summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authortb <>2022-01-12 08:45:09 +0000
committertb <>2022-01-12 08:45:09 +0000
commit609076ea072d474160a02eac6c5e96b36937d9a5 (patch)
treecf528be47e1b779325675a073c13e98e544d7396
parentf7047c5760416fa250d00dbd4dfe54e5bb4702ca (diff)
downloadopenbsd-609076ea072d474160a02eac6c5e96b36937d9a5.tar.gz
openbsd-609076ea072d474160a02eac6c5e96b36937d9a5.tar.bz2
openbsd-609076ea072d474160a02eac6c5e96b36937d9a5.zip
Fix asn1x509 build with opaque structures. Link statically for now.
-rw-r--r--src/regress/lib/libcrypto/asn1/Makefile6
-rw-r--r--src/regress/lib/libcrypto/asn1/asn1x509.c39
2 files changed, 25 insertions, 20 deletions
diff --git a/src/regress/lib/libcrypto/asn1/Makefile b/src/regress/lib/libcrypto/asn1/Makefile
index 17817514ac..307c8b6928 100644
--- a/src/regress/lib/libcrypto/asn1/Makefile
+++ b/src/regress/lib/libcrypto/asn1/Makefile
@@ -1,4 +1,4 @@
1# $OpenBSD: Makefile,v 1.13 2022/01/12 07:55:25 tb Exp $ 1# $OpenBSD: Makefile,v 1.14 2022/01/12 08:45:09 tb Exp $
2 2
3PROGS = \ 3PROGS = \
4 asn1api \ 4 asn1api \
@@ -14,11 +14,13 @@ PROGS = \
14DPADD+= ${LIBCRYPTO} ${LIBSSL} 14DPADD+= ${LIBCRYPTO} ${LIBSSL}
15WARNINGS= Yes 15WARNINGS= Yes
16LDFLAGS+= -lcrypto 16LDFLAGS+= -lcrypto
17CFLAGS+= -DLIBRESSL_INTERNAL -Wall -Wundef -Werror 17CFLAGS+= -DLIBRESSL_INTERNAL -DLIBRESSL_CRYPTO_INTERNAL
18CFLAGS+= -Wall -Wundef -Werror
18CFLAGS+= -I${.CURDIR}/../../../../lib/libcrypto/asn1 19CFLAGS+= -I${.CURDIR}/../../../../lib/libcrypto/asn1
19CFLAGS+= -I${.CURDIR}/../../../../lib/libcrypto/bytestring 20CFLAGS+= -I${.CURDIR}/../../../../lib/libcrypto/bytestring
20 21
21LDADD_asn1basic = ${CRYPTO_INT} 22LDADD_asn1basic = ${CRYPTO_INT}
23LDADD_asn1x509 = ${CRYPTO_INT} # XXX Remove after bump
22 24
23.for p in ${PROGS} 25.for p in ${PROGS}
24REGRESS_TARGETS += run-$p 26REGRESS_TARGETS += run-$p
diff --git a/src/regress/lib/libcrypto/asn1/asn1x509.c b/src/regress/lib/libcrypto/asn1/asn1x509.c
index a9cd4967da..fb0ae011f2 100644
--- a/src/regress/lib/libcrypto/asn1/asn1x509.c
+++ b/src/regress/lib/libcrypto/asn1/asn1x509.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: asn1x509.c,v 1.1 2021/11/30 07:34:29 jsing Exp $ */ 1/* $OpenBSD: asn1x509.c,v 1.2 2022/01/12 08:45:09 tb Exp $ */
2/* 2/*
3 * Copyright (c) 2017 Joel Sing <jsing@openbsd.org> 3 * Copyright (c) 2017 Joel Sing <jsing@openbsd.org>
4 * 4 *
@@ -193,7 +193,8 @@ dsa_pubkey_test(void)
193 goto done; 193 goto done;
194 } 194 }
195 195
196 if (BN_cmp(pkey_a->pkey.dsa->pub_key, pkey_b->pkey.dsa->pub_key) != 0) { 196 if (BN_cmp(DSA_get0_pub_key(EVP_PKEY_get0_DSA(pkey_a)),
197 DSA_get0_pub_key(EVP_PKEY_get0_DSA(pkey_b))) != 0) {
197 fprintf(stderr, "FAIL: DSA public keys mismatch\n"); 198 fprintf(stderr, "FAIL: DSA public keys mismatch\n");
198 goto done; 199 goto done;
199 } 200 }
@@ -219,7 +220,7 @@ dsa_pubkey_test(void)
219 goto done; 220 goto done;
220 } 221 }
221 222
222 if (BN_cmp(dsa_a->pub_key, dsa_b->pub_key) != 0) { 223 if (BN_cmp(DSA_get0_pub_key(dsa_a), DSA_get0_pub_key(dsa_b)) != 0) {
223 fprintf(stderr, "FAIL: DSA public keys mismatch\n"); 224 fprintf(stderr, "FAIL: DSA public keys mismatch\n");
224 goto done; 225 goto done;
225 } 226 }
@@ -230,7 +231,7 @@ dsa_pubkey_test(void)
230 goto done; 231 goto done;
231 } 232 }
232 233
233 if (BN_cmp(dsa_a->pub_key, dsa_b->pub_key) != 0) { 234 if (BN_cmp(DSA_get0_pub_key(dsa_a), DSA_get0_pub_key(dsa_b)) != 0) {
