boringssl/crypto/rsa
David Benjamin 8a58933db0 Remove the CRYPTO_EX_new callback.
This callback is never used. The one caller I've ever seen is in Android
code which isn't built with BoringSSL and it was a no-op.

It also doesn't actually make much sense. A callback cannot reasonably
assume that it sees every, say, SSL_CTX created because the index may be
registered after the first SSL_CTX is created. Nor is there any point in
an EX_DATA consumer in one file knowing about an SSL_CTX created in
completely unrelated code.

Replace all the pointers with a typedef to int*. This will ensure code
which passes NULL or 0 continues to compile while breaking code which
passes an actual function.

This simplifies some object creation functions which now needn't worry
about CRYPTO_new_ex_data failing. (Also avoids bouncing on the lock, but
it's taking a read lock, so this doesn't really matter.)

BUG=391192

Change-Id: I02893883c6fa8693682075b7b130aa538a0a1437
Reviewed-on: https://boringssl-review.googlesource.com/6625
Reviewed-by: Adam Langley <agl@google.com>
2015-12-15 21:29:46 +00:00
..
blinding.c Constify more BN_MONT_CTX parameters. 2015-11-06 20:04:36 +00:00
CMakeLists.txt
internal.h Constify more BN_MONT_CTX parameters. 2015-11-06 20:04:36 +00:00
padding.c Initialize |one_index| in OAEP padding check. 2015-12-15 19:46:39 +00:00
rsa_asn1.c Free BN_MONT_CTX in generic code. 2015-11-03 23:39:41 +00:00
rsa_impl.c Remove reference to removed |RSA_FLAG_NO_CONSTTIME| flag. 2015-11-20 19:59:29 +00:00
rsa_test.cc Switch rsa_test.cc to use the new RSA encrypt/decrypt API. 2015-10-28 23:36:44 +00:00
rsa.c Remove the CRYPTO_EX_new callback. 2015-12-15 21:29:46 +00:00