summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorangelos <angelos@openbsd.org>2001-06-05 10:04:46 +0000
committerangelos <angelos@openbsd.org>2001-06-05 10:04:46 +0000
commit960f07680417795604e9eddd29df61d2f0ed2e4e (patch)
tree3e71c1777a631115ebaa647ac7629118774b4ff0
parentClarify (from art@) (diff)
downloadwireguard-openbsd-960f07680417795604e9eddd29df61d2f0ed2e4e.tar.xz
wireguard-openbsd-960f07680417795604e9eddd29df61d2f0ed2e4e.zip
Don't use log_error() if it's an internal error.
-rw-r--r--sbin/isakmpd/ike_auth.c17
1 files changed, 9 insertions, 8 deletions
diff --git a/sbin/isakmpd/ike_auth.c b/sbin/isakmpd/ike_auth.c
index 04ea1a1957b..e7447938781 100644
--- a/sbin/isakmpd/ike_auth.c
+++ b/sbin/isakmpd/ike_auth.c
@@ -1,4 +1,4 @@
-/* $OpenBSD: ike_auth.c,v 1.43 2001/06/05 05:59:42 niklas Exp $ */
+/* $OpenBSD: ike_auth.c,v 1.44 2001/06/05 10:04:46 angelos Exp $ */
/* $EOM: ike_auth.c,v 1.59 2000/11/21 00:21:31 angelos Exp $ */
/*
@@ -897,21 +897,21 @@ rsa_sig_encode_hash (struct message *msg)
handler = cert_get (idtype);
if (!handler)
{
- log_error ("rsa_sig_encode_hash: cert_get (%d) failed", idtype);
+ log_print ("rsa_sig_encode_hash: cert_get (%d) failed", idtype);
return -1;
}
exchange->sent_cert = handler->cert_from_printable (buf);
if (exchange->sent_cert == NULL)
{
- log_error ("rsa_sig_encode_hash: failed to retrieve certificate");
+ log_print ("rsa_sig_encode_hash: failed to retrieve certificate");
return -1;
}
handler->cert_serialize (exchange->sent_cert, &data, &datalen);
if (data == NULL)
{
- log_error ("rsa_sig_encode_hash: cert serialization failed");
+ log_print ("rsa_sig_encode_hash: cert serialization failed");
return -1;
}
@@ -967,7 +967,8 @@ rsa_sig_encode_hash (struct message *msg)
if (!exchange->sent_cert)
{
free (data);
- log_error ("rsa_sig_encode_hash: failed to get certificate from wire encoding");
+ log_print ("rsa_sig_encode_hash: failed to get certificate from wire "
+ "encoding");
return -1;
}
@@ -1032,7 +1033,7 @@ rsa_sig_encode_hash (struct message *msg)
&datalen);
if ((data == NULL) || (datalen == -1))
{
- log_error ("rsa_sig_encode_hash: badly formatted RSA private key");
+ log_print ("rsa_sig_encode_hash: badly formatted RSA private key");
return 0;
}
@@ -1042,7 +1043,7 @@ rsa_sig_encode_hash (struct message *msg)
datalen);
if (exchange->sent_key == NULL)
{
- log_error ("rsa_sig_encode_hash: bad RSA private key from dynamic "
+ log_print ("rsa_sig_encode_hash: bad RSA private key from dynamic "
"SA acquisition subsystem");
return 0;
}
@@ -1092,7 +1093,7 @@ rsa_sig_encode_hash (struct message *msg)
exchange->sent_key, RSA_PKCS1_PADDING));
if (datalen == -1)
{
- log_error ("rsa_sig_encode_hash: RSA_private_encrypt () failed");
+ log_print ("rsa_sig_encode_hash: RSA_private_encrypt () failed");
free (buf);
return -1;
}