|
@@ -32,7 +32,7 @@
|
|
|
typedef struct QCryptoGcryptRSA {
|
|
|
QCryptoAkCipher akcipher;
|
|
|
gcry_sexp_t key;
|
|
|
- QCryptoRSAPaddingAlgorithm padding_alg;
|
|
|
+ QCryptoRSAPaddingAlgo padding_alg;
|
|
|
QCryptoHashAlgo hash_alg;
|
|
|
} QCryptoGcryptRSA;
|
|
|
|
|
@@ -241,7 +241,7 @@ static int qcrypto_gcrypt_rsa_encrypt(QCryptoAkCipher *akcipher,
|
|
|
|
|
|
err = gcry_sexp_build(&data_sexp, NULL,
|
|
|
"(data (flags %s) (value %b))",
|
|
|
- QCryptoRSAPaddingAlgorithm_str(rsa->padding_alg),
|
|
|
+ QCryptoRSAPaddingAlgo_str(rsa->padding_alg),
|
|
|
in_len, in);
|
|
|
if (gcry_err_code(err) != 0) {
|
|
|
error_setg(errp, "Failed to build plaintext: %s/%s",
|
|
@@ -263,7 +263,7 @@ static int qcrypto_gcrypt_rsa_encrypt(QCryptoAkCipher *akcipher,
|
|
|
goto cleanup;
|
|
|
}
|
|
|
|
|
|
- if (rsa->padding_alg == QCRYPTO_RSA_PADDING_ALG_RAW) {
|
|
|
+ if (rsa->padding_alg == QCRYPTO_RSA_PADDING_ALGO_RAW) {
|
|
|
cipher_mpi = gcry_sexp_nth_mpi(cipher_sexp_item, 1, GCRYMPI_FMT_USG);
|
|
|
if (!cipher_mpi) {
|
|
|
error_setg(errp, "Invalid ciphertext result");
|
|
@@ -332,7 +332,7 @@ static int qcrypto_gcrypt_rsa_decrypt(QCryptoAkCipher *akcipher,
|
|
|
|
|
|
err = gcry_sexp_build(&cipher_sexp, NULL,
|
|
|
"(enc-val (flags %s) (rsa (a %b) ))",
|
|
|
- QCryptoRSAPaddingAlgorithm_str(rsa->padding_alg),
|
|
|
+ QCryptoRSAPaddingAlgo_str(rsa->padding_alg),
|
|
|
in_len, in);
|
|
|
if (gcry_err_code(err) != 0) {
|
|
|
error_setg(errp, "Failed to build ciphertext: %s/%s",
|
|
@@ -348,7 +348,7 @@ static int qcrypto_gcrypt_rsa_decrypt(QCryptoAkCipher *akcipher,
|
|
|
}
|
|
|
|
|
|
/* S-expression of plaintext: (value plaintext) */
|
|
|
- if (rsa->padding_alg == QCRYPTO_RSA_PADDING_ALG_RAW) {
|
|
|
+ if (rsa->padding_alg == QCRYPTO_RSA_PADDING_ALGO_RAW) {
|
|
|
data_mpi = gcry_sexp_nth_mpi(data_sexp, 1, GCRYMPI_FMT_USG);
|
|
|
if (!data_mpi) {
|
|
|
error_setg(errp, "Invalid plaintext result");
|
|
@@ -410,7 +410,7 @@ static int qcrypto_gcrypt_rsa_sign(QCryptoAkCipher *akcipher,
|
|
|
return ret;
|
|
|
}
|
|
|
|
|
|
- if (rsa->padding_alg != QCRYPTO_RSA_PADDING_ALG_PKCS1) {
|
|
|
+ if (rsa->padding_alg != QCRYPTO_RSA_PADDING_ALGO_PKCS1) {
|
|
|
error_setg(errp, "Invalid padding %u", rsa->padding_alg);
|
|
|
return ret;
|
|
|
}
|
|
@@ -482,7 +482,7 @@ static int qcrypto_gcrypt_rsa_verify(QCryptoAkCipher *akcipher,
|
|
|
return ret;
|
|
|
}
|
|
|
|
|
|
- if (rsa->padding_alg != QCRYPTO_RSA_PADDING_ALG_PKCS1) {
|
|
|
+ if (rsa->padding_alg != QCRYPTO_RSA_PADDING_ALGO_PKCS1) {
|
|
|
error_setg(errp, "Invalid padding %u", rsa->padding_alg);
|
|
|
return ret;
|
|
|
}
|
|
@@ -570,10 +570,10 @@ bool qcrypto_akcipher_supports(QCryptoAkCipherOptions *opts)
|
|
|
switch (opts->alg) {
|
|
|
case QCRYPTO_AK_CIPHER_ALGO_RSA:
|
|
|
switch (opts->u.rsa.padding_alg) {
|
|
|
- case QCRYPTO_RSA_PADDING_ALG_RAW:
|
|
|
+ case QCRYPTO_RSA_PADDING_ALGO_RAW:
|
|
|
return true;
|
|
|
|
|
|
- case QCRYPTO_RSA_PADDING_ALG_PKCS1:
|
|
|
+ case QCRYPTO_RSA_PADDING_ALGO_PKCS1:
|
|
|
switch (opts->u.rsa.hash_alg) {
|
|
|
case QCRYPTO_HASH_ALGO_MD5:
|
|
|
case QCRYPTO_HASH_ALGO_SHA1:
|