diff --git a/bench2.cpp b/bench2.cpp
index b83c4192..e0853c4a 100644
--- a/bench2.cpp
+++ b/bench2.cpp
@@ -246,40 +246,40 @@ void Benchmark3(double t, double hertz)
std::cout << "\n
";
{
- BenchMarkCrypto > >(CRYPTOPP_DATA_DIR "TestData/rsa1024.dat", "RSA 1024", t);
- BenchMarkCrypto > >(CRYPTOPP_DATA_DIR "TestData/luc1024.dat", "LUC 1024", t);
+ BenchMarkCrypto > >(CRYPTOPP_DATA_DIR "TestData/rsa1024.dat", "RSA 1024", t);
+ BenchMarkCrypto > >(CRYPTOPP_DATA_DIR "TestData/luc1024.dat", "LUC 1024", t);
BenchMarkCrypto >(CRYPTOPP_DATA_DIR "TestData/dlie1024.dat", "DLIES 1024", t);
BenchMarkCrypto >(CRYPTOPP_DATA_DIR "TestData/lucc512.dat", "LUCELG 512", t);
}
std::cout << "\n";
{
- BenchMarkCrypto > >(CRYPTOPP_DATA_DIR "TestData/rsa2048.dat", "RSA 2048", t);
- BenchMarkCrypto > >(CRYPTOPP_DATA_DIR "TestData/luc2048.dat", "LUC 2048", t);
+ BenchMarkCrypto > >(CRYPTOPP_DATA_DIR "TestData/rsa2048.dat", "RSA 2048", t);
+ BenchMarkCrypto > >(CRYPTOPP_DATA_DIR "TestData/luc2048.dat", "LUC 2048", t);
BenchMarkCrypto >(CRYPTOPP_DATA_DIR "TestData/dlie2048.dat", "DLIES 2048", t);
BenchMarkCrypto >(CRYPTOPP_DATA_DIR "TestData/lucc1024.dat", "LUCELG 1024", t);
}
std::cout << "\n";
{
- BenchMarkSignature >(CRYPTOPP_DATA_DIR "TestData/rsa1024.dat", "RSA 1024", t);
- BenchMarkSignature >(CRYPTOPP_DATA_DIR "TestData/rw1024.dat", "RW 1024", t);
- BenchMarkSignature >(CRYPTOPP_DATA_DIR "TestData/luc1024.dat", "LUC 1024", t);
- BenchMarkSignature >(CRYPTOPP_DATA_DIR "TestData/nr1024.dat", "NR 1024", t);
+ BenchMarkSignature >(CRYPTOPP_DATA_DIR "TestData/rsa1024.dat", "RSA 1024", t);
+ BenchMarkSignature >(CRYPTOPP_DATA_DIR "TestData/rw1024.dat", "RW 1024", t);
+ BenchMarkSignature >(CRYPTOPP_DATA_DIR "TestData/luc1024.dat", "LUC 1024", t);
+ BenchMarkSignature >(CRYPTOPP_DATA_DIR "TestData/nr1024.dat", "NR 1024", t);
BenchMarkSignature(CRYPTOPP_DATA_DIR "TestData/dsa1024.dat", "DSA 1024", t);
- BenchMarkSignature >(CRYPTOPP_DATA_DIR "TestData/lucs512.dat", "LUC-HMP 512", t);
- BenchMarkSignature >(CRYPTOPP_DATA_DIR "TestData/esig1023.dat", "ESIGN 1023", t);
- BenchMarkSignature >(CRYPTOPP_DATA_DIR "TestData/esig1536.dat", "ESIGN 1536", t);
+ BenchMarkSignature >(CRYPTOPP_DATA_DIR "TestData/lucs512.dat", "LUC-HMP 512", t);
+ BenchMarkSignature >(CRYPTOPP_DATA_DIR "TestData/esig1023.dat", "ESIGN 1023", t);
+ BenchMarkSignature >(CRYPTOPP_DATA_DIR "TestData/esig1536.dat", "ESIGN 1536", t);
}
std::cout << "\n";
