diff options
| author | Werner Koch <[email protected]> | 1998-06-15 15:41:04 +0000 |
|---|---|---|
| committer | Werner Koch <[email protected]> | 1998-06-15 15:41:04 +0000 |
| commit | 6e1ca6b80fb50ff5e1c065b7ac12635487b4a6d2 (patch) | |
| tree | 7c4a888893a91b59753b3d89e59832f8c24ba039 /g10/keygen.c | |
| parent | gnupg extension are now working (diff) | |
| download | gnupg-6e1ca6b80fb50ff5e1c065b7ac12635487b4a6d2.tar.gz gnupg-6e1ca6b80fb50ff5e1c065b7ac12635487b4a6d2.zip | |
extensions are now working and fixed a lot of bugs
Diffstat (limited to 'g10/keygen.c')
| -rw-r--r-- | g10/keygen.c | 15 |
1 files changed, 8 insertions, 7 deletions
diff --git a/g10/keygen.c b/g10/keygen.c index 8ad30bb9b..21c388bfc 100644 --- a/g10/keygen.c +++ b/g10/keygen.c @@ -168,7 +168,7 @@ gen_elg(unsigned nbits, KBNODE pub_root, KBNODE sec_root, DEK *dek, skc->is_protected = 0; skc->protect.algo = 0; - skc->csum = checksum_mpi( skc->skey[3] ); + skc->csum = checksum_mpi_counted_nbits( skc->skey[3] ); if( ret_skc ) /* not a subkey: return an unprotected version of the skc */ *ret_skc = copy_secret_cert( NULL, skc ); @@ -232,10 +232,10 @@ gen_rsa(unsigned nbits, KBNODE pub_root, KBNODE sec_root, DEK *dek, skc->d.rsa.rsa_p = sk.p; skc->d.rsa.rsa_q = sk.q; skc->d.rsa.rsa_u = sk.u; - skc->d.rsa.csum = checksum_mpi( skc->d.rsa.rsa_d ); - skc->d.rsa.csum += checksum_mpi( skc->d.rsa.rsa_p ); - skc->d.rsa.csum += checksum_mpi( skc->d.rsa.rsa_q ); - skc->d.rsa.csum += checksum_mpi( skc->d.rsa.rsa_u ); + skc->d.rsa.csum = checksum_mpi_counted_nbits( skc->d.rsa.rsa_d ); + skc->d.rsa.csum += checksum_mpi_counted_nbits( skc->d.rsa.rsa_p ); + skc->d.rsa.csum += checksum_mpi_counted_nbits( skc->d.rsa.rsa_q ); + skc->d.rsa.csum += checksum_mpi_counted_nbits( skc->d.rsa.rsa_u ); if( ret_skc ) /* not a subkey: return an unprotected version of the skc */ *ret_skc = copy_secret_cert( NULL, skc ); @@ -244,7 +244,8 @@ gen_rsa(unsigned nbits, KBNODE pub_root, KBNODE sec_root, DEK *dek, skc->d.rsa.is_protected = 1; skc->d.rsa.protect_algo = CIPHER_ALGO_BLOWFISH; randomize_buffer( skc->d.rsa.protect.blowfish.iv, 8, 1); - skc->d.rsa.csum += checksum( skc->d.rsa.protect.blowfish.iv, 8 ); + skc->d.rsa.csum += checksum_counted_nbits( + skc->d.rsa.protect.blowfish.iv, 8 ); rc = protect_secret_key( skc, dek ); if( rc ) { log_error("protect_secret_key failed: %s\n", g10_errstr(rc) ); @@ -314,7 +315,7 @@ gen_dsa(unsigned nbits, KBNODE pub_root, KBNODE sec_root, DEK *dek, skc->is_protected = 0; skc->protect.algo = 0; - skc->csum = checksum_mpi( skc->skey[4] ); + skc->csum = checksum_mpi_counted_nbits( skc->skey[4] ); if( ret_skc ) /* not a subkey: return an unprotected version of the skc */ *ret_skc = copy_secret_cert( NULL, skc ); |
