aboutsummaryrefslogtreecommitdiffstats
path: root/src/crypto/crypto_null.c
diff options
context:
space:
mode:
authorMichael Brown <mcb30@ipxe.org>2024-08-18 10:43:52 +0100
committerMichael Brown <mcb30@ipxe.org>2024-08-18 15:44:38 +0100
commit53f089b723e16eecb4fd2e2a59b74b3932431b30 (patch)
treeb18d3ae4d8de119a6afb23c01ea3e9df069a0173 /src/crypto/crypto_null.c
parent950f6b5861d8d6b247b37e4e1401d26d8f908ee8 (diff)
downloadipxe-53f089b723e16eecb4fd2e2a59b74b3932431b30.tar.gz
[crypto] Pass asymmetric keys as ASN.1 cursors
Asymmetric keys are invariably encountered within ASN.1 structures such as X.509 certificates, and the various large integers within an RSA key are themselves encoded using ASN.1. Simplify all code handling asymmetric keys by passing keys as a single ASN.1 cursor, rather than separate data and length pointers. Signed-off-by: Michael Brown <mcb30@ipxe.org>
Diffstat (limited to 'src/crypto/crypto_null.c')
-rw-r--r--src/crypto/crypto_null.c4
1 files changed, 2 insertions, 2 deletions
diff --git a/src/crypto/crypto_null.c b/src/crypto/crypto_null.c
index 0ad463c3e..b4169382b 100644
--- a/src/crypto/crypto_null.c
+++ b/src/crypto/crypto_null.c
@@ -93,8 +93,8 @@ struct cipher_algorithm cipher_null = {
.auth = cipher_null_auth,
};
-int pubkey_null_init ( void *ctx __unused, const void *key __unused,
- size_t key_len __unused ) {
+int pubkey_null_init ( void *ctx __unused,
+ const struct asn1_cursor *key __unused ) {
return 0;
}