diff options
| author | markus <> | 2003-05-12 02:18:40 +0000 |
|---|---|---|
| committer | markus <> | 2003-05-12 02:18:40 +0000 |
| commit | d4fcd82bb7f6d603bd61e19a81ba97337b89dfca (patch) | |
| tree | d52e3a0f1f08f65ad283027e560e17ed0d720462 /src/lib/libcrypto/doc | |
| parent | 582bbd139cd2afd58d10dc051c5b0b989b441074 (diff) | |
| download | openbsd-d4fcd82bb7f6d603bd61e19a81ba97337b89dfca.tar.gz openbsd-d4fcd82bb7f6d603bd61e19a81ba97337b89dfca.tar.bz2 openbsd-d4fcd82bb7f6d603bd61e19a81ba97337b89dfca.zip | |
merge 0.9.7b with local changes; crank majors for libssl/libcrypto
Diffstat (limited to 'src/lib/libcrypto/doc')
| -rw-r--r-- | src/lib/libcrypto/doc/DH_generate_parameters.pod | 3 | ||||
| -rw-r--r-- | src/lib/libcrypto/doc/DSA_SIG_new.pod | 3 | ||||
| -rw-r--r-- | src/lib/libcrypto/doc/DSA_generate_key.pod | 3 | ||||
| -rw-r--r-- | src/lib/libcrypto/doc/ERR_get_error.pod | 2 | ||||
| -rw-r--r-- | src/lib/libcrypto/doc/EVP_EncryptInit.pod | 2 | ||||
| -rw-r--r-- | src/lib/libcrypto/doc/EVP_SealInit.pod | 26 | ||||
| -rw-r--r-- | src/lib/libcrypto/doc/RAND_bytes.pod | 3 | ||||
| -rw-r--r-- | src/lib/libcrypto/doc/RSA_generate_key.pod | 3 | ||||
| -rw-r--r-- | src/lib/libcrypto/doc/RSA_print.pod | 6 | ||||
| -rw-r--r-- | src/lib/libcrypto/doc/RSA_private_encrypt.pod | 4 | ||||
| -rw-r--r-- | src/lib/libcrypto/doc/RSA_public_encrypt.pod | 3 | ||||
| -rw-r--r-- | src/lib/libcrypto/doc/RSA_set_method.pod | 13 | ||||
| -rw-r--r-- | src/lib/libcrypto/doc/RSA_sign_ASN1_OCTET_STRING.pod | 4 | ||||
| -rw-r--r-- | src/lib/libcrypto/doc/d2i_DHparams.pod | 14 | ||||
| -rw-r--r-- | src/lib/libcrypto/doc/d2i_RSAPublicKey.pod | 39 |
15 files changed, 86 insertions, 42 deletions
diff --git a/src/lib/libcrypto/doc/DH_generate_parameters.pod b/src/lib/libcrypto/doc/DH_generate_parameters.pod index 4a2d653758..9081e9ea7c 100644 --- a/src/lib/libcrypto/doc/DH_generate_parameters.pod +++ b/src/lib/libcrypto/doc/DH_generate_parameters.pod | |||
| @@ -59,7 +59,8 @@ a usable generator. | |||
| 59 | 59 | ||
| 60 | =head1 SEE ALSO | 60 | =head1 SEE ALSO |
| 61 | 61 | ||
| 62 | L<dh(3)|dh(3)>, L<ERR_get_error(3)|ERR_get_error(3)>, L<rand(3)|rand(3)>, L<DH_free(3)|DH_free(3)> | 62 | L<dh(3)|dh(3)>, L<ERR_get_error(3)|ERR_get_error(3)>, L<rand(3)|rand(3)>, |
| 63 | L<DH_free(3)|DH_free(3)> | ||
| 63 | 64 | ||
| 64 | =head1 HISTORY | 65 | =head1 HISTORY |
| 65 | 66 | ||
diff --git a/src/lib/libcrypto/doc/DSA_SIG_new.pod b/src/lib/libcrypto/doc/DSA_SIG_new.pod index 45df4c0661..3ac6140038 100644 --- a/src/lib/libcrypto/doc/DSA_SIG_new.pod +++ b/src/lib/libcrypto/doc/DSA_SIG_new.pod | |||
| @@ -30,7 +30,8 @@ DSA_SIG_free() returns no value. | |||
| 30 | 30 | ||
| 31 | =head1 SEE ALSO | 31 | =head1 SEE ALSO |
| 32 | 32 | ||
| 33 | L<dsa(3)|dsa(3)>, L<ERR_get_error(3)|ERR_get_error(3)>, L<DSA_do_sign(3)|DSA_do_sign(3)> | 33 | L<dsa(3)|dsa(3)>, L<ERR_get_error(3)|ERR_get_error(3)>, |
