diff options
author | jmc <> | 2020-06-24 18:15:00 +0000 |
---|---|---|
committer | jmc <> | 2020-06-24 18:15:00 +0000 |
commit | 7cf633fcec3c8fa2f0cf16458c93b1b4f7cd4b2c (patch) | |
tree | b93cb160b6b844ab6508bbea31a84a5b0a09cae8 | |
parent | dd53a681ba46ce20012e28fb7cac84550523b4c0 (diff) | |
download | openbsd-7cf633fcec3c8fa2f0cf16458c93b1b4f7cd4b2c.tar.gz openbsd-7cf633fcec3c8fa2f0cf16458c93b1b4f7cd4b2c.tar.bz2 openbsd-7cf633fcec3c8fa2f0cf16458c93b1b4f7cd4b2c.zip |
use n-bit <noun> consistently; ok schwarze for the principal of the idea,
and for flagging which pages to check;
-rw-r--r-- | src/lib/libcrypto/man/BN_generate_prime.3 | 6 | ||||
-rw-r--r-- | src/lib/libcrypto/man/CMS_add1_signer.3 | 10 | ||||
-rw-r--r-- | src/lib/libcrypto/man/CMS_sign.3 | 10 | ||||
-rw-r--r-- | src/lib/libcrypto/man/ChaCha.3 | 12 | ||||
-rw-r--r-- | src/lib/libcrypto/man/EVP_aes_128_cbc.3 | 12 | ||||
-rw-r--r-- | src/lib/libcrypto/man/EVP_camellia_128_cbc.3 | 6 |
6 files changed, 28 insertions, 28 deletions
diff --git a/src/lib/libcrypto/man/BN_generate_prime.3 b/src/lib/libcrypto/man/BN_generate_prime.3 index 7db27fd627..764ea6f873 100644 --- a/src/lib/libcrypto/man/BN_generate_prime.3 +++ b/src/lib/libcrypto/man/BN_generate_prime.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: BN_generate_prime.3,v 1.18 2019/08/25 19:24:00 schwarze Exp $ | 1 | .\" $OpenBSD: BN_generate_prime.3,v 1.19 2020/06/24 18:15:00 jmc Exp $ |
2 | .\" full merge up to: OpenSSL f987a4dd Jun 27 10:12:08 2019 +0200 | 2 | .\" full merge up to: OpenSSL f987a4dd Jun 27 10:12:08 2019 +0200 |
3 | .\" | 3 | .\" |
4 | .\" This file was written by Ulf Moeller <ulf@openssl.org> | 4 | .\" This file was written by Ulf Moeller <ulf@openssl.org> |
@@ -50,7 +50,7 @@ | |||
50 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 50 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
51 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 51 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
52 | .\" | 52 | .\" |
53 | .Dd $Mdocdate: August 25 2019 $ | 53 | .Dd $Mdocdate: June 24 2020 $ |
54 | .Dt BN_GENERATE_PRIME 3 | 54 | .Dt BN_GENERATE_PRIME 3 |
55 | .Os | 55 | .Os |
56 | .Sh NAME | 56 | .Sh NAME |
@@ -262,7 +262,7 @@ When the source of the prime is not random or not trusted, the | |||
262 | number of checks needs to be much higher to reach the same level | 262 | number of checks needs to be much higher to reach the same level |
263 | of assurance: It should equal half of the targeted security level | 263 | of assurance: It should equal half of the targeted security level |
264 | in bits (rounded up to the next integer if necessary). | 264 | in bits (rounded up to the next integer if necessary). |
265 | For instance, to reach the 128 bit security level, | 265 | For instance, to reach the 128-bit security level, |
266 | .Fa nchecks | 266 | .Fa nchecks |
267 | should be set to 64. | 267 | should be set to 64. |
268 | .Pp | 268 | .Pp |
diff --git a/src/lib/libcrypto/man/CMS_add1_signer.3 b/src/lib/libcrypto/man/CMS_add1_signer.3 index 7f8183f93f..9ee97dfaf4 100644 --- a/src/lib/libcrypto/man/CMS_add1_signer.3 +++ b/src/lib/libcrypto/man/CMS_add1_signer.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: CMS_add1_signer.3,v 1.7 2019/11/02 15:39:46 schwarze Exp $ | 1 | .\" $OpenBSD: CMS_add1_signer.3,v 1.8 2020/06/24 18:15:00 jmc Exp $ |
2 | .\" full merge up to: OpenSSL e9b77246 Jan 20 19:58:49 2017 +0100 | 2 | .\" full merge up to: OpenSSL e9b77246 Jan 20 19:58:49 2017 +0100 |
3 | .\" | 3 | .\" |
4 | .\" This file is a derived work. | 4 | .\" This file is a derived work. |
@@ -65,7 +65,7 @@ | |||
65 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 65 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
