diff options
Diffstat (limited to 'src/lib/libcrypto/asn1/n_pkey.c')
-rw-r--r-- | src/lib/libcrypto/asn1/n_pkey.c | 66 |
1 files changed, 33 insertions, 33 deletions
diff --git a/src/lib/libcrypto/asn1/n_pkey.c b/src/lib/libcrypto/asn1/n_pkey.c index 97647d17e1..a59640582e 100644 --- a/src/lib/libcrypto/asn1/n_pkey.c +++ b/src/lib/libcrypto/asn1/n_pkey.c | |||
@@ -70,21 +70,21 @@ | |||
70 | #ifndef OPENSSL_NO_RC4 | 70 | #ifndef OPENSSL_NO_RC4 |
71 | 71 | ||
72 | typedef struct netscape_pkey_st | 72 | typedef struct netscape_pkey_st |
73 | { | 73 | { |
74 | long version; | 74 | long version; |
75 | X509_ALGOR *algor; | 75 | X509_ALGOR *algor; |
76 | ASN1_OCTET_STRING *private_key; | 76 | ASN1_OCTET_STRING *private_key; |
77 | } NETSCAPE_PKEY; | 77 | } NETSCAPE_PKEY; |
78 | 78 | ||
79 | typedef struct netscape_encrypted_pkey_st | 79 | typedef struct netscape_encrypted_pkey_st |
80 | { | 80 | { |
81 | ASN1_OCTET_STRING *os; | 81 | ASN1_OCTET_STRING *os; |
82 | /* This is the same structure as DigestInfo so use it: | 82 | /* This is the same structure as DigestInfo so use it: |
83 | * although this isn't really anything to do with | 83 | * although this isn't really anything to do with |
84 | * digests. | 84 | * digests. |
85 | */ | 85 | */ |
86 | X509_SIG *enckey; | 86 | X509_SIG *enckey; |
87 | } NETSCAPE_ENCRYPTED_PKEY; | 87 | } NETSCAPE_ENCRYPTED_PKEY; |
88 | 88 | ||
89 | 89 | ||
90 | ASN1_BROKEN_SEQUENCE(NETSCAPE_ENCRYPTED_PKEY) = { | 90 | ASN1_BROKEN_SEQUENCE(NETSCAPE_ENCRYPTED_PKEY) = { |
@@ -121,7 +121,7 @@ int i2d_Netscape_RSA(const RSA *a, unsigned char **pp, | |||
121 | int i2d_RSA_NET(const RSA *a, unsigned char **pp, | 121 | int i2d_RSA_NET(const RSA *a, unsigned char **pp, |
122 | int (*cb)(char *buf, int len, const char *prompt, int verify), | 122 | int (*cb)(char *buf, int len, const char *prompt, int verify), |
123 | int sgckey) | 123 | int sgckey) |
124 | { | 124 | { |
125 | int i, j, ret = 0; | 125 | int i, j, ret = 0; |
126 | int rsalen, pkeylen, olen; | 126 | int rsalen, pkeylen, olen; |
127 | NETSCAPE_PKEY *pkey = NULL; | 127 | NETSCAPE_PKEY *pkey = NULL; |
@@ -160,36 +160,36 @@ int i2d_RSA_NET(const RSA *a, unsigned char **pp, | |||
160 | enckey->enckey->algor->parameter->type=V_ASN1_NULL; | 160 | enckey->enckey->algor->parameter->type=V_ASN1_NULL; |
161 | 161 | ||
162 | if (pp == NULL) | 162 | if (pp == NULL) |
163 | { | 163 | { |
164 | olen = i2d_NETSCAPE_ENCRYPTED_PKEY(enckey, NULL); | 164 | olen = i2d_NETSCAPE_ENCRYPTED_PKEY(enckey, NULL); |
165 | NETSCAPE_PKEY_free(pkey); | 165 | NETSCAPE_PKEY_free(pkey); |
166 | NETSCAPE_ENCRYPTED_PKEY_free(enckey); | 166 | NETSCAPE_ENCRYPTED_PKEY_free(enckey); |
167 | return olen; | 167 | return olen; |
168 | } | 168 | } |
169 | 169 | ||
170 | 170 | ||
