diff options
author | schwarze <> | 2015-02-23 17:43:24 +0000 |
---|---|---|
committer | schwarze <> | 2015-02-23 17:43:24 +0000 |
commit | 9cb1a51933a1847042ee88e16d560485f682bcad (patch) | |
tree | 5a76fb973ee649bdb33c7731bc1ca457abfcec1e /src/lib/libssl | |
parent | 2820d04ee847cb7bede0b25e49194c3ade7ebdbf (diff) | |
download | openbsd-9cb1a51933a1847042ee88e16d560485f682bcad.tar.gz openbsd-9cb1a51933a1847042ee88e16d560485f682bcad.tar.bz2 openbsd-9cb1a51933a1847042ee88e16d560485f682bcad.zip |
fourth batch of perlpod(1) to mdoc(7) conversion
Diffstat (limited to 'src/lib/libssl')
18 files changed, 0 insertions, 1273 deletions
diff --git a/src/lib/libssl/src/doc/crypto/BN_BLINDING_new.pod b/src/lib/libssl/src/doc/crypto/BN_BLINDING_new.pod deleted file mode 100644 index 1c586ac54e..0000000000 --- a/src/lib/libssl/src/doc/crypto/BN_BLINDING_new.pod +++ /dev/null | |||
@@ -1,115 +0,0 @@ | |||
1 | =pod | ||
2 | |||
3 | =head1 NAME | ||
4 | |||
5 | BN_BLINDING_new, BN_BLINDING_free, BN_BLINDING_update, BN_BLINDING_convert, | ||
6 | BN_BLINDING_invert, BN_BLINDING_convert_ex, BN_BLINDING_invert_ex, | ||
7 | BN_BLINDING_get_thread_id, BN_BLINDING_set_thread_id, BN_BLINDING_thread_id, | ||
8 | BN_BLINDING_get_flags, BN_BLINDING_set_flags, | ||
9 | BN_BLINDING_create_param - blinding related BIGNUM functions. | ||
10 | |||
11 | =head1 SYNOPSIS | ||
12 | |||
13 | #include <openssl/bn.h> | ||
14 | |||
15 | BN_BLINDING *BN_BLINDING_new(const BIGNUM *A, const BIGNUM *Ai, | ||
16 | BIGNUM *mod); | ||
17 | void BN_BLINDING_free(BN_BLINDING *b); | ||
18 | int BN_BLINDING_update(BN_BLINDING *b,BN_CTX *ctx); | ||
19 | int BN_BLINDING_convert(BIGNUM *n, BN_BLINDING *b, BN_CTX *ctx); | ||
20 | int BN_BLINDING_invert(BIGNUM *n, BN_BLINDING *b, BN_CTX *ctx); | ||
21 | int BN_BLINDING_convert_ex(BIGNUM *n, BIGNUM *r, BN_BLINDING *b, | ||
22 | BN_CTX *ctx); | ||
23 | int BN_BLINDING_invert_ex(BIGNUM *n, const BIGNUM *r, BN_BLINDING *b, | ||
24 | BN_CTX *ctx); | ||
25 | #ifndef OPENSSL_NO_DEPRECATED | ||
26 | unsigned long BN_BLINDING_get_thread_id(const BN_BLINDING *); | ||
27 | void BN_BLINDING_set_thread_id(BN_BLINDING *, unsigned long); | ||
28 | #endif | ||
29 | CRYPTO_THREADID *BN_BLINDING_thread_id(BN_BLINDING *); | ||
30 | unsigned long BN_BLINDING_get_flags(const BN_BLINDING *); | ||
31 | void BN_BLINDING_set_flags(BN_BLINDING *, unsigned long); | ||
32 | BN_BLINDING *BN_BLINDING_create_param(BN_BLINDING *b, | ||
33 | const BIGNUM *e, BIGNUM *m, BN_CTX *ctx, | ||
34 | int (*bn_mod_exp)(BIGNUM *r, const BIGNUM *a, const BIGNUM *p, | ||
35 | const BIGNUM *m, BN_CTX *ctx, BN_MONT_CTX *m_ctx), | ||
36 | BN_MONT_CTX *m_ctx); | ||
37 | |||
38 | =head1 DESCRIPTION | ||
39 | |||
40 | BN_BLINDING_new() allocates a new B<BN_BLINDING> structure and copies | ||
41 | the B<A> and B<Ai> values into the newly created B<BN_BLINDING> object. | ||
42 | |||
43 | BN_BLINDING_free() frees the B<BN_BLINDING> structure. | ||
44 | |||
45 | BN_BLINDING_update() updates the B<BN_BLINDING> parameters by squaring | ||
46 | the B<A> and B<Ai> or, after specific number of uses and if the | ||
47 | necessary parameters are set, by re-creating the blinding parameters. | ||
48 | |||
49 | BN_BLINDING_convert_ex() multiplies B<n> with the blinding factor B<A>. | ||
50 | If B<r> is not NULL a copy the inverse blinding factor B<Ai> will be | ||
51 | returned in B<r> (this is useful if a B<RSA> object is shared among | ||
52 | several threads). BN_BLINDING_invert_ex() multiplies B<n> with the | ||
53 | inverse blinding factor B<Ai>. If B<r> is not NULL it will be used as | ||
54 | the inverse blinding. | ||
55 | |||
56 | BN_BLINDING_convert() and BN_BLINDING_invert() are wrapper | ||
57 | functions for BN_BLINDING_convert_ex() and BN_BLINDING_invert_ex() | ||
58 | with B<r> set to NULL. | ||
59 | |||
60 | BN_BLINDING_thread_id() provides access to the B<CRYPTO_THREADID> | ||
61 | object within the B<BN_BLINDING> structure. This is to help users | ||
62 | provide proper locking if needed for multi-threaded use. The "thread | ||
63 | id" object of a newly allocated B<BN_BLINDING> structure is | ||
64 | initialised to the thread id in which BN_BLINDING_new() was called. | ||
65 | |||
66 | BN_BLINDING_get_flags() returns the BN_BLINDING flags. Currently | ||
67 | there are two supported flags: B<BN_BLINDING_NO_UPDATE> and | ||
68 | B<BN_BLINDING_NO_RECREATE>. B<BN_BLINDING_NO_UPDATE> inhibits the | ||
69 | automatic update of the B<BN_BLINDING> parameters after each use | ||
70 | and B<BN_BLINDING_NO_RECREATE> inhibits the automatic re-creation | ||
71 | of the B<BN_BLINDING> parameters after a fixed number of uses (currently | ||
72 | 32). In newly allocated B<BN_BLINDING> objects no flags are set. | ||
73 | BN_BLINDING_set_flags() sets the B<BN_BLINDING> parameters flags. | ||
74 | |||
75 | BN_BLINDING_create_param() creates new B<BN_BLINDING> parameters | ||
76 | using the exponent B<e> and the modulus B<m>. B<bn_mod_exp> and | ||
77 | B<m_ctx> can be used to pass special functions for exponentiation | ||
78 | (normally BN_mod_exp_mont() and B<BN_MONT_CTX>). | ||
79 | |||
80 | =head1 RETURN VALUES | ||
81 | |||
82 | BN_BLINDING_new() returns the newly allocated B<BN_BLINDING> structure | ||
83 | or NULL in case of an error. | ||
84 | |||
85 | BN_BLINDING_update(), BN_BLINDING_convert(), BN_BLINDING_invert(), | ||
86 | BN_BLINDING_convert_ex() and BN_BLINDING_invert_ex() return 1 on | ||
87 | success and 0 if an error occured. | ||
88 | |||
89 | BN_BLINDING_thread_id() returns a pointer to the thread id object | ||
90 | within a B<BN_BLINDING> object. | ||
91 | |||
92 | BN_BLINDING_get_flags() returns the currently set B<BN_BLINDING> flags | ||
93 | (a B<unsigned long> value). | ||
94 | |||
95 | BN_BLINDING_create_param() returns the newly created B<BN_BLINDING> | ||
96 | parameters or NULL on error. | ||
97 | |||
98 | =head1 SEE ALSO | ||
99 | |||
100 | L<bn(3)|bn(3)> | ||
101 | |||
102 | =head1 HISTORY | ||
103 | |||
104 | BN_BLINDING_thread_id was first introduced in OpenSSL 1.0.0, and it | ||
105 | deprecates BN_BLINDING_set_thread_id and BN_BLINDING_get_thread_id. | ||
106 | |||
107 | BN_BLINDING_convert_ex, BN_BLINDIND_invert_ex, BN_BLINDING_get_thread_id, | ||
108 | BN_BLINDING_set_thread_id, BN_BLINDING_set_flags, BN_BLINDING_get_flags | ||
109 | and BN_BLINDING_create_param were first introduced in OpenSSL 0.9.8 | ||
110 | |||
111 | =head1 AUTHOR | ||
112 | |||
113 | Nils Larsch for the OpenSSL project (http://www.openssl.org). | ||
114 | |||
115 | =cut | ||
diff --git a/src/lib/libssl/src/doc/crypto/BN_CTX_new.pod b/src/lib/libssl/src/doc/crypto/BN_CTX_new.pod deleted file mode 100644 index bbedbb1778..0000000000 --- a/src/lib/libssl/src/doc/crypto/BN_CTX_new.pod +++ /dev/null | |||
@@ -1,57 +0,0 @@ | |||
1 | =pod | ||
2 | |||
3 | =head1 NAME | ||
4 | |||
5 | BN_CTX_new, BN_CTX_init, BN_CTX_free - allocate and free BN_CTX structures | ||
6 | |||
