@@ -461,7 +461,7 @@ const zend_function_entry openssl_functions[] = {
461
461
462
462
/* x.509 cert funcs */
463
463
PHP_FE (openssl_x509_read , arginfo_openssl_x509_read )
464
- PHP_FE (openssl_x509_free , arginfo_openssl_x509_free )
464
+ PHP_FE (openssl_x509_free , arginfo_openssl_x509_free )
465
465
PHP_FE (openssl_x509_parse , arginfo_openssl_x509_parse )
466
466
PHP_FE (openssl_x509_checkpurpose , arginfo_openssl_x509_checkpurpose )
467
467
PHP_FE (openssl_x509_check_private_key , arginfo_openssl_x509_check_private_key )
@@ -509,9 +509,9 @@ const zend_function_entry openssl_functions[] = {
509
509
PHP_FE (openssl_get_md_methods , arginfo_openssl_get_md_methods )
510
510
PHP_FE (openssl_get_cipher_methods , arginfo_openssl_get_cipher_methods )
511
511
512
- PHP_FE (openssl_dh_compute_key , arginfo_openssl_dh_compute_key )
512
+ PHP_FE (openssl_dh_compute_key , arginfo_openssl_dh_compute_key )
513
513
514
- PHP_FE (openssl_random_pseudo_bytes , arginfo_openssl_random_pseudo_bytes )
514
+ PHP_FE (openssl_random_pseudo_bytes , arginfo_openssl_random_pseudo_bytes )
515
515
PHP_FE (openssl_error_string , arginfo_openssl_error_string )
516
516
PHP_FE_END
517
517
};
@@ -620,8 +620,8 @@ struct php_x509_request { /* {{{ */
620
620
LHASH_OF (CONF_VALUE ) * global_config ; /* Global SSL config */
621
621
LHASH_OF (CONF_VALUE ) * req_config ; /* SSL config for this request */
622
622
#else
623
- LHASH * global_config ; /* Global SSL config */
624
- LHASH * req_config ; /* SSL config for this request */
623
+ LHASH * global_config ; /* Global SSL config */
624
+ LHASH * req_config ; /* SSL config for this request */
625
625
#endif
626
626
const EVP_MD * md_alg ;
627
627
const EVP_MD * digest ;
@@ -637,7 +637,7 @@ struct php_x509_request { /* {{{ */
637
637
638
638
EVP_PKEY * priv_key ;
639
639
640
- const EVP_CIPHER * priv_key_encrypt_cipher ;
640
+ const EVP_CIPHER * priv_key_encrypt_cipher ;
641
641
};
642
642
/* }}} */
643
643
@@ -671,7 +671,7 @@ static void add_assoc_name_entry(zval * val, char * key, X509_NAME * name, int s
671
671
int to_add_len = 0 ;
672
672
673
673
674
- ne = X509_NAME_get_entry (name , i );
674
+ ne = X509_NAME_get_entry (name , i );
675
675
obj = X509_NAME_ENTRY_get_object (ne );
676
676
nid = OBJ_obj2nid (obj );
677
677
@@ -880,18 +880,18 @@ static const EVP_CIPHER * php_openssl_get_evp_cipher_from_algo(zend_long algo);
880
880
/* {{{ strip line endings from spkac */
881
881
static int openssl_spki_cleanup (const char * src , char * dest )
882
882
{
883
- int removed = 0 ;
884
-
885
- while (* src ) {
886
- if (* src != '\n' && * src != '\r' ) {
887
- * dest ++ = * src ;
888
- } else {
889
- ++ removed ;
890
- }
891
- ++ src ;
892
- }
893
- * dest = 0 ;
894
- return removed ;
883
+ int removed = 0 ;
884
+
885
+ while (* src ) {
886
+ if (* src != '\n' && * src != '\r' ) {
887
+ * dest ++ = * src ;
888
+ } else {
889
+ ++ removed ;
890
+ }
891
+ ++ src ;
892
+ }
893
+ * dest = 0 ;
894
+ return removed ;
895
895
}
896
896
/* }}} */
897
897
@@ -954,7 +954,7 @@ static int php_openssl_parse_config(struct php_x509_request * req, zval * option
954
954
