diff options
Diffstat (limited to '')
-rw-r--r-- | g10/seckey-cert.c | 10 |
1 files changed, 5 insertions, 5 deletions
diff --git a/g10/seckey-cert.c b/g10/seckey-cert.c index 7f76b31e8..ab1034051 100644 --- a/g10/seckey-cert.c +++ b/g10/seckey-cert.c @@ -60,7 +60,7 @@ static int check_elg( PKT_secret_cert *cert ) { byte *buffer; - u16 n, csum=0; + u16 csum=0; int res; unsigned nbytes; u32 keyid[2]; @@ -73,7 +73,7 @@ check_elg( PKT_secret_cert *cert ) BLOWFISH_context *blowfish_ctx=NULL; switch( cert->d.elg.protect_algo ) { - case CIPHER_ALGO_NONE: log_bug(NULL); break; + case CIPHER_ALGO_NONE: BUG(); break; case CIPHER_ALGO_BLOWFISH: keyid_from_skc( cert, keyid ); dek = get_passphrase_hash( keyid, NULL ); @@ -142,7 +142,7 @@ protect_elg( PKT_secret_cert *cert, DEK *dek ) BLOWFISH_context *blowfish_ctx=NULL; switch( cert->d.elg.protect_algo ) { - case CIPHER_ALGO_NONE: log_bug(NULL); break; + case CIPHER_ALGO_NONE: BUG(); break; case CIPHER_ALGO_BLOWFISH: blowfish_ctx = m_alloc_secure( sizeof *blowfish_ctx ); blowfish_setkey( blowfish_ctx, dek->key, dek->keylen ); @@ -171,7 +171,7 @@ static int check_rsa( PKT_secret_cert *cert ) { byte *buffer; - u16 n, csum=0; + u16 csum=0; int res; unsigned nbytes; u32 keyid[2]; @@ -183,7 +183,7 @@ check_rsa( PKT_secret_cert *cert ) switch( cert->d.rsa.protect_algo ) { /* FIXME: use test variables to check for the correct key */ - case CIPHER_ALGO_NONE: log_bug(NULL); break; + case CIPHER_ALGO_NONE: BUG(); break; case CIPHER_ALGO_BLOWFISH: keyid_from_skc( cert, keyid ); dek = get_passphrase_hash( keyid, NULL ); |