summaryrefslogtreecommitdiff
path: root/libnm-core/nm-crypto-gnutls.c
diff options
context:
space:
mode:
Diffstat (limited to 'libnm-core/nm-crypto-gnutls.c')
-rw-r--r--libnm-core/nm-crypto-gnutls.c18
1 files changed, 9 insertions, 9 deletions
diff --git a/libnm-core/nm-crypto-gnutls.c b/libnm-core/nm-crypto-gnutls.c
index a3308f4b79..545cc787e7 100644
--- a/libnm-core/nm-crypto-gnutls.c
+++ b/libnm-core/nm-crypto-gnutls.c
@@ -150,8 +150,8 @@ _nmtst_crypto_decrypt(NMCryptoCipherType cipher,
}
/* Validate tail padding; last byte is the padding size, and all pad bytes
- * should contain the padding size.
- */
+ * should contain the padding size.
+ */
for (pad_i = 1; pad_i <= pad_len; ++pad_i) {
if (output.bin[data_len - pad_i] != pad_len) {
g_set_error(error,
@@ -215,8 +215,8 @@ _nmtst_crypto_encrypt(NMCryptoCipherType cipher,
}
/* If data_len % ivlen == 0, then we add another complete block
- * onto the end so that the decrypter knows there's padding.
- */
+ * onto the end so that the decrypter knows there's padding.
+ */
pad_len = iv_len - (data_len % iv_len);
padded_buf.len = data_len + pad_len;
@@ -386,11 +386,11 @@ _nm_crypto_verify_pkcs8(const guint8 *data,
if (err < 0) {
if (err == GNUTLS_E_UNKNOWN_CIPHER_TYPE) {
/* HACK: gnutls < 3.5.4 doesn't support all the cipher types that openssl
- * can use with PKCS#8, so if we encounter one, we have to assume
- * the given password works. gnutls needs to unsuckify, apparently.
- * Specifically, by default openssl uses pbeWithMD5AndDES-CBC
- * which gnutls does not support.
- */
+ * can use with PKCS#8, so if we encounter one, we have to assume
+ * the given password works. gnutls needs to unsuckify, apparently.
+ * Specifically, by default openssl uses pbeWithMD5AndDES-CBC
+ * which gnutls does not support.
+ */
} else {
g_set_error(error,
NM_CRYPTO_ERROR,