summaryrefslogtreecommitdiff
path: root/src/lib/libssl/ssl_lib.c
diff options
context:
space:
mode:
Diffstat (limited to 'src/lib/libssl/ssl_lib.c')
-rw-r--r--src/lib/libssl/ssl_lib.c98
1 files changed, 49 insertions, 49 deletions
diff --git a/src/lib/libssl/ssl_lib.c b/src/lib/libssl/ssl_lib.c
index 6d5d5c468b..605fc428ad 100644
--- a/src/lib/libssl/ssl_lib.c
+++ b/src/lib/libssl/ssl_lib.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: ssl_lib.c,v 1.153 2017/01/26 06:32:58 jsing Exp $ */ 1/* $OpenBSD: ssl_lib.c,v 1.154 2017/01/26 10:40:21 beck Exp $ */
2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) 2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3 * All rights reserved. 3 * All rights reserved.
4 * 4 *
@@ -163,7 +163,7 @@ int
163SSL_clear(SSL *s) 163SSL_clear(SSL *s)
164{ 164{
165 if (s->method == NULL) { 165 if (s->method == NULL) {
166 SSLerr(SSL_F_SSL_CLEAR, SSL_R_NO_METHOD_SPECIFIED); 166 SSLerror(SSL_R_NO_METHOD_SPECIFIED);
167 return (0); 167 return (0);
168 } 168 }
169 169
@@ -177,7 +177,7 @@ SSL_clear(SSL *s)
177 s->internal->shutdown = 0; 177 s->internal->shutdown = 0;
178 178
179 if (s->internal->renegotiate) { 179 if (s->internal->renegotiate) {
180 SSLerr(SSL_F_SSL_CLEAR, ERR_R_INTERNAL_ERROR); 180 SSLerror(ERR_R_INTERNAL_ERROR);
181 return (0); 181 return (0);
182 } 182 }
183 183
@@ -226,7 +226,7 @@ SSL_CTX_set_ssl_version(SSL_CTX *ctx, const SSL_METHOD *meth)
226 sk = ssl_create_cipher_list(ctx->method, &(ctx->cipher_list), 226 sk = ssl_create_cipher_list(ctx->method, &(ctx->cipher_list),
227 &(ctx->internal->cipher_list_by_id), SSL_DEFAULT_CIPHER_LIST); 227 &(ctx->internal->cipher_list_by_id), SSL_DEFAULT_CIPHER_LIST);
228 if ((sk == NULL) || (sk_SSL_CIPHER_num(sk) <= 0)) { 228 if ((sk == NULL) || (sk_SSL_CIPHER_num(sk) <= 0)) {
229 SSLerr(SSL_F_SSL_CTX_SET_SSL_VERSION, 229 SSLerror(
230 SSL_R_SSL_LIBRARY_HAS_NO_CIPHERS); 230 SSL_R_SSL_LIBRARY_HAS_NO_CIPHERS);
231 return (0); 231 return (0);
232 } 232 }
@@ -239,21 +239,21 @@ SSL_new(SSL_CTX *ctx)
239 SSL *s; 239 SSL *s;
240 240
241 if (ctx == NULL) { 241 if (ctx == NULL) {
242 SSLerr(SSL_F_SSL_NEW, SSL_R_NULL_SSL_CTX); 242 SSLerror(SSL_R_NULL_SSL_CTX);
243 return (NULL); 243 return (NULL);
244 } 244 }
245 if (ctx->method == NULL) { 245 if (ctx->method == NULL) {
246 SSLerr(SSL_F_SSL_NEW, SSL_R_SSL_CTX_HAS_NO_DEFAULT_SSL_VERSION); 246 SSLerror(SSL_R_SSL_CTX_HAS_NO_DEFAULT_SSL_VERSION);
247 return (NULL); 247 return (NULL);
248 } 248 }
249 249
250 if ((s = calloc(1, sizeof(*s))) == NULL) { 250 if ((s = calloc(1, sizeof(*s))) == NULL) {
251 SSLerr(SSL_F_SSL_NEW, ERR_R_MALLOC_FAILURE); 251 SSLerror(ERR_R_MALLOC_FAILURE);
252 return (NULL); 252 return (NULL);
253 } 253 }
