diff options
author | tb <> | 2024-04-23 10:52:08 +0000 |
---|---|---|
committer | tb <> | 2024-04-23 10:52:08 +0000 |
commit | 87dc7b3e69175b93ba1a68686a34fc4d18a65af2 (patch) | |
tree | 81ffadc419221c131324c655aa34a9b23b0048f7 | |
parent | 288e8e1eee27aa566a3b51612169c4a2c6ab9ed5 (diff) | |
download | openbsd-87dc7b3e69175b93ba1a68686a34fc4d18a65af2.tar.gz openbsd-87dc7b3e69175b93ba1a68686a34fc4d18a65af2.tar.bz2 openbsd-87dc7b3e69175b93ba1a68686a34fc4d18a65af2.zip |
One empty line is enough
-rw-r--r-- | src/lib/libcrypto/ec/ec_lib.c | 19 |
1 files changed, 1 insertions, 18 deletions
diff --git a/src/lib/libcrypto/ec/ec_lib.c b/src/lib/libcrypto/ec/ec_lib.c index dff4124580..85567a76c1 100644 --- a/src/lib/libcrypto/ec/ec_lib.c +++ b/src/lib/libcrypto/ec/ec_lib.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: ec_lib.c,v 1.66 2024/04/10 15:01:31 beck Exp $ */ | 1 | /* $OpenBSD: ec_lib.c,v 1.67 2024/04/23 10:52:08 tb Exp $ */ |
2 | /* | 2 | /* |
3 | * Originally written by Bodo Moeller for the OpenSSL project. | 3 | * Originally written by Bodo Moeller for the OpenSSL project. |
4 | */ | 4 | */ |
@@ -112,7 +112,6 @@ EC_GROUP_new(const EC_METHOD *meth) | |||
112 | } | 112 | } |
113 | LCRYPTO_ALIAS(EC_GROUP_new); | 113 | LCRYPTO_ALIAS(EC_GROUP_new); |
114 | 114 | ||
115 | |||
116 | void | 115 | void |
117 | EC_GROUP_free(EC_GROUP *group) | 116 | EC_GROUP_free(EC_GROUP *group) |
118 | { | 117 | { |
@@ -188,12 +187,10 @@ EC_GROUP_copy(EC_GROUP *dest, const EC_GROUP *src) | |||
188 | dest->seed_len = 0; | 187 | dest->seed_len = 0; |
189 | } | 188 | } |
190 | 189 | ||
191 | |||
192 | return dest->meth->group_copy(dest, src); | 190 | return dest->meth->group_copy(dest, src); |
193 | } | 191 | } |
194 | LCRYPTO_ALIAS(EC_GROUP_copy); | 192 | LCRYPTO_ALIAS(EC_GROUP_copy); |
195 | 193 | ||
196 | |||
197 | EC_GROUP * | 194 | EC_GROUP * |
198 | EC_GROUP_dup(const EC_GROUP *a) | 195 | EC_GROUP_dup(const EC_GROUP *a) |
199 | { | 196 | { |
@@ -208,7 +205,6 @@ EC_GROUP_dup(const EC_GROUP *a) | |||
208 | } | 205 | } |
209 | LCRYPTO_ALIAS(EC_GROUP_dup); | 206 | LCRYPTO_ALIAS(EC_GROUP_dup); |
210 | 207 | ||
211 | |||
212 | const EC_METHOD * | 208 | const EC_METHOD * |
213 | EC_GROUP_method_of(const EC_GROUP *group) | 209 | EC_GROUP_method_of(const EC_GROUP *group) |
214 | { | 210 | { |
@@ -216,7 +212,6 @@ EC_GROUP_method_of(const EC_GROUP *group) | |||
216 | } | 212 | } |
217 | LCRYPTO_ALIAS(EC_GROUP_method_of); | 213 | LCRYPTO_ALIAS(EC_GROUP_method_of); |
218 | 214 | ||
