KNF.
authorjsing <jsing@openbsd.org>
Thu, 8 May 2014 15:42:26 +0000 (15:42 +0000)
committerjsing <jsing@openbsd.org>
Thu, 8 May 2014 15:42:26 +0000 (15:42 +0000)
14 files changed:
lib/libcrypto/evp/evp_acnf.c
lib/libcrypto/evp/evp_enc.c
lib/libcrypto/evp/evp_err.c
lib/libcrypto/evp/evp_key.c
lib/libcrypto/evp/evp_lib.c
lib/libcrypto/evp/evp_pbe.c
lib/libcrypto/evp/evp_pkey.c
lib/libssl/src/crypto/evp/evp_acnf.c
lib/libssl/src/crypto/evp/evp_enc.c
lib/libssl/src/crypto/evp/evp_err.c
lib/libssl/src/crypto/evp/evp_key.c
lib/libssl/src/crypto/evp/evp_lib.c
lib/libssl/src/crypto/evp/evp_pbe.c
lib/libssl/src/crypto/evp/evp_pkey.c

index 643a186..afbbc39 100644 (file)
@@ -10,7 +10,7 @@
  * are met:
  *
  * 1. Redistributions of source code must retain the above copyright
- *    notice, this list of conditions and the following disclaimer. 
+ *    notice, this list of conditions and the following disclaimer.
  *
  * 2. Redistributions in binary form must reproduce the above copyright
  *    notice, this list of conditions and the following disclaimer in
 #include <openssl/evp.h>
 #include <openssl/conf.h>
 
-
 /* Load all algorithms and configure OpenSSL.
  * This function is called automatically when
  * OPENSSL_LOAD_CONF is set.
  */
 
-void OPENSSL_add_all_algorithms_conf(void)
-       {
+void
+OPENSSL_add_all_algorithms_conf(void)
+{
        OPENSSL_add_all_algorithms_noconf();
        OPENSSL_config(NULL);
-       }
+}
index e8ca502..0c3e8fc 100644 (file)
@@ -5,21 +5,21 @@
  * This package is an SSL implementation written
  * by Eric Young (eay@cryptsoft.com).
  * The implementation was written so as to conform with Netscapes SSL.
- * 
+ *
  * This library is free for commercial and non-commercial use as long as
  * the following conditions are aheared to.  The following conditions
  * apply to all code found in this distribution, be it the RC4, RSA,
  * lhash, DES, etc., code; not just the SSL code.  The SSL documentation
  * included with this distribution is covered by the same copyright terms
  * except that the holder is Tim Hudson (tjh@cryptsoft.com).
- * 
+ *
  * Copyright remains Eric Young's, and as such any Copyright notices in
  * the code are not to be removed.
  * If this package is used in a product, Eric Young should be given attribution
  * as the author of the parts of the library used.
  * This can be in the form of a textual message at program startup or
  * in documentation (online or textual) provided with the package.
- * 
+ *
  * Redistribution and use in source and binary forms, with or without
  * modification, are permitted provided that the following conditions
  * are met:
  *     Eric Young (eay@cryptsoft.com)"
  *    The word 'cryptographic' can be left out if the rouines from the library
  *    being used are not cryptographic related :-).
- * 4. If you include any Windows specific code (or a derivative thereof) from 
+ * 4. If you include any Windows specific code (or a derivative thereof) from
  *    the apps directory (application code) you must include an acknowledgement:
  *    "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
- * 
+ *
  * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
@@ -49,7 +49,7 @@
  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
  * SUCH DAMAGE.
- * 
+ *
  * The licence and distribution terms for any publically available version or
  * derivative of this code cannot be changed.  i.e. this code cannot simply be
  * copied and put under another distribution licence
 
 #define M_do_cipher(ctx, out, in, inl) ctx->cipher->do_cipher(ctx, out, in, inl)
 
-const char EVP_version[]="EVP" OPENSSL_VERSION_PTEXT;
+const char EVP_version[] = "EVP" OPENSSL_VERSION_PTEXT;
 
-void EVP_CIPHER_CTX_init(EVP_CIPHER_CTX *ctx)
-       {
-       memset(ctx,0,sizeof(EVP_CIPHER_CTX));
+void
+EVP_CIPHER_CTX_init(EVP_CIPHER_CTX *ctx)
+{
+       memset(ctx, 0, sizeof(EVP_CIPHER_CTX));
        /* ctx->cipher=NULL; */
-       }
+}
 
-EVP_CIPHER_CTX *EVP_CIPHER_CTX_new(void)
-       {
-       EVP_CIPHER_CTX *ctx=malloc(sizeof *ctx);
+EVP_CIPHER_CTX *
+EVP_CIPHER_CTX_new(void)
+{
+       EVP_CIPHER_CTX *ctx = malloc(sizeof *ctx);
        if (ctx)
                EVP_CIPHER_CTX_init(ctx);
        return ctx;
-       }
+}
 
-int EVP_CipherInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher,
-            const unsigned char *key, const unsigned char *iv, int enc)
-       {
+int
+EVP_CipherInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher,
+    const unsigned char *key, const unsigned char *iv, int enc)
+{
        if (cipher)
                EVP_CIPHER_CTX_init(ctx);
-       return EVP_CipherInit_ex(ctx,cipher,NULL,key,iv,enc);
-       }
+       return EVP_CipherInit_ex(ctx, cipher, NULL, key, iv, enc);
+}
 
-int EVP_CipherInit_ex(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, ENGINE *impl,
-            const unsigned char *key, const unsigned char *iv, int enc)
-       {
+int
+EVP_CipherInit_ex(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, ENGINE *impl,
+    const unsigned char *key, const unsigned char *iv, int enc)
+{
        if (enc == -1)
                enc = ctx->encrypt;
-       else
-               {
+       else {
                if (enc)
                        enc = 1;
                ctx->encrypt = enc;
-               }
+       }
 #ifndef OPENSSL_NO_ENGINE
        /* Whether it's nice or not, "Inits" can be used on "Final"'d contexts
         * so this context may already have an ENGINE! Try to avoid releasing
         * the previous handle, re-querying for an ENGINE, and having a
         * reinitialisation, when it may all be unecessary. */
-       if (ctx->engine && ctx->cipher && (!cipher ||
-                       (cipher && (cipher->nid == ctx->cipher->nid))))
+       if (ctx->engine && ctx->cipher &&
+           (!cipher || (cipher && (cipher->nid == ctx->cipher->nid))))
                goto skip_to_init;
 #endif
-       if (cipher)
-               {
+       if (cipher) {
                /* Ensure a context left lying around from last time is cleared
                 * (the previous check attempted to avoid this if the same
                 * ENGINE and EVP_CIPHER could be used). */
-               if (ctx->cipher)
-                       {
+               if (ctx->cipher) {
                        unsigned long flags = ctx->flags;
                        EVP_CIPHER_CTX_cleanup(ctx);
                        /* Restore encrypt and flags */
                        ctx->encrypt = enc;
                        ctx->flags = flags;
-                       }
+               }
 #ifndef OPENSSL_NO_ENGINE
-               if(impl)
-                       {
-                       if (!ENGINE_init(impl))
-                               {
-                               EVPerr(EVP_F_EVP_CIPHERINIT_EX, EVP_R_INITIALIZATION_ERROR);
+               if (impl) {
+                       if (!ENGINE_init(impl)) {
+                               EVPerr(EVP_F_EVP_CIPHERINIT_EX,
+                                   EVP_R_INITIALIZATION_ERROR);
                                return 0;
-                               }
                        }
-               else
+               else
                        /* Ask if an ENGINE is reserved for this job */
                        impl = ENGINE_get_cipher_engine(cipher->nid);
-               if(impl)
-                       {
+               if (impl) {
                        /* There's an ENGINE for this job ... (apparently) */
-                       const EVP_CIPHER *c = ENGINE_get_cipher(impl, cipher->nid);
-                       if(!c)
-                               {
+                       const EVP_CIPHER *c =
+                           ENGINE_get_cipher(impl, cipher->nid);
+                       if (!c) {
                                /* One positive side-effect of US's export
                                 * control history, is that we should at least
                                 * be able to avoid using US mispellings of
                                 * "initialisation"? */
-                               EVPerr(EVP_F_EVP_CIPHERINIT_EX, EVP_R_INITIALIZATION_ERROR);
+                               EVPerr(EVP_F_EVP_CIPHERINIT_EX,
+                                   EVP_R_INITIALIZATION_ERROR);
                                return 0;
-                               }
+                       }
                        /* We'll use the ENGINE's private cipher definition */
                        cipher = c;
                        /* Store the ENGINE functional reference so we know
                         * 'cipher' came from an ENGINE and we need to release
                         * it when done. */
                        ctx->engine = impl;
-                       }
-               else
+               } else
                        ctx->engine = NULL;
 #endif
 
-               ctx->cipher=cipher;
-               if (ctx->cipher->ctx_size)
-                       {
-                       ctx->cipher_data=malloc(ctx->cipher->ctx_size);
-                       if (!ctx->cipher_data)
-                               {
-                               EVPerr(EVP_F_EVP_CIPHERINIT_EX, ERR_R_MALLOC_FAILURE);
+               ctx->cipher = cipher;
+               if (ctx->cipher->ctx_size) {
+                       ctx->cipher_data = malloc(ctx->cipher->ctx_size);
+                       if (!ctx->cipher_data) {
+                               EVPerr(EVP_F_EVP_CIPHERINIT_EX,
+                                   ERR_R_MALLOC_FAILURE);
                                return 0;
-                               }
                        }
-               else
-                       {
+               } else {
                        ctx->cipher_data = NULL;
-                       }
+               }
                ctx->key_len = cipher->key_len;
                ctx->flags = 0;
-               if(ctx->cipher->flags & EVP_CIPH_CTRL_INIT)
-                       {
-                       if(!EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_INIT, 0, NULL))
-                               {
-                               EVPerr(EVP_F_EVP_CIPHERINIT_EX, EVP_R_INITIALIZATION_ERROR);
+               if (ctx->cipher->flags & EVP_CIPH_CTRL_INIT) {
+                       if (!EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_INIT, 0, NULL)) {
+                               EVPerr(EVP_F_EVP_CIPHERINIT_EX,
+                                   EVP_R_INITIALIZATION_ERROR);
                                return 0;
-                               }
                        }
                }
-       else if(!ctx->cipher)
-               {
+       } else if (!ctx->cipher) {
                EVPerr(EVP_F_EVP_CIPHERINIT_EX, EVP_R_NO_CIPHER_SET);
                return 0;
-               }
+       }
 #ifndef OPENSSL_NO_ENGINE
 skip_to_init:
 #endif
        /* we assume block size is a power of 2 in *cryptUpdate */
-       OPENSSL_assert(ctx->cipher->block_size == 1
-           || ctx->cipher->block_size == 8
-           || ctx->cipher->block_size == 16);
+       OPENSSL_assert(ctx->cipher->block_size == 1 ||
+           ctx->cipher->block_size == 8 ||
+           ctx->cipher->block_size == 16);
 
-       if(!(EVP_CIPHER_CTX_flags(ctx) & EVP_CIPH_CUSTOM_IV)) {
-               switch(EVP_CIPHER_CTX_mode(ctx)) {
+       if (!(EVP_CIPHER_CTX_flags(ctx) & EVP_CIPH_CUSTOM_IV)) {
+               switch (EVP_CIPHER_CTX_mode(ctx)) {
 
-                       case EVP_CIPH_STREAM_CIPHER:
-                       case EVP_CIPH_ECB_MODE:
+               case EVP_CIPH_STREAM_CIPHER:
+               case EVP_CIPH_ECB_MODE:
                        break;
 
-                       case EVP_CIPH_CFB_MODE:
-                       case EVP_CIPH_OFB_MODE:
+               case EVP_CIPH_CFB_MODE:
+               case EVP_CIPH_OFB_MODE:
 
                        ctx->num = 0;
                        /* fall-through */
 
-                       case EVP_CIPH_CBC_MODE:
+               case EVP_CIPH_CBC_MODE:
 
                        OPENSSL_assert(EVP_CIPHER_CTX_iv_length(ctx) <=
-                                       (int)sizeof(ctx->iv));
-                       if(iv) memcpy(ctx->oiv, iv, EVP_CIPHER_CTX_iv_length(ctx));
-                       memcpy(ctx->iv, ctx->oiv, EVP_CIPHER_CTX_iv_length(ctx));
+                           (int)sizeof(ctx->iv));
+                       if (iv)
+                               memcpy(ctx->oiv, iv,
+                                   EVP_CIPHER_CTX_iv_length(ctx));
+                       memcpy(ctx->iv, ctx->oiv,
+                           EVP_CIPHER_CTX_iv_length(ctx));
                        break;
 
-                       case EVP_CIPH_CTR_MODE:
+               case EVP_CIPH_CTR_MODE:
                        ctx->num = 0;
                        /* Don't reuse IV for CTR mode */
-                       if(iv)
-                               memcpy(ctx->iv, iv, EVP_CIPHER_CTX_iv_length(ctx));
+                       if (iv)
+                               memcpy(ctx->iv, iv,
+                                   EVP_CIPHER_CTX_iv_length(ctx));
                        break;
 
-                       default:
+               default:
                        return 0;
                        break;
                }
        }
 
-       if(key || (ctx->cipher->flags & EVP_CIPH_ALWAYS_CALL_INIT)) {
-               if(!ctx->cipher->init(ctx,key,iv,enc)) return 0;
+       if (key || (ctx->cipher->flags & EVP_CIPH_ALWAYS_CALL_INIT)) {
+               if (!ctx->cipher->init(ctx, key, iv, enc))
+                       return 0;
        }
-       ctx->buf_len=0;
-       ctx->final_used=0;
-       ctx->block_mask=ctx->cipher->block_size-1;
+       ctx->buf_len = 0;
+       ctx->final_used = 0;
+       ctx->block_mask = ctx->cipher->block_size - 1;
        return 1;
-       }
+}
 
-int EVP_CipherUpdate(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl,
-            const unsigned char *in, int inl)
-       {
+int
+EVP_CipherUpdate(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl,
+    const unsigned char *in, int inl)
+{
        if (ctx->encrypt)
-               return EVP_EncryptUpdate(ctx,out,outl,in,inl);
-       else    return EVP_DecryptUpdate(ctx,out,outl,in,inl);
-       }
+               return EVP_EncryptUpdate(ctx, out, outl, in, inl);
+       else
+               return EVP_DecryptUpdate(ctx, out, outl, in, inl);
+}
 
-int EVP_CipherFinal_ex(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl)
-       {
+int
+EVP_CipherFinal_ex(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl)
+{
        if (ctx->encrypt)
-               return EVP_EncryptFinal_ex(ctx,out,outl);
-       else    return EVP_DecryptFinal_ex(ctx,out,outl);
-       }
+               return EVP_EncryptFinal_ex(ctx, out, outl);
+       else
+               return EVP_DecryptFinal_ex(ctx, out, outl);
+}
 
-int EVP_CipherFinal(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl)
-       {
+int
+EVP_CipherFinal(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl)
+{
        if (ctx->encrypt)
-               return EVP_EncryptFinal(ctx,out,outl);
-       else    return EVP_DecryptFinal(ctx,out,outl);
-       }
+               return EVP_EncryptFinal(ctx, out, outl);
+       else
+               return EVP_DecryptFinal(ctx, out, outl);
+}
 
-int EVP_EncryptInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher,
-            const unsigned char *key, const unsigned char *iv)
-       {
+int
+EVP_EncryptInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher,
+    const unsigned char *key, const unsigned char *iv)
+{
        return EVP_CipherInit(ctx, cipher, key, iv, 1);
-       }
+}
 
-int EVP_EncryptInit_ex(EVP_CIPHER_CTX *ctx,const EVP_CIPHER *cipher, ENGINE *impl,
-               const unsigned char *key, const unsigned char *iv)
-       {
+int
+EVP_EncryptInit_ex(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, ENGINE *impl,
+    const unsigned char *key, const unsigned char *iv)
+{
        return EVP_CipherInit_ex(ctx, cipher, impl, key, iv, 1);
-       }
+}
 
-int EVP_DecryptInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher,
-            const unsigned char *key, const unsigned char *iv)
-       {
+int
+EVP_DecryptInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher,
+    const unsigned char *key, const unsigned char *iv)
+{
        return EVP_CipherInit(ctx, cipher, key, iv, 0);
-       }
+}
 
-int EVP_DecryptInit_ex(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, ENGINE *impl,
-            const unsigned char *key, const unsigned char *iv)
-       {
+int
+EVP_DecryptInit_ex(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, ENGINE *impl,
+    const unsigned char *key, const unsigned char *iv)
+{
        return EVP_CipherInit_ex(ctx, cipher, impl, key, iv, 0);
-       }
+}
 
-int EVP_EncryptUpdate(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl,
-            const unsigned char *in, int inl)
-       {
-       int i,j,bl;
+int
+EVP_EncryptUpdate(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl,
+    const unsigned char *in, int inl)
+{
+       int i, j, bl;
 
-       if (ctx->cipher->flags & EVP_CIPH_FLAG_CUSTOM_CIPHER)
-               {
+       if (ctx->cipher->flags & EVP_CIPH_FLAG_CUSTOM_CIPHER) {
                i = M_do_cipher(ctx, out, in, inl);
                if (i < 0)
                        return 0;
                else
                        *outl = i;
                return 1;
-               }
+       }
 
-       if (inl <= 0)
-               {
+       if (inl <= 0) {
                *outl = 0;
                return inl == 0;
-               }
+       }
 
-       if(ctx->buf_len == 0 && (inl&(ctx->block_mask)) == 0)
-               {
-               if(M_do_cipher(ctx,out,in,inl))
-                       {
-                       *outl=inl;
+       if (ctx->buf_len == 0 && (inl&(ctx->block_mask)) == 0) {
+               if (M_do_cipher(ctx, out, in, inl)) {
+                       *outl = inl;
                        return 1;
-                       }
-               else
-                       {
-                       *outl=0;
+               } else {
+                       *outl = 0;
                        return 0;
-                       }
                }
-       i=ctx->buf_len;
-       bl=ctx->cipher->block_size;
+       }
+       i = ctx->buf_len;
+       bl = ctx->cipher->block_size;
        OPENSSL_assert(bl <= (int)sizeof(ctx->buf));
-       if (i != 0)
-               {
-               if (i+inl < bl)
-                       {
-                       memcpy(&(ctx->buf[i]),in,inl);
-                       ctx->buf_len+=inl;
-                       *outl=0;
+       if (i != 0) {
+               if (i + inl < bl) {
+                       memcpy(&(ctx->buf[i]), in, inl);
+                       ctx->buf_len += inl;
+                       *outl = 0;
                        return 1;
-                       }
-               else
-                       {
-                       j=bl-i;
-                       memcpy(&(ctx->buf[i]),in,j);
-                       if(!M_do_cipher(ctx,out,ctx->buf,bl)) return 0;
-                       inl-=j;
-                       in+=j;
-                       out+=bl;
-                       *outl=bl;
-                       }
+               } else {
+                       j = bl - i;
+                       memcpy(&(ctx->buf[i]), in, j);
+                       if (!M_do_cipher(ctx, out, ctx->buf, bl))
+                               return 0;
+                       inl -= j;
+                       in += j;
+                       out += bl;
+                       *outl = bl;
                }
-       else
+       else
                *outl = 0;
-       i=inl&(bl-1);
-       inl-=i;
-       if (inl > 0)
-               {
-               if(!M_do_cipher(ctx,out,in,inl)) return 0;
-               *outl+=inl;
-               }
+       i = inl&(bl - 1);
+       inl -= i;
+       if (inl > 0) {
+               if (!M_do_cipher(ctx, out, in, inl))
+                       return 0;
+               *outl += inl;
+       }
 
        if (i != 0)
-               memcpy(ctx->buf,&(in[inl]),i);
-       ctx->buf_len=i;
+               memcpy(ctx->buf, &(in[inl]), i);
+       ctx->buf_len = i;
        return 1;
-       }
+}
 
-int EVP_EncryptFinal(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl)
-       {
+int
+EVP_EncryptFinal(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl)
+{
        int ret;
+
        ret = EVP_EncryptFinal_ex(ctx, out, outl);
        return ret;
-       }
+}
 
-int EVP_EncryptFinal_ex(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl)
-       {
-       int n,ret;
+int
+EVP_EncryptFinal_ex(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl)
+{
+       int n, ret;
        unsigned int i, b, bl;
 
-       if (ctx->cipher->flags & EVP_CIPH_FLAG_CUSTOM_CIPHER)
-               {
+       if (ctx->cipher->flags & EVP_CIPH_FLAG_CUSTOM_CIPHER) {
                ret = M_do_cipher(ctx, out, NULL, 0);
                if (ret < 0)
                        return 0;
-               else 
+               else
                        *outl = ret;
                return 1;
-               }
+       }
 
-       b=ctx->cipher->block_size;
+       b = ctx->cipher->block_size;
        OPENSSL_assert(b <= sizeof ctx->buf);
-       if (b == 1)
-               {
-               *outl=0;
+       if (b == 1) {
+               *outl = 0;
                return 1;
-               }
-       bl=ctx->buf_len;
-       if (ctx->flags & EVP_CIPH_NO_PADDING)
-               {
-               if(bl)
-                       {
-                       EVPerr(EVP_F_EVP_ENCRYPTFINAL_EX,EVP_R_DATA_NOT_MULTIPLE_OF_BLOCK_LENGTH);
+       }
+       bl = ctx->buf_len;
+       if (ctx->flags & EVP_CIPH_NO_PADDING) {
+               if (bl) {
+                       EVPerr(EVP_F_EVP_ENCRYPTFINAL_EX,
+                           EVP_R_DATA_NOT_MULTIPLE_OF_BLOCK_LENGTH);
                        return 0;
-                       }
+               }
                *outl = 0;
                return 1;
-               }
+       }
 
-       n=b-bl;
-       for (i=bl; i<b; i++)
-               ctx->buf[i]=n;
-       ret=M_do_cipher(ctx,out,ctx->buf,b);
+       n = b - bl;
+       for (i = bl; i < b; i++)
+               ctx->buf[i] = n;
+       ret = M_do_cipher(ctx, out, ctx->buf, b);
 
 
-       if(ret)
-               *outl=b;
+       if (ret)
+               *outl = b;
 
        return ret;
-       }
+}
 
-int EVP_DecryptUpdate(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl,
-            const unsigned char *in, int inl)
-       {
+int
+EVP_DecryptUpdate(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl,
+    const unsigned char *in, int inl)
+{
        int fix_len;
        unsigned int b;
 
-       if (ctx->cipher->flags & EVP_CIPH_FLAG_CUSTOM_CIPHER)
-               {
+       if (ctx->cipher->flags & EVP_CIPH_FLAG_CUSTOM_CIPHER) {
                fix_len = M_do_cipher(ctx, out, in, inl);
-               if (fix_len < 0)
-                       {
+               if (fix_len < 0) {
                        *outl = 0;
                        return 0;
-                       }
-               else
+               } else
                        *outl = fix_len;
                return 1;
-               }
+       }
 
-       if (inl <= 0)
-               {
+       if (inl <= 0) {
                *outl = 0;
                return inl == 0;
-               }
+       }
 
        if (ctx->flags & EVP_CIPH_NO_PADDING)
                return EVP_EncryptUpdate(ctx, out, outl, in, inl);
 
-       b=ctx->cipher->block_size;
+       b = ctx->cipher->block_size;
        OPENSSL_assert(b <= sizeof ctx->final);
 
-       if(ctx->final_used)
-               {
-               memcpy(out,ctx->final,b);
-               out+=b;
+       if (ctx->final_used) {
+               memcpy(out, ctx->final, b);
+               out += b;
                fix_len = 1;
-               }
-       else
+       } else
                fix_len = 0;
 
 
-       if(!EVP_EncryptUpdate(ctx,out,outl,in,inl))
+       if (!EVP_EncryptUpdate(ctx, out, outl, in, inl))
                return 0;
 
        /* if we have 'decrypted' a multiple of block size, make sure
         * we have a copy of this last block */
-       if (b > 1 && !ctx->buf_len)
-               {
-               *outl-=b;
-               ctx->final_used=1;
-               memcpy(ctx->final,&out[*outl],b);
-               }
-       else
+       if (b > 1 && !ctx->buf_len) {
+               *outl -= b;
+               ctx->final_used = 1;
+               memcpy(ctx->final, &out[*outl], b);
+       } else
                ctx->final_used = 0;
 
        if (fix_len)
                *outl += b;
-               
+
        return 1;
-       }
+}
 
-int EVP_DecryptFinal(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl)
-       {
+int
+EVP_DecryptFinal(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl)
+{
        int ret;
+
        ret = EVP_DecryptFinal_ex(ctx, out, outl);
        return ret;
-       }
+}
 
-int EVP_DecryptFinal_ex(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl)
-       {
-       int i,n;
+int
+EVP_DecryptFinal_ex(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl)
+{
+       int i, n;
        unsigned int b;
-       *outl=0;
+       *outl = 0;
 
-       if (ctx->cipher->flags & EVP_CIPH_FLAG_CUSTOM_CIPHER)
-               {
+       if (ctx->cipher->flags & EVP_CIPH_FLAG_CUSTOM_CIPHER) {
                i = M_do_cipher(ctx, out, NULL, 0);
                if (i < 0)
                        return 0;
                else
                        *outl = i;
                return 1;
-               }
+       }
 
-       b=ctx->cipher->block_size;
-       if (ctx->flags & EVP_CIPH_NO_PADDING)
-               {
-               if(ctx->buf_len)
-                       {
-                       EVPerr(EVP_F_EVP_DECRYPTFINAL_EX,EVP_R_DATA_NOT_MULTIPLE_OF_BLOCK_LENGTH);
+       b = ctx->cipher->block_size;
+       if (ctx->flags & EVP_CIPH_NO_PADDING) {
+               if (ctx->buf_len) {
+                       EVPerr(EVP_F_EVP_DECRYPTFINAL_EX,
+                           EVP_R_DATA_NOT_MULTIPLE_OF_BLOCK_LENGTH);
                        return 0;
-                       }
+               }
                *outl = 0;
                return 1;
+       }
+       if (b > 1) {
+               if (ctx->buf_len || !ctx->final_used) {
+                       EVPerr(EVP_F_EVP_DECRYPTFINAL_EX,
+                           EVP_R_WRONG_FINAL_BLOCK_LENGTH);
+                       return (0);
                }
-       if (b > 1)
-               {
-               if (ctx->buf_len || !ctx->final_used)
-                       {
-                       EVPerr(EVP_F_EVP_DECRYPTFINAL_EX,EVP_R_WRONG_FINAL_BLOCK_LENGTH);
-                       return(0);
-                       }
                OPENSSL_assert(b <= sizeof ctx->final);
-               n=ctx->final[b-1];
-               if (n == 0 || n > (int)b)
-                       {
-                       EVPerr(EVP_F_EVP_DECRYPTFINAL_EX,EVP_R_BAD_DECRYPT);
-                       return(0);
-                       }
-               for (i=0; i<n; i++)
-                       {
-                       if (ctx->final[--b] != n)
-                               {
-                               EVPerr(EVP_F_EVP_DECRYPTFINAL_EX,EVP_R_BAD_DECRYPT);
-                               return(0);
-                               }
+               n = ctx->final[b - 1];
+               if (n == 0 || n > (int)b) {
+                       EVPerr(EVP_F_EVP_DECRYPTFINAL_EX, EVP_R_BAD_DECRYPT);
+                       return (0);
+               }
+               for (i = 0; i < n; i++) {
+                       if (ctx->final[--b] != n) {
+                               EVPerr(EVP_F_EVP_DECRYPTFINAL_EX,
+                                   EVP_R_BAD_DECRYPT);
+                               return (0);
                        }
-               n=ctx->cipher->block_size-n;
-               for (i=0; i<n; i++)
-                       out[i]=ctx->final[i];
-               *outl=n;
                }
-       else
-               *outl=0;
-       return(1);
-       }
+               n = ctx->cipher->block_size - n;
+               for (i = 0; i < n; i++)
+                       out[i] = ctx->final[i];
+               *outl = n;
+       } else
+               *outl = 0;
+       return (1);
+}
 
-void EVP_CIPHER_CTX_free(EVP_CIPHER_CTX *ctx)
-       {
-       if (ctx)
-               {
+void
+EVP_CIPHER_CTX_free(EVP_CIPHER_CTX *ctx)
+{
+       if (ctx) {
                EVP_CIPHER_CTX_cleanup(ctx);
                free(ctx);
-               }
        }
+}
 
-int EVP_CIPHER_CTX_cleanup(EVP_CIPHER_CTX *c)
-       {
-       if (c->cipher != NULL)
-               {
-               if(c->cipher->cleanup && !c->cipher->cleanup(c))
+int
+EVP_CIPHER_CTX_cleanup(EVP_CIPHER_CTX *c)
+{
+       if (c->cipher != NULL) {
+               if (c->cipher->cleanup && !c->cipher->cleanup(c))
                        return 0;
                /* Cleanse cipher context data */
                if (c->cipher_data)
                        OPENSSL_cleanse(c->cipher_data, c->cipher->ctx_size);
-               }
+       }
        if (c->cipher_data)
                free(c->cipher_data);
 #ifndef OPENSSL_NO_ENGINE
@@ -568,93 +556,99 @@ int EVP_CIPHER_CTX_cleanup(EVP_CIPHER_CTX *c)
                 * functional reference we held for this reason. */
                ENGINE_finish(c->engine);
 #endif
-       memset(c,0,sizeof(EVP_CIPHER_CTX));
+       memset(c, 0, sizeof(EVP_CIPHER_CTX));
        return 1;
-       }
+}
 
-int EVP_CIPHER_CTX_set_key_length(EVP_CIPHER_CTX *c, int keylen)
-       {
-       if(c->cipher->flags & EVP_CIPH_CUSTOM_KEY_LENGTH) 
-               return EVP_CIPHER_CTX_ctrl(c, EVP_CTRL_SET_KEY_LENGTH, keylen, NULL);
-       if(c->key_len == keylen) return 1;
-       if((keylen > 0) && (c->cipher->flags & EVP_CIPH_VARIABLE_LENGTH))
-               {
+int
+EVP_CIPHER_CTX_set_key_length(EVP_CIPHER_CTX *c, int keylen)
+{
+       if (c->cipher->flags & EVP_CIPH_CUSTOM_KEY_LENGTH)
+               return EVP_CIPHER_CTX_ctrl(c, EVP_CTRL_SET_KEY_LENGTH,
+                   keylen, NULL);
+       if (c->key_len == keylen)
+               return 1;
+       if ((keylen > 0) && (c->cipher->flags & EVP_CIPH_VARIABLE_LENGTH)) {
                c->key_len = keylen;
                return 1;
-               }
-       EVPerr(EVP_F_EVP_CIPHER_CTX_SET_KEY_LENGTH,EVP_R_INVALID_KEY_LENGTH);
-       return 0;
        }
+       EVPerr(EVP_F_EVP_CIPHER_CTX_SET_KEY_LENGTH, EVP_R_INVALID_KEY_LENGTH);
+       return 0;
+}
 
