diff options
Diffstat (limited to 'src/lib/libcrypto/asn1/x_pubkey.c')
-rw-r--r-- | src/lib/libcrypto/asn1/x_pubkey.c | 25 |
1 files changed, 11 insertions, 14 deletions
diff --git a/src/lib/libcrypto/asn1/x_pubkey.c b/src/lib/libcrypto/asn1/x_pubkey.c index 3bdbb5a536..738507bbb6 100644 --- a/src/lib/libcrypto/asn1/x_pubkey.c +++ b/src/lib/libcrypto/asn1/x_pubkey.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x_pubkey.c,v 1.25 2015/02/11 04:00:39 jsing Exp $ */ | 1 | /* $OpenBSD: x_pubkey.c,v 1.26 2017/01/29 17:49:22 beck Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -149,17 +149,15 @@ X509_PUBKEY_set(X509_PUBKEY **x, EVP_PKEY *pkey) | |||
149 | if (pkey->ameth) { | 149 | if (pkey->ameth) { |
150 | if (pkey->ameth->pub_encode) { | 150 | if (pkey->ameth->pub_encode) { |
151 | if (!pkey->ameth->pub_encode(pk, pkey)) { | 151 | if (!pkey->ameth->pub_encode(pk, pkey)) { |
152 | X509err(X509_F_X509_PUBKEY_SET, | 152 | X509error(X509_R_PUBLIC_KEY_ENCODE_ERROR); |
153 | X509_R_PUBLIC_KEY_ENCODE_ERROR); | ||
154 | goto error; | 153 | goto error; |
155 | } | 154 | } |
156 | } else { | 155 | } else { |
157 | X509err(X509_F_X509_PUBKEY_SET, | 156 | X509error(X509_R_METHOD_NOT_SUPPORTED); |
158 | X509_R_METHOD_NOT_SUPPORTED); | ||
159 | goto error; | 157 | goto error; |
160 | } | 158 | } |
161 | } else { | 159 | } else { |
162 | X509err(X509_F_X509_PUBKEY_SET, X509_R_UNSUPPORTED_ALGORITHM); | 160 | X509error(X509_R_UNSUPPORTED_ALGORITHM); |
163 | goto error; | 161 | goto error; |
164 | } | 162 | } |
165 | 163 | ||
@@ -193,23 +191,22 @@ X509_PUBKEY_get(X509_PUBKEY *key) | |||
193 | goto error; | 191 | goto error; |
194 | 192 | ||
195 | if ((ret = EVP_PKEY_new()) == NULL) { | 193 | if ((ret = EVP_PKEY_new()) == NULL) { |
196 | X509err(X509_F_X509_PUBKEY_GET, ERR_R_MALLOC_FAILURE); | 194 | X509error(ERR_R_MALLOC_FAILURE); |
197 | goto error; | 195 | goto error; |
198 | } | 196 | } |
199 | 197 | ||
200 | if (!EVP_PKEY_set_type(ret, OBJ_obj2nid(key->algor->algorithm))) { | 198 | if (!EVP_PKEY_set_type(ret, OBJ_obj2nid(key->algor->algorithm))) { |
201 | X509err(X509_F_X509_PUBKEY_GET, X509_R_UNSUPPORTED_ALGORITHM); | 199 | X509error(X509_R_UNSUPPORTED_ALGORITHM); |
202 | goto error; | 200 | goto error; |
203 | } | 201 | } |
204 | 202 | ||
205 | if (ret->ameth->pub_decode) { | 203 | if (ret->ameth->pub_decode) { |
206 | if (!ret->ameth->pub_decode(ret, key)) { | 204 | if (!ret->ameth->pub_decode(ret, key)) { |
207 | X509err(X509_F_X509_PUBKEY_GET, | 205 | X509error(X509_R_PUBLIC_KEY_DECODE_ERROR); |
208 | X509_R_PUBLIC_KEY_DECODE_ERROR); | ||
209 | goto error; | 206 | goto error; |
210 | } | 207 | } |
211 | } else { | 208 | } else { |
212 | X509err(X509_F_X509_PUBKEY_GET, X509_R_METHOD_NOT_SUPPORTED); | 209 | X509error(X509_R_METHOD_NOT_SUPPORTED); |
213 | goto error; | 210 | goto error; |
214 | } | 211 | } |
215 | 212 | ||
@@ -304,7 +301,7 @@ i2d_RSA_PUBKEY(RSA *a, unsigned char **pp) | |||
304 | return 0; | 301 | return 0; |
305 | pktmp = EVP_PKEY_new(); | 302 | pktmp = EVP_PKEY_new(); |
306 | if (!pktmp) { | 303 | if (!pktmp) { |
307 | ASN1err(ASN1_F_I2D_RSA_PUBKEY, ERR_R_MALLOC_FAILURE); | 304 | ASN1error(ERR_R_MALLOC_FAILURE); |
308 | return 0; | 305 | return 0; |
309 | } | 306 | } |
310 | EVP_PKEY_set1_RSA(pktmp, a); | 307 | EVP_PKEY_set1_RSA(pktmp, a); |
@@ -346,7 +343,7 @@ i2d_DSA_PUBKEY(DSA *a, unsigned char **pp) | |||
346 | return 0; | 343 | return 0; |
347 | pktmp = EVP_PKEY_new(); | 344 | pktmp = EVP_PKEY_new(); |
348 | if (!pktmp) { | 345 | if (!pktmp) { |
349 | ASN1err(ASN1_F_I2D_DSA_PUBKEY, ERR_R_MALLOC_FAILURE); | 346 | ASN1error(ERR_R_MALLOC_FAILURE); |
350 | return 0; | 347 | return 0; |
351 | } | 348 | } |
352 | EVP_PKEY_set1_DSA(pktmp, a); | 349 | EVP_PKEY_set1_DSA(pktmp, a); |
@@ -387,7 +384,7 @@ i2d_EC_PUBKEY(EC_KEY *a, unsigned char **pp) | |||
387 | if (!a) | 384 | if (!a) |
388 | return (0); | 385 | return (0); |
389 | if ((pktmp = EVP_PKEY_new()) == NULL) { | 386 | if ((pktmp = EVP_PKEY_new()) == NULL) { |
390 | ASN1err(ASN1_F_I2D_EC_PUBKEY, ERR_R_MALLOC_FAILURE); | 387 | ASN1error(ERR_R_MALLOC_FAILURE); |
391 | return (0); | 388 | return (0); |
392 | } | 389 | } |
393 | EVP_PKEY_set1_EC_KEY(pktmp, a); | 390 | EVP_PKEY_set1_EC_KEY(pktmp, a); |