diff options
author | tb <> | 2018-02-20 18:05:28 +0000 |
---|---|---|
committer | tb <> | 2018-02-20 18:05:28 +0000 |
commit | 9d17df01c5dd3ba327b7cd95fb5de819941ff77a (patch) | |
tree | d0e432a5dae1c3d68b3f72c5b22ce5f8a3d9964d /src/lib/libcrypto/evp/p_lib.c | |
parent | accf1b94b3627d2ed5d78c6638d3d618404a8a2d (diff) | |
download | openbsd-9d17df01c5dd3ba327b7cd95fb5de819941ff77a.tar.gz openbsd-9d17df01c5dd3ba327b7cd95fb5de819941ff77a.tar.bz2 openbsd-9d17df01c5dd3ba327b7cd95fb5de819941ff77a.zip |
Provide EVP_PKEY_get0_EC_KEY() and 'if (ret)' vs 'if (ret != 0)' cosmetics.
ok jsing
Diffstat (limited to 'src/lib/libcrypto/evp/p_lib.c')
-rw-r--r-- | src/lib/libcrypto/evp/p_lib.c | 31 |
1 files changed, 20 insertions, 11 deletions
diff --git a/src/lib/libcrypto/evp/p_lib.c b/src/lib/libcrypto/evp/p_lib.c index 3cd1bf3b34..811fe0c86d 100644 --- a/src/lib/libcrypto/evp/p_lib.c +++ b/src/lib/libcrypto/evp/p_lib.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: p_lib.c,v 1.19 2018/02/17 13:47:36 tb Exp $ */ | 1 | /* $OpenBSD: p_lib.c,v 1.20 2018/02/20 18:05:28 tb Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -311,7 +311,7 @@ int | |||
311 | EVP_PKEY_set1_RSA(EVP_PKEY *pkey, RSA *key) | 311 | EVP_PKEY_set1_RSA(EVP_PKEY *pkey, RSA *key) |
312 | { | 312 | { |
313 | int ret = EVP_PKEY_assign_RSA(pkey, key); | 313 | int ret = EVP_PKEY_assign_RSA(pkey, key); |
314 | if (ret) | 314 | if (ret != 0) |
315 | RSA_up_ref(key); | 315 | RSA_up_ref(key); |
316 | return ret; | 316 | return ret; |
317 | } | 317 | } |
@@ -343,21 +343,21 @@ int | |||
343 | EVP_PKEY_set1_DSA(EVP_PKEY *pkey, DSA *key) | 343 | EVP_PKEY_set1_DSA(EVP_PKEY *pkey, DSA *key) |
344 | { | 344 | { |
345 | int ret = EVP_PKEY_assign_DSA(pkey, key); | 345 | int ret = EVP_PKEY_assign_DSA(pkey, key); |
346 | if (ret) | 346 | if (ret != 0) |
347 | DSA_up_ref(key); | 347 | DSA_up_ref(key); |
348 | return ret; | 348 | return ret; |
349 | } | 349 | } |
350 | #endif | 350 | #endif |
351 | 351 | ||
352 | #ifndef OPENSSL_NO_EC | 352 | #ifndef OPENSSL_NO_EC |
353 | 353 | EC_KEY * | |
354 | int | 354 | EVP_PKEY_get0_EC_KEY(EVP_PKEY *pkey) |
355 | EVP_PKEY_set1_EC_KEY(EVP_PKEY *pkey, EC_KEY *key) | ||
356 | { | 355 | { |
357 | int ret = EVP_PKEY_assign_EC_KEY(pkey, key); | 356 | if (pkey->type != EVP_PKEY_EC) { |
358 | if (ret) | 357 | EVPerror(EVP_R_EXPECTING_A_EC_KEY); |
359 | EC_KEY_up_ref(key); | 358 | return NULL; |
360 | return ret; | 359 | } |
360 | return pkey->pkey.ec; | ||
361 | } | 361 | } |
362 | 362 | ||
363 | EC_KEY * | 363 | EC_KEY * |
@@ -370,6 +370,15 @@ EVP_PKEY_get1_EC_KEY(EVP_PKEY *pkey) | |||
370 | EC_KEY_up_ref(pkey->pkey.ec); | 370 | EC_KEY_up_ref(pkey->pkey.ec); |
371 | return pkey->pkey.ec; | 371 | return pkey->pkey.ec; |
372 | } | 372 | } |
373 | |||
374 | int | ||
375 | EVP_PKEY_set1_EC_KEY(EVP_PKEY *pkey, EC_KEY *key) | ||
376 | { | ||
377 | int ret = EVP_PKEY_assign_EC_KEY(pkey, key); | ||
378 | if (ret != 0) | ||
379 | EC_KEY_up_ref(key); | ||
380 | return ret; | ||
381 | } | ||
373 | #endif | 382 | #endif |
374 | 383 | ||
375 | 384 | ||
@@ -399,7 +408,7 @@ int | |||
399 | EVP_PKEY_set1_DH(EVP_PKEY *pkey, DH *key) | 408 | EVP_PKEY_set1_DH(EVP_PKEY *pkey, DH *key) |
400 | { | 409 | { |
401 | int ret = EVP_PKEY_assign_DH(pkey, key); | 410 | int ret = EVP_PKEY_assign_DH(pkey, key); |
402 | if (ret) | 411 | if (ret != 0) |
403 | DH_up_ref(key); | 412 | DH_up_ref(key); |
404 | return ret; | 413 | return ret; |
405 | } | 414 | } |