234 fprintf(stderr, "FAIL: DSA public keys mismatch\n"); 235 fprintf(stderr, "FAIL: DSA public keys mismatch\n");
235 goto done; 236 goto done;
236 } 237 }
@@ -258,7 +259,7 @@ dsa_pubkey_test(void)
258 goto done; 259 goto done;
259 } 260 }
260 261
261 if (BN_cmp(dsa_a->pub_key, dsa_b->pub_key) != 0) { 262 if (BN_cmp(DSA_get0_pub_key(dsa_a), DSA_get0_pub_key(dsa_b)) != 0) {
262 fprintf(stderr, "FAIL: DSA public keys mismatch\n"); 263 fprintf(stderr, "FAIL: DSA public keys mismatch\n");
263 goto done; 264 goto done;
264 } 265 }
@@ -317,14 +318,14 @@ ec_pubkey_test(void)
317 goto done; 318 goto done;
318 } 319 }
319 320
320 if (EC_GROUP_cmp(EC_KEY_get0_group(pkey_a->pkey.ec), 321 if (EC_GROUP_cmp(EC_KEY_get0_group(EVP_PKEY_get0_EC_KEY(pkey_a)),
321 EC_KEY_get0_group(pkey_b->pkey.ec), NULL) != 0) { 322 EC_KEY_get0_group(EVP_PKEY_get0_EC_KEY(pkey_b)), NULL) != 0) {
322 fprintf(stderr, "FAIL: EC_KEY groups keys mismatch\n"); 323 fprintf(stderr, "FAIL: EC_KEY groups keys mismatch\n");
323 goto done; 324 goto done;
324 } 325 }
325 if (EC_POINT_cmp(EC_KEY_get0_group(pkey_a->pkey.ec), 326 if (EC_POINT_cmp(EC_KEY_get0_group(EVP_PKEY_get0_EC_KEY(pkey_a)),
326 EC_KEY_get0_public_key(pkey_a->pkey.ec), 327 EC_KEY_get0_public_key(EVP_PKEY_get0_EC_KEY(pkey_a)),
327 EC_KEY_get0_public_key(pkey_b->pkey.ec), NULL) != 0) { 328 EC_KEY_get0_public_key(EVP_PKEY_get0_EC_KEY(pkey_b)), NULL) != 0) {
328 fprintf(stderr, "FAIL: EC_KEY public keys mismatch\n"); 329 fprintf(stderr, "FAIL: EC_KEY public keys mismatch\n");
329 goto done; 330 goto done;
330 } 331 }
@@ -466,8 +467,10 @@ rsa_pubkey_test(void)
466 goto done; 467 goto done;
467 } 468 }
468 469
469 if (BN_cmp(pkey_a->pkey.rsa->n, pkey_b->pkey.rsa->n) != 0 || 470 if (BN_cmp(RSA_get0_n(EVP_PKEY_get0_RSA(pkey_a)),
470 BN_cmp(pkey_a->pkey.rsa->e, pkey_b->pkey.rsa->e) != 0) { 471 RSA_get0_n(EVP_PKEY_get0_RSA(pkey_b))) != 0 ||
472 BN_cmp(RSA_get0_e(EVP_PKEY_get0_RSA(pkey_a)),
473 RSA_get0_e(EVP_PKEY_get0_RSA(pkey_b))) != 0) {
471 fprintf(stderr, "FAIL: RSA public keys mismatch\n"); 474 fprintf(stderr, "FAIL: RSA public keys mismatch\n");
472 goto done; 475 goto done;
473 } 476 }
@@ -493,8 +496,8 @@ rsa_pubkey_test(void)
493 goto done; 496 goto done;
494 } 497 }
495 498
496 if (BN_cmp(rsa_a->n, rsa_b->n) != 0 || 499 if (BN_cmp(RSA_get0_n(rsa_a), RSA_get0_n(rsa_b)) != 0 ||
497 BN_cmp(rsa_a->e, rsa_b->e) != 0) { 500 BN_cmp(RSA_get0_e(rsa_a), RSA_get0_e(rsa_b)) != 0) {
498 fprintf(stderr, "FAIL: RSA public keys mismatch\n"); 501 fprintf(stderr, "FAIL: RSA public keys mismatch\n");
499 goto done; 502 goto done;
500 } 503 }
@@ -505,8 +508,8 @@ rsa_pubkey_test(void)
505 goto done; 508 goto done;
506 } 509 }
507 510
508 if (BN_cmp(rsa_a->n, rsa_b->n) != 0 || 511 if (BN_cmp(RSA_get0_n(rsa_a), RSA_get0_n(rsa_b)) != 0 ||
509 BN_cmp(rsa_a->e, rsa_b->e) != 0) { 512 BN_cmp(RSA_get0_e(rsa_a), RSA_get0_e(rsa_b)) != 0) {
510 fprintf(stderr, "FAIL: RSA public keys mismatch\n"); 513 fprintf(stderr, "FAIL: RSA public keys mismatch\n");
511 goto done; 514 goto done;
512 } 515 }
@@ -534,8 +537,8 @@ rsa_pubkey_test(void)
534 goto done; 537 goto done;
535 } 538 }
536 539
537 if (BN_cmp(rsa_a->n, rsa_b->n) != 0 || 540 if (BN_cmp(RSA_get0_n(rsa_a), RSA_get0_n(rsa_b)) != 0 ||
538 BN_cmp(rsa_a->e, rsa_b->e) != 0) { 541 BN_cmp(RSA_get0_e(rsa_a), RSA_get0_e(rsa_b)) != 0) {
539 fprintf(stderr, "FAIL: RSA public keys mismatch\n"); 542 fprintf(stderr, "FAIL: RSA public keys mismatch\n");
540 goto done; 543 goto done;
541 } 544 }