Go to file
Dr. Stephen Henson 7f9b7b074d Fix the gendsa program and add it to the app list. The progs.h file is
auto generated but not auto updated so it is included. Also remove the
encryption from the sample DSA keys.
1999-01-09 17:29:34 +00:00
apps Fix the gendsa program and add it to the app list. The progs.h file is 1999-01-09 17:29:34 +00:00
bugs Import of old SSLeay release: SSLeay 0.9.1b (unreleased) 1998-12-21 11:00:56 +00:00
certs Import of old SSLeay release: SSLeay 0.9.1b (unreleased) 1998-12-21 11:00:56 +00:00
crypto Get rid of redundant files. 1999-01-09 13:01:35 +00:00
demos Don't confuse matters by using the wrong library. 1999-01-02 19:03:46 +00:00
dep Import of old SSLeay release: SSLeay 0.9.1b (unreleased) 1998-12-21 11:00:56 +00:00
doc More structuring and sorting of the SSL API documentation. 1998-12-31 11:18:15 +00:00
include Add include dir 1998-12-23 07:55:37 +00:00
ms *** empty log message *** 1998-12-22 16:04:08 +00:00
mt Import of old SSLeay release: SSLeay 0.9.0b 1998-12-21 10:56:39 +00:00
perl Various cleanups and fixed by Marc and Ralf to start the OpenTLS project 1998-12-22 15:04:48 +00:00
rsaref Incorporation of RSEs assembled patches 1998-12-22 15:59:57 +00:00
shlib Import of old SSLeay release: SSLeay 0.9.0b 1998-12-21 10:56:39 +00:00
ssl Accept NULL in *_free. 1999-01-07 19:15:59 +00:00
test Fix tests for ssleay -> openssl. 1999-01-02 19:01:41 +00:00
times Various cleanups and fixed by Marc and Ralf to start the OpenTLS project 1998-12-22 15:04:48 +00:00
tools Various ssleay to openssl fixups 1999-01-02 15:52:11 +00:00
util ssldir.pl did not correctly set the directory in utils/mk1mk.pl when 1999-01-01 14:17:55 +00:00
.cvsignore More .cvsignore stuff to make CVS quiet on our generated files. 1999-01-03 13:17:47 +00:00
CHANGES Fix the gendsa program and add it to the app list. The progs.h file is 1999-01-09 17:29:34 +00:00
CHANGES.SSLeay *** empty log message *** 1998-12-23 07:42:26 +00:00
config Autodetect FreeBSD 3. 1998-12-28 17:14:28 +00:00
Configure Fix an error message 1998-12-30 07:12:35 +00:00
e_os.h First cut of a cleanup for apps/. First the `ssleay' program is now named 1999-01-02 12:59:33 +00:00
INSTALL The dir is named util/ and better to explicitly call the 1999-01-04 09:58:25 +00:00
INSTALL.W32 Various cleanups and fixed by Marc and Ralf to start the OpenTLS project 1998-12-22 15:04:48 +00:00
LICENSE Switch to OpenSSL name 1998-12-23 07:38:54 +00:00
makefile.one *** empty log message *** 1998-12-22 16:04:08 +00:00
Makefile.org Various ssleay to openssl fixups 1999-01-02 15:52:11 +00:00
makevms.com Import of old SSLeay release: SSLeay 0.8.1b 1998-12-21 10:52:47 +00:00
MINFO *** empty log message *** 1998-12-23 08:18:47 +00:00
README Fix version stuff: 1998-12-31 09:36:40 +00:00
README.PATENTS *** empty log message *** 1998-12-23 07:42:26 +00:00
README.PROBLEMS *** empty log message *** 1998-12-23 07:42:26 +00:00
STATUS A few train of thoughts about the build procedure mess 1999-01-02 16:28:51 +00:00

 OpenSSL 0.9.2 31-Dec-1998

 Copyright (c) 1998 The OpenSSL Project
 Copyright (c) 1995-1998 Eric Young
 All rights reserved.

 ....

 The OpenSSL Project is a collaborative effort to develop a robust,
 commercial-grade, fully featured, and Open Source toolkit implementing the
 Transport Layer Security (TLS v1) and Secure Sockets Layer (SSL v2/v3)
 protocols with full-strength cryptography world-wide. The project is managed
 by a worldwide community of volunteers that use the Internet to communicate,
 plan, and develop the OpenSSL tookit and its related documentation. 

