diff options
Diffstat (limited to '')
-rw-r--r-- | libraries/eet/src/lib/eet_cipher.c | 26 |
1 files changed, 13 insertions, 13 deletions
diff --git a/libraries/eet/src/lib/eet_cipher.c b/libraries/eet/src/lib/eet_cipher.c index 89ee65d..37a0899 100644 --- a/libraries/eet/src/lib/eet_cipher.c +++ b/libraries/eet/src/lib/eet_cipher.c | |||
@@ -275,7 +275,7 @@ on_error: | |||
275 | cb = NULL; | 275 | cb = NULL; |
276 | #endif /* ifdef HAVE_SIGNATURE */ | 276 | #endif /* ifdef HAVE_SIGNATURE */ |
277 | return NULL; | 277 | return NULL; |
278 | } /* eet_identity_open */ | 278 | } |
279 | 279 | ||
280 | EAPI void | 280 | EAPI void |
281 | eet_identity_close(Eet_Key *key) | 281 | eet_identity_close(Eet_Key *key) |
@@ -295,7 +295,7 @@ eet_identity_close(Eet_Key *key) | |||
295 | #else | 295 | #else |
296 | key = NULL; | 296 | key = NULL; |
297 | #endif /* ifdef HAVE_SIGNATURE */ | 297 | #endif /* ifdef HAVE_SIGNATURE */ |
298 | } /* eet_identity_close */ | 298 | } |
299 | 299 | ||
300 | EAPI void | 300 | EAPI void |
301 | eet_identity_print(Eet_Key *key, | 301 | eet_identity_print(Eet_Key *key, |
@@ -419,7 +419,7 @@ on_error: | |||
419 | out = NULL; | 419 | out = NULL; |
420 | ERR("You need to compile signature support in EET."); | 420 | ERR("You need to compile signature support in EET."); |
421 | #endif /* ifdef HAVE_SIGNATURE */ | 421 | #endif /* ifdef HAVE_SIGNATURE */ |
422 | } /* eet_identity_print */ | 422 | } |
423 | 423 | ||
424 | void | 424 | void |
425 | eet_identity_ref(Eet_Key *key) | 425 | eet_identity_ref(Eet_Key *key) |
@@ -428,7 +428,7 @@ eet_identity_ref(Eet_Key *key) | |||
428 | return; | 428 | return; |
429 | 429 | ||
430 | key->references++; | 430 | key->references++; |
431 | } /* eet_identity_ref */ | 431 | } |
432 | 432 | ||
433 | void | 433 | void |
434 | eet_identity_unref(Eet_Key *key) | 434 | eet_identity_unref(Eet_Key *key) |
@@ -438,7 +438,7 @@ eet_identity_unref(Eet_Key *key) | |||
438 | 438 | ||
439 | key->references--; | 439 | key->references--; |
440 | eet_identity_close(key); | 440 | eet_identity_close(key); |
441 | } /* eet_identity_unref */ | 441 | } |
442 | 442 | ||
443 | void * | 443 | void * |
444 | eet_identity_compute_sha1(const void *data_base, | 444 | eet_identity_compute_sha1(const void *data_base, |
@@ -479,7 +479,7 @@ eet_identity_compute_sha1(const void *data_base, | |||
479 | #endif /* ifdef HAVE_SIGNATURE */ | 479 | #endif /* ifdef HAVE_SIGNATURE */ |
480 | 480 | ||
481 | return result; | 481 | return result; |
482 | } /* eet_identity_compute_sha1 */ | 482 | } |
483 | 483 | ||
484 | Eet_Error | 484 | Eet_Error |
485 | eet_identity_sign(FILE *fp, | 485 | eet_identity_sign(FILE *fp, |
@@ -650,7 +650,7 @@ on_error: | |||
650 | key = NULL; | 650 | key = NULL; |
651 | return EET_ERROR_NOT_IMPLEMENTED; | 651 | return EET_ERROR_NOT_IMPLEMENTED; |
