Commit 6322f02b authored by Niels Möller's avatar Niels Möller

* rsa-decrypt.c (rsa_decrypt): Constification.

* rsa-encrypt.c (rsa_encrypt): Likewise.
* rsa.c (rsa_compute_root): Likewise.
* rsa_md5.c (rsa_md5_sign): Likewise.
(rsa_md5_verify): Likewise.
* rsa_sha1.c (rsa_sha1_sign): Likewise.
(rsa_sha1_verify): Likewise.

Rev: src/nettle/rsa-decrypt.c:1.2
Rev: src/nettle/rsa-encrypt.c:1.2
Rev: src/nettle/rsa.c:1.9
Rev: src/nettle/rsa.h:1.15
Rev: src/nettle/rsa_md5.c:1.6
Rev: src/nettle/rsa_sha1.c:1.6
parent 5ee81e7e
...@@ -32,7 +32,7 @@ ...@@ -32,7 +32,7 @@
#include <string.h> #include <string.h>
int int
rsa_decrypt(struct rsa_private_key *key, rsa_decrypt(const struct rsa_private_key *key,
unsigned *length, uint8_t *message, unsigned *length, uint8_t *message,
const mpz_t gibberish) const mpz_t gibberish)
{ {
......
...@@ -32,7 +32,7 @@ ...@@ -32,7 +32,7 @@
#include <string.h> #include <string.h>
int int
rsa_encrypt(struct rsa_public_key *key, rsa_encrypt(const struct rsa_public_key *key,
/* For padding */ /* For padding */
void *random_ctx, nettle_random_func random, void *random_ctx, nettle_random_func random,
unsigned length, const uint8_t *message, unsigned length, const uint8_t *message,
......
...@@ -134,7 +134,8 @@ rsa_prepare_private_key(struct rsa_private_key *key) ...@@ -134,7 +134,8 @@ rsa_prepare_private_key(struct rsa_private_key *key)
/* Computing an rsa root. */ /* Computing an rsa root. */
void void
rsa_compute_root(struct rsa_private_key *key, mpz_t x, const mpz_t m) rsa_compute_root(const struct rsa_private_key *key,
mpz_t x, const mpz_t m)
{ {
mpz_t xp; /* modulo p */ mpz_t xp; /* modulo p */
mpz_t xq; /* modulo q */ mpz_t xq; /* modulo q */
......
...@@ -133,23 +133,23 @@ rsa_prepare_private_key(struct rsa_private_key *key); ...@@ -133,23 +133,23 @@ rsa_prepare_private_key(struct rsa_private_key *key);
/* PKCS#1 style signatures */ /* PKCS#1 style signatures */
void void
rsa_md5_sign(struct rsa_private_key *key, rsa_md5_sign(const struct rsa_private_key *key,
struct md5_ctx *hash, struct md5_ctx *hash,
mpz_t signature); mpz_t signature);
int int
rsa_md5_verify(struct rsa_public_key *key, rsa_md5_verify(const struct rsa_public_key *key,
struct md5_ctx *hash, struct md5_ctx *hash,
const mpz_t signature); const mpz_t signature);
void void
rsa_sha1_sign(struct rsa_private_key *key, rsa_sha1_sign(const struct rsa_private_key *key,
struct sha1_ctx *hash, struct sha1_ctx *hash,
mpz_t signature); mpz_t signature);
int int
rsa_sha1_verify(struct rsa_public_key *key, rsa_sha1_verify(const struct rsa_public_key *key,
struct sha1_ctx *hash, struct sha1_ctx *hash,
const mpz_t signature); const mpz_t signature);
...@@ -161,7 +161,7 @@ rsa_sha1_verify(struct rsa_public_key *key, ...@@ -161,7 +161,7 @@ rsa_sha1_verify(struct rsa_public_key *key,
/* Returns 1 on success, 0 on failure, which happens if the /* Returns 1 on success, 0 on failure, which happens if the
* message is too long for the key. */ * message is too long for the key. */
int int
rsa_encrypt(struct rsa_public_key *key, rsa_encrypt(const struct rsa_public_key *key,
/* For padding */ /* For padding */
void *random_ctx, nettle_random_func random, void *random_ctx, nettle_random_func random,
unsigned length, const uint8_t *cleartext, unsigned length, const uint8_t *cleartext,
...@@ -173,14 +173,15 @@ rsa_encrypt(struct rsa_public_key *key, ...@@ -173,14 +173,15 @@ rsa_encrypt(struct rsa_public_key *key,
* failure, which happens if decryption failed or if the message * failure, which happens if decryption failed or if the message
* didn't fit. */ * didn't fit. */
int int
rsa_decrypt(struct rsa_private_key *key, rsa_decrypt(const struct rsa_private_key *key,
unsigned *length, uint8_t *cleartext, unsigned *length, uint8_t *cleartext,
const mpz_t ciphertext); const mpz_t ciphertext);
/* Compute x, the e:th root of m. Calling it with x == m is allowed. */ /* Compute x, the e:th root of m. Calling it with x == m is allowed. */
void void
rsa_compute_root(struct rsa_private_key *key, mpz_t x, const mpz_t m); rsa_compute_root(const struct rsa_private_key *key,
mpz_t x, const mpz_t m);
/* Key generation */ /* Key generation */
......
...@@ -42,7 +42,7 @@ static void ...@@ -42,7 +42,7 @@ static void
pkcs1_encode_md5(mpz_t m, unsigned length, struct md5_ctx *hash); pkcs1_encode_md5(mpz_t m, unsigned length, struct md5_ctx *hash);
void void
rsa_md5_sign(struct rsa_private_key *key, rsa_md5_sign(const struct rsa_private_key *key,
struct md5_ctx *hash, struct md5_ctx *hash,
mpz_t s) mpz_t s)
{ {
...@@ -54,7 +54,7 @@ rsa_md5_sign(struct rsa_private_key *key, ...@@ -54,7 +54,7 @@ rsa_md5_sign(struct rsa_private_key *key,
} }
int int
rsa_md5_verify(struct rsa_public_key *key, rsa_md5_verify(const struct rsa_public_key *key,
struct md5_ctx *hash, struct md5_ctx *hash,
const mpz_t s) const mpz_t s)
{ {
......
...@@ -42,7 +42,7 @@ static void ...@@ -42,7 +42,7 @@ static void
pkcs1_encode_sha1(mpz_t m, unsigned length, struct sha1_ctx *hash); pkcs1_encode_sha1(mpz_t m, unsigned length, struct sha1_ctx *hash);
void void
rsa_sha1_sign(struct rsa_private_key *key, rsa_sha1_sign(const struct rsa_private_key *key,
struct sha1_ctx *hash, struct sha1_ctx *hash,
mpz_t s) mpz_t s)
{ {
...@@ -54,7 +54,7 @@ rsa_sha1_sign(struct rsa_private_key *key, ...@@ -54,7 +54,7 @@ rsa_sha1_sign(struct rsa_private_key *key,
} }
int int
rsa_sha1_verify(struct rsa_public_key *key, rsa_sha1_verify(const struct rsa_public_key *key,
struct sha1_ctx *hash, struct sha1_ctx *hash,
const mpz_t s) const mpz_t s)
{ {
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment