diff options
| author | djm <> | 2012-10-13 21:23:50 +0000 |
|---|---|---|
| committer | djm <> | 2012-10-13 21:23:50 +0000 |
| commit | 228cae30b117c2493f69ad3c195341cd6ec8d430 (patch) | |
| tree | 29ff00b10d52c0978077c4fd83c33b065bade73e /src/lib/libcrypto/evp/evp_key.c | |
| parent | 731838c66b52c0ae5888333005b74115a620aa96 (diff) | |
| download | openbsd-228cae30b117c2493f69ad3c195341cd6ec8d430.tar.gz openbsd-228cae30b117c2493f69ad3c195341cd6ec8d430.tar.bz2 openbsd-228cae30b117c2493f69ad3c195341cd6ec8d430.zip | |
import OpenSSL-1.0.1c
Diffstat (limited to 'src/lib/libcrypto/evp/evp_key.c')
| -rw-r--r-- | src/lib/libcrypto/evp/evp_key.c | 27 |
1 files changed, 18 insertions, 9 deletions
diff --git a/src/lib/libcrypto/evp/evp_key.c b/src/lib/libcrypto/evp/evp_key.c index 839d6a3a16..7961fbebf2 100644 --- a/src/lib/libcrypto/evp/evp_key.c +++ b/src/lib/libcrypto/evp/evp_key.c | |||
| @@ -120,7 +120,7 @@ int EVP_BytesToKey(const EVP_CIPHER *type, const EVP_MD *md, | |||
| 120 | unsigned char md_buf[EVP_MAX_MD_SIZE]; | 120 | unsigned char md_buf[EVP_MAX_MD_SIZE]; |
| 121 | int niv,nkey,addmd=0; | 121 | int niv,nkey,addmd=0; |
| 122 | unsigned int mds=0,i; | 122 | unsigned int mds=0,i; |
| 123 | 123 | int rv = 0; | |
| 124 | nkey=type->key_len; | 124 | nkey=type->key_len; |
| 125 | niv=type->iv_len; | 125 | niv=type->iv_len; |
| 126 | OPENSSL_assert(nkey <= EVP_MAX_KEY_LENGTH); | 126 | OPENSSL_assert(nkey <= EVP_MAX_KEY_LENGTH); |
| @@ -134,17 +134,24 @@ int EVP_BytesToKey(const EVP_CIPHER *type, const EVP_MD *md, | |||
| 134 | if (!EVP_DigestInit_ex(&c,md, NULL)) | 134 | if (!EVP_DigestInit_ex(&c,md, NULL)) |
| 135 | return 0; | 135 | return 0; |
| 136 | if (addmd++) | 136 | if (addmd++) |
| 137 | EVP_DigestUpdate(&c,&(md_buf[0]),mds); | 137 | if (!EVP_DigestUpdate(&c,&(md_buf[0]),mds)) |
| 138 | EVP_DigestUpdate(&c,data,datal); | 138 | goto err; |
| 139 | if (!EVP_DigestUpdate(&c,data,datal)) | ||
| 140 | goto err; | ||
| 139 | if (salt != NULL) | 141 | if (salt != NULL) |
| 140 | EVP_DigestUpdate(&c,salt,PKCS5_SALT_LEN); | 142 | if (!EVP_DigestUpdate(&c,salt,PKCS5_SALT_LEN)) |
| 141 | EVP_DigestFinal_ex(&c,&(md_buf[0]),&mds); | 143 | goto err; |
| 144 | if (!EVP_DigestFinal_ex(&c,&(md_buf[0]),&mds)) | ||
| 145 | goto err; | ||
| 142 | 146 | ||
| 143 | for (i=1; i<(unsigned int)count; i++) | 147 | for (i=1; i<(unsigned int)count; i++) |
| 144 | { | 148 | { |
| 145 | EVP_DigestInit_ex(&c,md, NULL); | 149 | if (!EVP_DigestInit_ex(&c,md, NULL)) |
| 146 | EVP_DigestUpdate(&c,&(md_buf[0]),mds); | 150 | goto err; |
| 147 | EVP_DigestFinal_ex(&c,&(md_buf[0]),&mds); | 151 | if (!EVP_DigestUpdate(&c,&(md_buf[0]),mds)) |
| 152 | goto err; | ||
| 153 | if (!EVP_DigestFinal_ex(&c,&(md_buf[0]),&mds)) | ||
| 154 | goto err; | ||
| 148 | } | 155 | } |
| 149 | i=0; | 156 | i=0; |
| 150 | if (nkey) | 157 | if (nkey) |
| @@ -173,8 +180,10 @@ int EVP_BytesToKey(const EVP_CIPHER *type, const EVP_MD *md, | |||
| 173 | } | 180 | } |
| 174 | if ((nkey == 0) && (niv == 0)) break; | 181 | if ((nkey == 0) && (niv == 0)) break; |
| 175 | } | 182 | } |
| 183 | rv = type->key_len; | ||
| 184 | err: | ||
| 176 | EVP_MD_CTX_cleanup(&c); | 185 | EVP_MD_CTX_cleanup(&c); |
| 177 | OPENSSL_cleanse(&(md_buf[0]),EVP_MAX_MD_SIZE); | 186 | OPENSSL_cleanse(&(md_buf[0]),EVP_MAX_MD_SIZE); |
| 178 | return(type->key_len); | 187 | return rv; |
| 179 | } | 188 | } |
| 180 | 189 | ||
