summaryrefslogtreecommitdiff
path: root/lib/x509/key_encode.c
diff options
context:
space:
mode:
Diffstat (limited to 'lib/x509/key_encode.c')
-rw-r--r--lib/x509/key_encode.c61
1 files changed, 10 insertions, 51 deletions
diff --git a/lib/x509/key_encode.c b/lib/x509/key_encode.c
index 98b9769b59..d9d2cc8984 100644
--- a/lib/x509/key_encode.c
+++ b/lib/x509/key_encode.c
@@ -490,7 +490,7 @@ _gnutls_x509_write_dsa_pubkey(gnutls_pk_params_st * params,
/* Encodes the RSA parameters into an ASN.1 RSA private key structure.
*/
static int
-_gnutls_asn1_encode_rsa(ASN1_TYPE * c2, gnutls_pk_params_st * params, unsigned compat)
+_gnutls_asn1_encode_rsa(ASN1_TYPE * c2, gnutls_pk_params_st * params)
{
int result, ret;
uint8_t null = '\0';
@@ -596,34 +596,11 @@ _gnutls_asn1_encode_rsa(ASN1_TYPE * c2, gnutls_pk_params_st * params, unsigned c
goto cleanup;
}
- if (compat == 0 && (params->flags & GNUTLS_PK_FLAG_PROVABLE) && params->seed_size > 0) {
- if ((result = asn1_write_value(*c2, "otherInfo",
- "seed", 1)) != ASN1_SUCCESS) {
- gnutls_assert();
- ret = _gnutls_asn2err(result);
- goto cleanup;
- }
-
- if ((result = asn1_write_value(*c2, "otherInfo.seed.seed",
- params->seed, params->seed_size)) != ASN1_SUCCESS) {
- gnutls_assert();
- ret = _gnutls_asn2err(result);
- goto cleanup;
- }
-
- if ((result = asn1_write_value(*c2, "otherInfo.seed.algorithm",
- gnutls_digest_get_oid(params->palgo), 1)) != ASN1_SUCCESS) {
- gnutls_assert();
- ret = _gnutls_asn2err(result);
- goto cleanup;
- }
- } else {
- if ((result = asn1_write_value(*c2, "otherInfo",
- NULL, 0)) != ASN1_SUCCESS) {
- gnutls_assert();
- ret = _gnutls_asn2err(result);
- goto cleanup;
- }
+ if ((result = asn1_write_value(*c2, "otherPrimeInfos",
+ NULL, 0)) != ASN1_SUCCESS) {
+ gnutls_assert();
+ ret = _gnutls_asn2err(result);
+ goto cleanup;
}
if ((result =
@@ -756,7 +733,7 @@ cleanup:
/* Encodes the DSA parameters into an ASN.1 DSAPrivateKey structure.
*/
static int
-_gnutls_asn1_encode_dsa(ASN1_TYPE * c2, gnutls_pk_params_st * params, unsigned compat)
+_gnutls_asn1_encode_dsa(ASN1_TYPE * c2, gnutls_pk_params_st * params)
{
int result, ret;
const uint8_t null = '\0';
@@ -816,24 +793,6 @@ _gnutls_asn1_encode_dsa(ASN1_TYPE * c2, gnutls_pk_params_st * params, unsigned c
goto cleanup;
}
- if (params->seed_size > 0 && compat == 0) {
- if ((result = asn1_write_value(*c2, "seed.seed",
- params->seed, params->seed_size)) != ASN1_SUCCESS) {
- gnutls_assert();
- ret = _gnutls_asn2err(result);
- goto cleanup;
- }
-
- if ((result = asn1_write_value(*c2, "seed.algorithm",
- gnutls_digest_get_oid(params->palgo), 1)) != ASN1_SUCCESS) {
- gnutls_assert();
- ret = _gnutls_asn2err(result);
- goto cleanup;
- }
- } else {
- (void)asn1_write_value(*c2, "seed", NULL, 0);
- }
-
if ((result =
asn1_write_value(*c2, "version", &null, 1)) != ASN1_SUCCESS) {
gnutls_assert();
@@ -850,14 +809,14 @@ cleanup:
}
int _gnutls_asn1_encode_privkey(ASN1_TYPE * c2,
- gnutls_pk_params_st * params, unsigned compat)
+ gnutls_pk_params_st * params)
{
switch (params->algo) {
case GNUTLS_PK_RSA:
case GNUTLS_PK_RSA_PSS:
- return _gnutls_asn1_encode_rsa(c2, params, compat);
+ return _gnutls_asn1_encode_rsa(c2, params);
case GNUTLS_PK_DSA:
- return _gnutls_asn1_encode_dsa(c2, params, compat);
+ return _gnutls_asn1_encode_dsa(c2, params);
case GNUTLS_PK_ECDSA:
case GNUTLS_PK_EDDSA_ED25519:
return _gnutls_asn1_encode_ecc(c2, params);