254 if ((s->internal = calloc(1, sizeof(*s->internal))) == NULL) { 254 if ((s->internal = calloc(1, sizeof(*s->internal))) == NULL) {
255 free(s); 255 free(s);
256 SSLerr(SSL_F_SSL_NEW, ERR_R_MALLOC_FAILURE); 256 SSLerror(ERR_R_MALLOC_FAILURE);
257 return (NULL); 257 return (NULL);
258 } 258 }
259 259
@@ -372,7 +372,7 @@ SSL_new(SSL_CTX *ctx)
372 372
373 err: 373 err:
374 SSL_free(s); 374 SSL_free(s);
375 SSLerr(SSL_F_SSL_NEW, ERR_R_MALLOC_FAILURE); 375 SSLerror(ERR_R_MALLOC_FAILURE);
376 return (NULL); 376 return (NULL);
377} 377}
378 378
@@ -381,7 +381,7 @@ SSL_CTX_set_session_id_context(SSL_CTX *ctx, const unsigned char *sid_ctx,
381 unsigned int sid_ctx_len) 381 unsigned int sid_ctx_len)
382{ 382{
383 if (sid_ctx_len > sizeof ctx->sid_ctx) { 383 if (sid_ctx_len > sizeof ctx->sid_ctx) {
384 SSLerr(SSL_F_SSL_CTX_SET_SESSION_ID_CONTEXT, 384 SSLerror(
385 SSL_R_SSL_SESSION_ID_CONTEXT_TOO_LONG); 385 SSL_R_SSL_SESSION_ID_CONTEXT_TOO_LONG);
386 return (0); 386 return (0);
387 } 387 }
@@ -396,7 +396,7 @@ SSL_set_session_id_context(SSL *ssl, const unsigned char *sid_ctx,
396 unsigned int sid_ctx_len) 396 unsigned int sid_ctx_len)
397{ 397{
398 if (sid_ctx_len > SSL_MAX_SID_CTX_LENGTH) { 398 if (sid_ctx_len > SSL_MAX_SID_CTX_LENGTH) {
399 SSLerr(SSL_F_SSL_SET_SESSION_ID_CONTEXT, 399 SSLerror(
400 SSL_R_SSL_SESSION_ID_CONTEXT_TOO_LONG); 400 SSL_R_SSL_SESSION_ID_CONTEXT_TOO_LONG);
401 return (0); 401 return (0);
402 } 402 }
@@ -634,7 +634,7 @@ SSL_set_fd(SSL *s, int fd)
634 bio = BIO_new(BIO_s_socket()); 634 bio = BIO_new(BIO_s_socket());
635 635
636 if (bio == NULL) { 636 if (bio == NULL) {
637 SSLerr(SSL_F_SSL_SET_FD, ERR_R_BUF_LIB); 637 SSLerror(ERR_R_BUF_LIB);
638 goto err; 638 goto err;
639 } 639 }
640 BIO_set_fd(bio, fd, BIO_NOCLOSE); 640 BIO_set_fd(bio, fd, BIO_NOCLOSE);
@@ -655,7 +655,7 @@ SSL_set_wfd(SSL *s, int fd)
655 bio = BIO_new(BIO_s_socket()); 655 bio = BIO_new(BIO_s_socket());
656 656
657 if (bio == NULL) { 657 if (bio == NULL) {
658 SSLerr(SSL_F_SSL_SET_WFD, ERR_R_BUF_LIB); 658 SSLerror(ERR_R_BUF_LIB);
659 goto err; 659 goto err;
660 } 660 }
661 BIO_set_fd(bio, fd, BIO_NOCLOSE); 661 BIO_set_fd(bio, fd, BIO_NOCLOSE);
@@ -678,7 +678,7 @@ SSL_set_rfd(SSL *s, int fd)
678 bio = BIO_new(BIO_s_socket()); 678 bio = BIO_new(BIO_s_socket());
679 679
680 if (bio == NULL) { 680 if (bio == NULL) {
681 SSLerr(SSL_F_SSL_SET_RFD, ERR_R_BUF_LIB); 681 SSLerror(ERR_R_BUF_LIB);
682 goto err; 682 goto err;
683 } 683 }
684 BIO_set_fd(bio, fd, BIO_NOCLOSE); 684 BIO_set_fd(bio, fd, BIO_NOCLOSE);
@@ -873,12 +873,12 @@ SSL_CTX_check_private_key(const SSL_CTX *ctx)
873{ 873{
874 if ((ctx == NULL) || (ctx->internal->cert == NULL) || 874 if ((ctx == NULL) || (ctx->internal->cert == NULL) ||
875 (ctx->internal->cert->key->x509 == NULL)) { 875 (ctx->internal->cert->key->x509 == NULL)) {
