i2a_ASN1_OBJECT(bio_err, bag->type);
BIO_printf(bio_err, "\n");
return 1;
- break;
}
return 1;
}
ASN1err(ASN1_F_PARSE_TAGGING, ASN1_R_INVALID_MODIFIER);
ERR_add_error_data(2, "Char=", erch);
return 0;
- break;
}
} else
default:
ASN1err(ASN1_F_ASN1_STR2TYPE, ASN1_R_UNSUPPORTED_TYPE);
goto bad_str;
- break;
}
atmp->type = utype;
case NID_id_GostR3411_94:
BIO_puts(out, "gostr3411-94");
goto err;
- break;
default:
if (have_unknown)
BIO_clear_retry_flags(b);
return 0;
}
- break;
default:
if (!b->next_bio)
}
return asn1_d2i_ex_primitive(pval, in, len, it,
tag, aclass, opt, ctx);
- break;
case ASN1_ITYPE_MSTRING:
p = *in;
return asn1_template_ex_i2d(pval, out, it->templates,
tag, aclass);
return asn1_i2d_ex_primitive(pval, out, it, tag, aclass);
- break;
case ASN1_ITYPE_MSTRING:
return asn1_i2d_ex_primitive(pval, out, it, -1, aclass);
case V_ASN1_BIT_STRING:
return i2c_ASN1_BIT_STRING((ASN1_BIT_STRING *)*pval,
cout ? &cout : NULL);
- break;
case V_ASN1_INTEGER:
case V_ASN1_NEG_INTEGER:
* These are all have the same content format as ASN1_INTEGER
*/
return i2c_ASN1_INTEGER((ASN1_INTEGER *)*pval, cout ? &cout : NULL);
- break;
case V_ASN1_OCTET_STRING:
case V_ASN1_NUMERICSTRING:
printf("ERROR: %d\n", ret);
# endif
EXIT(ret);
- return (0);
}
static int print_test_data(void)
break;
case BIO_CTRL_DGRAM_GET_MTU:
return data->mtu;
- break;
case BIO_CTRL_DGRAM_SET_MTU:
data->mtu = num;
ret = num;
ERR_load_crypto_strings();
ERR_print_errors_fp(stderr);
EXIT(1);
- return (1);
}
int test_add(BIO *bp)
printf("ERROR\n");
#endif
EXIT(1);
- return (1);
}
# endif
EXIT(err);
- return (err);
}
#endif
case CMS_RECIPINFO_KEK:
return cms_RecipientInfo_kekri_encrypt(cms, ri);
- break;
case CMS_RECIPINFO_PASS:
return cms_RecipientInfo_pwri_crypt(cms, ri, 1);
- break;
default:
CMSerr(CMS_F_CMS_RECIPIENTINFO_ENCRYPT,
printf("ERROR: %d\n", ret);
# endif
EXIT(ret);
- return (ret);
}
static int cb(int p, int n, BN_GENCB *arg)
printf("ERROR\n");
# endif
EXIT(!ret);
- return (0);
}
static int dsa_cb(int p, int n, BN_GENCB *arg)
ERR_remove_thread_state(NULL);
CRYPTO_mem_leaks_fp(stderr);
EXIT(ret);
- return (ret);
}
# if 0
default:
return 0;
- break;
}
}
case PKCS8_OK:
p8->broken = PKCS8_OK;
return p8;
- break;
case PKCS8_NO_OCTET:
p8->broken = PKCS8_NO_OCTET;
p8->pkey->type = V_ASN1_SEQUENCE;
return p8;
- break;
default:
EVPerr(EVP_F_PKCS8_SET_BROKEN, EVP_R_PKCS8_UNKNOWN_BROKEN_TYPE);
static int test1_exit(int ec)
{
EXIT(ec);
- return (0); /* To keep some compilers quiet */
}
/* Test copying of contexts */
}
# endif /* OPENSSL_NO_MD5 */
EXIT(err);
- return (0);
}
# ifndef OPENSSL_NO_MD5
printf("ERROR: %d\n", err);
# endif
EXIT(err);
- return (err);
}
static int cfb64_test(unsigned char *cfb_cipher)
P++;
}
EXIT(err);
- return (0);
}
static char *pt(unsigned char *md)
printf("ERROR: %d\n", err);
# endif
EXIT(err);
- return (0);
}
static char *pt(unsigned char *md)
