From 9cb1a51933a1847042ee88e16d560485f682bcad Mon Sep 17 00:00:00 2001 From: schwarze <> Date: Mon, 23 Feb 2015 17:43:24 +0000 Subject: fourth batch of perlpod(1) to mdoc(7) conversion --- src/lib/libssl/src/doc/crypto/BN_BLINDING_new.pod | 115 ---------------- src/lib/libssl/src/doc/crypto/BN_CTX_new.pod | 57 -------- src/lib/libssl/src/doc/crypto/BN_CTX_start.pod | 52 ------- src/lib/libssl/src/doc/crypto/BN_add.pod | 127 ------------------ src/lib/libssl/src/doc/crypto/BN_add_word.pod | 61 --------- src/lib/libssl/src/doc/crypto/BN_bn2bin.pod | 95 ------------- src/lib/libssl/src/doc/crypto/BN_cmp.pod | 49 ------- src/lib/libssl/src/doc/crypto/BN_copy.pod | 34 ----- .../libssl/src/doc/crypto/BN_generate_prime.pod | 149 --------------------- src/lib/libssl/src/doc/crypto/BN_mod_inverse.pod | 36 ----- .../src/doc/crypto/BN_mod_mul_montgomery.pod | 101 -------------- .../src/doc/crypto/BN_mod_mul_reciprocal.pod | 81 ----------- src/lib/libssl/src/doc/crypto/BN_new.pod | 53 -------- src/lib/libssl/src/doc/crypto/BN_num_bytes.pod | 57 -------- src/lib/libssl/src/doc/crypto/BN_rand.pod | 56 -------- src/lib/libssl/src/doc/crypto/BN_set_bit.pod | 66 --------- src/lib/libssl/src/doc/crypto/BN_swap.pod | 25 ---- src/lib/libssl/src/doc/crypto/BN_zero.pod | 59 -------- 18 files changed, 1273 deletions(-) delete mode 100644 src/lib/libssl/src/doc/crypto/BN_BLINDING_new.pod delete mode 100644 src/lib/libssl/src/doc/crypto/BN_CTX_new.pod delete mode 100644 src/lib/libssl/src/doc/crypto/BN_CTX_start.pod delete mode 100644 src/lib/libssl/src/doc/crypto/BN_add.pod delete mode 100644 src/lib/libssl/src/doc/crypto/BN_add_word.pod delete mode 100644 src/lib/libssl/src/doc/crypto/BN_bn2bin.pod delete mode 100644 src/lib/libssl/src/doc/crypto/BN_cmp.pod delete mode 100644 src/lib/libssl/src/doc/crypto/BN_copy.pod delete mode 100644 src/lib/libssl/src/doc/crypto/BN_generate_prime.pod delete mode 100644 src/lib/libssl/src/doc/crypto/BN_mod_inverse.pod delete mode 100644 src/lib/libssl/src/doc/crypto/BN_mod_mul_montgomery.pod delete mode 100644 src/lib/libssl/src/doc/crypto/BN_mod_mul_reciprocal.pod delete mode 100644 src/lib/libssl/src/doc/crypto/BN_new.pod delete mode 100644 src/lib/libssl/src/doc/crypto/BN_num_bytes.pod delete mode 100644 src/lib/libssl/src/doc/crypto/BN_rand.pod delete mode 100644 src/lib/libssl/src/doc/crypto/BN_set_bit.pod delete mode 100644 src/lib/libssl/src/doc/crypto/BN_swap.pod delete mode 100644 src/lib/libssl/src/doc/crypto/BN_zero.pod (limited to 'src/lib/libssl') diff --git a/src/lib/libssl/src/doc/crypto/BN_BLINDING_new.pod b/src/lib/libssl/src/doc/crypto/BN_BLINDING_new.pod deleted file mode 100644 index 1c586ac54e..0000000000 --- a/src/lib/libssl/src/doc/crypto/BN_BLINDING_new.pod +++ /dev/null @@ -1,115 +0,0 @@ -=pod - -=head1 NAME - -BN_BLINDING_new, BN_BLINDING_free, BN_BLINDING_update, BN_BLINDING_convert, -BN_BLINDING_invert, BN_BLINDING_convert_ex, BN_BLINDING_invert_ex, -BN_BLINDING_get_thread_id, BN_BLINDING_set_thread_id, BN_BLINDING_thread_id, -BN_BLINDING_get_flags, BN_BLINDING_set_flags, -BN_BLINDING_create_param - blinding related BIGNUM functions. - -=head1 SYNOPSIS - - #include - - BN_BLINDING *BN_BLINDING_new(const BIGNUM *A, const BIGNUM *Ai, - BIGNUM *mod); - void BN_BLINDING_free(BN_BLINDING *b); - int BN_BLINDING_update(BN_BLINDING *b,BN_CTX *ctx); - int BN_BLINDING_convert(BIGNUM *n, BN_BLINDING *b, BN_CTX *ctx); - int BN_BLINDING_invert(BIGNUM *n, BN_BLINDING *b, BN_CTX *ctx); - int BN_BLINDING_convert_ex(BIGNUM *n, BIGNUM *r, BN_BLINDING *b, - BN_CTX *ctx); - int BN_BLINDING_invert_ex(BIGNUM *n, const BIGNUM *r, BN_BLINDING *b, - BN_CTX *ctx); - #ifndef OPENSSL_NO_DEPRECATED - unsigned long BN_BLINDING_get_thread_id(const BN_BLINDING *); - void BN_BLINDING_set_thread_id(BN_BLINDING *, unsigned long); - #endif - CRYPTO_THREADID *BN_BLINDING_thread_id(BN_BLINDING *); - unsigned long BN_BLINDING_get_flags(const BN_BLINDING *); - void BN_BLINDING_set_flags(BN_BLINDING *, unsigned long); - BN_BLINDING *BN_BLINDING_create_param(BN_BLINDING *b, - const BIGNUM *e, BIGNUM *m, BN_CTX *ctx, - int (*bn_mod_exp)(BIGNUM *r, const BIGNUM *a, const BIGNUM *p, - const BIGNUM *m, BN_CTX *ctx, BN_MONT_CTX *m_ctx), - BN_MONT_CTX *m_ctx); - -=head1 DESCRIPTION - -BN_BLINDING_new() allocates a new B structure and copies -the B and B values into the newly created B object. - -BN_BLINDING_free() frees the B structure. - -BN_BLINDING_update() updates the B parameters by squaring -the B and B or, after specific number of uses and if the -necessary parameters are set, by re-creating the blinding parameters. - -BN_BLINDING_convert_ex() multiplies B with the blinding factor B. -If B is not NULL a copy the inverse blinding factor B will be -returned in B (this is useful if a B object is shared among -several threads). BN_BLINDING_invert_ex() multiplies B with the -inverse blinding factor B. If B is not NULL it will be used as -the inverse blinding. - -BN_BLINDING_convert() and BN_BLINDING_invert() are wrapper -functions for BN_BLINDING_convert_ex() and BN_BLINDING_invert_ex() -with B set to NULL. - -BN_BLINDING_thread_id() provides access to the B -object within the B structure. This is to help users -provide proper locking if needed for