diff options
| author | jsing <> | 2019-08-11 10:38:27 +0000 |
|---|---|---|
| committer | jsing <> | 2019-08-11 10:38:27 +0000 |
| commit | f7a527513ace17b70b14f3975dd212ba42e464c8 (patch) | |
| tree | 42de514d40b8fbdc31f900b32db6a05e12455f76 /src/lib/libcrypto/cms/cms_lib.c | |
| parent | 36509464f71e4876798f5e8cf8060f48bd0c6a69 (diff) | |
| download | openbsd-f7a527513ace17b70b14f3975dd212ba42e464c8.tar.gz openbsd-f7a527513ace17b70b14f3975dd212ba42e464c8.tar.bz2 openbsd-f7a527513ace17b70b14f3975dd212ba42e464c8.zip | |
Convert CMSerr() to CMSerror().
Diffstat (limited to 'src/lib/libcrypto/cms/cms_lib.c')
| -rw-r--r-- | src/lib/libcrypto/cms/cms_lib.c | 39 |
1 files changed, 17 insertions, 22 deletions
diff --git a/src/lib/libcrypto/cms/cms_lib.c b/src/lib/libcrypto/cms/cms_lib.c index 7f02d6daae..b022d19d4b 100644 --- a/src/lib/libcrypto/cms/cms_lib.c +++ b/src/lib/libcrypto/cms/cms_lib.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: cms_lib.c,v 1.11 2019/08/11 10:15:30 jsing Exp $ */ | 1 | /* $OpenBSD: cms_lib.c,v 1.12 2019/08/11 10:38:27 jsing Exp $ */ |
| 2 | /* | 2 | /* |
| 3 | * Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 3 | * Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
| 4 | * project. | 4 | * project. |
| @@ -144,7 +144,7 @@ CMS_dataInit(CMS_ContentInfo *cms, BIO *icont) | |||
| 144 | else | 144 | else |
| 145 | cont = cms_content_bio(cms); | 145 | cont = cms_content_bio(cms); |
| 146 | if (!cont) { | 146 | if (!cont) { |
| 147 | CMSerr(CMS_F_CMS_DATAINIT, CMS_R_NO_CONTENT); | 147 | CMSerror(CMS_R_NO_CONTENT); |
| 148 | return NULL; | 148 | return NULL; |
| 149 | } | 149 | } |
| 150 | switch (OBJ_obj2nid(cms->contentType)) { | 150 | switch (OBJ_obj2nid(cms->contentType)) { |
| @@ -174,7 +174,7 @@ CMS_dataInit(CMS_ContentInfo *cms, BIO *icont) | |||
| 174 | break; | 174 | break; |
| 175 | 175 | ||
| 176 | default: | 176 | default: |
| 177 | CMSerr(CMS_F_CMS_DATAINIT, CMS_R_UNSUPPORTED_TYPE); | 177 | CMSerror(CMS_R_UNSUPPORTED_TYPE); |
| 178 | return NULL; | 178 | return NULL; |
| 179 | } | 179 | } |
| 180 | 180 | ||
| @@ -201,7 +201,7 @@ CMS_dataFinal(CMS_ContentInfo *cms, BIO *cmsbio) | |||
| 201 | long contlen; | 201 | long contlen; |
| 202 | mbio = BIO_find_type(cmsbio, BIO_TYPE_MEM); | 202 | mbio = BIO_find_type(cmsbio, BIO_TYPE_MEM); |
| 203 | if (!mbio) { | 203 | if (!mbio) { |
| 204 | CMSerr(CMS_F_CMS_DATAFINAL, CMS_R_CONTENT_NOT_FOUND); | 204 | CMSerror(CMS_R_CONTENT_NOT_FOUND); |
| 205 | return 0; | 205 | return 0; |
| 206 | } | 206 | } |
| 207 | contlen = BIO_get_mem_data(mbio, &cont); | 207 | contlen = BIO_get_mem_data(mbio, &cont); |
| @@ -228,7 +228,7 @@ CMS_dataFinal(CMS_ContentInfo *cms, BIO *cmsbio) | |||
| 228 | return cms_DigestedData_do_final(cms, cmsbio, 0); | 228 | return cms_DigestedData_do_final(cms, cmsbio, 0); |
| 229 | 229 | ||
| 230 | default: | 230 | default: |
| 231 | CMSerr(CMS_F_CMS_DATAFINAL, CMS_R_UNSUPPORTED_TYPE); | 231 | CMSerror(CMS_R_UNSUPPORTED_TYPE); |
