diff options
author | beck <> | 2017-01-29 17:49:23 +0000 |
---|---|---|
committer | beck <> | 2017-01-29 17:49:23 +0000 |
commit | 957b11334a7afb14537322f0e4795b2e368b3f59 (patch) | |
tree | 1a54abba678898ee5270ae4f3404a50ee9a92eea /src/lib/libcrypto/evp/p_lib.c | |
parent | df96e020e729c6c37a8c7fe311fdd1fe6a8718c5 (diff) | |
download | openbsd-957b11334a7afb14537322f0e4795b2e368b3f59.tar.gz openbsd-957b11334a7afb14537322f0e4795b2e368b3f59.tar.bz2 openbsd-957b11334a7afb14537322f0e4795b2e368b3f59.zip |
Send the function codes from the error functions to the bit bucket,
as was done earlier in libssl. Thanks inoguchi@ for noticing
libssl had more reacharounds into this.
ok jsing@ inoguchi@
Diffstat (limited to 'src/lib/libcrypto/evp/p_lib.c')
-rw-r--r-- | src/lib/libcrypto/evp/p_lib.c | 20 |
1 files changed, 9 insertions, 11 deletions
diff --git a/src/lib/libcrypto/evp/p_lib.c b/src/lib/libcrypto/evp/p_lib.c index e172c34894..0d4cd26d45 100644 --- a/src/lib/libcrypto/evp/p_lib.c +++ b/src/lib/libcrypto/evp/p_lib.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: p_lib.c,v 1.16 2014/07/12 22:26:01 miod Exp $ */ | 1 | /* $OpenBSD: p_lib.c,v 1.17 2017/01/29 17:49:23 beck Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -128,14 +128,12 @@ int | |||
128 | EVP_PKEY_copy_parameters(EVP_PKEY *to, const EVP_PKEY *from) | 128 | EVP_PKEY_copy_parameters(EVP_PKEY *to, const EVP_PKEY *from) |
129 | { | 129 | { |
130 | if (to->type != from->type) { | 130 | if (to->type != from->type) { |
131 | EVPerr(EVP_F_EVP_PKEY_COPY_PARAMETERS, | 131 | EVPerror(EVP_R_DIFFERENT_KEY_TYPES); |
132 | EVP_R_DIFFERENT_KEY_TYPES); | ||
133 | goto err; | 132 | goto err; |
134 | } | 133 | } |
135 | 134 | ||
136 | if (EVP_PKEY_missing_parameters(from)) { | 135 | if (EVP_PKEY_missing_parameters(from)) { |
137 | EVPerr(EVP_F_EVP_PKEY_COPY_PARAMETERS, | 136 | EVPerror(EVP_R_MISSING_PARAMETERS); |
138 | EVP_R_MISSING_PARAMETERS); | ||
139 | goto err; | 137 | goto err; |
140 | } | 138 | } |
141 | if (from->ameth && from->ameth->param_copy) | 139 | if (from->ameth && from->ameth->param_copy) |
@@ -192,7 +190,7 @@ EVP_PKEY_new(void) | |||
192 | 190 | ||
193 | ret = malloc(sizeof(EVP_PKEY)); | 191 | ret = malloc(sizeof(EVP_PKEY)); |
194 | if (ret == NULL) { | 192 | if (ret == NULL) { |
195 | EVPerr(EVP_F_EVP_PKEY_NEW, ERR_R_MALLOC_FAILURE); | 193 | EVPerror(ERR_R_MALLOC_FAILURE); |
196 | return (NULL); | 194 | return (NULL); |
197 | } | 195 | } |
198 | ret->type = EVP_PKEY_NONE; | 196 | ret->type = EVP_PKEY_NONE; |
@@ -240,7 +238,7 @@ pkey_set_type(EVP_PKEY *pkey, int type, const char *str, int len) | |||
240 | ENGINE_finish(e); | 238 | ENGINE_finish(e); |
241 | #endif | 239 | #endif |
242 | if (!ameth) { | 240 | if (!ameth) { |
243 | EVPerr(EVP_F_PKEY_SET_TYPE, EVP_R_UNSUPPORTED_ALGORITHM); | 241 | EVPerror(EVP_R_UNSUPPORTED_ALGORITHM); |
244 | return 0; | 242 | return 0; |
245 | } | 243 | } |
246 | if (pkey) { | 244 | if (pkey) { |
@@ -294,7 +292,7 @@ RSA * | |||
294 | EVP_PKEY_get1_RSA(EVP_PKEY *pkey) | 292 | EVP_PKEY_get1_RSA(EVP_PKEY *pkey) |
295 | { | 293 | { |
296 | if (pkey->type != EVP_PKEY_RSA) { | 294 | if (pkey->type != EVP_PKEY_RSA) { |
297 | EVPerr(EVP_F_EVP_PKEY_GET1_RSA, EVP_R_EXPECTING_AN_RSA_KEY); | 295 | EVPerror(EVP_R_EXPECTING_AN_RSA_KEY); |
298 | return NULL; | 296 | return NULL; |
299 | } | 297 | } |
300 | RSA_up_ref(pkey->pkey.rsa); | 298 | RSA_up_ref(pkey->pkey.rsa); |
@@ -316,7 +314,7 @@ DSA * | |||
316 | EVP_PKEY_get1_DSA(EVP_PKEY *pkey) | 314 | EVP_PKEY_get1_DSA(EVP_PKEY *pkey) |
317 | { | 315 | { |
318 | if (pkey->type != EVP_PKEY_DSA) { | 316 | if (pkey->type != EVP_PKEY_DSA) { |
319 | EVPerr(EVP_F_EVP_PKEY_GET1_DSA, EVP_R_EXPECTING_A_DSA_KEY); | 317 | EVPerror(EVP_R_EXPECTING_A_DSA_KEY); |
320 | return NULL; | 318 | return NULL; |
321 | } | 319 | } |
322 | DSA_up_ref(pkey->pkey.dsa); | 320 | DSA_up_ref(pkey->pkey.dsa); |
@@ -339,7 +337,7 @@ EC_KEY * | |||
339 | EVP_PKEY_get1_EC_KEY(EVP_PKEY *pkey) | 337 | EVP_PKEY_get1_EC_KEY(EVP_PKEY *pkey) |
340 | { | 338 | { |
341 | if (pkey->type != EVP_PKEY_EC) { | 339 | if (pkey->type != EVP_PKEY_EC) { |
342 | EVPerr(EVP_F_EVP_PKEY_GET1_EC_KEY, EVP_R_EXPECTING_A_EC_KEY); | 340 | EVPerror(EVP_R_EXPECTING_A_EC_KEY); |
343 | return NULL; | 341 | return NULL; |
344 | } | 342 | } |
345 | EC_KEY_up_ref(pkey->pkey.ec); | 343 | EC_KEY_up_ref(pkey->pkey.ec); |
@@ -363,7 +361,7 @@ DH * | |||
363 | EVP_PKEY_get1_DH(EVP_PKEY *pkey) | 361 | EVP_PKEY_get1_DH(EVP_PKEY *pkey) |
364 | { | 362 | { |
365 | if (pkey->type != EVP_PKEY_DH) { | 363 | if (pkey->type != EVP_PKEY_DH) { |
366 | EVPerr(EVP_F_EVP_PKEY_GET1_DH, EVP_R_EXPECTING_A_DH_KEY); | 364 | EVPerror(EVP_R_EXPECTING_A_DH_KEY); |
367 | return NULL; | 365 | return NULL; |
368 | } | 366 | } |
369 | DH_up_ref(pkey->pkey.dh); | 367 | DH_up_ref(pkey->pkey.dh); |