diff options
author | tb <> | 2021-10-31 08:27:15 +0000 |
---|---|---|
committer | tb <> | 2021-10-31 08:27:15 +0000 |
commit | 546fac75c026d32fb7fb87202c1b378520ab4c3e (patch) | |
tree | ad1afad8b03b47bd677634cf695b1c5669120bf3 /src | |
parent | bd06f1e8ae5fff9f6ae109217894e7f61176e903 (diff) | |
download | openbsd-546fac75c026d32fb7fb87202c1b378520ab4c3e.tar.gz openbsd-546fac75c026d32fb7fb87202c1b378520ab4c3e.tar.bz2 openbsd-546fac75c026d32fb7fb87202c1b378520ab4c3e.zip |
Prepare regress for opaque structs in x509*.h
Diffstat (limited to 'src')
-rw-r--r-- | src/regress/lib/libcrypto/x509/callback.c | 17 | ||||
-rw-r--r-- | src/regress/lib/libcrypto/x509/verify.c | 17 | ||||
-rw-r--r-- | src/regress/lib/libcrypto/x509/x509attribute.c | 4 | ||||
-rw-r--r-- | src/regress/lib/libcrypto/x509/x509name.c | 5 |
4 files changed, 18 insertions, 25 deletions
diff --git a/src/regress/lib/libcrypto/x509/callback.c b/src/regress/lib/libcrypto/x509/callback.c index e31d1b826b..b2531fe819 100644 --- a/src/regress/lib/libcrypto/x509/callback.c +++ b/src/regress/lib/libcrypto/x509/callback.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: callback.c,v 1.2 2021/09/30 18:28:38 jsing Exp $ */ | 1 | /* $OpenBSD: callback.c,v 1.3 2021/10/31 08:27:15 tb Exp $ */ |
2 | /* | 2 | /* |
3 | * Copyright (c) 2020 Joel Sing <jsing@openbsd.org> | 3 | * Copyright (c) 2020 Joel Sing <jsing@openbsd.org> |
4 | * Copyright (c) 2020-2021 Bob Beck <beck@openbsd.org> | 4 | * Copyright (c) 2020-2021 Bob Beck <beck@openbsd.org> |
@@ -115,7 +115,6 @@ verify_cert(const char *roots_dir, const char *roots_file, | |||
115 | X509_STORE_CTX *xsc = NULL; | 115 | X509_STORE_CTX *xsc = NULL; |
116 | X509_STORE *store = NULL; | 116 | X509_STORE *store = NULL; |
117 | int verify_err, use_dir; | 117 | int verify_err, use_dir; |
118 | unsigned long flags; | ||
119 | X509 *leaf = NULL; | 118 | X509 *leaf = NULL; |
120 | 119 | ||
121 | *chains = 0; | 120 | *chains = 0; |
@@ -141,15 +140,11 @@ verify_cert(const char *roots_dir, const char *roots_file, | |||
141 | if (!X509_STORE_load_locations(store, NULL, roots_dir)) | 140 | if (!X509_STORE_load_locations(store, NULL, roots_dir)) |
142 | errx(1, "failed to set by_dir directory of %s", roots_dir); | 141 | errx(1, "failed to set by_dir directory of %s", roots_dir); |
143 | } | 142 | } |
144 | if (mode == MODE_LEGACY_VFY) { | 143 | if (mode == MODE_LEGACY_VFY) |
145 | flags = X509_VERIFY_PARAM_get_flags(xsc->param); | 144 | X509_STORE_CTX_set_flags(xsc, X509_V_FLAG_LEGACY_VERIFY); |
146 | flags |= X509_V_FLAG_LEGACY_VERIFY; | 145 | else |
147 | X509_VERIFY_PARAM_set_flags(xsc->param, flags); | 146 | X509_VERIFY_PARAM_clear_flags(X509_STORE_CTX_get0_param(xsc), |
148 | } else { | 147 | X509_V_FLAG_LEGACY_VERIFY); |
149 | flags = X509_VERIFY_PARAM_get_flags(xsc->param); | ||
150 | flags &= ~X509_V_FLAG_LEGACY_VERIFY; | ||
151 | X509_VERIFY_PARAM_set_flags(xsc->param, flags); | ||
152 | } | ||
153 | 148 | ||
154 | if (verbose) | 149 | if (verbose) |
155 | X509_STORE_CTX_set_verify_cb(xsc, verify_cert_cb); | 150 | X509_STORE_CTX_set_verify_cb(xsc, verify_cert_cb); |
diff --git a/src/regress/lib/libcrypto/x509/verify.c b/src/regress/lib/libcrypto/x509/verify.c index 3a3c9b0197..3b85280359 100644 --- a/src/regress/lib/libcrypto/x509/verify.c +++ b/src/regress/lib/libcrypto/x509/verify.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: verify.c,v 1.8 2021/09/30 18:28:38 jsing Exp $ */ | 1 | /* $OpenBSD: verify.c,v 1.9 2021/10/31 08:27:15 tb Exp $ */ |
2 | /* | 2 | /* |
3 | * Copyright (c) 2020 Joel Sing <jsing@openbsd.org> | 3 | * Copyright (c) 2020 Joel Sing <jsing@openbsd.org> |
4 | * Copyright (c) 2020-2021 Bob Beck <beck@openbsd.org> | 4 | * Copyright (c) 2020-2021 Bob Beck <beck@openbsd.org> |