| 34 | L<DSA_do_sign(3)|DSA_do_sign(3)> | ||
| 34 | 35 | ||
| 35 | =head1 HISTORY | 36 | =head1 HISTORY |
| 36 | 37 | ||
diff --git a/src/lib/libcrypto/doc/DSA_generate_key.pod b/src/lib/libcrypto/doc/DSA_generate_key.pod index 9906a2d7e0..af83ccfaa1 100644 --- a/src/lib/libcrypto/doc/DSA_generate_key.pod +++ b/src/lib/libcrypto/doc/DSA_generate_key.pod | |||
| @@ -24,7 +24,8 @@ The error codes can be obtained by L<ERR_get_error(3)|ERR_get_error(3)>. | |||
| 24 | 24 | ||
| 25 | =head1 SEE ALSO | 25 | =head1 SEE ALSO |
| 26 | 26 | ||
| 27 | L<dsa(3)|dsa(3)>, L<ERR_get_error(3)|ERR_get_error(3)>, L<rand(3)|rand(3)>, L<DSA_generate_parameters(3)|DSA_generate_parameters(3)> | 27 | L<dsa(3)|dsa(3)>, L<ERR_get_error(3)|ERR_get_error(3)>, L<rand(3)|rand(3)>, |
| 28 | L<DSA_generate_parameters(3)|DSA_generate_parameters(3)> | ||
| 28 | 29 | ||
| 29 | =head1 HISTORY | 30 | =head1 HISTORY |
| 30 | 31 | ||
diff --git a/src/lib/libcrypto/doc/ERR_get_error.pod b/src/lib/libcrypto/doc/ERR_get_error.pod index 9fdedbcb91..34443045fc 100644 --- a/src/lib/libcrypto/doc/ERR_get_error.pod +++ b/src/lib/libcrypto/doc/ERR_get_error.pod | |||
| @@ -5,7 +5,7 @@ | |||
| 5 | ERR_get_error, ERR_peek_error, ERR_peek_last_error, | 5 | ERR_get_error, ERR_peek_error, ERR_peek_last_error, |
| 6 | ERR_get_error_line, ERR_peek_error_line, ERR_peek_last_error_line, | 6 | ERR_get_error_line, ERR_peek_error_line, ERR_peek_last_error_line, |
| 7 | ERR_get_error_line_data, ERR_peek_error_line_data, | 7 | ERR_get_error_line_data, ERR_peek_error_line_data, |
| 8 | ERR_peek_error_line_data - obtain error code and data | 8 | ERR_peek_last_error_line_data - obtain error code and data |
| 9 | 9 | ||
| 10 | =head1 SYNOPSIS | 10 | =head1 SYNOPSIS |
| 11 | 11 | ||
diff --git a/src/lib/libcrypto/doc/EVP_EncryptInit.pod b/src/lib/libcrypto/doc/EVP_EncryptInit.pod index 75cceb1ca2..daf57e5895 100644 --- a/src/lib/libcrypto/doc/EVP_EncryptInit.pod +++ b/src/lib/libcrypto/doc/EVP_EncryptInit.pod | |||
| @@ -419,7 +419,7 @@ Encrypt a string using blowfish: | |||
| 419 | EVP_CIPHER_CTX ctx; | 419 | EVP_CIPHER_CTX ctx; |
| 420 | FILE *out; | 420 | FILE *out; |
| 421 | EVP_CIPHER_CTX_init(&ctx); | 421 | EVP_CIPHER_CTX_init(&ctx); |
| 422 | EVP_EncryptInit_ex(&ctx, NULL, EVP_bf_cbc(), key, iv); | 422 | EVP_EncryptInit_ex(&ctx, EVP_bf_cbc(), NULL, key, iv); |
| 423 | 423 | ||
| 424 | if(!EVP_EncryptUpdate(&ctx, outbuf, &outlen, intext, strlen(intext))) | 424 | if(!EVP_EncryptUpdate(&ctx, outbuf, &outlen, intext, strlen(intext))) |
| 425 | { | 425 | { |
diff --git a/src/lib/libcrypto/doc/EVP_SealInit.pod b/src/lib/libcrypto/doc/EVP_SealInit.pod index 25ef07f7c7..b5e477e294 100644 --- a/src/lib/libcrypto/doc/EVP_SealInit.pod +++ b/src/lib/libcrypto/doc/EVP_SealInit.pod | |||
