ;; - 1) - TARGET_DEVICE_ARGS="--target-device iphone" - ;; - 2) - TARGET_DEVICE_ARGS="--target-device ipad" - ;; - *) - TARGET_DEVICE_ARGS="--target-device mac" - ;; - esac - find "${PWD}" -name "*.xcassets" -print0 | xargs -0 actool --output-format human-readable-text --notices --warnings --platform "${PLATFORM_NAME}" --minimum-deployment-target "${IPHONEOS_DEPLOYMENT_TARGET}" ${TARGET_DEVICE_ARGS} --compress-pngs --compile "${BUILT_PRODUCTS_DIR}/${UNLOCALIZED_RESOURCES_FOLDER_PATH}" -fi diff --git a/Pods/Pods-ObjectivePGPOSX.xcconfig b/Pods/Pods-ObjectivePGPOSX.xcconfig deleted file mode 100644 index d9e3703d..00000000 --- a/Pods/Pods-ObjectivePGPOSX.xcconfig +++ /dev/null @@ -1,6 +0,0 @@ -GCC_PREPROCESSOR_DEFINITIONS = $(inherited) COCOAPODS=1 -HEADER_SEARCH_PATHS = "${PODS_ROOT}/Headers" "${PODS_ROOT}/Headers/OpenSSL-Universal" "${PODS_ROOT}/Headers/OpenSSL-Universal/openssl" -LIBRARY_SEARCH_PATHS = "$(PODS_ROOT)/OpenSSL-Universal/lib-osx" "$(PODS_ROOT)/OpenSSL-Universal/lib-osx" -OTHER_CFLAGS = $(inherited) -isystem "${PODS_ROOT}/Headers" -isystem "${PODS_ROOT}/Headers/OpenSSL-Universal" -isystem "${PODS_ROOT}/Headers/OpenSSL-Universal/openssl" -OTHER_LDFLAGS = -ObjC -lcrypto -lssl -PODS_ROOT = ${SRCROOT}/Pods \ No newline at end of file diff --git a/Pods/Pods.xcodeproj/project.pbxproj b/Pods/Pods.xcodeproj/project.pbxproj index 0a303309..7aaf684f 100644 --- a/Pods/Pods.xcodeproj/project.pbxproj +++ b/Pods/Pods.xcodeproj/project.pbxproj @@ -1,5222 +1,733 @@ - - - - - archiveVersion - 1 - classes - - objectVersion - 46 - objects - - 00A94B71DC0340E8AF84261D - - fileRef - DE086473EB5946FABB8FA49B - isa - PBXBuildFile - - 029C904B82DD4A3D867A93A8 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - path - Pods-ObjectivePGPOSX-environment.h - sourceTree - <group> - - 02C97B397F1F4FA1A15ECD5D - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - pem2.h - path - include-osx/openssl/pem2.h - sourceTree - <group> - - 039C44251EC249DFBF97E4BE - - buildConfigurationList - 3CDEC44444F1451C90462C79 - buildPhases - - 726941417D5144B3BAD98676 - BA2A5C08C19A4ABEBCDC2D92 - - buildRules - - dependencies - - 22A3E3629906422ABBFC9FC8 - - isa - PBXNativeTarget - name - Pods-ObjectivePGPOSX - productName - Pods-ObjectivePGPOSX - productReference - 8D49B356C5DE4C52BBDAABC7 - productType - com.apple.product-type.library.static - - 04135D6075514F8A9F652166 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - pkcs12.h - path - include-osx/openssl/pkcs12.h - sourceTree - <group> - - 0470C184C6934FD689273ED7 - - fileRef - 1A9429215A8B414AA963BAB8 - isa - PBXBuildFile - - 0479358D495E47CE9ED06E42 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - asn1t.h - path - include-osx/openssl/asn1t.h - sourceTree - <group> - - 04C61415507F4D3480495BE6 - - fileRef - 835D69AAF46F41249D2E1B26 - isa - PBXBuildFile - - 04F13483FC924863B10C6173 - - fileRef - C34438E4AC1446928C13E8DC - isa - PBXBuildFile - - 0533BCE38D024F6C9D775AA3 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - des.h - path - include-osx/openssl/des.h - sourceTree - <group> - - 059915778FA94DE892DB4240 - - baseConfigurationReference - A4F14B14C9494DCAAB297708 - buildSettings - - ALWAYS_SEARCH_USER_PATHS - NO - COPY_PHASE_STRIP - YES - DSTROOT - /tmp/xcodeproj.dst - GCC_C_LANGUAGE_STANDARD - gnu99 - GCC_PRECOMPILE_PREFIX_HEADER - YES - GCC_VERSION - com.apple.compilers.llvm.clang.1_0 - INSTALL_PATH - $(BUILT_PRODUCTS_DIR) - IPHONEOS_DEPLOYMENT_TARGET - 6.0 - OTHER_CFLAGS - - -DNS_BLOCK_ASSERTIONS=1 - $(inherited) - - OTHER_CPLUSPLUSFLAGS - - -DNS_BLOCK_ASSERTIONS=1 - $(inherited) - - OTHER_LDFLAGS - - PRODUCT_NAME - $(TARGET_NAME) - PUBLIC_HEADERS_FOLDER_PATH - $(TARGET_NAME) - SDKROOT - iphoneos - SKIP_INSTALL - YES - VALIDATE_PRODUCT - YES - - isa - XCBuildConfiguration - name - Release - - 05B1B51B53494D14A4E7E3B8 - - fileRef - A9355F2A64EC4F24ABD5E409 - isa - PBXBuildFile - - 05B6F8120430439AB47C74E9 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - safestack.h - path - include-ios/openssl/safestack.h - sourceTree - <group> - - 063BBD634DC54D27BF3A0738 - - fileRef - 76BBA853D3BE4A13B98F6E55 - isa - PBXBuildFile - - 075792FA36DE493B8FE915F4 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - text.xcconfig - path - Pods-ObjectivePGPOSX-OpenSSL-Universal.xcconfig - sourceTree - <group> - - 07E14846BBEE49308789D199 - - fileRef - D1D8862A96C740E98008455F - isa - PBXBuildFile - - 097381BE4D754CB898A6E1B4 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - pem.h - path - include-ios/openssl/pem.h - sourceTree - <group> - - 0C4F621B3C654395B1726BD7 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - dso.h - path - include-osx/openssl/dso.h - sourceTree - <group> - - 0C8DE13D98BC425598D4D093 - - fileRef - AF8733B3F9BE453A9ED24A41 - isa - PBXBuildFile - - 0EC73805E5B64D04A606750C - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - rc2.h - path - include-osx/openssl/rc2.h - sourceTree - <group> - - 0F49E4AF7DA14959BC8B498D - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - cms.h - path - include-osx/openssl/cms.h - sourceTree - <group> - - 107D2944F6554D709B969E35 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - text.xcconfig - path - Pods-ObjectivePGPOSX.xcconfig - sourceTree - <group> - - 115C240D8C184634AEF1A275 - - fileRef - E03A3F04D4704C6A9A28833E - isa - PBXBuildFile - - 116590952C734E10A50FC6D7 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - ui.h - path - include-ios/openssl/ui.h - sourceTree - <group> - - 12B9A78E82194602A51C03A7 - - buildActionMask - 2147483647 - files - - C8E799FD13E5479A8229A979 - - isa - PBXSourcesBuildPhase - runOnlyForDeploymentPostprocessing - 0 - - 12E56F29A61F45A09FF3096F - - fileRef - 95432C50901941A6A950F183 - isa - PBXBuildFile - - 142C320E960249A1BFC35819 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - text.script.sh - path - Pods-ObjectivePGP-resources.sh - sourceTree - <group> - - 15C88058CCE14F98AEE8C9B8 - - baseConfigurationReference - 107D2944F6554D709B969E35 - buildSettings - - ALWAYS_SEARCH_USER_PATHS - NO - ARCHS - $(ARCHS_STANDARD_32_64_BIT) - COMBINE_HIDPI_IMAGES - YES - COPY_PHASE_STRIP - NO - DSTROOT - /tmp/xcodeproj.dst - GCC_C_LANGUAGE_STANDARD - gnu99 - GCC_DYNAMIC_NO_PIC - NO - GCC_ENABLE_OBJC_EXCEPTIONS - YES - GCC_OPTIMIZATION_LEVEL - 0 - GCC_PRECOMPILE_PREFIX_HEADER - YES - GCC_PREPROCESSOR_DEFINITIONS - - DEBUG=1 - $(inherited) - - GCC_SYMBOLS_PRIVATE_EXTERN - NO - GCC_VERSION - com.apple.compilers.llvm.clang.1_0 - INSTALL_PATH - $(BUILT_PRODUCTS_DIR) - MACOSX_DEPLOYMENT_TARGET - 10.7 - OTHER_LDFLAGS - - PRODUCT_NAME - $(TARGET_NAME) - SDKROOT - macosx - SKIP_INSTALL - YES - - isa - XCBuildConfiguration - name - Debug - - 16E5D4760AB746E6A41CF8F5 - - fileRef - B00B0415E77446A2A3E748EB - isa - PBXBuildFile - - 17630A3AA42D486F9A4B7C4A - - buildConfigurations - - 4899D21AE93D4149ACB947A5 - 059915778FA94DE892DB4240 - - defaultConfigurationIsVisible - 0 - defaultConfigurationName - Release - isa - XCConfigurationList - - 17D5B2D413A84FC0AA15332A - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - txt_db.h - path - include-ios/openssl/txt_db.h - sourceTree - <group> - - 190543358F3B46A29BF5F8DA - - fileRef - F178C0BDC07B492B8596F24F - isa - PBXBuildFile - - 1A9429215A8B414AA963BAB8 - - isa - PBXFileReference - lastKnownFileType - wrapper.framework - name - Cocoa.framework - path - Platforms/MacOSX.platform/Developer/SDKs/MacOSX10.9.sdk/System/Library/Frameworks/Cocoa.framework - sourceTree - DEVELOPER_DIR - - 1B5508C462E64A83BC69743A - - attributes - - LastUpgradeCheck - 0510 - - buildConfigurationList - FC35CFB44CE441C4B352A513 - compatibilityVersion - Xcode 3.2 - developmentRegion - English - hasScannedForEncodings - 0 - isa - PBXProject - knownRegions - - en - - mainGroup - 9FDC9CD57DE54F59933B7E15 - productRefGroup - F582F7CD0E624B79BC14F761 - projectDirPath - - projectReferences - - projectRoot - - targets - - 1CCEE92774D8428093B24B74 - 744454F5B3B44BBBA45796AD - 039C44251EC249DFBF97E4BE - 7ABAE4A066114A59B8004589 - - - 1CCEE92774D8428093B24B74 - - buildConfigurationList - 17630A3AA42D486F9A4B7C4A - buildPhases - - F96762A33AE0411FAE31DFF7 - 31ADB3848538486395FF6AAD - - buildRules - - dependencies - - F965999440334F32BFAB8706 - - isa - PBXNativeTarget - name - Pods-ObjectivePGP - productName - Pods-ObjectivePGP - productReference - 8493C05F194F40AF8A739D5A - productType - com.apple.product-type.library.static - - 1D4AA6D14B0849ADA8C96210 - - fileRef - 40E299D80F02458DA209E09E - isa - PBXBuildFile - - 1EC26ADD2003451C96DEFEB1 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - sha.h - path - include-ios/openssl/sha.h - sourceTree - <group> - - 1EC8189061014994832308FF - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - sha.h - path - include-osx/openssl/sha.h - sourceTree - <group> - - 1F105797D0FE4F1E965CF2C5 - - fileRef - 3E0AAD3FD4724B79AA54CC62 - isa - PBXBuildFile - - 20873CDB7F6E4D4EABD58618 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - rand.h - path - include-osx/openssl/rand.h - sourceTree - <group> - - 21BBA7338DDF4581BFDABDA5 - - fileRef - C43839E214394E42B2F55DB7 - isa - PBXBuildFile - - 22A3E3629906422ABBFC9FC8 - - isa - PBXTargetDependency - target - 7ABAE4A066114A59B8004589 - targetProxy - B8A82B1F6E9C4DDEB80FAD49 - - 22BC51658B5A4EECB7A987D9 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - ecdh.h - path - include-ios/openssl/ecdh.h - sourceTree - <group> - - 236D88AD4B234FE79328C674 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - text - path - Pods-ObjectivePGPOSX-acknowledgements.markdown - sourceTree - <group> - - 24490690ED1345439499590E - - fileRef - 345B655C1B514A3F8A9964AE - isa - PBXBuildFile - - 256255A4DDC341A8A0E0FEC1 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - md4.h - path - include-osx/openssl/md4.h - sourceTree - <group> - - 2626704640B64CCD9D86C4CB - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - ecdh.h - path - include-osx/openssl/ecdh.h - sourceTree - <group> - - 26333AD87AC646D194775269 - - fileRef - 1EC26ADD2003451C96DEFEB1 - isa - PBXBuildFile - - 269871A17FED4876852D5FB2 - - baseConfigurationReference - F6BD80B531184503A7EDD2CE - buildSettings - - ALWAYS_SEARCH_USER_PATHS - NO - COPY_PHASE_STRIP - NO - DSTROOT - /tmp/xcodeproj.dst - GCC_C_LANGUAGE_STANDARD - gnu99 - GCC_DYNAMIC_NO_PIC - NO - GCC_OPTIMIZATION_LEVEL - 0 - GCC_PRECOMPILE_PREFIX_HEADER - YES - GCC_PREFIX_HEADER - Pods-ObjectivePGP-OpenSSL-Universal-prefix.pch - GCC_PREPROCESSOR_DEFINITIONS - - DEBUG=1 - $(inherited) - - GCC_SYMBOLS_PRIVATE_EXTERN - NO - GCC_VERSION - com.apple.compilers.llvm.clang.1_0 - INSTALL_PATH - $(BUILT_PRODUCTS_DIR) - IPHONEOS_DEPLOYMENT_TARGET - 6.0 - OTHER_LDFLAGS - - PRODUCT_NAME - $(TARGET_NAME) - PUBLIC_HEADERS_FOLDER_PATH - $(TARGET_NAME) - SDKROOT - iphoneos - SKIP_INSTALL - YES - - isa - XCBuildConfiguration - name - Debug - - 26FFA779811E46BCBFB02A65 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - opensslv.h - path - include-osx/openssl/opensslv.h - sourceTree - <group> - - 277A09F44C6E4EDEBFE78EC1 - - fileRef - 96924AEC79E946A2BE664F43 - isa - PBXBuildFile - - 288AF7AB09444A0EB1A0AFBA - - fileRef - 7E42748E5B4047CBA3322D8D - isa - PBXBuildFile - - 28B2A0B619214BD8A3AC18B2 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - aes.h - path - include-osx/openssl/aes.h - sourceTree - <group> - - 298DF42D61EA42378A13E8A5 - - fileRef - 7E1D9B1E3C8D4175A15C74EC - isa - PBXBuildFile - - 29CB529B0F2F4A39AB5445C0 - - containerPortal - 1B5508C462E64A83BC69743A - isa - PBXContainerItemProxy - proxyType - 1 - remoteGlobalIDString - 744454F5B3B44BBBA45796AD - remoteInfo - Pods-ObjectivePGP-OpenSSL-Universal - - 2A8474BA3EF34FD398D0584A - - buildConfigurations - - D150FAD041944789BD7D7A83 - 95910626C74140EEA7279A0A - - defaultConfigurationIsVisible - 0 - defaultConfigurationName - Release - isa - XCConfigurationList - - 2B39FF7EA5064E92B0E983BE - - fileRef - 4FD35552EB264338BC87D162 - isa - PBXBuildFile - - 2BE868A376D342529580255B - - fileRef - D762C64ADEBF40AC9A784911 - isa - PBXBuildFile - - 2D2F949A252949C08D4F15D0 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - buffer.h - path - include-ios/openssl/buffer.h - sourceTree - <group> - - 2F46C4A6D807419B8E0E77EC - - fileRef - 9C17A35D128F4D65971FF3F6 - isa - PBXBuildFile - - 2F58B1744D744390B012E5F4 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - camellia.h - path - include-osx/openssl/camellia.h - sourceTree - <group> - - 2F773A4AB20D43AF9DF108A6 - - fileRef - 96C50D420A1E476E8BC0E8CF - isa - PBXBuildFile - - 2F9B35E7D712459A9B1B3D7A - - fileRef - 2D2F949A252949C08D4F15D0 - isa - PBXBuildFile - - 2FF985F663004FFF906CFF22 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - cast.h - path - include-osx/openssl/cast.h - sourceTree - <group> - - 31326E24DEB444B8B6C438EE - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - asn1.h - path - include-osx/openssl/asn1.h - sourceTree - <group> - - 31AB364786FF4B1FA160C4FD - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - conf.h - path - include-ios/openssl/conf.h - sourceTree - <group> - - 31ADB3848538486395FF6AAD - - buildActionMask - 2147483647 - files - - DBFC7E3ADA19406181006E95 - F9520E9D6C974C5DA64FCA89 - - isa - PBXFrameworksBuildPhase - runOnlyForDeploymentPostprocessing - 0 - - 32E5757E891C4A1CA231FB58 - - fileRef - 8E27CED5A747490A85ABD06A - isa - PBXBuildFile - - 332977252F9D4E4BBD8FFEAF - - fileRef - 0F49E4AF7DA14959BC8B498D - isa - PBXBuildFile - - 34239C763756452C958B2F54 - - fileRef - 7D15671D56104F0AB3137DCA - isa - PBXBuildFile - - 345B655C1B514A3F8A9964AE - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - whrlpool.h - path - include-osx/openssl/whrlpool.h - sourceTree - <group> - - 35CE87F7A79A4C7DBA9A6012 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - engine.h - path - include-osx/openssl/engine.h - sourceTree - <group> - - 37077425AD104AA4A13562E9 - - fileRef - 1EC8189061014994832308FF - isa - PBXBuildFile - - 37124B07CA6540FFBA7A7BF9 - - buildConfigurations - - 269871A17FED4876852D5FB2 - A1E25722B96E45C8A4903CD6 - - defaultConfigurationIsVisible - 0 - defaultConfigurationName - Release - isa - XCConfigurationList - - 37FCF869982B481793CE5BCD - - fileRef - 5206A4D014F34C1AA8573F2C - isa - PBXBuildFile - - 3881E19244A143DD9B307E62 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - cmac.h - path - include-ios/openssl/cmac.h - sourceTree - <group> - - 38AC0146636441589E459568 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - x509_vfy.h - path - include-osx/openssl/x509_vfy.h - sourceTree - <group> - - 3B46F2DD68E74441A7F7D324 - - fileRef - 7C0425F00C8941338EC130D1 - isa - PBXBuildFile - - 3B9F4997C3F44770B6517866 - - fileRef - A118EF0BAD2B48928BF7442B - isa - PBXBuildFile - - 3BAAD79EC0474B9C8A922606 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - safestack.h - path - include-osx/openssl/safestack.h - sourceTree - <group> - - 3C20271EA6A941008478D0AE - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - bio.h - path - include-osx/openssl/bio.h - sourceTree - <group> - - 3CDEC44444F1451C90462C79 - - buildConfigurations - - 15C88058CCE14F98AEE8C9B8 - DCB37E4D17734A5388113F75 - - defaultConfigurationIsVisible - 0 - defaultConfigurationName - Release - isa - XCConfigurationList - - 3E0AAD3FD4724B79AA54CC62 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - ssl2.h - path - include-osx/openssl/ssl2.h - sourceTree - <group> - - 3FE832BAA75C46299553FE41 - - fileRef - 5B92FE8957ED4405A8AC66E4 - isa - PBXBuildFile - - 3FFC76C854FB464E900D16DD - - fileRef - 894B9ADC42FE40F98EA070CD - isa - PBXBuildFile - - 402E8D2F53704500ABF4E5B2 - - fileRef - 8DF97587B10E45DFB2BCB4FA - isa - PBXBuildFile - - 4042D202294F4E19A6EA8F2F - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - ssl.h - path - include-osx/openssl/ssl.h - sourceTree - <group> - - 4046C15EDB784E7BB744AABF - - fileRef - 5B9422598E2143BEAB951AD8 - isa - PBXBuildFile - - 40E299D80F02458DA209E09E - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - rc4.h - path - include-ios/openssl/rc4.h - sourceTree - <group> - - 41851BECD56E40D698B04783 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - ssl23.h - path - include-ios/openssl/ssl23.h - sourceTree - <group> - - 418ACEAC0D414C76BE77C343 - - children - - BEB41DD5FB2341A9B9AC89E1 - F6BD80B531184503A7EDD2CE - 