diff options
Diffstat (limited to 'src/lib/libcrypto/x509v3/v3_skey.c')
-rw-r--r-- | src/lib/libcrypto/x509v3/v3_skey.c | 12 |
1 files changed, 6 insertions, 6 deletions
diff --git a/src/lib/libcrypto/x509v3/v3_skey.c b/src/lib/libcrypto/x509v3/v3_skey.c index fbd66bb721..9dc1741788 100644 --- a/src/lib/libcrypto/x509v3/v3_skey.c +++ b/src/lib/libcrypto/x509v3/v3_skey.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: v3_skey.c,v 1.14 2016/12/30 15:54:49 jsing Exp $ */ | 1 | /* $OpenBSD: v3_skey.c,v 1.15 2017/01/29 17:49:23 beck Exp $ */ |
2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
3 | * project 1999. | 3 | * project 1999. |
4 | */ | 4 | */ |
@@ -95,7 +95,7 @@ s2i_ASN1_OCTET_STRING(X509V3_EXT_METHOD *method, X509V3_CTX *ctx, char *str) | |||
95 | long length; | 95 | long length; |
96 | 96 | ||
97 | if (!(oct = ASN1_OCTET_STRING_new())) { | 97 | if (!(oct = ASN1_OCTET_STRING_new())) { |
98 | X509V3err(X509V3_F_S2I_ASN1_OCTET_STRING, ERR_R_MALLOC_FAILURE); | 98 | X509V3error(ERR_R_MALLOC_FAILURE); |
99 | return NULL; | 99 | return NULL; |
100 | } | 100 | } |
101 | 101 | ||
@@ -121,7 +121,7 @@ s2i_skey_id(X509V3_EXT_METHOD *method, X509V3_CTX *ctx, char *str) | |||
121 | return s2i_ASN1_OCTET_STRING(method, ctx, str); | 121 | return s2i_ASN1_OCTET_STRING(method, ctx, str); |
122 | 122 | ||
123 | if (!(oct = ASN1_OCTET_STRING_new())) { | 123 | if (!(oct = ASN1_OCTET_STRING_new())) { |
124 | X509V3err(X509V3_F_S2I_SKEY_ID, ERR_R_MALLOC_FAILURE); | 124 | X509V3error(ERR_R_MALLOC_FAILURE); |
125 | return NULL; | 125 | return NULL; |
126 | } | 126 | } |
127 | 127 | ||
@@ -129,7 +129,7 @@ s2i_skey_id(X509V3_EXT_METHOD *method, X509V3_CTX *ctx, char *str) | |||
129 | return oct; | 129 | return oct; |
130 | 130 | ||
131 | if (!ctx || (!ctx->subject_req && !ctx->subject_cert)) { | 131 | if (!ctx || (!ctx->subject_req && !ctx->subject_cert)) { |
132 | X509V3err(X509V3_F_S2I_SKEY_ID, X509V3_R_NO_PUBLIC_KEY); | 132 | X509V3error(X509V3_R_NO_PUBLIC_KEY); |
133 | goto err; | 133 | goto err; |
134 | } | 134 | } |
135 | 135 | ||
@@ -139,7 +139,7 @@ s2i_skey_id(X509V3_EXT_METHOD *method, X509V3_CTX *ctx, char *str) | |||
139 | pk = ctx->subject_cert->cert_info->key->public_key; | 139 | pk = ctx->subject_cert->cert_info->key->public_key; |
140 | 140 | ||
141 | if (!pk) { | 141 | if (!pk) { |
142 | X509V3err(X509V3_F_S2I_SKEY_ID, X509V3_R_NO_PUBLIC_KEY); | 142 | X509V3error(X509V3_R_NO_PUBLIC_KEY); |
143 | goto err; | 143 | goto err; |
144 | } | 144 | } |
145 | 145 | ||
@@ -148,7 +148,7 @@ s2i_skey_id(X509V3_EXT_METHOD *method, X509V3_CTX *ctx, char *str) | |||
148 | goto err; | 148 | goto err; |
149 | 149 | ||
150 | if (!ASN1_STRING_set(oct, pkey_dig, diglen)) { | 150 | if (!ASN1_STRING_set(oct, pkey_dig, diglen)) { |
151 | X509V3err(X509V3_F_S2I_SKEY_ID, ERR_R_MALLOC_FAILURE); | 151 | X509V3error(ERR_R_MALLOC_FAILURE); |
152 | goto err; | 152 | goto err; |
153 | } | 153 | } |
154 | 154 | ||