diff options
author | Nikos Mavrogiannopoulos <nmav@gnutls.org> | 2002-11-03 11:19:15 +0000 |
---|---|---|
committer | Nikos Mavrogiannopoulos <nmav@gnutls.org> | 2002-11-03 11:19:15 +0000 |
commit | 3474b08412abfdfc5970ef93a292428b15045faf (patch) | |
tree | 3cdc1398d83f12cebaec2aa48f8e103fd35d52a1 /lib/gnutls_pk.c | |
parent | 7a42636a60a6d2386f19d688b361147f4a99ddf2 (diff) | |
download | gnutls-3474b08412abfdfc5970ef93a292428b15045faf.tar.gz |
Added some new error codes and updated client.
Diffstat (limited to 'lib/gnutls_pk.c')
-rw-r--r-- | lib/gnutls_pk.c | 12 |
1 files changed, 6 insertions, 6 deletions
diff --git a/lib/gnutls_pk.c b/lib/gnutls_pk.c index 4c0110a0cd..3416ce8c6a 100644 --- a/lib/gnutls_pk.c +++ b/lib/gnutls_pk.c @@ -294,13 +294,13 @@ int _gnutls_rsa_verify( const gnutls_datum* vdata, const gnutls_datum *ciphertex if (plain.size != vdata->size) { gnutls_assert(); gnutls_sfree_datum( &plain); - return GNUTLS_E_PK_SIGNATURE_FAILED; + return GNUTLS_E_PK_SIG_VERIFY_FAILED; } if ( memcmp(plain.data, vdata->data, plain.size)!=0) { gnutls_assert(); gnutls_sfree_datum( &plain); - return GNUTLS_E_PK_SIGNATURE_FAILED; + return GNUTLS_E_PK_SIG_VERIFY_FAILED; } gnutls_sfree_datum( &plain); @@ -386,7 +386,7 @@ int _gnutls_dsa_sign(gnutls_datum * signature, const gnutls_datum *hash, k = hash->size; if (k!=20) { /* SHA only */ gnutls_assert(); - return GNUTLS_E_PK_SIGNATURE_FAILED; + return GNUTLS_E_PK_SIGN_FAILED; } if (_gnutls_mpi_scan(&mdata, hash->data, &k) != 0) { @@ -470,7 +470,7 @@ int _gnutls_dsa_verify( const gnutls_datum* vdata, const gnutls_datum *sig_value if (vdata->size != 20) { /* sha-1 only */ gnutls_assert(); - return GNUTLS_E_INTERNAL_ERROR; + return GNUTLS_E_PK_SIG_VERIFY_FAILED; } if (decode_ber_rs( sig_value, &rs[0], &rs[1])!=0) { @@ -673,7 +673,7 @@ int _gnutls_pk_sign(int algo, GNUTLS_MPI* data, GNUTLS_MPI hash, GNUTLS_MPI * pk if (rc != 0) { gnutls_assert(); - return GNUTLS_E_PK_SIGNATURE_FAILED; + return GNUTLS_E_PK_SIGN_FAILED; } else { GCRY_SEXP list; @@ -787,7 +787,7 @@ static int _gnutls_pk_verify(int algo, GNUTLS_MPI hash, GNUTLS_MPI* data, GNUTLS if (rc != 0) { gnutls_assert(); - return GNUTLS_E_PK_SIGNATURE_FAILED; + return GNUTLS_E_PK_SIG_VERIFY_FAILED; } return 0; |