Typo.
[openssl.git] / crypto / pkcs12 / p12_decr.c
index d28e886..9d3557e 100644 (file)
@@ -1,5 +1,5 @@
 /* p12_decr.c */
 /* p12_decr.c */
-/* Written by Dr Stephen N Henson (shenson@bigfoot.com) for the OpenSSL
+/* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL
  * project 1999.
  */
 /* ====================================================================
  * project 1999.
  */
 /* ====================================================================
 
 #include <stdio.h>
 #include "cryptlib.h"
 
 #include <stdio.h>
 #include "cryptlib.h"
-#include "pkcs12.h"
+#include <openssl/pkcs12.h>
 
 /* Define this to dump decrypted output to files called DERnnn */
 /*#define DEBUG_DECRYPT*/
 
 
 /* Encrypt/Decrypt a buffer based on password and algor, result in a
 
 /* Define this to dump decrypted output to files called DERnnn */
 /*#define DEBUG_DECRYPT*/
 
 
 /* Encrypt/Decrypt a buffer based on password and algor, result in a
- * Malloc'ed buffer
+ * OPENSSL_malloc'ed buffer
  */
 
  */
 
-unsigned char * PKCS12_pbe_crypt (algor, pass, passlen, in, inlen,
-                                                data, datalen, en_de)
-X509_ALGOR *algor;
-unsigned char *pass;
-int passlen;
-unsigned char *in;
-int inlen;
-unsigned char **data;
-int *datalen;
-int en_de;
+unsigned char * PKCS12_pbe_crypt(X509_ALGOR *algor, const char *pass,
+            int passlen, unsigned char *in, int inlen, unsigned char **data,
+            int *datalen, int en_de)
 {
        unsigned char *out;
        int outlen, i;
        EVP_CIPHER_CTX ctx;
 
 {
        unsigned char *out;
        int outlen, i;
        EVP_CIPHER_CTX ctx;
 
-       if(!(out = Malloc (inlen + 8))) {
-               PKCS12err(PKCS12_F_PKCS12_PBE_CRYPT,ERR_R_MALLOC_FAILURE);
-               return NULL;
-       }
-
+       EVP_CIPHER_CTX_init(&ctx);
        /* Decrypt data */
        /* Decrypt data */
-        if (!EVP_PBE_ALGOR_CipherInit (algor, pass, passlen, &ctx, en_de)) {
+        if (!EVP_PBE_CipherInit(algor->algorithm, pass, passlen,
+                                        algor->parameter, &ctx, en_de)) {
                PKCS12err(PKCS12_F_PKCS12_PBE_CRYPT,PKCS12_R_PKCS12_ALGOR_CIPHERINIT_ERROR);
                return NULL;
        }
                PKCS12err(PKCS12_F_PKCS12_PBE_CRYPT,PKCS12_R_PKCS12_ALGOR_CIPHERINIT_ERROR);
                return NULL;
        }
-       EVP_CipherUpdate (&ctx, out, &i, in, inlen);
+
+       if(!(out = OPENSSL_malloc(inlen + EVP_CIPHER_CTX_block_size(&ctx)))) {
+               PKCS12err(PKCS12_F_PKCS12_PBE_CRYPT,ERR_R_MALLOC_FAILURE);
+               goto err;
+       }
+
+       if (!EVP_CipherUpdate(&ctx, out, &i, in, inlen))
+               {
+               OPENSSL_free(out);
+               out = NULL;
+               PKCS12err(PKCS12_F_PKCS12_PBE_CRYPT,ERR_R_EVP_LIB);
+               goto err;
+               }
+
        outlen = i;
        outlen = i;
-       if(!EVP_CipherFinal (&ctx, out + i, &i)) {
-               Free (out);
+       if(!EVP_CipherFinal_ex(&ctx, out + i, &i)) {
+               OPENSSL_free(out);
+               out = NULL;
                PKCS12err(PKCS12_F_PKCS12_PBE_CRYPT,PKCS12_R_PKCS12_CIPHERFINAL_ERROR);
                PKCS12err(PKCS12_F_PKCS12_PBE_CRYPT,PKCS12_R_PKCS12_CIPHERFINAL_ERROR);
-               return NULL;
+               goto err;
        }
        outlen += i;
        if (datalen) *datalen = outlen;
        if (data) *data = out;
        }
        outlen += i;
        if (datalen) *datalen = outlen;
        if (data) *data = out;
+       err:
+       EVP_CIPHER_CTX_cleanup(&ctx);
        return out;
 
 }
 
 /* Decrypt an OCTET STRING and decode ASN1 structure 
        return out;
 
 }
 
 /* Decrypt an OCTET STRING and decode ASN1 structure 
- * if seq & 1 'obj' is a stack of structures to be encoded
- * if seq & 2 zero buffer after use
- * as a sequence.
+ * if zbuf set zero buffer after use.
  */
 
