@@ -30,9 +30,9 @@ int dsa_set_pqg(const unsigned char *p, unsigned long plen,
3030 /* init key */
3131 if ((err = dsa_int_init (key )) != CRYPT_OK ) return err ;
3232
33- if ((err = mp_read_unsigned_bin (key -> p , ( unsigned char * ) p , plen )) != CRYPT_OK ) { goto LBL_ERR ; }
34- if ((err = mp_read_unsigned_bin (key -> g , ( unsigned char * ) g , glen )) != CRYPT_OK ) { goto LBL_ERR ; }
35- if ((err = mp_read_unsigned_bin (key -> q , ( unsigned char * ) q , qlen )) != CRYPT_OK ) { goto LBL_ERR ; }
33+ if ((err = mp_read_unsigned_bin (key -> p , p , plen )) != CRYPT_OK ) { goto LBL_ERR ; }
34+ if ((err = mp_read_unsigned_bin (key -> g , g , glen )) != CRYPT_OK ) { goto LBL_ERR ; }
35+ if ((err = mp_read_unsigned_bin (key -> q , q , qlen )) != CRYPT_OK ) { goto LBL_ERR ; }
3636
3737 key -> qord = mp_unsigned_bin_size (key -> q );
3838
@@ -75,12 +75,12 @@ int dsa_set_key(const unsigned char *in, unsigned long inlen, int type, dsa_key
7575
7676 if (type == PK_PRIVATE ) {
7777 key -> type = PK_PRIVATE ;
78- if ((err = mp_read_unsigned_bin (key -> x , ( unsigned char * ) in , inlen )) != CRYPT_OK ) { goto LBL_ERR ; }
78+ if ((err = mp_read_unsigned_bin (key -> x , in , inlen )) != CRYPT_OK ) { goto LBL_ERR ; }
7979 if ((err = mp_exptmod (key -> g , key -> x , key -> p , key -> y )) != CRYPT_OK ) { goto LBL_ERR ; }
8080 }
8181 else {
8282 key -> type = PK_PUBLIC ;
83- if ((err = mp_read_unsigned_bin (key -> y , ( unsigned char * ) in , inlen )) != CRYPT_OK ) { goto LBL_ERR ; }
83+ if ((err = mp_read_unsigned_bin (key -> y , in , inlen )) != CRYPT_OK ) { goto LBL_ERR ; }
8484 }
8585
8686 if ((err = dsa_int_validate_xy (key , & stat )) != CRYPT_OK ) { goto LBL_ERR ; }
0 commit comments