mirror of
https://github.com/OpenRCT2/OpenRCT2
synced 2026-01-24 15:24:30 +01:00
committed by
Michał Janiszewski
parent
b45d4f328b
commit
e0b875398b
@@ -305,7 +305,7 @@ std::string NetworkKey::PublicKeyString()
|
||||
* public key. Serves a purpose of easy identification keys in multiplayer
|
||||
* overview, multiplayer settings.
|
||||
*
|
||||
* In particular, any of digest functions applied to a standarised key
|
||||
* In particular, any of digest functions applied to a standardised key
|
||||
* representation, like PEM, will be sufficient.
|
||||
*
|
||||
* @return returns a string containing key hash.
|
||||
@@ -387,7 +387,7 @@ bool NetworkKey::Sign(const uint8 * md, const size_t len, char ** signature, siz
|
||||
/* Allocate memory for the signature based on size in slen */
|
||||
if ((sig = (unsigned char*)OPENSSL_malloc((sint32)(sizeof(unsigned char) * (*out_size)))) == NULL)
|
||||
{
|
||||
log_error("Failed to crypto-allocate space fo signature");
|
||||
log_error("Failed to crypto-allocate space for signature");
|
||||
EVP_MD_CTX_destroy(mdctx);
|
||||
return false;
|
||||
}
|
||||
@@ -419,7 +419,7 @@ bool NetworkKey::Verify(const uint8 * md, const size_t len, const char * sig, co
|
||||
|
||||
if (1 != EVP_DigestVerifyInit(mdctx, nullptr, EVP_sha256(), nullptr, _key))
|
||||
{
|
||||
log_error("Failed to initalise verification routine");
|
||||
log_error("Failed to initialise verification routine");
|
||||
EVP_MD_CTX_destroy(mdctx);
|
||||
return false;
|
||||
}
|
||||
@@ -435,7 +435,7 @@ bool NetworkKey::Verify(const uint8 * md, const size_t len, const char * sig, co
|
||||
if (1 == EVP_DigestVerifyFinal(mdctx, (uint8 *)sig, siglen))
|
||||
{
|
||||
EVP_MD_CTX_destroy(mdctx);
|
||||
log_verbose("Succesfully verified signature");
|
||||
log_verbose("Successfully verified signature");
|
||||
return true;
|
||||
}
|
||||
else
|
||||
|
||||
Reference in New Issue
Block a user