From 957b11334a7afb14537322f0e4795b2e368b3f59 Mon Sep 17 00:00:00 2001 From: beck <> Date: Sun, 29 Jan 2017 17:49:23 +0000 Subject: Send the function codes from the error functions to the bit bucket, as was done earlier in libssl. Thanks inoguchi@ for noticing libssl had more reacharounds into this. ok jsing@ inoguchi@ --- src/lib/libcrypto/evp/evp_aead.c | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) (limited to 'src/lib/libcrypto/evp/evp_aead.c') diff --git a/src/lib/libcrypto/evp/evp_aead.c b/src/lib/libcrypto/evp/evp_aead.c index 197b7f515f..40471b0022 100644 --- a/src/lib/libcrypto/evp/evp_aead.c +++ b/src/lib/libcrypto/evp/evp_aead.c @@ -1,4 +1,4 @@ -/* $OpenBSD: evp_aead.c,v 1.5 2014/06/21 15:30:36 jsing Exp $ */ +/* $OpenBSD: evp_aead.c,v 1.6 2017/01/29 17:49:23 beck Exp $ */ /* * Copyright (c) 2014, Google Inc. * @@ -53,7 +53,7 @@ EVP_AEAD_CTX_init(EVP_AEAD_CTX *ctx, const EVP_AEAD *aead, { ctx->aead = aead; if (key_len != aead->key_len) { - EVPerr(EVP_F_EVP_AEAD_CTX_INIT, EVP_R_UNSUPPORTED_KEY_SIZE); + EVPerror(EVP_R_UNSUPPORTED_KEY_SIZE); return 0; } return aead->init(ctx, key, key_len, tag_len); @@ -96,12 +96,12 @@ EVP_AEAD_CTX_seal(const EVP_AEAD_CTX *ctx, unsigned char *out, size_t *out_len, /* Overflow. */ if (possible_out_len < in_len) { - EVPerr(EVP_F_AEAD_CTX_SEAL, EVP_R_TOO_LARGE); + EVPerror(EVP_R_TOO_LARGE); goto error; } if (!check_alias(in, in_len, out)) { - EVPerr(EVP_F_AEAD_CTX_SEAL, EVP_R_OUTPUT_ALIASES_INPUT); + EVPerror(EVP_R_OUTPUT_ALIASES_INPUT); goto error; } @@ -125,7 +125,7 @@ EVP_AEAD_CTX_open(const EVP_AEAD_CTX *ctx, unsigned char *out, size_t *out_len, size_t ad_len) { if (!check_alias(in, in_len, out)) { - EVPerr(EVP_F_AEAD_CTX_OPEN, EVP_R_OUTPUT_ALIASES_INPUT); + EVPerror(EVP_R_OUTPUT_ALIASES_INPUT); goto error; } -- cgit v1.2.3-55-g6feb