@@ -832,7 +832,7 @@ static BIO *encode_rfc3161_request(PKCS7 *sig, const EVP_MD *md)
832832 u_char * p ;
833833 int len ;
834834 STACK_OF (PKCS7_SIGNER_INFO ) * signer_info = PKCS7_get_signer_info (sig );
835-
835+
836836 if (!signer_info )
837837 return NULL ; /* FAILED */
838838 si = sk_PKCS7_SIGNER_INFO_value (signer_info , 0 );
@@ -881,7 +881,7 @@ static BIO *encode_authenticode_request(PKCS7 *sig)
881881 u_char * p ;
882882 int len ;
883883 STACK_OF (PKCS7_SIGNER_INFO ) * signer_info = PKCS7_get_signer_info (sig );
884-
884+
885885 if (!signer_info )
886886 return 0 ; /* FAILED */
887887 si = sk_PKCS7_SIGNER_INFO_value (signer_info , 0 );
@@ -922,7 +922,7 @@ static int decode_rfc3161_response(PKCS7 *sig, BIO *bin, int verbose)
922922 u_char * p ;
923923 int len ;
924924 STACK_OF (PKCS7_SIGNER_INFO ) * signer_info = PKCS7_get_signer_info (sig );
925-
925+
926926 if (!signer_info )
927927 return 1 ; /* FAILED */
928928 si = sk_PKCS7_SIGNER_INFO_value (signer_info , 0 );
@@ -2599,7 +2599,7 @@ static int pkcs7_set_nested_signature(PKCS7 *p7, PKCS7 *p7nest, time_t signing_t
25992599 int len = 0 ;
26002600 PKCS7_SIGNER_INFO * si ;
26012601 STACK_OF (PKCS7_SIGNER_INFO ) * signer_info = PKCS7_get_signer_info (p7 );
2602-
2602+
26032603 if (!signer_info )
26042604 return 0 ; /* FAILED */
26052605 si = sk_PKCS7_SIGNER_INFO_value (signer_info , 0 );
@@ -2927,7 +2927,7 @@ static int msi_verify_header(char *indata, uint32_t filesize, MSI_PARAMS *msipar
29272927 printf ("Failed to parse MSI_DIRENT struct\n" );
29282928 return 0 ; /* FAILED */
29292929 }
2930-
2930+
29312931 return 1 ; /* OK */
29322932}
29332933
@@ -3191,7 +3191,7 @@ static int msi_calc_MsiDigitalSignatureEx(MSI_PARAMS *msiparams, const EVP_MD *m
31913191 BIO_free_all (prehash );
31923192 return 0 ; /* FAILED */
31933193 }
3194- BIO_push (prehash , BIO_new (BIO_s_null ()));
3194+ BIO_push (prehash , BIO_new (BIO_s_null ()));
31953195
31963196 if (!msi_prehash_dir (msiparams -> dirent , prehash , 1 )) {
31973197 printf ("Unable to calculate MSI pre-hash ('metadata') hash\n" );
@@ -3230,7 +3230,7 @@ static int pe_calc_digest(char *indata, const EVP_MD *md, u_char *mdbuf, FILE_HE
32303230 memset (mdbuf , 0 , EVP_MAX_MD_SIZE );
32313231 bio = BIO_new_mem_buf (indata , offset );
32323232 (void )BIO_seek (bio , 0 );
3233-
3233+
32343234 bfb = OPENSSL_malloc (SIZE_16M );
32353235
32363236 BIO_read (bio , bfb , header -> header_size + 88 );
@@ -3677,7 +3677,7 @@ static int cab_calc_digest(char *indata, const EVP_MD *md, u_char *mdbuf, FILE_H
36773677 bio = BIO_new_mem_buf (indata , offset );
36783678 memset (mdbuf , 0 , EVP_MAX_MD_SIZE );
36793679 (void )BIO_seek (bio , 0 );
3680-
3680+
36813681 bfb = OPENSSL_malloc (SIZE_16M );
36823682
36833683 /* u1 signature[4] 4643534D MSCF: 0-3 */
@@ -4522,7 +4522,7 @@ static int add_unauthenticated_blob(PKCS7 *sig)
45224522 const char prefix [] = "\x0c\x82\x04\x00---BEGIN_BLOB---" ;
45234523 const char postfix [] = "---END_BLOB---" ;
45244524 STACK_OF (PKCS7_SIGNER_INFO ) * signer_info = PKCS7_get_signer_info (sig );
4525-
4525+
45264526 if (!signer_info )
45274527 return 0 ; /* FAILED */
45284528 si = sk_PKCS7_SIGNER_INFO_value (sig -> d .sign -> signer_info , 0 );
@@ -4912,7 +4912,7 @@ static int read_password(GLOBAL_OPTIONS *options)
49124912 }
49134913 passbuf [passlen ] = 0x00 ;
49144914 if (!memcmp (passbuf , utf8_bom , sizeof utf8_bom )) {
4915- options -> pass = OPENSSL_strdup (passbuf + sizeof utf8_bom );
4915+ options -> pass = OPENSSL_strdup (passbuf + sizeof utf8_bom );
49164916 } else {
49174917 options -> pass = OPENSSL_strdup (passbuf );
49184918 }
@@ -6107,7 +6107,7 @@ int main(int argc, char **argv)
61076107 ret = append_signature (sig , cursig , type , & options , & msiparams , & padlen , & len , outdata );
61086108 if (ret )
61096109 DO_EXIT_0 ("Append signature to outfile failed\n" );
6110-
6110+
61116111skip_signing :
61126112
61136113 update_data_size (type , cmd , & header , padlen , len , outdata );
0 commit comments