| @@ -18,22 +18,28 @@ EVP_SealInit, EVP_SealUpdate, EVP_SealFinal - EVP envelope encryption | |||
| 18 | =head1 DESCRIPTION | 18 | =head1 DESCRIPTION |
| 19 | 19 | ||
| 20 | The EVP envelope routines are a high level interface to envelope | 20 | The EVP envelope routines are a high level interface to envelope |
| 21 | encryption. They generate a random key and then "envelope" it by | 21 | encryption. They generate a random key and IV (if required) then |
| 22 | using public key encryption. Data can then be encrypted using this | 22 | "envelope" it by using public key encryption. Data can then be |
| 23 | key. | 23 | encrypted using this key. |
| 24 | 24 | ||
| 25 | EVP_SealInit() initializes a cipher context B<ctx> for encryption | 25 | EVP_SealInit() initializes a cipher context B<ctx> for encryption |
| 26 | with cipher B<type> using a random secret key and IV supplied in | 26 | with cipher B<type> using a random secret key and IV. B<type> is normally |
| 27 | the B<iv> parameter. B<type> is normally supplied by a function such | 27 | supplied by a function such as EVP_des_cbc(). The secret key is encrypted |
| 28 | as EVP_des_cbc(). The secret key is encrypted using one or more public | 28 | using one or more public keys, this allows the same encrypted data to be |
| 29 | keys, this allows the same encrypted data to be decrypted using any | 29 | decrypted using any of the corresponding private keys. B<ek> is an array of |
| 30 | of the corresponding private keys. B<ek> is an array of buffers where | 30 | buffers where the public key encrypted secret key will be written, each buffer |
| 31 | the public key encrypted secret key will be written, each buffer must | 31 | must contain enough room for the corresponding encrypted key: that is |
| 32 | contain enough room for the corresponding encrypted key: that is | ||
| 33 | B<ek[i]> must have room for B<EVP_PKEY_size(pubk[i])> bytes. The actual | 32 | B<ek[i]> must have room for B<EVP_PKEY_size(pubk[i])> bytes. The actual |
| 34 | size of each encrypted secret key is written to the array B<ekl>. B<pubk> is | 33 | size of each encrypted secret key is written to the array B<ekl>. B<pubk> is |
| 35 | an array of B<npubk> public keys. | 34 | an array of B<npubk> public keys. |
| 36 | 35 | ||
| 36 | The B<iv> parameter is a buffer where the generated IV is written to. It must | ||
| 37 | contain enough room for the corresponding cipher's IV, as determined by (for | ||
| 38 | example) EVP_CIPHER_iv_length(type). | ||
| 39 | |||
| 40 | If the cipher does not require an IV then the B<iv> parameter is ignored | ||
| 41 | and can be B<NULL>. | ||
| 42 | |||
| 37 | EVP_SealUpdate() and EVP_SealFinal() have exactly the same properties | 43 | EVP_SealUpdate() and EVP_SealFinal() have exactly the same properties |
