diff options
author | Werner Koch <[email protected]> | 2006-06-30 09:42:08 +0000 |
---|---|---|
committer | Werner Koch <[email protected]> | 2006-06-30 09:42:08 +0000 |
commit | 6c208fea3275e7d9244842811e8a5eefeb255e5f (patch) | |
tree | b98d77626ae598b03138f84ff2b1682c7e8733db /g10/seskey.c | |
parent | Remove stale lockfiles if created on the same node. (diff) | |
download | gnupg-6c208fea3275e7d9244842811e8a5eefeb255e5f.tar.gz gnupg-6c208fea3275e7d9244842811e8a5eefeb255e5f.zip |
A couple of fixes. gpg2's key generation does now work.
Diffstat (limited to 'g10/seskey.c')
-rw-r--r-- | g10/seskey.c | 5 |
1 files changed, 2 insertions, 3 deletions
diff --git a/g10/seskey.c b/g10/seskey.c index a31cbb15e..2ef00869f 100644 --- a/g10/seskey.c +++ b/g10/seskey.c @@ -220,8 +220,7 @@ encode_md_value (PKT_public_key *pk, PKT_secret_key *sk, { /* It's a DSA signature, so find out the size of q. */ - unsigned int qbytes = gcry_mpi_get_nbits (pk?pk->pkey[1]:sk->skey[1]); - size_t n; + size_t qbytes = gcry_mpi_get_nbits (pk?pk->pkey[1]:sk->skey[1]); /* Make sure it is a multiple of 8 bits. */ @@ -259,7 +258,7 @@ encode_md_value (PKT_public_key *pk, PKT_secret_key *sk, } if (gcry_mpi_scan (&frame, GCRYMPI_FMT_USG, - gcry_md_read (md, hash_algo), n, &n)) + gcry_md_read (md, hash_algo), qbytes, &qbytes)) BUG(); } else |