summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto/pkcs12/p12_kiss.c
diff options
context:
space:
mode:
authorbeck <>2000-03-19 11:13:58 +0000
committerbeck <>2000-03-19 11:13:58 +0000
commit796d609550df3a33fc11468741c5d2f6d3df4c11 (patch)
tree6c6d539061caa20372dad0ac4ddb1dfae2fbe7fe /src/lib/libcrypto/pkcs12/p12_kiss.c
parent5be3114c1fd7e0dfea1e38d3abb4cbba75244419 (diff)
downloadopenbsd-796d609550df3a33fc11468741c5d2f6d3df4c11.tar.gz
openbsd-796d609550df3a33fc11468741c5d2f6d3df4c11.tar.bz2
openbsd-796d609550df3a33fc11468741c5d2f6d3df4c11.zip
OpenSSL 0.9.5 merge
*warning* this bumps shared lib minors for libssl and libcrypto from 2.1 to 2.2 if you are using the ssl26 packages for ssh and other things to work you will need to get new ones (see ~beck/libsslsnap/<arch>) on cvs or ~beck/src-patent.tar.gz on cvs
Diffstat (limited to 'src/lib/libcrypto/pkcs12/p12_kiss.c')
-rw-r--r--src/lib/libcrypto/pkcs12/p12_kiss.c30
1 files changed, 15 insertions, 15 deletions
diff --git a/src/lib/libcrypto/pkcs12/p12_kiss.c b/src/lib/libcrypto/pkcs12/p12_kiss.c
index 767e1303da..08a60556e0 100644
--- a/src/lib/libcrypto/pkcs12/p12_kiss.c
+++ b/src/lib/libcrypto/pkcs12/p12_kiss.c
@@ -139,16 +139,16 @@ static int parse_pk12 (PKCS12 *p12, const char *pass, int passlen,
139 sk_pop_free (asafes, PKCS7_free); 139 sk_pop_free (asafes, PKCS7_free);
140 return 0; 140 return 0;
141 } 141 }
142 if (!parse_bags (bags, pass, passlen, pkey, cert, ca, 142 if (!parse_bags(bags, pass, passlen, pkey, cert, ca,
143 &keyid, &keymatch)) { 143 &keyid, &keymatch)) {
144 sk_pop_free (bags, PKCS12_SAFEBAG_free); 144 sk_pop_free(bags, PKCS12_SAFEBAG_free);
145 sk_pop_free (asafes, PKCS7_free); 145 sk_pop_free(asafes, PKCS7_free);
146 return 0; 146 return 0;
147 } 147 }
148 sk_pop_free (bags, PKCS12_SAFEBAG_free); 148 sk_pop_free(bags, PKCS12_SAFEBAG_free);
149 } 149 }
150 sk_pop_free (asafes, PKCS7_free); 150 sk_pop_free(asafes, PKCS7_free);
151 if (keyid) ASN1_OCTET_STRING_free (keyid); 151 if (keyid) M_ASN1_OCTET_STRING_free(keyid);
152 return 1; 152 return 1;
153} 153}
154 154
@@ -158,8 +158,8 @@ static int parse_bags (STACK *bags, const char *pass, int passlen,
158 ASN1_OCTET_STRING **keyid, char *keymatch) 158 ASN1_OCTET_STRING **keyid, char *keymatch)
159{ 159{
160 int i; 160 int i;
161 for (i = 0; i < sk_num (bags); i++) { 161 for (i = 0; i < sk_num(bags); i++) {
162 if (!parse_bag ((PKCS12_SAFEBAG *)sk_value (bags, i), 162 if (!parse_bag((PKCS12_SAFEBAG *)sk_value (bags, i),
163 pass, passlen, pkey, cert, ca, keyid, 163 pass, passlen, pkey, cert, ca, keyid,
164 keymatch)) return 0; 164 keymatch)) return 0;
165 } 165 }
@@ -170,7 +170,7 @@ static int parse_bags (STACK *bags, const char *pass, int passlen,
170#define MATCH_CERT 0x2 170#define MATCH_CERT 0x2
171#define MATCH_ALL 0x3 171#define MATCH_ALL 0x3
172 172
173static int parse_bag (PKCS12_SAFEBAG *bag, const char *pass, int passlen, 173static int parse_bag(PKCS12_SAFEBAG *bag, const char *pass, int passlen,
174 EVP_PKEY **pkey, X509 **cert, STACK **ca, 174 EVP_PKEY **pkey, X509 **cert, STACK **ca,
175 ASN1_OCTET_STRING **keyid, 175 ASN1_OCTET_STRING **keyid,
176 char *keymatch) 176 char *keymatch)
@@ -187,9 +187,9 @@ static int parse_bag (PKCS12_SAFEBAG *bag, const char *pass, int passlen,
187 /* Check for any local key id matching (if needed) */ 187 /* Check for any local key id matching (if needed) */
188 if (lkey && ((*keymatch & MATCH_ALL) != MATCH_ALL)) { 188 if (lkey && ((*keymatch & MATCH_ALL) != MATCH_ALL)) {
189 if (*keyid) { 189 if (*keyid) {
190 if (ASN1_OCTET_STRING_cmp (*keyid, lkey)) lkey = NULL; 190 if (M_ASN1_OCTET_STRING_cmp(*keyid, lkey)) lkey = NULL;
191 } else { 191 } else {
192 if (!(*keyid = ASN1_OCTET_STRING_dup (lkey))) { 192 if (!(*keyid = M_ASN1_OCTET_STRING_dup(lkey))) {
193 PKCS12err(PKCS12_F_PARSE_BAGS,ERR_R_MALLOC_FAILURE); 193 PKCS12err(PKCS12_F_PARSE_BAGS,ERR_R_MALLOC_FAILURE);
194 return 0; 194 return 0;
195 } 195 }
@@ -200,16 +200,16 @@ static int parse_bag (PKCS12_SAFEBAG *bag, const char *pass, int passlen,
200 { 200 {
201 case NID_keyBag: 201 case NID_keyBag:
202 if (!lkey || !pkey) return 1; 202 if (!lkey || !pkey) return 1;
203 if (!(*pkey = EVP_PKCS82PKEY (bag->value.keybag))) return 0; 203 if (!(*pkey = EVP_PKCS82PKEY(bag->value.keybag))) return 0;
204 *keymatch |= MATCH_KEY; 204 *keymatch |= MATCH_KEY;
205 break; 205 break;
206 206
207 case NID_pkcs8ShroudedKeyBag: 207 case NID_pkcs8ShroudedKeyBag:
208 if (!lkey || !pkey) return 1; 208 if (!lkey || !pkey) return 1;
209 if (!(p8 = M_PKCS12_decrypt_skey (bag, pass, passlen))) 209 if (!(p8 = M_PKCS12_decrypt_skey(bag, pass, passlen)))
210 return 0; 210 return 0;
211 *pkey = EVP_PKCS82PKEY (p8); 211 *pkey = EVP_PKCS82PKEY(p8);
212 PKCS8_PRIV_KEY_INFO_free (p8); 212 PKCS8_PRIV_KEY_INFO_free(p8);
213 if (!(*pkey)) return 0; 213 if (!(*pkey)) return 0;
214 *keymatch |= MATCH_KEY; 214 *keymatch |= MATCH_KEY;
215 break; 215 break;