diff options
author | jsing <> | 2019-08-11 10:38:27 +0000 |
---|---|---|
committer | jsing <> | 2019-08-11 10:38:27 +0000 |
commit | 66c480d1798005c797335d0f02a75fc501efcc7f (patch) | |
tree | 42de514d40b8fbdc31f900b32db6a05e12455f76 /src/lib/libcrypto/cms/cms_lib.c | |
parent | 08cb6e4d4d31afbeec6bc3bdd6594710504fd25b (diff) | |
download | openbsd-66c480d1798005c797335d0f02a75fc501efcc7f.tar.gz openbsd-66c480d1798005c797335d0f02a75fc501efcc7f.tar.bz2 openbsd-66c480d1798005c797335d0f02a75fc501efcc7f.zip |
Convert CMSerr() to CMSerror().
Diffstat (limited to 'src/lib/libcrypto/cms/cms_lib.c')
-rw-r--r-- | src/lib/libcrypto/cms/cms_lib.c | 39 |
1 files changed, 17 insertions, 22 deletions
diff --git a/src/lib/libcrypto/cms/cms_lib.c b/src/lib/libcrypto/cms/cms_lib.c index 7f02d6daae..b022d19d4b 100644 --- a/src/lib/libcrypto/cms/cms_lib.c +++ b/src/lib/libcrypto/cms/cms_lib.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: cms_lib.c,v 1.11 2019/08/11 10:15:30 jsing Exp $ */ | 1 | /* $OpenBSD: cms_lib.c,v 1.12 2019/08/11 10:38:27 jsing Exp $ */ |
2 | /* | 2 | /* |
3 | * Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 3 | * Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
4 | * project. | 4 | * project. |
@@ -144,7 +144,7 @@ CMS_dataInit(CMS_ContentInfo *cms, BIO *icont) | |||
144 | else | 144 | else |
145 | cont = cms_content_bio(cms); | 145 | cont = cms_content_bio(cms); |
146 | if (!cont) { | 146 | if (!cont) { |
147 | CMSerr(CMS_F_CMS_DATAINIT, CMS_R_NO_CONTENT); | 147 | CMSerror(CMS_R_NO_CONTENT); |
148 | return NULL; | 148 | return NULL; |
149 | } | 149 | } |
150 | switch (OBJ_obj2nid(cms->contentType)) { | 150 | switch (OBJ_obj2nid(cms->contentType)) { |
@@ -174,7 +174,7 @@ CMS_dataInit(CMS_ContentInfo *cms, BIO *icont) | |||
174 | break; | 174 | break; |
175 | 175 | ||
176 | default: | 176 | default: |
177 | CMSerr(CMS_F_CMS_DATAINIT, CMS_R_UNSUPPORTED_TYPE); | 177 | CMSerror(CMS_R_UNSUPPORTED_TYPE); |
178 | return NULL; | 178 | return NULL; |
179 | } | 179 | } |
180 | 180 | ||
@@ -201,7 +201,7 @@ CMS_dataFinal(CMS_ContentInfo *cms, BIO *cmsbio) | |||
201 | long contlen; | 201 | long contlen; |
202 | mbio = BIO_find_type(cmsbio, BIO_TYPE_MEM); | 202 | mbio = BIO_find_type(cmsbio, BIO_TYPE_MEM); |
203 | if (!mbio) { | 203 | if (!mbio) { |
204 | CMSerr(CMS_F_CMS_DATAFINAL, CMS_R_CONTENT_NOT_FOUND); | 204 | CMSerror(CMS_R_CONTENT_NOT_FOUND); |
205 | return 0; | 205 | return 0; |
206 | } | 206 | } |
207 | contlen = BIO_get_mem_data(mbio, &cont); | 207 | contlen = BIO_get_mem_data(mbio, &cont); |
@@ -228,7 +228,7 @@ CMS_dataFinal(CMS_ContentInfo *cms, BIO *cmsbio) | |||
228 | return cms_DigestedData_do_final(cms, cmsbio, 0); | 228 | return cms_DigestedData_do_final(cms, cmsbio, 0); |
229 | 229 | ||
230 | default: | 230 | default: |
231 | CMSerr(CMS_F_CMS_DATAFINAL, CMS_R_UNSUPPORTED_TYPE); | 231 | CMSerror(CMS_R_UNSUPPORTED_TYPE); |
