diff --git a/Telegram/SourceFiles/base/openssl_help.h b/Telegram/SourceFiles/base/openssl_help.h index 847021f2d..c17b60c69 100644 --- a/Telegram/SourceFiles/base/openssl_help.h +++ b/Telegram/SourceFiles/base/openssl_help.h @@ -83,11 +83,18 @@ public: } } void setBytes(base::const_byte_span bytes) { - if (!BN_bin2bn(reinterpret_cast(bytes.data()), bytes.size(), raw())) { + if (!BN_bin2bn( + reinterpret_cast(bytes.data()), + bytes.size(), + raw())) { _failed = true; } } - void setModExp(const BigNum &a, const BigNum &p, const BigNum &m, const Context &context = Context()) { + void setModExp( + const BigNum &a, + const BigNum &p, + const BigNum &m, + const Context &context = Context()) { if (a.failed() || p.failed() || m.failed()) { _failed = true; } else if (a.isNegative() || p.isNegative() || m.isNegative()) { @@ -134,7 +141,11 @@ public: return false; } constexpr auto kMillerRabinIterationCount = 30; - auto result = BN_is_prime_ex(raw(), kMillerRabinIterationCount, context.raw(), NULL); + auto result = BN_is_prime_ex( + raw(), + kMillerRabinIterationCount, + context.raw(), + NULL); if (result == 1) { return true; } else if (result != 0) { @@ -169,7 +180,9 @@ public: } auto length = BN_num_bytes(raw()); auto result = base::byte_vector(length, gsl::byte()); - auto resultSize = BN_bn2bin(raw(), reinterpret_cast(result.data())); + auto resultSize = BN_bn2bin( + raw(), + reinterpret_cast(result.data())); Assert(resultSize == length); return result; } diff --git a/Telegram/SourceFiles/mtproto/connection.cpp b/Telegram/SourceFiles/mtproto/connection.cpp index 131d07f26..b34e2f463 100644 --- a/Telegram/SourceFiles/mtproto/connection.cpp +++ b/Telegram/SourceFiles/mtproto/connection.cpp @@ -154,7 +154,10 @@ bool IsPrimeAndGood(base::const_byte_span primeBytes, int g) { return IsPrimeAndGoodCheck(openssl::BigNum(primeBytes), g); } -std::vector CreateAuthKey(base::const_byte_span firstBytes, base::const_byte_span randomBytes, base::const_byte_span primeBytes) { +std::vector CreateAuthKey( + base::const_byte_span firstBytes, + base::const_byte_span randomBytes, + base::const_byte_span primeBytes) { using openssl::BigNum; BigNum first(firstBytes); BigNum prime(primeBytes); @@ -165,7 +168,10 @@ std::vector CreateAuthKey(base::const_byte_span firstBytes, base::con return BigNum::ModExp(first, BigNum(randomBytes), prime).getBytes(); } -ModExpFirst CreateModExp(int g, base::const_byte_span primeBytes, base::const_byte_span randomSeed) { +ModExpFirst CreateModExp( + int g, + base::const_byte_span primeBytes, + base::const_byte_span randomSeed) { Expects(randomSeed.size() == ModExpFirst::kRandomPowerSize); using namespace openssl; diff --git a/Telegram/SourceFiles/mtproto/rsa_public_key.cpp b/Telegram/SourceFiles/mtproto/rsa_public_key.cpp index d2d689ede..5e3cca8fe 100644 --- a/Telegram/SourceFiles/mtproto/rsa_public_key.cpp +++ b/Telegram/SourceFiles/mtproto/rsa_public_key.cpp @@ -72,12 +72,14 @@ namespace internal { class RSAPublicKey::Private { public: - Private(base::const_byte_span key) : _rsa(PEM_read_bio_RSAPublicKey(BIO_new_mem_buf(const_cast(key.data()), key.size()), 0, 0, 0)) { + Private(base::const_byte_span key) + : _rsa(PEM_read_bio_RSAPublicKey(BIO_new_mem_buf(const_cast(key.data()), key.size()), 0, 0, 0)) { if (_rsa) { computeFingerprint(); } } - Private(base::const_byte_span nBytes, base::const_byte_span eBytes) : _rsa(RSA_new()) { + Private(base::const_byte_span nBytes, base::const_byte_span eBytes) + : _rsa(RSA_new()) { if (_rsa) { auto n = openssl::BigNum(nBytes).takeRaw(); auto e = openssl::BigNum(eBytes).takeRaw();