From 3893b88e79e309ab67702bb718f8664df65b4d81 Mon Sep 17 00:00:00 2001 From: tb Date: Fri, 14 May 2021 18:03:42 +0000 Subject: [PATCH] whitespace/KNF --- lib/libcrypto/rsa/rsa_sign.c | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/lib/libcrypto/rsa/rsa_sign.c b/lib/libcrypto/rsa/rsa_sign.c index 50e07f4f1e2..d205046bd35 100644 --- a/lib/libcrypto/rsa/rsa_sign.c +++ b/lib/libcrypto/rsa/rsa_sign.c @@ -1,4 +1,4 @@ -/* $OpenBSD: rsa_sign.c,v 1.31 2018/09/05 00:55:33 djm Exp $ */ +/* $OpenBSD: rsa_sign.c,v 1.32 2021/05/14 18:03:42 tb Exp $ */ /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) * All rights reserved. * @@ -108,7 +108,7 @@ encode_pkcs1(unsigned char **out, int *out_len, int type, sig.algor->parameter = ¶meter; sig.digest = &digest; - sig.digest->data = (unsigned char*)m; /* TMP UGLY CAST */ + sig.digest->data = (unsigned char *)m; /* TMP UGLY CAST */ sig.digest->length = m_len; if ((len = i2d_X509_SIG(&sig, &der)) < 0) @@ -194,7 +194,7 @@ int_rsa_verify(int type, const unsigned char *m, unsigned int m_len, if ((decrypt_len = RSA_public_decrypt((int)siglen, sigbuf, decrypt_buf, rsa, RSA_PKCS1_PADDING)) <= 0) goto err; - + if (type == NID_md5_sha1) { /* * NID_md5_sha1 corresponds to the MD5/SHA1 combination in @@ -229,7 +229,7 @@ int_rsa_verify(int type, const unsigned char *m, unsigned int m_len, if (rm != NULL) { const EVP_MD *md; - if ((md = EVP_get_digestbynid(type)) == NULL) { + if ((md = EVP_get_digestbynid(type)) == NULL) { RSAerror(RSA_R_UNKNOWN_ALGORITHM_TYPE); goto err; } -- 2.20.1