diff options
author | Jeffrey Walton <noloader@gmail.com> | 2017-04-24 05:05:14 -0400 |
---|---|---|
committer | Jeffrey Walton <noloader@gmail.com> | 2017-04-24 05:05:14 -0400 |
commit | 2297dd000a7cf2831095ba59be2ed653ea3bd884 (patch) | |
tree | 7aa629b92a168f33e8bc390de698a09c7286144f /test.cpp | |
parent | 64f1b50b7fc5cf887becd70b3e35ded6d98bf639 (diff) | |
download | cryptopp-git-2297dd000a7cf2831095ba59be2ed653ea3bd884.tar.gz |
Removed "typedef SHA1 SHA" (Issue 369)
This should have happened when we removed most of MAINTAIN_BACKWARDS_COMPATIBILITY artifacts. Its not practical move SHA1 into Weak:: namespace or "typedef SHA256 SHA" because SHA1 is too intertwined at the moment.
In the interim, maybe we can place SHA1 in both CryptoPP:: and Weak:: namespaces. This will allow us to transition into Weak::SHA1 over time, and signal to users SHA1 should be avoided.
Diffstat (limited to 'test.cpp')
-rw-r--r-- | test.cpp | 4 |
1 files changed, 2 insertions, 2 deletions
@@ -543,14 +543,14 @@ std::string RSADecryptString(const char *privFilename, const char *ciphertext) void RSASignFile(const char *privFilename, const char *messageFilename, const char *signatureFilename)
{
FileSource privFile(privFilename, true, new HexDecoder);
- RSASS<PKCS1v15, SHA>::Signer priv(privFile);
+ RSASS<PKCS1v15, SHA1>::Signer priv(privFile);
FileSource f(messageFilename, true, new SignerFilter(Test::GlobalRNG(), priv, new HexEncoder(new FileSink(signatureFilename))));
}
bool RSAVerifyFile(const char *pubFilename, const char *messageFilename, const char *signatureFilename)
{
FileSource pubFile(pubFilename, true, new HexDecoder);
- RSASS<PKCS1v15, SHA>::Verifier pub(pubFile);
+ RSASS<PKCS1v15, SHA1>::Verifier pub(pubFile);
FileSource signatureFile(signatureFilename, true, new HexDecoder);
if (signatureFile.MaxRetrievable() != pub.SignatureLength())
|