diff options
author | Nikos Mavrogiannopoulos <nmav@gnutls.org> | 2010-09-19 09:07:41 +0200 |
---|---|---|
committer | Nikos Mavrogiannopoulos <nmav@gnutls.org> | 2010-09-19 09:07:41 +0200 |
commit | 048f53e009bbfbf49a876881f203e5e3b4cf011d (patch) | |
tree | 6c027d8cbf12b61183c067c0efaace2f99498eba | |
parent | d489db78429b47f998dc605b0941bb765879664e (diff) | |
download | gnutls-048f53e009bbfbf49a876881f203e5e3b4cf011d.tar.gz |
indented some code
-rw-r--r-- | lib/nettle/pk.c | 595 | ||||
-rw-r--r-- | lib/openpgp/privkey.c | 1 |
2 files changed, 314 insertions, 282 deletions
diff --git a/lib/nettle/pk.c b/lib/nettle/pk.c index 29434b52dc..1596d088e6 100644 --- a/lib/nettle/pk.c +++ b/lib/nettle/pk.c @@ -50,7 +50,8 @@ static void rnd_func(void *_ctx, unsigned length, uint8_t * data) _gnutls_rnd(GNUTLS_RND_RANDOM, data, length); } -static void _dsa_params_to_pubkey(const gnutls_pk_params_st * pk_params, struct dsa_public_key *pub) +static void _dsa_params_to_pubkey(const gnutls_pk_params_st * pk_params, + struct dsa_public_key *pub) { memcpy(&pub->p, pk_params->params[0], sizeof(mpz_t)); memcpy(&pub->q, pk_params->params[1], sizeof(mpz_t)); @@ -58,12 +59,14 @@ static void _dsa_params_to_pubkey(const gnutls_pk_params_st * pk_params, struct memcpy(&pub->y, pk_params->params[3], sizeof(mpz_t)); } -static void _dsa_params_to_privkey(const gnutls_pk_params_st * pk_params, struct dsa_private_key *pub) +static void _dsa_params_to_privkey(const gnutls_pk_params_st * pk_params, + struct dsa_private_key *pub) { memcpy(&pub->x, pk_params->params[4], sizeof(mpz_t)); } -static void _rsa_params_to_privkey(const gnutls_pk_params_st * pk_params, struct rsa_private_key *priv) +static void _rsa_params_to_privkey(const gnutls_pk_params_st * pk_params, + struct rsa_private_key *priv) { memcpy(&priv->d, pk_params->params[2], sizeof(mpz_t)); memcpy(&priv->p, pk_params->params[3], sizeof(mpz_t)); @@ -84,26 +87,30 @@ _wrap_nettle_pk_encrypt(gnutls_pk_algorithm_t algo, /* make a sexp from pkey */ switch (algo) { - case GNUTLS_PK_RSA: { - bigint_t p; - - if (_gnutls_mpi_scan_nz(&p, plaintext->data, plaintext->size) != 0) { - gnutls_assert(); - return GNUTLS_E_MPI_SCAN_FAILED; - } + case GNUTLS_PK_RSA:{ + bigint_t p; - mpz_powm(p, p, TOMPZ(pk_params->params[1])/*e*/, TOMPZ(pk_params->params[0]/*m*/)); + if (_gnutls_mpi_scan_nz + (&p, plaintext->data, plaintext->size) != 0) { + gnutls_assert(); + return GNUTLS_E_MPI_SCAN_FAILED; + } - ret = _gnutls_mpi_dprint_size(p, ciphertext, plaintext->size); - _gnutls_mpi_release(&p); + mpz_powm(p, p, TOMPZ(pk_params->params[1]) /*e */ , + TOMPZ(pk_params->params[0] /*m */ )); - if (ret < 0) { - gnutls_assert(); - goto cleanup; - } + ret = + _gnutls_mpi_dprint_size(p, ciphertext, + plaintext->size); + _gnutls_mpi_release(&p); - break; - } + if (ret < 0) { + gnutls_assert(); + goto cleanup; + } + + break; + } default: gnutls_assert(); ret = GNUTLS_E_INTERNAL_ERROR; @@ -112,7 +119,7 @@ _wrap_nettle_pk_encrypt(gnutls_pk_algorithm_t algo, ret = 0; -cleanup: + cleanup: return ret; } @@ -120,9 +127,10 @@ cleanup: /* returns the blinded c and the inverse of a random * number r; */ -static bigint_t rsa_blind(bigint_t c, bigint_t e, bigint_t n, bigint_t *_ri) +static bigint_t rsa_blind(bigint_t c, bigint_t e, bigint_t n, + bigint_t * _ri) { -bigint_t nc = NULL, r = NULL, ri = NULL; + bigint_t nc = NULL, r = NULL, ri = NULL; /* nc = c*(r^e) * ri = r^(-1) @@ -139,15 +147,15 @@ bigint_t nc = NULL, r = NULL, ri = NULL; goto fail; } - r = _gnutls_mpi_randomize (NULL, _gnutls_mpi_get_nbits(n), - GNUTLS_RND_NONCE); + r = _gnutls_mpi_randomize(NULL, _gnutls_mpi_get_nbits(n), + GNUTLS_RND_NONCE); if (r == NULL) { gnutls_assert(); goto fail; } /* invert r */ - if (mpz_invert(ri, r, n)==0) { + if (mpz_invert(ri, r, n) == 0) { gnutls_assert(); goto fail; } @@ -163,7 +171,7 @@ bigint_t nc = NULL, r = NULL, ri = NULL; _gnutls_mpi_release(&r); return nc; -fail: + fail: _gnutls_mpi_release(&nc); _gnutls_mpi_release(&r); return NULL; @@ -186,42 +194,46 @@ _wrap_nettle_pk_decrypt(gnutls_pk_algorithm_t algo, /* make a sexp from pkey */ switch (algo) { - case GNUTLS_PK_RSA: { - struct rsa_private_key priv; - bigint_t c, ri, nc; - - if (_gnutls_mpi_scan_nz(&c, ciphertext->data, ciphertext->size) != 0) { - gnutls_assert(); - return GNUTLS_E_MPI_SCAN_FAILED; - } + case GNUTLS_PK_RSA:{ + struct rsa_private_key priv; + bigint_t c, ri, nc; + + if (_gnutls_mpi_scan_nz + (&c, ciphertext->data, + ciphertext->size) != 0) { + gnutls_assert(); + return GNUTLS_E_MPI_SCAN_FAILED; + } - nc = rsa_blind(c, pk_params->params[1]/*e*/, - pk_params->params[0]/*m*/, &ri); - _gnutls_mpi_release(&c); - if (nc == NULL) { - gnutls_assert(); - return GNUTLS_E_MEMORY_ERROR; - } + nc = rsa_blind(c, pk_params->params[1] /*e */ , + pk_params->params[0] /*m */ , &ri); + _gnutls_mpi_release(&c); + if (nc == NULL) { + gnutls_assert(); + return GNUTLS_E_MEMORY_ERROR; + } - rsa_private_key_init(&priv); - _rsa_params_to_privkey(pk_params, &priv); + rsa_private_key_init(&priv); + _rsa_params_to_privkey(pk_params, &priv); - rsa_compute_root(&priv, TOMPZ(nc), TOMPZ(nc)); + rsa_compute_root(&priv, TOMPZ(nc), TOMPZ(nc)); - rsa_unblind(nc, ri, pk_params->params[0]/*m*/); + rsa_unblind(nc, ri, pk_params->params[0] /*m */ ); - ret = _gnutls_mpi_dprint_size(nc, plaintext, ciphertext->size); + ret = + _gnutls_mpi_dprint_size(nc, plaintext, + ciphertext->size); - _gnutls_mpi_release(&nc); - _gnutls_mpi_release(&ri); + _gnutls_mpi_release(&nc); + _gnutls_mpi_release(&ri); - if (ret < 0) { - gnutls_assert(); - goto cleanup; - } + if (ret < 0) { + gnutls_assert(); + goto cleanup; + } - break; - } + break; + } default: gnutls_assert(); ret = GNUTLS_E_INTERNAL_ERROR; @@ -230,7 +242,7 @@ _wrap_nettle_pk_decrypt(gnutls_pk_algorithm_t algo, ret = 0; -cleanup: + cleanup: return ret; } @@ -247,82 +259,85 @@ _wrap_nettle_pk_sign(gnutls_pk_algorithm_t algo, switch (algo) { - case GNUTLS_PK_DSA: { - struct dsa_public_key pub; - struct dsa_private_key priv; - struct dsa_signature sig; - - dsa_public_key_init(&pub); - dsa_private_key_init(&priv); - _dsa_params_to_pubkey(pk_params, &pub); - _dsa_params_to_privkey(pk_params, &priv); - - dsa_signature_init(&sig); - - hash = _gnutls_dsa_q_to_hash(pub.q); - if (vdata->size != _gnutls_hash_get_algo_len(hash)) { - gnutls_assert(); - ret = GNUTLS_E_PK_SIGN_FAILED; - goto dsa_fail; - } - - ret = _dsa_sign(&pub, &priv, NULL, rnd_func, vdata->size, vdata->data, &sig); - if (ret == 0) { - gnutls_assert(); - ret = GNUTLS_E_PK_SIGN_FAILED; - goto dsa_fail; - } - - ret = - _gnutls_encode_ber_rs(signature, &sig.r, - &sig.s); - -dsa_fail: - dsa_signature_clear(&sig); - - if (ret < 0) { - gnutls_assert(); - goto cleanup; - } - break; - } - case GNUTLS_PK_RSA: { - struct rsa_private_key priv; - bigint_t hash, nc, ri; - - if (_gnutls_mpi_scan_nz(&hash, vdata->data, vdata->size) != 0) { - gnutls_assert(); - return GNUTLS_E_MPI_SCAN_FAILED; - } + case GNUTLS_PK_DSA:{ + struct dsa_public_key pub; + struct dsa_private_key priv; + struct dsa_signature sig; - rsa_private_key_init(&priv); - _rsa_params_to_privkey(pk_params, &priv); + dsa_public_key_init(&pub); + dsa_private_key_init(&priv); + _dsa_params_to_pubkey(pk_params, &pub); + _dsa_params_to_privkey(pk_params, &priv); - nc = rsa_blind(hash, pk_params->params[1]/*e*/, - pk_params->params[0]/*m*/, &ri); + dsa_signature_init(&sig); - _gnutls_mpi_release(&hash); + hash = _gnutls_dsa_q_to_hash(pub.q); + if (vdata->size != _gnutls_hash_get_algo_len(hash)) { + gnutls_assert(); + ret = GNUTLS_E_PK_SIGN_FAILED; + goto dsa_fail; + } - if (nc == NULL) { - gnutls_assert(); - return GNUTLS_E_MEMORY_ERROR; + ret = + _dsa_sign(&pub, &priv, NULL, rnd_func, + vdata->size, vdata->data, &sig); + if (ret == 0) { + gnutls_assert(); + ret = GNUTLS_E_PK_SIGN_FAILED; + goto dsa_fail; + } + + ret = + _gnutls_encode_ber_rs(signature, &sig.r, + &sig.s); + + dsa_fail: + dsa_signature_clear(&sig); + + if (ret < 0) { + gnutls_assert(); + goto cleanup; + } + break; } + case GNUTLS_PK_RSA:{ + struct rsa_private_key priv; + bigint_t hash, nc, ri; + + if (_gnutls_mpi_scan_nz + (&hash, vdata->data, vdata->size) != 0) { + gnutls_assert(); + return GNUTLS_E_MPI_SCAN_FAILED; + } - rsa_compute_root(&priv, TOMPZ(nc), TOMPZ(nc)); + rsa_private_key_init(&priv); + _rsa_params_to_privkey(pk_params, &priv); - rsa_unblind(nc, ri, pk_params->params[0]/*m*/); + nc = rsa_blind(hash, pk_params->params[1] /*e */ , + pk_params->params[0] /*m */ , &ri); - ret = _gnutls_mpi_dprint(nc, signature); - _gnutls_mpi_release(&nc); - _gnutls_mpi_release(&ri); + _gnutls_mpi_release(&hash); - if (ret < 0) { - gnutls_assert(); - goto cleanup; - } + if (nc == NULL) { + gnutls_assert(); + return GNUTLS_E_MEMORY_ERROR; + } - break; - } + rsa_compute_root(&priv, TOMPZ(nc), TOMPZ(nc)); + + rsa_unblind(nc, ri, pk_params->params[0] /*m */ ); + + ret = _gnutls_mpi_dprint(nc, signature); + _gnutls_mpi_release(&nc); + _gnutls_mpi_release(&ri); + + if (ret < 0) { + gnutls_assert(); + goto cleanup; + } + + break; + } default: gnutls_assert(); ret = GNUTLS_E_INTERNAL_ERROR; @@ -331,37 +346,38 @@ dsa_fail: ret = 0; -cleanup: + cleanup: return ret; } static int _int_rsa_verify(const gnutls_pk_params_st * pk_params, - bigint_t m, - bigint_t s) + bigint_t m, bigint_t s) { - int res; + int res; + + mpz_t m1; - mpz_t m1; + if ((mpz_sgn(TOMPZ(s)) <= 0) + || (mpz_cmp(TOMPZ(s), TOMPZ(pk_params->params[0])) >= 