232 | return 0; | 232 | return 0; |
233 | } | 233 | } |
234 | } | 234 | } |
@@ -266,7 +266,7 @@ CMS_get0_content(CMS_ContentInfo *cms) | |||
266 | default: | 266 | default: |
267 | if (cms->d.other->type == V_ASN1_OCTET_STRING) | 267 | if (cms->d.other->type == V_ASN1_OCTET_STRING) |
268 | return &cms->d.other->value.octet_string; | 268 | return &cms->d.other->value.octet_string; |
269 | CMSerr(CMS_F_CMS_GET0_CONTENT, CMS_R_UNSUPPORTED_CONTENT_TYPE); | 269 | CMSerror(CMS_R_UNSUPPORTED_CONTENT_TYPE); |
270 | return NULL; | 270 | return NULL; |
271 | } | 271 | } |
272 | } | 272 | } |
@@ -299,7 +299,7 @@ cms_get0_econtent_type(CMS_ContentInfo *cms) | |||
299 | return &cms->d.compressedData->encapContentInfo->eContentType; | 299 | return &cms->d.compressedData->encapContentInfo->eContentType; |
300 | 300 | ||
301 | default: | 301 | default: |
302 | CMSerr(CMS_F_CMS_GET0_ECONTENT_TYPE, CMS_R_UNSUPPORTED_CONTENT_TYPE); | 302 | CMSerror(CMS_R_UNSUPPORTED_CONTENT_TYPE); |
303 | return NULL; | 303 | return NULL; |
304 | } | 304 | } |
305 | } | 305 | } |
@@ -371,7 +371,7 @@ CMS_set_detached(CMS_ContentInfo *cms, int detached) | |||
371 | (*pos)->flags |= ASN1_STRING_FLAG_CONT; | 371 | (*pos)->flags |= ASN1_STRING_FLAG_CONT; |
372 | return 1; | 372 | return 1; |
373 | } | 373 | } |
374 | CMSerr(CMS_F_CMS_SET_DETACHED, ERR_R_MALLOC_FAILURE); | 374 | CMSerror(ERR_R_MALLOC_FAILURE); |
375 | 375 | ||
376 | return 0; | 376 | return 0; |
377 | } | 377 | } |
@@ -388,13 +388,12 @@ cms_DigestAlgorithm_init_bio(X509_ALGOR *digestAlgorithm) | |||
388 | X509_ALGOR_get0(&digestoid, NULL, NULL, digestAlgorithm); | 388 | X509_ALGOR_get0(&digestoid, NULL, NULL, digestAlgorithm); |
389 | digest = EVP_get_digestbyobj(digestoid); | 389 | digest = EVP_get_digestbyobj(digestoid); |
390 | if (!digest) { | 390 | if (!digest) { |
391 | CMSerr(CMS_F_CMS_DIGESTALGORITHM_INIT_BIO, | 391 | CMSerror(CMS_R_UNKNOWN_DIGEST_ALGORITHM); |
392 | CMS_R_UNKNOWN_DIGEST_ALGORITHM); | ||
393 | goto err; | 392 | goto err; |
394 | } | 393 | } |
395 | mdbio = BIO_new(BIO_f_md()); | 394 | mdbio = BIO_new(BIO_f_md()); |
396 | if (mdbio == NULL || !BIO_set_md(mdbio, digest)) { | 395 | if (mdbio == NULL || !BIO_set_md(mdbio, digest)) { |
397 | CMSerr(CMS_F_CMS_DIGESTALGORITHM_INIT_BIO, CMS_R_MD_BIO_INIT_ERROR); | 396 | CMSerror(CMS_R_MD_BIO_INIT_ERROR); |
398 | goto err; | 397 | goto err; |
399 | } | 398 | } |
400 | return mdbio; | 399 | return mdbio; |
@@ -420,8 +419,7 @@ cms_DigestAlgorithm_find_ctx(EVP_MD_CTX *mctx, BIO *chain, X509_ALGOR *mdalg) | |||
420 | EVP_MD_CTX *mtmp; | 419 | EVP_MD_CTX *mtmp; |
421 | chain = BIO_find_type(chain, BIO_TYPE_MD); | 420 | chain = BIO_find_type(chain, BIO_TYPE_MD); |
422 | if (chain == NULL) { | 421 | if (chain == NULL) { |
423 | CMSerr(CMS_F_CMS_DIGESTALGORITHM_FIND_CTX, | 422 | CMSerror(CMS_R_NO_MATCHING_DIGEST); |
424 | CMS_R_NO_MATCHING_DIGEST); | ||
