diff options
author | Jeffrey Walton <noloader@gmail.com> | 2017-04-24 05:05:14 -0400 |
---|---|---|
committer | Jeffrey Walton <noloader@gmail.com> | 2017-04-24 05:05:14 -0400 |
commit | 2297dd000a7cf2831095ba59be2ed653ea3bd884 (patch) | |
tree | 7aa629b92a168f33e8bc390de698a09c7286144f /gfpcrypt.h | |
parent | 64f1b50b7fc5cf887becd70b3e35ded6d98bf639 (diff) | |
download | cryptopp-git-2297dd000a7cf2831095ba59be2ed653ea3bd884.tar.gz |
Removed "typedef SHA1 SHA" (Issue 369)
This should have happened when we removed most of MAINTAIN_BACKWARDS_COMPATIBILITY artifacts. Its not practical move SHA1 into Weak:: namespace or "typedef SHA256 SHA" because SHA1 is too intertwined at the moment.
In the interim, maybe we can place SHA1 in both CryptoPP:: and Weak:: namespaces. This will allow us to transition into Weak::SHA1 over time, and signal to users SHA1 should be avoided.
Diffstat (limited to 'gfpcrypt.h')
-rw-r--r-- | gfpcrypt.h | 4 |
1 files changed, 2 insertions, 2 deletions
@@ -737,7 +737,7 @@ class DSA2; struct DL_Keys_DSA
{
typedef DL_PublicKey_GFP<DL_GroupParameters_DSA> PublicKey;
- typedef DL_PrivateKey_WithSignaturePairwiseConsistencyTest<DL_PrivateKey_GFP<DL_GroupParameters_DSA>, DSA2<SHA> > PrivateKey;
+ typedef DL_PrivateKey_WithSignaturePairwiseConsistencyTest<DL_PrivateKey_GFP<DL_GroupParameters_DSA>, DSA2<SHA1> > PrivateKey;
};
//! \class DSA2
@@ -779,7 +779,7 @@ typedef DSA2<SHA1> DSA; CRYPTOPP_DLL_TEMPLATE_CLASS DL_PublicKey_GFP<DL_GroupParameters_DSA>;
CRYPTOPP_DLL_TEMPLATE_CLASS DL_PrivateKey_GFP<DL_GroupParameters_DSA>;
-CRYPTOPP_DLL_TEMPLATE_CLASS DL_PrivateKey_WithSignaturePairwiseConsistencyTest<DL_PrivateKey_GFP<DL_GroupParameters_DSA>, DSA2<SHA> >;
+CRYPTOPP_DLL_TEMPLATE_CLASS DL_PrivateKey_WithSignaturePairwiseConsistencyTest<DL_PrivateKey_GFP<DL_GroupParameters_DSA>, DSA2<SHA1> >;
//! \class DL_EncryptionAlgorithm_Xor
//! \brief P1363 based XOR Encryption Method
|