Retire MD4. It has been depecared in OpenSSL since 3.0.0 [7 Sep 2021]

parent 517be163
...@@ -98,6 +98,10 @@ BLOB xkey.use() ...@@ -98,6 +98,10 @@ BLOB xkey.use()
Wrap the key in a blob to be passed to `crypto.verifier()`_ Wrap the key in a blob to be passed to `crypto.verifier()`_
Restricted to: ``vcl_init``.
.. _xkey.pem_pubkey(): .. _xkey.pem_pubkey():
VOID xkey.pem_pubkey(STRING) VOID xkey.pem_pubkey(STRING)
...@@ -111,13 +115,17 @@ comprise RSA and DSA. ...@@ -111,13 +115,17 @@ comprise RSA and DSA.
Any error is fatal to vcl initialization. Any error is fatal to vcl initialization.
Restricted to: ``vcl_init``.
.. _xkey.pem_privkey(): .. _xkey.pem_privkey():
VOID xkey.pem_privkey(STRING, STRING password=0) VOID xkey.pem_privkey(STRING, STRING password=0)
------------------------------------------------ ------------------------------------------------
Create a key from the PEM-encoded private key, optionally decrypting Create a key from the PEM-encoded private key, optionally decrypting
it using `password`. it using _password_.
The cryptographic method to be used and the key length are The cryptographic method to be used and the key length are
automatically determined from _pem_. Typically supported methods automatically determined from _pem_. Typically supported methods
...@@ -125,6 +133,10 @@ comprise RSA and DSA. ...@@ -125,6 +133,10 @@ comprise RSA and DSA.
Any error is fatal to vcl initialization. Any error is fatal to vcl initialization.
Restricted to: ``vcl_init``.
.. _xkey.rsa(): .. _xkey.rsa():
VOID xkey.rsa(BLOB n, BLOB e, [BLOB d]) VOID xkey.rsa(BLOB n, BLOB e, [BLOB d])
...@@ -134,6 +146,10 @@ Create an RSA key from the parameters n, e, and optionally d. ...@@ -134,6 +146,10 @@ Create an RSA key from the parameters n, e, and optionally d.
Any error is fatal to vcl initialization. Any error is fatal to vcl initialization.
Restricted to: ``vcl_init``.
.. _crypto.verifier(): .. _crypto.verifier():
new xverifier = crypto.verifier(ENUM digest, [STRING pem], [BLOB key]) new xverifier = crypto.verifier(ENUM digest, [STRING pem], [BLOB key])
...@@ -142,7 +158,7 @@ new xverifier = crypto.verifier(ENUM digest, [STRING pem], [BLOB key]) ...@@ -142,7 +158,7 @@ new xverifier = crypto.verifier(ENUM digest, [STRING pem], [BLOB key])
:: ::
new xverifier = crypto.verifier( new xverifier = crypto.verifier(
ENUM {md_null, md4, md5, sha1, sha224, sha256, sha384, sha512, ripemd160, rmd160, whirlpool} digest, ENUM {md_null, md5, sha1, sha224, sha256, sha384, sha512, ripemd160, rmd160, whirlpool} digest,
[STRING pem], [STRING pem],
[BLOB key] [BLOB key]
) )
...@@ -189,9 +205,10 @@ BOOL xverifier.valid(BLOB signature) ...@@ -189,9 +205,10 @@ BOOL xverifier.valid(BLOB signature)
Check if _signature_ is a valid signature for the _verifier_ object Check if _signature_ is a valid signature for the _verifier_ object
given the previous updates. given the previous updates.
Note that after calling .valid(), .update can be called again to add Note that after calling `xverifier.valid()`, `xverifier.update()` can
additional data, which can then be validated against a (different) be called again to add additional data, which can then be validated
signature using another call to .valid(). against a (different) signature using another call to
`xverifier.valid()`.
.. _crypto.signer(): .. _crypto.signer():
...@@ -201,7 +218,7 @@ new xsigner = crypto.signer(ENUM digest, [STRING pem], [BLOB key]) ...@@ -201,7 +218,7 @@ new xsigner = crypto.signer(ENUM digest, [STRING pem], [BLOB key])
:: ::
new xsigner = crypto.signer( new xsigner = crypto.signer(
ENUM {md_null, md4, md5, sha1, sha224, sha256, sha384, sha512, ripemd160, rmd160, whirlpool} digest, ENUM {md_null, md5, sha1, sha224, sha256, sha384, sha512, ripemd160, rmd160, whirlpool} digest,
[STRING pem], [STRING pem],
[BLOB key] [BLOB key]
) )
......
