提交 52ad523c 编写于 作者: D Dr. Stephen Henson

fix various style issues

Reviewed-by: NRich Salz <rsalz@openssl.org>
Reviewed-by: NMatt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/2177)
上级 d53b1dd4
...@@ -362,6 +362,7 @@ int EVP_PKEY_CTX_hex2ctrl(EVP_PKEY_CTX *ctx, int cmd, const char *hex) ...@@ -362,6 +362,7 @@ int EVP_PKEY_CTX_hex2ctrl(EVP_PKEY_CTX *ctx, int cmd, const char *hex)
OPENSSL_free(bin); OPENSSL_free(bin);
return rv; return rv;
} }
/* Pass a message digest to a ctrl */ /* Pass a message digest to a ctrl */
int EVP_PKEY_CTX_md(EVP_PKEY_CTX *ctx, int optype, int cmd, const char *md) int EVP_PKEY_CTX_md(EVP_PKEY_CTX *ctx, int optype, int cmd, const char *md)
{ {
......
...@@ -31,6 +31,7 @@ static int rsa_param_encode(const EVP_PKEY *pkey, ...@@ -31,6 +31,7 @@ static int rsa_param_encode(const EVP_PKEY *pkey,
ASN1_STRING **pstr, int *pstrtype) ASN1_STRING **pstr, int *pstrtype)
{ {
const RSA *rsa = pkey->pkey.rsa; const RSA *rsa = pkey->pkey.rsa;
*pstr = NULL; *pstr = NULL;
/* If RSA it's just NULL type */ /* If RSA it's just NULL type */
if (pkey->ameth->pkey_id == EVP_PKEY_RSA) { if (pkey->ameth->pkey_id == EVP_PKEY_RSA) {
...@@ -80,6 +81,7 @@ static int rsa_pub_encode(X509_PUBKEY *pk, const EVP_PKEY *pkey) ...@@ -80,6 +81,7 @@ static int rsa_pub_encode(X509_PUBKEY *pk, const EVP_PKEY *pkey)
int penclen; int penclen;
ASN1_STRING *str; ASN1_STRING *str;
int strtype; int strtype;
if (!rsa_param_encode(pkey, &str, &strtype)) if (!rsa_param_encode(pkey, &str, &strtype))
return 0; return 0;
penclen = i2d_RSAPublicKey(pkey->pkey.rsa, &penc); penclen = i2d_RSAPublicKey(pkey->pkey.rsa, &penc);
...@@ -146,6 +148,7 @@ static int rsa_priv_encode(PKCS8_PRIV_KEY_INFO *p8, const EVP_PKEY *pkey) ...@@ -146,6 +148,7 @@ static int rsa_priv_encode(PKCS8_PRIV_KEY_INFO *p8, const EVP_PKEY *pkey)
int rklen; int rklen;
ASN1_STRING *str; ASN1_STRING *str;
int strtype; int strtype;
if (!rsa_param_encode(pkey, &str, &strtype)) if (!rsa_param_encode(pkey, &str, &strtype))
return 0; return 0;
rklen = i2d_RSAPrivateKey(pkey->pkey.rsa, &rk); rklen = i2d_RSAPrivateKey(pkey->pkey.rsa, &rk);
...@@ -219,6 +222,7 @@ static int rsa_pss_param_print(BIO *bp, int pss_key, RSA_PSS_PARAMS *pss, ...@@ -219,6 +222,7 @@ static int rsa_pss_param_print(BIO *bp, int pss_key, RSA_PSS_PARAMS *pss,
{ {
int rv = 0; int rv = 0;
X509_ALGOR *maskHash = NULL; X509_ALGOR *maskHash = NULL;
