diff options
author | moneromooo-monero <moneromooo-monero@users.noreply.github.com> | 2016-05-13 20:45:20 +0100 |
---|---|---|
committer | moneromooo-monero <moneromooo-monero@users.noreply.github.com> | 2016-08-28 21:26:54 +0100 |
commit | 9b1afe5f2d488c64e3fb5e087055cf66d2165391 (patch) | |
tree | a61056d713db439c80617296b9b3031cb67bd744 /src/crypto/keccak.c | |
parent | Merge pull request #991 (diff) | |
download | monero-9b1afe5f2d488c64e3fb5e087055cf66d2165391.tar.xz |
ringct: import of Shen Noether's ring confidential transactions
Diffstat (limited to '')
-rw-r--r-- | src/crypto/keccak.c | 6 |
1 files changed, 3 insertions, 3 deletions
diff --git a/src/crypto/keccak.c b/src/crypto/keccak.c index 3ee2a887c..090d563a2 100644 --- a/src/crypto/keccak.c +++ b/src/crypto/keccak.c @@ -73,11 +73,11 @@ void keccakf(uint64_t st[25], int rounds) // compute a keccak hash (md) of given byte length from "in" typedef uint64_t state_t[25]; -int keccak(const uint8_t *in, int inlen, uint8_t *md, int mdlen) +int keccak(const uint8_t *in, size_t inlen, uint8_t *md, int mdlen) { state_t st; uint8_t temp[144]; - int i, rsiz, rsizw; + size_t i, rsiz, rsizw; rsiz = sizeof(state_t) == mdlen ? HASH_DATA_AREA : 200 - 2 * mdlen; rsizw = rsiz / 8; @@ -106,7 +106,7 @@ int keccak(const uint8_t *in, int inlen, uint8_t *md, int mdlen) return 0; } -void keccak1600(const uint8_t *in, int inlen, uint8_t *md) +void keccak1600(const uint8_t *in, size_t inlen, uint8_t *md) { keccak(in, inlen, md, sizeof(state_t)); } |