diff options
Diffstat (limited to 'src/lib/libssl/ssl_cert.c')
| -rw-r--r-- | src/lib/libssl/ssl_cert.c | 32 |
1 files changed, 16 insertions, 16 deletions
diff --git a/src/lib/libssl/ssl_cert.c b/src/lib/libssl/ssl_cert.c index 218a55c197..4f714f751a 100644 --- a/src/lib/libssl/ssl_cert.c +++ b/src/lib/libssl/ssl_cert.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: ssl_cert.c,v 1.60 2017/01/24 15:04:12 jsing Exp $ */ | 1 | /* $OpenBSD: ssl_cert.c,v 1.61 2017/01/26 10:40:21 beck Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -178,7 +178,7 @@ ssl_cert_new(void) | |||
| 178 | 178 | ||
| 179 | ret = calloc(1, sizeof(CERT)); | 179 | ret = calloc(1, sizeof(CERT)); |
| 180 | if (ret == NULL) { | 180 | if (ret == NULL) { |
| 181 | SSLerr(SSL_F_SSL_CERT_NEW, ERR_R_MALLOC_FAILURE); | 181 | SSLerror(ERR_R_MALLOC_FAILURE); |
| 182 | return (NULL); | 182 | return (NULL); |
| 183 | } | 183 | } |
| 184 | ret->key = &(ret->pkeys[SSL_PKEY_RSA_ENC]); | 184 | ret->key = &(ret->pkeys[SSL_PKEY_RSA_ENC]); |
| @@ -195,7 +195,7 @@ ssl_cert_dup(CERT *cert) | |||
| 195 | 195 | ||
| 196 | ret = calloc(1, sizeof(CERT)); | 196 | ret = calloc(1, sizeof(CERT)); |
| 197 | if (ret == NULL) { | 197 | if (ret == NULL) { |
| 198 | SSLerr(SSL_F_SSL_CERT_DUP, ERR_R_MALLOC_FAILURE); | 198 | SSLerror(ERR_R_MALLOC_FAILURE); |
| 199 | return (NULL); | 199 | return (NULL); |
| 200 | } | 200 | } |
| 201 | 201 | ||
| @@ -212,13 +212,13 @@ ssl_cert_dup(CERT *cert) | |||
| 212 | if (cert->dh_tmp != NULL) { | 212 | if (cert->dh_tmp != NULL) { |
| 213 | ret->dh_tmp = DHparams_dup(cert->dh_tmp); | 213 | ret->dh_tmp = DHparams_dup(cert->dh_tmp); |
| 214 | if (ret->dh_tmp == NULL) { | 214 | if (ret->dh_tmp == NULL) { |
| 215 | SSLerr(SSL_F_SSL_CERT_DUP, ERR_R_DH_LIB); | 215 | SSLerror(ERR_R_DH_LIB); |
| 216 | goto err; | 216 | goto err; |
| 217 | } | 217 | } |
| 218 | if (cert->dh_tmp->priv_key) { | 218 | if (cert->dh_tmp->priv_key) { |
| 219 | BIGNUM *b = BN_dup(cert->dh_tmp->priv_key); | 219 | BIGNUM *b = BN_dup(cert->dh_tmp->priv_key); |
| 220 | if (!b) { | 220 | if (!b) { |
| 221 | SSLerr(SSL_F_SSL_CERT_DUP, ERR_R_BN_LIB); | 221 | SSLerror(ERR_R_BN_LIB); |
| 222 | goto err; | 222 | goto err; |
| 223 | } | 223 | } |
| 224 | ret->dh_tmp->priv_key = b; | 224 | ret->dh_tmp->priv_key = b; |
| @@ -226,7 +226,7 @@ ssl_cert_dup(CERT *cert) | |||
| 226 | if (cert->dh_tmp->pub_key) { | 226 | if (cert->dh_tmp->pub_key) { |
