diff options
Diffstat (limited to 'src/lib/libcrypto/evp/evp_pbe.c')
-rw-r--r-- | src/lib/libcrypto/evp/evp_pbe.c | 17 |
1 files changed, 8 insertions, 9 deletions
diff --git a/src/lib/libcrypto/evp/evp_pbe.c b/src/lib/libcrypto/evp/evp_pbe.c index c7f0c7749a..de08c8d78c 100644 --- a/src/lib/libcrypto/evp/evp_pbe.c +++ b/src/lib/libcrypto/evp/evp_pbe.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: evp_pbe.c,v 1.24 2017/01/21 04:38:23 jsing Exp $ */ | 1 | /* $OpenBSD: evp_pbe.c,v 1.25 2017/01/29 17:49:23 beck Exp $ */ |
2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
3 | * project 1999. | 3 | * project 1999. |
4 | */ | 4 | */ |
@@ -128,7 +128,7 @@ EVP_PBE_CipherInit(ASN1_OBJECT *pbe_obj, const char *pass, int passlen, | |||
128 | if (!EVP_PBE_find(EVP_PBE_TYPE_OUTER, OBJ_obj2nid(pbe_obj), | 128 | if (!EVP_PBE_find(EVP_PBE_TYPE_OUTER, OBJ_obj2nid(pbe_obj), |
129 | &cipher_nid, &md_nid, &keygen)) { | 129 | &cipher_nid, &md_nid, &keygen)) { |
130 | char obj_tmp[80]; | 130 | char obj_tmp[80]; |
131 | EVPerr(EVP_F_EVP_PBE_CIPHERINIT, EVP_R_UNKNOWN_PBE_ALGORITHM); | 131 | EVPerror(EVP_R_UNKNOWN_PBE_ALGORITHM); |
132 | if (!pbe_obj) | 132 | if (!pbe_obj) |
133 | strlcpy(obj_tmp, "NULL", sizeof obj_tmp); | 133 | strlcpy(obj_tmp, "NULL", sizeof obj_tmp); |
134 | else | 134 | else |
@@ -147,7 +147,7 @@ EVP_PBE_CipherInit(ASN1_OBJECT *pbe_obj, const char *pass, int passlen, | |||
147 | else { | 147 | else { |
148 | cipher = EVP_get_cipherbynid(cipher_nid); | 148 | cipher = EVP_get_cipherbynid(cipher_nid); |
149 | if (!cipher) { | 149 | if (!cipher) { |
150 | EVPerr(EVP_F_EVP_PBE_CIPHERINIT, EVP_R_UNKNOWN_CIPHER); | 150 | EVPerror(EVP_R_UNKNOWN_CIPHER); |
151 | return 0; | 151 | return 0; |
152 | } | 152 | } |
153 | } | 153 | } |
@@ -157,13 +157,13 @@ EVP_PBE_CipherInit(ASN1_OBJECT *pbe_obj, const char *pass, int passlen, | |||
157 | else { | 157 | else { |
158 | md = EVP_get_digestbynid(md_nid); | 158 | md = EVP_get_digestbynid(md_nid); |
159 | if (!md) { | 159 | if (!md) { |
160 | EVPerr(EVP_F_EVP_PBE_CIPHERINIT, EVP_R_UNKNOWN_DIGEST); | 160 | EVPerror(EVP_R_UNKNOWN_DIGEST); |
161 | return 0; | 161 | return 0; |
162 | } | 162 | } |
163 | } | 163 | } |
164 | 164 | ||
165 | if (!keygen(ctx, pass, passlen, param, cipher, md, en_de)) { | 165 | if (!keygen(ctx, pass, passlen, param, cipher, md, en_de)) { |
166 | EVPerr(EVP_F_EVP_PBE_CIPHERINIT, EVP_R_KEYGEN_FAILURE); | 166 | EVPerror(EVP_R_KEYGEN_FAILURE); |
167 | return 0; | 167 | return 0; |
168 | } | 168 | } |
169 | return 1; | 169 | return 1; |
@@ -222,14 +222,13 @@ EVP_PBE_alg_add_type(int pbe_type, int pbe_nid, int cipher_nid, int md_nid, | |||
222 | if (pbe_algs == NULL) { | 222 | if (pbe_algs == NULL) { |
223 | pbe_algs = sk_EVP_PBE_CTL_new(pbe_cmp); | 223 | pbe_algs = sk_EVP_PBE_CTL_new(pbe_cmp); |
224 | if (pbe_algs == NULL) { | 224 | if (pbe_algs == NULL) { |
225 | EVPerr(EVP_F_EVP_PBE_ALG_ADD_TYPE, | 225 | EVPerror(ERR_R_MALLOC_FAILURE); |
226 | ERR_R_MALLOC_FAILURE); | ||
227 | return 0; | 226 | return 0; |
228 | } | 227 | } |
229 | } | 228 | } |
230 | pbe_tmp = malloc(sizeof(EVP_PBE_CTL)); | 229 | pbe_tmp = malloc(sizeof(EVP_PBE_CTL)); |
231 | if (pbe_tmp == NULL) { | 230 | if (pbe_tmp == NULL) { |
232 | EVPerr(EVP_F_EVP_PBE_ALG_ADD_TYPE, ERR_R_MALLOC_FAILURE); | 231 | EVPerror(ERR_R_MALLOC_FAILURE); |
233 | return 0; | 232 | return 0; |
234 | } | 233 | } |
235 | pbe_tmp->pbe_type = pbe_type; | 234 | pbe_tmp->pbe_type = pbe_type; |
@@ -240,7 +239,7 @@ EVP_PBE_alg_add_type(int pbe_type, int pbe_nid, int cipher_nid, int md_nid, | |||
240 | 239 | ||
241 | if (sk_EVP_PBE_CTL_push(pbe_algs, pbe_tmp) == 0) { | 240 | if (sk_EVP_PBE_CTL_push(pbe_algs, pbe_tmp) == 0) { |
242 | free(pbe_tmp); | 241 | free(pbe_tmp); |
243 | EVPerr(EVP_F_EVP_PBE_ALG_ADD_TYPE, ERR_R_MALLOC_FAILURE); | 242 | EVPerror(ERR_R_MALLOC_FAILURE); |
244 | return 0; | 243 | return 0; |
245 | } | 244 | } |
246 | return 1; | 245 | return 1; |