diff options
-rw-r--r-- | rsa-decrypt.c | 2 | ||||
-rw-r--r-- | rsa-encrypt.c | 2 | ||||
-rw-r--r-- | rsa.c | 3 | ||||
-rw-r--r-- | rsa.h | 15 | ||||
-rw-r--r-- | rsa_md5.c | 4 | ||||
-rw-r--r-- | rsa_sha1.c | 4 |
6 files changed, 16 insertions, 14 deletions
diff --git a/rsa-decrypt.c b/rsa-decrypt.c index a4cef7ad..dfdf089f 100644 --- a/rsa-decrypt.c +++ b/rsa-decrypt.c @@ -32,7 +32,7 @@ #include <string.h> int -rsa_decrypt(struct rsa_private_key *key, +rsa_decrypt(const struct rsa_private_key *key, unsigned *length, uint8_t *message, const mpz_t gibberish) { diff --git a/rsa-encrypt.c b/rsa-encrypt.c index 162bcd9b..285f974d 100644 --- a/rsa-encrypt.c +++ b/rsa-encrypt.c @@ -32,7 +32,7 @@ #include <string.h> int -rsa_encrypt(struct rsa_public_key *key, +rsa_encrypt(const struct rsa_public_key *key, /* For padding */ void *random_ctx, nettle_random_func random, unsigned length, const uint8_t *message, @@ -134,7 +134,8 @@ rsa_prepare_private_key(struct rsa_private_key *key) /* Computing an rsa root. */ void -rsa_compute_root(struct rsa_private_key *key, mpz_t x, const mpz_t m) +rsa_compute_root(const struct rsa_private_key *key, + mpz_t x, const mpz_t m) { mpz_t xp; /* modulo p */ mpz_t xq; /* modulo q */ @@ -133,23 +133,23 @@ rsa_prepare_private_key(struct rsa_private_key *key); /* PKCS#1 style signatures */ void -rsa_md5_sign(struct rsa_private_key *key, +rsa_md5_sign(const struct rsa_private_key *key, struct md5_ctx *hash, mpz_t signature); int -rsa_md5_verify(struct rsa_public_key *key, +rsa_md5_verify(const struct rsa_public_key *key, struct md5_ctx *hash, const mpz_t signature); void -rsa_sha1_sign(struct rsa_private_key *key, +rsa_sha1_sign(const struct rsa_private_key *key, struct sha1_ctx *hash, mpz_t signature); int -rsa_sha1_verify(struct rsa_public_key *key, +rsa_sha1_verify(const struct rsa_public_key *key, struct sha1_ctx *hash, const mpz_t signature); @@ -161,7 +161,7 @@ rsa_sha1_verify(struct rsa_public_key *key, /* Returns 1 on success, 0 on failure, which happens if the * message is too long for the key. */ int -rsa_encrypt(struct rsa_public_key *key, +rsa_encrypt(const struct rsa_public_key *key, /* For padding */ void *random_ctx, nettle_random_func random, unsigned length, const uint8_t *cleartext, @@ -173,14 +173,15 @@ rsa_encrypt(struct rsa_public_key *key, * failure, which happens if decryption failed or if the message * didn't fit. */ int -rsa_decrypt(struct rsa_private_key *key, +rsa_decrypt(const struct rsa_private_key *key, unsigned *length, uint8_t *cleartext, const mpz_t ciphertext); /* Compute x, the e:th root of m. Calling it with x == m is allowed. */ void -rsa_compute_root(struct rsa_private_key *key, mpz_t x, const mpz_t m); +rsa_compute_root(const struct rsa_private_key *key, + mpz_t x, const mpz_t m); /* Key generation */ @@ -42,7 +42,7 @@ static void pkcs1_encode_md5(mpz_t m, unsigned length, struct md5_ctx *hash); void -rsa_md5_sign(struct rsa_private_key *key, +rsa_md5_sign(const struct rsa_private_key *key, struct md5_ctx *hash, mpz_t s) { @@ -54,7 +54,7 @@ rsa_md5_sign(struct rsa_private_key *key, } int -rsa_md5_verify(struct rsa_public_key *key, +rsa_md5_verify(const struct rsa_public_key *key, struct md5_ctx *hash, const mpz_t s) { @@ -42,7 +42,7 @@ static void pkcs1_encode_sha1(mpz_t m, unsigned length, struct sha1_ctx *hash); void -rsa_sha1_sign(struct rsa_private_key *key, +rsa_sha1_sign(const struct rsa_private_key *key, struct sha1_ctx *hash, mpz_t s) { @@ -54,7 +54,7 @@ rsa_sha1_sign(struct rsa_private_key *key, } int -rsa_sha1_verify(struct rsa_public_key *key, +rsa_sha1_verify(const struct rsa_public_key *key, struct sha1_ctx *hash, const mpz_t s) { |