diff options
author | beck <> | 2000-03-19 11:13:58 +0000 |
---|---|---|
committer | beck <> | 2000-03-19 11:13:58 +0000 |
commit | 796d609550df3a33fc11468741c5d2f6d3df4c11 (patch) | |
tree | 6c6d539061caa20372dad0ac4ddb1dfae2fbe7fe /src/lib/libcrypto/pkcs12/p12_kiss.c | |
parent | 5be3114c1fd7e0dfea1e38d3abb4cbba75244419 (diff) | |
download | openbsd-796d609550df3a33fc11468741c5d2f6d3df4c11.tar.gz openbsd-796d609550df3a33fc11468741c5d2f6d3df4c11.tar.bz2 openbsd-796d609550df3a33fc11468741c5d2f6d3df4c11.zip |
OpenSSL 0.9.5 merge
*warning* this bumps shared lib minors for libssl and libcrypto from 2.1 to 2.2
if you are using the ssl26 packages for ssh and other things to work you will
need to get new ones (see ~beck/libsslsnap/<arch>) on cvs or ~beck/src-patent.tar.gz on cvs
Diffstat (limited to 'src/lib/libcrypto/pkcs12/p12_kiss.c')
-rw-r--r-- | src/lib/libcrypto/pkcs12/p12_kiss.c | 30 |
1 files changed, 15 insertions, 15 deletions
diff --git a/src/lib/libcrypto/pkcs12/p12_kiss.c b/src/lib/libcrypto/pkcs12/p12_kiss.c index 767e1303da..08a60556e0 100644 --- a/src/lib/libcrypto/pkcs12/p12_kiss.c +++ b/src/lib/libcrypto/pkcs12/p12_kiss.c | |||
@@ -139,16 +139,16 @@ static int parse_pk12 (PKCS12 *p12, const char *pass, int passlen, | |||
139 | sk_pop_free (asafes, PKCS7_free); | 139 | sk_pop_free (asafes, PKCS7_free); |
140 | return 0; | 140 | return 0; |
141 | } | 141 | } |
142 | if (!parse_bags (bags, pass, passlen, pkey, cert, ca, | 142 | if (!parse_bags(bags, pass, passlen, pkey, cert, ca, |
143 | &keyid, &keymatch)) { | 143 | &keyid, &keymatch)) { |
144 | sk_pop_free (bags, PKCS12_SAFEBAG_free); | 144 | sk_pop_free(bags, PKCS12_SAFEBAG_free); |
145 | sk_pop_free (asafes, PKCS7_free); | 145 | sk_pop_free(asafes, PKCS7_free); |
146 | return 0; | 146 | return 0; |
147 | } | 147 | } |
148 | sk_pop_free (bags, PKCS12_SAFEBAG_free); | 148 | sk_pop_free(bags, PKCS12_SAFEBAG_free); |
149 | } | 149 | } |
150 | sk_pop_free (asafes, PKCS7_free); | 150 | sk_pop_free(asafes, PKCS7_free); |
151 | if (keyid) ASN1_OCTET_STRING_free (keyid); | 151 | if (keyid) M_ASN1_OCTET_STRING_free(keyid); |
152 | return 1; | 152 | return 1; |
153 | } | 153 | } |
154 | 154 | ||
@@ -158,8 +158,8 @@ static int parse_bags (STACK *bags, const char *pass, int passlen, | |||
158 | ASN1_OCTET_STRING **keyid, char *keymatch) | 158 | ASN1_OCTET_STRING **keyid, char *keymatch) |
159 | { | 159 | { |
160 | int i; | 160 | int i; |
161 | for (i = 0; i < sk_num (bags); i++) { | 161 | for (i = 0; i < sk_num(bags); i++) { |
162 | if (!parse_bag ((PKCS12_SAFEBAG *)sk_value (bags, i), | 162 | if (!parse_bag((PKCS12_SAFEBAG *)sk_value (bags, i), |
163 | pass, passlen, pkey, cert, ca, keyid, | 163 | pass, passlen, pkey, cert, ca, keyid, |