if (!BIO_indent(bp, indent, 128)) if (!BIO_indent(bp, indent, 128))
goto err; goto err;
if (pss_key) { if (pss_key) {
...@@ -393,14 +397,14 @@ static int rsa_sig_print(BIO *bp, const X509_ALGOR *sigalg, ...@@ -393,14 +397,14 @@ static int rsa_sig_print(BIO *bp, const X509_ALGOR *sigalg,
{ {
if (OBJ_obj2nid(sigalg->algorithm) == EVP_PKEY_RSA_PSS) { if (OBJ_obj2nid(sigalg->algorithm) == EVP_PKEY_RSA_PSS) {
int rv; int rv;
RSA_PSS_PARAMS *pss; RSA_PSS_PARAMS *pss = rsa_pss_decode(sigalg);
pss = rsa_pss_decode(sigalg);
rv = rsa_pss_param_print(bp, 0, pss, indent); rv = rsa_pss_param_print(bp, 0, pss, indent);
RSA_PSS_PARAMS_free(pss); RSA_PSS_PARAMS_free(pss);
if (!rv) if (!rv)
return 0; return 0;
} else if (!sig && BIO_puts(bp, "\n") <= 0) } else if (!sig && BIO_puts(bp, "\n") <= 0) {
return 0; return 0;
}
if (sig) if (sig)
return X509_signature_dump(bp, sig, indent); return X509_signature_dump(bp, sig, indent);
return 1; return 1;
...@@ -409,6 +413,7 @@ static int rsa_sig_print(BIO *bp, const X509_ALGOR *sigalg, ...@@ -409,6 +413,7 @@ static int rsa_sig_print(BIO *bp, const X509_ALGOR *sigalg,
static int rsa_pkey_ctrl(EVP_PKEY *pkey, int op, long arg1, void *arg2) static int rsa_pkey_ctrl(EVP_PKEY *pkey, int op, long arg1, void *arg2)
{ {
X509_ALGOR *alg = NULL; X509_ALGOR *alg = NULL;
switch (op) { switch (op) {
case ASN1_PKEY_CTRL_PKCS7_SIGN: case ASN1_PKEY_CTRL_PKCS7_SIGN:
...@@ -479,6 +484,7 @@ static int rsa_md_to_mgf1(X509_ALGOR **palg, const EVP_MD *mgf1md) ...@@ -479,6 +484,7 @@ static int rsa_md_to_mgf1(X509_ALGOR **palg, const EVP_MD *mgf1md)
{ {
X509_ALGOR *algtmp = NULL; X509_ALGOR *algtmp = NULL;
ASN1_STRING *stmp = NULL; ASN1_STRING *stmp = NULL;
*palg = NULL; *palg = NULL;
if (mgf1md == NULL || EVP_MD_type(mgf1md) == NID_sha1) if (mgf1md == NULL || EVP_MD_type(mgf1md) == NID_sha1)
return 1; return 1;
...@@ -504,6 +510,7 @@ static int rsa_md_to_mgf1(X509_ALGOR **palg, const EVP_MD *mgf1md) ...@@ -504,6 +510,7 @@ static int rsa_md_to_mgf1(X509_ALGOR **palg, const EVP_MD *mgf1md)
static const EVP_MD *rsa_algor_to_md(X509_ALGOR *alg) static const EVP_MD *rsa_algor_to_md(X509_ALGOR *alg)
{ {
const EVP_MD *md; const EVP_MD *md;
if (!alg) if (!alg)
return EVP_sha1(); return EVP_sha1();
md = EVP_get_digestbyobj(alg->algorithm); md = EVP_get_digestbyobj(alg->algorithm);
