зеркало из https://github.com/mozilla/gecko-dev.git
Remove FORTEZZA code from this file. Coverity CID 874. r=rrelyea.
This commit is contained in:
Родитель
69ec9e2118
Коммит
4fde45d139
|
@ -37,7 +37,7 @@
|
||||||
/*
|
/*
|
||||||
* CMS recipientInfo methods.
|
* CMS recipientInfo methods.
|
||||||
*
|
*
|
||||||
* $Id: cmsrecinfo.c,v 1.18 2006/03/03 04:00:49 nelson%bolyard.com Exp $
|
* $Id: cmsrecinfo.c,v 1.19 2006/07/19 00:36:38 nelson%bolyard.com Exp $
|
||||||
*/
|
*/
|
||||||
|
|
||||||
#include "cmslocal.h"
|
#include "cmslocal.h"
|
||||||
|
@ -191,24 +191,6 @@ nss_cmsrecipientinfo_create(NSSCMSMessage *cmsg,
|
||||||
rv = SECFailure;
|
rv = SECFailure;
|
||||||
}
|
}
|
||||||
break;
|
break;
|
||||||
case SEC_OID_MISSI_KEA_DSS_OLD:
|
|
||||||
case SEC_OID_MISSI_KEA_DSS:
|
|
||||||
case SEC_OID_MISSI_KEA:
|
|
||||||
PORT_Assert(type == NSSCMSRecipientID_IssuerSN);
|
|
||||||
if (type != NSSCMSRecipientID_IssuerSN) {
|
|
||||||
rv = SECFailure;
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
/* backward compatibility - this is not really a keytrans operation */
|
|
||||||
ri->recipientInfoType = NSSCMSRecipientInfoID_KeyTrans;
|
|
||||||
/* hardcoded issuerSN choice for now */
|
|
||||||
ri->ri.keyTransRecipientInfo.recipientIdentifier.identifierType = NSSCMSRecipientID_IssuerSN;
|
|
||||||
ri->ri.keyTransRecipientInfo.recipientIdentifier.id.issuerAndSN = CERT_GetCertIssuerAndSN(poolp, cert);
|
|
||||||
if (ri->ri.keyTransRecipientInfo.recipientIdentifier.id.issuerAndSN == NULL) {
|
|
||||||
rv = SECFailure;
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
break;
|
|
||||||
case SEC_OID_X942_DIFFIE_HELMAN_KEY: /* dh-public-number */
|
case SEC_OID_X942_DIFFIE_HELMAN_KEY: /* dh-public-number */
|
||||||
PORT_Assert(type == NSSCMSRecipientID_IssuerSN);
|
PORT_Assert(type == NSSCMSRecipientID_IssuerSN);
|
||||||
if (type != NSSCMSRecipientID_IssuerSN) {
|
if (type != NSSCMSRecipientID_IssuerSN) {
|
||||||
|
@ -534,20 +516,6 @@ NSS_CMSRecipientInfo_WrapBulkKey(NSSCMSRecipientInfo *ri, PK11SymKey *bulkkey,
|
||||||
|
|
||||||
rv = SECOID_SetAlgorithmID(poolp, &(ri->ri.keyTransRecipientInfo.keyEncAlg), certalgtag, NULL);
|
rv = SECOID_SetAlgorithmID(poolp, &(ri->ri.keyTransRecipientInfo.keyEncAlg), certalgtag, NULL);
|
||||||
break;
|
break;
|
||||||
case SEC_OID_MISSI_KEA_DSS_OLD:
|
|
||||||
case SEC_OID_MISSI_KEA_DSS:
|
|
||||||
case SEC_OID_MISSI_KEA:
|
|
||||||
rv = NSS_CMSUtil_EncryptSymKey_MISSI(poolp, cert, bulkkey,
|
|
||||||
bulkalgtag,
|
|
||||||
&ri->ri.keyTransRecipientInfo.encKey,
|
|
||||||
¶ms, ri->cmsg->pwfn_arg);
|
|
||||||
if (rv != SECSuccess)
|
|
||||||
break;
|
|
||||||
|
|
||||||
/* here, we DO need to pass the params to the wrap function because, with
|
|
||||||
* RSA, there is no funny stuff going on with generation of IV vectors or so */
|
|
||||||
rv = SECOID_SetAlgorithmID(poolp, &(ri->ri.keyTransRecipientInfo.keyEncAlg), certalgtag, params);
|
|
||||||
break;
|
|
||||||
case SEC_OID_X942_DIFFIE_HELMAN_KEY: /* dh-public-number */
|
case SEC_OID_X942_DIFFIE_HELMAN_KEY: /* dh-public-number */
|
||||||
rek = ri->ri.keyAgreeRecipientInfo.recipientEncryptedKeys[0];
|
rek = ri->ri.keyAgreeRecipientInfo.recipientEncryptedKeys[0];
|
||||||
if (rek == NULL) {
|
if (rek == NULL) {
|
||||||
|
|
Загрузка…
Ссылка в новой задаче