219 | |||
220 | int | 215 | int |
221 | EC_METHOD_get_field_type(const EC_METHOD *meth) | 216 | EC_METHOD_get_field_type(const EC_METHOD *meth) |
222 | { | 217 | { |
@@ -358,7 +353,6 @@ EC_GROUP_set_generator(EC_GROUP *group, const EC_POINT *generator, | |||
358 | } | 353 | } |
359 | LCRYPTO_ALIAS(EC_GROUP_set_generator); | 354 | LCRYPTO_ALIAS(EC_GROUP_set_generator); |
360 | 355 | ||
361 | |||
362 | const EC_POINT * | 356 | const EC_POINT * |
363 | EC_GROUP_get0_generator(const EC_GROUP *group) | 357 | EC_GROUP_get0_generator(const EC_GROUP *group) |
364 | { | 358 | { |
@@ -399,7 +393,6 @@ EC_GROUP_get_cofactor(const EC_GROUP *group, BIGNUM *cofactor, BN_CTX *ctx) | |||
399 | } | 393 | } |
400 | LCRYPTO_ALIAS(EC_GROUP_get_cofactor); | 394 | LCRYPTO_ALIAS(EC_GROUP_get_cofactor); |
401 | 395 | ||
402 | |||
403 | void | 396 | void |
404 | EC_GROUP_set_curve_name(EC_GROUP *group, int nid) | 397 | EC_GROUP_set_curve_name(EC_GROUP *group, int nid) |
405 | { | 398 | { |
@@ -407,7 +400,6 @@ EC_GROUP_set_curve_name(EC_GROUP *group, int nid) | |||
407 | } | 400 | } |
408 | LCRYPTO_ALIAS(EC_GROUP_set_curve_name); | 401 | LCRYPTO_ALIAS(EC_GROUP_set_curve_name); |
409 | 402 | ||
410 | |||
411 | int | 403 | int |
412 | EC_GROUP_get_curve_name(const EC_GROUP *group) | 404 | EC_GROUP_get_curve_name(const EC_GROUP *group) |
413 | { | 405 | { |
@@ -415,7 +407,6 @@ EC_GROUP_get_curve_name(const EC_GROUP *group) | |||
415 | } | 407 | } |
416 | LCRYPTO_ALIAS(EC_GROUP_get_curve_name); | 408 | LCRYPTO_ALIAS(EC_GROUP_get_curve_name); |
417 | 409 | ||
418 | |||
419 | void | 410 | void |
420 | EC_GROUP_set_asn1_flag(EC_GROUP *group, int flag) | 411 | EC_GROUP_set_asn1_flag(EC_GROUP *group, int flag) |
421 | { | 412 | { |
@@ -423,7 +414,6 @@ EC_GROUP_set_asn1_flag(EC_GROUP *group, int flag) | |||
423 | } | 414 | } |
424 | LCRYPTO_ALIAS(EC_GROUP_set_asn1_flag); | 415 | LCRYPTO_ALIAS(EC_GROUP_set_asn1_flag); |
425 | 416 | ||
426 | |||
427 | int | 417 | int |
428 | EC_GROUP_get_asn1_flag(const EC_GROUP *group) | 418 | EC_GROUP_get_asn1_flag(const EC_GROUP *group) |
429 | { | 419 | { |
@@ -431,7 +421,6 @@ EC_GROUP_get_asn1_flag(const EC_GROUP *group) | |||
431 | } | 421 | } |
432 | LCRYPTO_ALIAS(EC_GROUP_get_asn1_flag); | 422 | LCRYPTO_ALIAS(EC_GROUP_get_asn1_flag); |
433 | 423 | ||
434 | |||
435 | void | 424 | void |
436 | EC_GROUP_set_point_conversion_form(EC_GROUP *group, | 425 | EC_GROUP_set_point_conversion_form(EC_GROUP *group, |
437 | point_conversion_form_t form) | 426 | point_conversion_form_t form) |
