head 1.1; access; symbols pkgsrc-2026Q1:1.1.0.18 pkgsrc-2026Q1-base:1.1 pkgsrc-2025Q4:1.1.0.16 pkgsrc-2025Q4-base:1.1 pkgsrc-2025Q3:1.1.0.14 pkgsrc-2025Q3-base:1.1 pkgsrc-2025Q2:1.1.0.12 pkgsrc-2025Q2-base:1.1 pkgsrc-2025Q1:1.1.0.10 pkgsrc-2025Q1-base:1.1 pkgsrc-2024Q4:1.1.0.8 pkgsrc-2024Q4-base:1.1 pkgsrc-2024Q3:1.1.0.6 pkgsrc-2024Q3-base:1.1 pkgsrc-2024Q2:1.1.0.4 pkgsrc-2024Q2-base:1.1 pkgsrc-2024Q1:1.1.0.2 pkgsrc-2024Q1-base:1.1; locks; strict; comment @// @; 1.1 date 2024.01.31.19.19.58; author schmonz; state Exp; branches; next ; commitid Nzxngm1mUe8cuDWE; desc @@ 1.1 log @Add libdkim: Portable library that signs and verifies emails libdkim is a portable library that signs and verifies emails using the OpenSSL library. DomainKeys Identified Mail (DKIM) defines a domain-level authentication framework for email using public-key cryptography and key server technology to permit verification of the source and contents of messages by either Mail Transport Agents (MTAs) or Mail User Agents (MUAs). @ text @$NetBSD$ Fix build with newer OpenSSL (from FreeBSD). --- src/dkimsign.cpp.orig 2024-01-30 15:33:54.094028460 +0000 +++ src/dkimsign.cpp @@@@ -41,20 +41,26 @@@@ CDKIMSign::CDKIMSign() m_EmptyLineCount = 0; m_pfnHdrCallback = NULL; - EVP_SignInit( &m_allman_sha1ctx, EVP_sha1() ); - EVP_SignInit( &m_Hdr_ietf_sha1ctx, EVP_sha1() ); - EVP_SignInit( &m_Hdr_ietf_sha256ctx, EVP_sha256() ); - EVP_DigestInit( &m_Bdy_ietf_sha1ctx, EVP_sha1() ); - EVP_DigestInit( &m_Bdy_ietf_sha256ctx, EVP_sha256() ); + m_allman_sha1ctx = EVP_MD_CTX_create(); + m_Hdr_ietf_sha1ctx = EVP_MD_CTX_create(); + m_Hdr_ietf_sha256ctx = EVP_MD_CTX_create(); + m_Bdy_ietf_sha1ctx = EVP_MD_CTX_create(); + m_Bdy_ietf_sha256ctx = EVP_MD_CTX_create(); + + EVP_SignInit( m_allman_sha1ctx, EVP_sha1() ); + EVP_SignInit( m_Hdr_ietf_sha1ctx, EVP_sha1() ); + EVP_SignInit( m_Hdr_ietf_sha256ctx, EVP_sha256() ); + EVP_DigestInit( m_Bdy_ietf_sha1ctx, EVP_sha1() ); + EVP_DigestInit( m_Bdy_ietf_sha256ctx, EVP_sha256() ); } CDKIMSign::~CDKIMSign() { - EVP_MD_CTX_cleanup( &m_allman_sha1ctx ); - EVP_MD_CTX_cleanup( &m_Hdr_ietf_sha1ctx ); - EVP_MD_CTX_cleanup( &m_Hdr_ietf_sha256ctx ); - EVP_MD_CTX_cleanup( &m_Bdy_ietf_sha1ctx ); - EVP_MD_CTX_cleanup( &m_Bdy_ietf_sha256ctx ); + EVP_MD_CTX_destroy( m_allman_sha1ctx ); + EVP_MD_CTX_destroy( m_Hdr_ietf_sha1ctx ); + EVP_MD_CTX_destroy( m_Hdr_ietf_sha256ctx ); + EVP_MD_CTX_destroy( m_Bdy_ietf_sha1ctx ); + EVP_MD_CTX_destroy( m_Bdy_ietf_sha256ctx ); } //////////////////////////////////////////////////////////////////////////////// @@@@ -150,34 +156,34 @@@@ void CDKIMSign::Hash( const char* szBuff { if( m_nIncludeBodyHash & DKIM_BODYHASH_ALLMAN_1 ) { - EVP_SignUpdate( &m_allman_sha1ctx, szBuffer, nBufLength ); + EVP_SignUpdate( m_allman_sha1ctx, szBuffer, nBufLength ); } } else { if( m_nIncludeBodyHash < DKIM_BODYHASH_IETF_1 ) { - EVP_SignUpdate( &m_allman_sha1ctx, szBuffer, nBufLength ); + EVP_SignUpdate( m_allman_sha1ctx, szBuffer, nBufLength ); } else if( m_nIncludeBodyHash & DKIM_BODYHASH_IETF_1 ) { if( m_nIncludeBodyHash & DKIM_BODYHASH_ALLMAN_1 ) { - EVP_SignUpdate( &m_allman_sha1ctx, szBuffer, nBufLength ); + EVP_SignUpdate( m_allman_sha1ctx, szBuffer, nBufLength ); } if( m_nHash & DKIM_HASH_SHA256 ) { if( bHdr ) - EVP_SignUpdate( &m_Hdr_ietf_sha256ctx, szBuffer, nBufLength ); + EVP_SignUpdate( m_Hdr_ietf_sha256ctx, szBuffer, nBufLength ); else - EVP_DigestUpdate( &m_Bdy_ietf_sha256ctx, szBuffer, nBufLength ); + EVP_DigestUpdate( m_Bdy_ietf_sha256ctx, szBuffer, nBufLength ); } if( m_nHash != DKIM_HASH_SHA256 ) { if( bHdr ) - EVP_SignUpdate( &m_Hdr_ietf_sha1ctx, szBuffer, nBufLength ); + EVP_SignUpdate( m_Hdr_ietf_sha1ctx, szBuffer, nBufLength ); else - EVP_DigestUpdate( &m_Bdy_ietf_sha1ctx, szBuffer, nBufLength ); + EVP_DigestUpdate( m_Bdy_ietf_sha1ctx, szBuffer, nBufLength ); } } } @@@@ -865,7 +871,7 @@@@ int CDKIMSign::ConstructSignature( char* unsigned char Hash[EVP_MAX_MD_SIZE]; unsigned int nHashLen = 0; - EVP_DigestFinal( bUseSha256 ? &m_Bdy_ietf_sha256ctx : &m_Bdy_ietf_sha1ctx, Hash, &nHashLen ); + EVP_DigestFinal( bUseSha256 ? m_Bdy_ietf_sha256ctx : m_Bdy_ietf_sha1ctx, Hash, &nHashLen ); bio = BIO_new(BIO_s_mem()); if (!bio) { @@@@ -936,11 +942,11 @@@@ int CDKIMSign::ConstructSignature( char* if( bUseIetfBodyHash ) { - EVP_SignUpdate( bUseSha256 ? &m_Hdr_ietf_sha256ctx : &m_Hdr_ietf_sha1ctx, sTemp.c_str(), sTemp.size() ); + EVP_SignUpdate( bUseSha256 ? m_Hdr_ietf_sha256ctx : m_Hdr_ietf_sha1ctx, sTemp.c_str(), sTemp.size() ); } else { - EVP_SignUpdate( &m_allman_sha1ctx, sTemp.c_str(), sTemp.size() ); + EVP_SignUpdate( m_allman_sha1ctx, sTemp.c_str(), sTemp.size() ); } bio = BIO_new_mem_buf(szPrivKey, -1); @@@@ -967,11 +973,11 @@@@ int CDKIMSign::ConstructSignature( char* if( bUseIetfBodyHash ) { - nSignRet = EVP_SignFinal( bUseSha256 ? &m_Hdr_ietf_sha256ctx : &m_Hdr_ietf_sha1ctx, sig, &siglen, pkey); + nSignRet = EVP_SignFinal( bUseSha256 ? m_Hdr_ietf_sha256ctx : m_Hdr_ietf_sha1ctx, sig, &siglen, pkey); } else { - nSignRet = EVP_SignFinal( &m_allman_sha1ctx, sig, &siglen, pkey); + nSignRet = EVP_SignFinal( m_allman_sha1ctx, sig, &siglen, pkey); } EVP_PKEY_free(pkey); @