{
- BenchMarkSignature >(CRYPTOPP_DATA_DIR "TestData/rsa2048.dat", "RSA 2048", t);
- BenchMarkSignature >(CRYPTOPP_DATA_DIR "TestData/rw2048.dat", "RW 2048", t);
- BenchMarkSignature >(CRYPTOPP_DATA_DIR "TestData/luc2048.dat", "LUC 2048", t);
- BenchMarkSignature >(CRYPTOPP_DATA_DIR "TestData/nr2048.dat", "NR 2048", t);
- BenchMarkSignature >(CRYPTOPP_DATA_DIR "TestData/lucs1024.dat", "LUC-HMP 1024", t);
- BenchMarkSignature >(CRYPTOPP_DATA_DIR "TestData/esig2046.dat", "ESIGN 2046", t);
+ BenchMarkSignature >(CRYPTOPP_DATA_DIR "TestData/rsa2048.dat", "RSA 2048", t);
+ BenchMarkSignature >(CRYPTOPP_DATA_DIR "TestData/rw2048.dat", "RW 2048", t);
+ BenchMarkSignature >(CRYPTOPP_DATA_DIR "TestData/luc2048.dat", "LUC 2048", t);
+ BenchMarkSignature >(CRYPTOPP_DATA_DIR "TestData/nr2048.dat", "NR 2048", t);
+ BenchMarkSignature >(CRYPTOPP_DATA_DIR "TestData/lucs1024.dat", "LUC-HMP 1024", t);
+ BenchMarkSignature >(CRYPTOPP_DATA_DIR "TestData/esig2046.dat", "ESIGN 2046", t);
}
std::cout << "\n";
@@ -310,12 +310,12 @@ void Benchmark3(double t, double hertz)
{
ECIES::Decryptor cpriv(Test::GlobalRNG(), ASN1::secp256k1());
ECIES::Encryptor cpub(cpriv);
- ECDSA::Signer spriv(cpriv);
- ECDSA::Verifier spub(spriv);
- ECDSA_RFC6979::Signer spriv2(cpriv);
- ECDSA_RFC6979::Verifier spub2(spriv);
- ECGDSA::Signer spriv3(Test::GlobalRNG(), ASN1::secp256k1());
- ECGDSA::Verifier spub3(spriv3);
+ ECDSA::Signer spriv(cpriv);
+ ECDSA::Verifier spub(spriv);
+ ECDSA_RFC6979::Signer spriv2(cpriv);
+ ECDSA_RFC6979::Verifier spub2(spriv);
+ ECGDSA::Signer spriv3(Test::GlobalRNG(), ASN1::secp256k1());
+ ECGDSA::Verifier spub3(spriv3);
ECDH::Domain ecdhc(ASN1::secp256k1());
ECMQV::Domain ecmqvc(ASN1::secp256k1());
@@ -337,12 +337,12 @@ void Benchmark3(double t, double hertz)
{
ECIES::Decryptor cpriv(Test::GlobalRNG(), ASN1::sect233r1());
ECIES::Encryptor cpub(cpriv);
- ECDSA::Signer spriv(cpriv);
- ECDSA::Verifier spub(spriv);
- ECDSA_RFC6979::Signer spriv2(cpriv);
- ECDSA_RFC6979::Verifier spub2(spriv);
- ECGDSA::Signer spriv3(Test::GlobalRNG(), ASN1::sect233r1());
- ECGDSA::Verifier spub3(spriv3);
+ ECDSA::Signer spriv(cpriv);
+ ECDSA::Verifier spub(spriv);
+ ECDSA_RFC6979::Signer spriv2(cpriv);
+ ECDSA_RFC6979::Verifier spub2(spriv);
+ ECGDSA::Signer spriv3(Test::GlobalRNG(), ASN1::sect233r1());
+ ECGDSA::Verifier spub3(spriv3);
ECDH::Domain ecdhc(ASN1::sect233r1());
ECMQV::Domain ecmqvc(ASN1::sect233r1());