0)) + return GNUTLS_E_PK_SIG_VERIFY_FAILED; - if ( (mpz_sgn(TOMPZ(s)) <= 0) - || (mpz_cmp(TOMPZ(s), TOMPZ(pk_params->params[0])) >= 0) ) - return GNUTLS_E_PK_SIG_VERIFY_FAILED; + mpz_init(m1); - mpz_init(m1); + mpz_powm(m1, TOMPZ(s), TOMPZ(pk_params->params[1]), + TOMPZ(pk_params->params[0])); - mpz_powm(m1, TOMPZ(s), TOMPZ(pk_params->params[1]), TOMPZ(pk_params->params[0])); + res = !mpz_cmp(TOMPZ(m), m1); - res = !mpz_cmp(TOMPZ(m), m1); + mpz_clear(m1); - mpz_clear(m1); + if (res == 0) + res = GNUTLS_E_PK_SIG_VERIFY_FAILED; + else + res = 0; - if (res == 0) - res = GNUTLS_E_PK_SIG_VERIFY_FAILED; - else res = 0; - - return res; + return res; } static int @@ -374,66 +390,71 @@ _wrap_nettle_pk_verify(gnutls_pk_algorithm_t algo, bigint_t tmp[2] = { NULL, NULL }; switch (algo) { - case GNUTLS_PK_DSA: { - struct dsa_public_key pub; - struct dsa_signature sig; - - ret = _gnutls_decode_ber_rs(signature, &tmp[0], &tmp[1]); - if (ret < 0) { - gnutls_assert(); - goto cleanup; - } - dsa_public_key_init(&pub); - _dsa_params_to_pubkey(pk_params, &pub); - memcpy(&sig.r, tmp[0], sizeof(sig.r)); - memcpy(&sig.s, tmp[1], sizeof(sig.s)); - - hash = _gnutls_dsa_q_to_hash(pub.q); - if (vdata->size != _gnutls_hash_get_algo_len(hash)) { - gnutls_assert(); - ret = GNUTLS_E_PK_SIG_VERIFY_FAILED; - goto dsa_fail; - } - - ret = _dsa_verify(&pub, vdata->size, vdata->data, &sig); - if (ret == 0) - ret = GNUTLS_E_PK_SIG_VERIFY_FAILED; - else - ret = 0; - -dsa_fail: - _gnutls_mpi_release(&tmp[0]); - _gnutls_mpi_release(&tmp[1]); - break; - } - case GNUTLS_PK_RSA: { - bigint_t hash; - - if (_gnutls_mpi_scan_nz(&hash, vdata->data, vdata->size) != 0) { - gnutls_assert(); - return GNUTLS_E_MPI_SCAN_FAILED; - } + case GNUTLS_PK_DSA:{ + struct dsa_public_key pub; + struct dsa_signature sig; + + ret = + _gnutls_decode_ber_rs(signature, &tmp[0], + &tmp[1]); + if (ret < 0) { + gnutls_assert(); + goto cleanup; + } + dsa_public_key_init(&pub); + _dsa_params_to_pubkey(pk_params, &pub); + memcpy(&sig.r, tmp[0], sizeof(sig.r)); + memcpy(&sig.s, tmp[1], sizeof(sig.s)); + + hash = _gnutls_dsa_q_to_hash(pub.q); + if (vdata->size != _gnutls_hash_get_algo_len(hash)) { + gnutls_assert(); + ret = GNUTLS_E_PK_SIG_VERIFY_FAILED; + goto dsa_fail; + } - ret = - _gnutls_mpi_scan_nz(&tmp[0], signature->data, - signature->size); - if (ret < 0) { - gnutls_assert(); - goto cleanup; + ret = + _dsa_verify(&pub, vdata->size, vdata->data, + &sig); + if (ret == 0) + ret = GNUTLS_E_PK_SIG_VERIFY_FAILED; + else + ret = 0; + + dsa_fail: + _gnutls_mpi_release(&tmp[0]); + _gnutls_mpi_release(&tmp[1]); + break; } + case GNUTLS_PK_RSA:{ + bigint_t hash; - ret = _int_rsa_verify(pk_params, hash, tmp[0]); - _gnutls_mpi_release(&tmp[0]); - _gnutls_mpi_release(&hash); - break; - } + if (_gnutls_mpi_scan_nz + (&hash, vdata->data, vdata->size) != 0) { + gnutls_assert(); + return GNUTLS_E_MPI_SCAN_FAILED; + } + + ret = + _gnutls_mpi_scan_nz(&tmp[0], signature->data, + signature->size); + if (ret < 0) { + gnutls_assert(); + goto cleanup; + } + + ret = _int_rsa_verify(pk_params, hash, tmp[0]); + _gnutls_mpi_release(&tmp[0]); + _gnutls_mpi_release(&hash); + break; + } default: gnutls_assert(); ret = GNUTLS_E_INTERNAL_ERROR; goto cleanup; } -cleanup: + cleanup: return ret; } @@ -443,107 +464,115 @@ wrap_nettle_pk_generate_params(gnutls_pk_algorithm_t algo, unsigned int level /*bits */ , gnutls_pk_params_st * params) { -int ret, i; -int q_bits; + int ret, i; + int q_bits; switch (algo) { - case GNUTLS_PK_DSA: { - struct dsa_public_key pub; - struct dsa_private_key priv; - - dsa_public_key_init(&pub); - dsa_private_key_init(&priv); - - /* the best would be to use _gnutls_pk_bits_to_subgroup_bits() - * but we do NIST DSA here */ - if (level <= 1024) - q_bits = 160; - else - q_bits = 256; - - ret = dsa_generate_keypair (&pub, &priv, NULL, rnd_func, NULL, NULL, level, q_bits); - if (ret != 1) { - gnutls_assert(); - return GNUTLS_E_INTERNAL_ERROR; - } - - params->params_nr = 0; - for (i=0;i<DSA_PRIVATE_PARAMS;i++) { - params->params[i] = _gnutls_mpi_alloc_like(&pub.p); - if (params->params[i] == NULL) { - ret = GNUTLS_E_MEMORY_ERROR; - dsa_private_key_clear(&priv); - dsa_public_key_clear(&pub); - goto fail; + case GNUTLS_PK_DSA:{ + struct dsa_public_key pub; + struct dsa_private_key priv; + + dsa_public_key_init(&pub); + dsa_private_key_init(&priv); + + /* the best would be to use _gnutls_pk_bits_to_subgroup_bits() + * but we do NIST DSA here */ + if (level <= 1024) + q_bits = 160; + else + q_bits = 256; + + ret = + dsa_generate_keypair(&pub, &priv, NULL, + rnd_func, NULL, NULL, + level, q_bits); + if (ret != 1) { + gnutls_assert(); + return GNUTLS_E_INTERNAL_ERROR; } - params->params_nr++; - } - _gnutls_mpi_set(params->params[0], pub.p); - _gnutls_mpi_set(params->params[1], pub.q); - _gnutls_mpi_set(params->params[2], pub.g); - _gnutls_mpi_set(params->params[3], pub.y); - _gnutls_mpi_set(params->params[4], priv.x); - - dsa_private_key_clear(&priv); - dsa_public_key_clear(&pub); - - break; - } - case GNUTLS_PK_RSA: { - struct rsa_public_key pub; - struct rsa_private_key priv; - - rsa_public_key_init(&pub); - rsa_private_key_init(&priv); - - _gnutls_mpi_set_ui(&pub.e, 65537); - - ret = rsa_generate_keypair (&pub, &priv, NULL, rnd_func, NULL, NULL, level, 0); - if (ret != 1) { - gnutls_assert(); - return GNUTLS_E_INTERNAL_ERROR; + + params->params_nr = 0; + for (i = 0; i < DSA_PRIVATE_PARAMS; i++) { + params->params[i] = + _gnutls_mpi_alloc_like(&pub.p); + if (params->params[i] == NULL) { + ret = GNUTLS_E_MEMORY_ERROR; + dsa_private_key_clear(&priv); + dsa_public_key_clear(&pub); + goto fail; + } + params->params_nr++; + } + _gnutls_mpi_set(params->params[0], pub.p); + _gnutls_mpi_set(params->params[1], pub.q); + _gnutls_mpi_set(params->params[2], pub.g); + _gnutls_mpi_set(params->params[3], pub.y); + _gnutls_mpi_set(params->params[4], priv.x); + + dsa_private_key_clear(&priv); + dsa_public_key_clear(&pub); + + break; } - - params->params_nr = 0; - for (i=0;i<RSA_PRIVATE_PARAMS;i++) { - params->params[i] = _gnutls_mpi_alloc_like(&pub.n); - if (params->params[i] == NULL) { - ret = GNUTLS_E_MEMORY_ERROR; - rsa_private_key_clear(&priv); - rsa_public_key_clear(&pub); - goto fail; + case GNUTLS_PK_RSA:{ + struct rsa_public_key