876 SSLerr(SSL_F_SSL_CTX_CHECK_PRIVATE_KEY, 876 SSLerror(
877 SSL_R_NO_CERTIFICATE_ASSIGNED); 877 SSL_R_NO_CERTIFICATE_ASSIGNED);
878 return (0); 878 return (0);
879 } 879 }
880 if (ctx->internal->cert->key->privatekey == NULL) { 880 if (ctx->internal->cert->key->privatekey == NULL) {
881 SSLerr(SSL_F_SSL_CTX_CHECK_PRIVATE_KEY, 881 SSLerror(
882 SSL_R_NO_PRIVATE_KEY_ASSIGNED); 882 SSL_R_NO_PRIVATE_KEY_ASSIGNED);
883 return (0); 883 return (0);
884 } 884 }
@@ -891,22 +891,22 @@ int
891SSL_check_private_key(const SSL *ssl) 891SSL_check_private_key(const SSL *ssl)
892{ 892{
893 if (ssl == NULL) { 893 if (ssl == NULL) {
894 SSLerr(SSL_F_SSL_CHECK_PRIVATE_KEY, 894 SSLerror(
895 ERR_R_PASSED_NULL_PARAMETER); 895 ERR_R_PASSED_NULL_PARAMETER);
896 return (0); 896 return (0);
897 } 897 }
898 if (ssl->cert == NULL) { 898 if (ssl->cert == NULL) {
899 SSLerr(SSL_F_SSL_CHECK_PRIVATE_KEY, 899 SSLerror(
900 SSL_R_NO_CERTIFICATE_ASSIGNED); 900 SSL_R_NO_CERTIFICATE_ASSIGNED);
901 return (0); 901 return (0);
902 } 902 }
903 if (ssl->cert->key->x509 == NULL) { 903 if (ssl->cert->key->x509 == NULL) {
904 SSLerr(SSL_F_SSL_CHECK_PRIVATE_KEY, 904 SSLerror(
905 SSL_R_NO_CERTIFICATE_ASSIGNED); 905 SSL_R_NO_CERTIFICATE_ASSIGNED);
906 return (0); 906 return (0);
907 } 907 }
908 if (ssl->cert->key->privatekey == NULL) { 908 if (ssl->cert->key->privatekey == NULL) {
909 SSLerr(SSL_F_SSL_CHECK_PRIVATE_KEY, 909 SSLerror(
910 SSL_R_NO_PRIVATE_KEY_ASSIGNED); 910 SSL_R_NO_PRIVATE_KEY_ASSIGNED);
911 return (0); 911 return (0);
912 } 912 }
@@ -942,7 +942,7 @@ int
942SSL_read(SSL *s, void *buf, int num) 942SSL_read(SSL *s, void *buf, int num)
943{ 943{
944 if (s->internal->handshake_func == NULL) { 944 if (s->internal->handshake_func == NULL) {
945 SSLerr(SSL_F_SSL_READ, SSL_R_UNINITIALIZED); 945 SSLerror(SSL_R_UNINITIALIZED);
946 return (-1); 946 return (-1);
947 } 947 }
948 948
@@ -957,7 +957,7 @@ int
957SSL_peek(SSL *s, void *buf, int num) 957SSL_peek(SSL *s, void *buf, int num)
958{ 958{
959 if (s->internal->handshake_func == NULL) { 959 if (s->internal->handshake_func == NULL) {
960 SSLerr(SSL_F_SSL_PEEK, SSL_R_UNINITIALIZED); 960 SSLerror(SSL_R_UNINITIALIZED);
961 return (-1); 961 return (-1);
962 } 962 }
963 963
@@ -971,13 +971,13 @@ int
971SSL_write(SSL *s, const void *buf, int num) 971SSL_write(SSL *s, const void *buf, int num)
972{ 972{
973 if (s->internal->handshake_func == NULL) { 973 if (s->internal->handshake_func == NULL) {
974 SSLerr(SSL_F_SSL_WRITE, SSL_R_UNINITIALIZED); 974 SSLerror(SSL_R_UNINITIALIZED);
975 return (-1); 975 return (-1);
976 } 976 }
977 977
978 if (s->internal->shutdown & SSL_SENT_SHUTDOWN) { 978 if (s->internal->shutdown & SSL_SENT_SHUTDOWN) {
979 s->internal->rwstate = SSL_NOTHING; 979 s->internal->rwstate = SSL_NOTHING;
