mirror of
				https://github.com/cuberite/polarssl.git
				synced 2025-11-03 20:22:59 -05:00 
			
		
		
		
	Removes mode param from mbedtls_rsa_rsaes_oaep_encrypt
Removes mode parameter from mbedtls_rsa_rsaes_oaep_encrypt and propagates changes throughout the codebase. Signed-off-by: Thomas Daubney <thomas.daubney@arm.com>
This commit is contained in:
		
							parent
							
								
									3c487f4b8e
								
							
						
					
					
						commit
						141700f057
					
				@ -639,22 +639,11 @@ int mbedtls_rsa_rsaes_pkcs1_v15_encrypt( mbedtls_rsa_context *ctx,
 | 
			
		||||
 * \note             The output buffer must be as large as the size
 | 
			
		||||
 *                   of ctx->N. For example, 128 Bytes if RSA-1024 is used.
 | 
			
		||||
 *
 | 
			
		||||
 * \deprecated       It is deprecated and discouraged to call this function
 | 
			
		||||
 *                   in #MBEDTLS_RSA_PRIVATE mode. Future versions of the library
 | 
			
		||||
 *                   are likely to remove the \p mode argument and have it
 | 
			
		||||
 *                   implicitly set to #MBEDTLS_RSA_PUBLIC.
 | 
			
		||||
 *
 | 
			
		||||
 * \note             Alternative implementations of RSA need not support
 | 
			
		||||
 *                   mode being set to #MBEDTLS_RSA_PRIVATE and might instead
 | 
			
		||||
 *                   return #MBEDTLS_ERR_PLATFORM_FEATURE_UNSUPPORTED.
 | 
			
		||||
 *
 | 
			
		||||
 * \param ctx        The initnialized RSA context to use.
 | 
			
		||||
 * \param f_rng      The RNG function to use. This is needed for padding
 | 
			
		||||
 *                   generation and must be provided.
 | 
			
		||||
 * \param p_rng      The RNG context to be passed to \p f_rng. This may
 | 
			
		||||
 *                   be \c NULL if \p f_rng doesn't need a context argument.
 | 
			
		||||
 * \param mode       The mode of operation. This must be either
 | 
			
		||||
 *                   #MBEDTLS_RSA_PUBLIC or #MBEDTLS_RSA_PRIVATE (deprecated).
 | 
			
		||||
 * \param label      The buffer holding the custom label to use.
 | 
			
		||||
 *                   This must be a readable buffer of length \p label_len
 | 
			
		||||
 *                   Bytes. It may be \c NULL if \p label_len is \c 0.
 | 
			
		||||
@ -673,7 +662,6 @@ int mbedtls_rsa_rsaes_pkcs1_v15_encrypt( mbedtls_rsa_context *ctx,
 | 
			
		||||
int mbedtls_rsa_rsaes_oaep_encrypt( mbedtls_rsa_context *ctx,
 | 
			
		||||
                            int (*f_rng)(void *, unsigned char *, size_t),
 | 
			
		||||
                            void *p_rng,
 | 
			
		||||
                            int mode,
 | 
			
		||||
                            const unsigned char *label, size_t label_len,
 | 
			
		||||
                            size_t ilen,
 | 
			
		||||
                            const unsigned char *input,
 | 
			
		||||
 | 
			
		||||
@ -3078,7 +3078,6 @@ psa_status_t psa_asymmetric_encrypt( mbedtls_svc_key_id_t key,
 | 
			
		||||
                mbedtls_rsa_rsaes_oaep_encrypt( rsa,
 | 
			
		||||
                                                mbedtls_psa_get_random,
 | 
			
		||||
                                                MBEDTLS_PSA_RANDOM_STATE,
 | 
			
		||||
                                                MBEDTLS_RSA_PUBLIC,
 | 
			
		||||
                                                salt, salt_length,
 | 
			
		||||
                                                input_length,
 | 
			
		||||
                                                input,
 | 
			
		||||
 | 
			
		||||
@ -1156,7 +1156,6 @@ exit:
 | 
			
		||||
int mbedtls_rsa_rsaes_oaep_encrypt( mbedtls_rsa_context *ctx,
 | 
			
		||||
                            int (*f_rng)(void *, unsigned char *, size_t),
 | 
			
		||||
                            void *p_rng,
 | 
			
		||||
                            int mode,
 | 
			
		||||
                            const unsigned char *label, size_t label_len,
 | 
			
		||||
                            size_t ilen,
 | 
			
		||||
                            const unsigned char *input,
 | 
			
		||||
@ -1170,15 +1169,10 @@ int mbedtls_rsa_rsaes_oaep_encrypt( mbedtls_rsa_context *ctx,
 | 
			
