From cbeb0b26e4c7caa8d1b47de791a7418dc20a4567 Mon Sep 17 00:00:00 2001 From: rsc Date: Sat, 1 Apr 2006 19:24:03 +0000 Subject: Use gcc -ansi -pedantic in 9c. Fix many non-C89-isms. --- src/libmp/port/mpextendedgcd.c | 18 +++++++++--------- 1 file changed, 9 insertions(+), 9 deletions(-) (limited to 'src/libmp/port/mpextendedgcd.c') diff --git a/src/libmp/port/mpextendedgcd.c b/src/libmp/port/mpextendedgcd.c index 413a05c2..712db170 100644 --- a/src/libmp/port/mpextendedgcd.c +++ b/src/libmp/port/mpextendedgcd.c @@ -3,12 +3,12 @@ #define iseven(a) (((a)->p[0] & 1) == 0) -// extended binary gcd -// -// For a anv b it solves, v = gcd(a,b) and finds x and y s.t. -// ax + by = v -// -// Handbook of Applied Cryptography, Menezes et al, 1997, pg 608. +/* extended binary gcd */ +/* */ +/* For a anv b it solves, v = gcd(a,b) and finds x and y s.t. */ +/* ax + by = v */ +/* */ +/* Handbook of Applied Cryptography, Menezes et al, 1997, pg 608. */ void mpextendedgcd(mpint *a, mpint *b, mpint *v, mpint *x, mpint *y) { @@ -53,7 +53,7 @@ mpextendedgcd(mpint *a, mpint *b, mpint *v, mpint *x, mpint *y) D = mpcopy(mpone); for(;;) { -// print("%B %B %B %B %B %B\n", u, v, A, B, C, D); +/* print("%B %B %B %B %B %B\n", u, v, A, B, C, D); */ while(iseven(u)){ mpright(u, 1, u); if(!iseven(A) || !iseven(B)) { @@ -64,7 +64,7 @@ mpextendedgcd(mpint *a, mpint *b, mpint *v, mpint *x, mpint *y) mpright(B, 1, B); } -// print("%B %B %B %B %B %B\n", u, v, A, B, C, D); +/* print("%B %B %B %B %B %B\n", u, v, A, B, C, D); */ while(iseven(v)){ mpright(v, 1, v); if(!iseven(C) || !iseven(D)) { @@ -75,7 +75,7 @@ mpextendedgcd(mpint *a, mpint *b, mpint *v, mpint *x, mpint *y) mpright(D, 1, D); } -// print("%B %B %B %B %B %B\n", u, v, A, B, C, D); +/* print("%B %B %B %B %B %B\n", u, v, A, B, C, D); */ if(mpcmp(u, v) >= 0){ mpsub(u, v, u); mpsub(A, C, A); -- cgit v1.2.3