diff options
Diffstat (limited to 'cipher')
-rw-r--r-- | cipher/ChangeLog | 15 | ||||
-rw-r--r-- | cipher/ac.c | 18 | ||||
-rw-r--r-- | cipher/dsa.c | 10 | ||||
-rw-r--r-- | cipher/elgamal.c | 20 | ||||
-rw-r--r-- | cipher/primegen.c | 9 | ||||
-rw-r--r-- | cipher/pubkey.c | 27 |
6 files changed, 58 insertions, 41 deletions
diff --git a/cipher/ChangeLog b/cipher/ChangeLog index 4b0d28a7..d4439138 100644 --- a/cipher/ChangeLog +++ b/cipher/ChangeLog @@ -1,3 +1,18 @@ +2003-10-31 Werner Koch <wk@gnupg.org> + + * dsa.c (verify): s/exp/ex/ due to shadowing of a builtin. + * elgamal.c (verify): Ditto. + + * ac.c (gcry_ac_data_get_index): s/index/idx/ + (gcry_ac_data_copy_internal): Remove the cast in _gcry_malloc. + (gcry_ac_data_add): Must use gcry_realloc instead of realloc. + * pubkey.c (sexp_elements_extract): s/index/idx/ as tribute to the + forehackers. + (gcry_pk_encrypt): Removed shadowed definition of I. Reordered + arguments to malloc for clarity. + (gcry_pk_sign, gcry_pk_genkey): Ditto. + * primegen.c (prime_generate_internal): s/random/randomlevel/. + 2003-10-27 Moritz Schulte <mo@g10code.com> * pubkey.c (gcry_pk_encrypt): Don't forget to deallocate pkey. diff --git a/cipher/ac.c b/cipher/ac.c index a4b4bf56..4917a336 100644 --- a/cipher/ac.c +++ b/cipher/ac.c @@ -148,8 +148,8 @@ gcry_ac_data_add (gcry_ac_data_t data, gcry_ac_mpi_t *ac_mpis = NULL; /* Allocate. */ - ac_mpis = realloc (data->data, - sizeof (gcry_ac_mpi_t) * (data->data_n + 1)); + ac_mpis = gcry_realloc (data->data, + sizeof (gcry_ac_mpi_t) * (data->data_n + 1)); if (! ac_mpis) err = gpg_err_code_from_errno (errno); @@ -171,11 +171,13 @@ static gcry_err_code_t gcry_ac_data_copy_internal (gcry_ac_data_t *data_cp, gcry_ac_data_t data) { gcry_err_code_t err = GPG_ERR_NO_ERROR; - gcry_ac_data_t data_new = NULL; + gcry_ac_data_t data_new; + void *p = NULL; int i = 0; /* Allocate data set. */ - err = _gcry_malloc (sizeof (struct gcry_ac_data), 0, (void **) &data_new); + err = _gcry_malloc (sizeof (struct gcry_ac_data), 0, &p); + data_new = p; if (! err) data_new->data_n = data->data_n; @@ -639,17 +641,17 @@ gcry_ac_data_get_name (gcry_ac_data_t data, const char *name, returned MPI value will be released in case gcry_ac_data_set is used to associate the label NAME with a different MPI value. */ gcry_error_t -gcry_ac_data_get_index (gcry_ac_data_t data, unsigned int index, +gcry_ac_data_get_index (gcry_ac_data_t data, unsigned int idx, const char **name, gcry_mpi_t *mpi) { gcry_err_code_t err = GPG_ERR_NO_ERROR; - if (index < data->data_n) + if (idx < data->data_n) { if (name) - *name = data->data[index].name; + *name = data->data[idx].name; if (mpi) - *mpi = data->data[index].mpi; + *mpi = data->data[idx].mpi; } else err = GPG_ERR_NO_DATA; diff --git a/cipher/dsa.c b/cipher/dsa.c index a75413b1..11908d4f 100644 --- a/cipher/dsa.c +++ b/cipher/dsa.c @@ -313,7 +313,7 @@ verify(gcry_mpi_t r, gcry_mpi_t s, gcry_mpi_t hash, DSA_public_key *pkey ) int rc; gcry_mpi_t w, u1, u2, v; gcry_mpi_t base[3]; - gcry_mpi_t exp[3]; + gcry_mpi_t ex[3]; if( !