From f1a1de6dbc31b67e5253ade4b5d7149a4890c138 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Niels=20M=C3=B6ller?= <nisse@lysator.liu.se> Date: Fri, 19 Sep 2003 15:27:48 +0200 Subject: [PATCH] * examples/rsa-decrypt.c: Fixes to get the file to compile. It won't work yet. Rev: src/nettle/examples/rsa-decrypt.c:1.2 --- examples/rsa-decrypt.c | 18 +++++++----------- 1 file changed, 7 insertions(+), 11 deletions(-) diff --git a/examples/rsa-decrypt.c b/examples/rsa-decrypt.c index 69668460..10c63dbe 100644 --- a/examples/rsa-decrypt.c +++ b/examples/rsa-decrypt.c @@ -46,6 +46,7 @@ #include "yarrow.h" #include "io.h" +#include "rsa-session.h" void rsa_session_set_decrypt_key(struct rsa_session *ctx, @@ -55,9 +56,9 @@ rsa_session_set_decrypt_key(struct rsa_session *ctx, const uint8_t *iv = SESSION_IV(key); const uint8_t *hmac_key = SESSION_HMAC_KEY(key); - aes_set_decrypt_key(ctx->aes.ctx, AES_KEY_SIZE, aes_key); - CBC_SET_IV(ctx->aes, iv); - hmac_sha1_set_key(ctx->hmac, SHA1_DIGEST_SIZE, hmac_key); + aes_set_decrypt_key(&ctx->aes.ctx, AES_KEY_SIZE, aes_key); + CBC_SET_IV(&ctx->aes, iv); + hmac_sha1_set_key(&ctx->hmac, SHA1_DIGEST_SIZE, hmac_key); } static int @@ -67,7 +68,7 @@ read_uint32(FILE *f, uint32_t *n) if (fread(buf, 1, sizeof(buf), f) != sizeof(buf)) return 0; - *n = WRITE_UINT32(buf); + *n = READ_UINT32(buf); return 1; } @@ -103,7 +104,7 @@ struct process_ctx }; static int -process_file(struct process_ctx *ctx, +process_file(struct rsa_session *ctx, FILE *in, FILE *out) { uint8_t buffer[AES_BLOCK_SIZE * 100]; @@ -158,8 +159,6 @@ process_file(struct process_ctx *ctx, int main(int argc, char **argv) { - struct process_ctx ctx; - struct rsa_private_key key; struct rsa_session ctx; struct rsa_session_info session; @@ -167,15 +166,12 @@ main(int argc, char **argv) unsigned length; mpz_t x; - int c; - if (argc != 2) { werror("Usage: rsa-decrypt PRIVATE-KEY < ciphertext\n"); return EXIT_FAILURE; } - rsa_public_key_init(&pub); rsa_private_key_init(&key); if (!read_rsa_key(argv[1], NULL, &key)) @@ -197,7 +193,7 @@ main(int argc, char **argv) } length = sizeof(session.key); - if (!rsa_decrypt(&key, &length, session->key, x)) + if (!rsa_decrypt(&key, &length, session.key, x)) { werror("Failed to decrypt rsa header in input file.\n"); return EXIT_FAILURE; -- GitLab