diff options
| author | tb <> | 2018-08-24 20:09:56 +0000 |
|---|---|---|
| committer | tb <> | 2018-08-24 20:09:56 +0000 |
| commit | 7933a0871b35f614a35f0194835c1415d26609d0 (patch) | |
| tree | 4cd224709219e2a0059f15e4e8e8b5b467ccc986 /src | |
| parent | 41189be79309f39d1bf45f50b75751b6ac97529c (diff) | |
| download | openbsd-7933a0871b35f614a35f0194835c1415d26609d0.tar.gz openbsd-7933a0871b35f614a35f0194835c1415d26609d0.tar.bz2 openbsd-7933a0871b35f614a35f0194835c1415d26609d0.zip | |
Stop handling broken PKCS#8 formats in openssl(1).
ok jsing
Diffstat (limited to 'src')
| -rw-r--r-- | src/usr.bin/openssl/pkcs8.c | 54 |
1 files changed, 2 insertions, 52 deletions
diff --git a/src/usr.bin/openssl/pkcs8.c b/src/usr.bin/openssl/pkcs8.c index a0dac88772..0327898903 100644 --- a/src/usr.bin/openssl/pkcs8.c +++ b/src/usr.bin/openssl/pkcs8.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: pkcs8.c,v 1.11 2018/02/07 05:47:55 jsing Exp $ */ | 1 | /* $OpenBSD: pkcs8.c,v 1.12 2018/08/24 20:09:56 tb Exp $ */ |
| 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
| 3 | * project 1999-2004. | 3 | * project 1999-2004. |
| 4 | */ | 4 | */ |
| @@ -75,7 +75,6 @@ static struct { | |||
| 75 | int nocrypt; | 75 | int nocrypt; |
| 76 | char *outfile; | 76 | char *outfile; |
| 77 | int outformat; | 77 | int outformat; |
| 78 | int p8_broken; | ||
| 79 | char *passargin; | 78 | char *passargin; |
| 80 | char *passargout; | 79 | char *passargout; |
| 81 | int pbe_nid; | 80 | int pbe_nid; |
| @@ -106,13 +105,6 @@ pkcs8_opt_v2(char *arg) | |||
| 106 | 105 | ||
| 107 | static struct option pkcs8_options[] = { | 106 | static struct option pkcs8_options[] = { |
| 108 | { | 107 | { |
| 109 | .name = "embed", | ||
| 110 | .desc = "Generate DSA keys in a broken format", | ||
| 111 | .type = OPTION_VALUE, | ||
| 112 | .value = PKCS8_EMBEDDED_PARAM, | ||
| 113 | .opt.value = &pkcs8_config.p8_broken, | ||
| 114 | }, | ||
| 115 | { | ||
| 116 | .name = "in", | 108 | .name = "in", |
| 117 | .argname = "file", | 109 | .argname = "file", |
| 118 | .desc = "Input file (default stdin)", | 110 | .desc = "Input file (default stdin)", |
| @@ -140,20 +132,6 @@ static struct option pkcs8_options[] = { | |||
| 140 | .opt.value = &pkcs8_config.iter, | 132 | .opt.value = &pkcs8_config.iter, |
| 141 | }, | 133 | }, |
| 142 | { | 134 | { |
| 143 | .name = "nooct", | ||
| 144 | .desc = "Generate RSA keys in a broken format (no octet)", | ||
| 145 | .type = OPTION_VALUE, | ||
| 146 | .value = PKCS8_NO_OCTET, | ||
| 147 | .opt.value = &pkcs8_config.p8_broken, | ||
| 148 | }, | ||
| 149 | { | ||
| 150 | .name = "nsdb", | ||
| 151 | .desc = "Generate DSA keys in the broken Netscape DB format", | ||
| 152 | .type = OPTION_VALUE, | ||
| 153 | .value = PKCS8_NS_DB, | ||
| 154 | .opt.value = &pkcs8_config.p8_broken, | ||