425 | return 0; | 423 | return 0; |
426 | } | 424 | } |
427 | BIO_get_md_ctx(chain, &mtmp); | 425 | BIO_get_md_ctx(chain, &mtmp); |
@@ -449,8 +447,7 @@ cms_get0_certificate_choices(CMS_ContentInfo *cms) | |||
449 | return &cms->d.envelopedData->originatorInfo->certificates; | 447 | return &cms->d.envelopedData->originatorInfo->certificates; |
450 | 448 | ||
451 | default: | 449 | default: |
452 | CMSerr(CMS_F_CMS_GET0_CERTIFICATE_CHOICES, | 450 | CMSerror(CMS_R_UNSUPPORTED_CONTENT_TYPE); |
453 | CMS_R_UNSUPPORTED_CONTENT_TYPE); | ||
454 | return NULL; | 451 | return NULL; |
455 | } | 452 | } |
456 | } | 453 | } |
@@ -493,8 +490,7 @@ CMS_add0_cert(CMS_ContentInfo *cms, X509 *cert) | |||
493 | cch = sk_CMS_CertificateChoices_value(*pcerts, i); | 490 | cch = sk_CMS_CertificateChoices_value(*pcerts, i); |
494 | if (cch->type == CMS_CERTCHOICE_CERT) { | 491 | if (cch->type == CMS_CERTCHOICE_CERT) { |
495 | if (!X509_cmp(cch->d.certificate, cert)) { | 492 | if (!X509_cmp(cch->d.certificate, cert)) { |
496 | CMSerr(CMS_F_CMS_ADD0_CERT, | 493 | CMSerror(CMS_R_CERTIFICATE_ALREADY_PRESENT); |
497 | CMS_R_CERTIFICATE_ALREADY_PRESENT); | ||
498 | return 0; | 494 | return 0; |
499 | } | 495 | } |
500 | } | 496 | } |
@@ -533,8 +529,7 @@ cms_get0_revocation_choices(CMS_ContentInfo *cms) | |||
533 | return &cms->d.envelopedData->originatorInfo->crls; | 529 | return &cms->d.envelopedData->originatorInfo->crls; |
534 | 530 | ||
535 | default: | 531 | default: |
536 | CMSerr(CMS_F_CMS_GET0_REVOCATION_CHOICES, | 532 | CMSerror(CMS_R_UNSUPPORTED_CONTENT_TYPE); |
537 | CMS_R_UNSUPPORTED_CONTENT_TYPE); | ||
538 | return NULL; | 533 | return NULL; |
539 | } | 534 | } |
540 | } | 535 | } |
@@ -689,7 +684,7 @@ cms_set1_ias(CMS_IssuerAndSerialNumber **pias, X509 *cert) | |||
689 | 684 | ||
690 | err: | 685 | err: |
691 | M_ASN1_free_of(ias, CMS_IssuerAndSerialNumber); | 686 | M_ASN1_free_of(ias, CMS_IssuerAndSerialNumber); |
692 | CMSerr(CMS_F_CMS_SET1_IAS, ERR_R_MALLOC_FAILURE); | 687 | CMSerror(ERR_R_MALLOC_FAILURE); |
693 | 688 | ||
694 | return 0; | 689 | return 0; |
695 | } | 690 | } |
@@ -702,12 +697,12 @@ cms_set1_keyid(ASN1_OCTET_STRING **pkeyid, X509 *cert) | |||
702 | 697 | ||
703 | cert_keyid = X509_get0_subject_key_id(cert); | 698 | cert_keyid = X509_get0_subject_key_id(cert); |
704 | if (cert_keyid == NULL) { | 699 | if (cert_keyid == NULL) { |
705 | CMSerr(CMS_F_CMS_SET1_KEYID, CMS_R_CERTIFICATE_HAS_NO_KEYID); | 700 | CMSerror(CMS_R_CERTIFICATE_HAS_NO_KEYID); |
706 | return 0; | 701 | return 0; |
707 | } | 702 | } |
708 | keyid = ASN1_STRING_dup(cert_keyid); | 703 | keyid = ASN1_STRING_dup(cert_keyid); |
709 | if (!keyid) { | 704 | if (!keyid) { |
710 | CMSerr(CMS_F_CMS_SET1_KEYID, ERR_R_MALLOC_FAILURE); | 705 | CMSerror(ERR_R_MALLOC_FAILURE); |
711 | return 0; | 706 | return 0; |
712 | } | 707 | } |
713 | ASN1_OCTET_STRING_free(*pkeyid); | 708 | ASN1_OCTET_STRING_free(*pkeyid); |