171 | /* Since its RC4 encrypted length is actual length */ | 171 | /* Since its RC4 encrypted length is actual length */ |
172 | if ((zz=(unsigned char *)malloc(rsalen)) == NULL) | 172 | if ((zz=(unsigned char *)malloc(rsalen)) == NULL) |
173 | { | 173 | { |
174 | ASN1err(ASN1_F_I2D_RSA_NET,ERR_R_MALLOC_FAILURE); | 174 | ASN1err(ASN1_F_I2D_RSA_NET,ERR_R_MALLOC_FAILURE); |
175 | goto err; | 175 | goto err; |
176 | } | 176 | } |
177 | 177 | ||
178 | pkey->private_key->data = zz; | 178 | pkey->private_key->data = zz; |
179 | /* Write out private key encoding */ | 179 | /* Write out private key encoding */ |
180 | i2d_RSAPrivateKey(a,&zz); | 180 | i2d_RSAPrivateKey(a,&zz); |
181 | 181 | ||
182 | if ((zz=malloc(pkeylen)) == NULL) | 182 | if ((zz=malloc(pkeylen)) == NULL) |
183 | { | 183 | { |
184 | ASN1err(ASN1_F_I2D_RSA_NET,ERR_R_MALLOC_FAILURE); | 184 | ASN1err(ASN1_F_I2D_RSA_NET,ERR_R_MALLOC_FAILURE); |
185 | goto err; | 185 | goto err; |
186 | } | 186 | } |
187 | 187 | ||
188 | if (!ASN1_STRING_set(enckey->os, "private-key", -1)) | 188 | if (!ASN1_STRING_set(enckey->os, "private-key", -1)) |
189 | { | 189 | { |
190 | ASN1err(ASN1_F_I2D_RSA_NET,ERR_R_MALLOC_FAILURE); | 190 | ASN1err(ASN1_F_I2D_RSA_NET,ERR_R_MALLOC_FAILURE); |
191 | goto err; | 191 | goto err; |
192 | } | 192 | } |
193 | enckey->enckey->digest->data = zz; | 193 | enckey->enckey->digest->data = zz; |
194 | i2d_NETSCAPE_PKEY(pkey,&zz); | 194 | i2d_NETSCAPE_PKEY(pkey,&zz); |
195 | 195 | ||
@@ -200,10 +200,10 @@ int i2d_RSA_NET(const RSA *a, unsigned char **pp, | |||
200 | cb=EVP_read_pw_string; | 200 | cb=EVP_read_pw_string; |
201 | i=cb((char *)buf,256,"Enter Private Key password:",1); | 201 | i=cb((char *)buf,256,"Enter Private Key password:",1); |
202 | if (i != 0) | 202 | if (i != 0) |
203 | { | 203 | { |
204 | ASN1err(ASN1_F_I2D_RSA_NET,ASN1_R_BAD_PASSWORD_READ); | 204 | ASN1err(ASN1_F_I2D_RSA_NET,ASN1_R_BAD_PASSWORD_READ); |
205 | goto err; | 205 | goto err; |
206 | } | 206 | } |
207 | i = strlen((char *)buf); | 207 | i = strlen((char *)buf); |
208 | /* If the key is used for SGC the algorithm is modified a little. */ | 208 | /* If the key is used for SGC the algorithm is modified a little. */ |
209 | if(sgckey) { | 209 | if(sgckey) { |
@@ -211,7 +211,7 @@ int i2d_RSA_NET(const RSA *a, unsigned char **pp, | |||
211 | goto err; | 211 | goto err; |
212 | memcpy(buf + 16, "SGCKEYSALT", 10); | 212 | memcpy(buf + 16, "SGCKEYSALT", 10); |
213 | i = 26; | 213 | i = 26; |
214 | } | 214 | } |
215 | 215 | ||
216 | if (!EVP_BytesToKey(EVP_rc4(),EVP_md5(),NULL,buf,i,1,key,NULL)) | 216 | if (!EVP_BytesToKey(EVP_rc4(),EVP_md5(),NULL,buf,i,1,key,NULL)) |
217 | goto err; | 217 | goto err; |
@@ -232,7 +232,7 @@ err: | |||
232 | NETSCAPE_ENCRYPTED_PKEY_free(enckey); | 232 | NETSCAPE_ENCRYPTED_PKEY_free(enckey); |
