aboutsummaryrefslogtreecommitdiffstats
path: root/src/libstrongswan/crypto/rsa/rsa_public_key.c
diff options
context:
space:
mode:
authorAndreas Steffen <andreas.steffen@strongswan.org>2006-06-27 08:48:28 +0000
committerAndreas Steffen <andreas.steffen@strongswan.org>2006-06-27 08:48:28 +0000
commit6f74bfd6ac6e37c6c3796fc55d02635b2851e72b (patch)
treeeafd391f54c49167848b1a04d3df5ebe3083ce3f /src/libstrongswan/crypto/rsa/rsa_public_key.c
parentc01d911201b18db6f4ca5e71e0e6584a59658dbc (diff)
downloadstrongswan-6f74bfd6ac6e37c6c3796fc55d02635b2851e72b.tar.bz2
strongswan-6f74bfd6ac6e37c6c3796fc55d02635b2851e72b.tar.xz
added X.509 trust chain verification
Diffstat (limited to 'src/libstrongswan/crypto/rsa/rsa_public_key.c')
-rw-r--r--src/libstrongswan/crypto/rsa/rsa_public_key.c34
1 files changed, 17 insertions, 17 deletions
diff --git a/src/libstrongswan/crypto/rsa/rsa_public_key.c b/src/libstrongswan/crypto/rsa/rsa_public_key.c
index 87c0bd019..cc714b0ea 100644
--- a/src/libstrongswan/crypto/rsa/rsa_public_key.c
+++ b/src/libstrongswan/crypto/rsa/rsa_public_key.c
@@ -141,7 +141,7 @@ struct private_rsa_public_key_t {
* @param data data to process
* @return processed data
*/
- chunk_t (*rsaep) (private_rsa_public_key_t *this, chunk_t data);
+ chunk_t (*rsaep) (const private_rsa_public_key_t *this, chunk_t data);
/**
* @brief Implements the RSASVP1 algorithm specified in PKCS#1.
@@ -150,7 +150,7 @@ struct private_rsa_public_key_t {
* @param data data to process
* @return processed data
*/
- chunk_t (*rsavp1) (private_rsa_public_key_t *this, chunk_t data);
+ chunk_t (*rsavp1) (const private_rsa_public_key_t *this, chunk_t data);
};
private_rsa_public_key_t *rsa_public_key_create_empty(void);
@@ -158,7 +158,7 @@ private_rsa_public_key_t *rsa_public_key_create_empty(void);
/**
* Implementation of private_rsa_public_key_t.rsaep and private_rsa_public_key_t.rsavp1
*/
-static chunk_t rsaep(private_rsa_public_key_t *this, chunk_t data)
+static chunk_t rsaep(const private_rsa_public_key_t *this, chunk_t data)
{
mpz_t m, c;
chunk_t encrypted;
@@ -182,7 +182,7 @@ static chunk_t rsaep(private_rsa_public_key_t *this, chunk_t data)
/**
* Implementation of rsa_public_key.verify_emsa_pkcs1_signature.
*/
-static status_t verify_emsa_pkcs1_signature(private_rsa_public_key_t *this, chunk_t data, chunk_t signature)
+static status_t verify_emsa_pkcs1_signature(const private_rsa_public_key_t *this, chunk_t data, chunk_t signature)
{
hasher_t *hasher = NULL;
chunk_t hash;
@@ -291,7 +291,7 @@ end:
/**
* Implementation of rsa_public_key.get_key.
*/
-static status_t get_key(private_rsa_public_key_t *this, chunk_t *key)
+static status_t get_key(const private_rsa_public_key_t *this, chunk_t *key)
{
chunk_t n, e;
@@ -313,7 +313,7 @@ static status_t get_key(private_rsa_public_key_t *this, chunk_t *key)
/**
* Implementation of rsa_public_key.save_key.
*/
-static status_t save_key(private_rsa_public_key_t *this, char *file)
+static status_t save_key(const private_rsa_public_key_t *this, char *file)
{
return NOT_SUPPORTED;
}
@@ -321,7 +321,7 @@ static status_t save_key(private_rsa_public_key_t *this, char *file)
/**
* Implementation of rsa_public_key.get_modulus.
*/
-static mpz_t *get_modulus(private_rsa_public_key_t *this)
+static mpz_t *get_modulus(const private_rsa_public_key_t *this)
{
return &this->n;
}
@@ -329,7 +329,7 @@ static mpz_t *get_modulus(private_rsa_public_key_t *this)
/**
* Implementation of rsa_public_key.get_keysize.
*/
-static size_t get_keysize(private_rsa_public_key_t *this)
+static size_t get_keysize(const private_rsa_public_key_t *this)
{
return this->k;
}
@@ -337,7 +337,7 @@ static size_t get_keysize(private_rsa_public_key_t *this)
/**
* Implementation of rsa_public_key.get_keyid.
*/
-static chunk_t get_keyid(private_rsa_public_key_t *this)
+static chunk_t get_keyid(const private_rsa_public_key_t *this)
{
return this->keyid;
}
@@ -345,7 +345,7 @@ static chunk_t get_keyid(private_rsa_public_key_t *this)
/**
* Implementation of rsa_public_key.clone.
*/
-static rsa_public_key_t* _clone(private_rsa_public_key_t *this)
+static rsa_public_key_t* _clone(const private_rsa_public_key_t *this)
{
private_rsa_public_key_t *clone = rsa_public_key_create_empty();
@@ -376,13 +376,13 @@ private_rsa_public_key_t *rsa_public_key_create_empty(void)
private_rsa_public_key_t *this = malloc_thing(private_rsa_public_key_t);
/* public functions */
- this->public.verify_emsa_pkcs1_signature = (status_t (*) (rsa_public_key_t*,chunk_t,chunk_t))verify_emsa_pkcs1_signature;
- this->public.get_key = (status_t (*) (rsa_public_key_t*,chunk_t*))get_key;
- this->public.save_key = (status_t (*) (rsa_public_key_t*,char*))save_key;
- this->public.get_modulus = (mpz_t *(*) (rsa_public_key_t*))get_modulus;
- this->public.get_keysize = (size_t (*) (rsa_public_key_t*))get_keysize;
- this->public.get_keyid = (chunk_t (*) (rsa_public_key_t*))get_keyid;
- this->public.clone = (rsa_public_key_t* (*) (rsa_public_key_t*))_clone;
+ this->public.verify_emsa_pkcs1_signature = (status_t (*) (const rsa_public_key_t*,chunk_t,chunk_t))verify_emsa_pkcs1_signature;
+ this->public.get_key = (status_t (*) (const rsa_public_key_t*,chunk_t*))get_key;
+ this->public.save_key = (status_t (*) (const rsa_public_key_t*,char*))save_key;
+ this->public.get_modulus = (mpz_t *(*) (const rsa_public_key_t*))get_modulus;
+ this->public.get_keysize = (size_t (*) (const rsa_public_key_t*))get_keysize;
+ this->public.get_keyid = (chunk_t (*) (const rsa_public_key_t*))get_keyid;
+ this->public.clone = (rsa_public_key_t* (*) (const rsa_public_key_t*))_clone;
this->public.destroy = (void (*) (rsa_public_key_t*))destroy;
/* private functions */