| 227 | BIGNUM *b = BN_dup(cert->dh_tmp->pub_key); | 227 | BIGNUM *b = BN_dup(cert->dh_tmp->pub_key); |
| 228 | if (!b) { | 228 | if (!b) { |
| 229 | SSLerr(SSL_F_SSL_CERT_DUP, ERR_R_BN_LIB); | 229 | SSLerror(ERR_R_BN_LIB); |
| 230 | goto err; | 230 | goto err; |
| 231 | } | 231 | } |
| 232 | ret->dh_tmp->pub_key = b; | 232 | ret->dh_tmp->pub_key = b; |
| @@ -238,7 +238,7 @@ ssl_cert_dup(CERT *cert) | |||
| 238 | if (cert->ecdh_tmp) { | 238 | if (cert->ecdh_tmp) { |
| 239 | ret->ecdh_tmp = EC_KEY_dup(cert->ecdh_tmp); | 239 | ret->ecdh_tmp = EC_KEY_dup(cert->ecdh_tmp); |
| 240 | if (ret->ecdh_tmp == NULL) { | 240 | if (ret->ecdh_tmp == NULL) { |
| 241 | SSLerr(SSL_F_SSL_CERT_DUP, ERR_R_EC_LIB); | 241 | SSLerror(ERR_R_EC_LIB); |
| 242 | goto err; | 242 | goto err; |
| 243 | } | 243 | } |
| 244 | } | 244 | } |
| @@ -284,7 +284,7 @@ ssl_cert_dup(CERT *cert) | |||
| 284 | 284 | ||
| 285 | default: | 285 | default: |
| 286 | /* Can't happen. */ | 286 | /* Can't happen. */ |
| 287 | SSLerr(SSL_F_SSL_CERT_DUP, SSL_R_LIBRARY_BUG); | 287 | SSLerror(SSL_R_LIBRARY_BUG); |
| 288 | } | 288 | } |
| 289 | } | 289 | } |
| 290 | } | 290 | } |
| @@ -354,12 +354,12 @@ ssl_cert_inst(CERT **o) | |||
| 354 | */ | 354 | */ |
| 355 | 355 | ||
| 356 | if (o == NULL) { | 356 | if (o == NULL) { |
| 357 | SSLerr(SSL_F_SSL_CERT_INST, ERR_R_PASSED_NULL_PARAMETER); | 357 | SSLerror(ERR_R_PASSED_NULL_PARAMETER); |
| 358 | return (0); | 358 | return (0); |
| 359 | } | 359 | } |
| 360 | if (*o == NULL) { | 360 | if (*o == NULL) { |
| 361 | if ((*o = ssl_cert_new()) == NULL) { | 361 | if ((*o = ssl_cert_new()) == NULL) { |
| 362 | SSLerr(SSL_F_SSL_CERT_INST, ERR_R_MALLOC_FAILURE); | 362 | SSLerror(ERR_R_MALLOC_FAILURE); |
| 363 | return (0); | 363 | return (0); |
| 364 | } | 364 | } |
| 365 | } | 365 | } |
| @@ -374,7 +374,7 @@ ssl_sess_cert_new(void) | |||
| 374 | 374 | ||
| 375 | ret = calloc(1, sizeof *ret); | 375 | ret = calloc(1, sizeof *ret); |
| 376 | if (ret == NULL) { | 376 | if (ret == NULL) { |
| 377 | SSLerr(SSL_F_SSL_SESS_CERT_NEW, ERR_R_MALLOC_FAILURE); | 377 | SSLerror(ERR_R_MALLOC_FAILURE); |
| 378 | return NULL; | 378 | return NULL; |
| 379 | } | 379 | } |
| 380 | ret->peer_key = &(ret->peer_pkeys[SSL_PKEY_RSA_ENC]); | 380 | ret->peer_key = &(ret->peer_pkeys[SSL_PKEY_RSA_ENC]); |
| @@ -418,7 +418,7 @@ ssl_verify_cert_chain(SSL *s, STACK_OF(X509) *sk) | |||
