|
@@ -188,33 +188,33 @@ int x509_note_pkey_algo(void *context, size_t hdrlen,
|
|
|
return -ENOPKG; /* Unsupported combination */
|
|
|
|
|
|
case OID_md4WithRSAEncryption:
|
|
|
- ctx->cert->sig.pkey_hash_algo = HASH_ALGO_MD5;
|
|
|
- ctx->cert->sig.pkey_algo = PKEY_ALGO_RSA;
|
|
|
+ ctx->cert->sig.hash_algo = "md4";
|
|
|
+ ctx->cert->sig.pkey_algo = "rsa";
|
|
|
break;
|
|
|
|
|
|
case OID_sha1WithRSAEncryption:
|
|
|
- ctx->cert->sig.pkey_hash_algo = HASH_ALGO_SHA1;
|
|
|
- ctx->cert->sig.pkey_algo = PKEY_ALGO_RSA;
|
|
|
+ ctx->cert->sig.hash_algo = "sha1";
|
|
|
+ ctx->cert->sig.pkey_algo = "rsa";
|
|
|
break;
|
|
|
|
|
|
case OID_sha256WithRSAEncryption:
|
|
|
- ctx->cert->sig.pkey_hash_algo = HASH_ALGO_SHA256;
|
|
|
- ctx->cert->sig.pkey_algo = PKEY_ALGO_RSA;
|
|
|
+ ctx->cert->sig.hash_algo = "sha256";
|
|
|
+ ctx->cert->sig.pkey_algo = "rsa";
|
|
|
break;
|
|
|
|
|
|
case OID_sha384WithRSAEncryption:
|
|
|
- ctx->cert->sig.pkey_hash_algo = HASH_ALGO_SHA384;
|
|
|
- ctx->cert->sig.pkey_algo = PKEY_ALGO_RSA;
|
|
|
+ ctx->cert->sig.hash_algo = "sha384";
|
|
|
+ ctx->cert->sig.pkey_algo = "rsa";
|
|
|
break;
|
|
|
|
|
|
case OID_sha512WithRSAEncryption:
|
|
|
- ctx->cert->sig.pkey_hash_algo = HASH_ALGO_SHA512;
|
|
|
- ctx->cert->sig.pkey_algo = PKEY_ALGO_RSA;
|
|
|
+ ctx->cert->sig.hash_algo = "sha512";
|
|
|
+ ctx->cert->sig.pkey_algo = "rsa";
|
|
|
break;
|
|
|
|
|
|
case OID_sha224WithRSAEncryption:
|
|
|
- ctx->cert->sig.pkey_hash_algo = HASH_ALGO_SHA224;
|
|
|
- ctx->cert->sig.pkey_algo = PKEY_ALGO_RSA;
|
|
|
+ ctx->cert->sig.hash_algo = "sha224";
|
|
|
+ ctx->cert->sig.pkey_algo = "rsa";
|
|
|
break;
|
|
|
}
|
|
|
|
|
@@ -396,7 +396,7 @@ int x509_extract_key_data(void *context, size_t hdrlen,
|
|
|
if (ctx->last_oid != OID_rsaEncryption)
|
|
|
return -ENOPKG;
|
|
|
|
|
|
- ctx->cert->pub->pkey_algo = PKEY_ALGO_RSA;
|
|
|
+ ctx->cert->pub->pkey_algo = "rsa";
|
|
|
|
|
|
/* Discard the BIT STRING metadata */
|
|
|
ctx->key = value + 1;
|