summaryrefslogtreecommitdiffstats
path: root/lib/libssl/src/demos/maurice/example2.c
diff options
context:
space:
mode:
authortedu <tedu@openbsd.org>2014-04-16 18:35:14 +0000
committertedu <tedu@openbsd.org>2014-04-16 18:35:14 +0000
commit3b6d1e39d63b84cd880dd908ad8efe1fc9aa53f4 (patch)
tree32478f30a546d3890772d75727312fb4cd4165ea /lib/libssl/src/demos/maurice/example2.c
parentdelete a few leftovers (diff)
downloadwireguard-openbsd-3b6d1e39d63b84cd880dd908ad8efe1fc9aa53f4.tar.xz
wireguard-openbsd-3b6d1e39d63b84cd880dd908ad8efe1fc9aa53f4.zip
quoth the readme:
NOTE: Don't expect any of these programs to work with current OpenSSL releases, or even with later SSLeay releases. ok miod
Diffstat (limited to 'lib/libssl/src/demos/maurice/example2.c')
-rw-r--r--lib/libssl/src/demos/maurice/example2.c75
1 files changed, 0 insertions, 75 deletions
diff --git a/lib/libssl/src/demos/maurice/example2.c b/lib/libssl/src/demos/maurice/example2.c
deleted file mode 100644
index 57bce10b5ed..00000000000
--- a/lib/libssl/src/demos/maurice/example2.c
+++ /dev/null
@@ -1,75 +0,0 @@
-/* NOCW */
-/*
- Please read the README file for condition of use, before
- using this software.
-
- Maurice Gittens <mgittens@gits.nl> January 1997
-*/
-
-#include <stdlib.h>
-#include <stdio.h>
-#include <strings.h>
-
-#include <openssl/rsa.h>
-#include <openssl/evp.h>
-#include <openssl/objects.h>
-#include <openssl/x509.h>
-#include <openssl/err.h>
-#include <openssl/pem.h>
-#include <openssl/ssl.h>
-
-#include "loadkeys.h"
-
-#define PUBFILE "cert.pem"
-#define PRIVFILE "privkey.pem"
-#define STDIN 0
-#define STDOUT 1
-
-int main()
-{
- char *ct = "This the clear text";
- char *buf;
- char *buf2;
- EVP_PKEY *pubKey;
- EVP_PKEY *privKey;
- int len;
-
- ERR_load_crypto_strings();
-
- privKey = ReadPrivateKey(PRIVFILE);
- if (!privKey)
- {
- ERR_print_errors_fp (stderr);
- exit (1);
- }
-
- pubKey = ReadPublicKey(PUBFILE);
- if(!pubKey)
- {
- EVP_PKEY_free(privKey);
- fprintf(stderr,"Error: can't load public key");
- exit(1);
- }
-
- /* No error checking */
- buf = malloc(EVP_PKEY_size(pubKey));
- buf2 = malloc(EVP_PKEY_size(pubKey));
-
- len = RSA_public_encrypt(strlen(ct)+1, ct, buf, pubKey->pkey.rsa,RSA_PKCS1_PADDING);
-
- if (len != EVP_PKEY_size(pubKey))
- {
- fprintf(stderr,"Error: ciphertext should match length of key\n");
- exit(1);
- }
-
- RSA_private_decrypt(len, buf, buf2, privKey->pkey.rsa,RSA_PKCS1_PADDING);
-
- printf("%s\n", buf2);
-
- EVP_PKEY_free(privKey);
- EVP_PKEY_free(pubKey);
- free(buf);
- free(buf2);
- return 0;
-}