removes 'end of line' spaces;

This commit is contained in:
Moisés Guimarães
2016-01-18 20:48:12 -03:00
parent 08c67e5cdc
commit a6a2214306

View File

@ -11298,7 +11298,7 @@ static void PickHashSigAlgo(WOLFSSL* ssl,
return BUFFER_ERROR; return BUFFER_ERROR;
} }
ssl->buffers.serverDH_Pub.buffer = ssl->buffers.serverDH_Pub.buffer =
(byte*) XMALLOC(length, ssl->heap, DYNAMIC_TYPE_DH); (byte*) XMALLOC(length, ssl->heap, DYNAMIC_TYPE_DH);
if (ssl->buffers.serverDH_Pub.buffer) { if (ssl->buffers.serverDH_Pub.buffer) {
@ -11308,7 +11308,7 @@ static void PickHashSigAlgo(WOLFSSL* ssl,
return MEMORY_ERROR; return MEMORY_ERROR;
} }
XMEMCPY(ssl->buffers.serverDH_Pub.buffer, input + *inOutIdx, XMEMCPY(ssl->buffers.serverDH_Pub.buffer, input + *inOutIdx,
length); length);
*inOutIdx += length; *inOutIdx += length;
break; break;
@ -11320,7 +11320,7 @@ static void PickHashSigAlgo(WOLFSSL* ssl,
{ {
byte b; byte b;
if ((*inOutIdx - begin) + ENUM_LEN + OPAQUE16_LEN + if ((*inOutIdx - begin) + ENUM_LEN + OPAQUE16_LEN +
OPAQUE8_LEN > size) { OPAQUE8_LEN > size) {
return BUFFER_ERROR; return BUFFER_ERROR;
} }
@ -11359,7 +11359,7 @@ static void PickHashSigAlgo(WOLFSSL* ssl,
wc_ecc_init(ssl->peerEccKey); wc_ecc_init(ssl->peerEccKey);
} }
if (wc_ecc_import_x963(input + *inOutIdx, length, if (wc_ecc_import_x963(input + *inOutIdx, length,
ssl->peerEccKey) != 0) { ssl->peerEccKey) != 0) {
return ECC_PEERKEY_ERROR; return ECC_PEERKEY_ERROR;
} }
@ -11409,7 +11409,7 @@ static void PickHashSigAlgo(WOLFSSL* ssl,
return DH_KEY_SIZE_E; return DH_KEY_SIZE_E;
} }
ssl->buffers.serverDH_P.buffer = (byte*) XMALLOC(length, ssl->heap, ssl->buffers.serverDH_P.buffer = (byte*) XMALLOC(length, ssl->heap,
DYNAMIC_TYPE_DH); DYNAMIC_TYPE_DH);
if (ssl->buffers.serverDH_P.buffer) { if (ssl->buffers.serverDH_P.buffer) {
@ -11876,7 +11876,7 @@ static void PickHashSigAlgo(WOLFSSL* ssl,
#endif #endif
#ifdef HAVE_ECC #ifdef HAVE_ECC
/* ecdsa */ /* ecdsa */
case ecc_dsa_sa_algo: case ecc_dsa_sa_algo:
{ {
int verify = 0; int verify = 0;
#ifndef NO_OLD_TLS #ifndef NO_OLD_TLS
@ -13411,7 +13411,7 @@ int DoSessionTicket(WOLFSSL* ssl,
/* then random and session id */ /* then random and session id */
if (!ssl->options.resuming) { if (!ssl->options.resuming) {
/* generate random part and session id */ /* generate random part and session id */
ret = wc_RNG_GenerateBlock(ssl->rng, output + idx, ret = wc_RNG_GenerateBlock(ssl->rng, output + idx,
RAN_LEN + sizeof(sessIdSz) + sessIdSz); RAN_LEN + sizeof(sessIdSz) + sessIdSz);
if (ret != 0) if (ret != 0)
return ret; return ret;
@ -14047,7 +14047,7 @@ int DoSessionTicket(WOLFSSL* ssl,
#ifdef HAVE_FUZZER #ifdef HAVE_FUZZER
if (ssl->fuzzerCb) { if (ssl->fuzzerCb) {
ssl->fuzzerCb(ssl, output + preSigIdx, preSigSz, ssl->fuzzerCb(ssl, output + preSigIdx, preSigSz,
FUZZ_SIGNATURE, ssl->fuzzerCtx); FUZZ_SIGNATURE, ssl->fuzzerCtx);
} }
#endif #endif
@ -14565,7 +14565,7 @@ int DoSessionTicket(WOLFSSL* ssl,
return NO_PRIVATE_KEY; return NO_PRIVATE_KEY;
} }
ret = wc_RsaPrivateKeyDecode(ssl->buffers.key.buffer, &i, ret = wc_RsaPrivateKeyDecode(ssl->buffers.key.buffer, &i,
&rsaKey, ssl->buffers.key.length); &rsaKey, ssl->buffers.key.length);
if (ret == 0) { if (ret == 0) {
sigSz = wc_RsaEncryptSize(&rsaKey); sigSz = wc_RsaEncryptSize(&rsaKey);
@ -14632,7 +14632,7 @@ int DoSessionTicket(WOLFSSL* ssl,
#ifdef HAVE_FUZZER #ifdef HAVE_FUZZER
if (ssl->fuzzerCb) { if (ssl->fuzzerCb) {
ssl->fuzzerCb(ssl, output + preSigIdx, preSigSz, ssl->fuzzerCb(ssl, output + preSigIdx, preSigSz,
FUZZ_SIGNATURE, ssl->fuzzerCtx); FUZZ_SIGNATURE, ssl->fuzzerCtx);
} }
#endif #endif
@ -14917,7 +14917,7 @@ int DoSessionTicket(WOLFSSL* ssl,
byte* digest = &hash[MD5_DIGEST_SIZE]; byte* digest = &hash[MD5_DIGEST_SIZE];
int typeH = SHAh; int typeH = SHAh;
int digestSz = SHA_DIGEST_SIZE; int digestSz = SHA_DIGEST_SIZE;
#ifdef WOLFSSL_SMALL_STACK #ifdef WOLFSSL_SMALL_STACK
encodedSig = (byte*)XMALLOC(MAX_ENCODED_SIG_SZ, NULL, encodedSig = (byte*)XMALLOC(MAX_ENCODED_SIG_SZ, NULL,
DYNAMIC_TYPE_TMP_BUFFER); DYNAMIC_TYPE_TMP_BUFFER);
@ -16355,7 +16355,7 @@ int DoSessionTicket(WOLFSSL* ssl,
if (!ssl->buffers.key.buffer) { if (!ssl->buffers.key.buffer) {
return NO_PRIVATE_KEY; return NO_PRIVATE_KEY;
} }
ret = wc_RsaPrivateKeyDecode(ssl->buffers.key.buffer, &idx, ret = wc_RsaPrivateKeyDecode(ssl->buffers.key.buffer, &idx,
&key, ssl->buffers.key.length); &key, ssl->buffers.key.length);