cryptoservices/certificateandkeymgmt/testcertificates/openssl/readme.txt
changeset 8 35751d3474b7
parent 0 2c201484c85f
--- a/cryptoservices/certificateandkeymgmt/testcertificates/openssl/readme.txt	Tue Jul 21 01:04:32 2009 +0100
+++ b/cryptoservices/certificateandkeymgmt/testcertificates/openssl/readme.txt	Thu Sep 10 14:01:51 2009 +0300
@@ -1,24 +1,24 @@
-The oscpResponder.pl script requires the ocsp responder to support DSA
-
-the following patch can be applied to openssl 0.9.7b or 0.9.7c:
-
---- openssl-0.9.7b.ORIG/apps/ocsp.c	2003-03-26 02:47:06.000000000 +0200
-+++ openssl-0.9.7b/apps/ocsp.c	2004-02-22 16:11:18.000000000 +0200
-@@ -1115,7 +1115,16 @@
- 
- 	OCSP_copy_nonce(bs, req);
- 		
--	OCSP_basic_sign(bs, rcert, rkey, EVP_sha1(), rother, flags);
-+	{
-+		/*in case of DSA keys we should use EVP_dss1()*/
-+		const EVP_MD *evp_md;
-+		/*
-+		 * - EVP_dss1 only or can be EVP_dss for some DSA keys ?
-+		 * - should we use method EVP_PKEY_type() ?
-+		 */
-+		evp_md = (rkey->type == EVP_PKEY_DSA) ? EVP_dss1() : EVP_sha1();
-+		OCSP_basic_sign(bs, rcert, rkey, evp_md, rother, flags);
-+	}
- 
- 	*resp = OCSP_response_create(OCSP_RESPONSE_STATUS_SUCCESSFUL, bs);
- 
+The oscpResponder.pl script requires the ocsp responder to support DSA
+
+the following patch can be applied to openssl 0.9.7b or 0.9.7c:
+
+--- openssl-0.9.7b.ORIG/apps/ocsp.c	2003-03-26 02:47:06.000000000 +0200
++++ openssl-0.9.7b/apps/ocsp.c	2004-02-22 16:11:18.000000000 +0200
+@@ -1115,7 +1115,16 @@
+ 
+ 	OCSP_copy_nonce(bs, req);
+ 		
+-	OCSP_basic_sign(bs, rcert, rkey, EVP_sha1(), rother, flags);
++	{
++		/*in case of DSA keys we should use EVP_dss1()*/
++		const EVP_MD *evp_md;
++		/*
++		 * - EVP_dss1 only or can be EVP_dss for some DSA keys ?
++		 * - should we use method EVP_PKEY_type() ?
++		 */
++		evp_md = (rkey->type == EVP_PKEY_DSA) ? EVP_dss1() : EVP_sha1();
++		OCSP_basic_sign(bs, rcert, rkey, evp_md, rother, flags);
++	}
+ 
+ 	*resp = OCSP_response_create(OCSP_RESPONSE_STATUS_SUCCESSFUL, bs);
+