SERIALIZER: No enc argument for OSSL_SERIALIZER_CTX_set_passphrase_cb()
authorRichard Levitte <levitte@openssl.org>
Fri, 10 Jul 2020 13:08:29 +0000 (15:08 +0200)
committerRichard Levitte <levitte@openssl.org>
Fri, 24 Jul 2020 14:43:20 +0000 (16:43 +0200)
Serialization will only encrypt, so there's no point telling
OSSL_SERIALIZER_CTX_set_passphrase_cb() that's going to happen.

We fix the declaration of OSSL_DESERIALIZER_CTX_set_passphrase_cb()
the same way.

Reviewed-by: Matt Caswell <matt@openssl.org>
Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
(Merged from https://github.com/openssl/openssl/pull/12410)

crypto/pem/pem_local.h
crypto/pem/pem_pk8.c
crypto/serializer/serializer_pkey.c
doc/man3/OSSL_SERIALIZER_CTX_new_by_EVP_PKEY.pod
include/openssl/deserializer.h
include/openssl/serializer.h

index 3b501abde789d9b2783b1b3c5be864d06541a4c3..9563925f73e05f1fecf06225c5960a1c44bb0b7b 100644 (file)
@@ -45,7 +45,7 @@
                 && !OSSL_SERIALIZER_CTX_set_passphrase(ctx, kstr, klen)) \
                 ret = 0;                                                \
             else if (cb != NULL                                         \
-                     && !OSSL_SERIALIZER_CTX_set_passphrase_cb(ctx, 1,  \
+                     && !OSSL_SERIALIZER_CTX_set_passphrase_cb(ctx,     \
                                                                cb, u))  \
                 ret = 0;                                                \
         }                                                               \
index 8dbcb65bf73d0eee89af479250764907a2ff528a..12a25b7a8260ec7315f2e9b25c6adc4393720fd9 100644 (file)
@@ -109,8 +109,7 @@ static int do_pk8pkey(BIO *bp, const EVP_PKEY *x, int isder, int nid,
                     && !OSSL_SERIALIZER_CTX_set_passphrase(ctx, ukstr, klen))
                     ret = 0;
                 else if (cb != NULL
-                         && !OSSL_SERIALIZER_CTX_set_passphrase_cb(ctx, 1,
-                                                                   cb, u))
+                         && !OSSL_SERIALIZER_CTX_set_passphrase_cb(ctx, cb, u))
                     ret = 0;
             }
         }
index 1e7fc3eafbd79e76ddd4207bf931c972412ccd02..35ddb92bd4ab75e9528c62c7fe4e864223281087 100644 (file)
@@ -71,7 +71,7 @@ int OSSL_SERIALIZER_CTX_set_passphrase_ui(OSSL_SERIALIZER_CTX *ctx,
     return 1;
 }
 
-int OSSL_SERIALIZER_CTX_set_passphrase_cb(OSSL_SERIALIZER_CTX *ctx, int enc,
+int OSSL_SERIALIZER_CTX_set_passphrase_cb(OSSL_SERIALIZER_CTX *ctx,
                                           pem_password_cb *cb, void *cbarg)
 {
     if (!ossl_assert(ctx != NULL)) {
@@ -83,7 +83,7 @@ int OSSL_SERIALIZER_CTX_set_passphrase_cb(OSSL_SERIALIZER_CTX *ctx, int enc,
     if (cb == NULL)
         return 1;
     ctx->ui_method =
-        ctx->allocated_ui_method = UI_UTIL_wrap_read_pem_callback(cb, enc);
+        ctx->allocated_ui_method = UI_UTIL_wrap_read_pem_callback(cb, 1);
     ctx->ui_data = cbarg;
 
     return ctx->ui_method != NULL;
index 43dddbce027135044ece2ae009f2a54388ef4ec7..5797ab1caa84340cb45059db63911b18911813b5 100644 (file)
@@ -31,7 +31,7 @@ OSSL_SERIALIZER_Parameters_TO_TEXT_PQ
  int OSSL_SERIALIZER_CTX_set_passphrase(OSSL_SERIALIZER_CTX *ctx,
                                         const unsigned char *kstr,
                                         size_t klen);
- int OSSL_SERIALIZER_CTX_set_passphrase_cb(OSSL_SERIALIZER_CTX *ctx, int enc,
+ int OSSL_SERIALIZER_CTX_set_passphrase_cb(OSSL_SERIALIZER_CTX *ctx,
                                            pem_password_cb *cb, void *cbarg);
  int OSSL_SERIALIZER_CTX_set_passphrase_ui(OSSL_SERIALIZER_CTX *ctx,
                                            const UI_METHOD *ui_method,
index e8752a6d1cdb18247479888d3084a978a104e17d..d54e47915da20db908f3042f148b0ffefde2dcbd 100644 (file)
@@ -61,7 +61,7 @@ int OSSL_DESERIALIZER_CTX_set_cipher(OSSL_DESERIALIZER_CTX *ctx,
 int OSSL_DESERIALIZER_CTX_set_passphrase(OSSL_DESERIALIZER_CTX *ctx,
                                          const unsigned char *kstr,
                                          size_t klen);
-int OSSL_DESERIALIZER_CTX_set_passphrase_cb(OSSL_DESERIALIZER_CTX *ctx, int enc,
+int OSSL_DESERIALIZER_CTX_set_passphrase_cb(OSSL_DESERIALIZER_CTX *ctx,
                                             pem_password_cb *cb, void *cbarg);
 int OSSL_DESERIALIZER_CTX_set_passphrase_ui(OSSL_DESERIALIZER_CTX *ctx,
                                             const UI_METHOD *ui_method,
index 8b24840786d1436ad1438339a450bd50b9a4ace8..50c85d617fe3cc023300a55e4b97a839830d27c6 100644 (file)
@@ -61,7 +61,7 @@ int OSSL_SERIALIZER_CTX_set_cipher(OSSL_SERIALIZER_CTX *ctx,
 int OSSL_SERIALIZER_CTX_set_passphrase(OSSL_SERIALIZER_CTX *ctx,
                                        const unsigned char *kstr,
                                        size_t klen);
-int OSSL_SERIALIZER_CTX_set_passphrase_cb(OSSL_SERIALIZER_CTX *ctx, int enc,
+int OSSL_SERIALIZER_CTX_set_passphrase_cb(OSSL_SERIALIZER_CTX *ctx,
                                           pem_password_cb *cb, void *cbarg);
 int OSSL_SERIALIZER_CTX_set_passphrase_ui(OSSL_SERIALIZER_CTX *ctx,
                                           const UI_METHOD *ui_method,