233 | NETSCAPE_PKEY_free(pkey); | 233 | NETSCAPE_PKEY_free(pkey); |
234 | return(ret); | 234 | return(ret); |
235 | } | 235 | } |
236 | 236 | ||
237 | 237 | ||
238 | RSA *d2i_Netscape_RSA(RSA **a, const unsigned char **pp, long length, | 238 | RSA *d2i_Netscape_RSA(RSA **a, const unsigned char **pp, long length, |
@@ -245,7 +245,7 @@ RSA *d2i_Netscape_RSA(RSA **a, const unsigned char **pp, long length, | |||
245 | RSA *d2i_RSA_NET(RSA **a, const unsigned char **pp, long length, | 245 | RSA *d2i_RSA_NET(RSA **a, const unsigned char **pp, long length, |
246 | int (*cb)(char *buf, int len, const char *prompt, int verify), | 246 | int (*cb)(char *buf, int len, const char *prompt, int verify), |
247 | int sgckey) | 247 | int sgckey) |
248 | { | 248 | { |
249 | RSA *ret=NULL; | 249 | RSA *ret=NULL; |
250 | const unsigned char *p; | 250 | const unsigned char *p; |
251 | NETSCAPE_ENCRYPTED_PKEY *enckey = NULL; | 251 | NETSCAPE_ENCRYPTED_PKEY *enckey = NULL; |
@@ -256,20 +256,20 @@ RSA *d2i_RSA_NET(RSA **a, const unsigned char **pp, long length, | |||
256 | if(!enckey) { | 256 | if(!enckey) { |
257 | ASN1err(ASN1_F_D2I_RSA_NET,ASN1_R_DECODING_ERROR); | 257 | ASN1err(ASN1_F_D2I_RSA_NET,ASN1_R_DECODING_ERROR); |
258 | return NULL; | 258 | return NULL; |
259 | } | 259 | } |
260 | 260 | ||
261 | if ((enckey->os->length != 11) || (strncmp("private-key", | 261 | if ((enckey->os->length != 11) || (strncmp("private-key", |
262 | (char *)enckey->os->data,11) != 0)) | 262 | (char *)enckey->os->data,11) != 0)) |
263 | { | 263 | { |
264 | ASN1err(ASN1_F_D2I_RSA_NET,ASN1_R_PRIVATE_KEY_HEADER_MISSING); | 264 | ASN1err(ASN1_F_D2I_RSA_NET,ASN1_R_PRIVATE_KEY_HEADER_MISSING); |
265 | NETSCAPE_ENCRYPTED_PKEY_free(enckey); | 265 | NETSCAPE_ENCRYPTED_PKEY_free(enckey); |
266 | return NULL; | 266 | return NULL; |
267 | } | 267 | } |
268 | if (OBJ_obj2nid(enckey->enckey->algor->algorithm) != NID_rc4) | 268 | if (OBJ_obj2nid(enckey->enckey->algor->algorithm) != NID_rc4) |
269 | { | 269 | { |
270 | ASN1err(ASN1_F_D2I_RSA_NET,ASN1_R_UNSUPPORTED_ENCRYPTION_ALGORITHM); | 270 | ASN1err(ASN1_F_D2I_RSA_NET,ASN1_R_UNSUPPORTED_ENCRYPTION_ALGORITHM); |
271 | goto err; | 271 | goto err; |
272 | } | 272 | } |
273 | if (cb == NULL) | 273 | if (cb == NULL) |
274 | cb=EVP_read_pw_string; | 274 | cb=EVP_read_pw_string; |
275 | if ((ret=d2i_RSA_NET_2(a, enckey->enckey->digest,cb, sgckey)) == NULL) goto err; | 275 | if ((ret=d2i_RSA_NET_2(a, enckey->enckey->digest,cb, sgckey)) == NULL) goto err; |
@@ -280,12 +280,12 @@ RSA *d2i_RSA_NET(RSA **a, const unsigned char **pp, long length, | |||
280 | NETSCAPE_ENCRYPTED_PKEY_free(enckey); | 280 | NETSCAPE_ENCRYPTED_PKEY_free(enckey); |
281 | return ret; | 281 | return ret; |
282 | 282 | ||
283 | } | 283 | } |
284 | 284 | ||