@@ -440,7 +429,6 @@ EC_GROUP_set_point_conversion_form(EC_GROUP *group, | |||
440 | } | 429 | } |
441 | LCRYPTO_ALIAS(EC_GROUP_set_point_conversion_form); | 430 | LCRYPTO_ALIAS(EC_GROUP_set_point_conversion_form); |
442 | 431 | ||
443 | |||
444 | point_conversion_form_t | 432 | point_conversion_form_t |
445 | EC_GROUP_get_point_conversion_form(const EC_GROUP *group) | 433 | EC_GROUP_get_point_conversion_form(const EC_GROUP *group) |
446 | { | 434 | { |
@@ -448,7 +436,6 @@ EC_GROUP_get_point_conversion_form(const EC_GROUP *group) | |||
448 | } | 436 | } |
449 | LCRYPTO_ALIAS(EC_GROUP_get_point_conversion_form); | 437 | LCRYPTO_ALIAS(EC_GROUP_get_point_conversion_form); |
450 | 438 | ||
451 | |||
452 | size_t | 439 | size_t |
453 | EC_GROUP_set_seed(EC_GROUP *group, const unsigned char *p, size_t len) | 440 | EC_GROUP_set_seed(EC_GROUP *group, const unsigned char *p, size_t len) |
454 | { | 441 | { |
@@ -469,7 +456,6 @@ EC_GROUP_set_seed(EC_GROUP *group, const unsigned char *p, size_t len) | |||
469 | } | 456 | } |
470 | LCRYPTO_ALIAS(EC_GROUP_set_seed); | 457 | LCRYPTO_ALIAS(EC_GROUP_set_seed); |
471 | 458 | ||
472 | |||
473 | unsigned char * | 459 | unsigned char * |
474 | EC_GROUP_get0_seed(const EC_GROUP *group) | 460 | EC_GROUP_get0_seed(const EC_GROUP *group) |
475 | { | 461 | { |
@@ -477,7 +463,6 @@ EC_GROUP_get0_seed(const EC_GROUP *group) | |||
477 | } | 463 | } |
478 | LCRYPTO_ALIAS(EC_GROUP_get0_seed); | 464 | LCRYPTO_ALIAS(EC_GROUP_get0_seed); |
479 | 465 | ||
480 | |||
481 | size_t | 466 | size_t |
482 | EC_GROUP_get_seed_len(const EC_GROUP *group) | 467 | EC_GROUP_get_seed_len(const EC_GROUP *group) |
483 | { | 468 | { |
@@ -564,7 +549,6 @@ EC_GROUP_get_degree(const EC_GROUP *group) | |||
564 | } | 549 | } |
565 | LCRYPTO_ALIAS(EC_GROUP_get_degree); | 550 | LCRYPTO_ALIAS(EC_GROUP_get_degree); |
566 | 551 | ||
567 | |||
568 | int | 552 | int |
569 | EC_GROUP_check_discriminant(const EC_GROUP *group, BN_CTX *ctx_in) | 553 | EC_GROUP_check_discriminant(const EC_GROUP *group, BN_CTX *ctx_in) |
570 | { | 554 | { |
@@ -590,7 +574,6 @@ EC_GROUP_check_discriminant(const EC_GROUP *group, BN_CTX *ctx_in) | |||
590 | } | 574 | } |
591 | LCRYPTO_ALIAS(EC_GROUP_check_discriminant); | 575 | LCRYPTO_ALIAS(EC_GROUP_check_discriminant); |
592 | 576 | ||
593 | |||
594 | int | 577 | int |
595 | EC_GROUP_cmp(const EC_GROUP *a, const EC_GROUP *b, BN_CTX *ctx) | 578 | EC_GROUP_cmp(const EC_GROUP *a, const EC_GROUP *b, BN_CTX *ctx) |
596 | { | 579 | { |