multi-threaded use. The "thread -id" object of a newly allocated B structure is -initialised to the thread id in which BN_BLINDING_new() was called. - -BN_BLINDING_get_flags() returns the BN_BLINDING flags. Currently -there are two supported flags: B and -B. B inhibits the -automatic update of the B parameters after each use -and B inhibits the automatic re-creation -of the B parameters after a fixed number of uses (currently -32). In newly allocated B objects no flags are set. -BN_BLINDING_set_flags() sets the B parameters flags. - -BN_BLINDING_create_param() creates new B parameters -using the exponent B and the modulus B. B and -B can be used to pass special functions for exponentiation -(normally BN_mod_exp_mont() and B). - -=head1 RETURN VALUES - -BN_BLINDING_new() returns the newly allocated B structure -or NULL in case of an error. - -BN_BLINDING_update(), BN_BLINDING_convert(), BN_BLINDING_invert(), -BN_BLINDING_convert_ex() and BN_BLINDING_invert_ex() return 1 on -success and 0 if an error occured. - -BN_BLINDING_thread_id() returns a pointer to the thread id object -within a B object. - -BN_BLINDING_get_flags() returns the currently set B flags -(a B value). - -BN_BLINDING_create_param() returns the newly created B -parameters or NULL on error. - -=head1 SEE ALSO - -L - -=head1 HISTORY - -BN_BLINDING_thread_id was first introduced in OpenSSL 1.0.0, and it -deprecates BN_BLINDING_set_thread_id and BN_BLINDING_get_thread_id. - -BN_BLINDING_convert_ex, BN_BLINDIND_invert_ex, BN_BLINDING_get_thread_id, -BN_BLINDING_set_thread_id, BN_BLINDING_set_flags, BN_BLINDING_get_flags -and BN_BLINDING_create_param were first introduced in OpenSSL 0.9.8 - -=head1 AUTHOR - -Nils Larsch for the OpenSSL project (http://www.openssl.org). - -=cut diff --git a/src/lib/libssl/src/doc/crypto/BN_CTX_new.pod b/src/lib/libssl/src/doc/crypto/BN_CTX_new.pod deleted file mode 100644 index bbedbb1778..0000000000 --- a/src/lib/libssl/src/doc/crypto/BN_CTX_new.pod +++ /dev/null @@ -1,57 +0,0 @@ -=pod - -=head1 NAME - -BN_CTX_new, BN_CTX_init, BN_CTX_free - allocate and free BN_CTX structures - -=head1 SYNOPSIS - - #include - - BN_CTX *BN_CTX_new(void); - - void BN_CTX_free(BN_CTX *c); - -Deprecated: - - void BN_CTX_init(BN_CTX *c); - - -=head1 DESCRIPTION - -A B is a structure that holds B temporary variables used by -library functions. Since dynamic memory allocation to create Bs -is rather expensive when used in conjunction with repeated subroutine -calls, the B structure is used. - -BN_CTX_new() allocates and initializes a B -structure. - -BN_CTX_free() frees the components of the B, and if it was -created by BN_CTX_new(), also the structure itself. -If L has been used on the B, -L must be called before the B -may be freed by BN_CTX_free(). - -BN_CTX_init() (deprecated) initializes an existing uninitialized B. -This should not be used for new programs. Use BN_CTX_new() instead. - -=head1 RETURN VALUES - -BN_CTX_new() returns a pointer to the B. If the allocation fails, -it returns B and sets an error code that can be obtained by -L. - -BN_CTX_init() and BN_CTX_free() have no return values. - -=head1 SEE ALSO - -L, L, L, -L - -=head1 HISTORY - -BN_CTX_new() and BN_CTX_free() are available in all versions on SSLeay -and OpenSSL. BN_CTX_init() was added in SSLeay 0.9.1b. - -=cut diff --git a/src/lib/libssl/src/doc/crypto/BN_CTX_start.pod b/src/lib/libssl/src/doc/crypto/BN_CTX_start.pod deleted file mode 100644 index dfcefe1a88..0000000000 --- a/src/lib/libssl/src/doc/crypto/BN_CTX_start.pod +++ /dev/null @@ -1,52 +0,0 @@ -=pod - -=head1 NAME - -BN_CTX_start, BN_CTX_get, BN_CTX_end - use temporary BIGNUM variables - -=head1 SYNOPSIS - - #include - - void BN_CTX_start(BN_CTX *ctx); - - BIGNUM *BN_CTX_get(BN_CTX *ctx); - - void BN_CTX_end(BN_CTX *ctx); - -=head1 DESCRIPTION - -These functions are used to obtain temporary B variables from -a B (which can been created by using L) -in order to save the overhead of repeatedly creating and -freeing Bs in functions that are called from inside a loop. - -A function must call BN_CTX_start() first. Then, BN_CTX_get() may be -called repeatedly to obtain temporary Bs. All BN_CTX_get() -calls must be made before calling any other functions that use the -B as an argument. - -Finally, BN_CTX_end() must be called before returning from the function. -When BN_CTX_end() is called, the B pointers obtained from -BN_CTX_get() become invalid. - -=head1 RETURN VALUES - -BN_CTX_start() and BN_CTX_end() return no values. - -BN_CTX_get() returns a pointer to the B, or B on error. -Once BN_CTX_get() has failed, the subsequent calls will return B -as well, so it is sufficient to check the return value of the last -BN_CTX_get() call. In case of an error, an error code is set, which -can be obtained by L. - - -=head1 SEE ALSO - -L - -=head1 HISTORY - -BN_CTX_start(), BN_CTX_get() and BN_CTX_end() were added in OpenSSL 0.9.5. - -=cut diff --git a/src/lib/libssl/src/doc/crypto/BN_add.pod b/src/lib/libssl/src/doc/crypto/BN_add.pod deleted file mode 100644 index 15b28d8334..0000000000 --- a/src/lib/libssl/src/doc/crypto/BN_add.pod +++ /dev/null @@ -1,127 +0,0 @@ -=pod - -=head1 NAME - -BN_add, BN_sub, BN_mul, BN_sqr, BN_div, BN_mod, BN_nnmod, BN_mod_add, -BN_mod_sub, BN_mod_mul, BN_mod_sqr, BN_exp, BN_mod_exp, BN_gcd - -arithmetic operations on BIGNUMs - -=head1 SYNOPSIS - - #include - - int BN_add(BIGNUM *r, const BIGNUM *a, const BIGNUM *b); - - int BN_sub(BIGNUM *r, const BIGNUM *a, const BIGNUM *b); - - int BN_mul(BIGNUM *r, BIGNUM *a, BIGNUM *b, BN_CTX *ctx); - - int BN_sqr(BIGNUM *r, BIGNUM *a, BN_CTX *ctx); - - int BN_div(BIGNUM *dv, BIGNUM *rem, const BIGNUM *a, const BIGNUM *d, - BN_CTX *ctx); - - int BN_mod(BIGNUM *rem, const BIGNUM *a, const BIGNUM *m, BN_CTX *ctx); - - int BN_nnmod(BIGNUM *r, const BIGNUM *a, const BIGNUM *m, BN_CTX *ctx); - - int BN_mod_add(BIGNUM *r, BIGNUM *a, BIGNUM *b, const BIGNUM *m, - BN_CTX *ctx); - - int BN_mod_sub(BIGNUM *r, BIGNUM *a, BIGNUM *b, const BIGNUM *m, - BN_CTX *ctx); - - int BN_mod_mul(BIGNUM *r, BIGNUM *a, BIGNUM *b, const BIGNUM *m, - BN_CTX *ctx); - - int BN_mod_sqr(BIGNUM *r, BIGNUM *a, const BIGNUM *m, BN_CTX *ctx); - - int BN_exp(BIGNUM *r, BIGNUM *a, BIGNUM *p, BN_CTX *ctx); - - int BN_mod_exp(BIGNUM *r, BIGNUM *a, const BIGNUM *p, - const BIGNUM *m, BN_CTX *ctx); - - int BN_gcd(BIGNUM *r, BIGNUM *a, BIGNUM *b, BN_CTX *ctx); - -=head1 DESCRIPTION - -BN_add() adds I and I and places the result in I (C). -I may be the same B as I or I. - -BN_sub() subtracts I from I and places the result in I (C). - -BN_mul() multiplies I and I and places the result in I (C). -I may be the same B as I or I. -For multiplication by powers of 2, use L. - -BN_sqr() takes the square of I and places the result in I -(C). I and I may be the same B. -This function is faster than BN_mul(r,a,a). - -BN_div() divides I by I and places the result in I and the -remainder in I (C). Either of I and I may -be B, in which case the respective value is not returned. -The result is rounded towards zero; thus if I is negative, the -remainder will be zero or negative. -For division by powers of 2, use BN_rshift(3). - -BN_mod() corresponds to BN_div() with I set to B. - -BN_nnmod() reduces I modulo I and places the non-negative -remainder in I. - -BN_mod_add() adds I to I modulo I and places the non-negative -result in I. - -BN_mod_sub() subtracts I from I modulo I and places the -non-negative result in I. - -BN_mod_mul() multiplies I by I and finds the non-negative -remainder respective to modulus I (C). I may be -the same B as I or I. For more efficient algorithms for -repeated computations using the same modulus, see -L and -L. - -BN_mod_sqr() takes the square of I modulo B and places the -result in I. - -BN_exp() raises I to the I

-th power and places the result in I -(C). This function is faster than repeated applications of -BN_mul(). - -BN_mod_exp() computes I to the I

-th power modulo I (C). This function uses less time and space than BN_exp(). - -BN_gcd() computes the greatest common divisor of I and I and -places the result in I. I may be the same B as I or -I. - -For all functions, I is a previously allocated B used for -temporary variables; see L. - -Unless noted otherwise, the result B must be different from -the arguments. - -=head1 RETURN VALUES - -For all functions, 1 is returned for success, 0 on error. The return -value should always be checked (e.g., C). -The error codes can be obtained by L. - -=head1 SEE ALSO - -L, L, -L, L, -L - -=head1 HISTORY - -BN_add(), BN_sub(), BN_sqr(), BN_div(), BN_mod(), BN_mod_mul(), -BN_mod_exp() and BN_gcd() are available in all versions of SSLeay and -OpenSSL. The I argument to BN_mul() was added in SSLeay -0.9.1b. BN_exp() appeared in SSLeay 0.9.0. -BN_nnmod(), BN_mod_add(), BN_mod_sub(), and BN_mod_sqr() were added in -OpenSSL 0.9.7. - -=cut diff --git a/src/lib/libssl/src/doc/crypto/BN_add_word.pod b/src/lib/libssl/src/doc/crypto/BN_add_word.pod deleted file mode 100644 index ba1026417d..0000000000 --- a/src/lib/libssl/src/doc/crypto/BN_add_word.pod +++ /dev/null @@ -1,61 +0,0 @@ -=pod - -=head1 NAME - -BN_add_word, BN_sub_word, BN_mul_word, BN_div_word, BN_mod_word - arithmetic -functions on BIGNUMs with integers - -=head1 SYNOPSIS - - #include - - int BN_add_word(BIGNUM *a, BN_ULONG w); - - int BN_sub_word(BIGNUM *a, BN_ULONG w); - - int BN_mul_word(BIGNUM *a, BN_ULONG w); - - BN_ULONG BN_div_word(BIGNUM *a, BN_ULONG w); - - BN_ULONG BN_mod_word(const BIGNUM *a, BN_ULONG w); - -=head1 DESCRIPTION - -These functions perform arithmetic operations on BIGNUMs with unsigned -integers. They are much more efficient than the normal BIGNUM -arithmetic operations. - -BN_add_word() adds B to B (C). - -BN_sub_word() subtracts B from B (C). - -BN_mul_word() multiplies B and B (C). - -BN_div_word() divides B by B (C) and returns the remainder. - -BN_mod_word() returns the remainder of B divided by B (C). - -For BN_div_word() and BN_mod_word(), B must not be 0. - -=head1 RETURN VALUES - -BN_add_word(), BN_sub_word() and BN_mul_word() return 1 for success, 0 on -error. The error codes can be obtained by L. - -BN_mod_word() and BN_div_word() return B%B on success and -B<(BN_ULONG)-1> if an error occurred. - -=head1 SEE ALSO - -L, L, L - -=head1 HISTORY - -BN_add_word() and BN_mod_word() are available in all versions of -SSLeay and OpenSSL. BN_div_word() was added in SSLeay 0.8, and -BN_sub_word() and BN_mul_word() in SSLeay 0.9.0. - -Before 0.9.8a