Changes between 1.1.1 and 3.0.0 [xx XXX xxxx]
+ *) Added a new FUNCerr() macro that takes a function name.
+ The macro SYSerr() is deprecated.
+ [Rich Salz]
+
*) {CRYPTO,OPENSSL}_mem_debug_{push,pop} are now no-ops and have been
deprecated.
[Rich Salz]
*) Support SM2 signing and verification schemes with X509 certificate.
[Paul Yang]
- *) The macro SYSerr() was changed to take a function name, not
- a numeric value; the SYS_F_xxx defines were removed.
- [Rich Salz]
-
*) Use SHA256 as the default digest for TS query in the ts app.
[Tomas Mraz]
#ifndef OPENSSL_NO_POSIX_IO
BIO_get_fp(in, &dbfp);
if (fstat(fileno(dbfp), &dbst) == -1) {
- SYSerr("fstat", errno);
+ FUNCerr("fstat", errno);
ERR_add_error_data(1, dbfile);
ERR_print_errors(bio_err);
goto err;
flags)) != 0) {
# ifdef EAI_SYSTEM
if (ret == EAI_SYSTEM) {
- SYSerr("getnameinfo", get_last_socket_error());
+ FUNCerr("getnameinfo", get_last_socket_error());
BIOerr(BIO_F_ADDR_STRINGS, ERR_R_SYS_LIB);
} else
# endif
switch ((gai_ret = getaddrinfo(host, service, &hints, res))) {
# ifdef EAI_SYSTEM
case EAI_SYSTEM:
- SYSerr("getaddrinfo", get_last_socket_error());
+ FUNCerr("getaddrinfo", get_last_socket_error());
BIOerr(BIO_F_BIO_LOOKUP_EX, ERR_R_SYS_LIB);
break;
# endif
*/
# if defined(OPENSSL_SYS_VXWORKS)
/* h_errno doesn't exist on VxWorks */
- SYSerr("gethostbyname", 1000 );
+ FUNCerr("gethostbyname", 1000 );
# else
- SYSerr("gethostbyname", 1000 + h_errno);
+ FUNCerr("gethostbyname", 1000 + h_errno);
# endif
#else
- SYSerr("gethostbyname", get_last_socket_error());
+ FUNCerr("gethostbyname", get_last_socket_error());
#endif
ret = 0;
goto err;
se = getservbyname(service, proto);
if (se == NULL) {
- SYSerr("getservbyname", get_last_socket_error());
+ FUNCerr("getservbyname", get_last_socket_error());
goto err;
}
} else {
* probed at run-time with DSO_global_lookup.
*/
if (WSAStartup(0x0202, &wsa_state) != 0) {
- SYSerr("wsastartup", get_last_socket_error());
+ FUNCerr("wsastartup", get_last_socket_error());
BIOerr(BIO_F_BIO_SOCK_INIT, BIO_R_WSASTARTUP);
return -1;
}
i = ioctlsocket(fd, type, ARG);
# endif /* __DJGPP__ */
if (i < 0)
- SYSerr("ioctlsocket", get_last_socket_error());
+ FUNCerr("ioctlsocket", get_last_socket_error());
return i;
}
ret = -2;
goto end;
}
- SYSerr("accept", get_last_socket_error());
+ FUNCerr("accept", get_last_socket_error());
BIOerr(BIO_F_BIO_ACCEPT, BIO_R_ACCEPT_ERROR);
goto end;
}
l = fcntl(s, F_GETFL, 0);
if (l == -1) {
- SYSerr("fcntl", get_last_sys_error());
+ FUNCerr("fcntl", get_last_sys_error());
ret = -1;
} else {
# if defined(O_NONBLOCK)
ret = fcntl(s, F_SETFL, l);
if (ret < 0) {
- SYSerr("fcntl", get_last_sys_error());
+ FUNCerr("fcntl", get_last_sys_error());
}
}
# else
ret = getsockname(sock, BIO_ADDR_sockaddr_noconst(info->addr),
&addr_len);
