summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorNikos Mavrogiannopoulos <nmav@gnutls.org>2001-12-11 16:36:00 +0000
committerNikos Mavrogiannopoulos <nmav@gnutls.org>2001-12-11 16:36:00 +0000
commit72f80dd4ef80569aca91e4991576d3d0f1954e55 (patch)
treefd9ad2c2e4ddff3d33a01577fec4249c0ec963fe
parent4ef06931f254c1fc93e3ba85014c4367cdd44f00 (diff)
downloadgnutls-72f80dd4ef80569aca91e4991576d3d0f1954e55.tar.gz
*** empty log message ***
-rw-r--r--NEWS3
-rw-r--r--THANKS1
-rw-r--r--lib/gnutls_int.h1
-rw-r--r--lib/gnutls_pk.c9
4 files changed, 7 insertions, 7 deletions
diff --git a/NEWS b/NEWS
index bb55e2296b..f65ae2842f 100644
--- a/NEWS
+++ b/NEWS
@@ -1,3 +1,6 @@
+Version ?.?.?
+- Corrected bug in new integer formatting (now we use the old again)
+
Version 0.2.91 (10/12/2001)
- Fixes in MPI handling (fixes possible bug with signed integers)
- Removed name indication extension
diff --git a/THANKS b/THANKS
index 7d6832f9ea..261507e449 100644
--- a/THANKS
+++ b/THANKS
@@ -1,3 +1,4 @@
+Werner Koch <wk@gnupg.org>
Tarun Upadhyay <tarun@poboxes.com>
Neil Spring <nspring@saavie.org>
Paul Sheer <psheer@icon.co.za>
diff --git a/lib/gnutls_int.h b/lib/gnutls_int.h
index 23b2038d03..d517b1ff49 100644
--- a/lib/gnutls_int.h
+++ b/lib/gnutls_int.h
@@ -35,7 +35,6 @@
#define DEBUG
*/
-
/* It might be a good idea to replace int with void*
* here.
*/
diff --git a/lib/gnutls_pk.c b/lib/gnutls_pk.c
index 85842e7fc7..a906547917 100644
--- a/lib/gnutls_pk.c
+++ b/lib/gnutls_pk.c
@@ -108,7 +108,7 @@ int _gnutls_pkcs1_rsa_encrypt(gnutls_datum * ciphertext, gnutls_datum plaintext,
return ret;
}
- _gnutls_mpi_print_raw( NULL, &psize, res);
+ _gnutls_mpi_print( NULL, &psize, res);
ciphertext->data = gnutls_malloc(psize);
if (ciphertext->data == NULL) {
@@ -116,7 +116,7 @@ int _gnutls_pkcs1_rsa_encrypt(gnutls_datum * ciphertext, gnutls_datum plaintext,
_gnutls_mpi_release(&res);
return GNUTLS_E_MEMORY_ERROR;
}
- _gnutls_mpi_print_raw( ciphertext->data, &psize, res);
+ _gnutls_mpi_print( ciphertext->data, &psize, res);
ciphertext->size = psize;
_gnutls_mpi_release(&res);
@@ -140,15 +140,12 @@ int _gnutls_pkcs1_rsa_decrypt(gnutls_sdatum * plaintext, gnutls_datum ciphertext
k = gcry_mpi_get_nbits(n) / 8;
esize = ciphertext.size;
- /* here we have a problem if the integer has leading zeros.
- * However this is STRICT PKCS1.
- */
if (esize != k) {
gnutls_assert();
return GNUTLS_E_PK_DECRYPTION_FAILED;
}
- if (_gnutls_mpi_scan_raw(&c, ciphertext.data, &esize) != 0) {
+ if (_gnutls_mpi_scan(&c, ciphertext.data, &esize) != 0) {
gnutls_assert();
return GNUTLS_E_MPI_SCAN_FAILED;
}