return FALSE;
}
} else {
- if (error_r != NULL)
- *error_r = "Unsupported encryption key";
- return FALSE;
+ /* Loading the key should have failed */
+ i_unreached();
}
/* add encryption key id, reuse peer_key buffer */
} else if (enctype == DCRYPT_DOVECOT_KEY_ENCRYPT_PASSWORD) {
ptr = buffer_append_space_unsafe(buf, len);
BN_bn2mpi(pk, ptr);
} else {
- if (*error_r != NULL)
- *error_r = "Unsupported key type";
- return FALSE;
+ /* Loading the key should have failed */
+ i_unreached();
}
/* see if we want ECDH based or password based encryption */
EVP_PKEY_set1_EC_KEY(pk, eck);
EC_KEY_free(eck);
} else {
- if (error_r != NULL)
- *error_r = "Invalid private key";
- return FALSE;
+ /* Loading the key should have failed */
+ i_unreached();
}
*pub_key_r = (struct dcrypt_public_key*)pk;
if (priv == NULL) return FALSE;
if (EVP_PKEY_base_id(priv) == EVP_PKEY_RSA) *key_type = DCRYPT_KEY_RSA;
else if (EVP_PKEY_base_id(priv) == EVP_PKEY_EC) *key_type = DCRYPT_KEY_EC;
+ else i_unreached();
return FALSE;
}
if (pub == NULL) return FALSE;
if (EVP_PKEY_base_id(pub) == EVP_PKEY_RSA) *key_type = DCRYPT_KEY_RSA;
else if (EVP_PKEY_base_id(pub) == EVP_PKEY_EC) *key_type = DCRYPT_KEY_EC;
+ else i_unreached();
return FALSE;
}