...@@ -92,7 +92,7 @@ $(DATAF1): $(srcdir)/vtc/data/gen.sh ...@@ -92,7 +92,7 @@ $(DATAF1): $(srcdir)/vtc/data/gen.sh
# 1st file written by generator # 1st file written by generator
SIGF1 = \ SIGF1 = \
vtc/sigs/RSA_512_md4_11.sig.b64 vtc/sigs/RSA_1024_md5_11_5.sig.b64
SIGF = \ SIGF = \
vtc/sigs/DSA_1024_sha1_11_5.sig.b64 \ vtc/sigs/DSA_1024_sha1_11_5.sig.b64 \
...@@ -395,27 +395,6 @@ SIGF = \ ...@@ -395,27 +395,6 @@ SIGF = \
vtc/sigs/DSA_512_sha512_8192.sig.b64 \ vtc/sigs/DSA_512_sha512_8192.sig.b64 \
vtc/sigs/DSA_512_sha512_83_41.sig.b64 \ vtc/sigs/DSA_512_sha512_83_41.sig.b64 \
vtc/sigs/DSA_512_sha512_83.sig.b64 \ vtc/sigs/DSA_512_sha512_83.sig.b64 \
vtc/sigs/RSA_1024_md4_11_5.sig.b64 \
vtc/sigs/RSA_1024_md4_11.sig.b64 \
vtc/sigs/RSA_1024_md4_1283_641.sig.b64 \
vtc/sigs/RSA_1024_md4_1283.sig.b64 \
vtc/sigs/RSA_1024_md4_2003_1001.sig.b64 \
vtc/sigs/RSA_1024_md4_2003.sig.b64 \
vtc/sigs/RSA_1024_md4_2048_1024.sig.b64 \
vtc/sigs/RSA_1024_md4_2048.sig.b64 \
vtc/sigs/RSA_1024_md4_241_120.sig.b64 \
vtc/sigs/RSA_1024_md4_241.sig.b64 \
vtc/sigs/RSA_1024_md4_512_256.sig.b64 \
vtc/sigs/RSA_1024_md4_512.sig.b64 \
vtc/sigs/RSA_1024_md4_617_308.sig.b64 \
vtc/sigs/RSA_1024_md4_617.sig.b64 \
vtc/sigs/RSA_1024_md4_7919_3959.sig.b64 \
vtc/sigs/RSA_1024_md4_7919.sig.b64 \
vtc/sigs/RSA_1024_md4_8192_4096.sig.b64 \
vtc/sigs/RSA_1024_md4_8192.sig.b64 \
vtc/sigs/RSA_1024_md4_83_41.sig.b64 \
vtc/sigs/RSA_1024_md4_83.sig.b64 \
vtc/sigs/RSA_1024_md5_11_5.sig.b64 \
vtc/sigs/RSA_1024_md5_11.sig.b64 \ vtc/sigs/RSA_1024_md5_11.sig.b64 \
vtc/sigs/RSA_1024_md5_1283_641.sig.b64 \ vtc/sigs/RSA_1024_md5_1283_641.sig.b64 \
vtc/sigs/RSA_1024_md5_1283.sig.b64 \ vtc/sigs/RSA_1024_md5_1283.sig.b64 \
...@@ -555,26 +534,6 @@ SIGF = \ ...@@ -555,26 +534,6 @@ SIGF = \
vtc/sigs/RSA_1024_sha512_8192.sig.b64 \ vtc/sigs/RSA_1024_sha512_8192.sig.b64 \
vtc/sigs/RSA_1024_sha512_83_41.sig.b64 \ vtc/sigs/RSA_1024_sha512_83_41.sig.b64 \
vtc/sigs/RSA_1024_sha512_83.sig.b64 \ vtc/sigs/RSA_1024_sha512_83.sig.b64 \
vtc/sigs/RSA_15360_md4_11_5.sig.b64 \
vtc/sigs/RSA_15360_md4_11.sig.b64 \
vtc/sigs/RSA_15360_md4_1283_641.sig.b64 \
vtc/sigs/RSA_15360_md4_1283.sig.b64 \
vtc/sigs/RSA_15360_md4_2003_1001.sig.b64 \
vtc/sigs/RSA_15360_md4_2003.sig.b64 \
vtc/sigs/RSA_15360_md4_2048_1024.sig.b64 \
vtc/sigs/RSA_15360_md4_2048.sig.b64 \
vtc/sigs/RSA_15360_md4_241_120.sig.b64 \
vtc/sigs/RSA_15360_md4_241.sig.b64 \
vtc/sigs/RSA_15360_md4_512_256.sig.b64 \
vtc/sigs/RSA_15360_md4_512.sig.b64 \
vtc/sigs/RSA_15360_md4_617_308.sig.b64 \
vtc/sigs/RSA_15360_md4_617.sig.b64 \
