Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Remove unnecessary argument names #615

Merged
merged 1 commit into from
Jun 27, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
12 changes: 6 additions & 6 deletions lib/crypto/crypto_compat.h
Original file line number Diff line number Diff line change
Expand Up @@ -7,26 +7,26 @@
* crypto_compat_RSA_valid_size(key):
* Return nonzero if ${key} has a valid size, and zero for an invalid size.
*/
int crypto_compat_RSA_valid_size(const RSA * const key);
int crypto_compat_RSA_valid_size(const RSA * const);

/**
* crypto_compat_RSA_import(key, n, e, d, p, q, dmp1, dmq1, iqmp):
* Import the given BIGNUMs into the RSA ${key}. If this function fails,
* free any any BIGNUMs which have not been imported into the ${key}, but do
* not free the ${key} itself.
*/
int crypto_compat_RSA_import(RSA * key, BIGNUM * n, BIGNUM * e, BIGNUM * d,
BIGNUM * p, BIGNUM * q, BIGNUM * dmp1, BIGNUM * dmq1, BIGNUM * iqmp);
int crypto_compat_RSA_import(RSA *, BIGNUM *, BIGNUM *, BIGNUM *,
BIGNUM *, BIGNUM *, BIGNUM *, BIGNUM *, BIGNUM *);

/**
* crypto_compat_RSA_export(key, n, e, d, p, q, dmp1, dmq1, iqmp):
* Export values from the given RSA ${key} into the BIGNUMs. ${n} and ${e}
* must be non-NULL; the other values may be NULL if desired, and will
* therefore not be exported.
*/
int crypto_compat_RSA_export(RSA * key, const BIGNUM ** n, const BIGNUM ** e,
const BIGNUM ** d, const BIGNUM ** p, const BIGNUM ** q,
const BIGNUM ** dmp1, const BIGNUM ** dmq1, const BIGNUM ** iqmp);
int crypto_compat_RSA_export(RSA *, const BIGNUM **, const BIGNUM **,
const BIGNUM **, const BIGNUM **, const BIGNUM **,
const BIGNUM **, const BIGNUM **, const BIGNUM **);

/**
* crypto_compat_RSA_generate_key(void):
Expand Down
2 changes: 1 addition & 1 deletion lib/keyfile/keyfile.h
Original file line number Diff line number Diff line change
Expand Up @@ -16,7 +16,7 @@
* method to read the passphrase, using ${passphrase_arg} if applicable.
*/
int keyfile_read(const char *, uint64_t *, int, int, enum passphrase_entry,
const char * passphrase_arg);
const char *);

/**
* keyfile_write(filename, machinenum, keys, passphrase, maxmem, cputime):
Expand Down
3 changes: 1 addition & 2 deletions tar/chunks/chunks_internal.h
Original file line number Diff line number Diff line change
Expand Up @@ -93,8 +93,7 @@ void chunks_stats_zero(struct chunkstats *);
* Adjust ${stats} for the addition of ${copies} chunks each having length
* ${len} and compressed length ${zlen}.
*/
void chunks_stats_add(struct chunkstats *, size_t len, size_t zlen,
ssize_t copies);
void chunks_stats_add(struct chunkstats *, size_t, size_t, ssize_t);

/**
* chunks_stats_addstats(to, from):
Expand Down
3 changes: 1 addition & 2 deletions tar/glue/archive_multitape.h
Original file line number Diff line number Diff line change
Expand Up @@ -26,8 +26,7 @@ void * archive_read_open_multitape(struct archive *, uint64_t, const char *);
* Return a cookie which can be passed to the multitape layer.
*/
void * archive_write_open_multitape(struct archive *, uint64_t, const char *,
const char *, int argc, char ** argv, int, int, time_t, const char *,
int *);
const char *, int, char **, int, int, time_t, const char *, int *);

/**
* archive_write_multitape_setmode(a, cookie, mode):
Expand Down
Loading