Skip to content

Commit 0313e1b

Browse files
committed
Merge branch 'ky/sample-updates'
* ky/sample-updates: sample: update obsolete API use sample: avoid "include OpenSSL"
2 parents a9954ba + dafa851 commit 0313e1b

File tree

7 files changed

+29
-34
lines changed

7 files changed

+29
-34
lines changed

sample/c_rehash.rb

+1-2
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,6 @@
11
#!/usr/bin/env ruby
22

33
require 'openssl'
4-
require 'digest/md5'
54

65
class CHashDir
76
include Enumerable
@@ -161,7 +160,7 @@ def hash_name(name)
161160
end
162161

163162
def fingerprint(der)
164-
Digest.hexdigest('MD5', der).upcase
163+
OpenSSL::Digest.hexdigest('MD5', der).upcase
165164
end
166165
end
167166

sample/cert2text.rb

+5-2
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,13 @@
11
#!/usr/bin/env ruby
22

33
require 'openssl'
4-
include OpenSSL::X509
54

65
def cert2text(cert_str)
7-
[Certificate, CRL, Request].each do |klass|
6+
[
7+
OpenSSL::X509::Certificate,
8+
OpenSSL::X509::CRL,
9+
OpenSSL::X509::Request,
10+
].each do |klass|
811
begin
912
puts klass.new(cert_str).to_text
1013
return

sample/certstore.rb

+2-5
Original file line numberDiff line numberDiff line change
@@ -3,9 +3,6 @@
33

44

55
class CertStore
6-
include OpenSSL
7-
include X509
8-
96
attr_reader :self_signed_ca
107
attr_reader :other_ca
118
attr_reader :ee
@@ -17,11 +14,11 @@ def initialize(certs_dir)
1714
@c_store = CHashDir.new(@certs_dir)
1815
@c_store.hash_dir(true)
1916
@crl_store = CrlStore.new(@c_store)
20-
@x509store = Store.new
17+
@x509store = OpenSSL::X509::Store.new
2118
@self_signed_ca = @other_ca = @ee = @crl = nil
2219

2320
# Uncomment this line to let OpenSSL to check CRL for each certs.
24-
# @x509store.flags = V_FLAG_CRL_CHECK | V_FLAG_CRL_CHECK_ALL
21+
# @x509store.flags = OpenSSL::X509::V_FLAG_CRL_CHECK | OpenSSL::X509::V_FLAG_CRL_CHECK_ALL
2522

2623
add_path
2724
scan_certs

sample/echo_svr.rb

+3-3
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@
1515
cert = OpenSSL::X509::Certificate.new(File::read(cert_file))
1616
key = OpenSSL::PKey.read(File::read(key_file))
1717
else
18-
key = OpenSSL::PKey::RSA.new(512){ print "." }
18+
key = OpenSSL::PKey::RSA.new(2048){ print "." }
1919
puts
2020
cert = OpenSSL::X509::Certificate.new
2121
cert.version = 2
@@ -25,7 +25,7 @@
2525
cert.issuer = name
2626
cert.not_before = Time.now
2727
cert.not_after = Time.now + 3600
28-
cert.public_key = key.public_key
28+
cert.public_key = key
2929
ef = OpenSSL::X509::ExtensionFactory.new(nil,cert)
3030
cert.extensions = [
3131
ef.create_extension("basicConstraints","CA:FALSE"),
@@ -37,7 +37,7 @@
3737
ef.issuer_certificate = cert
3838
cert.add_extension ef.create_extension("authorityKeyIdentifier",
3939
"keyid:always,issuer:always")
40-
cert.sign(key, OpenSSL::Digest.new('SHA1'))
40+
cert.sign(key, "SHA1")
4141
end
4242

4343
ctx = OpenSSL::SSL::SSLContext.new()

sample/gen_csr.rb

+6-8
Original file line numberDiff line numberDiff line change
@@ -3,8 +3,6 @@
33
require 'optparse'
44
require 'openssl'
55