7 | =head1 SYNOPSIS | ||
8 | |||
9 | #include <openssl/bn.h> | ||
10 | |||
11 | BN_CTX *BN_CTX_new(void); | ||
12 | |||
13 | void BN_CTX_free(BN_CTX *c); | ||
14 | |||
15 | Deprecated: | ||
16 | |||
17 | void BN_CTX_init(BN_CTX *c); | ||
18 | |||
19 | |||
20 | =head1 DESCRIPTION | ||
21 | |||
22 | A B<BN_CTX> is a structure that holds B<BIGNUM> temporary variables used by | ||
23 | library functions. Since dynamic memory allocation to create B<BIGNUM>s | ||
24 | is rather expensive when used in conjunction with repeated subroutine | ||
25 | calls, the B<BN_CTX> structure is used. | ||
26 | |||
27 | BN_CTX_new() allocates and initializes a B<BN_CTX> | ||
28 | structure. | ||
29 | |||
30 | BN_CTX_free() frees the components of the B<BN_CTX>, and if it was | ||
31 | created by BN_CTX_new(), also the structure itself. | ||
32 | If L<BN_CTX_start(3)|BN_CTX_start(3)> has been used on the B<BN_CTX>, | ||
33 | L<BN_CTX_end(3)|BN_CTX_end(3)> must be called before the B<BN_CTX> | ||
34 | may be freed by BN_CTX_free(). | ||
35 | |||
36 | BN_CTX_init() (deprecated) initializes an existing uninitialized B<BN_CTX>. | ||
37 | This should not be used for new programs. Use BN_CTX_new() instead. | ||
38 | |||
39 | =head1 RETURN VALUES | ||
40 | |||
41 | BN_CTX_new() returns a pointer to the B<BN_CTX>. If the allocation fails, | ||
42 | it returns B<NULL> and sets an error code that can be obtained by | ||
43 | L<ERR_get_error(3)|ERR_get_error(3)>. | ||
44 | |||
45 | BN_CTX_init() and BN_CTX_free() have no return values. | ||
46 | |||
47 | =head1 SEE ALSO | ||
48 | |||
49 | L<bn(3)|bn(3)>, L<ERR_get_error(3)|ERR_get_error(3)>, L<BN_add(3)|BN_add(3)>, | ||
50 | L<BN_CTX_start(3)|BN_CTX_start(3)> | ||
51 | |||
52 | =head1 HISTORY | ||
53 | |||
54 | BN_CTX_new() and BN_CTX_free() are available in all versions on SSLeay | ||
55 | and OpenSSL. BN_CTX_init() was added in SSLeay 0.9.1b. | ||
56 | |||
57 | =cut | ||
diff --git a/src/lib/libssl/src/doc/crypto/BN_CTX_start.pod b/src/lib/libssl/src/doc/crypto/BN_CTX_start.pod deleted file mode 100644 index dfcefe1a88..0000000000 --- a/src/lib/libssl/src/doc/crypto/BN_CTX_start.pod +++ /dev/null | |||
@@ -1,52 +0,0 @@ | |||
1 | =pod | ||
2 | |||
3 | =head1 NAME | ||
4 | |||
5 | BN_CTX_start, BN_CTX_get, BN_CTX_end - use temporary BIGNUM variables | ||
6 | |||
7 | =head1 SYNOPSIS | ||
8 | |||
9 | #include <openssl/bn.h> | ||
10 | |||
11 | void BN_CTX_start(BN_CTX *ctx); | ||
12 | |||
13 | BIGNUM *BN_CTX_get(BN_CTX *ctx); | ||
14 | |||
15 | void BN_CTX_end(BN_CTX *ctx); | ||
16 | |||
17 | =head1 DESCRIPTION | ||
18 | |||
19 | These functions are used to obtain temporary B<BIGNUM> variables from | ||
20 | a B<BN_CTX> (which can been created by using L<BN_CTX_new(3)|BN_CTX_new(3)>) | ||
21 | in order to save the overhead of repeatedly creating and | ||
22 | freeing B<BIGNUM>s in functions that are called from inside a loop. | ||
23 | |||
24 | A function must call BN_CTX_start() first. Then, BN_CTX_get() may be | ||
25 | called repeatedly to obtain temporary B<BIGNUM>s. All BN_CTX_get() | ||
26 | calls must be made before calling any other functions that use the | ||
27 | B<ctx> as an argument. | ||
28 | |||
29 | Finally, BN_CTX_end() must be called before returning from the function. | ||
30 | When BN_CTX_end() is called, the B<BIGNUM> pointers obtained from | ||
31 | BN_CTX_get() become invalid. | ||
32 | |||
33 | =head1 RETURN VALUES | ||
34 | |||
35 | BN_CTX_start() and BN_CTX_end() return no values. | ||
36 | |||
37 | BN_CTX_get() returns a pointer to the B<BIGNUM>, or B<NULL> on error. | ||
38 | Once BN_CTX_get() has failed, the subsequent calls will return B<NULL> | ||
39 | as well, so it is sufficient to check the return value of the last | ||
40 | BN_CTX_get() call. In case of an error, an error code is set, which | ||
41 | can be obtained by L<ERR_get_error(3)|ERR_get_error(3)>. | ||
42 | |||
43 | |||
44 | =head1 SEE ALSO | ||
45 | |||
46 | L<BN_CTX_new(3)|BN_CTX_new(3)> | ||
47 | |||
48 | =head1 HISTORY | ||
49 | |||
50 | BN_CTX_start(), BN_CTX_get() and BN_CTX_end() were added in OpenSSL 0.9.5. | ||
51 | |||
52 | =cut | ||
diff --git a/src/lib/libssl/src/doc/crypto/BN_add.pod b/src/lib/libssl/src/doc/crypto/BN_add.pod deleted file mode 100644 index 15b28d8334..0000000000 --- a/src/lib/libssl/src/doc/crypto/BN_add.pod +++ /dev/null | |||
@@ -1,127 +0,0 @@ | |||
1 | =pod | ||
2 | |||
3 | =head1 NAME | ||
4 | |||
5 | BN_add, BN_sub, BN_mul, BN_sqr, BN_div, BN_mod, BN_nnmod, BN_mod_add, | ||
6 | BN_mod_sub, BN_mod_mul, BN_mod_sqr, BN_exp, BN_mod_exp, BN_gcd - | ||
7 | arithmetic operations on BIGNUMs | ||
8 | |||
9 | =head1 SYNOPSIS | ||
10 | |||
11 | #include <openssl/bn.h> | ||
12 | |||
13 | int BN_add(BIGNUM *r, const BIGNUM *a, const BIGNUM *b); | ||
14 | |||
15 | int BN_sub(BIGNUM *r, const BIGNUM *a, const BIGNUM *b); | ||
16 | |||
17 | int BN_mul(BIGNUM *r, BIGNUM *a, BIGNUM *b, BN_CTX *ctx); | ||
18 | |||
19 | int BN_sqr(BIGNUM *r, BIGNUM *a, BN_CTX *ctx); | ||
20 | |||
21 | int BN_div(BIGNUM *dv, BIGNUM *rem, const BIGNUM *a, const BIGNUM *d, | ||
22 | BN_CTX *ctx); | ||
23 | |||
24 | int BN_mod(BIGNUM *rem, const BIGNUM *a, const BIGNUM *m, BN_CTX *ctx); | ||
25 | |||
26 | int BN_nnmod(BIGNUM *r, const BIGNUM *a, const BIGNUM *m, BN_CTX *ctx); | ||
27 | |||
28 | int BN_mod_add(BIGNUM *r, BIGNUM *a, BIGNUM *b, const BIGNUM *m, | ||
29 | BN_CTX *ctx); | ||
30 | |||
31 | int BN_mod_sub(BIGNUM *r, BIGNUM *a, BIGNUM *b, const BIGNUM *m, | ||
32 | BN_CTX *ctx); | ||
33 | |||
34 | int BN_mod_mul(BIGNUM *r, BIGNUM *a, BIGNUM *b, const BIGNUM *m, | ||
35 | BN_CTX *ctx); | ||
36 | |||
37 | int BN_mod_sqr(BIGNUM *r, BIGNUM *a, const BIGNUM *m, BN_CTX *ctx); | ||
38 | |||
39 | int BN_exp(BIGNUM *r, BIGNUM *a, BIGNUM *p, BN_CTX *ctx); | ||
40 | |||
41 | int BN_mod_exp(BIGNUM *r, BIGNUM *a, const BIGNUM *p, | ||
42 | const BIGNUM *m, BN_CTX *ctx); | ||
43 | |||
44 | int BN_gcd(BIGNUM *r, BIGNUM *a, BIGNUM *b, BN_CTX *ctx); | ||
45 | |||
46 | =head1 DESCRIPTION | ||
47 | |||
48 | BN_add() adds I<a> and I<b> and places the result in I<r> (C<r=a+b>). | ||
49 | I<r> may be the same B<BIGNUM> as I<a> or I<b>. | ||
50 | |||
51 | BN_sub() subtracts I<b> from I<a> and places the result in I<r> (C<r=a-b>). | ||
52 | |||
53 | BN_mul() multiplies I<a> and I<b> and places the result in I<r> (C<r=a*b>). | ||
54 | I<r> may be the same B<BIGNUM> as I<a> or I<b>. | ||
55 | For multiplication by powers of 2, use L<BN_lshift(3)|BN_lshift(3)>. | ||
56 | |||
57 | BN_sqr() takes the square of I<a> and places the result in I<r> | ||
58 | (C<r=a^2>). I<r> and I<a> may be the same B<BIGNUM>. | ||
59 | This function is faster than BN_mul(r,a,a). | ||
60 | |||
61 | BN_div() divides I<a> by I<d> and places the result in I<dv> and the | ||
62 | remainder in I<rem> (C<dv=a/d, rem=a%d>). Either of I<dv> and I<rem> may | ||
63 | be B<NULL>, in which case the respective value is not returned. | ||
