diff options
Diffstat (limited to 'crypto/http/http_client.c')
-rw-r--r-- | crypto/http/http_client.c | 88 |
1 files changed, 44 insertions, 44 deletions
diff --git a/crypto/http/http_client.c b/crypto/http/http_client.c index 1a68228548..ef23b889aa 100644 --- a/crypto/http/http_client.c +++ b/crypto/http/http_client.c @@ -84,7 +84,7 @@ OSSL_HTTP_REQ_CTX *OSSL_HTTP_REQ_CTX_new(BIO *wbio, BIO *rbio, OSSL_HTTP_REQ_CTX *rctx; if (wbio == NULL || rbio == NULL) { - HTTPerr(0, ERR_R_PASSED_NULL_PARAMETER); + ERR_raise(ERR_LIB_HTTP, ERR_R_PASSED_NULL_PARAMETER); return NULL; } @@ -121,7 +121,7 @@ void OSSL_HTTP_REQ_CTX_free(OSSL_HTTP_REQ_CTX *rctx) BIO *OSSL_HTTP_REQ_CTX_get0_mem_bio(OSSL_HTTP_REQ_CTX *rctx) { if (rctx == NULL) { - HTTPerr(0, ERR_R_PASSED_NULL_PARAMETER); + ERR_raise(ERR_LIB_HTTP, ERR_R_PASSED_NULL_PARAMETER); return NULL; } return rctx->mem; @@ -131,7 +131,7 @@ void OSSL_HTTP_REQ_CTX_set_max_response_length(OSSL_HTTP_REQ_CTX *rctx, unsigned long len) { if (rctx == NULL) { - HTTPerr(0, ERR_R_PASSED_NULL_PARAMETER); + ERR_raise(ERR_LIB_HTTP, ERR_R_PASSED_NULL_PARAMETER); return; } rctx->max_resp_len = len != 0 ? len : HTTP_DEFAULT_MAX_RESP_LEN; @@ -145,7 +145,7 @@ int OSSL_HTTP_REQ_CTX_header(OSSL_HTTP_REQ_CTX *rctx, const char *server, const char *port, const char *path) { if (rctx == NULL) { - HTTPerr(0, ERR_R_PASSED_NULL_PARAMETER); + ERR_raise(ERR_LIB_HTTP, ERR_R_PASSED_NULL_PARAMETER); return 0; } @@ -179,7 +179,7 @@ int OSSL_HTTP_REQ_CTX_add1_header(OSSL_HTTP_REQ_CTX *rctx, const char *name, const char *value) { if (rctx == NULL || name == NULL) { - HTTPerr(0, ERR_R_PASSED_NULL_PARAMETER); + ERR_raise(ERR_LIB_HTTP, ERR_R_PASSED_NULL_PARAMETER); return 0; } @@ -204,7 +204,7 @@ static int OSSL_HTTP_REQ_CTX_content(OSSL_HTTP_REQ_CTX *rctx, long req_len; if (rctx == NULL || req_mem == NULL) { - HTTPerr(0, ERR_R_PASSED_NULL_PARAMETER); + ERR_raise(ERR_LIB_HTTP, ERR_R_PASSED_NULL_PARAMETER); return 0; } @@ -225,7 +225,7 @@ BIO *HTTP_asn1_item2bio(const ASN1_ITEM *it, const ASN1_VALUE *val) BIO *res; if (it == NULL || val == NULL) { - HTTPerr(0, ERR_R_PASSED_NULL_PARAMETER); + ERR_raise(ERR_LIB_HTTP, ERR_R_PASSED_NULL_PARAMETER); return NULL; } @@ -245,7 +245,7 @@ int OSSL_HTTP_REQ_CTX_i2d(OSSL_HTTP_REQ_CTX *rctx, const char *content_type, int res; if (rctx == NULL || it == NULL || req == NULL) { - HTTPerr(0, ERR_R_PASSED_NULL_PARAMETER); + ERR_raise(ERR_LIB_HTTP, ERR_R_PASSED_NULL_PARAMETER); return 0; } @@ -294,7 +294,7 @@ OSSL_HTTP_REQ_CTX *HTTP_REQ_CTX_new(BIO *wbio, BIO *rbio, int use_http_proxy, OSSL_HTTP_REQ_CTX *rctx; if (use_http_proxy && (server == NULL || port == NULL)) { - HTTPerr(0, ERR_R_PASSED_NULL_PARAMETER); + ERR_raise(ERR_LIB_HTTP, ERR_R_PASSED_NULL_PARAMETER); return NULL; } /* remaining parameters are checked indirectly by the functions called */ @@ -330,7 +330,7 @@ static int parse_http_line1(char *line) for (code = line; *code != '\0' && !ossl_isspace(*code); code++) continue; if (*code == '\0') { - HTTPerr(0, HTTP_R_RESPONSE_PARSE_ERROR); + ERR_raise(ERR_LIB_HTTP, HTTP_R_RESPONSE_PARSE_ERROR); return 0; } @@ -339,7 +339,7 @@ static int parse_http_line1(char *line) code++; if (*code == '\0') { - HTTPerr(0, HTTP_R_RESPONSE_PARSE_ERROR); + ERR_raise(ERR_LIB_HTTP, HTTP_R_RESPONSE_PARSE_ERROR); return 0; } @@ -348,7 +348,7 @@ static int parse_http_line1(char *line) continue; if (*reason == '\0') { - HTTPerr(0, HTTP_R_RESPONSE_PARSE_ERROR); + ERR_raise(ERR_LIB_HTTP, HTTP_R_RESPONSE_PARSE_ERROR); return 0; } @@ -383,9 +383,9 @@ static int parse_http_line1(char *line) return retcode; default: if (retcode < 400) - HTTPerr(0, HTTP_R_STATUS_CODE_UNSUPPORTED); + ERR_raise(ERR_LIB_HTTP, HTTP_R_STATUS_CODE_UNSUPPORTED); else - HTTPerr(0, HTTP_R_RECEIVED_ERROR); + ERR_raise(ERR_LIB_HTTP, HTTP_R_RECEIVED_ERROR); if (*reason == '\0') ERR_add_error_data(2, "Code=", code); else @@ -400,12 +400,12 @@ static int check_set_resp_len(OSSL_HTTP_REQ_CTX *rctx, unsigned long len) unsigned long val = 0; if (len > rctx->max_resp_len) { - HTTPerr(0, HTTP_R_MAX_RESP_LEN_EXCEEDED); + ERR_raise(ERR_LIB_HTTP, HTTP_R_MAX_RESP_LEN_EXCEEDED); tag = ",max="; val = rctx->max_resp_len; } if (rctx->resp_len != 0 && rctx->resp_len != len) { - HTTPerr(0, HTTP_R_INCONSISTENT_CONTENT_LENGTH); + ERR_raise(ERR_LIB_HTTP, HTTP_R_INCONSISTENT_CONTENT_LENGTH); tag = ",before="; val = rctx->resp_len; } @@ -435,7 +435,7 @@ int OSSL_HTTP_REQ_CTX_nbio(OSSL_HTTP_REQ_CTX *rctx) char *key, *value, *line_end = NULL; if (rctx == NULL) { - HTTPerr(0, ERR_R_PASSED_NULL_PARAMETER); + ERR_raise(ERR_LIB_HTTP, ERR_R_PASSED_NULL_PARAMETER); return 0; } @@ -539,7 +539,7 @@ int OSSL_HTTP_REQ_CTX_nbio(OSSL_HTTP_REQ_CTX *rctx) /* Don't allow excessive lines */ if (n == rctx->iobuflen) { - HTTPerr(0, HTTP_R_RESPONSE_LINE_TOO_LONG); + ERR_raise(ERR_LIB_HTTP, HTTP_R_RESPONSE_LINE_TOO_LONG); rctx->state = OHS_ERROR; return 0; } @@ -556,7 +556,7 @@ int OSSL_HTTP_REQ_CTX_nbio(OSSL_HTTP_REQ_CTX *rctx) rctx->state = OHS_REDIRECT; goto next_line; } - HTTPerr(0, HTTP_R_REDIRECTION_NOT_ENABLED); + ERR_raise(ERR_LIB_HTTP, HTTP_R_REDIRECTION_NOT_ENABLED); /* redirection is not