X-Git-Url: https://git.openssl.org/gitweb/?p=openssl.git;a=blobdiff_plain;f=crypto%2Fdsa%2Fdsa.h;h=6010a954f0c700d051315e6ba3426fd056e28363;hp=28aa8a3073aec4d1e7451b60a358b3602a6567d2;hb=190c615d4398cc6c8b61eb7881d7409314529a75;hpb=5c57c69f9ebcc933161a24d77f87f17011c9977b diff --git a/crypto/dsa/dsa.h b/crypto/dsa/dsa.h index 28aa8a3073..6010a954f0 100644 --- a/crypto/dsa/dsa.h +++ b/crypto/dsa/dsa.h @@ -104,14 +104,6 @@ * used for all * exponents. */ -#define DSA_FLAG_NONCE_FROM_HASH 0x04 /* Causes the DSA nonce - * to be calculated from - * SHA512(private_key + - * H(message) + - * random). This - * strengthens DSA - * against a weak - * PRNG. */ /* If this flag is set the DSA method is FIPS compliant and can be used * in FIPS mode. This is set in the validated module method. If an @@ -147,9 +139,8 @@ struct dsa_method { const char *name; DSA_SIG * (*dsa_do_sign)(const unsigned char *dgst, int dlen, DSA *dsa); - int (*dsa_sign_setup)(DSA *dsa, BN_CTX *ctx_in, - BIGNUM **kinvp, BIGNUM **rp, - const unsigned char *dgst, int dlen); + int (*dsa_sign_setup)(DSA *dsa, BN_CTX *ctx_in, BIGNUM **kinvp, + BIGNUM **rp); int (*dsa_do_verify)(const unsigned char *dgst, int dgst_len, DSA_SIG *sig, DSA *dsa); int (*dsa_mod_exp)(DSA *dsa, BIGNUM *rr, BIGNUM *a1, BIGNUM *p1, @@ -353,7 +344,6 @@ void ERR_load_DSA_strings(void); #define DSA_R_MISSING_PARAMETERS 101 #define DSA_R_MODULUS_TOO_LARGE 103 #define DSA_R_NEED_NEW_SETUP_VALUES 110 -#define DSA_R_NONCE_CANNOT_BE_PRECOMPUTED 114 #define DSA_R_NO_PARAMETERS_SET 107 #define DSA_R_PARAMETER_ENCODING_ERROR 105 #define DSA_R_Q_NOT_PRIME 113