From d2dc831499db3f3362e98795b9078975b9958581 Mon Sep 17 00:00:00 2001 From: rbuj Date: Wed, 27 Oct 2021 18:14:21 +0200 Subject: Use a blank line at most --- src/skey/btoe.c | 1 - src/skey/md4.c | 5 ----- src/skey/sha1.c | 1 - src/skey/skey.c | 1 - 4 files changed, 8 deletions(-) (limited to 'src/skey') diff --git a/src/skey/btoe.c b/src/skey/btoe.c index bad4e81..f08dd3c 100644 --- a/src/skey/btoe.c +++ b/src/skey/btoe.c @@ -274,7 +274,6 @@ char *btoe(unsigned char *md) } - /* * Extract 'length' bits from the char array 's' * starting with bit 'start' diff --git a/src/skey/md4.c b/src/skey/md4.c index 3c7fe82..ce8eb23 100644 --- a/src/skey/md4.c +++ b/src/skey/md4.c @@ -23,7 +23,6 @@ * written by Colin Plumb in 1993. */ - #include #include #include "config.h" @@ -36,7 +35,6 @@ #else static void byteReverse(unsigned char *buf, unsigned longs); - /* * Note: this code is harmless on little-endian machines. */ @@ -192,7 +190,6 @@ void MD4Final(unsigned char* digest, MD4_CTX *ctx) (a) = rotl32 ((a), (s)); \ } - /* * The core of the MD4 algorithm */ @@ -256,7 +253,6 @@ void MD4Transform(guint32 buf[4], guint32 const in[16]) HH(c, d, a, b, in[7], 11); /* 47 */ HH(b, c, d, a, in[15], 15); /* 48 */ - buf[0] += a; buf[1] += b; buf[2] += c; @@ -292,7 +288,6 @@ int MD4Keycrunch( char *result, const char *seed, const char *passphrase) return 0; } - void MD4SKey(char *x) { MD4_CTX md; diff --git a/src/skey/sha1.c b/src/skey/sha1.c index 4537781..12fb478 100644 --- a/src/skey/sha1.c +++ b/src/skey/sha1.c @@ -35,7 +35,6 @@ static void byteReverse(unsigned char *buf, unsigned longs) } #endif - int SHA1Keycrunch(char *result, const char *seed, const char *passphrase) { char *buf; diff --git a/src/skey/skey.c b/src/skey/skey.c index fde2d15..0d35f9f 100644 --- a/src/skey/skey.c +++ b/src/skey/skey.c @@ -23,7 +23,6 @@ static struct skey_hash hash_table[] = { SHA1Keycrunch, SHA1SKey } }; - char *skey(SKeyAlgorithm algorithm, int seq, const char *seed, const char *passphrase) { char key[SKEY_SIZE]; -- cgit v1.2.1