vtc/sigs/RSA_15360_md4_7919_3959.sig.b64 \
vtc/sigs/RSA_15360_md4_7919.sig.b64 \
vtc/sigs/RSA_15360_md4_8192_4096.sig.b64 \
vtc/sigs/RSA_15360_md4_8192.sig.b64 \
vtc/sigs/RSA_15360_md4_83_41.sig.b64 \
vtc/sigs/RSA_15360_md4_83.sig.b64 \
vtc/sigs/RSA_15360_md5_11_5.sig.b64 \ vtc/sigs/RSA_15360_md5_11_5.sig.b64 \
vtc/sigs/RSA_15360_md5_11.sig.b64 \ vtc/sigs/RSA_15360_md5_11.sig.b64 \
vtc/sigs/RSA_15360_md5_1283_641.sig.b64 \ vtc/sigs/RSA_15360_md5_1283_641.sig.b64 \
...@@ -715,26 +674,6 @@ SIGF = \ ...@@ -715,26 +674,6 @@ SIGF = \
vtc/sigs/RSA_15360_sha512_8192.sig.b64 \ vtc/sigs/RSA_15360_sha512_8192.sig.b64 \
vtc/sigs/RSA_15360_sha512_83_41.sig.b64 \ vtc/sigs/RSA_15360_sha512_83_41.sig.b64 \
vtc/sigs/RSA_15360_sha512_83.sig.b64 \ vtc/sigs/RSA_15360_sha512_83.sig.b64 \
vtc/sigs/RSA_2048_md4_11_5.sig.b64 \
vtc/sigs/RSA_2048_md4_11.sig.b64 \
vtc/sigs/RSA_2048_md4_1283_641.sig.b64 \
vtc/sigs/RSA_2048_md4_1283.sig.b64 \
vtc/sigs/RSA_2048_md4_2003_1001.sig.b64 \
vtc/sigs/RSA_2048_md4_2003.sig.b64 \
vtc/sigs/RSA_2048_md4_2048_1024.sig.b64 \
vtc/sigs/RSA_2048_md4_2048.sig.b64 \
vtc/sigs/RSA_2048_md4_241_120.sig.b64 \
vtc/sigs/RSA_2048_md4_241.sig.b64 \
vtc/sigs/RSA_2048_md4_512_256.sig.b64 \
vtc/sigs/RSA_2048_md4_512.sig.b64 \
vtc/sigs/RSA_2048_md4_617_308.sig.b64 \
vtc/sigs/RSA_2048_md4_617.sig.b64 \
vtc/sigs/RSA_2048_md4_7919_3959.sig.b64 \
vtc/sigs/RSA_2048_md4_7919.sig.b64 \
vtc/sigs/RSA_2048_md4_8192_4096.sig.b64 \
vtc/sigs/RSA_2048_md4_8192.sig.b64 \
vtc/sigs/RSA_2048_md4_83_41.sig.b64 \
vtc/sigs/RSA_2048_md4_83.sig.b64 \
vtc/sigs/RSA_2048_md5_11_5.sig.b64 \ vtc/sigs/RSA_2048_md5_11_5.sig.b64 \
vtc/sigs/RSA_2048_md5_11.sig.b64 \ vtc/sigs/RSA_2048_md5_11.sig.b64 \
vtc/sigs/RSA_2048_md5_1283_641.sig.b64 \ vtc/sigs/RSA_2048_md5_1283_641.sig.b64 \
...@@ -875,26 +814,6 @@ SIGF = \ ...@@ -875,26 +814,6 @@ SIGF = \
vtc/sigs/RSA_2048_sha512_8192.sig.b64 \ vtc/sigs/RSA_2048_sha512_8192.sig.b64 \
vtc/sigs/RSA_2048_sha512_83_41.sig.b64 \ vtc/sigs/RSA_2048_sha512_83_41.sig.b64 \
vtc/sigs/RSA_2048_sha512_83.sig.b64 \ vtc/sigs/RSA_2048_sha512_83.sig.b64 \
vtc/sigs/RSA_3072_md4_11_5.sig.b64 \
vtc/sigs/RSA_3072_md4_11.sig.b64 \
vtc/sigs/RSA_3072_md4_1283_641.sig.b64 \
vtc/sigs/RSA_3072_md4_1283.sig.b64 \
vtc/sigs/RSA_3072_md4_2003_1001.sig.b64 \
vtc/sigs/RSA_3072_md4_2003.sig.b64 \
vtc/sigs/RSA_3072_md4_2048_1024.sig.b64 \
vtc/sigs/RSA_3072_md4_2048.sig.b64 \
vtc/sigs/RSA_3072_md4_241_120.sig.b64 \
vtc/sigs/RSA_3072_md4_241.sig.b64 \
vtc/sigs/RSA_3072_md4_512_256.sig.b64 \
vtc/sigs/RSA_3072_md4_512.sig.b64 \
vtc/sigs/RSA_3072_md4_617_308.sig.b64 \