 OpenSSL is based on the excellent SSLeay library developed from Eric A. Young
 and Tim J. Hudson.  The OpenSSL toolkit is licensed under a BSD-style licence,
 which basically means that you are free to get and use it for commercial and
 non-commercial purposes. 

 The package includes:

 libssl.a:
     Implementation of SSLv2, SSLv3, TLSv1 and the required code to support
     both SSLv2, SSLv3 and TLSv1 in the one server.

 libcrypto.a:
     General encryption and X.509 stuff needed by TLS/SSL but not actually
     logically part of it. It includes routines for the following:

     Ciphers
        libdes - EAY's libdes DES encryption package which has been floating
                 around the net for a few years.  It includes 15
                 'modes/variations' of DES (1, 2 and 3 key versions of ecb,
                 cbc, cfb and ofb; pcbc and a more general form of cfb and
                 ofb) including desx in cbc mode, a fast crypt(3), and
                 routines to read passwords from the keyboard.
        RC4 encryption,
        RC2 encryption      - 4 different modes, ecb, cbc, cfb and ofb.
        Blowfish encryption - 4 different modes, ecb, cbc, cfb and ofb.
        IDEA encryption     - 4 different modes, ecb, cbc, cfb and ofb.

     Digests
        MD5 and MD2 message digest algorithms, fast implementations,
        SHA (SHA-0) and SHA-1 message digest algorithms,
        MDC2 message digest. A DES based hash that is polular on smart cards.

     Public Key
        RSA encryption/decryption/generation.  
            There is no limit on the number of bits.
        DSA encryption/decryption/generation.   
            There is no limit on the number of bits.
        Diffie-Hellman key-exchange/key generation.  
            There is no limit on the number of bits.

     X.509v3 certificates
        X509 encoding/decoding into/from binary ASN1 and a PEM
             based ascii-binary encoding which supports encryption with a
             private key.  Program to generate RSA and DSA certificate
             requests and to generate RSA and DSA certificates.

     Systems
        The normal digital envelope routines and base64 encoding.  Higher
        level access to ciphers and digests by name.  New ciphers can be
        loaded at run time.  The BIO io system which is a simple non-blocking
        IO abstraction.  Current methods supported are file descriptors,
        sockets, socket accept, socket connect, memory buffer, buffering, SSL
        client/server, file pointer, encryption, digest, non-blocking testing
        and null.

     Data structures
        A dynamically growing hashing system
        A simple stack.
        A Configuration loader that uses a format similar to MS .ini files.

 Programs in this package include:

     enc     - a general encryption program that can encrypt/decrypt using
               one of 17 different cipher/mode combinations.  The
               input/output can also be converted to/from base64
               ascii encoding.
     dgst    - a generate message digesting program that will generate
               message digests for any of md2, md5, sha (sha-0 or sha-1)
               or mdc2.
     asn1parse - parse and display the structure of an asn1 encoded
               binary file.
     rsa     - Manipulate RSA private keys.
     dsa     - Manipulate DSA private keys.
     dh      - Manipulate Diffie-Hellman parameter files.
     dsaparam- Manipulate and generate DSA parameter files.
     crl     - Manipulate certificate revocation lists.
     crt2pkcs7- Generate a pkcs7 object containing a crl and a certificate.
     x509    - Manipulate x509 certificates, self-sign certificates.
     req     - Manipulate PKCS#10 certificate requests and also
               generate certificate requests.
     genrsa  - Generates an arbitrary sized RSA private key.
     gendh   - Generates a set of Diffie-Hellman parameters, the prime
               will be a strong prime.
     ca      - Create certificates from PKCS#10 certificate requests.
               This program also maintains a database of certificates
               issued.
     verify  - Check x509 certificate signatures.
     speed   - Benchmark SSLeay's ciphers.
     s_server- A test SSL server.
     s_client- A test SSL client.
     s_time  - Benchmark SSL performance of SSL server programs.
     errstr  - Convert from SSLeay hex error codes to a readable form.
        
To install this package, read the INSTALL file.
For the Microsoft world, read INSTALL.W32 file.

For people in the USA, it is possible to compile SSLeay to use RSA Inc.'s
public key library, RSAref.  From my understanding, it is claimed by RSA Inc.
to be illegal to use my public key routines inside the USA.  Read
doc/rsaref.doc on how to build with RSAref.

Read the documentation in the doc directory.  It is quite rough, but it lists
the functions, you will probably have to look at the code to work out how to
used them.  I will be working on documentation.  Look at the example programs.