summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto/evp/p_lib.c
diff options
context:
space:
mode:
authorbeck <>2017-01-29 17:49:23 +0000
committerbeck <>2017-01-29 17:49:23 +0000
commit957b11334a7afb14537322f0e4795b2e368b3f59 (patch)
tree1a54abba678898ee5270ae4f3404a50ee9a92eea /src/lib/libcrypto/evp/p_lib.c
parentdf96e020e729c6c37a8c7fe311fdd1fe6a8718c5 (diff)
downloadopenbsd-957b11334a7afb14537322f0e4795b2e368b3f59.tar.gz
openbsd-957b11334a7afb14537322f0e4795b2e368b3f59.tar.bz2
openbsd-957b11334a7afb14537322f0e4795b2e368b3f59.zip
Send the function codes from the error functions to the bit bucket,
as was done earlier in libssl. Thanks inoguchi@ for noticing libssl had more reacharounds into this. ok jsing@ inoguchi@
Diffstat (limited to 'src/lib/libcrypto/evp/p_lib.c')
-rw-r--r--src/lib/libcrypto/evp/p_lib.c20
1 files changed, 9 insertions, 11 deletions
diff --git a/src/lib/libcrypto/evp/p_lib.c b/src/lib/libcrypto/evp/p_lib.c
index e172c34894..0d4cd26d45 100644
--- a/src/lib/libcrypto/evp/p_lib.c
+++ b/src/lib/libcrypto/evp/p_lib.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: p_lib.c,v 1.16 2014/07/12 22:26:01 miod Exp $ */ 1/* $OpenBSD: p_lib.c,v 1.17 2017/01/29 17:49:23 beck Exp $ */
2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) 2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3 * All rights reserved. 3 * All rights reserved.
4 * 4 *
@@ -128,14 +128,12 @@ int
128EVP_PKEY_copy_parameters(EVP_PKEY *to, const EVP_PKEY *from) 128EVP_PKEY_copy_parameters(EVP_PKEY *to, const EVP_PKEY *from)
129{ 129{
130 if (to->type != from->type) { 130 if (to->type != from->type) {
131 EVPerr(EVP_F_EVP_PKEY_COPY_PARAMETERS, 131 EVPerror(EVP_R_DIFFERENT_KEY_TYPES);
132 EVP_R_DIFFERENT_KEY_TYPES);
133 goto err; 132 goto err;
134 } 133 }
135 134
136 if (EVP_PKEY_missing_parameters(from)) { 135 if (EVP_PKEY_missing_parameters(from)) {
137 EVPerr(EVP_F_EVP_PKEY_COPY_PARAMETERS, 136 EVPerror(EVP_R_MISSING_PARAMETERS);
138 EVP_R_MISSING_PARAMETERS);
139 goto err; 137 goto err;
140 } 138 }
141 if (from->ameth && from->ameth->param_copy) 139 if (from->ameth && from->ameth->param_copy)
@@ -192,7 +190,7 @@ EVP_PKEY_new(void)
192 190
193 ret = malloc(sizeof(EVP_PKEY)); 191 ret = malloc(sizeof(EVP_PKEY));
194 if (ret == NULL) { 192 if (ret == NULL) {
195 EVPerr(EVP_F_EVP_PKEY_NEW, ERR_R_MALLOC_FAILURE); 193 EVPerror(ERR_R_MALLOC_FAILURE);
196 return (NULL); 194 return (NULL);
197 } 195 }
198 ret->type = EVP_PKEY_NONE; 196 ret->type = EVP_PKEY_NONE;
@@ -240,7 +238,7 @@ pkey_set_type(EVP_PKEY *pkey, int type, const char *str, int len)
240 ENGINE_finish(e); 238 ENGINE_finish(e);
241#endif 239#endif
242 if (!ameth) { 240 if (!ameth) {
243 EVPerr(EVP_F_PKEY_SET_TYPE, EVP_R_UNSUPPORTED_ALGORITHM); 241 EVPerror(EVP_R_UNSUPPORTED_ALGORITHM);
244 return 0; 242 return 0;
245 } 243 }
246 if (pkey) { 244 if (pkey) {
@@ -294,7 +292,7 @@ RSA *
294EVP_PKEY_get1_RSA(EVP_PKEY *pkey) 292EVP_PKEY_get1_RSA(EVP_PKEY *pkey)
295{ 293{
296 if (pkey->type != EVP_PKEY_RSA) { 294 if (pkey->type != EVP_PKEY_RSA) {
297 EVPerr(EVP_F_EVP_PKEY_GET1_RSA, EVP_R_EXPECTING_AN_RSA_KEY); 295 EVPerror(EVP_R_EXPECTING_AN_RSA_KEY);
298 return NULL; 296 return NULL;
299 } 297 }
300 RSA_up_ref(pkey->pkey.rsa); 298 RSA_up_ref(pkey->pkey.rsa);
@@ -316,7 +314,7 @@ DSA *
316EVP_PKEY_get1_DSA(EVP_PKEY *pkey) 314EVP_PKEY_get1_DSA(EVP_PKEY *pkey)
317{ 315{
318 if (pkey->type != EVP_PKEY_DSA) { 316 if (pkey->type != EVP_PKEY_DSA) {
319 EVPerr(EVP_F_EVP_PKEY_GET1_DSA, EVP_R_EXPECTING_A_DSA_KEY); 317 EVPerror(EVP_R_EXPECTING_A_DSA_KEY);
320 return NULL; 318 return NULL;
321 } 319 }
322 DSA_up_ref(pkey->pkey.dsa); 320 DSA_up_ref(pkey->pkey.dsa);
@@ -339,7 +337,7 @@ EC_KEY *
339EVP_PKEY_get1_EC_KEY(EVP_PKEY *pkey) 337EVP_PKEY_get1_EC_KEY(EVP_PKEY *pkey)
340{ 338{
341 if (pkey->type != EVP_PKEY_EC) { 339 if (pkey->type != EVP_PKEY_EC) {
342 EVPerr(EVP_F_EVP_PKEY_GET1_EC_KEY, EVP_R_EXPECTING_A_EC_KEY); 340 EVPerror(EVP_R_EXPECTING_A_EC_KEY);
343 return NULL; 341 return NULL;
344 } 342 }
345 EC_KEY_up_ref(pkey->pkey.ec); 343 EC_KEY_up_ref(pkey->pkey.ec);
@@ -363,7 +361,7 @@ DH *
363EVP_PKEY_get1_DH(EVP_PKEY *pkey) 361EVP_PKEY_get1_DH(EVP_PKEY *pkey)
364{ 362{
365 if (pkey->type != EVP_PKEY_DH) { 363 if (pkey->type != EVP_PKEY_DH) {
366 EVPerr(EVP_F_EVP_PKEY_GET1_DH, EVP_R_EXPECTING_A_DH_KEY); 364 EVPerror(EVP_R_EXPECTING_A_DH_KEY);
367 return NULL; 365 return NULL;
368 } 366 }
369 DH_up_ref(pkey->pkey.dh); 367 DH_up_ref(pkey->pkey.dh);