keystore->public_key = X509_get_pubkey(keystore->x509_cert);
if (keystore->public_key) {
- switch (keystore->public_key->type) {
+#if OPENSSL_VERSION_NUMBER >= 0X10100000L
+ switch (EVP_PKEY_id(keystore->public_key)) {
+#else
+ switch (keystore->public_key->type) {
+#endif
case EVP_PKEY_RSA:
keystore->signAlgo = PARCSigningAlgorithm_RSA;
break;
#if OPENSSL_VERSION_NUMBER >= 0x10100000L
_hmacInit(ctx);
_hmacUpdate(ctx, to_digest_buffer, to_digest_length);
+ PARCBuffer *output = _hmacFinalize(ctx);
#else
_hmacInit(&ctx);
_hmacUpdate(&ctx, to_digest_buffer, to_digest_length);
-#endif
PARCBuffer *output = _hmacFinalize(&ctx);
+#endif
assertTrue(parcBuffer_Position(output) == true_hmac_length,
"hmac wrong length, expected %zu got %zu",
assertTrue(memcmp(parcByteArray_Array(parcBuffer_Array(output)), true_hmac_buffer, true_hmac_length) == 0,
"hmac values did not match");
+
#if OPENSSL_VERSION_NUMBER >= 0x10100000L
HMAC_CTX_free(ctx);
#else
#if OPENSSL_VERSION_NUMBER >= 0x10100000L
_hmacInit(ctx);
_hmacUpdate(ctx, to_digest_buffer, to_digest_length);
+ PARCBuffer *output = _hmacFinalize(ctx);
#else
_hmacInit(&ctx);
_hmacUpdate(&ctx, to_digest_buffer, to_digest_length);
-#endif
PARCBuffer *output = _hmacFinalize(&ctx);
+#endif
assertTrue(parcBuffer_Position(output) == true_hmac_length,
"hmac wrong length, expected %zu got %zu",