/* This is because of BIO_new_mem_buf() having its length param typed int */
if (data_len > INT_MAX)
- return YACA_ERROR_TOO_BIG_ARGUMENT;
+ return YACA_ERROR_INVALID_ARGUMENT;
/* First phase of correctness checking, calculate expected output length */
ret = base64_decode_length(data, data_len, &b64_len);
}
if (key_data_len > SIZE_MAX - sizeof(struct yaca_key_simple_s)) {
- ret = YACA_ERROR_TOO_BIG_ARGUMENT;
+ ret = YACA_ERROR_INVALID_ARGUMENT;
goto out;
}
/* This is because of BIO_new_mem_buf() having its length param typed int */
if (data_len > INT_MAX)
- return YACA_ERROR_TOO_BIG_ARGUMENT;
+ return YACA_ERROR_INVALID_ARGUMENT;
src = BIO_new_mem_buf(data, data_len);
if (src == NULL) {
size_t key_byte_len = key_bits / 8;
if (key_byte_len > SIZE_MAX - sizeof(struct yaca_key_simple_s))
- return YACA_ERROR_TOO_BIG_ARGUMENT;
+ return YACA_ERROR_INVALID_ARGUMENT;
nk = yaca_zalloc(sizeof(struct yaca_key_simple_s) + key_byte_len);
if (nk == NULL)
size_t key_byte_len = key_bits / 8;
if (key_byte_len > SIZE_MAX - sizeof(struct yaca_key_simple_s))
- return YACA_ERROR_TOO_BIG_ARGUMENT;
+ return YACA_ERROR_INVALID_ARGUMENT;
nk = yaca_zalloc(sizeof(struct yaca_key_simple_s) + key_byte_len);
if (nk == NULL)
return YACA_ERROR_INVALID_ARGUMENT;
if (key_byte_len > SIZE_MAX - sizeof(struct yaca_key_simple_s))
- return YACA_ERROR_TOO_BIG_ARGUMENT;
+ return YACA_ERROR_INVALID_ARGUMENT;
ret = digest_get_algorithm(algo, &md);
if (ret != YACA_ERROR_NONE)
goto err;
if (out_len > SIZE_MAX - lcipher_len) {
- ret = YACA_ERROR_TOO_BIG_ARGUMENT;
+ ret = YACA_ERROR_INVALID_ARGUMENT;
goto err;
}
goto err;
if (out_len > SIZE_MAX - lplain_len) {
- ret = YACA_ERROR_TOO_BIG_ARGUMENT;
+ ret = YACA_ERROR_INVALID_ARGUMENT;
goto err;
}