@@ -494,42 +494,6 @@ ossl_rsa_verify_pss(int argc, VALUE *argv, VALUE self)
494494 ossl_raise (eRSAError , NULL );
495495}
496496
497- /*
498- * call-seq:
499- * rsa.params => hash
500- *
501- * THIS METHOD IS INSECURE, PRIVATE INFORMATION CAN LEAK OUT!!!
502- *
503- * Stores all parameters of key to the hash. The hash has keys 'n', 'e', 'd',
504- * 'p', 'q', 'dmp1', 'dmq1', 'iqmp'.
505- *
506- * Don't use :-)) (It's up to you)
507- */
508- static VALUE
509- ossl_rsa_get_params (VALUE self )
510- {
511- OSSL_3_const RSA * rsa ;
512- VALUE hash ;
513- const BIGNUM * n , * e , * d , * p , * q , * dmp1 , * dmq1 , * iqmp ;
514-
515- GetRSA (self , rsa );
516- RSA_get0_key (rsa , & n , & e , & d );
517- RSA_get0_factors (rsa , & p , & q );
518- RSA_get0_crt_params (rsa , & dmp1 , & dmq1 , & iqmp );
519-
520- hash = rb_hash_new ();
521- rb_hash_aset (hash , rb_str_new2 ("n" ), ossl_bn_new (n ));
522- rb_hash_aset (hash , rb_str_new2 ("e" ), ossl_bn_new (e ));
523- rb_hash_aset (hash , rb_str_new2 ("d" ), ossl_bn_new (d ));
524- rb_hash_aset (hash , rb_str_new2 ("p" ), ossl_bn_new (p ));
525- rb_hash_aset (hash , rb_str_new2 ("q" ), ossl_bn_new (q ));
526- rb_hash_aset (hash , rb_str_new2 ("dmp1" ), ossl_bn_new (dmp1 ));
527- rb_hash_aset (hash , rb_str_new2 ("dmq1" ), ossl_bn_new (dmq1 ));
528- rb_hash_aset (hash , rb_str_new2 ("iqmp" ), ossl_bn_new (iqmp ));
529-
530- return hash ;
531- }
532-
533497/*
534498 * Document-method: OpenSSL::PKey::RSA#set_key
535499 * call-seq:
@@ -617,8 +581,6 @@ Init_ossl_rsa(void)
617581 rb_define_method (cRSA , "set_factors" , ossl_rsa_set_factors , 2 );
618582 rb_define_method (cRSA , "set_crt_params" , ossl_rsa_set_crt_params , 3 );
619583
620- rb_define_method (cRSA , "params" , ossl_rsa_get_params , 0 );
621-
622584/*
623585 * TODO: Test it
624586 rb_define_method(cRSA, "blinding_on!", ossl_rsa_blinding_on, 0);
0 commit comments