(mpi_cmp_ui( r, 0 ) > 0 && mpi_cmp( r, pkey->q ) < 0) ) @@ -336,10 +336,10 @@ verify(gcry_mpi_t r, gcry_mpi_t s, gcry_mpi_t hash, DSA_public_key *pkey ) mpi_mulm( u2, r, w, pkey->q ); /* v = g^u1 * y^u2 mod p mod q */ - base[0] = pkey->g; exp[0] = u1; - base[1] = pkey->y; exp[1] = u2; - base[2] = NULL; exp[2] = NULL; - mpi_mulpowm( v, base, exp, pkey->p ); + base[0] = pkey->g; ex[0] = u1; + base[1] = pkey->y; ex[1] = u2; + base[2] = NULL; ex[2] = NULL; + mpi_mulpowm( v, base, ex, pkey->p ); mpi_fdiv_r( v, v, pkey->q ); rc = !mpi_cmp( v, r ); diff --git a/cipher/elgamal.c b/cipher/elgamal.c index 51e5c559..b902aba6 100644 --- a/cipher/elgamal.c +++ b/cipher/elgamal.c @@ -448,7 +448,7 @@ verify(gcry_mpi_t a, gcry_mpi_t b, gcry_mpi_t input, ELG_public_key *pkey ) gcry_mpi_t t1; gcry_mpi_t t2; gcry_mpi_t base[4]; - gcry_mpi_t exp[4]; + gcry_mpi_t ex[4]; if( !(mpi_cmp_ui( a, 0 ) > 0 && mpi_cmp( a, pkey->p ) < 0) ) return 0; /* assertion 0 < a < p failed */ @@ -468,10 +468,10 @@ verify(gcry_mpi_t a, gcry_mpi_t b, gcry_mpi_t input, ELG_public_key *pkey ) rc = !mpi_cmp( t1, t2 ); #elif 0 /* t1 = (y^a mod p) * (a^b mod p) mod p */ - base[0] = pkey->y; exp[0] = a; - base[1] = a; exp[1] = b; - base[2] = NULL; exp[2] = NULL; - mpi_mulpowm( t1, base, exp, pkey->p ); + base[0] = pkey->y; ex[0] = a; + base[1] = a; ex[1] = b; + base[2] = NULL; ex[2] = NULL; + mpi_mulpowm( t1, base, ex, pkey->p ); /* t2 = g ^ input mod p */ gcry_mpi_powm( t2, pkey->g, input, pkey->p ); @@ -480,11 +480,11 @@ verify(gcry_mpi_t a, gcry_mpi_t b, gcry_mpi_t input, ELG_public_key *pkey ) #else /* t1 = g ^ - input * y ^ a * a ^ b mod p */ mpi_invm(t2, pkey->g, pkey->p ); - base[0] = t2 ; exp[0] = input; - base[1] = pkey->y; exp[1] = a; - base[2] = a; exp[2] = b; - base[3] = NULL; exp[3] = NULL; - mpi_mulpowm( t1, base, exp, pkey->p ); + base[0] = t2 ; ex[0] = input; + base[1] = pkey->y; ex[1] = a; + base[2] = a; ex[2] = b; + base[3] = NULL; ex[3] = NULL; + mpi_mulpowm( t1, base, ex, pkey->p ); rc = !mpi_cmp_ui( t1, 1 ); #endif diff --git a/cipher/primegen.c b/cipher/primegen.c index ed3420d9..127e2800 100644 --- a/cipher/primegen.c +++ b/cipher/primegen.c @@ -188,7 +188,7 @@ prime_generate_internal (int mode, gcry_mpi_t *prime_generated, unsigned int pbits, unsigned int qbits, gcry_mpi_t g, gcry_mpi_t **ret_factors, - gcry_random_level_t random, unsigned int flags, + gcry_random_level_t