diff --git a/bench2.cpp b/bench2.cpp index b83c4192..e0853c4a 100644 --- a/bench2.cpp +++ b/bench2.cpp @@ -246,40 +246,40 @@ void Benchmark3(double t, double hertz) std::cout << "\n"; { - BenchMarkCrypto > >(CRYPTOPP_DATA_DIR "TestData/rsa1024.dat", "RSA 1024", t); - BenchMarkCrypto > >(CRYPTOPP_DATA_DIR "TestData/luc1024.dat", "LUC 1024", t); + BenchMarkCrypto > >(CRYPTOPP_DATA_DIR "TestData/rsa1024.dat", "RSA 1024", t); + BenchMarkCrypto > >(CRYPTOPP_DATA_DIR "TestData/luc1024.dat", "LUC 1024", t); BenchMarkCrypto >(CRYPTOPP_DATA_DIR "TestData/dlie1024.dat", "DLIES 1024", t); BenchMarkCrypto >(CRYPTOPP_DATA_DIR "TestData/lucc512.dat", "LUCELG 512", t); } std::cout << "\n"; { - BenchMarkCrypto > >(CRYPTOPP_DATA_DIR "TestData/rsa2048.dat", "RSA 2048", t); - BenchMarkCrypto > >(CRYPTOPP_DATA_DIR "TestData/luc2048.dat", "LUC 2048", t); + BenchMarkCrypto > >(CRYPTOPP_DATA_DIR "TestData/rsa2048.dat", "RSA 2048", t); + BenchMarkCrypto > >(CRYPTOPP_DATA_DIR "TestData/luc2048.dat", "LUC 2048", t); BenchMarkCrypto >(CRYPTOPP_DATA_DIR "TestData/dlie2048.dat", "DLIES 2048", t); BenchMarkCrypto >(CRYPTOPP_DATA_DIR "TestData/lucc1024.dat", "LUCELG 1024", t); } std::cout << "\n"; { - BenchMarkSignature >(CRYPTOPP_DATA_DIR "TestData/rsa1024.dat", "RSA 1024", t); - BenchMarkSignature >(CRYPTOPP_DATA_DIR "TestData/rw1024.dat", "RW 1024", t); - BenchMarkSignature >(CRYPTOPP_DATA_DIR "TestData/luc1024.dat", "LUC 1024", t); - BenchMarkSignature >(CRYPTOPP_DATA_DIR "TestData/nr1024.dat", "NR 1024", t); + BenchMarkSignature >(CRYPTOPP_DATA_DIR "TestData/rsa1024.dat", "RSA 1024", t); + BenchMarkSignature >(CRYPTOPP_DATA_DIR "TestData/rw1024.dat", "RW 1024", t); + BenchMarkSignature >(CRYPTOPP_DATA_DIR "TestData/luc1024.dat", "LUC 1024", t); + BenchMarkSignature >(CRYPTOPP_DATA_DIR "TestData/nr1024.dat", "NR 1024", t); BenchMarkSignature(CRYPTOPP_DATA_DIR "TestData/dsa1024.dat", "DSA 1024", t); - BenchMarkSignature >(CRYPTOPP_DATA_DIR "TestData/lucs512.dat", "LUC-HMP 512", t); - BenchMarkSignature >(CRYPTOPP_DATA_DIR "TestData/esig1023.dat", "ESIGN 1023", t); - BenchMarkSignature >(CRYPTOPP_DATA_DIR "TestData/esig1536.dat", "ESIGN 1536", t); + BenchMarkSignature >(CRYPTOPP_DATA_DIR "TestData/lucs512.dat", "LUC-HMP 512", t); + BenchMarkSignature >(CRYPTOPP_DATA_DIR "TestData/esig1023.dat", "ESIGN 1023", t); + BenchMarkSignature >(CRYPTOPP_DATA_DIR "TestData/esig1536.dat", "ESIGN 1536", t); } std::cout << "\n"; { - BenchMarkSignature >(CRYPTOPP_DATA_DIR "TestData/rsa2048.dat", "RSA 2048", t); - BenchMarkSignature >(CRYPTOPP_DATA_DIR "TestData/rw2048.dat", "RW 2048", t); - BenchMarkSignature >(CRYPTOPP_DATA_DIR "TestData/luc2048.dat", "LUC 2048", t); - BenchMarkSignature >(CRYPTOPP_DATA_DIR "TestData/nr2048.dat", "NR 2048", t); - BenchMarkSignature >(CRYPTOPP_DATA_DIR "TestData/lucs1024.dat", "LUC-HMP 1024", t); - BenchMarkSignature >(CRYPTOPP_DATA_DIR "TestData/esig2046.dat", "ESIGN 2046", t); + BenchMarkSignature >(CRYPTOPP_DATA_DIR "TestData/rsa2048.dat", "RSA 2048", t); + BenchMarkSignature >(CRYPTOPP_DATA_DIR "TestData/rw2048.dat", "RW 2048", t); + BenchMarkSignature >(CRYPTOPP_DATA_DIR "TestData/luc2048.dat", "LUC 2048", t); + BenchMarkSignature >(CRYPTOPP_DATA_DIR "TestData/nr2048.dat", "NR 2048", t); + BenchMarkSignature >(CRYPTOPP_DATA_DIR "TestData/lucs1024.dat", "LUC-HMP 1024", t); + BenchMarkSignature >(CRYPTOPP_DATA_DIR "TestData/esig2046.dat", "ESIGN 2046", t); } std::cout << "\n"; @@ -310,12 +310,12 @@ void Benchmark3(double t, double hertz) { ECIES::Decryptor cpriv(Test::GlobalRNG(), ASN1::secp256k1()); ECIES::Encryptor cpub(cpriv); - ECDSA::Signer spriv(cpriv); - ECDSA::Verifier spub(spriv); - ECDSA_RFC6979::Signer spriv2(cpriv); - ECDSA_RFC6979::Verifier spub2(spriv); - ECGDSA::Signer spriv3(Test::GlobalRNG(), ASN1::secp256k1()); - ECGDSA::Verifier spub3(spriv3); + ECDSA::Signer spriv(cpriv); + ECDSA::Verifier spub(spriv); + ECDSA_RFC6979::Signer spriv2(cpriv); + ECDSA_RFC6979::Verifier spub2(spriv); + ECGDSA::Signer spriv3(Test::GlobalRNG(), ASN1::secp256k1()); + ECGDSA::Verifier spub3(spriv3); ECDH::Domain ecdhc(ASN1::secp256k1()); ECMQV::Domain ecmqvc(ASN1::secp256k1()); @@ -337,12 +337,12 @@ void Benchmark3(double t, double hertz) { ECIES::Decryptor cpriv(Test::GlobalRNG(), ASN1::sect233r1()); ECIES::Encryptor cpub(cpriv); - ECDSA::Signer spriv(cpriv); - ECDSA::Verifier spub(spriv); - ECDSA_RFC6979::Signer spriv2(cpriv); - ECDSA_RFC6979::Verifier spub2(spriv); - ECGDSA::Signer spriv3(Test::GlobalRNG(), ASN1::sect233r1()); - ECGDSA::Verifier spub3(spriv3); + ECDSA::Signer spriv(cpriv); + ECDSA::Verifier spub(spriv); + ECDSA_RFC6979::Signer spriv2(cpriv); + ECDSA_RFC6979::Verifier spub2(spriv); + ECGDSA::Signer spriv3(Test::GlobalRNG(), ASN1::sect233r1()); + ECGDSA::Verifier spub3(spriv3); ECDH::Domain ecdhc(ASN1::sect233r1()); ECMQV::Domain ecmqvc(ASN1::sect233r1()); diff --git a/default.h b/default.h index 78bc0d19..691cbbb3 100644 --- a/default.h +++ b/default.h @@ -19,7 +19,7 @@ NAMESPACE_BEGIN(CryptoPP) //! \brief Legacy block cipher for LegacyEncryptor, LegacyDecryptor, LegacyEncryptorWithMAC and LegacyDecryptorWithMAC typedef DES_EDE2 LegacyBlockCipher; //! \brief Legacy hash for use with LegacyEncryptorWithMAC and LegacyDecryptorWithMAC -typedef SHA LegacyHashModule; +typedef SHA1 LegacyHashModule; //! \brief Legacy HMAC for use withLegacyEncryptorWithMAC and LegacyDecryptorWithMAC typedef HMAC LegacyMAC; diff --git a/eccrypto.h b/eccrypto.h index df1dbe81..2a1836c2 100644 --- a/eccrypto.h +++ b/eccrypto.h @@ -398,7 +398,7 @@ struct ECDSA_RFC6979 : public DL_SS< //! \brief Elliptic Curve NR (ECNR) signature scheme //! \tparam EC elliptic curve field //! \tparam H HashTransformation derived class -template +template struct ECNR : public DL_SS, DL_Algorithm_ECNR, DL_SignatureMessageEncodingMethod_NR, H> { }; diff --git a/esign.cpp b/esign.cpp index 77137d66..7c69a684 100644 --- a/esign.cpp +++ b/esign.cpp @@ -21,15 +21,15 @@ NAMESPACE_BEGIN(CryptoPP) #if defined(CRYPTOPP_DEBUG) && !defined(CRYPTOPP_DOXYGEN_PROCESSING) void ESIGN_TestInstantiations() { - ESIGN::Verifier x1(1, 1); - ESIGN::Signer x2(NullRNG(), 1); - ESIGN::Verifier x3(x2); - ESIGN::Verifier x4(x2.GetKey()); - ESIGN::Verifier x5(x3); - ESIGN::Signer x6 = x2; + ESIGN::Verifier x1(1, 1); + ESIGN::Signer x2(NullRNG(), 1); + ESIGN::Verifier x3(x2); + ESIGN::Verifier x4(x2.GetKey()); + ESIGN::Verifier x5(x3); + ESIGN::Signer x6 = x2; x6 = x2; - x3 = ESIGN::Verifier(x2); + x3 = ESIGN::Verifier(x2); x4 = x2.GetKey(); } #endif diff --git a/fipsalgt.cpp b/fipsalgt.cpp index 26ce6477..ccba9940 100644 --- a/fipsalgt.cpp +++ b/fipsalgt.cpp @@ -457,7 +457,7 @@ protected: Integer p, q, h, g; int counter; - SecByteBlock seed(SHA::DIGESTSIZE); + SecByteBlock seed(SHA1::DIGESTSIZE); do { m_rng.GenerateBlock(seed, seed.size()); diff --git a/gfpcrypt.cpp b/gfpcrypt.cpp index 9e821c91..6494b084 100644 --- a/gfpcrypt.cpp +++ b/gfpcrypt.cpp @@ -23,12 +23,12 @@ NAMESPACE_BEGIN(CryptoPP) #if defined(CRYPTOPP_DEBUG) && !defined(CRYPTOPP_DOXYGEN_PROCESSING) void TestInstantiations_gfpcrypt() { - GDSA::Signer test; - GDSA::Verifier test1; + GDSA::Signer test; + GDSA::Verifier test1; DSA::Signer test5(NullRNG(), 100); DSA::Signer test2(test5); - NR::Signer test3; - NR::Verifier test4; + NR::Signer test3; + NR::Verifier test4; DLIES<>::Encryptor test6; DLIES<>::Decryptor test7; } diff --git a/gfpcrypt.h b/gfpcrypt.h index 75e99705..974886fa 100644 --- a/gfpcrypt.h +++ b/gfpcrypt.h @@ -737,7 +737,7 @@ class DSA2; struct DL_Keys_DSA { typedef DL_PublicKey_GFP PublicKey; - typedef DL_PrivateKey_WithSignaturePairwiseConsistencyTest, DSA2 > PrivateKey; + typedef DL_PrivateKey_WithSignaturePairwiseConsistencyTest, DSA2 > PrivateKey; }; //! \class DSA2 @@ -779,7 +779,7 @@ typedef DSA2 DSA; CRYPTOPP_DLL_TEMPLATE_CLASS DL_PublicKey_GFP; CRYPTOPP_DLL_TEMPLATE_CLASS