diff options
author | lloyd <[email protected]> | 2010-09-13 15:21:31 +0000 |
---|---|---|
committer | lloyd <[email protected]> | 2010-09-13 15:21:31 +0000 |
commit | 4a7e9edcc92b08a285ea24549fd8c813d10b63b9 (patch) | |
tree | 569e357cbc1bd2b195c1b10b281f6c0bbf01fd33 /src/math/numbertheory/dsa_gen.cpp | |
parent | 27d79c87365105d6128afe9eaf8a82383976ed44 (diff) |
First set of changes for avoiding use implicit vector->pointer conversions
Diffstat (limited to 'src/math/numbertheory/dsa_gen.cpp')
-rw-r--r-- | src/math/numbertheory/dsa_gen.cpp | 6 |
1 files changed, 3 insertions, 3 deletions
diff --git a/src/math/numbertheory/dsa_gen.cpp b/src/math/numbertheory/dsa_gen.cpp index 535c22976..e88af0d87 100644 --- a/src/math/numbertheory/dsa_gen.cpp +++ b/src/math/numbertheory/dsa_gen.cpp @@ -98,10 +98,10 @@ bool generate_dsa_primes(RandomNumberGenerator& rng, { ++seed; hash->update(seed); - hash->final(V + HASH_SIZE * (n-k)); + hash->final(&V[HASH_SIZE * (n-k)]); } - X.binary_decode(V + (HASH_SIZE - 1 - b/8), + X.binary_decode(&V[HASH_SIZE - 1 - b/8], V.size() - (HASH_SIZE - 1 - b/8)); X.set_bit(pbits-1); @@ -125,7 +125,7 @@ SecureVector<byte> generate_dsa_primes(RandomNumberGenerator& rng, while(true) { - rng.randomize(seed, seed.size()); + rng.randomize(&seed[0], seed.size()); if(generate_dsa_primes(rng, af, p, q, pbits, qbits, seed)) return seed; |