if (ret == -1) {
- SYSerr("getsockname", get_last_socket_error());
+ FUNCerr("getsockname", get_last_socket_error());
BIOerr(BIO_F_BIO_SOCK_INFO, BIO_R_GETSOCKNAME_ERROR);
return 0;
}
sock = socket(domain, socktype, protocol);
if (sock == -1) {
- SYSerr("socket", get_last_socket_error());
+ FUNCerr("socket", get_last_socket_error());
BIOerr(BIO_F_BIO_SOCKET, BIO_R_UNABLE_TO_CREATE_SOCKET);
return INVALID_SOCKET;
}
if (options & BIO_SOCK_KEEPALIVE) {
if (setsockopt(sock, SOL_SOCKET, SO_KEEPALIVE,
(const void *)&on, sizeof(on)) != 0) {
- SYSerr("setsockopt", get_last_socket_error());
+ FUNCerr("setsockopt", get_last_socket_error());
BIOerr(BIO_F_BIO_CONNECT, BIO_R_UNABLE_TO_KEEPALIVE);
return 0;
}
if (options & BIO_SOCK_NODELAY) {
if (setsockopt(sock, IPPROTO_TCP, TCP_NODELAY,
(const void *)&on, sizeof(on)) != 0) {
- SYSerr("setsockopt", get_last_socket_error());
+ FUNCerr("setsockopt", get_last_socket_error());
BIOerr(BIO_F_BIO_CONNECT, BIO_R_UNABLE_TO_NODELAY);
return 0;
}
if (connect(sock, BIO_ADDR_sockaddr(addr),
BIO_ADDR_sockaddr_size(addr)) == -1) {
if (!BIO_sock_should_retry(-1)) {
- SYSerr("connect", get_last_socket_error());
+ FUNCerr("connect", get_last_socket_error());
BIOerr(BIO_F_BIO_CONNECT, BIO_R_CONNECT_ERROR);
}
return 0;
if (options & BIO_SOCK_REUSEADDR) {
if (setsockopt(sock, SOL_SOCKET, SO_REUSEADDR,
(const void *)&on, sizeof(on)) != 0) {
- SYSerr("setsockopt", get_last_socket_error());
+ FUNCerr("setsockopt", get_last_socket_error());
BIOerr(BIO_F_BIO_BIND, BIO_R_UNABLE_TO_REUSEADDR);
return 0;
}
# endif
if (bind(sock, BIO_ADDR_sockaddr(addr), BIO_ADDR_sockaddr_size(addr)) != 0) {
- SYSerr("bind", get_last_socket_error());
+ FUNCerr("bind", get_last_socket_error());
BIOerr(BIO_F_BIO_BIND, BIO_R_UNABLE_TO_BIND_SOCKET);
return 0;
}
if (getsockopt(sock, SOL_SOCKET, SO_TYPE,
(void *)&socktype, &socktype_len) != 0
|| socktype_len != sizeof(socktype)) {
- SYSerr("getsockopt", get_last_socket_error());
+ FUNCerr("getsockopt", get_last_socket_error());
BIOerr(BIO_F_BIO_LISTEN, BIO_R_GETTING_SOCKTYPE);
return 0;
}
if (options & BIO_SOCK_KEEPALIVE) {
if (setsockopt(sock, SOL_SOCKET, SO_KEEPALIVE,
(const void *)&on, sizeof(on)) != 0) {
- SYSerr("setsockopt", get_last_socket_error());
+ FUNCerr("setsockopt", get_last_socket_error());
BIOerr(BIO_F_BIO_LISTEN, BIO_R_UNABLE_TO_KEEPALIVE);
return 0;
}
if (options & BIO_SOCK_NODELAY) {
if (setsockopt(sock, IPPROTO_TCP, TCP_NODELAY,
(const void *)&on, sizeof(on)) != 0) {
- SYSerr("setsockopt", get_last_socket_error());
+ FUNCerr("setsockopt", get_last_socket_error());
BIOerr(BIO_F_BIO_LISTEN, BIO_R_UNABLE_TO_NODELAY);
return 0;
}
on = options & BIO_SOCK_V6_ONLY ? 1 : 0;
if (setsockopt(sock, IPPROTO_IPV6, IPV6_V6ONLY,
(const void *)&on, sizeof(on)) != 0) {
- SYSerr("setsockopt", get_last_socket_error());
