Print this page
3882 remove xmod & friends

@@ -107,12 +107,10 @@
 static BIG_ERR_CODE
 RSA_key_init(RSAkey *key, int psize, int qsize)
 {
         BIG_ERR_CODE err = BIG_OK;
 
-/* EXPORT DELETE START */
-
         int plen, qlen, nlen;
 
         plen = BITLEN2BIGNUMLEN(psize);
         qlen = BITLEN2BIGNUMLEN(qsize);
         nlen = plen + qlen;

@@ -161,21 +159,16 @@
 ret2:
         big_finish(&(key->q));
 ret1:
         big_finish(&(key->p));
 
-/* EXPORT DELETE END */
-
         return (err);
 }
 
 static void
 RSA_key_finish(RSAkey *key)
 {
-
-/* EXPORT DELETE START */
-
         big_finish(&(key->n_rr));
         big_finish(&(key->q_rr));
         big_finish(&(key->p_rr));
         big_finish(&(key->pinvmodq));
         big_finish(&(key->dmodqminus1));

@@ -183,13 +176,10 @@
         big_finish(&(key->e));
         big_finish(&(key->d));
         big_finish(&(key->n));
         big_finish(&(key->q));
         big_finish(&(key->p));
-
-/* EXPORT DELETE END */
-
 }
 
 /*
  * Generate RSA key
  */

@@ -197,12 +187,10 @@
 generate_rsa_key(RSAkey *key, int psize, int qsize, BIGNUM *pubexp,
     int (*rfunc)(void *, size_t))
 {
         CK_RV           rv = CKR_OK;
 
-/* EXPORT DELETE START */
-
         int             (*rf)(void *, size_t);
         BIGNUM          a, b, c, d, e, f, g, h;
         int             len, keylen, size;
         BIG_ERR_CODE    brv = BIG_OK;
 

@@ -377,12 +365,10 @@
         big_finish(&d);
         big_finish(&c);
         big_finish(&b);
         big_finish(&a);
 
-/* EXPORT DELETE END */
-
         return (rv);
 }
 
 CK_RV
 rsa_genkey_pair(RSAbytekey *bkey)

@@ -410,12 +396,10 @@
          * the coefficient are kept straight too.  This note is here to
          * make the reader aware of the switcheroo.
          */
         CK_RV   rv = CKR_OK;
 
-/* EXPORT DELETE START */
-
         BIGNUM  public_exponent = {0};
         RSAkey  rsakey;
         uint32_t modulus_bytes;
 
         if (bkey == NULL)

@@ -493,12 +477,10 @@
         bignum2bytestring(bkey->coeff, &(rsakey.pinvmodq), bkey->coeff_bytes);
 
 clean1:
         RSA_key_finish(&rsakey);
 
-/* EXPORT DELETE END */
-
         return (rv);
 }
 
 /*
  * RSA encrypt operation

@@ -506,12 +488,10 @@
 CK_RV
 rsa_encrypt(RSAbytekey *bkey, uchar_t *in, uint32_t in_len, uchar_t *out)
 {
         CK_RV rv = CKR_OK;
 
-/* EXPORT DELETE START */
-
         BIGNUM msg;
         RSAkey rsakey;
         uint32_t modulus_bytes;
 
         if (bkey == NULL)

@@ -564,12 +544,10 @@
 clean3:
         big_finish(&msg);
 clean2:
         RSA_key_finish(&rsakey);
 
-/* EXPORT DELETE END */
-
         return (rv);
 }
 
 /*
  * RSA decrypt operation

@@ -577,12 +555,10 @@
 CK_RV
 rsa_decrypt(RSAbytekey *bkey, uchar_t *in, uint32_t in_len, uchar_t *out)
 {
         CK_RV rv = CKR_OK;
 
-/* EXPORT DELETE START */
-
         BIGNUM msg;
         RSAkey rsakey;
         uint32_t modulus_bytes;
 
         if (bkey == NULL)

@@ -653,9 +629,7 @@
 clean4:
         big_finish(&msg);
 clean3:
         RSA_key_finish(&rsakey);
 
-/* EXPORT DELETE END */
-
         return (rv);
 }