@@ -503,7 +503,7 @@ int CheckCertCRL_ex(WOLFSSL_CRL* crl, byte* issuerHash, byte* serial,
503503 /* Loading <issuer-hash>.rN form CRL file if find at the folder, */
504504 /* and try again checking Cert in the CRL list. */
505505 /* When not set the folder or not use hash_dir, do nothing. */
506- if ((foundEntry == 0 ) && (ret != OCSP_WANT_READ )) {
506+ if ((foundEntry == 0 ) && (ret != WC_NO_ERR_TRACE ( OCSP_WANT_READ ) )) {
507507 if (crl -> cm != NULL && crl -> cm -> x509_store_p != NULL ) {
508508 ret = LoadCertByIssuer (crl -> cm -> x509_store_p ,
509509 (WOLFSSL_X509_NAME * )issuerName , X509_LU_CRL );
@@ -517,7 +517,7 @@ int CheckCertCRL_ex(WOLFSSL_CRL* crl, byte* issuerHash, byte* serial,
517517#endif
518518 if (foundEntry == 0 ) {
519519 WOLFSSL_MSG ("Couldn't find CRL for status check" );
520- if (ret != CRL_CERT_DATE_ERR ) {
520+ if (ret != WC_NO_ERR_TRACE ( CRL_CERT_DATE_ERR ) ) {
521521 ret = CRL_MISSING ;
522522 }
523523
@@ -655,13 +655,15 @@ int BufferLoadCRL(WOLFSSL_CRL* crl, const byte* buff, long sz, int type,
655655 InitDecodedCRL (dcrl , crl -> heap );
656656 ret = ParseCRL (crl -> currentEntry -> certs , dcrl , myBuffer , (word32 )sz ,
657657 verify , crl -> cm );
658- if (ret != 0 && !(ret == ASN_CRL_NO_SIGNER_E && verify == NO_VERIFY )) {
658+ if (ret != 0 && !(ret == WC_NO_ERR_TRACE (ASN_CRL_NO_SIGNER_E )
659+ && verify == NO_VERIFY )) {
659660 WOLFSSL_MSG ("ParseCRL error" );
660661 CRL_Entry_free (crl -> currentEntry , crl -> heap );
661662 crl -> currentEntry = NULL ;
662663 }
663664 else {
664- ret = AddCRL (crl , dcrl , myBuffer , ret != ASN_CRL_NO_SIGNER_E );
665+ ret = AddCRL (crl , dcrl , myBuffer ,
666+ ret != WC_NO_ERR_TRACE (ASN_CRL_NO_SIGNER_E ));
665667 if (ret != 0 ) {
666668 WOLFSSL_MSG ("AddCRL error" );
667669 crl -> currentEntry = NULL ;
0 commit comments