| 38 | as the EVP_EncryptUpdate() and EVP_EncryptFinal() routines, as | 44 | as the EVP_EncryptUpdate() and EVP_EncryptFinal() routines, as |
| 39 | documented on the L<EVP_EncryptInit(3)|EVP_EncryptInit(3)> manual | 45 | documented on the L<EVP_EncryptInit(3)|EVP_EncryptInit(3)> manual |
diff --git a/src/lib/libcrypto/doc/RAND_bytes.pod b/src/lib/libcrypto/doc/RAND_bytes.pod index b03748b918..ce6329ce54 100644 --- a/src/lib/libcrypto/doc/RAND_bytes.pod +++ b/src/lib/libcrypto/doc/RAND_bytes.pod | |||
| @@ -35,7 +35,8 @@ method. | |||
| 35 | 35 | ||
| 36 | =head1 SEE ALSO | 36 | =head1 SEE ALSO |
| 37 | 37 | ||
| 38 | L<rand(3)|rand(3)>, L<ERR_get_error(3)|ERR_get_error(3)>, L<RAND_add(3)|RAND_add(3)> | 38 | L<rand(3)|rand(3)>, L<ERR_get_error(3)|ERR_get_error(3)>, |
| 39 | L<RAND_add(3)|RAND_add(3)> | ||
| 39 | 40 | ||
| 40 | =head1 HISTORY | 41 | =head1 HISTORY |
| 41 | 42 | ||
diff --git a/src/lib/libcrypto/doc/RSA_generate_key.pod b/src/lib/libcrypto/doc/RSA_generate_key.pod index 11bc0b3459..52dbb14a53 100644 --- a/src/lib/libcrypto/doc/RSA_generate_key.pod +++ b/src/lib/libcrypto/doc/RSA_generate_key.pod | |||
| @@ -59,7 +59,8 @@ RSA_generate_key() goes into an infinite loop for illegal input values. | |||
| 59 | 59 | ||
| 60 | =head1 SEE ALSO | 60 | =head1 SEE ALSO |
| 61 | 61 | ||
| 62 | L<ERR_get_error(3)|ERR_get_error(3)>, L<rand(3)|rand(3)>, L<rsa(3)|rsa(3)>, L<RSA_free(3)|RSA_free(3)> | 62 | L<ERR_get_error(3)|ERR_get_error(3)>, L<rand(3)|rand(3)>, L<rsa(3)|rsa(3)>, |
| 63 | L<RSA_free(3)|RSA_free(3)> | ||
| 63 | 64 | ||
| 64 | =head1 HISTORY | 65 | =head1 HISTORY |
| 65 | 66 | ||
diff --git a/src/lib/libcrypto/doc/RSA_print.pod b/src/lib/libcrypto/doc/RSA_print.pod index ff2d353d1a..c971e91f4d 100644 --- a/src/lib/libcrypto/doc/RSA_print.pod +++ b/src/lib/libcrypto/doc/RSA_print.pod | |||
| @@ -2,9 +2,9 @@ | |||
| 2 | 2 | ||
| 3 | =head1 NAME | 3 | =head1 NAME |
| 4 | 4 | ||
| 5 | RSA_print, RSA_print_fp, DHparams_print, DHparams_print_fp, DSA_print, | 5 | RSA_print, RSA_print_fp, |
| 6 | DSA_print_fp, DHparams_print, DHparams_print_fp - print cryptographic | 6 | DSAparams_print, DSAparams_print_fp, DSA_print, DSA_print_fp, |
| 7 | parameters | 7 | DHparams_print, DHparams_print_fp - print cryptographic parameters |
| 8 | 8 | ||
| 9 | =head1 SYNOPSIS | 9 | =head1 SYNOPSIS |
| 10 | 10 | ||
diff --git a/src/lib/libcrypto/doc/RSA_private_encrypt.pod b/src/lib/libcrypto/doc/RSA_private_encrypt.pod index 0d1b2bd541..746a80c79e 100644 --- a/src/lib/libcrypto/doc/RSA_private_encrypt.pod +++ b/src/lib/libcrypto/doc/RSA_private_encrypt.pod | |||
| @@ -59,8 +59,8 @@ obtained by L<ERR_get_error(3)|ERR_get_error(3)>. | |||
| 59 | 59 | ||
| 60 | =head1 SEE ALSO | 60 | =head1 SEE ALSO |
| 61 | 61 | ||
| 62 | L<ERR_get_error(3)|ERR_get_error(3)>, L<rsa(3)|rsa(3)>, L<RSA_sign(3)|RSA_sign(3)>, | 62 | L<ERR_get_error(3)|ERR_get_error(3)>, L<rsa(3)|rsa(3)>, |
