From 6dbd9e9722682f4cb4a44aea4cadadd85ddd78fb Mon Sep 17 00:00:00 2001 From: Jude Taylor Date: Wed, 12 Apr 2017 10:57:54 -0700 Subject: [PATCH] codemod: ASN1_STRING_data -> ASN1_STRING_get0_data Reviewed By: anirudhvr Differential Revision: D4830205 fbshipit-source-id: 55f34c3bddead8a73174c403f76572248c541a10 --- folly/portability/OpenSSL.cpp | 6 +++++- folly/portability/OpenSSL.h | 1 + folly/ssl/OpenSSLCertUtils.cpp | 6 +++--- 3 files changed, 9 insertions(+), 4 deletions(-) diff --git a/folly/portability/OpenSSL.cpp b/folly/portability/OpenSSL.cpp index b1052dba..b5a638d2 100644 --- a/folly/portability/OpenSSL.cpp +++ b/folly/portability/OpenSSL.cpp @@ -83,7 +83,11 @@ const char* SSL_SESSION_get0_hostname(const SSL_SESSION* s) { return s->tlsext_hostname; } -EVP_MD_CTX* EVP_MD_CTX_new() { +unsigned char* ASN1_STRING_get0_data(const ASN1_STRING* x) { + return ASN1_STRING_data((ASN1_STRING*)x); +} + +EVP_MD_CTX* EVP_MD_CTX_new(void) { EVP_MD_CTX* ctx = (EVP_MD_CTX*)OPENSSL_malloc(sizeof(EVP_MD_CTX)); if (!ctx) { throw std::runtime_error("Cannot allocate EVP_MD_CTX"); diff --git a/folly/portability/OpenSSL.h b/folly/portability/OpenSSL.h index d5d0b0f6..fdcec290 100644 --- a/folly/portability/OpenSSL.h +++ b/folly/portability/OpenSSL.h @@ -116,6 +116,7 @@ int BIO_meth_set_read(BIO_METHOD* biom, int (*read)(BIO*, char*, int)); int BIO_meth_set_write(BIO_METHOD* biom, int (*write)(BIO*, const char*, int)); const char* SSL_SESSION_get0_hostname(const SSL_SESSION* s); +unsigned char* ASN1_STRING_get0_data(const ASN1_STRING* x); EVP_MD_CTX* EVP_MD_CTX_new(); void EVP_MD_CTX_free(EVP_MD_CTX* ctx); diff --git a/folly/ssl/OpenSSLCertUtils.cpp b/folly/ssl/OpenSSLCertUtils.cpp index 79800df8..9dbbe46a 100644 --- a/folly/ssl/OpenSSLCertUtils.cpp +++ b/folly/ssl/OpenSSLCertUtils.cpp @@ -43,7 +43,7 @@ Optional OpenSSLCertUtils::getCommonName(X509& x509) { return none; } - auto cnData = reinterpret_cast(ASN1_STRING_data(cnAsn)); + auto cnData = reinterpret_cast(ASN1_STRING_get0_data(cnAsn)); auto cnLen = ASN1_STRING_length(cnAsn); if (!cnData || cnLen <= 0) { return none; @@ -69,8 +69,8 @@ std::vector OpenSSLCertUtils::getSubjectAltNames(X509& x509) { if (!genName || genName->type != GEN_DNS) { continue; } - auto nameData = - reinterpret_cast(ASN1_STRING_data(genName->d.dNSName)); + auto nameData = reinterpret_cast( + ASN1_STRING_get0_data(genName->d.dNSName)); auto nameLen = ASN1_STRING_length(genName->d.dNSName); if (!nameData || nameLen <= 0) { continue; -- 2.34.1