diff options
author | Pav Lucistnik <pav@FreeBSD.org> | 2004-05-03 16:05:39 +0000 |
---|---|---|
committer | Pav Lucistnik <pav@FreeBSD.org> | 2004-05-03 16:05:39 +0000 |
commit | 7be2a1b501723ad41feb2dc8976ce9107e329ebf (patch) | |
tree | d4bc2d20e8f04591c4d96b8c7f0a817757e1b1b0 /security/libtomcrypt/files | |
parent | Updated to 1.10 (diff) |
- Update to 0.94
PR: ports/66099
Submitted by: Wesley Shields <wxs@csh.rit.edu>
Approved by: maintainer
Notes
Notes:
svn path=/head/; revision=108279
Diffstat (limited to 'security/libtomcrypt/files')
-rw-r--r-- | security/libtomcrypt/files/patch-dsa.c | 88 |
1 files changed, 0 insertions, 88 deletions
diff --git a/security/libtomcrypt/files/patch-dsa.c b/security/libtomcrypt/files/patch-dsa.c deleted file mode 100644 index 3ff2d8d0a48e..000000000000 --- a/security/libtomcrypt/files/patch-dsa.c +++ /dev/null @@ -1,88 +0,0 @@ ---- dsa.c.orig Tue Jan 13 14:52:15 2004 -+++ dsa.c Tue Jan 13 14:53:54 2004 -@@ -297,15 +297,15 @@ - return err;
- }
-
--#define OUTPUT_BIGNUM(num, buf2, y, z) \
--{ \
-- z = (unsigned long)mp_unsigned_bin_size(num); \
-- if ((y + 4 + z) > *outlen) { return CRYPT_BUFFER_OVERFLOW; } \
-- STORE32L(z, out+y); \
-- y += 4; \
-- if (mp_to_unsigned_bin(num, out+y) != MP_OKAY) { return CRYPT_MEM; } \
-- y += z; \
--}
-+#define OUTPUT_BIGNUM(num, buf2, y, z) \ -+{ \ -+ z = (unsigned long)mp_unsigned_bin_size(num); \ -+ if ((y + 4 + z) > *outlen) { return CRYPT_BUFFER_OVERFLOW; } \ -+ STORE32L(z, out+y); \ -+ y += 4; \ -+ if (mp_to_unsigned_bin(num, out+y) != MP_OKAY) { return CRYPT_MEM; } \ -+ y += z; \ -+} -
- int dsa_export(unsigned char *out, unsigned long *outlen, int type, dsa_key *key)
- {
-@@ -352,33 +352,33 @@ - return CRYPT_OK;
- }
-
--#define INPUT_BIGNUM(num, in, x, y) \
--{ \
-- /* load value */ \
-- if (y+4 > inlen) { \
-- err = CRYPT_INVALID_PACKET; \
-- goto error; \
-- } \
-- LOAD32L(x, in+y); \
-- y += 4; \
-- \
-- /* sanity check... */ \
-- if (y+x > inlen) { \
-- err = CRYPT_INVALID_PACKET; \
-- goto error; \
-- } \
-- \
-- /* load it */ \
-- if (mp_read_unsigned_bin(num, (unsigned char *)in+y, (int)x) != MP_OKAY) {\
-- err = CRYPT_MEM; \
-- goto error; \
-- } \
-- y += x; \
-- if (mp_shrink(num) != MP_OKAY) { \
-- err = CRYPT_MEM; \
-- goto error; \
-- } \
--}
-+#define INPUT_BIGNUM(num, in, x, y) \ -+{ \ -+ /* load value */ \ -+ if (y+4 > inlen) { \ -+ err = CRYPT_INVALID_PACKET; \ -+ goto error; \ -+ } \ -+ LOAD32L(x, in+y); \ -+ y += 4; \ -+ \ -+ /* sanity check... */ \ -+ if (y+x > inlen) { \ -+ err = CRYPT_INVALID_PACKET; \ -+ goto error; \ -+ } \ -+ \ -+ /* load it */ \ -+ if (mp_read_unsigned_bin(num, (unsigned char *)in+y, (int)x) != MP_OKAY) {\ -+ err = CRYPT_MEM; \ -+ goto error; \ -+ } \ -+ y += x; \ -+ if (mp_shrink(num) != MP_OKAY) { \ -+ err = CRYPT_MEM; \ -+ goto error; \ -+ } \ -+} -
- int dsa_import(const unsigned char *in, unsigned long inlen, dsa_key *key)
- {
|