64 | The result is rounded towards zero; thus if I<a> is negative, the | ||
65 | remainder will be zero or negative. | ||
66 | For division by powers of 2, use BN_rshift(3). | ||
67 | |||
68 | BN_mod() corresponds to BN_div() with I<dv> set to B<NULL>. | ||
69 | |||
70 | BN_nnmod() reduces I<a> modulo I<m> and places the non-negative | ||
71 | remainder in I<r>. | ||
72 | |||
73 | BN_mod_add() adds I<a> to I<b> modulo I<m> and places the non-negative | ||
74 | result in I<r>. | ||
75 | |||
76 | BN_mod_sub() subtracts I<b> from I<a> modulo I<m> and places the | ||
77 | non-negative result in I<r>. | ||
78 | |||
79 | BN_mod_mul() multiplies I<a> by I<b> and finds the non-negative | ||
80 | remainder respective to modulus I<m> (C<r=(a*b) mod m>). I<r> may be | ||
81 | the same B<BIGNUM> as I<a> or I<b>. For more efficient algorithms for | ||
82 | repeated computations using the same modulus, see | ||
83 | L<BN_mod_mul_montgomery(3)|BN_mod_mul_montgomery(3)> and | ||
84 | L<BN_mod_mul_reciprocal(3)|BN_mod_mul_reciprocal(3)>. | ||
85 | |||
86 | BN_mod_sqr() takes the square of I<a> modulo B<m> and places the | ||
87 | result in I<r>. | ||
88 | |||
89 | BN_exp() raises I<a> to the I<p>-th power and places the result in I<r> | ||
90 | (C<r=a^p>). This function is faster than repeated applications of | ||
91 | BN_mul(). | ||
92 | |||
93 | BN_mod_exp() computes I<a> to the I<p>-th power modulo I<m> (C<r=a^p % | ||
94 | m>). This function uses less time and space than BN_exp(). | ||
95 | |||
96 | BN_gcd() computes the greatest common divisor of I<a> and I<b> and | ||
97 | places the result in I<r>. I<r> may be the same B<BIGNUM> as I<a> or | ||
98 | I<b>. | ||
99 | |||
100 | For all functions, I<ctx> is a previously allocated B<BN_CTX> used for | ||
101 | temporary variables; see L<BN_CTX_new(3)|BN_CTX_new(3)>. | ||
102 | |||
103 | Unless noted otherwise, the result B<BIGNUM> must be different from | ||
104 | the arguments. | ||
105 | |||
106 | =head1 RETURN VALUES | ||
107 | |||
108 | For all functions, 1 is returned for success, 0 on error. The return | ||
109 | value should always be checked (e.g., C<if (!BN_add(r,a,b)) goto err;>). | ||
110 | The error codes can be obtained by L<ERR_get_error(3)|ERR_get_error(3)>. | ||
111 | |||
112 | =head1 SEE ALSO | ||
113 | |||
114 | L<bn(3)|bn(3)>, L<ERR_get_error(3)|ERR_get_error(3)>, | ||
115 | L<BN_CTX_new(3)|BN_CTX_new(3)>, L<BN_add_word(3)|BN_add_word(3)>, | ||
116 | L<BN_set_bit(3)|BN_set_bit(3)> | ||
117 | |||
118 | =head1 HISTORY | ||
119 | |||
120 | BN_add(), BN_sub(), BN_sqr(), BN_div(), BN_mod(), BN_mod_mul(), | ||
121 | BN_mod_exp() and BN_gcd() are available in all versions of SSLeay and | ||
122 | OpenSSL. The I<ctx> argument to BN_mul() was added in SSLeay | ||
123 | 0.9.1b. BN_exp() appeared in SSLeay 0.9.0. | ||
124 | BN_nnmod(), BN_mod_add(), BN_mod_sub(), and BN_mod_sqr() were added in | ||
125 | OpenSSL 0.9.7. | ||
126 | |||
127 | =cut | ||
diff --git a/src/lib/libssl/src/doc/crypto/BN_add_word.pod b/src/lib/libssl/src/doc/crypto/BN_add_word.pod deleted file mode 100644 index ba1026417d..0000000000 --- a/src/lib/libssl/src/doc/crypto/BN_add_word.pod +++ /dev/null | |||
@@ -1,61 +0,0 @@ | |||
1 | =pod | ||
2 | |||
3 | =head1 NAME | ||
4 | |||
5 | BN_add_word, BN_sub_word, BN_mul_word, BN_div_word, BN_mod_word - arithmetic | ||
6 | functions on BIGNUMs with integers | ||
7 | |||
8 | =head1 SYNOPSIS | ||
9 | |||
10 | #include <openssl/bn.h> | ||
11 | |||
12 | int BN_add_word(BIGNUM *a, BN_ULONG w); | ||
13 | |||
14 | int BN_sub_word(BIGNUM *a, BN_ULONG w); | ||
15 | |||
16 | int BN_mul_word(BIGNUM *a, BN_ULONG w); | ||
17 | |||
18 | BN_ULONG BN_div_word(BIGNUM *a, BN_ULONG w); | ||
19 | |||
20 | BN_ULONG BN_mod_word(const BIGNUM *a, BN_ULONG w); | ||
21 | |||
22 | =head1 DESCRIPTION | ||
23 | |||
24 | These functions perform arithmetic operations on BIGNUMs with unsigned | ||
25 | integers. They are much more efficient than the normal BIGNUM | ||
26 | arithmetic operations. | ||
27 | |||
28 | BN_add_word() adds B<w> to B<a> (C<a+=w>). | ||
29 | |||
30 | BN_sub_word() subtracts B<w> from B<a> (C<a-=w>). | ||
31 | |||
32 | BN_mul_word() multiplies B<a> and B<w> (C<a*=w>). | ||
33 | |||
34 | BN_div_word() divides B<a> by B<w> (C<a/=w>) and returns the remainder. | ||
35 | |||
36 | BN_mod_word() returns the remainder of B<a> divided by B<w> (C<a%w>). | ||
37 | |||
38 | For BN_div_word() and BN_mod_word(), B<w> must not be 0. | ||
39 | |||
40 | =head1 RETURN VALUES | ||
41 | |||
42 | BN_add_word(), BN_sub_word() and BN_mul_word() return 1 for success, 0 on | ||
43 | error. The error codes can be obtained by L<ERR_get_error(3)|ERR_get_error(3)>. | ||
44 | |||
45 | BN_mod_word() and BN_div_word() return B<a>%B<w> on success and | ||
46 | B<(BN_ULONG)-1> if an error occurred. | ||
47 | |||
48 | =head1 SEE ALSO | ||
49 | |||
50 | L<bn(3)|bn(3)>, L<ERR_get_error(3)|ERR_get_error(3)>, L<BN_add(3)|BN_add(3)> | ||
51 | |||
52 | =head1 HISTORY | ||
53 | |||
54 | BN_add_word() and BN_mod_word() are available in all versions of | ||
55 | SSLeay and OpenSSL. BN_div_word() was added in SSLeay 0.8, and | ||
56 | BN_sub_word() and BN_mul_word() in SSLeay 0.9.0. | ||
57 | |||
58 | Before 0.9.8a the return value for BN_div_word() and BN_mod_word() | ||
59 | in case of an error was 0. | ||
60 | |||
61 | =cut | ||
diff --git a/src/lib/libssl/src/doc/crypto/BN_bn2bin.pod b/src/lib/libssl/src/doc/crypto/BN_bn2bin.pod deleted file mode 100644 index 03b439c7b9..0000000000 --- a/src/lib/libssl/src/doc/crypto/BN_bn2bin.pod +++ /dev/null | |||
@@ -1,95 +0,0 @@ | |||
1 | =pod | ||
2 | |||
3 | =head1 NAME | ||
4 | |||
5 | BN_bn2bin, BN_bin2bn, BN_bn2hex, BN_bn2dec, BN_hex2bn, BN_dec2bn, | ||
6 | BN_print, BN_print_fp, BN_bn2mpi, BN_mpi2bn - format conversions | ||
7 | |||
8 | =head1 SYNOPSIS | ||
9 | |||
10 | #include <openssl/bn.h> | ||
11 | |||
12 | int BN_bn2bin(const BIGNUM *a, unsigned char *to); | ||
13 | BIGNUM *BN_bin2bn(const unsigned char *s, int len, BIGNUM *ret); | ||
14 | |||
15 | char *BN_bn2hex(const BIGNUM *a); | ||
16 | char *BN_bn2dec(const BIGNUM *a); | ||
17 | int BN_hex2bn(BIGNUM **a, const char *str); | ||
18 | int BN_dec2bn(BIGNUM **a, const char *str); | ||
19 | |||
20 | int BN_print(BIO *fp, const BIGNUM *a); | ||
21 | int BN_print_fp(FILE *fp, const BIGNUM *a); | ||
22 | |||
23 | int BN_bn2mpi(const BIGNUM *a, unsigned char *to); | ||
24 | BIGNUM *BN_mpi2bn(unsigned char *s, int len, BIGNUM *ret); | ||
25 | |||
26 | =head1 DESCRIPTION | ||
27 | |||
28 | BN_bn2bin() converts the absolute value of B<a> into big-endian form | ||
29 | and stores it at B<to>. B<to> must point to BN_num_bytes(B<a>) bytes of | ||
30 | memory. | ||
31 | |||
32 | BN_bin2bn() converts the positive integer in big-endian form of length | ||
33 | B<len> at B<s> into a B<BIGNUM> and places it in B<ret>. If B<ret> is | ||
34 | NULL, a new B<BIGNUM> is created. | ||
35 | |||
