diff options
| author | tb <> | 2023-07-02 03:20:44 +0000 |
|---|---|---|
| committer | tb <> | 2023-07-02 03:20:44 +0000 |
| commit | 3456f0311e32b56262938ba7f5d1b6f51b457dfd (patch) | |
| tree | e112cefd2317a919f1c47469b863db070ca2c62c /src | |
| parent | 4d5cd8355cd485957101d02683ad1fd8c6d363c8 (diff) | |
| download | openbsd-3456f0311e32b56262938ba7f5d1b6f51b457dfd.tar.gz openbsd-3456f0311e32b56262938ba7f5d1b6f51b457dfd.tar.bz2 openbsd-3456f0311e32b56262938ba7f5d1b6f51b457dfd.zip | |
Invert method checks to avoid stupid line breaks
Diffstat (limited to 'src')
| -rw-r--r-- | src/lib/libcrypto/ecdsa/ecs_ossl.c | 48 |
1 files changed, 26 insertions, 22 deletions
diff --git a/src/lib/libcrypto/ecdsa/ecs_ossl.c b/src/lib/libcrypto/ecdsa/ecs_ossl.c index 251a938e2d..8614bf1968 100644 --- a/src/lib/libcrypto/ecdsa/ecs_ossl.c +++ b/src/lib/libcrypto/ecdsa/ecs_ossl.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: ecs_ossl.c,v 1.37 2023/06/25 19:33:39 tb Exp $ */ | 1 | /* $OpenBSD: ecs_ossl.c,v 1.38 2023/07/02 03:20:44 tb Exp $ */ |
| 2 | /* | 2 | /* |
| 3 | * Written by Nils Larsch for the OpenSSL project | 3 | * Written by Nils Larsch for the OpenSSL project |
| 4 | */ | 4 | */ |
| @@ -528,10 +528,11 @@ ECDSA_SIG * | |||
| 528 | ECDSA_do_sign_ex(const unsigned char *dgst, int dlen, const BIGNUM *kinv, | 528 | ECDSA_do_sign_ex(const unsigned char *dgst, int dlen, const BIGNUM *kinv, |
| 529 | const BIGNUM *rp, EC_KEY *eckey) | 529 | const BIGNUM *rp, EC_KEY *eckey) |
| 530 | { | 530 | { |
| 531 | if (eckey->meth->sign_sig != NULL) | 531 | if (eckey->meth->sign_sig == NULL) { |
| 532 | return eckey->meth->sign_sig(dgst, dlen, kinv, rp, eckey); | 532 | ECDSAerror(EVP_R_METHOD_NOT_SUPPORTED); |
| 533 | ECDSAerror(EVP_R_METHOD_NOT_SUPPORTED); | 533 | return 0; |
| 534 | return 0; | 534 | } |
| 535 | return eckey->meth->sign_sig(dgst, dlen, kinv, rp, eckey); | ||
| 535 | } | 536 | } |
| 536 | 537 | ||
| 537 | int | 538 | int |
| @@ -545,40 +546,43 @@ int | |||
| 545 | ECDSA_sign_ex(int type, const unsigned char *dgst, int dlen, unsigned char *sig, | 546 | ECDSA_sign_ex(int type, const unsigned char *dgst, int dlen, unsigned char *sig, |
| 546 | unsigned int *siglen, const BIGNUM *kinv, const BIGNUM *r, EC_KEY *eckey) | 547 | unsigned int *siglen, const BIGNUM *kinv, const BIGNUM *r, EC_KEY *eckey) |
| 547 | { | 548 | { |
| 548 | if (eckey->meth->sign != NULL) | 549 | if (eckey->meth->sign == NULL) { |
| 549 | return eckey->meth->sign(type, dgst, dlen, sig, siglen, kinv, r, eckey); | 550 | ECDSAerror(EVP_R_METHOD_NOT_SUPPORTED); |
| 550 | ECDSAerror(EVP_R_METHOD_NOT_SUPPORTED); | 551 | return 0; |
| 551 | return 0; | 552 | } |
| 553 | return eckey->meth->sign(type, dgst, dlen, sig, siglen, kinv, r, eckey); | ||
| 552 | } | 554 | } |
| 553 | 555 | ||
| 554 | int | 556 | int |
| 555 | ECDSA_sign_setup(EC_KEY *eckey, BN_CTX *ctx_in, BIGNUM **kinvp, BIGNUM **rp) | 557 | ECDSA_sign_setup(EC_KEY *eckey, BN_CTX *ctx_in, BIGNUM **kinvp, BIGNUM **rp) |
| 556 | { | 558 | { |
| 557 | if (eckey->meth->sign_setup != NULL) | 559 | if (eckey->meth->sign_setup == NULL) { |
| 558 | return eckey->meth->sign_setup(eckey, ctx_in, kinvp, rp); | 560 | ECDSAerror(EVP_R_METHOD_NOT_SUPPORTED); |
| 559 | ECDSAerror(EVP_R_METHOD_NOT_SUPPORTED); | 561 | return 0; |
| 560 | return 0; | 562 | } |
| 563 | return eckey->meth->sign_setup(eckey, ctx_in, kinvp, rp); | ||
| 561 | } | 564 | } |
| 562 | 565 | ||
| 563 | int | 566 | int |
| 564 | ECDSA_do_verify(const unsigned char *dgst, int dgst_len, const ECDSA_SIG *sig, | 567 | ECDSA_do_verify(const unsigned char *dgst, int dgst_len, const ECDSA_SIG *sig, |
| 565 | EC_KEY *eckey) | 568 | EC_KEY *eckey) |
| 566 | { | 569 | { |
| 567 | if (eckey->meth->verify_sig != NULL) | 570 | if (eckey->meth->verify_sig == NULL) { |
| 568 | return eckey->meth->verify_sig(dgst, dgst_len, sig, eckey); | 571 | ECDSAerror(EVP_R_METHOD_NOT_SUPPORTED); |
| 569 | ECDSAerror(EVP_R_METHOD_NOT_SUPPORTED); | 572 | return 0; |
| 570 | return 0; | 573 | } |
| 574 | return eckey->meth->verify_sig(dgst, dgst_len, sig, eckey); | ||
| 571 | } | 575 | } |
| 572 | 576 | ||
| 573 | int | 577 | int |
| 574 | ECDSA_verify(int type, const unsigned char *dgst, int dgst_len, | 578 | ECDSA_verify(int type, const unsigned char *dgst, int dgst_len, |
| 575 | const unsigned char *sigbuf, int sig_len, EC_KEY *eckey) | 579 | const unsigned char *sigbuf, int sig_len, EC_KEY *eckey) |
| 576 | { | 580 | { |
| 577 | if (eckey->meth->verify != NULL) | 581 | if (eckey->meth->verify == NULL) { |
| 578 | return eckey->meth->verify(type, dgst, dgst_len, | 582 | ECDSAerror(EVP_R_METHOD_NOT_SUPPORTED); |
| 579 | sigbuf, sig_len, eckey); | 583 | return 0; |
| 580 | ECDSAerror(EVP_R_METHOD_NOT_SUPPORTED); | 584 | } |
| 581 | return 0; | 585 | return eckey->meth->verify(type, dgst, dgst_len, sigbuf, sig_len, eckey); |
| 582 | } | 586 | } |
| 583 | 587 | ||
| 584 | int | 588 | int |
