With the recent change the sample config is all static, so no need to process
it by configure.
---
 configure.in          |  2 +-
 openssl.cnf.sample    | 50 ++++++++++++++++++++++++++++++++++++++++++++++++++
 openssl.cnf.sample.in | 50 --------------------------------------------------
 3 files changed, 51 insertions(+), 51 deletions(-)
 create mode 100644 openssl.cnf.sample
 delete mode 100644 openssl.cnf.sample.in

diff --git a/configure.in b/configure.in
index 399dc1e..dfa02a4 100644
--- a/configure.in
+++ b/configure.in
@@ -43,6 +43,6 @@ AC_PROG_LIBTOOL
 CFLAGS="$CFLAGS -Wall"
 AC_SUBST(CFLAGS)
 
-AC_OUTPUT(Makefile openssl.cnf.sample)
+AC_OUTPUT(Makefile)
 
 echo "CFLAGS=$CFLAGS"
diff --git a/openssl.cnf.sample b/openssl.cnf.sample
new file mode 100644
index 0000000..5973182
--- /dev/null
+++ b/openssl.cnf.sample
@@ -0,0 +1,50 @@
+#
+# OpenSSL example configuration file. This file will load the IBMCA engine
+# for all operations that the IBMCA engine implements for all apps that
+# have OpenSSL config support compiled into them.
+#
+# Adding OpenSSL config support is as simple as adding the following line to
+# the app:
+#
+# #define OPENSSL_LOAD_CONF    1
+#
+openssl_conf = openssl_def
+
+[openssl_def]
+engines = engine_section
+
+[engine_section]
+
+foo = ibmca_section
+
+[ibmca_section]
+# The openssl engine path for libibmca.so.
+# Set the dynamic_path to where the libibmca.so engine
+# resides on the system.
+dynamic_path = /usr/lib64/engines/libibmca.so
+
+engine_id = ibmca
+init = 1
+#
+# The following ibmca algorithms will be enabled by these parameters
+# to the default_algorithms line. Any combination of these is valid,
+# with "ALL" denoting the same as all of them in a comma separated
+# list.
+#
+# RSA
+# - RSA encrypt, decrypt, sign and verify, key lengths 512-4096
+#
+# RAND
+# - Hardware random number generation
+#
+# CIPHERS
+# - DES-ECB, DES-CBC, DES-CFB, DES-OFB, DES-EDE3, DES-EDE3-CBC, DES-EDE3-CFB,
+#   DES-EDE3-OFB, AES-128-ECB, AES-128-CBC, AES-128-CFB, AES-128-OFB,
+#   AES-192-ECB, AES-192-CBC, AES-192-CFB, AES-192-OFB, AES-256-ECB,
+#   AES-256-CBC, AES-256-CFB, AES-256-OFB symmetric crypto
+#
+# DIGESTS
+# - SHA1, SHA256 digests
+#
+default_algorithms = ALL
+#default_algorithms = RAND,RSA,CIPHERS,DIGESTS
diff --git a/openssl.cnf.sample.in b/openssl.cnf.sample.in
deleted file mode 100644
index 5973182..0000000
--- a/openssl.cnf.sample.in
+++ /dev/null
@@ -1,50 +0,0 @@
-#
-# OpenSSL example configuration file. This file will load the IBMCA engine
-# for all operations that the IBMCA engine implements for all apps that
-# have OpenSSL config support compiled into them.
-#
-# Adding OpenSSL config support is as simple as adding the following line to
-# the app:
-#
-# #define OPENSSL_LOAD_CONF    1
-#
-openssl_conf = openssl_def
-
-[openssl_def]
-engines = engine_section
-
-[engine_section]
-
-foo = ibmca_section
-
-[ibmca_section]
-# The openssl engine path for libibmca.so.
-# Set the dynamic_path to where the libibmca.so engine
-# resides on the system.
-dynamic_path = /usr/lib64/engines/libibmca.so
-
-engine_id = ibmca
-init = 1
-#
-# The following ibmca algorithms will be enabled by these parameters
-# to the default_algorithms line. Any combination of these is valid,
-# with "ALL" denoting the same as all of them in a comma separated
-# list.
-#
-# RSA
-# - RSA encrypt, decrypt, sign and verify, key lengths 512-4096
-#
-# RAND
-# - Hardware random number generation
-#
-# CIPHERS
-# - DES-ECB, DES-CBC, DES-CFB, DES-OFB, DES-EDE3, DES-EDE3-CBC, DES-EDE3-CFB,
-#   DES-EDE3-OFB, AES-128-ECB, AES-128-CBC, AES-128-CFB, AES-128-OFB,
-#   AES-192-ECB, AES-192-CBC, AES-192-CFB, AES-192-OFB, AES-256-ECB,
-#   AES-256-CBC, AES-256-CFB, AES-256-OFB symmetric crypto
-#
-# DIGESTS
-# - SHA1, SHA256 digests
-#
-default_algorithms = ALL
-#default_algorithms = RAND,RSA,CIPHERS,DIGESTS
-- 
1.9.3


------------------------------------------------------------------------------
Want fast and easy access to all the code in your enterprise? Index and
search up to 200,000 lines of code with a free copy of Black Duck
Code Sight - the same software that powers the world's largest code
search on Ohloh, the Black Duck Open Hub! Try it now.
http://p.sf.net/sfu/bds
_______________________________________________
Opencryptoki-tech mailing list
Opencryptoki-tech@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/opencryptoki-tech

Reply via email to