mirror of
https://github.com/yuzu-emu/mbedtls.git
synced 2025-01-23 09:31:03 +00:00
Minor fixes
This commit is contained in:
parent
26f1f6061d
commit
930ec7dfe5
|
@ -1049,7 +1049,8 @@
|
||||||
/**
|
/**
|
||||||
* \def MBEDTLS_RSA_NO_CRT
|
* \def MBEDTLS_RSA_NO_CRT
|
||||||
*
|
*
|
||||||
* Do not use the Chinese Remainder Theorem for the RSA private operation.
|
* Do not use the Chinese Remainder Theorem
|
||||||
|
* for the RSA private operation.
|
||||||
*
|
*
|
||||||
* Uncomment this macro to disable the use of CRT in RSA.
|
* Uncomment this macro to disable the use of CRT in RSA.
|
||||||
*
|
*
|
||||||
|
|
|
@ -1623,7 +1623,7 @@ int mbedtls_mpi_exp_mod( mbedtls_mpi *X, const mbedtls_mpi *A, const mbedtls_mpi
|
||||||
mbedtls_mpi RR, T, W[ 2 << MBEDTLS_MPI_WINDOW_SIZE ], Apos;
|
mbedtls_mpi RR, T, W[ 2 << MBEDTLS_MPI_WINDOW_SIZE ], Apos;
|
||||||
int neg;
|
int neg;
|
||||||
|
|
||||||
if( mbedtls_mpi_cmp_int( N, 0 ) < 0 || ( N->p[0] & 1 ) == 0 )
|
if( mbedtls_mpi_cmp_int( N, 0 ) <= 0 || ( N->p[0] & 1 ) == 0 )
|
||||||
return( MBEDTLS_ERR_MPI_BAD_INPUT_DATA );
|
return( MBEDTLS_ERR_MPI_BAD_INPUT_DATA );
|
||||||
|
|
||||||
if( mbedtls_mpi_cmp_int( E, 0 ) < 0 )
|
if( mbedtls_mpi_cmp_int( E, 0 ) < 0 )
|
||||||
|
|
|
@ -43,7 +43,8 @@ int mbedtls_rsa_decrypt_func( void *ctx, int mode, size_t *olen,
|
||||||
const unsigned char *input, unsigned char *output,
|
const unsigned char *input, unsigned char *output,
|
||||||
size_t output_max_len )
|
size_t output_max_len )
|
||||||
{
|
{
|
||||||
return( mbedtls_rsa_pkcs1_decrypt( (mbedtls_rsa_context *) ctx, NULL, NULL, mode, olen,
|
return( mbedtls_rsa_pkcs1_decrypt( (mbedtls_rsa_context *) ctx,
|
||||||
|
rnd_std_rand, NULL, mode, olen,
|
||||||
input, output, output_max_len ) );
|
input, output, output_max_len ) );
|
||||||
}
|
}
|
||||||
int mbedtls_rsa_sign_func( void *ctx,
|
int mbedtls_rsa_sign_func( void *ctx,
|
||||||
|
@ -51,7 +52,9 @@ int mbedtls_rsa_sign_func( void *ctx,
|
||||||
int mode, mbedtls_md_type_t md_alg, unsigned int hashlen,
|
int mode, mbedtls_md_type_t md_alg, unsigned int hashlen,
|
||||||
const unsigned char *hash, unsigned char *sig )
|
const unsigned char *hash, unsigned char *sig )
|
||||||
{
|
{
|
||||||
return( mbedtls_rsa_pkcs1_sign( (mbedtls_rsa_context *) ctx, f_rng, p_rng, mode,
|
((void) f_rng);
|
||||||
|
((void) p_rng);
|
||||||
|
return( mbedtls_rsa_pkcs1_sign( (mbedtls_rsa_context *) ctx, rnd_std_rand, NULL, mode,
|
||||||
md_alg, hashlen, hash, sig ) );
|
md_alg, hashlen, hash, sig ) );
|
||||||
}
|
}
|
||||||
size_t mbedtls_rsa_key_len_func( void *ctx )
|
size_t mbedtls_rsa_key_len_func( void *ctx )
|
||||||
|
@ -105,7 +108,8 @@ void mbedtls_pk_check_pair( char *pub_file, char *prv_file, int ret )
|
||||||
if( mbedtls_pk_get_type( &prv ) == MBEDTLS_PK_RSA )
|
if( mbedtls_pk_get_type( &prv ) == MBEDTLS_PK_RSA )
|
||||||
{
|
{
|
||||||
TEST_ASSERT( mbedtls_pk_setup_rsa_alt( &alt, mbedtls_pk_rsa( prv ),
|
TEST_ASSERT( mbedtls_pk_setup_rsa_alt( &alt, mbedtls_pk_rsa( prv ),
|
||||||
mbedtls_rsa_decrypt_func, mbedtls_rsa_sign_func, mbedtls_rsa_key_len_func ) == 0 );
|
mbedtls_rsa_decrypt_func, mbedtls_rsa_sign_func,
|
||||||
|
mbedtls_rsa_key_len_func ) == 0 );
|
||||||
TEST_ASSERT( mbedtls_pk_check_pair( &pub, &alt ) == ret );
|
TEST_ASSERT( mbedtls_pk_check_pair( &pub, &alt ) == ret );
|
||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
|
|
Loading…
Reference in a new issue