66 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 66 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
67 | .\" | 67 | .\" |
68 | .Dd $Mdocdate: November 2 2019 $ | 68 | .Dd $Mdocdate: June 24 2020 $ |
69 | .Dt CMS_ADD1_SIGNER 3 | 69 | .Dt CMS_ADD1_SIGNER 3 |
70 | .Os | 70 | .Os |
71 | .Sh NAME | 71 | .Sh NAME |
@@ -196,9 +196,9 @@ By default, issuer name and serial number are used instead. | |||
196 | If present, the | 196 | If present, the |
197 | .Vt SMIMECapabilities | 197 | .Vt SMIMECapabilities |
198 | attribute indicates support for the | 198 | attribute indicates support for the |
199 | following algorithms in preference order: 256 bit AES, Gost R3411-94, | 199 | following algorithms in preference order: 256-bit AES, Gost R3411-94, |
200 | Gost 28147-89, 192 bit AES, 128 bit AES, triple DES, 128 bit RC2, 64 bit | 200 | Gost 28147-89, 192-bit AES, 128-bit AES, triple DES, 128-bit RC2, 64-bit |
201 | RC2, DES and 40 bit RC2. | 201 | RC2, DES and 40-bit RC2. |
202 | If any of these algorithms is not available then it will not be | 202 | If any of these algorithms is not available then it will not be |
203 | included. | 203 | included. |
204 | .Pp | 204 | .Pp |
diff --git a/src/lib/libcrypto/man/CMS_sign.3 b/src/lib/libcrypto/man/CMS_sign.3 index f8cae4018d..64461959dd 100644 --- a/src/lib/libcrypto/man/CMS_sign.3 +++ b/src/lib/libcrypto/man/CMS_sign.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: CMS_sign.3,v 1.8 2019/11/02 15:39:46 schwarze Exp $ | 1 | .\" $OpenBSD: CMS_sign.3,v 1.9 2020/06/24 18:15:00 jmc Exp $ |
2 | .\" full merge up to: OpenSSL e9b77246 Jan 20 19:58:49 2017 +0100 | 2 | .\" full merge up to: OpenSSL e9b77246 Jan 20 19:58:49 2017 +0100 |
3 | .\" | 3 | .\" |
4 | .\" This file was written by Dr. Stephen Henson <steve@openssl.org>. | 4 | .\" This file was written by Dr. Stephen Henson <steve@openssl.org>. |
@@ -48,7 +48,7 @@ | |||
48 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 48 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
49 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 49 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
50 | .\" | 50 | .\" |
51 | .Dd $Mdocdate: November 2 2019 $ | 51 | .Dd $Mdocdate: June 24 2020 $ |
52 | .Dt CMS_SIGN 3 | 52 | .Dt CMS_SIGN 3 |
53 | .Os | 53 | .Os |
54 | .Sh NAME | 54 | .Sh NAME |
@@ -127,9 +127,9 @@ attribute. | |||
127 | Omit just the | 127 | Omit just the |
128 | .Vt SMIMECapabilities . | 128 | .Vt SMIMECapabilities . |
129 | If present, the SMIMECapabilities attribute indicates support for the | 129 | If present, the SMIMECapabilities attribute indicates support for the |
130 | following algorithms in preference order: 256 bit AES, Gost R3411-94, | 130 | following algorithms in preference order: 256-bit AES, Gost R3411-94, |
131 | Gost 28147-89, 192 bit AES, 128 bit AES, triple DES, 128 bit RC2, 64 bit | 131 | Gost 28147-89, 192-bit AES, 128-bit AES, triple DES, 128-bit RC2, 64-bit |
132 | RC2, DES and 40 bit RC2. | 132 | RC2, DES and 40-bit RC2. |
133 | If any of these algorithms is not available, then it will not be | 133 | If any of these algorithms is not available, then it will not be |
134 | included. | 134 | included. |
135 | .It Dv CMS_USE_KEYID | 135 | .It Dv CMS_USE_KEYID |
diff --git a/src/lib/libcrypto/man/ChaCha.3 b/src/lib/libcrypto/man/ChaCha.3 index 909d8ca77d..6b037f80ad 100644 --- a/src/lib/libcrypto/man/ChaCha.3 +++ b/src/lib/libcrypto/man/ChaCha.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: ChaCha.3,v 1.1 2020/06/24 17:00:38 schwarze Exp $ | 1 | .\" $OpenBSD: ChaCha.3,v 1.2 2020/06/24 18:15:00 jmc Exp $ |
2 | .\" | 2 | .\" |
3 | .\" Copyright (c) 2020 Ingo Schwarze <schwarze@openbsd.org> | 3 | .\" Copyright (c) 2020 Ingo Schwarze <schwarze@openbsd.org> |
