diff options
Diffstat (limited to 'src/lib/libcrypto/asn1/p5_pbev2.c')
-rw-r--r-- | src/lib/libcrypto/asn1/p5_pbev2.c | 14 |
1 files changed, 1 insertions, 13 deletions
diff --git a/src/lib/libcrypto/asn1/p5_pbev2.c b/src/lib/libcrypto/asn1/p5_pbev2.c index f967f25d3d..795721fad2 100644 --- a/src/lib/libcrypto/asn1/p5_pbev2.c +++ b/src/lib/libcrypto/asn1/p5_pbev2.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: p5_pbev2.c,v 1.20 2015/02/11 03:39:51 jsing Exp $ */ | 1 | /* $OpenBSD: p5_pbev2.c,v 1.21 2015/02/11 04:00:39 jsing Exp $ */ |
2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
3 | * project 1999-2004. | 3 | * project 1999-2004. |
4 | */ | 4 | */ |
@@ -68,15 +68,11 @@ | |||
68 | 68 | ||
69 | static const ASN1_TEMPLATE PBE2PARAM_seq_tt[] = { | 69 | static const ASN1_TEMPLATE PBE2PARAM_seq_tt[] = { |
70 | { | 70 | { |
71 | .flags = 0, | ||
72 | .tag = 0, | ||
73 | .offset = offsetof(PBE2PARAM, keyfunc), | 71 | .offset = offsetof(PBE2PARAM, keyfunc), |
74 | .field_name = "keyfunc", | 72 | .field_name = "keyfunc", |
75 | .item = &X509_ALGOR_it, | 73 | .item = &X509_ALGOR_it, |
76 | }, | 74 | }, |
77 | { | 75 | { |
78 | .flags = 0, | ||
79 | .tag = 0, | ||
80 | .offset = offsetof(PBE2PARAM, encryption), | 76 | .offset = offsetof(PBE2PARAM, encryption), |
81 | .field_name = "encryption", | 77 | .field_name = "encryption", |
82 | .item = &X509_ALGOR_it, | 78 | .item = &X509_ALGOR_it, |
@@ -88,7 +84,6 @@ const ASN1_ITEM PBE2PARAM_it = { | |||
88 | .utype = V_ASN1_SEQUENCE, | 84 | .utype = V_ASN1_SEQUENCE, |
89 | .templates = PBE2PARAM_seq_tt, | 85 | .templates = PBE2PARAM_seq_tt, |
90 | .tcount = sizeof(PBE2PARAM_seq_tt) / sizeof(ASN1_TEMPLATE), | 86 | .tcount = sizeof(PBE2PARAM_seq_tt) / sizeof(ASN1_TEMPLATE), |
91 | .funcs = NULL, | ||
92 | .size = sizeof(PBE2PARAM), | 87 | .size = sizeof(PBE2PARAM), |
93 | .sname = "PBE2PARAM", | 88 | .sname = "PBE2PARAM", |
94 | }; | 89 | }; |
@@ -121,29 +116,23 @@ PBE2PARAM_free(PBE2PARAM *a) | |||
121 | 116 | ||
122 | static const ASN1_TEMPLATE PBKDF2PARAM_seq_tt[] = { | 117 | static const ASN1_TEMPLATE PBKDF2PARAM_seq_tt[] = { |
123 | { | 118 | { |
124 | .flags = 0, | ||
125 | .tag = 0, | ||
126 | .offset = offsetof(PBKDF2PARAM, salt), | 119 | .offset = offsetof(PBKDF2PARAM, salt), |
127 | .field_name = "salt", | 120 | .field_name = "salt", |
128 | .item = &ASN1_ANY_it, | 121 | .item = &ASN1_ANY_it, |
129 | }, | 122 | }, |
130 | { | 123 | { |
131 | .flags = 0, | ||
132 | .tag = 0, | ||
133 | .offset = offsetof(PBKDF2PARAM, iter), | 124 | .offset = offsetof(PBKDF2PARAM, iter), |
134 | .field_name = "iter", | 125 | .field_name = "iter", |
135 | .item = &ASN1_INTEGER_it, | 126 | .item = &ASN1_INTEGER_it, |
136 | }, | 127 | }, |
137 | { | 128 | { |
138 | .flags = ASN1_TFLG_OPTIONAL, | 129 | .flags = ASN1_TFLG_OPTIONAL, |
139 | .tag = 0, | ||
140 | .offset = offsetof(PBKDF2PARAM, keylength), | 130 | .offset = offsetof(PBKDF2PARAM, keylength), |
141 | .field_name = "keylength", | 131 | .field_name = "keylength", |
142 | .item = &ASN1_INTEGER_it, | 132 | .item = &ASN1_INTEGER_it, |
143 | }, | 133 | }, |
144 | { | 134 | { |
145 | .flags = ASN1_TFLG_OPTIONAL, | 135 | .flags = ASN1_TFLG_OPTIONAL, |
146 | .tag = 0, | ||
147 | .offset = offsetof(PBKDF2PARAM, prf), | 136 | .offset = offsetof(PBKDF2PARAM, prf), |
148 | .field_name = "prf", | 137 | .field_name = "prf", |
149 | .item = &X509_ALGOR_it, | 138 | .item = &X509_ALGOR_it, |
@@ -155,7 +144,6 @@ const ASN1_ITEM PBKDF2PARAM_it = { | |||
155 | .utype = V_ASN1_SEQUENCE, | 144 | .utype = V_ASN1_SEQUENCE, |
156 | .templates = PBKDF2PARAM_seq_tt, | 145 | .templates = PBKDF2PARAM_seq_tt, |
157 | .tcount = sizeof(PBKDF2PARAM_seq_tt) / sizeof(ASN1_TEMPLATE), | 146 | .tcount = sizeof(PBKDF2PARAM_seq_tt) / sizeof(ASN1_TEMPLATE), |
158 | .funcs = NULL, | ||
159 | .size = sizeof(PBKDF2PARAM), | 147 | .size = sizeof(PBKDF2PARAM), |
160 | .sname = "PBKDF2PARAM", | 148 | .sname = "PBKDF2PARAM", |
161 | }; | 149 | }; |