diff --git a/default.h b/default.h
index 78bc0d19..691cbbb3 100644
--- a/default.h
+++ b/default.h
@@ -19,7 +19,7 @@ NAMESPACE_BEGIN(CryptoPP)
//! \brief Legacy block cipher for LegacyEncryptor, LegacyDecryptor, LegacyEncryptorWithMAC and LegacyDecryptorWithMAC
typedef DES_EDE2 LegacyBlockCipher;
//! \brief Legacy hash for use with LegacyEncryptorWithMAC and LegacyDecryptorWithMAC
-typedef SHA LegacyHashModule;
+typedef SHA1 LegacyHashModule;
//! \brief Legacy HMAC for use withLegacyEncryptorWithMAC and LegacyDecryptorWithMAC
typedef HMAC LegacyMAC;
diff --git a/eccrypto.h b/eccrypto.h
index df1dbe81..2a1836c2 100644
--- a/eccrypto.h
+++ b/eccrypto.h
@@ -398,7 +398,7 @@ struct ECDSA_RFC6979 : public DL_SS<
//! \brief Elliptic Curve NR (ECNR) signature scheme
//! \tparam EC elliptic curve field
//! \tparam H HashTransformation derived class
-template
+template
struct ECNR : public DL_SS, DL_Algorithm_ECNR, DL_SignatureMessageEncodingMethod_NR, H>
{
};
diff --git a/esign.cpp b/esign.cpp
index 77137d66..7c69a684 100644
--- a/esign.cpp
+++ b/esign.cpp
@@ -21,15 +21,15 @@ NAMESPACE_BEGIN(CryptoPP)
#if defined(CRYPTOPP_DEBUG) && !defined(CRYPTOPP_DOXYGEN_PROCESSING)
void ESIGN_TestInstantiations()
{
- ESIGN::Verifier x1(1, 1);
- ESIGN::Signer x2(NullRNG(), 1);
- ESIGN::Verifier x3(x2);
- ESIGN::Verifier x4(x2.GetKey());
- ESIGN::Verifier x5(x3);
- ESIGN::Signer x6 = x2;
+ ESIGN::Verifier x1(1, 1);
+ ESIGN::Signer x2(NullRNG(), 1);
+ ESIGN::Verifier x3(x2);
+ ESIGN::Verifier x4(x2.GetKey());
+ ESIGN::Verifier x5(x3);
+ ESIGN::Signer x6 = x2;
x6 = x2;
- x3 = ESIGN::Verifier(x2);
+ x3 = ESIGN::Verifier(x2);
x4 = x2.GetKey();
}
#endif
diff --git a/fipsalgt.cpp b/fipsalgt.cpp
index 26ce6477..ccba9940 100644
--- a/fipsalgt.cpp
+++ b/fipsalgt.cpp
@@ -457,7 +457,7 @@ protected:
Integer p, q, h, g;
int counter;
- SecByteBlock seed(SHA::DIGESTSIZE);
+ SecByteBlock seed(SHA1::DIGESTSIZE);
do
{
m_rng.GenerateBlock(seed, seed.size());
diff --git a/gfpcrypt.cpp b/gfpcrypt.cpp
index 9e821c91..6494b084 100644
--- a/gfpcrypt.cpp
+++ b/gfpcrypt.cpp
@@ -23,12 +23,12 @@ NAMESPACE_BEGIN(CryptoPP)
#if defined(CRYPTOPP_DEBUG) && !defined(CRYPTOPP_DOXYGEN_PROCESSING)
void TestInstantiations_gfpcrypt()
{
- GDSA::Signer test;
- GDSA::Verifier test1;
+ GDSA::Signer test;
+ GDSA::Verifier test1;
DSA::Signer test5(NullRNG(), 100);
DSA::Signer test2(test5);
- NR::Signer test3;
- NR::Verifier test4;
+ NR::Signer test3;