...@@ -522,6 +529,7 @@ static RSA_PSS_PARAMS *rsa_ctx_to_pss(EVP_PKEY_CTX *pkctx) ...@@ -522,6 +529,7 @@ static RSA_PSS_PARAMS *rsa_ctx_to_pss(EVP_PKEY_CTX *pkctx)
const EVP_MD *sigmd, *mgf1md; const EVP_MD *sigmd, *mgf1md;
EVP_PKEY *pk = EVP_PKEY_CTX_get0_pkey(pkctx); EVP_PKEY *pk = EVP_PKEY_CTX_get0_pkey(pkctx);
int saltlen; int saltlen;
if (EVP_PKEY_CTX_get_signature_md(pkctx, &sigmd) <= 0) if (EVP_PKEY_CTX_get_signature_md(pkctx, &sigmd) <= 0)
return NULL; return NULL;
if (EVP_PKEY_CTX_get_rsa_mgf1_md(pkctx, &mgf1md) <= 0) if (EVP_PKEY_CTX_get_rsa_mgf1_md(pkctx, &mgf1md) <= 0)
...@@ -543,6 +551,7 @@ RSA_PSS_PARAMS *rsa_pss_params_create(const EVP_MD *sigmd, ...@@ -543,6 +551,7 @@ RSA_PSS_PARAMS *rsa_pss_params_create(const EVP_MD *sigmd,
const EVP_MD *mgf1md, int saltlen) const EVP_MD *mgf1md, int saltlen)
{ {
RSA_PSS_PARAMS *pss = RSA_PSS_PARAMS_new(); RSA_PSS_PARAMS *pss = RSA_PSS_PARAMS_new();
if (pss == NULL) if (pss == NULL)
goto err; goto err;
if (saltlen != 20) { if (saltlen != 20) {
...@@ -568,6 +577,7 @@ static ASN1_STRING *rsa_ctx_to_pss_string(EVP_PKEY_CTX *pkctx) ...@@ -568,6 +577,7 @@ static ASN1_STRING *rsa_ctx_to_pss_string(EVP_PKEY_CTX *pkctx)
{ {
RSA_PSS_PARAMS *pss = rsa_ctx_to_pss(pkctx); RSA_PSS_PARAMS *pss = rsa_ctx_to_pss(pkctx);
ASN1_STRING *os = NULL; ASN1_STRING *os = NULL;
if (pss == NULL) if (pss == NULL)
return NULL; return NULL;
...@@ -592,6 +602,7 @@ static int rsa_pss_to_ctx(EVP_MD_CTX *ctx, EVP_PKEY_CTX *pkctx, ...@@ -592,6 +602,7 @@ static int rsa_pss_to_ctx(EVP_MD_CTX *ctx, EVP_PKEY_CTX *pkctx,
int saltlen; int saltlen;
const EVP_MD *mgf1md = NULL, *md = NULL; const EVP_MD *mgf1md = NULL, *md = NULL;
RSA_PSS_PARAMS *pss; RSA_PSS_PARAMS *pss;
/* Sanity check: make sure it is PSS */ /* Sanity check: make sure it is PSS */
if (OBJ_obj2nid(sigalg->algorithm) != EVP_PKEY_RSA_PSS) { if (OBJ_obj2nid(sigalg->algorithm) != EVP_PKEY_RSA_PSS) {
RSAerr(RSA_F_RSA_PSS_TO_CTX, RSA_R_UNSUPPORTED_SIGNATURE_TYPE); RSAerr(RSA_F_RSA_PSS_TO_CTX, RSA_R_UNSUPPORTED_SIGNATURE_TYPE);
...@@ -673,6 +684,7 @@ static int rsa_cms_verify(CMS_SignerInfo *si) ...@@ -673,6 +684,7 @@ static int rsa_cms_verify(CMS_SignerInfo *si)
int nid, nid2; int nid, nid2;
X509_ALGOR *alg; X509_ALGOR *alg;
EVP_PKEY_CTX *pkctx = CMS_SignerInfo_get0_pkey_ctx(si); EVP_PKEY_CTX *pkctx = CMS_SignerInfo_get0_pkey_ctx(si);