36 | BN_bn2hex() and BN_bn2dec() return printable strings containing the | ||
37 | hexadecimal and decimal encoding of B<a> respectively. For negative | ||
38 | numbers, the string is prefaced with a leading '-'. The string must be | ||
39 | freed later using free(). | ||
40 | |||
41 | BN_hex2bn() converts the string B<str> containing a hexadecimal number | ||
42 | to a B<BIGNUM> and stores it in **B<bn>. If *B<bn> is NULL, a new | ||
43 | B<BIGNUM> is created. If B<bn> is NULL, it only computes the number's | ||
44 | length in hexadecimal digits. If the string starts with '-', the | ||
45 | number is negative. BN_dec2bn() is the same using the decimal system. | ||
46 | |||
47 | BN_print() and BN_print_fp() write the hexadecimal encoding of B<a>, | ||
48 | with a leading '-' for negative numbers, to the B<BIO> or B<FILE> | ||
49 | B<fp>. | ||
50 | |||
51 | BN_bn2mpi() and BN_mpi2bn() convert B<BIGNUM>s from and to a format | ||
52 | that consists of the number's length in bytes represented as a 4-byte | ||
53 | big-endian number, and the number itself in big-endian format, where | ||
54 | the most significant bit signals a negative number (the representation | ||
55 | of numbers with the MSB set is prefixed with null byte). | ||
56 | |||
57 | BN_bn2mpi() stores the representation of B<a> at B<to>, where B<to> | ||
58 | must be large enough to hold the result. The size can be determined by | ||
59 | calling BN_bn2mpi(B<a>, NULL). | ||
60 | |||
61 | BN_mpi2bn() converts the B<len> bytes long representation at B<s> to | ||
62 | a B<BIGNUM> and stores it at B<ret>, or in a newly allocated B<BIGNUM> | ||
63 | if B<ret> is NULL. | ||
64 | |||
65 | =head1 RETURN VALUES | ||
66 | |||
67 | BN_bn2bin() returns the length of the big-endian number placed at B<to>. | ||
68 | BN_bin2bn() returns the B<BIGNUM>, NULL on error. | ||
69 | |||
70 | BN_bn2hex() and BN_bn2dec() return a null-terminated string, or NULL | ||
71 | on error. BN_hex2bn() and BN_dec2bn() return the number's length in | ||
72 | hexadecimal or decimal digits, and 0 on error. | ||
73 | |||
74 | BN_print_fp() and BN_print() return 1 on success, 0 on write errors. | ||
75 | |||
76 | BN_bn2mpi() returns the length of the representation. BN_mpi2bn() | ||
77 | returns the B<BIGNUM>, and NULL on error. | ||
78 | |||
79 | The error codes can be obtained by L<ERR_get_error(3)|ERR_get_error(3)>. | ||
80 | |||
81 | =head1 SEE ALSO | ||
82 | |||
83 | L<bn(3)|bn(3)>, L<ERR_get_error(3)|ERR_get_error(3)>, L<BN_zero(3)|BN_zero(3)>, | ||
84 | L<ASN1_INTEGER_to_BN(3)|ASN1_INTEGER_to_BN(3)>, | ||
85 | L<BN_num_bytes(3)|BN_num_bytes(3)> | ||
86 | |||
87 | =head1 HISTORY | ||
88 | |||
89 | BN_bn2bin(), BN_bin2bn(), BN_print_fp() and BN_print() are available | ||
90 | in all versions of SSLeay and OpenSSL. | ||
91 | |||
92 | BN_bn2hex(), BN_bn2dec(), BN_hex2bn(), BN_dec2bn(), BN_bn2mpi() and | ||
93 | BN_mpi2bn() were added in SSLeay 0.9.0. | ||
94 | |||
95 | =cut | ||
diff --git a/src/lib/libssl/src/doc/crypto/BN_cmp.pod b/src/lib/libssl/src/doc/crypto/BN_cmp.pod deleted file mode 100644 index 29df69631e..0000000000 --- a/src/lib/libssl/src/doc/crypto/BN_cmp.pod +++ /dev/null | |||
@@ -1,49 +0,0 @@ | |||
1 | =pod | ||
2 | |||
3 | =head1 NAME | ||
4 | |||
5 | BN_cmp, BN_ucmp, BN_is_zero, BN_is_one, BN_is_word, BN_is_odd - BIGNUM | ||
6 | comparison and test functions | ||
7 | |||
8 | =head1 SYNOPSIS | ||
9 | |||
10 | #include <openssl/bn.h> | ||
11 | |||
12 | int BN_cmp(BIGNUM *a, BIGNUM *b); | ||
13 | int BN_ucmp(BIGNUM *a, BIGNUM *b); | ||
14 | |||
15 | int BN_is_zero(BIGNUM *a); | ||
16 | int BN_is_one(BIGNUM *a); | ||
17 | int BN_is_word(BIGNUM *a, BN_ULONG w); | ||
18 | int BN_is_odd(BIGNUM *a); | ||
19 | |||
20 | =head1 DESCRIPTION | ||
21 | |||
22 | BN_cmp() compares the numbers B<a> and B<b>. BN_ucmp() compares their | ||
23 | absolute values. | ||
24 | |||
25 | BN_is_zero(), BN_is_one() and BN_is_word() test if B<a> equals 0, 1, | ||
26 | or B<w> respectively. BN_is_odd() tests if a is odd. | ||
27 | |||
28 | BN_is_zero(), BN_is_one(), BN_is_word() and BN_is_odd() are macros. | ||
29 | |||
30 | =head1 RETURN VALUES | ||
31 | |||
32 | BN_cmp() returns -1 if B<a> E<lt> B<b>, 0 if B<a> == B<b> and 1 if | ||
33 | B<a> E<gt> B<b>. BN_ucmp() is the same using the absolute values | ||
34 | of B<a> and B<b>. | ||
35 | |||
36 | BN_is_zero(), BN_is_one() BN_is_word() and BN_is_odd() return 1 if | ||
37 | the condition is true, 0 otherwise. | ||
38 | |||
39 | =head1 SEE ALSO | ||
40 | |||
41 | L<bn(3)|bn(3)> | ||
42 | |||
43 | =head1 HISTORY | ||
44 | |||
45 | BN_cmp(), BN_ucmp(), BN_is_zero(), BN_is_one() and BN_is_word() are | ||
46 | available in all versions of SSLeay and OpenSSL. | ||
47 | BN_is_odd() was added in SSLeay 0.8. | ||
48 | |||
49 | =cut | ||
diff --git a/src/lib/libssl/src/doc/crypto/BN_copy.pod b/src/lib/libssl/src/doc/crypto/BN_copy.pod deleted file mode 100644 index 388dd7df26..0000000000 --- a/src/lib/libssl/src/doc/crypto/BN_copy.pod +++ /dev/null | |||
@@ -1,34 +0,0 @@ | |||
1 | =pod | ||
2 | |||
3 | =head1 NAME | ||
4 | |||
5 | BN_copy, BN_dup - copy BIGNUMs | ||
6 | |||
7 | =head1 SYNOPSIS | ||
8 | |||
9 | #include <openssl/bn.h> | ||
10 | |||
11 | BIGNUM *BN_copy(BIGNUM *to, const BIGNUM *from); | ||
12 | |||
13 | BIGNUM *BN_dup(const BIGNUM *from); | ||
14 | |||
15 | =head1 DESCRIPTION | ||
16 | |||
17 | BN_copy() copies B<from> to B<to>. BN_dup() creates a new B<BIGNUM> | ||
18 | containing the value B<from>. | ||
19 | |||
20 | =head1 RETURN VALUES | ||
21 | |||
22 | BN_copy() returns B<to> on success, NULL on error. BN_dup() returns | ||
23 | the new B<BIGNUM>, and NULL on error. The error codes can be obtained | ||
24 | by L<ERR_get_error(3)|ERR_get_error(3)>. | ||
25 | |||
26 | =head1 SEE ALSO | ||
27 | |||
28 | L<bn(3)|bn(3)>, L<ERR_get_error(3)|ERR_get_error(3)> | ||
29 | |||
30 | =head1 HISTORY | ||
31 | |||
32 | BN_copy() and BN_dup() are available in all versions of SSLeay and OpenSSL. | ||
33 | |||
34 | =cut | ||
diff --git a/src/lib/libssl/src/doc/crypto/BN_generate_prime.pod b/src/lib/libssl/src/doc/crypto/BN_generate_prime.pod deleted file mode 100644 index 0a95633d54..0000000000 --- a/src/lib/libssl/src/doc/crypto/BN_generate_prime.pod +++ /dev/null | |||
@@ -1,149 +0,0 @@ | |||
1 | =pod | ||
2 | |||
3 | =head1 NAME | ||
4 | |||
5 | BN_generate_prime, BN_is_prime_ex, BN_is_prime_fasttest_ex, BN_GENCB_call, | ||
6 | BN_GENCB_set_old, BN_GENCB_set, BN_generate_prime, BN_is_prime, | ||
7 | BN_is_prime_fasttest - generate primes and test for primality | ||
8 | |||
9 | =head1 SYNOPSIS | ||
10 | |||
11 | #include <openssl/bn.h> | ||
12 | |||
13 | int BN_generate_prime_ex(BIGNUM *ret,int bits,int safe, const BIGNUM *add, | ||
14 | const BIGNUM *rem, BN_GENCB *cb); | ||
15 | |||
16 | int BN_is_prime_ex(const BIGNUM *p,int nchecks, BN_CTX *ctx, BN_GENCB *cb); | ||
17 | |||
18 | int BN_is_prime_fasttest_ex(const BIGNUM *p,int nchecks, BN_CTX *ctx, | ||