980 SSLerr(SSL_F_SSL_WRITE, SSL_R_PROTOCOL_IS_SHUTDOWN); 980 SSLerror(SSL_R_PROTOCOL_IS_SHUTDOWN);
981 return (-1); 981 return (-1);
982 } 982 }
983 return (s->method->internal->ssl_write(s, buf, num)); 983 return (s->method->internal->ssl_write(s, buf, num));
@@ -994,7 +994,7 @@ SSL_shutdown(SSL *s)
994 */ 994 */
995 995
996 if (s->internal->handshake_func == NULL) { 996 if (s->internal->handshake_func == NULL) {
997 SSLerr(SSL_F_SSL_SHUTDOWN, SSL_R_UNINITIALIZED); 997 SSLerror(SSL_R_UNINITIALIZED);
998 return (-1); 998 return (-1);
999 } 999 }
1000 1000
@@ -1306,7 +1306,7 @@ SSL_CTX_set_cipher_list(SSL_CTX *ctx, const char *str)
1306 if (sk == NULL) 1306 if (sk == NULL)
1307 return (0); 1307 return (0);
1308 else if (sk_SSL_CIPHER_num(sk) == 0) { 1308 else if (sk_SSL_CIPHER_num(sk) == 0) {
1309 SSLerr(SSL_F_SSL_CTX_SET_CIPHER_LIST, SSL_R_NO_CIPHER_MATCH); 1309 SSLerror(SSL_R_NO_CIPHER_MATCH);
1310 return (0); 1310 return (0);
1311 } 1311 }
1312 return (1); 1312 return (1);
@@ -1324,7 +1324,7 @@ SSL_set_cipher_list(SSL *s, const char *str)
1324 if (sk == NULL) 1324 if (sk == NULL)
1325 return (0); 1325 return (0);
1326 else if (sk_SSL_CIPHER_num(sk) == 0) { 1326 else if (sk_SSL_CIPHER_num(sk) == 0) {
1327 SSLerr(SSL_F_SSL_SET_CIPHER_LIST, SSL_R_NO_CIPHER_MATCH); 1327 SSLerror(SSL_R_NO_CIPHER_MATCH);
1328 return (0); 1328 return (0);
1329 } 1329 }
1330 return (1); 1330 return (1);
@@ -1428,20 +1428,20 @@ ssl_bytes_to_cipher_list(SSL *s, const unsigned char *p, int num)
1428 * RFC 5246 section 7.4.1.2 defines the interval as [2,2^16-2]. 1428 * RFC 5246 section 7.4.1.2 defines the interval as [2,2^16-2].
1429 */ 1429 */
1430 if (num < 2 || num > 0x10000 - 2) { 1430 if (num < 2 || num > 0x10000 - 2) {
1431 SSLerr(SSL_F_SSL_BYTES_TO_CIPHER_LIST, 1431 SSLerror(
1432 SSL_R_ERROR_IN_RECEIVED_CIPHER_LIST); 1432 SSL_R_ERROR_IN_RECEIVED_CIPHER_LIST);
1433 return (NULL); 1433 return (NULL);
1434 } 1434 }
1435 1435
1436 if ((sk = sk_SSL_CIPHER_new_null()) == NULL) { 1436 if ((sk = sk_SSL_CIPHER_new_null()) == NULL) {
1437 SSLerr(SSL_F_SSL_BYTES_TO_CIPHER_LIST, ERR_R_MALLOC_FAILURE); 1437 SSLerror(ERR_R_MALLOC_FAILURE);
1438 goto err; 1438 goto err;
1439 } 1439 }
1440 1440
1441 CBS_init(&cbs, p, num); 1441 CBS_init(&cbs, p, num);
1442 while (CBS_len(&cbs) > 0) { 1442 while (CBS_len(&cbs) > 0) {
1443 if (!CBS_get_u16(&cbs, &cipher_value)) { 1443 if (!CBS_get_u16(&cbs, &cipher_value)) {
1444 SSLerr(SSL_F_SSL_BYTES_TO_CIPHER_LIST, 1444 SSLerror(
1445 SSL_R_ERROR_IN_RECEIVED_CIPHER_LIST); 1445 SSL_R_ERROR_IN_RECEIVED_CIPHER_LIST);
1446 goto err; 1446 goto err;
1447 } 1447 }
@@ -1454,7 +1454,7 @@ ssl_bytes_to_cipher_list(SSL *s, const unsigned char *p, int num)
1454 * renegotiating. 1454 * renegotiating.