CMS_SignerInfo_get0_algs(si, NULL, NULL, NULL, &alg); CMS_SignerInfo_get0_algs(si, NULL, NULL, NULL, &alg);
nid = OBJ_obj2nid(alg->algorithm); nid = OBJ_obj2nid(alg->algorithm);
if (nid == EVP_PKEY_RSA_PSS) if (nid == EVP_PKEY_RSA_PSS)
...@@ -721,6 +733,7 @@ static int rsa_cms_sign(CMS_SignerInfo *si) ...@@ -721,6 +733,7 @@ static int rsa_cms_sign(CMS_SignerInfo *si)
X509_ALGOR *alg; X509_ALGOR *alg;
EVP_PKEY_CTX *pkctx = CMS_SignerInfo_get0_pkey_ctx(si); EVP_PKEY_CTX *pkctx = CMS_SignerInfo_get0_pkey_ctx(si);
ASN1_STRING *os = NULL; ASN1_STRING *os = NULL;
CMS_SignerInfo_get0_algs(si, NULL, NULL, NULL, &alg); CMS_SignerInfo_get0_algs(si, NULL, NULL, NULL, &alg);
if (pkctx) { if (pkctx) {
if (EVP_PKEY_CTX_get_rsa_padding(pkctx, &pad_mode) <= 0) if (EVP_PKEY_CTX_get_rsa_padding(pkctx, &pad_mode) <= 0)
...@@ -747,6 +760,7 @@ static int rsa_item_sign(EVP_MD_CTX *ctx, const ASN1_ITEM *it, void *asn, ...@@ -747,6 +760,7 @@ static int rsa_item_sign(EVP_MD_CTX *ctx, const ASN1_ITEM *it, void *asn,
{ {
int pad_mode; int pad_mode;
EVP_PKEY_CTX *pkctx = EVP_MD_CTX_pkey_ctx(ctx); EVP_PKEY_CTX *pkctx = EVP_MD_CTX_pkey_ctx(ctx);
if (EVP_PKEY_CTX_get_rsa_padding(pkctx, &pad_mode) <= 0) if (EVP_PKEY_CTX_get_rsa_padding(pkctx, &pad_mode) <= 0)
return 0; return 0;
if (pad_mode == RSA_PKCS1_PADDING) if (pad_mode == RSA_PKCS1_PADDING)
...@@ -779,7 +793,7 @@ static RSA_OAEP_PARAMS *rsa_oaep_decode(const X509_ALGOR *alg) ...@@ -779,7 +793,7 @@ static RSA_OAEP_PARAMS *rsa_oaep_decode(const X509_ALGOR *alg)
RSA_OAEP_PARAMS *oaep; RSA_OAEP_PARAMS *oaep;
oaep = ASN1_TYPE_unpack_sequence(ASN1_ITEM_rptr(RSA_OAEP_PARAMS), oaep = ASN1_TYPE_unpack_sequence(ASN1_ITEM_rptr(RSA_OAEP_PARAMS),
alg->parameter); alg->parameter);
if (oaep == NULL) if (oaep == NULL)
return NULL; return NULL;
...@@ -804,8 +818,9 @@ static int rsa_cms_decrypt(CMS_RecipientInfo *ri) ...@@ -804,8 +818,9 @@ static int rsa_cms_decrypt(CMS_RecipientInfo *ri)
int labellen = 0; int labellen = 0;
const EVP_MD *mgf1md = NULL, *md = NULL; const EVP_MD *mgf1md = NULL, *md = NULL;
RSA_OAEP_PARAMS *oaep; RSA_OAEP_PARAMS *oaep;
pkctx = CMS_RecipientInfo_get0_pkey_ctx(ri); pkctx = CMS_RecipientInfo_get0_pkey_ctx(ri);
if (!pkctx) if (pkctx == NULL)
return 0; return 0;
if (!CMS_RecipientInfo_ktri_get0_algs(ri, NULL, NULL, &cmsalg)) if (!CMS_RecipientInfo_ktri_get0_algs(ri, NULL, NULL, &cmsalg))
return -1; return -1;