supported/recommended for POST */ /* fall through */ default: @@ -585,7 +585,7 @@ int OSSL_HTTP_REQ_CTX_nbio(OSSL_HTTP_REQ_CTX *rctx) if (rctx->expected_ct != NULL && strcasecmp(key, "Content-Type") == 0) { if (strcasecmp(rctx->expected_ct, value) != 0) { - HTTPerr(0, HTTP_R_UNEXPECTED_CONTENT_TYPE); + ERR_raise(ERR_LIB_HTTP, HTTP_R_UNEXPECTED_CONTENT_TYPE); ERR_add_error_data(4, "expected=", rctx->expected_ct, ",actual=", value); return 0; @@ -595,7 +595,7 @@ int OSSL_HTTP_REQ_CTX_nbio(OSSL_HTTP_REQ_CTX *rctx) if (strcasecmp(key, "Content-Length") == 0) { resp_len = strtoul(value, &line_end, 10); if (line_end == value || *line_end != '\0') { - HTTPerr(0, HTTP_R_ERROR_PARSING_CONTENT_LENGTH); + ERR_raise(ERR_LIB_HTTP, HTTP_R_ERROR_PARSING_CONTENT_LENGTH); ERR_add_error_data(2, "input=", value); return 0; } @@ -613,13 +613,13 @@ int OSSL_HTTP_REQ_CTX_nbio(OSSL_HTTP_REQ_CTX *rctx) goto next_line; if (rctx->expected_ct != NULL) { - HTTPerr(0, HTTP_R_MISSING_CONTENT_TYPE); + ERR_raise(ERR_LIB_HTTP, HTTP_R_MISSING_CONTENT_TYPE); ERR_add_error_data(2, "expected=", rctx->expected_ct); return 0; } if (rctx->state == OHS_REDIRECT) { /* http status code indicated redirect but there was no Location */ - HTTPerr(0, HTTP_R_MISSING_REDIRECT_LOCATION); + ERR_raise(ERR_LIB_HTTP, HTTP_R_MISSING_REDIRECT_LOCATION); return 0; } @@ -643,7 +643,7 @@ int OSSL_HTTP_REQ_CTX_nbio(OSSL_HTTP_REQ_CTX *rctx) /* Check it is an ASN1 SEQUENCE */ if (*p++ != (V_ASN1_SEQUENCE | V_ASN1_CONSTRUCTED)) { - HTTPerr(0, HTTP_R_MISSING_ASN1_ENCODING); + ERR_raise(ERR_LIB_HTTP, HTTP_R_MISSING_ASN1_ENCODING); return 0; } @@ -658,7 +658,7 @@ int OSSL_HTTP_REQ_CTX_nbio(OSSL_HTTP_REQ_CTX *rctx) n = *p & 0x7F; /* Not NDEF or excessive length */ if (n == 0 || (n > 4)) { - HTTPerr(0, HTTP_R_ERROR_PARSING_ASN1_LENGTH); + ERR_raise(ERR_LIB_HTTP, HTTP_R_ERROR_PARSING_ASN1_LENGTH); return 0; } p++; @@ -739,7 +739,7 @@ static ASN1_VALUE *BIO_mem_d2i(BIO *mem, const ASN1_ITEM *it) ASN1_VALUE *resp = ASN1_item_d2i(NULL, &p, len, it); if (resp == NULL) - HTTPerr(0, HTTP_R_RESPONSE_PARSE_ERROR); + ERR_raise(ERR_LIB_HTTP, HTTP_R_RESPONSE_PARSE_ERROR); return resp; } @@ -749,7 +749,7 @@ static BIO *OSSL_HTTP_REQ_CTX_transfer(OSSL_HTTP_REQ_CTX *rctx) int rv; if (rctx == NULL) { - HTTPerr(0, ERR_R_PASSED_NULL_PARAMETER); + ERR_raise(ERR_LIB_HTTP, ERR_R_PASSED_NULL_PARAMETER); return NULL; } @@ -767,9 +767,9 @@ static BIO *OSSL_HTTP_REQ_CTX_transfer(OSSL_HTTP_REQ_CTX *rctx) if (rv == 0) { if (rctx->redirection_url == NULL) { /* an error occurred */ if (sending && (rctx->state & OHS_NOREAD) != 