@@ -94,15 +94,15 @@ type PublicKeyRSA struct {
94
94
_pkey C.GO_EVP_PKEY_PTR
95
95
}
96
96
97
- func NewPublicKeyRSA (N , E BigInt ) (* PublicKeyRSA , error ) {
97
+ func NewPublicKeyRSA (n , e BigInt ) (* PublicKeyRSA , error ) {
98
98
var pkey C.GO_EVP_PKEY_PTR
99
99
switch vMajor {
100
100
case 1 :
101
101
key := C .go_openssl_RSA_new ()
102
102
if key == nil {
103
103
return nil , newOpenSSLError ("RSA_new failed" )
104
104
}
105
- if ! rsaSetKey (key , N , E , nil ) {
105
+ if ! rsaSetKey (key , n , e , nil ) {
106
106
return nil , fail ("RSA_set0_key" )
107
107
}
108
108
pkey = C .go_openssl_EVP_PKEY_new ()
@@ -117,7 +117,7 @@ func NewPublicKeyRSA(N, E BigInt) (*PublicKeyRSA, error) {
117
117
}
118
118
case 3 :
119
119
var err error
120
- if pkey , err = newRSAKey3 (false , N , E , nil , nil , nil , nil , nil , nil ); err != nil {
120
+ if pkey , err = newRSAKey3 (false , n , e , nil , nil , nil , nil , nil , nil ); err != nil {
121
121
return nil , err
122
122
}
123
123
default :
@@ -145,24 +145,24 @@ type PrivateKeyRSA struct {
145
145
_pkey C.GO_EVP_PKEY_PTR
146
146
}
147
147
148
- func NewPrivateKeyRSA (N , E , D , P , Q , Dp , Dq , Qinv BigInt ) (* PrivateKeyRSA , error ) {
148
+ func NewPrivateKeyRSA (n , e , d , p , q , dp , dq , qinv BigInt ) (* PrivateKeyRSA , error ) {
149
149
var pkey C.GO_EVP_PKEY_PTR
150
150
switch vMajor {
151
151
case 1 :
152
152
key := C .go_openssl_RSA_new ()
153
153
if key == nil {
154
154
return nil , newOpenSSLError ("RSA_new failed" )
155
155
}
156
- if ! rsaSetKey (key , N , E , D ) {
156
+ if ! rsaSetKey (key , n , e , d ) {
157
157
return nil , fail ("RSA_set0_key" )
158
158
}
159
- if P != nil && Q != nil {
160
- if ! rsaSetFactors (key , P , Q ) {
159
+ if p != nil && q != nil {
160
+ if ! rsaSetFactors (key , p , q ) {
161
161
return nil , fail ("RSA_set0_factors" )
162
162
}
163
163
}
164
- if Dp != nil && Dq != nil && Qinv != nil {
165
- if ! rsaSetCRTParams (key , Dp , Dq , Qinv ) {
164
+ if dp != nil && dq != nil && qinv != nil {
165
+ if ! rsaSetCRTParams (key , dp , dq , qinv ) {
166
166
return nil , fail ("RSA_set0_crt_params" )
167
167
}
168
168
}
@@ -178,7 +178,7 @@ func NewPrivateKeyRSA(N, E, D, P, Q, Dp, Dq, Qinv BigInt) (*PrivateKeyRSA, error
178
178
}
179
179
case 3 :
180
180
var err error
181
- if pkey , err = newRSAKey3 (true , N , E , D , P , Q , Dp , Dq , Qinv ); err != nil {
181
+ if pkey , err = newRSAKey3 (true , n , e , d , p , q , dp , dq , qinv ); err != nil {
182
182
return nil , err
183
183
}
184
184
default :
@@ -334,7 +334,7 @@ func bnSet(b1 *C.GO_BIGNUM_PTR, b2 BigInt) {
334
334
func rsaSetKey (key C.GO_RSA_PTR , n , e , d BigInt ) bool {
335
335
if vMajor == 1 && vMinor == 0 {
336
336
r := (* rsa_st_1_0_2 )(unsafe .Pointer (key ))
337
- //r.d and d will be nil for public keys.
337
+ // r.d and d will be nil for public keys.
338
338
if (r .n == nil && n == nil ) ||
339
339
(r .e == nil && e == nil ) {
340
340
return false
@@ -376,8 +376,7 @@ func rsaSetCRTParams(key C.GO_RSA_PTR, dmp1, dmq1, iqmp BigInt) bool {
376
376
}
377
377
return C .go_openssl_RSA_set0_crt_params (key , bigToBN (dmp1 ), bigToBN (dmq1 ), bigToBN (iqmp )) == 1
378
378
}
379
-
380
- func newRSAKey3 (isPriv bool , N , E , D , P , Q , Dp , Dq , Qinv BigInt ) (C.GO_EVP_PKEY_PTR , error ) {
379
+ func newRSAKey3 (isPriv bool , n , e , d , p , q , dp , dq , qinv BigInt ) (C.GO_EVP_PKEY_PTR , error ) {
381
380
// Construct the parameters.
382
381
bld := C .go_openssl_OSSL_PARAM_BLD_new ()
383
382
if bld == nil {
@@ -393,17 +392,17 @@ func newRSAKey3(isPriv bool, N, E, D, P, Q, Dp, Dq, Qinv BigInt) (C.GO_EVP_PKEY_
393
392
comps := make ([]bigIntParam , 0 , 8 )
394
393
395
394
required := [... ]bigIntParam {
396
- {OSSL_PKEY_PARAM_RSA_N , N }, {OSSL_PKEY_PARAM_RSA_E , E }, {OSSL_PKEY_PARAM_RSA_D , D },
395
+ {OSSL_PKEY_PARAM_RSA_N , n }, {OSSL_PKEY_PARAM_RSA_E , e }, {OSSL_PKEY_PARAM_RSA_D , d },
397
396
}
398
397
comps = append (comps , required [:]... )
399
398
400
399
// OpenSSL 3.0 and 3.1 required all the precomputed values if
401
400
// P and Q are present. See:
402
401
// https://github.com/openssl/openssl/pull/22334
403
- if P != nil && Q != nil && Dp != nil && Dq != nil && Qinv != nil {
402
+ if p != nil && q != nil && dp != nil && dq != nil && qinv != nil {
404
403
precomputed := [... ]bigIntParam {
405
- {OSSL_PKEY_PARAM_RSA_FACTOR1 , P }, {OSSL_PKEY_PARAM_RSA_FACTOR2 , Q },
406
- {OSSL_PKEY_PARAM_RSA_EXPONENT1 , Dp }, {OSSL_PKEY_PARAM_RSA_EXPONENT2 , Dq }, {OSSL_PKEY_PARAM_RSA_COEFFICIENT1 , Qinv },
404
+ {OSSL_PKEY_PARAM_RSA_FACTOR1 , p }, {OSSL_PKEY_PARAM_RSA_FACTOR2 , q },
405
+ {OSSL_PKEY_PARAM_RSA_EXPONENT1 , dp }, {OSSL_PKEY_PARAM_RSA_EXPONENT2 , dq }, {OSSL_PKEY_PARAM_RSA_COEFFICIENT1 , qinv },
407
406
}
408
407
comps = append (comps , precomputed [:]... )
409
408
}
0 commit comments