652 | #endif /* ifdef HAVE_SIGNATURE */ | 652 | #endif /* ifdef HAVE_SIGNATURE */ |
653 | } /* eet_identity_sign */ | 653 | } |
654 | 654 | ||
655 | const void * | 655 | const void * |
656 | eet_identity_check(const void *data_base, | 656 | eet_identity_check(const void *data_base, |
@@ -830,7 +830,7 @@ eet_identity_check(const void *data_base, | |||
830 | x509_length = NULL; | 830 | x509_length = NULL; |
831 | return NULL; | 831 | return NULL; |
832 | #endif /* ifdef HAVE_SIGNATURE */ | 832 | #endif /* ifdef HAVE_SIGNATURE */ |
833 | } /* eet_identity_check */ | 833 | } |
834 | 834 | ||
835 | EAPI void | 835 | EAPI void |
836 | eet_identity_certificate_print(const unsigned char *certificate, | 836 | eet_identity_certificate_print(const unsigned char *certificate, |
@@ -896,7 +896,7 @@ on_error: | |||
896 | out = NULL; | 896 | out = NULL; |
897 | ERR("You need to compile signature support in EET."); | 897 | ERR("You need to compile signature support in EET."); |
898 | #endif /* ifdef HAVE_SIGNATURE */ | 898 | #endif /* ifdef HAVE_SIGNATURE */ |
899 | } /* eet_identity_certificate_print */ | 899 | } |
900 | 900 | ||
901 | Eet_Error | 901 | Eet_Error |
902 | eet_cipher(const void *data, | 902 | eet_cipher(const void *data, |
@@ -1073,7 +1073,7 @@ on_error: | |||
1073 | (void)result_length; | 1073 | (void)result_length; |
1074 | return EET_ERROR_NOT_IMPLEMENTED; | 1074 | return EET_ERROR_NOT_IMPLEMENTED; |
1075 | #endif /* ifdef HAVE_CIPHER */ | 1075 | #endif /* ifdef HAVE_CIPHER */ |
1076 | } /* eet_cipher */ | 1076 | } |
1077 | 1077 | ||
1078 | Eet_Error | 1078 | Eet_Error |
1079 | eet_decipher(const void *data, | 1079 | eet_decipher(const void *data, |
@@ -1224,7 +1224,7 @@ on_error: | |||
1224 | (void)result_length; | 1224 | (void)result_length; |
1225 | return EET_ERROR_NOT_IMPLEMENTED; | 1225 | return EET_ERROR_NOT_IMPLEMENTED; |
1226 | #endif /* ifdef HAVE_CIPHER */ | 1226 | #endif /* ifdef HAVE_CIPHER */ |
1227 | } /* eet_decipher */ | 1227 | } |
1228 | 1228 | ||
1229 | #ifdef HAVE_CIPHER | 1229 | #ifdef HAVE_CIPHER |
1230 | # ifdef HAVE_GNUTLS | 1230 | # ifdef HAVE_GNUTLS |
@@ -1265,7 +1265,7 @@ eet_hmac_sha1(const void *key, | |||
1265 | gcry_md_close(mdh); | 1265 | gcry_md_close(mdh); |
1266 | 1266 | ||
1267 | return 0; | 1267 | return 0; |
1268 | } /* eet_hmac_sha1 */ | 1268 | } |
1269 | 1269 | ||
1270 | # endif /* ifdef HAVE_GNUTLS */ | 1270 | # endif /* ifdef HAVE_GNUTLS */ |
1271 | 1271 | ||
@@ -1337,6 +1337,6 @@ eet_pbkdf2_sha1(const char *key, | |||
1337 | HMAC_cleanup(&hctx); | 1337 | HMAC_cleanup(&hctx); |
1338 | # endif /* ifdef HAVE_GNUTLS */ | 1338 | # endif /* ifdef HAVE_GNUTLS */ |
1339 | return 0; | 1339 | return 0; |
1340 | } /* eet_pbkdf2_sha1 */ | 1340 | } |
1341 | 1341 | ||
1342 | #endif /* ifdef HAVE_CIPHER */ | 1342 | #endif /* ifdef HAVE_CIPHER */ |