...@@ -825,14 +840,15 @@ static int rsa_cms_decrypt(CMS_RecipientInfo *ri) ...@@ -825,14 +840,15 @@ static int rsa_cms_decrypt(CMS_RecipientInfo *ri)
} }
mgf1md = rsa_algor_to_md(oaep->maskHash); mgf1md = rsa_algor_to_md(oaep->maskHash);
if (!mgf1md) if (mgf1md == NULL)
goto err; goto err;
md = rsa_algor_to_md(oaep->hashFunc); md = rsa_algor_to_md(oaep->hashFunc);
if (!md) if (md == NULL)
goto err; goto err;
if (oaep->pSourceFunc) { if (oaep->pSourceFunc != NULL) {
X509_ALGOR *plab = oaep->pSourceFunc; X509_ALGOR *plab = oaep->pSourceFunc;
if (OBJ_obj2nid(plab->algorithm) != NID_pSpecified) { if (OBJ_obj2nid(plab->algorithm) != NID_pSpecified) {
RSAerr(RSA_F_RSA_CMS_DECRYPT, RSA_R_UNSUPPORTED_LABEL_SOURCE); RSAerr(RSA_F_RSA_CMS_DECRYPT, RSA_R_UNSUPPORTED_LABEL_SOURCE);
goto err; goto err;
...@@ -873,6 +889,7 @@ static int rsa_cms_encrypt(CMS_RecipientInfo *ri) ...@@ -873,6 +889,7 @@ static int rsa_cms_encrypt(CMS_RecipientInfo *ri)
EVP_PKEY_CTX *pkctx = CMS_RecipientInfo_get0_pkey_ctx(ri); EVP_PKEY_CTX *pkctx = CMS_RecipientInfo_get0_pkey_ctx(ri);
int pad_mode = RSA_PKCS1_PADDING, rv = 0, labellen; int pad_mode = RSA_PKCS1_PADDING, rv = 0, labellen;
unsigned char *label; unsigned char *label;
CMS_RecipientInfo_ktri_get0_algs(ri, NULL, NULL, &alg); CMS_RecipientInfo_ktri_get0_algs(ri, NULL, NULL, &alg);
if (pkctx) { if (pkctx) {
if (EVP_PKEY_CTX_get_rsa_padding(pkctx, &pad_mode) <= 0) if (EVP_PKEY_CTX_get_rsa_padding(pkctx, &pad_mode) <= 0)
......
...@@ -49,8 +49,7 @@ typedef struct { ...@@ -49,8 +49,7 @@ typedef struct {
static int pkey_rsa_init(EVP_PKEY_CTX *ctx) static int pkey_rsa_init(EVP_PKEY_CTX *ctx)
{ {
RSA_PKEY_CTX *rctx; RSA_PKEY_CTX *rctx = OPENSSL_zalloc(sizeof(*rctx));
rctx = OPENSSL_zalloc(sizeof(*rctx));
if (rctx == NULL) if (rctx == NULL)
return 0; return 0;
rctx->nbits = 1024; rctx->nbits = 1024;
...@@ -70,6 +69,7 @@ static int pkey_rsa_init(EVP_PKEY_CTX *ctx) ...@@ -70,6 +69,7 @@ static int pkey_rsa_init(EVP_PKEY_CTX *ctx)
static int pkey_rsa_copy(EVP_PKEY_CTX *dst, EVP_PKEY_CTX *src) static int pkey_rsa_copy(EVP_PKEY_CTX *dst, EVP_PKEY_CTX *src)
{ {
RSA_PKEY_CTX *dctx, *sctx; RSA_PKEY_CTX *dctx, *sctx;
if (!pkey_rsa_init(dst)) if (!pkey_rsa_init(dst))
return 0; return 0;
sctx = src->data; sctx = src->data;
...@@ -95,7 +95,7 @@ static int pkey_rsa_copy(EVP_PKEY_CTX *dst, EVP_PKEY_CTX *src) ...@@ -95,7 +95,7 @@ static int pkey_rsa_copy(EVP_PKEY_CTX *dst, EVP_PKEY_CTX *src)
static int setup_tbuf(RSA_PKEY_CTX *ctx, EVP_PKEY_CTX *pk) static int setup_tbuf(RSA_PKEY_CTX *ctx, EVP_PKEY_CTX *pk)
{ {
if (ctx->tbuf) if (ctx->tbuf != NULL)
return 1; return 1;
ctx->tbuf = OPENSSL_malloc(EVP_PKEY_size(pk->pkey)); ctx->tbuf = OPENSSL_malloc(EVP_PKEY_size(pk->pkey));
if (ctx->tbuf == NULL) if (ctx->tbuf == NULL)
...@@ -234,6 +234,7 @@ static int pkey_rsa_verify(EVP_PKEY_CTX *ctx, ...@@ -234,6 +234,7 @@ static int pkey_rsa_verify(EVP_PKEY_CTX *ctx,
RSA_PKEY_CTX *rctx = ctx->data; RSA_PKEY_CTX *rctx = ctx->data;
RSA *rsa = ctx->pkey->pkey.rsa; RSA *rsa = ctx->pkey->pkey.rsa;
size_t rslen; size_t rslen;
if (rctx->md) { if (rctx->md) {
if (rctx->pad_mode == RSA_PKCS1_PADDING) if (rctx->pad_mode == RSA_PKCS1_PADDING)
return RSA_verify(EVP_MD_type(rctx->md), tbs, tbslen, return RSA_verify(EVP_MD_type(rctx->md), tbs, tbslen,
...@@ -283,6 +284,7 @@ static int pkey_rsa_encrypt(EVP_PKEY_CTX *ctx, ...@@ -283,6 +284,7 @@ static int pkey_rsa_encrypt(EVP_PKEY_CTX *ctx,
{ {
int ret; int ret;
RSA_PKEY_CTX *rctx = ctx->data; RSA_PKEY_CTX *rctx = ctx->data;
if (rctx->pad_mode == RSA_PKCS1_OAEP_PADDING) { if (rctx->pad_mode == RSA_PKCS1_OAEP_PADDING) {
int klen = RSA_size(ctx->pkey->pkey.rsa); int klen = RSA_size(ctx->pkey->pkey.rsa);
if (!setup_tbuf(rctx, ctx)) if (!setup_tbuf(rctx, ctx))
...@@ -310,6 +312,7 @@ static int pkey_rsa_decrypt(EVP_PKEY_CTX *ctx, ...@@ -310,6 +312,7 @@ static int pkey_rsa_decrypt(EVP_PKEY_CTX *ctx,
{ {
int ret; int ret;
RSA_PKEY_CTX *rctx = ctx->data; RSA_PKEY_CTX *rctx = ctx->data;
if (rctx->pad_mode == RSA_PKCS1_OAEP_PADDING) { if (rctx->pad_mode == RSA_PKCS1_OAEP_PADDING) {
int i; int i;
if (!setup_tbuf(rctx, ctx)) if (!setup_tbuf(rctx, ctx))
...@@ -339,6 +342,7 @@ static int pkey_rsa_decrypt(EVP_PKEY_CTX *ctx, ...@@ -339,6 +342,7 @@ static int pkey_rsa_decrypt(EVP_PKEY_CTX *ctx,
static int check_padding_md(const EVP_MD *md, int padding) static int check_padding_md(const EVP_MD *md, int padding)
{ {
int mdnid; int mdnid;
if (!md) if (!md)
return 1; return 1;
...@@ -383,6 +387,7 @@ static int check_padding_md(const EVP_MD *md, int padding) ...@@ -383,6 +387,7 @@ static int check_padding_md(const EVP_MD *md, int padding)
static int pkey_rsa_ctrl(EVP_PKEY_CTX *ctx, int type, int p1, void *p2) static int pkey_rsa_ctrl(EVP_PKEY_CTX *ctx, int type, int p1, void *p2)
