diff options
Diffstat (limited to 'src/lib/libcrypto/pkcs12/p12_npas.c')
-rw-r--r-- | src/lib/libcrypto/pkcs12/p12_npas.c | 10 |
1 files changed, 5 insertions, 5 deletions
diff --git a/src/lib/libcrypto/pkcs12/p12_npas.c b/src/lib/libcrypto/pkcs12/p12_npas.c index 84e31a7f21..a549433eeb 100644 --- a/src/lib/libcrypto/pkcs12/p12_npas.c +++ b/src/lib/libcrypto/pkcs12/p12_npas.c | |||
@@ -113,15 +113,15 @@ static int newpass_p12(PKCS12 *p12, char *oldpass, char *newpass) | |||
113 | unsigned char mac[EVP_MAX_MD_SIZE]; | 113 | unsigned char mac[EVP_MAX_MD_SIZE]; |
114 | unsigned int maclen; | 114 | unsigned int maclen; |
115 | 115 | ||
116 | if (!(asafes = M_PKCS12_unpack_authsafes(p12))) return 0; | 116 | if (!(asafes = PKCS12_unpack_authsafes(p12))) return 0; |
117 | if(!(newsafes = sk_PKCS7_new_null())) return 0; | 117 | if(!(newsafes = sk_PKCS7_new_null())) return 0; |
118 | for (i = 0; i < sk_PKCS7_num (asafes); i++) { | 118 | for (i = 0; i < sk_PKCS7_num (asafes); i++) { |
119 | p7 = sk_PKCS7_value(asafes, i); | 119 | p7 = sk_PKCS7_value(asafes, i); |
120 | bagnid = OBJ_obj2nid(p7->type); | 120 | bagnid = OBJ_obj2nid(p7->type); |
121 | if (bagnid == NID_pkcs7_data) { | 121 | if (bagnid == NID_pkcs7_data) { |
122 | bags = M_PKCS12_unpack_p7data(p7); | 122 | bags = PKCS12_unpack_p7data(p7); |
123 | } else if (bagnid == NID_pkcs7_encrypted) { | 123 | } else if (bagnid == NID_pkcs7_encrypted) { |
124 | bags = M_PKCS12_unpack_p7encdata(p7, oldpass, -1); | 124 | bags = PKCS12_unpack_p7encdata(p7, oldpass, -1); |
125 | alg_get(p7->d.encrypted->enc_data->algorithm, | 125 | alg_get(p7->d.encrypted->enc_data->algorithm, |
126 | &pbe_nid, &pbe_iter, &pbe_saltlen); | 126 | &pbe_nid, &pbe_iter, &pbe_saltlen); |
127 | } else continue; | 127 | } else continue; |
@@ -151,7 +151,7 @@ static int newpass_p12(PKCS12 *p12, char *oldpass, char *newpass) | |||
151 | 151 | ||
152 | p12_data_tmp = p12->authsafes->d.data; | 152 | p12_data_tmp = p12->authsafes->d.data; |
153 | if(!(p12->authsafes->d.data = ASN1_OCTET_STRING_new())) goto saferr; | 153 | if(!(p12->authsafes->d.data = ASN1_OCTET_STRING_new())) goto saferr; |
154 | if(!M_PKCS12_pack_authsafes(p12, newsafes)) goto saferr; | 154 | if(!PKCS12_pack_authsafes(p12, newsafes)) goto saferr; |
155 | 155 | ||
156 | if(!PKCS12_gen_mac(p12, newpass, -1, mac, &maclen)) goto saferr; | 156 | if(!PKCS12_gen_mac(p12, newpass, -1, mac, &maclen)) goto saferr; |
157 | if(!(macnew = ASN1_OCTET_STRING_new())) goto saferr; | 157 | if(!(macnew = ASN1_OCTET_STRING_new())) goto saferr; |
@@ -194,7 +194,7 @@ static int newpass_bag(PKCS12_SAFEBAG *bag, char *oldpass, char *newpass) | |||
194 | 194 | ||
195 | if(M_PKCS12_bag_type(bag) != NID_pkcs8ShroudedKeyBag) return 1; | 195 | if(M_PKCS12_bag_type(bag) != NID_pkcs8ShroudedKeyBag) return 1; |
196 | 196 | ||
197 | if (!(p8 = M_PKCS12_decrypt_skey(bag, oldpass, -1))) return 0; | 197 | if (!(p8 = PKCS8_decrypt(bag->value.shkeybag, oldpass, -1))) return 0; |
198 | alg_get(bag->value.shkeybag->algor, &p8_nid, &p8_iter, &p8_saltlen); | 198 | alg_get(bag->value.shkeybag->algor, &p8_nid, &p8_iter, &p8_saltlen); |
199 | if(!(p8new = PKCS8_encrypt(p8_nid, NULL, newpass, -1, NULL, p8_saltlen, | 199 | if(!(p8new = PKCS8_encrypt(p8_nid, NULL, newpass, -1, NULL, p8_saltlen, |
200 | p8_iter, p8))) return 0; | 200 | p8_iter, p8))) return 0; |