diff options
author | tb <> | 2023-08-24 04:23:30 +0000 |
---|---|---|
committer | tb <> | 2023-08-24 04:23:30 +0000 |
commit | 851839832e584adcccd0414ca001abedc4e7fbc1 (patch) | |
tree | 9bea6f8832b1609bccbd0f2e7becb92eba3a8824 | |
parent | ad6399390fbfaeedc563dcb1dadf1888794a7c30 (diff) | |
download | openbsd-851839832e584adcccd0414ca001abedc4e7fbc1.tar.gz openbsd-851839832e584adcccd0414ca001abedc4e7fbc1.tar.bz2 openbsd-851839832e584adcccd0414ca001abedc4e7fbc1.zip |
Align the documentation of EVP_chacha20() with actual behavior
Incorrect OpenSSL documentation was moved here and inherited parts of a
comment that was fixed in evp/e_chacha.c r1.13. Adjust the manual page
accordingly.
Discussed with schwarze
-rw-r--r-- | src/lib/libcrypto/man/EVP_chacha20.3 | 12 |
1 files changed, 6 insertions, 6 deletions
diff --git a/src/lib/libcrypto/man/EVP_chacha20.3 b/src/lib/libcrypto/man/EVP_chacha20.3 index 0dcd7a14c2..55e730ec9c 100644 --- a/src/lib/libcrypto/man/EVP_chacha20.3 +++ b/src/lib/libcrypto/man/EVP_chacha20.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: EVP_chacha20.3,v 1.4 2023/08/23 13:46:42 schwarze Exp $ | 1 | .\" $OpenBSD: EVP_chacha20.3,v 1.5 2023/08/24 04:23:30 tb Exp $ |
2 | .\" full merge up to: OpenSSL 35fd9953 May 28 14:49:38 2019 +0200 | 2 | .\" full merge up to: OpenSSL 35fd9953 May 28 14:49:38 2019 +0200 |
3 | .\" | 3 | .\" |
4 | .\" This file is a derived work. | 4 | .\" This file is a derived work. |
@@ -65,7 +65,7 @@ | |||
65 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 65 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
66 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 66 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
67 | .\" | 67 | .\" |
68 | .Dd $Mdocdate: August 23 2023 $ | 68 | .Dd $Mdocdate: August 24 2023 $ |
69 | .Dt EVP_CHACHA20 3 | 69 | .Dt EVP_CHACHA20 3 |
70 | .Os | 70 | .Os |
71 | .Sh NAME | 71 | .Sh NAME |
@@ -93,11 +93,11 @@ argument of 16 bytes = 128 bits, internally using | |||
93 | .Xr ChaCha_set_key 3 | 93 | .Xr ChaCha_set_key 3 |
94 | and | 94 | and |
95 | .Xr ChaCha_set_iv 3 . | 95 | .Xr ChaCha_set_iv 3 . |
96 | Due to the symmetry of the internal cipher state, interpreting the | 96 | The lower 8 bytes = 64 bits of |
97 | .Fa iv | 97 | .Fa iv |
98 | argument as a 4 byte counter followed by a 12 byte nonce | 98 | are used as counter and the remaining 8 bytes are used as |
99 | or interpreting it as an 8 byte counter followed by an 8 byte nonce | 99 | the initialization vector of |
100 | is functionally equivalent. | 100 | .Xr ChaCha_set_iv 3 . |
101 | .Xr EVP_EncryptUpdate 3 , | 101 | .Xr EVP_EncryptUpdate 3 , |
102 | .Xr EVP_EncryptFinal_ex 3 , | 102 | .Xr EVP_EncryptFinal_ex 3 , |
103 | .Xr EVP_DecryptUpdate 3 , | 103 | .Xr EVP_DecryptUpdate 3 , |