summaryrefslogtreecommitdiff
path: root/Userland/Libraries/LibCrypto/PK
diff options
context:
space:
mode:
authorLinus Groh <mail@linusgroh.de>2021-02-25 21:10:47 +0100
committerAndreas Kling <kling@serenityos.org>2021-02-26 16:59:56 +0100
commite265054c12a4fb596b26789e18f342711cf3ef95 (patch)
tree6539a9026bea3294693a9ae932b3528b3761d695 /Userland/Libraries/LibCrypto/PK
parentbe9df404fd180e1b3cab0c1bddce1f589de8e9f0 (diff)
downloadserenity-e265054c12a4fb596b26789e18f342711cf3ef95.zip
Everywhere: Remove a bunch of redundant 'AK::' namespace prefixes
This is basically just for consistency, it's quite strange to see multiple AK container types next to each other, some with and some without the namespace prefix - we're 'using AK::Foo;' a lot and should leverage that. :^)
Diffstat (limited to 'Userland/Libraries/LibCrypto/PK')
-rw-r--r--Userland/Libraries/LibCrypto/PK/Code/EMSA_PSS.h2
-rw-r--r--Userland/Libraries/LibCrypto/PK/RSA.cpp4
2 files changed, 3 insertions, 3 deletions
diff --git a/Userland/Libraries/LibCrypto/PK/Code/EMSA_PSS.h b/Userland/Libraries/LibCrypto/PK/Code/EMSA_PSS.h
index 95e6e58008..3812e000f9 100644
--- a/Userland/Libraries/LibCrypto/PK/Code/EMSA_PSS.h
+++ b/Userland/Libraries/LibCrypto/PK/Code/EMSA_PSS.h
@@ -57,7 +57,7 @@ public:
auto em_length = (em_bits + 7) / 8;
u8 salt[SaltLength];
- AK::fill_with_random(salt, SaltLength);
+ fill_with_random(salt, SaltLength);
if (em_length < hash_length + SaltLength + 2) {
dbgln("Ooops...encoding error");
diff --git a/Userland/Libraries/LibCrypto/PK/RSA.cpp b/Userland/Libraries/LibCrypto/PK/RSA.cpp
index b4b90c187b..2a5b7960b4 100644
--- a/Userland/Libraries/LibCrypto/PK/RSA.cpp
+++ b/Userland/Libraries/LibCrypto/PK/RSA.cpp
@@ -358,12 +358,12 @@ void RSA_PKCS1_EME::encrypt(ReadonlyBytes in, Bytes& out)
// FIXME: Without this assertion, GCC refuses to compile due to a memcpy overflow(!?)
VERIFY(ps_length < 16384);
- AK::fill_with_random(ps, ps_length);
+ fill_with_random(ps, ps_length);
// since arc4random can create zeros (shocking!)
// we have to go through and un-zero the zeros
for (size_t i = 0; i < ps_length; ++i)
while (!ps[i])
- AK::fill_with_random(ps + i, 1);
+ fill_with_random(ps + i, 1);
u8 paddings[] { 0x00, 0x02 };