pub; + struct rsa_private_key priv; + + rsa_public_key_init(&pub); + rsa_private_key_init(&priv); + + _gnutls_mpi_set_ui(&pub.e, 65537); + + ret = + rsa_generate_keypair(&pub, &priv, NULL, + rnd_func, NULL, NULL, + level, 0); + if (ret != 1) { + gnutls_assert(); + return GNUTLS_E_INTERNAL_ERROR; + } + + params->params_nr = 0; + for (i = 0; i < RSA_PRIVATE_PARAMS; i++) { + params->params[i] = + _gnutls_mpi_alloc_like(&pub.n); + if (params->params[i] == NULL) { + ret = GNUTLS_E_MEMORY_ERROR; + rsa_private_key_clear(&priv); + rsa_public_key_clear(&pub); + goto fail; + } + params->params_nr++; + } - params->params_nr++; - + _gnutls_mpi_set(params->params[0], pub.n); + _gnutls_mpi_set(params->params[1], pub.e); + _gnutls_mpi_set(params->params[2], priv.d); + _gnutls_mpi_set(params->params[3], priv.p); + _gnutls_mpi_set(params->params[4], priv.q); + _gnutls_mpi_set(params->params[5], priv.c); + _gnutls_mpi_set(params->params[6], priv.a); + _gnutls_mpi_set(params->params[7], priv.b); + rsa_private_key_clear(&priv); + rsa_public_key_clear(&pub); + + break; } - _gnutls_mpi_set(params->params[0], pub.n); - _gnutls_mpi_set(params->params[1], pub.e); - _gnutls_mpi_set(params->params[2], priv.d); - _gnutls_mpi_set(params->params[3], priv.p); - _gnutls_mpi_set(params->params[4], priv.q); - _gnutls_mpi_set(params->params[5], priv.c); - _gnutls_mpi_set(params->params[6], priv.a); - _gnutls_mpi_set(params->params[7], priv.b); - rsa_private_key_clear(&priv); - rsa_public_key_clear(&pub); - - break; - } default: gnutls_assert(); return GNUTLS_E_INVALID_REQUEST; } - + return 0; -fail: + fail: - for (i=0;i<params->params_nr;i++) { + for (i = 0; i < params->params_nr; i++) { _gnutls_mpi_release(¶ms->params[i]); } - params->params_nr=0; - + params->params_nr = 0; + return ret; } @@ -553,7 +582,7 @@ wrap_nettle_pk_fixup(gnutls_pk_algorithm_t algo, gnutls_direction_t direction, gnutls_pk_params_st * params) { -int result; + int result; if (direction == GNUTLS_IMPORT) { /* do not trust the generated values. Some old private keys @@ -561,16 +590,20 @@ int result; * old but it seemed some of the shipped example private * keys were as old. */ - mpz_invert(TOMPZ(params->params[5]), TOMPZ(params->params[4]), TOMPZ(params->params[3])); + mpz_invert(TOMPZ(params->params[5]), + TOMPZ(params->params[4]), + TOMPZ(params->params[3])); - /* calculate exp1 [6] and exp2 [7] */ + /* calculate exp1 [6] and exp2 [7] */ _gnutls_mpi_release(¶ms->params[6]); _gnutls_mpi_release(¶ms->params[7]); - result = _gnutls_calc_rsa_exp(params->params, RSA_PRIVATE_PARAMS-2); - if (result < 0) { - gnutls_assert(); - return result; + result = + _gnutls_calc_rsa_exp(params->params, + RSA_PRIVATE_PARAMS - 2); + if (result < 0) { + gnutls_assert(); + return result; } params->params_nr = RSA_PRIVATE_PARAMS; } diff --git a/lib/openpgp/privkey.c b/lib/openpgp/privkey.c index 9be4a2c541..9450e33cb4 100644 --- a/lib/openpgp/privkey.c +++ b/lib/openpgp/privkey.c @@ -758,7 +758,6 @@ _gnutls_openpgp_privkey_get_mpis (gnutls_openpgp_privkey_t pkey, goto error; } } - /* fixup will generate exp1 and exp2 that are not * available here. */ |