summaryrefslogtreecommitdiff
path: root/src/lib/libtls/tls_verify.c
diff options
context:
space:
mode:
Diffstat (limited to 'src/lib/libtls/tls_verify.c')
-rw-r--r--src/lib/libtls/tls_verify.c8
1 files changed, 4 insertions, 4 deletions
diff --git a/src/lib/libtls/tls_verify.c b/src/lib/libtls/tls_verify.c
index 8ddc68a8f1..c603ca8f73 100644
--- a/src/lib/libtls/tls_verify.c
+++ b/src/lib/libtls/tls_verify.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: tls_verify.c,v 1.9 2015/08/27 07:15:39 jsing Exp $ */ 1/* $OpenBSD: tls_verify.c,v 1.10 2015/08/27 15:26:50 jsing Exp $ */
2/* 2/*
3 * Copyright (c) 2014 Jeremie Courreges-Anglas <jca@openbsd.org> 3 * Copyright (c) 2014 Jeremie Courreges-Anglas <jca@openbsd.org>
4 * 4 *
@@ -125,7 +125,7 @@ tls_check_subject_altname(struct tls *ctx, X509 *cert, const char *name)
125 len = ASN1_STRING_length(altname->d.dNSName); 125 len = ASN1_STRING_length(altname->d.dNSName);
126 126
127 if (len < 0 || len != strlen(data)) { 127 if (len < 0 || len != strlen(data)) {
128 tls_set_error(ctx, 128 tls_set_errorx(ctx,
129 "error verifying name '%s': " 129 "error verifying name '%s': "
130 "NUL byte in subjectAltName, " 130 "NUL byte in subjectAltName, "
131 "probably a malicious certificate", 131 "probably a malicious certificate",
@@ -168,7 +168,7 @@ tls_check_subject_altname(struct tls *ctx, X509 *cert, const char *name)
168 data = ASN1_STRING_data(altname->d.iPAddress); 168 data = ASN1_STRING_data(altname->d.iPAddress);
169 169
170 if (datalen < 0) { 170 if (datalen < 0) {
171 tls_set_error(ctx, 171 tls_set_errorx(ctx,
172 "Unexpected negative length for an " 172 "Unexpected negative length for an "
173 "IP address: %d", datalen); 173 "IP address: %d", datalen);
174 rv = -2; 174 rv = -2;
@@ -218,7 +218,7 @@ tls_check_common_name(struct tls *ctx, X509 *cert, const char *name)
218 218
219 /* NUL bytes in CN? */ 219 /* NUL bytes in CN? */
220 if (common_name_len != strlen(common_name)) { 220 if (common_name_len != strlen(common_name)) {
221 tls_set_error(ctx, "error verifying name '%s': " 221 tls_set_errorx(ctx, "error verifying name '%s': "
222 "NUL byte in Common Name field, " 222 "NUL byte in Common Name field, "
223 "probably a malicious certificate", name); 223 "probably a malicious certificate", name);
224 rv = -2; 224 rv = -2;