-int EVP_CIPHER_CTX_set_padding(EVP_CIPHER_CTX *ctx, int pad)
-       {
-       if (pad) ctx->flags &= ~EVP_CIPH_NO_PADDING;
-       else ctx->flags |= EVP_CIPH_NO_PADDING;
+int
+EVP_CIPHER_CTX_set_padding(EVP_CIPHER_CTX *ctx, int pad)
+{
+       if (pad)
+               ctx->flags &= ~EVP_CIPH_NO_PADDING;
+       else
+               ctx->flags |= EVP_CIPH_NO_PADDING;
        return 1;
-       }
+}
 
-int EVP_CIPHER_CTX_ctrl(EVP_CIPHER_CTX *ctx, int type, int arg, void *ptr)
+int
+EVP_CIPHER_CTX_ctrl(EVP_CIPHER_CTX *ctx, int type, int arg, void *ptr)
 {
        int ret;
-       if(!ctx->cipher) {
+
+       if (!ctx->cipher) {
                EVPerr(EVP_F_EVP_CIPHER_CTX_CTRL, EVP_R_NO_CIPHER_SET);
                return 0;
        }
 
-       if(!ctx->cipher->ctrl) {
+       if (!ctx->cipher->ctrl) {
                EVPerr(EVP_F_EVP_CIPHER_CTX_CTRL, EVP_R_CTRL_NOT_IMPLEMENTED);
                return 0;
        }
 
        ret = ctx->cipher->ctrl(ctx, type, arg, ptr);
-       if(ret == -1) {
-               EVPerr(EVP_F_EVP_CIPHER_CTX_CTRL, EVP_R_CTRL_OPERATION_NOT_IMPLEMENTED);
+       if (ret == -1) {
+               EVPerr(EVP_F_EVP_CIPHER_CTX_CTRL,
+                   EVP_R_CTRL_OPERATION_NOT_IMPLEMENTED);
                return 0;
        }
        return ret;
 }
 
-int EVP_CIPHER_CTX_rand_key(EVP_CIPHER_CTX *ctx, unsigned char *key)
-       {
+int
+EVP_CIPHER_CTX_rand_key(EVP_CIPHER_CTX *ctx, unsigned char *key)
+{
        if (ctx->cipher->flags & EVP_CIPH_RAND_KEY)
                return EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_RAND_KEY, 0, key);
        if (RAND_bytes(key, ctx->key_len) <= 0)
                return 0;
        return 1;
-       }
+}
 
-int EVP_CIPHER_CTX_copy(EVP_CIPHER_CTX *out, const EVP_CIPHER_CTX *in)
-       {
-       if ((in == NULL) || (in->cipher == NULL))
-               {
-               EVPerr(EVP_F_EVP_CIPHER_CTX_COPY,EVP_R_INPUT_NOT_INITIALIZED);
+int
+EVP_CIPHER_CTX_copy(EVP_CIPHER_CTX *out, const EVP_CIPHER_CTX *in)
+{
+       if ((in == NULL) || (in->cipher == NULL)) {
+               EVPerr(EVP_F_EVP_CIPHER_CTX_COPY, EVP_R_INPUT_NOT_INITIALIZED);
                return 0;
-               }
+       }
 #ifndef OPENSSL_NO_ENGINE
        /* Make sure it's safe to copy a cipher context using an ENGINE */
-       if (in->engine && !ENGINE_init(in->engine))
-               {
-               EVPerr(EVP_F_EVP_CIPHER_CTX_COPY,ERR_R_ENGINE_LIB);
+       if (in->engine && !ENGINE_init(in->engine)) {
+               EVPerr(EVP_F_EVP_CIPHER_CTX_COPY, ERR_R_ENGINE_LIB);
                return 0;
-               }
+       }
 #endif
 
        EVP_CIPHER_CTX_cleanup(out);
-       memcpy(out,in,sizeof *out);
-
-       if (in->cipher_data && in->cipher->ctx_size)
-               {
-               out->cipher_data=malloc(in->cipher->ctx_size);
-               if (!out->cipher_data)
-                       {
-                       EVPerr(EVP_F_EVP_CIPHER_CTX_COPY,ERR_R_MALLOC_FAILURE);
+       memcpy(out, in, sizeof *out);
+
+       if (in->cipher_data && in->cipher->ctx_size) {
+               out->cipher_data = malloc(in->cipher->ctx_size);
+               if (!out->cipher_data) {
+                       EVPerr(EVP_F_EVP_CIPHER_CTX_COPY, ERR_R_MALLOC_FAILURE);
                        return 0;
-                       }
-               memcpy(out->cipher_data,in->cipher_data,in->cipher->ctx_size);
                }
+               memcpy(out->cipher_data, in->cipher_data, in->cipher->ctx_size);
+       }
 
        if (in->cipher->flags & EVP_CIPH_CUSTOM_COPY)
-               return in->cipher->ctrl((EVP_CIPHER_CTX *)in, EVP_CTRL_COPY, 0, out);
+               return in->cipher->ctrl((EVP_CIPHER_CTX *)in,
+                   EVP_CTRL_COPY, 0, out);
        return 1;
-       }
-
+}
index 08eab98..790459f 100644 (file)
@@ -7,7 +7,7 @@
  * are met:
  *
  * 1. Redistributions of source code must retain the above copyright
- *    notice, this list of conditions and the following disclaimer. 
+ *    notice, this list of conditions and the following disclaimer.
  *
  * 2. Redistributions in binary form must reproduce the above copyright
  *    notice, this list of conditions and the following disclaimer in
 #define ERR_FUNC(func) ERR_PACK(ERR_LIB_EVP,func,0)
 #define ERR_REASON(reason) ERR_PACK(ERR_LIB_EVP,0,reason)
 
-static ERR_STRING_DATA EVP_str_functs[]=
-       {
-{ERR_FUNC(EVP_F_AESNI_INIT_KEY),       "AESNI_INIT_KEY"},
-{ERR_FUNC(EVP_F_AESNI_XTS_CIPHER),     "AESNI_XTS_CIPHER"},
-{ERR_FUNC(EVP_F_AES_INIT_KEY), "AES_INIT_KEY"},
-{ERR_FUNC(EVP_F_AES_XTS),      "AES_XTS"},
-{ERR_FUNC(EVP_F_AES_XTS_CIPHER),       "AES_XTS_CIPHER"},
-{ERR_FUNC(EVP_F_ALG_MODULE_INIT),      "ALG_MODULE_INIT"},
-{ERR_FUNC(EVP_F_CAMELLIA_INIT_KEY),    "CAMELLIA_INIT_KEY"},
-{ERR_FUNC(EVP_F_CMAC_INIT),    "CMAC_INIT"},
-{ERR_FUNC(EVP_F_D2I_PKEY),     "D2I_PKEY"},
-{ERR_FUNC(EVP_F_DO_SIGVER_INIT),       "DO_SIGVER_INIT"},
-{ERR_FUNC(EVP_F_DSAPKEY2PKCS8),        "DSAPKEY2PKCS8"},
-{ERR_FUNC(EVP_F_DSA_PKEY2PKCS8),       "DSA_PKEY2PKCS8"},
-{ERR_FUNC(EVP_F_ECDSA_PKEY2PKCS8),     "ECDSA_PKEY2PKCS8"},
-{ERR_FUNC(EVP_F_ECKEY_PKEY2PKCS8),     "ECKEY_PKEY2PKCS8"},
-{ERR_FUNC(EVP_F_EVP_CIPHERINIT_EX),    "EVP_CipherInit_ex"},
-{ERR_FUNC(EVP_F_EVP_CIPHER_CTX_COPY),  "EVP_CIPHER_CTX_copy"},
-{ERR_FUNC(EVP_F_EVP_CIPHER_CTX_CTRL),  "EVP_CIPHER_CTX_ctrl"},
-{ERR_FUNC(EVP_F_EVP_CIPHER_CTX_SET_KEY_LENGTH),        "EVP_CIPHER_CTX_set_key_length"},
-{ERR_FUNC(EVP_F_EVP_DECRYPTFINAL_EX),  "EVP_DecryptFinal_ex"},
-{ERR_FUNC(EVP_F_EVP_DIGESTINIT_EX),    "EVP_DigestInit_ex"},
-{ERR_FUNC(EVP_F_EVP_ENCRYPTFINAL_EX),  "EVP_EncryptFinal_ex"},
-{ERR_FUNC(EVP_F_EVP_MD_CTX_COPY_EX),   "EVP_MD_CTX_copy_ex"},
-{ERR_FUNC(EVP_F_EVP_MD_SIZE),  "EVP_MD_size"},
-{ERR_FUNC(EVP_F_EVP_OPENINIT), "EVP_OpenInit"},
-{ERR_FUNC(EVP_F_EVP_PBE_ALG_ADD),      "EVP_PBE_alg_add"},
-{ERR_FUNC(EVP_F_EVP_PBE_ALG_ADD_TYPE), "EVP_PBE_alg_add_type"},
-{ERR_FUNC(EVP_F_EVP_PBE_CIPHERINIT),   "EVP_PBE_CipherInit"},
-{ERR_FUNC(EVP_F_EVP_PKCS82PKEY),       "EVP_PKCS82PKEY"},
-{ERR_FUNC(EVP_F_EVP_PKCS82PKEY_BROKEN),        "EVP_PKCS82PKEY_BROKEN"},
-{ERR_FUNC(EVP_F_EVP_PKEY2PKCS8_BROKEN),        "EVP_PKEY2PKCS8_broken"},
-{ERR_FUNC(EVP_F_EVP_PKEY_COPY_PARAMETERS),     "EVP_PKEY_copy_parameters"},
-{ERR_FUNC(EVP_F_EVP_PKEY_CTX_CTRL),    "EVP_PKEY_CTX_ctrl"},
-{ERR_FUNC(EVP_F_EVP_PKEY_CTX_CTRL_STR),        "EVP_PKEY_CTX_ctrl_str"},
-{ERR_FUNC(EVP_F_EVP_PKEY_CTX_DUP),     "EVP_PKEY_CTX_dup"},
-{ERR_FUNC(EVP_F_EVP_PKEY_DECRYPT),     "EVP_PKEY_decrypt"},
-{ERR_FUNC(EVP_F_EVP_PKEY_DECRYPT_INIT),        "EVP_PKEY_decrypt_init"},
-{ERR_FUNC(EVP_F_EVP_PKEY_DECRYPT_OLD), "EVP_PKEY_decrypt_old"},
-{ERR_FUNC(EVP_F_EVP_PKEY_DERIVE),      "EVP_PKEY_derive"},
-{ERR_FUNC(EVP_F_EVP_PKEY_DERIVE_INIT), "EVP_PKEY_derive_init"},
-{ERR_FUNC(EVP_F_EVP_PKEY_DERIVE_SET_PEER),     "EVP_PKEY_derive_set_peer"},
-{ERR_FUNC(EVP_F_EVP_PKEY_ENCRYPT),     "EVP_PKEY_encrypt"},
-{ERR_FUNC(EVP_F_EVP_PKEY_ENCRYPT_INIT),        "EVP_PKEY_encrypt_init"},
-{ERR_FUNC(EVP_F_EVP_PKEY_ENCRYPT_OLD), "EVP_PKEY_encrypt_old"},
-{ERR_FUNC(EVP_F_EVP_PKEY_GET1_DH),     "EVP_PKEY_get1_DH"},
-{ERR_FUNC(EVP_F_EVP_PKEY_GET1_DSA),    "EVP_PKEY_get1_DSA"},
-{ERR_FUNC(EVP_F_EVP_PKEY_GET1_ECDSA),  "EVP_PKEY_GET1_ECDSA"},
-{ERR_FUNC(EVP_F_EVP_PKEY_GET1_EC_KEY), "EVP_PKEY_get1_EC_KEY"},
-{ERR_FUNC(EVP_F_EVP_PKEY_GET1_RSA),    "EVP_PKEY_get1_RSA"},
-{ERR_FUNC(EVP_F_EVP_PKEY_KEYGEN),      "EVP_PKEY_keygen"},
-{ERR_FUNC(EVP_F_EVP_PKEY_KEYGEN_INIT), "EVP_PKEY_keygen_init"},
-{ERR_FUNC(EVP_F_EVP_PKEY_NEW), "EVP_PKEY_new"},
-{ERR_FUNC(EVP_F_EVP_PKEY_PARAMGEN),    "EVP_PKEY_paramgen"},
-{ERR_FUNC(EVP_F_EVP_PKEY_PARAMGEN_INIT),       "EVP_PKEY_paramgen_init"},
-{ERR_FUNC(EVP_F_EVP_PKEY_SIGN),        "EVP_PKEY_sign"},
-{ERR_FUNC(EVP_F_EVP_PKEY_SIGN_INIT),   "EVP_PKEY_sign_init"},
-{ERR_FUNC(EVP_F_EVP_PKEY_VERIFY),      "EVP_PKEY_verify"},
-{ERR_FUNC(EVP_F_EVP_PKEY_VERIFY_INIT), "EVP_PKEY_verify_init"},
-{ERR_FUNC(EVP_F_EVP_PKEY_VERIFY_RECOVER),      "EVP_PKEY_verify_recover"},
-{ERR_FUNC(EVP_F_EVP_PKEY_VERIFY_RECOVER_INIT), "EVP_PKEY_verify_recover_init"},
-{ERR_FUNC(EVP_F_EVP_RIJNDAEL), "EVP_RIJNDAEL"},
-{ERR_FUNC(EVP_F_EVP_SIGNFINAL),        "EVP_SignFinal"},
-{ERR_FUNC(EVP_F_EVP_VERIFYFINAL),      "EVP_VerifyFinal"},
-{ERR_FUNC(EVP_F_FIPS_CIPHERINIT),      "FIPS_CIPHERINIT"},
-{ERR_FUNC(EVP_F_FIPS_CIPHER_CTX_COPY), "FIPS_CIPHER_CTX_COPY"},
-{ERR_FUNC(EVP_F_FIPS_CIPHER_CTX_CTRL), "FIPS_CIPHER_CTX_CTRL"},
-{ERR_FUNC(EVP_F_FIPS_CIPHER_CTX_SET_KEY_LENGTH),       "FIPS_CIPHER_CTX_SET_KEY_LENGTH"},
-{ERR_FUNC(EVP_F_FIPS_DIGESTINIT),      "FIPS_DIGESTINIT"},
-{ERR_FUNC(EVP_F_FIPS_MD_CTX_COPY),     "FIPS_MD_CTX_COPY"},
-{ERR_FUNC(EVP_F_HMAC_INIT_EX), "HMAC_Init_ex"},
-{ERR_FUNC(EVP_F_INT_CTX_NEW),  "INT_CTX_NEW"},
-{ERR_FUNC(EVP_F_PKCS5_PBE_KEYIVGEN),   "PKCS5_PBE_keyivgen"},
-{ERR_FUNC(EVP_F_PKCS5_V2_PBE_KEYIVGEN),        "PKCS5_v2_PBE_keyivgen"},
-{ERR_FUNC(EVP_F_PKCS5_V2_PBKDF2_KEYIVGEN),     "PKCS5_V2_PBKDF2_KEYIVGEN"},
-{ERR_FUNC(EVP_F_PKCS8_SET_BROKEN),     "PKCS8_set_broken"},
-{ERR_FUNC(EVP_F_PKEY_SET_TYPE),        "PKEY_SET_TYPE"},
-{ERR_FUNC(EVP_F_RC2_MAGIC_TO_METH),    "RC2_MAGIC_TO_METH"},
-{ERR_FUNC(EVP_F_RC5_CTRL),     "RC5_CTRL"},
-{0,NULL}
-       };
+static ERR_STRING_DATA EVP_str_functs[]= {
+       {ERR_FUNC(EVP_F_AESNI_INIT_KEY),        "AESNI_INIT_KEY"},
+       {ERR_FUNC(EVP_F_AESNI_XTS_CIPHER),      "AESNI_XTS_CIPHER"},
+       {ERR_FUNC(EVP_F_AES_INIT_KEY),  "AES_INIT_KEY"},
+       {ERR_FUNC(EVP_F_AES_XTS),       "AES_XTS"},
+       {ERR_FUNC(EVP_F_AES_XTS_CIPHER),        "AES_XTS_CIPHER"},
+       {ERR_FUNC(EVP_F_ALG_MODULE_INIT),       "ALG_MODULE_INIT"},
+       {ERR_FUNC(EVP_F_CAMELLIA_INIT_KEY),     "CAMELLIA_INIT_KEY"},
+       {ERR_FUNC(EVP_F_CMAC_INIT),     "CMAC_INIT"},
+       {ERR_FUNC(EVP_F_D2I_PKEY),      "D2I_PKEY"},
+       {ERR_FUNC(EVP_F_DO_SIGVER_INIT),        "DO_SIGVER_INIT"},
+       {ERR_FUNC(EVP_F_DSAPKEY2PKCS8), "DSAPKEY2PKCS8"},
+       {ERR_FUNC(EVP_F_DSA_PKEY2PKCS8),        "DSA_PKEY2PKCS8"},
+       {ERR_FUNC(EVP_F_ECDSA_PKEY2PKCS8),      "ECDSA_PKEY2PKCS8"},
+       {ERR_FUNC(EVP_F_ECKEY_PKEY2PKCS8),      "ECKEY_PKEY2PKCS8"},
+       {ERR_FUNC(EVP_F_EVP_CIPHERINIT_EX),     "EVP_CipherInit_ex"},
+       {ERR_FUNC(EVP_F_EVP_CIPHER_CTX_COPY),   "EVP_CIPHER_CTX_copy"},
+       {ERR_FUNC(EVP_F_EVP_CIPHER_CTX_CTRL),   "EVP_CIPHER_CTX_ctrl"},
+       {ERR_FUNC(EVP_F_EVP_CIPHER_CTX_SET_KEY_LENGTH), "EVP_CIPHER_CTX_set_key_length"},
+       {ERR_FUNC(EVP_F_EVP_DECRYPTFINAL_EX),   "EVP_DecryptFinal_ex"},
+       {ERR_FUNC(EVP_F_EVP_DIGESTINIT_EX),     "EVP_DigestInit_ex"},
+       {ERR_FUNC(EVP_F_EVP_ENCRYPTFINAL_EX),   "EVP_EncryptFinal_ex"},
+       {ERR_FUNC(EVP_F_EVP_MD_CTX_COPY_EX),    "EVP_MD_CTX_copy_ex"},
+       {ERR_FUNC(EVP_F_EVP_MD_SIZE),   "EVP_MD_size"},
+       {ERR_FUNC(EVP_F_EVP_OPENINIT),  "EVP_OpenInit"},
+       {ERR_FUNC(EVP_F_EVP_PBE_ALG_ADD),       "EVP_PBE_alg_add"},
+       {ERR_FUNC(EVP_F_EVP_PBE_ALG_ADD_TYPE),  "EVP_PBE_alg_add_type"},
+       {ERR_FUNC(EVP_F_EVP_PBE_CIPHERINIT),    "EVP_PBE_CipherInit"},
+       {ERR_FUNC(EVP_F_EVP_PKCS82PKEY),        "EVP_PKCS82PKEY"},
+       {ERR_FUNC(EVP_F_EVP_PKCS82PKEY_BROKEN), "EVP_PKCS82PKEY_BROKEN"},
+       {ERR_FUNC(EVP_F_EVP_PKEY2PKCS8_BROKEN), "EVP_PKEY2PKCS8_broken"},
+       {ERR_FUNC(EVP_F_EVP_PKEY_COPY_PARAMETERS),      "EVP_PKEY_copy_parameters"},
+       {ERR_FUNC(EVP_F_EVP_PKEY_CTX_CTRL),     "EVP_PKEY_CTX_ctrl"},
+       {ERR_FUNC(EVP_F_EVP_PKEY_CTX_CTRL_STR), "EVP_PKEY_CTX_ctrl_str"},
+       {ERR_FUNC(EVP_F_EVP_PKEY_CTX_DUP),      "EVP_PKEY_CTX_dup"},
+       {ERR_FUNC(EVP_F_EVP_PKEY_DECRYPT),      "EVP_PKEY_decrypt"},
+       {ERR_FUNC(EVP_F_EVP_PKEY_DECRYPT_INIT), "EVP_PKEY_decrypt_init"},
+       {ERR_FUNC(EVP_F_EVP_PKEY_DECRYPT_OLD),  "EVP_PKEY_decrypt_old"},
+       {ERR_FUNC(EVP_F_EVP_PKEY_DERIVE),       "EVP_PKEY_derive"},
+       {ERR_FUNC(EVP_F_EVP_PKEY_DERIVE_INIT),  "EVP_PKEY_derive_init"},
+       {ERR_FUNC(EVP_F_EVP_PKEY_DERIVE_SET_PEER),      "EVP_PKEY_derive_set_peer"},
+       {ERR_FUNC(EVP_F_EVP_PKEY_ENCRYPT),      "EVP_PKEY_encrypt"},
+       {ERR_FUNC(EVP_F_EVP_PKEY_ENCRYPT_INIT), "EVP_PKEY_encrypt_init"},
+       {ERR_FUNC(EVP_F_EVP_PKEY_ENCRYPT_OLD),  "EVP_PKEY_encrypt_old"},
+       {ERR_FUNC(EVP_F_EVP_PKEY_GET1_DH),      "EVP_PKEY_get1_DH"},
+       {ERR_FUNC(EVP_F_EVP_PKEY_GET1_DSA),     "EVP_PKEY_get1_DSA"},
+       {ERR_FUNC(EVP_F_EVP_PKEY_GET1_ECDSA),   "EVP_PKEY_GET1_ECDSA"},
+       {ERR_FUNC(EVP_F_EVP_PKEY_GET1_EC_KEY),  "EVP_PKEY_get1_EC_KEY"},
+       {ERR_FUNC(EVP_F_EVP_PKEY_GET1_RSA),     "EVP_PKEY_get1_RSA"},
+       {ERR_FUNC(EVP_F_EVP_PKEY_KEYGEN),       "EVP_PKEY_keygen"},
+       {ERR_FUNC(EVP_F_EVP_PKEY_KEYGEN_INIT),  "EVP_PKEY_keygen_init"},
+       {ERR_FUNC(EVP_F_EVP_PKEY_NEW),  "EVP_PKEY_new"},
+       {ERR_FUNC(EVP_F_EVP_PKEY_PARAMGEN),     "EVP_PKEY_paramgen"},
+       {ERR_FUNC(EVP_F_EVP_PKEY_PARAMGEN_INIT),        "EVP_PKEY_paramgen_init"},
+       {ERR_FUNC(EVP_F_EVP_PKEY_SIGN), "EVP_PKEY_sign"},
+       {ERR_FUNC(EVP_F_EVP_PKEY_SIGN_INIT),    "EVP_PKEY_sign_init"},
+       {ERR_FUNC(EVP_F_EVP_PKEY_VERIFY),       "EVP_PKEY_verify"},
+       {ERR_FUNC(EVP_F_EVP_PKEY_VERIFY_INIT),  "EVP_PKEY_verify_init"},
+       {ERR_FUNC(EVP_F_EVP_PKEY_VERIFY_RECOVER),       "EVP_PKEY_verify_recover"},
+       {ERR_FUNC(EVP_F_EVP_PKEY_VERIFY_RECOVER_INIT),  "EVP_PKEY_verify_recover_init"},
+       {ERR_FUNC(EVP_F_EVP_RIJNDAEL),  "EVP_RIJNDAEL"},
+       {ERR_FUNC(EVP_F_EVP_SIGNFINAL), "EVP_SignFinal"},
+       {ERR_FUNC(EVP_F_EVP_VERIFYFINAL),       "EVP_VerifyFinal"},
+       {ERR_FUNC(EVP_F_FIPS_CIPHERINIT),       "FIPS_CIPHERINIT"},
+       {ERR_FUNC(EVP_F_FIPS_CIPHER_CTX_COPY),  "FIPS_CIPHER_CTX_COPY"},
+       {ERR_FUNC(EVP_F_FIPS_CIPHER_CTX_CTRL),  "FIPS_CIPHER_CTX_CTRL"},
+       {ERR_FUNC(EVP_F_FIPS_CIPHER_CTX_SET_KEY_LENGTH),        "FIPS_CIPHER_CTX_SET_KEY_LENGTH"},
+       {ERR_FUNC(EVP_F_FIPS_DIGESTINIT),       "FIPS_DIGESTINIT"},
+       {ERR_FUNC(EVP_F_FIPS_MD_CTX_COPY),      "FIPS_MD_CTX_COPY"},
+       {ERR_FUNC(EVP_F_HMAC_INIT_EX),  "HMAC_Init_ex"},
+       {ERR_FUNC(EVP_F_INT_CTX_NEW),   "INT_CTX_NEW"},
+       {ERR_FUNC(EVP_F_PKCS5_PBE_KEYIVGEN),    "PKCS5_PBE_keyivgen"},
+       {ERR_FUNC(EVP_F_PKCS5_V2_PBE_KEYIVGEN), "PKCS5_v2_PBE_keyivgen"},
+       {ERR_FUNC(EVP_F_PKCS5_V2_PBKDF2_KEYIVGEN),      "PKCS5_V2_PBKDF2_KEYIVGEN"},
+       {ERR_FUNC(EVP_F_PKCS8_SET_BROKEN),      "PKCS8_set_broken"},
+       {ERR_FUNC(EVP_F_PKEY_SET_TYPE), "PKEY_SET_TYPE"},
+       {ERR_FUNC(EVP_F_RC2_MAGIC_TO_METH),     "RC2_MAGIC_TO_METH"},
+       {ERR_FUNC(EVP_F_RC5_CTRL),      "RC5_CTRL"},
+       {0, NULL}
+};
 
