diff options
author | Julius Bünger <buenger@mytum.de> | 2019-04-26 05:56:54 +0200 |
---|---|---|
committer | Julius Bünger <buenger@mytum.de> | 2019-04-26 05:56:54 +0200 |
commit | f5f5a9f680df2cebe6435ec87650cb3cb6e3ef6e (patch) | |
tree | 94055d2c049a65b5ab6c61fd3c5867fe49f6f429 /src/secretsharing/gnunet-service-secretsharing.c | |
parent | a097690795f4f814de7cdbc97ef95fb899eeacd3 (diff) | |
download | gnunet-f5f5a9f680df2cebe6435ec87650cb3cb6e3ef6e.tar.gz gnunet-f5f5a9f680df2cebe6435ec87650cb3cb6e3ef6e.zip |
memcmp() -> GNUNET_memcmp(), first take
Diffstat (limited to 'src/secretsharing/gnunet-service-secretsharing.c')
-rw-r--r-- | src/secretsharing/gnunet-service-secretsharing.c | 13 |
1 files changed, 6 insertions, 7 deletions
diff --git a/src/secretsharing/gnunet-service-secretsharing.c b/src/secretsharing/gnunet-service-secretsharing.c index 1ffde0436..d136c5a68 100644 --- a/src/secretsharing/gnunet-service-secretsharing.c +++ b/src/secretsharing/gnunet-service-secretsharing.c | |||
@@ -330,7 +330,7 @@ get_keygen_peer_info (const struct KeygenSession *ks, | |||
330 | { | 330 | { |
331 | unsigned int i; | 331 | unsigned int i; |
332 | for (i = 0; i < ks->num_peers; i++) | 332 | for (i = 0; i < ks->num_peers; i++) |
333 | if (0 == memcmp (peer, &ks->info[i].peer, sizeof (struct GNUNET_PeerIdentity))) | 333 | if (0 == GNUNET_memcmp (peer, &ks->info[i].peer)) |
334 | return &ks->info[i]; | 334 | return &ks->info[i]; |
335 | return NULL; | 335 | return NULL; |
336 | } | 336 | } |
@@ -349,7 +349,7 @@ get_decrypt_peer_info (const struct DecryptSession *ds, | |||
349 | { | 349 | { |
350 | unsigned int i; | 350 | unsigned int i; |
351 | for (i = 0; i < ds->share->num_peers; i++) | 351 | for (i = 0; i < ds->share->num_peers; i++) |
352 | if (0 == memcmp (peer, &ds->info[i].peer, sizeof (struct GNUNET_PeerIdentity))) | 352 | if (0 == GNUNET_memcmp (peer, &ds->info[i].peer)) |
353 | return &ds->info[i]; | 353 | return &ds->info[i]; |
354 | return NULL; | 354 | return NULL; |
355 | } | 355 | } |
@@ -411,9 +411,8 @@ peer_find (const struct GNUNET_PeerIdentity *haystack, unsigned int n, | |||
411 | unsigned int i; | 411 | unsigned int i; |
412 | 412 | ||
413 | for (i = 0; i < n; i++) | 413 | for (i = 0; i < n; i++) |
414 | if (0 == memcmp (&haystack[i], | 414 | if (0 == GNUNET_memcmp (&haystack[i], |
415 | needle, | 415 | needle)) |
416 | sizeof (struct GNUNET_PeerIdentity))) | ||
417 | return i; | 416 | return i; |
418 | return -1; | 417 | return -1; |
419 | } | 418 | } |
@@ -827,7 +826,7 @@ keygen_round2_conclude (void *cls) | |||
827 | GNUNET_SECRETSHARING_ELGAMAL_BITS / 8, | 826 | GNUNET_SECRETSHARING_ELGAMAL_BITS / 8, |
828 | ks->info[i].sigma); | 827 | ks->info[i].sigma); |
829 | share->original_indices[i] = j; | 828 | share->original_indices[i] = j; |
830 | if (0 == memcmp (&share->peers[i], &my_peer, sizeof (struct GNUNET_PeerIdentity))) | 829 | if (0 == GNUNET_memcmp (&share->peers[i], &my_peer)) |
831 | share->my_peer = j; | 830 | share->my_peer = j; |
832 | j += 1; | 831 | j += 1; |
833 | } | 832 | } |
@@ -1897,7 +1896,7 @@ decrypt_new_element (void *cls, | |||
1897 | return; | 1896 | return; |
1898 | } | 1897 | } |
1899 | 1898 | ||
1900 | if (0 != memcmp (&d->ciphertext, &session->ciphertext, sizeof (struct GNUNET_SECRETSHARING_Ciphertext))) | 1899 | if (0 != GNUNET_memcmp (&d->ciphertext, &session->ciphertext)) |
1901 | { | 1900 | { |
1902 | GNUNET_log (GNUNET_ERROR_TYPE_WARNING, "P%u: got decrypt element with non-matching ciphertext from P%u\n", | 1901 | GNUNET_log (GNUNET_ERROR_TYPE_WARNING, "P%u: got decrypt element with non-matching ciphertext from P%u\n", |
1903 | (unsigned int) session->share->my_peer, (unsigned int) (info - session->info)); | 1902 | (unsigned int) session->share->my_peer, (unsigned int) (info - session->info)); |