aboutsummaryrefslogtreecommitdiff
path: root/src/util/crypto_rsa.c
diff options
context:
space:
mode:
authorChristian Grothoff <grothoff@gnunet.org>2022-03-27 16:03:54 +0200
committerChristian Grothoff <grothoff@gnunet.org>2022-03-30 10:29:16 +0200
commit789a13e1d124694f36fa298de1d79c51d9073506 (patch)
treedcf796b679ac72850ee8ad883eeae47ee9b18519 /src/util/crypto_rsa.c
parentedf6f59fac12cd6f7d0a14ecf2a47ab82a8beb17 (diff)
downloadgnunet-789a13e1d124694f36fa298de1d79c51d9073506.tar.gz
gnunet-789a13e1d124694f36fa298de1d79c51d9073506.zip
-style fixes, no semantic changes
Diffstat (limited to 'src/util/crypto_rsa.c')
-rw-r--r--src/util/crypto_rsa.c8
1 files changed, 4 insertions, 4 deletions
diff --git a/src/util/crypto_rsa.c b/src/util/crypto_rsa.c
index 610e5febc..4b8e5a5ce 100644
--- a/src/util/crypto_rsa.c
+++ b/src/util/crypto_rsa.c
@@ -521,7 +521,7 @@ static struct RsaBlindingKey *
521rsa_blinding_key_derive (const struct GNUNET_CRYPTO_RsaPublicKey *pkey, 521rsa_blinding_key_derive (const struct GNUNET_CRYPTO_RsaPublicKey *pkey,
522 const struct GNUNET_CRYPTO_RsaBlindingKeySecret *bks) 522 const struct GNUNET_CRYPTO_RsaBlindingKeySecret *bks)
523{ 523{
524 char *xts = "Blinding KDF extractor HMAC key"; /* Trusts bks' randomness more */ 524 const char *xts = "Blinding KDF extractor HMAC key"; /* Trusts bks' randomness more */
525 struct RsaBlindingKey *blind; 525 struct RsaBlindingKey *blind;
526 gcry_mpi_t n; 526 gcry_mpi_t n;
527 527
@@ -766,8 +766,9 @@ rsa_full_domain_hash (const struct GNUNET_CRYPTO_RsaPublicKey *pkey,
766 /* We key with the public denomination key as a homage to RSA-PSS by * 766 /* We key with the public denomination key as a homage to RSA-PSS by *
767 * Mihir Bellare and Phillip Rogaway. Doing this lowers the degree * 767 * Mihir Bellare and Phillip Rogaway. Doing this lowers the degree *
768 * of the hypothetical polyomial-time attack on RSA-KTI created by a * 768 * of the hypothetical polyomial-time attack on RSA-KTI created by a *
769 * polynomial-time one-more forgary attack. Yey seeding! */ 769 * polynomial-time one-more forgary attack. Yey seeding! */
770 xts_len = GNUNET_CRYPTO_rsa_public_key_encode (pkey, &xts); 770 xts_len = GNUNET_CRYPTO_rsa_public_key_encode (pkey,
771 &xts);
771 772
772 GNUNET_CRYPTO_kdf_mod_mpi (&r, 773 GNUNET_CRYPTO_kdf_mod_mpi (&r,
773 n, 774 n,
@@ -775,7 +776,6 @@ rsa_full_domain_hash (const struct GNUNET_CRYPTO_RsaPublicKey *pkey,
775 hash, sizeof(*hash), 776 hash, sizeof(*hash),
776 "RSA-FDA FTpsW!"); 777 "RSA-FDA FTpsW!");
777 GNUNET_free (xts); 778 GNUNET_free (xts);
778
779 ok = rsa_gcd_validate (r, n); 779 ok = rsa_gcd_validate (r, n);
780 gcry_mpi_release (n); 780 gcry_mpi_release (n);
781 if (ok) 781 if (ok)