Skip to content

Commit

Permalink
Remove unnecessary argument names
Browse files Browse the repository at this point in the history
  • Loading branch information
gperciva committed Jun 27, 2024
1 parent defd0ee commit 264183d
Show file tree
Hide file tree
Showing 4 changed files with 9 additions and 11 deletions.
12 changes: 6 additions & 6 deletions lib/crypto/crypto_compat.h
Original file line number Diff line number Diff line change
Expand Up @@ -7,26 +7,26 @@
* crypto_compat_RSA_valid_size(key):
* Return nonzero if ${key} has a valid size, and zero for an invalid size.
*/
int crypto_compat_RSA_valid_size(const RSA * const key);
int crypto_compat_RSA_valid_size(const RSA * const);

/**
* crypto_compat_RSA_import(key, n, e, d, p, q, dmp1, dmq1, iqmp):
* Import the given BIGNUMs into the RSA ${key}. If this function fails,
* free any any BIGNUMs which have not been imported into the ${key}, but do
* not free the ${key} itself.
*/
int crypto_compat_RSA_import(RSA * key, BIGNUM * n, BIGNUM * e, BIGNUM * d,
BIGNUM * p, BIGNUM * q, BIGNUM * dmp1, BIGNUM * dmq1, BIGNUM * iqmp);
int crypto_compat_RSA_import(RSA *, BIGNUM *, BIGNUM *, BIGNUM *,
BIGNUM *, BIGNUM *, BIGNUM *, BIGNUM *, BIGNUM *);

/**
* crypto_compat_RSA_export(key, n, e, d, p, q, dmp1, dmq1, iqmp):
* Export values from the given RSA ${key} into the BIGNUMs. ${n} and ${e}
* must be non-NULL; the other values may be NULL if desired, and will
* therefore not be exported.
*/
int crypto_compat_RSA_export(RSA * key, const BIGNUM ** n, const BIGNUM ** e,
const BIGNUM ** d, const BIGNUM ** p, const BIGNUM ** q,
const BIGNUM ** dmp1, const BIGNUM ** dmq1, const BIGNUM ** iqmp);
int crypto_compat_RSA_export(RSA *, const BIGNUM **, const BIGNUM **,
const BIGNUM **, const BIGNUM **, const BIGNUM **,
const BIGNUM **, const BIGNUM **, const BIGNUM **);

/**
* crypto_compat_RSA_generate_key(void):
Expand Down
2 changes: 1 addition & 1 deletion lib/keyfile/keyfile.h
Original file line number Diff line number Diff line change
Expand Up @@ -16,7 +16,7 @@
* method to read the passphrase, using ${passphrase_arg} if applicable.
*/
int keyfile_read(const char *, uint64_t *, int, int, enum passphrase_entry,
const char * passphrase_arg);
const char *);

/**
* keyfile_write(filename, machinenum, keys, passphrase, maxmem, cputime):
Expand Down
3 changes: 1 addition & 2 deletions tar/chunks/chunks_internal.h
Original file line number Diff line number Diff line change
Expand Up @@ -93,8 +93,7 @@ void chunks_stats_zero(struct chunkstats *);
* Adjust ${stats} for the addition of ${copies} chunks each having length
* ${len} and compressed length ${zlen}.
*/
void chunks_stats_add(struct chunkstats *, size_t len, size_t zlen,
ssize_t copies);
void chunks_stats_add(struct chunkstats *, size_t, size_t, ssize_t);

/**
* chunks_stats_addstats(to, from):
Expand Down
3 changes: 1 addition & 2 deletions tar/glue/archive_multitape.h
Original file line number Diff line number Diff line change
Expand Up @@ -26,8 +26,7 @@ void * archive_read_open_multitape(struct archive *, uint64_t, const char *);
* Return a cookie which can be passed to the multitape layer.
*/
void * archive_write_open_multitape(struct archive *, uint64_t, const char *,
const char *, int argc, char ** argv, int, int, time_t, const char *,
int *);
const char *, int, char **, int, int, time_t, const char *, int *);

/**
* archive_write_multitape_setmode(a, cookie, mode):
Expand Down

0 comments on commit 264183d

Please sign in to comment.