{
register uint32 psize = p->size;
register uint32 qsize = q->size;
- // k + inv(k) = 2 * qsize
- // g^k mod p = psize+4*psize+2
+ /* k + inv(k) = 2 * qsize */
+ /* g^k mod p = psize+4*psize+2 */
register uint32* ptemp;
register uint32* qtemp;
register uint32* pwksp = ptemp+psize;
register uint32* qwksp = qtemp+3*qsize;
- // allocate r
+ /* allocate r */
mp32nfree(r);
mp32nsize(r, qsize);
- // get a random k, invertible modulo q
+ /* get a random k, invertible modulo q */
mp32brndinv_w(q, rgc, qtemp, qtemp+qsize, qwksp);
#if 0
mp32binv_w(q, qsize, qtemp, qtemp+qsize, qwksp);
#endif
- // g^k mod p
+ /* g^k mod p */
mp32bpowmod_w(p, g->size, g->data, qsize, qtemp, ptemp, pwksp);
- // (g^k mod p) mod q - simple modulo
+ /* (g^k mod p) mod q - simple modulo */
mp32nmod(qtemp+2*qsize, psize, ptemp, qsize, q->modl, pwksp);
mp32copy(qsize, r->data, qtemp+psize+qsize);
- // allocate s
+ /* allocate s */
mp32nfree(s);
mp32nsize(s, qsize);
- // x*r mod q
+ /* x*r mod q */
mp32bmulmod_w(q, x->size, x->data, r->size, r->data, qtemp, qwksp);
- // add h(m) mod q
+ /* add h(m) mod q */
mp32baddmod_w(q, qsize, qtemp, hm->size, hm->data, qtemp+2*qsize, qwksp);
- // multiply inv(k) mod q
+ /* multiply inv(k) mod q */
mp32bmulmod_w(q, qsize, qtemp+qsize, qsize, qtemp+2*qsize, s->data, qwksp);
rc = 0;
fprintf(stderr, "\t s: "), mp32println(stderr, s->size, s->data);
/*@=modfilesys@*/
}
- // compute w = inv(s) mod q
+ /* compute w = inv(s) mod q */
if (mp32binv_w(q, s->size, s->data, qtemp, qwksp))
{
/*@-modfilesys@*/
if (_debug)
fprintf(stderr, "\t w = inv(s) mod q: "), mp32println(stderr, qsize, qtemp);
/*@=modfilesys@*/
- // compute u1 = h(m)*w mod q
+ /* compute u1 = h(m)*w mod q */
mp32bmulmod_w(q, hm->size, hm->data, qsize, qtemp, qtemp+qsize, qwksp);
/*@-modfilesys@*/
if (_debug)
fprintf(stderr, "\tu1 = h(m)*w mod q: "), mp32println(stderr, qsize, qtemp+qsize);
/*@=modfilesys@*/
- // compute u2 = r*w mod q
+ /* compute u2 = r*w mod q */
mp32bmulmod_w(q, r->size, r->data, qsize, qtemp, qtemp, qwksp);
/*@-modfilesys@*/
if (_debug)
fprintf(stderr, "\tu2 = r*w mod q : "), mp32println(stderr, qsize, qtemp);
/*@=modfilesys@*/
- // compute g^u1 mod p
+ /* compute g^u1 mod p */
mp32bpowmod_w(p, g->size, g->data, qsize, qtemp+qsize, ptemp, pwksp);
/*@-modfilesys@*/
if (_debug)
fprintf(stderr, "\t g^u1 mod p: "), mp32println(stderr, psize, ptemp);
/*@=modfilesys@*/
- // compute y^u2 mod p
+ /* compute y^u2 mod p */
mp32bpowmod_w(p, y->size, y->data, qsize, qtemp, ptemp+psize, pwksp);
/*@-modfilesys@*/
if (_debug)
fprintf(stderr, "\t y^u2 mod p: "), mp32println(stderr, psize, ptemp+psize);
/*@=modfilesys@*/
- // multiply mod p
+ /* multiply mod p */
mp32bmulmod_w(p, psize, ptemp, psize, ptemp+psize, ptemp, pwksp);
/*@-modfilesys@*/
if (_debug)
fprintf(stderr, "\t multiply mod p: "), mp32println(stderr, psize, ptemp);
/*@=modfilesys@*/
- // modulo q
+ /* modulo q */
mp32nmod(ptemp+psize, psize, ptemp, qsize, q->modl, pwksp);
/*@-modfilesys@*/
if (_debug)
PGPTAG_PRIVATE_60 = 60, /*!< Private or Experimental Values */
PGPTAG_COMMENT = 61, /*!< Comment */
PGPTAG_PRIVATE_62 = 62, /*!< Private or Experimental Values */
- PGPTAG_CONTROL = 63, /*!< Control (GPG) */
+ PGPTAG_CONTROL = 63 /*!< Control (GPG) */
} pgpTag;
/**
PGPPUBKEYALGO_EC = 18, /*!< Elliptic Curve */
PGPPUBKEYALGO_ECDSA = 19, /*!< ECDSA */
PGPPUBKEYALGO_ELGAMAL = 20, /*!< Elgamal */
- PGPPUBKEYALGO_DH = 21, /*!< Diffie-Hellman (X9.42) */
+ PGPPUBKEYALGO_DH = 21 /*!< Diffie-Hellman (X9.42) */
} pgpPubkeyAlgo;
/*@=typeuse@*/
PGPSUBTYPE_INTERNAL_107 = 107, /*!< internal or user-defined */
PGPSUBTYPE_INTERNAL_108 = 108, /*!< internal or user-defined */
PGPSUBTYPE_INTERNAL_109 = 109, /*!< internal or user-defined */
- PGPSUBTYPE_INTERNAL_110 = 110, /*!< internal or user-defined */
+ PGPSUBTYPE_INTERNAL_110 = 110 /*!< internal or user-defined */
} pgpSubType;
/*@=typeuse@*/
PGPARMOR_SIGNED_MESSAGE = 4, /*!< SIGNED MESSAGE */
PGPARMOR_FILE = 5, /*!< ARMORED FILE */
PGPARMOR_PRIVKEY = 6, /*!< PRIVATE KEY BLOCK */
- PGPARMOR_SECKEY = 7, /*!< SECRET KEY BLOCK */
+ PGPARMOR_SECKEY = 7 /*!< SECRET KEY BLOCK */
} pgpArmor;
/*@=typeuse@*/
PGPARMORKEY_COMMENT = 2, /*!< Comment: */
PGPARMORKEY_MESSAGEID = 3, /*!< MessageID: */
PGPARMORKEY_HASH = 4, /*!< Hash: */
- PGPARMORKEY_CHARSET = 5, /*!< Charset: */
+ PGPARMORKEY_CHARSET = 5 /*!< Charset: */
} pgpArmorKey;
/*@=typeuse@*/