vtc/sigs/RSA_3072_md4_617.sig.b64 \
vtc/sigs/RSA_3072_md4_7919_3959.sig.b64 \
vtc/sigs/RSA_3072_md4_7919.sig.b64 \
vtc/sigs/RSA_3072_md4_8192_4096.sig.b64 \
vtc/sigs/RSA_3072_md4_8192.sig.b64 \
vtc/sigs/RSA_3072_md4_83_41.sig.b64 \
vtc/sigs/RSA_3072_md4_83.sig.b64 \
vtc/sigs/RSA_3072_md5_11_5.sig.b64 \ vtc/sigs/RSA_3072_md5_11_5.sig.b64 \
vtc/sigs/RSA_3072_md5_11.sig.b64 \ vtc/sigs/RSA_3072_md5_11.sig.b64 \
vtc/sigs/RSA_3072_md5_1283_641.sig.b64 \ vtc/sigs/RSA_3072_md5_1283_641.sig.b64 \
...@@ -1035,27 +954,6 @@ SIGF = \ ...@@ -1035,27 +954,6 @@ SIGF = \
vtc/sigs/RSA_3072_sha512_8192.sig.b64 \ vtc/sigs/RSA_3072_sha512_8192.sig.b64 \
vtc/sigs/RSA_3072_sha512_83_41.sig.b64 \ vtc/sigs/RSA_3072_sha512_83_41.sig.b64 \
vtc/sigs/RSA_3072_sha512_83.sig.b64 \ vtc/sigs/RSA_3072_sha512_83.sig.b64 \
vtc/sigs/RSA_4096_md4_11_5.sig.b64 \
vtc/sigs/RSA_4096_md4_11.sig.b64 \
vtc/sigs/RSA_4096_md4_1283_641.sig.b64 \
vtc/sigs/RSA_4096_md4_1283.sig.b64 \
vtc/sigs/RSA_4096_md4_2003_1001.sig.b64 \
vtc/sigs/RSA_4096_md4_2003.sig.b64 \
vtc/sigs/RSA_4096_md4_2048_1024.sig.b64 \
vtc/sigs/RSA_4096_md4_2048.sig.b64 \
vtc/sigs/RSA_4096_md4_241_120.sig.b64 \
vtc/sigs/RSA_4096_md4_241.sig.b64 \
vtc/sigs/RSA_4096_md4_512_256.sig.b64 \
vtc/sigs/RSA_4096_md4_512.sig.b64 \
vtc/sigs/RSA_4096_md4_617_308.sig.b64 \
vtc/sigs/RSA_4096_md4_617.sig.b64 \
vtc/sigs/RSA_4096_md4_7919_3959.sig.b64 \
vtc/sigs/RSA_4096_md4_7919.sig.b64 \
vtc/sigs/RSA_4096_md4_8192_4096.sig.b64 \
vtc/sigs/RSA_4096_md4_8192.sig.b64 \
vtc/sigs/RSA_4096_md4_83_41.sig.b64 \
vtc/sigs/RSA_4096_md4_83.sig.b64 \
vtc/sigs/RSA_4096_md5_11_5.sig.b64 \
vtc/sigs/RSA_4096_md5_11.sig.b64 \ vtc/sigs/RSA_4096_md5_11.sig.b64 \
vtc/sigs/RSA_4096_md5_1283_641.sig.b64 \ vtc/sigs/RSA_4096_md5_1283_641.sig.b64 \
vtc/sigs/RSA_4096_md5_1283.sig.b64 \ vtc/sigs/RSA_4096_md5_1283.sig.b64 \
...@@ -1195,25 +1093,6 @@ SIGF = \ ...@@ -1195,25 +1093,6 @@ SIGF = \
vtc/sigs/RSA_4096_sha512_8192.sig.b64 \ vtc/sigs/RSA_4096_sha512_8192.sig.b64 \
vtc/sigs/RSA_4096_sha512_83_41.sig.b64 \ vtc/sigs/RSA_4096_sha512_83_41.sig.b64 \
vtc/sigs/RSA_4096_sha512_83.sig.b64 \ vtc/sigs/RSA_4096_sha512_83.sig.b64 \
vtc/sigs/RSA_512_md4_11_5.sig.b64 \
vtc/sigs/RSA_512_md4_1283_641.sig.b64 \
vtc/sigs/RSA_512_md4_1283.sig.b64 \
vtc/sigs/RSA_512_md4_2003_1001.sig.b64 \
vtc/sigs/RSA_512_md4_2003.sig.b64 \
vtc/sigs/RSA_512_md4_2048_1024.sig.b64 \
vtc/sigs/RSA_512_md4_2048.sig.b64 \
vtc/sigs/RSA_512_md4_241_120.sig.b64 \
vtc/sigs/RSA_512_md4_241.sig.b64 \
vtc/sigs/RSA_512_md4_512_256.sig.b64 \
vtc/sigs/RSA_512_md4_512.sig.b64 \
