diff options
author | tb <> | 2022-01-12 08:45:09 +0000 |
---|---|---|
committer | tb <> | 2022-01-12 08:45:09 +0000 |
commit | 609076ea072d474160a02eac6c5e96b36937d9a5 (patch) | |
tree | cf528be47e1b779325675a073c13e98e544d7396 | |
parent | f7047c5760416fa250d00dbd4dfe54e5bb4702ca (diff) | |
download | openbsd-609076ea072d474160a02eac6c5e96b36937d9a5.tar.gz openbsd-609076ea072d474160a02eac6c5e96b36937d9a5.tar.bz2 openbsd-609076ea072d474160a02eac6c5e96b36937d9a5.zip |
Fix asn1x509 build with opaque structures. Link statically for now.
-rw-r--r-- | src/regress/lib/libcrypto/asn1/Makefile | 6 | ||||
-rw-r--r-- | src/regress/lib/libcrypto/asn1/asn1x509.c | 39 |
2 files changed, 25 insertions, 20 deletions
diff --git a/src/regress/lib/libcrypto/asn1/Makefile b/src/regress/lib/libcrypto/asn1/Makefile index 17817514ac..307c8b6928 100644 --- a/src/regress/lib/libcrypto/asn1/Makefile +++ b/src/regress/lib/libcrypto/asn1/Makefile | |||
@@ -1,4 +1,4 @@ | |||
1 | # $OpenBSD: Makefile,v 1.13 2022/01/12 07:55:25 tb Exp $ | 1 | # $OpenBSD: Makefile,v 1.14 2022/01/12 08:45:09 tb Exp $ |
2 | 2 | ||
3 | PROGS = \ | 3 | PROGS = \ |
4 | asn1api \ | 4 | asn1api \ |
@@ -14,11 +14,13 @@ PROGS = \ | |||
14 | DPADD+= ${LIBCRYPTO} ${LIBSSL} | 14 | DPADD+= ${LIBCRYPTO} ${LIBSSL} |
15 | WARNINGS= Yes | 15 | WARNINGS= Yes |
16 | LDFLAGS+= -lcrypto | 16 | LDFLAGS+= -lcrypto |
17 | CFLAGS+= -DLIBRESSL_INTERNAL -Wall -Wundef -Werror | 17 | CFLAGS+= -DLIBRESSL_INTERNAL -DLIBRESSL_CRYPTO_INTERNAL |
18 | CFLAGS+= -Wall -Wundef -Werror | ||
18 | CFLAGS+= -I${.CURDIR}/../../../../lib/libcrypto/asn1 | 19 | CFLAGS+= -I${.CURDIR}/../../../../lib/libcrypto/asn1 |
19 | CFLAGS+= -I${.CURDIR}/../../../../lib/libcrypto/bytestring | 20 | CFLAGS+= -I${.CURDIR}/../../../../lib/libcrypto/bytestring |
20 | 21 | ||
21 | LDADD_asn1basic = ${CRYPTO_INT} | 22 | LDADD_asn1basic = ${CRYPTO_INT} |
23 | LDADD_asn1x509 = ${CRYPTO_INT} # XXX Remove after bump | ||
22 | 24 | ||
23 | .for p in ${PROGS} | 25 | .for p in ${PROGS} |
24 | REGRESS_TARGETS += run-$p | 26 | REGRESS_TARGETS += run-$p |
diff --git a/src/regress/lib/libcrypto/asn1/asn1x509.c b/src/regress/lib/libcrypto/asn1/asn1x509.c index a9cd4967da..fb0ae011f2 100644 --- a/src/regress/lib/libcrypto/asn1/asn1x509.c +++ b/src/regress/lib/libcrypto/asn1/asn1x509.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: asn1x509.c,v 1.1 2021/11/30 07:34:29 jsing Exp $ */ | 1 | /* $OpenBSD: asn1x509.c,v 1.2 2022/01/12 08:45:09 tb Exp $ */ |
2 | /* | 2 | /* |
3 | * Copyright (c) 2017 Joel Sing <jsing@openbsd.org> | 3 | * Copyright (c) 2017 Joel Sing <jsing@openbsd.org> |
