diff options
author | miod <> | 2023-01-01 17:00:08 +0000 |
---|---|---|
committer | miod <> | 2023-01-01 17:00:08 +0000 |
commit | 50c276a79fcd9b60f20eb134cde089c62e1c49a0 (patch) | |
tree | 1aff0f558a76a1ad55c6315db02af0a7e5ed103e /src | |
parent | f26dc18c66c6b61c0b6c189a10eed452b42b84cb (diff) | |
download | openbsd-50c276a79fcd9b60f20eb134cde089c62e1c49a0.tar.gz openbsd-50c276a79fcd9b60f20eb134cde089c62e1c49a0.tar.bz2 openbsd-50c276a79fcd9b60f20eb134cde089c62e1c49a0.zip |
Add explicit LL suffixes to large constants to appease some compilers on
32-bit systems.
Diffstat (limited to 'src')
-rw-r--r-- | src/regress/lib/libcrypto/ct/cttest.c | 12 |
1 files changed, 6 insertions, 6 deletions
diff --git a/src/regress/lib/libcrypto/ct/cttest.c b/src/regress/lib/libcrypto/ct/cttest.c index 803b976ef6..05ec88c091 100644 --- a/src/regress/lib/libcrypto/ct/cttest.c +++ b/src/regress/lib/libcrypto/ct/cttest.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: cttest.c,v 1.3 2022/01/06 04:42:00 jsing Exp $ */ | 1 | /* $OpenBSD: cttest.c,v 1.4 2023/01/01 17:00:08 miod Exp $ */ |
2 | /* | 2 | /* |
3 | * Copyright (c) 2021 Joel Sing <jsing@openbsd.org> | 3 | * Copyright (c) 2021 Joel Sing <jsing@openbsd.org> |
4 | * | 4 | * |
@@ -119,7 +119,7 @@ const struct sct_data sct_test_data[] = { | |||
119 | 0xbe, 0x57, 0x7d, 0x9c, 0x60, 0x0a, 0xf8, 0xf9, | 119 | 0xbe, 0x57, 0x7d, 0x9c, 0x60, 0x0a, 0xf8, 0xf9, |
120 | 0x4d, 0x5d, 0x26, 0x5c, 0x25, 0x5d, 0xc7, 0x84, | 120 | 0x4d, 0x5d, 0x26, 0x5c, 0x25, 0x5d, 0xc7, 0x84, |
121 | }, | 121 | }, |
122 | .timestamp = 1637344157551, | 122 | .timestamp = 1637344157551LL, |
123 | .extensions_len = 0, | 123 | .extensions_len = 0, |
124 | .signature_nid = NID_ecdsa_with_SHA256, | 124 | .signature_nid = NID_ecdsa_with_SHA256, |
125 | .signature = sct_signature1, | 125 | .signature = sct_signature1, |
@@ -133,7 +133,7 @@ const struct sct_data sct_test_data[] = { | |||
133 | 0x15, 0x1c, 0x11, 0xd9, 0x02, 0xc1, 0x00, 0x29, | 133 | 0x15, 0x1c, 0x11, 0xd9, 0x02, 0xc1, 0x00, 0x29, |
134 | 0x06, 0x8d, 0xb2, 0x08, 0x9a, 0x37, 0xd9, 0x13 | 134 | 0x06, 0x8d, 0xb2, 0x08, 0x9a, 0x37, 0xd9, 0x13 |
135 | }, | 135 | }, |
136 | .timestamp = 1637344157755, | 136 | .timestamp = 1637344157755LL, |
137 | .extensions_len = 0, | 137 | .extensions_len = 0, |
138 | .signature_nid = NID_ecdsa_with_SHA256, | 138 | .signature_nid = NID_ecdsa_with_SHA256, |
139 | .signature = sct_signature2, | 139 | .signature = sct_signature2, |
@@ -358,14 +358,14 @@ ct_sct_base64_test(void) | |||
358 | int failed = 1; | 358 | int failed = 1; |
359 | 359 | ||
360 | if ((sct1 = SCT_new_from_base64(SCT_VERSION_V1, sct_log_id1_base64, | 360 | if ((sct1 = SCT_new_from_base64(SCT_VERSION_V1, sct_log_id1_base64, |
361 | CT_LOG_ENTRY_TYPE_X509, 1637344157551, "", | 361 | CT_LOG_ENTRY_TYPE_X509, 1637344157551LL, "", |
362 | sct_signature1_base64)) == NULL) { | 362 | sct_signature1_base64)) == NULL) { |
363 | fprintf(stderr, "FAIL: SCT_new_from_base64() failed\n"); | 363 | fprintf(stderr, "FAIL: SCT_new_from_base64() failed\n"); |
364 | ERR_print_errors_fp(stderr); | 364 | ERR_print_errors_fp(stderr); |
365 | goto failure; | 365 | goto failure; |
366 | } | 366 | } |
367 | if ((sct2 = SCT_new_from_base64(SCT_VERSION_V1, sct_log_id2_base64, | 367 | if ((sct2 = SCT_new_from_base64(SCT_VERSION_V1, sct_log_id2_base64, |
368 | CT_LOG_ENTRY_TYPE_X509, 1637344157755, "", | 368 | CT_LOG_ENTRY_TYPE_X509, 1637344157755LL, "", |
369 | sct_signature2_base64)) == NULL) { | 369 | sct_signature2_base64)) == NULL) { |
370 | fprintf(stderr, "FAIL: SCT_new_from_base64() failed\n"); | 370 | fprintf(stderr, "FAIL: SCT_new_from_base64() failed\n"); |
371 | ERR_print_errors_fp(stderr); | 371 | ERR_print_errors_fp(stderr); |
@@ -416,7 +416,7 @@ ct_sct_verify_test(void) | |||
416 | goto failure; | 416 | goto failure; |
417 | 417 | ||
418 | CT_POLICY_EVAL_CTX_set_shared_CTLOG_STORE(ct_policy, ctlog_store); | 418 | CT_POLICY_EVAL_CTX_set_shared_CTLOG_STORE(ct_policy, ctlog_store); |
419 | CT_POLICY_EVAL_CTX_set_time(ct_policy, 1641393117000); | 419 | CT_POLICY_EVAL_CTX_set_time(ct_policy, 1641393117000LL); |
420 | 420 | ||
421 | if (!CT_POLICY_EVAL_CTX_set1_cert(ct_policy, cert)) | 421 | if (!CT_POLICY_EVAL_CTX_set1_cert(ct_policy, cert)) |
422 | goto failure; | 422 | goto failure; |