diff options
author | 2019-02-07 13:55:38 +0100 | |
---|---|---|
committer | 2019-02-07 13:55:38 +0100 | |
commit | fa9264951b3b3b4e69af84744f20e2dc147facf6 (patch) | |
tree | ced7eb7d51dba2860daa1cc1c56425fc5463da76 | |
parent | 58910d547203d4147690f7ef8fac251d0f375344 (diff) |
Code cleanup
Change-Id: Ia032d574a84db8688445567657bd2f970d79cbb3
Signed-off-by: Alberto Compagno <acompagn+fdio@cisco.com>
-rw-r--r-- | libparc/parc/security/parc_PublicKeySigner.c | 3 | ||||
-rw-r--r-- | libparc/parc/security/parc_SymmetricKeySigner.c | 2 |
2 files changed, 1 insertions, 4 deletions
diff --git a/libparc/parc/security/parc_PublicKeySigner.c b/libparc/parc/security/parc_PublicKeySigner.c index de048df8..c44a9158 100644 --- a/libparc/parc/security/parc_PublicKeySigner.c +++ b/libparc/parc/security/parc_PublicKeySigner.c @@ -200,7 +200,6 @@ static inline int _SignDigestECDSA(const PARCCryptoHash *digestToSign, PARCBuffe EC_KEY *ec_key = EVP_PKEY_get1_EC_KEY(privateKey); - //*sig = parcMemory_Allocate(ECDSA_size(ec_key)); parcAssertNotNull(sig, "Expected pointer to a memory region for storing the signature %u. Pointer is NULL", ECDSA_size(ec_key)); *sigLength = 0; @@ -255,8 +254,6 @@ _SignDigest(PARCPublicKeySigner *signer, const PARCCryptoHash *digestToSign, uin } PARCBuffer *bbSign = parcBuffer_Wrap(signature_buf, signLenght, 0, signLenght); - //parcBuffer_Flip(parcBuffer_PutArray(bbSign, sigLength, sig)); - //parcMemory_Deallocate((void **) &sig); PARCSignature *signature = parcSignature_Create(_GetSigningAlgorithm(signer), diff --git a/libparc/parc/security/parc_SymmetricKeySigner.c b/libparc/parc/security/parc_SymmetricKeySigner.c index 5f87b945..bfb98e42 100644 --- a/libparc/parc/security/parc_SymmetricKeySigner.c +++ b/libparc/parc/security/parc_SymmetricKeySigner.c @@ -265,7 +265,7 @@ _signDigest(PARCSymmetricKeySigner *interfaceContext, const PARCCryptoHash *hash { // The digest computed via our hash function (hmac) is the actual signature. // just need to wrap it up with the right parameters. - PARCBuffer *signatureBits = parcBuffer_Wrap(signature, sig_len, 0, sig_len);//parcBuffer_Copy(parcCryptoHash_GetDigest(hashToSign)); + PARCBuffer *signatureBits = parcBuffer_Wrap(signature, sig_len, 0, sig_len); PARCSignature *result = parcSignature_Create(_getSigningAlgorithm(interfaceContext), parcCryptoHash_GetDigestType(hashToSign), signatureBits); parcBuffer_Release(&signatureBits); return result; |