diff options
author | tb <> | 2021-05-14 18:03:42 +0000 |
---|---|---|
committer | tb <> | 2021-05-14 18:03:42 +0000 |
commit | ef9d8bd13ca04028d27714bedb7b235bc28a7725 (patch) | |
tree | bc5c58e34adc52430963331e2a05b2822ff6f493 | |
parent | 2979016a711eb6b14fbb8d36ef422d4925ad4b5b (diff) | |
download | openbsd-ef9d8bd13ca04028d27714bedb7b235bc28a7725.tar.gz openbsd-ef9d8bd13ca04028d27714bedb7b235bc28a7725.tar.bz2 openbsd-ef9d8bd13ca04028d27714bedb7b235bc28a7725.zip |
whitespace/KNF
-rw-r--r-- | src/lib/libcrypto/rsa/rsa_sign.c | 8 |
1 files changed, 4 insertions, 4 deletions
diff --git a/src/lib/libcrypto/rsa/rsa_sign.c b/src/lib/libcrypto/rsa/rsa_sign.c index 50e07f4f1e..d205046bd3 100644 --- a/src/lib/libcrypto/rsa/rsa_sign.c +++ b/src/lib/libcrypto/rsa/rsa_sign.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: rsa_sign.c,v 1.31 2018/09/05 00:55:33 djm Exp $ */ | 1 | /* $OpenBSD: rsa_sign.c,v 1.32 2021/05/14 18:03:42 tb Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -108,7 +108,7 @@ encode_pkcs1(unsigned char **out, int *out_len, int type, | |||
108 | sig.algor->parameter = ¶meter; | 108 | sig.algor->parameter = ¶meter; |
109 | 109 | ||
110 | sig.digest = &digest; | 110 | sig.digest = &digest; |
111 | sig.digest->data = (unsigned char*)m; /* TMP UGLY CAST */ | 111 | sig.digest->data = (unsigned char *)m; /* TMP UGLY CAST */ |
112 | sig.digest->length = m_len; | 112 | sig.digest->length = m_len; |
113 | 113 | ||
114 | if ((len = i2d_X509_SIG(&sig, &der)) < 0) | 114 | if ((len = i2d_X509_SIG(&sig, &der)) < 0) |
@@ -194,7 +194,7 @@ int_rsa_verify(int type, const unsigned char *m, unsigned int m_len, | |||
194 | if ((decrypt_len = RSA_public_decrypt((int)siglen, sigbuf, decrypt_buf, | 194 | if ((decrypt_len = RSA_public_decrypt((int)siglen, sigbuf, decrypt_buf, |
195 | rsa, RSA_PKCS1_PADDING)) <= 0) | 195 | rsa, RSA_PKCS1_PADDING)) <= 0) |
196 | goto err; | 196 | goto err; |
197 | 197 | ||
198 | if (type == NID_md5_sha1) { | 198 | if (type == NID_md5_sha1) { |
199 | /* | 199 | /* |
200 | * NID_md5_sha1 corresponds to the MD5/SHA1 combination in | 200 | * NID_md5_sha1 corresponds to the MD5/SHA1 combination in |
@@ -229,7 +229,7 @@ int_rsa_verify(int type, const unsigned char *m, unsigned int m_len, | |||
229 | if (rm != NULL) { | 229 | if (rm != NULL) { |
230 | const EVP_MD *md; | 230 | const EVP_MD *md; |
231 | 231 | ||
232 | if ((md = EVP_get_digestbynid(type)) == NULL) { | 232 | if ((md = EVP_get_digestbynid(type)) == NULL) { |
233 | RSAerror(RSA_R_UNKNOWN_ALGORITHM_TYPE); | 233 | RSAerror(RSA_R_UNKNOWN_ALGORITHM_TYPE); |
234 | goto err; | 234 | goto err; |
235 | } | 235 | } |