summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto
diff options
context:
space:
mode:
authortb <>2023-06-15 13:44:38 +0000
committertb <>2023-06-15 13:44:38 +0000
commit9df878af0c73c86a47253280c64c30e5087aa3ec (patch)
tree81d74136a78908e89ad6cb40d450ea331e6f3c89 /src/lib/libcrypto
parentbe4d851ec5fb784684c4cb3bc82f3f4079381ebf (diff)
downloadopenbsd-9df878af0c73c86a47253280c64c30e5087aa3ec.tar.gz
openbsd-9df878af0c73c86a47253280c64c30e5087aa3ec.tar.bz2
openbsd-9df878af0c73c86a47253280c64c30e5087aa3ec.zip
Rename a few variables and other cosmetics
Rename buf_in into in, buf_out into out, use in_len and out_len for their lengths, drop a couple of silly casts and remove some empty lines. ok jsing
Diffstat (limited to 'src/lib/libcrypto')
-rw-r--r--src/lib/libcrypto/asn1/asn1_item.c44
1 files changed, 21 insertions, 23 deletions
diff --git a/src/lib/libcrypto/asn1/asn1_item.c b/src/lib/libcrypto/asn1/asn1_item.c
index b441ca8f33..fcf45a0fee 100644
--- a/src/lib/libcrypto/asn1/asn1_item.c
+++ b/src/lib/libcrypto/asn1/asn1_item.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: asn1_item.c,v 1.11 2023/06/15 13:32:18 tb Exp $ */ 1/* $OpenBSD: asn1_item.c,v 1.12 2023/06/15 13:44:38 tb Exp $ */
2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) 2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3 * All rights reserved. 3 * All rights reserved.
4 * 4 *
@@ -233,8 +233,8 @@ ASN1_item_sign_ctx(const ASN1_ITEM *it, X509_ALGOR *algor1, X509_ALGOR *algor2,
233{ 233{
234 const EVP_MD *type; 234 const EVP_MD *type;
235 EVP_PKEY *pkey; 235 EVP_PKEY *pkey;
236 unsigned char *buf_in = NULL, *buf_out = NULL; 236 unsigned char *in = NULL, *out = NULL;
237 size_t buf_out_len = 0; 237 size_t out_len = 0;
238 int in_len = 0; 238 int in_len = 0;
239 int signid, paramtype; 239 int signid, paramtype;
240 int rv = 2; 240 int rv = 2;
@@ -254,7 +254,7 @@ ASN1_item_sign_ctx(const ASN1_ITEM *it, X509_ALGOR *algor1, X509_ALGOR *algor2,
254 rv = pkey->ameth->item_sign(ctx, it, asn, algor1, algor2, 254 rv = pkey->ameth->item_sign(ctx, it, asn, algor1, algor2,
255 signature); 255 signature);
256 if (rv == 1) { 256 if (rv == 1) {
257 buf_out_len = signature->length; 257 out_len = signature->length;
258 goto done; 258 goto done;
259 } 259 }
260 /* Return value meanings: 260 /* Return value meanings:
@@ -295,33 +295,31 @@ ASN1_item_sign_ctx(const ASN1_ITEM *it, X509_ALGOR *algor1, X509_ALGOR *algor2,
295 295
296 } 296 }
297 297
298 if ((in_len = ASN1_item_i2d(asn, &buf_in, it)) <= 0) { 298 if ((in_len = ASN1_item_i2d(asn, &in, it)) <= 0) {
299 in_len = 0; 299 in_len = 0;
300 goto err; 300 goto err;
301 } 301 }
302 302
303 if (!EVP_DigestSign(ctx, NULL, &buf_out_len, buf_in, in_len)) { 303 if (!EVP_DigestSign(ctx, NULL, &out_len, in, in_len)) {
304 ASN1error(ERR_R_EVP_LIB); 304 ASN1error(ERR_R_EVP_LIB);
