[pkg-opensc-commit] [engine-pkcs11] 28/43: Fixed "make distcheck"

Eric Dorland eric at moszumanska.debian.org
Sun Jan 31 06:38:49 UTC 2016


This is an automated email from the git hooks/post-receive script.

eric pushed a commit to branch master
in repository engine-pkcs11.

commit 3c542cd550a0cf7f6793db23b4db6be4596d6694
Author: Michał Trojnara <Michal.Trojnara at stunnel.org>
Date:   Tue Jan 26 16:51:14 2016 +0100

    Fixed "make distcheck"
---
 .gitignore         |  8 ++++++--
 Makefile.am        |  1 +
 Makefile.mak       |  5 -----
 appveyor.yml       |  1 -
 bootstrap          |  9 ---------
 configure.ac       | 46 ++++++++++++++++++++++++++++------------------
 src/Makefile.am    |  7 +++++--
 src/versioninfo.rc | 35 +++++++++++++++++++++++++++++++++++
 tests/Makefile.am  |  3 ++-
 tests/common.sh    | 10 +++++++---
 tests/evp-sign.c   | 46 ++++++++++++++--------------------------------
 tests/softhsm      | 17 +++++++++--------
 12 files changed, 107 insertions(+), 81 deletions(-)

diff --git a/.gitignore b/.gitignore
index 8b461eb..1316382 100644
--- a/.gitignore
+++ b/.gitignore
@@ -21,7 +21,6 @@ mkinstalldirs
 so_locations
 stamp-h*
 test-driver
-tests/evp-sign
 *.trs
 *.log
 .deps
@@ -45,7 +44,7 @@ tests/evp-sign
 *.pdb
 *.rej
 *.u
-*.rc
+*.res
 *.pc
 *~
 *.gz
@@ -58,3 +57,8 @@ m4/ltsugar.m4
 m4/ltversion.m4
 m4/lt~obsolete.m4
 
+test-driver
+tests/evp-sign
+tests/*.log
+tests/*.trs
+tests/output.*
diff --git a/Makefile.am b/Makefile.am
index 4714579..d86ba50 100644
--- a/Makefile.am
+++ b/Makefile.am
@@ -15,6 +15,7 @@ MAINTAINERCLEANFILES = \
 	$(srcdir)/packaged
 EXTRA_DIST = .gitignore
 
+# Prerequisites must be first on the list
 SUBDIRS = src tests
 
 dist_noinst_SCRIPTS = bootstrap
diff --git a/Makefile.mak b/Makefile.mak
index bfb1a31..312a537 100644
--- a/Makefile.mak
+++ b/Makefile.mak
@@ -3,11 +3,6 @@ SUBDIRS = src
 
 all::
 
-all:: config.h
-
-config.h: winconfig.h
-	@copy /y winconfig.h config.h
-	
 all depend install clean::
 	 @for %i in ( $(SUBDIRS) ) do \
 		@cmd /c "cd %i && $(MAKE) /nologo /f Makefile.mak $@"
diff --git a/appveyor.yml b/appveyor.yml
index 2a840b1..990c41c 100644
--- a/appveyor.yml
+++ b/appveyor.yml
@@ -53,7 +53,6 @@ build_script:
   - bash -c "exec 0</dev/null && ./bootstrap"
   # disable features to speed up the script
   - bash -c "exec 0</dev/null && ./configure OPENSSL_CFLAGS=\"-IC:\OpenSSL-Win32\include -IC:\OpenSSL-Win64\include\" OPENSSL_LIBS=\"-LC:\OpenSSL-Win32 -LC:\OpenSSL-Win64 -leay\" || cat config.log"
-  - cp winconfig.h config.h
   - nmake /f Makefile.mak %NMAKE_ARCH% %NMAKE_EXTRA%
   - appveyor PushArtifact src\libp11.dll
   - appveyor PushArtifact src\libp11.lib
diff --git a/bootstrap b/bootstrap
index ffdcf30..4cd22ac 100755
--- a/bootstrap
+++ b/bootstrap
@@ -1,11 +1,2 @@
 #!/bin/sh
-
-set -e
-set -x
-if test -f Makefile; then
-  make distclean
-fi
-
-rm -rf *~ *.cache *.m4 config.guess config.log \
-	config.status config.sub depcomp ltmain.sh
 autoreconf --verbose --install --force
diff --git a/configure.ac b/configure.ac
index 182a8ff..3c10d40 100644
--- a/configure.ac
+++ b/configure.ac
@@ -8,7 +8,7 @@ define([PACKAGE_SUFFIX], [_git])
 
