summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authortb <>2021-05-14 18:03:42 +0000
committertb <>2021-05-14 18:03:42 +0000
commitef9d8bd13ca04028d27714bedb7b235bc28a7725 (patch)
treebc5c58e34adc52430963331e2a05b2822ff6f493
parent2979016a711eb6b14fbb8d36ef422d4925ad4b5b (diff)
downloadopenbsd-ef9d8bd13ca04028d27714bedb7b235bc28a7725.tar.gz
openbsd-ef9d8bd13ca04028d27714bedb7b235bc28a7725.tar.bz2
openbsd-ef9d8bd13ca04028d27714bedb7b235bc28a7725.zip
whitespace/KNF
-rw-r--r--src/lib/libcrypto/rsa/rsa_sign.c8
1 files changed, 4 insertions, 4 deletions
diff --git a/src/lib/libcrypto/rsa/rsa_sign.c b/src/lib/libcrypto/rsa/rsa_sign.c
index 50e07f4f1e..d205046bd3 100644
--- a/src/lib/libcrypto/rsa/rsa_sign.c
+++ b/src/lib/libcrypto/rsa/rsa_sign.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: rsa_sign.c,v 1.31 2018/09/05 00:55:33 djm Exp $ */ 1/* $OpenBSD: rsa_sign.c,v 1.32 2021/05/14 18:03:42 tb Exp $ */
2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) 2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3 * All rights reserved. 3 * All rights reserved.
4 * 4 *
@@ -108,7 +108,7 @@ encode_pkcs1(unsigned char **out, int *out_len, int type,
108 sig.algor->parameter = &parameter; 108 sig.algor->parameter = &parameter;
109 109
110 sig.digest = &digest; 110 sig.digest = &digest;
111 sig.digest->data = (unsigned char*)m; /* TMP UGLY CAST */ 111 sig.digest->data = (unsigned char *)m; /* TMP UGLY CAST */
112 sig.digest->length = m_len; 112 sig.digest->length = m_len;
113 113
114 if ((len = i2d_X509_SIG(&sig, &der)) < 0) 114 if ((len = i2d_X509_SIG(&sig, &der)) < 0)
@@ -194,7 +194,7 @@ int_rsa_verify(int type, const unsigned char *m, unsigned int m_len,
194 if ((decrypt_len = RSA_public_decrypt((int)siglen, sigbuf, decrypt_buf, 194 if ((decrypt_len = RSA_public_decrypt((int)siglen, sigbuf, decrypt_buf,
195 rsa, RSA_PKCS1_PADDING)) <= 0) 195 rsa, RSA_PKCS1_PADDING)) <= 0)
196 goto err; 196 goto err;
197 197
198 if (type == NID_md5_sha1) { 198 if (type == NID_md5_sha1) {
199 /* 199 /*
200 * NID_md5_sha1 corresponds to the MD5/SHA1 combination in 200 * NID_md5_sha1 corresponds to the MD5/SHA1 combination in
@@ -229,7 +229,7 @@ int_rsa_verify(int type, const unsigned char *m, unsigned int m_len,
229 if (rm != NULL) { 229 if (rm != NULL) {
230 const EVP_MD *md; 230 const EVP_MD *md;
231 231
232 if ((md = EVP_get_digestbynid(type)) == NULL) { 232 if ((md = EVP_get_digestbynid(type)) == NULL) {
233 RSAerror(RSA_R_UNKNOWN_ALGORITHM_TYPE); 233 RSAerror(RSA_R_UNKNOWN_ALGORITHM_TYPE);
234 goto err; 234 goto err;
235 } 235 }