0) - HTTPerr(0, HTTP_R_ERROR_SENDING); + ERR_raise(ERR_LIB_HTTP, HTTP_R_ERROR_SENDING); else - HTTPerr(0, HTTP_R_ERROR_RECEIVING); + ERR_raise(ERR_LIB_HTTP, HTTP_R_ERROR_RECEIVING); } return NULL; } @@ -783,7 +783,7 @@ ASN1_VALUE *OSSL_HTTP_REQ_CTX_sendreq_d2i(OSSL_HTTP_REQ_CTX *rctx, const ASN1_ITEM *it) { if (rctx == NULL || it == NULL) { - HTTPerr(0, ERR_R_PASSED_NULL_PARAMETER); + ERR_raise(ERR_LIB_HTTP, ERR_R_PASSED_NULL_PARAMETER); return NULL; } return BIO_mem_d2i(OSSL_HTTP_REQ_CTX_transfer(rctx), it); @@ -845,11 +845,11 @@ BIO *OSSL_HTTP_transfer(const char *server, const char *port, const char *path, *redirection_url = NULL; /* do this beforehand to prevent dbl free */ if (use_ssl && bio_update_fn == NULL) { - HTTPerr(0, HTTP_R_TLS_NOT_ENABLED); + ERR_raise(ERR_LIB_HTTP, HTTP_R_TLS_NOT_ENABLED); return NULL; } if (rbio != NULL && (bio == NULL || bio_update_fn != NULL)) { - HTTPerr(0, ERR_R_PASSED_INVALID_ARGUMENT); + ERR_raise(ERR_LIB_HTTP, ERR_R_PASSED_INVALID_ARGUMENT); return NULL; } @@ -858,7 +858,7 @@ BIO *OSSL_HTTP_transfer(const char *server, const char *port, const char *path, } else { #ifndef OPENSSL_NO_SOCK if (server == NULL) { - HTTPerr(0, ERR_R_PASSED_NULL_PARAMETER); + ERR_raise(ERR_LIB_HTTP, ERR_R_PASSED_NULL_PARAMETER); return NULL; } if (*port == '\0') @@ -869,7 +869,7 @@ BIO *OSSL_HTTP_transfer(const char *server, const char *port, const char *path, if ((cbio = HTTP_new_bio(server, port, proxy)) == NULL) return NULL; #else - HTTPerr(0, HTTP_R_SOCK_NOT_SUPPORTED); + ERR_raise(ERR_LIB_HTTP, HTTP_R_SOCK_NOT_SUPPORTED); return NULL; #endif } @@ -902,7 +902,7 @@ BIO *OSSL_HTTP_transfer(const char *server, const char *port, const char *path, if (resp == NULL) { if (rctx->redirection_url != NULL) { if (redirection_url == NULL) - HTTPerr(0, HTTP_R_REDIRECTION_NOT_ENABLED); + ERR_raise(ERR_LIB_HTTP, HTTP_R_REDIRECTION_NOT_ENABLED); else /* may be NULL if out of memory: */ *redirection_url = OPENSSL_strdup(rctx->redirection_url); @@ -965,14 +965,14 @@ static int redirection_ok(int n_redir, const char *old_url, const char *new_url) size_t https_len = strlen(OSSL_HTTPS_NAME":"); if (n_redir >= HTTP_VERSION_MAX_REDIRECTIONS) { - HTTPerr(0, HTTP_R_TOO_MANY_REDIRECTIONS); + ERR_raise(ERR_LIB_HTTP, HTTP_R_TOO_MANY_REDIRECTIONS); return 0; } if (*new_url == '/') /* redirection to same server => same protocol */ return 1; if (strncmp(old_url, OSSL_HTTPS_NAME":", https_len) == 0 && strncmp(new_url, OSSL_HTTPS_NAME":", https_len) != 0) { - HTTPerr(0, HTTP_R_REDIRECTION_FROM_HTTPS_TO_HTTP); + ERR_raise(ERR_LIB_HTTP, HTTP_R_REDIRECTION_FROM_HTTPS_TO_HTTP); return 