Index: net/cert/ct_log_verifier_openssl.cc |
diff --git a/net/cert/ct_log_verifier_openssl.cc b/net/cert/ct_log_verifier_openssl.cc |
index fca4182e12622f585febdcdb68367159576b69ff..57657f0230cf459b51389187050770fab4e0acdf 100644 |
--- a/net/cert/ct_log_verifier_openssl.cc |
+++ b/net/cert/ct_log_verifier_openssl.cc |
@@ -48,7 +48,8 @@ CTLogVerifier::~CTLogVerifier() { |
CTLogVerifier::CTLogVerifier() |
: hash_algorithm_(ct::DigitallySigned::HASH_ALGO_NONE), |
signature_algorithm_(ct::DigitallySigned::SIG_ALGO_ANONYMOUS), |
- public_key_(NULL) {} |
+ public_key_(NULL) { |
+} |
bool CTLogVerifier::Init(const base::StringPiece& public_key, |
const base::StringPiece& description) { |
@@ -104,14 +105,14 @@ bool CTLogVerifier::VerifySignature(const base::StringPiece& data_to_sign, |
EVP_MD_CTX ctx; |
EVP_MD_CTX_init(&ctx); |
- bool ok = ( |
- 1 == EVP_DigestVerifyInit(&ctx, NULL, hash_alg, NULL, public_key_) && |
- 1 == EVP_DigestVerifyUpdate( |
- &ctx, data_to_sign.data(), data_to_sign.size()) && |
- 1 == EVP_DigestVerifyFinal( |
- &ctx, |
- reinterpret_cast<unsigned char*>(const_cast<char*>(signature.data())), |
- signature.size())); |
+ bool ok = |
+ (1 == EVP_DigestVerifyInit(&ctx, NULL, hash_alg, NULL, public_key_) && |
+ 1 == EVP_DigestVerifyUpdate( |
+ &ctx, data_to_sign.data(), data_to_sign.size()) && |
+ 1 == EVP_DigestVerifyFinal(&ctx, |
+ reinterpret_cast<unsigned char*>( |
+ const_cast<char*>(signature.data())), |
+ signature.size())); |
EVP_MD_CTX_cleanup(&ctx); |
return ok; |