diff options
Diffstat (limited to 'scard-opensc.c')
-rw-r--r-- | scard-opensc.c | 8 |
1 files changed, 4 insertions, 4 deletions
diff --git a/scard-opensc.c b/scard-opensc.c index ff3017f5e..a9b7ebc61 100644 --- a/scard-opensc.c +++ b/scard-opensc.c | |||
@@ -189,7 +189,7 @@ sc_private_decrypt(int flen, u_char *from, u_char *to, RSA *rsa, | |||
189 | int r; | 189 | int r; |
190 | 190 | ||
191 | if (padding != RSA_PKCS1_PADDING) | 191 | if (padding != RSA_PKCS1_PADDING) |
192 | return -1; | 192 | return -1; |
193 | r = sc_prkey_op_init(rsa, &key_obj, SC_USAGE_DECRYPT); | 193 | r = sc_prkey_op_init(rsa, &key_obj, SC_USAGE_DECRYPT); |
194 | if (r) | 194 | if (r) |
195 | return -1; | 195 | return -1; |
@@ -325,7 +325,7 @@ static void | |||
325 | convert_rsa_to_rsa1(Key * in, Key * out) | 325 | convert_rsa_to_rsa1(Key * in, Key * out) |
326 | { | 326 | { |
327 | struct sc_priv_data *priv; | 327 | struct sc_priv_data *priv; |
328 | 328 | ||
329 | out->rsa->flags = in->rsa->flags; | 329 | out->rsa->flags = in->rsa->flags; |
330 | out->flags = in->flags; | 330 | out->flags = in->flags; |
331 | RSA_set_method(out->rsa, RSA_get_method(in->rsa)); | 331 | RSA_set_method(out->rsa, RSA_get_method(in->rsa)); |
@@ -349,7 +349,7 @@ sc_read_pubkey(Key * k, const struct sc_pkcs15_object *cert_obj) | |||
349 | EVP_PKEY *pubkey = NULL; | 349 | EVP_PKEY *pubkey = NULL; |
350 | u8 *p; | 350 | u8 *p; |
351 | char *tmp; | 351 | char *tmp; |
352 | 352 | ||
353 | debug("sc_read_pubkey() with cert id %02X", cinfo->id.value[0]); | 353 | debug("sc_read_pubkey() with cert id %02X", cinfo->id.value[0]); |
354 | r = sc_pkcs15_read_certificate(p15card, cinfo, &cert); | 354 | r = sc_pkcs15_read_certificate(p15card, cinfo, &cert); |
355 | if (r) { | 355 | if (r) { |
@@ -391,7 +391,7 @@ sc_read_pubkey(Key * k, const struct sc_pkcs15_object *cert_obj) | |||
391 | tmp = key_fingerprint(k, SSH_FP_MD5, SSH_FP_HEX); | 391 | tmp = key_fingerprint(k, SSH_FP_MD5, SSH_FP_HEX); |
392 | debug("fingerprint %d %s", key_size(k), tmp); | 392 | debug("fingerprint %d %s", key_size(k), tmp); |
393 | xfree(tmp); | 393 | xfree(tmp); |
394 | 394 | ||
395 | return 0; | 395 | return 0; |
396 | err: | 396 | err: |
397 | if (cert) | 397 | if (cert) |