diff options
| author | 2022-10-08 07:00:05 +0200 | |
|---|---|---|
| committer | 2022-10-08 07:00:05 +0200 | |
| commit | 0f4779e2a095b72b7ec7fc0f2abe2cc57f152b76 (patch) | |
| tree | d9b945a8c84ba1441ad1563a78259e6ae95e4c1a /xs_openssl.h | |
| parent | More emoticons. (diff) | |
| download | penes-snac2-0f4779e2a095b72b7ec7fc0f2abe2cc57f152b76.tar.gz penes-snac2-0f4779e2a095b72b7ec7fc0f2abe2cc57f152b76.tar.xz penes-snac2-0f4779e2a095b72b7ec7fc0f2abe2cc57f152b76.zip | |
Backport from xs.
Diffstat (limited to '')
| -rw-r--r-- | xs_openssl.h | 16 |
1 files changed, 8 insertions, 8 deletions
diff --git a/xs_openssl.h b/xs_openssl.h index 9b0f71e..0652637 100644 --- a/xs_openssl.h +++ b/xs_openssl.h | |||
| @@ -9,10 +9,10 @@ d_char *xs_sha1_hex(const void *input, int size); | |||
| 9 | d_char *xs_sha256_hex(const void *input, int size); | 9 | d_char *xs_sha256_hex(const void *input, int size); |
| 10 | d_char *xs_sha256_base64(const void *input, int size); | 10 | d_char *xs_sha256_base64(const void *input, int size); |
| 11 | d_char *xs_rsa_genkey(int bits); | 11 | d_char *xs_rsa_genkey(int bits); |
| 12 | d_char *xs_rsa_sign(char *secret, char *mem, int size); | 12 | d_char *xs_rsa_sign(const char *secret, const char *mem, int size); |
| 13 | int xs_rsa_verify(char *pubkey, char *mem, int size, char *b64sig); | 13 | int xs_rsa_verify(const char *pubkey, const char *mem, int size, const char *b64sig); |
| 14 | d_char *xs_evp_sign(char *secret, char *mem, int size); | 14 | d_char *xs_evp_sign(const char *secret, const char *mem, int size); |
| 15 | int xs_evp_verify(char *pubkey, char *mem, int size, char *b64sig); | 15 | int xs_evp_verify(const char *pubkey, const char *mem, int size, const char *b64sig); |
| 16 | 16 | ||
| 17 | 17 | ||
| 18 | #ifdef XS_IMPLEMENTATION | 18 | #ifdef XS_IMPLEMENTATION |
| @@ -119,7 +119,7 @@ d_char *xs_rsa_genkey(int bits) | |||
| 119 | } | 119 | } |
| 120 | 120 | ||
| 121 | 121 | ||
| 122 | d_char *xs_rsa_sign(char *secret, char *mem, int size) | 122 | d_char *xs_rsa_sign(const char *secret, const char *mem, int size) |
| 123 | /* signs a memory block (secret is in PEM format) */ | 123 | /* signs a memory block (secret is in PEM format) */ |
| 124 | { | 124 | { |
| 125 | d_char *signature = NULL; | 125 | d_char *signature = NULL; |
| @@ -146,7 +146,7 @@ d_char *xs_rsa_sign(char *secret, char *mem, int size) | |||
| 146 | } | 146 | } |
| 147 | 147 | ||
| 148 | 148 | ||
| 149 | int xs_rsa_verify(char *pubkey, char *mem, int size, char *b64sig) | 149 | int xs_rsa_verify(const char *pubkey, const char *mem, int size, const char *b64sig) |
| 150 | /* verifies a base64 block, returns non-zero on ok */ | 150 | /* verifies a base64 block, returns non-zero on ok */ |
| 151 | { | 151 | { |
| 152 | int r = 0; | 152 | int r = 0; |
| @@ -176,7 +176,7 @@ int xs_rsa_verify(char *pubkey, char *mem, int size, char *b64sig) | |||
| 176 | } | 176 | } |
| 177 | 177 | ||
| 178 | 178 | ||
| 179 | d_char *xs_evp_sign(char *secret, char *mem, int size) | 179 | d_char *xs_evp_sign(const char *secret, const char *mem, int size) |
| 180 | /* signs a memory block (secret is in PEM format) */ | 180 | /* signs a memory block (secret is in PEM format) */ |
| 181 | { | 181 | { |
| 182 | d_char *signature = NULL; | 182 | d_char *signature = NULL; |
| @@ -217,7 +217,7 @@ d_char *xs_evp_sign(char *secret, char *mem, int size) | |||
| 217 | } | 217 | } |
| 218 | 218 | ||
| 219 | 219 | ||
| 220 | int xs_evp_verify(char *pubkey, char *mem, int size, char *b64sig) | 220 | int xs_evp_verify(const char *pubkey, const char *mem, int size, const char *b64sig) |
| 221 | /* verifies a base64 block, returns non-zero on ok */ | 221 | /* verifies a base64 block, returns non-zero on ok */ |
| 222 | { | 222 | { |
| 223 | int r = 0; | 223 | int r = 0; |