-static ERR_STRING_DATA EVP_str_reasons[]=
-       {
-{ERR_REASON(EVP_R_AES_IV_SETUP_FAILED)   ,"aes iv setup failed"},
-{ERR_REASON(EVP_R_AES_KEY_SETUP_FAILED)  ,"aes key setup failed"},
-{ERR_REASON(EVP_R_ASN1_LIB)              ,"asn1 lib"},
-{ERR_REASON(EVP_R_BAD_BLOCK_LENGTH)      ,"bad block length"},
-{ERR_REASON(EVP_R_BAD_DECRYPT)           ,"bad decrypt"},
-{ERR_REASON(EVP_R_BAD_KEY_LENGTH)        ,"bad key length"},
-{ERR_REASON(EVP_R_BN_DECODE_ERROR)       ,"bn decode error"},
-{ERR_REASON(EVP_R_BN_PUBKEY_ERROR)       ,"bn pubkey error"},
-{ERR_REASON(EVP_R_BUFFER_TOO_SMALL)      ,"buffer too small"},
-{ERR_REASON(EVP_R_CAMELLIA_KEY_SETUP_FAILED),"camellia key setup failed"},
-{ERR_REASON(EVP_R_CIPHER_PARAMETER_ERROR),"cipher parameter error"},
-{ERR_REASON(EVP_R_COMMAND_NOT_SUPPORTED) ,"command not supported"},
-{ERR_REASON(EVP_R_CTRL_NOT_IMPLEMENTED)  ,"ctrl not implemented"},
-{ERR_REASON(EVP_R_CTRL_OPERATION_NOT_IMPLEMENTED),"ctrl operation not implemented"},
-{ERR_REASON(EVP_R_DATA_NOT_MULTIPLE_OF_BLOCK_LENGTH),"data not multiple of block length"},
-{ERR_REASON(EVP_R_DECODE_ERROR)          ,"decode error"},
-{ERR_REASON(EVP_R_DIFFERENT_KEY_TYPES)   ,"different key types"},
-{ERR_REASON(EVP_R_DIFFERENT_PARAMETERS)  ,"different parameters"},
-{ERR_REASON(EVP_R_DISABLED_FOR_FIPS)     ,"disabled for fips"},
-{ERR_REASON(EVP_R_ENCODE_ERROR)          ,"encode error"},
-{ERR_REASON(EVP_R_ERROR_LOADING_SECTION) ,"error loading section"},
-{ERR_REASON(EVP_R_ERROR_SETTING_FIPS_MODE),"error setting fips mode"},
-{ERR_REASON(EVP_R_EVP_PBE_CIPHERINIT_ERROR),"evp pbe cipherinit error"},
-{ERR_REASON(EVP_R_EXPECTING_AN_RSA_KEY)  ,"expecting an rsa key"},
-{ERR_REASON(EVP_R_EXPECTING_A_DH_KEY)    ,"expecting a dh key"},
-{ERR_REASON(EVP_R_EXPECTING_A_DSA_KEY)   ,"expecting a dsa key"},
-{ERR_REASON(EVP_R_EXPECTING_A_ECDSA_KEY) ,"expecting a ecdsa key"},
-{ERR_REASON(EVP_R_EXPECTING_A_EC_KEY)    ,"expecting a ec key"},
-{ERR_REASON(EVP_R_FIPS_MODE_NOT_SUPPORTED),"fips mode not supported"},
-{ERR_REASON(EVP_R_INITIALIZATION_ERROR)  ,"initialization error"},
-{ERR_REASON(EVP_R_INPUT_NOT_INITIALIZED) ,"input not initialized"},
-{ERR_REASON(EVP_R_INVALID_DIGEST)        ,"invalid digest"},
-{ERR_REASON(EVP_R_INVALID_FIPS_MODE)     ,"invalid fips mode"},
-{ERR_REASON(EVP_R_INVALID_KEY_LENGTH)    ,"invalid key length"},
-{ERR_REASON(EVP_R_INVALID_OPERATION)     ,"invalid operation"},
-{ERR_REASON(EVP_R_IV_TOO_LARGE)          ,"iv too large"},
-{ERR_REASON(EVP_R_KEYGEN_FAILURE)        ,"keygen failure"},
-{ERR_REASON(EVP_R_MESSAGE_DIGEST_IS_NULL),"message digest is null"},
-{ERR_REASON(EVP_R_METHOD_NOT_SUPPORTED)  ,"method not supported"},
-{ERR_REASON(EVP_R_MISSING_PARAMETERS)    ,"missing parameters"},
-{ERR_REASON(EVP_R_NO_CIPHER_SET)         ,"no cipher set"},
-{ERR_REASON(EVP_R_NO_DEFAULT_DIGEST)     ,"no default digest"},
-{ERR_REASON(EVP_R_NO_DIGEST_SET)         ,"no digest set"},
-{ERR_REASON(EVP_R_NO_DSA_PARAMETERS)     ,"no dsa parameters"},
-{ERR_REASON(EVP_R_NO_KEY_SET)            ,"no key set"},
-{ERR_REASON(EVP_R_NO_OPERATION_SET)      ,"no operation set"},
-{ERR_REASON(EVP_R_NO_SIGN_FUNCTION_CONFIGURED),"no sign function configured"},
-{ERR_REASON(EVP_R_NO_VERIFY_FUNCTION_CONFIGURED),"no verify function configured"},
-{ERR_REASON(EVP_R_OPERATION_NOT_SUPPORTED_FOR_THIS_KEYTYPE),"operation not supported for this keytype"},
-{ERR_REASON(EVP_R_OPERATON_NOT_INITIALIZED),"operaton not initialized"},
-{ERR_REASON(EVP_R_PKCS8_UNKNOWN_BROKEN_TYPE),"pkcs8 unknown broken type"},
-{ERR_REASON(EVP_R_PRIVATE_KEY_DECODE_ERROR),"private key decode error"},
-{ERR_REASON(EVP_R_PRIVATE_KEY_ENCODE_ERROR),"private key encode error"},
-{ERR_REASON(EVP_R_PUBLIC_KEY_NOT_RSA)    ,"public key not rsa"},
-{ERR_REASON(EVP_R_TOO_LARGE)             ,"too large"},
-{ERR_REASON(EVP_R_UNKNOWN_CIPHER)        ,"unknown cipher"},
-{ERR_REASON(EVP_R_UNKNOWN_DIGEST)        ,"unknown digest"},
-{ERR_REASON(EVP_R_UNKNOWN_OPTION)        ,"unknown option"},
-{ERR_REASON(EVP_R_UNKNOWN_PBE_ALGORITHM) ,"unknown pbe algorithm"},
-{ERR_REASON(EVP_R_UNSUPORTED_NUMBER_OF_ROUNDS),"unsuported number of rounds"},
-{ERR_REASON(EVP_R_UNSUPPORTED_ALGORITHM) ,"unsupported algorithm"},
-{ERR_REASON(EVP_R_UNSUPPORTED_CIPHER)    ,"unsupported cipher"},
-{ERR_REASON(EVP_R_UNSUPPORTED_KEYLENGTH) ,"unsupported keylength"},
-{ERR_REASON(EVP_R_UNSUPPORTED_KEY_DERIVATION_FUNCTION),"unsupported key derivation function"},
-{ERR_REASON(EVP_R_UNSUPPORTED_KEY_SIZE)  ,"unsupported key size"},
-{ERR_REASON(EVP_R_UNSUPPORTED_PRF)       ,"unsupported prf"},
-{ERR_REASON(EVP_R_UNSUPPORTED_PRIVATE_KEY_ALGORITHM),"unsupported private key algorithm"},
-{ERR_REASON(EVP_R_UNSUPPORTED_SALT_TYPE) ,"unsupported salt type"},
-{ERR_REASON(EVP_R_WRONG_FINAL_BLOCK_LENGTH),"wrong final block length"},
-{ERR_REASON(EVP_R_WRONG_PUBLIC_KEY_TYPE) ,"wrong public key type"},
-{0,NULL}
-       };
+static ERR_STRING_DATA EVP_str_reasons[]= {
+       {ERR_REASON(EVP_R_AES_IV_SETUP_FAILED)   , "aes iv setup failed"},
+       {ERR_REASON(EVP_R_AES_KEY_SETUP_FAILED)  , "aes key setup failed"},
+       {ERR_REASON(EVP_R_ASN1_LIB)              , "asn1 lib"},
+       {ERR_REASON(EVP_R_BAD_BLOCK_LENGTH)      , "bad block length"},
+       {ERR_REASON(EVP_R_BAD_DECRYPT)           , "bad decrypt"},
+       {ERR_REASON(EVP_R_BAD_KEY_LENGTH)        , "bad key length"},
+       {ERR_REASON(EVP_R_BN_DECODE_ERROR)       , "bn decode error"},
+       {ERR_REASON(EVP_R_BN_PUBKEY_ERROR)       , "bn pubkey error"},
+       {ERR_REASON(EVP_R_BUFFER_TOO_SMALL)      , "buffer too small"},
+       {ERR_REASON(EVP_R_CAMELLIA_KEY_SETUP_FAILED), "camellia key setup failed"},
+       {ERR_REASON(EVP_R_CIPHER_PARAMETER_ERROR), "cipher parameter error"},
+       {ERR_REASON(EVP_R_COMMAND_NOT_SUPPORTED) , "command not supported"},
+       {ERR_REASON(EVP_R_CTRL_NOT_IMPLEMENTED)  , "ctrl not implemented"},
+       {ERR_REASON(EVP_R_CTRL_OPERATION_NOT_IMPLEMENTED), "ctrl operation not implemented"},
+       {ERR_REASON(EVP_R_DATA_NOT_MULTIPLE_OF_BLOCK_LENGTH), "data not multiple of block length"},
+       {ERR_REASON(EVP_R_DECODE_ERROR)          , "decode error"},
+       {ERR_REASON(EVP_R_DIFFERENT_KEY_TYPES)   , "different key types"},
+       {ERR_REASON(EVP_R_DIFFERENT_PARAMETERS)  , "different parameters"},
+       {ERR_REASON(EVP_R_DISABLED_FOR_FIPS)     , "disabled for fips"},
+       {ERR_REASON(EVP_R_ENCODE_ERROR)          , "encode error"},
+       {ERR_REASON(EVP_R_ERROR_LOADING_SECTION) , "error loading section"},
+       {ERR_REASON(EVP_R_ERROR_SETTING_FIPS_MODE), "error setting fips mode"},
+       {ERR_REASON(EVP_R_EVP_PBE_CIPHERINIT_ERROR), "evp pbe cipherinit error"},
+       {ERR_REASON(EVP_R_EXPECTING_AN_RSA_KEY)  , "expecting an rsa key"},
+       {ERR_REASON(EVP_R_EXPECTING_A_DH_KEY)    , "expecting a dh key"},
+       {ERR_REASON(EVP_R_EXPECTING_A_DSA_KEY)   , "expecting a dsa key"},
+       {ERR_REASON(EVP_R_EXPECTING_A_ECDSA_KEY) , "expecting a ecdsa key"},
+       {ERR_REASON(EVP_R_EXPECTING_A_EC_KEY)    , "expecting a ec key"},
+       {ERR_REASON(EVP_R_FIPS_MODE_NOT_SUPPORTED), "fips mode not supported"},
+       {ERR_REASON(EVP_R_INITIALIZATION_ERROR)  , "initialization error"},
+       {ERR_REASON(EVP_R_INPUT_NOT_INITIALIZED) , "input not initialized"},
+       {ERR_REASON(EVP_R_INVALID_DIGEST)        , "invalid digest"},
+       {ERR_REASON(EVP_R_INVALID_FIPS_MODE)     , "invalid fips mode"},
+       {ERR_REASON(EVP_R_INVALID_KEY_LENGTH)    , "invalid key length"},
+       {ERR_REASON(EVP_R_INVALID_OPERATION)     , "invalid operation"},
+       {ERR_REASON(EVP_R_IV_TOO_LARGE)          , "iv too large"},
+       {ERR_REASON(EVP_R_KEYGEN_FAILURE)        , "keygen failure"},
+       {ERR_REASON(EVP_R_MESSAGE_DIGEST_IS_NULL), "message digest is null"},
+       {ERR_REASON(EVP_R_METHOD_NOT_SUPPORTED)  , "method not supported"},
+       {ERR_REASON(EVP_R_MISSING_PARAMETERS)    , "missing parameters"},
+       {ERR_REASON(EVP_R_NO_CIPHER_SET)         , "no cipher set"},
+       {ERR_REASON(EVP_R_NO_DEFAULT_DIGEST)     , "no default digest"},
+       {ERR_REASON(EVP_R_NO_DIGEST_SET)         , "no digest set"},
+       {ERR_REASON(EVP_R_NO_DSA_PARAMETERS)     , "no dsa parameters"},
+       {ERR_REASON(EVP_R_NO_KEY_SET)            , "no key set"},
+       {ERR_REASON(EVP_R_NO_OPERATION_SET)      , "no operation set"},
+       {ERR_REASON(EVP_R_NO_SIGN_FUNCTION_CONFIGURED), "no sign function configured"},
+       {ERR_REASON(EVP_R_NO_VERIFY_FUNCTION_CONFIGURED), "no verify function configured"},
+       {ERR_REASON(EVP_R_OPERATION_NOT_SUPPORTED_FOR_THIS_KEYTYPE), "operation not supported for this keytype"},
+       {ERR_REASON(EVP_R_OPERATON_NOT_INITIALIZED), "operaton not initialized"},
+       {ERR_REASON(EVP_R_PKCS8_UNKNOWN_BROKEN_TYPE), "pkcs8 unknown broken type"},
+       {ERR_REASON(EVP_R_PRIVATE_KEY_DECODE_ERROR), "private key decode error"},
+       {ERR_REASON(EVP_R_PRIVATE_KEY_ENCODE_ERROR), "private key encode error"},
+       {ERR_REASON(EVP_R_PUBLIC_KEY_NOT_RSA)    , "public key not rsa"},
+       {ERR_REASON(EVP_R_TOO_LARGE)             , "too large"},
+       {ERR_REASON(EVP_R_UNKNOWN_CIPHER)        , "unknown cipher"},
+       {ERR_REASON(EVP_R_UNKNOWN_DIGEST)        , "unknown digest"},
+       {ERR_REASON(EVP_R_UNKNOWN_OPTION)        , "unknown option"},
+       {ERR_REASON(EVP_R_UNKNOWN_PBE_ALGORITHM) , "unknown pbe algorithm"},
+       {ERR_REASON(EVP_R_UNSUPORTED_NUMBER_OF_ROUNDS), "unsuported number of rounds"},
+       {ERR_REASON(EVP_R_UNSUPPORTED_ALGORITHM) , "unsupported algorithm"},
+       {ERR_REASON(EVP_R_UNSUPPORTED_CIPHER)    , "unsupported cipher"},
+       {ERR_REASON(EVP_R_UNSUPPORTED_KEYLENGTH) , "unsupported keylength"},
+       {ERR_REASON(EVP_R_UNSUPPORTED_KEY_DERIVATION_FUNCTION), "unsupported key derivation function"},
+       {ERR_REASON(EVP_R_UNSUPPORTED_KEY_SIZE)  , "unsupported key size"},
+       {ERR_REASON(EVP_R_UNSUPPORTED_PRF)       , "unsupported prf"},
+       {ERR_REASON(EVP_R_UNSUPPORTED_PRIVATE_KEY_ALGORITHM), "unsupported private key algorithm"},
+       {ERR_REASON(EVP_R_UNSUPPORTED_SALT_TYPE) , "unsupported salt type"},
+       {ERR_REASON(EVP_R_WRONG_FINAL_BLOCK_LENGTH), "wrong final block length"},
+       {ERR_REASON(EVP_R_WRONG_PUBLIC_KEY_TYPE) , "wrong public key type"},
+       {0, NULL}
+};
 
 #endif
 
-void ERR_load_EVP_strings(void)
-       {
+void
+ERR_load_EVP_strings(void)
+{
 #ifndef OPENSSL_NO_ERR
-
-       if (ERR_func_error_string(EVP_str_functs[0].error) == NULL)
-               {
-               ERR_load_strings(0,EVP_str_functs);
-               ERR_load_strings(0,EVP_str_reasons);
-               }
-#endif
+       if (ERR_func_error_string(EVP_str_functs[0].error) == NULL) {
+               ERR_load_strings(0, EVP_str_functs);
+               ERR_load_strings(0, EVP_str_reasons);
        }
+#endif
+}
index b3cb063..445456d 100644 (file)
@@ -5,21 +5,21 @@
  * This package is an SSL implementation written
  * by Eric Young (eay@cryptsoft.com).
  * The implementation was written so as to conform with Netscapes SSL.
- * 
+ *
  * This library is free for commercial and non-commercial use as long as
  * the following conditions are aheared to.  The following conditions
  * apply to all code found in this distribution, be it the RC4, RSA,
  * lhash, DES, etc., code; not just the SSL code.  The SSL documentation
  * included with this distribution is covered by the same copyright terms
  * except that the holder is Tim Hudson (tjh@cryptsoft.com).
- * 
+ *
  * Copyright remains Eric Young's, and as such any Copyright notices in
  * the code are not to be removed.
  * If this package is used in a product, Eric Young should be given attribution
  * as the author of the parts of the library used.
  * This can be in the form of a textual message at program startup or
  * in documentation (online or textual) provided with the package.
- * 
+ *
  * Redistribution and use in source and binary forms, with or without
  * modification, are permitted provided that the following conditions
  * are met:
  *     Eric Young (eay@cryptsoft.com)"
  *    The word 'cryptographic' can be left out if the rouines from the library
  *    being used are not cryptographic related :-).
- * 4. If you include any Windows specific code (or a derivative thereof) from 
+ * 4. If you include any Windows specific code (or a derivative thereof) from
  *    the apps directory (application code) you must include an acknowledgement:
  *    "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
- * 
+ *
  * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
@@ -49,7 +49,7 @@
  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
  * SUCH DAMAGE.
- * 
+ *
  * The licence and distribution terms for any publically available version or
  * derivative of this code cannot be changed.  i.e. this code cannot simply be
  * copied and put under another distribution licence
 /* should be init to zeros. */
 static char prompt_string[80];
 
-void EVP_set_pw_prompt(const char *prompt)
-       {
+void
+EVP_set_pw_prompt(const char *prompt)
+{
        if (prompt == NULL)
-               prompt_string[0]='\0';
-       else
-               {
-               strlcpy(prompt_string,prompt,sizeof(prompt_string));
-               }
+               prompt_string[0] = '\0';
+       else {
+               strlcpy(prompt_string, prompt, sizeof(prompt_string));
        }
+}
 
-char *EVP_get_pw_prompt(void)
-       {
+char *
+EVP_get_pw_prompt(void)
+{
        if (prompt_string[0] == '\0')
-               return(NULL);
+               return (NULL);
        else
-               return(prompt_string);
-       }
+               return (prompt_string);
+}
 
 /* For historical reasons, the standard function for reading passwords is
  * in the DES library -- if someone ever wants to disable DES,
  * this function will fail */
-int EVP_read_pw_string(char *buf, int len, const char *prompt, int verify)
-       {
+int
+EVP_read_pw_string(char *buf, int len, const char *prompt, int verify)
+{
        return EVP_read_pw_string_min(buf, 0, len, prompt, verify);
-       }
+}
 
-int EVP_read_pw_string_min(char *buf, int min, int len, const char *prompt, int verify)
-       {
+int
+EVP_read_pw_string_min(char *buf, int min, int len, const char *prompt,
+    int verify)
+{
        int ret;
        char buff[BUFSIZ];
        UI *ui;
 
        if ((prompt == NULL) && (prompt_string[0] != '\0'))
-               prompt=prompt_string;
+               prompt = prompt_string;
        ui = UI_new();
-       UI_add_input_string(ui,prompt,0,buf,min,(len>=BUFSIZ)?BUFSIZ-1:len);
+       UI_add_input_string(ui, prompt, 0,buf, min,
+           (len >= BUFSIZ) ? BUFSIZ - 1 : len);
        if (verify)
-               UI_add_verify_string(ui,prompt,0,
-                       buff,min,(len>=BUFSIZ)?BUFSIZ-1:len,buf);
+               UI_add_verify_string(ui, prompt, 0, buff, min,
+                   (len >= BUFSIZ) ? BUFSIZ - 1 : len, buf);
        ret = UI_process(ui);
        UI_free(ui);
-       OPENSSL_cleanse(buff,BUFSIZ);
+       OPENSSL_cleanse(buff, BUFSIZ);
        return ret;
-       }
+}
 
-int EVP_BytesToKey(const EVP_CIPHER *type, const EVP_MD *md, 
-            const unsigned char *salt, const unsigned char *data, int datal,
-            int count, unsigned char *key, unsigned char *iv)
-       {
+int
+EVP_BytesToKey(const EVP_CIPHER *type, const EVP_MD *md,
+    const unsigned char *salt, const unsigned char *data, int datal,
+    int count, unsigned char *key, unsigned char *iv)
+{
        EVP_MD_CTX c;
        unsigned char md_buf[EVP_MAX_MD_SIZE];
-       int niv,nkey,addmd=0;
-       unsigned int mds=0,i;
+       int niv, nkey, addmd = 0;
+       unsigned int mds = 0, i;
        int rv = 0;
-       nkey=type->key_len;
-       niv=type->iv_len;
+       nkey = type->key_len;
+       niv = type->iv_len;
        OPENSSL_assert(nkey <= EVP_MAX_KEY_LENGTH);
        OPENSSL_assert(niv <= EVP_MAX_IV_LENGTH);
 
-       if (data == NULL) return(nkey);
+       if (data == NULL)
+               return (nkey);
 
        EVP_MD_CTX_init(&c);
-       for (;;)
-               {
-               if (!EVP_DigestInit_ex(&c,md, NULL))
+       for (;;) {
+               if (!EVP_DigestInit_ex(&c, md, NULL))
                        return 0;
                if (addmd++)
-                       if (!EVP_DigestUpdate(&c,&(md_buf[0]),mds))
+                       if (!EVP_DigestUpdate(&c, &(md_buf[0]), mds))
                                goto err;
-               if (!EVP_DigestUpdate(&c,data,datal))
+               if (!EVP_DigestUpdate(&c, data, datal))
                        goto err;
                if (salt != NULL)
-                       if (!EVP_DigestUpdate(&c,salt,PKCS5_SALT_LEN))
+                       if (!EVP_DigestUpdate(&c, salt, PKCS5_SALT_LEN))
                                goto err;
-               if (!EVP_DigestFinal_ex(&c,&(md_buf[0]),&mds))
+               if (!EVP_DigestFinal_ex(&c, &(md_buf[0]), &mds))
                        goto err;
 
-               for (i=1; i<(unsigned int)count; i++)
-                       {
-                       if (!EVP_DigestInit_ex(&c,md, NULL))
+               for (i = 1; i < (unsigned int)count; i++) {
+                       if (!EVP_DigestInit_ex(&c, md, NULL))
                                goto err;
-                       if (!EVP_DigestUpdate(&c,&(md_buf[0]),mds))
+                       if (!EVP_DigestUpdate(&c, &(md_buf[0]), mds))
                                goto err;
-                       if (!EVP_DigestFinal_ex(&c,&(md_buf[0]),&mds))
+                       if (!EVP_DigestFinal_ex(&c, &(md_buf[0]), &mds))
                                goto err;
-                       }
-               i=0;
-               if (nkey)
-                       {
-                       for (;;)
-                               {
-                               if (nkey == 0) break;
-                               if (i == mds) break;
+               }
+               i = 0;
+               if (nkey) {
+                       for (;;) {
+                               if (nkey == 0)
+                                       break;
+                               if (i == mds)
+                                       break;
                                if (key != NULL)
-                                       *(key++)=md_buf[i];
+                                       *(key++) = md_buf[i];
                                nkey--;
                                i++;
-                               }
                        }
-               if (niv && (i != mds))
-                       {
-                       for (;;)
-                               {
-                               if (niv == 0) break;
-                               if (i == mds) break;
+               }
+               if (niv && (i != mds)) {
+                       for (;;) {
+                               if (niv == 0)
+                                       break;
+                               if (i == mds)
+                                       break;
                                if (iv != NULL)
-                                       *(iv++)=md_buf[i];
+                                       *(iv++) = md_buf[i];
                                niv--;
                                i++;
-                               }
                        }
-               if ((nkey == 0) && (niv == 0)) break;
                }
+               if ((nkey == 0) && (niv == 0))
+                       break;
+       }
        rv = type->key_len;
-       err:
+
+err:
        EVP_MD_CTX_cleanup(&c);
-       OPENSSL_cleanse(&(md_buf[0]),EVP_MAX_MD_SIZE);
+       OPENSSL_cleanse(&(md_buf[0]), EVP_MAX_MD_SIZE);
        return rv;
-       }
-
+}
index b180e48..791f6b8 100644 (file)
@@ -5,21 +5,21 @@
  * This package is an SSL implementation written
  * by Eric Young (eay@cryptsoft.com).
  * The implementation was written so as to conform with Netscapes SSL.
- * 
+ *
  * This library is free for commercial and non-commercial use as long as
  * the following conditions are aheared to.  The following conditions
  * apply to all code found in this distribution, be it the RC4, RSA,
  * lhash, DES, etc., code; not just the SSL code.  The SSL documentation
  * included with this distribution is covered by the same copyright terms
  * except that the holder is Tim Hudson (tjh@cryptsoft.com).
- * 
+ *
  * Copyright remains Eric Young's, and as such any Copyright notices in
  * the code are not to be removed.
  * If this package is used in a product, Eric Young should be given attribution
  * as the author of the parts of the library used.
  * This can be in the form of a textual message at program startup or
  * in documentation (online or textual) provided with the package.
- * 
+ *
  * Redistribution and use in source and binary forms, with or without
  * modification, are permitted provided that the following conditions
  * are met:
  *     Eric Young (eay@cryptsoft.com)"
  *    The word 'cryptographic' can be left out if the rouines from the library
  *    being used are not cryptographic related :-).
- * 4. If you include any Windows specific code (or a derivative thereof) from 
+ * 4. If you include any Windows specific code (or a derivative thereof) from
  *    the apps directory (application code) you must include an acknowledgement:
  *    "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
- * 
+ *
  * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
@@ -49,7 +49,7 @@
  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
  * SUCH DAMAGE.
- * 
+ *
  * The licence and distribution terms for any publically available version or
  * derivative of this code cannot be changed.  i.e. this code cannot simply be
  * copied and put under another distribution licence
 #include <openssl/evp.h>
 #include <openssl/objects.h>
 
-int EVP_CIPHER_param_to_asn1(EVP_CIPHER_CTX *c, ASN1_TYPE *type)
-       {
+int
+EVP_CIPHER_param_to_asn1(EVP_CIPHER_CTX *c, ASN1_TYPE *type)
+{
        int ret;
 
        if (c->cipher->set_asn1_parameters != NULL)
-               ret=c->cipher->set_asn1_parameters(c,type);
+               ret = c->cipher->set_asn1_parameters(c, type);
        else if (c->cipher->flags & EVP_CIPH_FLAG_DEFAULT_ASN1)
-               ret=EVP_CIPHER_set_asn1_iv(c, type);
+               ret = EVP_CIPHER_set_asn1_iv(c, type);
        else
-               ret=-1;
-       return(ret);
-       }
+               ret = -1;
+       return (ret);
+}
 
-int EVP_CIPHER_asn1_to_param(EVP_CIPHER_CTX *c, ASN1_TYPE *type)
-       {
+int
+EVP_CIPHER_asn1_to_param(EVP_CIPHER_CTX *c, ASN1_TYPE *type)
+{
        int ret;
 
        if (c->cipher->get_asn1_parameters != NULL)
-               ret=c->cipher->get_asn1_parameters(c,type);
+               ret = c->cipher->get_asn1_parameters(c, type);
        else if (c->cipher->flags & EVP_CIPH_FLAG_DEFAULT_ASN1)
-               ret=EVP_CIPHER_get_asn1_iv(c, type);
+               ret = EVP_CIPHER_get_asn1_iv(c, type);
        else
-               ret=-1;
-       return(ret);
-       }
+               ret = -1;
+       return (ret);
+}
 
-int EVP_CIPHER_get_asn1_iv(EVP_CIPHER_CTX *c, ASN1_TYPE *type)
-       {
-       int i=0;
+int
+EVP_CIPHER_get_asn1_iv(EVP_CIPHER_CTX *c, ASN1_TYPE *type)
+{
+       int i = 0;
        unsigned int l;
 
-       if (type != NULL) 
-               {
-               l=EVP_CIPHER_CTX_iv_length(c);
+       if (type != NULL) {
+               l = EVP_CIPHER_CTX_iv_length(c);
                OPENSSL_assert(l <= sizeof(c->iv));
-               i=ASN1_TYPE_get_octetstring(type,c->oiv,l);
+               i = ASN1_TYPE_get_octetstring(type, c->oiv, l);
                if (i != (int)l)
-                       return(-1);
+                       return (-1);
                else if (i > 0)
-                       memcpy(c->iv,c->oiv,l);
-               }
-       return(i);
+                       memcpy(c->iv, c->oiv, l);
        }
+       return (i);
+}
 
-int EVP_CIPHER_set_asn1_iv(EVP_CIPHER_CTX *c, ASN1_TYPE *type)
-       {
-       int i=0;
+int
+EVP_CIPHER_set_asn1_iv(EVP_CIPHER_CTX *c, ASN1_TYPE *type)
+{
+       int i = 0;
        unsigned int j;
 
-       if (type != NULL)
-               {
-               j=EVP_CIPHER_CTX_iv_length(c);
+       if (type != NULL) {
+               j = EVP_CIPHER_CTX_iv_length(c);
                OPENSSL_assert(j <= sizeof(c->iv));
-               i=ASN1_TYPE_set_octetstring(type,c->oiv,j);
-               }
-       return(i);
+               i = ASN1_TYPE_set_octetstring(type, c->oiv, j);
        }
+       return (i);
+}
 
 /* Convert the various cipher NIDs and dummies to a proper OID NID */
-int EVP_CIPHER_type(const EVP_CIPHER *ctx)
+int
+EVP_CIPHER_type(const EVP_CIPHER *ctx)
 {
        int nid;
        ASN1_OBJECT *otmp;
        nid = EVP_CIPHER_nid(ctx);
 
-       switch(nid) {
-
-               case NID_rc2_cbc:
-               case NID_rc2_64_cbc:
-               case NID_rc2_40_cbc:
-
+       switch (nid) {
+       case NID_rc2_cbc:
+       case NID_rc2_64_cbc:
+       case NID_rc2_40_cbc:
                return NID_rc2_cbc;
 
-               case NID_rc4:
-               case NID_rc4_40:
-
+       case NID_rc4:
+       case NID_rc4_40:
                return NID_rc4;
 
-               case NID_aes_128_cfb128:
-               case NID_aes_128_cfb8:
-               case NID_aes_128_cfb1:
-
+       case NID_aes_128_cfb128:
+       case NID_aes_128_cfb8:
+       case NID_aes_128_cfb1:
                return NID_aes_128_cfb128;
 
-               case NID_aes_192_cfb128:
-               case NID_aes_192_cfb8:
-               case NID_aes_192_cfb1:
-
+       case NID_aes_192_cfb128:
+       case NID_aes_192_cfb8:
+       case NID_aes_192_cfb1:
                return NID_aes_192_cfb128;
 
-               case NID_aes_256_cfb128:
-               case NID_aes_256_cfb8:
-               case NID_aes_256_cfb1:
-
+       case NID_aes_256_cfb128:
+       case NID_aes_256_cfb8:
+       case NID_aes_256_cfb1:
                return NID_aes_256_cfb128;
 
-               case NID_des_cfb64:
-               case NID_des_cfb8:
-               case NID_des_cfb1:
-
+       case NID_des_cfb64:
+       case NID_des_cfb8:
+       case NID_des_cfb1:
                return NID_des_cfb64;
 
-               case NID_des_ede3_cfb64:
-               case NID_des_ede3_cfb8:
-               case NID_des_ede3_cfb1:
-
+       case NID_des_ede3_cfb64:
+       case NID_des_ede3_cfb8:
+       case NID_des_ede3_cfb1:
                return NID_des_cfb64;
 
-               default:
+       default:
                /* Check it has an OID and it is valid */
                otmp = OBJ_nid2obj(nid);
-               if(!otmp || !otmp->data) nid = NID_undef;
+               if (!otmp || !otmp->data)
+                       nid = NID_undef;
                ASN1_OBJECT_free(otmp);
                return nid;
        }
 }
 
-int EVP_CIPHER_block_size(const EVP_CIPHER *e)
-       {
+int
+EVP_CIPHER_block_size(const EVP_CIPHER *e)
+{
        return e->block_size;
-       }
+}
 
-int EVP_CIPHER_CTX_block_size(const EVP_CIPHER_CTX *ctx)
-       {
+int
+EVP_CIPHER_CTX_block_size(const EVP_CIPHER_CTX *ctx)
+{
        return ctx->cipher->block_size;
-       }
+}
 
-int EVP_Cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, const unsigned char *in, unsigned int inl)
-       {
-       return ctx->cipher->do_cipher(ctx,out,in,inl);
-       }
+int
+EVP_Cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, const unsigned char *in,
+    unsigned int inl)
+{
+       return ctx->cipher->do_cipher(ctx, out, in, inl);
+}
 
-const EVP_CIPHER *EVP_CIPHER_CTX_cipher(const EVP_CIPHER_CTX *ctx)
-       {
+const EVP_CIPHER *
+EVP_CIPHER_CTX_cipher(const EVP_CIPHER_CTX *ctx)
+{
        return ctx->cipher;
-       }
+}
 
-unsigned long EVP_CIPHER_flags(const EVP_CIPHER *cipher)
-       {
+unsigned long
+EVP_CIPHER_flags(const EVP_CIPHER *cipher)
+{
        return cipher->flags;
-       }
+}
 
-unsigned long EVP_CIPHER_CTX_flags(const EVP_CIPHER_CTX *ctx)
-       {
+unsigned long
+EVP_CIPHER_CTX_flags(const EVP_CIPHER_CTX *ctx)
+{
        return ctx->cipher->flags;
-       }
+}
 
-void *EVP_CIPHER_CTX_get_app_data(const EVP_CIPHER_CTX *ctx)
-       {
+void *
+EVP_CIPHER_CTX_get_app_data(const EVP_CIPHER_CTX *ctx)
+{
        return ctx->app_data;
-       }
+}
 
-void EVP_CIPHER_CTX_set_app_data(EVP_CIPHER_CTX *ctx, void *data)
-       {
+void
+EVP_CIPHER_CTX_set_app_data(EVP_CIPHER_CTX *ctx, void *data)
+{
        ctx->app_data = data;
-       }
+}
 
-int EVP_CIPHER_iv_length(const EVP_CIPHER *cipher)
-       {
+int
+EVP_CIPHER_iv_length(const EVP_CIPHER *cipher)
+{
        return cipher->iv_len;
-       }
+}
 
-int EVP_CIPHER_CTX_iv_length(const EVP_CIPHER_CTX *ctx)
-       {
+int
+EVP_CIPHER_CTX_iv_length(const EVP_CIPHER_CTX *ctx)
+{
        return ctx->cipher->iv_len;
-       }
+}
 
-int EVP_CIPHER_key_length(const EVP_CIPHER *cipher)
-       {
+int
+EVP_CIPHER_key_length(const EVP_CIPHER *cipher)
+{
        return cipher->key_len;
-       }
+}
 