		||||
    mbedtls_md_context_t md_ctx;
 | 
			
		||||
 | 
			
		||||
    RSA_VALIDATE_RET( ctx != NULL );
 | 
			
		||||
    RSA_VALIDATE_RET( mode == MBEDTLS_RSA_PRIVATE ||
 | 
			
		||||
                      mode == MBEDTLS_RSA_PUBLIC );
 | 
			
		||||
    RSA_VALIDATE_RET( output != NULL );
 | 
			
		||||
    RSA_VALIDATE_RET( ilen == 0 || input != NULL );
 | 
			
		||||
    RSA_VALIDATE_RET( label_len == 0 || label != NULL );
 | 
			
		||||
 | 
			
		||||
    if( mode == MBEDTLS_RSA_PRIVATE && ctx->padding != MBEDTLS_RSA_PKCS_V21 )
 | 
			
		||||
        return( MBEDTLS_ERR_RSA_BAD_INPUT_DATA );
 | 
			
		||||
 | 
			
		||||
    if( f_rng == NULL )
 | 
			
		||||
        return( MBEDTLS_ERR_RSA_BAD_INPUT_DATA );
 | 
			
		||||
 | 
			
		||||
@ -1232,9 +1226,7 @@ exit:
 | 
			
		||||
    if( ret != 0 )
 | 
			
		||||
        return( ret );
 | 
			
		||||
 | 
			
		||||
    return( ( mode == MBEDTLS_RSA_PUBLIC )
 | 
			
		||||
            ? mbedtls_rsa_public(  ctx, output, output )
 | 
			
		||||
            : mbedtls_rsa_private( ctx, f_rng, p_rng, output, output ) );
 | 
			
		||||
    return( mbedtls_rsa_public(  ctx, output, output ) );
 | 
			
		||||
}
 | 
			
		||||
#endif /* MBEDTLS_PKCS1_V21 */
 | 
			
		||||
 | 
			
		||||
@ -1318,8 +1310,7 @@ int mbedtls_rsa_pkcs1_encrypt( mbedtls_rsa_context *ctx,
 | 
			
		||||
 | 
			
		||||
#if defined(MBEDTLS_PKCS1_V21)
 | 
			
		||||
        case MBEDTLS_RSA_PKCS_V21:
 | 
			
		||||
            return mbedtls_rsa_rsaes_oaep_encrypt( ctx, f_rng, p_rng,
 | 
			
		||||
                                                   MBEDTLS_RSA_PUBLIC, NULL, 0,
 | 
			
		||||
            return mbedtls_rsa_rsaes_oaep_encrypt( ctx, f_rng, p_rng, NULL, 0,
 | 
			
		||||
                                                   ilen, input, output );
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
@ -129,25 +129,21 @@ void rsa_invalid_param( )
 | 
			
		||||
 | 
			
		||||
    TEST_INVALID_PARAM_RET( MBEDTLS_ERR_RSA_BAD_INPUT_DATA,
 | 
			
		||||
                            mbedtls_rsa_rsaes_oaep_encrypt( NULL, NULL, NULL,
 | 
			
		||||
                                                            MBEDTLS_RSA_PUBLIC,
 | 
			
		||||
                                                            buf, sizeof( buf ),
 | 
			
		||||
                                                            sizeof( buf ), buf,
 | 
			
		||||
                                                            buf ) );
 | 
			
		||||
    TEST_INVALID_PARAM_RET( MBEDTLS_ERR_RSA_BAD_INPUT_DATA,
 | 
			
		||||
                            mbedtls_rsa_rsaes_oaep_encrypt( &ctx, NULL, NULL,
 | 
			
		||||
                                                            MBEDTLS_RSA_PUBLIC,
 | 
			
		||||
                                                            NULL, sizeof( buf ),
 | 
			
		||||
                                                            sizeof( buf ), buf,
 | 
			
		||||
                                                            buf ) );
 | 
			
		||||
    TEST_INVALID_PARAM_RET( MBEDTLS_ERR_RSA_BAD_INPUT_DATA,
 | 
			
		||||
                            mbedtls_rsa_rsaes_oaep_encrypt( &ctx, NULL, NULL,
 | 
			
		||||
                                                            MBEDTLS_RSA_PUBLIC,
 | 
			
		||||
                                                            buf, sizeof( buf ),
 | 
			
		||||
                                                            sizeof( buf ), NULL,
 | 
			
		||||
                                                            buf ) );
 | 
			
		||||
    TEST_INVALID_PARAM_RET( MBEDTLS_ERR_RSA_BAD_INPUT_DATA,
 | 
			
		||||
                            mbedtls_rsa_rsaes_oaep_encrypt( &ctx, NULL, NULL,
 | 
			
		||||
                                                            MBEDTLS_RSA_PUBLIC,
 | 
			
		||||
                                                            buf, sizeof( buf ),
 | 
			
		||||
                                                            sizeof( buf ), buf,
 | 
			
		||||
                                                            NULL ) );
 | 
			
		||||
 | 
			
		||||
		Loading…
	
	
			
			x
			
			
		
	
		Reference in New Issue
	
	Block a user