| 232 | return 0; | 232 | return 0; |
| 233 | } | 233 | } |
| 234 | } | 234 | } |
| @@ -266,7 +266,7 @@ CMS_get0_content(CMS_ContentInfo *cms) | |||
| 266 | default: | 266 | default: |
| 267 | if (cms->d.other->type == V_ASN1_OCTET_STRING) | 267 | if (cms->d.other->type == V_ASN1_OCTET_STRING) |
| 268 | return &cms->d.other->value.octet_string; | 268 | return &cms->d.other->value.octet_string; |
| 269 | CMSerr(CMS_F_CMS_GET0_CONTENT, CMS_R_UNSUPPORTED_CONTENT_TYPE); | 269 | CMSerror(CMS_R_UNSUPPORTED_CONTENT_TYPE); |
| 270 | return NULL; | 270 | return NULL; |
| 271 | } | 271 | } |
| 272 | } | 272 | } |
| @@ -299,7 +299,7 @@ cms_get0_econtent_type(CMS_ContentInfo *cms) | |||
| 299 | return &cms->d.compressedData->encapContentInfo->eContentType; | 299 | return &cms->d.compressedData->encapContentInfo->eContentType; |
| 300 | 300 | ||
| 301 | default: | 301 | default: |
| 302 | CMSerr(CMS_F_CMS_GET0_ECONTENT_TYPE, CMS_R_UNSUPPORTED_CONTENT_TYPE); | 302 | CMSerror(CMS_R_UNSUPPORTED_CONTENT_TYPE); |
| 303 | return NULL; | 303 | return NULL; |
| 304 | } | 304 | } |
| 305 | } | 305 | } |
| @@ -371,7 +371,7 @@ CMS_set_detached(CMS_ContentInfo *cms, int detached) | |||
| 371 | (*pos)->flags |= ASN1_STRING_FLAG_CONT; | 371 | (*pos)->flags |= ASN1_STRING_FLAG_CONT; |
| 372 | return 1; | 372 | return 1; |
| 373 | } | 373 | } |
| 374 | CMSerr(CMS_F_CMS_SET_DETACHED, ERR_R_MALLOC_FAILURE); | 374 | CMSerror(ERR_R_MALLOC_FAILURE); |
| 375 | 375 | ||
| 376 | return 0; | 376 | return 0; |
| 377 | } | 377 | } |
| @@ -388,13 +388,12 @@ cms_DigestAlgorithm_init_bio(X509_ALGOR *digestAlgorithm) | |||
| 388 | X509_ALGOR_get0(&digestoid, NULL, NULL, digestAlgorithm); | 388 | X509_ALGOR_get0(&digestoid, NULL, NULL, digestAlgorithm); |
| 389 | digest = EVP_get_digestbyobj(digestoid); | 389 | digest = EVP_get_digestbyobj(digestoid); |
| 390 | if (!digest) { | 390 | if (!digest) { |
| 391 | CMSerr(CMS_F_CMS_DIGESTALGORITHM_INIT_BIO, | 391 | CMSerror(CMS_R_UNKNOWN_DIGEST_ALGORITHM); |
| 392 | CMS_R_UNKNOWN_DIGEST_ALGORITHM); | ||
| 393 | goto err; | 392 | goto err; |
| 394 | } | 393 | } |
| 395 | mdbio = BIO_new(BIO_f_md()); | 394 | mdbio = BIO_new(BIO_f_md()); |
| 396 | if (mdbio == NULL || !BIO_set_md(mdbio, digest)) { | 395 | if (mdbio == NULL || !BIO_set_md(mdbio, digest)) { |
| 397 | CMSerr(CMS_F_CMS_DIGESTALGORITHM_INIT_BIO, CMS_R_MD_BIO_INIT_ERROR); | 396 | CMSerror(CMS_R_MD_BIO_INIT_ERROR); |
| 398 | goto err; | 397 | goto err; |
| 399 | } | 398 | } |
| 400 | return mdbio; | 399 | return mdbio; |
| @@ -420,8 +419,7 @@ cms_DigestAlgorithm_find_ctx(EVP_MD_CTX *mctx, BIO *chain, X509_ALGOR *mdalg) | |||
| 420 | EVP_MD_CTX *mtmp; | 419 | EVP_MD_CTX *mtmp; |
| 421 | chain = BIO_find_type(chain, BIO_TYPE_MD); | 420 | chain = BIO_find_type(chain, BIO_TYPE_MD); |
| 422 | if (chain == NULL) { | 421 | if (chain == NULL) { |
| 423 | CMSerr(CMS_F_CMS_DIGESTALGORITHM_FIND_CTX, | 422 | CMSerror(CMS_R_NO_MATCHING_DIGEST); |
| 424 | CMS_R_NO_MATCHING_DIGEST); | ||
| 425 | return 0; | 423 | return 0; |
