mirror of
https://github.com/openssl/openssl.git
synced 2024-11-27 05:21:51 +08:00
86db958835
Update makefiles so that consistent patterns are used. Object files are compiled from source using an implicit rule (but using our CFLAGS); for linking, we give an explicit rule. Ensure that "make test" works in each subdirectory (even if it does not actually run any applications). The top-level demo makefile now works. The makefiles are not make-agnostic. e.g. they use the variable $(RM) in "clean" recipes, which is defined in gnu-make but may not be defined in others. Part of #17806 Testing: $ cd demo $ make test Reviewed-by: Paul Dale <pauli@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/22698)
91 lines
2.0 KiB
C
91 lines
2.0 KiB
C
/*
|
|
* Copyright 2007-2023 The OpenSSL Project Authors. All Rights Reserved.
|
|
*
|
|
* Licensed under the Apache License 2.0 (the "License"). You may not use
|
|
* this file except in compliance with the License. You can obtain a copy
|
|
* in the file LICENSE in the source distribution or at
|
|
* https://www.openssl.org/source/license.html
|
|
*/
|
|
|
|
/* Simple S/MIME encrypt example */
|
|
#include <openssl/pem.h>
|
|
#include <openssl/pkcs7.h>
|
|
#include <openssl/err.h>
|
|
|
|
int main(int argc, char **argv)
|
|
{
|
|
BIO *in = NULL, *out = NULL, *tbio = NULL;
|
|
X509 *rcert = NULL;
|
|
STACK_OF(X509) *recips = NULL;
|
|
PKCS7 *p7 = NULL;
|
|
int ret = EXIT_FAILURE;
|
|
|
|
/*
|
|
* for streaming set PKCS7_STREAM
|
|
*/
|
|
int flags = PKCS7_STREAM;
|
|
|
|
OpenSSL_add_all_algorithms();
|
|
ERR_load_crypto_strings();
|
|
|
|
/* Read in recipient certificate */
|
|
tbio = BIO_new_file("signer.pem", "r");
|
|
|
|
if (!tbio)
|
|
goto err;
|
|
|
|
rcert = PEM_read_bio_X509(tbio, NULL, 0, NULL);
|
|
|
|
if (!rcert)
|
|
goto err;
|
|
|
|
/* Create recipient STACK and add recipient cert to it */
|
|
recips = sk_X509_new_null();
|
|
|
|
if (!recips || !sk_X509_push(recips, rcert))
|
|
goto err;
|
|
|
|
/*
|
|
* OSSL_STACK_OF_X509_free() will free up recipient STACK and its contents
|
|
* so set rcert to NULL so it isn't freed up twice.
|
|
*/
|
|
rcert = NULL;
|
|
|
|
/* Open content being encrypted */
|
|
|
|
in = BIO_new_file("encr.txt", "r");
|
|
|
|
if (!in)
|
|
goto err;
|
|
|
|
/* encrypt content */
|
|
p7 = PKCS7_encrypt(recips, in, EVP_des_ede3_cbc(), flags);
|
|
|
|
if (!p7)
|
|
goto err;
|
|
|
|
out = BIO_new_file("smencr.txt", "w");
|
|
if (!out)
|
|
goto err;
|
|
|
|
/* Write out S/MIME message */
|
|
if (!SMIME_write_PKCS7(out, p7, in, flags))
|
|
goto err;
|
|
|
|
printf("Success\n");
|
|
|
|
ret = EXIT_SUCCESS;
|
|
err:
|
|
if (ret != EXIT_SUCCESS) {
|
|
fprintf(stderr, "Error Encrypting Data\n");
|
|
ERR_print_errors_fp(stderr);
|
|
}
|
|
PKCS7_free(p7);
|
|
X509_free(rcert);
|
|
OSSL_STACK_OF_X509_free(recips);
|
|
BIO_free(in);
|
|
BIO_free(out);
|
|
BIO_free(tbio);
|
|
return ret;
|
|
}
|