1455 */ 1455 */
1456 if (s->internal->renegotiate) { 1456 if (s->internal->renegotiate) {
1457 SSLerr(SSL_F_SSL_BYTES_TO_CIPHER_LIST, 1457 SSLerror(
1458 SSL_R_SCSV_RECEIVED_WHEN_RENEGOTIATING); 1458 SSL_R_SCSV_RECEIVED_WHEN_RENEGOTIATING);
1459 ssl3_send_alert(s, SSL3_AL_FATAL, 1459 ssl3_send_alert(s, SSL3_AL_FATAL,
1460 SSL_AD_HANDSHAKE_FAILURE); 1460 SSL_AD_HANDSHAKE_FAILURE);
@@ -1474,7 +1474,7 @@ ssl_bytes_to_cipher_list(SSL *s, const unsigned char *p, int num)
1474 */ 1474 */
1475 max_version = ssl_max_server_version(s); 1475 max_version = ssl_max_server_version(s);
1476 if (max_version == 0 || s->version < max_version) { 1476 if (max_version == 0 || s->version < max_version) {
1477 SSLerr(SSL_F_SSL_BYTES_TO_CIPHER_LIST, 1477 SSLerror(
1478 SSL_R_INAPPROPRIATE_FALLBACK); 1478 SSL_R_INAPPROPRIATE_FALLBACK);
1479 if (s->s3 != NULL) 1479 if (s->s3 != NULL)
1480 ssl3_send_alert(s, SSL3_AL_FATAL, 1480 ssl3_send_alert(s, SSL3_AL_FATAL,
@@ -1486,7 +1486,7 @@ ssl_bytes_to_cipher_list(SSL *s, const unsigned char *p, int num)
1486 1486
1487 if ((c = ssl3_get_cipher_by_value(cipher_value)) != NULL) { 1487 if ((c = ssl3_get_cipher_by_value(cipher_value)) != NULL) {
1488 if (!sk_SSL_CIPHER_push(sk, c)) { 1488 if (!sk_SSL_CIPHER_push(sk, c)) {
1489 SSLerr(SSL_F_SSL_BYTES_TO_CIPHER_LIST, 1489 SSLerror(
1490 ERR_R_MALLOC_FAILURE); 1490 ERR_R_MALLOC_FAILURE);
1491 goto err; 1491 goto err;
1492 } 1492 }
@@ -1797,22 +1797,22 @@ SSL_CTX_new(const SSL_METHOD *meth)
1797 SSL_CTX *ret; 1797 SSL_CTX *ret;
1798 1798
1799 if (meth == NULL) { 1799 if (meth == NULL) {
1800 SSLerr(SSL_F_SSL_CTX_NEW, SSL_R_NULL_SSL_METHOD_PASSED); 1800 SSLerror(SSL_R_NULL_SSL_METHOD_PASSED);
1801 return (NULL); 1801 return (NULL);
1802 } 1802 }
1803 1803
1804 if ((ret = calloc(1, sizeof(*ret))) == NULL) { 1804 if ((ret = calloc(1, sizeof(*ret))) == NULL) {
1805 SSLerr(SSL_F_SSL_CTX_NEW, ERR_R_MALLOC_FAILURE); 1805 SSLerror(ERR_R_MALLOC_FAILURE);
1806 return (NULL); 1806 return (NULL);
1807 } 1807 }
1808 if ((ret->internal = calloc(1, sizeof(*ret->internal))) == NULL) { 1808 if ((ret->internal = calloc(1, sizeof(*ret->internal))) == NULL) {
1809 free(ret); 1809 free(ret);
1810 SSLerr(SSL_F_SSL_CTX_NEW, ERR_R_MALLOC_FAILURE); 1810 SSLerror(ERR_R_MALLOC_FAILURE);
1811 return (NULL); 1811 return (NULL);
1812 } 1812 }
1813 1813
1814 if (SSL_get_ex_data_X509_STORE_CTX_idx() < 0) { 1814 if (SSL_get_ex_data_X509_STORE_CTX_idx() < 0) {
1815 SSLerr(SSL_F_SSL_CTX_NEW, 1815 SSLerror(
1816 SSL_R_X509_VERIFICATION_SETUP_PROBLEMS); 1816 SSL_R_X509_VERIFICATION_SETUP_PROBLEMS);
