@@ -114,8 +114,8 @@ static size_t cipher_type_len = NUM_ELEMENTS(cipher_type);
114114
115115static fr_table_num_sorted_t const cipher_cert_verify_mode_table [] = {
116116 { L ("hard" ), CIPHER_CERT_VERIFY_HARD },
117- { L ("none" ), CIPHER_CERT_VERIFY_SOFT },
118- { L ("soft" ), CIPHER_CERT_VERIFY_NONE }
117+ { L ("none" ), CIPHER_CERT_VERIFY_NONE },
118+ { L ("soft" ), CIPHER_CERT_VERIFY_SOFT }
119119};
120120static size_t cipher_cert_verify_mode_table_len = NUM_ELEMENTS (cipher_cert_verify_mode_table );
121121
@@ -1089,7 +1089,7 @@ static int cipher_rsa_thread_instantiate(module_thread_inst_ctx_t const *mctx)
10891089 if (unlikely (EVP_PKEY_encrypt_init (ti -> evp_encrypt_ctx ) <= 0 )) {
10901090 fr_tls_strerror_printf (NULL );
10911091 PERROR ("%s: Failed initialising encrypt EVP_PKEY_CTX" , __FUNCTION__ );
1092- return XLAT_ACTION_FAIL ;
1092+ return -1 ;
10931093 }
10941094 if (unlikely (cipher_rsa_padding_params_set (ti -> evp_encrypt_ctx , inst -> rsa ) < 0 )) {
10951095 ERROR ("%s: Failed setting padding for encrypt EVP_PKEY_CTX" , __FUNCTION__ );
@@ -1115,7 +1115,7 @@ static int cipher_rsa_thread_instantiate(module_thread_inst_ctx_t const *mctx)
11151115 if (unlikely (EVP_PKEY_verify_init (ti -> evp_verify_ctx ) <= 0 )) {
11161116 fr_tls_strerror_printf (NULL );
11171117 PERROR ("%s: Failed initialising verify EVP_PKEY_CTX" , __FUNCTION__ );
1118- return XLAT_ACTION_FAIL ;
1118+ return -1 ;
11191119 }
11201120
11211121 /*
@@ -1131,7 +1131,7 @@ static int cipher_rsa_thread_instantiate(module_thread_inst_ctx_t const *mctx)
11311131 if (unlikely (EVP_PKEY_CTX_set_signature_md (ti -> evp_verify_ctx , inst -> rsa -> sig_digest )) <= 0 ) {
11321132 fr_tls_strerror_printf (NULL );
11331133 PERROR ("%s: Failed setting signature digest type" , __FUNCTION__ );
1134- return XLAT_ACTION_FAIL ;
1134+ return -1 ;
11351135 }
11361136 }
11371137
@@ -1155,7 +1155,7 @@ static int cipher_rsa_thread_instantiate(module_thread_inst_ctx_t const *mctx)
11551155 if (unlikely (EVP_PKEY_decrypt_init (ti -> evp_decrypt_ctx ) <= 0 )) {
11561156 fr_tls_strerror_printf (NULL );
11571157 PERROR ("%s: Failed initialising decrypt EVP_PKEY_CTX" , __FUNCTION__ );
1158- return XLAT_ACTION_FAIL ;
1158+ return -1 ;
11591159 }
11601160 if (unlikely (cipher_rsa_padding_params_set (ti -> evp_decrypt_ctx , inst -> rsa ) < 0 )) {
11611161 ERROR ("%s: Failed setting padding for decrypt EVP_PKEY_CTX" , __FUNCTION__ );
@@ -1181,7 +1181,7 @@ static int cipher_rsa_thread_instantiate(module_thread_inst_ctx_t const *mctx)
11811181 if (unlikely (EVP_PKEY_sign_init (ti -> evp_sign_ctx ) <= 0 )) {
11821182 fr_tls_strerror_printf (NULL );
11831183 PERROR ("%s: Failed initialising sign EVP_PKEY_CTX" , __FUNCTION__ );
1184- return XLAT_ACTION_FAIL ;
1184+ return -1 ;
11851185 }
11861186
11871187 /*
@@ -1197,7 +1197,7 @@ static int cipher_rsa_thread_instantiate(module_thread_inst_ctx_t const *mctx)
11971197 if (unlikely (EVP_PKEY_CTX_set_signature_md (ti -> evp_sign_ctx , inst -> rsa -> sig_digest )) <= 0 ) {
11981198 fr_tls_strerror_printf (NULL );
11991199 PERROR ("%s: Failed setting signature digest type" , __FUNCTION__ );
1200- return XLAT_ACTION_FAIL ;
1200+ return -1 ;
12011201 }
12021202
12031203 /*
0 commit comments