5411955A06454845B40F3C86 - 975B254C40DD434CB9EDBE0C - 075792FA36DE493B8FE915F4 - A769D76B71A6460292CE549F - 5C2B2C5F18F14A009D048029 - D193FD8AB0504383BC617609 - - isa - PBXGroup - name - Support Files - sourceTree - SOURCE_ROOT - - 426A5038A2434A31B13DBE7E - - fileRef - 38AC0146636441589E459568 - isa - PBXBuildFile - - 42A6840B1B1E4EA3A593A6A8 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - pem2.h - path - include-ios/openssl/pem2.h - sourceTree - <group> - - 42F1D0C9064048F8903BAFD9 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - srp.h - path - include-osx/openssl/srp.h - sourceTree - <group> - - 43B8081EA6A74B578C01025E - - fileRef - EF5205B4182140B69CA3209A - isa - PBXBuildFile - - 449F02475A65460094DC1DB4 - - fileRef - 5D0AB62C90674578B2EA9794 - isa - PBXBuildFile - - 44D66B3C4FD8438A9157B766 - - fileRef - 961D1E04033045338D9061FC - isa - PBXBuildFile - - 452A2311605E4928A1880454 - - fileRef - 4042D202294F4E19A6EA8F2F - isa - PBXBuildFile - - 4885098F230840F28E4E0156 - - fileRef - 719B5205E65F410B87CDA68E - isa - PBXBuildFile - - 4899D21AE93D4149ACB947A5 - - baseConfigurationReference - A4F14B14C9494DCAAB297708 - buildSettings - - ALWAYS_SEARCH_USER_PATHS - NO - COPY_PHASE_STRIP - NO - DSTROOT - /tmp/xcodeproj.dst - GCC_C_LANGUAGE_STANDARD - gnu99 - GCC_DYNAMIC_NO_PIC - NO - GCC_OPTIMIZATION_LEVEL - 0 - GCC_PRECOMPILE_PREFIX_HEADER - YES - GCC_PREPROCESSOR_DEFINITIONS - - DEBUG=1 - $(inherited) - - GCC_SYMBOLS_PRIVATE_EXTERN - NO - GCC_VERSION - com.apple.compilers.llvm.clang.1_0 - INSTALL_PATH - $(BUILT_PRODUCTS_DIR) - IPHONEOS_DEPLOYMENT_TARGET - 6.0 - OTHER_LDFLAGS - - PRODUCT_NAME - $(TARGET_NAME) - PUBLIC_HEADERS_FOLDER_PATH - $(TARGET_NAME) - SDKROOT - iphoneos - SKIP_INSTALL - YES - - isa - XCBuildConfiguration - name - Debug - - 48AEA905AACC4A5C8E058E14 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - stack.h - path - include-ios/openssl/stack.h - sourceTree - <group> - - 48B687A6AD32410AA7A52F51 - - fileRef - E9BF4039307048A0A4CAD742 - isa - PBXBuildFile - - 496175F8F2344B2F9DF7585B - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - hmac.h - path - include-ios/openssl/hmac.h - sourceTree - <group> - - 4A980DBA99B2476F9DA95A9B - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - rc4.h - path - include-osx/openssl/rc4.h - sourceTree - <group> - - 4AF16DD746A24493BF3B34D9 - - fileRef - 7D28B2D12A5949C296281C6E - isa - PBXBuildFile - - 4BB33DEF56A94B268DBEE66B - - fileRef - 4A980DBA99B2476F9DA95A9B - isa - PBXBuildFile - - 4CAB41BFDDCF4CC6A3D28A74 - - children - - C041C18B76F64431AADEE7BD - 8EC9659B393F478681FCB2A1 - 8B9D8603330F49C789C6465E - DB9A4D508BF44EBA990DE902 - - isa - PBXGroup - name - Frameworks - sourceTree - <group> - - 4D6AEB4923304518BBBCA3D6 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - opensslconf.h - path - include-osx/openssl/opensslconf.h - sourceTree - <group> - - 4E0F9A2DFF524A65A53F6A06 - - fileRef - 4ECE1C12BBB7416C8DDF0584 - isa - PBXBuildFile - - 4E35ADE8005F49B9A7EC103A - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - engine.h - path - include-ios/openssl/engine.h - sourceTree - <group> - - 4ECE1C12BBB7416C8DDF0584 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - ecdsa.h - path - include-osx/openssl/ecdsa.h - sourceTree - <group> - - 4EEE1714D4254CE98537F062 - - fileRef - D659EA6757624186AFCBA875 - isa - PBXBuildFile - - 4FC65FE0DCF74B52B59EA584 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - asn1_mac.h - path - include-ios/openssl/asn1_mac.h - sourceTree - <group> - - 4FD35552EB264338BC87D162 - - isa - PBXFileReference - lastKnownFileType - wrapper.framework - name - Foundation.framework - path - Platforms/iPhoneOS.platform/Developer/SDKs/iPhoneOS7.1.sdk/System/Library/Frameworks/Foundation.framework - sourceTree - DEVELOPER_DIR - - 5004E13CE25E4EEAAEA12B11 - - fileRef - 5411955A06454845B40F3C86 - isa - PBXBuildFile - - 509EAED56AAA4D6AB30005D0 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - ssl3.h - path - include-osx/openssl/ssl3.h - sourceTree - <group> - - 5206A4D014F34C1AA8573F2C - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - ts.h - path - include-ios/openssl/ts.h - sourceTree - <group> - - 52B42C98E80644BBA2ADF94B - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - seed.h - path - include-osx/openssl/seed.h - sourceTree - <group> - - 5411955A06454845B40F3C86 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.objc - path - Pods-ObjectivePGP-OpenSSL-Universal-dummy.m - sourceTree - <group> - - 5514026936D342909CB0B8D0 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - pkcs7.h - path - include-osx/openssl/pkcs7.h - sourceTree - <group> - - 5559C668DD3C498BA6E0381A - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - txt_db.h - path - include-osx/openssl/txt_db.h - sourceTree - <group> - - 55910121A68B443D89EAB42B - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - e_os2.h - path - include-ios/openssl/e_os2.h - sourceTree - <group> - - 565D73621EB849CE8313020B - - fileRef - D8B5858C7367462CAE85E2D7 - isa - PBXBuildFile - - 5724B50A03B645DE9BB97987 - - fileRef - E37A70EDA6174C14BD5B918D - isa - PBXBuildFile - - 5A6DEC9CD254460ABA92CC53 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - ssl3.h - path - include-ios/openssl/ssl3.h - sourceTree - <group> - - 5B3B3BB78D5A4AA99291CC90 - - fileRef - 9F55A745C3A04159B3CAE1DF - isa - PBXBuildFile - - 5B92FE8957ED4405A8AC66E4 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - x509v3.h - path - include-ios/openssl/x509v3.h - sourceTree - <group> - - 5B9422598E2143BEAB951AD8 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - stack.h - path - include-osx/openssl/stack.h - sourceTree - <group> - - 5BC93B1D0EDA4583993B1092 - - fileRef - 6C88AB21F2C84CE1AEC11037 - isa - PBXBuildFile - - 5C2B2C5F18F14A009D048029 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.objc - path - Pods-ObjectivePGPOSX-OpenSSL-Universal-dummy.m - sourceTree - <group> - - 5C36939E62E6497F903CFDC6 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - md4.h - path - include-ios/openssl/md4.h - sourceTree - <group> - - 5CF21D4376604F52B5974C01 - - fileRef - 52B42C98E80644BBA2ADF94B - isa - PBXBuildFile - - 5D0AB62C90674578B2EA9794 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - crypto.h - path - include-ios/openssl/crypto.h - sourceTree - <group> - - 5DA37D26537F44BA9D99E676 - - fileRef - DBCEE0F9B5644E75B367C6C6 - isa - PBXBuildFile - - 5F0DC2617F9040CF8B9DC1A4 - - fileRef - 7385132E51C74CDE8F8AA538 - isa - PBXBuildFile - - 5F1E9B5C988B4C669F44380E - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - dtls1.h - path - include-osx/openssl/dtls1.h - sourceTree - <group> - - 602A936DD2FA45A08AB01C1E - - fileRef - DFCB6663A1064AB3827A5706 - isa - PBXBuildFile - - 60B42F58EBBF4A46955C2B61 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - dh.h - path - include-ios/openssl/dh.h - sourceTree - <group> - - 639442A028C1419084D5818B - - fileRef - 98DC7C47B6E84FC39F754E74 - isa - PBXBuildFile - - 646FFEEDD00F476B9113545A - - fileRef - 04135D6075514F8A9F652166 - isa - PBXBuildFile - - 64ABB405B85C4A7CA5CC2EE4 - - fileRef - 2F58B1744D744390B012E5F4 - isa - PBXBuildFile - - 671D183427E3429EA7057549 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - buffer.h - path - include-osx/openssl/buffer.h - sourceTree - <group> - - 689E5CAC8CFF4B279F1A9C62 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - ossl_typ.h - path - include-ios/openssl/ossl_typ.h - sourceTree - <group> - - 6994C5EB00A640FA9763C6D0 - - fileRef - DFCFE33A9D834C2BA0372395 - isa - PBXBuildFile - - 69DC3E0629D44E30B0567CD5 - - fileRef - 5559C668DD3C498BA6E0381A - isa - PBXBuildFile - - 6A0E2DE00CB7442F935F6ED3 - - fileRef - FC7A5E86F9D548718AFA5301 - isa - PBXBuildFile - - 6A806A2C91F1427986FF50A7 - - fileRef - A556EA2AB379467FBAF82BD6 - isa - PBXBuildFile - - 6A99CF7C1DEB4330A2A295F5 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - obj_mac.h - path - include-osx/openssl/obj_mac.h - sourceTree - <group> - - 6B225BD7857A4681B02644A0 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - comp.h - path - include-ios/openssl/comp.h - sourceTree - <group> - - 6B5A4B049FAA4871BCD09A51 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - tls1.h - path - include-osx/openssl/tls1.h - sourceTree - <group> - - 6B87E52244314E4DAEAE5573 - - fileRef - 4D6AEB4923304518BBBCA3D6 - isa - PBXBuildFile - - 6C88AB21F2C84CE1AEC11037 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - symhacks.h - path - include-ios/openssl/symhacks.h - sourceTree - <group> - - 6CDB2B73B1F24DA3B3FFB21D - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - ec.h - path - include-ios/openssl/ec.h - sourceTree - <group> - - 6DD7DF947A4C414285179127 - - fileRef - 3C20271EA6A941008478D0AE - isa - PBXBuildFile - - 6E86C554B8ED495EBA6E2DD5 - - fileRef - 6CDB2B73B1F24DA3B3FFB21D - isa - PBXBuildFile - - 6F8EB3DB48674822814B4927 - - fileRef - FB59432606634F248AA046C8 - isa - PBXBuildFile - - 70A7269530BE4AE797B8C44A - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - opensslv.h - path - include-ios/openssl/opensslv.h - sourceTree - <group> - - 7103392683DD496A95DEB38F - - fileRef - 41851BECD56E40D698B04783 - isa - PBXBuildFile - - 719B5205E65F410B87CDA68E - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - lhash.h - path - include-ios/openssl/lhash.h - sourceTree - <group> - - 71C6349BCB834120B4D162E5 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - pkcs12.h - path - include-ios/openssl/pkcs12.h - sourceTree - <group> - - 726941417D5144B3BAD98676 - - buildActionMask - 2147483647 - files - - 6F8EB3DB48674822814B4927 - - isa - PBXSourcesBuildPhase - runOnlyForDeploymentPostprocessing - 0 - - 73363C9A16C5425EA7EA50AF - - fileRef - 3BAAD79EC0474B9C8A922606 - isa - PBXBuildFile - - 7385132E51C74CDE8F8AA538 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - dh.h - path - include-osx/openssl/dh.h - sourceTree - <group> - - 744454F5B3B44BBBA45796AD - - buildConfigurationList - 37124B07CA6540FFBA7A7BF9 - buildPhases - - 757BFEEB0C5640E8AB21AFAB - 8B6BE5A673154C899E4E8005 - CB5B9C150F024E428B1015DF - - buildRules - - dependencies - - isa - PBXNativeTarget - name - Pods-ObjectivePGP-OpenSSL-Universal - productName - Pods-ObjectivePGP-OpenSSL-Universal - productReference - D4E74398603044468EBD54D1 - productType - com.apple.product-type.library.static - - 757BFEEB0C5640E8AB21AFAB - - buildActionMask - 2147483647 - files - - 5004E13CE25E4EEAAEA12B11 - - isa - PBXSourcesBuildPhase - runOnlyForDeploymentPostprocessing - 0 - - 76BBA853D3BE4A13B98F6E55 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - pqueue.h - path - include-ios/openssl/pqueue.h - sourceTree - <group> - - 7761BE689C204452A3FC7975 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - text - name - Podfile - path - ../Podfile - sourceTree - SOURCE_ROOT - xcLanguageSpecificationIdentifier - xcode.lang.ruby - - 77C69CA187DC43F3A4153568 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - krb5_asn.h - path - include-osx/openssl/krb5_asn.h - sourceTree - <group> - - 796E69F60DF04E4D9B933687 - - fileRef - 9E142129AF9247CAB86E62D9 - isa - PBXBuildFile - - 79C250DED28C44418112784E - - fileRef - 42A6840B1B1E4EA3A593A6A8 - isa - PBXBuildFile - - 79C6BE497D4544EF8A756F20 - - fileRef - C4B656F220AE44918A01A844 - isa - PBXBuildFile - - 7A8584560A564CFAA18635E9 - - fileRef - EE68161429D0486C9053E8AB - isa - PBXBuildFile - - 7AB114668E894069A42CFA77 - - buildActionMask - 2147483647 - files - - D1A93156013143858A9B87F0 - A84F9D5F597342F48CCEE904 - 5B3B3BB78D5A4AA99291CC90 - 9638E5C3397C409C845B54DE - 6DD7DF947A4C414285179127 - 5724B50A03B645DE9BB97987 - AD353980F658476B9FC8B2AE - A91FDD7DCA944A7D9C845A4E - 64ABB405B85C4A7CA5CC2EE4 - F330DC90A13C4CBD8059A5DF - 87D454D70A1746DCAF7DC4F4 - 332977252F9D4E4BBD8FFEAF - 602A936DD2FA45A08AB01C1E - A9D640EAAB91426E9FE0F1FF - 8A13A9E70BF444539560690B - 9F4A5CE91A40465B8862205F - BEDC0C6CD1F24F27A4D4D0F4 - BF2AEF6A3EB14BB29CDC616F - 5F0DC2617F9040CF8B9DC1A4 - 05B1B51B53494D14A4E7E3B8 - F77147173D6B4B57AA90F419 - AE6EB7FA5E9F42E896D4ECD8 - 639442A028C1419084D5818B - FB666C41661A4B11A65EA65E - 9FAAB381F49D47F4855B62F7 - 7F7A4B8CC42246FE8A749CE1 - 4E0F9A2DFF524A65A53F6A06 - E302B523401B46F3A484D680 - 2F46C4A6D807419B8E0E77EC - 6A806A2C91F1427986FF50A7 - 12E56F29A61F45A09FF3096F - 6994C5EB00A640FA9763C6D0 - DA4047312F04473399F56CAD - 895718749519424795E1229E - AD06B54FBC1A4314A0CACFFB - F76814622F1D4BD184278107 - DDD2A3B41A8B43148836AB0A - 04F13483FC924863B10C6173 - 811E415ADCA146638EA0F9F8 - 88D19266C56C421BBED62588 - 44D66B3C4FD8438A9157B766 - C49C9E0B556E4A6F8394B07D - 6B87E52244314E4DAEAE5573 - 82AF4A5C9EDE493D838F741B - 3FFC76C854FB464E900D16DD - C4CF2481FF2844CCA96AFF36 - 9E5941ED55B74F6AAA0032F6 - 646FFEEDD00F476B9113545A - B4617FD90ECF42BFAB77918E - F0955523D50E4D6EA633B796 - D2AB187F14DA48ABB7A7F1E1 - 8CB494406EA24BE7ADF2C4C5 - 4BB33DEF56A94B268DBEE66B - EDD5CAC2FD844F6BA6AB4277 - 79C6BE497D4544EF8A756F20 - 73363C9A16C5425EA7EA50AF - 5CF21D4376604F52B5974C01 - 37077425AD104AA4A13562E9 - D7AAA36C06FA4D41A24A1519 - 04C61415507F4D3480495BE6 - 452A2311605E4928A1880454 - 1F105797D0FE4F1E965CF2C5 - 8E24AFB9E8D244F99FA87E10 - 82602996FB00499BA4FA5E92 - 4046C15EDB784E7BB744AABF - 32E5757E891C4A1CA231FB58 - 7EC27D473E2B49EEA979A65E - 7FEF1E614E1345E680BE56F3 - 69DC3E0629D44E30B0567CD5 - 796E69F60DF04E4D9B933687 - 6A0E2DE00CB7442F935F6ED3 - 24490690ED1345439499590E - AF4A0E43CF6D4414AF3BB53F - 426A5038A2434A31B13DBE7E - 4AF16DD746A24493BF3B34D9 - - isa - PBXHeadersBuildPhase - runOnlyForDeploymentPostprocessing - 0 - - 7ABAE4A066114A59B8004589 - - buildConfigurationList - 2A8474BA3EF34FD398D0584A - buildPhases - - 12B9A78E82194602A51C03A7 - A1CDBDE5F8F042B2B059A420 - 7AB114668E894069A42CFA77 - - buildRules - - dependencies - - isa - PBXNativeTarget - name - Pods-ObjectivePGPOSX-OpenSSL-Universal - productName - Pods-ObjectivePGPOSX-OpenSSL-Universal - productReference - 83B2151DF8AB41A5BF393A6A - productType - com.apple.product-type.library.static - - 7C0425F00C8941338EC130D1 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - ssl2.h - path - include-ios/openssl/ssl2.h - sourceTree - <group> - - 7D15671D56104F0AB3137DCA - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - rc2.h - path - include-ios/openssl/rc2.h - sourceTree - <group> - - 7D28B2D12A5949C296281C6E - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - x509v3.h - path - include-osx/openssl/x509v3.h - sourceTree - <group> - - 7E1D9B1E3C8D4175A15C74EC - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - cast.h - path - include-ios/openssl/cast.h - sourceTree - <group> - - 7E42748E5B4047CBA3322D8D - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - md5.h - path - include-ios/openssl/md5.h - sourceTree - <group> - - 7EC27D473E2B49EEA979A65E - - fileRef - 6B5A4B049FAA4871BCD09A51 - isa - PBXBuildFile - - 7F7A4B8CC42246FE8A749CE1 - - fileRef - 2626704640B64CCD9D86C4CB - isa - PBXBuildFile - - 7FEF1E614E1345E680BE56F3 - - fileRef - FB72357F3D4A493D8102A6E5 - isa - PBXBuildFile - - 811E415ADCA146638EA0F9F8 - - fileRef - 84094E1051CF4F7BB9099D76 - isa - PBXBuildFile - - 8194A80650E74F8D82141F30 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - asn1.h - path - include-ios/openssl/asn1.h - sourceTree - <group> - - 82602996FB00499BA4FA5E92 - - fileRef - 509EAED56AAA4D6AB30005D0 - isa - PBXBuildFile - - 8267C9EED5584849A2A7BD80 - - fileRef - C438FC2A36584100B1E9ACCC - isa - PBXBuildFile - - 82AF4A5C9EDE493D838F741B - - fileRef - 26FFA779811E46BCBFB02A65 - isa - PBXBuildFile - - 82DCFFE7A53E4775AB35596B - - fileRef - F501CADC10EF409AB6E9DF43 - isa - PBXBuildFile - - 835D69AAF46F41249D2E1B26 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - srtp.h - path - include-osx/openssl/srtp.h - sourceTree - <group> - - 837DAE5BE38448C3A8A17B81 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.objc - path - Pods-ObjectivePGP-dummy.m - sourceTree - <group> - - 83B2151DF8AB41A5BF393A6A - - explicitFileType - archive.ar - includeInIndex - 0 - isa - PBXFileReference - path - libPods-ObjectivePGPOSX-OpenSSL-Universal.a - sourceTree - BUILT_PRODUCTS_DIR - - 84094E1051CF4F7BB9099D76 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - modes.h - path - include-osx/openssl/modes.h - sourceTree - <group> - - 8493C05F194F40AF8A739D5A - - explicitFileType - archive.ar - includeInIndex - 0 - isa - PBXFileReference - path - libPods-ObjectivePGP.a - sourceTree - BUILT_PRODUCTS_DIR - - 84DA36BCF795450F81CBD702 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - ui_compat.h - path - include-ios/openssl/ui_compat.h - sourceTree - <group> - - 87D454D70A1746DCAF7DC4F4 - - fileRef - F0516888245349988BA6135D - isa - PBXBuildFile - - 883281A94D414DF1AE039430 - - fileRef - 689E5CAC8CFF4B279F1A9C62 - isa - PBXBuildFile - - 88D19266C56C421BBED62588 - - fileRef - 6A99CF7C1DEB4330A2A295F5 - isa - PBXBuildFile - - 8904971AAAF04ABCB0BBB086 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - kssl.h - path - include-osx/openssl/kssl.h - sourceTree - <group> - - 89428EA56F744E4181C607C7 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - conf_api.h - path - include-osx/openssl/conf_api.h - sourceTree - <group> - - 894B9ADC42FE40F98EA070CD - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - ossl_typ.h - path - include-osx/openssl/ossl_typ.h - sourceTree - <group> - - 895718749519424795E1229E - - fileRef - 8904971AAAF04ABCB0BBB086 - isa - PBXBuildFile - - 8A13A9E70BF444539560690B - - fileRef - 89428EA56F744E4181C607C7 - isa - PBXBuildFile - - 8B6BE5A673154C899E4E8005 - - buildActionMask - 2147483647 - files - - 2B39FF7EA5064E92B0E983BE - - isa - PBXFrameworksBuildPhase - runOnlyForDeploymentPostprocessing - 0 - - 8B9D8603330F49C789C6465E - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - archive.ar - name - libssl.a - path - lib-ios/libssl.a - sourceTree - <group> - - 8C5FE4F1826147A89FBEFB57 - - fileRef - E99FF0428E11408AA196E1A3 - isa - PBXBuildFile - - 8CB494406EA24BE7ADF2C4C5 - - fileRef - 0EC73805E5B64D04A606750C - isa - PBXBuildFile - - 8D49B356C5DE4C52BBDAABC7 - - explicitFileType - archive.ar - includeInIndex - 0 - isa - PBXFileReference - path - libPods-ObjectivePGPOSX.a - sourceTree - BUILT_PRODUCTS_DIR - - 8DC48AEAD352458E8DC0B1B9 - - fileRef - F2BAA3F6C229453CACBADB1F - isa - PBXBuildFile - - 8DF97587B10E45DFB2BCB4FA - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - ebcdic.h - path - include-ios/openssl/ebcdic.h - sourceTree - <group> - - 8E24AFB9E8D244F99FA87E10 - - fileRef - FB1C7C0ED9A74A089AAFC507 - isa - PBXBuildFile - - 8E27CED5A747490A85ABD06A - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - symhacks.h - path - include-osx/openssl/symhacks.h - sourceTree - <group> - - 8EC9659B393F478681FCB2A1 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - archive.ar - name - libcrypto.a - path - lib-osx/libcrypto.a - sourceTree - <group> - - 8F1EEEBE5EEF4C83AF6713E3 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - pkcs7.h - path - include-ios/openssl/pkcs7.h - sourceTree - <group> - - 8F604D2853254D769CD0A05E - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - des_old.h - path - include-osx/openssl/des_old.h - sourceTree - <group> - - 8FFE3B63AD994704B0806A52 - - fileRef - C5D943DDE5E5417D9D89BDC9 - isa - PBXBuildFile - - 900F9CFA59E747299162790C - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - ocsp.h - path - include-osx/openssl/ocsp.h - sourceTree - <group> - - 9085B795D7574257AFB9BBE5 - - fileRef - 837DAE5BE38448C3A8A17B81 - isa - PBXBuildFile - - 9136F52EB489431FA2A7719B - - fileRef - 84DA36BCF795450F81CBD702 - isa - PBXBuildFile - - 921822A7E6BF48A798C46FE8 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - bio.h - path - include-ios/openssl/bio.h - sourceTree - <group> - - 937C515A16824B8AAD62CACE - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - evp.h - path - include-ios/openssl/evp.h - sourceTree - <group> - - 94DF868A99D8495E93B8A20C - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - ecdsa.h - path - include-ios/openssl/ecdsa.h - sourceTree - <group> - - 95432C50901941A6A950F183 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - hmac.h - path - include-osx/openssl/hmac.h - sourceTree - <group> - - 954A286800E84288BA40AE5D - - fileRef - 83B2151DF8AB41A5BF393A6A - isa - PBXBuildFile - - 95910626C74140EEA7279A0A - - baseConfigurationReference - A769D76B71A6460292CE549F - buildSettings - - ALWAYS_SEARCH_USER_PATHS - NO - ARCHS - $(ARCHS_STANDARD_32_64_BIT) - COMBINE_HIDPI_IMAGES - YES - COPY_PHASE_STRIP - YES - DEBUG_INFORMATION_FORMAT - dwarf-with-dsym - DSTROOT - /tmp/xcodeproj.dst - GCC_C_LANGUAGE_STANDARD - gnu99 - GCC_ENABLE_OBJC_EXCEPTIONS - YES - GCC_PRECOMPILE_PREFIX_HEADER - YES - GCC_PREFIX_HEADER - Pods-ObjectivePGPOSX-OpenSSL-Universal-prefix.pch - GCC_VERSION - com.apple.compilers.llvm.clang.1_0 - INSTALL_PATH - $(BUILT_PRODUCTS_DIR) - MACOSX_DEPLOYMENT_TARGET - 10.7 - OTHER_CFLAGS - - -DNS_BLOCK_ASSERTIONS=1 - $(inherited) - - OTHER_CPLUSPLUSFLAGS - - -DNS_BLOCK_ASSERTIONS=1 - $(inherited) - - OTHER_LDFLAGS - - PRODUCT_NAME - $(TARGET_NAME) - SDKROOT - macosx - SKIP_INSTALL - YES - - isa - XCBuildConfiguration - name - Release - - 9595D56D88924994804E1336 - - fileRef - C8AC6E38404543138EE8D385 - isa - PBXBuildFile - - 95D17E8A13D14EA1BD31B015 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - lhash.h - path - include-osx/openssl/lhash.h - sourceTree - <group> - - 960DD21754B340DC90A41EBD - - children - - 107D2944F6554D709B969E35 - 236D88AD4B234FE79328C674 - C1A99AA2B7F14D7E805FE7D1 - FB59432606634F248AA046C8 - 029C904B82DD4A3D867A93A8 - A4E6F57972224009984AEDBA - - isa - PBXGroup - name - Pods-ObjectivePGPOSX - sourceTree - <group> - - 961D1E04033045338D9061FC - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - objects.h - path - include-osx/openssl/objects.h - sourceTree - <group> - - 9638E5C3397C409C845B54DE - - fileRef - 0479358D495E47CE9ED06E42 - isa - PBXBuildFile - - 96924AEC79E946A2BE664F43 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - tls1.h - path - include-ios/openssl/tls1.h - sourceTree - <group> - - 96C50D420A1E476E8BC0E8CF - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - x509_vfy.h - path - include-ios/openssl/x509_vfy.h - sourceTree - <group> - - 975B254C40DD434CB9EDBE0C - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - path - Pods-ObjectivePGP-OpenSSL-Universal-prefix.pch - sourceTree - <group> - - 981843322D724329A65B328B - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - des.h - path - include-ios/openssl/des.h - sourceTree - <group> - - 98DC7C47B6E84FC39F754E74 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - e_os2.h - path - include-osx/openssl/e_os2.h - sourceTree - <group> - - 98F30A291C5A41AC9EBB58A8 - - fileRef - 94DF868A99D8495E93B8A20C - isa - PBXBuildFile - - 9A6BA4E1938D4798A7068465 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - ec.h - path - include-osx/openssl/ec.h - sourceTree - <group> - - 9C17A35D128F4D65971FF3F6 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - err.h - path - include-osx/openssl/err.h - sourceTree - <group> - - 9E142129AF9247CAB86E62D9 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - ui.h - path - include-osx/openssl/ui.h - sourceTree - <group> - - 9E5941ED55B74F6AAA0032F6 - - fileRef - 02C97B397F1F4FA1A15ECD5D - isa - PBXBuildFile - - 9F4A5CE91A40465B8862205F - - fileRef - DC99143A372E4D57BE6E0832 - isa - PBXBuildFile - - 9F55A745C3A04159B3CAE1DF - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - asn1_mac.h - path - include-osx/openssl/asn1_mac.h - sourceTree - <group> - - 9F5A7FDA099D4022BD589C39 - - fileRef - 937C515A16824B8AAD62CACE - isa - PBXBuildFile - - 9FAAB381F49D47F4855B62F7 - - fileRef - 9A6BA4E1938D4798A7068465 - isa - PBXBuildFile - - 9FDC9CD57DE54F59933B7E15 - - children - - 7761BE689C204452A3FC7975 - C8E822FC50F5496DB238CF60 - B0476368E0054E759F132A58 - F582F7CD0E624B79BC14F761 - AE5E1CCA53FA48908BF029B2 - - isa - PBXGroup - sourceTree - <group> - - A118EF0BAD2B48928BF7442B - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - cms.h - path - include-ios/openssl/cms.h - sourceTree - <group> - - A1CDBDE5F8F042B2B059A420 - - buildActionMask - 2147483647 - files - - 0470C184C6934FD689273ED7 - - isa - PBXFrameworksBuildPhase - runOnlyForDeploymentPostprocessing - 0 - - A1E25722B96E45C8A4903CD6 - - baseConfigurationReference - F6BD80B531184503A7EDD2CE - buildSettings - - ALWAYS_SEARCH_USER_PATHS - NO - COPY_PHASE_STRIP - YES - DSTROOT - /tmp/xcodeproj.dst - GCC_C_LANGUAGE_STANDARD - gnu99 - GCC_PRECOMPILE_PREFIX_HEADER - YES - GCC_PREFIX_HEADER - Pods-ObjectivePGP-OpenSSL-Universal-prefix.pch - GCC_VERSION - com.apple.compilers.llvm.clang.1_0 - INSTALL_PATH - $(BUILT_PRODUCTS_DIR) - IPHONEOS_DEPLOYMENT_TARGET - 6.0 - OTHER_CFLAGS - - -DNS_BLOCK_ASSERTIONS=1 - $(inherited) - - OTHER_CPLUSPLUSFLAGS - - -DNS_BLOCK_ASSERTIONS=1 - $(inherited) - - OTHER_LDFLAGS - - PRODUCT_NAME - $(TARGET_NAME) - PUBLIC_HEADERS_FOLDER_PATH - $(TARGET_NAME) - SDKROOT - iphoneos - SKIP_INSTALL - YES - VALIDATE_PRODUCT - YES - - isa - XCBuildConfiguration - name - Release - - A3E3002233D3450D86F207F1 - - fileRef - 60B42F58EBBF4A46955C2B61 - isa - PBXBuildFile - - A4E6F57972224009984AEDBA - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - text.script.sh - path - Pods-ObjectivePGPOSX-resources.sh - sourceTree - <group> - - A4F14B14C9494DCAAB297708 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - text.xcconfig - path - Pods-ObjectivePGP.xcconfig - sourceTree - <group> - - A556EA2AB379467FBAF82BD6 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - evp.h - path - include-osx/openssl/evp.h - sourceTree - <group> - - A6A384A1A0504C26940346D1 - - fileRef - 981843322D724329A65B328B - isa - PBXBuildFile - - A6F100E29C984ADC8ED408D8 - - fileRef - 3881E19244A143DD9B307E62 - isa - PBXBuildFile - - A769D76B71A6460292CE549F - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - text.xcconfig - path - Pods-ObjectivePGPOSX-OpenSSL-Universal-Private.xcconfig - sourceTree - <group> - - A821D11CFD38417CAA359CBF - - buildSettings - - ALWAYS_SEARCH_USER_PATHS - NO - CLANG_CXX_LANGUAGE_STANDARD - gnu++0x - CLANG_CXX_LIBRARY - libc++ - CLANG_ENABLE_MODULES - YES - CLANG_ENABLE_OBJC_ARC - NO - CLANG_WARN_BOOL_CONVERSION - YES - CLANG_WARN_CONSTANT_CONVERSION - YES - CLANG_WARN_DIRECT_OBJC_ISA_USAGE - YES - CLANG_WARN_EMPTY_BODY - YES - CLANG_WARN_ENUM_CONVERSION - YES - CLANG_WARN_INT_CONVERSION - YES - CLANG_WARN_OBJC_ROOT_CLASS - YES - COPY_PHASE_STRIP - NO - ENABLE_NS_ASSERTIONS - NO - GCC_C_LANGUAGE_STANDARD - gnu99 - GCC_WARN_64_TO_32_BIT_CONVERSION - YES - GCC_WARN_ABOUT_RETURN_TYPE - YES - GCC_WARN_UNDECLARED_SELECTOR - YES - GCC_WARN_UNINITIALIZED_AUTOS - YES - GCC_WARN_UNUSED_FUNCTION - YES - GCC_WARN_UNUSED_VARIABLE - YES - IPHONEOS_DEPLOYMENT_TARGET - 6.0 - MACOSX_DEPLOYMENT_TARGET - 10.7 - STRIP_INSTALLED_PRODUCT - NO - VALIDATE_PRODUCT - YES - - isa - XCBuildConfiguration - name - Release - - A84F9D5F597342F48CCEE904 - - fileRef - 31326E24DEB444B8B6C438EE - isa - PBXBuildFile - - A91FDD7DCA944A7D9C845A4E - - fileRef - 671D183427E3429EA7057549 - isa - PBXBuildFile - - A9355F2A64EC4F24ABD5E409 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - dsa.h - path - include-osx/openssl/dsa.h - sourceTree - <group> - - A9D640EAAB91426E9FE0F1FF - - fileRef - B86D860AFC9842F6833FB261 - isa - PBXBuildFile - - AAE704D5AE50407EBD74BD34 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - pqueue.h - path - include-osx/openssl/pqueue.h - sourceTree - <group> - - AC5234131DF14D0484867A4C - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - obj_mac.h - path - include-ios/openssl/obj_mac.h - sourceTree - <group> - - AD06B54FBC1A4314A0CACFFB - - fileRef - 95D17E8A13D14EA1BD31B015 - isa - PBXBuildFile - - AD353980F658476B9FC8B2AE - - fileRef - FB6135C0DEEF43FC84388DAB - isa - PBXBuildFile - - AE5E1CCA53FA48908BF029B2 - - children - - FF94558553BC41238B16674F - 960DD21754B340DC90A41EBD - - isa - PBXGroup - name - Targets Support Files - sourceTree - <group> - - AE6EB7FA5E9F42E896D4ECD8 - - fileRef - 5F1E9B5C988B4C669F44380E - isa - PBXBuildFile - - AF44CB1B88D6423D8AC1995D - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - kssl.h - path - include-ios/openssl/kssl.h - sourceTree - <group> - - AF4A0E43CF6D4414AF3BB53F - - fileRef - FCBF369A5EDD490483C553B2 - isa - PBXBuildFile - - AF8733B3F9BE453A9ED24A41 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - dsa.h - path - include-ios/openssl/dsa.h - sourceTree - <group> - - B00B0415E77446A2A3E748EB - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - err.h - path - include-ios/openssl/err.h - sourceTree - <group> - - B0476368E0054E759F132A58 - - children - - C86135BD28B148D8BFF10517 - - isa - PBXGroup - name - Pods - sourceTree - <group> - - B1FF26A75D94431093B220AD - - fileRef - AC5234131DF14D0484867A4C - isa - PBXBuildFile - - B4617FD90ECF42BFAB77918E - - fileRef - 5514026936D342909CB0B8D0 - isa - PBXBuildFile - - B49B02E08A294C36B116241F - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - pem.h - path - include-osx/openssl/pem.h - sourceTree - <group> - - B7AC2A8318C44AE8BEBC9B4A - - children - - 4FD35552EB264338BC87D162 - - isa - PBXGroup - name - iOS - sourceTree - <group> - - B7AD0F625AC941FCB74FE1D7 - - fileRef - CB59705B27C9454E869374E6 - isa - PBXBuildFile - - B81FB39A2DB94175AC49DAB9 - - fileRef - 5A6DEC9CD254460ABA92CC53 - isa - PBXBuildFile - - B86D860AFC9842F6833FB261 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - conf.h - path - include-osx/openssl/conf.h - sourceTree - <group> - - B8A82B1F6E9C4DDEB80FAD49 - - containerPortal - 1B5508C462E64A83BC69743A - isa - PBXContainerItemProxy - proxyType - 1 - remoteGlobalIDString - 7ABAE4A066114A59B8004589 - remoteInfo - Pods-ObjectivePGPOSX-OpenSSL-Universal - - B93E9497A52E45CB867DE0D4 - - fileRef - 8F1EEEBE5EEF4C83AF6713E3 - isa - PBXBuildFile - - BA2A5C08C19A4ABEBCDC2D92 - - buildActionMask - 2147483647 - files - - BC9C440FE2B74F3AB7000492 - 954A286800E84288BA40AE5D - - isa - PBXFrameworksBuildPhase - runOnlyForDeploymentPostprocessing - 0 - - BC9C440FE2B74F3AB7000492 - - fileRef - 1A9429215A8B414AA963BAB8 - isa - PBXBuildFile - - BEB41DD5FB2341A9B9AC89E1 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - text.xcconfig - path - Pods-ObjectivePGP-OpenSSL-Universal.xcconfig - sourceTree - <group> - - BEDC0C6CD1F24F27A4D4D0F4 - - fileRef - 0533BCE38D024F6C9D775AA3 - isa - PBXBuildFile - - BF2AEF6A3EB14BB29CDC616F - - fileRef - 8F604D2853254D769CD0A05E - isa - PBXBuildFile - - C041C18B76F64431AADEE7BD - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - archive.ar - name - libcrypto.a - path - lib-ios/libcrypto.a - sourceTree - <group> - - C1A99AA2B7F14D7E805FE7D1 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - text.plist.xml - path - Pods-ObjectivePGPOSX-acknowledgements.plist - sourceTree - <group> - - C34438E4AC1446928C13E8DC - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - mdc2.h - path - include-osx/openssl/mdc2.h - sourceTree - <group> - - C43839E214394E42B2F55DB7 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - ocsp.h - path - include-ios/openssl/ocsp.h - sourceTree - <group> - - C438FC2A36584100B1E9ACCC - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - whrlpool.h - path - include-ios/openssl/whrlpool.h - sourceTree - <group> - - C49C9E0B556E4A6F8394B07D - - fileRef - 900F9CFA59E747299162790C - isa - PBXBuildFile - - C4B656F220AE44918A01A844 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - rsa.h - path - include-osx/openssl/rsa.h - sourceTree - <group> - - C4CF2481FF2844CCA96AFF36 - - fileRef - B49B02E08A294C36B116241F - isa - PBXBuildFile - - C5D943DDE5E5417D9D89BDC9 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - x509.h - path - include-ios/openssl/x509.h - sourceTree - <group> - - C7471951079C4D7DB47E8725 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - text.plist.xml - path - Pods-ObjectivePGP-acknowledgements.plist - sourceTree - <group> - - C845F973709B4CBFAE652109 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - path - Pods-ObjectivePGP-environment.h - sourceTree - <group> - - C86135BD28B148D8BFF10517 - - children - - D2E011D93F3248A1BF6E5402 - 28B2A0B619214BD8A3AC18B2 - 8194A80650E74F8D82141F30 - 31326E24DEB444B8B6C438EE - 9F55A745C3A04159B3CAE1DF - 4FC65FE0DCF74B52B59EA584 - DBCEE0F9B5644E75B367C6C6 - 0479358D495E47CE9ED06E42 - 921822A7E6BF48A798C46FE8 - 3C20271EA6A941008478D0AE - E37A70EDA6174C14BD5B918D - DE086473EB5946FABB8FA49B - FB6135C0DEEF43FC84388DAB - D762C64ADEBF40AC9A784911 - 2D2F949A252949C08D4F15D0 - 671D183427E3429EA7057549 - 2F58B1744D744390B012E5F4 - EE68161429D0486C9053E8AB - 2FF985F663004FFF906CFF22 - 7E1D9B1E3C8D4175A15C74EC - F0516888245349988BA6135D - 3881E19244A143DD9B307E62 - 0F49E4AF7DA14959BC8B498D - A118EF0BAD2B48928BF7442B - 6B225BD7857A4681B02644A0 - DFCB6663A1064AB3827A5706 - 31AB364786FF4B1FA160C4FD - B86D860AFC9842F6833FB261 - E959BF45F38B4085B34B2388 - 89428EA56F744E4181C607C7 - DC99143A372E4D57BE6E0832 - 5D0AB62C90674578B2EA9794 - 0533BCE38D024F6C9D775AA3 - 981843322D724329A65B328B - EF514E4F80894A97AA66FDD4 - 8F604D2853254D769CD0A05E - 7385132E51C74CDE8F8AA538 - 60B42F58EBBF4A46955C2B61 - A9355F2A64EC4F24ABD5E409 - AF8733B3F9BE453A9ED24A41 - 0C4F621B3C654395B1726BD7 - D4F3F9F2A6F14DB49CD732A8 - 5F1E9B5C988B4C669F44380E - C8AC6E38404543138EE8D385 - 55910121A68B443D89EAB42B - 98DC7C47B6E84FC39F754E74 - 8DF97587B10E45DFB2BCB4FA - F5A9469D94B14630B8D4CEF4 - 6CDB2B73B1F24DA3B3FFB21D - 9A6BA4E1938D4798A7068465 - 2626704640B64CCD9D86C4CB - 22BC51658B5A4EECB7A987D9 - 94DF868A99D8495E93B8A20C - 4ECE1C12BBB7416C8DDF0584 - 4E35ADE8005F49B9A7EC103A - 35CE87F7A79A4C7DBA9A6012 - B00B0415E77446A2A3E748EB - 9C17A35D128F4D65971FF3F6 - A556EA2AB379467FBAF82BD6 - 937C515A16824B8AAD62CACE - 95432C50901941A6A950F183 - 496175F8F2344B2F9DF7585B - DFCFE33A9D834C2BA0372395 - CB59705B27C9454E869374E6 - FA2ECD841113412BB9E6F0A6 - 77C69CA187DC43F3A4153568 - AF44CB1B88D6423D8AC1995D - 8904971AAAF04ABCB0BBB086 - 719B5205E65F410B87CDA68E - 95D17E8A13D14EA1BD31B015 - 5C36939E62E6497F903CFDC6 - 256255A4DDC341A8A0E0FEC1 - 7E42748E5B4047CBA3322D8D - FFC99AD3A4F74E299FB2B473 - E99FF0428E11408AA196E1A3 - C34438E4AC1446928C13E8DC - 84094E1051CF4F7BB9099D76 - D8B5858C7367462CAE85E2D7 - AC5234131DF14D0484867A4C - 6A99CF7C1DEB4330A2A295F5 - D659EA6757624186AFCBA875 - 961D1E04033045338D9061FC - 900F9CFA59E747299162790C - C43839E214394E42B2F55DB7 - 4D6AEB4923304518BBBCA3D6 - F2BAA3F6C229453CACBADB1F - 26FFA779811E46BCBFB02A65 - 70A7269530BE4AE797B8C44A - 689E5CAC8CFF4B279F1A9C62 - 894B9ADC42FE40F98EA070CD - 097381BE4D754CB898A6E1B4 - B49B02E08A294C36B116241F - 42A6840B1B1E4EA3A593A6A8 - 02C97B397F1F4FA1A15ECD5D - 71C6349BCB834120B4D162E5 - 04135D6075514F8A9F652166 - 8F1EEEBE5EEF4C83AF6713E3 - 5514026936D342909CB0B8D0 - 76BBA853D3BE4A13B98F6E55 - AAE704D5AE50407EBD74BD34 - 20873CDB7F6E4D4EABD58618 - E9BF4039307048A0A4CAD742 - 7D15671D56104F0AB3137DCA - 0EC73805E5B64D04A606750C - 4A980DBA99B2476F9DA95A9B - 40E299D80F02458DA209E09E - E03A3F04D4704C6A9A28833E - ECFAB0CDFDDC460BAEBABCAC - C4B656F220AE44918A01A844 - EF5205B4182140B69CA3209A - 05B6F8120430439AB47C74E9 - 3BAAD79EC0474B9C8A922606 - F501CADC10EF409AB6E9DF43 - 52B42C98E80644BBA2ADF94B - 1EC8189061014994832308FF - 1EC26ADD2003451C96DEFEB1 - 42F1D0C9064048F8903BAFD9 - F178C0BDC07B492B8596F24F - 835D69AAF46F41249D2E1B26 - D1D8862A96C740E98008455F - F3E8484EAFD5447BB609D36A - 4042D202294F4E19A6EA8F2F - 7C0425F00C8941338EC130D1 - 3E0AAD3FD4724B79AA54CC62 - FB1C7C0ED9A74A089AAFC507 - 41851BECD56E40D698B04783 - 5A6DEC9CD254460ABA92CC53 - 509EAED56AAA4D6AB30005D0 - 48AEA905AACC4A5C8E058E14 - 5B9422598E2143BEAB951AD8 - 8E27CED5A747490A85ABD06A - 6C88AB21F2C84CE1AEC11037 - 6B5A4B049FAA4871BCD09A51 - 96924AEC79E946A2BE664F43 - 5206A4D014F34C1AA8573F2C - FB72357F3D4A493D8102A6E5 - 17D5B2D413A84FC0AA15332A - 5559C668DD3C498BA6E0381A - 116590952C734E10A50FC6D7 - 9E142129AF9247CAB86E62D9 - FC7A5E86F9D548718AFA5301 - 84DA36BCF795450F81CBD702 - C438FC2A36584100B1E9ACCC - 345B655C1B514A3F8A9964AE - C5D943DDE5E5417D9D89BDC9 - FCBF369A5EDD490483C553B2 - 96C50D420A1E476E8BC0E8CF - 38AC0146636441589E459568 - 5B92FE8957ED4405A8AC66E4 - 7D28B2D12A5949C296281C6E - 4CAB41BFDDCF4CC6A3D28A74 - 418ACEAC0D414C76BE77C343 - - isa - PBXGroup - name - OpenSSL-Universal - path - OpenSSL-Universal - sourceTree - <group> - - C8AC6E38404543138EE8D385 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - dtls1.h - path - include-ios/openssl/dtls1.h - sourceTree - <group> - - C8E799FD13E5479A8229A979 - - fileRef - 5C2B2C5F18F14A009D048029 - isa - PBXBuildFile - - C8E822FC50F5496DB238CF60 - - children - - E468575D089C41739F4E37A5 - B7AC2A8318C44AE8BEBC9B4A - - isa - PBXGroup - name - Frameworks - sourceTree - <group> - - CB59705B27C9454E869374E6 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - idea.h - path - include-ios/openssl/idea.h - sourceTree - <group> - - CB5B9C150F024E428B1015DF - - buildActionMask - 2147483647 - files - - FB06F43E485847709DD932D1 - D30EA054DEE94582A68BCBA3 - E64B3B319A1F48BCAFE30E7D - 5DA37D26537F44BA9D99E676 - E72AF0628721482887A2692B - 00A94B71DC0340E8AF84261D - 2BE868A376D342529580255B - 2F9B35E7D712459A9B1B3D7A - 7A8584560A564CFAA18635E9 - 298DF42D61EA42378A13E8A5 - A6F100E29C984ADC8ED408D8 - 3B9F4997C3F44770B6517866 - E59A6F94ADB643A8AE157197 - F1EABE51026043689FC9ABE0 - CFEB86CB395A482BAFC6DC27 - 449F02475A65460094DC1DB4 - A6A384A1A0504C26940346D1 - E6DD880ECBD84641962B6056 - A3E3002233D3450D86F207F1 - 0C8DE13D98BC425598D4D093 - FC3341CC8B6B44C29E6B28D2 - 9595D56D88924994804E1336 - D306EF1DAFF7419B88632BCC - 402E8D2F53704500ABF4E5B2 - 6E86C554B8ED495EBA6E2DD5 - D45B902BB3D541148529078F - 98F30A291C5A41AC9EBB58A8 - D37DABD7A5924182932BB68C - 16E5D4760AB746E6A41CF8F5 - 9F5A7FDA099D4022BD589C39 - CBD456F000A448FB80D7609F - B7AD0F625AC941FCB74FE1D7 - CCEA34BC0342437EBC8B3AF9 - D4F0517AAF09400A878A805E - 4885098F230840F28E4E0156 - E155ECDB9E7345A8A97F886E - 288AF7AB09444A0EB1A0AFBA - 8C5FE4F1826147A89FBEFB57 - 565D73621EB849CE8313020B - B1FF26A75D94431093B220AD - 4EEE1714D4254CE98537F062 - 21BBA7338DDF4581BFDABDA5 - 8DC48AEAD352458E8DC0B1B9 - FF9ACCA1CE36488EBBEDD27B - 883281A94D414DF1AE039430 - EFC8581974DD42789D91348C - 79C250DED28C44418112784E - F5F8C5ACE78A49AE90BA6DAC - B93E9497A52E45CB867DE0D4 - 063BBD634DC54D27BF3A0738 - 48B687A6AD32410AA7A52F51 - 34239C763756452C958B2F54 - 1D4AA6D14B0849ADA8C96210 - 115C240D8C184634AEF1A275 - 43B8081EA6A74B578C01025E - EFDA5F328C36418B9EA470D1 - 82DCFFE7A53E4775AB35596B - 26333AD87AC646D194775269 - 190543358F3B46A29BF5F8DA - 07E14846BBEE49308789D199 - DBE4FC7C641E46549BF207D5 - 3B46F2DD68E74441A7F7D324 - 7103392683DD496A95DEB38F - B81FB39A2DB94175AC49DAB9 - F3833DC679CF4564B9AE71B8 - 5BC93B1D0EDA4583993B1092 - 277A09F44C6E4EDEBFE78EC1 - 37FCF869982B481793CE5BCD - DA97989E426B4044AADDEA57 - E0D11D58EC074021A0902D8C - 9136F52EB489431FA2A7719B - 8267C9EED5584849A2A7BD80 - 8FFE3B63AD994704B0806A52 - 2F773A4AB20D43AF9DF108A6 - 3FE832BAA75C46299553FE41 - - isa - PBXHeadersBuildPhase - runOnlyForDeploymentPostprocessing - 0 - - CBD456F000A448FB80D7609F - - fileRef - 496175F8F2344B2F9DF7585B - isa - PBXBuildFile - - CCEA34BC0342437EBC8B3AF9 - - fileRef - FA2ECD841113412BB9E6F0A6 - isa - PBXBuildFile - - CFEB86CB395A482BAFC6DC27 - - fileRef - E959BF45F38B4085B34B2388 - isa - PBXBuildFile - - D150FAD041944789BD7D7A83 - - baseConfigurationReference - A769D76B71A6460292CE549F - buildSettings - - ALWAYS_SEARCH_USER_PATHS - NO - ARCHS - $(ARCHS_STANDARD_32_64_BIT) - COMBINE_HIDPI_IMAGES - YES - COPY_PHASE_STRIP - NO - DSTROOT - /tmp/xcodeproj.dst - GCC_C_LANGUAGE_STANDARD - gnu99 - GCC_DYNAMIC_NO_PIC - NO - GCC_ENABLE_OBJC_EXCEPTIONS - YES - GCC_OPTIMIZATION_LEVEL - 0 - GCC_PRECOMPILE_PREFIX_HEADER - YES - GCC_PREFIX_HEADER - Pods-ObjectivePGPOSX-OpenSSL-Universal-prefix.pch - GCC_PREPROCESSOR_DEFINITIONS - - DEBUG=1 - $(inherited) - - GCC_SYMBOLS_PRIVATE_EXTERN - NO - GCC_VERSION - com.apple.compilers.llvm.clang.1_0 - INSTALL_PATH - $(BUILT_PRODUCTS_DIR) - MACOSX_DEPLOYMENT_TARGET - 10.7 - OTHER_LDFLAGS - - PRODUCT_NAME - $(TARGET_NAME) - SDKROOT - macosx - SKIP_INSTALL - YES - - isa - XCBuildConfiguration - name - Debug - - D193FD8AB0504383BC617609 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - path - Pods-ObjectivePGPOSX-OpenSSL-Universal-prefix.pch - sourceTree - <group> - - D1A93156013143858A9B87F0 - - fileRef - 28B2A0B619214BD8A3AC18B2 - isa - PBXBuildFile - - D1D8862A96C740E98008455F - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - srtp.h - path - include-ios/openssl/srtp.h - sourceTree - <group> - - D2AB187F14DA48ABB7A7F1E1 - - fileRef - 20873CDB7F6E4D4EABD58618 - isa - PBXBuildFile - - D2E011D93F3248A1BF6E5402 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - aes.h - path - include-ios/openssl/aes.h - sourceTree - <group> - - D306EF1DAFF7419B88632BCC - - fileRef - 55910121A68B443D89EAB42B - isa - PBXBuildFile - - D30EA054DEE94582A68BCBA3 - - fileRef - 8194A80650E74F8D82141F30 - isa - PBXBuildFile - - D37DABD7A5924182932BB68C - - fileRef - 4E35ADE8005F49B9A7EC103A - isa - PBXBuildFile - - D45B902BB3D541148529078F - - fileRef - 22BC51658B5A4EECB7A987D9 - isa - PBXBuildFile - - D4E74398603044468EBD54D1 - - explicitFileType - archive.ar - includeInIndex - 0 - isa - PBXFileReference - path - libPods-ObjectivePGP-OpenSSL-Universal.a - sourceTree - BUILT_PRODUCTS_DIR - - D4F0517AAF09400A878A805E - - fileRef - AF44CB1B88D6423D8AC1995D - isa - PBXBuildFile - - D4F3F9F2A6F14DB49CD732A8 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - dso.h - path - include-ios/openssl/dso.h - sourceTree - <group> - - D659EA6757624186AFCBA875 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - objects.h - path - include-ios/openssl/objects.h - sourceTree - <group> - - D762C64ADEBF40AC9A784911 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - bn.h - path - include-ios/openssl/bn.h - sourceTree - <group> - - D7AAA36C06FA4D41A24A1519 - - fileRef - 42F1D0C9064048F8903BAFD9 - isa - PBXBuildFile - - D8B5858C7367462CAE85E2D7 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - modes.h - path - include-ios/openssl/modes.h - sourceTree - <group> - - DA4047312F04473399F56CAD - - fileRef - 77C69CA187DC43F3A4153568 - isa - PBXBuildFile - - DA97989E426B4044AADDEA57 - - fileRef - 17D5B2D413A84FC0AA15332A - isa - PBXBuildFile - - DB9A4D508BF44EBA990DE902 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - archive.ar - name - libssl.a - path - lib-osx/libssl.a - sourceTree - <group> - - DBCEE0F9B5644E75B367C6C6 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - asn1t.h - path - include-ios/openssl/asn1t.h - sourceTree - <group> - - DBE4FC7C641E46549BF207D5 - - fileRef - F3E8484EAFD5447BB609D36A - isa - PBXBuildFile - - DBFC7E3ADA19406181006E95 - - fileRef - 4FD35552EB264338BC87D162 - isa - PBXBuildFile - - DC99143A372E4D57BE6E0832 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - crypto.h - path - include-osx/openssl/crypto.h - sourceTree - <group> - - DCB37E4D17734A5388113F75 - - baseConfigurationReference - 107D2944F6554D709B969E35 - buildSettings - - ALWAYS_SEARCH_USER_PATHS - NO - ARCHS - $(ARCHS_STANDARD_32_64_BIT) - COMBINE_HIDPI_IMAGES - YES - COPY_PHASE_STRIP - YES - DEBUG_INFORMATION_FORMAT - dwarf-with-dsym - DSTROOT - /tmp/xcodeproj.dst - GCC_C_LANGUAGE_STANDARD - gnu99 - GCC_ENABLE_OBJC_EXCEPTIONS - YES - GCC_PRECOMPILE_PREFIX_HEADER - YES - GCC_VERSION - com.apple.compilers.llvm.clang.1_0 - INSTALL_PATH - $(BUILT_PRODUCTS_DIR) - MACOSX_DEPLOYMENT_TARGET - 10.7 - OTHER_CFLAGS - - -DNS_BLOCK_ASSERTIONS=1 - $(inherited) - - OTHER_CPLUSPLUSFLAGS - - -DNS_BLOCK_ASSERTIONS=1 - $(inherited) - - OTHER_LDFLAGS - - PRODUCT_NAME - $(TARGET_NAME) - SDKROOT - macosx - SKIP_INSTALL - YES - - isa - XCBuildConfiguration - name - Release - - DDD2A3B41A8B43148836AB0A - - fileRef - FFC99AD3A4F74E299FB2B473 - isa - PBXBuildFile - - DE086473EB5946FABB8FA49B - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - blowfish.h - path - include-ios/openssl/blowfish.h - sourceTree - <group> - - DFCB6663A1064AB3827A5706 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - comp.h - path - include-osx/openssl/comp.h - sourceTree - <group> - - DFCFE33A9D834C2BA0372395 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - idea.h - path - include-osx/openssl/idea.h - sourceTree - <group> - - E03A3F04D4704C6A9A28833E - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - ripemd.h - path - include-ios/openssl/ripemd.h - sourceTree - <group> - - E0D11D58EC074021A0902D8C - - fileRef - 116590952C734E10A50FC6D7 - isa - PBXBuildFile - - E155ECDB9E7345A8A97F886E - - fileRef - 5C36939E62E6497F903CFDC6 - isa - PBXBuildFile - - E302B523401B46F3A484D680 - - fileRef - 35CE87F7A79A4C7DBA9A6012 - isa - PBXBuildFile - - E37A70EDA6174C14BD5B918D - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - blowfish.h - path - include-osx/openssl/blowfish.h - sourceTree - <group> - - E468575D089C41739F4E37A5 - - children - - 1A9429215A8B414AA963BAB8 - - isa - PBXGroup - name - OS X - sourceTree - <group> - - E59A6F94ADB643A8AE157197 - - fileRef - 6B225BD7857A4681B02644A0 - isa - PBXBuildFile - - E64B3B319A1F48BCAFE30E7D - - fileRef - 4FC65FE0DCF74B52B59EA584 - isa - PBXBuildFile - - E6DD880ECBD84641962B6056 - - fileRef - EF514E4F80894A97AA66FDD4 - isa - PBXBuildFile - - E72AF0628721482887A2692B - - fileRef - 921822A7E6BF48A798C46FE8 - isa - PBXBuildFile - - E8E0BD60C45445E28C3B9412 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - text - path - Pods-ObjectivePGP-acknowledgements.markdown - sourceTree - <group> - - E959BF45F38B4085B34B2388 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - conf_api.h - path - include-ios/openssl/conf_api.h - sourceTree - <group> - - E99FF0428E11408AA196E1A3 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - mdc2.h - path - include-ios/openssl/mdc2.h - sourceTree - <group> - - E9BF4039307048A0A4CAD742 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - rand.h - path - include-ios/openssl/rand.h - sourceTree - <group> - - ECFAB0CDFDDC460BAEBABCAC - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - ripemd.h - path - include-osx/openssl/ripemd.h - sourceTree - <group> - - EDD5CAC2FD844F6BA6AB4277 - - fileRef - ECFAB0CDFDDC460BAEBABCAC - isa - PBXBuildFile - - EE68161429D0486C9053E8AB - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - camellia.h - path - include-ios/openssl/camellia.h - sourceTree - <group> - - EF514E4F80894A97AA66FDD4 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - des_old.h - path - include-ios/openssl/des_old.h - sourceTree - <group> - - EF5205B4182140B69CA3209A - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - rsa.h - path - include-ios/openssl/rsa.h - sourceTree - <group> - - EFC8581974DD42789D91348C - - fileRef - 097381BE4D754CB898A6E1B4 - isa - PBXBuildFile - - EFDA5F328C36418B9EA470D1 - - fileRef - 05B6F8120430439AB47C74E9 - isa - PBXBuildFile - - F0516888245349988BA6135D - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - cmac.h - path - include-osx/openssl/cmac.h - sourceTree - <group> - - F0955523D50E4D6EA633B796 - - fileRef - AAE704D5AE50407EBD74BD34 - isa - PBXBuildFile - - F178C0BDC07B492B8596F24F - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - srp.h - path - include-ios/openssl/srp.h - sourceTree - <group> - - F1EABE51026043689FC9ABE0 - - fileRef - 31AB364786FF4B1FA160C4FD - isa - PBXBuildFile - - F2BAA3F6C229453CACBADB1F - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - opensslconf.h - path - include-ios/openssl/opensslconf.h - sourceTree - <group> - - F330DC90A13C4CBD8059A5DF - - fileRef - 2FF985F663004FFF906CFF22 - isa - PBXBuildFile - - F3833DC679CF4564B9AE71B8 - - fileRef - 48AEA905AACC4A5C8E058E14 - isa - PBXBuildFile - - F3E8484EAFD5447BB609D36A - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - ssl.h - path - include-ios/openssl/ssl.h - sourceTree - <group> - - F501CADC10EF409AB6E9DF43 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - seed.h - path - include-ios/openssl/seed.h - sourceTree - <group> - - F582F7CD0E624B79BC14F761 - - children - - 8493C05F194F40AF8A739D5A - D4E74398603044468EBD54D1 - 8D49B356C5DE4C52BBDAABC7 - 83B2151DF8AB41A5BF393A6A - - isa - PBXGroup - name - Products - sourceTree - <group> - - F5A9469D94B14630B8D4CEF4 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - ebcdic.h - path - include-osx/openssl/ebcdic.h - sourceTree - <group> - - F5F8C5ACE78A49AE90BA6DAC - - fileRef - 71C6349BCB834120B4D162E5 - isa - PBXBuildFile - - F6BD80B531184503A7EDD2CE - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - text.xcconfig - path - Pods-ObjectivePGP-OpenSSL-Universal-Private.xcconfig - sourceTree - <group> - - F76814622F1D4BD184278107 - - fileRef - 256255A4DDC341A8A0E0FEC1 - isa - PBXBuildFile - - F77147173D6B4B57AA90F419 - - fileRef - 0C4F621B3C654395B1726BD7 - isa - PBXBuildFile - - F9520E9D6C974C5DA64FCA89 - - fileRef - D4E74398603044468EBD54D1 - isa - PBXBuildFile - - F965999440334F32BFAB8706 - - isa - PBXTargetDependency - target - 744454F5B3B44BBBA45796AD - targetProxy - 29CB529B0F2F4A39AB5445C0 - - F96762A33AE0411FAE31DFF7 - - buildActionMask - 2147483647 - files - - 9085B795D7574257AFB9BBE5 - - isa - PBXSourcesBuildPhase - runOnlyForDeploymentPostprocessing - 0 - - FA2ECD841113412BB9E6F0A6 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - krb5_asn.h - path - include-ios/openssl/krb5_asn.h - sourceTree - <group> - - FB06F43E485847709DD932D1 - - fileRef - D2E011D93F3248A1BF6E5402 - isa - PBXBuildFile - - FB1C7C0ED9A74A089AAFC507 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - ssl23.h - path - include-osx/openssl/ssl23.h - sourceTree - <group> - - FB59432606634F248AA046C8 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.objc - path - Pods-ObjectivePGPOSX-dummy.m - sourceTree - <group> - - FB6135C0DEEF43FC84388DAB - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - bn.h - path - include-osx/openssl/bn.h - sourceTree - <group> - - FB666C41661A4B11A65EA65E - - fileRef - F5A9469D94B14630B8D4CEF4 - isa - PBXBuildFile - - FB72357F3D4A493D8102A6E5 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - ts.h - path - include-osx/openssl/ts.h - sourceTree - <group> - - FC3341CC8B6B44C29E6B28D2 - - fileRef - D4F3F9F2A6F14DB49CD732A8 - isa - PBXBuildFile - - FC35CFB44CE441C4B352A513 - - buildConfigurations - - FC58A82D2F884397A125E0AF - A821D11CFD38417CAA359CBF - - defaultConfigurationIsVisible - 0 - defaultConfigurationName - Release - isa - XCConfigurationList - - FC58A82D2F884397A125E0AF - - buildSettings - - ALWAYS_SEARCH_USER_PATHS - NO - CLANG_CXX_LANGUAGE_STANDARD - gnu++0x - CLANG_CXX_LIBRARY - libc++ - CLANG_ENABLE_MODULES - YES - CLANG_ENABLE_OBJC_ARC - NO - CLANG_WARN_BOOL_CONVERSION - YES - CLANG_WARN_CONSTANT_CONVERSION - YES - CLANG_WARN_DIRECT_OBJC_ISA_USAGE - YES - CLANG_WARN_EMPTY_BODY - YES - CLANG_WARN_ENUM_CONVERSION - YES - CLANG_WARN_INT_CONVERSION - YES - CLANG_WARN_OBJC_ROOT_CLASS - YES - COPY_PHASE_STRIP - YES - GCC_C_LANGUAGE_STANDARD - gnu99 - GCC_DYNAMIC_NO_PIC - NO - GCC_OPTIMIZATION_LEVEL - 0 - GCC_PREPROCESSOR_DEFINITIONS - - DEBUG=1 - $(inherited) - - GCC_SYMBOLS_PRIVATE_EXTERN - NO - GCC_WARN_64_TO_32_BIT_CONVERSION - YES - GCC_WARN_ABOUT_RETURN_TYPE - YES - GCC_WARN_UNDECLARED_SELECTOR - YES - GCC_WARN_UNINITIALIZED_AUTOS - YES - GCC_WARN_UNUSED_FUNCTION - YES - GCC_WARN_UNUSED_VARIABLE - YES - IPHONEOS_DEPLOYMENT_TARGET - 6.0 - MACOSX_DEPLOYMENT_TARGET - 10.7 - ONLY_ACTIVE_ARCH - YES - STRIP_INSTALLED_PRODUCT - NO - - isa - XCBuildConfiguration - name - Debug - - FC7A5E86F9D548718AFA5301 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - ui_compat.h - path - include-osx/openssl/ui_compat.h - sourceTree - <group> - - FCBF369A5EDD490483C553B2 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - x509.h - path - include-osx/openssl/x509.h - sourceTree - <group> - - FF94558553BC41238B16674F - - children - - A4F14B14C9494DCAAB297708 - E8E0BD60C45445E28C3B9412 - C7471951079C4D7DB47E8725 - 837DAE5BE38448C3A8A17B81 - C845F973709B4CBFAE652109 - 142C320E960249A1BFC35819 - - isa - PBXGroup - name - Pods-ObjectivePGP - sourceTree - <group> - - FF9ACCA1CE36488EBBEDD27B - - fileRef - 70A7269530BE4AE797B8C44A - isa - PBXBuildFile - - FFC99AD3A4F74E299FB2B473 - - includeInIndex - 1 - isa - PBXFileReference - lastKnownFileType - sourcecode.c.h - name - md5.h - path - include-osx/openssl/md5.h - sourceTree - <group> - - - rootObject - 1B5508C462E64A83BC69743A - - +// !$*UTF8*$! +{ + archiveVersion = 1; + classes = { + }; + objectVersion = 46; + objects = { + +/* Begin PBXBuildFile section */ + 03281A17079689226EA63E45 /* dh.h in Headers */ = {isa = PBXBuildFile; fileRef = BEB936612FA5AB6C0EA3750E /* dh.h */; }; + 0C0C1B3272D9F336F8DBBEC0 /* ripemd.h in Headers */ = {isa = PBXBuildFile; fileRef = 7743870EA88CF21EFD5885AE /* ripemd.h */; }; + 0E83EAD476C3A7C12E391E24 /* md4.h in Headers */ = {isa = PBXBuildFile; fileRef = 5A8ED88B50564CF261259E9E /* md4.h */; }; + 0F68C503AAF4C3F906D34707 /* opensslconf.h in Headers */ = {isa = PBXBuildFile; fileRef = 34970722147171DD2BAEA410 /* opensslconf.h */; }; + 10048EE39A5BDF4D86856A01 /* conf.h in Headers */ = {isa = PBXBuildFile; fileRef = 0A3BD6AA1943A591A62CF9F7 /* conf.h */; }; + 135DAAD3F39B190AD20B2EBD /* mdc2.h in Headers */ = {isa = PBXBuildFile; fileRef = 9A57AAFA472CE551A0286E58 /* mdc2.h */; }; + 141AA602297EF6479B8924E5 /* ssl2.h in Headers */ = {isa = PBXBuildFile; fileRef = 3E6C8DE037DA5B65C25A86F0 /* ssl2.h */; }; + 181B1AA754A36D6B7DAD0C75 /* blowfish.h in Headers */ = {isa = PBXBuildFile; fileRef = 07D529BF9DB460784F4832FA /* blowfish.h */; }; + 183A9C485D37B5CF9C0FD9CF /* ec.h in Headers */ = {isa = PBXBuildFile; fileRef = 3011AE24DBD35E465BF14C9C /* ec.h */; }; + 1DE1BAD06B204B7E6C8238CF /* ocsp.h in Headers */ = {isa = PBXBuildFile; fileRef = 8796B609F1190B35D9470453 /* ocsp.h */; }; + 221C6AD3B8E72E9977608CB0 /* cms.h in Headers */ = {isa = PBXBuildFile; fileRef = 6C7E881CC17375BCFD94B079 /* cms.h */; }; + 231472CF27AF119AC33E1E98 /* ts.h in Headers */ = {isa = PBXBuildFile; fileRef = 0C00D2DB61F8F74057937625 /* ts.h */; }; + 2552EAAEAD742A6ABCAB2CA9 /* lhash.h in Headers */ = {isa = PBXBuildFile; fileRef = F304D97A32D80D7F715D6102 /* lhash.h */; }; + 2730CC5FC752AAF2417EA630 /* engine.h in Headers */ = {isa = PBXBuildFile; fileRef = C66D45673D7763BF3FB415CD /* engine.h */; }; + 2BB2F454ED9FFB8AC19AD412 /* x509_vfy.h in Headers */ = {isa = PBXBuildFile; fileRef = A260B3DB0550C6F0318D0299 /* x509_vfy.h */; }; + 2DB20BA22FE237B58EB85370 /* rand.h in Headers */ = {isa = PBXBuildFile; fileRef = 0AE7EB8912A362B52D69DAAE /* rand.h */; }; + 367DF49B9914E69D2A2CA03C /* safestack.h in Headers */ = {isa = PBXBuildFile; fileRef = F693034043D58F16622393A6 /* safestack.h */; }; + 36D46759A2542A908C91305E /* pkcs12.h in Headers */ = {isa = PBXBuildFile; fileRef = A1F511C90105C96436D0C755 /* pkcs12.h */; }; + 377D8C5079A035612849324E /* kssl.h in Headers */ = {isa = PBXBuildFile; fileRef = 950AB0522A0BC115176E1220 /* kssl.h */; }; + 457A69CE0A853AA928481010 /* txt_db.h in Headers */ = {isa = PBXBuildFile; fileRef = 9FCE0036FE574FD1660DB195 /* txt_db.h */; }; + 46670EFB00F671D2682948DC /* conf_api.h in Headers */ = {isa = PBXBuildFile; fileRef = CF2BFF941AD045C0D182C7F5 /* conf_api.h */; }; + 51572A02535B6D9FFCDF076C /* ecdsa.h in Headers */ = {isa = PBXBuildFile; fileRef = 13DBBD313C8564CB0CAFEDAC /* ecdsa.h */; }; + 54FB556F2B27A6802833C118 /* stack.h in Headers */ = {isa = PBXBuildFile; fileRef = 933AFC88FEDEB2AC5E9835FA /* stack.h */; }; + 570120B060D44E5336AEB00B /* srp.h in Headers */ = {isa = PBXBuildFile; fileRef = FF251F24C57FD17A2C76DEBE /* srp.h */; }; + 57242EE3A12AED49125FAB44 /* x509v3.h in Headers */ = {isa = PBXBuildFile; fileRef = 837B8A531D5994C64B1D5146 /* x509v3.h */; }; + 57615BF6BF10E0CEC7DA22F9 /* sha.h in Headers */ = {isa = PBXBuildFile; fileRef = 298A400E2112574E4D61D65B /* sha.h */; }; + 5853A0420B7E220565F29A44 /* idea.h in Headers */ = {isa = PBXBuildFile; fileRef = 2AFE2F96F3BA957A136F8A2B /* idea.h */; }; + 587C3CA1691D406C899298E1 /* x509.h in Headers */ = {isa = PBXBuildFile; fileRef = 21595BDA65FEEB600C542C9F /* x509.h */; }; + 5C3D1281994F29D1D94AF215 /* md5.h in Headers */ = {isa = PBXBuildFile; fileRef = FB6F0BA41893D0D1545B71EE /* md5.h */; }; + 5ED958A919BC22B46A7D74B3 /* cast.h in Headers */ = {isa = PBXBuildFile; fileRef = 7575F1157EC0D5D14F355A71 /* cast.h */; }; + 618C78E3B642A710CB96C210 /* krb5_asn.h in Headers */ = {isa = PBXBuildFile; fileRef = 0809DD01FDE59CD1EFB6D636 /* krb5_asn.h */; }; + 660367CCE7C33A077025F4AB /* opensslv.h in Headers */ = {isa = PBXBuildFile; fileRef = C3C3A66152B8082886283639 /* opensslv.h */; }; + 6A0E1D29E1027C7FB4F9E9AD /* des.h in Headers */ = {isa = PBXBuildFile; fileRef = 7BEE0B25C68F079E2379FB1C /* des.h */; }; + 6A50819FCF55989551203C8D /* Foundation.framework in Frameworks */ = {isa = PBXBuildFile; fileRef = 63BC1F5F5C7D25CB7649A6B2 /* Foundation.framework */; }; + 6C3273FD8C9139961541AF16 /* Pods-ObjectivePGP-dummy.m in Sources */ = {isa = PBXBuildFile; fileRef = DEFAA36E1E69A4CD940EFF95 /* Pods-ObjectivePGP-dummy.m */; }; + 6DABBD1C7A442E2DA3B21E85 /* ssl23.h in Headers */ = {isa = PBXBuildFile; fileRef = 8D5293B1EE5895825BB8A2DE /* ssl23.h */; }; + 6DCFF853F6189EB96805B4C6 /* err.h in Headers */ = {isa = PBXBuildFile; fileRef = 5444F0D733BDCCF0C66FC7D0 /* err.h */; }; + 6E4626A0D37CF90A82AD4978 /* rc2.h in Headers */ = {isa = PBXBuildFile; fileRef = 4844D36317538B6C1D0BFFC3 /* rc2.h */; }; + 726EB41DD0568FE3B97612D0 /* pem2.h in Headers */ = {isa = PBXBuildFile; fileRef = 3AA8A71893E5C4EE5C7ABF95 /* pem2.h */; }; + 7AB0767C1B978437951FB807 /* cmac.h in Headers */ = {isa = PBXBuildFile; fileRef = 226C03444B188CA7B83180B5 /* cmac.h */; }; + 805AE35EC99D5BC49AB3B892 /* evp.h in Headers */ = {isa = PBXBuildFile; fileRef = C435C6F48320B473E8613295 /* evp.h */; }; + 8173FE8EA3C9970B10EFFB00 /* ossl_typ.h in Headers */ = {isa = PBXBuildFile; fileRef = 75CD3955821C634705902FCA /* ossl_typ.h */; }; + 847E62F4B9E73722517A34DC /* dtls1.h in Headers */ = {isa = PBXBuildFile; fileRef = 0E8A6ED397D728F0962FEED2 /* dtls1.h */; }; + 8F305DBCB5C244BBC92CE04C /* des_old.h in Headers */ = {isa = PBXBuildFile; fileRef = 75197BB6C0BFCE87B99AF3CD /* des_old.h */; }; + 909E3F08CFCD0E467E3EFDA9 /* crypto.h in Headers */ = {isa = PBXBuildFile; fileRef = FDAEDA6A01F7E90E218608B5 /* crypto.h */; }; + 9BB126C15B88CBE388BF11AF /* ecdh.h in Headers */ = {isa = PBXBuildFile; fileRef = 44B2F049CA0245DCBC508E26 /* ecdh.h */; }; + A5163AC158BC20F491AB77D1 /* ssl.h in Headers */ = {isa = PBXBuildFile; fileRef = 953273654ED5A630CA9349F7 /* ssl.h */; }; + A54F6C5CF7B670FDAD3BC3DA /* rsa.h in Headers */ = {isa = PBXBuildFile; fileRef = 0A808438B9F93887673DD7AC /* rsa.h */; }; + A753746C1AE0EA3F2469A974 /* tls1.h in Headers */ = {isa = PBXBuildFile; fileRef = 759DE479AB35C4842C642BE7 /* tls1.h */; }; + A974DD3CB416C8BCEEBF971F /* srtp.h in Headers */ = {isa = PBXBuildFile; fileRef = B4D5AF2998A4A681DCA6DCAD /* srtp.h */; }; + AA19091BCBB04387956CD80F /* pkcs7.h in Headers */ = {isa = PBXBuildFile; fileRef = 539C013017EDDB6651CA2D63 /* pkcs7.h */; }; + AAAAC2095B2E56DBB7079C4E /* whrlpool.h in Headers */ = {isa = PBXBuildFile; fileRef = FF40B15F1B3A8D3903D06BBE /* whrlpool.h */; }; + ABB65695C123E71ACF6019F7 /* pem.h in Headers */ = {isa = PBXBuildFile; fileRef = 161DF9042CB0B07FC5FFBECC /* pem.h */; }; + ABF30A9F304B5778B18CA1D3 /* obj_mac.h in Headers */ = {isa = PBXBuildFile; fileRef = 07F5BAF9B5CF55FC478B0D0A /* obj_mac.h */; }; + AC16A06571ECC927DFB5E935 /* buffer.h in Headers */ = {isa = PBXBuildFile; fileRef = BA79A35D81493BCCCABB6591 /* buffer.h */; }; + B0BCF89756929A1CB5622DB7 /* bn.h in Headers */ = {isa = PBXBuildFile; fileRef = 0862D5969BBF5321DF883CD4 /* bn.h */; }; + B47D2EF4D9C9087C6A05A186 /* camellia.h in Headers */ = {isa = PBXBuildFile; fileRef = F46E29EA166F9B6DB847FB9D /* camellia.h */; }; + B55D0D7FA43EF7D6747CF15A /* ebcdic.h in Headers */ = {isa = PBXBuildFile; fileRef = 93C01AC87F3B2EF1D5D173DB /* ebcdic.h */; }; + B835A3ED5A38EFD7A909A293 /* dso.h in Headers */ = {isa = PBXBuildFile; fileRef = 73156C201870E987C74B6738 /* dso.h */; }; + BEEA0B7FEA63A8CEBEF2ECAF /* bio.h in Headers */ = {isa = PBXBuildFile; fileRef = B567CF91FC2FC29E0797DA6C /* bio.h */; }; + C19B53F18AAC8FF22F88612E /* ssl3.h in Headers */ = {isa = PBXBuildFile; fileRef = 0CB2B0EC73A14FF1B8759918 /* ssl3.h */; }; + C3F1186892C909C3774B35E7 /* hmac.h in Headers */ = {isa = PBXBuildFile; fileRef = E9FA70BF4097D65389FA59AC /* hmac.h */; }; + C56E102B2C4D0E68AFD5D1BC /* symhacks.h in Headers */ = {isa = PBXBuildFile; fileRef = 6A53A8F4F7D54721FD05EC61 /* symhacks.h */; }; + C6F31693FC8CCBDB6DDB800F /* Pods-ObjectivePGP-OpenSSL-Universal-dummy.m in Sources */ = {isa = PBXBuildFile; fileRef = CAE63F95FA95AAA3E0B9A655 /* Pods-ObjectivePGP-OpenSSL-Universal-dummy.m */; }; + D3E8F56CB343A23F05D6D898 /* Foundation.framework in Frameworks */ = {isa = PBXBuildFile; fileRef = 63BC1F5F5C7D25CB7649A6B2 /* Foundation.framework */; }; + D46586CC811985C9FD8DFEC0 /* ui.h in Headers */ = {isa = PBXBuildFile; fileRef = C74DCB3D644BFA55028A9F4A /* ui.h */; }; + D79E3B58118E8509B49F1F7C /* e_os2.h in Headers */ = {isa = PBXBuildFile; fileRef = BC50D6C0EDDA2137FF5B9F0C /* e_os2.h */; }; + DB05096A45B584BB7066CB49 /* pqueue.h in Headers */ = {isa = PBXBuildFile; fileRef = 2DBE3F85307E7A651F0C744A /* pqueue.h */; }; + DB54282FE015FACBB9FE22B8 /* asn1_mac.h in Headers */ = {isa = PBXBuildFile; fileRef = 01403B3C2288012BA7BA581B /* asn1_mac.h */; }; + E2E39E3F7F4C3A7C2270D03F /* modes.h in Headers */ = {isa = PBXBuildFile; fileRef = EB9C0EE1A75B1423A6BDBE49 /* modes.h */; }; + E3375A8262850ECC2F773A1A /* asn1t.h in Headers */ = {isa = PBXBuildFile; fileRef = AB7E8E3A360BCC3147C5C9FD /* asn1t.h */; }; + E6E94CF6296F0433E78E93B1 /* asn1.h in Headers */ = {isa = PBXBuildFile; fileRef = 23DE24932A2753F72D643D87 /* asn1.h */; }; + EAD00B03615ACE8A669239FC /* aes.h in Headers */ = {isa = PBXBuildFile; fileRef = 7552CABFA3EE0B5B91726DE2 /* aes.h */; }; + EEEE85B08D7B70D83E6D2D73 /* comp.h in Headers */ = {isa = PBXBuildFile; fileRef = 29D120C3216606E0D0E38292 /* comp.h */; }; + F21BC4663B47D258CECFC854 /* seed.h in Headers */ = {isa = PBXBuildFile; fileRef = 91FD576AC5283AA42A91123F /* seed.h */; }; + F66ACEFF63ED57DFAD733508 /* rc4.h in Headers */ = {isa = PBXBuildFile; fileRef = B93C2B4DA29B05A0726D5F57 /* rc4.h */; }; + F7B4B113F0F2C3A1A449F531 /* objects.h in Headers */ = {isa = PBXBuildFile; fileRef = F853C28E2E1FC4B83B1E7749 /* objects.h */; }; + F938279DB175439B58C41854 /* dsa.h in Headers */ = {isa = PBXBuildFile; fileRef = E7AA6541301B765CD89C38A0 /* dsa.h */; }; + FDF627131ECF91A273340A55 /* ui_compat.h in Headers */ = {isa = PBXBuildFile; fileRef = A7FA80761A7F7E17668FD0B3 /* ui_compat.h */; }; +/* End PBXBuildFile section */ + +/* Begin PBXContainerItemProxy section */ + 4EDC1E08811916CE84FE4C00 /* PBXContainerItemProxy */ = { + isa = PBXContainerItemProxy; + containerPortal = A293D69F5DD04BC2C384E77E /* Project object */; + proxyType = 1; + remoteGlobalIDString = EC2A770536762ACB3AF1DCB5; + remoteInfo = "Pods-ObjectivePGP-OpenSSL-Universal"; + }; +/* End PBXContainerItemProxy section */ + +/* Begin PBXFileReference section */ + 01403B3C2288012BA7BA581B /* asn1_mac.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = asn1_mac.h; path = "include-ios/openssl/asn1_mac.h"; sourceTree = ""; }; + 07D529BF9DB460784F4832FA /* blowfish.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = blowfish.h; path = "include-ios/openssl/blowfish.h"; sourceTree = ""; }; + 07F5BAF9B5CF55FC478B0D0A /* obj_mac.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = obj_mac.h; path = "include-ios/openssl/obj_mac.h"; sourceTree = ""; }; + 0809DD01FDE59CD1EFB6D636 /* krb5_asn.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = krb5_asn.h; path = "include-ios/openssl/krb5_asn.h"; sourceTree = ""; }; + 0862D5969BBF5321DF883CD4 /* bn.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = bn.h; path = "include-ios/openssl/bn.h"; sourceTree = ""; }; + 09C35F36C883D49E39287F44 /* Pods-ObjectivePGP-environment.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; path = "Pods-ObjectivePGP-environment.h"; sourceTree = ""; }; + 0A3BD6AA1943A591A62CF9F7 /* conf.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = conf.h; path = "include-ios/openssl/conf.h"; sourceTree = ""; }; + 0A808438B9F93887673DD7AC /* rsa.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = rsa.h; path = "include-ios/openssl/rsa.h"; sourceTree = ""; }; + 0AE7EB8912A362B52D69DAAE /* rand.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = rand.h; path = "include-ios/openssl/rand.h"; sourceTree = ""; }; + 0C00D2DB61F8F74057937625 /* ts.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = ts.h; path = "include-ios/openssl/ts.h"; sourceTree = ""; }; + 0CB2B0EC73A14FF1B8759918 /* ssl3.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = ssl3.h; path = "include-ios/openssl/ssl3.h"; sourceTree = ""; }; + 0E8A6ED397D728F0962FEED2 /* dtls1.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = dtls1.h; path = "include-ios/openssl/dtls1.h"; sourceTree = ""; }; + 0F51BFF24ECA170B32DDBE57 /* Pods-ObjectivePGP-acknowledgements.plist */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = text.plist.xml; path = "Pods-ObjectivePGP-acknowledgements.plist"; sourceTree = ""; }; + 13DBBD313C8564CB0CAFEDAC /* ecdsa.