+ NR::Verifier test4;
DLIES<>::Encryptor test6;
DLIES<>::Decryptor test7;
}
diff --git a/gfpcrypt.h b/gfpcrypt.h
index 75e99705..974886fa 100644
--- a/gfpcrypt.h
+++ b/gfpcrypt.h
@@ -737,7 +737,7 @@ class DSA2;
struct DL_Keys_DSA
{
typedef DL_PublicKey_GFP PublicKey;
- typedef DL_PrivateKey_WithSignaturePairwiseConsistencyTest, DSA2 > PrivateKey;
+ typedef DL_PrivateKey_WithSignaturePairwiseConsistencyTest, DSA2 > PrivateKey;
};
//! \class DSA2
@@ -779,7 +779,7 @@ typedef DSA2 DSA;
CRYPTOPP_DLL_TEMPLATE_CLASS DL_PublicKey_GFP;
CRYPTOPP_DLL_TEMPLATE_CLASS DL_PrivateKey_GFP;
-CRYPTOPP_DLL_TEMPLATE_CLASS DL_PrivateKey_WithSignaturePairwiseConsistencyTest, DSA2 >;
+CRYPTOPP_DLL_TEMPLATE_CLASS DL_PrivateKey_WithSignaturePairwiseConsistencyTest, DSA2 >;
//! \class DL_EncryptionAlgorithm_Xor
//! \brief P1363 based XOR Encryption Method
diff --git a/luc.cpp b/luc.cpp
index c9faca62..702fc9f6 100644
--- a/luc.cpp
+++ b/luc.cpp
@@ -13,7 +13,7 @@ NAMESPACE_BEGIN(CryptoPP)
#if defined(CRYPTOPP_DEBUG) && !defined(CRYPTOPP_DOXYGEN_PROCESSING)
void LUC_TestInstantiations()
{
- LUC_HMP::Signer t1;
+ LUC_HMP::Signer t1;
LUCFunction t2;
InvertibleLUCFunction t3;
}
diff --git a/luc.h b/luc.h
index 49032a13..7b31edfe 100644
--- a/luc.h
+++ b/luc.h
@@ -152,11 +152,11 @@ struct LUCSS : public TF_SS
};
// analogous to the RSA schemes defined in PKCS #1 v2.0
-typedef LUCES >::Decryptor LUCES_OAEP_SHA_Decryptor;
-typedef LUCES >::Encryptor LUCES_OAEP_SHA_Encryptor;
+typedef LUCES >::Decryptor LUCES_OAEP_SHA_Decryptor;
+typedef LUCES >::Encryptor LUCES_OAEP_SHA_Encryptor;
-typedef LUCSS::Signer LUCSSA_PKCS1v15_SHA_Signer;
-typedef LUCSS::Verifier LUCSSA_PKCS1v15_SHA_Verifier;
+typedef LUCSS::Signer LUCSSA_PKCS1v15_SHA_Signer;
+typedef LUCSS::Verifier LUCSSA_PKCS1v15_SHA_Verifier;
// ********************************************************
diff --git a/oaep.h b/oaep.h
index b299f71f..1809af43 100644
--- a/oaep.h
+++ b/oaep.h
@@ -37,7 +37,7 @@ protected:
MaskGeneratingFunction * NewMGF() const {return new MGF;}
};
-CRYPTOPP_DLL_TEMPLATE_CLASS OAEP;
+CRYPTOPP_DLL_TEMPLATE_CLASS OAEP;
NAMESPACE_END
diff --git a/randpool.h b/randpool.h
index c356dca6..3214e3c0 100644
--- a/randpool.h
+++ b/randpool.h
@@ -20,8 +20,8 @@
//! # Go back one more
//! git checkout HEAD~1
//!
-//! $ grep 'MDC' *.h *.cpp
-//! randpool.cpp:typedef MDC RandomPoolCipher;
+//! $ grep 'MDC' *.h *.cpp
+//! randpool.cpp:typedef MDC RandomPoolCipher;
//!
