From 5b4a3b57154073333fbb2e04a37a612721f27399 Mon Sep 17 00:00:00 2001 From: Frank Denis Date: Thu, 10 Jul 2014 22:04:01 -0700 Subject: [PATCH] Reformat --- .../crypto_sign/ed25519/ref10/open.c | 78 ++++++++++--------- 1 file changed, 43 insertions(+), 35 deletions(-) diff --git a/src/libsodium/crypto_sign/ed25519/ref10/open.c b/src/libsodium/crypto_sign/ed25519/ref10/open.c index 17c60e03..77fe7b34 100644 --- a/src/libsodium/crypto_sign/ed25519/ref10/open.c +++ b/src/libsodium/crypto_sign/ed25519/ref10/open.c @@ -7,44 +7,52 @@ #include "ge.h" #include "sc.h" -int crypto_sign_open( - unsigned char *m,unsigned long long *mlen, - const unsigned char *sm,unsigned long long smlen, - const unsigned char *pk -) +int +crypto_sign_open(unsigned char *m, unsigned long long *mlen, + const unsigned char *sm, unsigned long long smlen, + const unsigned char *pk) { - crypto_hash_sha512_state hs; - unsigned char h[64]; - unsigned char rcheck[32]; - unsigned int i; - unsigned char d = 0; - ge_p3 A; - ge_p2 R; + crypto_hash_sha512_state hs; + unsigned char h[64]; + unsigned char rcheck[32]; + unsigned int i; + unsigned char d = 0; + ge_p3 A; + ge_p2 R; - if (smlen < 64) goto badsig; - if (sm[63] & 224) goto badsig; - if (ge_frombytes_negate_vartime(&A,pk) != 0) goto badsig; + if (smlen < 64) { + goto badsig; + } + if (sm[63] & 224) { + goto badsig; + } + if (ge_frombytes_negate_vartime(&A, pk) != 0) { + goto badsig; + } + for (i = 0; i < 32; ++i) { + d |= pk[i]; + } + if (d == 0) { + return -1; + } + crypto_hash_sha512_init(&hs); + crypto_hash_sha512_update(&hs, sm, 32); + crypto_hash_sha512_update(&hs, pk, 32); + crypto_hash_sha512_update(&hs, sm + 64, smlen - 64); + crypto_hash_sha512_final(&hs, h); + sc_reduce(h); - for (i = 0; i < 32; ++i) d |= pk[i]; - if (d == 0) return -1; - - crypto_hash_sha512_init(&hs); - crypto_hash_sha512_update(&hs, sm, 32); - crypto_hash_sha512_update(&hs, pk, 32); - crypto_hash_sha512_update(&hs, sm + 64, smlen - 64); - crypto_hash_sha512_final(&hs, h); - sc_reduce(h); - - ge_double_scalarmult_vartime(&R,h,&A,sm+32); - ge_tobytes(rcheck,&R); - if (crypto_verify_32(rcheck,sm) == 0) { - memmove(m, sm + 64,smlen - 64); - *mlen = smlen - 64; - return 0; - } + ge_double_scalarmult_vartime(&R, h, &A, sm + 32); + ge_tobytes(rcheck, &R); + if (crypto_verify_32(rcheck, sm) == 0) { + memmove(m, sm + 64, smlen - 64); + *mlen = smlen - 64; + return 0; + } badsig: - *mlen = 0; - memset(m, 0, smlen - 64); - return -1; + *mlen = 0; + memset(m, 0, smlen - 64); + + return -1; }