4 | .\" | 4 | .\" |
@@ -71,7 +71,7 @@ | |||
71 | .Fc | 71 | .Fc |
72 | .Sh DESCRIPTION | 72 | .Sh DESCRIPTION |
73 | These functions provide a low-level implementation | 73 | These functions provide a low-level implementation |
74 | of the ChaCha stream cipher with 256 and 128 bit keys. | 74 | of the ChaCha stream cipher with 256 and 128-bit keys. |
75 | The number of rounds is hardcoded to 20; | 75 | The number of rounds is hardcoded to 20; |
76 | variants with 8 or 12 rounds are not supported. | 76 | variants with 8 or 12 rounds are not supported. |
77 | .Pp | 77 | .Pp |
@@ -216,16 +216,16 @@ from the first two thirds of | |||
216 | RFC 8439: ChaCha20 and Poly1305 for IETF Protocols | 216 | RFC 8439: ChaCha20 and Poly1305 for IETF Protocols |
217 | .Pp | 217 | .Pp |
218 | Note that the standard specifies | 218 | Note that the standard specifies |
219 | a 32 bit counter and a 96 bit initialization vector whereas | 219 | a 32-bit counter and a 96-bit initialization vector whereas |
220 | this implementation follows Bernstein's original specification | 220 | this implementation follows Bernstein's original specification |
221 | and uses a 64 bit counter and a 64 bit initialization vector. | 221 | and uses a 64-bit counter and a 64-bit initialization vector. |
222 | .Pp | 222 | .Pp |
223 | These functions are specific to LibreSSL and not provided by OpenSSL. | 223 | These functions are specific to LibreSSL and not provided by OpenSSL. |
224 | BoringSSL does provide | 224 | BoringSSL does provide |
225 | .Fn CRYPTO_chacha_20 , | 225 | .Fn CRYPTO_chacha_20 , |
226 | but with an incompatible interface, taking a 96 bit | 226 | but with an incompatible interface, taking a 96-bit |
227 | .Fa iv | 227 | .Fa iv |
228 | and a 32 bit | 228 | and a 32-bit |
229 | .Fa counter . | 229 | .Fa counter . |
230 | .Sh HISTORY | 230 | .Sh HISTORY |
231 | .Fn ChaCha_set_key , | 231 | .Fn ChaCha_set_key , |
diff --git a/src/lib/libcrypto/man/EVP_aes_128_cbc.3 b/src/lib/libcrypto/man/EVP_aes_128_cbc.3 index f25df8c7eb..ac63f7f1f2 100644 --- a/src/lib/libcrypto/man/EVP_aes_128_cbc.3 +++ b/src/lib/libcrypto/man/EVP_aes_128_cbc.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: EVP_aes_128_cbc.3,v 1.3 2019/08/28 10:37:42 schwarze Exp $ | 1 | .\" $OpenBSD: EVP_aes_128_cbc.3,v 1.4 2020/06/24 18:15:00 jmc Exp $ |
2 | .\" selective merge up to: OpenSSL 7c6d372a Nov 20 13:20:01 2018 +0000 | 2 | .\" selective merge up to: OpenSSL 7c6d372a Nov 20 13:20:01 2018 +0000 |
3 | .\" | 3 | .\" |
4 | .\" This file was written by Ronald Tse <ronald.tse@ribose.com> | 4 | .\" This file was written by Ronald Tse <ronald.tse@ribose.com> |
@@ -48,7 +48,7 @@ | |||
48 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 48 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
49 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 49 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
50 | .\" | 50 | .\" |
51 | .Dd $Mdocdate: August 28 2019 $ | 51 | .Dd $Mdocdate: June 24 2020 $ |
52 | .Dt EVP_AES_128_CBC 3 | 52 | .Dt EVP_AES_128_CBC 3 |
53 | .Os | 53 | .Os |
54 | .Sh NAME | 54 | .Sh NAME |
@@ -193,7 +193,7 @@ framework. | |||
193 | .Fn EVP_aes_192_ofb , | 193 | .Fn EVP_aes_192_ofb , |
194 | and | 194 | and |
195 | .Fn EVP_aes_256_ofb | 195 | .Fn EVP_aes_256_ofb |
196 | provide AES for 128, 192, and 256 bit keys in the following modes: | 196 | provide AES for 128, 192, and 256-bit keys in the following modes: |
197 | CBC, CFB with 1-bit shift, CFB with 8-bit shift, CFB with 128-bit shift, | 197 | CBC, CFB with 1-bit shift, CFB with 8-bit shift, CFB with 128-bit shift, |
198 | CTR, ECB, and OFB. | 198 | CTR, ECB, and OFB. |
199 | .Pp | 199 | .Pp |
@@ -211,7 +211,7 @@ and | |||
211 | and | 211 | and |