+ FUNCerr("setsockopt", get_last_socket_error());
BIOerr(BIO_F_BIO_LISTEN, BIO_R_LISTEN_V6_ONLY);
return 0;
}
return 0;
if (socktype != SOCK_DGRAM && listen(sock, MAX_LISTEN) == -1) {
- SYSerr("listen", get_last_socket_error());
+ FUNCerr("listen", get_last_socket_error());
BIOerr(BIO_F_BIO_LISTEN, BIO_R_UNABLE_TO_LISTEN_SOCKET);
return 0;
}
BIO_ADDR_sockaddr_noconst(addr), &len);
if (accepted_sock == -1) {
if (!BIO_sock_should_retry(accepted_sock)) {
- SYSerr("accept", get_last_socket_error());
+ FUNCerr("accept", get_last_socket_error());
BIOerr(BIO_F_BIO_ACCEPT_EX, BIO_R_ACCEPT_ERROR);
}
return INVALID_SOCKET;
BIO_ADDRINFO_socktype(c->addr_iter),
BIO_ADDRINFO_protocol(c->addr_iter), 0);
if (ret == (int)INVALID_SOCKET) {
- SYSerr("socket", get_last_socket_error());
+ FUNCerr("socket", get_last_socket_error());
ERR_add_error_data(4,
"hostname=", c->param_addr,
" service=", c->param_serv);
BIO_ADDRINFO_socktype(c->addr_iter),
BIO_ADDRINFO_protocol(c->addr_iter), 0);
if (ret == (int)INVALID_SOCKET) {
- SYSerr("socket", get_last_socket_error());
+ FUNCerr("socket", get_last_socket_error());
ERR_add_error_data(4,
"hostname=", c->param_hostname,
" service=", c->param_service);
ERR_clear_error();
break;
} else {
- SYSerr("connect", get_last_socket_error());
+ FUNCerr("connect", get_last_socket_error());
ERR_add_error_data(4,
"hostname=", c->param_hostname,
" service=", c->param_service);
i = BIO_sock_error(b->num);
if (i) {
BIO_clear_retry_flags(b);
- SYSerr("connect", i);
+ FUNCerr("connect", i);
ERR_add_error_data(4,
"hostname=", c->param_hostname,
" service=", c->param_service);
fp_flags |= BIO_FP_TEXT;
if (file == NULL) {
- SYSerr("fopen", get_last_sys_error());
+ FUNCerr("fopen", get_last_sys_error());
ERR_add_error_data(5, "fopen('", filename, "','", mode, "')");
if (errno == ENOENT
# ifdef ENXIO
if (ret == 0
&& (b->flags & BIO_FLAGS_UPLINK_INTERNAL
? UP_ferror((FILE *)b->ptr) : ferror((FILE *)b->ptr))) {
- SYSerr("fread", get_last_sys_error());
+ FUNCerr("fread", get_last_sys_error());
BIOerr(BIO_F_FILE_READ, ERR_R_SYS_LIB);
ret = -1;
}
# endif
fp = openssl_fopen(ptr, p);
if (fp == NULL) {
- SYSerr("fopen", get_last_sys_error());
+ FUNCerr("fopen", get_last_sys_error());
ERR_add_error_data(5, "fopen('", ptr, "','", p, "')");
BIOerr(BIO_F_FILE_CTRL, ERR_R_SYS_LIB);
ret = 0;
st = b->flags & BIO_FLAGS_UPLINK_INTERNAL
? UP_fflush(b->ptr) : fflush((FILE *)b->ptr);
if (st == EOF) {
- SYSerr("fflush", get_last_sys_error());
+ FUNCerr("fflush", get_last_sys_error());
ERR_add_error_data(1, "fflush()");
BIOerr(BIO_F_FILE_CTRL, ERR_R_SYS_LIB);
ret = 0;
BIO *next;
if (stat(include, &st) < 0) {
- SYSerr("stat", errno);
+ FUNCerr("stat", errno);
ERR_add_error_data(1, include);
/* missing include file is not fatal error */
return NULL;