 AC_INIT([engine_pkcs11],[PACKAGE_VERSION_MAJOR.PACKAGE_VERSION_MINOR.PACKAGE_VERSION_FIX[]PACKAGE_SUFFIX])
 AC_CONFIG_AUX_DIR([.])
-AC_CONFIG_HEADERS([config.h])
+AC_CONFIG_HEADERS([src/config.h])
 AC_CONFIG_MACRO_DIR([m4])
 AM_INIT_AUTOMAKE
 
@@ -18,6 +18,9 @@ ENGINE_PKCS11_VERSION_FIX="PACKAGE_VERSION_FIX"
 
 AC_CONFIG_SRCDIR([src/engine_pkcs11.c])
 
+# silent build by default
+ifdef([AM_SILENT_RULES], [AM_SILENT_RULES([yes])])
+
 AC_CANONICAL_HOST
 AC_PROG_CC
 PKG_PROG_PKG_CONFIG
@@ -74,23 +77,29 @@ AC_ARG_WITH(
 	[enginesdir],
 	[AS_HELP_STRING([--with-enginesdir], [OpenSSL engines directory])],
 	[enginesdir="${withval}"],
-	[libcryptodir="`$PKG_CONFIG --variable=libdir --silence-errors libcrypto || \
-		$PKG_CONFIG --variable=libdir openssl`"
-	case "`$PKG_CONFIG --modversion --silence-errors libcrypto || \
-		$PKG_CONFIG --modversion openssl`" in
-	1.1.*) # Predicted engines directory prefix for OpenSSL 1.1.x
-		debian_ssl_prefix="openssl-1.1.0";;
-	1.0.*) # Engines directory prefix for OpenSSL 1.0.x
-		debian_ssl_prefix="openssl-1.0.0";;
-	*) # Engines directory prefix for OpenSSL 0.9.x
-		debian_ssl_prefix="ssl";;
-	esac
-	if test -d "$libcryptodir/$debian_ssl_prefix/engines"; then
-		# Debian-based OpenSSL package (for example Ubuntu)
-		enginesdir="$libcryptodir/$debian_ssl_prefix/engines"
-	else # Default OpenSSL engines directory
-		enginesdir="$libcryptodir/engines"
-	fi]
+	[
+		libcryptodir="`$PKG_CONFIG --variable=libdir --silence-errors libcrypto || \
+			$PKG_CONFIG --variable=libdir openssl`"
+		case "`$PKG_CONFIG --modversion --silence-errors libcrypto || \
+			$PKG_CONFIG --modversion openssl`" in
+		1.1.*) # Predicted engines directory prefix for OpenSSL 1.1.x
+			debian_ssl_prefix="openssl-1.1.0";;
+		1.0.*) # Engines directory prefix for OpenSSL 1.0.x
+			debian_ssl_prefix="openssl-1.0.0";;
+		*) # Engines directory prefix for OpenSSL 0.9.x
+			debian_ssl_prefix="ssl";;
+		esac
+		if test -d "$libcryptodir/$debian_ssl_prefix/engines"; then
+			# Debian-based OpenSSL package (for example Ubuntu)
+			enginesdir="$libcryptodir/$debian_ssl_prefix/engines"
+		else # Default OpenSSL engines directory
+			enginesdir="$libcryptodir/engines"
+		fi
+		if test "${prefix}" != "NONE" -o "${exec_prefix}" != "NONE"; then
+			# Override the autodetected value with the default
+			enginesdir="${libdir}"
+		fi
+	]
 )
 
 AC_ARG_WITH(
@@ -166,6 +175,7 @@ if test -n "${pkcs11_module}"; then
 		"${pkcs11_module}",
 		[Default PKCS#11 module.])
 fi
+
 AC_SUBST([enginesdir])
 AC_SUBST([ENGINE_PKCS11_VERSION_MAJOR])
 AC_SUBST([ENGINE_PKCS11_VERSION_MINOR])
diff --git a/src/Makefile.am b/src/Makefile.am
index 9556963..7b47c9d 100644
--- a/src/Makefile.am
+++ b/src/Makefile.am
@@ -1,7 +1,10 @@
-MAINTAINERCLEANFILES = \
-	$(srcdir)/Makefile.in $(srcdir)/versioninfo.rc
+MAINTAINERCLEANFILES = $(srcdir)/Makefile.in
 EXTRA_DIST = Makefile.mak versioninfo.rc.in
 
