diff options
author | Christian Grothoff <grothoff@gnunet.org> | 2022-03-27 16:03:54 +0200 |
---|---|---|
committer | Christian Grothoff <grothoff@gnunet.org> | 2022-03-30 10:29:16 +0200 |
commit | 789a13e1d124694f36fa298de1d79c51d9073506 (patch) | |
tree | dcf796b679ac72850ee8ad883eeae47ee9b18519 /src/util/crypto_rsa.c | |
parent | edf6f59fac12cd6f7d0a14ecf2a47ab82a8beb17 (diff) | |
download | gnunet-789a13e1d124694f36fa298de1d79c51d9073506.tar.gz gnunet-789a13e1d124694f36fa298de1d79c51d9073506.zip |
-style fixes, no semantic changes
Diffstat (limited to 'src/util/crypto_rsa.c')
-rw-r--r-- | src/util/crypto_rsa.c | 8 |
1 files changed, 4 insertions, 4 deletions
diff --git a/src/util/crypto_rsa.c b/src/util/crypto_rsa.c index 610e5febc..4b8e5a5ce 100644 --- a/src/util/crypto_rsa.c +++ b/src/util/crypto_rsa.c | |||
@@ -521,7 +521,7 @@ static struct RsaBlindingKey * | |||
521 | rsa_blinding_key_derive (const struct GNUNET_CRYPTO_RsaPublicKey *pkey, | 521 | rsa_blinding_key_derive (const struct GNUNET_CRYPTO_RsaPublicKey *pkey, |
522 | const struct GNUNET_CRYPTO_RsaBlindingKeySecret *bks) | 522 | const struct GNUNET_CRYPTO_RsaBlindingKeySecret *bks) |
523 | { | 523 | { |
524 | char *xts = "Blinding KDF extractor HMAC key"; /* Trusts bks' randomness more */ | 524 | const char *xts = "Blinding KDF extractor HMAC key"; /* Trusts bks' randomness more */ |
525 | struct RsaBlindingKey *blind; | 525 | struct RsaBlindingKey *blind; |
526 | gcry_mpi_t n; | 526 | gcry_mpi_t n; |
527 | 527 | ||
@@ -766,8 +766,9 @@ rsa_full_domain_hash (const struct GNUNET_CRYPTO_RsaPublicKey *pkey, | |||
766 | /* We key with the public denomination key as a homage to RSA-PSS by * | 766 | /* We key with the public denomination key as a homage to RSA-PSS by * |
767 | * Mihir Bellare and Phillip Rogaway. Doing this lowers the degree * | 767 | * Mihir Bellare and Phillip Rogaway. Doing this lowers the degree * |
768 | * of the hypothetical polyomial-time attack on RSA-KTI created by a * | 768 | * of the hypothetical polyomial-time attack on RSA-KTI created by a * |
769 | * polynomial-time one-more forgary attack. Yey seeding! */ | 769 | * polynomial-time one-more forgary attack. Yey seeding! */ |
770 | xts_len = GNUNET_CRYPTO_rsa_public_key_encode (pkey, &xts); | 770 | xts_len = GNUNET_CRYPTO_rsa_public_key_encode (pkey, |
771 | &xts); | ||
771 | 772 | ||
772 | GNUNET_CRYPTO_kdf_mod_mpi (&r, | 773 | GNUNET_CRYPTO_kdf_mod_mpi (&r, |
773 | n, | 774 | n, |
@@ -775,7 +776,6 @@ rsa_full_domain_hash (const struct GNUNET_CRYPTO_RsaPublicKey *pkey, | |||
775 | hash, sizeof(*hash), | 776 | hash, sizeof(*hash), |
776 | "RSA-FDA FTpsW!"); | 777 | "RSA-FDA FTpsW!"); |
777 | GNUNET_free (xts); | 778 | GNUNET_free (xts); |
778 | |||
779 | ok = rsa_gcd_validate (r, n); | 779 | ok = rsa_gcd_validate (r, n); |
780 | gcry_mpi_release (n); | 780 | gcry_mpi_release (n); |
781 | if (ok) | 781 | if (ok) |