if (cipher == NULL ) {
955
955
php_error_docref (NULL , E_WARNING , "Unknown cipher algorithm for private key." );
956
956
return FAILURE ;
957
- } else {
957
+ } else {
958
958
req -> priv_key_encrypt_cipher = cipher ;
959
959
}
960
960
} else {
@@ -1693,7 +1693,7 @@ PHP_FUNCTION(openssl_spki_export)
1693
1693
}
1694
1694
1695
1695
out = BIO_new (BIO_s_mem ());
1696
- if (out && PEM_write_bio_PUBKEY (out , pkey )) {
1696
+ if (out && PEM_write_bio_PUBKEY (out , pkey )) {
1697
1697
BUF_MEM * bio_buf ;
1698
1698
1699
1699
BIO_get_mem_ptr (out , & bio_buf );
@@ -1790,7 +1790,7 @@ PHP_FUNCTION(openssl_x509_export)
1790
1790
if (!notext ) {
1791
1791
X509_print (bio_out , cert );
1792
1792
}
1793
- if (PEM_write_bio_X509 (bio_out , cert )) {
1793
+ if (PEM_write_bio_X509 (bio_out , cert )) {
1794
1794
BUF_MEM * bio_buf ;
1795
1795
1796
1796
zval_dtor (zout );
@@ -1916,44 +1916,44 @@ static int openssl_x509v3_subjectAltName(BIO *bio, X509_EXTENSION *extension)
1916
1916
p = extension -> value -> data ;
1917
1917
length = extension -> value -> length ;
1918
1918
if (method -> it ) {
1919
- names = (GENERAL_NAMES * )(ASN1_item_d2i (NULL , & p , length ,
1920
- ASN1_ITEM_ptr (method -> it )));
1919
+ names = (GENERAL_NAMES * ) (ASN1_item_d2i (NULL , & p , length ,
1920
+ ASN1_ITEM_ptr (method -> it )));
1921
1921
} else {
1922
- names = (GENERAL_NAMES * )(method -> d2i (NULL , & p , length ));
1922
+ names = (GENERAL_NAMES * ) (method -> d2i (NULL , & p , length ));
1923
1923
}
1924
1924
if (names == NULL ) {
1925
1925
return -1 ;
1926
1926
}
1927
1927
1928
1928
num = sk_GENERAL_NAME_num (names );
1929
1929
for (i = 0 ; i < num ; i ++ ) {
1930
- GENERAL_NAME * name ;
1931
- ASN1_STRING * as ;
1932
- name = sk_GENERAL_NAME_value (names , i );
1933
- switch (name -> type ) {
1934
- case GEN_EMAIL :
1935
- BIO_puts (bio , "email:" );
1936
- as = name -> d .rfc822Name ;
1937
- BIO_write (bio , ASN1_STRING_data (as ),
1938
- ASN1_STRING_length (as ));
1939
- break ;
1940
- case GEN_DNS :
1941
- BIO_puts (bio , "DNS:" );
1942
- as = name -> d .dNSName ;
1943
- BIO_write (bio , ASN1_STRING_data (as ),
1944
- ASN1_STRING_length (as ));
1945
- break ;
1946
- case GEN_URI :
1947
- BIO_puts (bio , "URI:" );
1948
- as = name -> d .uniformResourceIdentifier ;
1949
- BIO_write (bio , ASN1_STRING_data (as ),
1950
- ASN1_STRING_length (as ));
1951
- break ;
1952
- default :
1953
- /* use builtin print for GEN_OTHERNAME, GEN_X400,
1954
- * GEN_EDIPARTY, GEN_DIRNAME, GEN_IPADD and GEN_RID
1955
- */
1956
- GENERAL_NAME_print (bio , name );
1930
+ GENERAL_NAME * name ;
1931
+ ASN1_STRING * as ;
1932
+ name = sk_GENERAL_NAME_value (names , i );
1933
+ switch (name -> type ) {
1934
+ case GEN_EMAIL :
1935
+ BIO_puts (bio , "email:" );
1936
+ as = name -> d .rfc822Name ;
1937
+ BIO_write (bio , ASN1_STRING_data (as ),
1938
+ ASN1_STRING_length (as ));
1939
+ break ;
1940
+ case GEN_DNS :
1941
+ BIO_puts (bio , "DNS:" );
1942
+ as = name -> d .dNSName ;
1943
+ BIO_write (bio , ASN1_STRING_data (as ),
1944
+ ASN1_STRING_length (as ));
1945
+ break ;
1946
+ case GEN_URI :
1947
+ BIO_puts (bio , "URI:" );
1948