printf("ERROR: %d\n", ret);
# endif
EXIT(ret);
- return (ret);
}
#endif
rctx->state = OHS_DONE;
return 1;
- break;
-
case OHS_DONE:
return 1;
case NID_safeContentsBag:
return parse_bags(bag->value.safes, pass, passlen, pkey, ocerts);
- break;
default:
return 1;
- break;
}
return 1;
}
printf("ERROR: %d\n", err);
#endif
EXIT(err);
- return (err);
}
printf("ERROR: %d\n", err);
# endif
EXIT(err);
- return (err);
}
#endif
printf("ERROR: %d\n", err);
# endif
EXIT(err);
- return (0);
}
#endif
P++;
}
EXIT(err);
- return (0);
}
static char *pt(unsigned char *md)
}
}
- return 1;
+ /* Unreachable */
}
if (!dsa->priv_key)
return NULL;
return dsa->priv_key;
- break;
}
case NID_id_GostR3410_2001:
{
if (!(priv = EC_KEY_get0_private_key(ec)))
return NULL;
return (BIGNUM *)priv;
- break;
}
}
return NULL;
pctx->md = (EVP_MD *)p2;
return 1;
}
- break;
case EVP_PKEY_CTRL_GET_MD:
*(const EVP_MD **)p2 = pctx->md;
break;
default:
return 0;
- break;
}
} else if ((strlen(value) == 2)
&& (toupper((unsigned char)value[0]) == 'X')) {
break;
default:
return 0;
- break;
}
} else {
R3410_params *p = R3410_paramset;
break;
default:
return 0;
- break;
}
} else if ((strlen(value) == 2)
&& (toupper((unsigned char)value[0]) == 'X')) {
break;
default:
return 0;
- break;
}
} else {
R3410_2001_params *p = R3410_2001_paramset;
data->md = (EVP_MD *)p2;
return 1;
}
- break;
case EVP_PKEY_CTRL_GET_MD:
*(const EVP_MD **)p2 = data->md;
SSLerr(SSL_F_SSL3_CTRL, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
return (ret);
}
- break;
#endif
#ifndef OPENSSL_NO_DH
case SSL_CTRL_SET_TMP_DH:
SSLerr(SSL_F_SSL3_CTRL, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
return (ret);
}
- break;
case SSL_CTRL_SET_DH_AUTO:
s->cert->dh_tmp_auto = larg;
return 1;
SSLerr(SSL_F_SSL3_CTRL, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
return (ret);
}
- break;
#endif /* !OPENSSL_NO_ECDH */
#ifndef OPENSSL_NO_TLSEXT
case SSL_CTRL_SET_TLSEXT_HOSTNAME:
SSLerr(SSL_F_SSL3_CTX_CTRL, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
return (0);
}
- break;
#endif
#ifndef OPENSSL_NO_DH
case SSL_CTRL_SET_TMP_DH:
SSLerr(SSL_F_SSL3_CTX_CTRL, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
return (0);
}
- break;
case SSL_CTRL_SET_DH_AUTO:
ctx->cert->dh_tmp_auto = larg;
return 1;
SSLerr(SSL_F_SSL3_CTX_CTRL, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
return (0);
}
- break;
#endif /* !OPENSSL_NO_ECDH */
#ifndef OPENSSL_NO_TLSEXT
case SSL_CTRL_SET_TLSEXT_SERVERNAME_ARG:
case SSL_CTRL_SET_TLSEXT_STATUS_REQ_CB_ARG:
ctx->tlsext_status_arg = parg;
return 1;
- break;
# ifndef OPENSSL_NO_SRP
case SSL_CTRL_SET_TLS_EXT_SRP_USERNAME:
serverinfo += len;
serverinfo_length -= len;
}
- return 0; /* Error */
+ /* Unreachable */
}
static int serverinfo_srv_parse_cb(SSL *s, unsigned int ext_type,
if (bio_err != NULL)
BIO_free(bio_err);
EXIT(ret);
- return ret;
}
int doit_biopair(SSL *s_ssl, SSL *c_ssl, long count,