]> git.pld-linux.org Git - packages/kannel.git/blame - kannel-openssl-1.1.0.patch
- adapterized
[packages/kannel.git] / kannel-openssl-1.1.0.patch
CommitLineData
6a1435a6
AG
1--- gateway-1.4.5.orig/wap/wtls_statesupport.c 2018-01-17 10:24:38.000000000 +0100
2+++ gateway-1.4.5/wap/wtls_statesupport.c 2018-09-28 12:41:57.816649426 +0200
3@@ -839,8 +839,8 @@
4 {
5 Octstr *result;
6 unsigned char *output, iv[20], c[2];
7- des_key_schedule des_ks;
8- des_cblock des_key, des_iv;
9+ DES_key_schedule des_ks;
10+ DES_cblock des_key, des_iv;
11 int i, len = octstr_len(data);
12
13 if (!data)
14@@ -874,14 +874,14 @@
15 octstr_get_cstr(wtls_machine->client_write_enc_key),
16 sizeof(des_key));
17 }
18- des_set_odd_parity(&des_key);
19- if (des_set_key_checked(&des_key, des_ks)) {
20+ DES_set_odd_parity(&des_key);
21+ if (DES_set_key_checked(&des_key, &des_ks)) {
22 error(0, "wtls_des ~> Unable to set key schedule");
23 return (NULL);
24 }
25 output = (unsigned char *)gw_malloc((len + 1) * sizeof(unsigned char));
26- des_ncbc_encrypt((unsigned char *)octstr_get_cstr(data), output, len,
27- des_ks, &des_iv, crypt);
28+ DES_ncbc_encrypt((unsigned char *)octstr_get_cstr(data), output, len,
29+ &des_ks, &des_iv, crypt);
30 result = octstr_create_from_data((char *)output, len);
31 gw_free(output);
32
33@@ -891,13 +891,13 @@
34 Octstr *wtls_rc5(Octstr * data, WTLSMachine * wtls_machine, int crypt)
35 {
36 Octstr *result;
37- EVP_CIPHER_CTX ectx;
38+ EVP_CIPHER_CTX *ectx;
39 unsigned char ebuf[20], *output, *input, iv[20], c[2];
40 int i = 0, len = octstr_len(data);
41
42 if (!data)
43 return (NULL);
44- EVP_CipherInit(&ectx, ALG, NULL, NULL, crypt);
45+ EVP_CipherInit(ectx, ALG, NULL, NULL, crypt);
46 switch (wtls_machine->bulk_cipher_algorithm) {
47 case RC5_CBC_40:
48 case RC5_CBC_56:
49@@ -908,7 +908,7 @@
50 i = 16;
51 break;
52 }
53- EVP_CIPHER_CTX_ctrl(&ectx, EVP_CTRL_SET_RC5_ROUNDS, i, NULL);
54+ EVP_CIPHER_CTX_ctrl(ectx, EVP_CTRL_SET_RC5_ROUNDS, i, NULL);
55 if (crypt == RC5_ENCRYPT) {
56 memcpy(iv, octstr_get_cstr(wtls_machine->server_write_IV),
57 octstr_len(wtls_machine->server_write_IV));
58@@ -917,7 +917,7 @@
59 for (i = 0; i < bulk_table[wtls_machine->bulk_cipher_algorithm].
60 iv_size; i++)
61 iv[i] = iv[i] ^ c[i % 2];
62- EVP_CipherInit(&ectx, NULL, (unsigned char *)octstr_get_cstr(
63+ EVP_CipherInit(ectx, NULL, (unsigned char *)octstr_get_cstr(
64 wtls_machine->server_write_enc_key), iv, RC5_ENCRYPT);
65 } else {
66 memcpy(iv, octstr_get_cstr(wtls_machine->client_write_IV),
67@@ -927,7 +927,7 @@
68 for (i = 0; i < bulk_table[wtls_machine->bulk_cipher_algorithm].
69 iv_size; i++)
70 iv[i] = iv[i] ^ c[i % 2];
71- EVP_CipherInit(&ectx, NULL, (unsigned char *)octstr_get_cstr(
72+ EVP_CipherInit(ectx, NULL, (unsigned char *)octstr_get_cstr(
73 wtls_machine->client_write_enc_key), iv, RC5_DECRYPT);
74 }
75
76@@ -936,13 +936,13 @@
77 i = 0;
78
79 for (i = 0; i <= len - 8; i += 8) {
80- EVP_Cipher(&ectx, ebuf, input + i, 8);
81+ EVP_Cipher(ectx, ebuf, input + i, 8);
82 memmove(output + i, ebuf, 8);
83 }
84
85 // Leftovers...
86 if (i < len) {
87- EVP_Cipher(&ectx, ebuf, input + i, len - i);
88+ EVP_Cipher(ectx, ebuf, input + i, len - i);
89 memmove(output + i, ebuf, len - i);
90 }
91
92@@ -1052,7 +1052,7 @@
93 {
94 RSA *rsaStructure = NULL;
95 EVP_PKEY *publicKey = NULL;
96- BIGNUM *modulus = 0, *exponent = NULL;
97+ const BIGNUM *modulus = 0, *exponent = NULL;
98 unsigned char *tempModulusStorage = 0, *tempExponentStorage = NULL;
99 int numbytes = 0;
100 RSAPublicKey *returnStructure = NULL;
101@@ -1060,17 +1060,17 @@
102
103 /* First, we need to extract the RSA structure from the X509 Cert */
104 /* Get the EVP_PKEY structure from the X509 cert */
105- publicKey = X509_PUBKEY_get(x509_cert->cert_info->key);
106+ publicKey = X509_PUBKEY_get( X509_get_X509_PUBKEY(x509_cert) );
107
108 /* Take said EVP_PKEY structure and get the RSA component */
109- if (EVP_PKEY_type(publicKey->type) != EVP_PKEY_RSA) {
110+ if ( EVP_PKEY_base_id(publicKey) != EVP_PKEY_RSA) {
111 return NULL;
112 } else {
113- rsaStructure = publicKey->pkey.rsa;
114+ rsaStructure = EVP_PKEY_get0_RSA(publicKey);
115 }
116
117- /* Then we need to grab the exponent component from the cert */
118- exponent = rsaStructure->e;
119+ /* Then we need to grab the exponent and modulus component from the cert */
120+ RSA_get0_key( rsaStructure, &modulus, &exponent, NULL);
121
122 /* We need to allocate sufficient memory to hold the exponent */
123 numbytes = BN_num_bytes(exponent);
124@@ -1083,9 +1083,6 @@
125 Exponent = octstr_create_from_data((char *)tempExponentStorage,
126 numbytes);
127
128- /* Then we need to grab the modulus component from the cert */
129- modulus = rsaStructure->n;
130-
131 /* We need to allocate sufficient memory to hold the modulus */
132 numbytes = BN_num_bytes(modulus);
133 tempModulusStorage = gw_malloc(numbytes);
This page took 0.043283 seconds and 4 git commands to generate.