2.8.0
P SHIBxmlsec xml-security-c
1.4.0
+P SHIBlog4shib log4shib
+ 1.0
--- /dev/null
+P SHIBossl OpenSSL
+ 0.9.8g
-ARCH=sparc
PKG=SHIBossl
NAME=openssl - OpenSSL Secure Sockets Layer lib and utilities
-VERSION=0.9.8e
+VERSION=0.9.8g
CATEGORY=system
VENDOR=http://www.openssl.org/source/ packaged for Shibboleth by Scott Cantor
-HOTLINE=http://bugs.internet2.edu/
+HOTLINE=https://bugs.internet2.edu/
EMAIL=cantor.2@osu.edu
-PSTAMP=11Jun2007
+PSTAMP=17Mar2008
CLASSES=none
--- /dev/null
+#!/bin/sh
+
+cd ${CLIENT_BASEDIR}/lib/pkgconfig
+
+sed "s|^prefix=.*|prefix=${CLIENT_BASEDIR}|1" libcrypto.pc > libcrypto.pc.tmp
+mv libcrypto.pc.tmp libcrypto.pc
+chmod 644 libcrypto.pc
+
+sed "s|^prefix=.*|prefix=${CLIENT_BASEDIR}|1" libssl.pc > libssl.pc.tmp
+mv libssl.pc.tmp libssl.pc
+chmod 644 libssl.pc
+
+sed "s|^prefix=.*|prefix=${CLIENT_BASEDIR}|1" openssl.pc > openssl.pc.tmp
+mv openssl.pc.tmp openssl.pc
+chmod 644 openssl.pc
+
+exit 0
--- /dev/null
+P SHIBossl OpenSSL
+ 0.9.8g
+P SHIBxerces xerces-c
+ 2.8.0
PKG=SHIBxmltool
-ARCH=sparc
VERSION=@-VERSION-@
NAME=xmltooling-c
CATEGORY=application,textproc,security
*
* @param ownCerts true iff any certificates subsequently stored should be freed by destructor
*/
- BasicX509Credential(bool ownCerts) : m_key(NULL), m_serial(-1), m_ownCerts(ownCerts), m_crl(NULL), m_keyInfo(NULL), m_compactKeyInfo(NULL) {
+ BasicX509Credential(bool ownCerts) : m_key(NULL), m_ownCerts(ownCerts), m_crl(NULL), m_keyInfo(NULL), m_compactKeyInfo(NULL) {
}
/**
* @param crl optional CRL
*/
BasicX509Credential(XSECCryptoKey* key, const std::vector<XSECCryptoX509*>& certs, XSECCryptoX509CRL* crl=NULL)
- : m_key(key), m_serial(-1), m_xseccerts(certs), m_ownCerts(true), m_crl(crl), m_keyInfo(NULL), m_compactKeyInfo(NULL) {
+ : m_key(key), m_xseccerts(certs), m_ownCerts(true), m_crl(crl), m_keyInfo(NULL), m_compactKeyInfo(NULL) {
}
/** The private/secret key/keypair. */
std::string m_issuerName;
/** Serial number. */
- int m_serial;
+ std::string m_serial;
/** The X.509 certificate chain. */
std::vector<XSECCryptoX509*> m_xseccerts;
return m_issuerName.c_str();
}
- int getSerialNumber() const {
- return m_serial;
+ const char* getSerialNumber() const {
+ return m_serial.c_str();
}
void extract();
*
* @return the serial number
*/
- virtual int getSerialNumber() const=0;
+ virtual const char* getSerialNumber() const=0;
/**
* Extracts properties like issuer and subject from the first certificate in the chain.
}
}
- if (!m_subjectName.empty() || (!m_issuerName.empty() && m_serial >= 0)) {
+ if (!m_subjectName.empty() || (!m_issuerName.empty() && !m_serial.empty())) {
if (!m_compactKeyInfo)
m_compactKeyInfo = KeyInfoBuilder::buildKeyInfo();
X509Data* x509Data=X509DataBuilder::buildX509Data();
x509Data->getX509SubjectNames().push_back(sn);
}
- if (!m_issuerName.empty() && m_serial >= 0) {
+ if (!m_issuerName.empty() && !m_serial.empty()) {
X509IssuerSerial* is = X509IssuerSerialBuilder::buildX509IssuerSerial();
X509IssuerName* in = X509IssuerNameBuilder::buildX509IssuerName();
auto_ptr_XMLCh wide(m_issuerName.c_str());
in->setName(wide.get());
is->setX509IssuerName(in);
X509SerialNumber* ser = X509SerialNumberBuilder::buildX509SerialNumber();
- char buf[64];
- sprintf(buf,"%d",m_serial);
- auto_ptr_XMLCh wide2(buf);
+ auto_ptr_XMLCh wide2(m_serial.c_str());
ser->setSerialNumber(wide2.get());
is->setX509SerialNumber(ser);
x509Data->getX509IssuerSerials().push_back(is);
if (serialBN) {
char* serial = BN_bn2dec(serialBN);
if (serial) {
- m_serial = atoi(serial);
+ m_serial = serial;
free(serial);
}
BN_free(serialBN);
}
const X509SerialNumber* ser = inames.front()->getX509SerialNumber();
- if (ser)
- m_serial = XMLString::parseInt(ser->getSerialNumber());
+ if (ser) {
+ auto_ptr_char sn(ser->getSerialNumber());
+ m_serial = sn.get();
+ }
}
}
}
delete[] kn;
}
n = kix->getX509IssuerSerialNumber();
- if (n && *n)
- m_serial = XMLString::parseInt(n);
+ if (n && *n) {
+ auto_ptr_char sn(n);
+ m_serial = sn.get();
+ }
}
}
}