nettle_mpz_sizeinbase_256. Updated all callers.
Rev: src/nettle/bignum-random.c:1.2
Rev: src/nettle/dsa-keygen.c:1.4
Rev: src/nettle/dsa.c:1.3
Rev: src/nettle/pgp-encode.c:1.3
Rev: src/nettle/rsa-compat.c:1.5
Rev: src/nettle/rsa-encrypt.c:1.3
Rev: src/nettle/rsa_md5.c:1.7
Rev: src/nettle/rsa_sha1.c:1.7
random(ctx, length, data);
- nettle_mpz_set_str_256(x, length, data);
+ nettle_mpz_set_str_256_u(x, length, data);
if (bits % 8)
mpz_fdiv_r_2exp(x, x, bits);
h1[0] |= 0x80;
h1[SHA1_DIGEST_SIZE - 1] |= 1;
- nettle_mpz_set_str_256(q, SHA1_DIGEST_SIZE, h1);
+ nettle_mpz_set_str_256_u(q, SHA1_DIGEST_SIZE, h1);
/* The spec says that we should use 18 iterations of
* miller-rabin. For performance, we want to do some trial
mpz_add_ui(t, t, j + k);
hash(t, buffer + ( (n-k) * SHA1_DIGEST_SIZE));
}
- nettle_mpz_set_str_256(p, size, buffer);
+ nettle_mpz_set_str_256_u(p, size, buffer);
mpz_fdiv_r_2exp(p, p, L);
mpz_setbit(p, L-1);
uint8_t digest[SHA1_DIGEST_SIZE];
sha1_digest(hash, sizeof(digest), digest);
- nettle_mpz_set_str_256(x, sizeof(digest), digest);
+ nettle_mpz_set_str_256_u(x, sizeof(digest), digest);
}
#endif /* WITH_PUBLIC_KEY */
if (!p)
return 0;
- nettle_mpz_set_str_256(x, octets, p);
+ nettle_mpz_set_str_256_u(x, octets, p);
return 1;
}
struct rsa_private_key k;
int res;
- nettle_mpz_init_set_str_256(k.p,
- MAX_RSA_MODULUS_LEN, key->prime[0]);
- nettle_mpz_init_set_str_256(k.q,
- MAX_RSA_MODULUS_LEN, key->prime[1]);
- nettle_mpz_init_set_str_256(k.a,
- MAX_RSA_MODULUS_LEN, key->primeExponent[0]);
- nettle_mpz_init_set_str_256(k.b,
- MAX_RSA_MODULUS_LEN, key->primeExponent[1]);
- nettle_mpz_init_set_str_256(k.c,
- MAX_RSA_MODULUS_LEN, key->coefficient);
+ nettle_mpz_init_set_str_256_u(k.p,
+ MAX_RSA_MODULUS_LEN, key->prime[0]);
+ nettle_mpz_init_set_str_256_u(k.q,
+ MAX_RSA_MODULUS_LEN, key->prime[1]);
+ nettle_mpz_init_set_str_256_u(k.a,
+ MAX_RSA_MODULUS_LEN, key->primeExponent[0]);
+ nettle_mpz_init_set_str_256_u(k.b,
+ MAX_RSA_MODULUS_LEN, key->primeExponent[1]);
+ nettle_mpz_init_set_str_256_u(k.c,
+ MAX_RSA_MODULUS_LEN, key->coefficient);
if (rsa_prepare_private_key(&k) && (k.size <= MAX_RSA_MODULUS_LEN))
{
struct rsa_public_key k;
int res;
- nettle_mpz_init_set_str_256(k.n,
- MAX_RSA_MODULUS_LEN, key->modulus);
- nettle_mpz_init_set_str_256(k.e,
- MAX_RSA_MODULUS_LEN, key->exponent);
+ nettle_mpz_init_set_str_256_u(k.n,
+ MAX_RSA_MODULUS_LEN, key->modulus);
+ nettle_mpz_init_set_str_256_u(k.e,
+ MAX_RSA_MODULUS_LEN, key->exponent);
if (rsa_prepare_public_key(&k) && (k.size == length))
{
mpz_t s;
- nettle_mpz_init_set_str_256(s,
- k.size, signature);
+ nettle_mpz_init_set_str_256_u(s,
+ k.size, signature);
res = rsa_md5_verify(&k, &ctx->hash, s)
? RE_SUCCESS : RE_SIGNATURE;
memcpy(em + 1 + padding, message, length);
- nettle_mpz_set_str_256(gibbberish, key->size - 1, em);
+ nettle_mpz_set_str_256_u(gibbberish, key->size - 1, em);
mpz_powm(gibbberish, gibbberish, key->e, key->n);
return 1;
em[0] = 1;
memset(em + 1, 0xff, i - 1);
- nettle_mpz_set_str_256(m, length, em);
+ nettle_mpz_set_str_256_u(m, length, em);
}
#endif /* WITH_PUBLIC_KEY */
em[0] = 1;
memset(em + 1, 0xff, i - 1);
- nettle_mpz_set_str_256(m, length, em);
+ nettle_mpz_set_str_256_u(m, length, em);
}
#endif /* WITH_PUBLIC_KEY */