19 | int do_trial_division, BN_GENCB *cb); | ||
20 | |||
21 | int BN_GENCB_call(BN_GENCB *cb, int a, int b); | ||
22 | |||
23 | #define BN_GENCB_set_old(gencb, callback, cb_arg) ... | ||
24 | |||
25 | #define BN_GENCB_set(gencb, callback, cb_arg) ... | ||
26 | |||
27 | |||
28 | Deprecated: | ||
29 | |||
30 | BIGNUM *BN_generate_prime(BIGNUM *ret, int num, int safe, BIGNUM *add, | ||
31 | BIGNUM *rem, void (*callback)(int, int, void *), void *cb_arg); | ||
32 | |||
33 | int BN_is_prime(const BIGNUM *a, int checks, void (*callback)(int, int, | ||
34 | void *), BN_CTX *ctx, void *cb_arg); | ||
35 | |||
36 | int BN_is_prime_fasttest(const BIGNUM *a, int checks, | ||
37 | void (*callback)(int, int, void *), BN_CTX *ctx, void *cb_arg, | ||
38 | int do_trial_division); | ||
39 | |||
40 | =head1 DESCRIPTION | ||
41 | |||
42 | BN_generate_prime_ex() generates a pseudo-random prime number of | ||
43 | bit length B<bits>. | ||
44 | If B<ret> is not B<NULL>, it will be used to store the number. | ||
45 | |||
46 | If B<cb> is not B<NULL>, it is used as follows: | ||
47 | |||
48 | =over 4 | ||
49 | |||
50 | =item * | ||
51 | |||
52 | B<BN_GENCB_call(cb, 0, i)> is called after generating the i-th | ||
53 | potential prime number. | ||
54 | |||
55 | =item * | ||
56 | |||
57 | While the number is being tested for primality, | ||
58 | B<BN_GENCB_call(cb, 1, j)> is called as described below. | ||
59 | |||
60 | =item * | ||
61 | |||
62 | When a prime has been found, B<BN_GENCB_call(cb, 2, i)> is called. | ||
63 | |||
64 | =back | ||
65 | |||
66 | The prime may have to fulfill additional requirements for use in | ||
67 | Diffie-Hellman key exchange: | ||
68 | |||
69 | If B<add> is not B<NULL>, the prime will fulfill the condition p % B<add> | ||
70 | == B<rem> (p % B<add> == 1 if B<rem> == B<NULL>) in order to suit a given | ||
71 | generator. | ||
72 | |||
73 | If B<safe> is true, it will be a safe prime (i.e. a prime p so | ||
74 | that (p-1)/2 is also prime). | ||
75 | |||
76 | The prime number generation has a negligible error probability. | ||
77 | |||
78 | BN_is_prime_ex() and BN_is_prime_fasttest_ex() test if the number B<p> is | ||
79 | prime. The following tests are performed until one of them shows that | ||
80 | B<p> is composite; if B<p> passes all these tests, it is considered | ||
81 | prime. | ||
82 | |||
83 | BN_is_prime_fasttest_ex(), when called with B<do_trial_division == 1>, | ||
84 | first attempts trial division by a number of small primes; | ||
85 | if no divisors are found by this test and B<cb> is not B<NULL>, | ||
86 | B<BN_GENCB_call(cb, 1, -1)> is called. | ||
87 | If B<do_trial_division == 0>, this test is skipped. | ||
88 | |||
89 | Both BN_is_prime_ex() and BN_is_prime_fasttest_ex() perform a Miller-Rabin | ||
90 | probabilistic primality test with B<nchecks> iterations. If | ||
91 | B<nchecks == BN_prime_checks>, a number of iterations is used that | ||
92 | yields a false positive rate of at most 2^-80 for random input. | ||
93 | |||
94 | If B<cb> is not B<NULL>, B<BN_GENCB_call(cb, 1, j)> is called | ||
95 | after the j-th iteration (j = 0, 1, ...). B<ctx> is a | ||
96 | pre-allocated B<BN_CTX> (to save the overhead of allocating and | ||
97 | freeing the structure in a loop), or B<NULL>. | ||
98 | |||
99 | BN_GENCB_call calls the callback function held in the B<BN_GENCB> structure | ||
100 | and passes the ints B<a> and B<b> as arguments. There are two types of | ||
101 | B<BN_GENCB> structure that are supported: "new" style and "old" style. New | ||
102 | programs should prefer the "new" style, whilst the "old" style is provided | ||
103 | for backwards compatibility purposes. | ||
104 | |||
105 | For "new" style callbacks a BN_GENCB structure should be initialised with a | ||
106 | call to BN_GENCB_set, where B<gencb> is a B<BN_GENCB *>, B<callback> is of | ||
107 | type B<int (*callback)(int, int, BN_GENCB *)> and B<cb_arg> is a B<void *>. | ||
108 | "Old" style callbacks are the same except they are initialised with a call | ||
109 | to BN_GENCB_set_old and B<callback> is of type | ||
110 | B<void (*callback)(int, int, void *)>. | ||
111 | |||
112 | A callback is invoked through a call to B<BN_GENCB_call>. This will check | ||
113 | the type of the callback and will invoke B<callback(a, b, gencb)> for new | ||
114 | style callbacks or B<callback(a, b, cb_arg)> for old style. | ||
115 | |||
116 | BN_generate_prime (deprecated) works in the same way as | ||
117 | BN_generate_prime_ex but expects an old style callback function | ||
118 | directly in the B<callback> parameter, and an argument to pass to it in | ||
119 | the B<cb_arg>. Similarly BN_is_prime and BN_is_prime_fasttest are | ||
120 | deprecated and can be compared to BN_is_prime_ex and | ||
121 | BN_is_prime_fasttest_ex respectively. | ||
122 | |||
123 | =head1 RETURN VALUES | ||
124 | |||
125 | BN_generate_prime_ex() returns 1 on success or 0 on error. | ||
126 | |||
127 | BN_is_prime_ex(), BN_is_prime_fasttest_ex(), BN_is_prime() and | ||
128 | BN_is_prime_fasttest() return 0 if the number is composite, 1 if it is | ||
129 | prime with an error probability of less than 0.25^B<nchecks>, and | ||
130 | -1 on error. | ||
131 | |||
132 | BN_generate_prime() returns the prime number on success, B<NULL> otherwise. | ||
133 | |||
134 | Callback functions should return 1 on success or 0 on error. | ||
135 | |||
136 | The error codes can be obtained by L<ERR_get_error(3)|ERR_get_error(3)>. | ||
137 | |||
138 | =head1 SEE ALSO | ||
139 | |||
140 | L<bn(3)|bn(3)>, L<ERR_get_error(3)|ERR_get_error(3)>, L<rand(3)|rand(3)> | ||
141 | |||
142 | =head1 HISTORY | ||
143 | |||
144 | The B<cb_arg> arguments to BN_generate_prime() and to BN_is_prime() | ||
145 | were added in SSLeay 0.9.0. The B<ret> argument to BN_generate_prime() | ||
146 | was added in SSLeay 0.9.1. | ||
147 | BN_is_prime_fasttest() was added in OpenSSL 0.9.5. | ||
148 | |||
149 | =cut | ||
diff --git a/src/lib/libssl/src/doc/crypto/BN_mod_inverse.pod b/src/lib/libssl/src/doc/crypto/BN_mod_inverse.pod deleted file mode 100644 index aefb1d27dd..0000000000 --- a/src/lib/libssl/src/doc/crypto/BN_mod_inverse.pod +++ /dev/null | |||
@@ -1,36 +0,0 @@ | |||
1 | =pod | ||
2 | |||
3 | =head1 NAME | ||
4 | |||
5 | BN_mod_inverse - compute inverse modulo n | ||
6 | |||
7 | =head1 SYNOPSIS | ||
8 | |||
9 | #include <openssl/bn.h> | ||
10 | |||
11 | BIGNUM *BN_mod_inverse(BIGNUM *r, BIGNUM *a, const BIGNUM *n, | ||
12 | BN_CTX *ctx); | ||
13 | |||
14 | =head1 DESCRIPTION | ||
15 | |||
16 | BN_mod_inverse() computes the inverse of B<a> modulo B<n> | ||
17 | places the result in B<r> (C<(a*r)%n==1>). If B<r> is NULL, | ||
18 | a new B<BIGNUM> is created. | ||
19 | |||
20 | B<ctx> is a previously allocated B<BN_CTX> used for temporary | ||
21 | variables. B<r> may be the same B<BIGNUM> as B<a> or B<n>. | ||
22 | |||
23 | =head1 RETURN VALUES | ||
24 | |||
25 | BN_mod_inverse() returns the B<BIGNUM> containing the inverse, and NULL on | ||
