aboutsummaryrefslogtreecommitdiffstats
path: root/g10/seckey-cert.c
diff options
context:
space:
mode:
authorWerner Koch <[email protected]>2003-07-28 08:59:18 +0000
committerWerner Koch <[email protected]>2003-07-28 08:59:18 +0000
commit979ed0ca26a5ae5538fc5b2aad0a8f2cdd2aae86 (patch)
treecb331e2255292830b8ecfa68fa38005c98f7b2b4 /g10/seckey-cert.c
parent* g10.c: New command --card-status. (diff)
downloadgnupg-979ed0ca26a5ae5538fc5b2aad0a8f2cdd2aae86.tar.gz
gnupg-979ed0ca26a5ae5538fc5b2aad0a8f2cdd2aae86.zip
Adjusted for use with current libgcrypt (1.1.42).
Diffstat (limited to 'g10/seckey-cert.c')
-rw-r--r--g10/seckey-cert.c9
1 files changed, 4 insertions, 5 deletions
diff --git a/g10/seckey-cert.c b/g10/seckey-cert.c
index 65be7a468..c9bddd2ff 100644
--- a/g10/seckey-cert.c
+++ b/g10/seckey-cert.c
@@ -161,10 +161,9 @@ do_check( PKT_secret_key *sk, const char *tryagain_text, int mode,
because the length may have an arbitrary value */
if( sk->csum == csum ) {
for( ; i < pubkey_get_nskey(sk->pubkey_algo); i++ ) {
- nbytes = ndata;
assert( gcry_is_secure( p ) );
res = gcry_mpi_scan( &sk->skey[i], GCRYMPI_FMT_PGP,
- p, &nbytes);
+ p, ndata, &nbytes);
if( res )
log_bug ("gcry_mpi_scan failed in do_check: %s\n",
gpg_strerror (res));
@@ -197,7 +196,7 @@ do_check( PKT_secret_key *sk, const char *tryagain_text, int mode,
csum += checksum (buffer, ndata);
gcry_mpi_release (sk->skey[i]);
res = gcry_mpi_scan( &sk->skey[i], GCRYMPI_FMT_USG,
- buffer, &ndata );
+ buffer, ndata, &ndata );
if( res )
log_bug ("gcry_mpi_scan failed in do_check: %s\n",
gpg_strerror (res));
@@ -352,7 +351,7 @@ protect_secret_key( PKT_secret_key *sk, DEK *dek )
GCRY_STRONG_RANDOM);
gcry_cipher_setiv( cipher_hd, sk->protect.iv, sk->protect.ivlen );
if( sk->version >= 4 ) {
- byte *bufarr[PUBKEY_MAX_NSKEY];
+ unsigned char *bufarr[PUBKEY_MAX_NSKEY];
unsigned narr[PUBKEY_MAX_NSKEY];
unsigned nbits[PUBKEY_MAX_NSKEY];
int ndata=0;
@@ -363,7 +362,7 @@ protect_secret_key( PKT_secret_key *sk, DEK *dek )
assert( !gcry_mpi_get_flag( sk->skey[i],
GCRYMPI_FLAG_OPAQUE ));
- if( gcry_mpi_aprint( GCRYMPI_FMT_USG, (void**)bufarr+j,
+ if( gcry_mpi_aprint( GCRYMPI_FMT_USG, bufarr+j,
narr+j, sk->skey[i]))
BUG();