[openssl-commits] [openssl] OpenSSL_1_1_1-stable update
Paul I. Dale
pauli at openssl.org
Mon Oct 15 23:36:29 UTC 2018
The branch OpenSSL_1_1_1-stable has been updated
via 84eb73eab519673d1bd7169f06ad588547722262 (commit)
from 9044cb0edbc67dd5ce81cab96f067a7806764b60 (commit)
- Log -----------------------------------------------------------------
commit 84eb73eab519673d1bd7169f06ad588547722262
Author: Pauli <paul.dale at oracle.com>
Date: Mon Oct 8 07:23:44 2018 +1000
Indentation fixes.
The PR #7329 left some indentation slightly off. This fixes it.
Reviewed-by: Paul Yang <yang.yang at baishancloud.com>
(Merged from https://github.com/openssl/openssl/pull/7360)
(cherry picked from commit 5b639d4cb3b9a33536e2ebadf6a03149ea26ba32)
-----------------------------------------------------------------------
Summary of changes:
test/ecdsatest.c | 16 ++++++++--------
1 file changed, 8 insertions(+), 8 deletions(-)
diff --git a/test/ecdsatest.c b/test/ecdsatest.c
index 95b642b..01a19ce 100644
--- a/test/ecdsatest.c
+++ b/test/ecdsatest.c
@@ -135,7 +135,7 @@ static int x9_62_test_internal(int nid, const char *r_in, const char *s_in)
/* Use ECDSA_sign_setup to avoid use of ECDSA nonces */
if (!TEST_true(ECDSA_sign_setup(key, NULL, &kinv, &rp)))
goto x962_int_err;
- if (!TEST_ptr(signature =
+ if (!TEST_ptr(signature =
ECDSA_do_sign_ex(digest, SHA_DIGEST_LENGTH, kinv, rp, key)))
goto x962_int_err;
@@ -151,7 +151,7 @@ static int x9_62_test_internal(int nid, const char *r_in, const char *s_in)
/* verify the signature */
if (!TEST_int_eq(ECDSA_do_verify(digest, SHA_DIGEST_LENGTH,
- signature, key), 1))
+ signature, key), 1))
goto x962_int_err;
ret = 1;
@@ -213,8 +213,8 @@ static int test_builtin(void)
EC_KEY *eckey = NULL, *wrong_eckey = NULL;
EC_GROUP *group;
ECDSA_SIG *ecdsa_sig = NULL, *modified_sig = NULL;
- unsigned char digest[SHA512_DIGEST_LENGTH],
- wrong_digest[SHA512_DIGEST_LENGTH];
+ unsigned char digest[SHA512_DIGEST_LENGTH];
+ unsigned char wrong_digest[SHA512_DIGEST_LENGTH];
unsigned char *signature = NULL;
const unsigned char *sig_ptr;
unsigned char *sig_ptr2;
@@ -273,8 +273,8 @@ static int test_builtin(void)
/* create signature */
sig_len = ECDSA_size(eckey);
if (!TEST_ptr(signature = OPENSSL_malloc(sig_len))
- || !TEST_true(ECDSA_sign(0, digest, SHA512_DIGEST_LENGTH,
- signature, &sig_len, eckey)))
+ || !TEST_true(ECDSA_sign(0, digest, SHA512_DIGEST_LENGTH,
+ signature, &sig_len, eckey)))
goto builtin_err;
/* verify signature */
@@ -335,7 +335,7 @@ static int test_builtin(void)
goto builtin_err;
if (!TEST_ptr(modified_r = BN_bin2bn(raw_buf, bn_len, NULL))
|| !TEST_ptr(modified_s = BN_bin2bn(raw_buf + bn_len,
- bn_len, NULL))
+ bn_len, NULL))
|| !TEST_true(ECDSA_SIG_set0(modified_sig,
modified_r, modified_s))) {
BN_free(modified_r);
@@ -352,7 +352,7 @@ static int test_builtin(void)
raw_buf[offset] ^= dirt;
if (!TEST_ptr(unmodified_r = BN_bin2bn(raw_buf, bn_len, NULL))
|| !TEST_ptr(unmodified_s = BN_bin2bn(raw_buf + bn_len,
- bn_len, NULL))
+ bn_len, NULL))
|| !TEST_true(ECDSA_SIG_set0(modified_sig, unmodified_r,
unmodified_s))) {
BN_free(unmodified_r);
More information about the openssl-commits
mailing list