diff options
Diffstat (limited to 'src/lib/libssl/ssl_rsa.c')
-rw-r--r-- | src/lib/libssl/ssl_rsa.c | 34 |
1 files changed, 17 insertions, 17 deletions
diff --git a/src/lib/libssl/ssl_rsa.c b/src/lib/libssl/ssl_rsa.c index cbb1c0b562..82c8cc0a87 100644 --- a/src/lib/libssl/ssl_rsa.c +++ b/src/lib/libssl/ssl_rsa.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: ssl_rsa.c,v 1.23 2017/01/23 05:13:02 jsing Exp $ */ | 1 | /* $OpenBSD: ssl_rsa.c,v 1.24 2017/01/23 22:34:38 beck Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -108,8 +108,8 @@ SSL_use_certificate_file(SSL *ssl, const char *file, int type) | |||
108 | } else if (type == SSL_FILETYPE_PEM) { | 108 | } else if (type == SSL_FILETYPE_PEM) { |
109 | j = ERR_R_PEM_LIB; | 109 | j = ERR_R_PEM_LIB; |
110 | x = PEM_read_bio_X509(in, NULL, | 110 | x = PEM_read_bio_X509(in, NULL, |
111 | ssl->ctx->internal->default_passwd_callback, | 111 | ssl->ctx->default_passwd_callback, |
112 | ssl->ctx->internal->default_passwd_callback_userdata); | 112 | ssl->ctx->default_passwd_callback_userdata); |
113 | } else { | 113 | } else { |
114 | SSLerr(SSL_F_SSL_USE_CERTIFICATE_FILE, SSL_R_BAD_SSL_FILETYPE); | 114 | SSLerr(SSL_F_SSL_USE_CERTIFICATE_FILE, SSL_R_BAD_SSL_FILETYPE); |
115 | goto end; | 115 | goto end; |
@@ -236,8 +236,8 @@ SSL_use_RSAPrivateKey_file(SSL *ssl, const char *file, int type) | |||
236 | } else if (type == SSL_FILETYPE_PEM) { | 236 | } else if (type == SSL_FILETYPE_PEM) { |
237 | j = ERR_R_PEM_LIB; | 237 | j = ERR_R_PEM_LIB; |
238 | rsa = PEM_read_bio_RSAPrivateKey(in, NULL, | 238 | rsa = PEM_read_bio_RSAPrivateKey(in, NULL, |
239 | ssl->ctx->internal->default_passwd_callback, | 239 | ssl->ctx->default_passwd_callback, |
240 | ssl->ctx->internal->default_passwd_callback_userdata); | 240 | ssl->ctx->default_passwd_callback_userdata); |
241 | } else { | 241 | } else { |
242 | SSLerr(SSL_F_SSL_USE_RSAPRIVATEKEY_FILE, SSL_R_BAD_SSL_FILETYPE); | 242 | SSLerr(SSL_F_SSL_USE_RSAPRIVATEKEY_FILE, SSL_R_BAD_SSL_FILETYPE); |
243 | goto end; | 243 | goto end; |
@@ -308,8 +308,8 @@ SSL_use_PrivateKey_file(SSL *ssl, const char *file, int type) | |||
308 | if (type == SSL_FILETYPE_PEM) { | 308 | if (type == SSL_FILETYPE_PEM) { |
309 | j = ERR_R_PEM_LIB; | 309 | j = ERR_R_PEM_LIB; |
310 | pkey = PEM_read_bio_PrivateKey(in, NULL, | 310 | pkey = PEM_read_bio_PrivateKey(in, NULL, |
311 | ssl->ctx->internal->default_passwd_callback, | 311 | ssl->ctx->default_passwd_callback, |
312 | ssl->ctx->internal->default_passwd_callback_userdata); | 312 | ssl->ctx->default_passwd_callback_userdata); |
313 | } else if (type == SSL_FILETYPE_ASN1) { | 313 | } else if (type == SSL_FILETYPE_ASN1) { |
314 | j = ERR_R_ASN1_LIB; | 314 | j = ERR_R_ASN1_LIB; |
315 | pkey = d2i_PrivateKey_bio(in, NULL); | 315 | pkey = d2i_PrivateKey_bio(in, NULL); |
@@ -440,8 +440,8 @@ SSL_CTX_use_certificate_file(SSL_CTX *ctx, const char *file, int type) | |||
440 | x = d2i_X509_bio(in, NULL); | 440 | x = d2i_X509_bio(in, NULL); |
441 | } else if (type == SSL_FILETYPE_PEM) { | 441 | } else if (type == SSL_FILETYPE_PEM) { |
442 | j = ERR_R_PEM_LIB; | 442 | j = ERR_R_PEM_LIB; |
443 | x = PEM_read_bio_X509(in, NULL, ctx->internal->default_passwd_callback, | 443 | x = PEM_read_bio_X509(in, NULL, ctx->default_passwd_callback, |
