summaryrefslogtreecommitdiff
path: root/security/libtomcrypt/files
diff options
context:
space:
mode:
authorPav Lucistnik <pav@FreeBSD.org>2004-05-03 16:05:39 +0000
committerPav Lucistnik <pav@FreeBSD.org>2004-05-03 16:05:39 +0000
commit7be2a1b501723ad41feb2dc8976ce9107e329ebf (patch)
treed4bc2d20e8f04591c4d96b8c7f0a817757e1b1b0 /security/libtomcrypt/files
parentUpdated to 1.10 (diff)
- Update to 0.94
PR: ports/66099 Submitted by: Wesley Shields <wxs@csh.rit.edu> Approved by: maintainer
Notes
Notes: svn path=/head/; revision=108279
Diffstat (limited to 'security/libtomcrypt/files')
-rw-r--r--security/libtomcrypt/files/patch-dsa.c88
1 files changed, 0 insertions, 88 deletions
diff --git a/security/libtomcrypt/files/patch-dsa.c b/security/libtomcrypt/files/patch-dsa.c
deleted file mode 100644
index 3ff2d8d0a48e..000000000000
--- a/security/libtomcrypt/files/patch-dsa.c
+++ /dev/null
@@ -1,88 +0,0 @@
---- dsa.c.orig Tue Jan 13 14:52:15 2004
-+++ dsa.c Tue Jan 13 14:53:54 2004
-@@ -297,15 +297,15 @@
- return err;
- }
-
--#define OUTPUT_BIGNUM(num, buf2, y, z) \
--{ \
-- z = (unsigned long)mp_unsigned_bin_size(num); \
-- if ((y + 4 + z) > *outlen) { return CRYPT_BUFFER_OVERFLOW; } \
-- STORE32L(z, out+y); \
-- y += 4; \
-- if (mp_to_unsigned_bin(num, out+y) != MP_OKAY) { return CRYPT_MEM; } \
-- y += z; \
--}
-+#define OUTPUT_BIGNUM(num, buf2, y, z) \
-+{ \
-+ z = (unsigned long)mp_unsigned_bin_size(num); \
-+ if ((y + 4 + z) > *outlen) { return CRYPT_BUFFER_OVERFLOW; } \
-+ STORE32L(z, out+y); \
-+ y += 4; \
-+ if (mp_to_unsigned_bin(num, out+y) != MP_OKAY) { return CRYPT_MEM; } \
-+ y += z; \
-+}
-
- int dsa_export(unsigned char *out, unsigned long *outlen, int type, dsa_key *key)
- {
-@@ -352,33 +352,33 @@
- return CRYPT_OK;
- }
-
--#define INPUT_BIGNUM(num, in, x, y) \
--{ \
-- /* load value */ \
-- if (y+4 > inlen) { \
-- err = CRYPT_INVALID_PACKET; \
-- goto error; \
-- } \
-- LOAD32L(x, in+y); \
-- y += 4; \
-- \
-- /* sanity check... */ \
-- if (y+x > inlen) { \
-- err = CRYPT_INVALID_PACKET; \
-- goto error; \
-- } \
-- \
-- /* load it */ \
-- if (mp_read_unsigned_bin(num, (unsigned char *)in+y, (int)x) != MP_OKAY) {\
-- err = CRYPT_MEM; \
-- goto error; \
-- } \
-- y += x; \
-- if (mp_shrink(num) != MP_OKAY) { \
-- err = CRYPT_MEM; \
-- goto error; \
-- } \
--}
-+#define INPUT_BIGNUM(num, in, x, y) \
-+{ \
-+ /* load value */ \
-+ if (y+4 > inlen) { \
-+ err = CRYPT_INVALID_PACKET; \
-+ goto error; \
-+ } \
-+ LOAD32L(x, in+y); \
-+ y += 4; \
-+ \
-+ /* sanity check... */ \
-+ if (y+x > inlen) { \
-+ err = CRYPT_INVALID_PACKET; \
-+ goto error; \
-+ } \
-+ \
-+ /* load it */ \
-+ if (mp_read_unsigned_bin(num, (unsigned char *)in+y, (int)x) != MP_OKAY) {\
-+ err = CRYPT_MEM; \
-+ goto error; \
-+ } \
-+ y += x; \
-+ if (mp_shrink(num) != MP_OKAY) { \
-+ err = CRYPT_MEM; \
-+ goto error; \
-+ } \
-+}
-
- int dsa_import(const unsigned char *in, unsigned long inlen, dsa_key *key)
- {