summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto/doc/rsa.pod
diff options
context:
space:
mode:
Diffstat (limited to 'src/lib/libcrypto/doc/rsa.pod')
-rw-r--r--src/lib/libcrypto/doc/rsa.pod31
1 files changed, 19 insertions, 12 deletions
diff --git a/src/lib/libcrypto/doc/rsa.pod b/src/lib/libcrypto/doc/rsa.pod
index 2b93a12b65..45ac53ffc1 100644
--- a/src/lib/libcrypto/doc/rsa.pod
+++ b/src/lib/libcrypto/doc/rsa.pod
@@ -16,13 +16,17 @@ rsa - RSA public key cryptosystem
16 unsigned char *to, RSA *rsa, int padding); 16 unsigned char *to, RSA *rsa, int padding);
17 int RSA_private_decrypt(int flen, unsigned char *from, 17 int RSA_private_decrypt(int flen, unsigned char *from,
18 unsigned char *to, RSA *rsa, int padding); 18 unsigned char *to, RSA *rsa, int padding);
19 int RSA_private_encrypt(int flen, unsigned char *from,
20 unsigned char *to, RSA *rsa,int padding);
21 int RSA_public_decrypt(int flen, unsigned char *from,
22 unsigned char *to, RSA *rsa,int padding);
19 23
20 int RSA_sign(int type, unsigned char *m, unsigned int m_len, 24 int RSA_sign(int type, unsigned char *m, unsigned int m_len,
21 unsigned char *sigret, unsigned int *siglen, RSA *rsa); 25 unsigned char *sigret, unsigned int *siglen, RSA *rsa);
22 int RSA_verify(int type, unsigned char *m, unsigned int m_len, 26 int RSA_verify(int type, unsigned char *m, unsigned int m_len,
23 unsigned char *sigbuf, unsigned int siglen, RSA *rsa); 27 unsigned char *sigbuf, unsigned int siglen, RSA *rsa);
24 28
25 int RSA_size(RSA *rsa); 29 int RSA_size(const RSA *rsa);
26 30
27 RSA *RSA_generate_key(int num, unsigned long e, 31 RSA *RSA_generate_key(int num, unsigned long e,
28 void (*callback)(int,int,void *), void *cb_arg); 32 void (*callback)(int,int,void *), void *cb_arg);
@@ -32,13 +36,13 @@ rsa - RSA public key cryptosystem
32 int RSA_blinding_on(RSA *rsa, BN_CTX *ctx); 36 int RSA_blinding_on(RSA *rsa, BN_CTX *ctx);
33 void RSA_blinding_off(RSA *rsa); 37 void RSA_blinding_off(RSA *rsa);
34 38
35 void RSA_set_default_openssl_method(RSA_METHOD *meth); 39 void RSA_set_default_method(const RSA_METHOD *meth);
36 RSA_METHOD *RSA_get_default_openssl_method(void); 40 const RSA_METHOD *RSA_get_default_method(void);
37 int RSA_set_method(RSA *rsa, ENGINE *engine); 41 int RSA_set_method(RSA *rsa, const RSA_METHOD *meth);
38 RSA_METHOD *RSA_get_method(RSA *rsa); 42 const RSA_METHOD *RSA_get_method(const RSA *rsa);
39 RSA_METHOD *RSA_PKCS1_SSLeay(void); 43 RSA_METHOD *RSA_PKCS1_SSLeay(void);
40 RSA_METHOD *RSA_null_method(void); 44 RSA_METHOD *RSA_null_method(void);
41 int RSA_flags(RSA *rsa); 45 int RSA_flags(const RSA *rsa);
42 RSA *RSA_new_method(ENGINE *engine); 46 RSA *RSA_new_method(ENGINE *engine);
43 47
44 int RSA_print(BIO *bp, RSA *x, int offset); 48 int RSA_print(BIO *bp, RSA *x, int offset);
@@ -49,11 +53,6 @@ rsa - RSA public key cryptosystem
49 int RSA_set_ex_data(RSA *r,int idx,char *arg); 53 int RSA_set_ex_data(RSA *r,int idx,char *arg);
50 char *RSA_get_ex_data(RSA *r, int idx); 54 char *RSA_get_ex_data(RSA *r, int idx);
51 55
52 int RSA_private_encrypt(int flen, unsigned char *from,
53 unsigned char *to, RSA *rsa,int padding);
54 int RSA_public_decrypt(int flen, unsigned char *from,
55 unsigned char *to, RSA *rsa,int padding);
56
57 int RSA_sign_ASN1_OCTET_STRING(int dummy, unsigned char *m, 56 int RSA_sign_ASN1_OCTET_STRING(int dummy, unsigned char *m,
58 unsigned int m_len, unsigned char *sigret, unsigned int *siglen, 57 unsigned int m_len, unsigned char *sigret, unsigned int *siglen,
59 RSA *rsa); 58 RSA *rsa);
@@ -90,6 +89,14 @@ B<p>, B<q>, B<dmp1>, B<dmq1> and B<iqmp> may be B<NULL> in private
90keys, but the RSA operations are much faster when these values are 89keys, but the RSA operations are much faster when these values are
91available. 90available.
92 91
92Note that RSA keys may use non-standard B<RSA_METHOD> implementations,
93either directly or by the use of B<ENGINE> modules. In some cases (eg. an
94ENGINE providing support for hardware-embedded keys), these BIGNUM values
95will not be used by the implementation or may be used for alternative data
96storage. For this reason, applications should generally avoid using RSA
97structure elements directly and instead use API functions to query or
98modify keys.
99
93=head1 CONFORMING TO 100=head1 CONFORMING TO
94 101
95SSL, PKCS #1 v2.0 102SSL, PKCS #1 v2.0
@@ -101,7 +108,7 @@ RSA was covered by a US patent which expired in September 2000.
101=head1 SEE ALSO 108=head1 SEE ALSO
102 109
103L<rsa(1)|rsa(1)>, L<bn(3)|bn(3)>, L<dsa(3)|dsa(3)>, L<dh(3)|dh(3)>, 110L<rsa(1)|rsa(1)>, L<bn(3)|bn(3)>, L<dsa(3)|dsa(3)>, L<dh(3)|dh(3)>,
104L<rand(3)|rand(3)>, L<RSA_new(3)|RSA_new(3)>, 111L<rand(3)|rand(3)>, L<engine(3)|engine(3)>, L<RSA_new(3)|RSA_new(3)>,
105L<RSA_public_encrypt(3)|RSA_public_encrypt(3)>, 112L<RSA_public_encrypt(3)|RSA_public_encrypt(3)>,
106L<RSA_sign(3)|RSA_sign(3)>, L<RSA_size(3)|RSA_size(3)>, 113L<RSA_sign(3)|RSA_sign(3)>, L<RSA_size(3)|RSA_size(3)>,
107L<RSA_generate_key(3)|RSA_generate_key(3)>, 114L<RSA_generate_key(3)|RSA_generate_key(3)>,