diff options
author | schwarze <> | 2019-06-08 10:40:51 +0000 |
---|---|---|
committer | schwarze <> | 2019-06-08 10:40:51 +0000 |
commit | 8f4e63e7d7854fe8feea4a10e965bcf933abb999 (patch) | |
tree | b6702e3fb830bf8d3a1e3153d9a8d539009ae5b1 | |
parent | c7efff3e254b868e292d5726e03e83b957c0dd15 (diff) | |
download | openbsd-8f4e63e7d7854fe8feea4a10e965bcf933abb999.tar.gz openbsd-8f4e63e7d7854fe8feea4a10e965bcf933abb999.tar.bz2 openbsd-8f4e63e7d7854fe8feea4a10e965bcf933abb999.zip |
Delete the display of the RSA_METHOD object
which is now supposed to be opaque.
OK tb@
I checked that all the information contained in comments in the
display is available from the appropriate places in RSA_meth_new(3)
and RSA_set_flags(3). Note that the comments regarding "mod_exp",
"init", and "finish" were half-misleading simplifications, anyway.
-rw-r--r-- | src/lib/libcrypto/man/RSA_set_method.3 | 71 |
1 files changed, 1 insertions, 70 deletions
diff --git a/src/lib/libcrypto/man/RSA_set_method.3 b/src/lib/libcrypto/man/RSA_set_method.3 index 53d41f5516..9e700a0cc3 100644 --- a/src/lib/libcrypto/man/RSA_set_method.3 +++ b/src/lib/libcrypto/man/RSA_set_method.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: RSA_set_method.3,v 1.14 2019/06/08 09:53:15 schwarze Exp $ | 1 | .\" $OpenBSD: RSA_set_method.3,v 1.15 2019/06/08 10:40:51 schwarze Exp $ |
2 | .\" OpenSSL 99d63d46 Oct 26 13:56:48 2016 -0400 | 2 | .\" OpenSSL 99d63d46 Oct 26 13:56:48 2016 -0400 |
3 | .\" | 3 | .\" |
4 | .\" This file was written by Ulf Moeller <ulf@openssl.org> | 4 | .\" This file was written by Ulf Moeller <ulf@openssl.org> |
@@ -204,75 +204,6 @@ function which may have been set up with | |||
204 | .Xr RSA_meth_set_init 3 | 204 | .Xr RSA_meth_set_init 3 |
205 | and which is called just before returning from | 205 | and which is called just before returning from |
206 | .Fn RSA_new_method . | 206 | .Fn RSA_new_method . |
207 | .Pp | ||
208 | The | ||
209 | .Dv RSA_METHOD | ||
210 | structure is defined as follows: | ||
211 | .Bd -literal | ||
212 | typedef struct rsa_meth_st | ||
213 | { | ||
214 | /* name of the implementation */ | ||
215 | const char *name; | ||
216 | |||
217 | /* encrypt */ | ||
218 | int (*rsa_pub_enc)(int flen, const unsigned char *from, | ||
219 | unsigned char *to, RSA *rsa, int padding); | ||
220 | |||
221 | /* verify arbitrary data */ | ||
222 | int (*rsa_pub_dec)(int flen, const unsigned char *from, | ||
223 | unsigned char *to, RSA *rsa, int padding); | ||
224 | |||
225 | /* sign arbitrary data */ | ||
226 | int (*rsa_priv_enc)(int flen, const unsigned char *from, | ||
227 | unsigned char *to, RSA *rsa, int padding); | ||
228 | |||
229 | /* decrypt */ | ||
230 | int (*rsa_priv_dec)(int flen, const unsigned char *from, | ||
231 | unsigned char *to, RSA *rsa, int padding); | ||
232 | |||
233 | /* compute r0 = r0 ^ I mod rsa->n (May be NULL for some | ||
234 | implementations) */ | ||
235 | int (*rsa_mod_exp)(BIGNUM *r0, const BIGNUM *I, RSA *rsa, | ||
236 | BN_CTX *ctx); | ||
237 | |||
238 | /* compute r = a ^ p mod m (May be NULL for some implementations) */ | ||
239 | int (*bn_mod_exp)(BIGNUM *r, const BIGNUM *a, const BIGNUM *p, | ||
240 | const BIGNUM *m, BN_CTX *ctx, BN_MONT_CTX *m_ctx); | ||
241 | |||
242 | /* called at RSA_new */ | ||
243 | int (*init)(RSA *rsa); | ||
244 | |||
245 | /* called at RSA_free */ | ||
246 | int (*finish)(RSA *rsa); | ||
247 | |||
248 | /* RSA_FLAG_EXT_PKEY - rsa_mod_exp is called for private key | ||
249 | * operations, even if p,q,dmp1,dmq1,iqmp | ||
250 | * are NULL | ||
251 | * RSA_FLAG_SIGN_VER - enable rsa_sign and rsa_verify | ||
252 | */ | ||
253 | int flags; | ||
254 | |||
255 | char *app_data; /* ?? */ | ||
256 | |||
257 | /* sign. For backward compatibility, this is used only | ||
258 | * if (flags & RSA_FLAG_SIGN_VER) | ||
259 | */ | ||
260 | int (*rsa_sign)(int type, const unsigned char *m, | ||
261 | unsigned int m_len, unsigned char *sigret, | ||
262 | unsigned int *siglen, const RSA *rsa); | ||
263 | |||
264 | /* verify. For backward compatibility, this is used only | ||
265 | * if (flags & RSA_FLAG_SIGN_VER) | ||
266 | */ | ||
267 | int (*rsa_verify)(int type, const unsigned char *m, | ||
268 | unsigned int m_len, const unsigned char *sigbuf, | ||
269 | unsigned int siglen, const RSA *rsa); | ||
270 | |||
271 | /* called at RSA_generate_key_ex; may be NULL */ | ||
272 | int (*rsa_keygen)(RSA *rsa, int bits, BIGNUM *e, BN_GENCB *cb); | ||
273 | |||
274 | } RSA_METHOD; | ||
275 | .Ed | ||
276 | .Sh RETURN VALUES | 207 | .Sh RETURN VALUES |
277 | .Fn RSA_PKCS1_SSLeay , | 208 | .Fn RSA_PKCS1_SSLeay , |
278 | .Fn RSA_get_default_method , | 209 | .Fn RSA_get_default_method , |