summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorschwarze <>2023-12-01 13:43:37 +0000
committerschwarze <>2023-12-01 13:43:37 +0000
commitd7c994996291e4875609e88e2210316c1e01dd88 (patch)
treed2f56841bbda1141f09614cb8d443f9c04f3d6a5
parentb96a4b784440cf187468037ed3da35454f5567e6 (diff)
downloadopenbsd-d7c994996291e4875609e88e2210316c1e01dd88.tar.gz
openbsd-d7c994996291e4875609e88e2210316c1e01dd88.tar.bz2
openbsd-d7c994996291e4875609e88e2210316c1e01dd88.zip
Some cleanup:
Remove some lies and some irrelevant historical information about the non_ex variants and waste fewer words deprecating them. Telling people to type longer function names and to pass an ignored NULL argument doesn't really help anything. Also talk less about those ignored ENGINE arguments. OK tb@
-rw-r--r--src/lib/libcrypto/man/EVP_EncryptInit.3104
1 files changed, 33 insertions, 71 deletions
diff --git a/src/lib/libcrypto/man/EVP_EncryptInit.3 b/src/lib/libcrypto/man/EVP_EncryptInit.3
index 8fc615b07e..7deabe92c1 100644
--- a/src/lib/libcrypto/man/EVP_EncryptInit.3
+++ b/src/lib/libcrypto/man/EVP_EncryptInit.3
@@ -1,4 +1,4 @@
1.\" $OpenBSD: EVP_EncryptInit.3,v 1.49 2023/12/01 10:40:21 schwarze Exp $ 1.\" $OpenBSD: EVP_EncryptInit.3,v 1.50 2023/12/01 13:43:37 schwarze Exp $
2.\" full merge up to: OpenSSL 5211e094 Nov 11 14:39:11 2014 -0800 2.\" full merge up to: OpenSSL 5211e094 Nov 11 14:39:11 2014 -0800
3.\" EVP_bf_cbc.pod EVP_cast5_cbc.pod EVP_idea_cbc.pod EVP_rc2_cbc.pod 3.\" EVP_bf_cbc.pod EVP_cast5_cbc.pod EVP_idea_cbc.pod EVP_rc2_cbc.pod
4.\" 7c6d372a Nov 20 13:20:01 2018 +0000 4.\" 7c6d372a Nov 20 13:20:01 2018 +0000
@@ -308,15 +308,13 @@ to
308.Fa out , 308.Fa out ,
309except that the 309except that the
310.Vt EVP_CIPHER 310.Vt EVP_CIPHER
311and 311object used by
312.Vt ENGINE
313objects used by
314.Fa in 312.Fa in
315and any application specific data set with 313and any application specific data set with
316.Xr EVP_CIPHER_CTX_set_app_data 3 314.Xr EVP_CIPHER_CTX_set_app_data 3
317are not copied and 315are not copied and
318.Fa out 316.Fa out
319will point to the same three objects. 317will point to the same two objects.
320The algorithm- and implementation-specific cipher data described in 318The algorithm- and implementation-specific cipher data described in
321.Xr EVP_CIPHER_CTX_get_cipher_data 3 319.Xr EVP_CIPHER_CTX_get_cipher_data 3
322is copied with 320is copied with
@@ -346,28 +344,27 @@ are used by some of the ciphers documented in the
346.Xr EVP_aes_256_gcm 3 344.Xr EVP_aes_256_gcm 3
347manual page. 345manual page.
348.Pp 346.Pp
347.Fn EVP_EncryptInit
348and
349.Fn EVP_EncryptInit_ex 349.Fn EVP_EncryptInit_ex
350sets up the cipher context 350set up the cipher context
351.Fa ctx 351.Fa ctx
352for encryption with cipher 352for encryption with cipher
353.Fa type 353.Fa type .
354from
355.Vt ENGINE
356.Fa impl .
357.Fa type 354.Fa type
358is normally supplied by a function such as 355is normally supplied by a function such as
359.Xr EVP_aes_256_cbc 3 . 356.Xr EVP_aes_256_cbc 3 .
