summaryrefslogtreecommitdiff
path: root/lib/nettle
diff options
context:
space:
mode:
authorNikos Mavrogiannopoulos <nmav@redhat.com>2017-07-25 10:16:40 +0200
committerNikos Mavrogiannopoulos <nmav@redhat.com>2017-08-03 11:57:52 +0200
commit99d5d8ae0eda8bbcfe118b1df987aea8ef142cf4 (patch)
treea7ebf84c99925e33dc3eb6c9fa238e9ef6769f2d /lib/nettle
parent67fac0f4ccb43c983c110060639de95168ca04a1 (diff)
downloadgnutls-99d5d8ae0eda8bbcfe118b1df987aea8ef142cf4.tar.gz
gnutls_pk_params_st: renamed sign field to spki
The name "sign" was ambiguous with regard to its intented use, as it could refer to digital signature parameters which was not exactly the case. That field contains parameters present in the subject public key info (SPKI), which could be used in a digital signature, but not necessarily. Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
Diffstat (limited to 'lib/nettle')
-rw-r--r--lib/nettle/pk.c6
1 files changed, 3 insertions, 3 deletions
diff --git a/lib/nettle/pk.c b/lib/nettle/pk.c
index e69ccb09c9..130deefd2e 100644
--- a/lib/nettle/pk.c
+++ b/lib/nettle/pk.c
@@ -1475,7 +1475,7 @@ char* gen_data = NULL;
ddata.data = (void*)gen_data;
ddata.size = hash_len;
} else if (algo == GNUTLS_PK_RSA_PSS) {
- switch (params->sign.rsa_pss_dig) {
+ switch (params->spki.rsa_pss_dig) {
case GNUTLS_DIG_SHA256:
ddata.data = (void*)const_data_sha256;
ddata.size = sizeof(const_data_sha256);
@@ -1534,13 +1534,13 @@ char* gen_data = NULL;
case GNUTLS_PK_EDDSA_ED25519:
case GNUTLS_PK_DSA:
case GNUTLS_PK_RSA_PSS:
- ret = _gnutls_pk_sign(algo, &sig, &ddata, params, &params->sign);
+ ret = _gnutls_pk_sign(algo, &sig, &ddata, params, &params->spki);
if (ret < 0) {
ret = gnutls_assert_val(GNUTLS_E_PK_GENERATION_ERROR);
goto cleanup;
}
- ret = _gnutls_pk_verify(algo, &ddata, &sig, params, &params->sign);
+ ret = _gnutls_pk_verify(algo, &ddata, &sig, params, &params->spki);
if (ret < 0) {
ret = gnutls_assert_val(GNUTLS_E_PK_GENERATION_ERROR);
gnutls_assert();