[or-cvs] change crypto_digest_new_env to crypto_new_digest_env
Roger Dingledine
arma at seul.org
Tue Dec 16 08:13:28 UTC 2003
Update of /home/or/cvsroot/src/common
In directory moria.mit.edu:/home2/arma/work/onion/cvs/src/common
Modified Files:
crypto.c crypto.h
Log Message:
change crypto_digest_new_env to crypto_new_digest_env
(and same with _free_)
to match our conventions
i think our conventions may be getting too ad hoc
Index: crypto.c
===================================================================
RCS file: /home/or/cvsroot/src/common/crypto.c,v
retrieving revision 1.48
retrieving revision 1.49
diff -u -d -r1.48 -r1.49
--- crypto.c 16 Dec 2003 05:47:21 -0000 1.48
+++ crypto.c 16 Dec 2003 08:13:26 -0000 1.49
@@ -66,8 +66,8 @@
static INLINE int
crypto_cipher_iv_length(int type) {
/*
- printf("%d -> %d IV\n",type, EVP_CIPHER_iv_length(
- crypto_cipher_evp_cipher(type,0)));
+ printf("%d -> %d IV\n",type,
+ EVP_CIPHER_iv_length(crypto_cipher_evp_cipher(type,0)));
*/
switch(type)
{
@@ -83,8 +83,8 @@
static INLINE int
crypto_cipher_key_length(int type) {
/*
- printf("%d -> %d\n",type, EVP_CIPHER_key_length(
- crypto_cipher_evp_cipher(type,0)));
+ printf("%d -> %d\n",type,
+ EVP_CIPHER_key_length(crypto_cipher_evp_cipher(type,0)));
*/
switch(type)
{
@@ -618,7 +618,7 @@
switch(env->type) {
case CRYPTO_PK_RSA:
return RSA_public_decrypt(fromlen, from, to, (RSA *)env->key,
- RSA_PKCS1_PADDING);
+ RSA_PKCS1_PADDING);
default:
return -1;
}
@@ -633,7 +633,7 @@
if (!(((RSA*)env->key)->p))
return -1;
return RSA_private_encrypt(fromlen, from, to, (RSA *)env->key,
- RSA_PKCS1_PADDING);
+ RSA_PKCS1_PADDING);
default:
return -1;
}
@@ -830,7 +830,7 @@
};
crypto_digest_env_t *
-crypto_digest_new_env(int type)
+crypto_new_digest_env(int type)
{
crypto_digest_env_t *r;
assert(type == CRYPTO_SHA1_DIGEST);
@@ -840,7 +840,7 @@
}
void
-crypto_digest_free(crypto_digest_env_t *digest) {
+crypto_free_digest_env(crypto_digest_env_t *digest) {
assert(digest);
tor_free(digest);
}
@@ -902,14 +902,14 @@
2^1536 - 2^1472 - 1 + 2^64 * { [2^1406 pi] + 741804 }
*/
r = BN_hex2bn(&p,
- "FFFFFFFFFFFFFFFFC90FDAA22168C234C4C6628B80DC1CD1"
- "29024E088A67CC74020BBEA63B139B22514A08798E3404DD"
- "EF9519B3CD3A431B302B0A6DF25F14374FE1356D6D51C245"
- "E485B576625E7EC6F44C42E9A637ED6B0BFF5CB6F406B7ED"
- "EE386BFB5A899FA5AE9F24117C4B1FE649286651ECE45B3D"
- "C2007CB8A163BF0598DA48361C55D39A69163FA8FD24CF5F"
- "83655D23DCA3AD961C62F356208552BB9ED529077096966D"
- "670C354E4ABC9804F1746C08CA237327FFFFFFFFFFFFFFFF");
+ "FFFFFFFFFFFFFFFFC90FDAA22168C234C4C6628B80DC1CD1"
+ "29024E088A67CC74020BBEA63B139B22514A08798E3404DD"
+ "EF9519B3CD3A431B302B0A6DF25F14374FE1356D6D51C245"
+ "E485B576625E7EC6F44C42E9A637ED6B0BFF5CB6F406B7ED"
+ "EE386BFB5A899FA5AE9F24117C4B1FE649286651ECE45B3D"
+ "C2007CB8A163BF0598DA48361C55D39A69163FA8FD24CF5F"
+ "83655D23DCA3AD961C62F356208552BB9ED529077096966D"
+ "670C354E4ABC9804F1746C08CA237327FFFFFFFFFFFFFFFF");
#endif
/* This is from rfc2409, section 6.2. It's a safe prime, and
@@ -918,11 +918,11 @@
*/
/* See also rfc 3536 */
r = BN_hex2bn(&p,
- "FFFFFFFFFFFFFFFFC90FDAA22168C234C4C6628B80DC1CD129024E08"
- "8A67CC74020BBEA63B139B22514A08798E3404DDEF9519B3CD3A431B"
- "302B0A6DF25F14374FE1356D6D51C245E485B576625E7EC6F44C42E9"
- "A637ED6B0BFF5CB6F406B7EDEE386BFB5A899FA5AE9F24117C4B1FE6"
- "49286651ECE65381FFFFFFFFFFFFFFFF");
+ "FFFFFFFFFFFFFFFFC90FDAA22168C234C4C6628B80DC1CD129024E08"
+ "8A67CC74020BBEA63B139B22514A08798E3404DDEF9519B3CD3A431B"
+ "302B0A6DF25F14374FE1356D6D51C245E485B576625E7EC6F44C42E9"
+ "A637ED6B0BFF5CB6F406B7EDEE386BFB5A899FA5AE9F24117C4B1FE6"
+ "49286651ECE65381FFFFFFFFFFFFFFFF");
assert(r);
r = BN_set_word(g, 2);
@@ -982,8 +982,8 @@
#undef MIN
#define MIN(a,b) ((a)<(b)?(a):(b))
int crypto_dh_compute_secret(crypto_dh_env_t *dh,
- char *pubkey, int pubkey_len,
- char *secret_out, int secret_bytes_out)
+ char *pubkey, int pubkey_len,
+ char *secret_out, int secret_bytes_out)
{
unsigned char hash[20];
unsigned char *secret_tmp = NULL;
@@ -997,6 +997,7 @@
goto error;
secret_tmp = tor_malloc(crypto_dh_get_bytes(dh)+1);
secret_len = DH_compute_key(secret_tmp, pubkey_bn, dh->dh);
+ assert(secret_len == crypto_dh_get_bytes(dh));
for (i = 0; i < secret_bytes_out; i += 20) {
secret_tmp[secret_len] = (unsigned char) i/20;
if (crypto_SHA_digest(secret_tmp, secret_len+1, hash))
Index: crypto.h
===================================================================
RCS file: /home/or/cvsroot/src/common/crypto.h,v
retrieving revision 1.25
retrieving revision 1.26
diff -u -d -r1.25 -r1.26
--- crypto.h 16 Dec 2003 05:47:21 -0000 1.25
+++ crypto.h 16 Dec 2003 08:13:26 -0000 1.26
@@ -99,8 +99,8 @@
/* SHA-1 */
int crypto_SHA_digest(const unsigned char *m, int len, unsigned char *digest);
-crypto_digest_env_t *crypto_new_digest_env(int type);
-void crypto_digest_free(crypto_digest_env_t *digest);
+crypto_digest_env_t *crypto_digest_new_env(int type);
+void crypto_free_digest_env(crypto_digest_env_t *digest);
void crypto_digest_add_bytes(crypto_digest_env_t *digest, const char *data,
size_t len);
void crypto_digest_get_digest(crypto_digest_env_t *digest,
More information about the tor-commits
mailing list