aboutsummaryrefslogtreecommitdiffstats
path: root/g10/seskey.c
diff options
context:
space:
mode:
authorWerner Koch <[email protected]>2006-06-30 09:42:08 +0000
committerWerner Koch <[email protected]>2006-06-30 09:42:08 +0000
commit6c208fea3275e7d9244842811e8a5eefeb255e5f (patch)
treeb98d77626ae598b03138f84ff2b1682c7e8733db /g10/seskey.c
parentRemove stale lockfiles if created on the same node. (diff)
downloadgnupg-6c208fea3275e7d9244842811e8a5eefeb255e5f.tar.gz
gnupg-6c208fea3275e7d9244842811e8a5eefeb255e5f.zip
A couple of fixes. gpg2's key generation does now work.
Diffstat (limited to 'g10/seskey.c')
-rw-r--r--g10/seskey.c5
1 files changed, 2 insertions, 3 deletions
diff --git a/g10/seskey.c b/g10/seskey.c
index a31cbb15e..2ef00869f 100644
--- a/g10/seskey.c
+++ b/g10/seskey.c
@@ -220,8 +220,7 @@ encode_md_value (PKT_public_key *pk, PKT_secret_key *sk,
{
/* It's a DSA signature, so find out the size of q. */
- unsigned int qbytes = gcry_mpi_get_nbits (pk?pk->pkey[1]:sk->skey[1]);
- size_t n;
+ size_t qbytes = gcry_mpi_get_nbits (pk?pk->pkey[1]:sk->skey[1]);
/* Make sure it is a multiple of 8 bits. */
@@ -259,7 +258,7 @@ encode_md_value (PKT_public_key *pk, PKT_secret_key *sk,
}
if (gcry_mpi_scan (&frame, GCRYMPI_FMT_USG,
- gcry_md_read (md, hash_algo), n, &n))
+ gcry_md_read (md, hash_algo), qbytes, &qbytes))
BUG();
}
else