aboutsummaryrefslogtreecommitdiff
path: root/sbin
diff options
context:
space:
mode:
authorJung-uk Kim <jkim@FreeBSD.org>2018-09-19 07:07:03 +0000
committerJung-uk Kim <jkim@FreeBSD.org>2018-09-19 07:07:03 +0000
commit3548eb3aab713ea0af80abc227e0f841407af6d0 (patch)
tree37024ce1569f8e2c8f0b10737adb615eb7ab85d2 /sbin
parent328bbc11c9bd7cef2d88a18692b94dab995654c8 (diff)
downloadsrc-3548eb3aab713ea0af80abc227e0f841407af6d0.tar.gz
src-3548eb3aab713ea0af80abc227e0f841407af6d0.zip
Make decryptcore(8) buildable.
Notes
Notes: svn path=/projects/openssl111/; revision=338782
Diffstat (limited to 'sbin')
-rw-r--r--sbin/decryptcore/decryptcore.c20
1 files changed, 12 insertions, 8 deletions
diff --git a/sbin/decryptcore/decryptcore.c b/sbin/decryptcore/decryptcore.c
index 76003d60a761..6957e847b419 100644
--- a/sbin/decryptcore/decryptcore.c
+++ b/sbin/decryptcore/decryptcore.c
@@ -120,7 +120,7 @@ decrypt(int ofd, const char *privkeyfile, const char *keyfile,
const char *input)
{
uint8_t buf[KERNELDUMP_BUFFER_SIZE], key[KERNELDUMP_KEY_MAX_SIZE];
- EVP_CIPHER_CTX ctx;
+ EVP_CIPHER_CTX *ctx;
const EVP_CIPHER *cipher;
FILE *fp;
struct kerneldumpkey *kdk;
@@ -134,6 +134,7 @@ decrypt(int ofd, const char *privkeyfile, const char *keyfile,
PJDLOG_ASSERT(keyfile != NULL);
PJDLOG_ASSERT(input != NULL);
+ ctx = NULL;
privkey = NULL;
/*
@@ -179,7 +180,9 @@ decrypt(int ofd, const char *privkeyfile, const char *keyfile,
ERR_error_string(ERR_get_error(), NULL));
goto failed;
}
- EVP_CIPHER_CTX_init(&ctx);
+ ctx = EVP_CIPHER_CTX_new();
+ if (ctx == NULL)
+ goto failed;
kdk = read_key(kfd);
close(kfd);
@@ -219,8 +222,8 @@ decrypt(int ofd, const char *privkeyfile, const char *keyfile,
RSA_free(privkey);
privkey = NULL;
- EVP_DecryptInit_ex(&ctx, cipher, NULL, key, kdk->kdk_iv);
- EVP_CIPHER_CTX_set_padding(&ctx, 0);
+ EVP_DecryptInit_ex(ctx, cipher, NULL, key, kdk->kdk_iv);
+ EVP_CIPHER_CTX_set_padding(ctx, 0);
explicit_bzero(key, sizeof(key));
@@ -233,13 +236,13 @@ decrypt(int ofd, const char *privkeyfile, const char *keyfile,
}
if (bytes > 0) {
- if (EVP_DecryptUpdate(&ctx, buf, &olen, buf,
+ if (EVP_DecryptUpdate(ctx, buf, &olen, buf,
bytes) == 0) {
pjdlog_error("Unable to decrypt core.");
goto failed;
}
} else {
- if (EVP_DecryptFinal_ex(&ctx, buf, &olen) == 0) {
+ if (EVP_DecryptFinal_ex(ctx, buf, &olen) == 0) {
pjdlog_error("Unable to decrypt core.");
goto failed;
}
@@ -252,13 +255,14 @@ decrypt(int ofd, const char *privkeyfile, const char *keyfile,
} while (bytes > 0);
explicit_bzero(buf, sizeof(buf));
- EVP_CIPHER_CTX_cleanup(&ctx);
+ EVP_CIPHER_CTX_free(ctx);
exit(0);
failed:
explicit_bzero(key, sizeof(key));
explicit_bzero(buf, sizeof(buf));
RSA_free(privkey);
- EVP_CIPHER_CTX_cleanup(&ctx);
+ if (ctx != NULL)
+ EVP_CIPHER_CTX_free(ctx);
exit(1);
}