diff options
| author | schwarze <> | 2019-03-19 19:50:03 +0000 |
|---|---|---|
| committer | schwarze <> | 2019-03-19 19:50:03 +0000 |
| commit | 412142b91f2f6730589c7a4c88c8d98eef86ad71 (patch) | |
| tree | b722f67c61a07d31b7ddff717cead257db8bfca0 | |
| parent | 1517415bce5f040c30f534901ec426684cfa80a4 (diff) | |
| download | openbsd-412142b91f2f6730589c7a4c88c8d98eef86ad71.tar.gz openbsd-412142b91f2f6730589c7a4c88c8d98eef86ad71.tar.bz2 openbsd-412142b91f2f6730589c7a4c88c8d98eef86ad71.zip | |
Document the flag EVP_CIPHER_CTX_FLAG_WRAP_ALLOW needed for the EVP
AES wrap modes, the function EVP_CIPHER_CTX_set_flags(3) needed to
set it, and the companion functions EVP_CIPHER_CTX_clear_flags(3)
and EVP_CIPHER_CTX_test_flags(3).
With help and an OK from tb@.
Diffstat (limited to '')
| -rw-r--r-- | src/lib/libcrypto/man/EVP_EncryptInit.3 | 46 | ||||
| -rw-r--r-- | src/lib/libcrypto/man/EVP_aes_128_cbc.3 | 29 |
2 files changed, 71 insertions, 4 deletions
diff --git a/src/lib/libcrypto/man/EVP_EncryptInit.3 b/src/lib/libcrypto/man/EVP_EncryptInit.3 index 10d30c4cf0..bb2457d9e0 100644 --- a/src/lib/libcrypto/man/EVP_EncryptInit.3 +++ b/src/lib/libcrypto/man/EVP_EncryptInit.3 | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | .\" $OpenBSD: EVP_EncryptInit.3,v 1.28 2019/03/18 11:38:16 schwarze Exp $ | 1 | .\" $OpenBSD: EVP_EncryptInit.3,v 1.29 2019/03/19 19:50:03 schwarze Exp $ |
| 2 | .\" full merge up to: OpenSSL 5211e094 Nov 11 14:39:11 2014 -0800 | 2 | .\" full merge up to: OpenSSL 5211e094 Nov 11 14:39:11 2014 -0800 |
| 3 | .\" selective merge up to: OpenSSL 16cfc2c9 Mar 8 22:30:28 2018 +0100 | 3 | .\" selective merge up to: OpenSSL 16cfc2c9 Mar 8 22:30:28 2018 +0100 |
| 4 | .\" | 4 | .\" |
| @@ -51,7 +51,7 @@ | |||
| 51 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 51 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
| 52 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 52 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
| 53 | .\" | 53 | .\" |
| 54 | .Dd $Mdocdate: March 18 2019 $ | 54 | .Dd $Mdocdate: March 19 2019 $ |
| 55 | .Dt EVP_ENCRYPTINIT 3 | 55 | .Dt EVP_ENCRYPTINIT 3 |
| 56 | .Os | 56 | .Os |
| 57 | .Sh NAME | 57 | .Sh NAME |
| @@ -75,6 +75,9 @@ | |||
| 75 | .Nm EVP_DecryptFinal , | 75 | .Nm EVP_DecryptFinal , |
| 76 | .Nm EVP_CipherInit , | 76 | .Nm EVP_CipherInit , |
| 77 | .Nm EVP_CipherFinal , | 77 | .Nm EVP_CipherFinal , |
| 78 | .Nm EVP_CIPHER_CTX_set_flags , | ||
| 79 | .Nm EVP_CIPHER_CTX_clear_flags , | ||
| 80 | .Nm EVP_CIPHER_CTX_test_flags , | ||
| 78 | .Nm EVP_CIPHER_CTX_set_padding , | 81 | .Nm EVP_CIPHER_CTX_set_padding , |
| 79 | .Nm EVP_CIPHER_CTX_set_key_length , | 82 | .Nm EVP_CIPHER_CTX_set_key_length , |
| 80 | .Nm EVP_CIPHER_CTX_ctrl , | 83 | .Nm EVP_CIPHER_CTX_ctrl , |
| @@ -267,6 +270,21 @@ | |||
| 267 | .Fa "unsigned char *outm" | 270 | .Fa "unsigned char *outm" |
| 268 | .Fa "int *outl" | 271 | .Fa "int *outl" |
| 269 | .Fc | 272 | .Fc |
| 273 | .Ft void | ||
| 274 | .Fo EVP_CIPHER_CTX_set_flags | ||
| 275 | .Fa "EVP_CIPHER_CTX *ctx" | ||
| 276 | .Fa "int flags" | ||
| 277 | .Fc | ||
| 278 | .Ft void | ||
| 279 | .Fo EVP_CIPHER_CTX_clear_flags | ||
| 280 | .Fa "EVP_CIPHER_CTX *ctx" | ||
| 281 | .Fa "int flags" | ||
| 282 | .Fc | ||
| 283 | .Ft int | ||
| 284 | .Fo EVP_CIPHER_CTX_test_flags | ||
| 285 | .Fa "EVP_CIPHER_CTX *ctx" | ||
| 286 | .Fa "int flags" | ||
| 287 | .Fc | ||
| 270 | .Ft int | 288 | .Ft int |
| 271 | .Fo EVP_CIPHER_CTX_set_padding | 289 | .Fo EVP_CIPHER_CTX_set_padding |
| 272 | .Fa "EVP_CIPHER_CTX *x" | 290 | .Fa "EVP_CIPHER_CTX *x" |
| @@ -595,6 +613,30 @@ structure. | |||
| 595 | The actual NID value is an internal value which may not have a | 613 | The actual NID value is an internal value which may not have a |