| 426 | } | 424 | } |
| 427 | BIO_get_md_ctx(chain, &mtmp); | 425 | BIO_get_md_ctx(chain, &mtmp); |
| @@ -449,8 +447,7 @@ cms_get0_certificate_choices(CMS_ContentInfo *cms) | |||
| 449 | return &cms->d.envelopedData->originatorInfo->certificates; | 447 | return &cms->d.envelopedData->originatorInfo->certificates; |
| 450 | 448 | ||
| 451 | default: | 449 | default: |
| 452 | CMSerr(CMS_F_CMS_GET0_CERTIFICATE_CHOICES, | 450 | CMSerror(CMS_R_UNSUPPORTED_CONTENT_TYPE); |
| 453 | CMS_R_UNSUPPORTED_CONTENT_TYPE); | ||
| 454 | return NULL; | 451 | return NULL; |
| 455 | } | 452 | } |
| 456 | } | 453 | } |
| @@ -493,8 +490,7 @@ CMS_add0_cert(CMS_ContentInfo *cms, X509 *cert) | |||
| 493 | cch = sk_CMS_CertificateChoices_value(*pcerts, i); | 490 | cch = sk_CMS_CertificateChoices_value(*pcerts, i); |
| 494 | if (cch->type == CMS_CERTCHOICE_CERT) { | 491 | if (cch->type == CMS_CERTCHOICE_CERT) { |
| 495 | if (!X509_cmp(cch->d.certificate, cert)) { | 492 | if (!X509_cmp(cch->d.certificate, cert)) { |
| 496 | CMSerr(CMS_F_CMS_ADD0_CERT, | 493 | CMSerror(CMS_R_CERTIFICATE_ALREADY_PRESENT); |
| 497 | CMS_R_CERTIFICATE_ALREADY_PRESENT); | ||
| 498 | return 0; | 494 | return 0; |
| 499 | } | 495 | } |
| 500 | } | 496 | } |
| @@ -533,8 +529,7 @@ cms_get0_revocation_choices(CMS_ContentInfo *cms) | |||
| 533 | return &cms->d.envelopedData->originatorInfo->crls; | 529 | return &cms->d.envelopedData->originatorInfo->crls; |
| 534 | 530 | ||
| 535 | default: | 531 | default: |
| 536 | CMSerr(CMS_F_CMS_GET0_REVOCATION_CHOICES, | 532 | CMSerror(CMS_R_UNSUPPORTED_CONTENT_TYPE); |
| 537 | CMS_R_UNSUPPORTED_CONTENT_TYPE); | ||
| 538 | return NULL; | 533 | return NULL; |
| 539 | } | 534 | } |
| 540 | } | 535 | } |
| @@ -689,7 +684,7 @@ cms_set1_ias(CMS_IssuerAndSerialNumber **pias, X509 *cert) | |||
| 689 | 684 | ||
| 690 | err: | 685 | err: |
| 691 | M_ASN1_free_of(ias, CMS_IssuerAndSerialNumber); | 686 | M_ASN1_free_of(ias, CMS_IssuerAndSerialNumber); |
| 692 | CMSerr(CMS_F_CMS_SET1_IAS, ERR_R_MALLOC_FAILURE); | 687 | CMSerror(ERR_R_MALLOC_FAILURE); |
| 693 | 688 | ||
| 694 | return 0; | 689 | return 0; |
| 695 | } | 690 | } |
| @@ -702,12 +697,12 @@ cms_set1_keyid(ASN1_OCTET_STRING **pkeyid, X509 *cert) | |||
| 702 | 697 | ||
| 703 | cert_keyid = X509_get0_subject_key_id(cert); | 698 | cert_keyid = X509_get0_subject_key_id(cert); |
| 704 | if (cert_keyid == NULL) { | 699 | if (cert_keyid == NULL) { |
| 705 | CMSerr(CMS_F_CMS_SET1_KEYID, CMS_R_CERTIFICATE_HAS_NO_KEYID); | 700 | CMSerror(CMS_R_CERTIFICATE_HAS_NO_KEYID); |
| 706 | return 0; | 701 | return 0; |
| 707 | } | 702 | } |
| 708 | keyid = ASN1_STRING_dup(cert_keyid); | 703 | keyid = ASN1_STRING_dup(cert_keyid); |
| 709 | if (!keyid) { | 704 | if (!keyid) { |
| 710 | CMSerr(CMS_F_CMS_SET1_KEYID, ERR_R_MALLOC_FAILURE); | 705 | CMSerror(ERR_R_MALLOC_FAILURE); |
| 711 | return 0; | 706 | return 0; |
| 712 | } | 707 | } |
| 713 | ASN1_OCTET_STRING_free(*pkeyid); | 708 | ASN1_OCTET_STRING_free(*pkeyid); |