+# ifeq ($(enginesdir),'')
+# enginesdir = INSTALL_DIR
+# endif
+
 engines_LTLIBRARIES = libpkcs11.la
 
 OPENSSL_EXTRA_CFLAGS = \
diff --git a/src/versioninfo.rc b/src/versioninfo.rc
new file mode 100644
index 0000000..b246fe9
--- /dev/null
+++ b/src/versioninfo.rc
@@ -0,0 +1,35 @@
+#include <winresrc.h>
+
+VS_VERSION_INFO VERSIONINFO
+	FILEVERSION 0,2,1,0
+	PRODUCTVERSION 0,2,1,0
+	FILEFLAGSMASK 0x3fL
+#ifdef _DEBUG
+	FILEFLAGS 0x21L
+#else
+	FILEFLAGS 0x20L
+#endif
+	FILEOS 0x40004L
+	FILETYPE 0x1L
+	FILESUBTYPE 0x0L
+BEGIN
+	BLOCK "StringFileInfo"
+	BEGIN
+		BLOCK "040904b0"
+		BEGIN
+			VALUE "Comments", "Provided under the terms of the GNU General Public License (LGPLv2.1+).\0"
+			VALUE "CompanyName", "OpenSC Project\0"
+			VALUE "FileDescription", "OpenSSL PKCS#11 engine\0"
+			VALUE "FileVersion", "0,2,1,0\0"
+			VALUE "InternalName", "engine_pkcs11\0"
+			VALUE "LegalCopyright", "OpenSC Project\0"
+			VALUE "LegalTrademarks", "\0"
+			VALUE "OriginalFilename", "engine_pkcs11.dll\0"
+			VALUE "PrivateBuild", "\0"
+			VALUE "ProductName", "engine_pkcs11\0"
+			VALUE "ProductVersion", "0,2,1,0\0"
+			VALUE "SpecialBuild", "\0"
+		END
+	END
+END
+
diff --git a/tests/Makefile.am b/tests/Makefile.am
index df559a7..f363f7a 100644
--- a/tests/Makefile.am
+++ b/tests/Makefile.am
@@ -1,4 +1,4 @@
-EXTRA_DIST = cert.der key.der common.sh engines.cnf.in
+EXTRA_DIST = common.sh engines.cnf.in
 
 AM_CFLAGS = $(OPENSSL_CFLAGS)
 AM_CPPFLAGS = \
@@ -12,6 +12,7 @@ evp_sign_SOURCES = evp-sign.c
 
 check_PROGRAMS = evp-sign
 dist_check_SCRIPTS = softhsm
+dist_check_DATA = cert.der key.der pubkey.der
 
 TESTS = $(dist_check_SCRIPTS)
 
diff --git a/tests/common.sh b/tests/common.sh
index 7f70e63..592558c 100644
--- a/tests/common.sh
+++ b/tests/common.sh
@@ -17,6 +17,10 @@
 # along with GnuTLS; if not, write to the Free Software Foundation,
 # Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
 
+echo "Current directory: $(pwd)"
+echo "Source directory: ${srcdir}"
+echo "Output directory: ${outdir}"
+
 mkdir -p $outdir
 
 for i in /usr/lib64/pkcs11 /usr/lib/softhsm /usr/local/lib/softhsm /opt/local/lib/softhsm /usr/lib/x86_64-linux-gnu/softhsm /usr/lib /usr/lib64/softhsm;do
@@ -90,17 +94,17 @@ PUK=1234
 init_card $PIN $PUK
 
 # generate key in token
-pkcs11-tool -p $PIN --module $ADDITIONAL_PARAM -d 00010203 -a server-key -l -w ${file_dir}/key.der -y privkey >/dev/null
+pkcs11-tool -p $PIN --module $ADDITIONAL_PARAM -d 00010203 -a server-key -l -w ${srcdir}/key.der -y privkey >/dev/null
 if test $? != 0;then
 	exit 1;
 fi
 
-pkcs11-tool -p $PIN --module $ADDITIONAL_PARAM -d 00010203 -a server-key -l -w ${file_dir}/pubkey.der -y pubkey >/dev/null
+pkcs11-tool -p $PIN --module $ADDITIONAL_PARAM -d 00010203 -a server-key -l -w ${srcdir}/pubkey.der -y pubkey >/dev/null
 if test $? != 0;then
 	exit 1;
 fi
 