//! \since Crypto++ 4.0 (PGP 2.6.x style), Crypto++ 5.5 (AES-256 based)
diff --git a/rsa.cpp b/rsa.cpp
index c730ac39..6853d22d 100644
--- a/rsa.cpp
+++ b/rsa.cpp
@@ -15,13 +15,13 @@
NAMESPACE_BEGIN(CryptoPP)
void RSA_TestInstantiations()
{
- RSASS::Verifier x1(1, 1);
- RSASS::Signer x2(NullRNG(), 1);
- RSASS::Verifier x3(x2);
- RSASS::Verifier x4(x2.GetKey());
- RSASS::Verifier x5(x3);
+ RSASS::Verifier x1(1, 1);
+ RSASS::Signer x2(NullRNG(), 1);
+ RSASS::Verifier x3(x2);
+ RSASS::Verifier x4(x2.GetKey());
+ RSASS::Verifier x5(x3);
#ifndef __MWERKS__
- RSASS::Signer x6 = x2;
+ RSASS::Signer x6 = x2;
x3 = x2;
x6 = x2;
#endif
@@ -29,7 +29,7 @@ void RSA_TestInstantiations()
#ifndef __GNUC__
RSAES::Encryptor x8(x3);
#endif
- RSAES >::Encryptor x9(x2);
+ RSAES >::Encryptor x9(x2);
x4 = x2.GetKey();
}
@@ -136,12 +136,12 @@ void InvertibleRSAFunction::GenerateRandom(RandomNumberGenerator &rng, const Nam
if (FIPS_140_2_ComplianceEnabled())
{
- RSASS::Signer signer(*this);
- RSASS::Verifier verifier(signer);
+ RSASS::Signer signer(*this);
+ RSASS::Verifier verifier(signer);
SignaturePairwiseConsistencyTest_FIPS_140_Only(signer, verifier);
- RSAES >::Decryptor decryptor(*this);
- RSAES >::Encryptor encryptor(decryptor);
+ RSAES >::Decryptor decryptor(*this);
+ RSAES >::Encryptor encryptor(decryptor);
EncryptionPairwiseConsistencyTest_FIPS_140_Only(encryptor, decryptor);
}
}
diff --git a/rsa.h b/rsa.h
index 6f195a64..f4c8fe20 100644
--- a/rsa.h
+++ b/rsa.h
@@ -217,22 +217,22 @@ DOCUMENTED_TYPEDEF(RSAES::Decryptor, RSAES_PKCS1v15_Decryptor);
//! \details RSA encryption scheme defined in PKCS #1 v2.0
DOCUMENTED_TYPEDEF(RSAES::Encryptor, RSAES_PKCS1v15_Encryptor);
-//! \brief \ref RSAES "RSAES>::Decryptor" typedef
+//! \brief \ref RSAES "RSAES>::Decryptor" typedef
//! \details RSA encryption scheme defined in PKCS #1 v2.0
-DOCUMENTED_TYPEDEF(RSAES >::Decryptor, RSAES_OAEP_SHA_Decryptor);
-//! \brief \ref RSAES "RSAES>::Encryptor" typedef
+DOCUMENTED_TYPEDEF(RSAES >::Decryptor, RSAES_OAEP_SHA_Decryptor);
+//! \brief \ref RSAES "RSAES>::Encryptor" typedef
//! \details RSA encryption scheme defined in PKCS #1 v2.0
-DOCUMENTED_TYPEDEF(RSAES >::Encryptor, RSAES_OAEP_SHA_Encryptor);
+DOCUMENTED_TYPEDEF(RSAES >::Encryptor, RSAES_OAEP_SHA_Encryptor);
#ifdef CRYPTOPP_DOXYGEN_PROCESSING
-//! \brief \ref RSASS "RSASS::Signer" typedef
+//! \brief \ref RSASS "RSASS::Signer" typedef
//! \details RSA signature schemes defined in PKCS #1 v2.0
//! \since Crypto++ 1.0
-class RSASSA_PKCS1v15_SHA_Signer : public RSASS::Signer {};
-//! \brief \ref RSASS "RSASS::Verifier" typedef
+class RSASSA_PKCS1v15_SHA_Signer : public RSASS::Signer {};
+//! \brief \ref RSASS "RSASS::Verifier" typedef
//! \details RSA signature schemes defined in PKCS #1 v2.0
//! \since Crypto++ 1.0
-class RSASSA_PKCS1v15_SHA_Verifier : public RSASS::Verifier {};