| 63 | L<RSA_verify(3)|RSA_verify(3)> | 63 | L<RSA_sign(3)|RSA_sign(3)>, L<RSA_verify(3)|RSA_verify(3)> |
| 64 | 64 | ||
| 65 | =head1 HISTORY | 65 | =head1 HISTORY |
| 66 | 66 | ||
diff --git a/src/lib/libcrypto/doc/RSA_public_encrypt.pod b/src/lib/libcrypto/doc/RSA_public_encrypt.pod index 8022a23f99..d53e19d2b7 100644 --- a/src/lib/libcrypto/doc/RSA_public_encrypt.pod +++ b/src/lib/libcrypto/doc/RSA_public_encrypt.pod | |||
| @@ -72,7 +72,8 @@ SSL, PKCS #1 v2.0 | |||
| 72 | 72 | ||
| 73 | =head1 SEE ALSO | 73 | =head1 SEE ALSO |
| 74 | 74 | ||
| 75 | L<ERR_get_error(3)|ERR_get_error(3)>, L<rand(3)|rand(3)>, L<rsa(3)|rsa(3)>, L<RSA_size(3)|RSA_size(3)> | 75 | L<ERR_get_error(3)|ERR_get_error(3)>, L<rand(3)|rand(3)>, L<rsa(3)|rsa(3)>, |
| 76 | L<RSA_size(3)|RSA_size(3)> | ||
| 76 | 77 | ||
| 77 | =head1 HISTORY | 78 | =head1 HISTORY |
| 78 | 79 | ||
diff --git a/src/lib/libcrypto/doc/RSA_set_method.pod b/src/lib/libcrypto/doc/RSA_set_method.pod index 0687c2242a..0a305f6b14 100644 --- a/src/lib/libcrypto/doc/RSA_set_method.pod +++ b/src/lib/libcrypto/doc/RSA_set_method.pod | |||
| @@ -3,13 +3,12 @@ | |||
| 3 | =head1 NAME | 3 | =head1 NAME |
| 4 | 4 | ||
| 5 | RSA_set_default_method, RSA_get_default_method, RSA_set_method, | 5 | RSA_set_default_method, RSA_get_default_method, RSA_set_method, |
| 6 | RSA_get_method, RSA_PKCS1_SSLeay, | 6 | RSA_get_method, RSA_PKCS1_SSLeay, RSA_null_method, RSA_flags, |
| 7 | RSA_null_method, RSA_flags, RSA_new_method - select RSA method | 7 | RSA_new_method - select RSA method |
| 8 | 8 | ||
| 9 | =head1 SYNOPSIS | 9 | =head1 SYNOPSIS |
| 10 | 10 | ||
| 11 | #include <openssl/rsa.h> | 11 | #include <openssl/rsa.h> |
| 12 | #include <openssl/engine.h> | ||
| 13 | 12 | ||
| 14 | void RSA_set_default_method(const RSA_METHOD *meth); | 13 | void RSA_set_default_method(const RSA_METHOD *meth); |
| 15 | 14 | ||
| @@ -25,7 +24,7 @@ RSA_null_method, RSA_flags, RSA_new_method - select RSA method | |||
| 25 | 24 | ||
| 26 | int RSA_flags(const RSA *rsa); | 25 | int RSA_flags(const RSA *rsa); |
| 27 | 26 | ||
| 28 | RSA *RSA_new_method(ENGINE *engine); | 27 | RSA *RSA_new_method(RSA_METHOD *method); |
| 29 | 28 | ||
| 30 | =head1 DESCRIPTION | 29 | =head1 DESCRIPTION |
| 31 | 30 | ||
| @@ -70,6 +69,12 @@ B<engine> will be used for the RSA operations. If B<engine> is NULL, the | |||
| 70 | default ENGINE for RSA operations is used, and if no default ENGINE is set, | 69 | default ENGINE for RSA operations is used, and if no default ENGINE is set, |
| 71 | the RSA_METHOD controlled by RSA_set_default_method() is used. | 70 | the RSA_METHOD controlled by RSA_set_default_method() is used. |
| 72 | 71 | ||
| 72 | RSA_flags() returns the B<flags> that are set for B<rsa>'s current method. | ||
| 73 | |||
| 74 | RSA_new_method() allocates and initializes an B<RSA> structure so that | ||
