view cinst/nss-secitemlist.c @ 359:f6ce186cebc2

If DO_RELEASE_BUILD is set use pubkey-release and test with it This currently fails because polarssl rejects keys with a public exponent larger then 64 bit. With the following patch all tests pass. But this currently awaits upstream comment. https://polarssl.org/discussions/bug-report-issues/rsa-keys-with-large-public-exponents-are-rejected --- rsa.c.orig 2014-04-10 17:22:32.727290031 +0200 +++ rsa.c 2014-04-10 17:22:38.847410225 +0200 @@ -154,7 +154,7 @@ return( POLARSSL_ERR_RSA_KEY_CHECK_FAILED ); if( mpi_msb( &ctx->E ) < 2 || - mpi_msb( &ctx->E ) > 64 ) + mpi_msb( &ctx->E ) > POLARSSL_MPI_MAX_BITS ) return( POLARSSL_ERR_RSA_KEY_CHECK_FAILED ); return( 0 );
author Andre Heinecke <andre.heinecke@intevation.de>
date Thu, 10 Apr 2014 17:50:44 +0200
parents 6ccaf25219fd
children 17e1c8f37d72
line wrap: on
line source
#include "nss-secitemlist.h"

void
seciteml_push (seciteml_t **list, SECItem *item)
{
  seciteml_t *newlelt;
  SECItem *newitem;
  newlelt = (seciteml_t *)xmalloc( sizeof(seciteml_t) );
  newitem = (SECItem *)xmalloc( sizeof(SECItem) );
  memcpy(newitem, item, sizeof(SECItem));
  newlelt->item = newitem;
  newlelt->next = *list;
  *list = newlelt;
}

SECItem *seciteml_pop (seciteml_t **list)
{
  seciteml_t *oldlelt;
  SECItem *item = NULL;
  
  if (*list != NULL)
    {
      oldlelt = *list;
      item = oldlelt->item;
      *list = oldlelt->next;
      free(oldlelt);
    }
  return(item);
}

http://wald.intevation.org/projects/trustbridge/