X-Git-Url: https://git.distorted.org.uk/u/mdw/catacomb/blobdiff_plain/bb2e2fd89f5577ebbaaf6b721a48dea9f27ea4cd..22bab86c9df047bdd258283c6567821319ba7a6f:/rsa-gen.c diff --git a/rsa-gen.c b/rsa-gen.c index 159357f..e3f5fda 100644 --- a/rsa-gen.c +++ b/rsa-gen.c @@ -1,6 +1,6 @@ /* -*-c-*- * - * $Id: rsa-gen.c,v 1.2 2000/06/17 12:05:15 mdw Exp $ + * $Id: rsa-gen.c,v 1.4 2000/10/08 12:11:22 mdw Exp $ * * RSA parameter generation * @@ -30,6 +30,12 @@ /*----- Revision history --------------------------------------------------* * * $Log: rsa-gen.c,v $ + * Revision 1.4 2000/10/08 12:11:22 mdw + * Use @MP_EQ@ instead of @MP_CMP@. + * + * Revision 1.3 2000/07/01 11:22:22 mdw + * Remove bad type name `rsa_param'. + * * Revision 1.2 2000/06/17 12:05:15 mdw * Lots of changes: * @@ -68,7 +74,7 @@ /* --- @rsa_gen@ --- * * - * Arguments: @rsa_param *rp@ = pointer to block to be filled in + * Arguments: @rsa_priv *rp@ = pointer to block to be filled in * @unsigned nbits@ = required modulus size in bits * @grand *r@ = random number source * @unsigned n@ = number of attempts to make @@ -82,7 +88,7 @@ * possible. */ -int rsa_gen(rsa_param *rp, unsigned nbits, grand *r, unsigned n, +int rsa_gen(rsa_priv *rp, unsigned nbits, grand *r, unsigned n, pgen_proc *event, void *ectx) { pgen_gcdstepctx g; @@ -180,7 +186,7 @@ again: */ mp_gcd(&g.g, 0, &rp->d, phi, rp->e); - if (MP_CMP(g.g, !=, MP_ONE) && MP_LEN(rp->d) * 4 > MP_LEN(rp->n) * 3) + if (!MP_EQ(g.g, MP_ONE) && MP_LEN(rp->d) * 4 > MP_LEN(rp->n) * 3) goto fail_e; /* --- Work out exponent residues --- */