diff options
| author | tb <> | 2023-11-19 21:06:15 +0000 |
|---|---|---|
| committer | tb <> | 2023-11-19 21:06:15 +0000 |
| commit | 3844b7216f32aa55d2d04eb1aa7226ba6eb8ea32 (patch) | |
| tree | 97bce89e133f8ba9c4e6e6d20026480aae02e61c | |
| parent | 541f42b55cd7e2dccb442b88dc4697c5818e9e04 (diff) | |
| download | openbsd-3844b7216f32aa55d2d04eb1aa7226ba6eb8ea32.tar.gz openbsd-3844b7216f32aa55d2d04eb1aa7226ba6eb8ea32.tar.bz2 openbsd-3844b7216f32aa55d2d04eb1aa7226ba6eb8ea32.zip | |
Remove musings how ENGINE may or may not screw everything up.
| -rw-r--r-- | src/lib/libcrypto/man/RSA_check_key.3 | 25 |
1 files changed, 2 insertions, 23 deletions
diff --git a/src/lib/libcrypto/man/RSA_check_key.3 b/src/lib/libcrypto/man/RSA_check_key.3 index c1e6379ac5..36b613b3a5 100644 --- a/src/lib/libcrypto/man/RSA_check_key.3 +++ b/src/lib/libcrypto/man/RSA_check_key.3 | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | .\" $OpenBSD: RSA_check_key.3,v 1.9 2023/05/01 07:28:11 tb Exp $ | 1 | .\" $OpenBSD: RSA_check_key.3,v 1.10 2023/11/19 21:06:15 tb Exp $ |
| 2 | .\" OpenSSL 6859cf74 Sep 25 13:33:28 2002 +0000 | 2 | .\" OpenSSL 6859cf74 Sep 25 13:33:28 2002 +0000 |
| 3 | .\" | 3 | .\" |
| 4 | .\" This file was written by Ulf Moeller <ulf@openssl.org> and | 4 | .\" This file was written by Ulf Moeller <ulf@openssl.org> and |
| @@ -49,7 +49,7 @@ | |||
| 49 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 49 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
| 50 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 50 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
| 51 | .\" | 51 | .\" |
| 52 | .Dd $Mdocdate: May 1 2023 $ | 52 | .Dd $Mdocdate: November 19 2023 $ |
| 53 | .Dt RSA_CHECK_KEY 3 | 53 | .Dt RSA_CHECK_KEY 3 |
| 54 | .Os | 54 | .Os |
| 55 | .Sh NAME | 55 | .Sh NAME |
| @@ -92,27 +92,6 @@ key structure must contain all the private key data too. | |||
| 92 | Therefore, it cannot be used with any arbitrary | 92 | Therefore, it cannot be used with any arbitrary |
| 93 | .Vt RSA | 93 | .Vt RSA |
| 94 | key object, even if it is otherwise fit for regular RSA operation. | 94 | key object, even if it is otherwise fit for regular RSA operation. |
| 95 | .Pp | ||
| 96 | Unlike most other RSA functions, this function does | ||
| 97 | .Sy not | ||
| 98 | work transparently with any underlying | ||
| 99 | .Vt ENGINE | ||
| 100 | implementation because it uses the key data in the | ||
| 101 | .Vt RSA | ||
| 102 | structure directly. | ||
| 103 | An | ||
| 104 | .Vt ENGINE | ||
| 105 | implementation can override the way key data is stored and handled, | ||
| 106 | and can even provide support for HSM keys - in which case the | ||
| 107 | .Vt RSA | ||
| 108 | structure may contain | ||
| 109 | .Sy no | ||
| 110 | key data at all! | ||
| 111 | If the | ||
| 112 | .Vt ENGINE | ||
| 113 | in question is only being used for acceleration or analysis purposes, | ||
| 114 | then in all likelihood the RSA key data is complete and untouched, | ||
| 115 | but this can't be assumed in the general case. | ||
| 116 | .Sh RETURN VALUES | 95 | .Sh RETURN VALUES |
| 117 | .Fn RSA_check_key | 96 | .Fn RSA_check_key |
| 118 | returns 1 if | 97 | returns 1 if |