1817 goto err; 1817 goto err;
1818 } 1818 }
@@ -1872,7 +1872,7 @@ SSL_CTX_new(const SSL_METHOD *meth)
1872 &ret->internal->cipher_list_by_id, SSL_DEFAULT_CIPHER_LIST); 1872 &ret->internal->cipher_list_by_id, SSL_DEFAULT_CIPHER_LIST);
1873 if (ret->cipher_list == NULL || 1873 if (ret->cipher_list == NULL ||
1874 sk_SSL_CIPHER_num(ret->cipher_list) <= 0) { 1874 sk_SSL_CIPHER_num(ret->cipher_list) <= 0) {
1875 SSLerr(SSL_F_SSL_CTX_NEW, SSL_R_LIBRARY_HAS_NO_CIPHERS); 1875 SSLerror(SSL_R_LIBRARY_HAS_NO_CIPHERS);
1876 goto err2; 1876 goto err2;
1877 } 1877 }
1878 1878
@@ -1881,12 +1881,12 @@ SSL_CTX_new(const SSL_METHOD *meth)
1881 goto err; 1881 goto err;
1882 1882
1883 if ((ret->internal->md5 = EVP_get_digestbyname("ssl3-md5")) == NULL) { 1883 if ((ret->internal->md5 = EVP_get_digestbyname("ssl3-md5")) == NULL) {
1884 SSLerr(SSL_F_SSL_CTX_NEW, 1884 SSLerror(
1885 SSL_R_UNABLE_TO_LOAD_SSL3_MD5_ROUTINES); 1885 SSL_R_UNABLE_TO_LOAD_SSL3_MD5_ROUTINES);
1886 goto err2; 1886 goto err2;
1887 } 1887 }
1888 if ((ret->internal->sha1 = EVP_get_digestbyname("ssl3-sha1")) == NULL) { 1888 if ((ret->internal->sha1 = EVP_get_digestbyname("ssl3-sha1")) == NULL) {
1889 SSLerr(SSL_F_SSL_CTX_NEW, 1889 SSLerror(
1890 SSL_R_UNABLE_TO_LOAD_SSL3_SHA1_ROUTINES); 1890 SSL_R_UNABLE_TO_LOAD_SSL3_SHA1_ROUTINES);
1891 goto err2; 1891 goto err2;
1892 } 1892 }
@@ -1942,7 +1942,7 @@ SSL_CTX_new(const SSL_METHOD *meth)
1942 1942
1943 return (ret); 1943 return (ret);
1944err: 1944err:
1945 SSLerr(SSL_F_SSL_CTX_NEW, ERR_R_MALLOC_FAILURE); 1945 SSLerror(ERR_R_MALLOC_FAILURE);
1946err2: 1946err2:
1947 SSL_CTX_free(ret); 1947 SSL_CTX_free(ret);
1948 return (NULL); 1948 return (NULL);
@@ -2126,7 +2126,7 @@ ssl_check_srvr_ecc_cert_and_alg(X509 *x, SSL *s)
2126 /* Key usage, if present, must allow signing. */ 2126 /* Key usage, if present, must allow signing. */
2127 if ((x->ex_flags & EXFLAG_KUSAGE) && 2127 if ((x->ex_flags & EXFLAG_KUSAGE) &&
2128 ((x->ex_kusage & X509v3_KU_DIGITAL_SIGNATURE) == 0)) { 2128 ((x->ex_kusage & X509v3_KU_DIGITAL_SIGNATURE) == 0)) {
2129 SSLerr(SSL_F_SSL_CHECK_SRVR_ECC_CERT_AND_ALG, 2129 SSLerror(
2130 SSL_R_ECC_CERT_NOT_FOR_SIGNING); 2130 SSL_R_ECC_CERT_NOT_FOR_SIGNING);
2131 return (0); 2131 return (0);
2132 } 2132 }
@@ -2159,7 +2159,7 @@ ssl_get_server_send_pkey(const SSL *s)
2159 } else if (alg_a & SSL_aGOST01) { 2159 } else if (alg_a & SSL_aGOST01) {
2160 i = SSL_PKEY_GOST01; 2160 i = SSL_PKEY_GOST01;
2161 } else { /* if (alg_a & SSL_aNULL) */ 2161 } else { /* if (alg_a & SSL_aNULL) */
2162 SSLerr(SSL_F_SSL_GET_SERVER_SEND_PKEY, ERR_R_INTERNAL_ERROR); 2162 SSLerror(ERR_R_INTERNAL_ERROR);