-int EVP_CIPHER_CTX_key_length(const EVP_CIPHER_CTX *ctx)
-       {
+int
+EVP_CIPHER_CTX_key_length(const EVP_CIPHER_CTX *ctx)
+{
        return ctx->key_len;
-       }
+}
 
-int EVP_CIPHER_nid(const EVP_CIPHER *cipher)
-       {
+int
+EVP_CIPHER_nid(const EVP_CIPHER *cipher)
+{
        return cipher->nid;
-       }
+}
 
-int EVP_CIPHER_CTX_nid(const EVP_CIPHER_CTX *ctx)
-       {
+int
+EVP_CIPHER_CTX_nid(const EVP_CIPHER_CTX *ctx)
+{
        return ctx->cipher->nid;
-       }
+}
 
-int EVP_MD_block_size(const EVP_MD *md) 
-       {
+int
+EVP_MD_block_size(const EVP_MD *md)
+{
        return md->block_size;
-       }
+}
 
-int EVP_MD_type(const EVP_MD *md)
-       {
+int
+EVP_MD_type(const EVP_MD *md)
+{
        return md->type;
-       }
+}
 
-int EVP_MD_pkey_type(const EVP_MD *md)
-       {
+int
+EVP_MD_pkey_type(const EVP_MD *md)
+{
        return md->pkey_type;
-       }
+}
 
-int EVP_MD_size(const EVP_MD *md)
-       {
-       if (!md)
-               {
+int
+EVP_MD_size(const EVP_MD *md)
+{
+       if (!md) {
                EVPerr(EVP_F_EVP_MD_SIZE, EVP_R_MESSAGE_DIGEST_IS_NULL);
                return -1;
-               }
-       return md->md_size;
        }
+       return md->md_size;
+}
 
-unsigned long EVP_MD_flags(const EVP_MD *md)
-       {
+unsigned long
+EVP_MD_flags(const EVP_MD *md)
+{
        return md->flags;
-       }
+}
 
-const EVP_MD *EVP_MD_CTX_md(const EVP_MD_CTX *ctx)
-       {
+const EVP_MD *
+EVP_MD_CTX_md(const EVP_MD_CTX *ctx)
+{
        if (!ctx)
                return NULL;
        return ctx->digest;
-       }
+}
 
-void EVP_MD_CTX_set_flags(EVP_MD_CTX *ctx, int flags)
-       {
+void
+EVP_MD_CTX_set_flags(EVP_MD_CTX *ctx, int flags)
+{
        ctx->flags |= flags;
-       }
+}
 
-void EVP_MD_CTX_clear_flags(EVP_MD_CTX *ctx, int flags)
-       {
+void
+EVP_MD_CTX_clear_flags(EVP_MD_CTX *ctx, int flags)
+{
        ctx->flags &= ~flags;
-       }
+}
 
-int EVP_MD_CTX_test_flags(const EVP_MD_CTX *ctx, int flags)
-       {
+int
+EVP_MD_CTX_test_flags(const EVP_MD_CTX *ctx, int flags)
+{
        return (ctx->flags & flags);
-       }
+}
 
-void EVP_CIPHER_CTX_set_flags(EVP_CIPHER_CTX *ctx, int flags)
-       {
+void
+EVP_CIPHER_CTX_set_flags(EVP_CIPHER_CTX *ctx, int flags)
+{
        ctx->flags |= flags;
-       }
+}
 
-void EVP_CIPHER_CTX_clear_flags(EVP_CIPHER_CTX *ctx, int flags)
-       {
+void
+EVP_CIPHER_CTX_clear_flags(EVP_CIPHER_CTX *ctx, int flags)
+{
        ctx->flags &= ~flags;
-       }
+}
 
-int EVP_CIPHER_CTX_test_flags(const EVP_CIPHER_CTX *ctx, int flags)
-       {
+int
+EVP_CIPHER_CTX_test_flags(const EVP_CIPHER_CTX *ctx, int flags)
+{
        return (ctx->flags & flags);
-       }
+}
index 37683af..779c159 100644 (file)
@@ -10,7 +10,7 @@
  * are met:
  *
  * 1. Redistributions of source code must retain the above copyright
- *    notice, this list of conditions and the following disclaimer. 
+ *    notice, this list of conditions and the following disclaimer.
  *
  * 2. Redistributions in binary form must reproduce the above copyright
  *    notice, this list of conditions and the following disclaimer in
@@ -70,50 +70,36 @@ static STACK_OF(EVP_PBE_CTL) *pbe_algs;
 
 /* Setup a cipher context from a PBE algorithm */
 
-typedef struct
-       {
+typedef struct {
        int pbe_type;
        int pbe_nid;
        int cipher_nid;
        int md_nid;
        EVP_PBE_KEYGEN *keygen;
-       } EVP_PBE_CTL;
+} EVP_PBE_CTL;
 
-static const EVP_PBE_CTL builtin_pbe[] = 
-       {
-       {EVP_PBE_TYPE_OUTER, NID_pbeWithMD2AndDES_CBC,
-                       NID_des_cbc, NID_md2, PKCS5_PBE_keyivgen},
-       {EVP_PBE_TYPE_OUTER, NID_pbeWithMD5AndDES_CBC,
-                       NID_des_cbc, NID_md5, PKCS5_PBE_keyivgen},
-       {EVP_PBE_TYPE_OUTER, NID_pbeWithSHA1AndRC2_CBC,
-                       NID_rc2_64_cbc, NID_sha1, PKCS5_PBE_keyivgen},
+static const EVP_PBE_CTL builtin_pbe[] = {
+       {EVP_PBE_TYPE_OUTER, NID_pbeWithMD2AndDES_CBC, NID_des_cbc, NID_md2, PKCS5_PBE_keyivgen},
+       {EVP_PBE_TYPE_OUTER, NID_pbeWithMD5AndDES_CBC, NID_des_cbc, NID_md5, PKCS5_PBE_keyivgen},
+       {EVP_PBE_TYPE_OUTER, NID_pbeWithSHA1AndRC2_CBC, NID_rc2_64_cbc, NID_sha1, PKCS5_PBE_keyivgen},
 
 #ifndef OPENSSL_NO_HMAC
        {EVP_PBE_TYPE_OUTER, NID_id_pbkdf2, -1, -1, PKCS5_v2_PBKDF2_keyivgen},
 #endif
 
-       {EVP_PBE_TYPE_OUTER, NID_pbe_WithSHA1And128BitRC4,
-                       NID_rc4, NID_sha1, PKCS12_PBE_keyivgen},
-       {EVP_PBE_TYPE_OUTER, NID_pbe_WithSHA1And40BitRC4,
-                       NID_rc4_40, NID_sha1, PKCS12_PBE_keyivgen},
-       {EVP_PBE_TYPE_OUTER, NID_pbe_WithSHA1And3_Key_TripleDES_CBC,
-                       NID_des_ede3_cbc, NID_sha1, PKCS12_PBE_keyivgen},
-       {EVP_PBE_TYPE_OUTER, NID_pbe_WithSHA1And2_Key_TripleDES_CBC, 
-                       NID_des_ede_cbc, NID_sha1, PKCS12_PBE_keyivgen},
-       {EVP_PBE_TYPE_OUTER, NID_pbe_WithSHA1And128BitRC2_CBC,
-                       NID_rc2_cbc, NID_sha1, PKCS12_PBE_keyivgen},
-       {EVP_PBE_TYPE_OUTER, NID_pbe_WithSHA1And40BitRC2_CBC,
-                       NID_rc2_40_cbc, NID_sha1, PKCS12_PBE_keyivgen},
+       {EVP_PBE_TYPE_OUTER, NID_pbe_WithSHA1And128BitRC4, NID_rc4, NID_sha1, PKCS12_PBE_keyivgen},
+       {EVP_PBE_TYPE_OUTER, NID_pbe_WithSHA1And40BitRC4, NID_rc4_40, NID_sha1, PKCS12_PBE_keyivgen},
+       {EVP_PBE_TYPE_OUTER, NID_pbe_WithSHA1And3_Key_TripleDES_CBC, NID_des_ede3_cbc, NID_sha1, PKCS12_PBE_keyivgen},
+       {EVP_PBE_TYPE_OUTER, NID_pbe_WithSHA1And2_Key_TripleDES_CBC, NID_des_ede_cbc, NID_sha1, PKCS12_PBE_keyivgen},
+       {EVP_PBE_TYPE_OUTER, NID_pbe_WithSHA1And128BitRC2_CBC, NID_rc2_cbc, NID_sha1, PKCS12_PBE_keyivgen},
+       {EVP_PBE_TYPE_OUTER, NID_pbe_WithSHA1And40BitRC2_CBC, NID_rc2_40_cbc, NID_sha1, PKCS12_PBE_keyivgen},
 
 #ifndef OPENSSL_NO_HMAC
        {EVP_PBE_TYPE_OUTER, NID_pbes2, -1, -1, PKCS5_v2_PBE_keyivgen},
 #endif
-       {EVP_PBE_TYPE_OUTER, NID_pbeWithMD2AndRC2_CBC,
-                       NID_rc2_64_cbc, NID_md2, PKCS5_PBE_keyivgen},
-       {EVP_PBE_TYPE_OUTER, NID_pbeWithMD5AndRC2_CBC,
-                       NID_rc2_64_cbc, NID_md5, PKCS5_PBE_keyivgen},
-       {EVP_PBE_TYPE_OUTER, NID_pbeWithSHA1AndDES_CBC,
-                       NID_des_cbc, NID_sha1, PKCS5_PBE_keyivgen},
+       {EVP_PBE_TYPE_OUTER, NID_pbeWithMD2AndRC2_CBC, NID_rc2_64_cbc, NID_md2, PKCS5_PBE_keyivgen},
+       {EVP_PBE_TYPE_OUTER, NID_pbeWithMD5AndRC2_CBC, NID_rc2_64_cbc, NID_md5, PKCS5_PBE_keyivgen},
+       {EVP_PBE_TYPE_OUTER, NID_pbeWithSHA1AndDES_CBC, NID_des_cbc, NID_sha1, PKCS5_PBE_keyivgen},
 
 
        {EVP_PBE_TYPE_PRF, NID_hmacWithSHA1, -1, NID_sha1, 0},
@@ -123,141 +109,141 @@ static const EVP_PBE_CTL builtin_pbe[] =
        {EVP_PBE_TYPE_PRF, NID_hmacWithSHA384, -1, NID_sha384, 0},
        {EVP_PBE_TYPE_PRF, NID_hmacWithSHA512, -1, NID_sha512, 0},
        {EVP_PBE_TYPE_PRF, NID_id_HMACGostR3411_94, -1, NID_id_GostR3411_94, 0},
-       };
+};
 
 #ifdef TEST
-int main(int argc, char **argv)
-       {
+int
+main(int argc, char **argv)
+{
        int i, nid_md, nid_cipher;
        EVP_PBE_CTL *tpbe, *tpbe2;
        /*OpenSSL_add_all_algorithms();*/
 
-       for (i = 0; i < sizeof(builtin_pbe)/sizeof(EVP_PBE_CTL); i++)
-               {
+       for (i = 0; i < sizeof(builtin_pbe) / sizeof(EVP_PBE_CTL); i++) {
                tpbe = builtin_pbe + i;
                fprintf(stderr, "%d %d %s ", tpbe->pbe_type, tpbe->pbe_nid,
-                                               OBJ_nid2sn(tpbe->pbe_nid));
+                   OBJ_nid2sn(tpbe->pbe_nid));
                if (EVP_PBE_find(tpbe->pbe_type, tpbe->pbe_nid,
-                                       &nid_cipher ,&nid_md,0))
+                   &nid_cipher , &nid_md, 0))
                        fprintf(stderr, "Found %s %s\n",
-                                       OBJ_nid2sn(nid_cipher),
-                                       OBJ_nid2sn(nid_md));
+                           OBJ_nid2sn(nid_cipher), OBJ_nid2sn(nid_md));
                else
                        fprintf(stderr, "Find ERROR!!\n");
-               }
+       }
 
        return 0;
-       }
+}
 #endif
-               
-
 
-int EVP_PBE_CipherInit(ASN1_OBJECT *pbe_obj, const char *pass, int passlen,
-                      ASN1_TYPE *param, EVP_CIPHER_CTX *ctx, int en_de)
-       {
+int
+EVP_PBE_CipherInit(ASN1_OBJECT *pbe_obj, const char *pass, int passlen,
+    ASN1_TYPE *param, EVP_CIPHER_CTX *ctx, int en_de)
+{
        const EVP_CIPHER *cipher;
        const EVP_MD *md;
        int cipher_nid, md_nid;
        EVP_PBE_KEYGEN *keygen;
 
        if (!EVP_PBE_find(EVP_PBE_TYPE_OUTER, OBJ_obj2nid(pbe_obj),
-                                       &cipher_nid, &md_nid, &keygen))
-               {
+           &cipher_nid, &md_nid, &keygen)) {
                char obj_tmp[80];
-               EVPerr(EVP_F_EVP_PBE_CIPHERINIT,EVP_R_UNKNOWN_PBE_ALGORITHM);
-               if (!pbe_obj) strlcpy (obj_tmp, "NULL", sizeof obj_tmp);
-               else i2t_ASN1_OBJECT(obj_tmp, sizeof obj_tmp, pbe_obj);
+               EVPerr(EVP_F_EVP_PBE_CIPHERINIT, EVP_R_UNKNOWN_PBE_ALGORITHM);
+               if (!pbe_obj)
+                       strlcpy (obj_tmp, "NULL", sizeof obj_tmp);
+               else
+                       i2t_ASN1_OBJECT(obj_tmp, sizeof obj_tmp, pbe_obj);
                ERR_asprintf_error_data("TYPE=%s", obj_tmp);
                return 0;
-               }
+       }
 
-       if(!pass)
+       if (!pass)
                passlen = 0;
        else if (passlen == -1)
                passlen = strlen(pass);
 
        if (cipher_nid == -1)
                cipher = NULL;
-       else
-               {
+       else {
                cipher = EVP_get_cipherbynid(cipher_nid);
-               if (!cipher)
-                       {
-                       EVPerr(EVP_F_EVP_PBE_CIPHERINIT,EVP_R_UNKNOWN_CIPHER);
+               if (!cipher) {
+                       EVPerr(EVP_F_EVP_PBE_CIPHERINIT, EVP_R_UNKNOWN_CIPHER);
                        return 0;
-                       }
                }
+       }
 
        if (md_nid == -1)
                md = NULL;
-       else
-               {
+       else {
                md = EVP_get_digestbynid(md_nid);
-               if (!md)
-                       {
-                       EVPerr(EVP_F_EVP_PBE_CIPHERINIT,EVP_R_UNKNOWN_DIGEST);
+               if (!md) {
+                       EVPerr(EVP_F_EVP_PBE_CIPHERINIT, EVP_R_UNKNOWN_DIGEST);
                        return 0;
-                       }
                }
+       }
 
-       if (!keygen(ctx, pass, passlen, param, cipher, md, en_de))
-               {
-               EVPerr(EVP_F_EVP_PBE_CIPHERINIT,EVP_R_KEYGEN_FAILURE);
+       if (!keygen(ctx, pass, passlen, param, cipher, md, en_de)) {
+               EVPerr(EVP_F_EVP_PBE_CIPHERINIT, EVP_R_KEYGEN_FAILURE);
                return 0;
-               }
-       return 1;       
+       }
+       return 1;
 }
 
 DECLARE_OBJ_BSEARCH_CMP_FN(EVP_PBE_CTL, EVP_PBE_CTL, pbe2);
 
-static int pbe2_cmp(const EVP_PBE_CTL *pbe1, const EVP_PBE_CTL *pbe2)
-       {
+static int
+pbe2_cmp(const EVP_PBE_CTL *pbe1, const EVP_PBE_CTL *pbe2)
+{
        int ret = pbe1->pbe_type - pbe2->pbe_type;
+
        if (ret)
                return ret;
        else
                return pbe1->pbe_nid - pbe2->pbe_nid;
-       }
+}
 
 IMPLEMENT_OBJ_BSEARCH_CMP_FN(EVP_PBE_CTL, EVP_PBE_CTL, pbe2);
 
-static int pbe_cmp(const EVP_PBE_CTL * const *a, const EVP_PBE_CTL * const *b)
-       {
+static int
+pbe_cmp(const EVP_PBE_CTL * const *a, const EVP_PBE_CTL * const *b)
+{
        int ret = (*a)->pbe_type - (*b)->pbe_type;
+
        if (ret)
                return ret;
        else
                return (*a)->pbe_nid - (*b)->pbe_nid;
-       }
+}
 
 /* Add a PBE algorithm */
 
-int EVP_PBE_alg_add_type(int pbe_type, int pbe_nid, int cipher_nid, int md_nid,
-                        EVP_PBE_KEYGEN *keygen)
-       {
+int
+EVP_PBE_alg_add_type(int pbe_type, int pbe_nid, int cipher_nid, int md_nid,
+    EVP_PBE_KEYGEN *keygen)
+{
        EVP_PBE_CTL *pbe_tmp;
+
        if (!pbe_algs)
                pbe_algs = sk_EVP_PBE_CTL_new(pbe_cmp);
-       if (!(pbe_tmp = (EVP_PBE_CTL*) malloc (sizeof(EVP_PBE_CTL))))
-               {
-               EVPerr(EVP_F_EVP_PBE_ALG_ADD_TYPE,ERR_R_MALLOC_FAILURE);
+       if (!(pbe_tmp = (EVP_PBE_CTL*) malloc (sizeof(EVP_PBE_CTL)))) {
+               EVPerr(EVP_F_EVP_PBE_ALG_ADD_TYPE, ERR_R_MALLOC_FAILURE);
                return 0;
-               }
+       }
        pbe_tmp->pbe_type = pbe_type;
        pbe_tmp->pbe_nid = pbe_nid;
        pbe_tmp->cipher_nid = cipher_nid;
        pbe_tmp->md_nid = md_nid;
        pbe_tmp->keygen = keygen;
 
-
        sk_EVP_PBE_CTL_push (pbe_algs, pbe_tmp);
        return 1;
-       }
+}
 
-int EVP_PBE_alg_add(int nid, const EVP_CIPHER *cipher, const EVP_MD *md,
-                   EVP_PBE_KEYGEN *keygen)
-       {
+int
+EVP_PBE_alg_add(int nid, const EVP_CIPHER *cipher, const EVP_MD *md,
+    EVP_PBE_KEYGEN *keygen)
+{
        int cipher_nid, md_nid;
+
        if (cipher)
                cipher_nid = EVP_CIPHER_type(cipher);
        else
@@ -268,12 +254,13 @@ int EVP_PBE_alg_add(int nid, const EVP_CIPHER *cipher, const EVP_MD *md,
                md_nid = -1;
 
        return EVP_PBE_alg_add_type(EVP_PBE_TYPE_OUTER, nid,
-                                       cipher_nid, md_nid, keygen);
-       }
+           cipher_nid, md_nid, keygen);
+}
 
-int EVP_PBE_find(int type, int pbe_nid,
-                int *pcnid, int *pmnid, EVP_PBE_KEYGEN **pkeygen)
-       {
+int
+EVP_PBE_find(int type, int pbe_nid,
+    int *pcnid, int *pmnid, EVP_PBE_KEYGEN **pkeygen)
+{
        EVP_PBE_CTL *pbetmp = NULL, pbelu;
        int i;
        if (pbe_nid == NID_undef)
@@ -282,17 +269,15 @@ int EVP_PBE_find(int type, int pbe_nid,
        pbelu.pbe_type = type;
        pbelu.pbe_nid = pbe_nid;
 
-       if (pbe_algs)
-               {
+       if (pbe_algs) {
                i = sk_EVP_PBE_CTL_find(pbe_algs, &pbelu);
                if (i != -1)
                        pbetmp = sk_EVP_PBE_CTL_value (pbe_algs, i);
-               }
-       if (pbetmp == NULL)
-               {
+       }
+       if (pbetmp == NULL) {
                pbetmp = OBJ_bsearch_pbe2(&pbelu, builtin_pbe,
-                                    sizeof(builtin_pbe)/sizeof(EVP_PBE_CTL));
-               }
+                   sizeof(builtin_pbe)/sizeof(EVP_PBE_CTL));
+       }
        if (pbetmp == NULL)
                return 0;
        if (pcnid)
@@ -302,15 +287,17 @@ int EVP_PBE_find(int type, int pbe_nid,
        if (pkeygen)
                *pkeygen = pbetmp->keygen;
        return 1;
-       }
+}
 
-static void free_evp_pbe_ctl(EVP_PBE_CTL *pbe)
-        {
-        free(pbe);
-        }
+static void
+free_evp_pbe_ctl(EVP_PBE_CTL *pbe)
+{
+       free(pbe);
+}
 
-void EVP_PBE_cleanup(void)
-       {
+void
+EVP_PBE_cleanup(void)
+{
        sk_EVP_PBE_CTL_pop_free(pbe_algs, free_evp_pbe_ctl);
        pbe_algs = NULL;
-       }
+}
index 94056f0..99fe5b3 100644 (file)
@@ -10,7 +10,7 @@
  * are met:
  *
  * 1. Redistributions of source code must retain the above copyright
- *    notice, this list of conditions and the following disclaimer. 
+ *    notice, this list of conditions and the following disclaimer.
  *
  * 2. Redistributions in binary form must reproduce the above copyright
  *    notice, this list of conditions and the following disclaimer in
@@ -65,7 +65,8 @@
 
 /* Extract a private key from a PKCS8 structure */
 
-EVP_PKEY *EVP_PKCS82PKEY(PKCS8_PRIV_KEY_INFO *p8)
+EVP_PKEY *
+EVP_PKCS82PKEY(PKCS8_PRIV_KEY_INFO *p8)
 {
        EVP_PKEY *pkey = NULL;
        ASN1_OBJECT *algoid;
@@ -75,166 +76,164 @@ EVP_PKEY *EVP_PKCS82PKEY(PKCS8_PRIV_KEY_INFO *p8)
                return NULL;
 
        if (!(pkey = EVP_PKEY_new())) {
-               EVPerr(EVP_F_EVP_PKCS82PKEY,ERR_R_MALLOC_FAILURE);
+               EVPerr(EVP_F_EVP_PKCS82PKEY, ERR_R_MALLOC_FAILURE);
                return NULL;
        }
 
-       if (!EVP_PKEY_set_type(pkey, OBJ_obj2nid(algoid)))
-               {
-               EVPerr(EVP_F_EVP_PKCS82PKEY, EVP_R_UNSUPPORTED_PRIVATE_KEY_ALGORITHM);
+       if (!EVP_PKEY_set_type(pkey, OBJ_obj2nid(algoid))) {
+               EVPerr(EVP_F_EVP_PKCS82PKEY,
+                   EVP_R_UNSUPPORTED_PRIVATE_KEY_ALGORITHM);
                i2t_ASN1_OBJECT(obj_tmp, 80, algoid);
                ERR_asprintf_error_data("TYPE=%s", obj_tmp);
                goto error;
-               }
+       }
 
-       if (pkey->ameth->priv_decode)
-               {
-               if (!pkey->ameth->priv_decode(pkey, p8))
-                       {
+       if (pkey->ameth->priv_decode) {
+               if (!pkey->ameth->priv_decode(pkey, p8)) {
                        EVPerr(EVP_F_EVP_PKCS82PKEY,
-                                       EVP_R_PRIVATE_KEY_DECODE_ERROR);
+                           EVP_R_PRIVATE_KEY_DECODE_ERROR);
                        goto error;
-                       }
                }
-       else
-               {
+       } else {
                EVPerr(EVP_F_EVP_PKCS82PKEY, EVP_R_METHOD_NOT_SUPPORTED);
                goto error;
-               }
+       }
 
        return pkey;
 
-       error:
+error:
        EVP_PKEY_free (pkey);
        return NULL;
 }
 
-PKCS8_PRIV_KEY_INFO *EVP_PKEY2PKCS8(EVP_PKEY *pkey)
+PKCS8_PRIV_KEY_INFO *
+EVP_PKEY2PKCS8(EVP_PKEY *pkey)
 {
        return EVP_PKEY2PKCS8_broken(pkey, PKCS8_OK);
 }
 
 /* Turn a private key into a PKCS8 structure */
 
-PKCS8_PRIV_KEY_INFO *EVP_PKEY2PKCS8_broken(EVP_PKEY *pkey, int broken)
+PKCS8_PRIV_KEY_INFO *
+EVP_PKEY2PKCS8_broken(EVP_PKEY *pkey, int broken)
 {
        PKCS8_PRIV_KEY_INFO *p8;
 
-       if (!(p8 = PKCS8_PRIV_KEY_INFO_new())) {        
-               EVPerr(EVP_F_EVP_PKEY2PKCS8_BROKEN,ERR_R_MALLOC_FAILURE);
+       if (!(p8 = PKCS8_PRIV_KEY_INFO_new())) {
+               EVPerr(EVP_F_EVP_PKEY2PKCS8_BROKEN, ERR_R_MALLOC_FAILURE);
                return NULL;
        }
        p8->broken = broken;
 
-       if (pkey->ameth)
-               {
-               if (pkey->ameth->priv_encode)
-                       {
-                       if (!pkey->ameth->priv_encode(p8, pkey))
-                               {
+       if (pkey->ameth) {
+               if (pkey->ameth->priv_encode) {
+                       if (!pkey->ameth->priv_encode(p8, pkey)) {
                                EVPerr(EVP_F_EVP_PKEY2PKCS8_BROKEN,
-                                       EVP_R_PRIVATE_KEY_ENCODE_ERROR);
+                                   EVP_R_PRIVATE_KEY_ENCODE_ERROR);
                                goto error;
-                               }
                        }
-               else
-                       {
+               } else {
                        EVPerr(EVP_F_EVP_PKEY2PKCS8_BROKEN,
-                                       EVP_R_METHOD_NOT_SUPPORTED);
+                           EVP_R_METHOD_NOT_SUPPORTED);
                        goto error;
-                       }
                }
-       else
-               {
+       } else {
                EVPerr(EVP_F_EVP_PKEY2PKCS8_BROKEN,
-                               EVP_R_UNSUPPORTED_PRIVATE_KEY_ALGORITHM);
+                   EVP_R_UNSUPPORTED_PRIVATE_KEY_ALGORITHM);
                goto error;
-               }
+       }
        return p8;
-       error:
+
+error:
        PKCS8_PRIV_KEY_INFO_free(p8);
        return NULL;
 }
 
-PKCS8_PRIV_KEY_INFO *PKCS8_set_broken(PKCS8_PRIV_KEY_INFO *p8, int broken)
+PKCS8_PRIV_KEY_INFO *
+PKCS8_set_broken(PKCS8_PRIV_KEY_INFO *p8, int broken)
 {
        switch (broken) {
-
-               case PKCS8_OK:
+       case PKCS8_OK:
                p8->broken = PKCS8_OK;
                return p8;
                break;
 
-               case PKCS8_NO_OCTET:
+       case PKCS8_NO_OCTET:
                p8->broken = PKCS8_NO_OCTET;
                p8->pkey->type = V_ASN1_SEQUENCE;
                return p8;
                break;
 
-               default:
-               EVPerr(EVP_F_PKCS8_SET_BROKEN,EVP_R_PKCS8_UNKNOWN_BROKEN_TYPE);
+       default:
+               EVPerr(EVP_F_PKCS8_SET_BROKEN, EVP_R_PKCS8_UNKNOWN_BROKEN_TYPE);
                return NULL;
        }
 }
 
 /* EVP_PKEY attribute functions */
 
-int EVP_PKEY_get_attr_count(const EVP_PKEY *key)
+int
+EVP_PKEY_get_attr_count(const EVP_PKEY *key)
 {
        return X509at_get_attr_count(key->attributes);
 }
 
-int EVP_PKEY_get_attr_by_NID(const EVP_PKEY *key, int nid,
-                         int lastpos)
+int
+EVP_PKEY_get_attr_by_NID(const EVP_PKEY *key, int nid, int lastpos)
 {
        return X509at_get_attr_by_NID(key->attributes, nid, lastpos);
 }
 
-int EVP_PKEY_get_attr_by_OBJ(const EVP_PKEY *key, ASN1_OBJECT *obj,
-                         int lastpos)
+int
+EVP_PKEY_get_attr_by_OBJ(const EVP_PKEY *key, ASN1_OBJECT *obj, int lastpos)
 {
        return X509at_get_attr_by_OBJ(key->attributes, obj, lastpos);
 }
 
-X509_ATTRIBUTE *EVP_PKEY_get_attr(const EVP_PKEY *key, int loc)
+X509_ATTRIBUTE *
+EVP_PKEY_get_attr(const EVP_PKEY *key, int loc)
 {
        return X509at_get_attr(key->attributes, loc);
 }
 
-X509_ATTRIBUTE *EVP_PKEY_delete_attr(EVP_PKEY *key, int loc)
+X509_ATTRIBUTE *
+EVP_PKEY_delete_attr(EVP_PKEY *key, int loc)
 {
        return X509at_delete_attr(key->attributes, loc);
 }
 
-int EVP_PKEY_add1_attr(EVP_PKEY *key, X509_ATTRIBUTE *attr)
+int
+EVP_PKEY_add1_attr(EVP_PKEY *key, X509_ATTRIBUTE *attr)
 {
-       if(X509at_add1_attr(&key->attributes, attr)) return 1;
+       if (X509at_add1_attr(&key->attributes, attr))
+               return 1;
        return 0;
 }
 
-int EVP_PKEY_add1_attr_by_OBJ(EVP_PKEY *key,
-                       const ASN1_OBJECT *obj, int type,
-                       const unsigned char *bytes, int len)
+int
+EVP_PKEY_add1_attr_by_OBJ(EVP_PKEY *key, const ASN1_OBJECT *obj, int type,
+    const unsigned char *bytes, int len)
 {
-       if(X509at_add1_attr_by_OBJ(&key->attributes, obj,
-                               type, bytes, len)) return 1;
+       if (X509at_add1_attr_by_OBJ(&key->attributes, obj, type, bytes, len))
+               return 1;
        return 0;
 }
 
-int EVP_PKEY_add1_attr_by_NID(EVP_PKEY *key,
-                       int nid, int type,
-                       const unsigned char *bytes, int len)
+int
+EVP_PKEY_add1_attr_by_NID(EVP_PKEY *key, int nid, int type,
+    const unsigned char *bytes, int len)
 {
-       if(X509at_add1_attr_by_NID(&key->attributes, nid,
-                               type, bytes, len)) return 1;
+       if (X509at_add1_attr_by_NID(&key->attributes, nid, type, bytes, len))
+               return 1;
        return 0;
 }
 
