diff options
author | Werner Koch <[email protected]> | 1997-12-01 10:33:23 +0000 |
---|---|---|
committer | Werner Koch <[email protected]> | 1997-12-01 10:33:23 +0000 |
commit | 5c1cca042e6bc0de22c7913f08457c7b8a46e592 (patch) | |
tree | 234246f67cf2e7deb79b94e7491fdd7111c1c65e /g10/pubkey-enc.c | |
parent | Improved prime number test (diff) | |
download | gnupg-5c1cca042e6bc0de22c7913f08457c7b8a46e592.tar.gz gnupg-5c1cca042e6bc0de22c7913f08457c7b8a46e592.zip |
List and check sigs works
Diffstat (limited to 'g10/pubkey-enc.c')
-rw-r--r-- | g10/pubkey-enc.c | 8 |
1 files changed, 4 insertions, 4 deletions
diff --git a/g10/pubkey-enc.c b/g10/pubkey-enc.c index 183d91936..ba6a6f15a 100644 --- a/g10/pubkey-enc.c +++ b/g10/pubkey-enc.c @@ -41,7 +41,7 @@ get_session_key( PKT_pubkey_enc *k, DEK *dek ) int i, j, c, rc = 0; MPI dek_frame = mpi_alloc_secure(40); u16 csum, csum2; - PKT_seckey_cert *skc = m_alloc_clear( sizeof *skc ); + PKT_secret_cert *skc = m_alloc_clear( sizeof *skc ); skc->pubkey_algo = k->pubkey_algo; /* we want a pubkey with this algo*/ if( (rc = get_seckey( skc, k->keyid )) ) @@ -58,7 +58,7 @@ get_session_key( PKT_pubkey_enc *k, DEK *dek ) skey.g = skc->d.elg.g; skey.y = skc->d.elg.y; skey.x = skc->d.elg.x; - elg_decipher( dek_frame, k->d.elg.a, k->d.elg.b, &skey ); + elg_decrypted( dek_frame, k->d.elg.a, k->d.elg.b, &skey ); memset( &skey, 0, sizeof skey ); } #ifdef HAVE_RSA_CIPHER @@ -82,7 +82,7 @@ get_session_key( PKT_pubkey_enc *k, DEK *dek ) rc = G10ERR_PUBKEY_ALGO; /* unsupported algorithm */ goto leave; } - free_seckey_cert( skc ); skc = NULL; + free_secret_cert( skc ); skc = NULL; /* Now get the DEK (data encryption key) from the dek_frame @@ -151,7 +151,7 @@ get_session_key( PKT_pubkey_enc *k, DEK *dek ) leave: mpi_free(dek_frame); if( skc ) - free_seckey_cert( skc ); + free_secret_cert( skc ); return rc; } |