randomlevel, unsigned int flags, int all_factors) { gcry_err_code_t err = 0; @@ -250,10 +250,10 @@ prime_generate_internal (int mode, prime = gcry_mpi_new (pbits); /* Generate first prime factor. */ - q = gen_prime (qbits, is_secret, random, NULL, NULL); + q = gen_prime (qbits, is_secret, randomlevel, NULL, NULL); if (mode == 1) - q_factor = gen_prime (req_qbits, is_secret, random, NULL, NULL); + q_factor = gen_prime (req_qbits, is_secret, randomlevel, NULL, NULL); /* Allocate an array to hold the factors + 2 for later usage. */ @@ -300,7 +300,8 @@ prime_generate_internal (int mode, for(i = 0; i < n; i++) { perms[i] = 1; - pool[i] = gen_prime (fbits, is_secret, random, NULL, NULL); + pool[i] = gen_prime (fbits, is_secret, + randomlevel, NULL, NULL); factors[i] = pool[i]; } } diff --git a/cipher/pubkey.c b/cipher/pubkey.c index 657e4c19..8197419c 100644 --- a/cipher/pubkey.c +++ b/cipher/pubkey.c @@ -684,29 +684,30 @@ sexp_elements_extract (gcry_sexp_t key_sexp, const char *element_names, gcry_mpi_t *elements) { gcry_err_code_t err = GPG_ERR_NO_ERROR; - int i, index; + int i, idx; const char *name; gcry_sexp_t list; - for (name = element_names, index = 0; *name && (! err); name++, index++) + for (name = element_names, idx = 0; *name && (! err); name++, idx++) { list = gcry_sexp_find_token (key_sexp, name, 1); if (! list) err = GPG_ERR_NO_OBJ; else { - elements[index] = gcry_sexp_nth_mpi (list, 1, GCRYMPI_FMT_USG); + elements[idx] = gcry_sexp_nth_mpi (list, 1, GCRYMPI_FMT_USG); gcry_sexp_release (list); - if (! elements[index]) + if (! elements[idx]) err = GPG_ERR_INV_OBJ; } } if (err) - for (i = 0; i < index; i++) - if (elements[i]) - gcry_free (elements[i]); - + { + for (i = 0; i < idx; i++) + if (elements[i]) + gcry_free (elements[i]); + } return err; } @@ -1398,8 +1399,7 @@ gcry_pk_encrypt (gcry_sexp_t *r_ciph, gcry_sexp_t s_data, gcry_sexp_t s_pkey) */ { - int i; - void **arg_list = malloc (sizeof (void *) * nelem); + void **arg_list = malloc (nelem * sizeof *arg_list); if (arg_list) { for (i = 0; i < nelem; i++) @@ -1621,8 +1621,7 @@ gcry_pk_sign (gcry_sexp_t *r_sig, gcry_sexp_t s_hash, gcry_sexp_t s_skey) strcpy (p, "))"); { - int i; - void **arg_list = malloc (sizeof (void *) * nelem); + void **arg_list = malloc (nelem * sizeof *arg_list); if (arg_list) { for (i = 0; i < nelem; i++) @@ -1950,8 +1949,8 @@ gcry_pk_genkey (gcry_sexp_t *r_key, gcry_sexp_t s_parms) mpis[nelem++] = NULL; { - int elem_n = strlen (pub_elems) + strlen (sec_elems), i; - void **arg_list = malloc (sizeof (void *) * nelem_cp); + int elem_n = strlen (pub_elems) + strlen (sec_elems); + void **arg_list = malloc (nelem_cp * sizeof *arg_list); if (arg_list) { for (i = 0; i < elem_n; i++) |