With the recent change the sample config is all static, so no need to process it by configure. --- configure.in | 2 +- openssl.cnf.sample | 50 ++++++++++++++++++++++++++++++++++++++++++++++++++ openssl.cnf.sample.in | 50 -------------------------------------------------- 3 files changed, 51 insertions(+), 51 deletions(-) create mode 100644 openssl.cnf.sample delete mode 100644 openssl.cnf.sample.in
diff --git a/configure.in b/configure.in index 399dc1e..dfa02a4 100644 --- a/configure.in +++ b/configure.in @@ -43,6 +43,6 @@ AC_PROG_LIBTOOL CFLAGS="$CFLAGS -Wall" AC_SUBST(CFLAGS) -AC_OUTPUT(Makefile openssl.cnf.sample) +AC_OUTPUT(Makefile) echo "CFLAGS=$CFLAGS" diff --git a/openssl.cnf.sample b/openssl.cnf.sample new file mode 100644 index 0000000..5973182 --- /dev/null +++ b/openssl.cnf.sample @@ -0,0 +1,50 @@ +# +# OpenSSL example configuration file. This file will load the IBMCA engine +# for all operations that the IBMCA engine implements for all apps that +# have OpenSSL config support compiled into them. +# +# Adding OpenSSL config support is as simple as adding the following line to +# the app: +# +# #define OPENSSL_LOAD_CONF 1 +# +openssl_conf = openssl_def + +[openssl_def] +engines = engine_section + +[engine_section] + +foo = ibmca_section + +[ibmca_section] +# The openssl engine path for libibmca.so. +# Set the dynamic_path to where the libibmca.so engine +# resides on the system. +dynamic_path = /usr/lib64/engines/libibmca.so + +engine_id = ibmca +init = 1 +# +# The following ibmca algorithms will be enabled by these parameters +# to the default_algorithms line. Any combination of these is valid, +# with "ALL" denoting the same as all of them in a comma separated +# list. +# +# RSA +# - RSA encrypt, decrypt, sign and verify, key lengths 512-4096 +# +# RAND +# - Hardware random number generation +# +# CIPHERS +# - DES-ECB, DES-CBC, DES-CFB, DES-OFB, DES-EDE3, DES-EDE3-CBC, DES-EDE3-CFB, +# DES-EDE3-OFB, AES-128-ECB, AES-128-CBC, AES-128-CFB, AES-128-OFB, +# AES-192-ECB, AES-192-CBC, AES-192-CFB, AES-192-OFB, AES-256-ECB, +# AES-256-CBC, AES-256-CFB, AES-256-OFB symmetric crypto +# +# DIGESTS +# - SHA1, SHA256 digests +# +default_algorithms = ALL +#default_algorithms = RAND,RSA,CIPHERS,DIGESTS diff --git a/openssl.cnf.sample.in b/openssl.cnf.sample.in deleted file mode 100644 index 5973182..0000000 --- a/openssl.cnf.sample.in +++ /dev/null @@ -1,50 +0,0 @@ -# -# OpenSSL example configuration file. This file will load the IBMCA engine -# for all operations that the IBMCA engine implements for all apps that -# have OpenSSL config support compiled into them. -# -# Adding OpenSSL config support is as simple as adding the following line to -# the app: -# -# #define OPENSSL_LOAD_CONF 1 -# -openssl_conf = openssl_def - -[openssl_def] -engines = engine_section - -[engine_section] - -foo = ibmca_section - -[ibmca_section] -# The openssl engine path for libibmca.so. -# Set the dynamic_path to where the libibmca.so engine -# resides on the system. -dynamic_path = /usr/lib64/engines/libibmca.so - -engine_id = ibmca -init = 1 -# -# The following ibmca algorithms will be enabled by these parameters -# to the default_algorithms line. Any combination of these is valid, -# with "ALL" denoting the same as all of them in a comma separated -# list. -# -# RSA -# - RSA encrypt, decrypt, sign and verify, key lengths 512-4096 -# -# RAND -# - Hardware random number generation -# -# CIPHERS -# - DES-ECB, DES-CBC, DES-CFB, DES-OFB, DES-EDE3, DES-EDE3-CBC, DES-EDE3-CFB, -# DES-EDE3-OFB, AES-128-ECB, AES-128-CBC, AES-128-CFB, AES-128-OFB, -# AES-192-ECB, AES-192-CBC, AES-192-CFB, AES-192-OFB, AES-256-ECB, -# AES-256-CBC, AES-256-CFB, AES-256-OFB symmetric crypto -# -# DIGESTS -# - SHA1, SHA256 digests -# -default_algorithms = ALL -#default_algorithms = RAND,RSA,CIPHERS,DIGESTS -- 1.9.3 ------------------------------------------------------------------------------ Want fast and easy access to all the code in your enterprise? Index and search up to 200,000 lines of code with a free copy of Black Duck Code Sight - the same software that powers the world's largest code search on Ohloh, the Black Duck Open Hub! Try it now. http://p.sf.net/sfu/bds _______________________________________________ Opencryptoki-tech mailing list Opencryptoki-tech@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/opencryptoki-tech