Mark the |e| argument to |RSA_generate_key_ex| as const.
The function does not take ownership of |e| and this makes that clear. Change-Id: I53bb5fa94bec5d16d1c904b59391d36df7abbde6 Reviewed-on: https://boringssl-review.googlesource.com/c/33164 Commit-Queue: Adam Langley <agl@google.com> Commit-Queue: David Benjamin <davidben@google.com> Reviewed-by: David Benjamin <davidben@google.com> CQ-Verified: CQ bot account: commit-bot@chromium.org <commit-bot@chromium.org>
This commit is contained in:
parent
5279ef5769
commit
9a547e17eb
@ -1066,7 +1066,7 @@ err:
|
||||
//
|
||||
// This function returns one on success and zero on failure. It has a failure
|
||||
// probability of about 2^-20.
|
||||
static int rsa_generate_key_impl(RSA *rsa, int bits, BIGNUM *e_value,
|
||||
static int rsa_generate_key_impl(RSA *rsa, int bits, const BIGNUM *e_value,
|
||||
BN_GENCB *cb) {
|
||||
// See FIPS 186-4 appendix B.3. This function implements a generalized version
|
||||
// of the FIPS algorithm. |RSA_generate_key_fips| performs additional checks
|
||||
@ -1247,7 +1247,8 @@ static void replace_bn_mont_ctx(BN_MONT_CTX **out, BN_MONT_CTX **in) {
|
||||
*in = NULL;
|
||||
}
|
||||
|
||||
int RSA_generate_key_ex(RSA *rsa, int bits, BIGNUM *e_value, BN_GENCB *cb) {
|
||||
int RSA_generate_key_ex(RSA *rsa, int bits, const BIGNUM *e_value,
|
||||
BN_GENCB *cb) {
|
||||
// |rsa_generate_key_impl|'s 2^-20 failure probability is too high at scale,
|
||||
// so we run the FIPS algorithm four times, bringing it down to 2^-80. We
|
||||
// should just adjust the retry limit, but FIPS 186-4 prescribes that value
|
||||
|
@ -161,7 +161,7 @@ OPENSSL_EXPORT int RSA_set0_crt_params(RSA *rsa, BIGNUM *dmp1, BIGNUM *dmq1,
|
||||
// with event=3 when a suitable value for |p| is found.
|
||||
//
|
||||
// It returns one on success or zero on error.
|
||||
OPENSSL_EXPORT int RSA_generate_key_ex(RSA *rsa, int bits, BIGNUM *e,
|
||||
OPENSSL_EXPORT int RSA_generate_key_ex(RSA *rsa, int bits, const BIGNUM *e,
|
||||
BN_GENCB *cb);
|
||||
|
||||
// RSA_generate_key_fips behaves like |RSA_generate_key_ex| but performs
|
||||
|
Loading…
Reference in New Issue
Block a user