summaryrefslogtreecommitdiffstats
path: root/test/ecdsatest.c
diff options
context:
space:
mode:
authorPauli <paul.dale@oracle.com>2018-10-07 23:23:44 +0200
committerPauli <paul.dale@oracle.com>2018-10-07 23:23:44 +0200
commit5b639d4cb3b9a33536e2ebadf6a03149ea26ba32 (patch)
tree2116c2789d888059b42655b684fdf8a8efc86cf3 /test/ecdsatest.c
parentRemove useless check. (diff)
downloadopenssl-5b639d4cb3b9a33536e2ebadf6a03149ea26ba32.tar.xz
openssl-5b639d4cb3b9a33536e2ebadf6a03149ea26ba32.zip
Indentation fixes.
The PR #7329 left some indentation slightly off. This fixes it. Reviewed-by: Paul Yang <yang.yang@baishancloud.com> (Merged from https://github.com/openssl/openssl/pull/7360)
Diffstat (limited to 'test/ecdsatest.c')
-rw-r--r--test/ecdsatest.c16
1 files changed, 8 insertions, 8 deletions
diff --git a/test/ecdsatest.c b/test/ecdsatest.c
index 95b642b195..01a19cecd7 100644
--- a/test/ecdsatest.c
+++ b/test/ecdsatest.c
@@ -135,7 +135,7 @@ static int x9_62_test_internal(int nid, const char *r_in, const char *s_in)
/* Use ECDSA_sign_setup to avoid use of ECDSA nonces */
if (!TEST_true(ECDSA_sign_setup(key, NULL, &kinv, &rp)))
goto x962_int_err;
- if (!TEST_ptr(signature =
+ if (!TEST_ptr(signature =
ECDSA_do_sign_ex(digest, SHA_DIGEST_LENGTH, kinv, rp, key)))
goto x962_int_err;
@@ -151,7 +151,7 @@ static int x9_62_test_internal(int nid, const char *r_in, const char *s_in)
/* verify the signature */
if (!TEST_int_eq(ECDSA_do_verify(digest, SHA_DIGEST_LENGTH,
- signature, key), 1))
+ signature, key), 1))
goto x962_int_err;
ret = 1;
@@ -213,8 +213,8 @@ static int test_builtin(void)
EC_KEY *eckey = NULL, *wrong_eckey = NULL;
EC_GROUP *group;
ECDSA_SIG *ecdsa_sig = NULL, *modified_sig = NULL;
- unsigned char digest[SHA512_DIGEST_LENGTH],
- wrong_digest[SHA512_DIGEST_LENGTH];
+ unsigned char digest[SHA512_DIGEST_LENGTH];
+ unsigned char wrong_digest[SHA512_DIGEST_LENGTH];
unsigned char *signature = NULL;
const unsigned char *sig_ptr;
unsigned char *sig_ptr2;
@@ -273,8 +273,8 @@ static int test_builtin(void)
/* create signature */
sig_len = ECDSA_size(eckey);
if (!TEST_ptr(signature = OPENSSL_malloc(sig_len))
- || !TEST_true(ECDSA_sign(0, digest, SHA512_DIGEST_LENGTH,
- signature, &sig_len, eckey)))
+ || !TEST_true(ECDSA_sign(0, digest, SHA512_DIGEST_LENGTH,
+ signature, &sig_len, eckey)))
goto builtin_err;
/* verify signature */
@@ -335,7 +335,7 @@ static int test_builtin(void)
goto builtin_err;
if (!TEST_ptr(modified_r = BN_bin2bn(raw_buf, bn_len, NULL))
|| !TEST_ptr(modified_s = BN_bin2bn(raw_buf + bn_len,
- bn_len, NULL))
+ bn_len, NULL))
|| !TEST_true(ECDSA_SIG_set0(modified_sig,
modified_r, modified_s))) {
BN_free(modified_r);
@@ -352,7 +352,7 @@ static int test_builtin(void)
raw_buf[offset] ^= dirt;
if (!TEST_ptr(unmodified_r = BN_bin2bn(raw_buf, bn_len, NULL))
|| !TEST_ptr(unmodified_s = BN_bin2bn(raw_buf + bn_len,
- bn_len, NULL))
+ bn_len, NULL))
|| !TEST_true(ECDSA_SIG_set0(modified_sig, unmodified_r,
unmodified_s))) {
BN_free(unmodified_r);