*
* SYNOPSIS
*
- * bool silc_pkcs_register(const SilcPKCSObject *pkcs);
+ * SilcBool silc_pkcs_register(const SilcPKCSObject *pkcs);
*
* DESCRIPTION
*
* builtin the sources. Returns FALSE on error.
*
***/
-bool silc_pkcs_register(const SilcPKCSObject *pkcs);
+SilcBool silc_pkcs_register(const SilcPKCSObject *pkcs);
/****f* silccrypt/SilcPKCSAPI/silc_pkcs_unregister
*
* SYNOPSIS
*
- * bool silc_pkcs_unregister(SilcPKCSObject *pkcs);
+ * SilcBool silc_pkcs_unregister(SilcPKCSObject *pkcs);
*
* DESCRIPTION
*
* Unregister a PKCS from the SILC. Returns FALSE on error.
*
***/
-bool silc_pkcs_unregister(SilcPKCSObject *pkcs);
+SilcBool silc_pkcs_unregister(SilcPKCSObject *pkcs);
/****f* silccrypt/SilcPKCSAPI/silc_pkcs_register_default
*
* SYNOPSIS
*
- * bool silc_pkcs_register_default(void);
+ * SilcBool silc_pkcs_register_default(void);
*
* DESCRIPTION
*
* order is not wanted. Returns FALSE on error.
*
***/
-bool silc_pkcs_register_default(void);
+SilcBool silc_pkcs_register_default(void);
/****f* silccrypt/SilcPKCSAPI/silc_pkcs_unregister_all
*
* SYNOPSIS
*
- * bool silc_pkcs_unregister_all(void);
+ * SilcBool silc_pkcs_unregister_all(void);
*
* DESCRIPTION
*
* Returns FALSE on error.
*
***/
-bool silc_pkcs_unregister_all(void);
+SilcBool silc_pkcs_unregister_all(void);
/****f* silccrypt/SilcPKCSAPI/silc_pkcs_alloc
*
* SYNOPSIS
*
- * bool silc_pkcs_alloc(const unsigned char *name, SilcPKCS *new_pkcs);
+ * SilcBool silc_pkcs_alloc(const unsigned char *name, SilcPKCS *new_pkcs);
*
* DESCRIPTION
*
* to the 'new_pkcs' argument. Returns FALSE on error.
*
***/
-bool silc_pkcs_alloc(const unsigned char *name, SilcPKCS *new_pkcs);
+SilcBool silc_pkcs_alloc(const unsigned char *name, SilcPKCS *new_pkcs);
/****f* silccrypt/SilcPKCSAPI/silc_pkcs_free
*
*
* SYNOPSIS
*
- * bool silc_pkcs_is_supported(const unsigned char *name);
+ * SilcBool silc_pkcs_is_supported(const unsigned char *name);
*
* DESCRIPTION
*
* Returns TRUE if PKCS algorithm `name' is supported.
*
***/
-bool silc_pkcs_is_supported(const unsigned char *name);
+SilcBool silc_pkcs_is_supported(const unsigned char *name);
/****f* silccrypt/SilcPKCSAPI/silc_pkcs_get_supported
*
*
* SYNOPSIS
*
- * bool silc_pkcs_generate_key(SilcPKCS pkcs, SilcUInt32 bits_key_len,
+ * SilcBool silc_pkcs_generate_key(SilcPKCS pkcs, SilcUInt32 bits_key_len,
* SilcRng rng);
*
* DESCRIPTION
* If the `rng' is NULL global SILC RNG will be used.
*
***/
-bool silc_pkcs_generate_key(SilcPKCS pkcs, SilcUInt32 bits_key_len,
+SilcBool silc_pkcs_generate_key(SilcPKCS pkcs, SilcUInt32 bits_key_len,
SilcRng rng);
/****f* silccrypt/SilcPKCSAPI/silc_pkcs_get_key_len
*
* SYNOPSIS
*
- * bool silc_pkcs_encrypt(SilcPKCS pkcs, unsigned char *src,
+ * SilcBool silc_pkcs_encrypt(SilcPKCS pkcs, unsigned char *src,
* SilcUInt32 src_len, unsigned char *dst,
* SilcUInt32 *dst_len);
*
* Encrypts. Returns FALSE on error.
*
***/
-bool silc_pkcs_encrypt(SilcPKCS pkcs, unsigned char *src, SilcUInt32 src_len,
+SilcBool silc_pkcs_encrypt(SilcPKCS pkcs, unsigned char *src, SilcUInt32 src_len,
unsigned char *dst, SilcUInt32 *dst_len);
/****f* silccrypt/SilcPKCSAPI/silc_pkcs_decrypt
*
* SYNOPSIS
*
- * bool silc_pkcs_decrypt(SilcPKCS pkcs, unsigned char *src,
+ * SilcBool silc_pkcs_decrypt(SilcPKCS pkcs, unsigned char *src,
* SilcUInt32 src_len, unsigned char *dst,
* SilcUInt32 *dst_len);
*
* Decrypts. Returns FALSE on error.