+class RSASSA_PKCS1v15_SHA_Verifier : public RSASS::Verifier {};
namespace Weak {
@@ -256,8 +256,8 @@ class RSASSA_PKCS1v15_MD5_Verifier : public RSASS::Verifie
}
#else
-typedef RSASS::Signer RSASSA_PKCS1v15_SHA_Signer;
-typedef RSASS::Verifier RSASSA_PKCS1v15_SHA_Verifier;
+typedef RSASS::Signer RSASSA_PKCS1v15_SHA_Signer;
+typedef RSASS::Verifier RSASSA_PKCS1v15_SHA_Verifier;
namespace Weak {
typedef RSASS::Signer RSASSA_PKCS1v15_MD2_Signer;
diff --git a/seal.cpp b/seal.cpp
index d0ba4fce..acc4e4e5 100644
--- a/seal.cpp
+++ b/seal.cpp
@@ -39,7 +39,7 @@ word32 SEAL_Gamma::Apply(word32 i)
{
memcpy(Z, H, 20);
D[0] = shaIndex;
- SHA::Transform(Z, D);
+ SHA1::Transform(Z, D);
lastIndex = shaIndex;
}
return Z[i%5];
diff --git a/sha.h b/sha.h
index ce2ff06e..806317d4 100644
--- a/sha.h
+++ b/sha.h
@@ -30,8 +30,6 @@ public:
CRYPTOPP_STATIC_CONSTEXPR const char* CRYPTOPP_API StaticAlgorithmName() {return "SHA-1";}
};
-typedef SHA1 SHA; // for backwards compatibility
-
//! \class SHA256
//! \brief SHA-256 message digest
//! \sa SHA-256
diff --git a/test.cpp b/test.cpp
index e41a49e3..72fda0d7 100644
--- a/test.cpp
+++ b/test.cpp
@@ -543,14 +543,14 @@ std::string RSADecryptString(const char *privFilename, const char *ciphertext)
void RSASignFile(const char *privFilename, const char *messageFilename, const char *signatureFilename)
{
FileSource privFile(privFilename, true, new HexDecoder);
- RSASS::Signer priv(privFile);
+ RSASS::Signer priv(privFile);
FileSource f(messageFilename, true, new SignerFilter(Test::GlobalRNG(), priv, new HexEncoder(new FileSink(signatureFilename))));
}
bool RSAVerifyFile(const char *pubFilename, const char *messageFilename, const char *signatureFilename)
{
FileSource pubFile(pubFilename, true, new HexDecoder);
- RSASS::Verifier pub(pubFile);
+ RSASS::Verifier pub(pubFile);
FileSource signatureFile(signatureFilename, true, new HexDecoder);
if (signatureFile.MaxRetrievable() != pub.SignatureLength())
diff --git a/validat2.cpp b/validat2.cpp
index 3e1eb8d8..1c039001 100644
--- a/validat2.cpp
+++ b/validat2.cpp
@@ -322,8 +322,8 @@ bool ValidateRSA()
pass = CryptoSystemValidate(rsaPriv, rsaPub) && pass;
}
{
- RSAES >::Decryptor rsaPriv(GlobalRNG(), 512);
- RSAES >::Encryptor rsaPub(rsaPriv);
+ RSAES >::Decryptor rsaPriv(GlobalRNG(), 512);
+ RSAES >::Encryptor rsaPub(rsaPriv);
pass = CryptoSystemValidate(rsaPriv, rsaPub) && pass;
}
@@ -679,16 +679,16 @@ bool ValidateNR()
bool pass = true;
{
FileSource f(CRYPTOPP_DATA_DIR "TestData/nr2048.dat", true, new HexDecoder);
- NR::Signer privS(f);
+ NR::Signer privS(f);
privS.AccessKey().Precompute();
- NR::Verifier pubS(privS);
+ NR::Verifier pubS(privS);
pass = SignatureValidate(privS, pubS) && pass;
}
{
std::cout << "Generating new signature key..." << std::endl;
- NR::Signer privS(GlobalRNG(), 256);
- NR::Verifier pubS(privS);
+ NR::Signer privS(GlobalRNG(), 256);
+ NR::Verifier pubS(privS);
