| Index: net/cert/ct_log_verifier_openssl.cc
|
| diff --git a/net/cert/ct_log_verifier_openssl.cc b/net/cert/ct_log_verifier_openssl.cc
|
| index fca4182e12622f585febdcdb68367159576b69ff..57657f0230cf459b51389187050770fab4e0acdf 100644
|
| --- a/net/cert/ct_log_verifier_openssl.cc
|
| +++ b/net/cert/ct_log_verifier_openssl.cc
|
| @@ -48,7 +48,8 @@ CTLogVerifier::~CTLogVerifier() {
|
| CTLogVerifier::CTLogVerifier()
|
| : hash_algorithm_(ct::DigitallySigned::HASH_ALGO_NONE),
|
| signature_algorithm_(ct::DigitallySigned::SIG_ALGO_ANONYMOUS),
|
| - public_key_(NULL) {}
|
| + public_key_(NULL) {
|
| +}
|
|
|
| bool CTLogVerifier::Init(const base::StringPiece& public_key,
|
| const base::StringPiece& description) {
|
| @@ -104,14 +105,14 @@ bool CTLogVerifier::VerifySignature(const base::StringPiece& data_to_sign,
|
| EVP_MD_CTX ctx;
|
| EVP_MD_CTX_init(&ctx);
|
|
|
| - bool ok = (
|
| - 1 == EVP_DigestVerifyInit(&ctx, NULL, hash_alg, NULL, public_key_) &&
|
| - 1 == EVP_DigestVerifyUpdate(
|
| - &ctx, data_to_sign.data(), data_to_sign.size()) &&
|
| - 1 == EVP_DigestVerifyFinal(
|
| - &ctx,
|
| - reinterpret_cast<unsigned char*>(const_cast<char*>(signature.data())),
|
| - signature.size()));
|
| + bool ok =
|
| + (1 == EVP_DigestVerifyInit(&ctx, NULL, hash_alg, NULL, public_key_) &&
|
| + 1 == EVP_DigestVerifyUpdate(
|
| + &ctx, data_to_sign.data(), data_to_sign.size()) &&
|
| + 1 == EVP_DigestVerifyFinal(&ctx,
|
| + reinterpret_cast<unsigned char*>(
|
| + const_cast<char*>(signature.data())),
|
| + signature.size()));
|
|
|
| EVP_MD_CTX_cleanup(&ctx);
|
| return ok;
|
|
|