| 155 | }, | ||
| 156 | { | ||
| 157 | .name = "out", | 135 | .name = "out", |
| 158 | .argname = "file", | 136 | .argname = "file", |
| 159 | .desc = "Output file (default stdout)", | 137 | .desc = "Output file (default stdout)", |
| @@ -238,7 +216,6 @@ pkcs8_main(int argc, char **argv) | |||
| 238 | pkcs8_config.iter = PKCS12_DEFAULT_ITER; | 216 | pkcs8_config.iter = PKCS12_DEFAULT_ITER; |
| 239 | pkcs8_config.informat = FORMAT_PEM; | 217 | pkcs8_config.informat = FORMAT_PEM; |
| 240 | pkcs8_config.outformat = FORMAT_PEM; | 218 | pkcs8_config.outformat = FORMAT_PEM; |
| 241 | pkcs8_config.p8_broken = PKCS8_OK; | ||
| 242 | pkcs8_config.pbe_nid = -1; | 219 | pkcs8_config.pbe_nid = -1; |
| 243 | 220 | ||
| 244 | if (options_parse(argc, argv, pkcs8_options, NULL, NULL) != 0) { | 221 | if (options_parse(argc, argv, pkcs8_options, NULL, NULL) != 0) { |
| @@ -278,8 +255,7 @@ pkcs8_main(int argc, char **argv) | |||
| 278 | pkcs8_config.informat, 1, passin, "key"); | 255 | pkcs8_config.informat, 1, passin, "key"); |
| 279 | if (!pkey) | 256 | if (!pkey) |
| 280 | goto end; | 257 | goto end; |
| 281 | if (!(p8inf = EVP_PKEY2PKCS8_broken(pkey, | 258 | if (!(p8inf = EVP_PKEY2PKCS8(pkey))) { |
| 282 | pkcs8_config.p8_broken))) { | ||
| 283 | BIO_printf(bio_err, "Error converting key\n"); | 259 | BIO_printf(bio_err, "Error converting key\n"); |
| 284 | ERR_print_errors(bio_err); | 260 | ERR_print_errors(bio_err); |
| 285 | goto end; | 261 | goto end; |
| @@ -369,32 +345,6 @@ pkcs8_main(int argc, char **argv) | |||
| 369 | ERR_print_errors(bio_err); | 345 | ERR_print_errors(bio_err); |
| 370 | goto end; | 346 | goto end; |
| 371 | } | 347 | } |
| 372 | if (p8inf->broken) { | ||
| 373 | BIO_printf(bio_err, "Warning: broken key encoding: "); | ||
| 374 | switch (p8inf->broken) { | ||
| 375 | case PKCS8_NO_OCTET: | ||
| 376 | BIO_printf(bio_err, "No Octet String in PrivateKey\n"); | ||
| 377 | break; | ||
| 378 | |||
| 379 | case PKCS8_EMBEDDED_PARAM: | ||
| 380 | BIO_printf(bio_err, | ||
| 381 | "DSA parameters included in PrivateKey\n"); | ||
| 382 | break; | ||
| 383 | |||
| 384 | case PKCS8_NS_DB: | ||
| 385 | BIO_printf(bio_err, | ||
| 386 | "DSA public key include in PrivateKey\n"); | ||
| 387 | break; | ||
| 388 | |||
| 389 | case PKCS8_NEG_PRIVKEY: | ||
| 390 | BIO_printf(bio_err, "DSA private key value is negative\n"); | ||
| 391 | break; | ||
| 392 | |||
| 393 | default: | ||
| 394 | BIO_printf(bio_err, "Unknown broken type\n"); | ||
| 395 | break; | ||
| 396 | } | ||
| 397 | } | ||
| 398 | if (pkcs8_config.outformat == FORMAT_PEM) | 348 | if (pkcs8_config.outformat == FORMAT_PEM) |
| 399 | PEM_write_bio_PrivateKey(out, pkey, NULL, NULL, 0, NULL, | 349 | PEM_write_bio_PrivateKey(out, pkey, NULL, NULL, 0, NULL, |
| 400 | passout); | 350 | passout); |