*
***/
-bool silc_pkcs_decrypt(SilcPKCS pkcs, unsigned char *src, SilcUInt32 src_len,
+SilcBool silc_pkcs_decrypt(SilcPKCS pkcs, unsigned char *src, SilcUInt32 src_len,
unsigned char *dst, SilcUInt32 *dst_len);
/****f* silccrypt/SilcPKCSAPI/silc_pkcs_sign
*
* SYNOPSIS
*
- * bool silc_pkcs_sign(SilcPKCS pkcs, unsigned char *src,
+ * SilcBool silc_pkcs_sign(SilcPKCS pkcs, unsigned char *src,
* SilcUInt32 src_len, unsigned char *dst,
* SilcUInt32 *dst_len);
*
* Generates signature. Returns FALSE on error.
*
***/
-bool silc_pkcs_sign(SilcPKCS pkcs, unsigned char *src, SilcUInt32 src_len,
+SilcBool silc_pkcs_sign(SilcPKCS pkcs, unsigned char *src, SilcUInt32 src_len,
unsigned char *dst, SilcUInt32 *dst_len);
/****f* silccrypt/SilcPKCSAPI/silc_pkcs_verify
*
* SYNOPSIS
*
- * bool silc_pkcs_verify(SilcPKCS pkcs, unsigned char *signature,
+ * SilcBool silc_pkcs_verify(SilcPKCS pkcs, unsigned char *signature,
* SilcUInt32 signature_len, unsigned char *data,
* SilcUInt32 data_len);
*
* verified against the 'data'.
*
***/
-bool silc_pkcs_verify(SilcPKCS pkcs, unsigned char *signature,
+SilcBool silc_pkcs_verify(SilcPKCS pkcs, unsigned char *signature,
SilcUInt32 signature_len, unsigned char *data,
SilcUInt32 data_len);
*
* SYNOPSIS
*
- * bool silc_pkcs_sign_with_hash(SilcPKCS pkcs, SilcHash hash,
+ * SilcBool silc_pkcs_sign_with_hash(SilcPKCS pkcs, SilcHash hash,
* unsigned char *src, SilcUInt32 src_len,
* unsigned char *dst, SilcUInt32 *dst_len);
*
* error.
*
***/
-bool silc_pkcs_sign_with_hash(SilcPKCS pkcs, SilcHash hash,
+SilcBool silc_pkcs_sign_with_hash(SilcPKCS pkcs, SilcHash hash,
unsigned char *src, SilcUInt32 src_len,
unsigned char *dst, SilcUInt32 *dst_len);
*
* SYNOPSIS
*
- * bool silc_pkcs_verify_with_hash(SilcPKCS pkcs, SilcHash hash,
+ * SilcBool silc_pkcs_verify_with_hash(SilcPKCS pkcs, SilcHash hash,
* unsigned char *signature,
* SilcUInt32 signature_len,
* unsigned char *data,
* the `signature'. Returns FALSE on error.
*
***/
-bool silc_pkcs_verify_with_hash(SilcPKCS pkcs, SilcHash hash,
+SilcBool silc_pkcs_verify_with_hash(SilcPKCS pkcs, SilcHash hash,
unsigned char *signature,
SilcUInt32 signature_len,
unsigned char *data,
*
* SYNOPSIS
*
- * bool silc_pkcs_public_key_decode(unsigned char *data,
+ * SilcBool silc_pkcs_public_key_decode(unsigned char *data,
* SilcUInt32 data_len,
* SilcPublicKey *public_key);
*
* successful. Allocates new public key as well.
*
***/
-bool silc_pkcs_public_key_decode(unsigned char *data, SilcUInt32 data_len,
+SilcBool silc_pkcs_public_key_decode(unsigned char *data, SilcUInt32 data_len,
SilcPublicKey *public_key);
/****f* silccrypt/SilcPKCSAPI/silc_pkcs_public_key_payload_encode
*
* SYNOPSIS
*
- * bool silc_pkcs_public_key_payload_encode(SilcPublicKey public_key);
+ * SilcBool silc_pkcs_public_key_payload_encode(SilcPublicKey public_key);
*
* DESCRIPTION
*
*
* SYNOPSIS
*
- * bool silc_pkcs_public_key_payload_decode(unsigned char *data,
+ * SilcBool silc_pkcs_public_key_payload_decode(unsigned char *data,
* SilcUInt32 data_len,
* SilcPublicKey *public_key);
*
* cannot be decoded.