the return value for BN_div_word() and BN_mod_word() -in case of an error was 0. - -=cut diff --git a/src/lib/libssl/src/doc/crypto/BN_bn2bin.pod b/src/lib/libssl/src/doc/crypto/BN_bn2bin.pod deleted file mode 100644 index 03b439c7b9..0000000000 --- a/src/lib/libssl/src/doc/crypto/BN_bn2bin.pod +++ /dev/null @@ -1,95 +0,0 @@ -=pod - -=head1 NAME - -BN_bn2bin, BN_bin2bn, BN_bn2hex, BN_bn2dec, BN_hex2bn, BN_dec2bn, -BN_print, BN_print_fp, BN_bn2mpi, BN_mpi2bn - format conversions - -=head1 SYNOPSIS - - #include - - int BN_bn2bin(const BIGNUM *a, unsigned char *to); - BIGNUM *BN_bin2bn(const unsigned char *s, int len, BIGNUM *ret); - - char *BN_bn2hex(const BIGNUM *a); - char *BN_bn2dec(const BIGNUM *a); - int BN_hex2bn(BIGNUM **a, const char *str); - int BN_dec2bn(BIGNUM **a, const char *str); - - int BN_print(BIO *fp, const BIGNUM *a); - int BN_print_fp(FILE *fp, const BIGNUM *a); - - int BN_bn2mpi(const BIGNUM *a, unsigned char *to); - BIGNUM *BN_mpi2bn(unsigned char *s, int len, BIGNUM *ret); - -=head1 DESCRIPTION - -BN_bn2bin() converts the absolute value of B into big-endian form -and stores it at B. B must point to BN_num_bytes(B) bytes of -memory. - -BN_bin2bn() converts the positive integer in big-endian form of length -B at B into a B and places it in B. If B is -NULL, a new B is created. - -BN_bn2hex() and BN_bn2dec() return printable strings containing the -hexadecimal and decimal encoding of B respectively. For negative -numbers, the string is prefaced with a leading '-'. The string must be -freed later using free(). - -BN_hex2bn() converts the string B containing a hexadecimal number -to a B and stores it in **B. If *B is NULL, a new -B is created. If B is NULL, it only computes the number's -length in hexadecimal digits. If the string starts with '-', the -number is negative. BN_dec2bn() is the same using the decimal system. - -BN_print() and BN_print_fp() write the hexadecimal encoding of B, -with a leading '-' for negative numbers, to the B or B -B. - -BN_bn2mpi() and BN_mpi2bn() convert Bs from and to a format -that consists of the number's length in bytes represented as a 4-byte -big-endian number, and the number itself in big-endian format, where -the most significant bit signals a negative number (the representation -of numbers with the MSB set is prefixed with null byte). - -BN_bn2mpi() stores the representation of B at B, where B -must be large enough to hold the result. The size can be determined by -calling BN_bn2mpi(B, NULL). - -BN_mpi2bn() converts the B bytes long representation at B to -a B and stores it at B, or in a newly allocated B -if B is NULL. - -=head1 RETURN VALUES - -BN_bn2bin() returns the length of the big-endian number placed at B. -BN_bin2bn() returns the B, NULL on error. - -BN_bn2hex() and BN_bn2dec() return a null-terminated string, or NULL -on error. BN_hex2bn() and BN_dec2bn() return the number's length in -hexadecimal or decimal digits, and 0 on error. - -BN_print_fp() and BN_print() return 1 on success, 0 on write errors. - -BN_bn2mpi() returns the length of the representation. BN_mpi2bn() -returns the B, and NULL on error. - -The error codes can be obtained by L. - -=head1 SEE ALSO - -L, L, L, -L, -L - -=head1 HISTORY - -BN_bn2bin(), BN_bin2bn(), BN_print_fp() and BN_print() are available -in all versions of SSLeay and OpenSSL. - -BN_bn2hex(), BN_bn2dec(), BN_hex2bn(), BN_dec2bn(), BN_bn2mpi() and -BN_mpi2bn() were added in SSLeay 0.9.0. - -=cut diff --git a/src/lib/libssl/src/doc/crypto/BN_cmp.pod b/src/lib/libssl/src/doc/crypto/BN_cmp.pod deleted file mode 100644 index 29df69631e..0000000000 --- a/src/lib/libssl/src/doc/crypto/BN_cmp.pod +++ /dev/null @@ -1,49 +0,0 @@ -=pod - -=head1 NAME - -BN_cmp, BN_ucmp, BN_is_zero, BN_is_one, BN_is_word, BN_is_odd - BIGNUM -comparison and test functions - -=head1 SYNOPSIS - - #include - - int BN_cmp(BIGNUM *a, BIGNUM *b); - int BN_ucmp(BIGNUM *a, BIGNUM *b); - - int BN_is_zero(BIGNUM *a); - int BN_is_one(BIGNUM *a); - int BN_is_word(BIGNUM *a, BN_ULONG w); - int BN_is_odd(BIGNUM *a); - -=head1 DESCRIPTION - -BN_cmp() compares the numbers B and B. BN_ucmp() compares their -absolute values. - -BN_is_zero(), BN_is_one() and BN_is_word() test if B equals 0, 1, -or B respectively. BN_is_odd() tests if a is odd. - -BN_is_zero(), BN_is_one(), BN_is_word() and BN_is_odd() are macros. - -=head1 RETURN VALUES - -BN_cmp() returns -1 if B E B, 0 if B == B and 1 if -B E B. BN_ucmp() is the same using the absolute values -of B and B. - -BN_is_zero(), BN_is_one() BN_is_word() and BN_is_odd() return 1 if -the condition is true, 0 otherwise. - -=head1 SEE ALSO - -L - -=head1 HISTORY - -BN_cmp(), BN_ucmp(), BN_is_zero(), BN_is_one() and BN_is_word() are -available in all versions of SSLeay and OpenSSL. -BN_is_odd() was added in SSLeay 0.8. - -=cut diff --git a/src/lib/libssl/src/doc/crypto/BN_copy.pod b/src/lib/libssl/src/doc/crypto/BN_copy.pod deleted file mode 100644 index 388dd7df26..0000000000 --- a/src/lib/libssl/src/doc/crypto/BN_copy.pod +++ /dev/null @@ -1,34 +0,0 @@ -=pod - -=head1 NAME - -BN_copy, BN_dup - copy BIGNUMs - -=head1 SYNOPSIS - - #include - - BIGNUM *BN_copy(BIGNUM *to, const BIGNUM *from); - - BIGNUM *BN_dup(const BIGNUM *from); - -=head1 DESCRIPTION - -BN_copy() copies B to B. BN_dup() creates a new B -containing the value B. - -=head1 RETURN VALUES - -BN_copy() returns B on success, NULL on error. BN_dup() returns -the new B, and NULL on error. The error codes can be obtained -by L. - -=head1 SEE ALSO - -L, L - -=head1 HISTORY - -BN_copy() and BN_dup() are available in all versions of SSLeay and OpenSSL. - -=cut diff --git a/src/lib/libssl/src/doc/crypto/BN_generate_prime.pod b/src/lib/libssl/src/doc/crypto/BN_generate_prime.pod deleted file mode 100644 index 0a95633d54..0000000000 --- a/src/lib/libssl/src/doc/crypto/BN_generate_prime.pod +++ /dev/null @@ -1,149 +0,0 @@ -=pod - -=head1 NAME - -BN_generate_prime, BN_is_prime_ex, BN_is_prime_fasttest_ex, BN_GENCB_call, -BN_GENCB_set_old, BN_GENCB_set, BN_generate_prime, BN_is_prime, -BN_is_prime_fasttest - generate primes and test for primality - -=head1 SYNOPSIS - - #include - - int BN_generate_prime_ex(BIGNUM *ret,int bits,int safe, const BIGNUM *add, - const BIGNUM *rem, BN_GENCB *cb); - - int BN_is_prime_ex(const BIGNUM *p,int nchecks, BN_CTX *ctx, BN_GENCB *cb); - - int BN_is_prime_fasttest_ex(const BIGNUM *p,int nchecks, BN_CTX *ctx, - int do_trial_division, BN_GENCB *cb); - - int BN_GENCB_call(BN_GENCB *cb, int a, int b); - - #define BN_GENCB_set_old(gencb, callback, cb_arg) ... - - #define BN_GENCB_set(gencb, callback, cb_arg) ... - - -Deprecated: - -BIGNUM *BN_generate_prime(BIGNUM *ret, int num, int safe, BIGNUM *add, - BIGNUM *rem, void (*callback)(int, int, void *), void *cb_arg); - - int BN_is_prime(const BIGNUM *a, int checks, void (*callback)(int, int, - void *), BN_CTX *ctx, void *cb_arg); - - int BN_is_prime_fasttest(const BIGNUM *a, int checks, - void (*callback)(int, int, void *), BN_CTX *ctx, void *cb_arg, - int do_trial_division); - -=head1 DESCRIPTION - -BN_generate_prime_ex() generates a pseudo-random prime number of -bit length B. -If B is not B, it will be used to store the number. - -If B is not B, it is used as follows: - -=over 4 - -=item * - -B is called after generating the i-th -potential prime number. - -=item * - -While the number is being tested for primality, -B is called as described below. - -=item * - -When a prime has been found, B is called. - -=back - -The prime may have to fulfill additional requirements for use in -Diffie-Hellman key exchange: - -If B is not B, the prime will fulfill the condition p % B -== B (p % B == 1 if B == B) in order to suit a given -generator. - -If B is true, it will be a safe prime (i.e. a prime p so -that (p-1)/2 is also prime). - -The prime number generation has a negligible error probability. - -BN_is_prime_ex() and BN_is_prime_fasttest_ex() test if the number B

is -prime. The following tests are performed until one of them shows that -B

is composite; if B

passes all these tests, it is considered -prime. - -BN_is_prime_fasttest_ex(), when called with B, -first attempts trial division by a number of small primes; -if no divisors are found by this test and B is not B, -B is called. -If B, this test is skipped. - -Both BN_is_prime_ex() and BN_is_prime_fasttest_ex() perform a Miller-Rabin -probabilistic primality test with B iterations. If -B, a number of iterations is used that -yields a false positive rate of at most 2^-80 for random input. - -If B is not B, B is called -after the j-th iteration (j = 0, 1, ...). B is a -pre-allocated B (to save the overhead of allocating and -freeing the structure in a loop), or B. - -BN_GENCB_call calls the callback function held in the B structure -and passes the ints B and B as arguments. There are two types of -B structure that are supported: "new" style and "old" style. New -programs should prefer the "new" style, whilst the "old" style is provided -for backwards compatibility purposes. - -For "new" style callbacks a BN_GENCB structure should be initialised with a -call to BN_GENCB_set, where B is a B, B is of -type B and B is a B. -"Old" style callbacks are the same except they are initialised with a call -to BN_GENCB_set_old and B is of type -B. - -A callback is invoked through a call to B. This will check -the type of the callback and will invoke B for new -style callbacks or B for old style. - -BN_generate_prime (deprecated) works in the same way as -BN_generate_prime_ex but expects an old style callback function -directly in the B parameter, and an argument to pass to it in -the B. Similarly BN_is_prime and BN_is_prime_fasttest are -deprecated and can be compared to BN_is_prime_ex and -BN_is_prime_fasttest_ex respectively. - -=head1 RETURN VALUES - -BN_generate_prime_ex() returns 1 on success or 0 on error. - -BN_is_prime_ex(), BN_is_prime_fasttest_ex(), BN_is_prime() and -BN_is_prime_fasttest() return 0 if the number is composite, 1 if it is -prime with an error probability of less than 0.25^B, and --1 on error. - -BN_generate_prime() returns the prime number on success, B otherwise. - -Callback functions should return 1 on success or 0 on error. - -The error codes can be obtained by L. - -=head1 SEE ALSO - -L, L, L - -=head1 HISTORY - -The B arguments to BN_generate_prime() and to BN_is_prime() -were added in SSLeay 0.9.0. The B argument to BN_generate_prime() -was added in SSLeay 0.9.1. -BN_is_prime_fasttest() was added in OpenSSL 