-int EVP_PKEY_add1_attr_by_txt(EVP_PKEY *key,
-                       const char *attrname, int type,
-                       const unsigned char *bytes, int len)
+int
+EVP_PKEY_add1_attr_by_txt(EVP_PKEY *key, const char *attrname, int type,
+    const unsigned char *bytes, int len)
 {
-       if(X509at_add1_attr_by_txt(&key->attributes, attrname,
-                               type, bytes, len)) return 1;
+       if (X509at_add1_attr_by_txt(&key->attributes, attrname, type,
+           bytes, len))
+               return 1;
        return 0;
 }
index 643a186..afbbc39 100644 (file)
@@ -10,7 +10,7 @@
  * are met:
  *
  * 1. Redistributions of source code must retain the above copyright
- *    notice, this list of conditions and the following disclaimer. 
+ *    notice, this list of conditions and the following disclaimer.
  *
  * 2. Redistributions in binary form must reproduce the above copyright
  *    notice, this list of conditions and the following disclaimer in
 #include <openssl/evp.h>
 #include <openssl/conf.h>
 
-
 /* Load all algorithms and configure OpenSSL.
  * This function is called automatically when
  * OPENSSL_LOAD_CONF is set.
  */
 
-void OPENSSL_add_all_algorithms_conf(void)
-       {
+void
+OPENSSL_add_all_algorithms_conf(void)
+{
        OPENSSL_add_all_algorithms_noconf();
        OPENSSL_config(NULL);
-       }
+}
index e8ca502..0c3e8fc 100644 (file)
@@ -5,21 +5,21 @@
  * This package is an SSL implementation written
  * by Eric Young (eay@cryptsoft.com).
  * The implementation was written so as to conform with Netscapes SSL.
- * 
+ *
  * This library is free for commercial and non-commercial use as long as
  * the following conditions are aheared to.  The following conditions
  * apply to all code found in this distribution, be it the RC4, RSA,
  * lhash, DES, etc., code; not just the SSL code.  The SSL documentation
  * included with this distribution is covered by the same copyright terms
  * except that the holder is Tim Hudson (tjh@cryptsoft.com).
- * 
+ *
  * Copyright remains Eric Young's, and as such any Copyright notices in
  * the code are not to be removed.
  * If this package is used in a product, Eric Young should be given attribution
  * as the author of the parts of the library used.
  * This can be in the form of a textual message at program startup or
  * in documentation (online or textual) provided with the package.
- * 
+ *
  * Redistribution and use in source and binary forms, with or without
  * modification, are permitted provided that the following conditions
  * are met:
  *     Eric Young (eay@cryptsoft.com)"
  *    The word 'cryptographic' can be left out if the rouines from the library
  *    being used are not cryptographic related :-).
- * 4. If you include any Windows specific code (or a derivative thereof) from 
+ * 4. If you include any Windows specific code (or a derivative thereof) from
  *    the apps directory (application code) you must include an acknowledgement:
  *    "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
- * 
+ *
  * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
@@ -49,7 +49,7 @@
  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
  * SUCH DAMAGE.
- * 
+ *
  * The licence and distribution terms for any publically available version or
  * derivative of this code cannot be changed.  i.e. this code cannot simply be
  * copied and put under another distribution licence
 
 #define M_do_cipher(ctx, out, in, inl) ctx->cipher->do_cipher(ctx, out, in, inl)
 
-const char EVP_version[]="EVP" OPENSSL_VERSION_PTEXT;
+const char EVP_version[] = "EVP" OPENSSL_VERSION_PTEXT;
 
-void EVP_CIPHER_CTX_init(EVP_CIPHER_CTX *ctx)
-       {
-       memset(ctx,0,sizeof(EVP_CIPHER_CTX));
+void
+EVP_CIPHER_CTX_init(EVP_CIPHER_CTX *ctx)
+{
+       memset(ctx, 0, sizeof(EVP_CIPHER_CTX));
        /* ctx->cipher=NULL; */
-       }
+}
 
-EVP_CIPHER_CTX *EVP_CIPHER_CTX_new(void)
-       {
-       EVP_CIPHER_CTX *ctx=malloc(sizeof *ctx);
+EVP_CIPHER_CTX *
+EVP_CIPHER_CTX_new(void)
+{
+       EVP_CIPHER_CTX *ctx = malloc(sizeof *ctx);
        if (ctx)
                EVP_CIPHER_CTX_init(ctx);
        return ctx;
-       }
+}
 
-int EVP_CipherInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher,
-            const unsigned char *key, const unsigned char *iv, int enc)
-       {
+int
+EVP_CipherInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher,
+    const unsigned char *key, const unsigned char *iv, int enc)
+{
        if (cipher)
                EVP_CIPHER_CTX_init(ctx);
-       return EVP_CipherInit_ex(ctx,cipher,NULL,key,iv,enc);
-       }
+       return EVP_CipherInit_ex(ctx, cipher, NULL, key, iv, enc);
+}
 
-int EVP_CipherInit_ex(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, ENGINE *impl,
-            const unsigned char *key, const unsigned char *iv, int enc)
-       {
+int
+EVP_CipherInit_ex(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, ENGINE *impl,
+    const unsigned char *key, const unsigned char *iv, int enc)
+{
        if (enc == -1)
                enc = ctx->encrypt;
-       else
-               {
+       else {
                if (enc)
                        enc = 1;
                ctx->encrypt = enc;
-               }
+       }
 #ifndef OPENSSL_NO_ENGINE
        /* Whether it's nice or not, "Inits" can be used on "Final"'d contexts
         * so this context may already have an ENGINE! Try to avoid releasing
         * the previous handle, re-querying for an ENGINE, and having a
         * reinitialisation, when it may all be unecessary. */
-       if (ctx->engine && ctx->cipher && (!cipher ||
-                       (cipher && (cipher->nid == ctx->cipher->nid))))
+       if (ctx->engine && ctx->cipher &&
+           (!cipher || (cipher && (cipher->nid == ctx->cipher->nid))))
                goto skip_to_init;
 #endif
-       if (cipher)
-               {
+       if (cipher) {
                /* Ensure a context left lying around from last time is cleared
                 * (the previous check attempted to avoid this if the same
                 * ENGINE and EVP_CIPHER could be used). */
-               if (ctx->cipher)
-                       {
+               if (ctx->cipher) {
                        unsigned long flags = ctx->flags;
                        EVP_CIPHER_CTX_cleanup(ctx);
                        /* Restore encrypt and flags */
                        ctx->encrypt = enc;
                        ctx->flags = flags;
-                       }
+               }
 #ifndef OPENSSL_NO_ENGINE
-               if(impl)
-                       {
-                       if (!ENGINE_init(impl))
-                               {
-                               EVPerr(EVP_F_EVP_CIPHERINIT_EX, EVP_R_INITIALIZATION_ERROR);
+               if (impl) {
+                       if (!ENGINE_init(impl)) {
+                               EVPerr(EVP_F_EVP_CIPHERINIT_EX,
+                                   EVP_R_INITIALIZATION_ERROR);
                                return 0;
-                               }
                        }
-               else
+               else
                        /* Ask if an ENGINE is reserved for this job */
                        impl = ENGINE_get_cipher_engine(cipher->nid);
-               if(impl)
-                       {
+               if (impl) {
                        /* There's an ENGINE for this job ... (apparently) */
-                       const EVP_CIPHER *c = ENGINE_get_cipher(impl, cipher->nid);
-                       if(!c)
-                               {
+                       const EVP_CIPHER *c =
+                           ENGINE_get_cipher(impl, cipher->nid);
+                       if (!c) {
                                /* One positive side-effect of US's export
                                 * control history, is that we should at least
                                 * be able to avoid using US mispellings of
                                 * "initialisation"? */
-                               EVPerr(EVP_F_EVP_CIPHERINIT_EX, EVP_R_INITIALIZATION_ERROR);
+                               EVPerr(EVP_F_EVP_CIPHERINIT_EX,
+                                   EVP_R_INITIALIZATION_ERROR);
                                return 0;
-                               }
+                       }
                        /* We'll use the ENGINE's private cipher definition */
                        cipher = c;
                        /* Store the ENGINE functional reference so we know
                         * 'cipher' came from an ENGINE and we need to release
                         * it when done. */
                        ctx->engine = impl;
-                       }
-               else
+               } else
                        ctx->engine = NULL;
 #endif
 
-               ctx->cipher=cipher;
-               if (ctx->cipher->ctx_size)
-                       {
-                       ctx->cipher_data=malloc(ctx->cipher->ctx_size);
-                       if (!ctx->cipher_data)
-                               {
-                               EVPerr(EVP_F_EVP_CIPHERINIT_EX, ERR_R_MALLOC_FAILURE);
+               ctx->cipher = cipher;
+               if (ctx->cipher->ctx_size) {
+                       ctx->cipher_data = malloc(ctx->cipher->ctx_size);
+                       if (!ctx->cipher_data) {
+                               EVPerr(EVP_F_EVP_CIPHERINIT_EX,
+                                   ERR_R_MALLOC_FAILURE);
                                return 0;
-                               }
                        }
-               else
-                       {
+               } else {
                        ctx->cipher_data = NULL;
-                       }
+               }
                ctx->key_len = cipher->key_len;
                ctx->flags = 0;
-               if(ctx->cipher->flags & EVP_CIPH_CTRL_INIT)
-                       {
-                       if(!EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_INIT, 0, NULL))
-                               {
-                               EVPerr(EVP_F_EVP_CIPHERINIT_EX, EVP_R_INITIALIZATION_ERROR);
+               if (ctx->cipher->flags & EVP_CIPH_CTRL_INIT) {
+                       if (!EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_INIT, 0, NULL)) {
+                               EVPerr(EVP_F_EVP_CIPHERINIT_EX,
+                                   EVP_R_INITIALIZATION_ERROR);
                                return 0;
-                               }
                        }
                }
-       else if(!ctx->cipher)
-               {
+       } else if (!ctx->cipher) {
                EVPerr(EVP_F_EVP_CIPHERINIT_EX, EVP_R_NO_CIPHER_SET);
                return 0;
-               }
+       }
 #ifndef OPENSSL_NO_ENGINE
 skip_to_init:
 #endif
        /* we assume block size is a power of 2 in *cryptUpdate */
-       OPENSSL_assert(ctx->cipher->block_size == 1
-           || ctx->cipher->block_size == 8
-           || ctx->cipher->block_size == 16);
+       OPENSSL_assert(ctx->cipher->block_size == 1 ||
+           ctx->cipher->block_size == 8 ||
+           ctx->cipher->block_size == 16);
 
-       if(!(EVP_CIPHER_CTX_flags(ctx) & EVP_CIPH_CUSTOM_IV)) {
-               switch(EVP_CIPHER_CTX_mode(ctx)) {
+       if (!(EVP_CIPHER_CTX_flags(ctx) & EVP_CIPH_CUSTOM_IV)) {
+               switch (EVP_CIPHER_CTX_mode(ctx)) {
 
-                       case EVP_CIPH_STREAM_CIPHER:
-                       case EVP_CIPH_ECB_MODE:
+               case EVP_CIPH_STREAM_CIPHER:
+               case EVP_CIPH_ECB_MODE:
                        break;
 
-                       case EVP_CIPH_CFB_MODE:
-                       case EVP_CIPH_OFB_MODE:
+               case EVP_CIPH_CFB_MODE:
+               case EVP_CIPH_OFB_MODE:
 
                        ctx->num = 0;
                        /* fall-through */
 
-                       case EVP_CIPH_CBC_MODE:
+               case EVP_CIPH_CBC_MODE:
 
                        OPENSSL_assert(EVP_CIPHER_CTX_iv_length(ctx) <=
-                                       (int)sizeof(ctx->iv));
-                       if(iv) memcpy(ctx->oiv, iv, EVP_CIPHER_CTX_iv_length(ctx));
-                       memcpy(ctx->iv, ctx->oiv, EVP_CIPHER_CTX_iv_length(ctx));
+                           (int)sizeof(ctx->iv));
+                       if (iv)
+                               memcpy(ctx->oiv, iv,
+                                   EVP_CIPHER_CTX_iv_length(ctx));
+                       memcpy(ctx->iv, ctx->oiv,
+                           EVP_CIPHER_CTX_iv_length(ctx));
                        break;
 
-                       case EVP_CIPH_CTR_MODE:
+               case EVP_CIPH_CTR_MODE:
                        ctx->num = 0;
                        /* Don't reuse IV for CTR mode */
-                       if(iv)
-                               memcpy(ctx->iv, iv, EVP_CIPHER_CTX_iv_length(ctx));
+                       if (iv)
+                               memcpy(ctx->iv, iv,
+                                   EVP_CIPHER_CTX_iv_length(ctx));
                        break;
 
-                       default:
+               default:
                        return 0;
                        break;
                }
        }
 
-       if(key || (ctx->cipher->flags & EVP_CIPH_ALWAYS_CALL_INIT)) {
-               if(!ctx->cipher->init(ctx,key,iv,enc)) return 0;
+       if (key || (ctx->cipher->flags & EVP_CIPH_ALWAYS_CALL_INIT)) {
+               if (!ctx->cipher->init(ctx, key, iv, enc))
+                       return 0;
        }
-       ctx->buf_len=0;
-       ctx->final_used=0;
-       ctx->block_mask=ctx->cipher->block_size-1;
+       ctx->buf_len = 0;
+       ctx->final_used = 0;
+       ctx->block_mask = ctx->cipher->block_size - 1;
        return 1;
-       }
+}
 
-int EVP_CipherUpdate(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl,
-            const unsigned char *in, int inl)
-       {
+int
+EVP_CipherUpdate(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl,
+    const unsigned char *in, int inl)
+{
        if (ctx->encrypt)
-               return EVP_EncryptUpdate(ctx,out,outl,in,inl);
-       else    return EVP_DecryptUpdate(ctx,out,outl,in,inl);
-       }
+               return EVP_EncryptUpdate(ctx, out, outl, in, inl);
+       else
+               return EVP_DecryptUpdate(ctx, out, outl, in, inl);
+}
 
-int EVP_CipherFinal_ex(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl)
-       {
+int
+EVP_CipherFinal_ex(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl)
+{
        if (ctx->encrypt)
-               return EVP_EncryptFinal_ex(ctx,out,outl);
-       else    return EVP_DecryptFinal_ex(ctx,out,outl);
-       }
+               return EVP_EncryptFinal_ex(ctx, out, outl);
+       else
+               return EVP_DecryptFinal_ex(ctx, out, outl);
+}
 
-int EVP_CipherFinal(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl)
-       {
+int
+EVP_CipherFinal(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl)
+{
        if (ctx->encrypt)
-               return EVP_EncryptFinal(ctx,out,outl);
-       else    return EVP_DecryptFinal(ctx,out,outl);
-       }
+               return EVP_EncryptFinal(ctx, out, outl);
+       else
+               return EVP_DecryptFinal(ctx, out, outl);
+}
 
-int EVP_EncryptInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher,
-            const unsigned char *key, const unsigned char *iv)
-       {
+int
+EVP_EncryptInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher,
+    const unsigned char *key, const unsigned char *iv)
+{
        return EVP_CipherInit(ctx, cipher, key, iv, 1);
-       }
+}
 
-int EVP_EncryptInit_ex(EVP_CIPHER_CTX *ctx,const EVP_CIPHER *cipher, ENGINE *impl,
-               const unsigned char *key, const unsigned char *iv)
-       {
+int
+EVP_EncryptInit_ex(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, ENGINE *impl,
+    const unsigned char *key, const unsigned char *iv)
+{
        return EVP_CipherInit_ex(ctx, cipher, impl, key, iv, 1);
-       }
+}
 
-int EVP_DecryptInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher,
-            const unsigned char *key, const unsigned char *iv)
-       {
+int
+EVP_DecryptInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher,
+    const unsigned char *key, const unsigned char *iv)
+{
        return EVP_CipherInit(ctx, cipher, key, iv, 0);
-       }
+}
 
-int EVP_DecryptInit_ex(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, ENGINE *impl,
-            const unsigned char *key, const unsigned char *iv)
-       {
+int
+EVP_DecryptInit_ex(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, ENGINE *impl,
+    const unsigned char *key, const unsigned char *iv)
+{
        return EVP_CipherInit_ex(ctx, cipher, impl, key, iv, 0);
-       }
+}
 
-int EVP_EncryptUpdate(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl,
-            const unsigned char *in, int inl)
-       {
-       int i,j,bl;
+int
+EVP_EncryptUpdate(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl,
+    const unsigned char *in, int inl)
+{
+       int i, j, bl;
 
-       if (ctx->cipher->flags & EVP_CIPH_FLAG_CUSTOM_CIPHER)
-               {
+       if (ctx->cipher->flags & EVP_CIPH_FLAG_CUSTOM_CIPHER) {
                i = M_do_cipher(ctx, out, in, inl);
                if (i < 0)
                        return 0;
                else
                        *outl = i;
                return 1;
-               }
+       }
 
-       if (inl <= 0)
-               {
+       if (inl <= 0) {
                *outl = 0;
                return inl == 0;
-               }
+       }
 
-       if(ctx->buf_len == 0 && (inl&(ctx->block_mask)) == 0)
-               {
-               if(M_do_cipher(ctx,out,in,inl))
-                       {
-                       *outl=inl;
+       if (ctx->buf_len == 0 && (inl&(ctx->block_mask)) == 0) {
+               if (M_do_cipher(ctx, out, in, inl)) {
+                       *outl = inl;
                        return 1;
-                       }
-               else
-                       {
-                       *outl=0;
+               } else {
+                       *outl = 0;
                        return 0;
-                       }
                }
-       i=ctx->buf_len;
-       bl=ctx->cipher->block_size;
+       }
+       i = ctx->buf_len;
+       bl = ctx->cipher->block_size;
        OPENSSL_assert(bl <= (int)sizeof(ctx->buf));
-       if (i != 0)
-               {
-               if (i+inl < bl)
-                       {
-                       memcpy(&(ctx->buf[i]),in,inl);
-                       ctx->buf_len+=inl;
-                       *outl=0;
+       if (i != 0) {
+               if (i + inl < bl) {
+                       memcpy(&(ctx->buf[i]), in, inl);
+                       ctx->buf_len += inl;
+                       *outl = 0;
                        return 1;
-                       }
-               else
-                       {
-                       j=bl-i;
-                       memcpy(&(ctx->buf[i]),in,j);
-                       if(!M_do_cipher(ctx,out,ctx->buf,bl)) return 0;
-                       inl-=j;
-                       in+=j;
-                       out+=bl;
-                       *outl=bl;
-                       }
+               } else {
+                       j = bl - i;
+                       memcpy(&(ctx->buf[i]), in, j);
+                       if (!M_do_cipher(ctx, out, ctx->buf, bl))
+                               return 0;
+                       inl -= j;
+                       in += j;
+                       out += bl;
+                       *outl = bl;
                }
-       else
+       else
                *outl = 0;
-       i=inl&(bl-1);
-       inl-=i;
-       if (inl > 0)
-               {
-               if(!M_do_cipher(ctx,out,in,inl)) return 0;
-               *outl+=inl;
-               }
+       i = inl&(bl - 1);
+       inl -= i;
+       if (inl > 0) {
+               if (!M_do_cipher(ctx, out, in, inl))
+                       return 0;
+               *outl += inl;
+       }
 
        if (i != 0)
-               memcpy(ctx->buf,&(in[inl]),i);
-       ctx->buf_len=i;
+               memcpy(ctx->buf, &(in[inl]), i);
+       ctx->buf_len = i;
        return 1;
-       }
+}
 
-int EVP_EncryptFinal(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl)
-       {
+int
+EVP_EncryptFinal(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl)
+{
        int ret;
+
        ret = EVP_EncryptFinal_ex(ctx, out, outl);
        return ret;
-       }
+}
 
-int EVP_EncryptFinal_ex(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl)
-       {
-       int n,ret;
+int
+EVP_EncryptFinal_ex(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl)
+{
+       int n, ret;
        unsigned int i, b, bl;
 
-       if (ctx->cipher->flags & EVP_CIPH_FLAG_CUSTOM_CIPHER)
-               {
+       if (ctx->cipher->flags & EVP_CIPH_FLAG_CUSTOM_CIPHER) {
                ret = M_do_cipher(ctx, out, NULL, 0);
                if (ret < 0)
                        return 0;
-               else 
+               else
                        *outl = ret;
                return 1;
-               }
+       }
 
-       b=ctx->cipher->block_size;
+       b = ctx->cipher->block_size;
        OPENSSL_assert(b <= sizeof ctx->buf);
-       if (b == 1)
-               {
-               *outl=0;
+       if (b == 1) {
+               *outl = 0;
                return 1;
-               }
-       bl=ctx->buf_len;
-       if (ctx->flags & EVP_CIPH_NO_PADDING)
-               {
-               if(bl)
-                       {
-                       EVPerr(EVP_F_EVP_ENCRYPTFINAL_EX,EVP_R_DATA_NOT_MULTIPLE_OF_BLOCK_LENGTH);
+       }
+       bl = ctx->buf_len;
+       if (ctx->flags & EVP_CIPH_NO_PADDING) {
+               if (bl) {
+                       EVPerr(EVP_F_EVP_ENCRYPTFINAL_EX,
+                           EVP_R_DATA_NOT_MULTIPLE_OF_BLOCK_LENGTH);
                        return 0;
-                       }
+               }
                *outl = 0;
                return 1;
-               }
+       }
 
-       n=b-bl;
-       for (i=bl; i<b; i++)
-               ctx->buf[i]=n;
-       ret=M_do_cipher(ctx,out,ctx->buf,b);
+       n = b - bl;
+       for (i = bl; i < b; i++)
+               ctx->buf[i] = n;
+       ret = M_do_cipher(ctx, out, ctx->buf, b);
 
 
-       if(ret)
-               *outl=b;
+       if (ret)
+               *outl = b;
 
        return ret;
-       }
+}
 
-int EVP_DecryptUpdate(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl,
-            const unsigned char *in, int inl)
-       {
+int
+EVP_DecryptUpdate(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl,
+    const unsigned char *in, int inl)
+{
        int fix_len;
        unsigned int b;
 
-       if (ctx->cipher->flags & EVP_CIPH_FLAG_CUSTOM_CIPHER)
-               {
+       if (ctx->cipher->flags & EVP_CIPH_FLAG_CUSTOM_CIPHER) {
                fix_len = M_do_cipher(ctx, out, in, inl);
-               if (fix_len < 0)
-                       {
+               if (fix_len < 0) {
                        *outl = 0;
                        return 0;
-                       }
-               else
+               } else
                        *outl = fix_len;
                return 1;
-               }
+       }
 
-       if (inl <= 0)
-               {
+       if (inl <= 0) {
                *outl = 0;
                return inl == 0;
-               }
+       }
 
        if (ctx->flags & EVP_CIPH_NO_PADDING)
                return EVP_EncryptUpdate(ctx, out, outl, in, inl);
 
-       b=ctx->cipher->block_size;
+       b = ctx->cipher->block_size;
        OPENSSL_assert(b <= sizeof ctx->final);
 
-       if(ctx->final_used)
-               {
-               memcpy(out,ctx->final,b);
-               out+=b;
+       if (ctx->final_used) {
+               memcpy(out, ctx->final, b);
+               out += b;
                fix_len = 1;
-               }
-       else
+       } else
                fix_len = 0;
 
 
-       if(!EVP_EncryptUpdate(ctx,out,outl,in,inl))
+       if (!EVP_EncryptUpdate(ctx, out, outl, in, inl))
                return 0;
 
        /* if we have 'decrypted' a multiple of block size, make sure
         * we have a copy of this last block */
-       if (b > 1 && !ctx->buf_len)
-               {
-               *outl-=b;
-               ctx->final_used=1;
-               memcpy(ctx->final,&out[*outl],b);
-               }
-       else
+       if (b > 1 && !ctx->buf_len) {
+               *outl -= b;
+               ctx->final_used = 1;
+               memcpy(ctx->final, &out[*outl], b);
+       } else
                ctx->final_used = 0;
 
        if (fix_len)
                *outl += b;
-               
+
        return 1;
-       }
+}
 
-int EVP_DecryptFinal(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl)
-       {
+int
+EVP_DecryptFinal(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl)
+{
        int ret;
+
        ret = EVP_DecryptFinal_ex(ctx, out, outl);
        return ret;
-       }
+}
 
-int EVP_DecryptFinal_ex(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl)
-       {
-       int i,n;
+int
+EVP_DecryptFinal_ex(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl)
+{
+       int i, n;
        unsigned int b;
-       *outl=0;
+       *outl = 0;
 
-       if (ctx->cipher->flags & EVP_CIPH_FLAG_CUSTOM_CIPHER)
-               {
+       if (ctx->cipher->flags & EVP_CIPH_FLAG_CUSTOM_CIPHER) {
                i = M_do_cipher(ctx, out, NULL, 0);
                if (i < 0)
                        return 0;
                else
                        *outl = i;
                return 1;
-               }
+       }
 
-       b=ctx->cipher->block_size;
-       if (ctx->flags & EVP_CIPH_NO_PADDING)
-               {
-               if(ctx->buf_len)
-                       {
-                       EVPerr(EVP_F_EVP_DECRYPTFINAL_EX,EVP_R_DATA_NOT_MULTIPLE_OF_BLOCK_LENGTH);
+       b = ctx->cipher->block_size;
+       if (ctx->flags & EVP_CIPH_NO_PADDING) {
+               if (ctx->buf_len) {
+                       EVPerr(EVP_F_EVP_DECRYPTFINAL_EX,
+                           EVP_R_DATA_NOT_MULTIPLE_OF_BLOCK_LENGTH);
                        return 0;
-                       }
+               }
                *outl = 0;
                return 1;
+       }
+       if (b > 1) {
+               if (ctx->buf_len || !ctx->final_used) {
+                       EVPerr(EVP_F_EVP_DECRYPTFINAL_EX,
+                           EVP_R_WRONG_FINAL_BLOCK_LENGTH);
+                       return (0);
                }
-       if (b > 1)
-               {
-               if (ctx->buf_len || !ctx->final_used)
-                       {
-                       EVPerr(EVP_F_EVP_DECRYPTFINAL_EX,EVP_R_WRONG_FINAL_BLOCK_LENGTH);
-                       return(0);
-                       }
                OPENSSL_assert(b <= sizeof ctx->final);
-               n=ctx->final[b-1];
-               if (n == 0 || n > (int)b)
-                       {
-                       EVPerr(EVP_F_EVP_DECRYPTFINAL_EX,EVP_R_BAD_DECRYPT);
-                       return(0);
-                       }
-               for (i=0; i<n; i++)
-                       {
-                       if (ctx->final[--b] != n)
-                               {
-                               EVPerr(EVP_F_EVP_DECRYPTFINAL_EX,EVP_R_BAD_DECRYPT);
-                               return(0);
-                               }
+               n = ctx->final[b - 1];
+               if (n == 0 || n > (int)b) {
+                       EVPerr(EVP_F_EVP_DECRYPTFINAL_EX, EVP_R_BAD_DECRYPT);
+                       return (0);
+               }
+               for (i = 0; i < n; i++) {
+                       if (ctx->final[--b] != n) {
+                               EVPerr(EVP_F_EVP_DECRYPTFINAL_EX,
+                                   EVP_R_BAD_DECRYPT);
+                               return (0);
                        }
-               n=ctx->cipher->block_size-n;
-               for (i=0; i<n; i++)
-                       out[i]=ctx->final[i];
-               *outl=n;
                }
-       else
-               *outl=0;
-       return(1);
-       }
+               n = ctx->cipher->block_size - n;
+               for (i = 0; i < n; i++)
+                       out[i] = ctx->final[i];
+               *outl = n;
+       } else
+               *outl = 0;
+       return (1);
+}
 
-void EVP_CIPHER_CTX_free(EVP_CIPHER_CTX *ctx)
-       {
-       if (ctx)
-               {
+void
+EVP_CIPHER_CTX_free(EVP_CIPHER_CTX *ctx)
+{
+       if (ctx) {
                EVP_CIPHER_CTX_cleanup(ctx);
                free(ctx);
-               }
        }
+}
 
-int EVP_CIPHER_CTX_cleanup(EVP_CIPHER_CTX *c)
-       {
-       if (c->cipher != NULL)
-               {
-               if(c->cipher->cleanup && !c->cipher->cleanup(c))
+int
+EVP_CIPHER_CTX_cleanup(EVP_CIPHER_CTX *c)
+{
+       if (c->cipher != NULL) {
+               if (c->cipher->cleanup && !c->cipher->cleanup(c))
                        return 0;
                /* Cleanse cipher context data */
                if (c->cipher_data)
                        OPENSSL_cleanse(c->cipher_data, c->cipher->ctx_size);
-               }
+       }
        if (c->cipher_data)
                free(c->cipher_data);
 #ifndef OPENSSL_NO_ENGINE
@@ -568,93 +556,99 @@ int EVP_CIPHER_CTX_cleanup(EVP_CIPHER_CTX *c)
                 * functional reference we held for this reason. */
                ENGINE_finish(c->engine);
 #endif
-       memset(c,0,sizeof(EVP_CIPHER_CTX));
+       memset(c, 0, sizeof(EVP_CIPHER_CTX));
        return 1;
-       }
+}
 
-int EVP_CIPHER_CTX_set_key_length(EVP_CIPHER_CTX *c, int keylen)
-       {
-       if(c->cipher->flags & EVP_CIPH_CUSTOM_KEY_LENGTH) 
-               return EVP_CIPHER_CTX_ctrl(c, EVP_CTRL_SET_KEY_LENGTH, keylen, NULL);
-       if(c->key_len == keylen) return 1;
-       if((keylen > 0) && (c->cipher->flags & EVP_CIPH_VARIABLE_LENGTH))
-               {
+int
+EVP_CIPHER_CTX_set_key_length(EVP_CIPHER_CTX *c, int keylen)
+{
+       if (c->cipher->flags & EVP_CIPH_CUSTOM_KEY_LENGTH)
+               return EVP_CIPHER_CTX_ctrl(c, EVP_CTRL_SET_KEY_LENGTH,
+                   keylen, NULL);
+       if (c->key_len == keylen)
+               return 1;
+       if ((keylen > 0) && (c->cipher->flags & EVP_CIPH_VARIABLE_LENGTH)) {
                c->key_len = keylen;
                return 1;
-               }
-       EVPerr(EVP_F_EVP_CIPHER_CTX_SET_KEY_LENGTH,EVP_R_INVALID_KEY_LENGTH);
-       return 0;
        }
+       EVPerr(EVP_F_EVP_CIPHER_CTX_SET_KEY_LENGTH, EVP_R_INVALID_KEY_LENGTH);
+       return 0;
+}
 
