diff options
Diffstat (limited to 'src/lib/libtls/tls_verify.c')
-rw-r--r-- | src/lib/libtls/tls_verify.c | 8 |
1 files changed, 4 insertions, 4 deletions
diff --git a/src/lib/libtls/tls_verify.c b/src/lib/libtls/tls_verify.c index 8ddc68a8f1..c603ca8f73 100644 --- a/src/lib/libtls/tls_verify.c +++ b/src/lib/libtls/tls_verify.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: tls_verify.c,v 1.9 2015/08/27 07:15:39 jsing Exp $ */ | 1 | /* $OpenBSD: tls_verify.c,v 1.10 2015/08/27 15:26:50 jsing Exp $ */ |
2 | /* | 2 | /* |
3 | * Copyright (c) 2014 Jeremie Courreges-Anglas <jca@openbsd.org> | 3 | * Copyright (c) 2014 Jeremie Courreges-Anglas <jca@openbsd.org> |
4 | * | 4 | * |
@@ -125,7 +125,7 @@ tls_check_subject_altname(struct tls *ctx, X509 *cert, const char *name) | |||
125 | len = ASN1_STRING_length(altname->d.dNSName); | 125 | len = ASN1_STRING_length(altname->d.dNSName); |
126 | 126 | ||
127 | if (len < 0 || len != strlen(data)) { | 127 | if (len < 0 || len != strlen(data)) { |
128 | tls_set_error(ctx, | 128 | tls_set_errorx(ctx, |
129 | "error verifying name '%s': " | 129 | "error verifying name '%s': " |
130 | "NUL byte in subjectAltName, " | 130 | "NUL byte in subjectAltName, " |
131 | "probably a malicious certificate", | 131 | "probably a malicious certificate", |
@@ -168,7 +168,7 @@ tls_check_subject_altname(struct tls *ctx, X509 *cert, const char *name) | |||
168 | data = ASN1_STRING_data(altname->d.iPAddress); | 168 | data = ASN1_STRING_data(altname->d.iPAddress); |
169 | 169 | ||
170 | if (datalen < 0) { | 170 | if (datalen < 0) { |
171 | tls_set_error(ctx, | 171 | tls_set_errorx(ctx, |
172 | "Unexpected negative length for an " | 172 | "Unexpected negative length for an " |
173 | "IP address: %d", datalen); | 173 | "IP address: %d", datalen); |
174 | rv = -2; | 174 | rv = -2; |
@@ -218,7 +218,7 @@ tls_check_common_name(struct tls *ctx, X509 *cert, const char *name) | |||
218 | 218 | ||
219 | /* NUL bytes in CN? */ | 219 | /* NUL bytes in CN? */ |
220 | if (common_name_len != strlen(common_name)) { | 220 | if (common_name_len != strlen(common_name)) { |
221 | tls_set_error(ctx, "error verifying name '%s': " | 221 | tls_set_errorx(ctx, "error verifying name '%s': " |
222 | "NUL byte in Common Name field, " | 222 | "NUL byte in Common Name field, " |
223 | "probably a malicious certificate", name); | 223 | "probably a malicious certificate", name); |
224 | rv = -2; | 224 | rv = -2; |