#include "random_dummy.h"
-uint16_t rsa_pkcs1v15_compute_padlength_B(bigint_t* modulus, uint16_t msg_length_B){
+uint16_t rsa_pkcs1v15_compute_padlength_B(bigint_t *modulus, uint16_t msg_length_B){
return bigint_get_first_set_bit(modulus) / 8 + 1 - msg_length_B - 3;
}
-uint8_t rsa_encrypt_pkcs1v15(void* dest, uint16_t* out_length, const void* src,
- uint16_t length_B, rsa_publickey_t* key, const void* pad){
+uint8_t rsa_encrypt_pkcs1v15(void *dest, uint16_t *out_length, const void *src,
+ uint16_t length_B, rsa_publickey_t *key, const void *pad){
int16_t pad_length;
bigint_t x;
- pad_length = rsa_pkcs1v15_compute_padlength_B(key->modulus, length_B);
+ pad_length = rsa_pkcs1v15_compute_padlength_B(&key->modulus, length_B);
if(pad_length<8){
#if DEBUG
cli_putstr_P(PSTR("\r\nERROR: pad_length<8; pad_length: "));
((uint8_t*)dest)[2+pad_length] = 0x00;
memcpy((uint8_t*)dest+3+pad_length, src, length_B);
x.wordv = dest;
- x.length_B = (length_B+pad_length+3+sizeof(bigint_word_t)-1)/sizeof(bigint_word_t);
+ x.length_W = (length_B+pad_length+3+sizeof(bigint_word_t)-1)/sizeof(bigint_word_t);
#if DEBUG
cli_putstr_P(PSTR("\r\nx-data: "));
- cli_hexdump_block(x.wordv, x.length_B * sizeof(bigint_word_t), 4, 16);
+ cli_hexdump_block(x.wordv, x.length_W * sizeof(bigint_word_t), 4, 16);
#endif
bigint_adjust(&x);
- rsa_os2ip(&x, NULL, length_B+pad_length+3);
+ rsa_os2ip(&x, NULL, length_B + pad_length + 3);
rsa_enc(&x, key);
rsa_i2osp(NULL, &x, out_length);
return 0;
}
-uint8_t rsa_decrypt_pkcs1v15(void* dest, uint16_t* out_length, const void* src,
- uint16_t length_B, rsa_privatekey_t* key, void* pad){
+uint8_t rsa_decrypt_pkcs1v15(void *dest, uint16_t *out_length, const void *src,
+ uint16_t length_B, rsa_privatekey_t *key, void *pad){
bigint_t x;
uint16_t m_length, pad_length=0, idx=0;
x.wordv = dest;