From 223fc8654a790c204536cd7c61520154418915b8 Mon Sep 17 00:00:00 2001 From: =?utf8?q?Ulf=20M=C3=B6ller?= Date: Mon, 24 Jan 2000 01:20:39 +0000 Subject: [PATCH] RSA_print etc --- doc/crypto/BN_bn2bin.pod | 8 ++++---- doc/crypto/RSA_print.pod | 26 ++++++++++++++++++++------ doc/crypto/bn.pod | 2 +- doc/crypto/dh.pod | 2 +- 4 files changed, 26 insertions(+), 12 deletions(-) diff --git a/doc/crypto/BN_bn2bin.pod b/doc/crypto/BN_bn2bin.pod index 5d26765dd9..c8c75db011 100644 --- a/doc/crypto/BN_bn2bin.pod +++ b/doc/crypto/BN_bn2bin.pod @@ -3,7 +3,7 @@ =head1 NAME BN_bn2bin, BN_bin2bn, BN_bn2hex, BN_bn2dec, BN_hex2bn, BN_dec2bn, -BN_print_fp, BN_print, BN_bn2mpi, BN_mpi2bn - Format conversions +BN_print, BN_print_fp, BN_bn2mpi, BN_mpi2bn - Format conversions =head1 SYNOPSIS @@ -17,8 +17,8 @@ BN_print_fp, BN_print, BN_bn2mpi, BN_mpi2bn - Format conversions int BN_hex2bn(BIGNUM **a, const char *str); int BN_dec2bn(BIGNUM **a, const char *str); - int BN_print_fp(FILE *fp, BIGNUM *a); int BN_print(BIO *fp, const BIGNUM *a); + int BN_print_fp(FILE *fp, BIGNUM *a); int BN_bn2mpi(const BIGNUM *a, unsigned char *to); BIGNUM *BN_mpi2bn(unsigned char *s, int len, BIGNUM *ret); @@ -44,8 +44,8 @@ B is created. If B is NULL, it only computes the number's length in hexadecimal digits. If the string starts with '-', the number is negative. BN_dec2bn() is the same using the decimal system. -BN_print_fp() and BN_print() write the hexadecimal encoding of B, -with a leading '-' for negative numbers, to the B or B +BN_print() and BN_print_fp() write the hexadecimal encoding of B, +with a leading '-' for negative numbers, to the B or B B. BN_bn2mpi() and BN_mpi2bn() convert Bs from and to a format diff --git a/doc/crypto/RSA_print.pod b/doc/crypto/RSA_print.pod index 2361daa10e..67203a8ada 100644 --- a/doc/crypto/RSA_print.pod +++ b/doc/crypto/RSA_print.pod @@ -2,30 +2,44 @@ =head1 NAME -RSA_print, RSA_print_fp - Print RSA key +RSA_print, RSA_print_fp, DHparams_print, DHparams_print_fp - Print +cryptographic parameters =head1 SYNOPSIS #include int RSA_print(BIO *bp, RSA *x, int offset); - int RSA_print_fp(FILE *fp, RSA *x, int offset); + #include + + int DSA_print(BIO *bp, DSA *x, int offset); + int DSA_print_fp(FILE *fp, DSA *x, int offset); + + #include + + int DHparams_print(BIO *bp, DH *x); + int DHparams_print_fp(FILE *fp, DH *x); + =head1 DESCRIPTION -... +A human-readable hexadecimal output of the components of the RSA +key, DSA key or DH parameters is printed to B or B. + +The output lines are indented by B spaces. =head1 RETURN VALUES -... +These functions return 1 on success, 0 on error. =head1 SEE ALSO -... +dh(3), dsa(3), rsa(3), BN_bn2bin(3) =head1 HISTORY -... +RSA_print(), RSA_print_fp(), DSA_print(), DSA_print_fp(), DH_print(), +DH_print_fp() are available in all versions of SSLeay and OpenSSL. =cut diff --git a/doc/crypto/bn.pod b/doc/crypto/bn.pod index 1a0e38b24c..9dfe52a518 100644 --- a/doc/crypto/bn.pod +++ b/doc/crypto/bn.pod @@ -80,8 +80,8 @@ bn - Multiprecision integer arithmetics char *BN_bn2dec(const BIGNUM *a); int BN_hex2bn(BIGNUM **a, const char *str); int BN_dec2bn(BIGNUM **a, const char *str); - int BN_print_fp(FILE *fp, BIGNUM *a); int BN_print(BIO *fp, const BIGNUM *a); + int BN_print_fp(FILE *fp, BIGNUM *a); int BN_bn2mpi(const BIGNUM *a, unsigned char *to); BIGNUM *BN_mpi2bn(unsigned char *s, int len, BIGNUM *ret); diff --git a/doc/crypto/dh.pod b/doc/crypto/dh.pod index 1b8982ee27..6f0f73f0a1 100644 --- a/doc/crypto/dh.pod +++ b/doc/crypto/dh.pod @@ -60,6 +60,6 @@ The B structure consists of several BIGNUM components. dhparam(1), bn(3), dsa(3), err(3), rand(3), rsa(3), DH_set_method(3), DH_new(3), DH_get_ex_new_index(3), DH_generate_parameters(3), -DH_compute_key(3), d2i_DHparams(3), DHparams_print(3) +DH_compute_key(3), d2i_DHparams(3), RSA_print(3) =cut -- 2.25.1