@@ -93,7 +93,7 @@ static int s_ssh_decode_ecdsa(const unsigned char *in, unsigned long *inlen, ltc
9393 LTC_SSHDATA_STRING , groupname , & groupnamelen ,
9494 LTC_SSHDATA_STRING , buf0 , & buf0len ,
9595 LTC_SSHDATA_STRING , buf1 , & buf1len ,
96- LTC_SSHDATA_EOL , NULL );
96+ LTC_SSHDATA_EOL , LTC_NULL );
9797 if (err == CRYPT_OK ) {
9898 key = buf1 ;
9999 keylen = buf1len ;
@@ -137,7 +137,7 @@ static int s_ssh_decode_ed25519(const unsigned char *in, unsigned long *inlen, l
137137
138138 if ((err = ssh_decode_sequence_multi (p , & cur_len ,
139139 LTC_SSHDATA_STRING , pubkey , & pubkeylen ,
140- LTC_SSHDATA_EOL , NULL )) != CRYPT_OK ) {
140+ LTC_SSHDATA_EOL , LTC_NULL )) != CRYPT_OK ) {
141141 goto cleanup ;
142142 }
143143
@@ -155,7 +155,7 @@ static int s_ssh_decode_ed25519(const unsigned char *in, unsigned long *inlen, l
155155
156156 if ((err = ssh_decode_sequence_multi (p , & cur_len ,
157157 LTC_SSHDATA_STRING , privkey , & privkeylen ,
158- LTC_SSHDATA_EOL , NULL )) != CRYPT_OK ) {
158+ LTC_SSHDATA_EOL , LTC_NULL )) != CRYPT_OK ) {
159159 goto cleanup ;
160160 }
161161 if ((err = ed25519_import_raw (privkey , privkeylen , PK_PRIVATE , & key -> u .ed25519 )) != CRYPT_OK ) {
@@ -195,7 +195,7 @@ static int s_ssh_decode_dsa(const unsigned char *in, unsigned long *inlen, ltc_p
195195 LTC_SSHDATA_MPINT , key -> u .dsa .q ,
196196 LTC_SSHDATA_MPINT , key -> u .dsa .g ,
197197 LTC_SSHDATA_MPINT , key -> u .dsa .y ,
198- LTC_SSHDATA_EOL , NULL )) != CRYPT_OK ) {
198+ LTC_SSHDATA_EOL , LTC_NULL )) != CRYPT_OK ) {
199199 goto cleanup ;
200200 }
201201 key -> u .dsa .qord = ltc_mp_unsigned_bin_size (key -> u .dsa .q );
@@ -219,7 +219,7 @@ static int s_ssh_decode_dsa(const unsigned char *in, unsigned long *inlen, ltc_p
219219
220220 if ((err = ssh_decode_sequence_multi (p , & cur_len ,
221221 LTC_SSHDATA_MPINT , key -> u .dsa .x ,
222- LTC_SSHDATA_EOL , NULL )) != CRYPT_OK ) {
222+ LTC_SSHDATA_EOL , LTC_NULL )) != CRYPT_OK ) {
223223 goto cleanup ;
224224 }
225225
@@ -262,7 +262,7 @@ static int s_ssh_decode_rsa(const unsigned char *in, unsigned long *inlen, ltc_p
262262 if ((err = ssh_decode_sequence_multi (p , & cur_len ,
263263 LTC_SSHDATA_MPINT , key -> u .rsa .N ,
264264 LTC_SSHDATA_MPINT , key -> u .rsa .e ,
265- LTC_SSHDATA_EOL , NULL )) != CRYPT_OK ) {
265+ LTC_SSHDATA_EOL , LTC_NULL )) != CRYPT_OK ) {
266266 goto cleanup ;
267267 }
268268
@@ -290,7 +290,7 @@ static int s_ssh_decode_rsa(const unsigned char *in, unsigned long *inlen, ltc_p
290290 LTC_SSHDATA_MPINT , key -> u .rsa .qP ,
291291 LTC_SSHDATA_MPINT , key -> u .rsa .p ,
