mirror of
https://github.com/kvazar-network/kevacoin.git
synced 2025-01-29 16:24:22 +00:00
Merge #9326: Update for OpenSSL 1.1 API.
b05b1af Fix qt/paymentrequestplus.cpp for OpenSSL 1.1 API. (Gregory Maxwell) bae1eef Fix wallet/test/crypto_tests.cpp for OpenSSL 1.1 API. (Gregory Maxwell)
This commit is contained in:
commit
26fe5c98ab
@ -159,14 +159,24 @@ bool PaymentRequestPlus::getMerchant(X509_STORE* certStore, QString& merchant) c
|
|||||||
std::string data_to_verify; // Everything but the signature
|
std::string data_to_verify; // Everything but the signature
|
||||||
rcopy.SerializeToString(&data_to_verify);
|
rcopy.SerializeToString(&data_to_verify);
|
||||||
|
|
||||||
EVP_MD_CTX ctx;
|
#if OPENSSL_VERSION_NUMBER >= 0x10100000L
|
||||||
|
EVP_MD_CTX *ctx = EVP_MD_CTX_new();
|
||||||
|
if (!ctx) throw SSLVerifyError("Error allocating OpenSSL context.");
|
||||||
|
#else
|
||||||
|
EVP_MD_CTX _ctx;
|
||||||
|
EVP_MD_CTX *ctx;
|
||||||
|
ctx = &_ctx;
|
||||||
|
#endif
|
||||||
EVP_PKEY *pubkey = X509_get_pubkey(signing_cert);
|
EVP_PKEY *pubkey = X509_get_pubkey(signing_cert);
|
||||||
EVP_MD_CTX_init(&ctx);
|
EVP_MD_CTX_init(ctx);
|
||||||
if (!EVP_VerifyInit_ex(&ctx, digestAlgorithm, NULL) ||
|
if (!EVP_VerifyInit_ex(ctx, digestAlgorithm, NULL) ||
|
||||||
!EVP_VerifyUpdate(&ctx, data_to_verify.data(), data_to_verify.size()) ||
|
!EVP_VerifyUpdate(ctx, data_to_verify.data(), data_to_verify.size()) ||
|
||||||
!EVP_VerifyFinal(&ctx, (const unsigned char*)paymentRequest.signature().data(), (unsigned int)paymentRequest.signature().size(), pubkey)) {
|
!EVP_VerifyFinal(ctx, (const unsigned char*)paymentRequest.signature().data(), (unsigned int)paymentRequest.signature().size(), pubkey)) {
|
||||||
throw SSLVerifyError("Bad signature, invalid payment request.");
|
throw SSLVerifyError("Bad signature, invalid payment request.");
|
||||||
}
|
}
|
||||||
|
#if OPENSSL_VERSION_NUMBER >= 0x10100000L
|
||||||
|
EVP_MD_CTX_free(ctx);
|
||||||
|
#endif
|
||||||
|
|
||||||
// OpenSSL API for getting human printable strings from certs is baroque.
|
// OpenSSL API for getting human printable strings from certs is baroque.
