diff options
| author | schwarze <> | 2019-06-08 10:40:51 +0000 |
|---|---|---|
| committer | schwarze <> | 2019-06-08 10:40:51 +0000 |
| commit | 8f4e63e7d7854fe8feea4a10e965bcf933abb999 (patch) | |
| tree | b6702e3fb830bf8d3a1e3153d9a8d539009ae5b1 /src | |
| parent | c7efff3e254b868e292d5726e03e83b957c0dd15 (diff) | |
| download | openbsd-8f4e63e7d7854fe8feea4a10e965bcf933abb999.tar.gz openbsd-8f4e63e7d7854fe8feea4a10e965bcf933abb999.tar.bz2 openbsd-8f4e63e7d7854fe8feea4a10e965bcf933abb999.zip | |
Delete the display of the RSA_METHOD object
which is now supposed to be opaque.
OK tb@
I checked that all the information contained in comments in the
display is available from the appropriate places in RSA_meth_new(3)
and RSA_set_flags(3). Note that the comments regarding "mod_exp",
"init", and "finish" were half-misleading simplifications, anyway.
Diffstat (limited to 'src')
| -rw-r--r-- | src/lib/libcrypto/man/RSA_set_method.3 | 71 |
1 files changed, 1 insertions, 70 deletions
diff --git a/src/lib/libcrypto/man/RSA_set_method.3 b/src/lib/libcrypto/man/RSA_set_method.3 index 53d41f5516..9e700a0cc3 100644 --- a/src/lib/libcrypto/man/RSA_set_method.3 +++ b/src/lib/libcrypto/man/RSA_set_method.3 | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | .\" $OpenBSD: RSA_set_method.3,v 1.14 2019/06/08 09:53:15 schwarze Exp $ | 1 | .\" $OpenBSD: RSA_set_method.3,v 1.15 2019/06/08 10:40:51 schwarze Exp $ |
| 2 | .\" OpenSSL 99d63d46 Oct 26 13:56:48 2016 -0400 | 2 | .\" OpenSSL 99d63d46 Oct 26 13:56:48 2016 -0400 |
| 3 | .\" | 3 | .\" |
| 4 | .\" This file was written by Ulf Moeller <ulf@openssl.org> | 4 | .\" This file was written by Ulf Moeller <ulf@openssl.org> |
| @@ -204,75 +204,6 @@ function which may have been set up with | |||
| 204 | .Xr RSA_meth_set_init 3 | 204 | .Xr RSA_meth_set_init 3 |
| 205 | and which is called just before returning from | 205 | and which is called just before returning from |
| 206 | .Fn RSA_new_method . | 206 | .Fn RSA_new_method . |
| 207 | .Pp | ||
| 208 | The | ||
| 209 | .Dv RSA_METHOD | ||
| 210 | structure is defined as follows: | ||
| 211 | .Bd -literal | ||
| 212 | typedef struct rsa_meth_st | ||
| 213 | { | ||
| 214 | /* name of the implementation */ | ||
| 215 | const char *name; | ||
| 216 | |||
| 217 | /* encrypt */ | ||
| 218 | int (*rsa_pub_enc)(int flen, const unsigned char *from, | ||
| 219 | unsigned char *to, RSA *rsa, int padding); | ||
| 220 | |||
| 221 | /* verify arbitrary data */ | ||
| 222 | int (*rsa_pub_dec)(int flen, const unsigned char *from, | ||
| 223 | unsigned char *to, RSA *rsa, int padding); | ||
| 224 | |||
| 225 | /* sign arbitrary data */ | ||
| 226 | int (*rsa_priv_enc)(int flen, const unsigned char *from, | ||
| 227 | unsigned char *to, RSA *rsa, int padding); | ||
| 228 | |||
| 229 | /* decrypt */ | ||
| 230 | int (*rsa_priv_dec)(int flen, const unsigned char *from, | ||
| 231 | unsigned char *to, RSA *rsa, int padding); | ||
| 232 | |||
| 233 | /* compute r0 = r0 ^ I mod rsa->n (May be NULL for some | ||
| 234 | implementations) */ | ||
| 235 | int (*rsa_mod_exp)(BIGNUM *r0, const BIGNUM *I, RSA *rsa, | ||
| 236 | BN_CTX *ctx); | ||
| 237 | |||
| 238 | /* compute r = a ^ p mod m (May be NULL for some implementations) */ | ||
| 239 | int (*bn_mod_exp)(BIGNUM *r, const BIGNUM *a, const BIGNUM *p, | ||
| 240 | const BIGNUM *m, BN_CTX *ctx, BN_MONT_CTX *m_ctx); | ||
| 241 | |||
| 242 | /* called at RSA_new */ | ||
| 243 | int (*init)(RSA *rsa); | ||
| 244 | |||
| 245 | /* called at RSA_free */ | ||
| 246 | int (*finish)(RSA *rsa); | ||
| 247 | |||
| 248 | /* RSA_FLAG_EXT_PKEY - rsa_mod_exp is called for private key | ||
| 249 | * operations, even if p,q,dmp1,dmq1,iqmp | ||
| 250 | * are NULL | ||
| 251 | * RSA_FLAG_SIGN_VER - enable rsa_sign and rsa_verify | ||
| 252 | */ | ||
| 253 | int flags; | ||
| 254 | |||
| 255 | char *app_data; /* ?? */ | ||
| 256 | |||
| 257 | /* sign. For backward compatibility, this is used only | ||
| 258 | * if (flags & RSA_FLAG_SIGN_VER) | ||
| 259 | */ | ||
| 260 | int (*rsa_sign)(int type, const unsigned char *m, | ||
| 261 | unsigned int m_len, unsigned char *sigret, | ||
| 262 | unsigned int *siglen, const RSA *rsa); | ||
| 263 | |||
| 264 | /* verify. For backward compatibility, this is used only | ||
| 265 | * if (flags & RSA_FLAG_SIGN_VER) | ||
| 266 | */ | ||
| 267 | int (*rsa_verify)(int type, const unsigned char *m, | ||
| 268 | unsigned int m_len, const unsigned char *sigbuf, | ||
| 269 | unsigned int siglen, const RSA *rsa); | ||
| 270 | |||
| 271 | /* called at RSA_generate_key_ex; may be NULL */ | ||
| 272 | int (*rsa_keygen)(RSA *rsa, int bits, BIGNUM *e, BN_GENCB *cb); | ||
| 273 | |||
| 274 | } RSA_METHOD; | ||
| 275 | .Ed | ||
| 276 | .Sh RETURN VALUES | 207 | .Sh RETURN VALUES |
| 277 | .Fn RSA_PKCS1_SSLeay , | 208 | .Fn RSA_PKCS1_SSLeay , |
| 278 | .Fn RSA_get_default_method , | 209 | .Fn RSA_get_default_method , |
