diff options
Diffstat (limited to 'src/lib/libcrypto/pkcs12/p12_mutl.c')
-rw-r--r-- | src/lib/libcrypto/pkcs12/p12_mutl.c | 13 |
1 files changed, 8 insertions, 5 deletions
diff --git a/src/lib/libcrypto/pkcs12/p12_mutl.c b/src/lib/libcrypto/pkcs12/p12_mutl.c index bac558d6b9..f1094b3840 100644 --- a/src/lib/libcrypto/pkcs12/p12_mutl.c +++ b/src/lib/libcrypto/pkcs12/p12_mutl.c | |||
@@ -131,7 +131,7 @@ int PKCS12_set_mac (PKCS12 *p12, const char *pass, int passlen, | |||
131 | PKCS12err(PKCS12_F_PKCS12_SET_MAC,PKCS12_R_MAC_GENERATION_ERROR); | 131 | PKCS12err(PKCS12_F_PKCS12_SET_MAC,PKCS12_R_MAC_GENERATION_ERROR); |
132 | return 0; | 132 | return 0; |
133 | } | 133 | } |
134 | if (!(ASN1_OCTET_STRING_set (p12->mac->dinfo->digest, mac, maclen))) { | 134 | if (!(M_ASN1_OCTET_STRING_set (p12->mac->dinfo->digest, mac, maclen))) { |
135 | PKCS12err(PKCS12_F_PKCS12_SET_MAC,PKCS12_R_MAC_STRING_SET_ERROR); | 135 | PKCS12err(PKCS12_F_PKCS12_SET_MAC,PKCS12_R_MAC_STRING_SET_ERROR); |
136 | return 0; | 136 | return 0; |
137 | } | 137 | } |
@@ -142,13 +142,13 @@ int PKCS12_set_mac (PKCS12 *p12, const char *pass, int passlen, | |||
142 | int PKCS12_setup_mac (PKCS12 *p12, int iter, unsigned char *salt, int saltlen, | 142 | int PKCS12_setup_mac (PKCS12 *p12, int iter, unsigned char *salt, int saltlen, |
143 | EVP_MD *md_type) | 143 | EVP_MD *md_type) |
144 | { | 144 | { |
145 | if (!(p12->mac = PKCS12_MAC_DATA_new ())) return PKCS12_ERROR; | 145 | if (!(p12->mac = PKCS12_MAC_DATA_new())) return PKCS12_ERROR; |
146 | if (iter > 1) { | 146 | if (iter > 1) { |
147 | if(!(p12->mac->iter = ASN1_INTEGER_new())) { | 147 | if(!(p12->mac->iter = M_ASN1_INTEGER_new())) { |
148 | PKCS12err(PKCS12_F_PKCS12_SETUP_MAC, ERR_R_MALLOC_FAILURE); | 148 | PKCS12err(PKCS12_F_PKCS12_SETUP_MAC, ERR_R_MALLOC_FAILURE); |
149 | return 0; | 149 | return 0; |
150 | } | 150 | } |
151 | ASN1_INTEGER_set (p12->mac->iter, iter); | 151 | ASN1_INTEGER_set(p12->mac->iter, iter); |
152 | } | 152 | } |
153 | if (!saltlen) saltlen = PKCS12_SALT_LEN; | 153 | if (!saltlen) saltlen = PKCS12_SALT_LEN; |
154 | p12->mac->salt->length = saltlen; | 154 | p12->mac->salt->length = saltlen; |
@@ -156,7 +156,10 @@ int PKCS12_setup_mac (PKCS12 *p12, int iter, unsigned char *salt, int saltlen, | |||
156 | PKCS12err(PKCS12_F_PKCS12_SETUP_MAC, ERR_R_MALLOC_FAILURE); | 156 | PKCS12err(PKCS12_F_PKCS12_SETUP_MAC, ERR_R_MALLOC_FAILURE); |
157 | return 0; | 157 | return 0; |
158 | } | 158 | } |
159 | if (!salt) RAND_bytes (p12->mac->salt->data, saltlen); | 159 | if (!salt) { |
160 | if (RAND_bytes (p12->mac->salt->data, saltlen) <= 0) | ||
161 | return 0; | ||
162 | } | ||
160 | else memcpy (p12->mac->salt->data, salt, saltlen); | 163 | else memcpy (p12->mac->salt->data, salt, saltlen); |
161 | p12->mac->dinfo->algor->algorithm = OBJ_nid2obj(EVP_MD_type(md_type)); | 164 | p12->mac->dinfo->algor->algorithm = OBJ_nid2obj(EVP_MD_type(md_type)); |
162 | if (!(p12->mac->dinfo->algor->parameter = ASN1_TYPE_new())) { | 165 | if (!(p12->mac->dinfo->algor->parameter = ASN1_TYPE_new())) { |