Line | Source | Count |
1 | | - |
2 | | - |
3 | | - |
4 | | - |
5 | void | - |
6 | PKCS12_PBE_add(void) | - |
7 | { | - |
8 | } | - |
9 | | - |
10 | int | - |
11 | PKCS12_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, | - |
12 | ASN1_TYPE *param, const EVP_CIPHER *cipher, const EVP_MD *md, int en_de) | - |
13 | { | - |
14 | PBEPARAM *pbe; | - |
15 | int saltlen, iter, ret; | - |
16 | unsigned char *salt; | - |
17 | const unsigned char *pbuf; | - |
18 | unsigned char key[64], iv[16]; | - |
19 | | - |
20 | | - |
21 | if (param == TRUE | never evaluated | FALSE | never evaluated |
| 0 |
22 | ((void *)0)TRUE | never evaluated | FALSE | never evaluated |
| 0 |
23 | || param->type != 16TRUE | never evaluated | FALSE | never evaluated |
|| | 0 |
24 | param->value.sequence == TRUE | never evaluated | FALSE | never evaluated |
| 0 |
25 | ((void *)0)TRUE | never evaluated | FALSE | never evaluated |
| 0 |
26 | ) { | - |
27 | ERR_put_error(35,(0xfff),(101),__FILE__,85); | - |
28 | return never executed: return 0; 0;never executed: return 0; | 0 |
29 | } | - |
30 | | - |
31 | pbuf = param->value.sequence->data; | - |
32 | if (!(pbe = d2i_PBEPARAM(TRUE | never evaluated | FALSE | never evaluated |
| 0 |
33 | ((void *)0)TRUE | never evaluated | FALSE | never evaluated |
| 0 |
34 | , &pbuf, param->value.sequence->length))TRUE | never evaluated | FALSE | never evaluated |
) { | 0 |
35 | ERR_put_error(35,(0xfff),(101),__FILE__,91); | - |
36 | return never executed: return 0; 0;never executed: return 0; | 0 |
37 | } | - |
38 | | - |
39 | if (!pbe->iterTRUE | never evaluated | FALSE | never evaluated |
) | 0 |
40 | iter = 1; never executed: iter = 1; | 0 |
41 | else if ((TRUE | never evaluated | FALSE | never evaluated |
iter = ASN1_INTEGER_get(pbe->iter)) <= 0TRUE | never evaluated | FALSE | never evaluated |
) { | 0 |
42 | ERR_put_error(35,(0xfff),(101),__FILE__,98); | - |
43 | PBEPARAM_free(pbe); | - |
44 | return never executed: return 0; 0;never executed: return 0; | 0 |
45 | } | - |
46 | salt = pbe->salt->data; | - |
47 | saltlen = pbe->salt->length; | - |
48 | if (!PKCS12_key_gen_asc (pass, passlen, salt, saltlen, 1,TRUE | never evaluated | FALSE | never evaluated |
| 0 |
49 | iter, EVP_CIPHER_key_length(cipher), key, md)TRUE | never evaluated | FALSE | never evaluated |
) { | 0 |
50 | ERR_put_error(35,(0xfff),(107),__FILE__,106); | - |
51 | PBEPARAM_free(pbe); | - |
52 | return never executed: return 0; 0;never executed: return 0; | 0 |
53 | } | - |
54 | if (!PKCS12_key_gen_asc (pass, passlen, salt, saltlen, 2,TRUE | never evaluated | FALSE | never evaluated |
| 0 |
55 | iter, EVP_CIPHER_iv_length(cipher), iv, md)TRUE | never evaluated | FALSE | never evaluated |
) { | 0 |
56 | ERR_put_error(35,(0xfff),(106),__FILE__,112); | - |
57 | PBEPARAM_free(pbe); | - |
58 | return never executed: return 0; 0;never executed: return 0; | 0 |
59 | } | - |
60 | PBEPARAM_free(pbe); | - |
61 | ret = EVP_CipherInit_ex(ctx, cipher, | - |
62 | ((void *)0) | - |
63 | , key, iv, en_de); | - |
64 | explicit_bzero(key, 64); | - |
65 | explicit_bzero(iv, 16); | - |
66 | return never executed: return ret; ret;never executed: return ret; | 0 |
67 | } | - |
| | |