-int EVP_CIPHER_CTX_set_padding(EVP_CIPHER_CTX *ctx, int pad)
-       {
-       if (pad) ctx->flags &= ~EVP_CIPH_NO_PADDING;
-       else ctx->flags |= EVP_CIPH_NO_PADDING;
+int
+EVP_CIPHER_CTX_set_padding(EVP_CIPHER_CTX *ctx, int pad)
+{
+       if (pad)
+               ctx->flags &= ~EVP_CIPH_NO_PADDING;
+       else
+               ctx->flags |= EVP_CIPH_NO_PADDING;
        return 1;
-       }
+}
 
-int EVP_CIPHER_CTX_ctrl(EVP_CIPHER_CTX *ctx, int type, int arg, void *ptr)
+int
+EVP_CIPHER_CTX_ctrl(EVP_CIPHER_CTX *ctx, int type, int arg, void *ptr)
 {
        int ret;
-       if(!ctx->cipher) {
+
+       if (!ctx->cipher) {
                EVPerr(EVP_F_EVP_CIPHER_CTX_CTRL, EVP_R_NO_CIPHER_SET);
                return 0;
        }
 
-       if(!ctx->cipher->ctrl) {
+       if (!ctx->cipher->ctrl) {
                EVPerr(EVP_F_EVP_CIPHER_CTX_CTRL, EVP_R_CTRL_NOT_IMPLEMENTED);
                return 0;
        }
 
        ret = ctx->cipher->ctrl(ctx, type, arg, ptr);
-       if(ret == -1) {
-               EVPerr(EVP_F_EVP_CIPHER_CTX_CTRL, EVP_R_CTRL_OPERATION_NOT_IMPLEMENTED);
+       if (ret == -1) {
+               EVPerr(EVP_F_EVP_CIPHER_CTX_CTRL,
+                   EVP_R_CTRL_OPERATION_NOT_IMPLEMENTED);
                return 0;
        }
        return ret;
 }
 
-int EVP_CIPHER_CTX_rand_key(EVP_CIPHER_CTX *ctx, unsigned char *key)
-       {
+int
+EVP_CIPHER_CTX_rand_key(EVP_CIPHER_CTX *ctx, unsigned char *key)
+{
        if (ctx->cipher->flags & EVP_CIPH_RAND_KEY)
                return EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_RAND_KEY, 0, key);
        if (RAND_bytes(key, ctx->key_len) <= 0)
                return 0;
        return 1;
-       }
+}
 
-int EVP_CIPHER_CTX_copy(EVP_CIPHER_CTX *out, const EVP_CIPHER_CTX *in)
-       {
-       if ((in == NULL) || (in->cipher == NULL))
-               {
-               EVPerr(EVP_F_EVP_CIPHER_CTX_COPY,EVP_R_INPUT_NOT_INITIALIZED);
+int
+EVP_CIPHER_CTX_copy(EVP_CIPHER_CTX *out, const EVP_CIPHER_CTX *in)
+{
+       if ((in == NULL) || (in->cipher == NULL)) {
+               EVPerr(EVP_F_EVP_CIPHER_CTX_COPY, EVP_R_INPUT_NOT_INITIALIZED);
                return 0;
-               }
+       }
 #ifndef OPENSSL_NO_ENGINE
        /* Make sure it's safe to copy a cipher context using an ENGINE */
-       if (in->engine && !ENGINE_init(in->engine))
-               {
-               EVPerr(EVP_F_EVP_CIPHER_CTX_COPY,ERR_R_ENGINE_LIB);
+       if (in->engine && !ENGINE_init(in->engine)) {
+               EVPerr(EVP_F_EVP_CIPHER_CTX_COPY, ERR_R_ENGINE_LIB);
                return 0;
-               }
+       }
 #endif
 
        EVP_CIPHER_CTX_cleanup(out);
-       memcpy(out,in,sizeof *out);
-
-       if (in->cipher_data && in->cipher->ctx_size)
-               {
-               out->cipher_data=malloc(in->cipher->ctx_size);
-               if (!out->cipher_data)
-                       {
-                       EVPerr(EVP_F_EVP_CIPHER_CTX_COPY,ERR_R_MALLOC_FAILURE);
+       memcpy(out, in, sizeof *out);
+
+       if (in->cipher_data && in->cipher->ctx_size) {
+               out->cipher_data = malloc(in->cipher->ctx_size);
+               if (!out->cipher_data) {
+                       EVPerr(EVP_F_EVP_CIPHER_CTX_COPY, ERR_R_MALLOC_FAILURE);
                        return 0;
-                       }
-               memcpy(out->cipher_data,in->cipher_data,in->cipher->ctx_size);
                }
+               memcpy(out->cipher_data, in->cipher_data, in->cipher->ctx_size);
+       }
 
        if (in->cipher->flags & EVP_CIPH_CUSTOM_COPY)
-               return in->cipher->ctrl((EVP_CIPHER_CTX *)in, EVP_CTRL_COPY, 0, out);
+               return in->cipher->ctrl((EVP_CIPHER_CTX *)in,
+                   EVP_CTRL_COPY, 0, out);
        return 1;
-       }
-
+}
index 08eab98..790459f 100644 (file)
@@ -7,7 +7,7 @@
  * are met:
  *
  * 1. Redistributions of source code must retain the above copyright
- *    notice, this list of conditions and the following disclaimer. 
+ *    notice, this list of conditions and the following disclaimer.
  *
  * 2. Redistributions in binary form must reproduce the above copyright
  *    notice, this list of conditions and the following disclaimer in
 #define ERR_FUNC(func) ERR_PACK(ERR_LIB_EVP,func,0)
 #define ERR_REASON(reason) ERR_PACK(ERR_LIB_EVP,0,reason)
 
-static ERR_STRING_DATA EVP_str_functs[]=
-       {
-{ERR_FUNC(EVP_F_AESNI_INIT_KEY),       "AESNI_INIT_KEY"},
-{ERR_FUNC(EVP_F_AESNI_XTS_CIPHER),     "AESNI_XTS_CIPHER"},
-{ERR_FUNC(EVP_F_AES_INIT_KEY), "AES_INIT_KEY"},
-{ERR_FUNC(EVP_F_AES_XTS),      "AES_XTS"},
-{ERR_FUNC(EVP_F_AES_XTS_CIPHER),       "AES_XTS_CIPHER"},
-{ERR_FUNC(EVP_F_ALG_MODULE_INIT),      "ALG_MODULE_INIT"},
-{ERR_FUNC(EVP_F_CAMELLIA_INIT_KEY),    "CAMELLIA_INIT_KEY"},
-{ERR_FUNC(EVP_F_CMAC_INIT),    "CMAC_INIT"},
-{ERR_FUNC(EVP_F_D2I_PKEY),     "D2I_PKEY"},
-{ERR_FUNC(EVP_F_DO_SIGVER_INIT),       "DO_SIGVER_INIT"},
-{ERR_FUNC(EVP_F_DSAPKEY2PKCS8),        "DSAPKEY2PKCS8"},
-{ERR_FUNC(EVP_F_DSA_PKEY2PKCS8),       "DSA_PKEY2PKCS8"},
-{ERR_FUNC(EVP_F_ECDSA_PKEY2PKCS8),     "ECDSA_PKEY2PKCS8"},
-{ERR_FUNC(EVP_F_ECKEY_PKEY2PKCS8),     "ECKEY_PKEY2PKCS8"},
-{ERR_FUNC(EVP_F_EVP_CIPHERINIT_EX),    "EVP_CipherInit_ex"},
-{ERR_FUNC(EVP_F_EVP_CIPHER_CTX_COPY),  "EVP_CIPHER_CTX_copy"},
-{ERR_FUNC(EVP_F_EVP_CIPHER_CTX_CTRL),  "EVP_CIPHER_CTX_ctrl"},
-{ERR_FUNC(EVP_F_EVP_CIPHER_CTX_SET_KEY_LENGTH),        "EVP_CIPHER_CTX_set_key_length"},
-{ERR_FUNC(EVP_F_EVP_DECRYPTFINAL_EX),  "EVP_DecryptFinal_ex"},
-{ERR_FUNC(EVP_F_EVP_DIGESTINIT_EX),    "EVP_DigestInit_ex"},
-{ERR_FUNC(EVP_F_EVP_ENCRYPTFINAL_EX),  "EVP_EncryptFinal_ex"},
-{ERR_FUNC(EVP_F_EVP_MD_CTX_COPY_EX),   "EVP_MD_CTX_copy_ex"},
-{ERR_FUNC(EVP_F_EVP_MD_SIZE),  "EVP_MD_size"},
-{ERR_FUNC(EVP_F_EVP_OPENINIT), "EVP_OpenInit"},
-{ERR_FUNC(EVP_F_EVP_PBE_ALG_ADD),      "EVP_PBE_alg_add"},
-{ERR_FUNC(EVP_F_EVP_PBE_ALG_ADD_TYPE), "EVP_PBE_alg_add_type"},
-{ERR_FUNC(EVP_F_EVP_PBE_CIPHERINIT),   "EVP_PBE_CipherInit"},
-{ERR_FUNC(EVP_F_EVP_PKCS82PKEY),       "EVP_PKCS82PKEY"},
-{ERR_FUNC(EVP_F_EVP_PKCS82PKEY_BROKEN),        "EVP_PKCS82PKEY_BROKEN"},
-{ERR_FUNC(EVP_F_EVP_PKEY2PKCS8_BROKEN),        "EVP_PKEY2PKCS8_broken"},
-{ERR_FUNC(EVP_F_EVP_PKEY_COPY_PARAMETERS),     "EVP_PKEY_copy_parameters"},
-{ERR_FUNC(EVP_F_EVP_PKEY_CTX_CTRL),    "EVP_PKEY_CTX_ctrl"},
-{ERR_FUNC(EVP_F_EVP_PKEY_CTX_CTRL_STR),        "EVP_PKEY_CTX_ctrl_str"},
-{ERR_FUNC(EVP_F_EVP_PKEY_CTX_DUP),     "EVP_PKEY_CTX_dup"},
-{ERR_FUNC(EVP_F_EVP_PKEY_DECRYPT),     "EVP_PKEY_decrypt"},
-{ERR_FUNC(EVP_F_EVP_PKEY_DECRYPT_INIT),        "EVP_PKEY_decrypt_init"},
-{ERR_FUNC(EVP_F_EVP_PKEY_DECRYPT_OLD), "EVP_PKEY_decrypt_old"},
-{ERR_FUNC(EVP_F_EVP_PKEY_DERIVE),      "EVP_PKEY_derive"},
-{ERR_FUNC(EVP_F_EVP_PKEY_DERIVE_INIT), "EVP_PKEY_derive_init"},
-{ERR_FUNC(EVP_F_EVP_PKEY_DERIVE_SET_PEER),     "EVP_PKEY_derive_set_peer"},
-{ERR_FUNC(EVP_F_EVP_PKEY_ENCRYPT),     "EVP_PKEY_encrypt"},
-{ERR_FUNC(EVP_F_EVP_PKEY_ENCRYPT_INIT),        "EVP_PKEY_encrypt_init"},
-{ERR_FUNC(EVP_F_EVP_PKEY_ENCRYPT_OLD), "EVP_PKEY_encrypt_old"},
-{ERR_FUNC(EVP_F_EVP_PKEY_GET1_DH),     "EVP_PKEY_get1_DH"},
-{ERR_FUNC(EVP_F_EVP_PKEY_GET1_DSA),    "EVP_PKEY_get1_DSA"},
-{ERR_FUNC(EVP_F_EVP_PKEY_GET1_ECDSA),  "EVP_PKEY_GET1_ECDSA"},
-{ERR_FUNC(EVP_F_EVP_PKEY_GET1_EC_KEY), "EVP_PKEY_get1_EC_KEY"},
-{ERR_FUNC(EVP_F_EVP_PKEY_GET1_RSA),    "EVP_PKEY_get1_RSA"},
-{ERR_FUNC(EVP_F_EVP_PKEY_KEYGEN),      "EVP_PKEY_keygen"},
-{ERR_FUNC(EVP_F_EVP_PKEY_KEYGEN_INIT), "EVP_PKEY_keygen_init"},
-{ERR_FUNC(EVP_F_EVP_PKEY_NEW), "EVP_PKEY_new"},
-{ERR_FUNC(EVP_F_EVP_PKEY_PARAMGEN),    "EVP_PKEY_paramgen"},
-{ERR_FUNC(EVP_F_EVP_PKEY_PARAMGEN_INIT),       "EVP_PKEY_paramgen_init"},
-{ERR_FUNC(EVP_F_EVP_PKEY_SIGN),        "EVP_PKEY_sign"},
-{ERR_FUNC(EVP_F_EVP_PKEY_SIGN_INIT),   "EVP_PKEY_sign_init"},
-{ERR_FUNC(EVP_F_EVP_PKEY_VERIFY),      "EVP_PKEY_verify"},
-{ERR_FUNC(EVP_F_EVP_PKEY_VERIFY_INIT), "EVP_PKEY_verify_init"},
-{ERR_FUNC(EVP_F_EVP_PKEY_VERIFY_RECOVER),      "EVP_PKEY_verify_recover"},
-{ERR_FUNC(EVP_F_EVP_PKEY_VERIFY_RECOVER_INIT), "EVP_PKEY_verify_recover_init"},
-{ERR_FUNC(EVP_F_EVP_RIJNDAEL), "EVP_RIJNDAEL"},
-{ERR_FUNC(EVP_F_EVP_SIGNFINAL),        "EVP_SignFinal"},
-{ERR_FUNC(EVP_F_EVP_VERIFYFINAL),      "EVP_VerifyFinal"},
-{ERR_FUNC(EVP_F_FIPS_CIPHERINIT),      "FIPS_CIPHERINIT"},
-{ERR_FUNC(EVP_F_FIPS_CIPHER_CTX_COPY), "FIPS_CIPHER_CTX_COPY"},
-{ERR_FUNC(EVP_F_FIPS_CIPHER_CTX_CTRL), "FIPS_CIPHER_CTX_CTRL"},
-{ERR_FUNC(EVP_F_FIPS_CIPHER_CTX_SET_KEY_LENGTH),       "FIPS_CIPHER_CTX_SET_KEY_LENGTH"},
-{ERR_FUNC(EVP_F_FIPS_DIGESTINIT),      "FIPS_DIGESTINIT"},
-{ERR_FUNC(EVP_F_FIPS_MD_CTX_COPY),     "FIPS_MD_CTX_COPY"},
-{ERR_FUNC(EVP_F_HMAC_INIT_EX), "HMAC_Init_ex"},
-{ERR_FUNC(EVP_F_INT_CTX_NEW),  "INT_CTX_NEW"},
-{ERR_FUNC(EVP_F_PKCS5_PBE_KEYIVGEN),   "PKCS5_PBE_keyivgen"},
-{ERR_FUNC(EVP_F_PKCS5_V2_PBE_KEYIVGEN),        "PKCS5_v2_PBE_keyivgen"},
-{ERR_FUNC(EVP_F_PKCS5_V2_PBKDF2_KEYIVGEN),     "PKCS5_V2_PBKDF2_KEYIVGEN"},
-{ERR_FUNC(EVP_F_PKCS8_SET_BROKEN),     "PKCS8_set_broken"},
-{ERR_FUNC(EVP_F_PKEY_SET_TYPE),        "PKEY_SET_TYPE"},
-{ERR_FUNC(EVP_F_RC2_MAGIC_TO_METH),    "RC2_MAGIC_TO_METH"},
-{ERR_FUNC(EVP_F_RC5_CTRL),     "RC5_CTRL"},
-{0,NULL}
-       };
+static ERR_STRING_DATA EVP_str_functs[]= {
+       {ERR_FUNC(EVP_F_AESNI_INIT_KEY),        "AESNI_INIT_KEY"},
+       {ERR_FUNC(EVP_F_AESNI_XTS_CIPHER),      "AESNI_XTS_CIPHER"},
+       {ERR_FUNC(EVP_F_AES_INIT_KEY),  "AES_INIT_KEY"},
+       {ERR_FUNC(EVP_F_AES_XTS),       "AES_XTS"},
+       {ERR_FUNC(EVP_F_AES_XTS_CIPHER),        "AES_XTS_CIPHER"},
+       {ERR_FUNC(EVP_F_ALG_MODULE_INIT),       "ALG_MODULE_INIT"},
+       {ERR_FUNC(EVP_F_CAMELLIA_INIT_KEY),     "CAMELLIA_INIT_KEY"},
+       {ERR_FUNC(EVP_F_CMAC_INIT),     "CMAC_INIT"},
+       {ERR_FUNC(EVP_F_D2I_PKEY),      "D2I_PKEY"},
+       {ERR_FUNC(EVP_F_DO_SIGVER_INIT),        "DO_SIGVER_INIT"},
+       {ERR_FUNC(EVP_F_DSAPKEY2PKCS8), "DSAPKEY2PKCS8"},
+       {ERR_FUNC(EVP_F_DSA_PKEY2PKCS8),        "DSA_PKEY2PKCS8"},
+       {ERR_FUNC(EVP_F_ECDSA_PKEY2PKCS8),      "ECDSA_PKEY2PKCS8"},
+       {ERR_FUNC(EVP_F_ECKEY_PKEY2PKCS8),      "ECKEY_PKEY2PKCS8"},
+       {ERR_FUNC(EVP_F_EVP_CIPHERINIT_EX),     "EVP_CipherInit_ex"},
+       {ERR_FUNC(EVP_F_EVP_CIPHER_CTX_COPY),   "EVP_CIPHER_CTX_copy"},
+       {ERR_FUNC(EVP_F_EVP_CIPHER_CTX_CTRL),   "EVP_CIPHER_CTX_ctrl"},
+       {ERR_FUNC(EVP_F_EVP_CIPHER_CTX_SET_KEY_LENGTH), "EVP_CIPHER_CTX_set_key_length"},
+       {ERR_FUNC(EVP_F_EVP_DECRYPTFINAL_EX),   "EVP_DecryptFinal_ex"},
+       {ERR_FUNC(EVP_F_EVP_DIGESTINIT_EX),     "EVP_DigestInit_ex"},
+       {ERR_FUNC(EVP_F_EVP_ENCRYPTFINAL_EX),   "EVP_EncryptFinal_ex"},
+       {ERR_FUNC(EVP_F_EVP_MD_CTX_COPY_EX),    "EVP_MD_CTX_copy_ex"},
+       {ERR_FUNC(EVP_F_EVP_MD_SIZE),   "EVP_MD_size"},
+       {ERR_FUNC(EVP_F_EVP_OPENINIT),  "EVP_OpenInit"},
+       {ERR_FUNC(EVP_F_EVP_PBE_ALG_ADD),       "EVP_PBE_alg_add"},
+       {ERR_FUNC(EVP_F_EVP_PBE_ALG_ADD_TYPE),  "EVP_PBE_alg_add_type"},
+       {ERR_FUNC(EVP_F_EVP_PBE_CIPHERINIT),    "EVP_PBE_CipherInit"},
+       {ERR_FUNC(EVP_F_EVP_PKCS82PKEY),        "EVP_PKCS82PKEY"},
+       {ERR_FUNC(EVP_F_EVP_PKCS82PKEY_BROKEN), "EVP_PKCS82PKEY_BROKEN"},
+       {ERR_FUNC(EVP_F_EVP_PKEY2PKCS8_BROKEN), "EVP_PKEY2PKCS8_broken"},
+       {ERR_FUNC(EVP_F_EVP_PKEY_COPY_PARAMETERS),      "EVP_PKEY_copy_parameters"},
+       {ERR_FUNC(EVP_F_EVP_PKEY_CTX_CTRL),     "EVP_PKEY_CTX_ctrl"},
+       {ERR_FUNC(EVP_F_EVP_PKEY_CTX_CTRL_STR), "EVP_PKEY_CTX_ctrl_str"},
+       {ERR_FUNC(EVP_F_EVP_PKEY_CTX_DUP),      "EVP_PKEY_CTX_dup"},
+       {ERR_FUNC(EVP_F_EVP_PKEY_DECRYPT),      "EVP_PKEY_decrypt"},
+       {ERR_FUNC(EVP_F_EVP_PKEY_DECRYPT_INIT), "EVP_PKEY_decrypt_init"},
+       {ERR_FUNC(EVP_F_EVP_PKEY_DECRYPT_OLD),  "EVP_PKEY_decrypt_old"},
+       {ERR_FUNC(EVP_F_EVP_PKEY_DERIVE),       "EVP_PKEY_derive"},
+       {ERR_FUNC(EVP_F_EVP_PKEY_DERIVE_INIT),  "EVP_PKEY_derive_init"},
+       {ERR_FUNC(EVP_F_EVP_PKEY_DERIVE_SET_PEER),      "EVP_PKEY_derive_set_peer"},
+       {ERR_FUNC(EVP_F_EVP_PKEY_ENCRYPT),      "EVP_PKEY_encrypt"},
+       {ERR_FUNC(EVP_F_EVP_PKEY_ENCRYPT_INIT), "EVP_PKEY_encrypt_init"},
+       {ERR_FUNC(EVP_F_EVP_PKEY_ENCRYPT_OLD),  "EVP_PKEY_encrypt_old"},
+       {ERR_FUNC(EVP_F_EVP_PKEY_GET1_DH),      "EVP_PKEY_get1_DH"},
+       {ERR_FUNC(EVP_F_EVP_PKEY_GET1_DSA),     "EVP_PKEY_get1_DSA"},
+       {ERR_FUNC(EVP_F_EVP_PKEY_GET1_ECDSA),   "EVP_PKEY_GET1_ECDSA"},
+       {ERR_FUNC(EVP_F_EVP_PKEY_GET1_EC_KEY),  "EVP_PKEY_get1_EC_KEY"},
+       {ERR_FUNC(EVP_F_EVP_PKEY_GET1_RSA),     "EVP_PKEY_get1_RSA"},
+       {ERR_FUNC(EVP_F_EVP_PKEY_KEYGEN),       "EVP_PKEY_keygen"},
+       {ERR_FUNC(EVP_F_EVP_PKEY_KEYGEN_INIT),  "EVP_PKEY_keygen_init"},
+       {ERR_FUNC(EVP_F_EVP_PKEY_NEW),  "EVP_PKEY_new"},
+       {ERR_FUNC(EVP_F_EVP_PKEY_PARAMGEN),     "EVP_PKEY_paramgen"},
+       {ERR_FUNC(EVP_F_EVP_PKEY_PARAMGEN_INIT),        "EVP_PKEY_paramgen_init"},
+       {ERR_FUNC(EVP_F_EVP_PKEY_SIGN), "EVP_PKEY_sign"},
+       {ERR_FUNC(EVP_F_EVP_PKEY_SIGN_INIT),    "EVP_PKEY_sign_init"},
+       {ERR_FUNC(EVP_F_EVP_PKEY_VERIFY),       "EVP_PKEY_verify"},
+       {ERR_FUNC(EVP_F_EVP_PKEY_VERIFY_INIT),  "EVP_PKEY_verify_init"},
+       {ERR_FUNC(EVP_F_EVP_PKEY_VERIFY_RECOVER),       "EVP_PKEY_verify_recover"},
+       {ERR_FUNC(EVP_F_EVP_PKEY_VERIFY_RECOVER_INIT),  "EVP_PKEY_verify_recover_init"},
+       {ERR_FUNC(EVP_F_EVP_RIJNDAEL),  "EVP_RIJNDAEL"},
+       {ERR_FUNC(EVP_F_EVP_SIGNFINAL), "EVP_SignFinal"},
+       {ERR_FUNC(EVP_F_EVP_VERIFYFINAL),       "EVP_VerifyFinal"},
+       {ERR_FUNC(EVP_F_FIPS_CIPHERINIT),       "FIPS_CIPHERINIT"},
+       {ERR_FUNC(EVP_F_FIPS_CIPHER_CTX_COPY),  "FIPS_CIPHER_CTX_COPY"},
+       {ERR_FUNC(EVP_F_FIPS_CIPHER_CTX_CTRL),  "FIPS_CIPHER_CTX_CTRL"},
+       {ERR_FUNC(EVP_F_FIPS_CIPHER_CTX_SET_KEY_LENGTH),        "FIPS_CIPHER_CTX_SET_KEY_LENGTH"},
+       {ERR_FUNC(EVP_F_FIPS_DIGESTINIT),       "FIPS_DIGESTINIT"},
+       {ERR_FUNC(EVP_F_FIPS_MD_CTX_COPY),      "FIPS_MD_CTX_COPY"},
+       {ERR_FUNC(EVP_F_HMAC_INIT_EX),  "HMAC_Init_ex"},
+       {ERR_FUNC(EVP_F_INT_CTX_NEW),   "INT_CTX_NEW"},
+       {ERR_FUNC(EVP_F_PKCS5_PBE_KEYIVGEN),    "PKCS5_PBE_keyivgen"},
+       {ERR_FUNC(EVP_F_PKCS5_V2_PBE_KEYIVGEN), "PKCS5_v2_PBE_keyivgen"},
+       {ERR_FUNC(EVP_F_PKCS5_V2_PBKDF2_KEYIVGEN),      "PKCS5_V2_PBKDF2_KEYIVGEN"},
+       {ERR_FUNC(EVP_F_PKCS8_SET_BROKEN),      "PKCS8_set_broken"},
+       {ERR_FUNC(EVP_F_PKEY_SET_TYPE), "PKEY_SET_TYPE"},
+       {ERR_FUNC(EVP_F_RC2_MAGIC_TO_METH),     "RC2_MAGIC_TO_METH"},
+       {ERR_FUNC(EVP_F_RC5_CTRL),      "RC5_CTRL"},
+       {0, NULL}
+};
 