0.9.5. - -=cut diff --git a/src/lib/libssl/src/doc/crypto/BN_mod_inverse.pod b/src/lib/libssl/src/doc/crypto/BN_mod_inverse.pod deleted file mode 100644 index aefb1d27dd..0000000000 --- a/src/lib/libssl/src/doc/crypto/BN_mod_inverse.pod +++ /dev/null @@ -1,36 +0,0 @@ -=pod - -=head1 NAME - -BN_mod_inverse - compute inverse modulo n - -=head1 SYNOPSIS - - #include - - BIGNUM *BN_mod_inverse(BIGNUM *r, BIGNUM *a, const BIGNUM *n, - BN_CTX *ctx); - -=head1 DESCRIPTION - -BN_mod_inverse() computes the inverse of B modulo B -places the result in B (C<(a*r)%n==1>). If B is NULL, -a new B is created. - -B is a previously allocated B used for temporary -variables. B may be the same B as B or B. - -=head1 RETURN VALUES - -BN_mod_inverse() returns the B containing the inverse, and NULL on -error. The error codes can be obtained by L. - -=head1 SEE ALSO - -L, L, L - -=head1 HISTORY - -BN_mod_inverse() is available in all versions of SSLeay and OpenSSL. - -=cut diff --git a/src/lib/libssl/src/doc/crypto/BN_mod_mul_montgomery.pod b/src/lib/libssl/src/doc/crypto/BN_mod_mul_montgomery.pod deleted file mode 100644 index 6b16351b92..0000000000 --- a/src/lib/libssl/src/doc/crypto/BN_mod_mul_montgomery.pod +++ /dev/null @@ -1,101 +0,0 @@ -=pod - -=head1 NAME - -BN_mod_mul_montgomery, BN_MONT_CTX_new, BN_MONT_CTX_init, -BN_MONT_CTX_free, BN_MONT_CTX_set, BN_MONT_CTX_copy, -BN_from_montgomery, BN_to_montgomery - Montgomery multiplication - -=head1 SYNOPSIS - - #include - - BN_MONT_CTX *BN_MONT_CTX_new(void); - void BN_MONT_CTX_init(BN_MONT_CTX *ctx); - void BN_MONT_CTX_free(BN_MONT_CTX *mont); - - int BN_MONT_CTX_set(BN_MONT_CTX *mont, const BIGNUM *m, BN_CTX *ctx); - BN_MONT_CTX *BN_MONT_CTX_copy(BN_MONT_CTX *to, BN_MONT_CTX *from); - - int BN_mod_mul_montgomery(BIGNUM *r, BIGNUM *a, BIGNUM *b, - BN_MONT_CTX *mont, BN_CTX *ctx); - - int BN_from_montgomery(BIGNUM *r, BIGNUM *a, BN_MONT_CTX *mont, - BN_CTX *ctx); - - int BN_to_montgomery(BIGNUM *r, BIGNUM *a, BN_MONT_CTX *mont, - BN_CTX *ctx); - -=head1 DESCRIPTION - -These functions implement Montgomery multiplication. They are used -automatically when L is called with suitable input, -but they may be useful when several operations are to be performed -using the same modulus. - -BN_MONT_CTX_new() allocates and initializes a B structure. -BN_MONT_CTX_init() initializes an existing uninitialized B. - -BN_MONT_CTX_set() sets up the I structure from the modulus I -by precomputing its inverse and a value R. - -BN_MONT_CTX_copy() copies the B I to I. - -BN_MONT_CTX_free() frees the components of the B, and, if -it was created by BN_MONT_CTX_new(), also the structure itself. - -BN_mod_mul_montgomery() computes Mont(I,I):=I*I*R^-1 and places -the result in I. - -BN_from_montgomery() performs the Montgomery reduction I = I*R^-1. - -BN_to_montgomery() computes Mont(I,R^2), i.e. I*R. -Note that I must be non-negative and smaller than the modulus. - -For all functions, I is a previously allocated B used for -temporary variables. - -The B structure is defined as follows: - - typedef struct bn_mont_ctx_st - { - int ri; /* number of bits in R */ - BIGNUM RR; /* R^2 (used to convert to Montgomery form) */ - BIGNUM N; /* The modulus */ - BIGNUM Ni; /* R*(1/R mod N) - N*Ni = 1 - * (Ni is only stored for bignum algorithm) */ - BN_ULONG n0; /* least significant word of Ni */ - int flags; - } BN_MONT_CTX; - -BN_to_montgomery() is a macro. - -=head1 RETURN VALUES - -BN_MONT_CTX_new() returns the newly allocated B, and NULL -on error. - -BN_MONT_CTX_init() and BN_MONT_CTX_free() have no return values. - -For the other functions, 1 is returned for success, 0 on error. -The error codes can be obtained by L. - -=head1 WARNING - -The inputs must be reduced modulo B, otherwise the result will be -outside the expected range. - -=head1 SEE ALSO - -L, L, L, -L - -=head1 HISTORY - -BN_MONT_CTX_new(), BN_MONT_CTX_free(), BN_MONT_CTX_set(), -BN_mod_mul_montgomery(), BN_from_montgomery() and BN_to_montgomery() -are available in all versions of SSLeay and OpenSSL. - -BN_MONT_CTX_init() and BN_MONT_CTX_copy() were added in SSLeay 0.9.1b. - -=cut diff --git a/src/lib/libssl/src/doc/crypto/BN_mod_mul_reciprocal.pod b/src/lib/libssl/src/doc/crypto/BN_mod_mul_reciprocal.pod deleted file mode 100644 index 74a216ddc2..0000000000 --- a/src/lib/libssl/src/doc/crypto/BN_mod_mul_reciprocal.pod +++ /dev/null @@ -1,81 +0,0 @@ -=pod - -=head1 NAME - -BN_mod_mul_reciprocal, BN_div_recp, BN_RECP_CTX_new, BN_RECP_CTX_init, -BN_RECP_CTX_free, BN_RECP_CTX_set - modular multiplication using -reciprocal - -=head1 SYNOPSIS - - #include - - BN_RECP_CTX *BN_RECP_CTX_new(void); - void BN_RECP_CTX_init(BN_RECP_CTX *recp); - void BN_RECP_CTX_free(BN_RECP_CTX *recp); - - int BN_RECP_CTX_set(BN_RECP_CTX *recp, const BIGNUM *m, BN_CTX *ctx); - - int BN_div_recp(BIGNUM *dv, BIGNUM *rem, BIGNUM *a, BN_RECP_CTX *recp, - BN_CTX *ctx); - - int BN_mod_mul_reciprocal(BIGNUM *r, BIGNUM *a, BIGNUM *b, - BN_RECP_CTX *recp, BN_CTX *ctx); - -=head1 DESCRIPTION - -BN_mod_mul_reciprocal() can be used to perform an efficient -L operation when the operation will be performed -repeatedly with the same modulus. It computes B=(B*B)%B -using B=1/B, which is set as described below. B is a -previously