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = ecdsa.h; path = "include-ios/openssl/ecdsa.h"; sourceTree = ""; }; + 161DF9042CB0B07FC5FFBECC /* pem.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = pem.h; path = "include-ios/openssl/pem.h"; sourceTree = ""; }; + 1B34E8169A15DA59E6BE941E /* libssl.a */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = archive.ar; name = libssl.a; path = "lib-ios/libssl.a"; sourceTree = ""; }; + 1F4E19D17B7FFD513033074F /* libPods-ObjectivePGP.a */ = {isa = PBXFileReference; explicitFileType = archive.ar; includeInIndex = 0; path = "libPods-ObjectivePGP.a"; sourceTree = BUILT_PRODUCTS_DIR; }; + 1F687871A8F8DF80F0709F8C /* Pods-ObjectivePGP.debug.xcconfig */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = text.xcconfig; path = "Pods-ObjectivePGP.debug.xcconfig"; sourceTree = ""; }; + 21595BDA65FEEB600C542C9F /* x509.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = x509.h; path = "include-ios/openssl/x509.h"; sourceTree = ""; }; + 226C03444B188CA7B83180B5 /* cmac.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = cmac.h; path = "include-ios/openssl/cmac.h"; sourceTree = ""; }; + 23DE24932A2753F72D643D87 /* asn1.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = asn1.h; path = "include-ios/openssl/asn1.h"; sourceTree = ""; }; + 298A400E2112574E4D61D65B /* sha.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = sha.h; path = "include-ios/openssl/sha.h"; sourceTree = ""; }; + 29D120C3216606E0D0E38292 /* comp.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = comp.h; path = "include-ios/openssl/comp.h"; sourceTree = ""; }; + 2AFE2F96F3BA957A136F8A2B /* idea.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = idea.h; path = "include-ios/openssl/idea.h"; sourceTree = ""; }; + 2DBE3F85307E7A651F0C744A /* pqueue.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = pqueue.h; path = "include-ios/openssl/pqueue.h"; sourceTree = ""; }; + 3011AE24DBD35E465BF14C9C /* ec.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = ec.h; path = "include-ios/openssl/ec.h"; sourceTree = ""; }; + 34970722147171DD2BAEA410 /* opensslconf.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = opensslconf.h; path = "include-ios/openssl/opensslconf.h"; sourceTree = ""; }; + 359711D40862DA19BE702C3C /* Podfile */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = text; name = Podfile; path = ../Podfile; sourceTree = SOURCE_ROOT; xcLanguageSpecificationIdentifier = xcode.lang.ruby; }; + 3AA8A71893E5C4EE5C7ABF95 /* pem2.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = pem2.h; path = "include-ios/openssl/pem2.h"; sourceTree = ""; }; + 3E6C8DE037DA5B65C25A86F0 /* ssl2.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = ssl2.h; path = "include-ios/openssl/ssl2.h"; sourceTree = ""; }; + 44B2F049CA0245DCBC508E26 /* ecdh.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = ecdh.h; path = "include-ios/openssl/ecdh.h"; sourceTree = ""; }; + 4844D36317538B6C1D0BFFC3 /* rc2.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = rc2.h; path = "include-ios/openssl/rc2.h"; sourceTree = ""; }; + 539C013017EDDB6651CA2D63 /* pkcs7.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = pkcs7.h; path = "include-ios/openssl/pkcs7.h"; sourceTree = ""; }; + 5444F0D733BDCCF0C66FC7D0 /* err.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = err.h; path = "include-ios/openssl/err.h"; sourceTree = ""; }; + 5A8ED88B50564CF261259E9E /* md4.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = md4.h; path = "include-ios/openssl/md4.h"; sourceTree = ""; }; + 5DA48C98875005DCDE1B45C1 /* libcrypto.a */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = archive.ar; name = libcrypto.a; path = "lib-ios/libcrypto.a"; sourceTree = ""; }; + 63B99B92613B9DFC7C91019F /* Pods-ObjectivePGP.release.xcconfig */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = text.xcconfig; path = "Pods-ObjectivePGP.release.xcconfig"; sourceTree = ""; }; + 63BC1F5F5C7D25CB7649A6B2 /* Foundation.framework */ = {isa = PBXFileReference; lastKnownFileType = wrapper.framework; name = Foundation.framework; path = Platforms/iPhoneOS.platform/Developer/SDKs/iPhoneOS7.1.sdk/System/Library/Frameworks/Foundation.framework; sourceTree = DEVELOPER_DIR; }; + 6A53A8F4F7D54721FD05EC61 /* symhacks.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = symhacks.h; path = "include-ios/openssl/symhacks.h"; sourceTree = ""; }; + 6C7E881CC17375BCFD94B079 /* cms.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = cms.h; path = "include-ios/openssl/cms.h"; sourceTree = ""; }; + 73156C201870E987C74B6738 /* dso.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = dso.h; path = "include-ios/openssl/dso.h"; sourceTree = ""; }; + 75197BB6C0BFCE87B99AF3CD /* des_old.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = des_old.h; path = "include-ios/openssl/des_old.h"; sourceTree = ""; }; + 7552CABFA3EE0B5B91726DE2 /* aes.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = aes.h; path = "include-ios/openssl/aes.h"; sourceTree = ""; }; + 7575F1157EC0D5D14F355A71 /* cast.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = cast.h; path = "include-ios/openssl/cast.h"; sourceTree = ""; }; + 759DE479AB35C4842C642BE7 /* tls1.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = tls1.h; path = "include-ios/openssl/tls1.h"; sourceTree = ""; }; + 75CD3955821C634705902FCA /* ossl_typ.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = ossl_typ.h; path = "include-ios/openssl/ossl_typ.h"; sourceTree = ""; }; + 7743870EA88CF21EFD5885AE /* ripemd.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = ripemd.h; path = "include-ios/openssl/ripemd.h"; sourceTree = ""; }; + 7BEE0B25C68F079E2379FB1C /* des.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = des.h; path = "include-ios/openssl/des.h"; sourceTree = ""; }; + 835BEDFF1067392DD37AED22 /* Pods-ObjectivePGP-acknowledgements.markdown */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = text; path = "Pods-ObjectivePGP-acknowledgements.markdown"; sourceTree = ""; }; + 837B8A531D5994C64B1D5146 /* x509v3.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = x509v3.h; path = "include-ios/openssl/x509v3.h"; sourceTree = ""; }; + 8796B609F1190B35D9470453 /* ocsp.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = ocsp.h; path = "include-ios/openssl/ocsp.h"; sourceTree = ""; }; + 8D5293B1EE5895825BB8A2DE /* ssl23.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = ssl23.h; path = "include-ios/openssl/ssl23.h"; sourceTree = ""; }; + 91FD576AC5283AA42A91123F /* seed.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = seed.h; path = "include-ios/openssl/seed.h"; sourceTree = ""; }; + 933AFC88FEDEB2AC5E9835FA /* stack.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = stack.h; path = "include-ios/openssl/stack.h"; sourceTree = ""; }; + 93C01AC87F3B2EF1D5D173DB /* ebcdic.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = ebcdic.h; path = "include-ios/openssl/ebcdic.h"; sourceTree = ""; }; + 950AB0522A0BC115176E1220 /* kssl.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = kssl.h; path = "include-ios/openssl/kssl.h"; sourceTree = ""; }; + 953273654ED5A630CA9349F7 /* ssl.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = ssl.h; path = "include-ios/openssl/ssl.h"; sourceTree = ""; }; + 9A57AAFA472CE551A0286E58 /* mdc2.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = mdc2.h; path = "include-ios/openssl/mdc2.h"; sourceTree = ""; }; + 9FCE0036FE574FD1660DB195 /* txt_db.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = txt_db.h; path = "include-ios/openssl/txt_db.h"; sourceTree = ""; }; + A119F15E4EF7813A5D74DF0B /* Pods-ObjectivePGP-OpenSSL-Universal-Private.xcconfig */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = text.xcconfig; path = "Pods-ObjectivePGP-OpenSSL-Universal-Private.xcconfig"; sourceTree = ""; }; + A1F511C90105C96436D0C755 /* pkcs12.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = pkcs12.h; path = "include-ios/openssl/pkcs12.h"; sourceTree = ""; }; + A260B3DB0550C6F0318D0299 /* x509_vfy.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = x509_vfy.h; path = "include-ios/openssl/x509_vfy.h"; sourceTree = ""; }; + A70217C48D11537A6CF45F26 /* Pods-ObjectivePGP-OpenSSL-Universal-prefix.pch */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; path = "Pods-ObjectivePGP-OpenSSL-Universal-prefix.pch"; sourceTree = ""; }; + A7FA80761A7F7E17668FD0B3 /* ui_compat.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = ui_compat.h; path = "include-ios/openssl/ui_compat.h"; sourceTree = ""; }; + A8A6F917A744D9D228AD6836 /* libPods-ObjectivePGP-OpenSSL-Universal.a */ = {isa = PBXFileReference; explicitFileType = archive.ar; includeInIndex = 0; path = "libPods-ObjectivePGP-OpenSSL-Universal.a"; sourceTree = BUILT_PRODUCTS_DIR; }; + AB7E8E3A360BCC3147C5C9FD /* asn1t.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = asn1t.h; path = "include-ios/openssl/asn1t.h"; sourceTree = ""; }; + B4D5AF2998A4A681DCA6DCAD /* srtp.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = srtp.h; path = "include-ios/openssl/srtp.h"; sourceTree = ""; }; + B567CF91FC2FC29E0797DA6C /* bio.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = bio.h; path = "include-ios/openssl/bio.h"; sourceTree = ""; }; + B93C2B4DA29B05A0726D5F57 /* rc4.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = rc4.h; path = "include-ios/openssl/rc4.h"; sourceTree = ""; }; + BA79A35D81493BCCCABB6591 /* buffer.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = buffer.h; path = "include-ios/openssl/buffer.h"; sourceTree = ""; }; + BC50D6C0EDDA2137FF5B9F0C /* e_os2.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = e_os2.h; path = "include-ios/openssl/e_os2.h"; sourceTree = ""; }; + BEB936612FA5AB6C0EA3750E /* dh.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = dh.h; path = "include-ios/openssl/dh.h"; sourceTree = ""; }; + C3C3A66152B8082886283639 /* opensslv.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = opensslv.h; path = "include-ios/openssl/opensslv.h"; sourceTree = ""; }; + C435C6F48320B473E8613295 /* evp.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = evp.h; path = "include-ios/openssl/evp.h"; sourceTree = ""; }; + C66D45673D7763BF3FB415CD /* engine.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = engine.h; path = "include-ios/openssl/engine.h"; sourceTree = ""; }; + C74DCB3D644BFA55028A9F4A /* ui.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = ui.h; path = "include-ios/openssl/ui.h"; sourceTree = ""; }; + CAE63F95FA95AAA3E0B9A655 /* Pods-ObjectivePGP-OpenSSL-Universal-dummy.m */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.objc; path = "Pods-ObjectivePGP-OpenSSL-Universal-dummy.m"; sourceTree = ""; }; + CF2BFF941AD045C0D182C7F5 /* conf_api.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = conf_api.h; path = "include-ios/openssl/conf_api.h"; sourceTree = ""; }; + DB716261D8FEDE9E3BCB7D11 /* Pods-ObjectivePGP-resources.sh */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = text.script.sh; path = "Pods-ObjectivePGP-resources.sh"; sourceTree = ""; }; + DEFAA36E1E69A4CD940EFF95 /* Pods-ObjectivePGP-dummy.m */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.objc; path = "Pods-ObjectivePGP-dummy.m"; sourceTree = ""; }; + E7AA6541301B765CD89C38A0 /* dsa.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = dsa.h; path = "include-ios/openssl/dsa.h"; sourceTree = ""; }; + E9FA70BF4097D65389FA59AC /* hmac.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = hmac.h; path = "include-ios/openssl/hmac.h"; sourceTree = ""; }; + EB9C0EE1A75B1423A6BDBE49 /* modes.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = modes.h; path = "include-ios/openssl/modes.h"; sourceTree = ""; }; + F304D97A32D80D7F715D6102 /* lhash.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = lhash.h; path = "include-ios/openssl/lhash.h"; sourceTree = ""; }; + F46E29EA166F9B6DB847FB9D /* camellia.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = camellia.h; path = "include-ios/openssl/camellia.h"; sourceTree = ""; }; + F693034043D58F16622393A6 /* safestack.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = safestack.h; path = "include-ios/openssl/safestack.h"; sourceTree = ""; }; + F798BC4EF9AAE269E187508E /* Pods-ObjectivePGP-OpenSSL-Universal.xcconfig */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = text.xcconfig; path = "Pods-ObjectivePGP-OpenSSL-Universal.xcconfig"; sourceTree = ""; }; + F853C28E2E1FC4B83B1E7749 /* objects.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = objects.h; path = "include-ios/openssl/objects.h"; sourceTree = ""; }; + FB6F0BA41893D0D1545B71EE /* md5.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = md5.h; path = "include-ios/openssl/md5.h"; sourceTree = ""; }; + FDAEDA6A01F7E90E218608B5 /* crypto.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = crypto.h; path = "include-ios/openssl/crypto.h"; sourceTree = ""; }; + FF251F24C57FD17A2C76DEBE /* srp.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = srp.h; path = "include-ios/openssl/srp.h"; sourceTree = ""; }; + FF40B15F1B3A8D3903D06BBE /* whrlpool.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = whrlpool.h; path = "include-ios/openssl/whrlpool.h"; sourceTree = ""; }; +/* End PBXFileReference section */ + +/* Begin PBXFrameworksBuildPhase section */ + BF0FBDCA9E401F70F9D52DD5 /* Frameworks */ = { + isa = PBXFrameworksBuildPhase; + buildActionMask = 2147483647; + files = ( + D3E8F56CB343A23F05D6D898 /* Foundation.framework in Frameworks */, + ); + runOnlyForDeploymentPostprocessing = 0; + }; + BF1C22A1016214AC4104C44F /* Frameworks */ = { + isa = PBXFrameworksBuildPhase; + buildActionMask = 2147483647; + files = ( + 6A50819FCF55989551203C8D /* Foundation.framework in Frameworks */, + ); + runOnlyForDeploymentPostprocessing = 0; + }; +/* End PBXFrameworksBuildPhase section */ + +/* Begin PBXGroup section */ + 189FBE8FB5431FE98E1CF24C /* Pods */ = { + isa = PBXGroup; + children = ( + 862ABFDA6FFD7F184347B446 /* OpenSSL-Universal */, + ); + name = Pods; + sourceTree = ""; + }; + 2EFF7BA7AFD7BC2F8AF1C63A /* Targets Support Files */ = { + isa = PBXGroup; + children = ( + 9299FD0F75834B00EAE89A63 /* Pods-ObjectivePGP */, + ); + name = "Targets Support Files"; + sourceTree = ""; + }; + 3303B7C2943AFE8E3183BC51 /* Frameworks */ = { + isa = PBXGroup; + children = ( + 5DA48C98875005DCDE1B45C1 /* libcrypto.a */, + 1B34E8169A15DA59E6BE941E /* libssl.a */, + ); + name = Frameworks; + sourceTree = ""; + }; + 581E4498F8316F69F947EB23 /* Support Files */ = { + isa = PBXGroup; + children = ( + F798BC4EF9AAE269E187508E /* Pods-ObjectivePGP-OpenSSL-Universal.xcconfig */, + A119F15E4EF7813A5D74DF0B /* Pods-ObjectivePGP-OpenSSL-Universal-Private.xcconfig */, + CAE63F95FA95AAA3E0B9A655 /* Pods-ObjectivePGP-OpenSSL-Universal-dummy.m */, + A70217C48D11537A6CF45F26 /* Pods-ObjectivePGP-OpenSSL-Universal-prefix.pch */, + ); + name = "Support Files"; + path = "../Target Support Files/Pods-ObjectivePGP-OpenSSL-Universal"; + sourceTree = ""; + }; + 5E268E083272F80E4552DE01 /* iOS */ = { + isa = PBXGroup; + children = ( + 63BC1F5F5C7D25CB7649A6B2 /* Foundation.framework */, + ); + name = iOS; + sourceTree = ""; + }; + 862ABFDA6FFD7F184347B446 /* OpenSSL-Universal */ = { + isa = PBXGroup; + children = ( + 7552CABFA3EE0B5B91726DE2 /* aes.h */, + 23DE24932A2753F72D643D87 /* asn1.h */, + 01403B3C2288012BA7BA581B /* asn1_mac.h */, + AB7E8E3A360BCC3147C5C9FD /* asn1t.h */, + B567CF91FC2FC29E0797DA6C /* bio.h */, + 07D529BF9DB460784F4832FA /* blowfish.h */, + 0862D5969BBF5321DF883CD4 /* bn.h */, + BA79A35D81493BCCCABB6591 /* buffer.h */, + F46E29EA166F9B6DB847FB9D /* camellia.h */, + 7575F1157EC0D5D14F355A71 /* cast.h */, + 226C03444B188CA7B83180B5 /* cmac.h */, + 6C7E881CC17375BCFD94B079 /* cms.h */, + 29D120C3216606E0D0E38292 /* comp.h */, + 0A3BD6AA1943A591A62CF9F7 /* conf.h */, + CF2BFF941AD045C0D182C7F5 /* conf_api.h */, + FDAEDA6A01F7E90E218608B5 /* crypto.h */, + 7BEE0B25C68F079E2379FB1C /* des.h */, + 75197BB6C0BFCE87B99AF3CD /* des_old.h */, + BEB936612FA5AB6C0EA3750E /* dh.h */, + E7AA6541301B765CD89C38A0 /* dsa.h */, + 73156C201870E987C74B6738 /* dso.h */, + 0E8A6ED397D728F0962FEED2 /* dtls1.h */, + BC50D6C0EDDA2137FF5B9F0C /* e_os2.h */, + 93C01AC87F3B2EF1D5D173DB /* ebcdic.h */, + 3011AE24DBD35E465BF14C9C /* ec.h */, + 44B2F049CA0245DCBC508E26 /* ecdh.h */, + 13DBBD313C8564CB0CAFEDAC /* ecdsa.h */, + C66D45673D7763BF3FB415CD /* engine.h */, + 5444F0D733BDCCF0C66FC7D0 /* err.h */, + C435C6F48320B473E8613295 /* evp.h */, + E9FA70BF4097D65389FA59AC /* hmac.h */, + 2AFE2F96F3BA957A136F8A2B /* idea.h */, + 0809DD01FDE59CD1EFB6D636 /* krb5_asn.h */, + 950AB0522A0BC115176E1220 /* kssl.h */, + F304D97A32D80D7F715D6102 /* lhash.h */, + 5A8ED88B50564CF261259E9E /* md4.h */, + FB6F0BA41893D0D1545B71EE /* md5.h */, + 9A57AAFA472CE551A0286E58 /* mdc2.h */, + EB9C0EE1A75B1423A6BDBE49 /* modes.h */, + 07F5BAF9B5CF55FC478B0D0A /* obj_mac.h */, + F853C28E2E1FC4B83B1E7749 /* objects.h */, + 8796B609F1190B35D9470453 /* ocsp.h */, + 34970722147171DD2BAEA410 /* opensslconf.h */, + C3C3A66152B8082886283639 /* opensslv.h */, + 75CD3955821C634705902FCA /* ossl_typ.h */, + 161DF9042CB0B07FC5FFBECC /* pem.h */, + 3AA8A71893E5C4EE5C7ABF95 /* pem2.h */, + A1F511C90105C96436D0C755 /* pkcs12.h */, + 539C013017EDDB6651CA2D63 /* pkcs7.h */, + 2DBE3F85307E7A651F0C744A /* pqueue.h */, + 0AE7EB8912A362B52D69DAAE /* rand.h */, + 4844D36317538B6C1D0BFFC3 /* rc2.h */, + B93C2B4DA29B05A0726D5F57 /* rc4.h */, + 7743870EA88CF21EFD5885AE /* ripemd.h */, + 0A808438B9F93887673DD7AC /* rsa.h */, + F693034043D58F16622393A6 /* safestack.h */, + 91FD576AC5283AA42A91123F /* seed.h */, + 298A400E2112574E4D61D65B /* sha.h */, + FF251F24C57FD17A2C76DEBE /* srp.h */, + B4D5AF2998A4A681DCA6DCAD /* srtp.h */, + 953273654ED5A630CA9349F7 /* ssl.h */, + 3E6C8DE037DA5B65C25A86F0 /* ssl2.h */, + 8D5293B1EE5895825BB8A2DE /* ssl23.h */, + 0CB2B0EC73A14FF1B8759918 /* ssl3.h */, + 933AFC88FEDEB2AC5E9835FA /* stack.h */, + 6A53A8F4F7D54721FD05EC61 /* symhacks.h */, + 759DE479AB35C4842C642BE7 /* tls1.h */, + 0C00D2DB61F8F74057937625 /* ts.h */, + 9FCE0036FE574FD1660DB195 /* txt_db.h */, + C74DCB3D644BFA55028A9F4A /* ui.h */, + A7FA80761A7F7E17668FD0B3 /* ui_compat.h */, + FF40B15F1B3A8D3903D06BBE /* whrlpool.h */, + 21595BDA65FEEB600C542C9F /* x509.h */, + A260B3DB0550C6F0318D0299 /* x509_vfy.h */, + 837B8A531D5994C64B1D5146 /* x509v3.h */, + 3303B7C2943AFE8E3183BC51 /* Frameworks */, + 581E4498F8316F69F947EB23 /* Support Files */, + ); + path = "OpenSSL-Universal"; + sourceTree = ""; + }; + 9299FD0F75834B00EAE89A63 /* Pods-ObjectivePGP */ = { + isa = PBXGroup; + children = ( + 835BEDFF1067392DD37AED22 /* Pods-ObjectivePGP-acknowledgements.markdown */, + 0F51BFF24ECA170B32DDBE57 /* Pods-ObjectivePGP-acknowledgements.plist */, + DEFAA36E1E69A4CD940EFF95 /* Pods-ObjectivePGP-dummy.m */, + 09C35F36C883D49E39287F44 /* Pods-ObjectivePGP-environment.h */, + DB716261D8FEDE9E3BCB7D11 /* Pods-ObjectivePGP-resources.sh */, + 1F687871A8F8DF80F0709F8C /* Pods-ObjectivePGP.debug.xcconfig */, + 63B99B92613B9DFC7C91019F /* Pods-ObjectivePGP.release.xcconfig */, + ); + name = "Pods-ObjectivePGP"; + path = "Target Support Files/Pods-ObjectivePGP"; + sourceTree = ""; + }; + 9D3ACB276F04E8ABD480A6E5 /* Frameworks */ = { + isa = PBXGroup; + children = ( + 5E268E083272F80E4552DE01 /* iOS */, + ); + name = Frameworks; + sourceTree = ""; + }; + EE2717983C70C1D3CD8678DF /* Products */ = { + isa = PBXGroup; + children = ( + 1F4E19D17B7FFD513033074F /* libPods-ObjectivePGP.a */, + A8A6F917A744D9D228AD6836 /* libPods-ObjectivePGP-OpenSSL-Universal.a */, + ); + name = Products; + sourceTree = ""; + }; + F4541D76AED04EA6B48DCB6D = { + isa = PBXGroup; + children = ( + 359711D40862DA19BE702C3C /* Podfile */, + 9D3ACB276F04E8ABD480A6E5 /* Frameworks */, + 189FBE8FB5431FE98E1CF24C /* Pods */, + EE2717983C70C1D3CD8678DF /* Products */, + 2EFF7BA7AFD7BC2F8AF1C63A /* Targets Support Files */, + ); + sourceTree = ""; + }; +/* End PBXGroup section */ + +/* Begin PBXHeadersBuildPhase section */ + DB5FE1347254CDCA96DB5E06 /* Headers */ = { + isa = PBXHeadersBuildPhase; + buildActionMask = 2147483647; + files = ( + EAD00B03615ACE8A669239FC /* aes.h in Headers */, + E6E94CF6296F0433E78E93B1 /* asn1.h in Headers */, + DB54282FE015FACBB9FE22B8 /* asn1_mac.h in Headers */, + E3375A8262850ECC2F773A1A /* asn1t.h in Headers */, + BEEA0B7FEA63A8CEBEF2ECAF /* bio.h in Headers */, + 181B1AA754A36D6B7DAD0C75 /* blowfish.h in Headers */, + B0BCF89756929A1CB5622DB7 /* bn.h in Headers */, + AC16A06571ECC927DFB5E935 /* buffer.h in Headers */, + B47D2EF4D9C9087C6A05A186 /* camellia.h in Headers */, + 5ED958A919BC22B46A7D74B3 /* cast.h in Headers */, + 7AB0767C1B978437951FB807 /* cmac.h in Headers */, + 221C6AD3B8E72E9977608CB0 /* cms.h in Headers */, + EEEE85B08D7B70D83E6D2D73 /* comp.h in Headers */, + 10048EE39A5BDF4D86856A01 /* conf.h in Headers */, + 46670EFB00F671D2682948DC /* conf_api.h in Headers */, + 909E3F08CFCD0E467E3EFDA9 /* crypto.h in Headers */, + 6A0E1D29E1027C7FB4F9E9AD /* des.h in Headers */, + 8F305DBCB5C244BBC92CE04C /* des_old.h in Headers */, + 03281A17079689226EA63E45 /* dh.h in Headers */, + F938279DB175439B58C41854 /* dsa.h in Headers */, + B835A3ED5A38EFD7A909A293 /* dso.h in Headers */, + 847E62F4B9E73722517A34DC /* dtls1.h in Headers */, + D79E3B58118E8509B49F1F7C /* e_os2.h in Headers */, + B55D0D7FA43EF7D6747CF15A /* ebcdic.h in Headers */, + 183A9C485D37B5CF9C0FD9CF /* ec.h in Headers */, + 9BB126C15B88CBE388BF11AF /* ecdh.h in Headers */, + 51572A02535B6D9FFCDF076C /* ecdsa.h in Headers */, + 2730CC5FC752AAF2417EA630 /* engine.h in Headers */, + 6DCFF853F6189EB96805B4C6 /* err.h in Headers */, + 805AE35EC99D5BC49AB3B892 /* evp.h in Headers */, + C3F1186892C909C3774B35E7 /* hmac.h in Headers */, + 5853A0420B7E220565F29A44 /* idea.h in Headers */, + 618C78E3B642A710CB96C210 /* krb5_asn.h in Headers */, + 377D8C5079A035612849324E /* kssl.h in Headers */, + 2552EAAEAD742A6ABCAB2CA9 /* lhash.h in Headers */, + 0E83EAD476C3A7C12E391E24 /* md4.h in Headers */, + 5C3D1281994F29D1D94AF215 /* md5.h in Headers */, + 135DAAD3F39B190AD20B2EBD /* mdc2.h in Headers */, + E2E39E3F7F4C3A7C2270D03F /* modes.h in Headers */, + ABF30A9F304B5778B18CA1D3 /* obj_mac.h in Headers */, + F7B4B113F0F2C3A1A449F531 /* objects.h in Headers */, + 1DE1BAD06B204B7E6C8238CF /* ocsp.h in Headers */, + 0F68C503AAF4C3F906D34707 /* opensslconf.h in Headers */, + 660367CCE7C33A077025F4AB /* opensslv.h in Headers */, + 8173FE8EA3C9970B10EFFB00 /* ossl_typ.h in Headers */, + ABB65695C123E71ACF6019F7 /* pem.h in Headers */, + 726EB41DD0568FE3B97612D0 /* pem2.h in Headers */, + 36D46759A2542A908C91305E /* pkcs12.h in Headers */, + AA19091BCBB04387956CD80F /* pkcs7.h in Headers */, + DB05096A45B584BB7066CB49 /* pqueue.h in Headers */, + 2DB20BA22FE237B58EB85370 /* rand.h in Headers */, + 6E4626A0D37CF90A82AD4978 /* rc2.h in Headers */, + F66ACEFF63ED57DFAD733508 /* rc4.h in Headers */, + 0C0C1B3272D9F336F8DBBEC0 /* ripemd.h in Headers */, + A54F6C5CF7B670FDAD3BC3DA /* rsa.h in Headers */, + 367DF49B9914E69D2A2CA03C /* safestack.h in Headers */, + F21BC4663B47D258CECFC854 /* seed.h in Headers */, + 57615BF6BF10E0CEC7DA22F9 /* sha.h in Headers */, + 570120B060D44E5336AEB00B /* srp.h in Headers */, + A974DD3CB416C8BCEEBF971F /* srtp.h in Headers */, + A5163AC158BC20F491AB77D1 /* ssl.h in Headers */, + 141AA602297EF6479B8924E5 /* ssl2.h in Headers */, + 6DABBD1C7A442E2DA3B21E85 /* ssl23.h in Headers */, + C19B53F18AAC8FF22F88612E /* ssl3.h in Headers */, + 54FB556F2B27A6802833C118 /* stack.h in Headers */, + C56E102B2C4D0E68AFD5D1BC /* symhacks.h in Headers */, + A753746C1AE0EA3F2469A974 /* tls1.h in Headers */, + 231472CF27AF119AC33E1E98 /* ts.h in Headers */, + 457A69CE0A853AA928481010 /* txt_db.h in Headers */, + D46586CC811985C9FD8DFEC0 /* ui.h in Headers */, + FDF627131ECF91A273340A55 /* ui_compat.h in Headers */, + AAAAC2095B2E56DBB7079C4E /* whrlpool.h in Headers */, + 587C3CA1691D406C899298E1 /* x509.h in Headers */, + 2BB2F454ED9FFB8AC19AD412 /* x509_vfy.h in Headers */, + 57242EE3A12AED49125FAB44 /* x509v3.h in Headers */, + ); + runOnlyForDeploymentPostprocessing = 0; + }; +/* End PBXHeadersBuildPhase section */ + +/* Begin PBXNativeTarget section */ + 429EEBFFE5895FEE4F82D8CF /* Pods-ObjectivePGP */ = { + isa = PBXNativeTarget; + buildConfigurationList = 845934CBA9734209A66B23D9 /* Build configuration list for PBXNativeTarget "Pods-ObjectivePGP" */; + buildPhases = ( + 6EF83AC3BC327FEADEAA4116 /* Sources */, + BF1C22A1016214AC4104C44F /* Frameworks */, + ); + buildRules = ( + ); + dependencies = ( + 90677937CCA3545EB46F4F1E /* PBXTargetDependency */, + ); + name = "Pods-ObjectivePGP"; + productName = "Pods-ObjectivePGP"; + productReference = 1F4E19D17B7FFD513033074F /* libPods-ObjectivePGP.a */; + productType = "com.apple.product-type.library.static"; + }; + EC2A770536762ACB3AF1DCB5 /* Pods-ObjectivePGP-OpenSSL-Universal */ = { + isa = PBXNativeTarget; + buildConfigurationList = D4A8C39BA7E9DB92FC6DA2EE /* Build configuration list for PBXNativeTarget "Pods-ObjectivePGP-OpenSSL-Universal" */; + buildPhases = ( + 5F248487ED7BEFF732C908F3 /* Sources */, + BF0FBDCA9E401F70F9D52DD5 /* Frameworks */, + DB5FE1347254CDCA96DB5E06 /* Headers */, + ); + buildRules = ( + ); + dependencies = ( + ); + name = "Pods-ObjectivePGP-OpenSSL-Universal"; + productName = "Pods-ObjectivePGP-OpenSSL-Universal"; + productReference = A8A6F917A744D9D228AD6836 /* libPods-ObjectivePGP-OpenSSL-Universal.a */; + productType = "com.apple.product-type.library.static"; + }; +/* End PBXNativeTarget section */ + +/* Begin PBXProject section */ + A293D69F5DD04BC2C384E77E /* Project object */ = { + isa = PBXProject; + attributes = { + LastUpgradeCheck = 0510; + }; + buildConfigurationList = B1E44B6FAAC59012E8EC448C /* Build configuration list for PBXProject "Pods" */; + compatibilityVersion = "Xcode 3.2"; + developmentRegion = English; + hasScannedForEncodings = 0; + knownRegions = ( + en, + ); + mainGroup = F4541D76AED04EA6B48DCB6D; + productRefGroup = EE2717983C70C1D3CD8678DF /* Products */; + projectDirPath = ""; + projectRoot = ""; + targets = ( + 429EEBFFE5895FEE4F82D8CF /* Pods-ObjectivePGP */, + EC2A770536762ACB3AF1DCB5 /* Pods-ObjectivePGP-OpenSSL-Universal */, + ); + }; +/* End PBXProject section */ + +/* Begin PBXSourcesBuildPhase section */ + 5F248487ED7BEFF732C908F3 /* Sources */ = { + isa = PBXSourcesBuildPhase; + buildActionMask = 2147483647; + files = ( + C6F31693FC8CCBDB6DDB800F /* Pods-ObjectivePGP-OpenSSL-Universal-dummy.m in Sources */, + ); + runOnlyForDeploymentPostprocessing = 0; + }; + 6EF83AC3BC327FEADEAA4116 /* Sources */ = { + isa = PBXSourcesBuildPhase; + buildActionMask = 2147483647; + files = ( + 6C3273FD8C9139961541AF16 /* Pods-ObjectivePGP-dummy.m in Sources */, + ); + runOnlyForDeploymentPostprocessing = 0; + }; +/* End PBXSourcesBuildPhase section */ + +/* Begin PBXTargetDependency section */ + 90677937CCA3545EB46F4F1E /* PBXTargetDependency */ = { + isa = PBXTargetDependency; + name = "Pods-ObjectivePGP-OpenSSL-Universal"; + target = EC2A770536762ACB3AF1DCB5 /* Pods-ObjectivePGP-OpenSSL-Universal */; + targetProxy = 4EDC1E08811916CE84FE4C00 /* PBXContainerItemProxy */; + }; +/* End PBXTargetDependency section */ + +/* Begin XCBuildConfiguration section */ + 02C0555200CB8A287590DCE9 /* Release */ = { + isa = XCBuildConfiguration; + baseConfigurationReference = A119F15E4EF7813A5D74DF0B /* Pods-ObjectivePGP-OpenSSL-Universal-Private.xcconfig */; + buildSettings = { + ENABLE_STRICT_OBJC_MSGSEND = YES; + GCC_PREFIX_HEADER = "Target Support Files/Pods-ObjectivePGP-OpenSSL-Universal/Pods-ObjectivePGP-OpenSSL-Universal-prefix.pch"; + IPHONEOS_DEPLOYMENT_TARGET = 6.0; + MTL_ENABLE_DEBUG_INFO = NO; + OTHER_LDFLAGS = ""; + OTHER_LIBTOOLFLAGS = ""; + PRODUCT_NAME = "$(TARGET_NAME)"; + SDKROOT = iphoneos; + SKIP_INSTALL = YES; + }; + name = Release; + }; + 2B0F023E5565548CB3D3D695 /* Debug */ = { + isa = XCBuildConfiguration; + baseConfigurationReference = A119F15E4EF7813A5D74DF0B /* Pods-ObjectivePGP-OpenSSL-Universal-Private.xcconfig */; + buildSettings = { + ENABLE_STRICT_OBJC_MSGSEND = YES; + GCC_PREFIX_HEADER = "Target Support Files/Pods-ObjectivePGP-OpenSSL-Universal/Pods-ObjectivePGP-OpenSSL-Universal-prefix.pch"; + IPHONEOS_DEPLOYMENT_TARGET = 6.0; + MTL_ENABLE_DEBUG_INFO = YES; + OTHER_LDFLAGS = ""; + OTHER_LIBTOOLFLAGS = ""; + PRODUCT_NAME = "$(TARGET_NAME)"; + SDKROOT = iphoneos; + SKIP_INSTALL = YES; + }; + name = Debug; + }; + 6345B535E279E366E570BAB6 /* Debug */ = { + isa = XCBuildConfiguration; + buildSettings = { + ALWAYS_SEARCH_USER_PATHS = NO; + CLANG_CXX_LANGUAGE_STANDARD = "gnu++0x"; + CLANG_CXX_LIBRARY = "libc++"; + CLANG_ENABLE_MODULES = YES; + CLANG_ENABLE_OBJC_ARC = YES; + CLANG_WARN_BOOL_CONVERSION = YES; + CLANG_WARN_CONSTANT_CONVERSION = YES; + CLANG_WARN_DIRECT_OBJC_ISA_USAGE = YES; + CLANG_WARN_EMPTY_BODY = YES; + CLANG_WARN_ENUM_CONVERSION = YES; + CLANG_WARN_INT_CONVERSION = YES; + CLANG_WARN_OBJC_ROOT_CLASS = YES; + CLANG_WARN_UNREACHABLE_CODE = YES; + CLANG_WARN__DUPLICATE_METHOD_MATCH = YES; + COPY_PHASE_STRIP = YES; + GCC_C_LANGUAGE_STANDARD = gnu99; + GCC_DYNAMIC_NO_PIC = NO; + GCC_OPTIMIZATION_LEVEL = 0; + GCC_PREPROCESSOR_DEFINITIONS = ( + "DEBUG=1", + "$(inherited)", + ); + GCC_SYMBOLS_PRIVATE_EXTERN = NO; + GCC_WARN_64_TO_32_BIT_CONVERSION = YES; + GCC_WARN_ABOUT_RETURN_TYPE = YES; + GCC_WARN_UNDECLARED_SELECTOR = YES; + GCC_WARN_UNINITIALIZED_AUTOS = YES; + GCC_WARN_UNUSED_FUNCTION = YES; + GCC_WARN_UNUSED_VARIABLE = YES; + IPHONEOS_DEPLOYMENT_TARGET = 6.0; + ONLY_ACTIVE_ARCH = YES; + STRIP_INSTALLED_PRODUCT = NO; + }; + name = Debug; + }; + 854063A3C4D3BFB6181C5319 /* Debug */ = { + isa = XCBuildConfiguration; + baseConfigurationReference = 1F687871A8F8DF80F0709F8C /* Pods-ObjectivePGP.debug.xcconfig */; + buildSettings = { + ENABLE_STRICT_OBJC_MSGSEND = YES; + IPHONEOS_DEPLOYMENT_TARGET = 6.0; + MTL_ENABLE_DEBUG_INFO = YES; + OTHER_LDFLAGS = ""; + OTHER_LIBTOOLFLAGS = ""; + PODS_ROOT = "$(SRCROOT)"; + PRODUCT_NAME = "$(TARGET_NAME)"; + SDKROOT = iphoneos; + SKIP_INSTALL = YES; + }; + name = Debug; + }; + A012898F93049E8A8C7FECBF /* Release */ = { + isa = XCBuildConfiguration; + buildSettings = { + ALWAYS_SEARCH_USER_PATHS = NO; + CLANG_CXX_LANGUAGE_STANDARD = "gnu++0x"; + CLANG_CXX_LIBRARY = "libc++"; + CLANG_ENABLE_MODULES = YES; + CLANG_ENABLE_OBJC_ARC = YES; + CLANG_WARN_BOOL_CONVERSION = YES; + CLANG_WARN_CONSTANT_CONVERSION = YES; + CLANG_WARN_DIRECT_OBJC_ISA_USAGE = YES; + CLANG_WARN_EMPTY_BODY = YES; + CLANG_WARN_ENUM_CONVERSION = YES; + CLANG_WARN_INT_CONVERSION = YES; + CLANG_WARN_OBJC_ROOT_CLASS = YES; + CLANG_WARN_UNREACHABLE_CODE = YES; + CLANG_WARN__DUPLICATE_METHOD_MATCH = YES; + COPY_PHASE_STRIP = NO; + ENABLE_NS_ASSERTIONS = NO; + GCC_C_LANGUAGE_STANDARD = gnu99; + GCC_PREPROCESSOR_DEFINITIONS = "RELEASE=1"; + GCC_WARN_64_TO_32_BIT_CONVERSION = YES; + GCC_WARN_ABOUT_RETURN_TYPE = YES; + GCC_WARN_UNDECLARED_SELECTOR = YES; + GCC_WARN_UNINITIALIZED_AUTOS = YES; + GCC_WARN_UNUSED_FUNCTION = YES; + GCC_WARN_UNUSED_VARIABLE = YES; + IPHONEOS_DEPLOYMENT_TARGET = 6.0; + STRIP_INSTALLED_PRODUCT = NO; + VALIDATE_PRODUCT = YES; + }; + name = Release; + }; + C7312036FCA49A4767BE9EF6 /* Release */ = { + isa = XCBuildConfiguration; + baseConfigurationReference = 63B99B92613B9DFC7C91019F /* Pods-ObjectivePGP.release.xcconfig */; + buildSettings = { + ENABLE_STRICT_OBJC_MSGSEND = YES; + IPHONEOS_DEPLOYMENT_TARGET = 6.0; + MTL_ENABLE_DEBUG_INFO = NO; + OTHER_LDFLAGS = ""; + OTHER_LIBTOOLFLAGS = ""; + PODS_ROOT = "$(SRCROOT)"; + PRODUCT_NAME = "$(TARGET_NAME)"; + SDKROOT = iphoneos; + SKIP_INSTALL = YES; + }; + name = Release; + }; +/* End XCBuildConfiguration section */ + +/* Begin XCConfigurationList section */ + 845934CBA9734209A66B23D9 /* Build configuration list for PBXNativeTarget "Pods-ObjectivePGP" */ = { + isa = XCConfigurationList; + buildConfigurations = ( + 854063A3C4D3BFB6181C5319 /* Debug */, + C7312036FCA49A4767BE9EF6 /* Release */, + ); + defaultConfigurationIsVisible = 0; + defaultConfigurationName = Release; + }; + B1E44B6FAAC59012E8EC448C /* Build configuration list for PBXProject "Pods" */ = { + isa = XCConfigurationList; + buildConfigurations = ( + 6345B535E279E366E570BAB6 /* Debug */, + A012898F93049E8A8C7FECBF /* Release */, + ); + defaultConfigurationIsVisible = 0; + defaultConfigurationName = Release; + }; + D4A8C39BA7E9DB92FC6DA2EE /* Build configuration list for PBXNativeTarget "Pods-ObjectivePGP-OpenSSL-Universal" */ = { + isa = XCConfigurationList; + buildConfigurations = ( + 2B0F023E5565548CB3D3D695 /* Debug */, + 02C0555200CB8A287590DCE9 /* Release */, + ); + defaultConfigurationIsVisible = 0; + defaultConfigurationName = Release; + }; +/* End XCConfigurationList section */ + }; + rootObject = A293D69F5DD04BC2C384E77E /* Project object */; +} diff --git a/Pods/Target Support Files/Pods-ObjectivePGP-OpenSSL-Universal/Pods-ObjectivePGP-OpenSSL-Universal-Private.xcconfig b/Pods/Target Support Files/Pods-ObjectivePGP-OpenSSL-Universal/Pods-ObjectivePGP-OpenSSL-Universal-Private.xcconfig new file mode 100644 index 00000000..6d1da6f4 --- /dev/null +++ b/Pods/Target Support Files/Pods-ObjectivePGP-OpenSSL-Universal/Pods-ObjectivePGP-OpenSSL-Universal-Private.xcconfig @@ -0,0 +1,6 @@ +#include "Pods-ObjectivePGP-OpenSSL-Universal.xcconfig" +GCC_PREPROCESSOR_DEFINITIONS = $(inherited) COCOAPODS=1 +HEADER_SEARCH_PATHS = "${PODS_ROOT}/Headers/Private" "${PODS_ROOT}/Headers/Private/OpenSSL-Universal" "${PODS_ROOT}/Headers/Private/OpenSSL-Universal/openssl" "${PODS_ROOT}/Headers/Public" "${PODS_ROOT}/Headers/Public/OpenSSL-Universal" "${PODS_ROOT}/Headers/Public/OpenSSL-Universal/openssl" +LIBRARY_SEARCH_PATHS = ${PODS_OBJECTIVEPGP_OPENSSL_UNIVERSAL_LIBRARY_SEARCH_PATHS} +OTHER_LDFLAGS = ${PODS_OBJECTIVEPGP_OPENSSL_UNIVERSAL_OTHER_LDFLAGS} -ObjC +PODS_ROOT = ${SRCROOT} \ No newline at end of file diff --git a/Pods/Pods-ObjectivePGP-OpenSSL-Universal-dummy.m b/Pods/Target Support Files/Pods-ObjectivePGP-OpenSSL-Universal/Pods-ObjectivePGP-OpenSSL-Universal-dummy.m similarity index 100% rename from Pods/Pods-ObjectivePGP-OpenSSL-Universal-dummy.m rename to Pods/Target Support Files/Pods-ObjectivePGP-OpenSSL-Universal/Pods-ObjectivePGP-OpenSSL-Universal-dummy.m diff --git a/Pods/Pods-ObjectivePGP-OpenSSL-Universal-prefix.pch b/Pods/Target Support Files/Pods-ObjectivePGP-OpenSSL-Universal/Pods-ObjectivePGP-OpenSSL-Universal-prefix.pch similarity index 100% rename from Pods/Pods-ObjectivePGP-OpenSSL-Universal-prefix.pch rename to Pods/Target Support Files/Pods-ObjectivePGP-OpenSSL-Universal/Pods-ObjectivePGP-OpenSSL-Universal-prefix.pch diff --git a/Pods/Pods-ObjectivePGP-OpenSSL-Universal.xcconfig b/Pods/Target Support Files/Pods-ObjectivePGP-OpenSSL-Universal/Pods-ObjectivePGP-OpenSSL-Universal.xcconfig similarity index 66% rename from Pods/Pods-ObjectivePGP-OpenSSL-Universal.xcconfig rename to Pods/Target Support Files/Pods-ObjectivePGP-OpenSSL-Universal/Pods-ObjectivePGP-OpenSSL-Universal.xcconfig index 85c04526..1325824e 100644 --- a/Pods/Pods-ObjectivePGP-OpenSSL-Universal.xcconfig +++ b/Pods/Target Support Files/Pods-ObjectivePGP-OpenSSL-Universal/Pods-ObjectivePGP-OpenSSL-Universal.xcconfig @@ -1,2 +1,2 @@ PODS_OBJECTIVEPGP_OPENSSL_UNIVERSAL_LIBRARY_SEARCH_PATHS = "$(PODS_ROOT)/OpenSSL-Universal/lib-ios" "$(PODS_ROOT)/OpenSSL-Universal/lib-ios" -PODS_OBJECTIVEPGP_OPENSSL_UNIVERSAL_OTHER_LDFLAGS = -lcrypto -lssl \ No newline at end of file +PODS_OBJECTIVEPGP_OPENSSL_UNIVERSAL_OTHER_LDFLAGS = -l"crypto" -l"ssl" \ No newline at end of file diff --git a/Pods/Pods-ObjectivePGP-acknowledgements.markdown b/Pods/Target Support Files/Pods-ObjectivePGP/Pods-ObjectivePGP-acknowledgements.markdown similarity index 100% rename from Pods/Pods-ObjectivePGP-acknowledgements.markdown rename to Pods/Target Support Files/Pods-ObjectivePGP/Pods-ObjectivePGP-acknowledgements.markdown diff --git a/Pods/Pods-ObjectivePGP-acknowledgements.plist b/Pods/Target Support Files/Pods-ObjectivePGP/Pods-ObjectivePGP-acknowledgements.plist similarity index 100% rename from Pods/Pods-ObjectivePGP-acknowledgements.plist rename to Pods/Target Support Files/Pods-ObjectivePGP/Pods-ObjectivePGP-acknowledgements.plist diff --git a/Pods/Pods-ObjectivePGP-dummy.m b/Pods/Target Support Files/Pods-ObjectivePGP/Pods-ObjectivePGP-dummy.m similarity index 100% rename from Pods/Pods-ObjectivePGP-dummy.m rename to Pods/Target Support Files/Pods-ObjectivePGP/Pods-ObjectivePGP-dummy.m diff --git a/Pods/Pods-ObjectivePGP-environment.h b/Pods/Target Support Files/Pods-ObjectivePGP/Pods-ObjectivePGP-environment.h similarity index 95% rename from Pods/Pods-ObjectivePGP-environment.h rename to Pods/Target Support Files/Pods-ObjectivePGP/Pods-ObjectivePGP-environment.h index 0f3626dd..70023076 100644 --- a/Pods/Pods-ObjectivePGP-environment.h +++ b/Pods/Target Support Files/Pods-ObjectivePGP/Pods-ObjectivePGP-environment.h @@ -11,5 +11,5 @@ // This library does not follow semantic-versioning, // so we were not able to define version macros. // Please contact the author. -// Version: 1.0.1.h. +// Version: 1.0.1.k. diff --git a/Pods/Pods-ObjectivePGP-resources.sh b/Pods/Target Support Files/Pods-ObjectivePGP/Pods-ObjectivePGP-resources.sh similarity index 85% rename from Pods/Pods-ObjectivePGP-resources.sh rename to Pods/Target Support Files/Pods-ObjectivePGP/Pods-ObjectivePGP-resources.sh index 39c2549a..e149064a 100755 --- a/Pods/Pods-ObjectivePGP-resources.sh +++ b/Pods/Target Support Files/Pods-ObjectivePGP/Pods-ObjectivePGP-resources.sh @@ -1,6 +1,8 @@ #!/bin/sh set -e +mkdir -p "${CONFIGURATION_BUILD_DIR}/${UNLOCALIZED_RESOURCES_FOLDER_PATH}" + RESOURCES_TO_COPY=${PODS_ROOT}/resources-to-copy-${TARGETNAME}.txt > "$RESOURCES_TO_COPY" @@ -29,6 +31,10 @@ install_resource() echo "xcrun momc \"${PODS_ROOT}/$1\" \"${CONFIGURATION_BUILD_DIR}/${UNLOCALIZED_RESOURCES_FOLDER_PATH}/`basename "$1" .xcdatamodeld`.momd\"" xcrun momc "${PODS_ROOT}/$1" "${CONFIGURATION_BUILD_DIR}/${UNLOCALIZED_RESOURCES_FOLDER_PATH}/`basename "$1" .xcdatamodeld`.momd" ;; + *.xcmappingmodel) + echo "xcrun mapc \"${PODS_ROOT}/$1\" \"${CONFIGURATION_BUILD_DIR}/${UNLOCALIZED_RESOURCES_FOLDER_PATH}/`basename "$1" .xcmappingmodel`.cdm\"" + xcrun mapc "${PODS_ROOT}/$1" "${CONFIGURATION_BUILD_DIR}/${UNLOCALIZED_RESOURCES_FOLDER_PATH}/`basename "$1" .xcmappingmodel`.cdm" + ;; *.xcassets) ;; /*) @@ -48,9 +54,9 @@ if [[ "${ACTION}" == "install" ]]; then fi rm -f "$RESOURCES_TO_COPY" -if [[ -n "${WRAPPER_EXTENSION}" ]] && [ `xcrun --find actool` ] && [ `find . -name '*.xcassets' | wc -l` -ne 0 ] +if [[ -n "${WRAPPER_EXTENSION}" ]] && [ "`xcrun --find actool`" ] && [ `find . -name '*.xcassets' | wc -l` -ne 0 ] then - case "${TARGETED_DEVICE_FAMILY}" in + case "${TARGETED_DEVICE_FAMILY}" in 1,2) TARGET_DEVICE_ARGS="--target-device ipad --target-device iphone" ;; @@ -62,7 +68,7 @@ then ;; *) TARGET_DEVICE_ARGS="--target-device mac" - ;; - esac + ;; + esac find "${PWD}" -name "*.xcassets" -print0 | xargs -0 actool --output-format human-readable-text --notices --warnings --platform "${PLATFORM_NAME}" --minimum-deployment-target "${IPHONEOS_DEPLOYMENT_TARGET}" ${TARGET_DEVICE_ARGS} --compress-pngs --compile "${BUILT_PRODUCTS_DIR}/${UNLOCALIZED_RESOURCES_FOLDER_PATH}" fi diff --git a/Pods/Target Support Files/Pods-ObjectivePGP/Pods-ObjectivePGP.debug.xcconfig b/Pods/Target Support Files/Pods-ObjectivePGP/Pods-ObjectivePGP.debug.xcconfig new file mode 100644 index 00000000..deaf5eee --- /dev/null +++ b/Pods/Target Support Files/Pods-ObjectivePGP/Pods-ObjectivePGP.debug.xcconfig @@ -0,0 +1,7 @@ +GCC_PREPROCESSOR_DEFINITIONS = $(inherited) COCOAPODS=1 +HEADER_SEARCH_PATHS = "${PODS_ROOT}/Headers/Public" "${PODS_ROOT}/Headers/Public/OpenSSL-Universal" "${PODS_ROOT}/Headers/Public/OpenSSL-Universal/openssl" +LIBRARY_SEARCH_PATHS = "$(PODS_ROOT)/OpenSSL-Universal/lib-ios" "$(PODS_ROOT)/OpenSSL-Universal/lib-ios" +OTHER_CFLAGS = $(inherited) -isystem "${PODS_ROOT}/Headers/Public" -isystem "${PODS_ROOT}/Headers/Public/OpenSSL-Universal" -isystem "${PODS_ROOT}/Headers/Public/OpenSSL-Universal/openssl" +OTHER_LDFLAGS = -ObjC -l"Pods-ObjectivePGP-OpenSSL-Universal" -l"crypto" -l"ssl" +OTHER_LIBTOOLFLAGS = $(OTHER_LDFLAGS) +PODS_ROOT = ${SRCROOT}/Pods \ No newline at end of file diff --git a/Pods/Target Support Files/Pods-ObjectivePGP/Pods-ObjectivePGP.release.xcconfig b/Pods/Target Support Files/Pods-ObjectivePGP/Pods-ObjectivePGP.release.xcconfig new file mode 100644 index 00000000..deaf5eee --- /dev/null +++ b/Pods/Target Support Files/Pods-ObjectivePGP/Pods-ObjectivePGP.release.xcconfig @@ -0,0 +1,7 @@ +GCC_PREPROCESSOR_DEFINITIONS = $(inherited) COCOAPODS=1 +HEADER_SEARCH_PATHS = "${PODS_ROOT}/Headers/Public" "${PODS_ROOT}/Headers/Public/OpenSSL-Universal" "${PODS_ROOT}/Headers/Public/OpenSSL-Universal/openssl" +LIBRARY_SEARCH_PATHS = "$(PODS_ROOT)/OpenSSL-Universal/lib-ios" "$(PODS_ROOT)/OpenSSL-Universal/lib-ios" +OTHER_CFLAGS = $(inherited) -isystem "${PODS_ROOT}/Headers/Public" -isystem "${PODS_ROOT}/Headers/Public/OpenSSL-Universal" -isystem "${PODS_ROOT}/Headers/Public/OpenSSL-Universal/openssl" +OTHER_LDFLAGS = -ObjC -l"Pods-ObjectivePGP-OpenSSL-Universal" -l"crypto" -l"ssl" +OTHER_LIBTOOLFLAGS = $(OTHER_LDFLAGS) +PODS_ROOT = ${SRCROOT}/Pods \ No newline at end of file diff --git a/opgp/main.m b/opgp/main.m deleted file mode 100644 index 9de9d7bb..00000000 --- a/opgp/main.m +++ /dev/null @@ -1,190 +0,0 @@ -// -// main.m -// opgp -// -// Created by Marcin Krzyzanowski on 24/06/14. -// Copyright (c) 2014 Marcin Krzyżanowski. All rights reserved. -// - -#import -#import "ObjectivePGP.h" - -int main(int argc, const char * argv[]) { - @autoreleasepool { - NSUserDefaults *standardDefaults = [NSUserDefaults standardUserDefaults]; - - [standardDefaults registerDefaults:@{@"armor":@(YES)}]; - - NSString *inputPath = [standardDefaults stringForKey:@"input"]; - NSString *messagePlaintext = [standardDefaults stringForKey:@"msg"]; - NSString *outputFile = [standardDefaults stringForKey:@"output"]; - NSString *pubringFile = [standardDefaults stringForKey:@"pubring"]; - NSString *secringFile = [standardDefaults stringForKey:@"secring"]; - NSString *keyIdentifier = [standardDefaults stringForKey:@"keyid"]; - NSString *keyFile = [standardDefaults stringForKey:@"key"]; - NSString *passprase = [standardDefaults stringForKey:@"passphrase"]; - BOOL armor = [standardDefaults boolForKey:@"armor"]; - - if (outputFile) { - fprintf(stdout, "opgp (ObjectivePGP) 0.0.2 (alpha)\n"); - fprintf(stdout, "Copyright (C) 2014 Marcin Krzyżanowski \n"); - fprintf(stdout, "All rights reserved. No warranty, explicit or implicit, provided.\n"); - } - - NSArray *commandLineArguments = [[NSProcessInfo processInfo] arguments]; - if (commandLineArguments.count == 1 || [commandLineArguments containsObject:@"-help"]) { - fprintf(stdout, "\n"); - fprintf(stdout, "Usage: opgp [-encrypt] [-key keyfile.asc] [-armor 1] [-msg \"message\"] ...\n"); - fprintf(stdout, "Options:\n"); - fprintf(stdout, "\t-decrypt Decrypt mode (Default)\n"); - fprintf(stdout, "\t-encrypt Encrypt mode \n"); - fprintf(stdout, "\t-input file.txt - path or URL to input file\n"); - fprintf(stdout, "\t-msg \"message\" - input text\n"); - fprintf(stdout, "\t-keyid [28A83333F9C27197|F9C27197] - public or secret key identifier (Optional if \"-key\" is specified)\n"); - fprintf(stdout, "\t-key key.asc - public or secret key file\n"); - fprintf(stdout, "\t-output file.txt.gpg - output path (Optional)\n"); - fprintf(stdout, "\t-pubring [pubring.gpg|pubring.asc] - keyring with public keys (Optional)\n"); - fprintf(stdout, "\t-secring [secring.gpg|secring.asc] - keyring with public keys (Optional)\n"); - fprintf(stdout, "\t-passphrase 12345 - secret key password (Optional)\n"); - fprintf(stdout, "\t-armor [1|0] - output format (Optional)\n"); - fprintf(stdout, "\t-help Help\n"); - fprintf(stdout, "\t-license License\n"); - return 0; - } - - if ([commandLineArguments containsObject:@"-license"]) { - fprintf(stdout, "You are granted a non-exclusive License to use the Software for any purposes for an unlimited period of time.\n\ -The software product under this License is provided free of charge.\n\ -Even though a license fee is not paid for the use of Freeware Version software,\n\ -it does not mean that there are no conditions for using such software:\n\n\ -- The Software may be installed and used by the Licensee for any legal purpose.\n\ -- The Software may be installed and used by the Licensee on any number of systems.\n\ -- The Software can be copied and distributed under the condition that original copyright notice\n\ - and disclaimer of warranty will stay intact, and the Licensee will not charge money\n\ - or fees for the Software product, except to cover distribution costs.\n\ -- The Licensee will not have any proprietary rights in and to the Software.\n\ -- The Licensee acknowledges and agrees that the Licensor retains all copyrights\n\ - and other proprietary rights in and to the Software.\n\n\ -Use within the scope of this License is free of charge and no royalty or licensing fees shall be paid by the Licensee.\n\n"); - return 0; - } - - BOOL encrypt = NO; - if ([commandLineArguments containsObject:@"-encrypt"]) { - encrypt = YES; - } - - if (!pubringFile) { - pubringFile = [[NSHomeDirectory() stringByAppendingPathComponent:@".gnupg"] stringByAppendingPathComponent:@"pubring.gpg"]; - } - - if (!secringFile) { - secringFile = [[NSHomeDirectory() stringByAppendingPathComponent:@".gnupg"] stringByAppendingPathComponent:@"secring.gpg"]; - } - - // load or fetch input file - NSData *inputData = nil; - if (messagePlaintext) { - inputData = [messagePlaintext dataUsingEncoding:NSUTF8StringEncoding]; - } else { - NSURL *inputURL = [NSURL URLWithString:inputPath]; - if (inputURL.scheme) { - NSError *loadURLError = nil; - inputData = [NSData dataWithContentsOfURL:inputURL options:NSDataReadingMappedIfSafe error:&loadURLError]; - if (loadURLError) { - fprintf(stderr, "ERROR: Unable to fetch %s\n", inputPath.UTF8String); - return 1; - } - } else { - inputData = [NSData dataWithContentsOfMappedFile:inputPath]; - } - } - - if (!inputData) { - fprintf(stderr, "ERROR: Invalid input data\n"); - return 1; - } - - // Build output filename - if (!outputFile) { - NSString *extension = armor ? @"gpg.asc" : @"gpg"; - if (inputPath) { - outputFile = [[inputPath lastPathComponent] stringByAppendingPathExtension:extension]; - } - } - - ObjectivePGP *pgp = [[ObjectivePGP alloc] init]; - - if (pubringFile) { - [pgp importKeysFromFile:[pubringFile stringByExpandingTildeInPath] allowDuplicates:NO]; - } - - if (secringFile) { - [pgp importKeysFromFile:[secringFile stringByExpandingTildeInPath] allowDuplicates:NO]; - } - - // load key - PGPKey *operationKey = nil; - if (keyFile) { - NSData *fetchedKeyData = nil; - NSURL *keyURL = [NSURL URLWithString:keyFile]; - if (keyURL.scheme) { - NSError *loadURLError = nil; - fetchedKeyData = [NSData dataWithContentsOfURL:keyURL options:NSDataReadingMappedIfSafe error:&loadURLError]; - if (loadURLError) { - fprintf(stderr, "ERROR: Unable to fetch key at %s\n", keyFile.UTF8String); - return 1; - } - } else { - fetchedKeyData = [NSData dataWithContentsOfMappedFile:[keyFile stringByExpandingTildeInPath]]; - } - - NSArray *loadedKeys = [pgp importKeysFromData:fetchedKeyData allowDuplicates:NO]; - if (!keyIdentifier) { - PGPKey *key = loadedKeys[0]; - operationKey = key; - } - } - - if (keyIdentifier) { - if (encrypt) { - operationKey = [pgp getKeyForIdentifier:keyIdentifier type:PGPKeyPublic]; - } else { - operationKey = [pgp getKeyForIdentifier:keyIdentifier type:PGPKeySecret]; - } - - if (!operationKey) { - fprintf(stderr, "ERROR: Can't use key %s\n", keyIdentifier.UTF8String); - return 1; - } - } - - if (encrypt && !operationKey) { - fprintf(stderr, "ERROR: Can't find key to encrypt message, please specify one\n"); - return 1; - } - - NSData *outputData = nil; - NSError *operationError = nil; - if (encrypt) { - outputData = [pgp encryptData:inputData usingPublicKey:operationKey armored:armor error:&operationError]; - } else { - outputData = [pgp decryptData:inputData passphrase:passprase error:&operationError]; - } - - if (operationError) { - fprintf(stderr, "ERROR: %s\n", operationError.localizedDescription.UTF8String); - } else { - if (outputFile) { - if (![outputData writeToFile:[outputFile stringByExpandingTildeInPath] atomically:YES]) { - fprintf(stderr, "ERROR: Can't write to output file\n"); - return 1; - } - fprintf(stdout, "Written to %s\n", outputFile.UTF8String); - } else { - fwrite(outputData.bytes, outputData.length, 1, stdout); - } - } - } - return 0; -}