# The INPUT HEADER is scanned for declarations
# LIBNAME INPUT HEADER ERROR-TABLE FILE
L ERR NONE NONE
+L FUNC NONE NONE
L BN include/openssl/bn.h crypto/bn/bn_err.c
L RSA include/openssl/rsa.h crypto/rsa/rsa_err.c
L DH include/openssl/dh.h crypto/dh/dh_err.c
}
if (stat(path_data[i].path, &st) < 0) {
- SYSerr("stat", errno);
+ FUNCerr("stat", errno);
ERR_add_error_data(1, path_data[i].path);
} else {
path = path_data[i].path;
static int clean_devcrypto_session(struct session_op *sess) {
if (ioctl(cfd, CIOCFSESSION, &sess->ses) < 0) {
- SYSerr("ioctl", errno);
+ FUNCerr("ioctl", errno);
return 0;
}
memset(sess, 0, sizeof(struct session_op));
cipher_ctx->mode = cipher_d->flags & EVP_CIPH_MODE;
cipher_ctx->blocksize = cipher_d->blocksize;
if (ioctl(cfd, CIOCGSESSION, &cipher_ctx->sess) < 0) {
- SYSerr("ioctl", errno);
+ FUNCerr("ioctl", errno);
return 0;
}
#endif
if (ioctl(cfd, CIOCCRYPT, &cryp) < 0) {
- SYSerr("ioctl", errno);
+ FUNCerr("ioctl", errno);
return 0;
}
memset(&digest_ctx->sess, 0, sizeof(digest_ctx->sess));
digest_ctx->sess.mac = digest_d->devcryptoid;
if (ioctl(cfd, CIOCGSESSION, &digest_ctx->sess) < 0) {
- SYSerr("ioctl", errno);
+ FUNCerr("ioctl", errno);
return 0;
}
return 1;
return 1;
}
- SYSerr("ioctl", errno);
+ FUNCerr("ioctl", errno);
return 0;
}
if (EVP_MD_CTX_test_flags(ctx, EVP_MD_CTX_FLAG_ONESHOT)) {
memcpy(md, digest_ctx->digest_res, EVP_MD_CTX_size(ctx));
} else if (digest_op(digest_ctx, NULL, 0, md, COP_FLAG_FINAL) < 0) {
- SYSerr("ioctl", errno);
+ FUNCerr("ioctl", errno);
return 0;
}
return 1;
if (!digest_init(to)) {
- SYSerr("ioctl", errno);
+ FUNCerr("ioctl", errno);
return 0;
}
cphash.src_ses = digest_from->sess.ses;
cphash.dst_ses = digest_to->sess.ses;
if (ioctl(cfd, CIOCCPHASH, &cphash) < 0) {
- SYSerr("ioctl", errno);
+ FUNCerr("ioctl", errno);
return 0;
}
return 1;
# define ERR_LIB_USER 128
-# define SYSerr(f,r) ERR_PUT_func_error(ERR_LIB_SYS,(f),(r),OPENSSL_FILE,OPENSSL_LINE)
+# if ! OPENSSL_API_3
+# define SYSerr(f,r) ERR_PUT_error(ERR_LIB_SYS,0,(r),OPENSSL_FILE,OPENSSL_LINE)
+#endif
+# define FUNCerr(f,r) ERR_PUT_func_error(ERR_LIB_SYS,(f),(r),OPENSSL_FILE,OPENSSL_LINE)
# define BNerr(f,r) ERR_PUT_error(ERR_LIB_BN,0,(r),OPENSSL_FILE,OPENSSL_LINE)
# define RSAerr(f,r) ERR_PUT_error(ERR_LIB_RSA,0,(r),OPENSSL_FILE,OPENSSL_LINE)
# define DHerr(f,r) ERR_PUT_error(ERR_LIB_DH,0,(r),OPENSSL_FILE,OPENSSL_LINE)
}
if (errno) {
- SYSerr("readdir", get_last_sys_error());
+ FUNCerr("readdir", get_last_sys_error());
ERR_add_error_data(3, "OPENSSL_DIR_read(&ctx, '", dir, "')");
SSLerr(SSL_F_SSL_ADD_DIR_CERT_SUBJECTS_TO_STACK, ERR_R_SYS_LIB);
goto err;
else
#endif
#ifdef OPENSSL_NO_KTLS
- SYSerr("sendfile", get_last_sys_error());
+ FUNCerr("sendfile", get_last_sys_error());
#else
SSLerr(SSL_F_SSL_SENDFILE, SSL_R_UNINITIALIZED);
#endif