  */
 
-char * PKCS12_decrypt_d2i (algor, d2i, free_func, pass, passlen, oct, seq)
-X509_ALGOR *algor;
-char * (*d2i)();
-void (*free_func)();
-unsigned char *pass;
-int passlen;
-ASN1_OCTET_STRING *oct;
-int seq;
+void * PKCS12_item_decrypt_d2i(X509_ALGOR *algor, const ASN1_ITEM *it,
+            const char *pass, int passlen, ASN1_OCTET_STRING *oct, int zbuf)
 {
 {
-       unsigned char *out, *p, *ret;
+       unsigned char *out;
+       const unsigned char *p;
+       void *ret;
        int outlen;
        int outlen;
-       if (!PKCS12_pbe_crypt (algor, pass, passlen, oct->data, oct->length,
-                                &out, &outlen, 0)) {
-               PKCS12err(PKCS12_F_PKCS12_DECRYPT_D2I,PKCS12_R_PKCS12_PBE_CRYPT_ERROR);
+
+       if (!PKCS12_pbe_crypt(algor, pass, passlen, oct->data, oct->length,
+                              &out, &outlen, 0)) {
+               PKCS12err(PKCS12_F_PKCS12_ITEM_DECRYPT_D2I,PKCS12_R_PKCS12_PBE_CRYPT_ERROR);
                return NULL;
        }
        p = out;
                return NULL;
        }
        p = out;
@@ -142,56 +143,42 @@ int seq;
                fclose(op);
        }
 #endif
                fclose(op);
        }
 #endif
-       if (seq & 1) ret = (char *) d2i_ASN1_SET(NULL, &p, outlen, d2i,
-                               free_func, V_ASN1_SEQUENCE, V_ASN1_UNIVERSAL);
-       else ret = d2i(NULL, &p, outlen);
-       if (seq & 2) memset(out, 0, outlen);
-       if(!ret) PKCS12err(PKCS12_F_PKCS12_DECRYPT_D2I,PKCS12_R_DECODE_ERROR);
-       Free (out);
+       ret = ASN1_item_d2i(NULL, &p, outlen, it);
+       if (zbuf) OPENSSL_cleanse(out, outlen);
+       if(!ret) PKCS12err(PKCS12_F_PKCS12_ITEM_DECRYPT_D2I,PKCS12_R_DECODE_ERROR);
+       OPENSSL_free(out);
        return ret;
 }
 
 /* Encode ASN1 structure and encrypt, return OCTET STRING 
        return ret;
 }
 
 /* Encode ASN1 structure and encrypt, return OCTET STRING 
- * if 'seq' is non-zero 'obj' is a stack of structures to be encoded
- * as a sequence
+ * if zbuf set zero encoding.
  */
 
  */
 
-ASN1_OCTET_STRING *PKCS12_i2d_encrypt (algor, i2d, pass, passlen, obj, seq)
-X509_ALGOR *algor;
-int (*i2d)();
-unsigned char *pass;
-int passlen;
-char *obj;
-int seq;
+ASN1_OCTET_STRING *PKCS12_item_i2d_encrypt(X509_ALGOR *algor, const ASN1_ITEM *it,
+                                      const char *pass, int passlen,
+                                      void *obj, int zbuf)
 {
        ASN1_OCTET_STRING *oct;
 {
        ASN1_OCTET_STRING *oct;
-       unsigned char *in, *p;
+       unsigned char *in = NULL;
        int inlen;
        int inlen;
-       if (!(oct = ASN1_OCTET_STRING_new ())) {
-               PKCS12err(PKCS12_F_PKCS12_I2D_ENCRYPT,ERR_R_MALLOC_FAILURE);
+       if (!(oct = M_ASN1_OCTET_STRING_new ())) {
+               PKCS12err(PKCS12_F_PKCS12_ITEM_I2D_ENCRYPT,ERR_R_MALLOC_FAILURE);
                return NULL;
        }
                return NULL;
        }
-       if (seq) inlen = i2d_ASN1_SET((STACK *)obj, NULL, i2d, V_ASN1_SEQUENCE,
-                                                V_ASN1_UNIVERSAL, IS_SEQUENCE);
-       else inlen = i2d (obj, NULL);
-       if (!inlen) {
-               PKCS12err(PKCS12_F_PKCS12_I2D_ENCRYPT,PKCS12_R_ENCODE_ERROR);
+       inlen = ASN1_item_i2d(obj, &in, it);
+       if (!in) {
+               PKCS12err(PKCS12_F_PKCS12_ITEM_I2D_ENCRYPT,PKCS12_R_ENCODE_ERROR);
                return NULL;
        }
                return NULL;
        }
-       if (!(in = Malloc (inlen))) {
-               PKCS12err(PKCS12_F_PKCS12_I2D_ENCRYPT,ERR_R_MALLOC_FAILURE);
-               return NULL;
-       }
-       p = in;
-       if (seq) i2d_ASN1_SET((STACK *)obj, &p, i2d, V_ASN1_SEQUENCE,
-                                                V_ASN1_UNIVERSAL, IS_SEQUENCE);
-       else i2d (obj, &p);
-       if (!PKCS12_pbe_crypt (algor, pass, passlen, in, inlen, &oct->data,
+       if (!PKCS12_pbe_crypt(algor, pass, passlen, in, inlen, &oct->data,
                                 &oct->length, 1)) {
                                 &oct->length, 1)) {
-               PKCS12err(PKCS12_F_PKCS12_I2D_ENCRYPT,PKCS12_R_ENCRYPT_ERROR);
-               Free(in);
+               PKCS12err(PKCS12_F_PKCS12_ITEM_I2D_ENCRYPT,PKCS12_R_ENCRYPT_ERROR);
+               OPENSSL_free(in);
                return NULL;
        }
                return NULL;
        }
-       Free (in);
+       if (zbuf) OPENSSL_cleanse(in, inlen);
+       OPENSSL_free(in);
        return oct;
 }
        return oct;
 }
+
+IMPLEMENT_PKCS12_STACK_OF(PKCS7)