diff options
author | Filippo Valsorda <filippo@golang.org> | 2020-10-20 19:52:21 +0200 |
---|---|---|
committer | Filippo Valsorda <filippo@golang.org> | 2020-11-05 17:59:43 +0000 |
commit | f42bd50779dea8d8e46de14e2f00cfe716f52d6d (patch) | |
tree | f39c0ca04c46350a018f5b77b8f0a4abf2ae65e3 /src/crypto/internal/boring/goboringcrypto.h | |
parent | ceda58bfd0d79830e400196e6667ca1fde1977c2 (diff) | |
download | go-f42bd50779dea8d8e46de14e2f00cfe716f52d6d.tar.gz go-f42bd50779dea8d8e46de14e2f00cfe716f52d6d.zip |
[dev.boringcrypto] crypto/internal/boring: update BoringCrypto module to certificate 3678
Replace the chroot scaffolding with Docker, which brings its own caching
and works on macOS.
Fixes #40188
Change-Id: I5c96417932e952cbaf1e2991d131c1d5dd7d9921
Reviewed-on: https://go-review.googlesource.com/c/go/+/263997
Reviewed-by: Katie Hockman <katie@golang.org>
Trust: Filippo Valsorda <filippo@golang.org>
Diffstat (limited to 'src/crypto/internal/boring/goboringcrypto.h')
-rw-r--r-- | src/crypto/internal/boring/goboringcrypto.h | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/src/crypto/internal/boring/goboringcrypto.h b/src/crypto/internal/boring/goboringcrypto.h index 744496c6ef..37b7917c04 100644 --- a/src/crypto/internal/boring/goboringcrypto.h +++ b/src/crypto/internal/boring/goboringcrypto.h @@ -118,7 +118,7 @@ size_t _goboringcrypto_EVP_AEAD_key_length(const GO_EVP_AEAD*); size_t _goboringcrypto_EVP_AEAD_nonce_length(const GO_EVP_AEAD*); size_t _goboringcrypto_EVP_AEAD_max_overhead(const GO_EVP_AEAD*); size_t _goboringcrypto_EVP_AEAD_max_tag_len(const GO_EVP_AEAD*); -typedef struct GO_EVP_AEAD_CTX { char data[24]; } GO_EVP_AEAD_CTX; +typedef struct GO_EVP_AEAD_CTX { char data[600]; } GO_EVP_AEAD_CTX; void _goboringcrypto_EVP_AEAD_CTX_zero(GO_EVP_AEAD_CTX*); int _goboringcrypto_EVP_AEAD_CTX_init(GO_EVP_AEAD_CTX*, const GO_EVP_AEAD*, const uint8_t*, size_t, size_t, GO_ENGINE*); void _goboringcrypto_EVP_AEAD_CTX_cleanup(GO_EVP_AEAD_CTX*); @@ -188,7 +188,7 @@ void _goboringcrypto_RSA_free(GO_RSA*); void _goboringcrypto_RSA_get0_key(const GO_RSA*, const GO_BIGNUM **n, const GO_BIGNUM **e, const GO_BIGNUM **d); void _goboringcrypto_RSA_get0_factors(const GO_RSA*, const GO_BIGNUM **p, const GO_BIGNUM **q); void _goboringcrypto_RSA_get0_crt_params(const GO_RSA*, const GO_BIGNUM **dmp1, const GO_BIGNUM **dmp2, const GO_BIGNUM **iqmp); -int _goboringcrypto_RSA_generate_key_ex(GO_RSA*, int, GO_BIGNUM*, GO_BN_GENCB*); +int _goboringcrypto_RSA_generate_key_ex(GO_RSA*, int, const GO_BIGNUM*, GO_BN_GENCB*); int _goboringcrypto_RSA_generate_key_fips(GO_RSA*, int, GO_BN_GENCB*); enum { GO_RSA_PKCS1_PADDING = 1, |