summaryrefslogtreecommitdiffstats
path: root/crypto/openssh/openbsd-compat/openssl-compat.c
diff options
context:
space:
mode:
authordes <des@FreeBSD.org>2011-05-04 07:34:44 +0000
committerdes <des@FreeBSD.org>2011-05-04 07:34:44 +0000
commitee2afa8165baec284a83500803978f8a0e645ccd (patch)
treea745d3c673d44775cc175961e80d2246eb00e0df /crypto/openssh/openbsd-compat/openssl-compat.c
parentd035dd6f462a261f9b99bfa8545a924b314e1bb5 (diff)
parent1824cfda46b3f11c1c3c4071e80b73ca91553149 (diff)
downloadFreeBSD-src-ee2afa8165baec284a83500803978f8a0e645ccd.zip
FreeBSD-src-ee2afa8165baec284a83500803978f8a0e645ccd.tar.gz
Upgrade to OpenSSH 5.8p2.
Diffstat (limited to 'crypto/openssh/openbsd-compat/openssl-compat.c')
-rw-r--r--crypto/openssh/openbsd-compat/openssl-compat.c76
1 files changed, 75 insertions, 1 deletions
diff --git a/crypto/openssh/openbsd-compat/openssl-compat.c b/crypto/openssh/openbsd-compat/openssl-compat.c
index 420496c..b617fdf 100644
--- a/crypto/openssh/openbsd-compat/openssl-compat.c
+++ b/crypto/openssh/openbsd-compat/openssl-compat.c
@@ -1,4 +1,4 @@
-/* $Id: openssl-compat.c,v 1.9 2010/01/28 23:54:11 dtucker Exp $ */
+/* $Id: openssl-compat.c,v 1.13 2011/01/21 22:37:06 dtucker Exp $ */
/*
* Copyright (c) 2005 Darren Tucker <dtucker@zip.com.au>
@@ -18,10 +18,20 @@
#include "includes.h"
+#include <stdarg.h>
+#include <string.h>
+
#ifdef USE_OPENSSL_ENGINE
# include <openssl/engine.h>
+# include <openssl/conf.h>
+#endif
+
+#ifndef HAVE_RSA_GET_DEFAULT_METHOD
+# include <openssl/rsa.h>
#endif
+#include "log.h"
+
#define SSH_DONT_OVERLOAD_OPENSSL_FUNCS
#include "openssl-compat.h"
@@ -58,6 +68,70 @@ ssh_EVP_DigestUpdate(EVP_MD_CTX *ctx, const void *d, unsigned int cnt)
}
#endif
+#ifndef HAVE_BN_IS_PRIME_EX
+int
+BN_is_prime_ex(const BIGNUM *p, int nchecks, BN_CTX *ctx, void *cb)
+{
+ if (cb != NULL)
+ fatal("%s: callback args not supported", __func__);
+ return BN_is_prime(p, nchecks, NULL, ctx, NULL);
+}
+#endif
+
+#ifndef HAVE_RSA_GENERATE_KEY_EX
+int
+RSA_generate_key_ex(RSA *rsa, int bits, BIGNUM *bn_e, void *cb)
+{
+ RSA *new_rsa, tmp_rsa;
+ unsigned long e;
+
+ if (cb != NULL)
+ fatal("%s: callback args not supported", __func__);
+ e = BN_get_word(bn_e);
+ if (e == 0xffffffffL)
+ fatal("%s: value of e too large", __func__);
+ new_rsa = RSA_generate_key(bits, e, NULL, NULL);
+ if (new_rsa == NULL)
+ return 0;
+ /* swap rsa/new_rsa then free new_rsa */
+ tmp_rsa = *rsa;
+ *rsa = *new_rsa;
+ *new_rsa = tmp_rsa;
+ RSA_free(new_rsa);
+ return 1;
+}
+#endif
+
+#ifndef HAVE_DSA_GENERATE_PARAMETERS_EX
+int
+DSA_generate_parameters_ex(DSA *dsa, int bits, const unsigned char *seed,
+ int seed_len, int *counter_ret, unsigned long *h_ret, void *cb)
+{
+ DSA *new_dsa, tmp_dsa;
+
+ if (cb != NULL)
+ fatal("%s: callback args not supported", __func__);
+ new_dsa = DSA_generate_parameters(bits, (unsigned char *)seed, seed_len,
+ counter_ret, h_ret, NULL, NULL);
+ if (new_dsa == NULL)
+ return 0;
+ /* swap dsa/new_dsa then free new_dsa */
+ tmp_dsa = *dsa;
+ *dsa = *new_dsa;
+ *new_dsa = tmp_dsa;
+ DSA_free(new_dsa);
+ return 1;
+}
+#endif
+
+#ifndef HAVE_RSA_GET_DEFAULT_METHOD
+RSA_METHOD *
+RSA_get_default_method(void)
+{
+ return RSA_PKCS1_SSLeay();
+}
+#endif
+
#ifdef USE_OPENSSL_ENGINE
void
ssh_SSLeay_add_all_algorithms(void)
OpenPOWER on IntegriCloud