@@ -108,7 +108,6 @@ verify_cert(const char *roots_dir, const char *roots_file, | |||
108 | X509_STORE_CTX *xsc = NULL; | 108 | X509_STORE_CTX *xsc = NULL; |
109 | X509_STORE *store = NULL; | 109 | X509_STORE *store = NULL; |
110 | int verify_err, use_dir; | 110 | int verify_err, use_dir; |
111 | unsigned long flags; | ||
112 | X509 *leaf = NULL; | 111 | X509 *leaf = NULL; |
113 | 112 | ||
114 | *chains = 0; | 113 | *chains = 0; |
@@ -134,15 +133,11 @@ verify_cert(const char *roots_dir, const char *roots_file, | |||
134 | if (!X509_STORE_load_locations(store, NULL, roots_dir)) | 133 | if (!X509_STORE_load_locations(store, NULL, roots_dir)) |
135 | errx(1, "failed to set by_dir directory of %s", roots_dir); | 134 | errx(1, "failed to set by_dir directory of %s", roots_dir); |
136 | } | 135 | } |
137 | if (mode == MODE_LEGACY_VFY) { | 136 | if (mode == MODE_LEGACY_VFY) |
138 | flags = X509_VERIFY_PARAM_get_flags(xsc->param); | 137 | X509_STORE_CTX_set_flags(xsc, X509_V_FLAG_LEGACY_VERIFY); |
139 | flags |= X509_V_FLAG_LEGACY_VERIFY; | 138 | else |
140 | X509_VERIFY_PARAM_set_flags(xsc->param, flags); | 139 | X509_VERIFY_PARAM_clear_flags(X509_STORE_CTX_get0_param(xsc), |
141 | } else { | 140 | X509_V_FLAG_LEGACY_VERIFY); |
142 | flags = X509_VERIFY_PARAM_get_flags(xsc->param); | ||
143 | flags &= ~X509_V_FLAG_LEGACY_VERIFY; | ||
144 | X509_VERIFY_PARAM_set_flags(xsc->param, flags); | ||
145 | } | ||
146 | 141 | ||
147 | if (verbose) | 142 | if (verbose) |
148 | X509_STORE_CTX_set_verify_cb(xsc, verify_cert_cb); | 143 | X509_STORE_CTX_set_verify_cb(xsc, verify_cert_cb); |
diff --git a/src/regress/lib/libcrypto/x509/x509attribute.c b/src/regress/lib/libcrypto/x509/x509attribute.c index 3dd6d2912c..4f98114458 100644 --- a/src/regress/lib/libcrypto/x509/x509attribute.c +++ b/src/regress/lib/libcrypto/x509/x509attribute.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x509attribute.c,v 1.1 2020/06/04 21:21:03 schwarze Exp $ */ | 1 | /* $OpenBSD: x509attribute.c,v 1.2 2021/10/31 08:27:15 tb Exp $ */ |
2 | /* | 2 | /* |
3 | * Copyright (c) 2020 Ingo Schwarze <schwarze@openbsd.org> | 3 | * Copyright (c) 2020 Ingo Schwarze <schwarze@openbsd.org> |
4 | * | 4 | * |
@@ -15,6 +15,8 @@ | |||
15 | * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | 15 | * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
16 | */ | 16 | */ |
17 | 17 | ||
18 | #define LIBRESSL_CRYPTO_INTERNAL | ||
19 | |||
18 | #include <errno.h> | 20 | #include <errno.h> |
19 | #include <stdio.h> | 21 | #include <stdio.h> |
20 | #include <string.h> | 22 | #include <string.h> |
diff --git a/src/regress/lib/libcrypto/x509/x509name.c b/src/regress/lib/libcrypto/x509/x509name.c index c9c96d4ec8..9deeeb2986 100644 --- a/src/regress/lib/libcrypto/x509/x509name.c +++ b/src/regress/lib/libcrypto/x509/x509name.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x509name.c,v 1.2 2018/11/10 01:43:03 tb Exp $ */ | 1 | /* $OpenBSD: x509name.c,v 1.3 2021/10/31 08:27:15 tb Exp $ */ |
2 | /* | 2 | /* |
3 | * Copyright (c) 2018 Ingo Schwarze <schwarze@openbsd.org> | 3 | * Copyright (c) 2018 Ingo Schwarze <schwarze@openbsd.org> |
4 | * | 4 | * |
@@ -28,7 +28,8 @@ debug_print(X509_NAME *name) | |||
28 | int loc; | 28 | int loc; |
29 | 29 | ||
30 | for (loc = 0; loc < X509_NAME_entry_count(name); loc++) | 30 | for (loc = 0; loc < X509_NAME_entry_count(name); loc++) |
31 | printf("%d:", X509_NAME_get_entry(name, loc)->set); | 31 | printf("%d:", |
32 | X509_NAME_ENTRY_set(X509_NAME_get_entry(name, loc))); | ||
32 | putchar(' '); | 33 | putchar(' '); |
33 | X509_NAME_print_ex_fp(stdout, name, 0, XN_FLAG_SEP_CPLUS_SPC); | 34 | X509_NAME_print_ex_fp(stdout, name, 0, XN_FLAG_SEP_CPLUS_SPC); |
34 | putchar('\n'); | 35 | putchar('\n'); |