{ {
RSA_PKEY_CTX *rctx = ctx->data; RSA_PKEY_CTX *rctx = ctx->data;
switch (type) { switch (type) {
case EVP_PKEY_CTRL_RSA_PADDING: case EVP_PKEY_CTRL_RSA_PADDING:
if ((p1 >= RSA_PKCS1_PADDING) && (p1 <= RSA_PKCS1_PSS_PADDING)) { if ((p1 >= RSA_PKCS1_PADDING) && (p1 <= RSA_PKCS1_PSS_PADDING)) {
...@@ -554,7 +559,7 @@ static int pkey_rsa_ctrl(EVP_PKEY_CTX *ctx, int type, int p1, void *p2) ...@@ -554,7 +559,7 @@ static int pkey_rsa_ctrl(EVP_PKEY_CTX *ctx, int type, int p1, void *p2)
static int pkey_rsa_ctrl_str(EVP_PKEY_CTX *ctx, static int pkey_rsa_ctrl_str(EVP_PKEY_CTX *ctx,
const char *type, const char *value) const char *type, const char *value)
{ {
if (!value) { if (value == NULL) {
RSAerr(RSA_F_PKEY_RSA_CTRL_STR, RSA_R_VALUE_MISSING); RSAerr(RSA_F_PKEY_RSA_CTRL_STR, RSA_R_VALUE_MISSING);
return 0; return 0;
} }
...@@ -650,6 +655,7 @@ static int pkey_rsa_ctrl_str(EVP_PKEY_CTX *ctx, ...@@ -650,6 +655,7 @@ static int pkey_rsa_ctrl_str(EVP_PKEY_CTX *ctx,
static int rsa_set_pss_param(RSA *rsa, EVP_PKEY_CTX *ctx) static int rsa_set_pss_param(RSA *rsa, EVP_PKEY_CTX *ctx)
{ {
RSA_PKEY_CTX *rctx = ctx->data; RSA_PKEY_CTX *rctx = ctx->data;
if (!pkey_ctx_is_pss(ctx)) if (!pkey_ctx_is_pss(ctx))
return 1; return 1;
/* If all parameters are default values don't set pss */ /* If all parameters are default values don't set pss */
...@@ -668,6 +674,7 @@ static int pkey_rsa_keygen(EVP_PKEY_CTX *ctx, EVP_PKEY *pkey) ...@@ -668,6 +674,7 @@ static int pkey_rsa_keygen(EVP_PKEY_CTX *ctx, EVP_PKEY *pkey)
RSA_PKEY_CTX *rctx = ctx->data; RSA_PKEY_CTX *rctx = ctx->data;
BN_GENCB *pcb; BN_GENCB *pcb;
int ret; int ret;
if (rctx->pub_exp == NULL) { if (rctx->pub_exp == NULL) {
rctx->pub_exp = BN_new(); rctx->pub_exp = BN_new();
if (rctx->pub_exp == NULL || !BN_set_word(rctx->pub_exp, RSA_F4)) if (rctx->pub_exp == NULL || !BN_set_word(rctx->pub_exp, RSA_F4))
...@@ -745,6 +752,7 @@ static int pkey_pss_init(EVP_PKEY_CTX *ctx) ...@@ -745,6 +752,7 @@ static int pkey_pss_init(EVP_PKEY_CTX *ctx)
const EVP_MD *md; const EVP_MD *md;
const EVP_MD *mgf1md; const EVP_MD *mgf1md;
int min_saltlen; int min_saltlen;
/* Should never happen */ /* Should never happen */
if (!pkey_ctx_is_pss(ctx)) if (!pkey_ctx_is_pss(ctx))
return 0; return 0;
......
Markdown is supported
0% .
You are about to add 0 people to the discussion. Proceed with caution.
先完成此消息的编辑!
想要评论请 注册