vtc/sigs/RSA_512_md4_617_308.sig.b64 \
vtc/sigs/RSA_512_md4_617.sig.b64 \
vtc/sigs/RSA_512_md4_7919_3959.sig.b64 \
vtc/sigs/RSA_512_md4_7919.sig.b64 \
vtc/sigs/RSA_512_md4_8192_4096.sig.b64 \
vtc/sigs/RSA_512_md4_8192.sig.b64 \
vtc/sigs/RSA_512_md4_83_41.sig.b64 \
vtc/sigs/RSA_512_md4_83.sig.b64 \
vtc/sigs/RSA_512_md5_11_5.sig.b64 \ vtc/sigs/RSA_512_md5_11_5.sig.b64 \
vtc/sigs/RSA_512_md5_11.sig.b64 \ vtc/sigs/RSA_512_md5_11.sig.b64 \
vtc/sigs/RSA_512_md5_1283_641.sig.b64 \ vtc/sigs/RSA_512_md5_1283_641.sig.b64 \
...@@ -1314,26 +1193,6 @@ SIGF = \ ...@@ -1314,26 +1193,6 @@ SIGF = \
vtc/sigs/RSA_512_sha256_8192.sig.b64 \ vtc/sigs/RSA_512_sha256_8192.sig.b64 \
vtc/sigs/RSA_512_sha256_83_41.sig.b64 \ vtc/sigs/RSA_512_sha256_83_41.sig.b64 \
vtc/sigs/RSA_512_sha256_83.sig.b64 \ vtc/sigs/RSA_512_sha256_83.sig.b64 \
vtc/sigs/RSA_7680_md4_11_5.sig.b64 \
vtc/sigs/RSA_7680_md4_11.sig.b64 \
vtc/sigs/RSA_7680_md4_1283_641.sig.b64 \
vtc/sigs/RSA_7680_md4_1283.sig.b64 \
vtc/sigs/RSA_7680_md4_2003_1001.sig.b64 \
vtc/sigs/RSA_7680_md4_2003.sig.b64 \
vtc/sigs/RSA_7680_md4_2048_1024.sig.b64 \
vtc/sigs/RSA_7680_md4_2048.sig.b64 \
vtc/sigs/RSA_7680_md4_241_120.sig.b64 \
vtc/sigs/RSA_7680_md4_241.sig.b64 \
vtc/sigs/RSA_7680_md4_512_256.sig.b64 \
vtc/sigs/RSA_7680_md4_512.sig.b64 \
vtc/sigs/RSA_7680_md4_617_308.sig.b64 \
vtc/sigs/RSA_7680_md4_617.sig.b64 \
vtc/sigs/RSA_7680_md4_7919_3959.sig.b64 \
vtc/sigs/RSA_7680_md4_7919.sig.b64 \
vtc/sigs/RSA_7680_md4_8192_4096.sig.b64 \
vtc/sigs/RSA_7680_md4_8192.sig.b64 \
vtc/sigs/RSA_7680_md4_83_41.sig.b64 \
vtc/sigs/RSA_7680_md4_83.sig.b64 \
vtc/sigs/RSA_7680_md5_11_5.sig.b64 \ vtc/sigs/RSA_7680_md5_11_5.sig.b64 \
vtc/sigs/RSA_7680_md5_11.sig.b64 \ vtc/sigs/RSA_7680_md5_11.sig.b64 \
vtc/sigs/RSA_7680_md5_1283_641.sig.b64 \ vtc/sigs/RSA_7680_md5_1283_641.sig.b64 \
...@@ -1626,16 +1485,6 @@ BUILT_TESTS = \ ...@@ -1626,16 +1485,6 @@ BUILT_TESTS = \
vtc/DSA_512_sha512_7919.vtc \ vtc/DSA_512_sha512_7919.vtc \
vtc/DSA_512_sha512_8192.vtc \ vtc/DSA_512_sha512_8192.vtc \
vtc/DSA_512_sha512_83.vtc \ vtc/DSA_512_sha512_83.vtc \
vtc/RSA_1024_md4_11.vtc \
vtc/RSA_1024_md4_1283.vtc \
vtc/RSA_1024_md4_2003.vtc \
vtc/RSA_1024_md4_2048.vtc \
vtc/RSA_1024_md4_241.vtc \
vtc/RSA_1024_md4_512.vtc \
vtc/RSA_1024_md4_617.vtc \
vtc/RSA_1024_md4_7919.vtc \
vtc/RSA_1024_md4_8192.vtc \
vtc/RSA_1024_md4_83.vtc \
vtc/RSA_1024_md5_11.vtc \ vtc/RSA_1024_md5_11.vtc \
vtc/RSA_1024_md5_1283.vtc \ vtc/RSA_1024_md5_1283.vtc \
vtc/RSA_1024_md5_2003.vtc \ vtc/RSA_1024_md5_2003.vtc \
...@@ -1706,16 +1555,6 @@ BUILT_TESTS = \ ...@@ -1706,16 +1555,6 @@ BUILT_TESTS = \
