diff options
| author | miod <> | 2023-01-01 17:00:08 +0000 |
|---|---|---|
| committer | miod <> | 2023-01-01 17:00:08 +0000 |
| commit | a958aba4b4c9b024de92764b955638e6ca55ca42 (patch) | |
| tree | 1aff0f558a76a1ad55c6315db02af0a7e5ed103e /src | |
| parent | e7bb0069b4ec3aa7a2fc8cb8439bb62f3b836f3b (diff) | |
| download | openbsd-a958aba4b4c9b024de92764b955638e6ca55ca42.tar.gz openbsd-a958aba4b4c9b024de92764b955638e6ca55ca42.tar.bz2 openbsd-a958aba4b4c9b024de92764b955638e6ca55ca42.zip | |
Add explicit LL suffixes to large constants to appease some compilers on
32-bit systems.
Diffstat (limited to 'src')
| -rw-r--r-- | src/regress/lib/libcrypto/ct/cttest.c | 12 |
1 files changed, 6 insertions, 6 deletions
diff --git a/src/regress/lib/libcrypto/ct/cttest.c b/src/regress/lib/libcrypto/ct/cttest.c index 803b976ef6..05ec88c091 100644 --- a/src/regress/lib/libcrypto/ct/cttest.c +++ b/src/regress/lib/libcrypto/ct/cttest.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: cttest.c,v 1.3 2022/01/06 04:42:00 jsing Exp $ */ | 1 | /* $OpenBSD: cttest.c,v 1.4 2023/01/01 17:00:08 miod Exp $ */ |
| 2 | /* | 2 | /* |
| 3 | * Copyright (c) 2021 Joel Sing <jsing@openbsd.org> | 3 | * Copyright (c) 2021 Joel Sing <jsing@openbsd.org> |
| 4 | * | 4 | * |
| @@ -119,7 +119,7 @@ const struct sct_data sct_test_data[] = { | |||
| 119 | 0xbe, 0x57, 0x7d, 0x9c, 0x60, 0x0a, 0xf8, 0xf9, | 119 | 0xbe, 0x57, 0x7d, 0x9c, 0x60, 0x0a, 0xf8, 0xf9, |
| 120 | 0x4d, 0x5d, 0x26, 0x5c, 0x25, 0x5d, 0xc7, 0x84, | 120 | 0x4d, 0x5d, 0x26, 0x5c, 0x25, 0x5d, 0xc7, 0x84, |
| 121 | }, | 121 | }, |
| 122 | .timestamp = 1637344157551, | 122 | .timestamp = 1637344157551LL, |
| 123 | .extensions_len = 0, | 123 | .extensions_len = 0, |
| 124 | .signature_nid = NID_ecdsa_with_SHA256, | 124 | .signature_nid = NID_ecdsa_with_SHA256, |
| 125 | .signature = sct_signature1, | 125 | .signature = sct_signature1, |
| @@ -133,7 +133,7 @@ const struct sct_data sct_test_data[] = { | |||
| 133 | 0x15, 0x1c, 0x11, 0xd9, 0x02, 0xc1, 0x00, 0x29, | 133 | 0x15, 0x1c, 0x11, 0xd9, 0x02, 0xc1, 0x00, 0x29, |
| 134 | 0x06, 0x8d, 0xb2, 0x08, 0x9a, 0x37, 0xd9, 0x13 | 134 | 0x06, 0x8d, 0xb2, 0x08, 0x9a, 0x37, 0xd9, 0x13 |
| 135 | }, | 135 | }, |
| 136 | .timestamp = 1637344157755, | 136 | .timestamp = 1637344157755LL, |
| 137 | .extensions_len = 0, | 137 | .extensions_len = 0, |
| 138 | .signature_nid = NID_ecdsa_with_SHA256, | 138 | .signature_nid = NID_ecdsa_with_SHA256, |
| 139 | .signature = sct_signature2, | 139 | .signature = sct_signature2, |
| @@ -358,14 +358,14 @@ ct_sct_base64_test(void) | |||
| 358 | int failed = 1; | 358 | int failed = 1; |
| 359 | 359 | ||
| 360 | if ((sct1 = SCT_new_from_base64(SCT_VERSION_V1, sct_log_id1_base64, | 360 | if ((sct1 = SCT_new_from_base64(SCT_VERSION_V1, sct_log_id1_base64, |
| 361 | CT_LOG_ENTRY_TYPE_X509, 1637344157551, "", | 361 | CT_LOG_ENTRY_TYPE_X509, 1637344157551LL, "", |
| 362 | sct_signature1_base64)) == NULL) { | 362 | sct_signature1_base64)) == NULL) { |
| 363 | fprintf(stderr, "FAIL: SCT_new_from_base64() failed\n"); | 363 | fprintf(stderr, "FAIL: SCT_new_from_base64() failed\n"); |
| 364 | ERR_print_errors_fp(stderr); | 364 | ERR_print_errors_fp(stderr); |
| 365 | goto failure; | 365 | goto failure; |
| 366 | } | 366 | } |
| 367 | if ((sct2 = SCT_new_from_base64(SCT_VERSION_V1, sct_log_id2_base64, | 367 | if ((sct2 = SCT_new_from_base64(SCT_VERSION_V1, sct_log_id2_base64, |
| 368 | CT_LOG_ENTRY_TYPE_X509, 1637344157755, "", | 368 | CT_LOG_ENTRY_TYPE_X509, 1637344157755LL, "", |
| 369 | sct_signature2_base64)) == NULL) { | 369 | sct_signature2_base64)) == NULL) { |
| 370 | fprintf(stderr, "FAIL: SCT_new_from_base64() failed\n"); | 370 | fprintf(stderr, "FAIL: SCT_new_from_base64() failed\n"); |
| 371 | ERR_print_errors_fp(stderr); | 371 | ERR_print_errors_fp(stderr); |
| @@ -416,7 +416,7 @@ ct_sct_verify_test(void) | |||
| 416 | goto failure; | 416 | goto failure; |
| 417 | 417 | ||
| 418 | CT_POLICY_EVAL_CTX_set_shared_CTLOG_STORE(ct_policy, ctlog_store); | 418 | CT_POLICY_EVAL_CTX_set_shared_CTLOG_STORE(ct_policy, ctlog_store); |
| 419 | CT_POLICY_EVAL_CTX_set_time(ct_policy, 1641393117000); | 419 | CT_POLICY_EVAL_CTX_set_time(ct_policy, 1641393117000LL); |
| 420 | 420 | ||
| 421 | if (!CT_POLICY_EVAL_CTX_set1_cert(ct_policy, cert)) | 421 | if (!CT_POLICY_EVAL_CTX_set1_cert(ct_policy, cert)) |
| 422 | goto failure; | 422 | goto failure; |