164 | keymatch)) return 0; | 164 | keymatch)) return 0; |
165 | } | 165 | } |
@@ -170,7 +170,7 @@ static int parse_bags (STACK *bags, const char *pass, int passlen, | |||
170 | #define MATCH_CERT 0x2 | 170 | #define MATCH_CERT 0x2 |
171 | #define MATCH_ALL 0x3 | 171 | #define MATCH_ALL 0x3 |
172 | 172 | ||
173 | static int parse_bag (PKCS12_SAFEBAG *bag, const char *pass, int passlen, | 173 | static int parse_bag(PKCS12_SAFEBAG *bag, const char *pass, int passlen, |
174 | EVP_PKEY **pkey, X509 **cert, STACK **ca, | 174 | EVP_PKEY **pkey, X509 **cert, STACK **ca, |
175 | ASN1_OCTET_STRING **keyid, | 175 | ASN1_OCTET_STRING **keyid, |
176 | char *keymatch) | 176 | char *keymatch) |
@@ -187,9 +187,9 @@ static int parse_bag (PKCS12_SAFEBAG *bag, const char *pass, int passlen, | |||
187 | /* Check for any local key id matching (if needed) */ | 187 | /* Check for any local key id matching (if needed) */ |
188 | if (lkey && ((*keymatch & MATCH_ALL) != MATCH_ALL)) { | 188 | if (lkey && ((*keymatch & MATCH_ALL) != MATCH_ALL)) { |
189 | if (*keyid) { | 189 | if (*keyid) { |
190 | if (ASN1_OCTET_STRING_cmp (*keyid, lkey)) lkey = NULL; | 190 | if (M_ASN1_OCTET_STRING_cmp(*keyid, lkey)) lkey = NULL; |
191 | } else { | 191 | } else { |
192 | if (!(*keyid = ASN1_OCTET_STRING_dup (lkey))) { | 192 | if (!(*keyid = M_ASN1_OCTET_STRING_dup(lkey))) { |
193 | PKCS12err(PKCS12_F_PARSE_BAGS,ERR_R_MALLOC_FAILURE); | 193 | PKCS12err(PKCS12_F_PARSE_BAGS,ERR_R_MALLOC_FAILURE); |
194 | return 0; | 194 | return 0; |
195 | } | 195 | } |
@@ -200,16 +200,16 @@ static int parse_bag (PKCS12_SAFEBAG *bag, const char *pass, int passlen, | |||
200 | { | 200 | { |
201 | case NID_keyBag: | 201 | case NID_keyBag: |
202 | if (!lkey || !pkey) return 1; | 202 | if (!lkey || !pkey) return 1; |
203 | if (!(*pkey = EVP_PKCS82PKEY (bag->value.keybag))) return 0; | 203 | if (!(*pkey = EVP_PKCS82PKEY(bag->value.keybag))) return 0; |
204 | *keymatch |= MATCH_KEY; | 204 | *keymatch |= MATCH_KEY; |
205 | break; | 205 | break; |
206 | 206 | ||
207 | case NID_pkcs8ShroudedKeyBag: | 207 | case NID_pkcs8ShroudedKeyBag: |
208 | if (!lkey || !pkey) return 1; | 208 | if (!lkey || !pkey) return 1; |
209 | if (!(p8 = M_PKCS12_decrypt_skey (bag, pass, passlen))) | 209 | if (!(p8 = M_PKCS12_decrypt_skey(bag, pass, passlen))) |
210 | return 0; | 210 | return 0; |
211 | *pkey = EVP_PKCS82PKEY (p8); | 211 | *pkey = EVP_PKCS82PKEY(p8); |
212 | PKCS8_PRIV_KEY_INFO_free (p8); | 212 | PKCS8_PRIV_KEY_INFO_free(p8); |
213 | if (!(*pkey)) return 0; | 213 | if (!(*pkey)) return 0; |
214 | *keymatch |= MATCH_KEY; | 214 | *keymatch |= MATCH_KEY; |
215 | break; | 215 | break; |