Swap D,E parameters in mbedtls_rsa_deduce_primes
diff --git a/include/mbedtls/rsa_internal.h b/include/mbedtls/rsa_internal.h
index 080f09f..3b351c9 100644
--- a/include/mbedtls/rsa_internal.h
+++ b/include/mbedtls/rsa_internal.h
@@ -72,8 +72,8 @@
* overwrite it.
*
* \param N RSA modulus N = PQ, with P, Q to be found
- * \param D RSA private exponent
* \param E RSA public exponent
+ * \param D RSA private exponent
* \param P Pointer to MPI holding first prime factor of N on success
* \param Q Pointer to MPI holding second prime factor of N on success
*
@@ -87,8 +87,8 @@
* use the helper function \c mbedtls_rsa_validate_params.
*
*/
-int mbedtls_rsa_deduce_primes( mbedtls_mpi const *N, mbedtls_mpi const *D,
- mbedtls_mpi const *E,
+int mbedtls_rsa_deduce_primes( mbedtls_mpi const *N, mbedtls_mpi const *E,
+ mbedtls_mpi const *D,
mbedtls_mpi *P, mbedtls_mpi *Q );
/**
diff --git a/library/rsa.c b/library/rsa.c
index 5366abc..bf24a09 100644
--- a/library/rsa.c
+++ b/library/rsa.c
@@ -274,7 +274,7 @@
if( pq_missing )
{
- ret = mbedtls_rsa_deduce_primes( &ctx->N, &ctx->D, &ctx->E,
+ ret = mbedtls_rsa_deduce_primes( &ctx->N, &ctx->E, &ctx->D,
&ctx->P, &ctx->Q );
if( ret != 0 )
return( MBEDTLS_ERR_RSA_BAD_INPUT_DATA + ret );
diff --git a/library/rsa_internal.c b/library/rsa_internal.c
index 3b54fde..f65f0df 100644
--- a/library/rsa_internal.c
+++ b/library/rsa_internal.c
@@ -66,7 +66,7 @@
*
*/
int mbedtls_rsa_deduce_primes( mbedtls_mpi const *N,
- mbedtls_mpi const *D, mbedtls_mpi const *E,
+ mbedtls_mpi const *E, mbedtls_mpi const *D,
mbedtls_mpi *P, mbedtls_mpi *Q )
{
int ret = 0;