292292 LTC_SSHDATA_MPINT , key -> u .rsa .q ,
293- LTC_SSHDATA_EOL , NULL )) != CRYPT_OK ) {
293+ LTC_SSHDATA_EOL , LTC_NULL )) != CRYPT_OK ) {
294294 goto cleanup_tmps ;
295295 }
296296
@@ -377,7 +377,7 @@ static int s_decode_key(const unsigned char *in, unsigned long *inlen, ltc_pka_k
377377 if ((err = ssh_decode_sequence_multi (p , & cur_len ,
378378 LTC_SSHDATA_UINT32 , & check1 ,
379379 LTC_SSHDATA_UINT32 , & check2 ,
380- LTC_SSHDATA_EOL , NULL )) != CRYPT_OK ) {
380+ LTC_SSHDATA_EOL , LTC_NULL )) != CRYPT_OK ) {
381381 return err ;
382382 }
383383 if (check1 != check2 ) {
@@ -390,7 +390,7 @@ static int s_decode_key(const unsigned char *in, unsigned long *inlen, ltc_pka_k
390390 }
391391 if ((err = ssh_decode_sequence_multi (p , & cur_len ,
392392 LTC_SSHDATA_STRING , pka , & pkalen ,
393- LTC_SSHDATA_EOL , NULL )) != CRYPT_OK ) {
393+ LTC_SSHDATA_EOL , LTC_NULL )) != CRYPT_OK ) {
394394 return err ;
395395 }
396396
@@ -427,7 +427,7 @@ static int s_decode_key(const unsigned char *in, unsigned long *inlen, ltc_pka_k
427427 }
428428 if ((err = ssh_decode_sequence_multi (p , & cur_len ,
429429 LTC_SSHDATA_STRING , c , & commentlen ,
430- LTC_SSHDATA_EOL , NULL )) != CRYPT_OK ) {
430+ LTC_SSHDATA_EOL , LTC_NULL )) != CRYPT_OK ) {
431431 return err ;
432432 }
433433 if (commentlen == 0 ) {
@@ -651,7 +651,7 @@ static int s_decode_header(unsigned char *in, unsigned long *inlen, struct kdf_o
651651 LTC_SSHDATA_STRING , kdfoptions , & kdfoptionslen ,
652652 LTC_SSHDATA_UINT32 , & num_keys ,
653653 LTC_SSHDATA_STRING , pubkey1 , & pubkey1len ,
654- LTC_SSHDATA_EOL , NULL )) != CRYPT_OK ) {
654+ LTC_SSHDATA_EOL , LTC_NULL )) != CRYPT_OK ) {
655655 return err ;
656656 }
657657 if (num_keys != 1 ) {
@@ -680,7 +680,7 @@ static int s_decode_header(unsigned char *in, unsigned long *inlen, struct kdf_o
680680 if ((err = ssh_decode_sequence_multi (kdfoptions , & len ,
681681 LTC_SSHDATA_STRING , opts -> salt , & opts -> saltlen ,
682682 LTC_SSHDATA_UINT32 , & opts -> num_rounds ,
683- LTC_SSHDATA_EOL , NULL )) != CRYPT_OK ) {
683+ LTC_SSHDATA_EOL , LTC_NULL )) != CRYPT_OK ) {
684684 return err ;
685685 }
686686 if (len != kdfoptionslen ) {
@@ -754,7 +754,7 @@ static int s_decode_openssh(struct get_char *g, ltc_pka_key *k, const password_c
754754
755755 if ((err = ssh_decode_sequence_multi (p , & w ,
756756 LTC_SSHDATA_STRING , privkey , & privkey_len ,
757- LTC_SSHDATA_EOL , NULL )) != CRYPT_OK ) {
757+ LTC_SSHDATA_EOL , LTC_NULL )) != CRYPT_OK ) {
758758 goto cleanup ;
759759 }
760760
0 commit comments