Line | Source | Count |
1 | | - |
2 | | - |
3 | | - |
4 | void PKCS12_PBE_add(void) | - |
5 | { | - |
6 | } | - |
7 | | - |
8 | int PKCS12_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, | - |
9 | ASN1_TYPE *param, const EVP_CIPHER *cipher, | - |
10 | const EVP_MD *md, int en_de) | - |
11 | { | - |
12 | PBEPARAM *pbe; | - |
13 | int saltlen, iter, ret; | - |
14 | unsigned char *salt; | - |
15 | unsigned char key[64], iv[16]; | - |
16 | int (*pkcs12_key_gen)(const char *pass, int passlen, | - |
17 | unsigned char *salt, int slen, | - |
18 | int id, int iter, int n, | - |
19 | unsigned char *out, | - |
20 | const EVP_MD *md_type); | - |
21 | | - |
22 | pkcs12_key_gen = PKCS12_key_gen_utf8; | - |
23 | | - |
24 | if (cipher == TRUE | never evaluated | FALSE | never evaluated |
| 0 |
25 | ((void *)0)TRUE | never evaluated | FALSE | never evaluated |
| 0 |
26 | ) | - |
27 | return never executed: return 0; 0;never executed: return 0; | 0 |
28 | | - |
29 | | - |
30 | | - |
31 | pbe = ASN1_TYPE_unpack_sequence((&(PBEPARAM_it)), param); | - |
32 | if (pbe == TRUE | never evaluated | FALSE | never evaluated |
| 0 |
33 | ((void *)0)TRUE | never evaluated | FALSE | never evaluated |
| 0 |
34 | ) { | - |
35 | ERR_put_error(35,(120),(101),__FILE__,43); | - |
36 | return never executed: return 0; 0;never executed: return 0; | 0 |
37 | } | - |
38 | | - |
39 | if (!pbe->iterTRUE | never evaluated | FALSE | never evaluated |
) | 0 |
40 | iter = 1; never executed: iter = 1; | 0 |
41 | else | - |
42 | iter = ASN1_INTEGER_get(pbe->iter); never executed: iter = ASN1_INTEGER_get(pbe->iter); | 0 |
43 | salt = pbe->salt->data; | - |
44 | saltlen = pbe->salt->length; | - |
45 | if (!(*pkcs12_key_gen)(pass, passlen, salt, saltlen, 1,TRUE | never evaluated | FALSE | never evaluated |
| 0 |
46 | iter, EVP_CIPHER_key_length(cipher), key, md)TRUE | never evaluated | FALSE | never evaluated |
) { | 0 |
47 | ERR_put_error(35,(120),(107),__FILE__,55); | - |
48 | PBEPARAM_free(pbe); | - |
49 | return never executed: return 0; 0;never executed: return 0; | 0 |
50 | } | - |
51 | if (!(*pkcs12_key_gen)(pass, passlen, salt, saltlen, 2,TRUE | never evaluated | FALSE | never evaluated |
| 0 |
52 | iter, EVP_CIPHER_iv_length(cipher), iv, md)TRUE | never evaluated | FALSE | never evaluated |
) { | 0 |
53 | ERR_put_error(35,(120),(106),__FILE__,61); | - |
54 | PBEPARAM_free(pbe); | - |
55 | return never executed: return 0; 0;never executed: return 0; | 0 |
56 | } | - |
57 | PBEPARAM_free(pbe); | - |
58 | ret = EVP_CipherInit_ex(ctx, cipher, | - |
59 | ((void *)0) | - |
60 | , key, iv, en_de); | - |
61 | OPENSSL_cleanse(key, 64); | - |
62 | OPENSSL_cleanse(iv, 16); | - |
63 | return never executed: return ret; ret;never executed: return ret; | 0 |
64 | } | - |
| | |