212 | .Fn EVP_aes_256_cbc_hmac_sha1 | 212 | .Fn EVP_aes_256_cbc_hmac_sha1 |
213 | provide authenticated encryption with AES in CBC mode using SHA-1 as HMAC, | 213 | provide authenticated encryption with AES in CBC mode using SHA-1 as HMAC, |
214 | with keys of 128 and 256 bits length respectively. | 214 | with keys of 128 and 256-bit length respectively. |
215 | The authentication tag is 160 bits long. | 215 | The authentication tag is 160 bits long. |
216 | This is not intended for usage outside of TLS and requires | 216 | This is not intended for usage outside of TLS and requires |
217 | calling of some undocumented control functions. | 217 | calling of some undocumented control functions. |
@@ -224,7 +224,7 @@ These ciphers do not conform to the EVP AEAD interface. | |||
224 | .Fn EVP_aes_192_gcm , | 224 | .Fn EVP_aes_192_gcm , |
225 | and | 225 | and |
226 | .Fn EVP_aes_256_gcm | 226 | .Fn EVP_aes_256_gcm |
227 | provide AES for 128, 192 and 256 bit keys in CBC-MAC Mode (CCM) | 227 | provide AES for 128, 192 and 256-bit keys in CBC-MAC Mode (CCM) |
228 | and Galois Counter Mode (GCM), respectively. | 228 | and Galois Counter Mode (GCM), respectively. |
229 | These ciphers require additional control operations to function | 229 | These ciphers require additional control operations to function |
230 | correctly; see | 230 | correctly; see |
@@ -235,7 +235,7 @@ for details. | |||
235 | .Fn EVP_aes_192_wrap , | 235 | .Fn EVP_aes_192_wrap , |
236 | and | 236 | and |
237 | .Fn EVP_aes_256_wrap | 237 | .Fn EVP_aes_256_wrap |
238 | provide AES key wrap with 128, 192 and 256 bit keys | 238 | provide AES key wrap with 128, 192 and 256-bit keys |
239 | according to RFC 3394 section 2.2.1 ("wrap"). | 239 | according to RFC 3394 section 2.2.1 ("wrap"). |
240 | When the returned | 240 | When the returned |
241 | .Vt EVP_CIPHER | 241 | .Vt EVP_CIPHER |
diff --git a/src/lib/libcrypto/man/EVP_camellia_128_cbc.3 b/src/lib/libcrypto/man/EVP_camellia_128_cbc.3 index dd7f15d86c..190247a68b 100644 --- a/src/lib/libcrypto/man/EVP_camellia_128_cbc.3 +++ b/src/lib/libcrypto/man/EVP_camellia_128_cbc.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: EVP_camellia_128_cbc.3,v 1.1 2019/03/21 14:15:13 schwarze Exp $ | 1 | .\" $OpenBSD: EVP_camellia_128_cbc.3,v 1.2 2020/06/24 18:15:00 jmc Exp $ |
2 | .\" selective merge up to: OpenSSL 7c6d372a Nov 20 13:20:01 2018 +0000 | 2 | .\" selective merge up to: OpenSSL 7c6d372a Nov 20 13:20:01 2018 +0000 |
3 | .\" | 3 | .\" |
4 | .\" This file was written by Ronald Tse <ronald.tse@ribose.com> | 4 | .\" This file was written by Ronald Tse <ronald.tse@ribose.com> |
@@ -48,7 +48,7 @@ | |||
48 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 48 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
49 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 49 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
50 | .\" | 50 | .\" |
51 | .Dd $Mdocdate: March 21 2019 $ | 51 | .Dd $Mdocdate: June 24 2020 $ |
52 | .Dt EVP_CAMELLIA_128_CBC 3 | 52 | .Dt EVP_CAMELLIA_128_CBC 3 |
53 | .Os | 53 | .Os |
54 | .Sh NAME | 54 | .Sh NAME |
@@ -122,7 +122,7 @@ | |||
122 | These functions provide the Camellia encryption algorithm in the | 122 | These functions provide the Camellia encryption algorithm in the |
123 | .Xr evp 3 | 123 | .Xr evp 3 |
124 | framework. | 124 | framework. |
125 | They use 128, 192, and 256 bit keys in the following modes, respectively: | 125 | They use 128, 192, and 256-bit keys in the following modes, respectively: |
126 | CBC, CFB with 1-bit shift, CFB with 8-bit shift, CFB with 128-bit shift, | 126 | CBC, CFB with 1-bit shift, CFB with 8-bit shift, CFB with 128-bit shift, |
127 | ECB, and OFB. | 127 | ECB, and OFB. |
128 | .Pp | 128 | .Pp |