2163 return (NULL); 2163 return (NULL);
2164 } 2164 }
2165 2165
@@ -2199,7 +2199,7 @@ ssl_get_sign_pkey(SSL *s, const SSL_CIPHER *cipher, const EVP_MD **pmd)
2199 (c->pkeys[SSL_PKEY_ECC].privatekey != NULL)) 2199 (c->pkeys[SSL_PKEY_ECC].privatekey != NULL))
2200 idx = SSL_PKEY_ECC; 2200 idx = SSL_PKEY_ECC;
2201 if (idx == -1) { 2201 if (idx == -1) {
2202 SSLerr(SSL_F_SSL_GET_SIGN_PKEY, ERR_R_INTERNAL_ERROR); 2202 SSLerror(ERR_R_INTERNAL_ERROR);
2203 return (NULL); 2203 return (NULL);
2204 } 2204 }
2205 if (pmd) 2205 if (pmd)
@@ -2403,7 +2403,7 @@ SSL_do_handshake(SSL *s)
2403 int ret = 1; 2403 int ret = 1;
2404 2404
2405 if (s->internal->handshake_func == NULL) { 2405 if (s->internal->handshake_func == NULL) {
2406 SSLerr(SSL_F_SSL_DO_HANDSHAKE, SSL_R_CONNECTION_TYPE_NOT_SET); 2406 SSLerror(SSL_R_CONNECTION_TYPE_NOT_SET);
2407 return (-1); 2407 return (-1);
2408 } 2408 }
2409 2409
@@ -2448,7 +2448,7 @@ SSL_set_connect_state(SSL *s)
2448int 2448int
2449ssl_undefined_function(SSL *s) 2449ssl_undefined_function(SSL *s)
2450{ 2450{
2451 SSLerr(SSL_F_SSL_UNDEFINED_FUNCTION, 2451 SSLerror(
2452 ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED); 2452 ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
2453 return (0); 2453 return (0);
2454} 2454}
@@ -2456,7 +2456,7 @@ ssl_undefined_function(SSL *s)
2456int 2456int
2457ssl_undefined_void_function(void) 2457ssl_undefined_void_function(void)
2458{ 2458{
2459 SSLerr(SSL_F_SSL_UNDEFINED_VOID_FUNCTION, 2459 SSLerror(
2460 ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED); 2460 ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
2461 return (0); 2461 return (0);
2462} 2462}
@@ -2464,7 +2464,7 @@ ssl_undefined_void_function(void)
2464int 2464int
2465ssl_undefined_const_function(const SSL *s) 2465ssl_undefined_const_function(const SSL *s)
2466{ 2466{
2467 SSLerr(SSL_F_SSL_UNDEFINED_CONST_FUNCTION, 2467 SSLerror(
2468 ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED); 2468 ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
2469 return (0); 2469 return (0);
2470} 2470}
@@ -2700,7 +2700,7 @@ ssl_init_wbio_buffer(SSL *s, int push)
2700 (void)BIO_reset(bbio); 2700 (void)BIO_reset(bbio);
2701/* if (!BIO_set_write_buffer_size(bbio,16*1024)) */ 2701/* if (!BIO_set_write_buffer_size(bbio,16*1024)) */
2702 if (!BIO_set_read_buffer_size(bbio, 1)) { 2702 if (!BIO_set_read_buffer_size(bbio, 1)) {
2703 SSLerr(SSL_F_SSL_INIT_WBIO_BUFFER, ERR_R_BUF_LIB); 2703 SSLerror(ERR_R_BUF_LIB);
2704 return (0); 2704 return (0);
2705 } 2705 }
2706 if (push) { 2706 if (push) {