diff options
author | Quinten Stokkink <goqs@hotmail.com> | 2018-06-22 16:32:47 +0200 |
---|---|---|
committer | Paul Kehrer <paul.l.kehrer@gmail.com> | 2018-06-22 09:32:47 -0500 |
commit | 0d9fc8ec6d35ec6c4f834a8873e7ca63e9e769d0 (patch) | |
tree | d42743111671c9ac39bc8be081fbf4db68884e2e /src | |
parent | 58fd9c412ad8e91f1453f86ba1fc16479f5b11d0 (diff) | |
download | cryptography-0d9fc8ec6d35ec6c4f834a8873e7ca63e9e769d0.tar.gz cryptography-0d9fc8ec6d35ec6c4f834a8873e7ca63e9e769d0.tar.bz2 cryptography-0d9fc8ec6d35ec6c4f834a8873e7ca63e9e769d0.zip |
Exposed OpenSSL prime methods (#4292)
These are required by the Tribler project.
Diffstat (limited to 'src')
-rw-r--r-- | src/_cffi_src/openssl/bignum.py | 6 |
1 files changed, 6 insertions, 0 deletions
diff --git a/src/_cffi_src/openssl/bignum.py b/src/_cffi_src/openssl/bignum.py index eab40284..a352f5a8 100644 --- a/src/_cffi_src/openssl/bignum.py +++ b/src/_cffi_src/openssl/bignum.py @@ -72,6 +72,12 @@ BIGNUM *BN_mod_inverse(BIGNUM *, const BIGNUM *, const BIGNUM *, BN_CTX *); int BN_num_bytes(const BIGNUM *); int BN_mod(BIGNUM *, const BIGNUM *, const BIGNUM *, BN_CTX *); + +/* The following 3 prime methods are exposed for Tribler. */ +int BN_generate_prime_ex(BIGNUM *, int, int, const BIGNUM *, + const BIGNUM *, BN_GENCB *); +int BN_is_prime_ex(const BIGNUM *, int, BN_CTX *, BN_GENCB *); +const int BN_prime_checks_for_size(int); """ CUSTOMIZATIONS = """ |