diff options
author | tb <> | 2020-06-02 04:50:17 +0000 |
---|---|---|
committer | tb <> | 2020-06-02 04:50:17 +0000 |
commit | 6dd62332e93a2e76a8a440c4a0cc15fdafa0f7a6 (patch) | |
tree | f981b70b8aafa6c26f906ab07cf7bfaacda29693 | |
parent | 4e967b47a9720e5103bffe1537f460142bb49437 (diff) | |
download | openbsd-6dd62332e93a2e76a8a440c4a0cc15fdafa0f7a6.tar.gz openbsd-6dd62332e93a2e76a8a440c4a0cc15fdafa0f7a6.tar.bz2 openbsd-6dd62332e93a2e76a8a440c4a0cc15fdafa0f7a6.zip |
distracting whitespace
-rw-r--r-- | src/lib/libssl/tls13_server.c | 10 |
1 files changed, 5 insertions, 5 deletions
diff --git a/src/lib/libssl/tls13_server.c b/src/lib/libssl/tls13_server.c index e9fecdee26..50ae694496 100644 --- a/src/lib/libssl/tls13_server.c +++ b/src/lib/libssl/tls13_server.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: tls13_server.c,v 1.55 2020/05/29 18:00:10 jsing Exp $ */ | 1 | /* $OpenBSD: tls13_server.c,v 1.56 2020/06/02 04:50:17 tb Exp $ */ |
2 | /* | 2 | /* |
3 | * Copyright (c) 2019, 2020 Joel Sing <jsing@openbsd.org> | 3 | * Copyright (c) 2019, 2020 Joel Sing <jsing@openbsd.org> |
4 | * Copyright (c) 2020 Bob Beck <beck@openbsd.org> | 4 | * Copyright (c) 2020 Bob Beck <beck@openbsd.org> |
@@ -255,7 +255,7 @@ err: | |||
255 | } | 255 | } |
256 | 256 | ||
257 | static int | 257 | static int |
258 | tls13_server_engage_record_protection(struct tls13_ctx *ctx) | 258 | tls13_server_engage_record_protection(struct tls13_ctx *ctx) |
259 | { | 259 | { |
260 | struct tls13_secrets *secrets; | 260 | struct tls13_secrets *secrets; |
261 | struct tls13_secret context; | 261 | struct tls13_secret context; |
@@ -469,7 +469,7 @@ tls13_server_check_certificate(struct tls13_ctx *ctx, CERT_PKEY *cpk, | |||
469 | /* | 469 | /* |
470 | * The digitalSignature bit MUST be set if the Key Usage extension is | 470 | * The digitalSignature bit MUST be set if the Key Usage extension is |
471 | * present as per RFC 8446 section 4.4.2.2. | 471 | * present as per RFC 8446 section 4.4.2.2. |
472 | */ | 472 | */ |
473 | if ((cpk->x509->ex_flags & EXFLAG_KUSAGE) && | 473 | if ((cpk->x509->ex_flags & EXFLAG_KUSAGE) && |
474 | !(cpk->x509->ex_kusage & X509v3_KU_DIGITAL_SIGNATURE)) | 474 | !(cpk->x509->ex_kusage & X509v3_KU_DIGITAL_SIGNATURE)) |
475 | goto done; | 475 | goto done; |
@@ -483,7 +483,7 @@ tls13_server_check_certificate(struct tls13_ctx *ctx, CERT_PKEY *cpk, | |||
483 | done: | 483 | done: |
484 | return 1; | 484 | return 1; |
485 | } | 485 | } |
486 | 486 | ||
487 | static int | 487 | static int |
488 | tls13_server_select_certificate(struct tls13_ctx *ctx, CERT_PKEY **out_cpk, | 488 | tls13_server_select_certificate(struct tls13_ctx *ctx, CERT_PKEY **out_cpk, |
489 | const struct ssl_sigalg **out_sigalg) | 489 | const struct ssl_sigalg **out_sigalg) |
@@ -586,7 +586,7 @@ tls13_server_certificate_verify_send(struct tls13_ctx *ctx, CBB *cbb) | |||
586 | memset(&sig_cbb, 0, sizeof(sig_cbb)); | 586 | memset(&sig_cbb, 0, sizeof(sig_cbb)); |
587 | 587 | ||
588 | if ((cpk = ctx->hs->cpk) == NULL) | 588 | if ((cpk = ctx->hs->cpk) == NULL) |
589 | goto err; | 589 | goto err; |
590 | if ((sigalg = ctx->hs->sigalg) == NULL) | 590 | if ((sigalg = ctx->hs->sigalg) == NULL) |
591 | goto err; | 591 | goto err; |
592 | pkey = cpk->privatekey; | 592 | pkey = cpk->privatekey; |