diff options
Diffstat (limited to 'src/lib/libcrypto/x509v3/v3_akey.c')
-rw-r--r-- | src/lib/libcrypto/x509v3/v3_akey.c | 17 |
1 files changed, 6 insertions, 11 deletions
diff --git a/src/lib/libcrypto/x509v3/v3_akey.c b/src/lib/libcrypto/x509v3/v3_akey.c index 028c709d28..e2e5730c7d 100644 --- a/src/lib/libcrypto/x509v3/v3_akey.c +++ b/src/lib/libcrypto/x509v3/v3_akey.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: v3_akey.c,v 1.18 2016/12/30 15:54:49 jsing Exp $ */ | 1 | /* $OpenBSD: v3_akey.c,v 1.19 2017/01/29 17:49:23 beck Exp $ */ |
2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
3 | * project 1999. | 3 | * project 1999. |
4 | */ | 4 | */ |
@@ -145,8 +145,7 @@ v2i_AUTHORITY_KEYID(X509V3_EXT_METHOD *method, X509V3_CTX *ctx, | |||
145 | if (cnf->value && !strcmp(cnf->value, "always")) | 145 | if (cnf->value && !strcmp(cnf->value, "always")) |
146 | issuer = 2; | 146 | issuer = 2; |
147 | } else { | 147 | } else { |
148 | X509V3err(X509V3_F_V2I_AUTHORITY_KEYID, | 148 | X509V3error(X509V3_R_UNKNOWN_OPTION); |
149 | X509V3_R_UNKNOWN_OPTION); | ||
150 | ERR_asprintf_error_data("name=%s", cnf->name); | 149 | ERR_asprintf_error_data("name=%s", cnf->name); |
151 | return NULL; | 150 | return NULL; |
152 | } | 151 | } |
@@ -155,8 +154,7 @@ v2i_AUTHORITY_KEYID(X509V3_EXT_METHOD *method, X509V3_CTX *ctx, | |||
155 | if (!ctx || !ctx->issuer_cert) { | 154 | if (!ctx || !ctx->issuer_cert) { |
156 | if (ctx && (ctx->flags == CTX_TEST)) | 155 | if (ctx && (ctx->flags == CTX_TEST)) |
157 | return AUTHORITY_KEYID_new(); | 156 | return AUTHORITY_KEYID_new(); |
158 | X509V3err(X509V3_F_V2I_AUTHORITY_KEYID, | 157 | X509V3error(X509V3_R_NO_ISSUER_CERTIFICATE); |
159 | X509V3_R_NO_ISSUER_CERTIFICATE); | ||
160 | return NULL; | 158 | return NULL; |
161 | } | 159 | } |
162 | 160 | ||
@@ -167,8 +165,7 @@ v2i_AUTHORITY_KEYID(X509V3_EXT_METHOD *method, X509V3_CTX *ctx, | |||
167 | if ((i >= 0) && (ext = X509_get_ext(cert, i))) | 165 | if ((i >= 0) && (ext = X509_get_ext(cert, i))) |
168 | ikeyid = X509V3_EXT_d2i(ext); | 166 | ikeyid = X509V3_EXT_d2i(ext); |
169 | if (keyid == 2 && !ikeyid) { | 167 | if (keyid == 2 && !ikeyid) { |
170 | X509V3err(X509V3_F_V2I_AUTHORITY_KEYID, | 168 | X509V3error(X509V3_R_UNABLE_TO_GET_ISSUER_KEYID); |
171 | X509V3_R_UNABLE_TO_GET_ISSUER_KEYID); | ||
172 | return NULL; | 169 | return NULL; |
173 | } | 170 | } |
174 | } | 171 | } |
@@ -177,8 +174,7 @@ v2i_AUTHORITY_KEYID(X509V3_EXT_METHOD *method, X509V3_CTX *ctx, | |||
177 | isname = X509_NAME_dup(X509_get_issuer_name(cert)); | 174 | isname = X509_NAME_dup(X509_get_issuer_name(cert)); |
178 | serial = ASN1_INTEGER_dup(X509_get_serialNumber(cert)); | 175 | serial = ASN1_INTEGER_dup(X509_get_serialNumber(cert)); |
179 | if (!isname || !serial) { | 176 | if (!isname || !serial) { |
180 | X509V3err(X509V3_F_V2I_AUTHORITY_KEYID, | 177 | X509V3error(X509V3_R_UNABLE_TO_GET_ISSUER_DETAILS); |
181 | X509V3_R_UNABLE_TO_GET_ISSUER_DETAILS); | ||
182 | goto err; | 178 | goto err; |
183 | } | 179 | } |
184 | } | 180 | } |
@@ -190,8 +186,7 @@ v2i_AUTHORITY_KEYID(X509V3_EXT_METHOD *method, X509V3_CTX *ctx, | |||
190 | if (!(gens = sk_GENERAL_NAME_new_null()) || | 186 | if (!(gens = sk_GENERAL_NAME_new_null()) || |
191 | !(gen = GENERAL_NAME_new()) || | 187 | !(gen = GENERAL_NAME_new()) || |
192 | !sk_GENERAL_NAME_push(gens, gen)) { | 188 | !sk_GENERAL_NAME_push(gens, gen)) { |
193 | X509V3err(X509V3_F_V2I_AUTHORITY_KEYID, | 189 | X509V3error(ERR_R_MALLOC_FAILURE); |
194 | ERR_R_MALLOC_FAILURE); | ||
195 | goto err; | 190 | goto err; |
196 | } | 191 | } |
197 | gen->type = GEN_DIRNAME; | 192 | gen->type = GEN_DIRNAME; |