diff options
author | Moritz Schulte <mo@g10code.com> | 2003-07-14 22:36:44 +0000 |
---|---|---|
committer | Moritz Schulte <mo@g10code.com> | 2003-07-14 22:36:44 +0000 |
commit | a66dbf4c7a0f7c0f6b2fe0378c97605373428154 (patch) | |
tree | b833792b11097a48fbabed172ce981c57460ce9c /cipher/rsa.c | |
parent | 88920837676bf80c371ff950670fb2fa7bf58b24 (diff) | |
download | libgcrypt-a66dbf4c7a0f7c0f6b2fe0378c97605373428154.tar.gz |
2003-07-14 Moritz Schulte <moritz@g10code.com>
* cipher.c (gcry_cipher_lookup_func_name): Also check the cipher
name aliases, not just the primary name.
(gcry_cipher_map_name): Remove kludge for aliasing Rijndael to
AES.
* arcfour.c, blowfish.c, cast5.c, des.c, twofish.c: Adjust cipher
specification structures.
* rijndael.c (rijndael_names, rijndael192_names,
rijndael256_names): New variables, use them in the cipher
specifications.
* rmd160test.c: Removed file.
* ac.c, arcfour.c, blowfish.c, cast5.c, cipher.c, des.c, dsa.c,
elgamal.c, md.c, pubkey.c, random.c, rijndael.c, rsa.c, twofish.c:
Used gcry_err* wrappers for libgpg symbols.
* primegen.c (gen_prime): Correct the order arguments to
extra_check.
2003-07-12 Moritz Schulte <moritz@g10code.com>
* ac.c: Replaced all public occurences of gpg_error_t with
gcry_error_t.
* cipher.c: Likewise.
* md.c: Likewise.
* pubkey.c: Likewise.
* random.c: Likewise.
* cipher.c: Added support for TWOFISH128.
Diffstat (limited to 'cipher/rsa.c')
-rw-r--r-- | cipher/rsa.c | 16 |
1 files changed, 8 insertions, 8 deletions
diff --git a/cipher/rsa.c b/cipher/rsa.c index 1a5a8dc5..bd110b98 100644 --- a/cipher/rsa.c +++ b/cipher/rsa.c @@ -388,7 +388,7 @@ secret(gcry_mpi_t output, gcry_mpi_t input, RSA_secret_key *skey ) ************** interface ****************** *********************************************/ -gpg_err_code_t +gcry_err_code_t _gcry_rsa_generate (int algo, unsigned int nbits, unsigned long use_e, gcry_mpi_t *skey, gcry_mpi_t **retfactors) { @@ -409,10 +409,10 @@ _gcry_rsa_generate (int algo, unsigned int nbits, unsigned long use_e, } -gpg_err_code_t +gcry_err_code_t _gcry_rsa_check_secret_key( int algo, gcry_mpi_t *skey ) { - gpg_err_code_t err = GPG_ERR_NO_ERROR; + gcry_err_code_t err = GPG_ERR_NO_ERROR; RSA_secret_key sk; sk.n = skey[0]; @@ -429,7 +429,7 @@ _gcry_rsa_check_secret_key( int algo, gcry_mpi_t *skey ) } -gpg_err_code_t +gcry_err_code_t _gcry_rsa_encrypt (int algo, gcry_mpi_t *resarr, gcry_mpi_t data, gcry_mpi_t *pkey, int flags) { @@ -484,7 +484,7 @@ _gcry_rsa_unblind (gcry_mpi_t x, gcry_mpi_t ri, gcry_mpi_t n) return y; } -gpg_err_code_t +gcry_err_code_t _gcry_rsa_decrypt (int algo, gcry_mpi_t *result, gcry_mpi_t *data, gcry_mpi_t *skey, int flags) { @@ -559,7 +559,7 @@ _gcry_rsa_decrypt (int algo, gcry_mpi_t *result, gcry_mpi_t *data, gcry_mpi_t *s return GPG_ERR_NO_ERROR; } -gpg_err_code_t +gcry_err_code_t _gcry_rsa_sign (int algo, gcry_mpi_t *resarr, gcry_mpi_t data, gcry_mpi_t *skey) { RSA_secret_key sk; @@ -576,14 +576,14 @@ _gcry_rsa_sign (int algo, gcry_mpi_t *resarr, gcry_mpi_t data, gcry_mpi_t *skey) return GPG_ERR_NO_ERROR; } -gpg_err_code_t +gcry_err_code_t _gcry_rsa_verify (int algo, gcry_mpi_t hash, gcry_mpi_t *data, gcry_mpi_t *pkey, int (*cmp) (void *opaque, gcry_mpi_t tmp), void *opaquev) { RSA_public_key pk; gcry_mpi_t result; - gpg_err_code_t rc; + gcry_err_code_t rc; pk.n = pkey[0]; pk.e = pkey[1]; |