| 75 | B<method> will be used for the RSA operations. If B<method> is B<NULL>, | ||
| 76 | the default method is used. | ||
| 77 | |||
| 73 | =head1 THE RSA_METHOD STRUCTURE | 78 | =head1 THE RSA_METHOD STRUCTURE |
| 74 | 79 | ||
| 75 | typedef struct rsa_meth_st | 80 | typedef struct rsa_meth_st |
diff --git a/src/lib/libcrypto/doc/RSA_sign_ASN1_OCTET_STRING.pod b/src/lib/libcrypto/doc/RSA_sign_ASN1_OCTET_STRING.pod index b8c7bbb7e3..e70380bbfc 100644 --- a/src/lib/libcrypto/doc/RSA_sign_ASN1_OCTET_STRING.pod +++ b/src/lib/libcrypto/doc/RSA_sign_ASN1_OCTET_STRING.pod | |||
| @@ -47,8 +47,8 @@ These functions serve no recognizable purpose. | |||
| 47 | 47 | ||
| 48 | =head1 SEE ALSO | 48 | =head1 SEE ALSO |
| 49 | 49 | ||
| 50 | L<ERR_get_error(3)|ERR_get_error(3)>, L<objects(3)|objects(3)>, L<rand(3)|rand(3)>, | 50 | L<ERR_get_error(3)|ERR_get_error(3)>, L<objects(3)|objects(3)>, |
| 51 | L<rsa(3)|rsa(3)>, L<RSA_sign(3)|RSA_sign(3)>, | 51 | L<rand(3)|rand(3)>, L<rsa(3)|rsa(3)>, L<RSA_sign(3)|RSA_sign(3)>, |
| 52 | L<RSA_verify(3)|RSA_verify(3)> | 52 | L<RSA_verify(3)|RSA_verify(3)> |
| 53 | 53 | ||
| 54 | =head1 HISTORY | 54 | =head1 HISTORY |
diff --git a/src/lib/libcrypto/doc/d2i_DHparams.pod b/src/lib/libcrypto/doc/d2i_DHparams.pod index a6d1743d39..1e98aebeca 100644 --- a/src/lib/libcrypto/doc/d2i_DHparams.pod +++ b/src/lib/libcrypto/doc/d2i_DHparams.pod | |||
| @@ -2,7 +2,7 @@ | |||
| 2 | 2 | ||
| 3 | =head1 NAME | 3 | =head1 NAME |
| 4 | 4 | ||
| 5 | d2i_DHparams, i2d_DHparams - ... | 5 | d2i_DHparams, i2d_DHparams - PKCS#3 DH parameter functions. |
| 6 | 6 | ||
| 7 | =head1 SYNOPSIS | 7 | =head1 SYNOPSIS |
| 8 | 8 | ||
| @@ -13,18 +13,18 @@ d2i_DHparams, i2d_DHparams - ... | |||
| 13 | 13 | ||
| 14 | =head1 DESCRIPTION | 14 | =head1 DESCRIPTION |
| 15 | 15 | ||
| 16 | ... | 16 | These functions decode and encode PKCS#3 DH parameters using the |
| 17 | DHparameter structure described in PKCS#3. | ||
| 17 | 18 | ||
| 18 | =head1 RETURN VALUES | 19 | Othewise these behave in a similar way to d2i_X509() and i2d_X509() |
| 19 | 20 | described in the L<d2i_X509(3)|d2i_X509(3)> manual page. | |
| 20 | ... | ||
| 21 | 21 | ||
| 22 | =head1 SEE ALSO | 22 | =head1 SEE ALSO |
| 23 | 23 | ||
| 24 | ... | 24 | L<d2i_X509(3)|d2i_X509(3)> |
| 25 | 25 | ||
| 26 | =head1 HISTORY | 26 | =head1 HISTORY |
| 27 | 27 | ||
| 28 | ... | 28 | TBA |
| 29 | 29 | ||
| 30 | =cut | 30 | =cut |
diff --git a/src/lib/libcrypto/doc/d2i_RSAPublicKey.pod b/src/lib/libcrypto/doc/d2i_RSAPublicKey.pod index ff4d0d57db..7c71bcbf3d 100644 --- a/src/lib/libcrypto/doc/d2i_RSAPublicKey.pod +++ b/src/lib/libcrypto/doc/d2i_RSAPublicKey.pod | |||
| @@ -2,7 +2,9 @@ | |||
| 2 | 2 | ||
| 3 | =head1 NAME | 3 | =head1 NAME |
| 4 | 4 | ||