*
***/
-bool silc_pkcs_public_key_payload_decode(unsigned char *data,
+SilcBool silc_pkcs_public_key_payload_decode(unsigned char *data,
SilcUInt32 data_len,
SilcPublicKey *public_key);
*
* SYNOPSIS
*
- * bool silc_pkcs_public_key_compare(SilcPublicKey key1,
+ * SilcBool silc_pkcs_public_key_compare(SilcPublicKey key1,
* SilcPublicKey key2);
*
* DESCRIPTION
* FALSE if they are not same.
*
***/
-bool silc_pkcs_public_key_compare(SilcPublicKey key1, SilcPublicKey key2);
+SilcBool silc_pkcs_public_key_compare(SilcPublicKey key1, SilcPublicKey key2);
/****f* silccrypt/SilcPKCSAPI/silc_pkcs_public_key_copy
*
*
* SYNOPSIS
*
- * bool silc_pkcs_private_key_decode(unsigned char *data,
+ * SilcBool silc_pkcs_private_key_decode(unsigned char *data,
* SilcUInt32 data_len,
* SilcPrivateKey *private_key);
*
* successful. Allocates new private key as well.
*
***/
-bool silc_pkcs_private_key_decode(unsigned char *data, SilcUInt32 data_len,
+SilcBool silc_pkcs_private_key_decode(unsigned char *data, SilcUInt32 data_len,
SilcPrivateKey *private_key);
/****f* silccrypt/SilcPKCSAPI/silc_pkcs_save_public_key
*
* SYNOPSIS
*
- * bool silc_pkcs_save_public_key(const char *filename,
+ * SilcBool silc_pkcs_save_public_key(const char *filename,
* SilcPublicKey public_key,
* SilcUInt32 encoding);
*
* Saves public key into file. Returns FALSE on error.
*
***/
-bool silc_pkcs_save_public_key(const char *filename, SilcPublicKey public_key,
+SilcBool silc_pkcs_save_public_key(const char *filename, SilcPublicKey public_key,
SilcUInt32 encoding);
/****f* silccrypt/SilcPKCSAPI/silc_pkcs_save_public_key_data
*
* SYNOPSIS
*
- * bool silc_pkcs_save_public_key_data(const char *filename,
+ * SilcBool silc_pkcs_save_public_key_data(const char *filename,
* unsigned char *data,
* SilcUInt32 data_len,
* SilcUInt32 encoding);
* data when calling this function. Returns FALSE on error.
*
***/
-bool silc_pkcs_save_public_key_data(const char *filename, unsigned char *data,
+SilcBool silc_pkcs_save_public_key_data(const char *filename, unsigned char *data,
SilcUInt32 data_len, SilcUInt32 encoding);
/****f* silccrypt/SilcPKCSAPI/silc_pkcs_save_private_key
*
* SYNOPSIS
*
- * bool silc_pkcs_save_private_key(const char *filename,
+ * SilcBool silc_pkcs_save_private_key(const char *filename,
* SilcPrivateKey private_key,
* unsigned char *passphrase,
* SilcUInt32 passphrase_len,
* is AES with 256 bit key in CBC mode. Returns FALSE on error.
*
***/
-bool silc_pkcs_save_private_key(const char *filename,
+SilcBool silc_pkcs_save_private_key(const char *filename,
SilcPrivateKey private_key,
unsigned char *passphrase,
SilcUInt32 passphrase_len,
*
* SYNOPSIS
*
- * bool silc_pkcs_load_public_key(const char *filename,
+ * SilcBool silc_pkcs_load_public_key(const char *filename,
* SilcPublicKey *public_key,
* SilcUInt32 encoding);
*
* if loading was successful.
*
***/
-bool silc_pkcs_load_public_key(const char *filename, SilcPublicKey *public_key,
+SilcBool silc_pkcs_load_public_key(const char *filename, SilcPublicKey *public_key,
SilcUInt32 encoding);
/****f* silccrypt/SilcPKCSAPI/silc_pkcs_load_private_key
*
* SYNOPSIS
*
- * bool silc_pkcs_load_private_key(const char *filename,
+ * SilcBool silc_pkcs_load_private_key(const char *filename,
* SilcPrivateKey *private_key,
* unsigned char *passphrase,
* SilcUInt32 passphrase_len,
* key of the private key file.
*
***/
-bool silc_pkcs_load_private_key(const char *filename,
+SilcBool silc_pkcs_load_private_key(const char *filename,
SilcPrivateKey *private_key,
unsigned char *passphrase,
SilcUInt32 passphrase_len,