mirror of
https://github.com/wolfSSL/wolfssl.git
synced 2025-07-31 19:24:42 +02:00
add key mismatch error
This commit is contained in:
@@ -7101,6 +7101,11 @@ int wolfSSL_CTX_check_private_key(const WOLFSSL_CTX* ctx)
|
|||||||
#endif
|
#endif
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
|
/* placing error into error queue for Python port */
|
||||||
|
if (res != WOLFSSL_SUCCESS) {
|
||||||
|
WOLFSSL_ERROR(WC_KEY_MISMATCH_E);
|
||||||
|
}
|
||||||
|
|
||||||
return res;
|
return res;
|
||||||
}
|
}
|
||||||
#endif /* !NO_CHECK_PRIVATE_KEY */
|
#endif /* !NO_CHECK_PRIVATE_KEY */
|
||||||
|
@@ -645,6 +645,9 @@ const char* wc_GetErrorString(int error)
|
|||||||
case PBKDF2_KAT_FIPS_E:
|
case PBKDF2_KAT_FIPS_E:
|
||||||
return "wolfCrypt FIPS PBKDF2 Known Answer Test Failure";
|
return "wolfCrypt FIPS PBKDF2 Known Answer Test Failure";
|
||||||
|
|
||||||
|
case WC_KEY_MISMATCH_E:
|
||||||
|
return "key values mismatch";
|
||||||
|
|
||||||
case DEADLOCK_AVERTED_E:
|
case DEADLOCK_AVERTED_E:
|
||||||
return "Deadlock averted -- retry the call";
|
return "Deadlock averted -- retry the call";
|
||||||
|
|
||||||
|
@@ -1830,6 +1830,8 @@ typedef WOLFSSL_CONF_CTX SSL_CONF_CTX;
|
|||||||
#define SSL_CONF_cmd wolfSSL_CONF_cmd
|
#define SSL_CONF_cmd wolfSSL_CONF_cmd
|
||||||
#define SSL_CONF_cmd_value_type wolfSSL_CONF_cmd_value_type
|
#define SSL_CONF_cmd_value_type wolfSSL_CONF_cmd_value_type
|
||||||
|
|
||||||
|
#define SSL_OP_LEGACY_SERVER_CONNECT 0
|
||||||
|
|
||||||
#endif /* !OPENSSL_COEXIST && (OPENSSL_EXTRA || OPENSSL_EXTRA_X509_SMALL) */
|
#endif /* !OPENSSL_COEXIST && (OPENSSL_EXTRA || OPENSSL_EXTRA_X509_SMALL) */
|
||||||
|
|
||||||
|
|
||||||
|
@@ -214,6 +214,7 @@
|
|||||||
#define X509_V_ERR_EXTENSIONS_REQUIRE_VERSION_3 93
|
#define X509_V_ERR_EXTENSIONS_REQUIRE_VERSION_3 93
|
||||||
#define X509_V_ERR_EC_KEY_EXPLICIT_PARAMS 94
|
#define X509_V_ERR_EC_KEY_EXPLICIT_PARAMS 94
|
||||||
#define X509_R_CERT_ALREADY_IN_HASH_TABLE 101
|
#define X509_R_CERT_ALREADY_IN_HASH_TABLE 101
|
||||||
|
#define X509_R_KEY_VALUES_MISMATCH WC_KEY_MISMATCH_E
|
||||||
|
|
||||||
#define X509_EXTENSION_set_critical wolfSSL_X509_EXTENSION_set_critical
|
#define X509_EXTENSION_set_critical wolfSSL_X509_EXTENSION_set_critical
|
||||||
#define X509_EXTENSION_set_object wolfSSL_X509_EXTENSION_set_object
|
#define X509_EXTENSION_set_object wolfSSL_X509_EXTENSION_set_object
|
||||||
|
@@ -135,7 +135,8 @@ enum wolfCrypt_ErrorCodes {
|
|||||||
ED25519_KAT_FIPS_E = -163, /* Ed25519 Known answer test failure */
|
ED25519_KAT_FIPS_E = -163, /* Ed25519 Known answer test failure */
|
||||||
ED448_KAT_FIPS_E = -164, /* Ed448 Known answer test failure */
|
ED448_KAT_FIPS_E = -164, /* Ed448 Known answer test failure */
|
||||||
PBKDF2_KAT_FIPS_E = -165, /* PBKDF2 Known answer test failure */
|
PBKDF2_KAT_FIPS_E = -165, /* PBKDF2 Known answer test failure */
|
||||||
/* -166..-169 unused. */
|
WC_KEY_MISMATCH_E = -166, /* Error for private/public key mismatch */
|
||||||
|
/* -167..-169 unused. */
|
||||||
|
|
||||||
ECC_BAD_ARG_E = -170, /* ECC input argument of wrong type */
|
ECC_BAD_ARG_E = -170, /* ECC input argument of wrong type */
|
||||||
ASN_ECC_KEY_E = -171, /* ASN ECC bad input */
|
ASN_ECC_KEY_E = -171, /* ASN ECC bad input */
|
||||||
|
Reference in New Issue
Block a user