vtc/RSA_1024_sha512_7919.vtc \ vtc/RSA_1024_sha512_7919.vtc \
vtc/RSA_1024_sha512_8192.vtc \ vtc/RSA_1024_sha512_8192.vtc \
vtc/RSA_1024_sha512_83.vtc \ vtc/RSA_1024_sha512_83.vtc \
vtc/RSA_15360_md4_11.vtc \
vtc/RSA_15360_md4_1283.vtc \
vtc/RSA_15360_md4_2003.vtc \
vtc/RSA_15360_md4_2048.vtc \
vtc/RSA_15360_md4_241.vtc \
vtc/RSA_15360_md4_512.vtc \
vtc/RSA_15360_md4_617.vtc \
vtc/RSA_15360_md4_7919.vtc \
vtc/RSA_15360_md4_8192.vtc \
vtc/RSA_15360_md4_83.vtc \
vtc/RSA_15360_md5_11.vtc \ vtc/RSA_15360_md5_11.vtc \
vtc/RSA_15360_md5_1283.vtc \ vtc/RSA_15360_md5_1283.vtc \
vtc/RSA_15360_md5_2003.vtc \ vtc/RSA_15360_md5_2003.vtc \
...@@ -1786,16 +1625,6 @@ BUILT_TESTS = \ ...@@ -1786,16 +1625,6 @@ BUILT_TESTS = \
vtc/RSA_15360_sha512_7919.vtc \ vtc/RSA_15360_sha512_7919.vtc \
vtc/RSA_15360_sha512_8192.vtc \ vtc/RSA_15360_sha512_8192.vtc \
vtc/RSA_15360_sha512_83.vtc \ vtc/RSA_15360_sha512_83.vtc \
vtc/RSA_2048_md4_11.vtc \
vtc/RSA_2048_md4_1283.vtc \
vtc/RSA_2048_md4_2003.vtc \
vtc/RSA_2048_md4_2048.vtc \
vtc/RSA_2048_md4_241.vtc \
vtc/RSA_2048_md4_512.vtc \
vtc/RSA_2048_md4_617.vtc \
vtc/RSA_2048_md4_7919.vtc \
vtc/RSA_2048_md4_8192.vtc \
vtc/RSA_2048_md4_83.vtc \
vtc/RSA_2048_md5_11.vtc \ vtc/RSA_2048_md5_11.vtc \
vtc/RSA_2048_md5_1283.vtc \ vtc/RSA_2048_md5_1283.vtc \
vtc/RSA_2048_md5_2003.vtc \ vtc/RSA_2048_md5_2003.vtc \
...@@ -1866,16 +1695,6 @@ BUILT_TESTS = \ ...@@ -1866,16 +1695,6 @@ BUILT_TESTS = \
vtc/RSA_2048_sha512_7919.vtc \ vtc/RSA_2048_sha512_7919.vtc \
vtc/RSA_2048_sha512_8192.vtc \ vtc/RSA_2048_sha512_8192.vtc \
vtc/RSA_2048_sha512_83.vtc \ vtc/RSA_2048_sha512_83.vtc \
vtc/RSA_3072_md4_11.vtc \
vtc/RSA_3072_md4_1283.vtc \
vtc/RSA_3072_md4_2003.vtc \
vtc/RSA_3072_md4_2048.vtc \
vtc/RSA_3072_md4_241.vtc \
vtc/RSA_3072_md4_512.vtc \
vtc/RSA_3072_md4_617.vtc \
vtc/RSA_3072_md4_7919.vtc \
vtc/RSA_3072_md4_8192.vtc \
vtc/RSA_3072_md4_83.vtc \
vtc/RSA_3072_md5_11.vtc \ vtc/RSA_3072_md5_11.vtc \
vtc/RSA_3072_md5_1283.vtc \ vtc/RSA_3072_md5_1283.vtc \
vtc/RSA_3072_md5_2003.vtc \ vtc/RSA_3072_md5_2003.vtc \
...@@ -1946,16 +1765,6 @@ BUILT_TESTS = \ ...@@ -1946,16 +1765,6 @@ BUILT_TESTS = \
vtc/RSA_3072_sha512_7919.vtc \ vtc/RSA_3072_sha512_7919.vtc \
vtc/RSA_3072_sha512_8192.vtc \ vtc/RSA_3072_sha512_8192.vtc \
vtc/RSA_3072_sha512_83.vtc \ vtc/RSA_3072_sha512_83.vtc \
vtc/RSA_4096_md4_11.vtc \
vtc/RSA_4096_md4_1283.vtc \
vtc/RSA_4096_md4_2003.vtc \
vtc/RSA_4096_md4_2048.vtc \
vtc/RSA_4096_md4_241.vtc \
vtc/RSA_4096_md4_512.vtc \
vtc/RSA_4096_md4_617.vtc \
