File 0788-ssl-fix-compile-warnings-in-tests.patch of Package erlang

From ddde05aa2e878c7733e20446a4406a56d6a09745 Mon Sep 17 00:00:00 2001
From: Jakub Witczak <kuba@erlang.org>
Date: Thu, 2 Dec 2021 17:49:07 +0100
Subject: [PATCH] ssl: fix compile warnings in tests

---
 lib/ssl/test/inet_crypto_dist.erl   | 24 ++++++++++++------------
 lib/ssl/test/ssl_ECC.erl            |  2 --
 lib/ssl/test/ssl_api_SUITE.erl      |  2 +-
 lib/ssl/test/ssl_bench_test_lib.erl |  2 --
 lib/ssl/test/ssl_cert_tests.erl     |  8 +++-----
 lib/ssl/test/ssl_dist_test_lib.erl  |  2 --
 lib/ssl/test/ssl_test_lib.erl       |  4 +---
 lib/ssl/test/tls_api_SUITE.erl      |  2 +-
 8 files changed, 18 insertions(+), 28 deletions(-)

diff --git a/lib/ssl/test/inet_crypto_dist.erl b/lib/ssl/test/inet_crypto_dist.erl
index b8a2443ba2..8babe8ee5b 100644
--- a/lib/ssl/test/inet_crypto_dist.erl
+++ b/lib/ssl/test/inet_crypto_dist.erl
@@ -960,7 +960,8 @@ init_msg(
     MsgLen = byte_size(R1A) + TagLen + iolist_size(Plaintext),
     AAD = [<<MsgLen:32>>, R1A],
     {Ciphertext, Tag} =
-        crypto:block_encrypt(AeadCipher, Key1A, IV1A, {AAD, Plaintext, TagLen}),
+        crypto:crypto_one_time(AeadCipher, Key1A, IV1A,
+                               {AAD, Plaintext, TagLen}, true),
     Msg = [R1A, Tag, Ciphertext],
     {R2A, R3A, Msg}.
 %%
@@ -981,8 +982,8 @@ init_msg(
             MsgLen = byte_size(Msg),
             AAD = [<<MsgLen:32>>, R1B],
             case
-                crypto:block_decrypt(
-                  AeadCipher, Key1B, IV1B, {AAD, Ciphertext, Tag})
+                crypto:crypto_one_time(
+                  AeadCipher, Key1B, IV1B, {AAD, Ciphertext, Tag}, false)
             of
                 <<R2B:RLen/binary, R3B:RLen/binary, PubKeyB/binary>> ->
                     SharedSecret = compute_shared_secret(KeyPair, PubKeyB),
@@ -999,9 +1000,8 @@ init_msg(
                     StartMsgLen = TagLen + iolist_size(StartCleartext),
                     StartAAD = <<StartMsgLen:32>>,
                     {StartCiphertext, StartTag} =
-                        crypto:block_encrypt(
-                          AeadCipher, Key2A, IV2A,
-                          {StartAAD, StartCleartext, TagLen}),
+                        crypto:crypto_one_time(AeadCipher, Key2A, IV2A,
+                                             {StartAAD, StartCleartext, TagLen}, true),
                     StartMsg = [StartTag, StartCiphertext],
                     %%
                     {Key2B, IV2B} =
@@ -1032,8 +1032,8 @@ start_msg(
             MsgLen = byte_size(Msg),
             AAD = <<MsgLen:32>>,
             case
-                crypto:block_decrypt(
-                  AeadCipher, Key2B, IV2B, {AAD, Ciphertext, Tag})
+                crypto:crypto_one_time(
+                  AeadCipher, Key2B, IV2B, {AAD, Ciphertext, Tag}, false)
             of
                 <<R2A:RLen/binary, R3A:RLen/binary, RekeyCountB:32>>
                   when RekeyCountA =< (RekeyCountB bsl 2),
@@ -1044,7 +1044,7 @@ start_msg(
 
 hmac_key_iv(HmacAlgo, MacKey, Data, KeyLen, IVLen) ->
     <<Key:KeyLen/binary, IV:IVLen/binary>> =
-        crypto:hmac(HmacAlgo, MacKey, Data, KeyLen + IVLen),
+        crypto:macN(HmacAlgo, MacKey, Data, KeyLen + IVLen),
     {Key, IV}.
 
 %% -------------------------------------------------------------------------
@@ -1455,7 +1455,8 @@ encrypt_chunk(
     AAD = <<Seq:32, ChunkLen:32>>,
     IVBin = <<IVSalt/binary, (IVNo + Seq):48>>,
     {Ciphertext, CipherTag} =
-        crypto:block_encrypt(AeadCipher, Key, IVBin, {AAD, Cleartext, TagLen}),
+        crypto:crypto_one_time(AeadCipher, Key, IVBin,
+                               {AAD, Cleartext, TagLen}, true),
     Chunk = [Ciphertext,CipherTag],
     Chunk.
 
@@ -1488,8 +1489,7 @@ block_decrypt(
      rekey_key = #key_pair{public = PubKeyA} = KeyPair,
      rekey_count = RekeyCount} = Params,
   Seq, AeadCipher, Key, IV, Data) ->
-    %%
-    case crypto:block_decrypt(AeadCipher, Key, IV, Data) of
+    case crypto:crypto_one_time(AeadCipher, Key, IV, Data, false) of
         <<?REKEY_CHUNK, Rest/binary>> ->
             PubKeyLen = byte_size(PubKeyA),
             case Rest of
diff --git a/lib/ssl/test/ssl_ECC.erl b/lib/ssl/test/ssl_ECC.erl
index 73dafcd1fc..56b67361e1 100644
--- a/lib/ssl/test/ssl_ECC.erl
+++ b/lib/ssl/test/ssl_ECC.erl
@@ -23,8 +23,6 @@
 
 -module(ssl_ECC).
 
--behaviour(ct_suite).
-
 -include_lib("common_test/include/ct.hrl").
 -include_lib("public_key/include/public_key.hrl").
 
diff --git a/lib/ssl/test/ssl_bench_test_lib.erl b/lib/ssl/test/ssl_bench_test_lib.erl
index 74ab142993..cbb9cfe47a 100644
--- a/lib/ssl/test/ssl_bench_test_lib.erl
+++ b/lib/ssl/test/ssl_bench_test_lib.erl
@@ -19,8 +19,6 @@
 %%
 -module(ssl_bench_test_lib).
 
--behaviour(ct_suite).
-
 %% API
 -export([setup/1]).
 
diff --git a/lib/ssl/test/ssl_cert_tests.erl b/lib/ssl/test/ssl_cert_tests.erl
index a6760663f8..d57efbebc4 100644
--- a/lib/ssl/test/ssl_cert_tests.erl
+++ b/lib/ssl/test/ssl_cert_tests.erl
@@ -21,8 +21,6 @@
 %%
 -module(ssl_cert_tests).
 
--behaviour(ct_suite).
-
 -include_lib("public_key/include/public_key.hrl").
 
 %% Test cases
@@ -196,9 +194,9 @@ client_auth_partial_chain_fun_fail(Config) when is_list(Config) ->
     {ok, ServerCAs} = file:read_file(proplists:get_value(cacertfile, ServerOpts0)),
     [{_,_,_}, {_, IntermidiateCA, _} | _] = public_key:pem_decode(ServerCAs),
 
-    PartialChain =  fun(_CertChain) ->
-                            true = false %% crash on purpose
-		    end,
+    PartialChain = fun(_CertChain) ->
+                           error(crash_on_purpose)
+                   end,
     ServerOpts = [{cacerts, [IntermidiateCA]},
                   {partial_chain, PartialChain} |
                   proplists:delete(cacertfile, ServerOpts0)],
diff --git a/lib/ssl/test/ssl_dist_test_lib.erl b/lib/ssl/test/ssl_dist_test_lib.erl
index d0fda480b2..2dc5188195 100644
--- a/lib/ssl/test/ssl_dist_test_lib.erl
+++ b/lib/ssl/test/ssl_dist_test_lib.erl
@@ -20,8 +20,6 @@
 
 -module(ssl_dist_test_lib).
 
--behaviour(ct_suite).
-
 -include_lib("common_test/include/ct.hrl").
 -include_lib("public_key/include/public_key.hrl").
 -include("ssl_dist_test_lib.hrl").
diff --git a/lib/ssl/test/ssl_test_lib.erl b/lib/ssl/test/ssl_test_lib.erl
index 569efe499b..4ae989455e 100644
--- a/lib/ssl/test/ssl_test_lib.erl
+++ b/lib/ssl/test/ssl_test_lib.erl
@@ -21,8 +21,6 @@
 %%
 -module(ssl_test_lib).
 
--behaviour(ct_suite).
-
 -include_lib("common_test/include/ct.hrl").
 -include_lib("public_key/include/public_key.hrl").
 -include_lib("ssl/src/tls_handshake_1_3.hrl").
@@ -2865,7 +2863,7 @@ update_session_ticket_extension([Ticket|_], MaxEarlyDataSize) ->
     ct:log("~p:~p~nOverwrite max_early_data_size (from ~p to ~p)!",
                      [?MODULE, ?LINE, Size, MaxEarlyDataSize]),
     #{ticket := #new_session_ticket{
-                   extensions = #{early_data := Extensions0}} = NST0} = Ticket,
+                   extensions = #{early_data := _Extensions0}} = NST0} = Ticket,
     Extensions = #{early_data => #early_data_indication_nst{
                                     indication = MaxEarlyDataSize}},
     NST = NST0#new_session_ticket{extensions = Extensions},
diff --git a/lib/ssl/test/tls_api_SUITE.erl b/lib/ssl/test/tls_api_SUITE.erl
index a5f4fe3709..f41222a2a3 100644
--- a/lib/ssl/test/tls_api_SUITE.erl
+++ b/lib/ssl/test/tls_api_SUITE.erl
@@ -793,7 +793,7 @@ transport_close(Config) when is_list(Config) ->
 transport_close_in_inital_hello() ->
     [{doc, "Test what happens if server dies after calling transport_accept but before initiating handshake."}].
 transport_close_in_inital_hello(Config) when is_list(Config) ->
-    ClientOpts = ssl_test_lib:ssl_options(client_rsa_opts, Config),
+    _ClientOpts = ssl_test_lib:ssl_options(client_rsa_opts, Config),
     ServerOpts = ssl_test_lib:ssl_options(server_rsa_opts, Config),
     {_, _, Hostname} = ssl_test_lib:run_where(Config),
     process_flag(trap_exit, true),
-- 
2.31.1

openSUSE Build Service is sponsored by