| 418 | 418 | ||
| 419 | x = sk_X509_value(sk, 0); | 419 | x = sk_X509_value(sk, 0); |
| 420 | if (!X509_STORE_CTX_init(&ctx, s->ctx->cert_store, x, sk)) { | 420 | if (!X509_STORE_CTX_init(&ctx, s->ctx->cert_store, x, sk)) { |
| 421 | SSLerr(SSL_F_SSL_VERIFY_CERT_CHAIN, ERR_R_X509_LIB); | 421 | SSLerror(ERR_R_X509_LIB); |
| 422 | return (0); | 422 | return (0); |
| 423 | } | 423 | } |
| 424 | X509_STORE_CTX_set_ex_data(&ctx, | 424 | X509_STORE_CTX_set_ex_data(&ctx, |
| @@ -574,7 +574,7 @@ SSL_load_client_CA_file(const char *file) | |||
| 574 | in = BIO_new(BIO_s_file_internal()); | 574 | in = BIO_new(BIO_s_file_internal()); |
| 575 | 575 | ||
| 576 | if ((sk == NULL) || (in == NULL)) { | 576 | if ((sk == NULL) || (in == NULL)) { |
| 577 | SSLerr(SSL_F_SSL_LOAD_CLIENT_CA_FILE, ERR_R_MALLOC_FAILURE); | 577 | SSLerror(ERR_R_MALLOC_FAILURE); |
| 578 | goto err; | 578 | goto err; |
| 579 | } | 579 | } |
| 580 | 580 | ||
| @@ -587,7 +587,7 @@ SSL_load_client_CA_file(const char *file) | |||
| 587 | if (ret == NULL) { | 587 | if (ret == NULL) { |
| 588 | ret = sk_X509_NAME_new_null(); | 588 | ret = sk_X509_NAME_new_null(); |
| 589 | if (ret == NULL) { | 589 | if (ret == NULL) { |
| 590 | SSLerr(SSL_F_SSL_LOAD_CLIENT_CA_FILE, | 590 | SSLerror( |
| 591 | ERR_R_MALLOC_FAILURE); | 591 | ERR_R_MALLOC_FAILURE); |
| 592 | goto err; | 592 | goto err; |
| 593 | } | 593 | } |
| @@ -643,7 +643,7 @@ SSL_add_file_cert_subjects_to_stack(STACK_OF(X509_NAME) *stack, | |||
| 643 | in = BIO_new(BIO_s_file_internal()); | 643 | in = BIO_new(BIO_s_file_internal()); |
| 644 | 644 | ||
| 645 | if (in == NULL) { | 645 | if (in == NULL) { |
| 646 | SSLerr(SSL_F_SSL_ADD_FILE_CERT_SUBJECTS_TO_STACK, | 646 | SSLerror( |
| 647 | ERR_R_MALLOC_FAILURE); | 647 | ERR_R_MALLOC_FAILURE); |
| 648 | goto err; | 648 | goto err; |
| 649 | } | 649 | } |
| @@ -713,7 +713,7 @@ SSL_add_dir_cert_subjects_to_stack(STACK_OF(X509_NAME) *stack, const char *dir) | |||
| 713 | if (!ret) { | 713 | if (!ret) { |
| 714 | SYSerr(SYS_F_OPENDIR, errno); | 714 | SYSerr(SYS_F_OPENDIR, errno); |
| 715 | ERR_asprintf_error_data("opendir ('%s')", dir); | 715 | ERR_asprintf_error_data("opendir ('%s')", dir); |
| 716 | SSLerr(SSL_F_SSL_ADD_DIR_CERT_SUBJECTS_TO_STACK, ERR_R_SYS_LIB); | 716 | SSLerror(ERR_R_SYS_LIB); |
| 717 | } | 717 | } |
| 718 | return ret; | 718 | return ret; |
| 719 | } | 719 | } |