360If
361.Fa impl
362is
363.Dv NULL ,
364then the default implementation is used.
365.Fa key 357.Fa key
366is the symmetric key to use and 358is the symmetric key to use and
367.Fa iv 359.Fa iv
368is the IV to use (if necessary). 360is the IV to use (if necessary).
369The actual number of bytes used for the 361The actual number of bytes used for the
370key and IV depends on the cipher. 362key and IV depends on the cipher.
363The
364.Fa ENGINE *impl
365argument is always ignored and passing
366.Dv NULL
367is recommended.
371It is possible to set all parameters to 368It is possible to set all parameters to
372.Dv NULL 369.Dv NULL
373except 370except
@@ -397,8 +394,11 @@ The actual number of bytes written is placed in
397.Fa outl . 394.Fa outl .
398.Pp 395.Pp
399If padding is enabled (the default) then 396If padding is enabled (the default) then
400.Fn EVP_EncryptFinal_ex 397.Fn EVP_EncryptFinal
401encrypts the "final" data, that is any data that remains in a partial 398and
399.Fn EVP_EncryptFinal_ex ,
400which behave identically,
401encrypt the "final" data, that is any data that remains in a partial
402block. 402block.
403It uses NOTES (aka PKCS padding). 403It uses NOTES (aka PKCS padding).
404The encrypted final data is written to 404The encrypted final data is written to
@@ -412,18 +412,24 @@ no further calls to
412should be made. 412should be made.
413.Pp 413.Pp
414If padding is disabled then 414If padding is disabled then
415.Fn EVP_EncryptFinal
416and
415.Fn EVP_EncryptFinal_ex 417.Fn EVP_EncryptFinal_ex
416will not encrypt any more data and it will return an error if any data 418do not encrypt any more data and return an error if any data
417remains in a partial block: that is if the total data length is not a 419remains in a partial block: that is if the total data length is not a
418multiple of the block size. 420multiple of the block size.
419.Pp 421.Pp
422.Fn EVP_DecryptInit ,
420.Fn EVP_DecryptInit_ex , 423.Fn EVP_DecryptInit_ex ,
421.Fn EVP_DecryptUpdate , 424.Fn EVP_DecryptUpdate ,
425.Fn EVP_DecryptFinal ,
422and 426and
423.Fn EVP_DecryptFinal_ex 427.Fn EVP_DecryptFinal_ex
424are the corresponding decryption operations. 428are the corresponding decryption operations.
425.Fn EVP_DecryptFinal 429.Fn EVP_DecryptFinal
426will return an error code if padding is enabled and the final block is 430and
431.Fn EVP_DecryptFinal_ex
432return an error code if padding is enabled and the final block is
427not correctly formatted. 433not correctly formatted.
428The parameters and restrictions are identical to the encryption 434The parameters and restrictions are identical to the encryption
429operations except that if padding is enabled the decrypted data buffer 435operations except that if padding is enabled the decrypted data buffer
@@ -435,8 +441,10 @@ unless the cipher block size is 1 in which case
435.Fa inl 441.Fa inl
436bytes is sufficient. 442bytes is sufficient.
437.Pp 443.Pp
444.Fn EVP_CipherInit ,
438.Fn EVP_CipherInit_ex , 445.Fn EVP_CipherInit_ex ,
439.Fn EVP_CipherUpdate , 446.Fn EVP_CipherUpdate ,
447.Fn EVP_CipherFinal ,
440and 448and
441.Fn EVP_CipherFinal_ex 449.Fn EVP_CipherFinal_ex
442are functions that can be used for decryption or encryption. 450are functions that can be used for decryption or encryption.
@@ -448,37 +456,6 @@ the value unchanged (the actual value of
448.Fa enc 456.Fa enc
449being supplied in a previous call). 457being supplied in a previous call).
