Thomas Daubney | 62b0d1d | 2021-05-21 16:55:03 +0100 | [diff] [blame] | 1 | Remove the mode parameter from RSA functions |
| 2 | -------------------------------------------- |
| 3 | |
| 4 | This affects all users who use the RSA encryption, decryption, sign and |
| 5 | verify APIs. |
| 6 | |
Thomas Daubney | 6f96611 | 2021-05-25 15:00:19 +0100 | [diff] [blame] | 7 | The RSA module no longer supports private-key operations with the public key or |
| 8 | vice versa. As a consequence, RSA operation functions no longer have a mode |
| 9 | parameter. If you were calling RSA operations with the normal mode (public key |
| 10 | for verification or encryption, private key for signature or decryption), remove |
| 11 | the `MBEDTLS_MODE_PUBLIC` or `MBEDTLS_MODE_PRIVATE` argument. If you were calling |
| 12 | RSA operations with the wrong mode, which rarely makes sense from a security |
| 13 | perspective, this is no longer supported. |
Thomas Daubney | 62b0d1d | 2021-05-21 16:55:03 +0100 | [diff] [blame] | 14 | |
Thomas Daubney | 6f96611 | 2021-05-25 15:00:19 +0100 | [diff] [blame] | 15 | Remove the RNG parameter from RSA verify functions |
| 16 | -------------------------------------------------- |
Thomas Daubney | 62b0d1d | 2021-05-21 16:55:03 +0100 | [diff] [blame] | 17 | |
Thomas Daubney | 6f96611 | 2021-05-25 15:00:19 +0100 | [diff] [blame] | 18 | RSA verification functions also no longer take random generator arguments (this |
| 19 | was only needed when using a private key). This affects all applications using |
| 20 | the RSA verify functions. |
Thomas Daubney | 62b0d1d | 2021-05-21 16:55:03 +0100 | [diff] [blame] | 21 | |