26 | error. The error codes can be obtained by L<ERR_get_error(3)|ERR_get_error(3)>. | ||
27 | |||
28 | =head1 SEE ALSO | ||
29 | |||
30 | L<bn(3)|bn(3)>, L<ERR_get_error(3)|ERR_get_error(3)>, L<BN_add(3)|BN_add(3)> | ||
31 | |||
32 | =head1 HISTORY | ||
33 | |||
34 | BN_mod_inverse() is available in all versions of SSLeay and OpenSSL. | ||
35 | |||
36 | =cut | ||
diff --git a/src/lib/libssl/src/doc/crypto/BN_mod_mul_montgomery.pod b/src/lib/libssl/src/doc/crypto/BN_mod_mul_montgomery.pod deleted file mode 100644 index 6b16351b92..0000000000 --- a/src/lib/libssl/src/doc/crypto/BN_mod_mul_montgomery.pod +++ /dev/null | |||
@@ -1,101 +0,0 @@ | |||
1 | =pod | ||
2 | |||
3 | =head1 NAME | ||
4 | |||
5 | BN_mod_mul_montgomery, BN_MONT_CTX_new, BN_MONT_CTX_init, | ||
6 | BN_MONT_CTX_free, BN_MONT_CTX_set, BN_MONT_CTX_copy, | ||
7 | BN_from_montgomery, BN_to_montgomery - Montgomery multiplication | ||
8 | |||
9 | =head1 SYNOPSIS | ||
10 | |||
11 | #include <openssl/bn.h> | ||
12 | |||
13 | BN_MONT_CTX *BN_MONT_CTX_new(void); | ||
14 | void BN_MONT_CTX_init(BN_MONT_CTX *ctx); | ||
15 | void BN_MONT_CTX_free(BN_MONT_CTX *mont); | ||
16 | |||
17 | int BN_MONT_CTX_set(BN_MONT_CTX *mont, const BIGNUM *m, BN_CTX *ctx); | ||
18 | BN_MONT_CTX *BN_MONT_CTX_copy(BN_MONT_CTX *to, BN_MONT_CTX *from); | ||
19 | |||
20 | int BN_mod_mul_montgomery(BIGNUM *r, BIGNUM *a, BIGNUM *b, | ||
21 | BN_MONT_CTX *mont, BN_CTX *ctx); | ||
22 | |||
23 | int BN_from_montgomery(BIGNUM *r, BIGNUM *a, BN_MONT_CTX *mont, | ||
24 | BN_CTX *ctx); | ||
25 | |||
26 | int BN_to_montgomery(BIGNUM *r, BIGNUM *a, BN_MONT_CTX *mont, | ||
27 | BN_CTX *ctx); | ||
28 | |||
29 | =head1 DESCRIPTION | ||
30 | |||
31 | These functions implement Montgomery multiplication. They are used | ||
32 | automatically when L<BN_mod_exp(3)|BN_mod_exp(3)> is called with suitable input, | ||
33 | but they may be useful when several operations are to be performed | ||
34 | using the same modulus. | ||
35 | |||
36 | BN_MONT_CTX_new() allocates and initializes a B<BN_MONT_CTX> structure. | ||
37 | BN_MONT_CTX_init() initializes an existing uninitialized B<BN_MONT_CTX>. | ||
38 | |||
39 | BN_MONT_CTX_set() sets up the I<mont> structure from the modulus I<m> | ||
40 | by precomputing its inverse and a value R. | ||
41 | |||
42 | BN_MONT_CTX_copy() copies the B<BN_MONT_CTX> I<from> to I<to>. | ||
43 | |||
44 | BN_MONT_CTX_free() frees the components of the B<BN_MONT_CTX>, and, if | ||
45 | it was created by BN_MONT_CTX_new(), also the structure itself. | ||
46 | |||
47 | BN_mod_mul_montgomery() computes Mont(I<a>,I<b>):=I<a>*I<b>*R^-1 and places | ||
48 | the result in I<r>. | ||
49 | |||
50 | BN_from_montgomery() performs the Montgomery reduction I<r> = I<a>*R^-1. | ||
51 | |||
52 | BN_to_montgomery() computes Mont(I<a>,R^2), i.e. I<a>*R. | ||
53 | Note that I<a> must be non-negative and smaller than the modulus. | ||
54 | |||
55 | For all functions, I<ctx> is a previously allocated B<BN_CTX> used for | ||
56 | temporary variables. | ||
57 | |||
58 | The B<BN_MONT_CTX> structure is defined as follows: | ||
59 | |||
60 | typedef struct bn_mont_ctx_st | ||
61 | { | ||
62 | int ri; /* number of bits in R */ | ||
63 | BIGNUM RR; /* R^2 (used to convert to Montgomery form) */ | ||
64 | BIGNUM N; /* The modulus */ | ||
65 | BIGNUM Ni; /* R*(1/R mod N) - N*Ni = 1 | ||
66 | * (Ni is only stored for bignum algorithm) */ | ||
67 | BN_ULONG n0; /* least significant word of Ni */ | ||
68 | int flags; | ||
69 | } BN_MONT_CTX; | ||
70 | |||
71 | BN_to_montgomery() is a macro. | ||
72 | |||
73 | =head1 RETURN VALUES | ||
74 | |||
75 | BN_MONT_CTX_new() returns the newly allocated B<BN_MONT_CTX>, and NULL | ||
76 | on error. | ||
77 | |||
78 | BN_MONT_CTX_init() and BN_MONT_CTX_free() have no return values. | ||
79 | |||
80 | For the other functions, 1 is returned for success, 0 on error. | ||
81 | The error codes can be obtained by L<ERR_get_error(3)|ERR_get_error(3)>. | ||
82 | |||
83 | =head1 WARNING | ||
84 | |||
85 | The inputs must be reduced modulo B<m>, otherwise the result will be | ||
86 | outside the expected range. | ||
87 | |||
88 | =head1 SEE ALSO | ||
89 | |||
90 | L<bn(3)|bn(3)>, L<ERR_get_error(3)|ERR_get_error(3)>, L<BN_add(3)|BN_add(3)>, | ||
91 | L<BN_CTX_new(3)|BN_CTX_new(3)> | ||
92 | |||
93 | =head1 HISTORY | ||
94 | |||
95 | BN_MONT_CTX_new(), BN_MONT_CTX_free(), BN_MONT_CTX_set(), | ||
96 | BN_mod_mul_montgomery(), BN_from_montgomery() and BN_to_montgomery() | ||
97 | are available in all versions of SSLeay and OpenSSL. | ||
98 | |||
99 | BN_MONT_CTX_init() and BN_MONT_CTX_copy() were added in SSLeay 0.9.1b. | ||
100 | |||
101 | =cut | ||
diff --git a/src/lib/libssl/src/doc/crypto/BN_mod_mul_reciprocal.pod b/src/lib/libssl/src/doc/crypto/BN_mod_mul_reciprocal.pod deleted file mode 100644 index 74a216ddc2..0000000000 --- a/src/lib/libssl/src/doc/crypto/BN_mod_mul_reciprocal.pod +++ /dev/null | |||
@@ -1,81 +0,0 @@ | |||
1 | =pod | ||
2 | |||
3 | =head1 NAME | ||
4 | |||
5 | BN_mod_mul_reciprocal, BN_div_recp, BN_RECP_CTX_new, BN_RECP_CTX_init, | ||
6 | BN_RECP_CTX_free, BN_RECP_CTX_set - modular multiplication using | ||
7 | reciprocal | ||
8 | |||
9 | =head1 SYNOPSIS | ||
10 | |||
11 | #include <openssl/bn.h> | ||
12 | |||
13 | BN_RECP_CTX *BN_RECP_CTX_new(void); | ||
14 | void BN_RECP_CTX_init(BN_RECP_CTX *recp); | ||
15 | void BN_RECP_CTX_free(BN_RECP_CTX *recp); | ||
16 | |||
17 | int BN_RECP_CTX_set(BN_RECP_CTX *recp, const BIGNUM *m, BN_CTX *ctx); | ||
18 | |||
19 | int BN_div_recp(BIGNUM *dv, BIGNUM *rem, BIGNUM *a, BN_RECP_CTX *recp, | ||
20 | BN_CTX *ctx); | ||
21 | |||
22 | int BN_mod_mul_reciprocal(BIGNUM *r, BIGNUM *a, BIGNUM *b, | ||
23 | BN_RECP_CTX *recp, BN_CTX *ctx); | ||
24 | |||
25 | =head1 DESCRIPTION | ||
26 | |||
27 | BN_mod_mul_reciprocal() can be used to perform an efficient | ||
28 | L<BN_mod_mul(3)|BN_mod_mul(3)> operation when the operation will be performed | ||
29 | repeatedly with the same modulus. It computes B<r>=(B<a>*B<b>)%B<m> | ||
30 | using B<recp>=1/B<m>, which is set as described below. B<ctx> is a | ||
31 | previously allocated B<BN_CTX> used for temporary variables. | ||
32 | |||
33 | BN_RECP_CTX_new() allocates and initializes a B<BN_RECP> structure. | ||
34 | BN_RECP_CTX_init() initializes an existing uninitialized B<BN_RECP>. | ||
35 | |||
36 | BN_RECP_CTX_free() frees the components of the B<BN_RECP>, and, if it | ||
37 | was created by BN_RECP_CTX_new(), also the structure itself. | ||
38 | |||
39 | BN_RECP_CTX_set() stores B<m> in B<recp> and sets it up for computing | ||
40 | 1/B<m> and shifting it left by BN_num_bits(B<m>)+1 to make it an | ||
41 | integer. The result and the number of bits it was shifted left will | ||
42 | later be stored in B<recp>. | ||
43 | |||
44 | BN_div_recp() divides B<a> by B<m> using B<recp>. It places the quotient | ||
45 | in B<dv> and the remainder in B<rem>. | ||