+ as = name -> d .uniformResourceIdentifier ;
1949
+ BIO_write (bio , ASN1_STRING_data (as ),
1950
+ ASN1_STRING_length (as ));
1951
+ break ;
1952
+ default :
1953
+ /* use builtin print for GEN_OTHERNAME, GEN_X400,
1954
+ * GEN_EDIPARTY, GEN_DIRNAME, GEN_IPADD and GEN_RID
1955
+ */
1956
+ GENERAL_NAME_print (bio , name );
1957
1957
}
1958
1958
/* trailing ', ' except for last element */
1959
1959
if (i < (num - 1 )) {
@@ -1978,7 +1978,7 @@ PHP_FUNCTION(openssl_x509_parse)
1978
1978
zval subitem ;
1979
1979
X509_EXTENSION * extension ;
1980
1980
char * extname ;
1981
- BIO * bio_out ;
1981
+ BIO * bio_out ;
1982
1982
BUF_MEM * bio_buf ;
1983
1983
char buf [256 ];
1984
1984
@@ -2347,8 +2347,8 @@ static STACK_OF(X509) * php_array_to_X509_sk(zval * zcerts) /* {{{ */
2347
2347
{
2348
2348
zval * zcertval ;
2349
2349
STACK_OF (X509 ) * sk = NULL ;
2350
- X509 * cert ;
2351
- zend_resource * certresource ;
2350
+ X509 * cert ;
2351
+ zend_resource * certresource ;
2352
2352
2353
2353
sk = sk_X509_new_null ();
2354
2354
@@ -2387,8 +2387,8 @@ static STACK_OF(X509) * php_array_to_X509_sk(zval * zcerts) /* {{{ */
2387
2387
sk_X509_push (sk , cert );
2388
2388
}
2389
2389
2390
- clean_exit :
2391
- return sk ;
2390
+ clean_exit :
2391
+ return sk ;
2392
2392
}
2393
2393
/* }}} */
2394
2394
@@ -2446,7 +2446,7 @@ PHP_FUNCTION(openssl_pkcs12_export_to_file)
2446
2446
/* end parse extra config */
2447
2447
2448
2448
/*PKCS12 *PKCS12_create(char *pass, char *name, EVP_PKEY *pkey, X509 *cert, STACK_OF(X509) *ca,
2449
- int nid_key, int nid_cert, int iter, int mac_iter, int keytype);*/
2449
+ int nid_key, int nid_cert, int iter, int mac_iter, int keytype);*/
2450
2450
2451
2451
p12 = PKCS12_create (pass , friendly_name , priv_key , cert , ca , 0 , 0 , 0 , 0 , 0 );
2452
2452
@@ -2522,7 +2522,7 @@ PHP_FUNCTION(openssl_pkcs12_export)
2522
2522
p12 = PKCS12_create (pass , friendly_name , priv_key , cert , ca , 0 , 0 , 0 , 0 , 0 );
2523
2523
2524
2524
bio_out = BIO_new (BIO_s_mem ());
2525
- if (i2d_PKCS12_bio (bio_out , p12 )) {
2525
+ if (i2d_PKCS12_bio (bio_out , p12 )) {
2526
2526
BUF_MEM * bio_buf ;
2527
2527
2528
2528
zval_dtor (zout );
@@ -2638,7 +2638,7 @@ PHP_FUNCTION(openssl_pkcs12_read)
2638
2638
}
2639
2639
}
2640
2640
2641
- cleanup :
2641
+ cleanup :
2642
2642
if (bio_in ) {
2643
2643
BIO_free (bio_in );
2644
2644
}
@@ -3576,9 +3576,9 @@ PHP_FUNCTION(openssl_pkey_new)
3576
3576
EVP_PKEY * pkey ;
3577
3577
3578
3578
if ((data = zend_hash_str_find (Z_ARRVAL_P (args ), "rsa" , sizeof ("rsa" )- 1 )) != NULL &&
3579
- Z_TYPE_P (data ) == IS_ARRAY ) {
3580
- pkey = EVP_PKEY_new ();
3581
- if (pkey ) {
3579
+ Z_TYPE_P (data ) == IS_ARRAY ) {
3580
+ pkey = EVP_PKEY_new ();
3581
+ if (pkey ) {
3582
3582
RSA * rsa = RSA_new ();
3583
3583
if (rsa ) {
3584
3584
OPENSSL_PKEY_SET_BN (Z_ARRVAL_P (data ), rsa , n );
@@ -3599,10 +3599,10 @@ PHP_FUNCTION(openssl_pkey_new)
3599
3599
EVP_PKEY_free (pkey );
3600
3600
}
3601
3601
RETURN_FALSE ;
3602
- } else if ((data = zend_hash_str_find (Z_ARRVAL_P (args ), "dsa" , sizeof ("dsa" )- 1 )) != NULL &&
3603
- Z_TYPE_P (data ) == IS_ARRAY ) {
3604