pass = SignatureValidate(privS, pubS) && pass;
}
@@ -736,8 +736,8 @@ bool ValidateLUC_DL()
std::cout << "\nLUC-HMP validation suite running...\n\n";
FileSource f(CRYPTOPP_DATA_DIR "TestData/lucs512.dat", true, new HexDecoder);
- LUC_HMP::Signer privS(f);
- LUC_HMP::Verifier pubS(privS);
+ LUC_HMP::Signer privS(f);
+ LUC_HMP::Verifier pubS(privS);
bool pass = SignatureValidate(privS, pubS);
std::cout << "\nLUC-IES validation suite running...\n\n";
@@ -757,13 +757,13 @@ bool ValidateRabin()
{
FileSource f(CRYPTOPP_DATA_DIR "TestData/rabi1024.dat", true, new HexDecoder);
- RabinSS::Signer priv(f);
- RabinSS::Verifier pub(priv);
+ RabinSS::Signer priv(f);
+ RabinSS::Verifier pub(priv);
pass = SignatureValidate(priv, pub) && pass;
}
{
- RabinES >::Decryptor priv(GlobalRNG(), 512);
- RabinES >::Encryptor pub(priv);
+ RabinES >::Decryptor priv(GlobalRNG(), 512);
+ RabinES >::Encryptor pub(priv);
pass = CryptoSystemValidate(priv, pub) && pass;
}
return pass;
@@ -774,8 +774,8 @@ bool ValidateRW()
std::cout << "\nRW validation suite running...\n\n";
FileSource f(CRYPTOPP_DATA_DIR "TestData/rw1024.dat", true, new HexDecoder);
- RWSS::Signer priv(f);
- RWSS::Verifier pub(priv);
+ RWSS::Signer priv(f);
+ RWSS::Verifier pub(priv);
return SignatureValidate(priv, pub);
}
@@ -917,8 +917,8 @@ bool ValidateECP()
cpriv.GetKey().DEREncode(bq);
cpub.AccessKey().AccessGroupParameters().SetEncodeAsOID(true);
cpub.GetKey().DEREncode(bq);
- ECDSA::Signer spriv(bq);
- ECDSA::Verifier spub(bq);
+ ECDSA::Signer spriv(bq);
+ ECDSA::Verifier spub(bq);
ECDH::Domain ecdhc(ASN1::secp192r1());
ECMQV::Domain ecmqvc(ASN1::secp192r1());
@@ -966,8 +966,8 @@ bool ValidateEC2N()
cpriv.DEREncode(bq);
cpub.AccessKey().AccessGroupParameters().SetEncodeAsOID(true);
cpub.DEREncode(bq);
- ECDSA::Signer spriv(bq);
- ECDSA::Verifier spub(bq);
+ ECDSA::Signer spriv(bq);
+ ECDSA::Verifier spub(bq);
ECDH::Domain ecdhc(ASN1::sect193r1());
ECMQV::Domain ecmqvc(ASN1::sect193r1());
@@ -1023,8 +1023,8 @@ bool ValidateECDSA()
Integer n("40000000000000000000000004a20e90c39067c893bbb9a5H");
Integer d("340562e1dda332f9d2aec168249b5696ee39d0ed4d03760fH");
EC2N::Point Q(ec.Multiply(d, P));
- ECDSA::Signer priv(ec, P, n, d);
- ECDSA::Verifier pub(priv);
+ ECDSA::Signer priv(ec, P, n, d);
+ ECDSA::Verifier pub(priv);
Integer h("A9993E364706816ABA3E25717850C26C9CD0D89DH");
Integer k("3eeace72b4919d991738d521879f787cb590aff8189d2b69H");
@@ -1416,8 +1416,8 @@ bool ValidateESIGN()
"\x79\xA2\xE5\x52\x20\x5D\x97\x5E\xFE\x39\xAE\x21\x10\xFB\x35\xF4\x80\x81\x41\x13\xDD\xE8\x5F\xCA\x1E\x4F\xF8\x9B\xB2\x68\xFB\x28";
FileSource keys(CRYPTOPP_DATA_DIR "TestData/esig1536.dat", true, new HexDecoder);
- ESIGN::Signer signer(keys);
- ESIGN::Verifier verifier(signer);
+ ESIGN::Signer signer(keys);
+ ESIGN::Verifier verifier(signer);
fail = !SignatureValidate(signer, verifier);
pass = pass && !fail;