diff options
author | Richard Levitte <levitte@openssl.org> | 2001-05-13 04:40:44 +0000 |
---|---|---|
committer | Richard Levitte <levitte@openssl.org> | 2001-05-13 04:40:44 +0000 |
commit | 56bb1a7c83f2c498f4cc308786a4f253e8a5d9b5 (patch) | |
tree | 9859f5d2973f9fab6d02ce21114b9ed9a19bb70d /crypto/des | |
parent | 96aaf806d8da234b7acc50a4822c4aff84d907bb (diff) | |
download | openssl-new-56bb1a7c83f2c498f4cc308786a4f253e8a5d9b5.tar.gz |
Move the password reading functions completely away from the DES
section.
Add ui_compat.h for inclusion by those who want the old functions and
provide all of them, not just the higher-level ones, in ui_compat.c.
Diffstat (limited to 'crypto/des')
-rw-r--r-- | crypto/des/des.h | 9 |
1 files changed, 0 insertions, 9 deletions
diff --git a/crypto/des/des.h b/crypto/des/des.h index 77c7505565..67ca1ff103 100644 --- a/crypto/des/des.h +++ b/crypto/des/des.h @@ -207,12 +207,6 @@ DES_LONG des_quad_cksum(const unsigned char *input,des_cblock output[], long length,int out_count,des_cblock *seed); void des_random_seed(des_cblock *key); int des_random_key(des_cblock *ret); -int des_read_password(des_cblock *key,const char *prompt,int verify); -int des_read_2passwords(des_cblock *key1,des_cblock *key2, - const char *prompt,int verify); -#if 0 -int des_read_pw_string(char *buf,int length,const char *prompt,int verify); -#endif void des_set_odd_parity(des_cblock *key); int des_check_key_parity(const_des_cblock *key); int des_is_weak_key(const_des_cblock *key); @@ -230,9 +224,6 @@ void des_cfb64_encrypt(const unsigned char *in,unsigned char *out,long length, int enc); void des_ofb64_encrypt(const unsigned char *in,unsigned char *out,long length, des_key_schedule schedule,des_cblock *ivec,int *num); -#if 0 -int des_read_pw(char *buf,char *buff,int size,const char *prompt,int verify); -#endif /* The following definitions provide compatibility with the MIT Kerberos * library. The des_key_schedule structure is not binary compatible. */ |