diff options
| author | Lexi Winter <ivy@FreeBSD.org> | 2025-12-01 03:19:41 +0000 |
|---|---|---|
| committer | Lexi Winter <ivy@FreeBSD.org> | 2025-12-01 03:19:41 +0000 |
| commit | 2e80774d0b20d167bc0a9e2b63dafbfb171c0d22 (patch) | |
| tree | 25f0138e1af8902b92dacc8cce09b267447c17db /security/iddawc/files/patch-src-iddawc.c | |
| parent | f85f2b2d6e5b7ed869376eb4b180c3a74a5c5da9 (diff) | |
| parent | 1a30da80670973368b399f2b01fe9c04b91a1273 (diff) | |
Merge remote-tracking branch 'freebsd/main' into lf/mainlf/main
Diffstat (limited to 'security/iddawc/files/patch-src-iddawc.c')
| -rw-r--r-- | security/iddawc/files/patch-src-iddawc.c | 29 |
1 files changed, 0 insertions, 29 deletions
diff --git a/security/iddawc/files/patch-src-iddawc.c b/security/iddawc/files/patch-src-iddawc.c deleted file mode 100644 index 8841b26e2c51..000000000000 --- a/security/iddawc/files/patch-src-iddawc.c +++ /dev/null @@ -1,29 +0,0 @@ ---- src/iddawc.c.orig 2022-12-17 21:23:54 UTC -+++ src/iddawc.c -@@ -4972,7 +4972,7 @@ int i_verify_id_token(struct _i_session * i_session) { - if (alg != GNUTLS_DIG_UNKNOWN) { - hash_data.data = (unsigned char*)i_session->access_token; - hash_data.size = (unsigned int)o_strlen(i_session->access_token); -- if (gnutls_fingerprint(alg, &hash_data, hash, &hash_len) == GNUTLS_E_SUCCESS) { -+ if (gnutls_fingerprint((gnutls_digest_algorithm_t) alg, &hash_data, hash, &hash_len) == GNUTLS_E_SUCCESS) { - if (o_base64url_encode(hash, hash_len/2, hash_encoded, &hash_encoded_len)) { - if (o_strncmp((const char *)hash_encoded, json_string_value(json_object_get(i_session->id_token_payload, "at_hash")), hash_encoded_len) != 0) { - y_log_message(Y_LOG_LEVEL_DEBUG, "i_verify_id_token at - at_hash invalid"); -@@ -5000,7 +5000,7 @@ int i_verify_id_token(struct _i_session * i_session) { - if (alg != GNUTLS_DIG_UNKNOWN) { - hash_data.data = (unsigned char*)i_session->code; - hash_data.size = (unsigned int)o_strlen(i_session->code); -- if (gnutls_fingerprint(alg, &hash_data, hash, &hash_len) == GNUTLS_E_SUCCESS) { -+ if (gnutls_fingerprint((gnutls_digest_algorithm_t) alg, &hash_data, hash, &hash_len) == GNUTLS_E_SUCCESS) { - if (o_base64url_encode(hash, hash_len/2, hash_encoded, &hash_encoded_len)) { - if (o_strncmp((const char *)hash_encoded, json_string_value(json_object_get(i_session->id_token_payload, "c_hash")), hash_encoded_len) != 0) { - y_log_message(Y_LOG_LEVEL_DEBUG, "i_verify_id_token - c_hash invalid"); -@@ -5028,7 +5028,7 @@ int i_verify_id_token(struct _i_session * i_session) { - if (alg != GNUTLS_DIG_UNKNOWN) { - hash_data.data = (unsigned char*)i_session->state; - hash_data.size = (unsigned int)o_strlen(i_session->state); -- if (gnutls_fingerprint(alg, &hash_data, hash, &hash_len) == GNUTLS_E_SUCCESS) { -+ if (gnutls_fingerprint((gnutls_digest_algorithm_t) alg, &hash_data, hash, &hash_len) == GNUTLS_E_SUCCESS) { - if (o_base64url_encode(hash, hash_len/2, hash_encoded, &hash_encoded_len)) { - if (o_strncmp((const char *)hash_encoded, json_string_value(json_object_get(i_session->id_token_payload, "s_hash")), hash_encoded_len) != 0) { - y_log_message(Y_LOG_LEVEL_DEBUG, "i_verify_id_token - s_hash invalid"); |
