提交 ee13f9b1 编写于 作者: D Dr. Stephen Henson

Fix parameters to dummy function BN_ref_mod_exp().

上级 27eb622b
......@@ -5,6 +5,10 @@
Changes between 0.9.1c and 0.9.2
*) Fix the dummy function BN_ref_mod_exp() in rsaref.c to have the correct
parameters. This was causing a warning which killed off the Win32 compile.
[Steve Henson]
*) Remove C++ style comments from crypto/bn/bn_local.h.
[Neil Costigan <neil.costigan@celocom.com>]
......
......@@ -96,7 +96,7 @@ int RSA_ref_public_encrypt(int len, unsigned char *from,
unsigned char *to, RSA *rsa, int padding);
int RSA_ref_public_decrypt(int len, unsigned char *from,
unsigned char *to, RSA *rsa, int padding);
static int BN_ref_mod_exp(BIGNUM *r,BIGNUM *a,BIGNUM *p,BIGNUM *m, BN_CTX *ctx);
static int BN_ref_mod_exp(BIGNUM *r,BIGNUM *a,BIGNUM *p,BIGNUM *m, BN_CTX *ctx, BN_MONT_CTX *m_ctx);
static int RSA_ref_mod_exp(BIGNUM *r0, BIGNUM *I, RSA *rsa);
#else
......@@ -144,9 +144,10 @@ RSA *rsa;
return(0);
}
static int BN_ref_mod_exp(r,a,p,m,ctx)
static int BN_ref_mod_exp(r,a,p,m,ctx,m_ctx)
BIGNUM *r,*a,*p,*m;
BN_CTX *ctx;
BN_MONT_CTX *m_ctx;
{
RSAREFerr(RSAREF_F_BN_REF_MOD_EXP,ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
return(0);
......
Markdown is supported
0% .
You are about to add 0 people to the discussion. Proceed with caution.
先完成此消息的编辑!
想要评论请 注册