-static ERR_STRING_DATA EVP_str_reasons[]=
-       {
-{ERR_REASON(EVP_R_AES_IV_SETUP_FAILED)   ,"aes iv setup failed"},
-{ERR_REASON(EVP_R_AES_KEY_SETUP_FAILED)  ,"aes key setup failed"},
-{ERR_REASON(EVP_R_ASN1_LIB)              ,"asn1 lib"},
-{ERR_REASON(EVP_R_BAD_BLOCK_LENGTH)      ,"bad block length"},
-{ERR_REASON(EVP_R_BAD_DECRYPT)           ,"bad decrypt"},
-{ERR_REASON(EVP_R_BAD_KEY_LENGTH)        ,"bad key length"},
-{ERR_REASON(EVP_R_BN_DECODE_ERROR)       ,"bn decode error"},
-{ERR_REASON(EVP_R_BN_PUBKEY_ERROR)       ,"bn pubkey error"},
-{ERR_REASON(EVP_R_BUFFER_TOO_SMALL)      ,"buffer too small"},
-{ERR_REASON(EVP_R_CAMELLIA_KEY_SETUP_FAILED),"camellia key setup failed"},
-{ERR_REASON(EVP_R_CIPHER_PARAMETER_ERROR),"cipher parameter error"},
-{ERR_REASON(EVP_R_COMMAND_NOT_SUPPORTED) ,"command not supported"},
-{ERR_REASON(EVP_R_CTRL_NOT_IMPLEMENTED)  ,"ctrl not implemented"},
-{ERR_REASON(EVP_R_CTRL_OPERATION_NOT_IMPLEMENTED),"ctrl operation not implemented"},
-{ERR_REASON(EVP_R_DATA_NOT_MULTIPLE_OF_BLOCK_LENGTH),"data not multiple of block length"},
-{ERR_REASON(EVP_R_DECODE_ERROR)          ,"decode error"},
-{ERR_REASON(EVP_R_DIFFERENT_KEY_TYPES)   ,"different key types"},
-{ERR_REASON(EVP_R_DIFFERENT_PARAMETERS)  ,"different parameters"},
-{ERR_REASON(EVP_R_DISABLED_FOR_FIPS)     ,"disabled for fips"},
-{ERR_REASON(EVP_R_ENCODE_ERROR)          ,"encode error"},
-{ERR_REASON(EVP_R_ERROR_LOADING_SECTION) ,"error loading section"},
-{ERR_REASON(EVP_R_ERROR_SETTING_FIPS_MODE),"error setting fips mode"},
-{ERR_REASON(EVP_R_EVP_PBE_CIPHERINIT_ERROR),"evp pbe cipherinit error"},
-{ERR_REASON(EVP_R_EXPECTING_AN_RSA_KEY)  ,"expecting an rsa key"},
-{ERR_REASON(EVP_R_EXPECTING_A_DH_KEY)    ,"expecting a dh key"},
-{ERR_REASON(EVP_R_EXPECTING_A_DSA_KEY)   ,"expecting a dsa key"},
-{ERR_REASON(EVP_R_EXPECTING_A_ECDSA_KEY) ,"expecting a ecdsa key"},
-{ERR_REASON(EVP_R_EXPECTING_A_EC_KEY)    ,"expecting a ec key"},
-{ERR_REASON(EVP_R_FIPS_MODE_NOT_SUPPORTED),"fips mode not supported"},
-{ERR_REASON(EVP_R_INITIALIZATION_ERROR)  ,"initialization error"},
-{ERR_REASON(EVP_R_INPUT_NOT_INITIALIZED) ,"input not initialized"},
-{ERR_REASON(EVP_R_INVALID_DIGEST)        ,"invalid digest"},
-{ERR_REASON(EVP_R_INVALID_FIPS_MODE)     ,"invalid fips mode"},
-{ERR_REASON(EVP_R_INVALID_KEY_LENGTH)    ,"invalid key length"},
-{ERR_REASON(EVP_R_INVALID_OPERATION)     ,"invalid operation"},
-{ERR_REASON(EVP_R_IV_TOO_LARGE)          ,"iv too large"},
-{ERR_REASON(EVP_R_KEYGEN_FAILURE)        ,"keygen failure"},
-{ERR_REASON(EVP_R_MESSAGE_DIGEST_IS_NULL),"message digest is null"},
-{ERR_REASON(EVP_R_METHOD_NOT_SUPPORTED)  ,"method not supported"},
-{ERR_REASON(EVP_R_MISSING_PARAMETERS)    ,"missing parameters"},
-{ERR_REASON(EVP_R_NO_CIPHER_SET)         ,"no cipher set"},
-{ERR_REASON(EVP_R_NO_DEFAULT_DIGEST)     ,"no default digest"},
-{ERR_REASON(EVP_R_NO_DIGEST_SET)         ,"no digest set"},
-{ERR_REASON(EVP_R_NO_DSA_PARAMETERS)     ,"no dsa parameters"},
-{ERR_REASON(EVP_R_NO_KEY_SET)            ,"no key set"},
-{ERR_REASON(EVP_R_NO_OPERATION_SET)      ,"no operation set"},
-{ERR_REASON(EVP_R_NO_SIGN_FUNCTION_CONFIGURED),"no sign function configured"},
-{ERR_REASON(EVP_R_NO_VERIFY_FUNCTION_CONFIGURED),"no verify function configured"},
-{ERR_REASON(EVP_R_OPERATION_NOT_SUPPORTED_FOR_THIS_KEYTYPE),"operation not supported for this keytype"},
-{ERR_REASON(EVP_R_OPERATON_NOT_INITIALIZED),"operaton not initialized"},
-{ERR_REASON(EVP_R_PKCS8_UNKNOWN_BROKEN_TYPE),"pkcs8 unknown broken type"},
-{ERR_REASON(EVP_R_PRIVATE_KEY_DECODE_ERROR),"private key decode error"},
-{ERR_REASON(EVP_R_PRIVATE_KEY_ENCODE_ERROR),"private key encode error"},
-{ERR_REASON(EVP_R_PUBLIC_KEY_NOT_RSA)    ,"public key not rsa"},
-{ERR_REASON(EVP_R_TOO_LARGE)             ,"too large"},
-{ERR_REASON(EVP_R_UNKNOWN_CIPHER)        ,"unknown cipher"},
-{ERR_REASON(EVP_R_UNKNOWN_DIGEST)        ,"unknown digest"},
-{ERR_REASON(EVP_R_UNKNOWN_OPTION)        ,"unknown option"},
-{ERR_REASON(EVP_R_UNKNOWN_PBE_ALGORITHM) ,"unknown pbe algorithm"},
-{ERR_REASON(EVP_R_UNSUPORTED_NUMBER_OF_ROUNDS),"unsuported number of rounds"},
-{ERR_REASON(EVP_R_UNSUPPORTED_ALGORITHM) ,"unsupported algorithm"},
-{ERR_REASON(EVP_R_UNSUPPORTED_CIPHER)    ,"unsupported cipher"},
-{ERR_REASON(EVP_R_UNSUPPORTED_KEYLENGTH) ,"unsupported keylength"},
-{ERR_REASON(EVP_R_UNSUPPORTED_KEY_DERIVATION_FUNCTION),"unsupported key derivation function"},
-{ERR_REASON(EVP_R_UNSUPPORTED_KEY_SIZE)  ,"unsupported key size"},
-{ERR_REASON(EVP_R_UNSUPPORTED_PRF)       ,"unsupported prf"},
-{ERR_REASON(EVP_R_UNSUPPORTED_PRIVATE_KEY_ALGORITHM),"unsupported private key algorithm"},
-{ERR_REASON(EVP_R_UNSUPPORTED_SALT_TYPE) ,"unsupported salt type"},
-{ERR_REASON(EVP_R_WRONG_FINAL_BLOCK_LENGTH),"wrong final block length"},
-{ERR_REASON(EVP_R_WRONG_PUBLIC_KEY_TYPE) ,"wrong public key type"},
-{0,NULL}
-       };
+static ERR_STRING_DATA EVP_str_reasons[]= {
+       {ERR_REASON(EVP_R_AES_IV_SETUP_FAILED)   , "aes iv setup failed"},
+       {ERR_REASON(EVP_R_AES_KEY_SETUP_FAILED)  , "aes key setup failed"},
+       {ERR_REASON(EVP_R_ASN1_LIB)              , "asn1 lib"},
+       {ERR_REASON(EVP_R_BAD_BLOCK_LENGTH)      , "bad block length"},
+       {ERR_REASON(EVP_R_BAD_DECRYPT)           , "bad decrypt"},
+       {ERR_REASON(EVP_R_BAD_KEY_LENGTH)        , "bad key length"},
+       {ERR_REASON(EVP_R_BN_DECODE_ERROR)       , "bn decode error"},
+       {ERR_REASON(EVP_R_BN_PUBKEY_ERROR)       , "bn pubkey error"},
+       {ERR_REASON(EVP_R_BUFFER_TOO_SMALL)      , "buffer too small"},
+       {ERR_REASON(EVP_R_CAMELLIA_KEY_SETUP_FAILED), "camellia key setup failed"},
+       {ERR_REASON(EVP_R_CIPHER_PARAMETER_ERROR), "cipher parameter error"},
+       {ERR_REASON(EVP_R_COMMAND_NOT_SUPPORTED) , "command not supported"},
+       {ERR_REASON(EVP_R_CTRL_NOT_IMPLEMENTED)  , "ctrl not implemented"},
+       {ERR_REASON(EVP_R_CTRL_OPERATION_NOT_IMPLEMENTED), "ctrl operation not implemented"},
+       {ERR_REASON(EVP_R_DATA_NOT_MULTIPLE_OF_BLOCK_LENGTH), "data not multiple of block length"},
+       {ERR_REASON(EVP_R_DECODE_ERROR)          , "decode error"},
+       {ERR_REASON(EVP_R_DIFFERENT_KEY_TYPES)   , "different key types"},
+       {ERR_REASON(EVP_R_DIFFERENT_PARAMETERS)  , "different parameters"},
+       {ERR_REASON(EVP_R_DISABLED_FOR_FIPS)     , "disabled for fips"},
+       {ERR_REASON(EVP_R_ENCODE_ERROR)          , "encode error"},
+       {ERR_REASON(EVP_R_ERROR_LOADING_SECTION) , "error loading section"},
+       {ERR_REASON(EVP_R_ERROR_SETTING_FIPS_MODE), "error setting fips mode"},
+       {ERR_REASON(EVP_R_EVP_PBE_CIPHERINIT_ERROR), "evp pbe cipherinit error"},
+       {ERR_REASON(EVP_R_EXPECTING_AN_RSA_KEY)  , "expecting an rsa key"},
+       {ERR_REASON(EVP_R_EXPECTING_A_DH_KEY)    , "expecting a dh key"},
+       {ERR_REASON(EVP_R_EXPECTING_A_DSA_KEY)   , "expecting a dsa key"},
+       {ERR_REASON(EVP_R_EXPECTING_A_ECDSA_KEY) , "expecting a ecdsa key"},
+       {ERR_REASON(EVP_R_EXPECTING_A_EC_KEY)    , "expecting a ec key"},
+       {ERR_REASON(EVP_R_FIPS_MODE_NOT_SUPPORTED), "fips mode not supported"},
+       {ERR_REASON(EVP_R_INITIALIZATION_ERROR)  , "initialization error"},
+       {ERR_REASON(EVP_R_INPUT_NOT_INITIALIZED) , "input not initialized"},
+       {ERR_REASON(EVP_R_INVALID_DIGEST)        , "invalid digest"},
+       {ERR_REASON(EVP_R_INVALID_FIPS_MODE)     , "invalid fips mode"},
+       {ERR_REASON(EVP_R_INVALID_KEY_LENGTH)    , "invalid key length"},
+       {ERR_REASON(EVP_R_INVALID_OPERATION)     , "invalid operation"},
+       {ERR_REASON(EVP_R_IV_TOO_LARGE)          , "iv too large"},
+       {ERR_REASON(EVP_R_KEYGEN_FAILURE)        , "keygen failure"},
+       {ERR_REASON(EVP_R_MESSAGE_DIGEST_IS_NULL), "message digest is null"},
+       {ERR_REASON(EVP_R_METHOD_NOT_SUPPORTED)  , "method not supported"},
+       {ERR_REASON(EVP_R_MISSING_PARAMETERS)    , "missing parameters"},
+       {ERR_REASON(EVP_R_NO_CIPHER_SET)         , "no cipher set"},
+       {ERR_REASON(EVP_R_NO_DEFAULT_DIGEST)     , "no default digest"},
+       {ERR_REASON(EVP_R_NO_DIGEST_SET)         , "no digest set"},
+       {ERR_REASON(EVP_R_NO_DSA_PARAMETERS)     , "no dsa parameters"},
+       {ERR_REASON(EVP_R_NO_KEY_SET)            , "no key set"},
+       {ERR_REASON(EVP_R_NO_OPERATION_SET)      , "no operation set"},
+       {ERR_REASON(EVP_R_NO_SIGN_FUNCTION_CONFIGURED), "no sign function configured"},
+       {ERR_REASON(EVP_R_NO_VERIFY_FUNCTION_CONFIGURED), "no verify function configured"},
+       {ERR_REASON(EVP_R_OPERATION_NOT_SUPPORTED_FOR_THIS_KEYTYPE), "operation not supported for this keytype"},
+       {ERR_REASON(EVP_R_OPERATON_NOT_INITIALIZED), "operaton not initialized"},
+       {ERR_REASON(EVP_R_PKCS8_UNKNOWN_BROKEN_TYPE), "pkcs8 unknown broken type"},
+       {ERR_REASON(EVP_R_PRIVATE_KEY_DECODE_ERROR), "private key decode error"},
+       {ERR_REASON(EVP_R_PRIVATE_KEY_ENCODE_ERROR), "private key encode error"},
+       {ERR_REASON(EVP_R_PUBLIC_KEY_NOT_RSA)    , "public key not rsa"},
+       {ERR_REASON(EVP_R_TOO_LARGE)             , "too large"},
+       {ERR_REASON(EVP_R_UNKNOWN_CIPHER)        , "unknown cipher"},
+       {ERR_REASON(EVP_R_UNKNOWN_DIGEST)        , "unknown digest"},
+       {ERR_REASON(EVP_R_UNKNOWN_OPTION)        , "unknown option"},
+       {ERR_REASON(EVP_R_UNKNOWN_PBE_ALGORITHM) , "unknown pbe algorithm"},
+       {ERR_REASON(EVP_R_UNSUPORTED_NUMBER_OF_ROUNDS), "unsuported number of rounds"},
+       {ERR_REASON(EVP_R_UNSUPPORTED_ALGORITHM) , "unsupported algorithm"},
+       {ERR_REASON(EVP_R_UNSUPPORTED_CIPHER)    , "unsupported cipher"},
+       {ERR_REASON(EVP_R_UNSUPPORTED_KEYLENGTH) , "unsupported keylength"},
+       {ERR_REASON(EVP_R_UNSUPPORTED_KEY_DERIVATION_FUNCTION), "unsupported key derivation function"},
+       {ERR_REASON(EVP_R_UNSUPPORTED_KEY_SIZE)  , "unsupported key size"},
+       {ERR_REASON(EVP_R_UNSUPPORTED_PRF)       , "unsupported prf"},
+       {ERR_REASON(EVP_R_UNSUPPORTED_PRIVATE_KEY_ALGORITHM), "unsupported private key algorithm"},
+       {ERR_REASON(EVP_R_UNSUPPORTED_SALT_TYPE) , "unsupported salt type"},
+       {ERR_REASON(EVP_R_WRONG_FINAL_BLOCK_LENGTH), "wrong final block length"},
+       {ERR_REASON(EVP_R_WRONG_PUBLIC_KEY_TYPE) , "wrong public key type"},
+       {0, NULL}
+};
 
 #endif
 
-void ERR_load_EVP_strings(void)
-       {
+void
+ERR_load_EVP_strings(void)
+{
 #ifndef OPENSSL_NO_ERR
-
-       if (ERR_func_error_string(EVP_str_functs[0].error) == NULL)
-               {
-               ERR_load_strings(0,EVP_str_functs);
-               ERR_load_strings(0,EVP_str_reasons);
-               }
-#endif
+       if (ERR_func_error_string(EVP_str_functs[0].error) == NULL) {
+               ERR_load_strings(0, EVP_str_functs);
+               ERR_load_strings(0, EVP_str_reasons);
        }
+#endif
+}
index b3cb063..445456d 100644 (file)
@@ -5,21 +5,21 @@
  * This package is an SSL implementation written
  * by Eric Young (eay@cryptsoft.com).
  * The implementation was written so as to conform with Netscapes SSL.
- * 
+ *
  * This library is free for commercial and non-commercial use as long as
  * the following conditions are aheared to.  The following conditions
  * apply to all code found in this distribution, be it the RC4, RSA,
  * lhash, DES, etc., code; not just the SSL code.  The SSL documentation
  * included with this distribution is covered by the same copyright terms
  * except that the holder is Tim Hudson (tjh@cryptsoft.com).
- * 
+ *
  * Copyright remains Eric Young's, and as such any Copyright notices in
  * the code are not to be removed.
  * If this package is used in a product, Eric Young should be given attribution
  * as the author of the parts of the library used.
  * This can be in the form of a textual message at program startup or
  * in documentation (online or textual) provided with the package.
- * 
+ *
  * Redistribution and use in source and binary forms, with or without
  * modification, are permitted provided that the following conditions
  * are met:
  *     Eric Young (eay@cryptsoft.com)"
  *    The word 'cryptographic' can be left out if the rouines from the library
  *    being used are not cryptographic related :-).
- * 4. If you include any Windows specific code (or a derivative thereof) from 
+ * 4. If you include any Windows specific code (or a derivative thereof) from
  *    the apps directory (application code) you must include an acknowledgement:
  *    "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
- * 
+ *
  * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
@@ -49,7 +49,7 @@
  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
  * SUCH DAMAGE.
- * 
+ *
  * The licence and distribution terms for any publically available version or
  * derivative of this code cannot be changed.  i.e. this code cannot simply be
  * copied and put under another distribution licence
 /* should be init to zeros. */
 static char prompt_string[80];
 
-void EVP_set_pw_prompt(const char *prompt)
-       {
+void
+EVP_set_pw_prompt(const char *prompt)
+{
        if (prompt == NULL)
-               prompt_string[0]='\0';
-       else
-               {
-               strlcpy(prompt_string,prompt,sizeof(prompt_string));
-               }
+               prompt_string[0] = '\0';
+       else {
+               strlcpy(prompt_string, prompt, sizeof(prompt_string));
        }
+}
 
-char *EVP_get_pw_prompt(void)
-       {
+char *
+EVP_get_pw_prompt(void)
+{
        if (prompt_string[0] == '\0')
-               return(NULL);
+               return (NULL);
        else
-               return(prompt_string);
-       }
+               return (prompt_string);
+}
 
 /* For historical reasons, the standard function for reading passwords is
  * in the DES library -- if someone ever wants to disable DES,
  * this function will fail */
-int EVP_read_pw_string(char *buf, int len, const char *prompt, int verify)
-       {
+int
+EVP_read_pw_string(char *buf, int len, const char *prompt, int verify)
+{
        return EVP_read_pw_string_min(buf, 0, len, prompt, verify);
-       }
+}
 
-int EVP_read_pw_string_min(char *buf, int min, int len, const char *prompt, int verify)
-       {
+int
+EVP_read_pw_string_min(char *buf, int min, int len, const char *prompt,
+    int verify)
+{
        int ret;
        char buff[BUFSIZ];
        UI *ui;
 
        if ((prompt == NULL) && (prompt_string[0] != '\0'))
-               prompt=prompt_string;
+               prompt = prompt_string;
        ui = UI_new();
-       UI_add_input_string(ui,prompt,0,buf,min,(len>=BUFSIZ)?BUFSIZ-1:len);
+       UI_add_input_string(ui, prompt, 0,buf, min,
+           (len >= BUFSIZ) ? BUFSIZ - 1 : len);
        if (verify)
-               UI_add_verify_string(ui,prompt,0,
-                       buff,min,(len>=BUFSIZ)?BUFSIZ-1:len,buf);
+               UI_add_verify_string(ui, prompt, 0, buff, min,
+                   (len >= BUFSIZ) ? BUFSIZ - 1 : len, buf);
        ret = UI_process(ui);
        UI_free(ui);
-       OPENSSL_cleanse(buff,BUFSIZ);
+       OPENSSL_cleanse(buff, BUFSIZ);
        return ret;
-       }
+}
 
-int EVP_BytesToKey(const EVP_CIPHER *type, const EVP_MD *md, 
-            const unsigned char *salt, const unsigned char *data, int datal,
-            int count, unsigned char *key, unsigned char *iv)
-       {
+int
+EVP_BytesToKey(const EVP_CIPHER *type, const EVP_MD *md,
+    const unsigned char *salt, const unsigned char *data, int datal,
+    int count, unsigned char *key, unsigned char *iv)
+{
        EVP_MD_CTX c;
        unsigned char md_buf[EVP_MAX_MD_SIZE];
-       int niv,nkey,addmd=0;
-       unsigned int mds=0,i;
+       int niv, nkey, addmd = 0;
+       unsigned int mds = 0, i;
        int rv = 0;
-       nkey=type->key_len;
-       niv=type->iv_len;
+       nkey = type->key_len;
+       niv = type->iv_len;
        OPENSSL_assert(nkey <= EVP_MAX_KEY_LENGTH);
        OPENSSL_assert(niv <= EVP_MAX_IV_LENGTH);
 
-       if (data == NULL) return(nkey);
+       if (data == NULL)
+               return (nkey);
 
        EVP_MD_CTX_init(&c);
-       for (;;)
-               {
-               if (!EVP_DigestInit_ex(&c,md, NULL))
+       for (;;) {
+               if (!EVP_DigestInit_ex(&c, md, NULL))
                        return 0;
                if (addmd++)
-                       if (!EVP_DigestUpdate(&c,&(md_buf[0]),mds))
+                       if (!EVP_DigestUpdate(&c, &(md_buf[0]), mds))
                                goto err;
-               if (!EVP_DigestUpdate(&c,data,datal))
+               if (!EVP_DigestUpdate(&c, data, datal))
                        goto err;
                if (salt != NULL)
-                       if (!EVP_DigestUpdate(&c,salt,PKCS5_SALT_LEN))
+                       if (!EVP_DigestUpdate(&c, salt, PKCS5_SALT_LEN))
                                goto err;
-               if (!EVP_DigestFinal_ex(&c,&(md_buf[0]),&mds))
+               if (!EVP_DigestFinal_ex(&c, &(md_buf[0]), &mds))
                        goto err;
 
-               for (i=1; i<(unsigned int)count; i++)
-                       {
-                       if (!EVP_DigestInit_ex(&c,md, NULL))
+               for (i = 1; i < (unsigned int)count; i++) {
+                       if (!EVP_DigestInit_ex(&c, md, NULL))
                                goto err;
-                       if (!EVP_DigestUpdate(&c,&(md_buf[0]),mds))
+                       if (!EVP_DigestUpdate(&c, &(md_buf[0]), mds))
                                goto err;
-                       if (!EVP_DigestFinal_ex(&c,&(md_buf[0]),&mds))
+                       if (!EVP_DigestFinal_ex(&c, &(md_buf[0]), &mds))
                                goto err;
-                       }
-               i=0;
-               if (nkey)
-                       {
-                       for (;;)
-                               {
-                               if (nkey == 0) break;
-                               if (i == mds) break;
+               }
+               i = 0;
+               if (nkey) {
+                       for (;;) {
+                               if (nkey == 0)
+                                       break;
+                               if (i == mds)
+                                       break;
                                if (key != NULL)
-                                       *(key++)=md_buf[i];
+                                       *(key++) = md_buf[i];
                                nkey--;
                                i++;
-                               }
                        }
-               if (niv && (i != mds))
-                       {
-                       for (;;)
-                               {
-                               if (niv == 0) break;
-                               if (i == mds) break;
+               }
+               if (niv && (i != mds)) {
+                       for (;;) {
+                               if (niv == 0)
+                                       break;
+                               if (i == mds)
+                                       break;
                                if (iv != NULL)
-                                       *(iv++)=md_buf[i];
+                                       *(iv++) = md_buf[i];
                                niv--;
                                i++;
-                               }
                        }
-               if ((nkey == 0) && (niv == 0)) break;
                }
+               if ((nkey == 0) && (niv == 0))
+                       break;
+       }
        rv = type->key_len;
-       err:
+
+err:
        EVP_MD_CTX_cleanup(&c);
-       OPENSSL_cleanse(&(md_buf[0]),EVP_MAX_MD_SIZE);
+       OPENSSL_cleanse(&(md_buf[0]), EVP_MAX_MD_SIZE);
        return rv;
-       }
-
+}
index b180e48..791f6b8 100644 (file)
@@ -5,21 +5,21 @@
  * This package is an SSL implementation written
  * by Eric Young (eay@cryptsoft.com).
  * The implementation was written so as to conform with Netscapes SSL.
- * 
+ *
  * This library is free for commercial and non-commercial use as long as
  * the following conditions are aheared to.  The following conditions
  * apply to all code found in this distribution, be it the RC4, RSA,
  * lhash, DES, etc., code; not just the SSL code.  The SSL documentation
  * included with this distribution is covered by the same copyright terms
  * except that the holder is Tim Hudson (tjh@cryptsoft.com).
- * 
+ *
  * Copyright remains Eric Young's, and as such any Copyright notices in
  * the code are not to be removed.
  * If this package is used in a product, Eric Young should be given attribution
  * as the author of the parts of the library used.
  * This can be in the form of a textual message at program startup or
  * in documentation (online or textual) provided with the package.
- * 
+ *
  * Redistribution and use in source and binary forms, with or without
  * modification, are permitted provided that the following conditions
  * are met:
  *     Eric Young (eay@cryptsoft.com)"
  *    The word 'cryptographic' can be left out if the rouines from the library
  *    being used are not cryptographic related :-).
- * 4. If you include any Windows specific code (or a derivative thereof) from 
+ * 4. If you include any Windows specific code (or a derivative thereof) from
  *    the apps directory (application code) you must include an acknowledgement:
  *    "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
- * 
+ *
  * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
@@ -49,7 +49,7 @@
  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
  * SUCH DAMAGE.
- * 
+ *
  * The licence and distribution terms for any publically available version or
  * derivative of this code cannot be changed.  i.e. this code cannot simply be
  * copied and put under another distribution licence
 #include <openssl/evp.h>
 #include <openssl/objects.h>
 
-int EVP_CIPHER_param_to_asn1(EVP_CIPHER_CTX *c, ASN1_TYPE *type)
-       {
+int
+EVP_CIPHER_param_to_asn1(EVP_CIPHER_CTX *c, ASN1_TYPE *type)
+{
        int ret;
 
        if (c->cipher->set_asn1_parameters != NULL)
-               ret=c->cipher->set_asn1_parameters(c,type);
+               ret = c->cipher->set_asn1_parameters(c, type);
        else if (c->cipher->flags & EVP_CIPH_FLAG_DEFAULT_ASN1)
-               ret=EVP_CIPHER_set_asn1_iv(c, type);
+               ret = EVP_CIPHER_set_asn1_iv(c, type);
        else
-               ret=-1;
-       return(ret);
-       }
+               ret = -1;
+       return (ret);
+}
 
-int EVP_CIPHER_asn1_to_param(EVP_CIPHER_CTX *c, ASN1_TYPE *type)
-       {
+int
+EVP_CIPHER_asn1_to_param(EVP_CIPHER_CTX *c, ASN1_TYPE *type)
+{
        int ret;
 
        if (c->cipher->get_asn1_parameters != NULL)
-               ret=c->cipher->get_asn1_parameters(c,type);
+               ret = c->cipher->get_asn1_parameters(c, type);
        else if (c->cipher->flags & EVP_CIPH_FLAG_DEFAULT_ASN1)
-               ret=EVP_CIPHER_get_asn1_iv(c, type);
+               ret = EVP_CIPHER_get_asn1_iv(c, type);
        else
-               ret=-1;
-       return(ret);
-       }
+               ret = -1;
+       return (ret);
+}
 
-int EVP_CIPHER_get_asn1_iv(EVP_CIPHER_CTX *c, ASN1_TYPE *type)
-       {
-       int i=0;
+int
+EVP_CIPHER_get_asn1_iv(EVP_CIPHER_CTX *c, ASN1_TYPE *type)
+{
+       int i = 0;
        unsigned int l;
 
-       if (type != NULL) 
-               {
-               l=EVP_CIPHER_CTX_iv_length(c);
+       if (type != NULL) {
+               l = EVP_CIPHER_CTX_iv_length(c);
                OPENSSL_assert(l <= sizeof(c->iv));
-               i=ASN1_TYPE_get_octetstring(type,c->oiv,l);
+               i = ASN1_TYPE_get_octetstring(type, c->oiv, l);
                if (i != (int)l)
-                       return(-1);
+                       return (-1);
                else if (i > 0)
-                       memcpy(c->iv,c->oiv,l);
-               }
-       return(i);
+                       memcpy(c->iv, c->oiv, l);
        }
+       return (i);
+}
 
-int EVP_CIPHER_set_asn1_iv(EVP_CIPHER_CTX *c, ASN1_TYPE *type)
-       {
-       int i=0;
+int
+EVP_CIPHER_set_asn1_iv(EVP_CIPHER_CTX *c, ASN1_TYPE *type)
+{
+       int i = 0;
        unsigned int j;
 
-       if (type != NULL)
-               {
-               j=EVP_CIPHER_CTX_iv_length(c);
+       if (type != NULL) {
+               j = EVP_CIPHER_CTX_iv_length(c);
                OPENSSL_assert(j <= sizeof(c->iv));
-               i=ASN1_TYPE_set_octetstring(type,c->oiv,j);
-               }
-       return(i);
+               i = ASN1_TYPE_set_octetstring(type, c->oiv, j);
        }
+       return (i);
+}
 
 /* Convert the various cipher NIDs and dummies to a proper OID NID */
-int EVP_CIPHER_type(const EVP_CIPHER *ctx)
+int
+EVP_CIPHER_type(const EVP_CIPHER *ctx)
 {
        int nid;
        ASN1_OBJECT *otmp;
        nid = EVP_CIPHER_nid(ctx);
 
-       switch(nid) {
-
-               case NID_rc2_cbc:
-               case NID_rc2_64_cbc:
-               case NID_rc2_40_cbc:
-
+       switch (nid) {
+       case NID_rc2_cbc:
+       case NID_rc2_64_cbc:
+       case NID_rc2_40_cbc:
                return NID_rc2_cbc;
 
-               case NID_rc4:
-               case NID_rc4_40:
-
+       case NID_rc4:
+       case NID_rc4_40:
                return NID_rc4;
 
-               case NID_aes_128_cfb128:
-               case NID_aes_128_cfb8:
-               case NID_aes_128_cfb1:
-
+       case NID_aes_128_cfb128:
+       case NID_aes_128_cfb8:
+       case NID_aes_128_cfb1:
                return NID_aes_128_cfb128;
 
-               case NID_aes_192_cfb128:
-               case NID_aes_192_cfb8:
-               case NID_aes_192_cfb1:
-
+       case NID_aes_192_cfb128:
+       case NID_aes_192_cfb8:
+       case NID_aes_192_cfb1:
                return NID_aes_192_cfb128;
 
-               case NID_aes_256_cfb128:
-               case NID_aes_256_cfb8:
-               case NID_aes_256_cfb1:
-
+       case NID_aes_256_cfb128:
+       case NID_aes_256_cfb8:
+       case NID_aes_256_cfb1:
                return NID_aes_256_cfb128;
 
-               case NID_des_cfb64:
-               case NID_des_cfb8:
-               case NID_des_cfb1:
-
+       case NID_des_cfb64:
+       case NID_des_cfb8:
+       case NID_des_cfb1:
                return NID_des_cfb64;
 
-               case NID_des_ede3_cfb64:
-               case NID_des_ede3_cfb8:
-               case NID_des_ede3_cfb1:
-
+       case NID_des_ede3_cfb64:
+       case NID_des_ede3_cfb8:
+       case NID_des_ede3_cfb1:
                return NID_des_cfb64;
 
-               default:
+       default:
                /* Check it has an OID and it is valid */
                otmp = OBJ_nid2obj(nid);
-               if(!otmp || !otmp->data) nid = NID_undef;
+               if (!otmp || !otmp->data)
+                       nid = NID_undef;
                ASN1_OBJECT_free(otmp);
                return nid;
        }
 }
 
-int EVP_CIPHER_block_size(const EVP_CIPHER *e)
-       {
+int
+EVP_CIPHER_block_size(const EVP_CIPHER *e)
+{
        return e->block_size;
-       }
+}
 
-int EVP_CIPHER_CTX_block_size(const EVP_CIPHER_CTX *ctx)
-       {
+int
+EVP_CIPHER_CTX_block_size(const EVP_CIPHER_CTX *ctx)
+{
        return ctx->cipher->block_size;
-       }
+}
 
-int EVP_Cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, const unsigned char *in, unsigned int inl)
-       {
-       return ctx->cipher->do_cipher(ctx,out,in,inl);
-       }
+int
+EVP_Cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, const unsigned char *in,
+    unsigned int inl)
+{
+       return ctx->cipher->do_cipher(ctx, out, in, inl);
+}
 
-const EVP_CIPHER *EVP_CIPHER_CTX_cipher(const EVP_CIPHER_CTX *ctx)
-       {
+const EVP_CIPHER *
+EVP_CIPHER_CTX_cipher(const EVP_CIPHER_CTX *ctx)
+{
        return ctx->cipher;
-       }
+}
 
-unsigned long EVP_CIPHER_flags(const EVP_CIPHER *cipher)
-       {
+unsigned long
+EVP_CIPHER_flags(const EVP_CIPHER *cipher)
+{
        return cipher->flags;
-       }
+}
 
-unsigned long EVP_CIPHER_CTX_flags(const EVP_CIPHER_CTX *ctx)
-       {
+unsigned long
+EVP_CIPHER_CTX_flags(const EVP_CIPHER_CTX *ctx)
+{
        return ctx->cipher->flags;
-       }
+}
 
-void *EVP_CIPHER_CTX_get_app_data(const EVP_CIPHER_CTX *ctx)
-       {
+void *
+EVP_CIPHER_CTX_get_app_data(const EVP_CIPHER_CTX *ctx)
+{
        return ctx->app_data;
-       }
+}
 
-void EVP_CIPHER_CTX_set_app_data(EVP_CIPHER_CTX *ctx, void *data)
-       {
+void
+EVP_CIPHER_CTX_set_app_data(EVP_CIPHER_CTX *ctx, void *data)
+{
        ctx->app_data = data;
-       }
+}
 
-int EVP_CIPHER_iv_length(const EVP_CIPHER *cipher)
-       {
+int
+EVP_CIPHER_iv_length(const EVP_CIPHER *cipher)
+{
        return cipher->iv_len;
-       }
+}
 
-int EVP_CIPHER_CTX_iv_length(const EVP_CIPHER_CTX *ctx)
-       {
+int
+EVP_CIPHER_CTX_iv_length(const EVP_CIPHER_CTX *ctx)
+{
        return ctx->cipher->iv_len;
-       }
+}
 
-int EVP_CIPHER_key_length(const EVP_CIPHER *cipher)
-       {
+int
+EVP_CIPHER_key_length(const EVP_CIPHER *cipher)
+{
        return cipher->key_len;
-       }
+}
 
-int EVP_CIPHER_CTX_key_length(const EVP_CIPHER_CTX *ctx)
-       {
+int
+EVP_CIPHER_CTX_key_length(const EVP_CIPHER_CTX *ctx)
+{
        return ctx->key_len;
-       }
+}
 
-int EVP_CIPHER_nid(const EVP_CIPHER *cipher)
-       {
+int
+EVP_CIPHER_nid(const EVP_CIPHER *cipher)
+{
        return cipher->nid;
-       }
+}
 
