Skip to content
体验新版
项目
组织
正在加载...
登录
切换导航
打开侧边栏
OpenHarmony
Third Party Openssl
提交
223fc865
T
Third Party Openssl
项目概览
OpenHarmony
/
Third Party Openssl
1 年多 前同步成功
通知
10
Star
18
Fork
1
代码
文件
提交
分支
Tags
贡献者
分支图
Diff
Issue
0
列表
看板
标记
里程碑
合并请求
0
Wiki
0
Wiki
分析
仓库
DevOps
项目成员
Pages
T
Third Party Openssl
项目概览
项目概览
详情
发布
仓库
仓库
文件
提交
分支
标签
贡献者
分支图
比较
Issue
0
Issue
0
列表
看板
标记
里程碑
合并请求
0
合并请求
0
Pages
分析
分析
仓库分析
DevOps
Wiki
0
Wiki
成员
成员
收起侧边栏
关闭侧边栏
动态
分支图
创建新Issue
提交
Issue看板
提交
223fc865
编写于
1月 24, 2000
作者:
U
Ulf Möller
浏览文件
操作
浏览文件
下载
电子邮件补丁
差异文件
RSA_print etc
上级
0e930f25
变更
4
隐藏空白更改
内联
并排
Showing
4 changed file
with
26 addition
and
12 deletion
+26
-12
doc/crypto/BN_bn2bin.pod
doc/crypto/BN_bn2bin.pod
+4
-4
doc/crypto/RSA_print.pod
doc/crypto/RSA_print.pod
+20
-6
doc/crypto/bn.pod
doc/crypto/bn.pod
+1
-1
doc/crypto/dh.pod
doc/crypto/dh.pod
+1
-1
未找到文件。
doc/crypto/BN_bn2bin.pod
浏览文件 @
223fc865
...
...
@@ -3,7 +3,7 @@
=head1 NAME
BN_bn2bin, BN_bin2bn, BN_bn2hex, BN_bn2dec, BN_hex2bn, BN_dec2bn,
BN_print
_fp, BN_print
, BN_bn2mpi, BN_mpi2bn - Format conversions
BN_print
, BN_print_fp
, BN_bn2mpi, BN_mpi2bn - Format conversions
=head1 SYNOPSIS
...
...
@@ -17,8 +17,8 @@ BN_print_fp, BN_print, BN_bn2mpi, BN_mpi2bn - Format conversions
int BN_hex2bn(BIGNUM **a, const char *str);
int BN_dec2bn(BIGNUM **a, const char *str);
int BN_print_fp(FILE *fp, BIGNUM *a);
int BN_print(BIO *fp, const BIGNUM *a);
int BN_print_fp(FILE *fp, BIGNUM *a);
int BN_bn2mpi(const BIGNUM *a, unsigned char *to);
BIGNUM *BN_mpi2bn(unsigned char *s, int len, BIGNUM *ret);
...
...
@@ -44,8 +44,8 @@ B<BIGNUM> is created. If B<bn> is NULL, it only computes the number's
length in hexadecimal digits. If the string starts with '-', the
number is negative. BN_dec2bn() is the same using the decimal system.
BN_print
_fp() and BN_print
() write the hexadecimal encoding of B<a>,
with a leading '-' for negative numbers, to the B<
FILE> or B<BIO
>
BN_print
() and BN_print_fp
() write the hexadecimal encoding of B<a>,
with a leading '-' for negative numbers, to the B<
BIO> or B<FILE
>
B<fp>.
BN_bn2mpi() and BN_mpi2bn() convert B<BIGNUM>s from and to a format
...
...
doc/crypto/RSA_print.pod
浏览文件 @
223fc865
...
...
@@ -2,30 +2,44 @@
=head1 NAME
RSA_print, RSA_print_fp - Print RSA key
RSA_print, RSA_print_fp, DHparams_print, DHparams_print_fp - Print
cryptographic parameters
=head1 SYNOPSIS
#include <openssl/rsa.h>
int RSA_print(BIO *bp, RSA *x, int offset);
int RSA_print_fp(FILE *fp, RSA *x, int offset);
#include <openssl/dsa.h>
int DSA_print(BIO *bp, DSA *x, int offset);
int DSA_print_fp(FILE *fp, DSA *x, int offset);
#include <openssl/dh.h>
int DHparams_print(BIO *bp, DH *x);
int DHparams_print_fp(FILE *fp, DH *x);
=head1 DESCRIPTION
...
A human-readable hexadecimal output of the components of the RSA
key, DSA key or DH parameters is printed to B<bp> or B<fp>.
The output lines are indented by B<offset> spaces.
=head1 RETURN VALUES
..
.
These functions return 1 on success, 0 on error
.
=head1 SEE ALSO
...
dh(3), dsa(3), rsa(3), BN_bn2bin(3)
=head1 HISTORY
...
RSA_print(), RSA_print_fp(), DSA_print(), DSA_print_fp(), DH_print(),
DH_print_fp() are available in all versions of SSLeay and OpenSSL.
=cut
doc/crypto/bn.pod
浏览文件 @
223fc865
...
...
@@ -80,8 +80,8 @@ bn - Multiprecision integer arithmetics
char *BN_bn2dec(const BIGNUM *a);
int BN_hex2bn(BIGNUM **a, const char *str);
int BN_dec2bn(BIGNUM **a, const char *str);
int BN_print_fp(FILE *fp, BIGNUM *a);
int BN_print(BIO *fp, const BIGNUM *a);
int BN_print_fp(FILE *fp, BIGNUM *a);
int BN_bn2mpi(const BIGNUM *a, unsigned char *to);
BIGNUM *BN_mpi2bn(unsigned char *s, int len, BIGNUM *ret);
...
...
doc/crypto/dh.pod
浏览文件 @
223fc865
...
...
@@ -60,6 +60,6 @@ The B<DH> structure consists of several BIGNUM components.
dhparam(1), bn(3), dsa(3), err(3), rand(3), rsa(3), DH_set_method(3),
DH_new(3), DH_get_ex_new_index(3), DH_generate_parameters(3),
DH_compute_key(3), d2i_DHparams(3),
DHparams
_print(3)
DH_compute_key(3), d2i_DHparams(3),
RSA
_print(3)
=cut
编辑
预览
Markdown
is supported
0%
请重试
或
添加新附件
.
添加附件
取消
You are about to add
0
people
to the discussion. Proceed with caution.
先完成此消息的编辑!
取消
想要评论请
注册
或
登录