summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto/dsa/dsa.h
diff options
context:
space:
mode:
authortb <>2024-12-05 19:34:46 +0000
committertb <>2024-12-05 19:34:46 +0000
commite2eaf3f2399f519f00d6624c4781f18a74571016 (patch)
tree27104488bc44817b52bb2c24a8cc8e3ee11161c1 /src/lib/libcrypto/dsa/dsa.h
parentde9aea9cc14b09138a727b6b042d5e7bb3e43151 (diff)
downloadopenbsd-e2eaf3f2399f519f00d6624c4781f18a74571016.tar.gz
openbsd-e2eaf3f2399f519f00d6624c4781f18a74571016.tar.bz2
openbsd-e2eaf3f2399f519f00d6624c4781f18a74571016.zip
Make the DSS_prime_checks macro internal
Rename it to DSA_prime_checks and add an XXX comment mentioning that we could reduce the number of rounds thanks to BPSW. There are no plans of changing that as DSA is on its way out. discussed with miod
Diffstat (limited to 'src/lib/libcrypto/dsa/dsa.h')
-rw-r--r--src/lib/libcrypto/dsa/dsa.h9
1 files changed, 1 insertions, 8 deletions
diff --git a/src/lib/libcrypto/dsa/dsa.h b/src/lib/libcrypto/dsa/dsa.h
index 63e5cedb1c..9f3d561239 100644
--- a/src/lib/libcrypto/dsa/dsa.h
+++ b/src/lib/libcrypto/dsa/dsa.h
@@ -1,4 +1,4 @@
1/* $OpenBSD: dsa.h,v 1.45 2024/12/05 19:29:08 tb Exp $ */ 1/* $OpenBSD: dsa.h,v 1.46 2024/12/05 19:34:46 tb Exp $ */
2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) 2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3 * All rights reserved. 3 * All rights reserved.
4 * 4 *
@@ -177,13 +177,6 @@ int DSA_print(BIO *bp, const DSA *x, int off);
177int DSAparams_print_fp(FILE *fp, const DSA *x); 177int DSAparams_print_fp(FILE *fp, const DSA *x);
178int DSA_print_fp(FILE *bp, const DSA *x, int off); 178int DSA_print_fp(FILE *bp, const DSA *x, int off);
179 179
180/*
181 * Primality test according to FIPS PUB 186-4, Appendix C.3. Set the number
182 * to 64 rounds of Miller-Rabin, which corresponds to 128 bits of security.
183 * This is necessary for keys of size >= 3072.
184 */
185#define DSS_prime_checks 64
186
187#ifndef OPENSSL_NO_DH 180#ifndef OPENSSL_NO_DH
188/* Convert DSA structure (key or just parameters) into DH structure 181/* Convert DSA structure (key or just parameters) into DH structure
189 * (be careful to avoid small subgroup attacks when using this!) */ 182 * (be careful to avoid small subgroup attacks when using this!) */