aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorChristian Grothoff <christian@grothoff.org>2018-05-30 10:29:24 +0200
committerChristian Grothoff <christian@grothoff.org>2018-05-30 10:29:24 +0200
commit14e3e037972140889deb5bf2e90931af7e6b5ec9 (patch)
tree59f5833f44d10b42352590aa9d86706ace3c49ea
parent30fb422df59da0e650eb790933dadbd4bb189658 (diff)
downloadgnunet-14e3e037972140889deb5bf2e90931af7e6b5ec9.tar.gz
gnunet-14e3e037972140889deb5bf2e90931af7e6b5ec9.zip
style fix
-rw-r--r--src/util/crypto_rsa.c7
1 files changed, 3 insertions, 4 deletions
diff --git a/src/util/crypto_rsa.c b/src/util/crypto_rsa.c
index a985d8e59..bbd6c95ea 100644
--- a/src/util/crypto_rsa.c
+++ b/src/util/crypto_rsa.c
@@ -94,7 +94,6 @@ key_from_sexp (gcry_mpi_t *array,
94 gcry_sexp_t list; 94 gcry_sexp_t list;
95 gcry_sexp_t l2; 95 gcry_sexp_t l2;
96 const char *s; 96 const char *s;
97 unsigned int i;
98 unsigned int idx; 97 unsigned int idx;
99 98
100 if (! (list = gcry_sexp_find_token (sexp, topname, 0))) 99 if (! (list = gcry_sexp_find_token (sexp, topname, 0)))
@@ -109,7 +108,7 @@ key_from_sexp (gcry_mpi_t *array,
109 { 108 {
110 if (! (l2 = gcry_sexp_find_token (list, s, 1))) 109 if (! (l2 = gcry_sexp_find_token (list, s, 1)))
111 { 110 {
112 for (i = 0; i < idx; i++) 111 for (unsigned int i = 0; i < idx; i++)
113 { 112 {
114 gcry_free (array[i]); 113 gcry_free (array[i]);
115 array[i] = NULL; 114 array[i] = NULL;
@@ -121,7 +120,7 @@ key_from_sexp (gcry_mpi_t *array,
121 gcry_sexp_release (l2); 120 gcry_sexp_release (l2);
122 if (! array[idx]) 121 if (! array[idx])
123 { 122 {
124 for (i = 0; i < idx; i++) 123 for (unsigned int i = 0; i < idx; i++)
125 { 124 {
126 gcry_free (array[i]); 125 gcry_free (array[i]);
127 array[i] = NULL; 126 array[i] = NULL;
@@ -720,7 +719,7 @@ rsa_full_domain_hash (const struct GNUNET_CRYPTO_RsaPublicKey *pkey,
720 * @param pkey the public key of the signer 719 * @param pkey the public key of the signer
721 * @param[out] buf set to a buffer with the blinded message to be signed 720 * @param[out] buf set to a buffer with the blinded message to be signed
722 * @param[out] buf_size number of bytes stored in @a buf 721 * @param[out] buf_size number of bytes stored in @a buf
723 * @return GNUNET_YES if successful, GNUNET_NO if RSA key is malicious 722 * @return #GNUNET_YES if successful, #GNUNET_NO if RSA key is malicious
724 */ 723 */
725int 724int
726GNUNET_CRYPTO_rsa_blind (const struct GNUNET_HashCode *hash, 725GNUNET_CRYPTO_rsa_blind (const struct GNUNET_HashCode *hash,