-pkcs11-tool -p $PIN --module $ADDITIONAL_PARAM -d 00010203 -a server-key -l -w ${file_dir}/cert.der -y cert >/dev/null
+pkcs11-tool -p $PIN --module $ADDITIONAL_PARAM -d 00010203 -a server-key -l -w ${srcdir}/cert.der -y cert >/dev/null
 if test $? != 0;then
 	exit 1;
 fi
diff --git a/tests/evp-sign.c b/tests/evp-sign.c
index 5bc5fb1..b5c0ba8 100644
--- a/tests/evp-sign.c
+++ b/tests/evp-sign.c
@@ -33,7 +33,6 @@
 #include <getopt.h>
 #include <err.h>
 #include <arpa/inet.h>
-#include <openssl/bio.h>
 #include <openssl/evp.h>
 #include <openssl/pem.h>
 #include <openssl/err.h>
@@ -46,6 +45,7 @@ static UI_METHOD *ui_detect_failed_ctrl = NULL;
 
 static int ui_open_fail(UI *ui)
 {
+	(void) ui;
 	fprintf(stderr, "It seems like get_pin fell through even though the pin should already be set!\n");
 	return 0;
 }
@@ -138,27 +138,22 @@ static void display_openssl_errors(int l)
 
 int main(int argc, char **argv)
 {
-	char *hash_algo = NULL;
-	char *private_key_name, *x509_name, *module_name, *dest_name;
+	char *private_key_name, *public_key_name;
 	unsigned char buf[4096];
 	const EVP_MD *digest_algo;
-	EVP_PKEY *private_key, *pubkey;
+	EVP_PKEY *private_key, *public_key;
 	char *key_pass = NULL;
-	X509 *x509;
 	unsigned n;
 	int ret;
-	long errline;
 	ENGINE *e;
-	CONF *conf;
 	EVP_MD_CTX *ctx;
 	const char *module_path, *efile;
-	BIO *in, *b;
 	enum { NONE, BY_DEFAULT, BY_CTRL } pin_method = NONE;
 	UI_METHOD *ui_method = NULL;
 	void *ui_extra = NULL;
 
 	if (argc < 5) {
-		fprintf(stderr, "usage: %s [PIN setting method] [PIN] [CONF] [private key URL] [module]\n", argv[0]);
+		fprintf(stderr, "usage: %s [PIN setting method] [PIN] [CONF] [private key URL] [public key URL] [module]\n", argv[0]);
 		fprintf(stderr, "\n");
 		fprintf(stderr, "PIN setting method can be 'default' or 'ctrl'\n");
 		exit(1);
@@ -173,9 +168,10 @@ int main(int argc, char **argv)
 		exit(1);
 	}
 	key_pass = argv[2];
-	private_key_name = argv[4];
-	module_path = argv[5];
 	efile = argv[3];
+	private_key_name = argv[4];
+	public_key_name = argv[5];
+	module_path = argv[6];
 
 	setup_ui();
 
@@ -232,27 +228,13 @@ int main(int argc, char **argv)
 		exit(1);
 	}
 
-	x509_name = "cert.der";
-
-	b = BIO_new_file(x509_name, "rb");
-	if (b == NULL) {
-		fprintf(stderr, "error loading %s\n", x509_name);
-		exit(1);
-	}
-
-	x509 = d2i_X509_bio(b, NULL);	/* Binary encoded X.509 */
-	if (x509 == NULL) {
-		BIO_reset(b);
-		x509 = PEM_read_bio_X509(b, NULL, NULL, NULL);	/* PEM encoded X.509 */
-	}
-
-	if (x509 == NULL) {
-		fprintf(stderr, "error loading cert %s\n", x509_name);
+	public_key = ENGINE_load_public_key(e, public_key_name,
+		ui_method, ui_extra);
+	if (public_key == NULL) {
+		fprintf(stderr, "cannot load: %s\n", public_key_name);
+		display_openssl_errors(__LINE__);
 		exit(1);
 	}
-	pubkey = X509_get_pubkey(x509);
-
-	BIO_free(b);
 
 	/* Digest the module data. */
 	OpenSSL_add_all_digests();
@@ -287,7 +269,7 @@ int main(int argc, char **argv)
 		exit(1);
 	}
 