0; } return 1; @@ -996,7 +996,7 @@ BIO *OSSL_HTTP_get(const char *url, const char *proxy, const char *no_proxy, BIO *resp = NULL; if (url == NULL) { - HTTPerr(0, ERR_R_PASSED_NULL_PARAMETER); + ERR_raise(ERR_LIB_HTTP, ERR_R_PASSED_NULL_PARAMETER); return NULL; } if ((current_url = OPENSSL_strdup(url)) == NULL) @@ -1053,7 +1053,7 @@ ASN1_VALUE *OSSL_HTTP_get_asn1(const char *url, ASN1_VALUE *resp = NULL; if (url == NULL || it == NULL) { - HTTPerr(0, ERR_R_PASSED_NULL_PARAMETER); + ERR_raise(ERR_LIB_HTTP, ERR_R_PASSED_NULL_PARAMETER); return NULL; } if ((mem = OSSL_HTTP_get(url, proxy, no_proxy, bio, rbio, bio_update_fn, @@ -1083,7 +1083,7 @@ ASN1_VALUE *OSSL_HTTP_post_asn1(const char *server, const char *port, ASN1_VALUE *resp = NULL; if (req == NULL) { - HTTPerr(0, ERR_R_PASSED_NULL_PARAMETER); + ERR_raise(ERR_LIB_HTTP, ERR_R_PASSED_NULL_PARAMETER); return NULL; } /* remaining parameters are checked indirectly */ @@ -1147,7 +1147,7 @@ int OSSL_HTTP_proxy_connect(BIO *bio, const char *server, const char *port, if (bio == NULL || server == NULL || (bio_err != NULL && prog == NULL)) { - HTTPerr(0, ERR_R_PASSED_NULL_PARAMETER); + ERR_raise(ERR_LIB_HTTP, ERR_R_PASSED_NULL_PARAMETER); goto end; } if (port == NULL || *port == '\0') @@ -1223,7 +1223,7 @@ int OSSL_HTTP_proxy_connect(BIO *bio, const char *server, const char *port, /* RFC 7231 4.3.6: any 2xx status code is valid */ if (strncmp(mbuf, HTTP_PREFIX, strlen(HTTP_PREFIX)) != 0) { - HTTPerr(0, HTTP_R_RESPONSE_PARSE_ERROR); + ERR_raise(ERR_LIB_HTTP, HTTP_R_RESPONSE_PARSE_ERROR); BIO_printf(bio_err, "%s: HTTP CONNECT failed, non-HTTP response\n", prog); /* Wrong protocol, not even HTTP, so stop reading headers */ @@ -1231,7 +1231,7 @@ int OSSL_HTTP_proxy_connect(BIO *bio, const char *server, const char *port, } mbufp = mbuf + strlen(HTTP_PREFIX); if (strncmp(mbufp, HTTP_VERSION_PATT, strlen(HTTP_VERSION_PATT)) != 0) { - HTTPerr(0, HTTP_R_RECEIVED_WRONG_HTTP_VERSION); + ERR_raise(ERR_LIB_HTTP, HTTP_R_RECEIVED_WRONG_HTTP_VERSION); BIO_printf(bio_err, "%s: HTTP CONNECT failed, bad HTTP version %.*s\n", prog, HTTP_VERSION_STR_LEN, mbufp); @@ -1244,7 +1244,7 @@ int OSSL_HTTP_proxy_connect(BIO *bio, const char *server, const char *port, while (read_len > 0 && ossl_isspace(mbuf[read_len - 1])) read_len--; mbuf[read_len] = '\0'; - HTTPerr(0, HTTP_R_CONNECT_FAILURE); + ERR_raise(ERR_LIB_HTTP, HTTP_R_CONNECT_FAILURE); ERR_add_error_data(2, "Reason=", mbufp); BIO_printf(bio_err, "%s: HTTP CONNECT failed, Reason=%s\n", prog, mbufp); |