projects
/
openssl.git
/ blobdiff
commit
grep
author
committer
pickaxe
?
search:
re
summary
|
shortlog
|
log
|
commit
|
commitdiff
|
tree
raw
|
inline
| side by side
apps/speed.c: add -aead flag.
[openssl.git]
/
apps
/
dsa.c
diff --git
a/apps/dsa.c
b/apps/dsa.c
index d88116fb1098d7eb5029877fe73f5550cc2c0f0b..6022e64cd4cebecbb710f4dbaa85e0e6a235ddca 100644
(file)
--- a/
apps/dsa.c
+++ b/
apps/dsa.c
@@
-1,5
+1,5
@@
/*
/*
- * Copyright 1995-201
6
The OpenSSL Project Authors. All Rights Reserved.
+ * Copyright 1995-201
8
The OpenSSL Project Authors. All Rights Reserved.
*
* Licensed under the OpenSSL license (the "License"). You may not use
* this file except in compliance with the License. You can obtain a copy
*
* Licensed under the OpenSSL license (the "License"). You may not use
* this file except in compliance with the License. You can obtain a copy
@@
-17,6
+17,7
@@
NON_EMPTY_TRANSLATION_UNIT
# include <string.h>
# include <time.h>
# include "apps.h"
# include <string.h>
# include <time.h>
# include "apps.h"
+# include "progs.h"
# include <openssl/bio.h>
# include <openssl/err.h>
# include <openssl/dsa.h>
# include <openssl/bio.h>
# include <openssl/err.h>
# include <openssl/dsa.h>
@@
-161,7
+162,7
@@
int dsa_main(int argc, char **argv)
else
pkey = load_key(infile, informat, 1, passin, e, "Private Key");
else
pkey = load_key(infile, informat, 1, passin, e, "Private Key");
- if (pkey) {
+ if (pkey
!= NULL
) {
dsa = EVP_PKEY_get1_DSA(pkey);
EVP_PKEY_free(pkey);
}
dsa = EVP_PKEY_get1_DSA(pkey);
EVP_PKEY_free(pkey);
}
@@
-199,24
+200,27
@@
int dsa_main(int argc, char **argv)
}
BIO_printf(bio_err, "writing DSA key\n");
if (outformat == FORMAT_ASN1) {
}
BIO_printf(bio_err, "writing DSA key\n");
if (outformat == FORMAT_ASN1) {
- if (pubin || pubout)
+ if (pubin || pubout)
{
i = i2d_DSA_PUBKEY_bio(out, dsa);
i = i2d_DSA_PUBKEY_bio(out, dsa);
- else {
+
}
else {
assert(private);
i = i2d_DSAPrivateKey_bio(out, dsa);
}
} else if (outformat == FORMAT_PEM) {
assert(private);
i = i2d_DSAPrivateKey_bio(out, dsa);
}
} else if (outformat == FORMAT_PEM) {
- if (pubin || pubout)
+ if (pubin || pubout)
{
i = PEM_write_bio_DSA_PUBKEY(out, dsa);
i = PEM_write_bio_DSA_PUBKEY(out, dsa);
- else {
+
}
else {
assert(private);
i = PEM_write_bio_DSAPrivateKey(out, dsa, enc,
NULL, 0, NULL, passout);
}
assert(private);
i = PEM_write_bio_DSAPrivateKey(out, dsa, enc,
NULL, 0, NULL, passout);
}
-# if
!defined(OPENSSL_NO_RSA) && !defined(OPENSSL_NO_RC4)
+# if
ndef OPENSSL_NO_RSA
} else if (outformat == FORMAT_MSBLOB || outformat == FORMAT_PVK) {
EVP_PKEY *pk;
pk = EVP_PKEY_new();
} else if (outformat == FORMAT_MSBLOB || outformat == FORMAT_PVK) {
EVP_PKEY *pk;
pk = EVP_PKEY_new();
+ if (pk == NULL)
+ goto end;
+
EVP_PKEY_set1_DSA(pk, dsa);
if (outformat == FORMAT_PVK) {
if (pubin) {
EVP_PKEY_set1_DSA(pk, dsa);
if (outformat == FORMAT_PVK) {
if (pubin) {
@@
-225,11
+229,16
@@
int dsa_main(int argc, char **argv)
goto end;
}
assert(private);
goto end;
}
assert(private);
+# ifdef OPENSSL_NO_RC4
+ BIO_printf(bio_err, "PVK format not supported\n");
+ EVP_PKEY_free(pk);
+ goto end;
+# else
i = i2b_PVK_bio(out, pk, pvk_encr, 0, passout);
i = i2b_PVK_bio(out, pk, pvk_encr, 0, passout);
- }
- else if (pubin || pubout)
+# endif
+ } else if (pubin || pubout) {
i = i2b_PublicKey_bio(out, pk);
i = i2b_PublicKey_bio(out, pk);
- else {
+
}
else {
assert(private);
i = i2b_PrivateKey_bio(out, pk);
}
assert(private);
i = i2b_PrivateKey_bio(out, pk);
}
@@
-251,6
+260,6
@@
int dsa_main(int argc, char **argv)
release_engine(e);
OPENSSL_free(passin);
OPENSSL_free(passout);
release_engine(e);
OPENSSL_free(passin);
OPENSSL_free(passout);
- return
(ret)
;
+ return
ret
;
}
#endif
}
#endif