46 | |||
47 | The B<BN_RECP_CTX> structure is defined as follows: | ||
48 | |||
49 | typedef struct bn_recp_ctx_st | ||
50 | { | ||
51 | BIGNUM N; /* the divisor */ | ||
52 | BIGNUM Nr; /* the reciprocal */ | ||
53 | int num_bits; | ||
54 | int shift; | ||
55 | int flags; | ||
56 | } BN_RECP_CTX; | ||
57 | |||
58 | It cannot be shared between threads. | ||
59 | |||
60 | =head1 RETURN VALUES | ||
61 | |||
62 | BN_RECP_CTX_new() returns the newly allocated B<BN_RECP_CTX>, and NULL | ||
63 | on error. | ||
64 | |||
65 | BN_RECP_CTX_init() and BN_RECP_CTX_free() have no return values. | ||
66 | |||
67 | For the other functions, 1 is returned for success, 0 on error. | ||
68 | The error codes can be obtained by L<ERR_get_error(3)|ERR_get_error(3)>. | ||
69 | |||
70 | =head1 SEE ALSO | ||
71 | |||
72 | L<bn(3)|bn(3)>, L<ERR_get_error(3)|ERR_get_error(3)>, L<BN_add(3)|BN_add(3)>, | ||
73 | L<BN_CTX_new(3)|BN_CTX_new(3)> | ||
74 | |||
75 | =head1 HISTORY | ||
76 | |||
77 | B<BN_RECP_CTX> was added in SSLeay 0.9.0. Before that, the function | ||
78 | BN_reciprocal() was used instead, and the BN_mod_mul_reciprocal() | ||
79 | arguments were different. | ||
80 | |||
81 | =cut | ||
diff --git a/src/lib/libssl/src/doc/crypto/BN_new.pod b/src/lib/libssl/src/doc/crypto/BN_new.pod deleted file mode 100644 index ab7a105e3a..0000000000 --- a/src/lib/libssl/src/doc/crypto/BN_new.pod +++ /dev/null | |||
@@ -1,53 +0,0 @@ | |||
1 | =pod | ||
2 | |||
3 | =head1 NAME | ||
4 | |||
5 | BN_new, BN_init, BN_clear, BN_free, BN_clear_free - allocate and free BIGNUMs | ||
6 | |||
7 | =head1 SYNOPSIS | ||
8 | |||
9 | #include <openssl/bn.h> | ||
10 | |||
11 | BIGNUM *BN_new(void); | ||
12 | |||
13 | void BN_init(BIGNUM *); | ||
14 | |||
15 | void BN_clear(BIGNUM *a); | ||
16 | |||
17 | void BN_free(BIGNUM *a); | ||
18 | |||
19 | void BN_clear_free(BIGNUM *a); | ||
20 | |||
21 | =head1 DESCRIPTION | ||
22 | |||
23 | BN_new() allocates and initializes a B<BIGNUM> structure. BN_init() | ||
24 | initializes an existing uninitialized B<BIGNUM>. | ||
25 | |||
26 | BN_clear() is used to destroy sensitive data such as keys when they | ||
27 | are no longer needed. It erases the memory used by B<a> and sets it | ||
28 | to the value 0. | ||
29 | |||
30 | BN_free() frees the components of the B<BIGNUM>, and if it was created | ||
31 | by BN_new(), also the structure itself. BN_clear_free() additionally | ||
32 | overwrites the data before the memory is returned to the system. | ||
33 | |||
34 | =head1 RETURN VALUES | ||
35 | |||
36 | BN_new() returns a pointer to the B<BIGNUM>. If the allocation fails, | ||
37 | it returns B<NULL> and sets an error code that can be obtained | ||
38 | by L<ERR_get_error(3)|ERR_get_error(3)>. | ||
39 | |||
40 | BN_init(), BN_clear(), BN_free() and BN_clear_free() have no return | ||
41 | values. | ||
42 | |||
43 | =head1 SEE ALSO | ||
44 | |||
45 | L<bn(3)|bn(3)>, L<ERR_get_error(3)|ERR_get_error(3)> | ||
46 | |||
47 | =head1 HISTORY | ||
48 | |||
49 | BN_new(), BN_clear(), BN_free() and BN_clear_free() are available in | ||
50 | all versions on SSLeay and OpenSSL. BN_init() was added in SSLeay | ||
51 | 0.9.1b. | ||
52 | |||
53 | =cut | ||
diff --git a/src/lib/libssl/src/doc/crypto/BN_num_bytes.pod b/src/lib/libssl/src/doc/crypto/BN_num_bytes.pod deleted file mode 100644 index a6a2e3f819..0000000000 --- a/src/lib/libssl/src/doc/crypto/BN_num_bytes.pod +++ /dev/null | |||
@@ -1,57 +0,0 @@ | |||
1 | =pod | ||
2 | |||
3 | =head1 NAME | ||
4 | |||
5 | BN_num_bits, BN_num_bytes, BN_num_bits_word - get BIGNUM size | ||
6 | |||
7 | =head1 SYNOPSIS | ||
8 | |||
9 | #include <openssl/bn.h> | ||
10 | |||
11 | int BN_num_bytes(const BIGNUM *a); | ||
12 | |||
13 | int BN_num_bits(const BIGNUM *a); | ||
14 | |||
15 | int BN_num_bits_word(BN_ULONG w); | ||
16 | |||
17 | =head1 DESCRIPTION | ||
18 | |||
19 | BN_num_bytes() returns the size of a B<BIGNUM> in bytes. | ||
20 | |||
21 | BN_num_bits_word() returns the number of significant bits in a word. | ||
22 | If we take 0x00000432 as an example, it returns 11, not 16, not 32. | ||
23 | Basically, except for a zero, it returns I<floor(log2(w))+1>. | ||
24 | |||
25 | BN_num_bits() returns the number of significant bits in a B<BIGNUM>, | ||
26 | following the same principle as BN_num_bits_word(). | ||
27 | |||
28 | BN_num_bytes() is a macro. | ||
29 | |||
30 | =head1 RETURN VALUES | ||
31 | |||
32 | The size. | ||
33 | |||
34 | =head1 NOTES | ||
35 | |||
36 | Some have tried using BN_num_bits() on individual numbers in RSA keys, | ||
37 | DH keys and DSA keys, and found that they don't always come up with | ||
38 | the number of bits they expected (something like 512, 1024, 2048, | ||
39 | ...). This is because generating a number with some specific number | ||
40 | of bits doesn't always set the highest bits, thereby making the number | ||
41 | of I<significant> bits a little lower. If you want to know the "key | ||
42 | size" of such a key, either use functions like RSA_size(), DH_size() | ||
43 | and DSA_size(), or use BN_num_bytes() and multiply with 8 (although | ||
44 | there's no real guarantee that will match the "key size", just a lot | ||
45 | more probability). | ||
46 | |||
47 | =head1 SEE ALSO | ||
48 | |||
49 | L<bn(3)|bn(3)>, L<DH_size(3)|DH_size(3)>, L<DSA_size(3)|DSA_size(3)>, | ||
50 | L<RSA_size(3)|RSA_size(3)> | ||
51 | |||
52 | =head1 HISTORY | ||
53 | |||
54 | BN_num_bytes(), BN_num_bits() and BN_num_bits_word() are available in | ||
55 | all versions of SSLeay and OpenSSL. | ||
56 | |||
57 | =cut | ||
diff --git a/src/lib/libssl/src/doc/crypto/BN_rand.pod b/src/lib/libssl/src/doc/crypto/BN_rand.pod deleted file mode 100644 index 856f310077..0000000000 --- a/src/lib/libssl/src/doc/crypto/BN_rand.pod +++ /dev/null | |||
@@ -1,56 +0,0 @@ | |||
1 | =pod | ||
2 | |||
3 | =head1 NAME | ||
4 | |||
5 | BN_rand, BN_pseudo_rand, BN_rand_range, BN_pseudo_rand_range - generate pseudo-random number | ||
6 | |||
7 | =head1 SYNOPSIS | ||
8 | |||
9 | #include <openssl/bn.h> | ||
10 | |||
11 | int BN_rand(BIGNUM *rnd, int bits, int top, int bottom); | ||
12 | |||
13 | int BN_pseudo_rand(BIGNUM *rnd, int bits, int top, int bottom); | ||
14 | |||
15 | int BN_rand_range(BIGNUM *rnd, BIGNUM *range); | ||
16 | |||
17 | int BN_pseudo_rand_range(BIGNUM *rnd, BIGNUM *range); | ||
18 | |||
19 | =head1 DESCRIPTION | ||
20 | |||
21 | BN_rand() generates a cryptographically strong pseudo-random number of | ||
22 | B<bits> bits in length and stores it in B<rnd>. If B<top> is -1, the | ||
23 | most significant bit of the random number can be zero. If B<top> is 0, | ||
24 | it is set to 1, and if B<top> is 1, the two most significant bits of | ||
25 | the number will be set to 1, so that the product of two such random | ||
26 | numbers will always have 2*B<bits> length. If B<bottom> is true, the | ||
27 | number will be odd. | ||
28 | |||
