summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--rsa-decrypt.c2
-rw-r--r--rsa-encrypt.c2
-rw-r--r--rsa.c3
-rw-r--r--rsa.h15
-rw-r--r--rsa_md5.c4
-rw-r--r--rsa_sha1.c4
6 files changed, 16 insertions, 14 deletions
diff --git a/rsa-decrypt.c b/rsa-decrypt.c
index a4cef7ad..dfdf089f 100644
--- a/rsa-decrypt.c
+++ b/rsa-decrypt.c
@@ -32,7 +32,7 @@
#include <string.h>
int
-rsa_decrypt(struct rsa_private_key *key,
+rsa_decrypt(const struct rsa_private_key *key,
unsigned *length, uint8_t *message,
const mpz_t gibberish)
{
diff --git a/rsa-encrypt.c b/rsa-encrypt.c
index 162bcd9b..285f974d 100644
--- a/rsa-encrypt.c
+++ b/rsa-encrypt.c
@@ -32,7 +32,7 @@
#include <string.h>
int
-rsa_encrypt(struct rsa_public_key *key,
+rsa_encrypt(const struct rsa_public_key *key,
/* For padding */
void *random_ctx, nettle_random_func random,
unsigned length, const uint8_t *message,
diff --git a/rsa.c b/rsa.c
index ab465056..16a94bd7 100644
--- a/rsa.c
+++ b/rsa.c
@@ -134,7 +134,8 @@ rsa_prepare_private_key(struct rsa_private_key *key)
/* Computing an rsa root. */
void
-rsa_compute_root(struct rsa_private_key *key, mpz_t x, const mpz_t m)
+rsa_compute_root(const struct rsa_private_key *key,
+ mpz_t x, const mpz_t m)
{
mpz_t xp; /* modulo p */
mpz_t xq; /* modulo q */
diff --git a/rsa.h b/rsa.h
index 9f98db1a..7ba9a4a0 100644
--- a/rsa.h
+++ b/rsa.h
@@ -133,23 +133,23 @@ rsa_prepare_private_key(struct rsa_private_key *key);
/* PKCS#1 style signatures */
void
-rsa_md5_sign(struct rsa_private_key *key,
+rsa_md5_sign(const struct rsa_private_key *key,
struct md5_ctx *hash,
mpz_t signature);
int
-rsa_md5_verify(struct rsa_public_key *key,
+rsa_md5_verify(const struct rsa_public_key *key,
struct md5_ctx *hash,
const mpz_t signature);
void
-rsa_sha1_sign(struct rsa_private_key *key,
+rsa_sha1_sign(const struct rsa_private_key *key,
struct sha1_ctx *hash,
mpz_t signature);
int
-rsa_sha1_verify(struct rsa_public_key *key,
+rsa_sha1_verify(const struct rsa_public_key *key,
struct sha1_ctx *hash,
const mpz_t signature);
@@ -161,7 +161,7 @@ rsa_sha1_verify(struct rsa_public_key *key,
/* Returns 1 on success, 0 on failure, which happens if the
* message is too long for the key. */
int
-rsa_encrypt(struct rsa_public_key *key,
+rsa_encrypt(const struct rsa_public_key *key,
/* For padding */
void *random_ctx, nettle_random_func random,
unsigned length, const uint8_t *cleartext,
@@ -173,14 +173,15 @@ rsa_encrypt(struct rsa_public_key *key,
* failure, which happens if decryption failed or if the message
* didn't fit. */
int
-rsa_decrypt(struct rsa_private_key *key,
+rsa_decrypt(const struct rsa_private_key *key,
unsigned *length, uint8_t *cleartext,
const mpz_t ciphertext);
/* Compute x, the e:th root of m. Calling it with x == m is allowed. */
void
-rsa_compute_root(struct rsa_private_key *key, mpz_t x, const mpz_t m);
+rsa_compute_root(const struct rsa_private_key *key,
+ mpz_t x, const mpz_t m);
/* Key generation */
diff --git a/rsa_md5.c b/rsa_md5.c
index 05487ef6..32276172 100644
--- a/rsa_md5.c
+++ b/rsa_md5.c
@@ -42,7 +42,7 @@ static void
pkcs1_encode_md5(mpz_t m, unsigned length, struct md5_ctx *hash);
void
-rsa_md5_sign(struct rsa_private_key *key,
+rsa_md5_sign(const struct rsa_private_key *key,
struct md5_ctx *hash,
mpz_t s)
{
@@ -54,7 +54,7 @@ rsa_md5_sign(struct rsa_private_key *key,
}
int
-rsa_md5_verify(struct rsa_public_key *key,
+rsa_md5_verify(const struct rsa_public_key *key,
struct md5_ctx *hash,
const mpz_t s)
{
diff --git a/rsa_sha1.c b/rsa_sha1.c
index ecc697c4..52624d5e 100644
--- a/rsa_sha1.c
+++ b/rsa_sha1.c
@@ -42,7 +42,7 @@ static void
pkcs1_encode_sha1(mpz_t m, unsigned length, struct sha1_ctx *hash);
void
-rsa_sha1_sign(struct rsa_private_key *key,
+rsa_sha1_sign(const struct rsa_private_key *key,
struct sha1_ctx *hash,
mpz_t s)
{
@@ -54,7 +54,7 @@ rsa_sha1_sign(struct rsa_private_key *key,
}
int
-rsa_sha1_verify(struct rsa_public_key *key,
+rsa_sha1_verify(const struct rsa_public_key *key,
struct sha1_ctx *hash,
const mpz_t s)
{