| 596 | corresponding OBJECT IDENTIFIER. | 614 | corresponding OBJECT IDENTIFIER. |
| 597 | .Pp | 615 | .Pp |
| 616 | .Fn EVP_CIPHER_CTX_set_flags | ||
| 617 | enables the given | ||
| 618 | .Fa flags | ||
| 619 | in | ||
| 620 | .Fa ctx . | ||
| 621 | .Fn EVP_CIPHER_CTX_clear_flags | ||
| 622 | disables the given | ||
| 623 | .Fa flags | ||
| 624 | in | ||
| 625 | .Fa ctx . | ||
| 626 | .Fn EVP_CIPHER_CTX_test_flags | ||
| 627 | checks whether any of the given | ||
| 628 | .Fa flags | ||
| 629 | are currently set in | ||
| 630 | .Fa ctx , | ||
| 631 | returning the subset of the | ||
| 632 | .Fa flags | ||
| 633 | that are set, or 0 if none of them are set. | ||
| 634 | Currently, the only supported cipher context flag is | ||
| 635 | .Dv EVP_CIPHER_CTX_FLAG_WRAP_ALLOW ; | ||
| 636 | see | ||
| 637 | .Xr EVP_aes_128_wrap 3 | ||
| 638 | for details. | ||
| 639 | .Pp | ||
| 598 | .Fn EVP_CIPHER_CTX_set_padding | 640 | .Fn EVP_CIPHER_CTX_set_padding |
| 599 | enables or disables padding. | 641 | enables or disables padding. |
| 600 | This function should be called after the context is set up for | 642 | This function should be called after the context is set up for |
diff --git a/src/lib/libcrypto/man/EVP_aes_128_cbc.3 b/src/lib/libcrypto/man/EVP_aes_128_cbc.3 index 8c01f07f55..be8e5ff75b 100644 --- a/src/lib/libcrypto/man/EVP_aes_128_cbc.3 +++ b/src/lib/libcrypto/man/EVP_aes_128_cbc.3 | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | .\" $OpenBSD: EVP_aes_128_cbc.3,v 1.1 2019/03/18 11:38:16 schwarze Exp $ | 1 | .\" $OpenBSD: EVP_aes_128_cbc.3,v 1.2 2019/03/19 19:50:03 schwarze Exp $ |
| 2 | .\" selective merge up to: OpenSSL 7c6d372a Nov 20 13:20:01 2018 +0000 | 2 | .\" selective merge up to: OpenSSL 7c6d372a Nov 20 13:20:01 2018 +0000 |
| 3 | .\" | 3 | .\" |
| 4 | .\" This file was written by Ronald Tse <ronald.tse@ribose.com> | 4 | .\" This file was written by Ronald Tse <ronald.tse@ribose.com> |
| @@ -48,7 +48,7 @@ | |||
| 48 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 48 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
| 49 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 49 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
| 50 | .\" | 50 | .\" |
| 51 | .Dd $Mdocdate: March 18 2019 $ | 51 | .Dd $Mdocdate: March 19 2019 $ |
| 52 | .Dt EVP_AES_128_CBC 3 | 52 | .Dt EVP_AES_128_CBC 3 |
| 53 | .Os | 53 | .Os |
| 54 | .Sh NAME | 54 | .Sh NAME |
| @@ -237,6 +237,31 @@ and | |||
| 237 | .Fn EVP_aes_256_wrap | 237 | .Fn EVP_aes_256_wrap |
| 238 | provide AES key wrap with 128, 192 and 256 bit keys | 238 | provide AES key wrap with 128, 192 and 256 bit keys |
| 239 | according to RFC 3394 section 2.2.1 ("wrap"). | 239 | according to RFC 3394 section 2.2.1 ("wrap"). |
| 240 | When the returned | ||
| 241 | .Vt EVP_CIPHER | ||
| 242 | object is later passed to | ||
| 243 | .Xr EVP_CipherInit_ex 3 , | ||
| 244 | .Xr EVP_EncryptInit_ex 3 , | ||
| 245 | or | ||
| 246 | .Xr EVP_DecryptInit_ex 3 | ||
| 247 | together with an | ||
| 248 | .Vt EVP_CIPHER_CTX | ||
| 249 | object, the flag | ||
| 250 | .Dv EVP_CIPHER_CTX_FLAG_WRAP_ALLOW | ||
| 251 | must have been set in the | ||
| 252 | .Vt EVP_CIPHER_CTX | ||
| 253 | using | ||
| 254 | .Xr EVP_CIPHER_CTX_set_flags 3 . | ||
| 255 | Otherwise, or when passing the returned | ||
| 256 | .Vt EVP_CIPHER | ||
| 257 | object to | ||
| 258 | .Xr EVP_CipherInit 3 , | ||
| 259 | .Xr EVP_EncryptInit 3 , | ||
| 260 | or | ||
| 261 | .Xr EVP_DecryptInit 3 , | ||
| 262 | initialization fails with a | ||
| 263 | .Dq wrap not allowed | ||
| 264 | error. | ||
| 240 | .Pp | 265 | .Pp |
| 241 | .Fn EVP_aes_128_xts | 266 | .Fn EVP_aes_128_xts |
| 242 | and | 267 | and |