| 5 | d2i_RSAPublicKey, i2d_RSAPublicKey, d2i_RSAPrivateKey, i2d_RSAPrivateKey, i2d_Netscape_RSA, d2i_Netscape_RSA - ... | 5 | d2i_RSAPublicKey, i2d_RSAPublicKey, d2i_RSAPrivateKey, i2d_RSAPrivateKey, |
| 6 | d2i_RSA_PUBKEY, i2d_RSA_PUBKEY, i2d_Netscape_RSA, | ||
| 7 | d2i_Netscape_RSA - RSA public and private key encoding functions. | ||
| 6 | 8 | ||
| 7 | =head1 SYNOPSIS | 9 | =head1 SYNOPSIS |
| 8 | 10 | ||
| @@ -12,6 +14,10 @@ d2i_RSAPublicKey, i2d_RSAPublicKey, d2i_RSAPrivateKey, i2d_RSAPrivateKey, i2d_Ne | |||
| 12 | 14 | ||
| 13 | int i2d_RSAPublicKey(RSA *a, unsigned char **pp); | 15 | int i2d_RSAPublicKey(RSA *a, unsigned char **pp); |
| 14 | 16 | ||
| 17 | RSA * d2i_RSA_PUBKEY(RSA **a, unsigned char **pp, long length); | ||
| 18 | |||
| 19 | int i2d_RSA_PUBKEY(RSA *a, unsigned char **pp); | ||
| 20 | |||
| 15 | RSA * d2i_RSAPrivateKey(RSA **a, unsigned char **pp, long length); | 21 | RSA * d2i_RSAPrivateKey(RSA **a, unsigned char **pp, long length); |
| 16 | 22 | ||
| 17 | int i2d_RSAPrivateKey(RSA *a, unsigned char **pp); | 23 | int i2d_RSAPrivateKey(RSA *a, unsigned char **pp); |
| @@ -22,18 +28,39 @@ d2i_RSAPublicKey, i2d_RSAPublicKey, d2i_RSAPrivateKey, i2d_RSAPrivateKey, i2d_Ne | |||
| 22 | 28 | ||
| 23 | =head1 DESCRIPTION | 29 | =head1 DESCRIPTION |
| 24 | 30 | ||
| 25 | ... | 31 | d2i_RSAPublicKey() and i2d_RSAPublicKey() decode and encode a PKCS#1 RSAPublicKey |
| 32 | structure. | ||
| 33 | |||
| 34 | d2i_RSA_PUKEY() and i2d_RSA_PUKEY() decode and encode an RSA public key using a | ||
| 35 | SubjectPublicKeyInfo (certificate public key) structure. | ||
| 36 | |||
| 37 | d2i_RSAPrivateKey(), i2d_RSAPrivateKey() decode and encode a PKCS#1 RSAPrivateKey | ||
| 38 | structure. | ||
| 39 | |||
| 40 | d2i_Netscape_RSA(), i2d_Netscape_RSA() decode and encode an RSA private key in | ||
| 41 | NET format. | ||
| 42 | |||
| 43 | The usage of all of these functions is similar to the d2i_X509() and | ||
| 44 | i2d_X509() described in the L<d2i_X509(3)|d2i_X509(3)> manual page. | ||
| 45 | |||
| 46 | =head1 NOTES | ||
| 47 | |||
| 48 | The B<RSA> structure passed to the private key encoding functions should have | ||
| 49 | all the PKCS#1 private key components present. | ||
| 26 | 50 | ||
| 27 | =head1 RETURN VALUES | 51 | The data encoded by the private key functions is unencrypted and therefore |
| 52 | offers no private key security. | ||
| 28 | 53 | ||
| 29 | ... | 54 | The NET format functions are present to provide compatibility with certain very |
| 55 | old software. This format has some severe security weaknesses and should be | ||
| 56 | avoided if possible. | ||
| 30 | 57 | ||
| 31 | =head1 SEE ALSO | 58 | =head1 SEE ALSO |
| 32 | 59 | ||
| 33 | ... | 60 | L<d2i_X509(3)|d2i_X509(3)> |
| 34 | 61 | ||
| 35 | =head1 HISTORY | 62 | =head1 HISTORY |
| 36 | 63 | ||
| 37 | ... | 64 | TBA |
| 38 | 65 | ||
| 39 | =cut | 66 | =cut |
