We should err on the side of caution when we can't verify a sighash
because we don't have that algorithm compiled in, and allow it.
hashdata[i]);
}
sha224_digest(&sha224_context, SHA224_DIGEST_SIZE, hash);
hashdata[i]);
}
sha224_digest(&sha224_context, SHA224_DIGEST_SIZE, hash);
#else
logthing(LOGTHING_INFO, "SHA224 support not available.");
#else
logthing(LOGTHING_INFO, "SHA224 support not available.");
case OPENPGP_HASH_SHA256:
#ifdef NETTLE_WITH_SHA256
sha256_init(&sha256_context);
case OPENPGP_HASH_SHA256:
#ifdef NETTLE_WITH_SHA256
sha256_init(&sha256_context);
hashdata[i]);
}
sha256_digest(&sha256_context, SHA256_DIGEST_SIZE, hash);
hashdata[i]);
}
sha256_digest(&sha256_context, SHA256_DIGEST_SIZE, hash);
#else
logthing(LOGTHING_INFO, "SHA256 support not available.");
#else
logthing(LOGTHING_INFO, "SHA256 support not available.");
case OPENPGP_HASH_SHA384:
#ifdef NETTLE_WITH_SHA384
sha384_init(&sha384_context);
case OPENPGP_HASH_SHA384:
#ifdef NETTLE_WITH_SHA384
sha384_init(&sha384_context);
hashdata[i]);
}
sha384_digest(&sha384_context, SHA384_DIGEST_SIZE, hash);
hashdata[i]);
}
sha384_digest(&sha384_context, SHA384_DIGEST_SIZE, hash);
#else
logthing(LOGTHING_INFO, "SHA384 support not available.");
#else
logthing(LOGTHING_INFO, "SHA384 support not available.");
case OPENPGP_HASH_SHA512:
#ifdef NETTLE_WITH_SHA512
sha512_init(&sha512_context);
case OPENPGP_HASH_SHA512:
#ifdef NETTLE_WITH_SHA512
sha512_init(&sha512_context);
hashdata[i]);
}
sha512_digest(&sha512_context, SHA512_DIGEST_SIZE, hash);
hashdata[i]);
}
sha512_digest(&sha512_context, SHA512_DIGEST_SIZE, hash);
#else
logthing(LOGTHING_INFO, "SHA512 support not available.");
#else
logthing(LOGTHING_INFO, "SHA512 support not available.");
default:
logthing(LOGTHING_ERROR, "Unsupported signature hash type %d",
hashtype);
default:
logthing(LOGTHING_ERROR, "Unsupported signature hash type %d",
hashtype);