blob: e400650dd0108e3cf7eb5820836b51d7cba5516d [file] [log] [blame] [view]
Thomas Daubney62b0d1d2021-05-21 16:55:03 +01001Remove the mode parameter from RSA functions
2--------------------------------------------
3
4This affects all users who use the RSA encryption, decryption, sign and
5verify APIs.
6
Thomas Daubney6f966112021-05-25 15:00:19 +01007The RSA module no longer supports private-key operations with the public key or
8vice versa. As a consequence, RSA operation functions no longer have a mode
9parameter. If you were calling RSA operations with the normal mode (public key
10for verification or encryption, private key for signature or decryption), remove
11the `MBEDTLS_MODE_PUBLIC` or `MBEDTLS_MODE_PRIVATE` argument. If you were calling
12RSA operations with the wrong mode, which rarely makes sense from a security
13perspective, this is no longer supported.
Thomas Daubney62b0d1d2021-05-21 16:55:03 +010014
Thomas Daubney6f966112021-05-25 15:00:19 +010015Remove the RNG parameter from RSA verify functions
16--------------------------------------------------
Thomas Daubney62b0d1d2021-05-21 16:55:03 +010017
Thomas Daubney6f966112021-05-25 15:00:19 +010018RSA verification functions also no longer take random generator arguments (this
19was only needed when using a private key). This affects all applications using
20the RSA verify functions.
Thomas Daubney62b0d1d2021-05-21 16:55:03 +010021
Thomas Daubney6f966112021-05-25 15:00:19 +010022RNG is now mandatory in all RSA private key operations
23------------------------------------------------------
24
25The random generator is now mandatory for blinding in all RSA private-key
26operations (`mbedtls_rsa_private`, `mbedtls_rsa_xxx_sign`,
27`mbedtls_rsa_xxx_decrypt`) as well as for encryption
28(`mbedtls_rsa_xxx_encrypt`). This means that passing a null `f_rng` is no longer
29supported.