summaryrefslogtreecommitdiff
path: root/lib
diff options
context:
space:
mode:
authorTheo Buehler <tb@cvs.openbsd.org>2021-05-14 18:03:43 +0000
committerTheo Buehler <tb@cvs.openbsd.org>2021-05-14 18:03:43 +0000
commitd0f3400b439e7c9c2df5323d97c94924ee5488bb (patch)
tree0736373122473c0421002719d66c8c9fb2315d59 /lib
parentc0be6fd3c4acbca61e60380c0fa78331525141d5 (diff)
whitespace/KNF
Diffstat (limited to 'lib')
-rw-r--r--lib/libcrypto/rsa/rsa_sign.c8
1 files changed, 4 insertions, 4 deletions
diff --git a/lib/libcrypto/rsa/rsa_sign.c b/lib/libcrypto/rsa/rsa_sign.c
index 50e07f4f1e2..d205046bd35 100644
--- a/lib/libcrypto/rsa/rsa_sign.c
+++ b/lib/libcrypto/rsa/rsa_sign.c
@@ -1,4 +1,4 @@
-/* $OpenBSD: rsa_sign.c,v 1.31 2018/09/05 00:55:33 djm Exp $ */
+/* $OpenBSD: rsa_sign.c,v 1.32 2021/05/14 18:03:42 tb Exp $ */
/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
* All rights reserved.
*
@@ -108,7 +108,7 @@ encode_pkcs1(unsigned char **out, int *out_len, int type,
sig.algor->parameter = &parameter;
sig.digest = &digest;
- sig.digest->data = (unsigned char*)m; /* TMP UGLY CAST */
+ sig.digest->data = (unsigned char *)m; /* TMP UGLY CAST */
sig.digest->length = m_len;
if ((len = i2d_X509_SIG(&sig, &der)) < 0)
@@ -194,7 +194,7 @@ int_rsa_verify(int type, const unsigned char *m, unsigned int m_len,
if ((decrypt_len = RSA_public_decrypt((int)siglen, sigbuf, decrypt_buf,
rsa, RSA_PKCS1_PADDING)) <= 0)
goto err;
-
+
if (type == NID_md5_sha1) {
/*
* NID_md5_sha1 corresponds to the MD5/SHA1 combination in
@@ -229,7 +229,7 @@ int_rsa_verify(int type, const unsigned char *m, unsigned int m_len,
if (rm != NULL) {
const EVP_MD *md;
- if ((md = EVP_get_digestbynid(type)) == NULL) {
+ if ((md = EVP_get_digestbynid(type)) == NULL) {
RSAerror(RSA_R_UNKNOWN_ALGORITHM_TYPE);
goto err;
}