|
||||||
int textlen = X509_NAME_get_text_by_NID(certname, NID_commonName, NULL, 0);
|
int textlen = X509_NAME_get_text_by_NID(certname, NID_commonName, NULL, 0);
|
||||||
|
@ -42,15 +42,19 @@ bool OldEncrypt(const CKeyingMaterial& vchPlaintext, std::vector<unsigned char>
|
|||||||
int nCLen = nLen + AES_BLOCK_SIZE, nFLen = 0;
|
int nCLen = nLen + AES_BLOCK_SIZE, nFLen = 0;
|
||||||
vchCiphertext = std::vector<unsigned char> (nCLen);
|
vchCiphertext = std::vector<unsigned char> (nCLen);
|
||||||
|
|
||||||
EVP_CIPHER_CTX ctx;
|
EVP_CIPHER_CTX *ctx = EVP_CIPHER_CTX_new();
|
||||||
|
|
||||||
|
if (!ctx) return false;
|
||||||
|
|
||||||
bool fOk = true;
|
bool fOk = true;
|
||||||
|
|
||||||
EVP_CIPHER_CTX_init(&ctx);
|
EVP_CIPHER_CTX_init(ctx);
|
||||||
if (fOk) fOk = EVP_EncryptInit_ex(&ctx, EVP_aes_256_cbc(), NULL, chKey, chIV) != 0;
|
if (fOk) fOk = EVP_EncryptInit_ex(ctx, EVP_aes_256_cbc(), NULL, chKey, chIV) != 0;
|
||||||
if (fOk) fOk = EVP_EncryptUpdate(&ctx, &vchCiphertext[0], &nCLen, &vchPlaintext[0], nLen) != 0;
|
if (fOk) fOk = EVP_EncryptUpdate(ctx, &vchCiphertext[0], &nCLen, &vchPlaintext[0], nLen) != 0;
|
||||||
if (fOk) fOk = EVP_EncryptFinal_ex(&ctx, (&vchCiphertext[0]) + nCLen, &nFLen) != 0;
|
if (fOk) fOk = EVP_EncryptFinal_ex(ctx, (&vchCiphertext[0]) + nCLen, &nFLen) != 0;
|
||||||
EVP_CIPHER_CTX_cleanup(&ctx);
|
EVP_CIPHER_CTX_cleanup(ctx);
|
||||||
|
|
||||||
|
EVP_CIPHER_CTX_free(ctx);
|
||||||
|
|
||||||
if (!fOk) return false;
|
if (!fOk) return false;
|
||||||
|
|
||||||
@ -66,15 +70,19 @@ bool OldDecrypt(const std::vector<unsigned char>& vchCiphertext, CKeyingMaterial
|
|||||||
|
|
||||||
vchPlaintext = CKeyingMaterial(nPLen);
|
vchPlaintext = CKeyingMaterial(nPLen);
|
||||||
|
|
||||||
EVP_CIPHER_CTX ctx;
|
EVP_CIPHER_CTX *ctx = EVP_CIPHER_CTX_new();
|
||||||
|
|
||||||
|
if (!ctx) return false;
|
||||||
|
|
||||||
bool fOk = true;
|
bool fOk = true;
|
||||||
|
|
||||||
EVP_CIPHER_CTX_init(&ctx);
|
EVP_CIPHER_CTX_init(ctx);
|
||||||
if (fOk) fOk = EVP_DecryptInit_ex(&ctx, EVP_aes_256_cbc(), NULL, chKey, chIV) != 0;
|
if (fOk) fOk = EVP_DecryptInit_ex(ctx, EVP_aes_256_cbc(), NULL, chKey, chIV) != 0;
|
||||||
if (fOk) fOk = EVP_DecryptUpdate(&ctx, &vchPlaintext[0], &nPLen, &vchCiphertext[0], nLen) != 0;
|
if (fOk) fOk = EVP_DecryptUpdate(ctx, &vchPlaintext[0], &nPLen, &vchCiphertext[0], nLen) != 0;
|
||||||
if (fOk) fOk = EVP_DecryptFinal_ex(&ctx, (&vchPlaintext[0]) + nPLen, &nFLen) != 0;
|
if (fOk) fOk = EVP_DecryptFinal_ex(ctx, (&vchPlaintext[0]) + nPLen, &nFLen) != 0;
|
||||||
EVP_CIPHER_CTX_cleanup(&ctx);
|
EVP_CIPHER_CTX_cleanup(ctx);
|
||||||
|
|
||||||
|
EVP_CIPHER_CTX_free(ctx);
|
||||||
|
|
||||||
if (!fOk) return false;
|
if (!fOk) return false;
|
||||||
|
|
||||||
|
Loading…
x
Reference in New Issue
Block a user