285 | static RSA *d2i_RSA_NET_2(RSA **a, ASN1_OCTET_STRING *os, | 285 | static RSA *d2i_RSA_NET_2(RSA **a, ASN1_OCTET_STRING *os, |
286 | int (*cb)(char *buf, int len, const char *prompt, | 286 | int (*cb)(char *buf, int len, const char *prompt, |
287 | int verify), int sgckey) | 287 | int verify), int sgckey) |
288 | { | 288 | { |
289 | NETSCAPE_PKEY *pkey=NULL; | 289 | NETSCAPE_PKEY *pkey=NULL; |
290 | RSA *ret=NULL; | 290 | RSA *ret=NULL; |
291 | int i,j; | 291 | int i,j; |
@@ -297,10 +297,10 @@ static RSA *d2i_RSA_NET_2(RSA **a, ASN1_OCTET_STRING *os, | |||
297 | 297 | ||
298 | i=cb((char *)buf,256,"Enter Private Key password:",0); | 298 | i=cb((char *)buf,256,"Enter Private Key password:",0); |
299 | if (i != 0) | 299 | if (i != 0) |
300 | { | 300 | { |
301 | ASN1err(ASN1_F_D2I_RSA_NET_2,ASN1_R_BAD_PASSWORD_READ); | 301 | ASN1err(ASN1_F_D2I_RSA_NET_2,ASN1_R_BAD_PASSWORD_READ); |
302 | goto err; | 302 | goto err; |
303 | } | 303 | } |
304 | 304 | ||
305 | i = strlen((char *)buf); | 305 | i = strlen((char *)buf); |
306 | if(sgckey){ | 306 | if(sgckey){ |
@@ -308,7 +308,7 @@ static RSA *d2i_RSA_NET_2(RSA **a, ASN1_OCTET_STRING *os, | |||
308 | goto err; | 308 | goto err; |
309 | memcpy(buf + 16, "SGCKEYSALT", 10); | 309 | memcpy(buf + 16, "SGCKEYSALT", 10); |
310 | i = 26; | 310 | i = 26; |
311 | } | 311 | } |
312 | 312 | ||
313 | if (!EVP_BytesToKey(EVP_rc4(),EVP_md5(),NULL,buf,i,1,key,NULL)) | 313 | if (!EVP_BytesToKey(EVP_rc4(),EVP_md5(),NULL,buf,i,1,key,NULL)) |
314 | goto err; | 314 | goto err; |
@@ -325,22 +325,22 @@ static RSA *d2i_RSA_NET_2(RSA **a, ASN1_OCTET_STRING *os, | |||
325 | zz=os->data; | 325 | zz=os->data; |
326 | 326 | ||
327 | if ((pkey=d2i_NETSCAPE_PKEY(NULL,&zz,os->length)) == NULL) | 327 | if ((pkey=d2i_NETSCAPE_PKEY(NULL,&zz,os->length)) == NULL) |
328 | { | 328 | { |
329 | ASN1err(ASN1_F_D2I_RSA_NET_2,ASN1_R_UNABLE_TO_DECODE_RSA_PRIVATE_KEY); | 329 | ASN1err(ASN1_F_D2I_RSA_NET_2,ASN1_R_UNABLE_TO_DECODE_RSA_PRIVATE_KEY); |
330 | goto err; | 330 | goto err; |
331 | } | 331 | } |
332 | 332 | ||
333 | zz=pkey->private_key->data; | 333 | zz=pkey->private_key->data; |
334 | if ((ret=d2i_RSAPrivateKey(a,&zz,pkey->private_key->length)) == NULL) | 334 | if ((ret=d2i_RSAPrivateKey(a,&zz,pkey->private_key->length)) == NULL) |
335 | { | 335 | { |
336 | ASN1err(ASN1_F_D2I_RSA_NET_2,ASN1_R_UNABLE_TO_DECODE_RSA_KEY); | 336 | ASN1err(ASN1_F_D2I_RSA_NET_2,ASN1_R_UNABLE_TO_DECODE_RSA_KEY); |
337 | goto err; | 337 | goto err; |
338 | } | 338 | } |
339 | err: | 339 | err: |
340 | EVP_CIPHER_CTX_cleanup(&ctx); | 340 | EVP_CIPHER_CTX_cleanup(&ctx); |
341 | NETSCAPE_PKEY_free(pkey); | 341 | NETSCAPE_PKEY_free(pkey); |
342 | return(ret); | 342 | return(ret); |
343 | } | 343 | } |
344 | 344 | ||
345 | #endif /* OPENSSL_NO_RC4 */ | 345 | #endif /* OPENSSL_NO_RC4 */ |
346 | 346 | ||