summaryrefslogtreecommitdiff
path: root/rsa.h
diff options
context:
space:
mode:
Diffstat (limited to 'rsa.h')
-rw-r--r--rsa.h20
1 files changed, 10 insertions, 10 deletions
diff --git a/rsa.h b/rsa.h
index 3ad7e9ab..38455a70 100644
--- a/rsa.h
+++ b/rsa.h
@@ -95,7 +95,7 @@ struct rsa_public_key
{
/* Size of the modulo, in octets. This is also the size of all
* signatures that are created or verified with this key. */
- unsigned size;
+ size_t size;
/* Modulo */
mpz_t n;
@@ -106,7 +106,7 @@ struct rsa_public_key
struct rsa_private_key
{
- unsigned size;
+ size_t size;
/* d is filled in by the key generation function; otherwise it's
* completely unused. */
@@ -174,18 +174,18 @@ rsa_private_key_prepare(struct rsa_private_key *key);
/* PKCS#1 style signatures */
int
rsa_pkcs1_sign(const struct rsa_private_key *key,
- unsigned length, const uint8_t *digest_info,
+ size_t length, const uint8_t *digest_info,
mpz_t s);
int
rsa_pkcs1_sign_tr(const struct rsa_public_key *pub,
const struct rsa_private_key *key,
void *random_ctx, nettle_random_func *random,
- unsigned length, const uint8_t *digest_info,
+ size_t length, const uint8_t *digest_info,
mpz_t s);
int
rsa_pkcs1_verify(const struct rsa_public_key *key,
- unsigned length, const uint8_t *digest_info,
+ size_t length, const uint8_t *digest_info,
const mpz_t signature);
int
@@ -281,7 +281,7 @@ int
rsa_encrypt(const struct rsa_public_key *key,
/* For padding */
void *random_ctx, nettle_random_func *random,
- unsigned length, const uint8_t *cleartext,
+ size_t length, const uint8_t *cleartext,
mpz_t cipher);
/* Message must point to a buffer of size *LENGTH. KEY->size is enough
@@ -291,7 +291,7 @@ rsa_encrypt(const struct rsa_public_key *key,
* didn't fit. */
int
rsa_decrypt(const struct rsa_private_key *key,
- unsigned *length, uint8_t *cleartext,
+ size_t *length, uint8_t *cleartext,
const mpz_t ciphertext);
/* Timing-resistant version, using randomized RSA blinding. */
@@ -299,7 +299,7 @@ int
rsa_decrypt_tr(const struct rsa_public_key *pub,
const struct rsa_private_key *key,
void *random_ctx, nettle_random_func *random,
- unsigned *length, uint8_t *message,
+ size_t *length, uint8_t *message,
const mpz_t gibberish);
/* Compute x, the e:th root of m. Calling it with x == m is allowed. */
@@ -364,7 +364,7 @@ int
rsa_keypair_from_sexp(struct rsa_public_key *pub,
struct rsa_private_key *priv,
unsigned limit,
- unsigned length, const uint8_t *expr);
+ size_t length, const uint8_t *expr);
/* Keys in PKCS#1 format. */
@@ -402,7 +402,7 @@ _rsa_verify(const struct rsa_public_key *key,
const mpz_t m,
const mpz_t s);
-unsigned
+size_t
_rsa_check_size(mpz_t n);
void