diff options
Diffstat (limited to 'src/lib/libssl/src/crypto/pkcs12/p12_utl.c')
-rw-r--r-- | src/lib/libssl/src/crypto/pkcs12/p12_utl.c | 58 |
1 files changed, 43 insertions, 15 deletions
diff --git a/src/lib/libssl/src/crypto/pkcs12/p12_utl.c b/src/lib/libssl/src/crypto/pkcs12/p12_utl.c index 2adcbc95e1..243ec76be9 100644 --- a/src/lib/libssl/src/crypto/pkcs12/p12_utl.c +++ b/src/lib/libssl/src/crypto/pkcs12/p12_utl.c | |||
@@ -62,30 +62,34 @@ | |||
62 | 62 | ||
63 | /* Cheap and nasty Unicode stuff */ | 63 | /* Cheap and nasty Unicode stuff */ |
64 | 64 | ||
65 | unsigned char *asc2uni (const char *asc, unsigned char **uni, int *unilen) | 65 | unsigned char *asc2uni(const char *asc, int asclen, unsigned char **uni, int *unilen) |
66 | { | 66 | { |
67 | int ulen, i; | 67 | int ulen, i; |
68 | unsigned char *unitmp; | 68 | unsigned char *unitmp; |
69 | ulen = strlen(asc)*2 + 2; | 69 | if (asclen == -1) asclen = strlen(asc); |
70 | if (!(unitmp = Malloc (ulen))) return NULL; | 70 | ulen = asclen*2 + 2; |
71 | for (i = 0; i < ulen; i+=2) { | 71 | if (!(unitmp = OPENSSL_malloc(ulen))) return NULL; |
72 | for (i = 0; i < ulen - 2; i+=2) { | ||
72 | unitmp[i] = 0; | 73 | unitmp[i] = 0; |
73 | unitmp[i + 1] = asc[i>>1]; | 74 | unitmp[i + 1] = asc[i>>1]; |
74 | } | 75 | } |
76 | /* Make result double null terminated */ | ||
77 | unitmp[ulen - 2] = 0; | ||
78 | unitmp[ulen - 1] = 0; | ||
75 | if (unilen) *unilen = ulen; | 79 | if (unilen) *unilen = ulen; |
76 | if (uni) *uni = unitmp; | 80 | if (uni) *uni = unitmp; |
77 | return unitmp; | 81 | return unitmp; |
78 | } | 82 | } |
79 | 83 | ||
80 | char *uni2asc (unsigned char *uni, int unilen) | 84 | char *uni2asc(unsigned char *uni, int unilen) |
81 | { | 85 | { |
82 | int asclen, i; | 86 | int asclen, i; |
83 | char *asctmp; | 87 | char *asctmp; |
84 | asclen = unilen / 2; | 88 | asclen = unilen / 2; |
85 | /* If no terminating zero allow for one */ | 89 | /* If no terminating zero allow for one */ |
86 | if (uni[unilen - 1]) asclen++; | 90 | if (!unilen || uni[unilen - 1]) asclen++; |
87 | uni++; | 91 | uni++; |
88 | if (!(asctmp = Malloc (asclen))) return NULL; | 92 | if (!(asctmp = OPENSSL_malloc(asclen))) return NULL; |
89 | for (i = 0; i < unilen; i+=2) asctmp[i>>1] = uni[i]; | 93 | for (i = 0; i < unilen; i+=2) asctmp[i>>1] = uni[i]; |
90 | asctmp[asclen - 1] = 0; | 94 | asctmp[asclen - 1] = 0; |
91 | return asctmp; | 95 | return asctmp; |
@@ -93,26 +97,50 @@ char *uni2asc (unsigned char *uni, int unilen) | |||
93 | 97 | ||