allocated B used for temporary variables. - -BN_RECP_CTX_new() allocates and initializes a B structure. -BN_RECP_CTX_init() initializes an existing uninitialized B. - -BN_RECP_CTX_free() frees the components of the B, and, if it -was created by BN_RECP_CTX_new(), also the structure itself. - -BN_RECP_CTX_set() stores B in B and sets it up for computing -1/B and shifting it left by BN_num_bits(B)+1 to make it an -integer. The result and the number of bits it was shifted left will -later be stored in B. - -BN_div_recp() divides B by B using B. It places the quotient -in B and the remainder in B. - -The B structure is defined as follows: - - typedef struct bn_recp_ctx_st - { - BIGNUM N; /* the divisor */ - BIGNUM Nr; /* the reciprocal */ - int num_bits; - int shift; - int flags; - } BN_RECP_CTX; - -It cannot be shared between threads. - -=head1 RETURN VALUES - -BN_RECP_CTX_new() returns the newly allocated B, and NULL -on error. - -BN_RECP_CTX_init() and BN_RECP_CTX_free() have no return values. - -For the other functions, 1 is returned for success, 0 on error. -The error codes can be obtained by L. - -=head1 SEE ALSO - -L, L, L, -L - -=head1 HISTORY - -B was added in SSLeay 0.9.0. Before that, the function -BN_reciprocal() was used instead, and the BN_mod_mul_reciprocal() -arguments were different. - -=cut diff --git a/src/lib/libssl/src/doc/crypto/BN_new.pod b/src/lib/libssl/src/doc/crypto/BN_new.pod deleted file mode 100644 index ab7a105e3a..0000000000 --- a/src/lib/libssl/src/doc/crypto/BN_new.pod +++ /dev/null @@ -1,53 +0,0 @@ -=pod - -=head1 NAME - -BN_new, BN_init, BN_clear, BN_free, BN_clear_free - allocate and free BIGNUMs - -=head1 SYNOPSIS - - #include - - BIGNUM *BN_new(void); - - void BN_init(BIGNUM *); - - void BN_clear(BIGNUM *a); - - void BN_free(BIGNUM *a); - - void BN_clear_free(BIGNUM *a); - -=head1 DESCRIPTION - -BN_new() allocates and initializes a B structure. BN_init() -initializes an existing uninitialized B. - -BN_clear() is used to destroy sensitive data such as keys when they -are no longer needed. It erases the memory used by B and sets it -to the value 0. - -BN_free() frees the components of the B, and if it was created -by BN_new(), also the structure itself. BN_clear_free() additionally -overwrites the data before the memory is returned to the system. - -=head1 RETURN VALUES - -BN_new() returns a pointer to the B. If the allocation fails, -it returns B and sets an error code that can be obtained -by L. - -BN_init(), BN_clear(), BN_free() and BN_clear_free() have no return -values. - -=head1 SEE ALSO - -L, L - -=head1 HISTORY - -BN_new(), BN_clear(), BN_free() and BN_clear_free() are available in -all versions on SSLeay and OpenSSL. BN_init() was added in SSLeay -0.9.1b. - -=cut diff --git a/src/lib/libssl/src/doc/crypto/BN_num_bytes.pod b/src/lib/libssl/src/doc/crypto/BN_num_bytes.pod deleted file mode 100644 index a6a2e3f819..0000000000 --- a/src/lib/libssl/src/doc/crypto/BN_num_bytes.pod +++ /dev/null @@ -1,57 +0,0 @@ -=pod - -=head1 NAME - -BN_num_bits, BN_num_bytes, BN_num_bits_word - get BIGNUM size - -=head1 SYNOPSIS - - #include - - int BN_num_bytes(const BIGNUM *a); - - int BN_num_bits(const BIGNUM *a); - - int BN_num_bits_word(BN_ULONG w); - -=head1 DESCRIPTION - -BN_num_bytes() returns the size of a B in bytes. - -BN_num_bits_word() returns the number of significant bits in a word. -If we take 0x00000432 as an example, it returns 11, not 16, not 32. -Basically, except for a zero, it returns I. - -BN_num_bits() returns the number of significant bits in a B, -following the same principle as BN_num_bits_word(). - -BN_num_bytes() is a macro. - -=head1 RETURN VALUES - -The size. - -=head1 NOTES - -Some have tried using BN_num_bits() on individual numbers in RSA keys, -DH keys and DSA keys, and found that they don't always come up with -the number of bits they expected (something like 512, 1024, 2048, -...). This is because generating a number with some specific number -of bits doesn't always set the highest bits, thereby making the number -of I bits a little lower. If you want to know the "key -size" of such a key, either use functions like RSA_size(), DH_size() -and DSA_size(), or use BN_num_bytes() and multiply with 8 (although -there's no real guarantee that will match the "key size", just a lot -more probability). - -=head1 SEE ALSO - -L, L, L, -L - -=head1 HISTORY - -BN_num_bytes(), BN_num_bits() and BN_num_bits_word() are available in -all versions of SSLeay and OpenSSL. - -=cut diff --git a/src/lib/libssl/src/doc/crypto/BN_rand.pod b/src/lib/libssl/src/doc/crypto/BN_rand.pod deleted file mode 100644 index 856f310077..0000000000 --- a/src/lib/libssl/src/doc/crypto/BN_rand.pod +++ /dev/null @@ -1,56 +0,0 @@ -=pod - -=head1 NAME - -BN_rand, BN_pseudo_rand, BN_rand_range, BN_pseudo_rand_range - generate pseudo-random number - -=head1 SYNOPSIS - - #include - - int BN_rand(BIGNUM *rnd, int bits, int top, int bottom); - - int BN_pseudo_rand(BIGNUM *rnd, int bits, int top, int bottom); - - int BN_rand_range(BIGNUM *rnd, BIGNUM *range); - - int BN_pseudo_rand_range(BIGNUM *rnd, BIGNUM *range); - -=head1 DESCRIPTION - -BN_rand() generates a cryptographically strong pseudo-random number of -B bits in length and stores it in