305 goto err; 305 goto err;
306 } 306 }
307 307 if ((out = calloc(1, out_len)) == NULL) {
308 if ((buf_out = calloc(1, buf_out_len)) == NULL) {
309 ASN1error(ERR_R_MALLOC_FAILURE); 308 ASN1error(ERR_R_MALLOC_FAILURE);
310 goto err; 309 goto err;
311 } 310 }
312 311 if (!EVP_DigestSign(ctx, out, &out_len, in, in_len)) {
313 if (!EVP_DigestSign(ctx, buf_out, &buf_out_len, buf_in, in_len)) {
314 ASN1error(ERR_R_EVP_LIB); 312 ASN1error(ERR_R_EVP_LIB);
315 goto err; 313 goto err;
316 } 314 }
317 315
318 if (buf_out_len > INT_MAX) { 316 if (out_len > INT_MAX) {
319 ASN1error(ASN1_R_TOO_LONG); 317 ASN1error(ASN1_R_TOO_LONG);
320 goto err; 318 goto err;
321 } 319 }
322 320
323 ASN1_STRING_set0(signature, buf_out, (int)buf_out_len); 321 ASN1_STRING_set0(signature, out, out_len);
324 buf_out = NULL; 322 out = NULL;
325 323
326 if (!asn1_abs_set_unused_bits(signature, 0)) { 324 if (!asn1_abs_set_unused_bits(signature, 0)) {
327 ASN1error(ERR_R_ASN1_LIB); 325 ASN1error(ERR_R_ASN1_LIB);
@@ -329,11 +327,11 @@ ASN1_item_sign_ctx(const ASN1_ITEM *it, X509_ALGOR *algor1, X509_ALGOR *algor2,
329 } 327 }
330 328
331 done: 329 done:
332 ret = (int)buf_out_len; 330 ret = out_len;
333 err: 331 err:
334 EVP_MD_CTX_cleanup(ctx); 332 EVP_MD_CTX_cleanup(ctx);
335 freezero(buf_in, in_len); 333 freezero(in, in_len);
336 freezero(buf_out, buf_out_len); 334 freezero(out, out_len);
337 335
338 return ret; 336 return ret;
339} 337}
@@ -343,10 +341,10 @@ ASN1_item_verify(const ASN1_ITEM *it, X509_ALGOR *a,
343 ASN1_BIT_STRING *signature, void *asn, EVP_PKEY *pkey) 341 ASN1_BIT_STRING *signature, void *asn, EVP_PKEY *pkey)
344{ 342{
345 EVP_MD_CTX ctx; 343 EVP_MD_CTX ctx;
346 unsigned char *buf_in = NULL; 344 unsigned char *in = NULL;
347 int ret = -1, inl;
348
349 int mdnid, pknid; 345 int mdnid, pknid;
346 int in_len = 0;
347 int ret = -1;
350 348
351 if (!pkey) { 349 if (!pkey) {
352 ASN1error(ERR_R_PASSED_NULL_PARAMETER); 350 ASN1error(ERR_R_PASSED_NULL_PARAMETER);
@@ -402,20 +400,20 @@ ASN1_item_verify(const ASN1_ITEM *it, X509_ALGOR *a,
402 400
403 } 401 }
404 402
405 inl = ASN1_item_i2d(asn, &buf_in, it); 403 in_len = ASN1_item_i2d(asn, &in, it);
406 404
407 if (buf_in == NULL) { 405 if (in == NULL) {
408 ASN1error(ERR_R_MALLOC_FAILURE); 406 ASN1error(ERR_R_MALLOC_FAILURE);
409 goto err; 407 goto err;
410 } 408 }
411 409
412 if (!EVP_DigestVerifyUpdate(&ctx, buf_in, inl)) { 410 if (!EVP_DigestVerifyUpdate(&ctx, in, in_len)) {
413 ASN1error(ERR_R_EVP_LIB); 411 ASN1error(ERR_R_EVP_LIB);
414 ret = 0; 412 ret = 0;
415 goto err; 413 goto err;
416 } 414 }
417 415
418 freezero(buf_in, (unsigned int)inl); 416 freezero(in, (unsigned int)in_len);
419 417
420 if (EVP_DigestVerifyFinal(&ctx, signature->data, 418 if (EVP_DigestVerifyFinal(&ctx, signature->data,
421 (size_t)signature->length) <= 0) { 419 (size_t)signature->length) <= 0) {