summaryrefslogtreecommitdiffstats
path: root/src/blowfish.c
diff options
context:
space:
mode:
authorBram Moolenaar <Bram@vim.org>2021-12-31 19:59:55 +0000
committerBram Moolenaar <Bram@vim.org>2021-12-31 19:59:55 +0000
commitf1474d801bbdb73406dd3d1f931f515f99e86dfa (patch)
treee69c4f4dcf990b7c13711f8b36e518117c14670e /src/blowfish.c
parent6d0570117ac86b7979bf249de5741088212d6e17 (diff)
patch 8.2.3960: error messages are spread outv8.2.3960
Problem: Error messages are spread out. Solution: Move more errors to errors.h.
Diffstat (limited to 'src/blowfish.c')
-rw-r--r--src/blowfish.c10
1 files changed, 5 insertions, 5 deletions
diff --git a/src/blowfish.c b/src/blowfish.c
index 4f6ce01c10..dc977db428 100644
--- a/src/blowfish.c
+++ b/src/blowfish.c
@@ -416,7 +416,7 @@ bf_key_init(
keylen = (int)STRLEN(key) / 2;
if (keylen == 0)
{
- iemsg(_("E831: bf_key_init() called with empty password"));
+ iemsg(_(e_bf_key_init_called_with_empty_password));
return;
}
for (i = 0; i < keylen; i++)
@@ -519,7 +519,7 @@ bf_self_test(void)
// warning.
if (ui != 0xffffffffUL || ui + 1 != 0) {
err++;
- emsg(_("E820: sizeof(uint32_t) != 4"));
+ emsg(_(e_sizeof_uint32_isnot_four));
}
if (!bf_check_tables(pax_init, sbx_init, 0x6ffa520a))
@@ -540,7 +540,7 @@ bf_self_test(void)
if (memcmp(bk.uc, bf_test_data[i].cryptxt, 8) != 0)
{
if (err == 0 && memcmp(bk.uc, bf_test_data[i].badcryptxt, 8) == 0)
- emsg(_("E817: Blowfish big/little endian use wrong"));
+ emsg(_(e_blowfish_big_little_endian_use_wrong));
err++;
}
}
@@ -672,12 +672,12 @@ blowfish_self_test(void)
{
if (sha256_self_test() == FAIL)
{
- emsg(_("E818: sha256 test failed"));
+ emsg(_(e_sha256_test_failed));
return FAIL;
}
if (bf_self_test() == FAIL)
{
- emsg(_("E819: Blowfish test failed"));
+ emsg(_(e_blowfish_test_failed));
return FAIL;
}
return OK;