summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto/ts/ts_rsp_utils.c
diff options
context:
space:
mode:
authorbeck <>2017-01-29 17:49:23 +0000
committerbeck <>2017-01-29 17:49:23 +0000
commit957b11334a7afb14537322f0e4795b2e368b3f59 (patch)
tree1a54abba678898ee5270ae4f3404a50ee9a92eea /src/lib/libcrypto/ts/ts_rsp_utils.c
parentdf96e020e729c6c37a8c7fe311fdd1fe6a8718c5 (diff)
downloadopenbsd-957b11334a7afb14537322f0e4795b2e368b3f59.tar.gz
openbsd-957b11334a7afb14537322f0e4795b2e368b3f59.tar.bz2
openbsd-957b11334a7afb14537322f0e4795b2e368b3f59.zip
Send the function codes from the error functions to the bit bucket,
as was done earlier in libssl. Thanks inoguchi@ for noticing libssl had more reacharounds into this. ok jsing@ inoguchi@
Diffstat (limited to 'src/lib/libcrypto/ts/ts_rsp_utils.c')
-rw-r--r--src/lib/libcrypto/ts/ts_rsp_utils.c26
1 files changed, 12 insertions, 14 deletions
diff --git a/src/lib/libcrypto/ts/ts_rsp_utils.c b/src/lib/libcrypto/ts/ts_rsp_utils.c
index 39eb2a2963..5638331d17 100644
--- a/src/lib/libcrypto/ts/ts_rsp_utils.c
+++ b/src/lib/libcrypto/ts/ts_rsp_utils.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: ts_rsp_utils.c,v 1.5 2015/07/29 14:58:34 jsing Exp $ */ 1/* $OpenBSD: ts_rsp_utils.c,v 1.6 2017/01/29 17:49:23 beck Exp $ */
2/* Written by Zoltan Glozik (zglozik@stones.com) for the OpenSSL 2/* Written by Zoltan Glozik (zglozik@stones.com) for the OpenSSL
3 * project 2002. 3 * project 2002.
4 */ 4 */
@@ -74,7 +74,7 @@ TS_RESP_set_status_info(TS_RESP *a, TS_STATUS_INFO *status_info)
74 return 1; 74 return 1;
75 new_status_info = TS_STATUS_INFO_dup(status_info); 75 new_status_info = TS_STATUS_INFO_dup(status_info);
76 if (new_status_info == NULL) { 76 if (new_status_info == NULL) {
77 TSerr(TS_F_TS_RESP_SET_STATUS_INFO, ERR_R_MALLOC_FAILURE); 77 TSerror(ERR_R_MALLOC_FAILURE);
78 return 0; 78 return 0;
79 } 79 }
80 TS_STATUS_INFO_free(a->status_info); 80 TS_STATUS_INFO_free(a->status_info);
@@ -133,7 +133,7 @@ TS_TST_INFO_set_policy_id(TS_TST_INFO *a, ASN1_OBJECT *policy)
133 return 1; 133 return 1;
134 new_policy = OBJ_dup(policy); 134 new_policy = OBJ_dup(policy);
135 if (new_policy == NULL) { 135 if (new_policy == NULL) {
136 TSerr(TS_F_TS_TST_INFO_SET_POLICY_ID, ERR_R_MALLOC_FAILURE); 136 TSerror(ERR_R_MALLOC_FAILURE);
137 return 0; 137 return 0;
138 } 138 }
139 ASN1_OBJECT_free(a->policy_id); 139 ASN1_OBJECT_free(a->policy_id);
@@ -156,7 +156,7 @@ TS_TST_INFO_set_msg_imprint(TS_TST_INFO *a, TS_MSG_IMPRINT *msg_imprint)
156 return 1; 156 return 1;
157 new_msg_imprint = TS_MSG_IMPRINT_dup(msg_imprint); 157 new_msg_imprint = TS_MSG_IMPRINT_dup(msg_imprint);
158 if (new_msg_imprint == NULL) { 158 if (new_msg_imprint == NULL) {
159 TSerr(TS_F_TS_TST_INFO_SET_MSG_IMPRINT, ERR_R_MALLOC_FAILURE); 159 TSerror(ERR_R_MALLOC_FAILURE);
160 return 0; 160 return 0;
161 } 161 }
162 TS_MSG_IMPRINT_free(a->msg_imprint); 162 TS_MSG_IMPRINT_free(a->msg_imprint);
@@ -179,7 +179,7 @@ TS_TST_INFO_set_serial(TS_TST_INFO *a, const ASN1_INTEGER *serial)
179 return 1; 179 return 1;
180 new_serial = ASN1_INTEGER_dup(serial); 180 new_serial = ASN1_INTEGER_dup(serial);
181 if (new_serial == NULL) { 181 if (new_serial == NULL) {
182 TSerr(TS_F_TS_TST_INFO_SET_SERIAL, ERR_R_MALLOC_FAILURE); 182 TSerror(ERR_R_MALLOC_FAILURE);