29 | BN_pseudo_rand() does the same, but pseudo-random numbers generated by | ||
30 | this function are not necessarily unpredictable. They can be used for | ||
31 | non-cryptographic purposes and for certain purposes in cryptographic | ||
32 | protocols, but usually not for key generation etc. | ||
33 | |||
34 | BN_rand_range() generates a cryptographically strong pseudo-random | ||
35 | number B<rnd> in the range 0 E<lt>= B<rnd> E<lt> B<range>. | ||
36 | BN_pseudo_rand_range() does the same, but is based on BN_pseudo_rand(), | ||
37 | and hence numbers generated by it are not necessarily unpredictable. | ||
38 | |||
39 | =head1 RETURN VALUES | ||
40 | |||
41 | The functions return 1 on success, 0 on error. | ||
42 | The error codes can be obtained by L<ERR_get_error(3)|ERR_get_error(3)>. | ||
43 | |||
44 | =head1 SEE ALSO | ||
45 | |||
46 | L<bn(3)|bn(3)>, L<ERR_get_error(3)|ERR_get_error(3)>, L<rand(3)|rand(3)>, | ||
47 | L<RAND_add(3)|RAND_add(3)>, L<RAND_bytes(3)|RAND_bytes(3)> | ||
48 | |||
49 | =head1 HISTORY | ||
50 | |||
51 | BN_rand() is available in all versions of SSLeay and OpenSSL. | ||
52 | BN_pseudo_rand() was added in OpenSSL 0.9.5. The B<top> == -1 case | ||
53 | and the function BN_rand_range() were added in OpenSSL 0.9.6a. | ||
54 | BN_pseudo_rand_range() was added in OpenSSL 0.9.6c. | ||
55 | |||
56 | =cut | ||
diff --git a/src/lib/libssl/src/doc/crypto/BN_set_bit.pod b/src/lib/libssl/src/doc/crypto/BN_set_bit.pod deleted file mode 100644 index b7c47b9b01..0000000000 --- a/src/lib/libssl/src/doc/crypto/BN_set_bit.pod +++ /dev/null | |||
@@ -1,66 +0,0 @@ | |||
1 | =pod | ||
2 | |||
3 | =head1 NAME | ||
4 | |||
5 | BN_set_bit, BN_clear_bit, BN_is_bit_set, BN_mask_bits, BN_lshift, | ||
6 | BN_lshift1, BN_rshift, BN_rshift1 - bit operations on BIGNUMs | ||
7 | |||
8 | =head1 SYNOPSIS | ||
9 | |||
10 | #include <openssl/bn.h> | ||
11 | |||
12 | int BN_set_bit(BIGNUM *a, int n); | ||
13 | int BN_clear_bit(BIGNUM *a, int n); | ||
14 | |||
15 | int BN_is_bit_set(const BIGNUM *a, int n); | ||
16 | |||
17 | int BN_mask_bits(BIGNUM *a, int n); | ||
18 | |||
19 | int BN_lshift(BIGNUM *r, const BIGNUM *a, int n); | ||
20 | int BN_lshift1(BIGNUM *r, BIGNUM *a); | ||
21 | |||
22 | int BN_rshift(BIGNUM *r, BIGNUM *a, int n); | ||
23 | int BN_rshift1(BIGNUM *r, BIGNUM *a); | ||
24 | |||
25 | =head1 DESCRIPTION | ||
26 | |||
27 | BN_set_bit() sets bit B<n> in B<a> to 1 (C<a|=(1E<lt>E<lt>n)>). The | ||
28 | number is expanded if necessary. | ||
29 | |||
30 | BN_clear_bit() sets bit B<n> in B<a> to 0 (C<a&=~(1E<lt>E<lt>n)>). An | ||
31 | error occurs if B<a> is shorter than B<n> bits. | ||
32 | |||
33 | BN_is_bit_set() tests if bit B<n> in B<a> is set. | ||
34 | |||
35 | BN_mask_bits() truncates B<a> to an B<n> bit number | ||
36 | (C<a&=~((~0)E<gt>E<gt>n)>). An error occurs if B<a> already is | ||
37 | shorter than B<n> bits. | ||
38 | |||
39 | BN_lshift() shifts B<a> left by B<n> bits and places the result in | ||
40 | B<r> (C<r=a*2^n>). BN_lshift1() shifts B<a> left by one and places | ||
41 | the result in B<r> (C<r=2*a>). | ||
42 | |||
43 | BN_rshift() shifts B<a> right by B<n> bits and places the result in | ||
44 | B<r> (C<r=a/2^n>). BN_rshift1() shifts B<a> right by one and places | ||
45 | the result in B<r> (C<r=a/2>). | ||
46 | |||
47 | For the shift functions, B<r> and B<a> may be the same variable. | ||
48 | |||
49 | =head1 RETURN VALUES | ||
50 | |||
51 | BN_is_bit_set() returns 1 if the bit is set, 0 otherwise. | ||
52 | |||
53 | All other functions return 1 for success, 0 on error. The error codes | ||
54 | can be obtained by L<ERR_get_error(3)|ERR_get_error(3)>. | ||
55 | |||
56 | =head1 SEE ALSO | ||
57 | |||
58 | L<bn(3)|bn(3)>, L<BN_num_bytes(3)|BN_num_bytes(3)>, L<BN_add(3)|BN_add(3)> | ||
59 | |||
60 | =head1 HISTORY | ||
61 | |||
62 | BN_set_bit(), BN_clear_bit(), BN_is_bit_set(), BN_mask_bits(), | ||
63 | BN_lshift(), BN_lshift1(), BN_rshift(), and BN_rshift1() are available | ||
64 | in all versions of SSLeay and OpenSSL. | ||
65 | |||
66 | =cut | ||
diff --git a/src/lib/libssl/src/doc/crypto/BN_swap.pod b/src/lib/libssl/src/doc/crypto/BN_swap.pod deleted file mode 100644 index 14097ca357..0000000000 --- a/src/lib/libssl/src/doc/crypto/BN_swap.pod +++ /dev/null | |||
@@ -1,25 +0,0 @@ | |||
1 | =pod | ||
2 | |||
3 | =head1 NAME | ||
4 | |||
5 | BN_swap - exchange BIGNUMs | ||
6 | |||
7 | =head1 SYNOPSIS | ||
8 | |||
9 | #include <openssl/bn.h> | ||
10 | |||
11 | void BN_swap(BIGNUM *a, BIGNUM *b); | ||
12 | |||
13 | =head1 DESCRIPTION | ||
14 | |||
15 | BN_swap() exchanges the values of I<a> and I<b>. | ||
16 | |||
17 | =head1 SEE ALSO | ||
18 | |||
19 | L<bn(3)|bn(3)> | ||
20 | |||
21 | =head1 HISTORY | ||
22 | |||
23 | BN_swap was added in OpenSSL 0.9.7. | ||
24 | |||
25 | =cut | ||
diff --git a/src/lib/libssl/src/doc/crypto/BN_zero.pod b/src/lib/libssl/src/doc/crypto/BN_zero.pod deleted file mode 100644 index b555ec3988..0000000000 --- a/src/lib/libssl/src/doc/crypto/BN_zero.pod +++ /dev/null | |||
@@ -1,59 +0,0 @@ | |||
1 | =pod | ||
2 | |||
3 | =head1 NAME | ||
4 | |||
5 | BN_zero, BN_one, BN_value_one, BN_set_word, BN_get_word - BIGNUM assignment | ||
6 | operations | ||
7 | |||
8 | =head1 SYNOPSIS | ||
9 | |||
10 | #include <openssl/bn.h> | ||
11 | |||
12 | int BN_zero(BIGNUM *a); | ||
13 | int BN_one(BIGNUM *a); | ||
14 | |||
15 | const BIGNUM *BN_value_one(void); | ||
16 | |||
17 | int BN_set_word(BIGNUM *a, unsigned long w); | ||
18 | unsigned long BN_get_word(BIGNUM *a); | ||
19 | |||
20 | =head1 DESCRIPTION | ||
21 | |||
22 | BN_zero(), BN_one() and BN_set_word() set B<a> to the values 0, 1 and | ||
23 | B<w> respectively. BN_zero() and BN_one() are macros. | ||
24 | |||
25 | BN_value_one() returns a B<BIGNUM> constant of value 1. This constant | ||
26 | is useful for use in comparisons and assignment. | ||
27 | |||
28 | BN_get_word() returns B<a>, if it can be represented as an unsigned | ||
29 | long. | ||
30 | |||
31 | =head1 RETURN VALUES | ||
32 | |||
33 | BN_get_word() returns the value B<a>, and 0xffffffffL if B<a> cannot | ||
34 | be represented as an unsigned long. | ||
35 | |||
36 | BN_zero(), BN_one() and BN_set_word() return 1 on success, 0 otherwise. | ||
37 | BN_value_one() returns the constant. | ||
38 | |||
39 | =head1 BUGS | ||
40 | |||
41 | Someone might change the constant. | ||
42 | |||
43 | If a B<BIGNUM> is equal to 0xffffffffL it can be represented as an | ||
44 | unsigned long but this value is also returned on error. | ||
45 | |||
46 | =head1 SEE ALSO | ||
47 | |||
48 | L<bn(3)|bn(3)>, L<BN_bn2bin(3)|BN_bn2bin(3)> | ||
49 | |||
50 | =head1 HISTORY | ||
51 | |||
52 | BN_zero(), BN_one() and BN_set_word() are available in all versions of | ||
53 | SSLeay and OpenSSL. BN_value_one() and BN_get_word() were added in | ||
54 | SSLeay 0.8. | ||
55 | |||
56 | BN_value_one() was changed to return a true const BIGNUM * in OpenSSL | ||
57 | 0.9.7. | ||
58 | |||
59 | =cut | ||