450.Pp 458.Pp
451.Fn EVP_EncryptInit ,
452.Fn EVP_DecryptInit ,
453and
454.Fn EVP_CipherInit
455are deprecated functions behaving like
456.Fn EVP_EncryptInit_ex ,
457.Fn EVP_DecryptInit_ex ,
458and
459.Fn EVP_CipherInit_ex
460except that they always use the default cipher implementation
461and that they require
462.Fn EVP_CIPHER_CTX_reset
463before they can be used on a context that was already used.
464.Pp
465.Fn EVP_EncryptFinal ,
466.Fn EVP_DecryptFinal ,
467and
468.Fn EVP_CipherFinal
469are identical to
470.Fn EVP_EncryptFinal_ex ,
471.Fn EVP_DecryptFinal_ex ,
472and
473.Fn EVP_CipherFinal_ex .
474In previous releases of OpenSSL, they also used to clean up the
475.Fa ctx ,
476but this is no longer done and
477.Fn EVP_CIPHER_CTX_reset
478or
479.Fn EVP_CIPHER_CTX_free
480must be called to free any context resources.
481.Pp
482.Fn EVP_get_cipherbyname , 459.Fn EVP_get_cipherbyname ,
483.Fn EVP_get_cipherbynid , 460.Fn EVP_get_cipherbynid ,
484and 461and
@@ -520,25 +497,6 @@ final decrypt error.
520If padding is disabled then the decryption operation will always succeed 497If padding is disabled then the decryption operation will always succeed
521if the total amount of data decrypted is a multiple of the block size. 498if the total amount of data decrypted is a multiple of the block size.
522.Pp 499.Pp
523The functions
524.Fn EVP_EncryptInit ,
525.Fn EVP_EncryptFinal ,
526.Fn EVP_DecryptInit ,
527.Fn EVP_CipherInit ,
528and
529.Fn EVP_CipherFinal
530are obsolete but are retained for compatibility with existing code.
531New code should use
532.Fn EVP_EncryptInit_ex ,
533.Fn EVP_EncryptFinal_ex ,
534.Fn EVP_DecryptInit_ex ,
535.Fn EVP_DecryptFinal_ex ,
536.Fn EVP_CipherInit_ex ,
537and
538.Fn EVP_CipherFinal_ex
539because they can reuse an existing context without allocating and
540freeing it up on each call.
541.Pp
542.Fn EVP_get_cipherbynid 500.Fn EVP_get_cipherbynid
543and 501and
544.Fn EVP_get_cipherbyobj 502.Fn EVP_get_cipherbyobj
@@ -683,9 +641,11 @@ set to
683.Dv NULL . 641.Dv NULL .
684.Pp 642.Pp
685When decrypting, the return value of 643When decrypting, the return value of
686.Fn EVP_DecryptFinal 644.Fn EVP_DecryptFinal ,
645.Fn EVP_DecryptFinal_ex ,
646.Fn EVP_CipherFinal ,
687or 647or
688.Fn EVP_CipherFinal 648.Fn EVP_CipherFinal_ex
689indicates if the operation was successful. 649indicates if the operation was successful.
690If it does not indicate success, the authentication operation has 650If it does not indicate success, the authentication operation has
691failed and any output data MUST NOT be used as it is corrupted. 651failed and any output data MUST NOT be used as it is corrupted.
@@ -704,6 +664,8 @@ bytes of the tag value to the buffer indicated by
704This call can only be made when encrypting data and after all data has 664This call can only be made when encrypting data and after all data has
705been processed, e.g. after an 665been processed, e.g. after an
706.Fn EVP_EncryptFinal 666.Fn EVP_EncryptFinal
667or
668.Fn EVP_EncryptFinal_ex
707call. 669call.
708.It Fn EVP_CIPHER_CTX_ctrl ctx EVP_CTRL_GCM_SET_TAG taglen tag 670.It Fn EVP_CIPHER_CTX_ctrl ctx EVP_CTRL_GCM_SET_TAG taglen tag
709Sets the expected tag to 671Sets the expected tag to