old_des fix windows build, remove docs
Remove outdated doc files. Fix windows build after old_des was removed. Reviewed-by: Tim Hudson <tjh@openssl.org>
This commit is contained in:
parent
24956ca00f
commit
c303d4d868
3 changed files with 1 additions and 89 deletions
|
@ -312,37 +312,6 @@ functions directly.
|
|||
Single-key DES is insecure due to its short key size. ECB mode is
|
||||
not suitable for most applications; see L<des_modes(7)|des_modes(7)>.
|
||||
|
||||
=head1 HISTORY
|
||||
|
||||
In OpenSSL 0.9.7, all des_ functions were renamed to DES_ to avoid
|
||||
clashes with older versions of libdes. Compatibility des_ functions
|
||||
are provided for a short while, as well as crypt().
|
||||
Declarations for these are in <openssl/des_old.h>. There is no DES_
|
||||
variant for des_random_seed().
|
||||
This will happen to other functions
|
||||
as well if they are deemed redundant (des_random_seed() just calls
|
||||
RAND_seed() and is present for backward compatibility only), buggy or
|
||||
already scheduled for removal.
|
||||
|
||||
des_cbc_cksum(), des_cbc_encrypt(), des_ecb_encrypt(),
|
||||
des_is_weak_key(), des_key_sched(), des_pcbc_encrypt(),
|
||||
des_quad_cksum(), des_random_key() and des_string_to_key()
|
||||
are available in the MIT Kerberos library;
|
||||
des_check_key_parity(), des_fixup_key_parity() and des_is_weak_key()
|
||||
are available in newer versions of that library.
|
||||
|
||||
des_set_key_checked() and des_set_key_unchecked() were added in
|
||||
OpenSSL 0.9.5.
|
||||
|
||||
des_generate_random_block(), des_init_random_number_generator(),
|
||||
des_new_random_key(), des_set_random_generator_seed() and
|
||||
des_set_sequence_number() and des_rand_data() are used in newer
|
||||
versions of Kerberos but are not implemented here.
|
||||
|
||||
des_random_key() generated cryptographically weak random data in
|
||||
SSLeay and in OpenSSL prior version 0.9.5, as well as in the original
|
||||
MIT library.
|
||||
|
||||
=head1 AUTHOR
|
||||
|
||||
Eric Young (eay@cryptsoft.com). Modified for the OpenSSL project
|
||||
|
|
|
@ -1,57 +0,0 @@
|
|||
=pod
|
||||
|
||||
=head1 NAME
|
||||
|
||||
des_read_password, des_read_2passwords, des_read_pw_string, des_read_pw -
|
||||
Compatibility user interface functions
|
||||
|
||||
=head1 SYNOPSIS
|
||||
|
||||
#include <openssl/des_old.h>
|
||||
|
||||
int des_read_password(DES_cblock *key,const char *prompt,int verify);
|
||||
int des_read_2passwords(DES_cblock *key1,DES_cblock *key2,
|
||||
const char *prompt,int verify);
|
||||
|
||||
int des_read_pw_string(char *buf,int length,const char *prompt,int verify);
|
||||
int des_read_pw(char *buf,char *buff,int size,const char *prompt,int verify);
|
||||
|
||||
=head1 DESCRIPTION
|
||||
|
||||
The DES library contained a few routines to prompt for passwords. These
|
||||
aren't necessarely dependent on DES, and have therefore become part of the
|
||||
UI compatibility library.
|
||||
|
||||
des_read_pw() writes the string specified by I<prompt> to standard output
|
||||
turns echo off and reads an input string from the terminal. The string is
|
||||
returned in I<buf>, which must have spac for at least I<size> bytes.
|
||||
If I<verify> is set, the user is asked for the password twice and unless
|
||||
the two copies match, an error is returned. The second password is stored
|
||||
in I<buff>, which must therefore also be at least I<size> bytes. A return
|
||||
code of -1 indicates a system error, 1 failure due to use interaction, and
|
||||
0 is success. All other functions described here use des_read_pw() to do
|
||||
the work.
|
||||
|
||||
des_read_pw_string() is a variant of des_read_pw() that provides a buffer
|
||||
for you if I<verify> is set.
|
||||
|
||||
des_read_password() calls des_read_pw() and converts the password to a
|
||||
DES key by calling DES_string_to_key(); des_read_2password() operates in
|
||||
the same way as des_read_password() except that it generates two keys
|
||||
by using the DES_string_to_2key() function.
|
||||
|
||||
=head1 NOTES
|
||||
|
||||
des_read_pw_string() is available in the MIT Kerberos library as well, and
|
||||
is also available under the name EVP_read_pw_string().
|
||||
|
||||
=head1 SEE ALSO
|
||||
|
||||
L<ui(3)|ui(3)>, L<ui_create(3)|ui_create(3)>
|
||||
|
||||
=head1 AUTHOR
|
||||
|
||||
Richard Levitte (richard@levitte.org) for the OpenSSL project
|
||||
(http://www.openssl.org).
|
||||
|
||||
=cut
|
|
@ -281,7 +281,7 @@ my $crypto ="crypto/crypto.h";
|
|||
$crypto.=" crypto/cryptlib.h";
|
||||
$crypto.=" crypto/o_dir.h";
|
||||
$crypto.=" crypto/o_str.h";
|
||||
$crypto.=" crypto/des/des.h crypto/des/des_old.h" ; # unless $no_des;
|
||||
$crypto.=" crypto/des/des.h" ; # unless $no_des;
|
||||
$crypto.=" crypto/idea/idea.h" ; # unless $no_idea;
|
||||
$crypto.=" crypto/rc4/rc4.h" ; # unless $no_rc4;
|
||||
$crypto.=" crypto/rc5/rc5.h" ; # unless $no_rc5;
|
||||
|
|
Loading…
Reference in a new issue