94 | int i2d_PKCS12_bio(BIO *bp, PKCS12 *p12) | 98 | int i2d_PKCS12_bio(BIO *bp, PKCS12 *p12) |
95 | { | 99 | { |
96 | return ASN1_i2d_bio((int(*)())i2d_PKCS12, bp, (unsigned char *)p12); | 100 | return ASN1_item_i2d_bio(ASN1_ITEM_rptr(PKCS12), bp, p12); |
97 | } | 101 | } |
98 | 102 | ||
99 | #ifndef NO_FP_API | 103 | #ifndef OPENSSL_NO_FP_API |
100 | int i2d_PKCS12_fp(FILE *fp, PKCS12 *p12) | 104 | int i2d_PKCS12_fp(FILE *fp, PKCS12 *p12) |
101 | { | 105 | { |
102 | return ASN1_i2d_fp((int(*)())i2d_PKCS12, fp, (unsigned char *)p12); | 106 | return ASN1_item_i2d_fp(ASN1_ITEM_rptr(PKCS12), fp, p12); |
103 | } | 107 | } |
104 | #endif | 108 | #endif |
105 | 109 | ||
106 | PKCS12 *d2i_PKCS12_bio(BIO *bp, PKCS12 **p12) | 110 | PKCS12 *d2i_PKCS12_bio(BIO *bp, PKCS12 **p12) |
107 | { | 111 | { |
108 | return (PKCS12 *)ASN1_d2i_bio((char *(*)())PKCS12_new, | 112 | return ASN1_item_d2i_bio(ASN1_ITEM_rptr(PKCS12), bp, p12); |
109 | (char *(*)())d2i_PKCS12, bp, (unsigned char **)p12); | ||
110 | } | 113 | } |
111 | #ifndef NO_FP_API | 114 | #ifndef OPENSSL_NO_FP_API |
112 | PKCS12 *d2i_PKCS12_fp(FILE *fp, PKCS12 **p12) | 115 | PKCS12 *d2i_PKCS12_fp(FILE *fp, PKCS12 **p12) |
113 | { | 116 | { |
114 | return (PKCS12 *)ASN1_d2i_fp((char *(*)())PKCS12_new, | 117 | return ASN1_item_d2i_fp(ASN1_ITEM_rptr(PKCS12), fp, p12); |
115 | (char *(*)())d2i_PKCS12, fp, (unsigned char **)(p12)); | ||
116 | } | 118 | } |
117 | #endif | 119 | #endif |
118 | 120 | ||
121 | PKCS12_SAFEBAG *PKCS12_x5092certbag(X509 *x509) | ||
122 | { | ||
123 | return PKCS12_item_pack_safebag(x509, ASN1_ITEM_rptr(X509), | ||
124 | NID_x509Certificate, NID_certBag); | ||
125 | } | ||
126 | |||
127 | PKCS12_SAFEBAG *PKCS12_x509crl2certbag(X509_CRL *crl) | ||
128 | { | ||
129 | return PKCS12_item_pack_safebag(crl, ASN1_ITEM_rptr(X509_CRL), | ||
130 | NID_x509Crl, NID_crlBag); | ||
131 | } | ||
132 | |||
133 | X509 *PKCS12_certbag2x509(PKCS12_SAFEBAG *bag) | ||
134 | { | ||
135 | if(M_PKCS12_bag_type(bag) != NID_certBag) return NULL; | ||
136 | if(M_PKCS12_cert_bag_type(bag) != NID_x509Certificate) return NULL; | ||
137 | return ASN1_item_unpack(bag->value.bag->value.octet, ASN1_ITEM_rptr(X509)); | ||
138 | } | ||
139 | |||
140 | X509_CRL *PKCS12_certbag2x509crl(PKCS12_SAFEBAG *bag) | ||
141 | { | ||
142 | if(M_PKCS12_bag_type(bag) != NID_crlBag) return NULL; | ||
143 | if(M_PKCS12_cert_bag_type(bag) != NID_x509Crl) return NULL; | ||
144 | return ASN1_item_unpack(bag->value.bag->value.octet, | ||
145 | ASN1_ITEM_rptr(X509_CRL)); | ||
146 | } | ||