diff options
| author | tb <> | 2021-05-14 18:03:42 +0000 |
|---|---|---|
| committer | tb <> | 2021-05-14 18:03:42 +0000 |
| commit | ef9d8bd13ca04028d27714bedb7b235bc28a7725 (patch) | |
| tree | bc5c58e34adc52430963331e2a05b2822ff6f493 /src | |
| parent | 2979016a711eb6b14fbb8d36ef422d4925ad4b5b (diff) | |
| download | openbsd-ef9d8bd13ca04028d27714bedb7b235bc28a7725.tar.gz openbsd-ef9d8bd13ca04028d27714bedb7b235bc28a7725.tar.bz2 openbsd-ef9d8bd13ca04028d27714bedb7b235bc28a7725.zip | |
whitespace/KNF
Diffstat (limited to 'src')
| -rw-r--r-- | src/lib/libcrypto/rsa/rsa_sign.c | 8 |
1 files changed, 4 insertions, 4 deletions
diff --git a/src/lib/libcrypto/rsa/rsa_sign.c b/src/lib/libcrypto/rsa/rsa_sign.c index 50e07f4f1e..d205046bd3 100644 --- a/src/lib/libcrypto/rsa/rsa_sign.c +++ b/src/lib/libcrypto/rsa/rsa_sign.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: rsa_sign.c,v 1.31 2018/09/05 00:55:33 djm Exp $ */ | 1 | /* $OpenBSD: rsa_sign.c,v 1.32 2021/05/14 18:03:42 tb Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -108,7 +108,7 @@ encode_pkcs1(unsigned char **out, int *out_len, int type, | |||
| 108 | sig.algor->parameter = ¶meter; | 108 | sig.algor->parameter = ¶meter; |
| 109 | 109 | ||
| 110 | sig.digest = &digest; | 110 | sig.digest = &digest; |
| 111 | sig.digest->data = (unsigned char*)m; /* TMP UGLY CAST */ | 111 | sig.digest->data = (unsigned char *)m; /* TMP UGLY CAST */ |
| 112 | sig.digest->length = m_len; | 112 | sig.digest->length = m_len; |
| 113 | 113 | ||
| 114 | if ((len = i2d_X509_SIG(&sig, &der)) < 0) | 114 | if ((len = i2d_X509_SIG(&sig, &der)) < 0) |
| @@ -194,7 +194,7 @@ int_rsa_verify(int type, const unsigned char *m, unsigned int m_len, | |||
| 194 | if ((decrypt_len = RSA_public_decrypt((int)siglen, sigbuf, decrypt_buf, | 194 | if ((decrypt_len = RSA_public_decrypt((int)siglen, sigbuf, decrypt_buf, |
| 195 | rsa, RSA_PKCS1_PADDING)) <= 0) | 195 | rsa, RSA_PKCS1_PADDING)) <= 0) |
| 196 | goto err; | 196 | goto err; |
| 197 | 197 | ||
| 198 | if (type == NID_md5_sha1) { | 198 | if (type == NID_md5_sha1) { |
| 199 | /* | 199 | /* |
| 200 | * NID_md5_sha1 corresponds to the MD5/SHA1 combination in | 200 | * NID_md5_sha1 corresponds to the MD5/SHA1 combination in |
| @@ -229,7 +229,7 @@ int_rsa_verify(int type, const unsigned char *m, unsigned int m_len, | |||
| 229 | if (rm != NULL) { | 229 | if (rm != NULL) { |
| 230 | const EVP_MD *md; | 230 | const EVP_MD *md; |
| 231 | 231 | ||
| 232 | if ((md = EVP_get_digestbynid(type)) == NULL) { | 232 | if ((md = EVP_get_digestbynid(type)) == NULL) { |
| 233 | RSAerror(RSA_R_UNKNOWN_ALGORITHM_TYPE); | 233 | RSAerror(RSA_R_UNKNOWN_ALGORITHM_TYPE); |
| 234 | goto err; | 234 | goto err; |
| 235 | } | 235 | } |