- pkey = EVP_PKEY_new ();
3605
- if (pkey ) {
3602
+ } else if ((data = zend_hash_str_find (Z_ARRVAL_P (args ), "dsa" , sizeof ("dsa" ) - 1 )) != NULL &&
3603
+ Z_TYPE_P (data ) == IS_ARRAY ) {
3604
+ pkey = EVP_PKEY_new ();
3605
+ if (pkey ) {
3606
3606
DSA * dsa = DSA_new ();
3607
3607
if (dsa ) {
3608
3608
OPENSSL_PKEY_SET_BN (Z_ARRVAL_P (data ), dsa , p );
@@ -3623,10 +3623,10 @@ PHP_FUNCTION(openssl_pkey_new)
3623
3623
EVP_PKEY_free (pkey );
3624
3624
}
3625
3625
RETURN_FALSE ;
3626
- } else if ((data = zend_hash_str_find (Z_ARRVAL_P (args ), "dh" , sizeof ("dh" )- 1 )) != NULL &&
3627
- Z_TYPE_P (data ) == IS_ARRAY ) {
3628
- pkey = EVP_PKEY_new ();
3629
- if (pkey ) {
3626
+ } else if ((data = zend_hash_str_find (Z_ARRVAL_P (args ), "dh" , sizeof ("dh" ) - 1 )) != NULL &&
3627
+ Z_TYPE_P (data ) == IS_ARRAY ) {
3628
+ pkey = EVP_PKEY_new ();
3629
+ if (pkey ) {
3630
3630
DH * dh = DH_new ();
3631
3631
if (dh ) {
3632
3632
OPENSSL_PKEY_SET_BN (Z_ARRVAL_P (data ), dh , p );
@@ -4522,7 +4522,7 @@ PHP_FUNCTION(openssl_private_encrypt)
4522
4522
switch (pkey -> type ) {
4523
4523
case EVP_PKEY_RSA :
4524
4524
case EVP_PKEY_RSA2 :
4525
- successful = (RSA_private_encrypt ((int )data_len ,
4525
+ successful = (RSA_private_encrypt ((int )data_len ,
4526
4526
(unsigned char * )data ,
4527
4527
(unsigned char * )ZSTR_VAL (cryptedbuf ),
4528
4528
pkey -> pkey .rsa ,
@@ -4835,7 +4835,7 @@ PHP_FUNCTION(openssl_verify)
4835
4835
zval * key ;
4836
4836
EVP_PKEY * pkey ;
4837
4837
int err ;
4838
- EVP_MD_CTX md_ctx ;
4838
+ EVP_MD_CTX md_ctx ;
4839
4839
const EVP_MD * mdtype ;
4840
4840
zend_resource * keyresource = NULL ;
4841
4841
char * data ;
@@ -4873,7 +4873,7 @@ PHP_FUNCTION(openssl_verify)
4873
4873
RETURN_FALSE ;
4874
4874
}
4875
4875
4876
- EVP_VerifyInit (& md_ctx , mdtype );
4876
+ EVP_VerifyInit (& md_ctx , mdtype );
4877
4877
EVP_VerifyUpdate (& md_ctx , data , data_len );
4878
4878
err = EVP_VerifyFinal (& md_ctx , (unsigned char * )signature , (unsigned int )signature_len , pkey );
4879
4879
EVP_MD_CTX_cleanup (& md_ctx );
@@ -5203,22 +5203,22 @@ static zend_bool php_openssl_validate_iv(char **piv, size_t *piv_len, size_t iv_
5203
5203
if (* piv_len == 0 ) {
5204
5204
/* BC behavior */
5205
5205
* piv_len = iv_required_len ;
5206
- * piv = iv_new ;
5206
+ * piv = iv_new ;
5207
5207
return 1 ;
5208
5208
}
5209
5209
5210
5210
if (* piv_len < iv_required_len ) {
5211
5211
php_error_docref (NULL , E_WARNING , "IV passed is only %d bytes long, cipher expects an IV of precisely %d bytes, padding with \\0" , * piv_len , iv_required_len );
5212
5212
memcpy (iv_new , * piv , * piv_len );
5213
5213
* piv_len = iv_required_len ;
5214
- * piv = iv_new ;
5214
+ * piv = iv_new ;
5215
5215
return 1 ;
5216
5216
}
5217
5217
5218
5218
php_error_docref (NULL , E_WARNING , "IV passed is %d bytes long which is longer than the %d expected by selected cipher, truncating" , * piv_len , iv_required_len );
5219
5219
memcpy (iv_new , * piv , iv_required_len );
5220
5220
* piv_len = iv_required_len ;
5221
- * piv = iv_new ;
5221
+ * piv = iv_new ;
5222
5222
return 1 ;
5223
5223
5224
5224
}
0 commit comments