summaryrefslogtreecommitdiff
path: root/lib/auth_srp.c
diff options
context:
space:
mode:
authorNikos Mavrogiannopoulos <nmav@gnutls.org>2004-08-02 12:41:36 +0000
committerNikos Mavrogiannopoulos <nmav@gnutls.org>2004-08-02 12:41:36 +0000
commit6ce485da03986b24b33218981cf279a72577136e (patch)
treebf0b752851189f556e15fb8e0d1b6c72545521fb /lib/auth_srp.c
parent505c48d59876320578047b94a60dc9e97549302b (diff)
downloadgnutls-6ce485da03986b24b33218981cf279a72577136e.tar.gz
_gnutls_calc_srp_u() has been modified to be better.
Diffstat (limited to 'lib/auth_srp.c')
-rw-r--r--lib/auth_srp.c12
1 files changed, 2 insertions, 10 deletions
diff --git a/lib/auth_srp.c b/lib/auth_srp.c
index 671ec20fa0..a0ed00ff9d 100644
--- a/lib/auth_srp.c
+++ b/lib/auth_srp.c
@@ -245,7 +245,6 @@ int _gnutls_gen_srp_client_kx(gnutls_session_t session, opaque ** data)
int ret;
uint8 *data_a;
char *username, *password;
- size_t n_size = 0;
char buf[64];
const gnutls_srp_client_credentials_t cred =
_gnutls_get_cred(session->key, GNUTLS_CRD_SRP, NULL);
@@ -275,9 +274,6 @@ int _gnutls_gen_srp_client_kx(gnutls_session_t session, opaque ** data)
return GNUTLS_E_INSUFFICIENT_CREDENTIALS;
}
- /* get the size of n in bytes */
- _gnutls_mpi_print( NULL, &n_size, N);
-
A = _gnutls_calc_srp_A(&_a, G, N);
if (A == NULL) {
gnutls_assert();
@@ -288,7 +284,7 @@ int _gnutls_gen_srp_client_kx(gnutls_session_t session, opaque ** data)
*/
/* calculate u */
- session->key->u = _gnutls_calc_srp_u(A, B, n_size);
+ session->key->u = _gnutls_calc_srp_u(A, B, N);
if (session->key->u == NULL) {
gnutls_assert();
return GNUTLS_E_MEMORY_ERROR;
@@ -351,7 +347,6 @@ int _gnutls_proc_srp_client_kx(gnutls_session_t session, opaque * data,
size_t _n_A;
ssize_t data_size = _data_size;
int ret;
- size_t n_size = 0;
DECR_LEN(data_size, 2);
_n_A = _gnutls_read_uint16(&data[0]);
@@ -375,10 +370,7 @@ int _gnutls_proc_srp_client_kx(gnutls_session_t session, opaque * data,
/* Start the SRP calculations.
* - Calculate u
*/
- /* get the size of n in bytes */
- _gnutls_mpi_print( NULL, &n_size, N);
-
- session->key->u = _gnutls_calc_srp_u(A, B, n_size);
+ session->key->u = _gnutls_calc_srp_u(A, B, N);
if (session->key->u == NULL) {
gnutls_assert();
return GNUTLS_E_MEMORY_ERROR;