4 | * | 4 | * |
@@ -193,7 +193,8 @@ dsa_pubkey_test(void) | |||
193 | goto done; | 193 | goto done; |
194 | } | 194 | } |
195 | 195 | ||
196 | if (BN_cmp(pkey_a->pkey.dsa->pub_key, pkey_b->pkey.dsa->pub_key) != 0) { | 196 | if (BN_cmp(DSA_get0_pub_key(EVP_PKEY_get0_DSA(pkey_a)), |
197 | DSA_get0_pub_key(EVP_PKEY_get0_DSA(pkey_b))) != 0) { | ||
197 | fprintf(stderr, "FAIL: DSA public keys mismatch\n"); | 198 | fprintf(stderr, "FAIL: DSA public keys mismatch\n"); |
198 | goto done; | 199 | goto done; |
199 | } | 200 | } |
@@ -219,7 +220,7 @@ dsa_pubkey_test(void) | |||
219 | goto done; | 220 | goto done; |
220 | } | 221 | } |
221 | 222 | ||
222 | if (BN_cmp(dsa_a->pub_key, dsa_b->pub_key) != 0) { | 223 | if (BN_cmp(DSA_get0_pub_key(dsa_a), DSA_get0_pub_key(dsa_b)) != 0) { |
223 | fprintf(stderr, "FAIL: DSA public keys mismatch\n"); | 224 | fprintf(stderr, "FAIL: DSA public keys mismatch\n"); |
224 | goto done; | 225 | goto done; |
225 | } | 226 | } |
@@ -230,7 +231,7 @@ dsa_pubkey_test(void) | |||
230 | goto done; | 231 | goto done; |
231 | } | 232 | } |
232 | 233 | ||
233 | if (BN_cmp(dsa_a->pub_key, dsa_b->pub_key) != 0) { | 234 | if (BN_cmp(DSA_get0_pub_key(dsa_a), DSA_get0_pub_key(dsa_b)) != 0) { |
234 | fprintf(stderr, "FAIL: DSA public keys mismatch\n"); | 235 | fprintf(stderr, "FAIL: DSA public keys mismatch\n"); |
235 | goto done; | 236 | goto done; |
236 | } | 237 | } |
@@ -258,7 +259,7 @@ dsa_pubkey_test(void) | |||
258 | goto done; | 259 | goto done; |
259 | } | 260 | } |
260 | 261 | ||
261 | if (BN_cmp(dsa_a->pub_key, dsa_b->pub_key) != 0) { | 262 | if (BN_cmp(DSA_get0_pub_key(dsa_a), DSA_get0_pub_key(dsa_b)) != 0) { |
262 | fprintf(stderr, "FAIL: DSA public keys mismatch\n"); | 263 | fprintf(stderr, "FAIL: DSA public keys mismatch\n"); |
263 | goto done; | 264 | goto done; |
264 | } | 265 | } |
@@ -317,14 +318,14 @@ ec_pubkey_test(void) | |||
317 | goto done; | 318 | goto done; |
318 | } | 319 | } |
319 | 320 | ||
320 | if (EC_GROUP_cmp(EC_KEY_get0_group(pkey_a->pkey.ec), | 321 | if (EC_GROUP_cmp(EC_KEY_get0_group(EVP_PKEY_get0_EC_KEY(pkey_a)), |
321 | EC_KEY_get0_group(pkey_b->pkey.ec), NULL) != 0) { | 322 | EC_KEY_get0_group(EVP_PKEY_get0_EC_KEY(pkey_b)), NULL) != 0) { |
322 | fprintf(stderr, "FAIL: EC_KEY groups keys mismatch\n"); | 323 | fprintf(stderr, "FAIL: EC_KEY groups keys mismatch\n"); |
323 | goto done; | 324 | goto done; |
324 | } | 325 | } |
325 | if (EC_POINT_cmp(EC_KEY_get0_group(pkey_a->pkey.ec), | 326 | if (EC_POINT_cmp(EC_KEY_get0_group(EVP_PKEY_get0_EC_KEY(pkey_a)), |