444 | ctx->internal->default_passwd_callback_userdata); | 444 | ctx->default_passwd_callback_userdata); |
445 | } else { | 445 | } else { |
446 | SSLerr(SSL_F_SSL_CTX_USE_CERTIFICATE_FILE, SSL_R_BAD_SSL_FILETYPE); | 446 | SSLerr(SSL_F_SSL_CTX_USE_CERTIFICATE_FILE, SSL_R_BAD_SSL_FILETYPE); |
447 | goto end; | 447 | goto end; |
@@ -526,8 +526,8 @@ SSL_CTX_use_RSAPrivateKey_file(SSL_CTX *ctx, const char *file, int type) | |||
526 | } else if (type == SSL_FILETYPE_PEM) { | 526 | } else if (type == SSL_FILETYPE_PEM) { |
527 | j = ERR_R_PEM_LIB; | 527 | j = ERR_R_PEM_LIB; |
528 | rsa = PEM_read_bio_RSAPrivateKey(in, NULL, | 528 | rsa = PEM_read_bio_RSAPrivateKey(in, NULL, |
529 | ctx->internal->default_passwd_callback, | 529 | ctx->default_passwd_callback, |
530 | ctx->internal->default_passwd_callback_userdata); | 530 | ctx->default_passwd_callback_userdata); |
531 | } else { | 531 | } else { |
532 | SSLerr(SSL_F_SSL_CTX_USE_RSAPRIVATEKEY_FILE, SSL_R_BAD_SSL_FILETYPE); | 532 | SSLerr(SSL_F_SSL_CTX_USE_RSAPRIVATEKEY_FILE, SSL_R_BAD_SSL_FILETYPE); |
533 | goto end; | 533 | goto end; |
@@ -596,8 +596,8 @@ SSL_CTX_use_PrivateKey_file(SSL_CTX *ctx, const char *file, int type) | |||
596 | if (type == SSL_FILETYPE_PEM) { | 596 | if (type == SSL_FILETYPE_PEM) { |
597 | j = ERR_R_PEM_LIB; | 597 | j = ERR_R_PEM_LIB; |
598 | pkey = PEM_read_bio_PrivateKey(in, NULL, | 598 | pkey = PEM_read_bio_PrivateKey(in, NULL, |
599 | ctx->internal->default_passwd_callback, | 599 | ctx->default_passwd_callback, |
600 | ctx->internal->default_passwd_callback_userdata); | 600 | ctx->default_passwd_callback_userdata); |
601 | } else if (type == SSL_FILETYPE_ASN1) { | 601 | } else if (type == SSL_FILETYPE_ASN1) { |
602 | j = ERR_R_ASN1_LIB; | 602 | j = ERR_R_ASN1_LIB; |
603 | pkey = d2i_PrivateKey_bio(in, NULL); | 603 | pkey = d2i_PrivateKey_bio(in, NULL); |
@@ -650,8 +650,8 @@ ssl_ctx_use_certificate_chain_bio(SSL_CTX *ctx, BIO *in) | |||
650 | 650 | ||
651 | ERR_clear_error(); /* clear error stack for SSL_CTX_use_certificate() */ | 651 | ERR_clear_error(); /* clear error stack for SSL_CTX_use_certificate() */ |
652 | 652 | ||
653 | x = PEM_read_bio_X509_AUX(in, NULL, ctx->internal->default_passwd_callback, | 653 | x = PEM_read_bio_X509_AUX(in, NULL, ctx->default_passwd_callback, |
654 | ctx->internal->default_passwd_callback_userdata); | 654 | ctx->default_passwd_callback_userdata); |
655 | if (x == NULL) { | 655 | if (x == NULL) { |
656 | SSLerr(SSL_F_SSL_CTX_USE_CERTIFICATE_CHAIN_FILE, ERR_R_PEM_LIB); | 656 | SSLerr(SSL_F_SSL_CTX_USE_CERTIFICATE_CHAIN_FILE, ERR_R_PEM_LIB); |
657 | goto end; | 657 | goto end; |
@@ -677,8 +677,8 @@ ssl_ctx_use_certificate_chain_bio(SSL_CTX *ctx, BIO *in) | |||
677 | } | 677 | } |
678 | 678 | ||
679 | while ((ca = PEM_read_bio_X509(in, NULL, | 679 | while ((ca = PEM_read_bio_X509(in, NULL, |
680 | ctx->internal->default_passwd_callback, | 680 | ctx->default_passwd_callback, |
681 | ctx->internal->default_passwd_callback_userdata)) != NULL) { | 681 | ctx->default_passwd_callback_userdata)) != NULL) { |
682 | r = SSL_CTX_add_extra_chain_cert(ctx, ca); | 682 | r = SSL_CTX_add_extra_chain_cert(ctx, ca); |
683 | if (!r) { | 683 | if (!r) { |
684 | X509_free(ca); | 684 | X509_free(ca); |