summaryrefslogtreecommitdiff
path: root/test.cpp
diff options
context:
space:
mode:
authorJeffrey Walton <noloader@gmail.com>2017-04-24 05:05:14 -0400
committerJeffrey Walton <noloader@gmail.com>2017-04-24 05:05:14 -0400
commit2297dd000a7cf2831095ba59be2ed653ea3bd884 (patch)
tree7aa629b92a168f33e8bc390de698a09c7286144f /test.cpp
parent64f1b50b7fc5cf887becd70b3e35ded6d98bf639 (diff)
downloadcryptopp-git-2297dd000a7cf2831095ba59be2ed653ea3bd884.tar.gz
Removed "typedef SHA1 SHA" (Issue 369)
This should have happened when we removed most of MAINTAIN_BACKWARDS_COMPATIBILITY artifacts. Its not practical move SHA1 into Weak:: namespace or "typedef SHA256 SHA" because SHA1 is too intertwined at the moment. In the interim, maybe we can place SHA1 in both CryptoPP:: and Weak:: namespaces. This will allow us to transition into Weak::SHA1 over time, and signal to users SHA1 should be avoided.
Diffstat (limited to 'test.cpp')
-rw-r--r--test.cpp4
1 files changed, 2 insertions, 2 deletions
diff --git a/test.cpp b/test.cpp
index e41a49e3..72fda0d7 100644
--- a/test.cpp
+++ b/test.cpp
@@ -543,14 +543,14 @@ std::string RSADecryptString(const char *privFilename, const char *ciphertext)
void RSASignFile(const char *privFilename, const char *messageFilename, const char *signatureFilename)
{
FileSource privFile(privFilename, true, new HexDecoder);
- RSASS<PKCS1v15, SHA>::Signer priv(privFile);
+ RSASS<PKCS1v15, SHA1>::Signer priv(privFile);
FileSource f(messageFilename, true, new SignerFilter(Test::GlobalRNG(), priv, new HexEncoder(new FileSink(signatureFilename))));
}
bool RSAVerifyFile(const char *pubFilename, const char *messageFilename, const char *signatureFilename)
{
FileSource pubFile(pubFilename, true, new HexDecoder);
- RSASS<PKCS1v15, SHA>::Verifier pub(pubFile);
+ RSASS<PKCS1v15, SHA1>::Verifier pub(pubFile);
FileSource signatureFile(signatureFilename, true, new HexDecoder);
if (signatureFile.MaxRetrievable() != pub.SignatureLength())