projects
/
u
/
mdw
/
catacomb
/ blobdiff
commit
grep
author
committer
pickaxe
?
search:
re
summary
|
shortlog
|
log
|
commit
|
commitdiff
|
tree
raw
|
inline
| side by side
First glimmerings of binary polynomial arithmetic.
[u/mdw/catacomb]
/
dsig.c
diff --git
a/dsig.c
b/dsig.c
index
e591538
..
a1e945d
100644
(file)
--- a/
dsig.c
+++ b/
dsig.c
@@
-1,6
+1,6
@@
/* -*-c-*-
*
/* -*-c-*-
*
- * $Id: dsig.c,v 1.
4 2000/08/04 23:23:44
mdw Exp $
+ * $Id: dsig.c,v 1.
5 2000/10/08 12:12:09
mdw Exp $
*
* Verify signatures on distribuitions of files
*
*
* Verify signatures on distribuitions of files
*
@@
-30,6
+30,9
@@
/*----- Revision history --------------------------------------------------*
*
* $Log: dsig.c,v $
/*----- Revision history --------------------------------------------------*
*
* $Log: dsig.c,v $
+ * Revision 1.5 2000/10/08 12:12:09 mdw
+ * Shut up some warnings.
+ *
* Revision 1.4 2000/08/04 23:23:44 mdw
* Various <ctype.h> fixes.
*
* Revision 1.4 2000/08/04 23:23:44 mdw
* Various <ctype.h> fixes.
*
@@
-101,7
+104,7
@@
static int dsasign(key *k, const void *m, size_t msz, dstr *d)
if (sz < msz)
die(EXIT_FAILURE, "hash function too wide for this signing key");
DENSURE(d, sz * 2);
if (sz < msz)
die(EXIT_FAILURE, "hash function too wide for this signing key");
DENSURE(d, sz * 2);
- p = d->buf + d->len;
+ p =
(octet *)
d->buf + d->len;
rand_get(RAND_GLOBAL, p, sz);
dsa_sign(&dp.dp, dp.x, m, msz, p, sz, p, sz, p + sz, sz);
d->len += sz * 2;
rand_get(RAND_GLOBAL, p, sz);
dsa_sign(&dp.dp, dp.x, m, msz, p, sz, p, sz, p + sz, sz);
d->len += sz * 2;
@@
-116,6
+119,7
@@
static int dsaverify(key *k, const void *m, size_t msz,
key_packstruct ks[DSA_PUBFETCHSZ];
key_packdef *kp;
size_t sz;
key_packstruct ks[DSA_PUBFETCHSZ];
key_packdef *kp;
size_t sz;
+ const octet *p = s;
int e;
kp = key_fetchinit(dsa_pubfetch, ks, &dp);
int e;
kp = key_fetchinit(dsa_pubfetch, ks, &dp);
@@
-124,7
+128,7
@@
static int dsaverify(key *k, const void *m, size_t msz,
return (e);
}
sz = ssz / 2;
return (e);
}
sz = ssz / 2;
- e = dsa_verify(&dp.dp, dp.y, m, msz,
s, sz, s
+ sz, sz);
+ e = dsa_verify(&dp.dp, dp.y, m, msz,
p, sz, p
+ sz, sz);
key_fetchdone(kp);
return (e);
}
key_fetchdone(kp);
return (e);
}
@@
-816,14
+820,14
@@
static void keyreport(const char *file, int line, const char *err, void *p)
*
* Arguments: @const gchash *c@ = pointer to hash class
* @const char *file@ = file to hash
*
* Arguments: @const gchash *c@ = pointer to hash class
* @const char *file@ = file to hash
- * @
octet
*b@ = pointer to output buffer
+ * @
void
*b@ = pointer to output buffer
*
* Returns: Zero if it worked, or nonzero for a system error.
*
* Use: Hashes a file.
*/
*
* Returns: Zero if it worked, or nonzero for a system error.
*
* Use: Hashes a file.
*/
-static int fhash(const gchash *c, const char *file,
octet
*b)
+static int fhash(const gchash *c, const char *file,
void
*b)
{
FILE *fp = fopen(file, "rb");
ghash *h = c->init();
{
FILE *fp = fopen(file, "rb");
ghash *h = c->init();
@@
-1133,7
+1137,7
@@
static int verify(int argc, char *argv[])
sig *s = sigtab;
const gchash *gch = &rmd160;
dstr d = DSTR_INIT;
sig *s = sigtab;
const gchash *gch = &rmd160;
dstr d = DSTR_INIT;
- ghash *h;
+ ghash *h
= 0
;
FILE *fp;
block b;
int e;
FILE *fp;
block b;
int e;