summaryrefslogtreecommitdiff
path: root/src
diff options
context:
space:
mode:
authortb <>2024-10-26 14:32:56 +0000
committertb <>2024-10-26 14:32:56 +0000
commitf39ebbbad9ab0d5e2ba7dd51a5bc98b6d4833786 (patch)
tree731ee78ecc126e814c0dbe2e0180c7b70a87b4ab /src
parent7ccf065af6f0457c33e36093dc03e479be111de9 (diff)
downloadopenbsd-f39ebbbad9ab0d5e2ba7dd51a5bc98b6d4833786.tar.gz
openbsd-f39ebbbad9ab0d5e2ba7dd51a5bc98b6d4833786.tar.bz2
openbsd-f39ebbbad9ab0d5e2ba7dd51a5bc98b6d4833786.zip
Mechanically rename priv_key to ec_privatekey
Diffstat (limited to 'src')
-rw-r--r--src/lib/libcrypto/ec/ec_asn1.c54
1 files changed, 27 insertions, 27 deletions
diff --git a/src/lib/libcrypto/ec/ec_asn1.c b/src/lib/libcrypto/ec/ec_asn1.c
index 4b5e11b381..3bb175873c 100644
--- a/src/lib/libcrypto/ec/ec_asn1.c
+++ b/src/lib/libcrypto/ec/ec_asn1.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: ec_asn1.c,v 1.79 2024/10/25 00:59:00 tb Exp $ */ 1/* $OpenBSD: ec_asn1.c,v 1.80 2024/10/26 14:32:56 tb Exp $ */
2/* 2/*
3 * Written by Nils Larsch for the OpenSSL project. 3 * Written by Nils Larsch for the OpenSSL project.
4 */ 4 */
@@ -1093,9 +1093,9 @@ EC_KEY *
1093d2i_ECPrivateKey(EC_KEY **a, const unsigned char **in, long len) 1093d2i_ECPrivateKey(EC_KEY **a, const unsigned char **in, long len)
1094{ 1094{
1095 EC_KEY *ret = NULL; 1095 EC_KEY *ret = NULL;
1096 EC_PRIVATEKEY *priv_key = NULL; 1096 EC_PRIVATEKEY *ec_privatekey = NULL;
1097 1097
1098 if ((priv_key = d2i_EC_PRIVATEKEY(NULL, in, len)) == NULL) { 1098 if ((ec_privatekey = d2i_EC_PRIVATEKEY(NULL, in, len)) == NULL) {
1099 ECerror(ERR_R_EC_LIB); 1099 ECerror(ERR_R_EC_LIB);
1100 return NULL; 1100 return NULL;
1101 } 1101 }
@@ -1107,20 +1107,20 @@ d2i_ECPrivateKey(EC_KEY **a, const unsigned char **in, long len)
1107 } else 1107 } else
1108 ret = *a; 1108 ret = *a;
1109 1109
1110 if (priv_key->parameters) { 1110 if (ec_privatekey->parameters) {
1111 EC_GROUP_free(ret->group); 1111 EC_GROUP_free(ret->group);
1112 ret->group = ec_asn1_pkparameters2group(priv_key->parameters); 1112 ret->group = ec_asn1_pkparameters2group(ec_privatekey->parameters);
1113 } 1113 }
1114 if (ret->group == NULL) { 1114 if (ret->group == NULL) {
1115 ECerror(ERR_R_EC_LIB); 1115 ECerror(ERR_R_EC_LIB);
1116 goto err; 1116 goto err;
1117 } 1117 }
1118 ret->version = priv_key->version; 1118 ret->version = ec_privatekey->version;
1119 1119
1120 if (priv_key->privateKey) { 1120 if (ec_privatekey->privateKey) {
1121 ret->priv_key = BN_bin2bn( 1121 ret->priv_key = BN_bin2bn(
1122 ASN1_STRING_data(priv_key->privateKey), 1122 ASN1_STRING_data(ec_privatekey->privateKey),
1123 ASN1_STRING_length(priv_key->privateKey), 1123 ASN1_STRING_length(ec_privatekey->privateKey),
