diff options
author | 2014-07-10 12:08:22 +0000 | |
---|---|---|
committer | 2014-07-10 12:08:22 +0000 | |
commit | 5e814c1075e579de36b0ef4ea3d03eaa7b410dad (patch) | |
tree | b1b9b1cec71c7432ebc31788fff288dcb9093a79 | |
parent | Add bus and root hub routines to prevent panic at attach. (diff) | |
download | wireguard-openbsd-5e814c1075e579de36b0ef4ea3d03eaa7b410dad.tar.xz wireguard-openbsd-5e814c1075e579de36b0ef4ea3d03eaa7b410dad.zip |
Tweak some comments. We do not really need to know that "New!" flags were
added 10+ years ago (they're kinda somewhat stale by now...)
-rw-r--r-- | lib/libcrypto/rsa/rsa.h | 17 | ||||
-rw-r--r-- | lib/libssl/src/crypto/rsa/rsa.h | 17 |
2 files changed, 16 insertions, 18 deletions
diff --git a/lib/libcrypto/rsa/rsa.h b/lib/libcrypto/rsa/rsa.h index fdfd29c33ad..b84ab4c6d75 100644 --- a/lib/libcrypto/rsa/rsa.h +++ b/lib/libcrypto/rsa/rsa.h @@ -1,4 +1,4 @@ -/* $OpenBSD: rsa.h,v 1.23 2014/07/10 11:04:49 jsing Exp $ */ +/* $OpenBSD: rsa.h,v 1.24 2014/07/10 12:08:22 jsing Exp $ */ /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) * All rights reserved. * @@ -187,18 +187,17 @@ struct rsa_st { #define RSA_FLAG_SIGN_VER 0x0040 /* - * New with 0.9.6j and 0.9.7b; the built-in RSA implementation now uses - * blinding by default (ignoring RSA_FLAG_BLINDING), but other engines might - * not need it. + * The built-in RSA implementation uses blinding by default, but other engines + * might not need it. */ #define RSA_FLAG_NO_BLINDING 0x0080 /* - * New with 0.9.8f; the built-in RSA implementation now uses constant time - * operations by default in private key operations, e.g., constant time modular - * exponentiation, modular inverse without leaking branches, division without - * leaking branches. This flag disables these constant time operations and - * results in faster RSA private key operations. + * The built-in RSA implementation uses constant time operations by default + * in private key operations, e.g., constant time modular exponentiation, + * modular inverse without leaking branches, division without leaking branches. + * This flag disables these constant time operations and results in faster RSA + * private key operations. */ #define RSA_FLAG_NO_CONSTTIME 0x0100 diff --git a/lib/libssl/src/crypto/rsa/rsa.h b/lib/libssl/src/crypto/rsa/rsa.h index fdfd29c33ad..b84ab4c6d75 100644 --- a/lib/libssl/src/crypto/rsa/rsa.h +++ b/lib/libssl/src/crypto/rsa/rsa.h @@ -1,4 +1,4 @@ -/* $OpenBSD: rsa.h,v 1.23 2014/07/10 11:04:49 jsing Exp $ */ +/* $OpenBSD: rsa.h,v 1.24 2014/07/10 12:08:22 jsing Exp $ */ /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) * All rights reserved. * @@ -187,18 +187,17 @@ struct rsa_st { #define RSA_FLAG_SIGN_VER 0x0040 /* - * New with 0.9.6j and 0.9.7b; the built-in RSA implementation now uses - * blinding by default (ignoring RSA_FLAG_BLINDING), but other engines might - * not need it. + * The built-in RSA implementation uses blinding by default, but other engines + * might not need it. */ #define RSA_FLAG_NO_BLINDING 0x0080 /* - * New with 0.9.8f; the built-in RSA implementation now uses constant time - * operations by default in private key operations, e.g., constant time modular - * exponentiation, modular inverse without leaking branches, division without - * leaking branches. This flag disables these constant time operations and - * results in faster RSA private key operations. + * The built-in RSA implementation uses constant time operations by default + * in private key operations, e.g., constant time modular exponentiation, + * modular inverse without leaking branches, division without leaking branches. + * This flag disables these constant time operations and results in faster RSA + * private key operations. */ #define RSA_FLAG_NO_CONSTTIME 0x0100 |