mirror of
https://github.com/pi-hole/dnsmasq.git
synced 2025-12-19 18:28:25 +00:00
Fix FTBFS with Nettle-3.0.
This commit is contained in:
@@ -11,6 +11,9 @@ version 2.72
|
|||||||
Add DBus methods SetFilterWin2KOption and SetBogusPrivOption
|
Add DBus methods SetFilterWin2KOption and SetBogusPrivOption
|
||||||
Thanks to the Smoothwall project for the patch.
|
Thanks to the Smoothwall project for the patch.
|
||||||
|
|
||||||
|
Fix failure to build against Nettle-3.0. Thanks to Steven
|
||||||
|
Barth for spotting this and finding the fix.
|
||||||
|
|
||||||
|
|
||||||
version 2.71
|
version 2.71
|
||||||
Subtle change to error handling to help DNSSEC validation
|
Subtle change to error handling to help DNSSEC validation
|
||||||
|
|||||||
18
src/dnssec.c
18
src/dnssec.c
@@ -28,6 +28,12 @@
|
|||||||
#include <nettle/nettle-meta.h>
|
#include <nettle/nettle-meta.h>
|
||||||
#include <nettle/bignum.h>
|
#include <nettle/bignum.h>
|
||||||
|
|
||||||
|
/* Nettle-3.0 moved to a new API for DSA. We use a name that's defined in the new API
|
||||||
|
to detect Nettle-3, and invoke the backwards compatibility mode. */
|
||||||
|
#ifdef dsa_params_init
|
||||||
|
#include <nettle/dsa-compat.h>
|
||||||
|
#endif
|
||||||
|
|
||||||
|
|
||||||
#define SERIAL_UNDEF -100
|
#define SERIAL_UNDEF -100
|
||||||
#define SERIAL_EQ 0
|
#define SERIAL_EQ 0
|
||||||
@@ -121,8 +127,8 @@ static int hash_init(const struct nettle_hash *hash, void **ctxp, unsigned char
|
|||||||
return 1;
|
return 1;
|
||||||
}
|
}
|
||||||
|
|
||||||
static int rsa_verify(struct blockdata *key_data, unsigned int key_len, unsigned char *sig, size_t sig_len,
|
static int dnsmasq_rsa_verify(struct blockdata *key_data, unsigned int key_len, unsigned char *sig, size_t sig_len,
|
||||||
unsigned char *digest, int algo)
|
unsigned char *digest, int algo)
|
||||||
{
|
{
|
||||||
unsigned char *p;
|
unsigned char *p;
|
||||||
size_t exp_len;
|
size_t exp_len;
|
||||||
@@ -173,8 +179,8 @@ static int rsa_verify(struct blockdata *key_data, unsigned int key_len, unsigned
|
|||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
static int dsa_verify(struct blockdata *key_data, unsigned int key_len, unsigned char *sig, size_t sig_len,
|
static int dnsmasq_dsa_verify(struct blockdata *key_data, unsigned int key_len, unsigned char *sig, size_t sig_len,
|
||||||
unsigned char *digest, int algo)
|
unsigned char *digest, int algo)
|
||||||
{
|
{
|
||||||
unsigned char *p;
|
unsigned char *p;
|
||||||
unsigned int t;
|
unsigned int t;
|
||||||
@@ -293,10 +299,10 @@ static int verify(struct blockdata *key_data, unsigned int key_len, unsigned cha
|
|||||||
switch (algo)
|
switch (algo)
|
||||||
{
|
{
|
||||||
case 1: case 5: case 7: case 8: case 10:
|
case 1: case 5: case 7: case 8: case 10:
|
||||||
return rsa_verify(key_data, key_len, sig, sig_len, digest, algo);
|
return dnsmasq_rsa_verify(key_data, key_len, sig, sig_len, digest, algo);
|
||||||
|
|
||||||
case 3: case 6:
|
case 3: case 6:
|
||||||
return dsa_verify(key_data, key_len, sig, sig_len, digest, algo);
|
return dnsmasq_dsa_verify(key_data, key_len, sig, sig_len, digest, algo);
|
||||||
|
|
||||||
#ifndef NO_NETTLE_ECC
|
#ifndef NO_NETTLE_ECC
|
||||||
case 13: case 14:
|
case 13: case 14:
|
||||||
|
|||||||
Reference in New Issue
Block a user