vtc/RSA_4096_md4_7919.vtc \
vtc/RSA_4096_md4_8192.vtc \
vtc/RSA_4096_md4_83.vtc \
vtc/RSA_4096_md5_11.vtc \ vtc/RSA_4096_md5_11.vtc \
vtc/RSA_4096_md5_1283.vtc \ vtc/RSA_4096_md5_1283.vtc \
vtc/RSA_4096_md5_2003.vtc \ vtc/RSA_4096_md5_2003.vtc \
...@@ -2026,16 +1835,6 @@ BUILT_TESTS = \ ...@@ -2026,16 +1835,6 @@ BUILT_TESTS = \
vtc/RSA_4096_sha512_7919.vtc \ vtc/RSA_4096_sha512_7919.vtc \
vtc/RSA_4096_sha512_8192.vtc \ vtc/RSA_4096_sha512_8192.vtc \
vtc/RSA_4096_sha512_83.vtc \ vtc/RSA_4096_sha512_83.vtc \
vtc/RSA_512_md4_11.vtc \
vtc/RSA_512_md4_1283.vtc \
vtc/RSA_512_md4_2003.vtc \
vtc/RSA_512_md4_2048.vtc \
vtc/RSA_512_md4_241.vtc \
vtc/RSA_512_md4_512.vtc \
vtc/RSA_512_md4_617.vtc \
vtc/RSA_512_md4_7919.vtc \
vtc/RSA_512_md4_8192.vtc \
vtc/RSA_512_md4_83.vtc \
vtc/RSA_512_md5_11.vtc \ vtc/RSA_512_md5_11.vtc \
vtc/RSA_512_md5_1283.vtc \ vtc/RSA_512_md5_1283.vtc \
vtc/RSA_512_md5_2003.vtc \ vtc/RSA_512_md5_2003.vtc \
...@@ -2086,16 +1885,6 @@ BUILT_TESTS = \ ...@@ -2086,16 +1885,6 @@ BUILT_TESTS = \
vtc/RSA_512_sha256_7919.vtc \ vtc/RSA_512_sha256_7919.vtc \
vtc/RSA_512_sha256_8192.vtc \ vtc/RSA_512_sha256_8192.vtc \
vtc/RSA_512_sha256_83.vtc \ vtc/RSA_512_sha256_83.vtc \
vtc/RSA_7680_md4_11.vtc \
vtc/RSA_7680_md4_1283.vtc \
vtc/RSA_7680_md4_2003.vtc \
vtc/RSA_7680_md4_2048.vtc \
vtc/RSA_7680_md4_241.vtc \
vtc/RSA_7680_md4_512.vtc \
vtc/RSA_7680_md4_617.vtc \
vtc/RSA_7680_md4_7919.vtc \
vtc/RSA_7680_md4_8192.vtc \
vtc/RSA_7680_md4_83.vtc \
vtc/RSA_7680_md5_11.vtc \ vtc/RSA_7680_md5_11.vtc \
vtc/RSA_7680_md5_1283.vtc \ vtc/RSA_7680_md5_1283.vtc \
vtc/RSA_7680_md5_2003.vtc \ vtc/RSA_7680_md5_2003.vtc \
...@@ -2192,7 +1981,7 @@ TESTS_QUICK = \ ...@@ -2192,7 +1981,7 @@ TESTS_QUICK = \
vtc/DSA_2048_sha256_8192.vtc \ vtc/DSA_2048_sha256_8192.vtc \
vtc/DSA_2048_sha256_83.vtc \ vtc/DSA_2048_sha256_83.vtc \
vtc/DSA_512_sha512_2048.vtc \ vtc/DSA_512_sha512_2048.vtc \
vtc/RSA_1024_md4_7919.vtc \ vtc/RSA_1024_md5_7919.vtc \
vtc/RSA_15360_rmd160_7919.vtc \ vtc/RSA_15360_rmd160_7919.vtc \
vtc/RSA_2048_sha256_11.vtc \ vtc/RSA_2048_sha256_11.vtc \
vtc/RSA_2048_sha256_1283.vtc \ vtc/RSA_2048_sha256_1283.vtc \
...@@ -2205,7 +1994,7 @@ TESTS_QUICK = \ ...@@ -2205,7 +1994,7 @@ TESTS_QUICK = \
vtc/RSA_2048_sha256_8192.vtc \ vtc/RSA_2048_sha256_8192.vtc \
vtc/RSA_2048_sha256_83.vtc \ vtc/RSA_2048_sha256_83.vtc \
vtc/RSA_3072_sha1_241.vtc \ vtc/RSA_3072_sha1_241.vtc \
vtc/RSA_4096_md4_7919.vtc \ vtc/RSA_4096_md5_7919.vtc \
vtc/RSA_512_sha224_617.vtc \ vtc/RSA_512_sha224_617.vtc \
vtc/RSA_7680_sha512_2003.vtc vtc/RSA_7680_sha512_2003.vtc
......