DL_PrivateKey_GFP; -CRYPTOPP_DLL_TEMPLATE_CLASS DL_PrivateKey_WithSignaturePairwiseConsistencyTest, DSA2 >; +CRYPTOPP_DLL_TEMPLATE_CLASS DL_PrivateKey_WithSignaturePairwiseConsistencyTest, DSA2 >; //! \class DL_EncryptionAlgorithm_Xor //! \brief P1363 based XOR Encryption Method diff --git a/luc.cpp b/luc.cpp index c9faca62..702fc9f6 100644 --- a/luc.cpp +++ b/luc.cpp @@ -13,7 +13,7 @@ NAMESPACE_BEGIN(CryptoPP) #if defined(CRYPTOPP_DEBUG) && !defined(CRYPTOPP_DOXYGEN_PROCESSING) void LUC_TestInstantiations() { - LUC_HMP::Signer t1; + LUC_HMP::Signer t1; LUCFunction t2; InvertibleLUCFunction t3; } diff --git a/luc.h b/luc.h index 49032a13..7b31edfe 100644 --- a/luc.h +++ b/luc.h @@ -152,11 +152,11 @@ struct LUCSS : public TF_SS }; // analogous to the RSA schemes defined in PKCS #1 v2.0 -typedef LUCES >::Decryptor LUCES_OAEP_SHA_Decryptor; -typedef LUCES >::Encryptor LUCES_OAEP_SHA_Encryptor; +typedef LUCES >::Decryptor LUCES_OAEP_SHA_Decryptor; +typedef LUCES >::Encryptor LUCES_OAEP_SHA_Encryptor; -typedef LUCSS::Signer LUCSSA_PKCS1v15_SHA_Signer; -typedef LUCSS::Verifier LUCSSA_PKCS1v15_SHA_Verifier; +typedef LUCSS::Signer LUCSSA_PKCS1v15_SHA_Signer; +typedef LUCSS::Verifier LUCSSA_PKCS1v15_SHA_Verifier; // ******************************************************** diff --git a/oaep.h b/oaep.h index b299f71f..1809af43 100644 --- a/oaep.h +++ b/oaep.h @@ -37,7 +37,7 @@ protected: MaskGeneratingFunction * NewMGF() const {return new MGF;} }; -CRYPTOPP_DLL_TEMPLATE_CLASS OAEP; +CRYPTOPP_DLL_TEMPLATE_CLASS OAEP; NAMESPACE_END diff --git a/randpool.h b/randpool.h index c356dca6..3214e3c0 100644 --- a/randpool.h +++ b/randpool.h @@ -20,8 +20,8 @@ //! # Go back one more //! git checkout HEAD~1 //! -//! $ grep 'MDC' *.h *.cpp -//! randpool.cpp:typedef MDC RandomPoolCipher; +//! $ grep 'MDC' *.h *.cpp +//! randpool.cpp:typedef MDC RandomPoolCipher; //! //! \since Crypto++ 4.0 (PGP 2.6.x style), Crypto++ 5.5 (AES-256 based) diff --git a/rsa.cpp b/rsa.cpp index c730ac39..6853d22d 100644 --- a/rsa.cpp +++ b/rsa.cpp @@ -15,13 +15,13 @@ NAMESPACE_BEGIN(CryptoPP) void RSA_TestInstantiations() { - RSASS::Verifier x1(1, 1); - RSASS::Signer x2(NullRNG(), 1); - RSASS::Verifier x3(x2); - RSASS::Verifier x4(x2.GetKey()); - RSASS::Verifier x5(x3); + RSASS::Verifier x1(1, 1); + RSASS::Signer x2(NullRNG(), 1); + RSASS::Verifier x3(x2); + RSASS::Verifier x4(x2.GetKey()); + RSASS::Verifier x5(x3); #ifndef __MWERKS__ - RSASS::Signer x6 = x2; + RSASS::Signer x6 = x2; x3 = x2; x6 = x2; #endif @@ -29,7 +29,7 @@ void RSA_TestInstantiations() #ifndef __GNUC__ RSAES::Encryptor x8(x3); #endif - RSAES >::Encryptor x9(x2); + RSAES >::Encryptor x9(x2); x4 = x2.GetKey(); } @@ -136,12 +136,12 @@ void InvertibleRSAFunction::GenerateRandom(RandomNumberGenerator &rng, const Nam if (FIPS_140_2_ComplianceEnabled()) { - RSASS::Signer signer(*this); - RSASS::Verifier verifier(signer); + RSASS::Signer signer(*this); + RSASS::Verifier verifier(signer); SignaturePairwiseConsistencyTest_FIPS_140_Only(signer, verifier); - RSAES >::Decryptor decryptor(*this); - RSAES >::Encryptor encryptor(decryptor); + RSAES >::Decryptor decryptor(*this); + RSAES >::Encryptor encryptor(decryptor); EncryptionPairwiseConsistencyTest_FIPS_140_Only(encryptor, decryptor); } } diff --git a/rsa.h b/rsa.h index 6f195a64..f4c8fe20 100644 --- a/rsa.h +++ b/rsa.h @@ -217,22 +217,22 @@ DOCUMENTED_TYPEDEF(RSAES::Decryptor, RSAES_PKCS1v15_Decryptor); //! \details RSA encryption scheme defined in PKCS #1 v2.0 DOCUMENTED_TYPEDEF(RSAES::Encryptor, RSAES_PKCS1v15_Encryptor); -//! \brief \ref RSAES "RSAES>::Decryptor" typedef +//! \brief \ref RSAES "RSAES>::Decryptor" typedef //! \details RSA encryption scheme defined in PKCS #1 v2.0 -DOCUMENTED_TYPEDEF(RSAES >::Decryptor, RSAES_OAEP_SHA_Decryptor); -//! \brief \ref RSAES "RSAES>::Encryptor" typedef +DOCUMENTED_TYPEDEF(RSAES >::Decryptor, RSAES_OAEP_SHA_Decryptor); +//! \brief \ref RSAES "RSAES>::Encryptor" typedef //! \details RSA encryption scheme defined in PKCS #1 v2.0 -DOCUMENTED_TYPEDEF(RSAES >::Encryptor, RSAES_OAEP_SHA_Encryptor); +DOCUMENTED_TYPEDEF(RSAES >::Encryptor, RSAES_OAEP_SHA_Encryptor); #ifdef CRYPTOPP_DOXYGEN_PROCESSING -//! \brief \ref RSASS "RSASS::Signer" typedef +//! \brief \ref RSASS "RSASS::Signer" typedef //! \details RSA signature schemes defined in PKCS #1 v2.0 //! \since Crypto++ 1.0 -class RSASSA_PKCS1v15_SHA_Signer : public RSASS::Signer {}; -//! \brief \ref RSASS "RSASS::Verifier" typedef +class RSASSA_PKCS1v15_SHA_Signer : public RSASS::Signer {}; +//! \brief \ref RSASS "RSASS::Verifier" typedef //! \details RSA signature schemes defined in PKCS #1 v2.0 //! \since Crypto++ 1.0 -class RSASSA_PKCS1v15_SHA_Verifier : public RSASS::Verifier {}; +class RSASSA_PKCS1v15_SHA_Verifier : public RSASS::Verifier {}; namespace Weak { @@ -256,8 +256,8 @@ class RSASSA_PKCS1v15_MD5_Verifier : public RSASS::Verifie } #else -typedef RSASS::Signer RSASSA_PKCS1v15_SHA_Signer; -typedef RSASS::Verifier RSASSA_PKCS1v15_SHA_Verifier; +typedef RSASS::Signer RSASSA_PKCS1v15_SHA_Signer; +typedef RSASS::Verifier RSASSA_PKCS1v15_SHA_Verifier; namespace Weak { typedef RSASS::Signer RSASSA_PKCS1v15_MD2_Signer; diff --git a/seal.cpp b/seal.cpp index d0ba4fce..acc4e4e5 100644 --- a/seal.cpp +++ b/seal.cpp @@ -39,7 +39,7 @@ word32 SEAL_Gamma::Apply(word32 i) { memcpy(Z, H, 20); D[0] = shaIndex; - SHA::Transform(Z, D); + SHA1::Transform(Z, D); lastIndex = shaIndex; } return Z[i%5]; diff --git a/sha.h b/sha.h index ce2ff06e..806317d4 100644 --- a/sha.h +++ b/sha.h @@ -30,8 +30,6 @@ public: CRYPTOPP_STATIC_CONSTEXPR const char* CRYPTOPP_API StaticAlgorithmName() {return "SHA-1";} }; -typedef SHA1 SHA; // for backwards compatibility - //! \class SHA256 //! \brief SHA-256 message digest //! \sa SHA-256 diff --git a/test.cpp b/test.cpp index e41a49e3..72fda0d7 100644 --- a/test.cpp +++ b/test.cpp @@ -543,14 +543,14 @@ std::string RSADecryptString(const char *privFilename, const char *ciphertext) void RSASignFile(const char *privFilename, const char *messageFilename, const char *signatureFilename) { FileSource privFile(privFilename, true, new HexDecoder); - RSASS::Signer priv(privFile); + RSASS::Signer priv(privFile); FileSource f(messageFilename, true, new SignerFilter(Test::GlobalRNG(), priv, new HexEncoder(new FileSink(signatureFilename)))); } bool RSAVerifyFile(const char *pubFilename, const char *messageFilename, const char *signatureFilename) { FileSource pubFile(pubFilename, true, new HexDecoder); - RSASS::Verifier pub(pubFile); + RSASS::Verifier pub(pubFile); FileSource signatureFile(signatureFilename, true, new HexDecoder); if (signatureFile.MaxRetrievable() != pub.SignatureLength()) diff --git a/validat2.cpp b/validat2.cpp index 3e1eb8d8..1c039001 100644 --- a/validat2.cpp +++ b/validat2.cpp @@ -322,8 +322,8 @@ bool ValidateRSA() pass = CryptoSystemValidate(rsaPriv, rsaPub) && pass; } { - RSAES >::Decryptor rsaPriv(GlobalRNG(), 512); - RSAES >::Encryptor rsaPub(rsaPriv); + RSAES >::Decryptor rsaPriv(GlobalRNG(), 512); + RSAES >::Encryptor rsaPub(rsaPriv); pass = CryptoSystemValidate(rsaPriv, rsaPub) && pass; } @@ -679,16 +679,16 @@ bool ValidateNR() bool pass = true; { FileSource f(CRYPTOPP_DATA_DIR "TestData/nr2048.dat", true, new HexDecoder); - NR::Signer privS(f); + NR::Signer privS(f); privS.AccessKey().Precompute(); - NR::Verifier pubS(privS); + NR::Verifier pubS(privS); pass = SignatureValidate(privS, pubS) && pass; } { std::cout << "Generating new signature key..." << std::endl; - NR::Signer privS(GlobalRNG(), 256); - NR::Verifier pubS(privS); + NR::Signer privS(GlobalRNG(), 256); + NR::Verifier pubS(privS); pass = SignatureValidate(privS, pubS) && pass; } @@ -736,8 +736,8 @@ bool ValidateLUC_DL() std::cout << "\nLUC-HMP validation suite running...