183 return 0; 183 return 0;
184 } 184 }
185 ASN1_INTEGER_free(a->serial); 185 ASN1_INTEGER_free(a->serial);
@@ -202,7 +202,7 @@ TS_TST_INFO_set_time(TS_TST_INFO *a, const ASN1_GENERALIZEDTIME *gtime)
202 return 1; 202 return 1;
203 new_time = ASN1_STRING_dup(gtime); 203 new_time = ASN1_STRING_dup(gtime);
204 if (new_time == NULL) { 204 if (new_time == NULL) {
205 TSerr(TS_F_TS_TST_INFO_SET_TIME, ERR_R_MALLOC_FAILURE); 205 TSerror(ERR_R_MALLOC_FAILURE);
206 return 0; 206 return 0;
207 } 207 }
208 ASN1_GENERALIZEDTIME_free(a->time); 208 ASN1_GENERALIZEDTIME_free(a->time);
@@ -225,7 +225,7 @@ TS_TST_INFO_set_accuracy(TS_TST_INFO *a, TS_ACCURACY *accuracy)
225 return 1; 225 return 1;
226 new_accuracy = TS_ACCURACY_dup(accuracy); 226 new_accuracy = TS_ACCURACY_dup(accuracy);
227 if (new_accuracy == NULL) { 227 if (new_accuracy == NULL) {
228 TSerr(TS_F_TS_TST_INFO_SET_ACCURACY, ERR_R_MALLOC_FAILURE); 228 TSerror(ERR_R_MALLOC_FAILURE);
229 return 0; 229 return 0;
230 } 230 }
231 TS_ACCURACY_free(a->accuracy); 231 TS_ACCURACY_free(a->accuracy);
@@ -248,7 +248,7 @@ TS_ACCURACY_set_seconds(TS_ACCURACY *a, const ASN1_INTEGER *seconds)
248 return 1; 248 return 1;
249 new_seconds = ASN1_INTEGER_dup(seconds); 249 new_seconds = ASN1_INTEGER_dup(seconds);
250 if (new_seconds == NULL) { 250 if (new_seconds == NULL) {
251 TSerr(TS_F_TS_ACCURACY_SET_SECONDS, ERR_R_MALLOC_FAILURE); 251 TSerror(ERR_R_MALLOC_FAILURE);
252 return 0; 252 return 0;
253 } 253 }
254 ASN1_INTEGER_free(a->seconds); 254 ASN1_INTEGER_free(a->seconds);
@@ -272,8 +272,7 @@ TS_ACCURACY_set_millis(TS_ACCURACY *a, const ASN1_INTEGER *millis)
272 if (millis != NULL) { 272 if (millis != NULL) {
273 new_millis = ASN1_INTEGER_dup(millis); 273 new_millis = ASN1_INTEGER_dup(millis);
274 if (new_millis == NULL) { 274 if (new_millis == NULL) {
275 TSerr(TS_F_TS_ACCURACY_SET_MILLIS, 275 TSerror(ERR_R_MALLOC_FAILURE);
276 ERR_R_MALLOC_FAILURE);
277 return 0; 276 return 0;
278 } 277 }
279 } 278 }
@@ -298,8 +297,7 @@ TS_ACCURACY_set_micros(TS_ACCURACY *a, const ASN1_INTEGER *micros)
298 if (micros != NULL) { 297 if (micros != NULL) {
299 new_micros = ASN1_INTEGER_dup(micros); 298 new_micros = ASN1_INTEGER_dup(micros);
300 if (new_micros == NULL) { 299 if (new_micros == NULL) {
301 TSerr(TS_F_TS_ACCURACY_SET_MICROS, 300 TSerror(ERR_R_MALLOC_FAILURE);
302 ERR_R_MALLOC_FAILURE);
303 return 0; 301 return 0;
304 } 302 }
305 } 303 }
@@ -336,7 +334,7 @@ TS_TST_INFO_set_nonce(TS_TST_INFO *a, const ASN1_INTEGER *nonce)
336 return 1; 334 return 1;
337 new_nonce = ASN1_INTEGER_dup(nonce); 335 new_nonce = ASN1_INTEGER_dup(nonce);
338 if (new_nonce == NULL) { 336 if (new_nonce == NULL) {
339 TSerr(TS_F_TS_TST_INFO_SET_NONCE, ERR_R_MALLOC_FAILURE); 337 TSerror(ERR_R_MALLOC_FAILURE);
340 return 0; 338 return 0;
341 } 339 }
342 ASN1_INTEGER_free(a->nonce); 340 ASN1_INTEGER_free(a->nonce);
@@ -359,7 +357,7 @@ TS_TST_INFO_set_tsa(TS_TST_INFO *a, GENERAL_NAME *tsa)
359 return 1; 357 return 1;
360 new_tsa = GENERAL_NAME_dup(tsa); 358 new_tsa = GENERAL_NAME_dup(tsa);
361 if (new_tsa == NULL) { 359 if (new_tsa == NULL) {
362 TSerr(TS_F_TS_TST_INFO_SET_TSA, ERR_R_MALLOC_FAILURE); 360 TSerror(ERR_R_MALLOC_FAILURE);
363 return 0; 361 return 0;
364 } 362 }
365 GENERAL_NAME_free(a->tsa); 363 GENERAL_NAME_free(a->tsa);