[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[PATCH 04/11] pki_crypto: annotate BoringSSL incompatibilities
[Thread Prev] | [Thread Next]
- Subject: [PATCH 04/11] pki_crypto: annotate BoringSSL incompatibilities
- From: Jon Simons <jon@xxxxxxxxxxxxx>
- Reply-to: libssh@xxxxxxxxxx
- Date: Sat, 9 Sep 2017 20:12:47 -0700
- To: libssh@xxxxxxxxxx
- Cc: Jon Simons <jon@xxxxxxxxxxxxx>
Comments-only change: mark a TODO in each of the spots that do not build with BoringSSL. Signed-off-by: Jon Simons <jon@xxxxxxxxxxxxx> --- src/pki_crypto.c | 18 +++++++++--------- 1 file changed, 9 insertions(+), 9 deletions(-) diff --git a/src/pki_crypto.c b/src/pki_crypto.c index f5e8fb09..e061696d 100644 --- a/src/pki_crypto.c +++ b/src/pki_crypto.c @@ -261,7 +261,7 @@ ssh_key pki_key_dup(const ssh_key key, int demote) goto fail; } - rc = DSA_set0_pqg(new->dsa, np, nq, ng); + rc = DSA_set0_pqg(new->dsa, np, nq, ng); /* TODO: not in BoringSSL */ if (rc == 0) { BN_free(np); BN_free(nq); @@ -275,7 +275,7 @@ ssh_key pki_key_dup(const ssh_key key, int demote) goto fail; } - rc = DSA_set0_key(new->dsa, npub_key, NULL); + rc = DSA_set0_key(new->dsa, npub_key, NULL); /* TODO: not in BoringSSL */ if (rc == 0) { goto fail; } @@ -322,7 +322,7 @@ ssh_key pki_key_dup(const ssh_key key, int demote) goto fail; } - rc = RSA_set0_key(new->rsa, nn, ne, NULL); + rc = RSA_set0_key(new->rsa, nn, ne, NULL); /* TODO: not in BoringSSL */ if (rc == 0) { BN_free(nn); BN_free(ne); @@ -357,7 +357,7 @@ ssh_key pki_key_dup(const ssh_key key, int demote) goto fail; } - rc = RSA_set0_factors(new->rsa, np, nq); + rc = RSA_set0_factors(new->rsa, np, nq); /* TODO: not in BoringSSL */ if (rc == 0) { BN_free(np); BN_free(nq); @@ -377,7 +377,7 @@ ssh_key pki_key_dup(const ssh_key key, int demote) goto fail; } - rc = RSA_set0_crt_params(new->rsa, ndmp1, ndmq1, niqmp); + rc = RSA_set0_crt_params(new->rsa, ndmp1, ndmq1, niqmp); /* TODO: not in BoringSSL */ if (rc == 0) { BN_free(ndmp1); BN_free(ndmq1); @@ -1250,7 +1250,7 @@ static ssh_string pki_dsa_signature_to_blob(const ssh_signature sig) ssh_string s; int s_len, s_offset_in, s_offset_out; - DSA_SIG_get0(sig->dsa_sig, &pr, &ps); + DSA_SIG_get0(sig->dsa_sig, &pr, &ps); /* TODO: not in BoringSSL */ r = ssh_make_bignum_string((BIGNUM *)pr); if (r == NULL) { return NULL; @@ -1316,7 +1316,7 @@ ssh_string pki_signature_to_blob(const ssh_signature sig) return NULL; } - ECDSA_SIG_get0(sig->ecdsa_sig, &pr, &ps); + ECDSA_SIG_get0(sig->ecdsa_sig, &pr, &ps); /* TODO: not in BoringSSL */ r = ssh_make_bignum_string((BIGNUM *)pr); if (r == NULL) { ssh_buffer_free(b); @@ -1500,7 +1500,7 @@ ssh_signature pki_signature_from_blob(const ssh_key pubkey, return NULL; } - rc = DSA_SIG_set0(sig->dsa_sig, pr, ps); + rc = DSA_SIG_set0(sig->dsa_sig, pr, ps); /* TODO: not in BoringSSL */ if (rc == 0) { ssh_signature_free(sig); return NULL; @@ -1578,7 +1578,7 @@ ssh_signature pki_signature_from_blob(const ssh_key pubkey, return NULL; } - rc = ECDSA_SIG_set0(sig->ecdsa_sig, pr, ps); + rc = ECDSA_SIG_set0(sig->ecdsa_sig, pr, ps); /* TODO: not in BoringSSL */ if (rc == 0) { ssh_signature_free(sig); return NULL; -- 2.14.1
[PATCH 00/11] libssh: enable building with BoringSSL | Jon Simons <jon@xxxxxxxxxxxxx> |