-	if (EVP_DigestVerifyInit(ctx, NULL, digest_algo, NULL, pubkey) <= 0) {
+	if (EVP_DigestVerifyInit(ctx, NULL, digest_algo, NULL, public_key) <= 0) {
 		display_openssl_errors(__LINE__);
 		exit(1);
 	}
@@ -303,7 +285,7 @@ int main(int argc, char **argv)
 	}
 	EVP_MD_CTX_destroy(ctx);
 
-	EVP_PKEY_free(pubkey);
+	EVP_PKEY_free(public_key);
 	EVP_PKEY_free(private_key);
 	ENGINE_finish(e);
 	CONF_modules_unload(1);
diff --git a/tests/softhsm b/tests/softhsm
index ba6c260..7e078cb 100755
--- a/tests/softhsm
+++ b/tests/softhsm
@@ -16,8 +16,7 @@
 # along with GnuTLS; if not, write to the Free Software Foundation,
 # Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
 
-outdir="${srcdir}/output.$$"
-file_dir="${srcdir:-./}"
+outdir="output.$$"
 
 . ${srcdir}/common.sh
 
@@ -26,38 +25,40 @@ file_dir="${srcdir:-./}"
 sed -e "s|@MODULE_PATH@|${ADDITIONAL_PARAM}|g" -e "s|@ENGINE_PATH@|../src/.libs/libpkcs11.so|g" <"${srcdir}/engines.cnf.in" >engines.cnf
 
 export OPENSSL_ENGINES="../src/.libs/"
+PRIVATE_KEY="pkcs11:token=libp11-test;id=%00%01%02%03;object=server-key;type=private;pin-value=1234"
+PUBLIC_KEY="pkcs11:token=libp11-test;id=%00%01%02%03;object=server-key;type=public;pin-value=1234"
 
-./evp-sign ctrl false engines.cnf "pkcs11:token=libp11-test;id=%00%01%02%03;object=server-key;type=private;pin-value=1234" ${ADDITIONAL_PARAM}
+./evp-sign ctrl false engines.cnf ${PRIVATE_KEY} ${PUBLIC_KEY} ${ADDITIONAL_PARAM}
 if test $? != 0;then
 	echo "Basic PKCS #11 test, using ctrl failed"
 	exit 1;
 fi
 
-./evp-sign default false engines.cnf "pkcs11:token=libp11-test;id=%00%01%02%03;object=server-key;type=private;pin-value=1234" ${ADDITIONAL_PARAM}
+./evp-sign default false engines.cnf ${PRIVATE_KEY} ${PUBLIC_KEY} ${ADDITIONAL_PARAM}
 if test $? != 0;then
 	echo "Basic PKCS #11 test, using default failed"
 	exit 1;
 fi
 
-./evp-sign ctrl 1234 engines.cnf "pkcs11:token=libp11-test;id=%00%01%02%03;object=server-key;type=private" ${ADDITIONAL_PARAM}
+./evp-sign ctrl 1234 engines.cnf ${PRIVATE_KEY} ${PUBLIC_KEY} ${ADDITIONAL_PARAM}
 if test $? != 0;then
 	echo "Basic PKCS #11 test without pin-value, using ctrl failed"
 	exit 1;
 fi
 
-./evp-sign default 1234 engines.cnf "pkcs11:token=libp11-test;id=%00%01%02%03;object=server-key;type=private" ${ADDITIONAL_PARAM}
+./evp-sign default 1234 engines.cnf ${PRIVATE_KEY} ${PUBLIC_KEY} ${ADDITIONAL_PARAM}
 if test $? != 0;then
 	echo "Basic PKCS #11 test without pin-value, using default failed"
 	exit 1;
 fi
 
-./evp-sign ctrl 1234 engines.cnf "label_server-key" ${ADDITIONAL_PARAM}
+./evp-sign ctrl 1234 engines.cnf "label_server-key" "label_server-key" ${ADDITIONAL_PARAM}
 if test $? != 0;then
 	echo "Basic PKCS #11 test with legacy name #1 failed"
 	exit 1;
 fi
 
-./evp-sign default 1234 engines.cnf "id_00010203" ${ADDITIONAL_PARAM}
+./evp-sign default 1234 engines.cnf "id_00010203" "id_00010203" ${ADDITIONAL_PARAM}
 if test $? != 0;then
 	echo "Basic PKCS #11 test with legacy name #2 failed"
 	exit 1;

-- 
Alioth's /usr/local/bin/git-commit-notice on /srv/git.debian.org/git/pkg-opensc/engine-pkcs11.git



More information about the pkg-opensc-commit mailing list