diff options
-rw-r--r-- | src/lib/libcrypto/ec/ecx_methods.c | 10 |
1 files changed, 5 insertions, 5 deletions
diff --git a/src/lib/libcrypto/ec/ecx_methods.c b/src/lib/libcrypto/ec/ecx_methods.c index 8510d1a471..cc757d31b4 100644 --- a/src/lib/libcrypto/ec/ecx_methods.c +++ b/src/lib/libcrypto/ec/ecx_methods.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: ecx_methods.c,v 1.5 2023/03/15 06:34:07 tb Exp $ */ | 1 | /* $OpenBSD: ecx_methods.c,v 1.6 2023/07/02 15:02:52 tb Exp $ */ |
2 | /* | 2 | /* |
3 | * Copyright (c) 2022 Joel Sing <jsing@openbsd.org> | 3 | * Copyright (c) 2022 Joel Sing <jsing@openbsd.org> |
4 | * | 4 | * |
@@ -683,11 +683,11 @@ ecx_item_verify(EVP_MD_CTX *md_ctx, const ASN1_ITEM *it, void *asn, | |||
683 | 683 | ||
684 | if (nid != NID_ED25519 || param_type != V_ASN1_UNDEF) { | 684 | if (nid != NID_ED25519 || param_type != V_ASN1_UNDEF) { |
685 | ECerror(EC_R_INVALID_ENCODING); | 685 | ECerror(EC_R_INVALID_ENCODING); |
686 | return 0; | 686 | return -1; |
687 | } | 687 | } |
688 | 688 | ||
689 | if (!EVP_DigestVerifyInit(md_ctx, NULL, NULL, NULL, pkey)) | 689 | if (!EVP_DigestVerifyInit(md_ctx, NULL, NULL, NULL, pkey)) |
690 | return 0; | 690 | return -1; |
691 | 691 | ||
692 | return 2; | 692 | return 2; |
693 | } | 693 | } |
@@ -757,9 +757,9 @@ pkey_ecx_digestverify(EVP_MD_CTX *md_ctx, const unsigned char *sig, | |||
757 | ecx_key = pkey_ctx->pkey->pkey.ecx; | 757 | ecx_key = pkey_ctx->pkey->pkey.ecx; |
758 | 758 | ||
759 | if (ecx_key == NULL || ecx_key->pub_key == NULL) | 759 | if (ecx_key == NULL || ecx_key->pub_key == NULL) |
760 | return 0; | 760 | return -1; |
761 | if (sig_len != ecx_sig_size(pkey_ctx->pkey)) | 761 | if (sig_len != ecx_sig_size(pkey_ctx->pkey)) |
762 | return 0; | 762 | return -1; |
763 | 763 | ||
764 | return ED25519_verify(message, message_len, sig, ecx_key->pub_key); | 764 | return ED25519_verify(message, message_len, sig, ecx_key->pub_key); |
765 | } | 765 | } |