326 | EC_KEY_get0_public_key(pkey_a->pkey.ec), | 327 | EC_KEY_get0_public_key(EVP_PKEY_get0_EC_KEY(pkey_a)), |
327 | EC_KEY_get0_public_key(pkey_b->pkey.ec), NULL) != 0) { | 328 | EC_KEY_get0_public_key(EVP_PKEY_get0_EC_KEY(pkey_b)), NULL) != 0) { |
328 | fprintf(stderr, "FAIL: EC_KEY public keys mismatch\n"); | 329 | fprintf(stderr, "FAIL: EC_KEY public keys mismatch\n"); |
329 | goto done; | 330 | goto done; |
330 | } | 331 | } |
@@ -466,8 +467,10 @@ rsa_pubkey_test(void) | |||
466 | goto done; | 467 | goto done; |
467 | } | 468 | } |
468 | 469 | ||
469 | if (BN_cmp(pkey_a->pkey.rsa->n, pkey_b->pkey.rsa->n) != 0 || | 470 | if (BN_cmp(RSA_get0_n(EVP_PKEY_get0_RSA(pkey_a)), |
470 | BN_cmp(pkey_a->pkey.rsa->e, pkey_b->pkey.rsa->e) != 0) { | 471 | RSA_get0_n(EVP_PKEY_get0_RSA(pkey_b))) != 0 || |
472 | BN_cmp(RSA_get0_e(EVP_PKEY_get0_RSA(pkey_a)), | ||
473 | RSA_get0_e(EVP_PKEY_get0_RSA(pkey_b))) != 0) { | ||
471 | fprintf(stderr, "FAIL: RSA public keys mismatch\n"); | 474 | fprintf(stderr, "FAIL: RSA public keys mismatch\n"); |
472 | goto done; | 475 | goto done; |
473 | } | 476 | } |
@@ -493,8 +496,8 @@ rsa_pubkey_test(void) | |||
493 | goto done; | 496 | goto done; |
494 | } | 497 | } |
495 | 498 | ||
496 | if (BN_cmp(rsa_a->n, rsa_b->n) != 0 || | 499 | if (BN_cmp(RSA_get0_n(rsa_a), RSA_get0_n(rsa_b)) != 0 || |
497 | BN_cmp(rsa_a->e, rsa_b->e) != 0) { | 500 | BN_cmp(RSA_get0_e(rsa_a), RSA_get0_e(rsa_b)) != 0) { |
498 | fprintf(stderr, "FAIL: RSA public keys mismatch\n"); | 501 | fprintf(stderr, "FAIL: RSA public keys mismatch\n"); |
499 | goto done; | 502 | goto done; |
500 | } | 503 | } |
@@ -505,8 +508,8 @@ rsa_pubkey_test(void) | |||
505 | goto done; | 508 | goto done; |
506 | } | 509 | } |
507 | 510 | ||
508 | if (BN_cmp(rsa_a->n, rsa_b->n) != 0 || | 511 | if (BN_cmp(RSA_get0_n(rsa_a), RSA_get0_n(rsa_b)) != 0 || |
509 | BN_cmp(rsa_a->e, rsa_b->e) != 0) { | 512 | BN_cmp(RSA_get0_e(rsa_a), RSA_get0_e(rsa_b)) != 0) { |
510 | fprintf(stderr, "FAIL: RSA public keys mismatch\n"); | 513 | fprintf(stderr, "FAIL: RSA public keys mismatch\n"); |
511 | goto done; | 514 | goto done; |
512 | } | 515 | } |
@@ -534,8 +537,8 @@ rsa_pubkey_test(void) | |||
534 | goto done; | 537 | goto done; |
535 | } | 538 | } |
536 | 539 | ||
537 | if (BN_cmp(rsa_a->n, rsa_b->n) != 0 || | 540 | if (BN_cmp(RSA_get0_n(rsa_a), RSA_get0_n(rsa_b)) != 0 || |
538 | BN_cmp(rsa_a->e, rsa_b->e) != 0) { | 541 | BN_cmp(RSA_get0_e(rsa_a), RSA_get0_e(rsa_b)) != 0) { |
539 | fprintf(stderr, "FAIL: RSA public keys mismatch\n"); | 542 | fprintf(stderr, "FAIL: RSA public keys mismatch\n"); |
540 | goto done; | 543 | goto done; |
541 | } | 544 | } |