mirror of
https://git.tartarus.org/simon/putty.git
synced 2025-01-09 01:18:00 +00:00
testcrypt: allow null return from ssh2_mac_new.
This can now happen if, for instance, the CLMUL implementation of aesgcm is compiled in, but not available at runtime because we're on an old Intel CPU. In this situation, testcrypt would segfault when driven by test/cryptsuite.py, and test/list-accel.py would erroneously claim the CLMUL implementation was available when it wasn't.
This commit is contained in:
parent
06d7c3916a
commit
a1d80e41dd
@ -269,7 +269,7 @@ FUNC(opt_val_hash, blake2b_new_general, ARG(uint, hashlen))
|
||||
* to ssh2_mac_new. Also, again, I've invented an ssh2_mac_update so
|
||||
* you can put data into the MAC.
|
||||
*/
|
||||
FUNC(val_mac, ssh2_mac_new, ARG(macalg, alg), ARG(opt_val_cipher, cipher))
|
||||
FUNC(opt_val_mac, ssh2_mac_new, ARG(macalg, alg), ARG(opt_val_cipher, cipher))
|
||||
FUNC(void, ssh2_mac_setkey, ARG(val_mac, m), ARG(val_string_ptrlen, key))
|
||||
FUNC(void, ssh2_mac_start, ARG(val_mac, m))
|
||||
FUNC(void, ssh2_mac_update, ARG(val_mac, m), ARG(val_string_ptrlen, data))
|
||||
|
@ -584,6 +584,7 @@ NULLABLE_RETURN_WRAPPER(val_string, strbuf *)
|
||||
NULLABLE_RETURN_WRAPPER(val_string_asciz, char *)
|
||||
NULLABLE_RETURN_WRAPPER(val_string_asciz_const, const char *)
|
||||
NULLABLE_RETURN_WRAPPER(val_cipher, ssh_cipher *)
|
||||
NULLABLE_RETURN_WRAPPER(val_mac, ssh2_mac *)
|
||||
NULLABLE_RETURN_WRAPPER(val_hash, ssh_hash *)
|
||||
NULLABLE_RETURN_WRAPPER(val_key, ssh_key *)
|
||||
NULLABLE_RETURN_WRAPPER(val_mpint, mp_int *)
|
||||
|
Loading…
Reference in New Issue
Block a user