B. If B is -1, the -most significant bit of the random number can be zero. If B is 0, -it is set to 1, and if B is 1, the two most significant bits of -the number will be set to 1, so that the product of two such random -numbers will always have 2*B length. If B is true, the -number will be odd. - -BN_pseudo_rand() does the same, but pseudo-random numbers generated by -this function are not necessarily unpredictable. They can be used for -non-cryptographic purposes and for certain purposes in cryptographic -protocols, but usually not for key generation etc. - -BN_rand_range() generates a cryptographically strong pseudo-random -number B in the range 0 E= B E B. -BN_pseudo_rand_range() does the same, but is based on BN_pseudo_rand(), -and hence numbers generated by it are not necessarily unpredictable. - -=head1 RETURN VALUES - -The functions return 1 on success, 0 on error. -The error codes can be obtained by L. - -=head1 SEE ALSO - -L, L, L, -L, L - -=head1 HISTORY - -BN_rand() is available in all versions of SSLeay and OpenSSL. -BN_pseudo_rand() was added in OpenSSL 0.9.5. The B == -1 case -and the function BN_rand_range() were added in OpenSSL 0.9.6a. -BN_pseudo_rand_range() was added in OpenSSL 0.9.6c. - -=cut diff --git a/src/lib/libssl/src/doc/crypto/BN_set_bit.pod b/src/lib/libssl/src/doc/crypto/BN_set_bit.pod deleted file mode 100644 index b7c47b9b01..0000000000 --- a/src/lib/libssl/src/doc/crypto/BN_set_bit.pod +++ /dev/null @@ -1,66 +0,0 @@ -=pod - -=head1 NAME - -BN_set_bit, BN_clear_bit, BN_is_bit_set, BN_mask_bits, BN_lshift, -BN_lshift1, BN_rshift, BN_rshift1 - bit operations on BIGNUMs - -=head1 SYNOPSIS - - #include - - int BN_set_bit(BIGNUM *a, int n); - int BN_clear_bit(BIGNUM *a, int n); - - int BN_is_bit_set(const BIGNUM *a, int n); - - int BN_mask_bits(BIGNUM *a, int n); - - int BN_lshift(BIGNUM *r, const BIGNUM *a, int n); - int BN_lshift1(BIGNUM *r, BIGNUM *a); - - int BN_rshift(BIGNUM *r, BIGNUM *a, int n); - int BN_rshift1(BIGNUM *r, BIGNUM *a); - -=head1 DESCRIPTION - -BN_set_bit() sets bit B in B to 1 (CEn)>). The -number is expanded if necessary. - -BN_clear_bit() sets bit B in B to 0 (CEn)>). An -error occurs if B is shorter than B bits. - -BN_is_bit_set() tests if bit B in B is set. - -BN_mask_bits() truncates B to an B bit number -(CEn)>). An error occurs if B already is -shorter than B bits. - -BN_lshift() shifts B left by B bits and places the result in -B (C). BN_lshift1() shifts B left by one and places -the result in B (C). - -BN_rshift() shifts B right by B bits and places the result in -B (C). BN_rshift1() shifts B right by one and places -the result in B (C). - -For the shift functions, B and B may be the same variable. - -=head1 RETURN VALUES - -BN_is_bit_set() returns 1 if the bit is set, 0 otherwise. - -All other functions return 1 for success, 0 on error. The error codes -can be obtained by L. - -=head1 SEE ALSO - -L, L, L - -=head1 HISTORY - -BN_set_bit(), BN_clear_bit(), BN_is_bit_set(), BN_mask_bits(), -BN_lshift(), BN_lshift1(), BN_rshift(), and BN_rshift1() are available -in all versions of SSLeay and OpenSSL. - -=cut diff --git a/src/lib/libssl/src/doc/crypto/BN_swap.pod b/src/lib/libssl/src/doc/crypto/BN_swap.pod deleted file mode 100644 index 14097ca357..0000000000 --- a/src/lib/libssl/src/doc/crypto/BN_swap.pod +++ /dev/null @@ -1,25 +0,0 @@ -=pod - -=head1 NAME - -BN_swap - exchange BIGNUMs - -=head1 SYNOPSIS - - #include - - void BN_swap(BIGNUM *a, BIGNUM *b); - -=head1 DESCRIPTION - -BN_swap() exchanges the values of I and I. - -=head1 SEE ALSO - -L - -=head1 HISTORY - -BN_swap was added in OpenSSL 0.9.7. - -=cut diff --git a/src/lib/libssl/src/doc/crypto/BN_zero.pod b/src/lib/libssl/src/doc/crypto/BN_zero.pod deleted file mode 100644 index b555ec3988..0000000000 --- a/src/lib/libssl/src/doc/crypto/BN_zero.pod +++ /dev/null @@ -1,59 +0,0 @@ -=pod - -=head1 NAME - -BN_zero, BN_one, BN_value_one, BN_set_word, BN_get_word - BIGNUM assignment -operations - -=head1 SYNOPSIS - - #include - - int BN_zero(BIGNUM *a); - int BN_one(BIGNUM *a); - - const BIGNUM *BN_value_one(void); - - int BN_set_word(BIGNUM *a, unsigned long w); - unsigned long BN_get_word(BIGNUM *a); - -=head1 DESCRIPTION - -BN_zero(), BN_one() and BN_set_word() set B to the values 0, 1 and -B respectively. BN_zero() and BN_one() are macros. - -BN_value_one() returns a B constant of value 1. This constant -is useful for use in comparisons and assignment. - -BN_get_word() returns B, if it can be represented as an unsigned -long. - -=head1 RETURN VALUES - -BN_get_word() returns the value B, and 0xffffffffL if B cannot -be represented as an unsigned long. - -BN_zero(), BN_one() and BN_set_word() return 1 on success, 0 otherwise. -BN_value_one() returns the constant. - -=head1 BUGS - -Someone might change the constant. - -If a B is equal to 0xffffffffL it can be represented as an -unsigned long but this value is also returned on error. - -=head1 SEE ALSO - -L, L - -=head1 HISTORY - -BN_zero(), BN_one() and BN_set_word() are available in all versions of -SSLeay and OpenSSL. BN_value_one() and BN_get_word() were added in -SSLeay 0.8. - -BN_value_one() was changed to return a true const BIGNUM * in OpenSSL -0.9.7. - -=cut -- cgit v1.2.3-55-g6feb