diff options
| author | beck <> | 2017-01-29 17:49:23 +0000 |
|---|---|---|
| committer | beck <> | 2017-01-29 17:49:23 +0000 |
| commit | d1f47bd292f36094480caa49ada36b99a69c59b0 (patch) | |
| tree | 1a54abba678898ee5270ae4f3404a50ee9a92eea /src/lib/libcrypto/x509v3/v3_akey.c | |
| parent | f8c627888330b75c2eea8a3c27d0efe947a4f9da (diff) | |
| download | openbsd-d1f47bd292f36094480caa49ada36b99a69c59b0.tar.gz openbsd-d1f47bd292f36094480caa49ada36b99a69c59b0.tar.bz2 openbsd-d1f47bd292f36094480caa49ada36b99a69c59b0.zip | |
Send the function codes from the error functions to the bit bucket,
as was done earlier in libssl. Thanks inoguchi@ for noticing
libssl had more reacharounds into this.
ok jsing@ inoguchi@
Diffstat (limited to 'src/lib/libcrypto/x509v3/v3_akey.c')
| -rw-r--r-- | src/lib/libcrypto/x509v3/v3_akey.c | 17 |
1 files changed, 6 insertions, 11 deletions
diff --git a/src/lib/libcrypto/x509v3/v3_akey.c b/src/lib/libcrypto/x509v3/v3_akey.c index 028c709d28..e2e5730c7d 100644 --- a/src/lib/libcrypto/x509v3/v3_akey.c +++ b/src/lib/libcrypto/x509v3/v3_akey.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: v3_akey.c,v 1.18 2016/12/30 15:54:49 jsing Exp $ */ | 1 | /* $OpenBSD: v3_akey.c,v 1.19 2017/01/29 17:49:23 beck Exp $ */ |
| 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
| 3 | * project 1999. | 3 | * project 1999. |
| 4 | */ | 4 | */ |
| @@ -145,8 +145,7 @@ v2i_AUTHORITY_KEYID(X509V3_EXT_METHOD *method, X509V3_CTX *ctx, | |||
| 145 | if (cnf->value && !strcmp(cnf->value, "always")) | 145 | if (cnf->value && !strcmp(cnf->value, "always")) |
| 146 | issuer = 2; | 146 | issuer = 2; |
| 147 | } else { | 147 | } else { |
| 148 | X509V3err(X509V3_F_V2I_AUTHORITY_KEYID, | 148 | X509V3error(X509V3_R_UNKNOWN_OPTION); |
| 149 | X509V3_R_UNKNOWN_OPTION); | ||
| 150 | ERR_asprintf_error_data("name=%s", cnf->name); | 149 | ERR_asprintf_error_data("name=%s", cnf->name); |
| 151 | return NULL; | 150 | return NULL; |
| 152 | } | 151 | } |
| @@ -155,8 +154,7 @@ v2i_AUTHORITY_KEYID(X509V3_EXT_METHOD *method, X509V3_CTX *ctx, | |||
| 155 | if (!ctx || !ctx->issuer_cert) { | 154 | if (!ctx || !ctx->issuer_cert) { |
| 156 | if (ctx && (ctx->flags == CTX_TEST)) | 155 | if (ctx && (ctx->flags == CTX_TEST)) |
| 157 | return AUTHORITY_KEYID_new(); | 156 | return AUTHORITY_KEYID_new(); |
| 158 | X509V3err(X509V3_F_V2I_AUTHORITY_KEYID, | 157 | X509V3error(X509V3_R_NO_ISSUER_CERTIFICATE); |
| 159 | X509V3_R_NO_ISSUER_CERTIFICATE); | ||
| 160 | return NULL; | 158 | return NULL; |
| 161 | } | 159 | } |
| 162 | 160 | ||
| @@ -167,8 +165,7 @@ v2i_AUTHORITY_KEYID(X509V3_EXT_METHOD *method, X509V3_CTX *ctx, | |||
| 167 | if ((i >= 0) && (ext = X509_get_ext(cert, i))) | 165 | if ((i >= 0) && (ext = X509_get_ext(cert, i))) |
| 168 | ikeyid = X509V3_EXT_d2i(ext); | 166 | ikeyid = X509V3_EXT_d2i(ext); |
| 169 | if (keyid == 2 && !ikeyid) { | 167 | if (keyid == 2 && !ikeyid) { |
| 170 | X509V3err(X509V3_F_V2I_AUTHORITY_KEYID, | 168 | X509V3error(X509V3_R_UNABLE_TO_GET_ISSUER_KEYID); |
| 171 | X509V3_R_UNABLE_TO_GET_ISSUER_KEYID); | ||
| 172 | return NULL; | 169 | return NULL; |
| 173 | } | 170 | } |
| 174 | } | 171 | } |
| @@ -177,8 +174,7 @@ v2i_AUTHORITY_KEYID(X509V3_EXT_METHOD *method, X509V3_CTX *ctx, | |||
| 177 | isname = X509_NAME_dup(X509_get_issuer_name(cert)); | 174 | isname = X509_NAME_dup(X509_get_issuer_name(cert)); |
| 178 | serial = ASN1_INTEGER_dup(X509_get_serialNumber(cert)); | 175 | serial = ASN1_INTEGER_dup(X509_get_serialNumber(cert)); |
| 179 | if (!isname || !serial) { | 176 | if (!isname || !serial) { |
| 180 | X509V3err(X509V3_F_V2I_AUTHORITY_KEYID, | 177 | X509V3error(X509V3_R_UNABLE_TO_GET_ISSUER_DETAILS); |
| 181 | X509V3_R_UNABLE_TO_GET_ISSUER_DETAILS); | ||
| 182 | goto err; | 178 | goto err; |
| 183 | } | 179 | } |
| 184 | } | 180 | } |
| @@ -190,8 +186,7 @@ v2i_AUTHORITY_KEYID(X509V3_EXT_METHOD *method, X509V3_CTX *ctx, | |||
| 190 | if (!(gens = sk_GENERAL_NAME_new_null()) || | 186 | if (!(gens = sk_GENERAL_NAME_new_null()) || |
| 191 | !(gen = GENERAL_NAME_new()) || | 187 | !(gen = GENERAL_NAME_new()) || |
| 192 | !sk_GENERAL_NAME_push(gens, gen)) { | 188 | !sk_GENERAL_NAME_push(gens, gen)) { |
| 193 | X509V3err(X509V3_F_V2I_AUTHORITY_KEYID, | 189 | X509V3error(ERR_R_MALLOC_FAILURE); |
| 194 | ERR_R_MALLOC_FAILURE); | ||
| 195 | goto err; | 190 | goto err; |
| 196 | } | 191 | } |
| 197 | gen->type = GEN_DIRNAME; | 192 | gen->type = GEN_DIRNAME; |
