summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto/x509v3/v3_akey.c
diff options
context:
space:
mode:
Diffstat (limited to 'src/lib/libcrypto/x509v3/v3_akey.c')
-rw-r--r--src/lib/libcrypto/x509v3/v3_akey.c17
1 files changed, 6 insertions, 11 deletions
diff --git a/src/lib/libcrypto/x509v3/v3_akey.c b/src/lib/libcrypto/x509v3/v3_akey.c
index 028c709d28..e2e5730c7d 100644
--- a/src/lib/libcrypto/x509v3/v3_akey.c
+++ b/src/lib/libcrypto/x509v3/v3_akey.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: v3_akey.c,v 1.18 2016/12/30 15:54:49 jsing Exp $ */ 1/* $OpenBSD: v3_akey.c,v 1.19 2017/01/29 17:49:23 beck Exp $ */
2/* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL 2/* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL
3 * project 1999. 3 * project 1999.
4 */ 4 */
@@ -145,8 +145,7 @@ v2i_AUTHORITY_KEYID(X509V3_EXT_METHOD *method, X509V3_CTX *ctx,
145 if (cnf->value && !strcmp(cnf->value, "always")) 145 if (cnf->value && !strcmp(cnf->value, "always"))
146 issuer = 2; 146 issuer = 2;
147 } else { 147 } else {
148 X509V3err(X509V3_F_V2I_AUTHORITY_KEYID, 148 X509V3error(X509V3_R_UNKNOWN_OPTION);
149 X509V3_R_UNKNOWN_OPTION);
150 ERR_asprintf_error_data("name=%s", cnf->name); 149 ERR_asprintf_error_data("name=%s", cnf->name);
151 return NULL; 150 return NULL;
152 } 151 }
@@ -155,8 +154,7 @@ v2i_AUTHORITY_KEYID(X509V3_EXT_METHOD *method, X509V3_CTX *ctx,
155 if (!ctx || !ctx->issuer_cert) { 154 if (!ctx || !ctx->issuer_cert) {
156 if (ctx && (ctx->flags == CTX_TEST)) 155 if (ctx && (ctx->flags == CTX_TEST))
157 return AUTHORITY_KEYID_new(); 156 return AUTHORITY_KEYID_new();
158 X509V3err(X509V3_F_V2I_AUTHORITY_KEYID, 157 X509V3error(X509V3_R_NO_ISSUER_CERTIFICATE);
159 X509V3_R_NO_ISSUER_CERTIFICATE);
160 return NULL; 158 return NULL;
161 } 159 }
162 160
@@ -167,8 +165,7 @@ v2i_AUTHORITY_KEYID(X509V3_EXT_METHOD *method, X509V3_CTX *ctx,
167 if ((i >= 0) && (ext = X509_get_ext(cert, i))) 165 if ((i >= 0) && (ext = X509_get_ext(cert, i)))
168 ikeyid = X509V3_EXT_d2i(ext); 166 ikeyid = X509V3_EXT_d2i(ext);
169 if (keyid == 2 && !ikeyid) { 167 if (keyid == 2 && !ikeyid) {
170 X509V3err(X509V3_F_V2I_AUTHORITY_KEYID, 168 X509V3error(X509V3_R_UNABLE_TO_GET_ISSUER_KEYID);
171 X509V3_R_UNABLE_TO_GET_ISSUER_KEYID);
172 return NULL; 169 return NULL;
173 } 170 }
174 } 171 }
@@ -177,8 +174,7 @@ v2i_AUTHORITY_KEYID(X509V3_EXT_METHOD *method, X509V3_CTX *ctx,
177 isname = X509_NAME_dup(X509_get_issuer_name(cert)); 174 isname = X509_NAME_dup(X509_get_issuer_name(cert));
178 serial = ASN1_INTEGER_dup(X509_get_serialNumber(cert)); 175 serial = ASN1_INTEGER_dup(X509_get_serialNumber(cert));
179 if (!isname || !serial) { 176 if (!isname || !serial) {
180 X509V3err(X509V3_F_V2I_AUTHORITY_KEYID, 177 X509V3error(X509V3_R_UNABLE_TO_GET_ISSUER_DETAILS);
181 X509V3_R_UNABLE_TO_GET_ISSUER_DETAILS);
182 goto err; 178 goto err;
183 } 179 }
184 } 180 }
@@ -190,8 +186,7 @@ v2i_AUTHORITY_KEYID(X509V3_EXT_METHOD *method, X509V3_CTX *ctx,
190 if (!(gens = sk_GENERAL_NAME_new_null()) || 186 if (!(gens = sk_GENERAL_NAME_new_null()) ||
191 !(gen = GENERAL_NAME_new()) || 187 !(gen = GENERAL_NAME_new()) ||
192 !sk_GENERAL_NAME_push(gens, gen)) { 188 !sk_GENERAL_NAME_push(gens, gen)) {
193 X509V3err(X509V3_F_V2I_AUTHORITY_KEYID, 189 X509V3error(ERR_R_MALLOC_FAILURE);
194 ERR_R_MALLOC_FAILURE);
195 goto err; 190 goto err;
196 } 191 }
197 gen->type = GEN_DIRNAME; 192 gen->type = GEN_DIRNAME;