summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorjsing <jsing@openbsd.org>2014-07-10 12:08:22 +0000
committerjsing <jsing@openbsd.org>2014-07-10 12:08:22 +0000
commit5e814c1075e579de36b0ef4ea3d03eaa7b410dad (patch)
treeb1b9b1cec71c7432ebc31788fff288dcb9093a79
parentAdd bus and root hub routines to prevent panic at attach. (diff)
downloadwireguard-openbsd-5e814c1075e579de36b0ef4ea3d03eaa7b410dad.tar.xz
wireguard-openbsd-5e814c1075e579de36b0ef4ea3d03eaa7b410dad.zip
Tweak some comments. We do not really need to know that "New!" flags were
added 10+ years ago (they're kinda somewhat stale by now...)
-rw-r--r--lib/libcrypto/rsa/rsa.h17
-rw-r--r--lib/libssl/src/crypto/rsa/rsa.h17
2 files changed, 16 insertions, 18 deletions
diff --git a/lib/libcrypto/rsa/rsa.h b/lib/libcrypto/rsa/rsa.h
index fdfd29c33ad..b84ab4c6d75 100644
--- a/lib/libcrypto/rsa/rsa.h
+++ b/lib/libcrypto/rsa/rsa.h
@@ -1,4 +1,4 @@
-/* $OpenBSD: rsa.h,v 1.23 2014/07/10 11:04:49 jsing Exp $ */
+/* $OpenBSD: rsa.h,v 1.24 2014/07/10 12:08:22 jsing Exp $ */
/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
* All rights reserved.
*
@@ -187,18 +187,17 @@ struct rsa_st {
#define RSA_FLAG_SIGN_VER 0x0040
/*
- * New with 0.9.6j and 0.9.7b; the built-in RSA implementation now uses
- * blinding by default (ignoring RSA_FLAG_BLINDING), but other engines might
- * not need it.
+ * The built-in RSA implementation uses blinding by default, but other engines
+ * might not need it.
*/
#define RSA_FLAG_NO_BLINDING 0x0080
/*
- * New with 0.9.8f; the built-in RSA implementation now uses constant time
- * operations by default in private key operations, e.g., constant time modular
- * exponentiation, modular inverse without leaking branches, division without
- * leaking branches. This flag disables these constant time operations and
- * results in faster RSA private key operations.
+ * The built-in RSA implementation uses constant time operations by default
+ * in private key operations, e.g., constant time modular exponentiation,
+ * modular inverse without leaking branches, division without leaking branches.
+ * This flag disables these constant time operations and results in faster RSA
+ * private key operations.
*/
#define RSA_FLAG_NO_CONSTTIME 0x0100
diff --git a/lib/libssl/src/crypto/rsa/rsa.h b/lib/libssl/src/crypto/rsa/rsa.h
index fdfd29c33ad..b84ab4c6d75 100644
--- a/lib/libssl/src/crypto/rsa/rsa.h
+++ b/lib/libssl/src/crypto/rsa/rsa.h
@@ -1,4 +1,4 @@
-/* $OpenBSD: rsa.h,v 1.23 2014/07/10 11:04:49 jsing Exp $ */
+/* $OpenBSD: rsa.h,v 1.24 2014/07/10 12:08:22 jsing Exp $ */
/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
* All rights reserved.
*
@@ -187,18 +187,17 @@ struct rsa_st {
#define RSA_FLAG_SIGN_VER 0x0040
/*
- * New with 0.9.6j and 0.9.7b; the built-in RSA implementation now uses
- * blinding by default (ignoring RSA_FLAG_BLINDING), but other engines might
- * not need it.
+ * The built-in RSA implementation uses blinding by default, but other engines
+ * might not need it.
*/
#define RSA_FLAG_NO_BLINDING 0x0080
/*
- * New with 0.9.8f; the built-in RSA implementation now uses constant time
- * operations by default in private key operations, e.g., constant time modular
- * exponentiation, modular inverse without leaking branches, division without
- * leaking branches. This flag disables these constant time operations and
- * results in faster RSA private key operations.
+ * The built-in RSA implementation uses constant time operations by default
+ * in private key operations, e.g., constant time modular exponentiation,
+ * modular inverse without leaking branches, division without leaking branches.
+ * This flag disables these constant time operations and results in faster RSA
+ * private key operations.
*/
#define RSA_FLAG_NO_CONSTTIME 0x0100