diff options
author | Linus Groh <mail@linusgroh.de> | 2021-02-25 21:10:47 +0100 |
---|---|---|
committer | Andreas Kling <kling@serenityos.org> | 2021-02-26 16:59:56 +0100 |
commit | e265054c12a4fb596b26789e18f342711cf3ef95 (patch) | |
tree | 6539a9026bea3294693a9ae932b3528b3761d695 /Userland/Libraries/LibCrypto/PK | |
parent | be9df404fd180e1b3cab0c1bddce1f589de8e9f0 (diff) | |
download | serenity-e265054c12a4fb596b26789e18f342711cf3ef95.zip |
Everywhere: Remove a bunch of redundant 'AK::' namespace prefixes
This is basically just for consistency, it's quite strange to see
multiple AK container types next to each other, some with and some
without the namespace prefix - we're 'using AK::Foo;' a lot and should
leverage that. :^)
Diffstat (limited to 'Userland/Libraries/LibCrypto/PK')
-rw-r--r-- | Userland/Libraries/LibCrypto/PK/Code/EMSA_PSS.h | 2 | ||||
-rw-r--r-- | Userland/Libraries/LibCrypto/PK/RSA.cpp | 4 |
2 files changed, 3 insertions, 3 deletions
diff --git a/Userland/Libraries/LibCrypto/PK/Code/EMSA_PSS.h b/Userland/Libraries/LibCrypto/PK/Code/EMSA_PSS.h index 95e6e58008..3812e000f9 100644 --- a/Userland/Libraries/LibCrypto/PK/Code/EMSA_PSS.h +++ b/Userland/Libraries/LibCrypto/PK/Code/EMSA_PSS.h @@ -57,7 +57,7 @@ public: auto em_length = (em_bits + 7) / 8; u8 salt[SaltLength]; - AK::fill_with_random(salt, SaltLength); + fill_with_random(salt, SaltLength); if (em_length < hash_length + SaltLength + 2) { dbgln("Ooops...encoding error"); diff --git a/Userland/Libraries/LibCrypto/PK/RSA.cpp b/Userland/Libraries/LibCrypto/PK/RSA.cpp index b4b90c187b..2a5b7960b4 100644 --- a/Userland/Libraries/LibCrypto/PK/RSA.cpp +++ b/Userland/Libraries/LibCrypto/PK/RSA.cpp @@ -358,12 +358,12 @@ void RSA_PKCS1_EME::encrypt(ReadonlyBytes in, Bytes& out) // FIXME: Without this assertion, GCC refuses to compile due to a memcpy overflow(!?) VERIFY(ps_length < 16384); - AK::fill_with_random(ps, ps_length); + fill_with_random(ps, ps_length); // since arc4random can create zeros (shocking!) // we have to go through and un-zero the zeros for (size_t i = 0; i < ps_length; ++i) while (!ps[i]) - AK::fill_with_random(ps + i, 1); + fill_with_random(ps + i, 1); u8 paddings[] { 0x00, 0x02 }; |