summaryrefslogtreecommitdiff
path: root/cipher/elgamal.c
diff options
context:
space:
mode:
authorMoritz Schulte <mo@g10code.com>2003-07-14 22:36:44 +0000
committerMoritz Schulte <mo@g10code.com>2003-07-14 22:36:44 +0000
commita66dbf4c7a0f7c0f6b2fe0378c97605373428154 (patch)
treeb833792b11097a48fbabed172ce981c57460ce9c /cipher/elgamal.c
parent88920837676bf80c371ff950670fb2fa7bf58b24 (diff)
downloadlibgcrypt-a66dbf4c7a0f7c0f6b2fe0378c97605373428154.tar.gz
2003-07-14 Moritz Schulte <moritz@g10code.com>
* cipher.c (gcry_cipher_lookup_func_name): Also check the cipher name aliases, not just the primary name. (gcry_cipher_map_name): Remove kludge for aliasing Rijndael to AES. * arcfour.c, blowfish.c, cast5.c, des.c, twofish.c: Adjust cipher specification structures. * rijndael.c (rijndael_names, rijndael192_names, rijndael256_names): New variables, use them in the cipher specifications. * rmd160test.c: Removed file. * ac.c, arcfour.c, blowfish.c, cast5.c, cipher.c, des.c, dsa.c, elgamal.c, md.c, pubkey.c, random.c, rijndael.c, rsa.c, twofish.c: Used gcry_err* wrappers for libgpg symbols. * primegen.c (gen_prime): Correct the order arguments to extra_check. 2003-07-12 Moritz Schulte <moritz@g10code.com> * ac.c: Replaced all public occurences of gpg_error_t with gcry_error_t. * cipher.c: Likewise. * md.c: Likewise. * pubkey.c: Likewise. * random.c: Likewise. * cipher.c: Added support for TWOFISH128.
Diffstat (limited to 'cipher/elgamal.c')
-rw-r--r--cipher/elgamal.c22
1 files changed, 11 insertions, 11 deletions
diff --git a/cipher/elgamal.c b/cipher/elgamal.c
index e1b20740..04c37330 100644
--- a/cipher/elgamal.c
+++ b/cipher/elgamal.c
@@ -498,7 +498,7 @@ verify(gcry_mpi_t a, gcry_mpi_t b, gcry_mpi_t input, ELG_public_key *pkey )
************** interface ******************
*********************************************/
-gpg_err_code_t
+gcry_err_code_t
_gcry_elg_generate (int algo, unsigned nbits, unsigned long dummy,
gcry_mpi_t *skey, gcry_mpi_t **retfactors)
{
@@ -514,10 +514,10 @@ _gcry_elg_generate (int algo, unsigned nbits, unsigned long dummy,
}
-gpg_err_code_t
+gcry_err_code_t
_gcry_elg_check_secret_key (int algo, gcry_mpi_t *skey)
{
- gpg_err_code_t err = GPG_ERR_NO_ERROR;
+ gcry_err_code_t err = GPG_ERR_NO_ERROR;
ELG_secret_key sk;
if ((! skey[0]) || (! skey[1]) || (! skey[2]) || (! skey[3]))
@@ -537,10 +537,10 @@ _gcry_elg_check_secret_key (int algo, gcry_mpi_t *skey)
}
-gpg_err_code_t
+gcry_err_code_t
_gcry_elg_encrypt (int algo, gcry_mpi_t *resarr, gcry_mpi_t data, gcry_mpi_t *pkey, int flags)
{
- gpg_err_code_t err = GPG_ERR_NO_ERROR;
+ gcry_err_code_t err = GPG_ERR_NO_ERROR;
ELG_public_key pk;
if ((! data) || (! pkey[0]) || (! pkey[1]) || (! pkey[2]))
@@ -558,10 +558,10 @@ _gcry_elg_encrypt (int algo, gcry_mpi_t *resarr, gcry_mpi_t data, gcry_mpi_t *pk
}
-gpg_err_code_t
+gcry_err_code_t
_gcry_elg_decrypt (int algo, gcry_mpi_t *result, gcry_mpi_t *data, gcry_mpi_t *skey, int flags)
{
- gpg_err_code_t err = GPG_ERR_NO_ERROR;
+ gcry_err_code_t err = GPG_ERR_NO_ERROR;
ELG_secret_key sk;
if ((! data[0]) || (! data[1])
@@ -580,10 +580,10 @@ _gcry_elg_decrypt (int algo, gcry_mpi_t *result, gcry_mpi_t *data, gcry_mpi_t *s
}
-gpg_err_code_t
+gcry_err_code_t
_gcry_elg_sign (int algo, gcry_mpi_t *resarr, gcry_mpi_t data, gcry_mpi_t *skey)
{
- gpg_err_code_t err = GPG_ERR_NO_ERROR;
+ gcry_err_code_t err = GPG_ERR_NO_ERROR;
ELG_secret_key sk;
if ((! data)
@@ -603,11 +603,11 @@ _gcry_elg_sign (int algo, gcry_mpi_t *resarr, gcry_mpi_t data, gcry_mpi_t *skey)
return err;
}
-gpg_err_code_t
+gcry_err_code_t
_gcry_elg_verify (int algo, gcry_mpi_t hash, gcry_mpi_t *data, gcry_mpi_t *pkey,
int (*cmp) (void *, gcry_mpi_t), void *opaquev)
{
- gpg_err_code_t err = GPG_ERR_NO_ERROR;
+ gcry_err_code_t err = GPG_ERR_NO_ERROR;
ELG_public_key pk;
if ((! data[0]) || (! data[1]) || (! hash)