-int EVP_CIPHER_CTX_nid(const EVP_CIPHER_CTX *ctx)
-       {
+int
+EVP_CIPHER_CTX_nid(const EVP_CIPHER_CTX *ctx)
+{
        return ctx->cipher->nid;
-       }
+}
 
-int EVP_MD_block_size(const EVP_MD *md) 
-       {
+int
+EVP_MD_block_size(const EVP_MD *md)
+{
        return md->block_size;
-       }
+}
 
-int EVP_MD_type(const EVP_MD *md)
-       {
+int
+EVP_MD_type(const EVP_MD *md)
+{
        return md->type;
-       }
+}
 
-int EVP_MD_pkey_type(const EVP_MD *md)
-       {
+int
+EVP_MD_pkey_type(const EVP_MD *md)
+{
        return md->pkey_type;
-       }
+}
 
-int EVP_MD_size(const EVP_MD *md)
-       {
-       if (!md)
-               {
+int
+EVP_MD_size(const EVP_MD *md)
+{
+       if (!md) {
                EVPerr(EVP_F_EVP_MD_SIZE, EVP_R_MESSAGE_DIGEST_IS_NULL);
                return -1;
-               }
-       return md->md_size;
        }
+       return md->md_size;
+}
 
-unsigned long EVP_MD_flags(const EVP_MD *md)
-       {
+unsigned long
+EVP_MD_flags(const EVP_MD *md)
+{
        return md->flags;
-       }
+}
 
-const EVP_MD *EVP_MD_CTX_md(const EVP_MD_CTX *ctx)
-       {
+const EVP_MD *
+EVP_MD_CTX_md(const EVP_MD_CTX *ctx)
+{
        if (!ctx)
                return NULL;
        return ctx->digest;
-       }
+}
 
-void EVP_MD_CTX_set_flags(EVP_MD_CTX *ctx, int flags)
-       {
+void
+EVP_MD_CTX_set_flags(EVP_MD_CTX *ctx, int flags)
+{
        ctx->flags |= flags;
-       }
+}
 
-void EVP_MD_CTX_clear_flags(EVP_MD_CTX *ctx, int flags)
-       {
+void
+EVP_MD_CTX_clear_flags(EVP_MD_CTX *ctx, int flags)
+{
        ctx->flags &= ~flags;
-       }
+}
 
-int EVP_MD_CTX_test_flags(const EVP_MD_CTX *ctx, int flags)
-       {
+int
+EVP_MD_CTX_test_flags(const EVP_MD_CTX *ctx, int flags)
+{
        return (ctx->flags & flags);
-       }
+}
 
-void EVP_CIPHER_CTX_set_flags(EVP_CIPHER_CTX *ctx, int flags)
-       {
+void
+EVP_CIPHER_CTX_set_flags(EVP_CIPHER_CTX *ctx, int flags)
+{
        ctx->flags |= flags;
-       }
+}
 
-void EVP_CIPHER_CTX_clear_flags(EVP_CIPHER_CTX *ctx, int flags)
-       {
+void
+EVP_CIPHER_CTX_clear_flags(EVP_CIPHER_CTX *ctx, int flags)
+{
        ctx->flags &= ~flags;
-       }
+}
 
-int EVP_CIPHER_CTX_test_flags(const EVP_CIPHER_CTX *ctx, int flags)
-       {
+int
+EVP_CIPHER_CTX_test_flags(const EVP_CIPHER_CTX *ctx, int flags)
+{
        return (ctx->flags & flags);
-       }
+}
index 37683af..779c159 100644 (file)
@@ -10,7 +10,7 @@
  * are met:
  *
  * 1. Redistributions of source code must retain the above copyright
- *    notice, this list of conditions and the following disclaimer. 
+ *    notice, this list of conditions and the following disclaimer.
  *
  * 2. Redistributions in binary form must reproduce the above copyright
  *    notice, this list of conditions and the following disclaimer in
@@ -70,50 +70,36 @@ static STACK_OF(EVP_PBE_CTL) *pbe_algs;
 
 /* Setup a cipher context from a PBE algorithm */
 
-typedef struct
-       {
+typedef struct {
        int pbe_type;
        int pbe_nid;
        int cipher_nid;
        int md_nid;
        EVP_PBE_KEYGEN *keygen;
-       } EVP_PBE_CTL;
+} EVP_PBE_CTL;
 
-static const EVP_PBE_CTL builtin_pbe[] = 
-       {
-       {EVP_PBE_TYPE_OUTER, NID_pbeWithMD2AndDES_CBC,
-                       NID_des_cbc, NID_md2, PKCS5_PBE_keyivgen},
-       {EVP_PBE_TYPE_OUTER, NID_pbeWithMD5AndDES_CBC,
-                       NID_des_cbc, NID_md5, PKCS5_PBE_keyivgen},
-       {EVP_PBE_TYPE_OUTER, NID_pbeWithSHA1AndRC2_CBC,
-                       NID_rc2_64_cbc, NID_sha1, PKCS5_PBE_keyivgen},
+static const EVP_PBE_CTL builtin_pbe[] = {
+       {EVP_PBE_TYPE_OUTER, NID_pbeWithMD2AndDES_CBC, NID_des_cbc, NID_md2, PKCS5_PBE_keyivgen},
+       {EVP_PBE_TYPE_OUTER, NID_pbeWithMD5AndDES_CBC, NID_des_cbc, NID_md5, PKCS5_PBE_keyivgen},
+       {EVP_PBE_TYPE_OUTER, NID_pbeWithSHA1AndRC2_CBC, NID_rc2_64_cbc, NID_sha1, PKCS5_PBE_keyivgen},
 
 #ifndef OPENSSL_NO_HMAC
        {EVP_PBE_TYPE_OUTER, NID_id_pbkdf2, -1, -1, PKCS5_v2_PBKDF2_keyivgen},
 #endif
 
-       {EVP_PBE_TYPE_OUTER, NID_pbe_WithSHA1And128BitRC4,
-                       NID_rc4, NID_sha1, PKCS12_PBE_keyivgen},
-       {EVP_PBE_TYPE_OUTER, NID_pbe_WithSHA1And40BitRC4,
-                       NID_rc4_40, NID_sha1, PKCS12_PBE_keyivgen},
-       {EVP_PBE_TYPE_OUTER, NID_pbe_WithSHA1And3_Key_TripleDES_CBC,
-                       NID_des_ede3_cbc, NID_sha1, PKCS12_PBE_keyivgen},
-       {EVP_PBE_TYPE_OUTER, NID_pbe_WithSHA1And2_Key_TripleDES_CBC, 
-                       NID_des_ede_cbc, NID_sha1, PKCS12_PBE_keyivgen},
-       {EVP_PBE_TYPE_OUTER, NID_pbe_WithSHA1And128BitRC2_CBC,
-                       NID_rc2_cbc, NID_sha1, PKCS12_PBE_keyivgen},
-       {EVP_PBE_TYPE_OUTER, NID_pbe_WithSHA1And40BitRC2_CBC,
-                       NID_rc2_40_cbc, NID_sha1, PKCS12_PBE_keyivgen},
+       {EVP_PBE_TYPE_OUTER, NID_pbe_WithSHA1And128BitRC4, NID_rc4, NID_sha1, PKCS12_PBE_keyivgen},
+       {EVP_PBE_TYPE_OUTER, NID_pbe_WithSHA1And40BitRC4, NID_rc4_40, NID_sha1, PKCS12_PBE_keyivgen},
+       {EVP_PBE_TYPE_OUTER, NID_pbe_WithSHA1And3_Key_TripleDES_CBC, NID_des_ede3_cbc, NID_sha1, PKCS12_PBE_keyivgen},
+       {EVP_PBE_TYPE_OUTER, NID_pbe_WithSHA1And2_Key_TripleDES_CBC, NID_des_ede_cbc, NID_sha1, PKCS12_PBE_keyivgen},
+       {EVP_PBE_TYPE_OUTER, NID_pbe_WithSHA1And128BitRC2_CBC, NID_rc2_cbc, NID_sha1, PKCS12_PBE_keyivgen},
+       {EVP_PBE_TYPE_OUTER, NID_pbe_WithSHA1And40BitRC2_CBC, NID_rc2_40_cbc, NID_sha1, PKCS12_PBE_keyivgen},
 
 #ifndef OPENSSL_NO_HMAC
        {EVP_PBE_TYPE_OUTER, NID_pbes2, -1, -1, PKCS5_v2_PBE_keyivgen},
 #endif
-       {EVP_PBE_TYPE_OUTER, NID_pbeWithMD2AndRC2_CBC,
-                       NID_rc2_64_cbc, NID_md2, PKCS5_PBE_keyivgen},
-       {EVP_PBE_TYPE_OUTER, NID_pbeWithMD5AndRC2_CBC,
-                       NID_rc2_64_cbc, NID_md5, PKCS5_PBE_keyivgen},
-       {EVP_PBE_TYPE_OUTER, NID_pbeWithSHA1AndDES_CBC,
-                       NID_des_cbc, NID_sha1, PKCS5_PBE_keyivgen},
+       {EVP_PBE_TYPE_OUTER, NID_pbeWithMD2AndRC2_CBC, NID_rc2_64_cbc, NID_md2, PKCS5_PBE_keyivgen},
+       {EVP_PBE_TYPE_OUTER, NID_pbeWithMD5AndRC2_CBC, NID_rc2_64_cbc, NID_md5, PKCS5_PBE_keyivgen},
+       {EVP_PBE_TYPE_OUTER, NID_pbeWithSHA1AndDES_CBC, NID_des_cbc, NID_sha1, PKCS5_PBE_keyivgen},
 
 
        {EVP_PBE_TYPE_PRF, NID_hmacWithSHA1, -1, NID_sha1, 0},
@@ -123,141 +109,141 @@ static const EVP_PBE_CTL builtin_pbe[] =
        {EVP_PBE_TYPE_PRF, NID_hmacWithSHA384, -1, NID_sha384, 0},
        {EVP_PBE_TYPE_PRF, NID_hmacWithSHA512, -1, NID_sha512, 0},
        {EVP_PBE_TYPE_PRF, NID_id_HMACGostR3411_94, -1, NID_id_GostR3411_94, 0},
-       };
+};
 
 #ifdef TEST
-int main(int argc, char **argv)
-       {
+int
+main(int argc, char **argv)
+{
        int i, nid_md, nid_cipher;
        EVP_PBE_CTL *tpbe, *tpbe2;
        /*OpenSSL_add_all_algorithms();*/
 
-       for (i = 0; i < sizeof(builtin_pbe)/sizeof(EVP_PBE_CTL); i++)
-               {
+       for (i = 0; i < sizeof(builtin_pbe) / sizeof(EVP_PBE_CTL); i++) {
                tpbe = builtin_pbe + i;
                fprintf(stderr, "%d %d %s ", tpbe->pbe_type, tpbe->pbe_nid,
-                                               OBJ_nid2sn(tpbe->pbe_nid));
+                   OBJ_nid2sn(tpbe->pbe_nid));
                if (EVP_PBE_find(tpbe->pbe_type, tpbe->pbe_nid,
-                                       &nid_cipher ,&nid_md,0))
+                   &nid_cipher , &nid_md, 0))
                        fprintf(stderr, "Found %s %s\n",
-                                       OBJ_nid2sn(nid_cipher),
-                                       OBJ_nid2sn(nid_md));
+                           OBJ_nid2sn(nid_cipher), OBJ_nid2sn(nid_md));
                else
                        fprintf(stderr, "Find ERROR!!\n");
-               }
+       }
 
        return 0;
-       }
+}
 #endif
-               
-
 
-int EVP_PBE_CipherInit(ASN1_OBJECT *pbe_obj, const char *pass, int passlen,
-                      ASN1_TYPE *param, EVP_CIPHER_CTX *ctx, int en_de)
-       {
+int
+EVP_PBE_CipherInit(ASN1_OBJECT *pbe_obj, const char *pass, int passlen,
+    ASN1_TYPE *param, EVP_CIPHER_CTX *ctx, int en_de)
+{
        const EVP_CIPHER *cipher;
        const EVP_MD *md;
        int cipher_nid, md_nid;
        EVP_PBE_KEYGEN *keygen;
 
        if (!EVP_PBE_find(EVP_PBE_TYPE_OUTER, OBJ_obj2nid(pbe_obj),
-                                       &cipher_nid, &md_nid, &keygen))
-               {
+           &cipher_nid, &md_nid, &keygen)) {
                char obj_tmp[80];
-               EVPerr(EVP_F_EVP_PBE_CIPHERINIT,EVP_R_UNKNOWN_PBE_ALGORITHM);
-               if (!pbe_obj) strlcpy (obj_tmp, "NULL", sizeof obj_tmp);
-               else i2t_ASN1_OBJECT(obj_tmp, sizeof obj_tmp, pbe_obj);
+               EVPerr(EVP_F_EVP_PBE_CIPHERINIT, EVP_R_UNKNOWN_PBE_ALGORITHM);
+               if (!pbe_obj)
+                       strlcpy (obj_tmp, "NULL", sizeof obj_tmp);
+               else
+                       i2t_ASN1_OBJECT(obj_tmp, sizeof obj_tmp, pbe_obj);
                ERR_asprintf_error_data("TYPE=%s", obj_tmp);
                return 0;
-               }
+       }
 
-       if(!pass)
+       if (!pass)
                passlen = 0;
        else if (passlen == -1)
                passlen = strlen(pass);
 
        if (cipher_nid == -1)
                cipher = NULL;
-       else
-               {
+       else {
                cipher = EVP_get_cipherbynid(cipher_nid);
-               if (!cipher)
-                       {
-                       EVPerr(EVP_F_EVP_PBE_CIPHERINIT,EVP_R_UNKNOWN_CIPHER);
+               if (!cipher) {
+                       EVPerr(EVP_F_EVP_PBE_CIPHERINIT, EVP_R_UNKNOWN_CIPHER);
                        return 0;
-                       }
                }
+       }
 
        if (md_nid == -1)
                md = NULL;
-       else
-               {
+       else {
                md = EVP_get_digestbynid(md_nid);
-               if (!md)
-                       {
-                       EVPerr(EVP_F_EVP_PBE_CIPHERINIT,EVP_R_UNKNOWN_DIGEST);
+               if (!md) {
+                       EVPerr(EVP_F_EVP_PBE_CIPHERINIT, EVP_R_UNKNOWN_DIGEST);
                        return 0;
-                       }
                }
+       }
 
-       if (!keygen(ctx, pass, passlen, param, cipher, md, en_de))
-               {
-               EVPerr(EVP_F_EVP_PBE_CIPHERINIT,EVP_R_KEYGEN_FAILURE);
+       if (!keygen(ctx, pass, passlen, param, cipher, md, en_de)) {
+               EVPerr(EVP_F_EVP_PBE_CIPHERINIT, EVP_R_KEYGEN_FAILURE);
                return 0;
-               }
-       return 1;       
+       }
+       return 1;
 }
 
 DECLARE_OBJ_BSEARCH_CMP_FN(EVP_PBE_CTL, EVP_PBE_CTL, pbe2);
 
-static int pbe2_cmp(const EVP_PBE_CTL *pbe1, const EVP_PBE_CTL *pbe2)
-       {
+static int
+pbe2_cmp(const EVP_PBE_CTL *pbe1, const EVP_PBE_CTL *pbe2)
+{
        int ret = pbe1->pbe_type - pbe2->pbe_type;
+
        if (ret)
                return ret;
        else
                return pbe1->pbe_nid - pbe2->pbe_nid;
-       }
+}
 
 IMPLEMENT_OBJ_BSEARCH_CMP_FN(EVP_PBE_CTL, EVP_PBE_CTL, pbe2);
 
-static int pbe_cmp(const EVP_PBE_CTL * const *a, const EVP_PBE_CTL * const *b)
-       {
+static int
+pbe_cmp(const EVP_PBE_CTL * const *a, const EVP_PBE_CTL * const *b)
+{
        int ret = (*a)->pbe_type - (*b)->pbe_type;
+
        if (ret)
                return ret;
        else
                return (*a)->pbe_nid - (*b)->pbe_nid;
-       }
+}
 
 /* Add a PBE algorithm */
 
-int EVP_PBE_alg_add_type(int pbe_type, int pbe_nid, int cipher_nid, int md_nid,
-                        EVP_PBE_KEYGEN *keygen)
-       {
+int
+EVP_PBE_alg_add_type(int pbe_type, int pbe_nid, int cipher_nid, int md_nid,
+    EVP_PBE_KEYGEN *keygen)
+{
        EVP_PBE_CTL *pbe_tmp;
+
        if (!pbe_algs)
                pbe_algs = sk_EVP_PBE_CTL_new(pbe_cmp);
-       if (!(pbe_tmp = (EVP_PBE_CTL*) malloc (sizeof(EVP_PBE_CTL))))
-               {
-               EVPerr(EVP_F_EVP_PBE_ALG_ADD_TYPE,ERR_R_MALLOC_FAILURE);
+       if (!(pbe_tmp = (EVP_PBE_CTL*) malloc (sizeof(EVP_PBE_CTL)))) {
+               EVPerr(EVP_F_EVP_PBE_ALG_ADD_TYPE, ERR_R_MALLOC_FAILURE);
                return 0;
-               }
+       }
        pbe_tmp->pbe_type = pbe_type;
        pbe_tmp->pbe_nid = pbe_nid;
        pbe_tmp->cipher_nid = cipher_nid;
        pbe_tmp->md_nid = md_nid;
        pbe_tmp->keygen = keygen;
 
-
        sk_EVP_PBE_CTL_push (pbe_algs, pbe_tmp);
        return 1;
-       }
+}
 
-int EVP_PBE_alg_add(int nid, const EVP_CIPHER *cipher, const EVP_MD *md,
-                   EVP_PBE_KEYGEN *keygen)
-       {
+int
+EVP_PBE_alg_add(int nid, const EVP_CIPHER *cipher, const EVP_MD *md,
+    EVP_PBE_KEYGEN *keygen)
+{
        int cipher_nid, md_nid;
+
        if (cipher)
                cipher_nid = EVP_CIPHER_type(cipher);
        else
@@ -268,12 +254,13 @@ int EVP_PBE_alg_add(int nid, const EVP_CIPHER *cipher, const EVP_MD *md,
                md_nid = -1;
 
        return EVP_PBE_alg_add_type(EVP_PBE_TYPE_OUTER, nid,
-                                       cipher_nid, md_nid, keygen);
-       }
+           cipher_nid, md_nid, keygen);
+}
 
-int EVP_PBE_find(int type, int pbe_nid,
-                int *pcnid, int *pmnid, EVP_PBE_KEYGEN **pkeygen)
-       {
+int
+EVP_PBE_find(int type, int pbe_nid,
+    int *pcnid, int *pmnid, EVP_PBE_KEYGEN **pkeygen)
+{
        EVP_PBE_CTL *pbetmp = NULL, pbelu;
        int i;
        if (pbe_nid == NID_undef)
@@ -282,17 +269,15 @@ int EVP_PBE_find(int type, int pbe_nid,
        pbelu.pbe_type = type;
        pbelu.pbe_nid = pbe_nid;
 
-       if (pbe_algs)
-               {
+       if (pbe_algs) {
                i = sk_EVP_PBE_CTL_find(pbe_algs, &pbelu);
                if (i != -1)
                        pbetmp = sk_EVP_PBE_CTL_value (pbe_algs, i);
-               }
-       if (pbetmp == NULL)
-               {
+       }
+       if (pbetmp == NULL) {
                pbetmp = OBJ_bsearch_pbe2(&pbelu, builtin_pbe,
-                                    sizeof(builtin_pbe)/sizeof(EVP_PBE_CTL));
-               }
+                   sizeof(builtin_pbe)/sizeof(EVP_PBE_CTL));
+       }
        if (pbetmp == NULL)
                return 0;
        if (pcnid)
@@ -302,15 +287,17 @@ int EVP_PBE_find(int type, int pbe_nid,
        if (pkeygen)
                *pkeygen = pbetmp->keygen;
        return 1;
-       }
+}
 
-static void free_evp_pbe_ctl(EVP_PBE_CTL *pbe)
-        {
-        free(pbe);
-        }
+static void
+free_evp_pbe_ctl(EVP_PBE_CTL *pbe)
+{
+       free(pbe);
+}
 
-void EVP_PBE_cleanup(void)
-       {
+void
+EVP_PBE_cleanup(void)
+{
        sk_EVP_PBE_CTL_pop_free(pbe_algs, free_evp_pbe_ctl);
        pbe_algs = NULL;
-       }
+}
index 94056f0..99fe5b3 100644 (file)
@@ -10,7 +10,7 @@
  * are met:
  *
  * 1. Redistributions of source code must retain the above copyright
- *    notice, this list of conditions and the following disclaimer. 
+ *    notice, this list of conditions and the following disclaimer.
  *
  * 2. Redistributions in binary form must reproduce the above copyright
  *    notice, this list of conditions and the following disclaimer in
@@ -65,7 +65,8 @@
 
 /* Extract a private key from a PKCS8 structure */
 
-EVP_PKEY *EVP_PKCS82PKEY(PKCS8_PRIV_KEY_INFO *p8)
+EVP_PKEY *
+EVP_PKCS82PKEY(PKCS8_PRIV_KEY_INFO *p8)
 {
        EVP_PKEY *pkey = NULL;
        ASN1_OBJECT *algoid;
@@ -75,166 +76,164 @@ EVP_PKEY *EVP_PKCS82PKEY(PKCS8_PRIV_KEY_INFO *p8)
                return NULL;
 
        if (!(pkey = EVP_PKEY_new())) {
-               EVPerr(EVP_F_EVP_PKCS82PKEY,ERR_R_MALLOC_FAILURE);
+               EVPerr(EVP_F_EVP_PKCS82PKEY, ERR_R_MALLOC_FAILURE);
                return NULL;
        }
 
-       if (!EVP_PKEY_set_type(pkey, OBJ_obj2nid(algoid)))
-               {
-               EVPerr(EVP_F_EVP_PKCS82PKEY, EVP_R_UNSUPPORTED_PRIVATE_KEY_ALGORITHM);
+       if (!EVP_PKEY_set_type(pkey, OBJ_obj2nid(algoid))) {
+               EVPerr(EVP_F_EVP_PKCS82PKEY,
+                   EVP_R_UNSUPPORTED_PRIVATE_KEY_ALGORITHM);
                i2t_ASN1_OBJECT(obj_tmp, 80, algoid);
                ERR_asprintf_error_data("TYPE=%s", obj_tmp);
                goto error;
-               }
+       }
 
-       if (pkey->ameth->priv_decode)
-               {
-               if (!pkey->ameth->priv_decode(pkey, p8))
-                       {
+       if (pkey->ameth->priv_decode) {
+               if (!pkey->ameth->priv_decode(pkey, p8)) {
                        EVPerr(EVP_F_EVP_PKCS82PKEY,
-                                       EVP_R_PRIVATE_KEY_DECODE_ERROR);
+                           EVP_R_PRIVATE_KEY_DECODE_ERROR);
                        goto error;
-                       }
                }
-       else
-               {
+       } else {
                EVPerr(EVP_F_EVP_PKCS82PKEY, EVP_R_METHOD_NOT_SUPPORTED);
                goto error;
-               }
+       }
 
        return pkey;
 
-       error:
+error:
        EVP_PKEY_free (pkey);
        return NULL;
 }
 
-PKCS8_PRIV_KEY_INFO *EVP_PKEY2PKCS8(EVP_PKEY *pkey)
+PKCS8_PRIV_KEY_INFO *
+EVP_PKEY2PKCS8(EVP_PKEY *pkey)
 {
        return EVP_PKEY2PKCS8_broken(pkey, PKCS8_OK);
 }
 
 /* Turn a private key into a PKCS8 structure */
 
-PKCS8_PRIV_KEY_INFO *EVP_PKEY2PKCS8_broken(EVP_PKEY *pkey, int broken)
+PKCS8_PRIV_KEY_INFO *
+EVP_PKEY2PKCS8_broken(EVP_PKEY *pkey, int broken)
 {
        PKCS8_PRIV_KEY_INFO *p8;
 
-       if (!(p8 = PKCS8_PRIV_KEY_INFO_new())) {        
-               EVPerr(EVP_F_EVP_PKEY2PKCS8_BROKEN,ERR_R_MALLOC_FAILURE);
+       if (!(p8 = PKCS8_PRIV_KEY_INFO_new())) {
+               EVPerr(EVP_F_EVP_PKEY2PKCS8_BROKEN, ERR_R_MALLOC_FAILURE);
                return NULL;
        }
        p8->broken = broken;
 
-       if (pkey->ameth)
-               {
-               if (pkey->ameth->priv_encode)
-                       {
-                       if (!pkey->ameth->priv_encode(p8, pkey))
-                               {
+       if (pkey->ameth) {
+               if (pkey->ameth->priv_encode) {
+                       if (!pkey->ameth->priv_encode(p8, pkey)) {
                                EVPerr(EVP_F_EVP_PKEY2PKCS8_BROKEN,
-                                       EVP_R_PRIVATE_KEY_ENCODE_ERROR);
+                                   EVP_R_PRIVATE_KEY_ENCODE_ERROR);
                                goto error;
-                               }
                        }
-               else
-                       {
+               } else {
                        EVPerr(EVP_F_EVP_PKEY2PKCS8_BROKEN,
-                                       EVP_R_METHOD_NOT_SUPPORTED);
+                           EVP_R_METHOD_NOT_SUPPORTED);
                        goto error;
-                       }
                }
-       else
-               {
+       } else {
                EVPerr(EVP_F_EVP_PKEY2PKCS8_BROKEN,
-                               EVP_R_UNSUPPORTED_PRIVATE_KEY_ALGORITHM);
+                   EVP_R_UNSUPPORTED_PRIVATE_KEY_ALGORITHM);
                goto error;
-               }
+       }
        return p8;
-       error:
+
+error:
        PKCS8_PRIV_KEY_INFO_free(p8);
        return NULL;
 }
 
-PKCS8_PRIV_KEY_INFO *PKCS8_set_broken(PKCS8_PRIV_KEY_INFO *p8, int broken)
+PKCS8_PRIV_KEY_INFO *
+PKCS8_set_broken(PKCS8_PRIV_KEY_INFO *p8, int broken)
 {
        switch (broken) {
-
-               case PKCS8_OK:
+       case PKCS8_OK:
                p8->broken = PKCS8_OK;
                return p8;
                break;
 
-               case PKCS8_NO_OCTET:
+       case PKCS8_NO_OCTET:
                p8->broken = PKCS8_NO_OCTET;
                p8->pkey->type = V_ASN1_SEQUENCE;
                return p8;
                break;
 
-               default:
-               EVPerr(EVP_F_PKCS8_SET_BROKEN,EVP_R_PKCS8_UNKNOWN_BROKEN_TYPE);
+       default:
+               EVPerr(EVP_F_PKCS8_SET_BROKEN, EVP_R_PKCS8_UNKNOWN_BROKEN_TYPE);
                return NULL;
        }
 }
 
 /* EVP_PKEY attribute functions */
 
-int EVP_PKEY_get_attr_count(const EVP_PKEY *key)
+int
+EVP_PKEY_get_attr_count(const EVP_PKEY *key)
 {
        return X509at_get_attr_count(key->attributes);
 }
 
-int EVP_PKEY_get_attr_by_NID(const EVP_PKEY *key, int nid,
-                         int lastpos)
+int
+EVP_PKEY_get_attr_by_NID(const EVP_PKEY *key, int nid, int lastpos)
 {
        return X509at_get_attr_by_NID(key->attributes, nid, lastpos);
 }
 
-int EVP_PKEY_get_attr_by_OBJ(const EVP_PKEY *key, ASN1_OBJECT *obj,
-                         int lastpos)
+int
+EVP_PKEY_get_attr_by_OBJ(const EVP_PKEY *key, ASN1_OBJECT *obj, int lastpos)
 {
        return X509at_get_attr_by_OBJ(key->attributes, obj, lastpos);
 }
 
-X509_ATTRIBUTE *EVP_PKEY_get_attr(const EVP_PKEY *key, int loc)
+X509_ATTRIBUTE *
+EVP_PKEY_get_attr(const EVP_PKEY *key, int loc)
 {
        return X509at_get_attr(key->attributes, loc);
 }
 
-X509_ATTRIBUTE *EVP_PKEY_delete_attr(EVP_PKEY *key, int loc)
+X509_ATTRIBUTE *
+EVP_PKEY_delete_attr(EVP_PKEY *key, int loc)
 {
        return X509at_delete_attr(key->attributes, loc);
 }
 
-int EVP_PKEY_add1_attr(EVP_PKEY *key, X509_ATTRIBUTE *attr)
+int
+EVP_PKEY_add1_attr(EVP_PKEY *key, X509_ATTRIBUTE *attr)
 {
-       if(X509at_add1_attr(&key->attributes, attr)) return 1;
+       if (X509at_add1_attr(&key->attributes, attr))
+               return 1;
        return 0;
 }
 
-int EVP_PKEY_add1_attr_by_OBJ(EVP_PKEY *key,
-                       const ASN1_OBJECT *obj, int type,
-                       const unsigned char *bytes, int len)
+int
+EVP_PKEY_add1_attr_by_OBJ(EVP_PKEY *key, const ASN1_OBJECT *obj, int type,
+    const unsigned char *bytes, int len)
 {
-       if(X509at_add1_attr_by_OBJ(&key->attributes, obj,
-                               type, bytes, len)) return 1;
+       if (X509at_add1_attr_by_OBJ(&key->attributes, obj, type, bytes, len))
+               return 1;
        return 0;
 }
 
-int EVP_PKEY_add1_attr_by_NID(EVP_PKEY *key,
-                       int nid, int type,
-                       const unsigned char *bytes, int len)
+int
+EVP_PKEY_add1_attr_by_NID(EVP_PKEY *key, int nid, int type,
+    const unsigned char *bytes, int len)
 {
-       if(X509at_add1_attr_by_NID(&key->attributes, nid,
-                               type, bytes, len)) return 1;
+       if (X509at_add1_attr_by_NID(&key->attributes, nid, type, bytes, len))
+               return 1;
        return 0;
 }
 
-int EVP_PKEY_add1_attr_by_txt(EVP_PKEY *key,
-                       const char *attrname, int type,
-                       const unsigned char *bytes, int len)
+int
+EVP_PKEY_add1_attr_by_txt(EVP_PKEY *key, const char *attrname, int type,
+    const unsigned char *bytes, int len)
 {
-       if(X509at_add1_attr_by_txt(&key->attributes, attrname,
-                               type, bytes, len)) return 1;
+       if (X509at_add1_attr_by_txt(&key->attributes, attrname, type,
+           bytes, len))
+               return 1;
        return 0;
 }