\n\n"; FileSource f(CRYPTOPP_DATA_DIR "TestData/lucs512.dat", true, new HexDecoder); - LUC_HMP::Signer privS(f); - LUC_HMP::Verifier pubS(privS); + LUC_HMP::Signer privS(f); + LUC_HMP::Verifier pubS(privS); bool pass = SignatureValidate(privS, pubS); std::cout << "\nLUC-IES validation suite running...\n\n"; @@ -757,13 +757,13 @@ bool ValidateRabin() { FileSource f(CRYPTOPP_DATA_DIR "TestData/rabi1024.dat", true, new HexDecoder); - RabinSS::Signer priv(f); - RabinSS::Verifier pub(priv); + RabinSS::Signer priv(f); + RabinSS::Verifier pub(priv); pass = SignatureValidate(priv, pub) && pass; } { - RabinES >::Decryptor priv(GlobalRNG(), 512); - RabinES >::Encryptor pub(priv); + RabinES >::Decryptor priv(GlobalRNG(), 512); + RabinES >::Encryptor pub(priv); pass = CryptoSystemValidate(priv, pub) && pass; } return pass; @@ -774,8 +774,8 @@ bool ValidateRW() std::cout << "\nRW validation suite running...\n\n"; FileSource f(CRYPTOPP_DATA_DIR "TestData/rw1024.dat", true, new HexDecoder); - RWSS::Signer priv(f); - RWSS::Verifier pub(priv); + RWSS::Signer priv(f); + RWSS::Verifier pub(priv); return SignatureValidate(priv, pub); } @@ -917,8 +917,8 @@ bool ValidateECP() cpriv.GetKey().DEREncode(bq); cpub.AccessKey().AccessGroupParameters().SetEncodeAsOID(true); cpub.GetKey().DEREncode(bq); - ECDSA::Signer spriv(bq); - ECDSA::Verifier spub(bq); + ECDSA::Signer spriv(bq); + ECDSA::Verifier spub(bq); ECDH::Domain ecdhc(ASN1::secp192r1()); ECMQV::Domain ecmqvc(ASN1::secp192r1()); @@ -966,8 +966,8 @@ bool ValidateEC2N() cpriv.DEREncode(bq); cpub.AccessKey().AccessGroupParameters().SetEncodeAsOID(true); cpub.DEREncode(bq); - ECDSA::Signer spriv(bq); - ECDSA::Verifier spub(bq); + ECDSA::Signer spriv(bq); + ECDSA::Verifier spub(bq); ECDH::Domain ecdhc(ASN1::sect193r1()); ECMQV::Domain ecmqvc(ASN1::sect193r1()); @@ -1023,8 +1023,8 @@ bool ValidateECDSA() Integer n("40000000000000000000000004a20e90c39067c893bbb9a5H"); Integer d("340562e1dda332f9d2aec168249b5696ee39d0ed4d03760fH"); EC2N::Point Q(ec.Multiply(d, P)); - ECDSA::Signer priv(ec, P, n, d); - ECDSA::Verifier pub(priv); + ECDSA::Signer priv(ec, P, n, d); + ECDSA::Verifier pub(priv); Integer h("A9993E364706816ABA3E25717850C26C9CD0D89DH"); Integer k("3eeace72b4919d991738d521879f787cb590aff8189d2b69H"); @@ -1416,8 +1416,8 @@ bool ValidateESIGN() "\x79\xA2\xE5\x52\x20\x5D\x97\x5E\xFE\x39\xAE\x21\x10\xFB\x35\xF4\x80\x81\x41\x13\xDD\xE8\x5F\xCA\x1E\x4F\xF8\x9B\xB2\x68\xFB\x28"; FileSource keys(CRYPTOPP_DATA_DIR "TestData/esig1536.dat", true, new HexDecoder); - ESIGN::Signer signer(keys); - ESIGN::Verifier verifier(signer); + ESIGN::Signer signer(keys); + ESIGN::Verifier verifier(signer); fail = !SignatureValidate(signer, verifier); pass = pass && !fail;