#if CRYPTKIT_HIGH_LEVEL_SIG
+#warning HLS
/*
* Generate digital signature, ElGamal style.
*/
return frtn;
}
#endif /* CRYPTKIT_ECDSA_ENABLE */
+#endif /* CRYPTKIT_HIGH_LEVEL_SIG */
#endif /* ECDSA_VERIFY_ONLY */
+#if CRYPTKIT_HIGH_LEVEL_SIG
+
#if CRYPTKIT_ECDSA_ENABLE
/*
pkinst->plus->twist = CURVE_PLUS;
pkinst->minus->twist = CURVE_MINUS;
frtn = feeDERDecodePublicKey(keyBlob,
- keyBlobLen,
+ (unsigned)keyBlobLen,
&version, // currently unused
&pkinst->cp,
&pkinst->plus->x,
}
memset(pkinst, 0, sizeof(pubKeyInst));
frtn = feeDERDecodePrivateKey(keyBlob,
- keyBlobLen,
+ (unsigned)keyBlobLen,
&version, // currently unused
&pkinst->cp,
&pkinst->privGiant);
unsigned xyStrLen = 0;
/* obtain x/y and depth from X509 encoding */
- feeReturn frtn = feeDERDecodeX509PublicKey(keyBlob, keyBlobLen, &depth,
+ feeReturn frtn = feeDERDecodeX509PublicKey(keyBlob, (unsigned)keyBlobLen, &depth,
&xyStr, &xyStrLen);
if(frtn) {
return frtn;
/* obtain x/y and depth from PKCS8 encoding */
/* For now we ignore the possible public key string */
- feeReturn frtn = feeDERDecodePKCS8PrivateKey(keyBlob, keyBlobLen, &depth,
+ feeReturn frtn = feeDERDecodePKCS8PrivateKey(keyBlob, (unsigned)keyBlobLen, &depth,
&privStr, &privStrLen, NULL, NULL);
if(frtn) {
return frtn;
unsigned pubStrLen = 0;
/* obtain x/y, public bit string, and depth from PKCS8 encoding */
- feeReturn frtn = feeDERDecodeOpenSSLKey(keyBlob, keyBlobLen, &depth,
+ feeReturn frtn = feeDERDecodeOpenSSLKey(keyBlob, (unsigned)keyBlobLen, &depth,
&privStr, &privStrLen, &pubStr, &pubStrLen);
if(frtn) {
return frtn;