1124 ret->priv_key); 1124 ret->priv_key);
1125 if (ret->priv_key == NULL) { 1125 if (ret->priv_key == NULL) {
1126 ECerror(ERR_R_BN_LIB); 1126 ECerror(ERR_R_BN_LIB);
@@ -1139,12 +1139,12 @@ d2i_ECPrivateKey(EC_KEY **a, const unsigned char **in, long len)
1139 goto err; 1139 goto err;
1140 } 1140 }
1141 1141
1142 if (priv_key->publicKey) { 1142 if (ec_privatekey->publicKey) {
1143 const unsigned char *pub_oct; 1143 const unsigned char *pub_oct;
1144 size_t pub_oct_len; 1144 size_t pub_oct_len;
1145 1145
1146 pub_oct = ASN1_STRING_data(priv_key->publicKey); 1146 pub_oct = ASN1_STRING_data(ec_privatekey->publicKey);
1147 pub_oct_len = ASN1_STRING_length(priv_key->publicKey); 1147 pub_oct_len = ASN1_STRING_length(ec_privatekey->publicKey);
1148 if (pub_oct == NULL || pub_oct_len <= 0) { 1148 if (pub_oct == NULL || pub_oct_len <= 0) {
1149 ECerror(EC_R_BUFFER_TOO_SMALL); 1149 ECerror(EC_R_BUFFER_TOO_SMALL);
1150 goto err; 1150 goto err;
@@ -1167,7 +1167,7 @@ d2i_ECPrivateKey(EC_KEY **a, const unsigned char **in, long len)
1167 ret->enc_flag |= EC_PKEY_NO_PUBKEY; 1167 ret->enc_flag |= EC_PKEY_NO_PUBKEY;
1168 } 1168 }
1169 1169
1170 EC_PRIVATEKEY_free(priv_key); 1170 EC_PRIVATEKEY_free(ec_privatekey);
1171 if (a != NULL) 1171 if (a != NULL)
1172 *a = ret; 1172 *a = ret;
1173 return (ret); 1173 return (ret);
@@ -1175,8 +1175,8 @@ d2i_ECPrivateKey(EC_KEY **a, const unsigned char **in, long len)
1175 err: 1175 err:
1176 if (a == NULL || *a != ret) 1176 if (a == NULL || *a != ret)
1177 EC_KEY_free(ret); 1177 EC_KEY_free(ret);
1178 if (priv_key) 1178 if (ec_privatekey)
1179 EC_PRIVATEKEY_free(priv_key); 1179 EC_PRIVATEKEY_free(ec_privatekey);
1180 1180
1181 return (NULL); 1181 return (NULL);
1182} 1182}
@@ -1188,18 +1188,18 @@ i2d_ECPrivateKey(EC_KEY *a, unsigned char **out)
1188 int ret = 0, ok = 0; 1188 int ret = 0, ok = 0;
1189 unsigned char *buffer = NULL; 1189 unsigned char *buffer = NULL;
1190 size_t buf_len = 0, tmp_len; 1190 size_t buf_len = 0, tmp_len;
1191 EC_PRIVATEKEY *priv_key = NULL; 1191 EC_PRIVATEKEY *ec_privatekey = NULL;
1192 1192
1193 if (a == NULL || a->group == NULL || a->priv_key == NULL || 1193 if (a == NULL || a->group == NULL || a->priv_key == NULL ||
1194 (!(a->enc_flag & EC_PKEY_NO_PUBKEY) && a->pub_key == NULL)) { 1194 (!(a->enc_flag & EC_PKEY_NO_PUBKEY) && a->pub_key == NULL)) {
1195 ECerror(ERR_R_PASSED_NULL_PARAMETER); 1195 ECerror(ERR_R_PASSED_NULL_PARAMETER);
1196 goto err; 1196 goto err;
1197 } 1197 }
1198 if ((priv_key = EC_PRIVATEKEY_new()) == NULL) { 1198 if ((ec_privatekey = EC_PRIVATEKEY_new()) == NULL) {
1199 ECerror(ERR_R_MALLOC_FAILURE); 1199 ECerror(ERR_R_MALLOC_FAILURE);
1200 goto err; 1200 goto err;
1201 } 1201 }
1202 priv_key->version = a->version; 1202 ec_privatekey->version = a->version;
1203 1203
1204 buf_len = (size_t) BN_num_bytes(a->priv_key); 1204 buf_len = (size_t) BN_num_bytes(a->priv_key);
1205 buffer = malloc(buf_len); 1205 buffer = malloc(buf_len);
@@ -1211,7 +1211,7 @@ i2d_ECPrivateKey(EC_KEY *a, unsigned char **out)
1211 ECerror(ERR_R_BN_LIB); 1211 ECerror(ERR_R_BN_LIB);
1212 goto err; 1212 goto err;
1213 } 1213 }
1214 if (!ASN1_STRING_set(priv_key->privateKey, buffer, buf_len)) { 1214 if (!ASN1_STRING_set(ec_privatekey->privateKey, buffer, buf_len)) {
1215 ECerror(ERR_R_ASN1_LIB); 1215 ECerror(ERR_R_ASN1_LIB);
1216 goto err; 1216 goto err;
1217 } 1217 }
@@ -1222,11 +1222,11 @@ i2d_ECPrivateKey(EC_KEY *a, unsigned char **out)
1222 ECerror(ERR_R_EC_LIB); 1222 ECerror(ERR_R_EC_LIB);
1223 goto err; 1223 goto err;
1224 } 1224 }
1225 priv_key->parameters = parameters; 1225 ec_privatekey->parameters = parameters;
1226 } 1226 }
1227 if (!(a->enc_flag & EC_PKEY_NO_PUBKEY) && a->pub_key != NULL) { 1227 if (!(a->enc_flag & EC_PKEY_NO_PUBKEY) && a->pub_key != NULL) {
1228 priv_key->publicKey = ASN1_BIT_STRING_new(); 1228 ec_privatekey->publicKey = ASN1_BIT_STRING_new();
1229 if (priv_key->publicKey == NULL) { 1229 if (ec_privatekey->publicKey == NULL) {
1230 ECerror(ERR_R_MALLOC_FAILURE); 1230 ECerror(ERR_R_MALLOC_FAILURE);
1231 goto err; 1231 goto err;
1232 } 1232 }
@@ -1247,24 +1247,24 @@ i2d_ECPrivateKey(EC_KEY *a, unsigned char **out)
1247 ECerror(ERR_R_EC_LIB); 1247 ECerror(ERR_R_EC_LIB);
1248 goto err; 1248 goto err;
1249 } 1249 }
1250 if (!ASN1_STRING_set(priv_key->publicKey, buffer, buf_len)) { 1250 if (!ASN1_STRING_set(ec_privatekey->publicKey, buffer, buf_len)) {
1251 ECerror(ERR_R_ASN1_LIB); 1251 ECerror(ERR_R_ASN1_LIB);
1252 goto err; 1252 goto err;
1253 } 1253 }
1254 if (!asn1_abs_set_unused_bits(priv_key->publicKey, 0)) { 1254 if (!asn1_abs_set_unused_bits(ec_privatekey->publicKey, 0)) {
1255 ECerror(ERR_R_ASN1_LIB); 1255 ECerror(ERR_R_ASN1_LIB);
1256 goto err; 1256 goto err;
1257 } 1257 }
1258 } 1258 }
1259 if ((ret = i2d_EC_PRIVATEKEY(priv_key, out)) == 0) { 1259 if ((ret = i2d_EC_PRIVATEKEY(ec_privatekey, out)) == 0) {
1260 ECerror(ERR_R_EC_LIB); 1260 ECerror(ERR_R_EC_LIB);
1261 goto err; 1261 goto err;
1262 } 1262 }
1263 ok = 1; 1263 ok = 1;
1264 err: 1264 err:
1265 free(buffer); 1265 free(buffer);
1266 if (priv_key) 1266 if (ec_privatekey)
1267 EC_PRIVATEKEY_free(priv_key); 1267 EC_PRIVATEKEY_free(ec_privatekey);
1268 return (ok ? ret : 0); 1268 return (ok ? ret : 0);
1269} 1269}
1270LCRYPTO_ALIAS(i2d_ECPrivateKey); 1270LCRYPTO_ALIAS(i2d_ECPrivateKey);