Linux vps-61133.fhnet.fr 4.9.0-19-amd64 #1 SMP Debian 4.9.320-2 (2022-06-30) x86_64
Apache/2.4.25 (Debian)
Server IP : 93.113.207.21 & Your IP : 216.73.216.122
Domains :
Cant Read [ /etc/named.conf ]
User : www-data
Terminal
Auto Root
Create File
Create Folder
Localroot Suggester
Backdoor Destroyer
Readme
/
usr /
share /
doc /
libssl-doc /
demos /
cms /
Delete
Unzip
Name
Size
Permission
Date
Action
cacert.pem
1.04
KB
-rw-r--r--
2019-09-10 15:16
cakey.pem
891
B
-rw-r--r--
2019-09-10 15:16
cms_comp.c
1.34
KB
-rw-r--r--
2019-09-10 15:16
cms_ddec.c
1.9
KB
-rw-r--r--
2019-09-10 15:16
cms_dec.c
1.65
KB
-rw-r--r--
2019-09-10 15:16
cms_denc.c
2.16
KB
-rw-r--r--
2019-09-10 15:16
cms_enc.c
2.02
KB
-rw-r--r--
2019-09-10 15:16
cms_sign.c
1.93
KB
-rw-r--r--
2019-09-10 15:16
cms_sign2.c
2.07
KB
-rw-r--r--
2019-09-10 15:16
cms_uncomp.c
1.21
KB
-rw-r--r--
2019-09-10 15:16
cms_ver.c
1.78
KB
-rw-r--r--
2019-09-10 15:16
comp.txt
566
B
-rw-r--r--
2019-09-10 15:16
encr.txt
65
B
-rw-r--r--
2019-09-10 15:16
sign.txt
58
B
-rw-r--r--
2019-09-10 15:16
signer.pem
1.82
KB
-rw-r--r--
2019-09-10 15:16
signer2.pem
1.82
KB
-rw-r--r--
2019-09-10 15:16
Save
Rename
/* * Copyright 2008-2016 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the OpenSSL license (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ /* Simple S/MIME verification example */ #include <openssl/pem.h> #include <openssl/cms.h> #include <openssl/err.h> int main(int argc, char **argv) { BIO *in = NULL, *out = NULL, *tbio = NULL, *cont = NULL; X509_STORE *st = NULL; X509 *cacert = NULL; CMS_ContentInfo *cms = NULL; int ret = 1; OpenSSL_add_all_algorithms(); ERR_load_crypto_strings(); /* Set up trusted CA certificate store */ st = X509_STORE_new(); /* Read in CA certificate */ tbio = BIO_new_file("cacert.pem", "r"); if (!tbio) goto err; cacert = PEM_read_bio_X509(tbio, NULL, 0, NULL); if (!cacert) goto err; if (!X509_STORE_add_cert(st, cacert)) goto err; /* Open message being verified */ in = BIO_new_file("smout.txt", "r"); if (!in) goto err; /* parse message */ cms = SMIME_read_CMS(in, &cont); if (!cms) goto err; /* File to output verified content to */ out = BIO_new_file("smver.txt", "w"); if (!out) goto err; if (!CMS_verify(cms, NULL, st, cont, out, 0)) { fprintf(stderr, "Verification Failure\n"); goto err; } fprintf(stderr, "Verification Successful\n"); ret = 0; err: if (ret) { fprintf(stderr, "Error Verifying Data\n"); ERR_print_errors_fp(stderr); } CMS_ContentInfo_free(cms); X509_free(cacert); BIO_free(in); BIO_free(out); BIO_free(tbio); return ret; }