6-
include OpenSSL
7-
86
def usage
97
myname = File::basename($0)
108
$stderr.puts <<EOS
@@ -21,13 +19,13 @@ def usage
2119

2220
$stdout.sync = true
2321
name_str = ARGV.shift or usage()
24-
name = X509::Name.parse(name_str)
22+
name = OpenSSL::X509::Name.parse(name_str)
2523

2624
keypair = nil
2725
if keypair_file
28-
keypair = PKey.read(File.read(keypair_file))
26+
keypair = OpenSSL::PKey.read(File.read(keypair_file))
2927
else
30-
keypair = PKey::RSA.new(1024) { putc "." }
28+
keypair = OpenSSL::PKey::RSA.new(2048) { putc "." }
3129
puts
3230
puts "Writing #{keyout}..."
3331
File.open(keyout, "w", 0400) do |f|
@@ -37,11 +35,11 @@ def usage
3735

3836
puts "Generating CSR for #{name_str}"
3937

40-
req = X509::Request.new
38+
req = OpenSSL::X509::Request.new
4139
req.version = 0
4240
req.subject = name
43-
req.public_key = keypair.public_key
44-
req.sign(keypair, Digest.new('MD5'))
41+
req.public_key = keypair
42+
req.sign(keypair, "MD5")
4543

4644
puts "Writing #{csrout}..."
4745
File.open(csrout, "w") do |f|

sample/smime_read.rb

+5-6
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,5 @@
11
require 'optparse'
22
require 'openssl'
3-
include OpenSSL
43

54
options = ARGV.getopts("c:k:C:")
65

@@ -10,14 +9,14 @@
109

1110
data = $stdin.read
1211

13-
cert = X509::Certificate.new(File::read(cert_file))
14-
key = PKey::read(File::read(key_file))
15-
p7enc = PKCS7::read_smime(data)
12+
cert = OpenSSL::X509::Certificate.new(File::read(cert_file))
13+
key = OpenSSL::PKey::read(File::read(key_file))
14+
p7enc = OpenSSL::PKCS7::read_smime(data)
1615
data = p7enc.decrypt(key, cert)
1716

18-
store = X509::Store.new
17+
store = OpenSSL::X509::Store.new
1918
store.add_path(ca_path)
20-
p7sig = PKCS7::read_smime(data)
19+
p7sig = OpenSSL::PKCS7::read_smime(data)
2120
if p7sig.verify([], store)
2221
puts p7sig.data
2322
end

sample/smime_write.rb

+7-8
Original file line numberDiff line numberDiff line change
@@ -1,23 +1,22 @@
11
require 'openssl'
22
require 'optparse'
3-
include OpenSSL
43

54
options = ARGV.getopts("c:k:r:")
65

76
cert_file = options["c"]
87
key_file = options["k"]
98
rcpt_file = options["r"]
109

11-
cert = X509::Certificate.new(File::read(cert_file))
12-
key = PKey::read(File::read(key_file))
10+
cert = OpenSSL::X509::Certificate.new(File::read(cert_file))
11+
key = OpenSSL::PKey::read(File::read(key_file))
1312

1413
data = "Content-Type: text/plain\r\n"
1514
data << "\r\n"
1615
data << "This is a clear-signed message.\r\n"
1716

18-
p7sig = PKCS7::sign(cert, key, data, [], PKCS7::DETACHED)
19-
smime0 = PKCS7::write_smime(p7sig)
17+
p7sig = OpenSSL::PKCS7::sign(cert, key, data, [], OpenSSL::PKCS7::DETACHED)
18+
smime0 = OpenSSL::PKCS7::write_smime(p7sig)
2019

21-
rcpt = X509::Certificate.new(File::read(rcpt_file))
22-
p7enc = PKCS7::encrypt([rcpt], smime0)
23-
print PKCS7::write_smime(p7enc)
20+
rcpt = OpenSSL::X509::Certificate.new(File::read(rcpt_file))
21+
p7enc = OpenSSL::PKCS7::encrypt([rcpt], smime0)
22+
print OpenSSL::PKCS7::write_smime(p7enc)

0 commit comments

Comments
 (0)