diff options
Diffstat (limited to 'src/lib/libcrypto/pkcs12/p12_kiss.c')
-rw-r--r-- | src/lib/libcrypto/pkcs12/p12_kiss.c | 30 |
1 files changed, 15 insertions, 15 deletions
diff --git a/src/lib/libcrypto/pkcs12/p12_kiss.c b/src/lib/libcrypto/pkcs12/p12_kiss.c index 767e1303da..08a60556e0 100644 --- a/src/lib/libcrypto/pkcs12/p12_kiss.c +++ b/src/lib/libcrypto/pkcs12/p12_kiss.c | |||
@@ -139,16 +139,16 @@ static int parse_pk12 (PKCS12 *p12, const char *pass, int passlen, | |||
139 | sk_pop_free (asafes, PKCS7_free); | 139 | sk_pop_free (asafes, PKCS7_free); |
140 | return 0; | 140 | return 0; |
141 | } | 141 | } |
142 | if (!parse_bags (bags, pass, passlen, pkey, cert, ca, | 142 | if (!parse_bags(bags, pass, passlen, pkey, cert, ca, |
143 | &keyid, &keymatch)) { | 143 | &keyid, &keymatch)) { |
144 | sk_pop_free (bags, PKCS12_SAFEBAG_free); | 144 | sk_pop_free(bags, PKCS12_SAFEBAG_free); |
145 | sk_pop_free (asafes, PKCS7_free); | 145 | sk_pop_free(asafes, PKCS7_free); |
146 | return 0; | 146 | return 0; |
147 | } | 147 | } |
148 | sk_pop_free (bags, PKCS12_SAFEBAG_free); | 148 | sk_pop_free(bags, PKCS12_SAFEBAG_free); |
149 | } | 149 | } |
150 | sk_pop_free (asafes, PKCS7_free); | 150 | sk_pop_free(asafes, PKCS7_free); |
151 | if (keyid) ASN1_OCTET_STRING_free (keyid); | 151 | if (keyid) M_ASN1_OCTET_STRING_free(keyid); |
152 | return 1; | 152 | return 1; |
153 | } | 153 | } |
154 | 154 | ||
@@ -158,8 +158,8 @@ static int parse_bags (STACK *bags, const char *pass, int passlen, | |||
158 | ASN1_OCTET_STRING **keyid, char *keymatch) | 158 | ASN1_OCTET_STRING **keyid, char *keymatch) |
159 | { | 159 | { |
160 | int i; | 160 | int i; |
161 | for (i = 0; i < sk_num (bags); i++) { | 161 | for (i = 0; i < sk_num(bags); i++) { |
162 | if (!parse_bag ((PKCS12_SAFEBAG *)sk_value (bags, i), | 162 | if (!parse_bag((PKCS12_SAFEBAG *)sk_value (bags, i), |
163 | pass, passlen, pkey, cert, ca, keyid, | 163 | pass, passlen, pkey, cert, ca, keyid, |
164 | keymatch)) return 0; | 164 | keymatch)) return 0; |
165 | } | 165 | } |
@@ -170,7 +170,7 @@ static int parse_bags (STACK *bags, const char *pass, int passlen, | |||
170 | #define MATCH_CERT 0x2 | 170 | #define MATCH_CERT 0x2 |
171 | #define MATCH_ALL 0x3 | 171 | #define MATCH_ALL 0x3 |
172 | 172 | ||
173 | static int parse_bag (PKCS12_SAFEBAG *bag, const char *pass, int passlen, | 173 | static int parse_bag(PKCS12_SAFEBAG *bag, const char *pass, int passlen, |
174 | EVP_PKEY **pkey, X509 **cert, STACK **ca, | 174 | EVP_PKEY **pkey, X509 **cert, STACK **ca, |
175 | ASN1_OCTET_STRING **keyid, | 175 | ASN1_OCTET_STRING **keyid, |
176 | char *keymatch) | 176 | char *keymatch) |
@@ -187,9 +187,9 @@ static int parse_bag (PKCS12_SAFEBAG *bag, const char *pass, int passlen, | |||
187 | /* Check for any local key id matching (if needed) */ | 187 | /* Check for any local key id matching (if needed) */ |
188 | if (lkey && ((*keymatch & MATCH_ALL) != MATCH_ALL)) { | 188 | if (lkey && ((*keymatch & MATCH_ALL) != MATCH_ALL)) { |
189 | if (*keyid) { | 189 | if (*keyid) { |
190 | if (ASN1_OCTET_STRING_cmp (*keyid, lkey)) lkey = NULL; | 190 | if (M_ASN1_OCTET_STRING_cmp(*keyid, lkey)) lkey = NULL; |
191 | } else { | 191 | } else { |
192 | if (!(*keyid = ASN1_OCTET_STRING_dup (lkey))) { | 192 | if (!(*keyid = M_ASN1_OCTET_STRING_dup(lkey))) { |
193 | PKCS12err(PKCS12_F_PARSE_BAGS,ERR_R_MALLOC_FAILURE); | 193 | PKCS12err(PKCS12_F_PARSE_BAGS,ERR_R_MALLOC_FAILURE); |
194 | return 0; | 194 | return 0; |
195 | } | 195 | } |
@@ -200,16 +200,16 @@ static int parse_bag (PKCS12_SAFEBAG *bag, const char *pass, int passlen, | |||
200 | { | 200 | { |
201 | case NID_keyBag: | 201 | case NID_keyBag: |
202 | if (!lkey || !pkey) return 1; | 202 | if (!lkey || !pkey) return 1; |
203 | if (!(*pkey = EVP_PKCS82PKEY (bag->value.keybag))) return 0; | 203 | if (!(*pkey = EVP_PKCS82PKEY(bag->value.keybag))) return 0; |
204 | *keymatch |= MATCH_KEY; | 204 | *keymatch |= MATCH_KEY; |
205 | break; | 205 | break; |
206 | 206 | ||
207 | case NID_pkcs8ShroudedKeyBag: | 207 | case NID_pkcs8ShroudedKeyBag: |
208 | if (!lkey || !pkey) return 1; | 208 | if (!lkey || !pkey) return 1; |
209 | if (!(p8 = M_PKCS12_decrypt_skey (bag, pass, passlen))) | 209 | if (!(p8 = M_PKCS12_decrypt_skey(bag, pass, passlen))) |
210 | return 0; | 210 | return 0; |
211 | *pkey = EVP_PKCS82PKEY (p8); | 211 | *pkey = EVP_PKCS82PKEY(p8); |
212 | PKCS8_PRIV_KEY_INFO_free (p8); | 212 | PKCS8_PRIV_KEY_INFO_free(p8); |
213 | if (!(*pkey)) return 0; | 213 | if (!(*pkey)) return 0; |
214 | *keymatch |= MATCH_KEY; | 214 | *keymatch |= MATCH_KEY; |
215 | break; | 215 | break; |