Commit 6322f02b authored by Niels Möller's avatar Niels Möller

* rsa-decrypt.c (rsa_decrypt): Constification.

* rsa-encrypt.c (rsa_encrypt): Likewise.
* rsa.c (rsa_compute_root): Likewise.
* rsa_md5.c (rsa_md5_sign): Likewise.
(rsa_md5_verify): Likewise.
* rsa_sha1.c (rsa_sha1_sign): Likewise.
(rsa_sha1_verify): Likewise.

Rev: src/nettle/rsa-decrypt.c:1.2
Rev: src/nettle/rsa-encrypt.c:1.2
Rev: src/nettle/rsa.c:1.9
Rev: src/nettle/rsa.h:1.15
Rev: src/nettle/rsa_md5.c:1.6
Rev: src/nettle/rsa_sha1.c:1.6
parent 5ee81e7e
......@@ -32,7 +32,7 @@
#include <string.h>
int
rsa_decrypt(struct rsa_private_key *key,
rsa_decrypt(const struct rsa_private_key *key,
unsigned *length, uint8_t *message,
const mpz_t gibberish)
{
......
......@@ -32,7 +32,7 @@
#include <string.h>
int
rsa_encrypt(struct rsa_public_key *key,
rsa_encrypt(const struct rsa_public_key *key,
/* For padding */
void *random_ctx, nettle_random_func random,
unsigned length, const uint8_t *message,
......
......@@ -134,7 +134,8 @@ rsa_prepare_private_key(struct rsa_private_key *key)
/* Computing an rsa root. */
void
rsa_compute_root(struct rsa_private_key *key, mpz_t x, const mpz_t m)
rsa_compute_root(const struct rsa_private_key *key,
mpz_t x, const mpz_t m)
{
mpz_t xp; /* modulo p */
mpz_t xq; /* modulo q */
......
......@@ -133,23 +133,23 @@ rsa_prepare_private_key(struct rsa_private_key *key);
/* PKCS#1 style signatures */
void
rsa_md5_sign(struct rsa_private_key *key,
rsa_md5_sign(const struct rsa_private_key *key,
struct md5_ctx *hash,
mpz_t signature);
int
rsa_md5_verify(struct rsa_public_key *key,
rsa_md5_verify(const struct rsa_public_key *key,
struct md5_ctx *hash,
const mpz_t signature);
void
rsa_sha1_sign(struct rsa_private_key *key,
rsa_sha1_sign(const struct rsa_private_key *key,
struct sha1_ctx *hash,
mpz_t signature);
int
rsa_sha1_verify(struct rsa_public_key *key,
rsa_sha1_verify(const struct rsa_public_key *key,
struct sha1_ctx *hash,
const mpz_t signature);
......@@ -161,7 +161,7 @@ rsa_sha1_verify(struct rsa_public_key *key,
/* Returns 1 on success, 0 on failure, which happens if the
* message is too long for the key. */
int
rsa_encrypt(struct rsa_public_key *key,
rsa_encrypt(const struct rsa_public_key *key,
/* For padding */
void *random_ctx, nettle_random_func random,
unsigned length, const uint8_t *cleartext,
......@@ -173,14 +173,15 @@ rsa_encrypt(struct rsa_public_key *key,
* failure, which happens if decryption failed or if the message
* didn't fit. */
int
rsa_decrypt(struct rsa_private_key *key,
rsa_decrypt(const struct rsa_private_key *key,
unsigned *length, uint8_t *cleartext,
const mpz_t ciphertext);
/* Compute x, the e:th root of m. Calling it with x == m is allowed. */
void
rsa_compute_root(struct rsa_private_key *key, mpz_t x, const mpz_t m);
rsa_compute_root(const struct rsa_private_key *key,
mpz_t x, const mpz_t m);
/* Key generation */
......
......@@ -42,7 +42,7 @@ static void
pkcs1_encode_md5(mpz_t m, unsigned length, struct md5_ctx *hash);
void
rsa_md5_sign(struct rsa_private_key *key,
rsa_md5_sign(const struct rsa_private_key *key,
struct md5_ctx *hash,
mpz_t s)
{
......@@ -54,7 +54,7 @@ rsa_md5_sign(struct rsa_private_key *key,
}
int
rsa_md5_verify(struct rsa_public_key *key,
rsa_md5_verify(const struct rsa_public_key *key,
struct md5_ctx *hash,
const mpz_t s)
{
......
......@@ -42,7 +42,7 @@ static void
pkcs1_encode_sha1(mpz_t m, unsigned length, struct sha1_ctx *hash);
void
rsa_sha1_sign(struct rsa_private_key *key,
rsa_sha1_sign(const struct rsa_private_key *key,
struct sha1_ctx *hash,
mpz_t s)
{
......@@ -54,7 +54,7 @@ rsa_sha1_sign(struct rsa_private_key *key,
}
int
rsa_sha1_verify(struct rsa_public_key *key,
rsa_sha1_verify(const struct rsa_public_key *key,
struct sha1_ctx *hash,
const mpz_t s)
{
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment