aboutsummaryrefslogtreecommitdiff
path: root/pkgs/tools/security/tpm-luks/openssl-1.1.patch
blob: 10132242b3457cb513c05493562849b11fd49170 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
diff --git a/swtpm-utils/lib/hmac.c b/swtpm-utils/lib/hmac.c
index 5545375..f9bedea 100644
--- a/swtpm-utils/lib/hmac.c
+++ b/swtpm-utils/lib/hmac.c
@@ -381,15 +381,19 @@ uint32_t TSS_authhmac(unsigned char *digest, unsigned char *key, unsigned int ke
 /****************************************************************************/
 uint32_t TSS_rawhmac(unsigned char *digest, const unsigned char *key, unsigned int keylen, ...)
    {
-   HMAC_CTX hmac;
+   HMAC_CTX* hmac;
    unsigned int dlen;
    unsigned char *data;
    va_list argp;
-   
-#ifdef HAVE_HMAC_CTX_CLEANUP
-   HMAC_CTX_init(&hmac);
-#endif
-   HMAC_Init(&hmac,key,keylen,EVP_sha1());
+
+   hmac = HMAC_CTX_new();
+
+   if (hmac == NULL)
+     {
+     return ERR_MEM_ERR;
+     }
+
+   HMAC_Init_ex(hmac,key,keylen,EVP_sha1(),NULL);
 
    va_start(argp,keylen);
    for (;;)
@@ -398,15 +402,11 @@ uint32_t TSS_rawhmac(unsigned char *digest, const unsigned char *key, unsigned i
       if (dlen == 0) break;
       data = (unsigned char *)va_arg(argp,unsigned char *);
       if (data == NULL) return ERR_NULL_ARG;
-      HMAC_Update(&hmac,data,dlen);
+      HMAC_Update(hmac,data,dlen);
       }
-   HMAC_Final(&hmac,digest,&dlen);
+   HMAC_Final(hmac,digest,&dlen);
 
-#ifdef HAVE_HMAC_CTX_CLEANUP
-   HMAC_CTX_cleanup(&hmac);
-#else
-   HMAC_cleanup(&hmac);
-#endif
+   HMAC_CTX_free(hmac);
    va_end(argp);
    return 0;
    }
diff --git a/swtpm-utils/lib/keys.c b/swtpm-utils/lib/keys.c
index 99691b6..6627a1f 100644
--- a/swtpm-utils/lib/keys.c
+++ b/swtpm-utils/lib/keys.c
@@ -1249,8 +1249,7 @@ RSA *TSS_convpubkey(pubkeydata *k)
                 exp);
    }
    /* set up the RSA public key structure */
-   rsa->n = mod;
-   rsa->e = exp;
+   RSA_set0_key(rsa, mod, exp, NULL);
    return rsa;
    }