...@@ -39,9 +39,6 @@ static const EVP_MD *mdtbl[_MD_E_MAX]; ...@@ -39,9 +39,6 @@ static const EVP_MD *mdtbl[_MD_E_MAX];
void void
md_init (void) { md_init (void) {
mdtbl[md_null] = EVP_md_null(); mdtbl[md_null] = EVP_md_null();
#ifndef OPENSSL_NO_MD4
mdtbl[md4] = EVP_md4();
#endif
#ifndef OPENSSL_NO_MD5 #ifndef OPENSSL_NO_MD5
mdtbl[md5] = EVP_md5(); mdtbl[md5] = EVP_md5();
#endif #endif
......
VMODENUM(md_null) VMODENUM(md_null)
VMODENUM(md4)
VMODENUM(md5) VMODENUM(md5)
VMODENUM(sha1) VMODENUM(sha1)
//VMODENUM(dss) //VMODENUM(dss)
......
...@@ -155,7 +155,7 @@ new xverifier = crypto.verifier(ENUM digest, [STRING pem], [BLOB key]) ...@@ -155,7 +155,7 @@ new xverifier = crypto.verifier(ENUM digest, [STRING pem], [BLOB key])
:: ::
new xverifier = crypto.verifier( new xverifier = crypto.verifier(
ENUM {md_null, md4, md5, sha1, sha224, sha256, sha384, sha512, ripemd160, rmd160, whirlpool} digest, ENUM {md_null, md5, sha1, sha224, sha256, sha384, sha512, ripemd160, rmd160, whirlpool} digest,
[STRING pem], [STRING pem],
[BLOB key] [BLOB key]
) )
...@@ -215,7 +215,7 @@ new xsigner = crypto.signer(ENUM digest, [STRING pem], [BLOB key]) ...@@ -215,7 +215,7 @@ new xsigner = crypto.signer(ENUM digest, [STRING pem], [BLOB key])
:: ::
new xsigner = crypto.signer( new xsigner = crypto.signer(
ENUM {md_null, md4, md5, sha1, sha224, sha256, sha384, sha512, ripemd160, rmd160, whirlpool} digest, ENUM {md_null, md5, sha1, sha224, sha256, sha384, sha512, ripemd160, rmd160, whirlpool} digest,
[STRING pem], [STRING pem],
[BLOB key] [BLOB key]
) )
......
...@@ -83,7 +83,7 @@ Any error is fatal to vcl initialization. ...@@ -83,7 +83,7 @@ Any error is fatal to vcl initialization.
$Restrict vcl_init $Restrict vcl_init
$Object verifier(ENUM {md_null, md4, md5, sha1, sha224, $Object verifier(ENUM {md_null, md5, sha1, sha224,
sha256, sha384, sha512, ripemd160, rmd160, whirlpool} digest, sha256, sha384, sha512, ripemd160, rmd160, whirlpool} digest,
[STRING pem], [BLOB key]) [STRING pem], [BLOB key])
...@@ -122,7 +122,7 @@ be called again to add additional data, which can then be validated ...@@ -122,7 +122,7 @@ be called again to add additional data, which can then be validated
against a (different) signature using another call to against a (different) signature using another call to
`xverifier.valid()`. `xverifier.valid()`.
$Object signer(ENUM {md_null, md4, md5, sha1, sha224, $Object signer(ENUM {md_null, md5, sha1, sha224,
sha256, sha384, sha512, ripemd160, rmd160, whirlpool} digest, sha256, sha384, sha512, ripemd160, rmd160, whirlpool} digest,
[STRING pem], [BLOB key]) [STRING pem], [BLOB key])
......
...@@ -7,7 +7,6 @@ set -eux ...@@ -7,7 +7,6 @@ set -eux
cd $(dirname $0) cd $(dirname $0)
typeset -ra mds=( typeset -ra mds=(
md4
md5 md5
rmd160 rmd160
sha1 sha1
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment