diff options
| author | jim <> | 2014-05-04 22:26:33 +0000 |
|---|---|---|
| committer | jim <> | 2014-05-04 22:26:33 +0000 |
| commit | cd97ab584496168ea99dfe43e3be997ea086b8e6 (patch) | |
| tree | c61ab0faf9a25b5fa4c1daeb8248a7e8deff66d2 /src/lib/libc | |
| parent | 18a7f65e7a1b8f6fab29266772aee3efe424a41a (diff) | |
| download | openbsd-cd97ab584496168ea99dfe43e3be997ea086b8e6.tar.gz openbsd-cd97ab584496168ea99dfe43e3be997ea086b8e6.tar.bz2 openbsd-cd97ab584496168ea99dfe43e3be997ea086b8e6.zip | |
Improve line wrapping for lines exceeding 80 chars.
ok jmc@
Diffstat (limited to '')
46 files changed, 284 insertions, 192 deletions
diff --git a/src/lib/libcrypto/doc/DH_generate_key.pod b/src/lib/libcrypto/doc/DH_generate_key.pod index 81f09fdf45..148e13762b 100644 --- a/src/lib/libcrypto/doc/DH_generate_key.pod +++ b/src/lib/libcrypto/doc/DH_generate_key.pod | |||
| @@ -40,7 +40,8 @@ The error codes can be obtained by L<ERR_get_error(3)|ERR_get_error(3)>. | |||
| 40 | 40 | ||
| 41 | =head1 SEE ALSO | 41 | =head1 SEE ALSO |
| 42 | 42 | ||
| 43 | L<dh(3)|dh(3)>, L<ERR_get_error(3)|ERR_get_error(3)>, L<rand(3)|rand(3)>, L<DH_size(3)|DH_size(3)> | 43 | L<dh(3)|dh(3)>, L<ERR_get_error(3)|ERR_get_error(3)>, L<rand(3)|rand(3)>, |
| 44 | L<DH_size(3)|DH_size(3)> | ||
| 44 | 45 | ||
| 45 | =head1 HISTORY | 46 | =head1 HISTORY |
| 46 | 47 | ||
diff --git a/src/lib/libcrypto/doc/DH_generate_parameters.pod b/src/lib/libcrypto/doc/DH_generate_parameters.pod index 862aa0c39a..d19e0217ee 100644 --- a/src/lib/libcrypto/doc/DH_generate_parameters.pod +++ b/src/lib/libcrypto/doc/DH_generate_parameters.pod | |||
| @@ -23,11 +23,11 @@ seeded prior to calling DH_generate_parameters(). | |||
| 23 | B<prime_len> is the length in bits of the safe prime to be generated. | 23 | B<prime_len> is the length in bits of the safe prime to be generated. |
| 24 | B<generator> is a small number E<gt> 1, typically 2 or 5. | 24 | B<generator> is a small number E<gt> 1, typically 2 or 5. |
| 25 | 25 | ||
| 26 | A callback function may be used to provide feedback about the progress | 26 | A callback function may be used to provide feedback about the progress of the |
| 27 | of the key generation. If B<callback> is not B<NULL>, it will be | 27 | key generation. If B<callback> is not B<NULL>, it will be called as described |
| 28 | called as described in L<BN_generate_prime(3)|BN_generate_prime(3)> while a random prime | 28 | in L<BN_generate_prime(3)|BN_generate_prime(3)> while a random prime number is |
| 29 | number is generated, and when a prime has been found, B<callback(3, | 29 | generated, and when a prime has been found, B<callback(3, 0, cb_arg)> is |
| 30 | 0, cb_arg)> is called. | 30 | called. |
| 31 | 31 | ||
| 32 | DH_check() validates Diffie-Hellman parameters. It checks that B<p> is | 32 | DH_check() validates Diffie-Hellman parameters. It checks that B<p> is |
| 33 | a safe prime, and that B<g> is a suitable generator. In the case of an | 33 | a safe prime, and that B<g> is a suitable generator. In the case of an |
diff --git a/src/lib/libcrypto/doc/DH_get_ex_new_index.pod b/src/lib/libcrypto/doc/DH_get_ex_new_index.pod index fa5eab2650..934ec094bb 100644 --- a/src/lib/libcrypto/doc/DH_get_ex_new_index.pod +++ b/src/lib/libcrypto/doc/DH_get_ex_new_index.pod | |||
| @@ -2,7 +2,8 @@ | |||
| 2 | 2 | ||
| 3 | =head1 NAME | 3 | =head1 NAME |
| 4 | 4 | ||
| 5 | DH_get_ex_new_index, DH_set_ex_data, DH_get_ex_data - add application specific data to DH structures | 5 | DH_get_ex_new_index, DH_set_ex_data, DH_get_ex_data - add application specific |
| 6 | data to DH structures | ||
| 6 | 7 | ||
| 7 | =head1 SYNOPSIS | 8 | =head1 SYNOPSIS |
| 8 | 9 | ||
diff --git a/src/lib/libcrypto/doc/DH_new.pod b/src/lib/libcrypto/doc/DH_new.pod index 60c930093e..d6c3ca82b5 100644 --- a/src/lib/libcrypto/doc/DH_new.pod +++ b/src/lib/libcrypto/doc/DH_new.pod | |||
| @@ -21,9 +21,9 @@ erased before the memory is returned to the system. | |||
| 21 | 21 | ||
| 22 | =head1 RETURN VALUES | 22 | =head1 RETURN VALUES |
| 23 | 23 | ||
| 24 | If the allocation fails, DH_new() returns B<NULL> and sets an error | 24 | If the allocation fails, DH_new() returns B<NULL> and sets an error code that |
| 25 | code that can be obtained by L<ERR_get_error(3)|ERR_get_error(3)>. Otherwise it returns | 25 | can be obtained by L<ERR_get_error(3)|ERR_get_error(3)>. Otherwise it returns a |
| 26 | a pointer to the newly allocated structure. | 26 | pointer to the newly allocated structure. |
| 27 | 27 | ||
| 28 | DH_free() returns no value. | 28 | DH_free() returns no value. |
| 29 | 29 | ||
diff --git a/src/lib/libcrypto/doc/DSA_get_ex_new_index.pod b/src/lib/libcrypto/doc/DSA_get_ex_new_index.pod index fb6efc1182..e2fcabf370 100644 --- a/src/lib/libcrypto/doc/DSA_get_ex_new_index.pod +++ b/src/lib/libcrypto/doc/DSA_get_ex_new_index.pod | |||
| @@ -2,7 +2,8 @@ | |||
| 2 | 2 | ||
| 3 | =head1 NAME | 3 | =head1 NAME |
| 4 | 4 | ||
| 5 | DSA_get_ex_new_index, DSA_set_ex_data, DSA_get_ex_data - add application specific data to DSA structures | 5 | DSA_get_ex_new_index, DSA_set_ex_data, DSA_get_ex_data - add application |
| 6 | specific data to DSA structures | ||
| 6 | 7 | ||
| 7 | =head1 SYNOPSIS | 8 | =head1 SYNOPSIS |
| 8 | 9 | ||
diff --git a/src/lib/libcrypto/doc/DSA_set_method.pod b/src/lib/libcrypto/doc/DSA_set_method.pod index 5ad7362f58..707370adf7 100644 --- a/src/lib/libcrypto/doc/DSA_set_method.pod +++ b/src/lib/libcrypto/doc/DSA_set_method.pod | |||
| @@ -103,8 +103,8 @@ B<DSA_METHOD>s. | |||
| 103 | 103 | ||
| 104 | DSA_set_default_method() returns no value. | 104 | DSA_set_default_method() returns no value. |
| 105 | 105 | ||
| 106 | DSA_set_method() returns non-zero if the provided B<meth> was successfully set as | 106 | DSA_set_method() returns non-zero if the provided B<meth> was successfully set |
| 107 | the method for B<dsa> (including unloading the ENGINE handle if the previous | 107 | as the method for B<dsa> (including unloading the ENGINE handle if the previous |
| 108 | method was supplied by an ENGINE). | 108 | method was supplied by an ENGINE). |
| 109 | 109 | ||
| 110 | DSA_new_method() returns NULL and sets an error code that can be | 110 | DSA_new_method() returns NULL and sets an error code that can be |
| @@ -117,8 +117,8 @@ As of version 0.9.7, DSA_METHOD implementations are grouped together with other | |||
| 117 | algorithmic APIs (eg. RSA_METHOD, EVP_CIPHER, etc) in B<ENGINE> modules. If a | 117 | algorithmic APIs (eg. RSA_METHOD, EVP_CIPHER, etc) in B<ENGINE> modules. If a |
| 118 | default ENGINE is specified for DSA functionality using an ENGINE API function, | 118 | default ENGINE is specified for DSA functionality using an ENGINE API function, |
| 119 | that will override any DSA defaults set using the DSA API (ie. | 119 | that will override any DSA defaults set using the DSA API (ie. |
| 120 | DSA_set_default_method()). For this reason, the ENGINE API is the recommended way | 120 | DSA_set_default_method()). For this reason, the ENGINE API is the recommended |
| 121 | to control default implementations for use in DSA and other cryptographic | 121 | way to control default implementations for use in DSA and other cryptographic |
| 122 | algorithms. | 122 | algorithms. |
| 123 | 123 | ||
| 124 | =head1 SEE ALSO | 124 | =head1 SEE ALSO |
diff --git a/src/lib/libcrypto/doc/EVP_DigestInit.pod b/src/lib/libcrypto/doc/EVP_DigestInit.pod index dcc5d73f69..2ff01b9c7c 100644 --- a/src/lib/libcrypto/doc/EVP_DigestInit.pod +++ b/src/lib/libcrypto/doc/EVP_DigestInit.pod | |||
| @@ -4,12 +4,12 @@ | |||
| 4 | 4 | ||
| 5 | EVP_MD_CTX_init, EVP_MD_CTX_create, EVP_DigestInit_ex, EVP_DigestUpdate, | 5 | EVP_MD_CTX_init, EVP_MD_CTX_create, EVP_DigestInit_ex, EVP_DigestUpdate, |
| 6 | EVP_DigestFinal_ex, EVP_MD_CTX_cleanup, EVP_MD_CTX_destroy, EVP_MAX_MD_SIZE, | 6 | EVP_DigestFinal_ex, EVP_MD_CTX_cleanup, EVP_MD_CTX_destroy, EVP_MAX_MD_SIZE, |
| 7 | EVP_MD_CTX_copy_ex, EVP_MD_CTX_copy, EVP_MD_type, EVP_MD_pkey_type, EVP_MD_size, | 7 | EVP_MD_CTX_copy_ex, EVP_MD_CTX_copy, EVP_MD_type, EVP_MD_pkey_type, |
| 8 | EVP_MD_block_size, EVP_MD_CTX_md, EVP_MD_CTX_size, EVP_MD_CTX_block_size, EVP_MD_CTX_type, | 8 | EVP_MD_size, EVP_MD_block_size, EVP_MD_CTX_md, EVP_MD_CTX_size, |
| 9 | EVP_md_null, EVP_md2, EVP_md5, EVP_sha, EVP_sha1, EVP_sha224, EVP_sha256, | 9 | EVP_MD_CTX_block_size, EVP_MD_CTX_type, EVP_md_null, EVP_md2, EVP_md5, EVP_sha, |
| 10 | EVP_sha384, EVP_sha512, EVP_dss, EVP_dss1, EVP_mdc2, | 10 | EVP_sha1, EVP_sha224, EVP_sha256, EVP_sha384, EVP_sha512, EVP_dss, EVP_dss1, |
| 11 | EVP_ripemd160, EVP_get_digestbyname, EVP_get_digestbynid, EVP_get_digestbyobj - | 11 | EVP_mdc2, EVP_ripemd160, EVP_get_digestbyname, EVP_get_digestbynid, |
| 12 | EVP digest routines | 12 | EVP_get_digestbyobj - EVP digest routines |
| 13 | 13 | ||
| 14 | =head1 SYNOPSIS | 14 | =head1 SYNOPSIS |
| 15 | 15 | ||
| @@ -127,11 +127,11 @@ normally used when setting ASN1 OIDs. | |||
| 127 | EVP_MD_CTX_md() returns the B<EVP_MD> structure corresponding to the passed | 127 | EVP_MD_CTX_md() returns the B<EVP_MD> structure corresponding to the passed |
| 128 | B<EVP_MD_CTX>. | 128 | B<EVP_MD_CTX>. |
| 129 | 129 | ||
| 130 | EVP_MD_pkey_type() returns the NID of the public key signing algorithm associated | 130 | EVP_MD_pkey_type() returns the NID of the public key signing algorithm |
| 131 | with this digest. For example EVP_sha1() is associated with RSA so this will | 131 | associated with this digest. For example EVP_sha1() is associated with RSA so |
| 132 | return B<NID_sha1WithRSAEncryption>. Since digests and signature algorithms | 132 | this will return B<NID_sha1WithRSAEncryption>. Since digests and signature |
| 133 | are no longer linked this function is only retained for compatibility | 133 | algorithms are no longer linked this function is only retained for |
| 134 | reasons. | 134 | compatibility reasons. |
| 135 | 135 | ||
| 136 | EVP_md2(), EVP_md5(), EVP_sha(), EVP_sha1(), EVP_sha224(), EVP_sha256(), | 136 | EVP_md2(), EVP_md5(), EVP_sha(), EVP_sha1(), EVP_sha224(), EVP_sha256(), |
| 137 | EVP_sha384(), EVP_sha512(), EVP_mdc2() and EVP_ripemd160() return B<EVP_MD> | 137 | EVP_sha384(), EVP_sha512(), EVP_mdc2() and EVP_ripemd160() return B<EVP_MD> |
diff --git a/src/lib/libcrypto/doc/EVP_DigestSignInit.pod b/src/lib/libcrypto/doc/EVP_DigestSignInit.pod index 11e8f6f937..7aec6daecc 100644 --- a/src/lib/libcrypto/doc/EVP_DigestSignInit.pod +++ b/src/lib/libcrypto/doc/EVP_DigestSignInit.pod | |||
| @@ -2,7 +2,8 @@ | |||
| 2 | 2 | ||
| 3 | =head1 NAME | 3 | =head1 NAME |
| 4 | 4 | ||
| 5 | EVP_DigestSignInit, EVP_DigestSignUpdate, EVP_DigestSignFinal - EVP signing functions | 5 | EVP_DigestSignInit, EVP_DigestSignUpdate, EVP_DigestSignFinal - EVP signing |
| 6 | functions | ||
| 6 | 7 | ||
| 7 | =head1 SYNOPSIS | 8 | =head1 SYNOPSIS |
| 8 | 9 | ||
diff --git a/src/lib/libcrypto/doc/EVP_DigestVerifyInit.pod b/src/lib/libcrypto/doc/EVP_DigestVerifyInit.pod index 819e0d4b9f..60666bfddc 100644 --- a/src/lib/libcrypto/doc/EVP_DigestVerifyInit.pod +++ b/src/lib/libcrypto/doc/EVP_DigestVerifyInit.pod | |||
| @@ -2,7 +2,8 @@ | |||
| 2 | 2 | ||
| 3 | =head1 NAME | 3 | =head1 NAME |
| 4 | 4 | ||
| 5 | EVP_DigestVerifyInit, EVP_DigestVerifyUpdate, EVP_DigestVerifyFinal - EVP signature verification functions | 5 | EVP_DigestVerifyInit, EVP_DigestVerifyUpdate, EVP_DigestVerifyFinal - EVP |
| 6 | signature verification functions | ||
| 6 | 7 | ||
| 7 | =head1 SYNOPSIS | 8 | =head1 SYNOPSIS |
| 8 | 9 | ||
diff --git a/src/lib/libcrypto/doc/EVP_EncryptInit.pod b/src/lib/libcrypto/doc/EVP_EncryptInit.pod index 84875e0fe0..d42445cf10 100644 --- a/src/lib/libcrypto/doc/EVP_EncryptInit.pod +++ b/src/lib/libcrypto/doc/EVP_EncryptInit.pod | |||
| @@ -239,11 +239,13 @@ RC5 can be set. | |||
| 239 | EVP_EncryptInit_ex(), EVP_EncryptUpdate() and EVP_EncryptFinal_ex() | 239 | EVP_EncryptInit_ex(), EVP_EncryptUpdate() and EVP_EncryptFinal_ex() |
| 240 | return 1 for success and 0 for failure. | 240 | return 1 for success and 0 for failure. |
| 241 | 241 | ||
| 242 | EVP_DecryptInit_ex() and EVP_DecryptUpdate() return 1 for success and 0 for failure. | 242 | EVP_DecryptInit_ex() and EVP_DecryptUpdate() return 1 for success and 0 for |
| 243 | EVP_DecryptFinal_ex() returns 0 if the decrypt failed or 1 for success. | 243 | failure. EVP_DecryptFinal_ex() returns 0 if the decrypt failed or 1 for |
| 244 | success. | ||
| 244 | 245 | ||
| 245 | EVP_CipherInit_ex() and EVP_CipherUpdate() return 1 for success and 0 for failure. | 246 | EVP_CipherInit_ex() and EVP_CipherUpdate() return 1 for success and 0 for |
| 246 | EVP_CipherFinal_ex() returns 0 for a decryption failure or 1 for success. | 247 | failure. EVP_CipherFinal_ex() returns 0 for a decryption failure or 1 for |
| 248 | success. | ||
| 247 | 249 | ||
| 248 | EVP_CIPHER_CTX_cleanup() returns 1 for success and 0 for failure. | 250 | EVP_CIPHER_CTX_cleanup() returns 1 for success and 0 for failure. |
| 249 | 251 | ||
| @@ -285,11 +287,13 @@ Null cipher: does nothing. | |||
| 285 | 287 | ||
| 286 | DES in CBC, ECB, CFB and OFB modes respectively. | 288 | DES in CBC, ECB, CFB and OFB modes respectively. |
| 287 | 289 | ||
| 288 | =item EVP_des_ede_cbc(void), EVP_des_ede(), EVP_des_ede_ofb(void), EVP_des_ede_cfb(void) | 290 | =item EVP_des_ede_cbc(void), EVP_des_ede(), EVP_des_ede_ofb(void), |
| 291 | EVP_des_ede_cfb(void) | ||
| 289 | 292 | ||
| 290 | Two key triple DES in CBC, ECB, CFB and OFB modes respectively. | 293 | Two key triple DES in CBC, ECB, CFB and OFB modes respectively. |
| 291 | 294 | ||
| 292 | =item EVP_des_ede3_cbc(void), EVP_des_ede3(), EVP_des_ede3_ofb(void), EVP_des_ede3_cfb(void) | 295 | =item EVP_des_ede3_cbc(void), EVP_des_ede3(), EVP_des_ede3_ofb(void), |
| 296 | EVP_des_ede3_cfb(void) | ||
| 293 | 297 | ||
| 294 | Three key triple DES in CBC, ECB, CFB and OFB modes respectively. | 298 | Three key triple DES in CBC, ECB, CFB and OFB modes respectively. |
| 295 | 299 | ||
| @@ -299,44 +303,49 @@ DESX algorithm in CBC mode. | |||
| 299 | 303 | ||
| 300 | =item EVP_rc4(void) | 304 | =item EVP_rc4(void) |
| 301 | 305 | ||
| 302 | RC4 stream cipher. This is a variable key length cipher with default key length 128 bits. | 306 | RC4 stream cipher. This is a variable key length cipher with default key length |
| 307 | 128 bits. | ||
| 303 | 308 | ||
| 304 | =item EVP_rc4_40(void) | 309 | =item EVP_rc4_40(void) |
| 305 | 310 | ||
| 306 | RC4 stream cipher with 40 bit key length. This is obsolete and new code should use EVP_rc4() | 311 | RC4 stream cipher with 40 bit key length. This is obsolete and new code should |
| 307 | and the EVP_CIPHER_CTX_set_key_length() function. | 312 | use EVP_rc4() and the EVP_CIPHER_CTX_set_key_length() function. |
| 308 | 313 | ||
| 309 | =item EVP_idea_cbc() EVP_idea_ecb(void), EVP_idea_cfb(void), EVP_idea_ofb(void), EVP_idea_cbc(void) | 314 | =item EVP_idea_cbc() EVP_idea_ecb(void), EVP_idea_cfb(void), |
| 315 | EVP_idea_ofb(void), EVP_idea_cbc(void) | ||
| 310 | 316 | ||
| 311 | IDEA encryption algorithm in CBC, ECB, CFB and OFB modes respectively. | 317 | IDEA encryption algorithm in CBC, ECB, CFB and OFB modes respectively. |
| 312 | 318 | ||
| 313 | =item EVP_rc2_cbc(void), EVP_rc2_ecb(void), EVP_rc2_cfb(void), EVP_rc2_ofb(void) | 319 | =item EVP_rc2_cbc(void), EVP_rc2_ecb(void), EVP_rc2_cfb(void), EVP_rc2_ofb(void) |
| 314 | 320 | ||
| 315 | RC2 encryption algorithm in CBC, ECB, CFB and OFB modes respectively. This is a variable key | 321 | RC2 encryption algorithm in CBC, ECB, CFB and OFB modes respectively. This is a |
| 316 | length cipher with an additional parameter called "effective key bits" or "effective key length". | 322 | variable key length cipher with an additional parameter called "effective key |
| 317 | By default both are set to 128 bits. | 323 | bits" or "effective key length". By default both are set to 128 bits. |
| 318 | 324 | ||
| 319 | =item EVP_rc2_40_cbc(void), EVP_rc2_64_cbc(void) | 325 | =item EVP_rc2_40_cbc(void), EVP_rc2_64_cbc(void) |
| 320 | 326 | ||
| 321 | RC2 algorithm in CBC mode with a default key length and effective key length of 40 and 64 bits. | 327 | RC2 algorithm in CBC mode with a default key length and effective key length of |
| 322 | These are obsolete and new code should use EVP_rc2_cbc(), EVP_CIPHER_CTX_set_key_length() and | 328 | 40 and 64 bits. These are obsolete and new code should use EVP_rc2_cbc(), |
| 323 | EVP_CIPHER_CTX_ctrl() to set the key length and effective key length. | 329 | EVP_CIPHER_CTX_set_key_length() and EVP_CIPHER_CTX_ctrl() to set the key length |
| 330 | and effective key length. | ||
| 324 | 331 | ||
| 325 | =item EVP_bf_cbc(void), EVP_bf_ecb(void), EVP_bf_cfb(void), EVP_bf_ofb(void); | 332 | =item EVP_bf_cbc(void), EVP_bf_ecb(void), EVP_bf_cfb(void), EVP_bf_ofb(void); |
| 326 | 333 | ||
| 327 | Blowfish encryption algorithm in CBC, ECB, CFB and OFB modes respectively. This is a variable key | 334 | Blowfish encryption algorithm in CBC, ECB, CFB and OFB modes respectively. This |
| 328 | length cipher. | 335 | is a variable key length cipher. |
| 329 | 336 | ||
| 330 | =item EVP_cast5_cbc(void), EVP_cast5_ecb(void), EVP_cast5_cfb(void), EVP_cast5_ofb(void) | 337 | =item EVP_cast5_cbc(void), EVP_cast5_ecb(void), EVP_cast5_cfb(void), |
| 338 | EVP_cast5_ofb(void) | ||
| 331 | 339 | ||
| 332 | CAST encryption algorithm in CBC, ECB, CFB and OFB modes respectively. This is a variable key | 340 | CAST encryption algorithm in CBC, ECB, CFB and OFB modes respectively. This is |
| 333 | length cipher. | 341 | a variable key length cipher. |
| 334 | 342 | ||
| 335 | =item EVP_rc5_32_12_16_cbc(void), EVP_rc5_32_12_16_ecb(void), EVP_rc5_32_12_16_cfb(void), EVP_rc5_32_12_16_ofb(void) | 343 | =item EVP_rc5_32_12_16_cbc(void), EVP_rc5_32_12_16_ecb(void), |
| 344 | EVP_rc5_32_12_16_cfb(void), EVP_rc5_32_12_16_ofb(void) | ||
| 336 | 345 | ||
| 337 | RC5 encryption algorithm in CBC, ECB, CFB and OFB modes respectively. This is a variable key length | 346 | RC5 encryption algorithm in CBC, ECB, CFB and OFB modes respectively. This is a |
| 338 | cipher with an additional "number of rounds" parameter. By default the key length is set to 128 | 347 | variable key length cipher with an additional "number of rounds" parameter. By |
| 339 | bits and 12 rounds. | 348 | default the key length is set to 128 bits and 12 rounds. |
| 340 | 349 | ||
| 341 | =back | 350 | =back |
| 342 | 351 | ||
diff --git a/src/lib/libcrypto/doc/EVP_PKEY_CTX_ctrl.pod b/src/lib/libcrypto/doc/EVP_PKEY_CTX_ctrl.pod index e8d1ddda75..ba6e51100b 100644 --- a/src/lib/libcrypto/doc/EVP_PKEY_CTX_ctrl.pod +++ b/src/lib/libcrypto/doc/EVP_PKEY_CTX_ctrl.pod | |||
| @@ -65,14 +65,15 @@ RSA_PKCS1_OAEP_PADDING for OAEP padding (encrypt and decrypt only), | |||
| 65 | RSA_X931_PADDING for X9.31 padding (signature operations only) and | 65 | RSA_X931_PADDING for X9.31 padding (signature operations only) and |
| 66 | RSA_PKCS1_PSS_PADDING (sign and verify only). | 66 | RSA_PKCS1_PSS_PADDING (sign and verify only). |
| 67 | 67 | ||
| 68 | Two RSA padding modes behave differently if EVP_PKEY_CTX_set_signature_md() | 68 | Two RSA padding modes behave differently if EVP_PKEY_CTX_set_signature_md() is |
| 69 | is used. If this macro is called for PKCS#1 padding the plaintext buffer is | 69 | used. If this macro is called for PKCS#1 padding the plaintext buffer is an |
| 70 | an actual digest value and is encapsulated in a DigestInfo structure according | 70 | actual digest value and is encapsulated in a DigestInfo structure according to |
| 71 | to PKCS#1 when signing and this structure is expected (and stripped off) when | 71 | PKCS#1 when signing and this structure is expected (and stripped off) when |
| 72 | verifying. If this control is not used with RSA and PKCS#1 padding then the | 72 | verifying. If this control is not used with RSA and PKCS#1 padding then the |
| 73 | supplied data is used directly and not encapsulated. In the case of X9.31 | 73 | supplied data is used directly and not encapsulated. In the case of X9.31 |
| 74 | padding for RSA the algorithm identifier byte is added or checked and removed | 74 | padding for RSA the algorithm identifier byte is added or checked and removed |
| 75 | if this control is called. If it is not called then the first byte of the plaintext buffer is expected to be the algorithm identifier byte. | 75 | if this control is called. If it is not called then the first byte of the |
| 76 | plaintext buffer is expected to be the algorithm identifier byte. | ||
| 76 | 77 | ||
| 77 | The EVP_PKEY_CTX_set_rsa_pss_saltlen() macro sets the RSA PSS salt length to | 78 | The EVP_PKEY_CTX_set_rsa_pss_saltlen() macro sets the RSA PSS salt length to |
| 78 | B<len> as its name implies it is only supported for PSS padding. Two special | 79 | B<len> as its name implies it is only supported for PSS padding. Two special |
diff --git a/src/lib/libcrypto/doc/EVP_PKEY_CTX_new.pod b/src/lib/libcrypto/doc/EVP_PKEY_CTX_new.pod index a9af867580..9822d6806f 100644 --- a/src/lib/libcrypto/doc/EVP_PKEY_CTX_new.pod +++ b/src/lib/libcrypto/doc/EVP_PKEY_CTX_new.pod | |||
| @@ -2,7 +2,8 @@ | |||
| 2 | 2 | ||
| 3 | =head1 NAME | 3 | =head1 NAME |
| 4 | 4 | ||
| 5 | EVP_PKEY_CTX_new, EVP_PKEY_CTX_new_id, EVP_PKEY_CTX_dup, EVP_PKEY_CTX_free - public key algorithm context functions. | 5 | EVP_PKEY_CTX_new, EVP_PKEY_CTX_new_id, EVP_PKEY_CTX_dup, EVP_PKEY_CTX_free - |
| 6 | public key algorithm context functions. | ||
| 6 | 7 | ||
| 7 | =head1 SYNOPSIS | 8 | =head1 SYNOPSIS |
| 8 | 9 | ||
diff --git a/src/lib/libcrypto/doc/EVP_PKEY_cmp.pod b/src/lib/libcrypto/doc/EVP_PKEY_cmp.pod index 4145245299..c389216086 100644 --- a/src/lib/libcrypto/doc/EVP_PKEY_cmp.pod +++ b/src/lib/libcrypto/doc/EVP_PKEY_cmp.pod | |||
| @@ -2,7 +2,8 @@ | |||
| 2 | 2 | ||
| 3 | =head1 NAME | 3 | =head1 NAME |
| 4 | 4 | ||
| 5 | EVP_PKEY_copy_parameters, EVP_PKEY_missing_parameters, EVP_PKEY_cmp_parameters, EVP_PKEY_cmp - public key parameter and comparison functions | 5 | EVP_PKEY_copy_parameters, EVP_PKEY_missing_parameters, EVP_PKEY_cmp_parameters, |
| 6 | EVP_PKEY_cmp - public key parameter and comparison functions | ||
| 6 | 7 | ||
| 7 | =head1 SYNOPSIS | 8 | =head1 SYNOPSIS |
| 8 | 9 | ||
diff --git a/src/lib/libcrypto/doc/EVP_PKEY_derive.pod b/src/lib/libcrypto/doc/EVP_PKEY_derive.pod index de877ead1a..2424ce0e54 100644 --- a/src/lib/libcrypto/doc/EVP_PKEY_derive.pod +++ b/src/lib/libcrypto/doc/EVP_PKEY_derive.pod | |||
| @@ -2,7 +2,8 @@ | |||
| 2 | 2 | ||
| 3 | =head1 NAME | 3 | =head1 NAME |
| 4 | 4 | ||
| 5 | EVP_PKEY_derive_init, EVP_PKEY_derive_set_peer, EVP_PKEY_derive - derive public key algorithm shared secret. | 5 | EVP_PKEY_derive_init, EVP_PKEY_derive_set_peer, EVP_PKEY_derive - derive public |
| 6 | key algorithm shared secret. | ||
| 6 | 7 | ||
| 7 | =head1 SYNOPSIS | 8 | =head1 SYNOPSIS |
| 8 | 9 | ||
diff --git a/src/lib/libcrypto/doc/EVP_PKEY_keygen.pod b/src/lib/libcrypto/doc/EVP_PKEY_keygen.pod index b6102da036..378fb310ff 100644 --- a/src/lib/libcrypto/doc/EVP_PKEY_keygen.pod +++ b/src/lib/libcrypto/doc/EVP_PKEY_keygen.pod | |||
| @@ -2,7 +2,10 @@ | |||
| 2 | 2 | ||
| 3 | =head1 NAME | 3 | =head1 NAME |
| 4 | 4 | ||
| 5 | EVP_PKEY_keygen_init, EVP_PKEY_keygen, EVP_PKEY_paramgen_init, EVP_PKEY_paramgen, EVP_PKEY_CTX_set_cb, EVP_PKEY_CTX_get_cb, EVP_PKEY_CTX_get_keygen_info, EVP_PKEVP_PKEY_CTX_set_app_data, EVP_PKEY_CTX_get_app_data - key and parameter generation functions | 5 | EVP_PKEY_keygen_init, EVP_PKEY_keygen, EVP_PKEY_paramgen_init, |
| 6 | EVP_PKEY_paramgen, EVP_PKEY_CTX_set_cb, EVP_PKEY_CTX_get_cb, | ||
| 7 | EVP_PKEY_CTX_get_keygen_info, EVP_PKEVP_PKEY_CTX_set_app_data, | ||
| 8 | EVP_PKEY_CTX_get_app_data - key and parameter generation functions | ||
| 6 | 9 | ||
| 7 | =head1 SYNOPSIS | 10 | =head1 SYNOPSIS |
| 8 | 11 | ||
diff --git a/src/lib/libcrypto/doc/EVP_PKEY_print_private.pod b/src/lib/libcrypto/doc/EVP_PKEY_print_private.pod index c9b7a89821..eabbaed264 100644 --- a/src/lib/libcrypto/doc/EVP_PKEY_print_private.pod +++ b/src/lib/libcrypto/doc/EVP_PKEY_print_private.pod | |||
| @@ -2,7 +2,8 @@ | |||
| 2 | 2 | ||
| 3 | =head1 NAME | 3 | =head1 NAME |
| 4 | 4 | ||
| 5 | EVP_PKEY_print_public, EVP_PKEY_print_private, EVP_PKEY_print_params - public key algorithm printing routines. | 5 | EVP_PKEY_print_public, EVP_PKEY_print_private, EVP_PKEY_print_params - public |
| 6 | key algorithm printing routines. | ||
| 6 | 7 | ||
| 7 | =head1 SYNOPSIS | 8 | =head1 SYNOPSIS |
| 8 | 9 | ||
diff --git a/src/lib/libcrypto/doc/EVP_PKEY_set1_RSA.pod b/src/lib/libcrypto/doc/EVP_PKEY_set1_RSA.pod index 8afb1b22e1..c2031c3d0b 100644 --- a/src/lib/libcrypto/doc/EVP_PKEY_set1_RSA.pod +++ b/src/lib/libcrypto/doc/EVP_PKEY_set1_RSA.pod | |||
| @@ -4,8 +4,8 @@ | |||
| 4 | 4 | ||
| 5 | EVP_PKEY_set1_RSA, EVP_PKEY_set1_DSA, EVP_PKEY_set1_DH, EVP_PKEY_set1_EC_KEY, | 5 | EVP_PKEY_set1_RSA, EVP_PKEY_set1_DSA, EVP_PKEY_set1_DH, EVP_PKEY_set1_EC_KEY, |
| 6 | EVP_PKEY_get1_RSA, EVP_PKEY_get1_DSA, EVP_PKEY_get1_DH, EVP_PKEY_get1_EC_KEY, | 6 | EVP_PKEY_get1_RSA, EVP_PKEY_get1_DSA, EVP_PKEY_get1_DH, EVP_PKEY_get1_EC_KEY, |
| 7 | EVP_PKEY_assign_RSA, EVP_PKEY_assign_DSA, EVP_PKEY_assign_DH, EVP_PKEY_assign_EC_KEY, | 7 | EVP_PKEY_assign_RSA, EVP_PKEY_assign_DSA, EVP_PKEY_assign_DH, |
| 8 | EVP_PKEY_type - EVP_PKEY assignment functions. | 8 | EVP_PKEY_assign_EC_KEY, EVP_PKEY_type - EVP_PKEY assignment functions. |
| 9 | 9 | ||
| 10 | =head1 SYNOPSIS | 10 | =head1 SYNOPSIS |
| 11 | 11 | ||
diff --git a/src/lib/libcrypto/doc/EVP_PKEY_verify.pod b/src/lib/libcrypto/doc/EVP_PKEY_verify.pod index f7ae4f9ebe..ba317b4e7b 100644 --- a/src/lib/libcrypto/doc/EVP_PKEY_verify.pod +++ b/src/lib/libcrypto/doc/EVP_PKEY_verify.pod | |||
| @@ -2,7 +2,8 @@ | |||
| 2 | 2 | ||
| 3 | =head1 NAME | 3 | =head1 NAME |
| 4 | 4 | ||
| 5 | EVP_PKEY_verify_init, EVP_PKEY_verify - signature verification using a public key algorithm | 5 | EVP_PKEY_verify_init, EVP_PKEY_verify - signature verification using a public |
| 6 | key algorithm | ||
| 6 | 7 | ||
| 7 | =head1 SYNOPSIS | 8 | =head1 SYNOPSIS |
| 8 | 9 | ||
diff --git a/src/lib/libcrypto/doc/EVP_PKEY_verify_recover.pod b/src/lib/libcrypto/doc/EVP_PKEY_verify_recover.pod index 00d53db783..4debf7bff0 100644 --- a/src/lib/libcrypto/doc/EVP_PKEY_verify_recover.pod +++ b/src/lib/libcrypto/doc/EVP_PKEY_verify_recover.pod | |||
| @@ -2,7 +2,8 @@ | |||
| 2 | 2 | ||
| 3 | =head1 NAME | 3 | =head1 NAME |
| 4 | 4 | ||
| 5 | EVP_PKEY_verify_recover_init, EVP_PKEY_verify_recover - recover signature using a public key algorithm | 5 | EVP_PKEY_verify_recover_init, EVP_PKEY_verify_recover - recover signature using |
| 6 | a public key algorithm | ||
| 6 | 7 | ||
| 7 | =head1 SYNOPSIS | 8 | =head1 SYNOPSIS |
| 8 | 9 | ||
| @@ -45,7 +46,8 @@ context if several operations are performed using the same parameters. | |||
| 45 | 46 | ||
| 46 | =head1 RETURN VALUES | 47 | =head1 RETURN VALUES |
| 47 | 48 | ||
| 48 | EVP_PKEY_verify_recover_init() and EVP_PKEY_verify_recover() return 1 for success | 49 | EVP_PKEY_verify_recover_init() and EVP_PKEY_verify_recover() return 1 for |
| 50 | success | ||
| 49 | and 0 or a negative value for failure. In particular a return value of -2 | 51 | and 0 or a negative value for failure. In particular a return value of -2 |
| 50 | indicates the operation is not supported by the public key algorithm. | 52 | indicates the operation is not supported by the public key algorithm. |
| 51 | 53 | ||
diff --git a/src/lib/libcrypto/doc/EVP_VerifyInit.pod b/src/lib/libcrypto/doc/EVP_VerifyInit.pod index 0ffb0a8077..c665ee2ebc 100644 --- a/src/lib/libcrypto/doc/EVP_VerifyInit.pod +++ b/src/lib/libcrypto/doc/EVP_VerifyInit.pod | |||
| @@ -2,7 +2,8 @@ | |||
| 2 | 2 | ||
| 3 | =head1 NAME | 3 | =head1 NAME |
| 4 | 4 | ||
| 5 | EVP_VerifyInit, EVP_VerifyUpdate, EVP_VerifyFinal - EVP signature verification functions | 5 | EVP_VerifyInit, EVP_VerifyUpdate, EVP_VerifyFinal - EVP signature verification |
| 6 | functions | ||
| 6 | 7 | ||
| 7 | =head1 SYNOPSIS | 8 | =head1 SYNOPSIS |
| 8 | 9 | ||
| @@ -38,8 +39,8 @@ implementation of digest B<type>. | |||
| 38 | EVP_VerifyInit_ex() and EVP_VerifyUpdate() return 1 for success and 0 for | 39 | EVP_VerifyInit_ex() and EVP_VerifyUpdate() return 1 for success and 0 for |
| 39 | failure. | 40 | failure. |
| 40 | 41 | ||
| 41 | EVP_VerifyFinal() returns 1 for a correct signature, 0 for failure and -1 if some | 42 | EVP_VerifyFinal() returns 1 for a correct signature, 0 for failure and -1 if |
| 42 | other error occurred. | 43 | some other error occurred. |
| 43 | 44 | ||
| 44 | The error codes can be obtained by L<ERR_get_error(3)|ERR_get_error(3)>. | 45 | The error codes can be obtained by L<ERR_get_error(3)|ERR_get_error(3)>. |
| 45 | 46 | ||
diff --git a/src/lib/libcrypto/doc/OBJ_nid2obj.pod b/src/lib/libcrypto/doc/OBJ_nid2obj.pod index 458ef025f0..b2b8af990c 100644 --- a/src/lib/libcrypto/doc/OBJ_nid2obj.pod +++ b/src/lib/libcrypto/doc/OBJ_nid2obj.pod | |||
| @@ -2,9 +2,9 @@ | |||
| 2 | 2 | ||
| 3 | =head1 NAME | 3 | =head1 NAME |
| 4 | 4 | ||
| 5 | OBJ_nid2obj, OBJ_nid2ln, OBJ_nid2sn, OBJ_obj2nid, OBJ_txt2nid, OBJ_ln2nid, OBJ_sn2nid, | 5 | OBJ_nid2obj, OBJ_nid2ln, OBJ_nid2sn, OBJ_obj2nid, OBJ_txt2nid, OBJ_ln2nid, |
| 6 | OBJ_cmp, OBJ_dup, OBJ_txt2obj, OBJ_obj2txt, OBJ_create, OBJ_cleanup - ASN1 object utility | 6 | OBJ_sn2nid, OBJ_cmp, OBJ_dup, OBJ_txt2obj, OBJ_obj2txt, OBJ_create, OBJ_cleanup |
| 7 | functions | 7 | - ASN1 object utility functions |
| 8 | 8 | ||
| 9 | =head1 SYNOPSIS | 9 | =head1 SYNOPSIS |
| 10 | 10 | ||
diff --git a/src/lib/libcrypto/doc/OPENSSL_VERSION_NUMBER.pod b/src/lib/libcrypto/doc/OPENSSL_VERSION_NUMBER.pod index c39ac35e78..2f63a18a71 100644 --- a/src/lib/libcrypto/doc/OPENSSL_VERSION_NUMBER.pod +++ b/src/lib/libcrypto/doc/OPENSSL_VERSION_NUMBER.pod | |||
| @@ -94,8 +94,8 @@ L<crypto(3)|crypto(3)> | |||
| 94 | 94 | ||
| 95 | =head1 HISTORY | 95 | =head1 HISTORY |
| 96 | 96 | ||
| 97 | SSLeay() and SSLEAY_VERSION_NUMBER are available in all versions of SSLeay and OpenSSL. | 97 | SSLeay() and SSLEAY_VERSION_NUMBER are available in all versions of SSLeay and |
| 98 | OPENSSL_VERSION_NUMBER is available in all versions of OpenSSL. | 98 | OpenSSL. OPENSSL_VERSION_NUMBER is available in all versions of OpenSSL. |
| 99 | B<SSLEAY_DIR> was added in OpenSSL 0.9.7. | 99 | B<SSLEAY_DIR> was added in OpenSSL 0.9.7. |
| 100 | 100 | ||
| 101 | =cut | 101 | =cut |
diff --git a/src/lib/libcrypto/doc/OpenSSL_add_all_algorithms.pod b/src/lib/libcrypto/doc/OpenSSL_add_all_algorithms.pod index e63411b5bb..cc6c07fa24 100644 --- a/src/lib/libcrypto/doc/OpenSSL_add_all_algorithms.pod +++ b/src/lib/libcrypto/doc/OpenSSL_add_all_algorithms.pod | |||
| @@ -39,24 +39,24 @@ None of the functions return a value. | |||
| 39 | A typical application will call OpenSSL_add_all_algorithms() initially and | 39 | A typical application will call OpenSSL_add_all_algorithms() initially and |
| 40 | EVP_cleanup() before exiting. | 40 | EVP_cleanup() before exiting. |
| 41 | 41 | ||
| 42 | An application does not need to add algorithms to use them explicitly, for example | 42 | An application does not need to add algorithms to use them explicitly, for |
| 43 | by EVP_sha1(). It just needs to add them if it (or any of the functions it calls) | 43 | example by EVP_sha1(). It just needs to add them if it (or any of the functions |
| 44 | needs to lookup algorithms. | 44 | it calls) needs to lookup algorithms. |
| 45 | 45 | ||
| 46 | The cipher and digest lookup functions are used in many parts of the library. If | 46 | The cipher and digest lookup functions are used in many parts of the library. |
| 47 | the table is not initialized several functions will misbehave and complain they | 47 | If the table is not initialized several functions will misbehave and complain |
| 48 | cannot find algorithms. This includes the PEM, PKCS#12, SSL and S/MIME libraries. | 48 | they cannot find algorithms. This includes the PEM, PKCS#12, SSL and S/MIME |
| 49 | This is a common query in the OpenSSL mailing lists. | 49 | libraries. This is a common query in the OpenSSL mailing lists. |
| 50 | 50 | ||
| 51 | Calling OpenSSL_add_all_algorithms() links in all algorithms: as a result a | 51 | Calling OpenSSL_add_all_algorithms() links in all algorithms: as a result a |
| 52 | statically linked executable can be quite large. If this is important it is possible | 52 | statically linked executable can be quite large. If this is important it is |
| 53 | to just add the required ciphers and digests. | 53 | possible to just add the required ciphers and digests. |
| 54 | 54 | ||
| 55 | =head1 BUGS | 55 | =head1 BUGS |
| 56 | 56 | ||
| 57 | Although the functions do not return error codes it is possible for them to fail. | 57 | Although the functions do not return error codes it is possible for them to |
| 58 | This will only happen as a result of a memory allocation failure so this is not | 58 | fail. This will only happen as a result of a memory allocation failure so this |
| 59 | too much of a problem in practice. | 59 | is not too much of a problem in practice. |
| 60 | 60 | ||
| 61 | =head1 SEE ALSO | 61 | =head1 SEE ALSO |
| 62 | 62 | ||
diff --git a/src/lib/libcrypto/doc/PEM_read_bio_PrivateKey.pod b/src/lib/libcrypto/doc/PEM_read_bio_PrivateKey.pod index e196bf1498..7e821f69c3 100644 --- a/src/lib/libcrypto/doc/PEM_read_bio_PrivateKey.pod +++ b/src/lib/libcrypto/doc/PEM_read_bio_PrivateKey.pod | |||
| @@ -2,7 +2,29 @@ | |||
| 2 | 2 | ||
| 3 | =head1 NAME | 3 | =head1 NAME |
| 4 | 4 | ||
| 5 | PEM, PEM_read_bio_PrivateKey, PEM_read_PrivateKey, PEM_write_bio_PrivateKey, PEM_write_PrivateKey, PEM_write_bio_PKCS8PrivateKey, PEM_write_PKCS8PrivateKey, PEM_write_bio_PKCS8PrivateKey_nid, PEM_write_PKCS8PrivateKey_nid, PEM_read_bio_PUBKEY, PEM_read_PUBKEY, PEM_write_bio_PUBKEY, PEM_write_PUBKEY, PEM_read_bio_RSAPrivateKey, PEM_read_RSAPrivateKey, PEM_write_bio_RSAPrivateKey, PEM_write_RSAPrivateKey, PEM_read_bio_RSAPublicKey, PEM_read_RSAPublicKey, PEM_write_bio_RSAPublicKey, PEM_write_RSAPublicKey, PEM_read_bio_RSA_PUBKEY, PEM_read_RSA_PUBKEY, PEM_write_bio_RSA_PUBKEY, PEM_write_RSA_PUBKEY, PEM_read_bio_DSAPrivateKey, PEM_read_DSAPrivateKey, PEM_write_bio_DSAPrivateKey, PEM_write_DSAPrivateKey, PEM_read_bio_DSA_PUBKEY, PEM_read_DSA_PUBKEY, PEM_write_bio_DSA_PUBKEY, PEM_write_DSA_PUBKEY, PEM_read_bio_DSAparams, PEM_read_DSAparams, PEM_write_bio_DSAparams, PEM_write_DSAparams, PEM_read_bio_DHparams, PEM_read_DHparams, PEM_write_bio_DHparams, PEM_write_DHparams, PEM_read_bio_X509, PEM_read_X509, PEM_write_bio_X509, PEM_write_X509, PEM_read_bio_X509_AUX, PEM_read_X509_AUX, PEM_write_bio_X509_AUX, PEM_write_X509_AUX, PEM_read_bio_X509_REQ, PEM_read_X509_REQ, PEM_write_bio_X509_REQ, PEM_write_X509_REQ, PEM_write_bio_X509_REQ_NEW, PEM_write_X509_REQ_NEW, PEM_read_bio_X509_CRL, PEM_read_X509_CRL, PEM_write_bio_X509_CRL, PEM_write_X509_CRL, PEM_read_bio_PKCS7, PEM_read_PKCS7, PEM_write_bio_PKCS7, PEM_write_PKCS7, PEM_read_bio_NETSCAPE_CERT_SEQUENCE, PEM_read_NETSCAPE_CERT_SEQUENCE, PEM_write_bio_NETSCAPE_CERT_SEQUENCE, PEM_write_NETSCAPE_CERT_SEQUENCE - PEM routines | 5 | PEM, PEM_read_bio_PrivateKey, PEM_read_PrivateKey, PEM_write_bio_PrivateKey, |
| 6 | PEM_write_PrivateKey, PEM_write_bio_PKCS8PrivateKey, PEM_write_PKCS8PrivateKey, | ||
| 7 | PEM_write_bio_PKCS8PrivateKey_nid, PEM_write_PKCS8PrivateKey_nid, | ||
| 8 | PEM_read_bio_PUBKEY, PEM_read_PUBKEY, PEM_write_bio_PUBKEY, PEM_write_PUBKEY, | ||
| 9 | PEM_read_bio_RSAPrivateKey, PEM_read_RSAPrivateKey, | ||
| 10 | PEM_write_bio_RSAPrivateKey, PEM_write_RSAPrivateKey, | ||
| 11 | PEM_read_bio_RSAPublicKey, PEM_read_RSAPublicKey, PEM_write_bio_RSAPublicKey, | ||
| 12 | PEM_write_RSAPublicKey, PEM_read_bio_RSA_PUBKEY, PEM_read_RSA_PUBKEY, | ||
| 13 | PEM_write_bio_RSA_PUBKEY, PEM_write_RSA_PUBKEY, PEM_read_bio_DSAPrivateKey, | ||
| 14 | PEM_read_DSAPrivateKey, PEM_write_bio_DSAPrivateKey, PEM_write_DSAPrivateKey, | ||
| 15 | PEM_read_bio_DSA_PUBKEY, PEM_read_DSA_PUBKEY, PEM_write_bio_DSA_PUBKEY, | ||
| 16 | PEM_write_DSA_PUBKEY, PEM_read_bio_DSAparams, PEM_read_DSAparams, | ||
| 17 | PEM_write_bio_DSAparams, PEM_write_DSAparams, PEM_read_bio_DHparams, | ||
| 18 | PEM_read_DHparams, PEM_write_bio_DHparams, PEM_write_DHparams, | ||
| 19 | PEM_read_bio_X509, PEM_read_X509, PEM_write_bio_X509, PEM_write_X509, | ||
| 20 | PEM_read_bio_X509_AUX, PEM_read_X509_AUX, PEM_write_bio_X509_AUX, | ||
| 21 | PEM_write_X509_AUX, PEM_read_bio_X509_REQ, PEM_read_X509_REQ, | ||
| 22 | PEM_write_bio_X509_REQ, PEM_write_X509_REQ, PEM_write_bio_X509_REQ_NEW, | ||
| 23 | PEM_write_X509_REQ_NEW, PEM_read_bio_X509_CRL, PEM_read_X509_CRL, | ||
| 24 | PEM_write_bio_X509_CRL, PEM_write_X509_CRL, PEM_read_bio_PKCS7, PEM_read_PKCS7, | ||
| 25 | PEM_write_bio_PKCS7, PEM_write_PKCS7, PEM_read_bio_NETSCAPE_CERT_SEQUENCE, | ||
| 26 | PEM_read_NETSCAPE_CERT_SEQUENCE, PEM_write_bio_NETSCAPE_CERT_SEQUENCE, | ||
| 27 | PEM_write_NETSCAPE_CERT_SEQUENCE - PEM routines | ||
| 6 | 28 | ||
| 7 | =head1 SYNOPSIS | 29 | =head1 SYNOPSIS |
| 8 | 30 | ||
diff --git a/src/lib/libcrypto/doc/PEM_write_bio_CMS_stream.pod b/src/lib/libcrypto/doc/PEM_write_bio_CMS_stream.pod index e070c45c2e..f9946adebf 100644 --- a/src/lib/libcrypto/doc/PEM_write_bio_CMS_stream.pod +++ b/src/lib/libcrypto/doc/PEM_write_bio_CMS_stream.pod | |||
| @@ -2,7 +2,7 @@ | |||
| 2 | 2 | ||
| 3 | =head1 NAME | 3 | =head1 NAME |
| 4 | 4 | ||
| 5 | PEM_write_bio_CMS_stream - output CMS_ContentInfo structure in PEM format. | 5 | PEM_write_bio_CMS_stream - output CMS_ContentInfo structure in PEM format. |
| 6 | 6 | ||
| 7 | =head1 SYNOPSIS | 7 | =head1 SYNOPSIS |
| 8 | 8 | ||
diff --git a/src/lib/libcrypto/doc/PKCS12_create.pod b/src/lib/libcrypto/doc/PKCS12_create.pod index 0a1e460cf1..382193ec95 100644 --- a/src/lib/libcrypto/doc/PKCS12_create.pod +++ b/src/lib/libcrypto/doc/PKCS12_create.pod | |||
| @@ -38,13 +38,13 @@ The default MAC iteration count is 1 in order to retain compatibility with | |||
| 38 | old software which did not interpret MAC iteration counts. If such compatibility | 38 | old software which did not interpret MAC iteration counts. If such compatibility |
| 39 | is not required then B<mac_iter> should be set to PKCS12_DEFAULT_ITER. | 39 | is not required then B<mac_iter> should be set to PKCS12_DEFAULT_ITER. |
| 40 | 40 | ||
| 41 | B<keytype> adds a flag to the store private key. This is a non standard extension | 41 | B<keytype> adds a flag to the store private key. This is a non standard |
| 42 | that is only currently interpreted by MSIE. If set to zero the flag is omitted, | 42 | extension that is only currently interpreted by MSIE. If set to zero the flag |
| 43 | if set to B<KEY_SIG> the key can be used for signing only, if set to B<KEY_EX> | 43 | is omitted, if set to B<KEY_SIG> the key can be used for signing only, if set |
| 44 | it can be used for signing and encryption. This option was useful for old | 44 | to B<KEY_EX> it can be used for signing and encryption. This option was useful |
| 45 | export grade software which could use signing only keys of arbitrary size but | 45 | for old export grade software which could use signing only keys of arbitrary |
| 46 | had restrictions on the permissible sizes of keys which could be used for | 46 | size but had restrictions on the permissible sizes of keys which could be used |
| 47 | encryption. | 47 | for encryption. |
| 48 | 48 | ||
| 49 | =head1 NEW FUNCTIONALITY IN OPENSSL 0.9.8 | 49 | =head1 NEW FUNCTIONALITY IN OPENSSL 0.9.8 |
| 50 | 50 | ||
diff --git a/src/lib/libcrypto/doc/PKCS7_decrypt.pod b/src/lib/libcrypto/doc/PKCS7_decrypt.pod index 325699d0b6..78919998ce 100644 --- a/src/lib/libcrypto/doc/PKCS7_decrypt.pod +++ b/src/lib/libcrypto/doc/PKCS7_decrypt.pod | |||
| @@ -22,8 +22,9 @@ B<flags> is an optional set of flags. | |||
| 22 | OpenSSL_add_all_algorithms() (or equivalent) should be called before using this | 22 | OpenSSL_add_all_algorithms() (or equivalent) should be called before using this |
| 23 | function or errors about unknown algorithms will occur. | 23 | function or errors about unknown algorithms will occur. |
| 24 | 24 | ||
| 25 | Although the recipients certificate is not needed to decrypt the data it is needed | 25 | Although the recipients certificate is not needed to decrypt the data it is |
| 26 | to locate the appropriate (of possible several) recipients in the PKCS#7 structure. | 26 | needed to locate the appropriate (of possible several) recipients in the PKCS#7 |
| 27 | structure. | ||
| 27 | 28 | ||
| 28 | The following flags can be passed in the B<flags> parameter. | 29 | The following flags can be passed in the B<flags> parameter. |
| 29 | 30 | ||
| @@ -38,8 +39,9 @@ The error can be obtained from ERR_get_error(3) | |||
| 38 | 39 | ||
| 39 | =head1 BUGS | 40 | =head1 BUGS |
| 40 | 41 | ||
| 41 | PKCS7_decrypt() must be passed the correct recipient key and certificate. It would | 42 | PKCS7_decrypt() must be passed the correct recipient key and certificate. It |
| 42 | be better if it could look up the correct key and certificate from a database. | 43 | would be better if it could look up the correct key and certificate from a |
| 44 | database. | ||
| 43 | 45 | ||
| 44 | The lack of single pass processing and need to hold all data in memory as | 46 | The lack of single pass processing and need to hold all data in memory as |
| 45 | mentioned in PKCS7_sign() also applies to PKCS7_verify(). | 47 | mentioned in PKCS7_sign() also applies to PKCS7_verify(). |
diff --git a/src/lib/libcrypto/doc/PKCS7_verify.pod b/src/lib/libcrypto/doc/PKCS7_verify.pod index 51ada03f2d..f88e66632b 100644 --- a/src/lib/libcrypto/doc/PKCS7_verify.pod +++ b/src/lib/libcrypto/doc/PKCS7_verify.pod | |||
| @@ -37,9 +37,9 @@ be signedData. There must be at least one signature on the data and if | |||
| 37 | the content is detached B<indata> cannot be B<NULL>. | 37 | the content is detached B<indata> cannot be B<NULL>. |
| 38 | 38 | ||
| 39 | An attempt is made to locate all the signer's certificates, first looking in | 39 | An attempt is made to locate all the signer's certificates, first looking in |
| 40 | the B<certs> parameter (if it is not B<NULL>) and then looking in any certificates | 40 | the B<certs> parameter (if it is not B<NULL>) and then looking in any |
| 41 | contained in the B<p7> structure itself. If any signer's certificates cannot be | 41 | certificates contained in the B<p7> structure itself. If any signer's |
| 42 | located the operation fails. | 42 | certificates cannot be located the operation fails. |
| 43 | 43 | ||
| 44 | Each signer's certificate is chain verified using the B<smimesign> purpose and | 44 | Each signer's certificate is chain verified using the B<smimesign> purpose and |
| 45 | the supplied trusted certificate store. Any internal certificates in the message | 45 | the supplied trusted certificate store. Any internal certificates in the message |
| @@ -50,9 +50,9 @@ the signature's checked. | |||
| 50 | 50 | ||
| 51 | If all signature's verify correctly then the function is successful. | 51 | If all signature's verify correctly then the function is successful. |
| 52 | 52 | ||
| 53 | Any of the following flags (ored together) can be passed in the B<flags> parameter | 53 | Any of the following flags (ored together) can be passed in the B<flags> |
| 54 | to change the default verify behaviour. Only the flag B<PKCS7_NOINTERN> is | 54 | parameter to change the default verify behaviour. Only the flag |
| 55 | meaningful to PKCS7_get0_signers(). | 55 | B<PKCS7_NOINTERN> is meaningful to PKCS7_get0_signers(). |
| 56 | 56 | ||
| 57 | If B<PKCS7_NOINTERN> is set the certificates in the message itself are not | 57 | If B<PKCS7_NOINTERN> is set the certificates in the message itself are not |
| 58 | searched when locating the signer's certificate. This means that all the signers | 58 | searched when locating the signer's certificate. This means that all the signers |
diff --git a/src/lib/libcrypto/doc/RAND_bytes.pod b/src/lib/libcrypto/doc/RAND_bytes.pod index 1a9b91e281..34c945b4e5 100644 --- a/src/lib/libcrypto/doc/RAND_bytes.pod +++ b/src/lib/libcrypto/doc/RAND_bytes.pod | |||
| @@ -30,11 +30,10 @@ the new pseudo-random bytes unless disabled at compile time (see FAQ). | |||
| 30 | 30 | ||
| 31 | =head1 RETURN VALUES | 31 | =head1 RETURN VALUES |
| 32 | 32 | ||
| 33 | RAND_bytes() returns 1 on success, 0 otherwise. The error code can be | 33 | RAND_bytes() returns 1 on success, 0 otherwise. The error code can be obtained |
| 34 | obtained by L<ERR_get_error(3)|ERR_get_error(3)>. RAND_pseudo_bytes() returns 1 if the | 34 | by L<ERR_get_error(3)|ERR_get_error(3)>. RAND_pseudo_bytes() returns 1 if the |
| 35 | bytes generated are cryptographically strong, 0 otherwise. Both | 35 | bytes generated are cryptographically strong, 0 otherwise. Both functions |
| 36 | functions return -1 if they are not supported by the current RAND | 36 | return -1 if they are not supported by the current RAND method. |
| 37 | method. | ||
| 38 | 37 | ||
| 39 | =head1 SEE ALSO | 38 | =head1 SEE ALSO |
| 40 | 39 | ||
diff --git a/src/lib/libcrypto/doc/RAND_load_file.pod b/src/lib/libcrypto/doc/RAND_load_file.pod index 3f7e944d86..28118e3c2e 100644 --- a/src/lib/libcrypto/doc/RAND_load_file.pod +++ b/src/lib/libcrypto/doc/RAND_load_file.pod | |||
| @@ -43,7 +43,8 @@ error. | |||
| 43 | 43 | ||
| 44 | =head1 SEE ALSO | 44 | =head1 SEE ALSO |
| 45 | 45 | ||
| 46 | L<rand(3)|rand(3)>, L<RAND_add(3)|RAND_add(3)>, L<RAND_cleanup(3)|RAND_cleanup(3)> | 46 | L<rand(3)|rand(3)>, L<RAND_add(3)|RAND_add(3)>, |
| 47 | L<RAND_cleanup(3)|RAND_cleanup(3)> | ||
| 47 | 48 | ||
| 48 | =head1 HISTORY | 49 | =head1 HISTORY |
| 49 | 50 | ||
diff --git a/src/lib/libcrypto/doc/RSA_blinding_on.pod b/src/lib/libcrypto/doc/RSA_blinding_on.pod index fd2c69abd8..e6af8d4355 100644 --- a/src/lib/libcrypto/doc/RSA_blinding_on.pod +++ b/src/lib/libcrypto/doc/RSA_blinding_on.pod | |||
| @@ -2,7 +2,8 @@ | |||
| 2 | 2 | ||
| 3 | =head1 NAME | 3 | =head1 NAME |
| 4 | 4 | ||
| 5 | RSA_blinding_on, RSA_blinding_off - protect the RSA operation from timing attacks | 5 | RSA_blinding_on, RSA_blinding_off - protect the RSA operation from timing |
| 6 | attacks | ||
| 6 | 7 | ||
| 7 | =head1 SYNOPSIS | 8 | =head1 SYNOPSIS |
| 8 | 9 | ||
diff --git a/src/lib/libcrypto/doc/RSA_get_ex_new_index.pod b/src/lib/libcrypto/doc/RSA_get_ex_new_index.pod index 7d0fd1f91d..b1ac1167dd 100644 --- a/src/lib/libcrypto/doc/RSA_get_ex_new_index.pod +++ b/src/lib/libcrypto/doc/RSA_get_ex_new_index.pod | |||
| @@ -2,7 +2,8 @@ | |||
| 2 | 2 | ||
| 3 | =head1 NAME | 3 | =head1 NAME |
| 4 | 4 | ||
| 5 | RSA_get_ex_new_index, RSA_set_ex_data, RSA_get_ex_data - add application specific data to RSA structures | 5 | RSA_get_ex_new_index, RSA_set_ex_data, RSA_get_ex_data - add application |
| 6 | specific data to RSA structures | ||
| 6 | 7 | ||
| 7 | =head1 SYNOPSIS | 8 | =head1 SYNOPSIS |
| 8 | 9 | ||
| @@ -78,26 +79,27 @@ corresponding parameters when B<RSA_get_ex_new_index()> was called. | |||
| 78 | B<dup_func()> is called when a structure is being copied. Pointers to the | 79 | B<dup_func()> is called when a structure is being copied. Pointers to the |
| 79 | destination and source B<CRYPTO_EX_DATA> structures are passed in the B<to> and | 80 | destination and source B<CRYPTO_EX_DATA> structures are passed in the B<to> and |
| 80 | B<from> parameters respectively. The B<from_d> parameter is passed a pointer to | 81 | B<from> parameters respectively. The B<from_d> parameter is passed a pointer to |
| 81 | the source application data when the function is called, when the function returns | 82 | the source application data when the function is called, when the function |
| 82 | the value is copied to the destination: the application can thus modify the data | 83 | returns the value is copied to the destination: the application can thus modify |
| 83 | pointed to by B<from_d> and have different values in the source and destination. | 84 | the data pointed to by B<from_d> and have different values in the source and |
| 84 | The B<idx>, B<argl> and B<argp> parameters are the same as those in B<new_func()> | 85 | destination. The B<idx>, B<argl> and B<argp> parameters are the same as those |
| 85 | and B<free_func()>. | 86 | in B<new_func()> and B<free_func()>. |
| 86 | 87 | ||
| 87 | =head1 RETURN VALUES | 88 | =head1 RETURN VALUES |
| 88 | 89 | ||
| 89 | B<RSA_get_ex_new_index()> returns a new index or -1 on failure (note 0 is a valid | 90 | B<RSA_get_ex_new_index()> returns a new index or -1 on failure (note 0 is a |
| 90 | index value). | 91 | valid index value). |
| 91 | 92 | ||
| 92 | B<RSA_set_ex_data()> returns 1 on success or 0 on failure. | 93 | B<RSA_set_ex_data()> returns 1 on success or 0 on failure. |
| 93 | 94 | ||
| 94 | B<RSA_get_ex_data()> returns the application data or 0 on failure. 0 may also | 95 | B<RSA_get_ex_data()> returns the application data or 0 on failure. 0 may also |
| 95 | be valid application data but currently it can only fail if given an invalid B<idx> | 96 | be valid application data but currently it can only fail if given an invalid |
| 96 | parameter. | 97 | B<idx> parameter. |
| 97 | 98 | ||
| 98 | B<new_func()> and B<dup_func()> should return 0 for failure and 1 for success. | 99 | B<new_func()> and B<dup_func()> should return 0 for failure and 1 for success. |
| 99 | 100 | ||
| 100 | On failure an error code can be obtained from L<ERR_get_error(3)|ERR_get_error(3)>. | 101 | On failure an error code can be obtained from |
| 102 | L<ERR_get_error(3)|ERR_get_error(3)>. | ||
| 101 | 103 | ||
| 102 | =head1 BUGS | 104 | =head1 BUGS |
| 103 | 105 | ||
diff --git a/src/lib/libcrypto/doc/RSA_new.pod b/src/lib/libcrypto/doc/RSA_new.pod index 3d15b92824..41e5e60340 100644 --- a/src/lib/libcrypto/doc/RSA_new.pod +++ b/src/lib/libcrypto/doc/RSA_new.pod | |||
| @@ -22,9 +22,9 @@ erased before the memory is returned to the system. | |||
| 22 | 22 | ||
| 23 | =head1 RETURN VALUES | 23 | =head1 RETURN VALUES |
| 24 | 24 | ||
| 25 | If the allocation fails, RSA_new() returns B<NULL> and sets an error | 25 | If the allocation fails, RSA_new() returns B<NULL> and sets an error code that |
| 26 | code that can be obtained by L<ERR_get_error(3)|ERR_get_error(3)>. Otherwise it returns | 26 | can be obtained by L<ERR_get_error(3)|ERR_get_error(3)>. Otherwise it returns a |
| 27 | a pointer to the newly allocated structure. | 27 | pointer to the newly allocated structure. |
| 28 | 28 | ||
| 29 | RSA_free() returns no value. | 29 | RSA_free() returns no value. |
| 30 | 30 | ||
diff --git a/src/lib/libcrypto/doc/RSA_private_encrypt.pod b/src/lib/libcrypto/doc/RSA_private_encrypt.pod index 4c4d131172..aa2bc1bd76 100644 --- a/src/lib/libcrypto/doc/RSA_private_encrypt.pod +++ b/src/lib/libcrypto/doc/RSA_private_encrypt.pod | |||
| @@ -29,10 +29,9 @@ B<padding> denotes one of the following modes: | |||
| 29 | 29 | ||
| 30 | =item RSA_PKCS1_PADDING | 30 | =item RSA_PKCS1_PADDING |
| 31 | 31 | ||
| 32 | PKCS #1 v1.5 padding. This function does not handle the | 32 | PKCS #1 v1.5 padding. This function does not handle the B<algorithmIdentifier> |
| 33 | B<algorithmIdentifier> specified in PKCS #1. When generating or | 33 | specified in PKCS #1. When generating or verifying PKCS #1 signatures, |
| 34 | verifying PKCS #1 signatures, L<RSA_sign(3)|RSA_sign(3)> and L<RSA_verify(3)|RSA_verify(3)> should be | 34 | L<RSA_sign(3)|RSA_sign(3)> and L<RSA_verify(3)|RSA_verify(3)> should be used. |
| 35 | used. | ||
| 36 | 35 | ||
| 37 | =item RSA_NO_PADDING | 36 | =item RSA_NO_PADDING |
| 38 | 37 | ||
diff --git a/src/lib/libcrypto/doc/RSA_sign_ASN1_OCTET_STRING.pod b/src/lib/libcrypto/doc/RSA_sign_ASN1_OCTET_STRING.pod index e70380bbfc..315a9af9e8 100644 --- a/src/lib/libcrypto/doc/RSA_sign_ASN1_OCTET_STRING.pod +++ b/src/lib/libcrypto/doc/RSA_sign_ASN1_OCTET_STRING.pod | |||
| @@ -26,7 +26,8 @@ memory. | |||
| 26 | 26 | ||
| 27 | B<dummy> is ignored. | 27 | B<dummy> is ignored. |
| 28 | 28 | ||
| 29 | The random number generator must be seeded prior to calling RSA_sign_ASN1_OCTET_STRING(). | 29 | The random number generator must be seeded prior to calling |
| 30 | RSA_sign_ASN1_OCTET_STRING(). | ||
| 30 | 31 | ||
| 31 | RSA_verify_ASN1_OCTET_STRING() verifies that the signature B<sigbuf> | 32 | RSA_verify_ASN1_OCTET_STRING() verifies that the signature B<sigbuf> |
| 32 | of size B<siglen> is the DER representation of a given octet string | 33 | of size B<siglen> is the DER representation of a given octet string |
diff --git a/src/lib/libcrypto/doc/SHA1.pod b/src/lib/libcrypto/doc/SHA1.pod index 232af9227e..9fffdf59e7 100644 --- a/src/lib/libcrypto/doc/SHA1.pod +++ b/src/lib/libcrypto/doc/SHA1.pod | |||
| @@ -60,7 +60,8 @@ ANSI X9.30 | |||
| 60 | 60 | ||
| 61 | =head1 SEE ALSO | 61 | =head1 SEE ALSO |
| 62 | 62 | ||
| 63 | L<ripemd(3)|ripemd(3)>, L<hmac(3)|hmac(3)>, L<EVP_DigestInit(3)|EVP_DigestInit(3)> | 63 | L<ripemd(3)|ripemd(3)>, L<hmac(3)|hmac(3)>, |
| 64 | L<EVP_DigestInit(3)|EVP_DigestInit(3)> | ||
| 64 | 65 | ||
| 65 | =head1 HISTORY | 66 | =head1 HISTORY |
| 66 | 67 | ||
diff --git a/src/lib/libcrypto/doc/X509_NAME_add_entry_by_txt.pod b/src/lib/libcrypto/doc/X509_NAME_add_entry_by_txt.pod index 5b9e81b922..c6442b947f 100644 --- a/src/lib/libcrypto/doc/X509_NAME_add_entry_by_txt.pod +++ b/src/lib/libcrypto/doc/X509_NAME_add_entry_by_txt.pod | |||
| @@ -2,8 +2,9 @@ | |||
| 2 | 2 | ||
| 3 | =head1 NAME | 3 | =head1 NAME |
| 4 | 4 | ||
| 5 | X509_NAME_add_entry_by_txt, X509_NAME_add_entry_by_OBJ, X509_NAME_add_entry_by_NID, | 5 | X509_NAME_add_entry_by_txt, X509_NAME_add_entry_by_OBJ, |
| 6 | X509_NAME_add_entry, X509_NAME_delete_entry - X509_NAME modification functions | 6 | X509_NAME_add_entry_by_NID, X509_NAME_add_entry, X509_NAME_delete_entry - |
| 7 | X509_NAME modification functions | ||
| 7 | 8 | ||
| 8 | =head1 SYNOPSIS | 9 | =head1 SYNOPSIS |
| 9 | 10 | ||
diff --git a/src/lib/libcrypto/doc/X509_NAME_print_ex.pod b/src/lib/libcrypto/doc/X509_NAME_print_ex.pod index b2d86d4ddb..ff5d788d88 100644 --- a/src/lib/libcrypto/doc/X509_NAME_print_ex.pod +++ b/src/lib/libcrypto/doc/X509_NAME_print_ex.pod | |||
| @@ -16,16 +16,16 @@ X509_NAME_oneline - X509_NAME printing routines. | |||
| 16 | 16 | ||
| 17 | =head1 DESCRIPTION | 17 | =head1 DESCRIPTION |
| 18 | 18 | ||
| 19 | X509_NAME_print_ex() prints a human readable version of B<nm> to BIO B<out>. Each | 19 | X509_NAME_print_ex() prints a human readable version of B<nm> to BIO B<out>. |
| 20 | line (for multiline formats) is indented by B<indent> spaces. The output format | 20 | Each line (for multiline formats) is indented by B<indent> spaces. The output |
| 21 | can be extensively customised by use of the B<flags> parameter. | 21 | format can be extensively customised by use of the B<flags> parameter. |
| 22 | 22 | ||
| 23 | X509_NAME_print_ex_fp() is identical to X509_NAME_print_ex() except the output is | 23 | X509_NAME_print_ex_fp() is identical to X509_NAME_print_ex() except the output |
| 24 | written to FILE pointer B<fp>. | 24 | is written to FILE pointer B<fp>. |
| 25 | 25 | ||
| 26 | X509_NAME_oneline() prints an ASCII version of B<a> to B<buf>. At most B<size> | 26 | X509_NAME_oneline() prints an ASCII version of B<a> to B<buf>. At most B<size> |
| 27 | bytes will be written. If B<buf> is B<NULL> then a buffer is dynamically allocated | 27 | bytes will be written. If B<buf> is B<NULL> then a buffer is dynamically |
| 28 | and returned, otherwise B<buf> is returned. | 28 | allocated and returned, otherwise B<buf> is returned. |
| 29 | 29 | ||
| 30 | X509_NAME_print() prints out B<name> to B<bp> indenting each line by B<obase> | 30 | X509_NAME_print() prints out B<name> to B<bp> indenting each line by B<obase> |
| 31 | characters. Multiple lines are used if the output (including indent) exceeds | 31 | characters. Multiple lines are used if the output (including indent) exceeds |
| @@ -33,10 +33,10 @@ characters. Multiple lines are used if the output (including indent) exceeds | |||
| 33 | 33 | ||
| 34 | =head1 NOTES | 34 | =head1 NOTES |
| 35 | 35 | ||
| 36 | The functions X509_NAME_oneline() and X509_NAME_print() are legacy functions which | 36 | The functions X509_NAME_oneline() and X509_NAME_print() are legacy functions |
| 37 | produce a non standard output form, they don't handle multi character fields and | 37 | which produce a non standard output form, they don't handle multi character |
| 38 | have various quirks and inconsistencies. Their use is strongly discouraged in new | 38 | fields and have various quirks and inconsistencies. Their use is strongly |
| 39 | applications. | 39 | discouraged in new applications. |
| 40 | 40 | ||
| 41 | Although there are a large number of possible flags for most purposes | 41 | Although there are a large number of possible flags for most purposes |
| 42 | B<XN_FLAG_ONELINE>, B<XN_FLAG_MULTILINE> or B<XN_FLAG_RFC2253> will suffice. | 42 | B<XN_FLAG_ONELINE>, B<XN_FLAG_MULTILINE> or B<XN_FLAG_RFC2253> will suffice. |
| @@ -49,15 +49,16 @@ The complete set of the flags supported by X509_NAME_print_ex() is listed below. | |||
| 49 | Several options can be ored together. | 49 | Several options can be ored together. |
| 50 | 50 | ||
| 51 | The options B<XN_FLAG_SEP_COMMA_PLUS>, B<XN_FLAG_SEP_CPLUS_SPC>, | 51 | The options B<XN_FLAG_SEP_COMMA_PLUS>, B<XN_FLAG_SEP_CPLUS_SPC>, |
| 52 | B<XN_FLAG_SEP_SPLUS_SPC> and B<XN_FLAG_SEP_MULTILINE> determine the field separators | 52 | B<XN_FLAG_SEP_SPLUS_SPC> and B<XN_FLAG_SEP_MULTILINE> determine the field |
| 53 | to use. Two distinct separators are used between distinct RelativeDistinguishedName | 53 | separators to use. Two distinct separators are used between distinct |
| 54 | components and separate values in the same RDN for a multi-valued RDN. Multi-valued | 54 | RelativeDistinguishedName components and separate values in the same RDN for a |
| 55 | RDNs are currently very rare so the second separator will hardly ever be used. | 55 | multi-valued RDN. Multi-valued RDNs are currently very rare so the second |
| 56 | separator will hardly ever be used. | ||
| 56 | 57 | ||
| 57 | B<XN_FLAG_SEP_COMMA_PLUS> uses comma and plus as separators. B<XN_FLAG_SEP_CPLUS_SPC> | 58 | B<XN_FLAG_SEP_COMMA_PLUS> uses comma and plus as separators. |
| 58 | uses comma and plus with spaces: this is more readable that plain comma and plus. | 59 | B<XN_FLAG_SEP_CPLUS_SPC> uses comma and plus with spaces: this is more readable |
| 59 | B<XN_FLAG_SEP_SPLUS_SPC> uses spaced semicolon and plus. B<XN_FLAG_SEP_MULTILINE> uses | 60 | that plain comma and plus. B<XN_FLAG_SEP_SPLUS_SPC> uses spaced semicolon and |
| 60 | spaced newline and plus respectively. | 61 | plus. B<XN_FLAG_SEP_MULTILINE> uses spaced newline and plus respectively. |
| 61 | 62 | ||
| 62 | If B<XN_FLAG_DN_REV> is set the whole DN is printed in reversed order. | 63 | If B<XN_FLAG_DN_REV> is set the whole DN is printed in reversed order. |
| 63 | 64 | ||
| @@ -92,7 +93,8 @@ B<XN_FLAG_ONELINE> is a more readable one line format which is the same as: | |||
| 92 | B<XN_FLAG_MULTILINE> is a multiline format which is the same as: | 93 | B<XN_FLAG_MULTILINE> is a multiline format which is the same as: |
| 93 | B<ASN1_STRFLGS_ESC_CTRL | ASN1_STRFLGS_ESC_MSB | XN_FLAG_SEP_MULTILINE | XN_FLAG_SPC_EQ | XN_FLAG_FN_LN | XN_FLAG_FN_ALIGN> | 94 | B<ASN1_STRFLGS_ESC_CTRL | ASN1_STRFLGS_ESC_MSB | XN_FLAG_SEP_MULTILINE | XN_FLAG_SPC_EQ | XN_FLAG_FN_LN | XN_FLAG_FN_ALIGN> |
| 94 | 95 | ||
| 95 | B<XN_FLAG_COMPAT> uses a format identical to X509_NAME_print(): in fact it calls X509_NAME_print() internally. | 96 | B<XN_FLAG_COMPAT> uses a format identical to X509_NAME_print(): in fact it |
| 97 | calls X509_NAME_print() internally. | ||
| 96 | 98 | ||
| 97 | =head1 SEE ALSO | 99 | =head1 SEE ALSO |
| 98 | 100 | ||
diff --git a/src/lib/libcrypto/doc/X509_STORE_CTX_get_error.pod b/src/lib/libcrypto/doc/X509_STORE_CTX_get_error.pod index 60e8332ae9..5760f64fcb 100644 --- a/src/lib/libcrypto/doc/X509_STORE_CTX_get_error.pod +++ b/src/lib/libcrypto/doc/X509_STORE_CTX_get_error.pod | |||
| @@ -2,7 +2,10 @@ | |||
| 2 | 2 | ||
| 3 | =head1 NAME | 3 | =head1 NAME |
| 4 | 4 | ||
| 5 | X509_STORE_CTX_get_error, X509_STORE_CTX_set_error, X509_STORE_CTX_get_error_depth, X509_STORE_CTX_get_current_cert, X509_STORE_CTX_get1_chain, X509_verify_cert_error_string - get or set certificate verification status information | 5 | X509_STORE_CTX_get_error, X509_STORE_CTX_set_error, |
| 6 | X509_STORE_CTX_get_error_depth, X509_STORE_CTX_get_current_cert, | ||
| 7 | X509_STORE_CTX_get1_chain, X509_verify_cert_error_string - get or set | ||
| 8 | certificate verification status information | ||
| 6 | 9 | ||
| 7 | =head1 SYNOPSIS | 10 | =head1 SYNOPSIS |
| 8 | 11 | ||
| @@ -82,19 +85,22 @@ of an untrusted certificate cannot be found. | |||
| 82 | 85 | ||
| 83 | the CRL of a certificate could not be found. | 86 | the CRL of a certificate could not be found. |
| 84 | 87 | ||
| 85 | =item B<X509_V_ERR_UNABLE_TO_DECRYPT_CERT_SIGNATURE: unable to decrypt certificate's signature> | 88 | =item B<X509_V_ERR_UNABLE_TO_DECRYPT_CERT_SIGNATURE: unable to decrypt |
| 89 | certificate's signature> | ||
| 86 | 90 | ||
| 87 | the certificate signature could not be decrypted. This means that the actual | 91 | the certificate signature could not be decrypted. This means that the actual |
| 88 | signature value could not be determined rather than it not matching the | 92 | signature value could not be determined rather than it not matching the |
| 89 | expected value, this is only meaningful for RSA keys. | 93 | expected value, this is only meaningful for RSA keys. |
| 90 | 94 | ||
| 91 | =item B<X509_V_ERR_UNABLE_TO_DECRYPT_CRL_SIGNATURE: unable to decrypt CRL's signature> | 95 | =item B<X509_V_ERR_UNABLE_TO_DECRYPT_CRL_SIGNATURE: unable to decrypt CRL's |
| 96 | signature> | ||
| 92 | 97 | ||
| 93 | the CRL signature could not be decrypted: this means that the actual signature | 98 | the CRL signature could not be decrypted: this means that the actual signature |
| 94 | value could not be determined rather than it not matching the expected value. | 99 | value could not be determined rather than it not matching the expected value. |
| 95 | Unused. | 100 | Unused. |
| 96 | 101 | ||
| 97 | =item B<X509_V_ERR_UNABLE_TO_DECODE_ISSUER_PUBLIC_KEY: unable to decode issuer public key> | 102 | =item B<X509_V_ERR_UNABLE_TO_DECODE_ISSUER_PUBLIC_KEY: unable to decode issuer |
| 103 | public key> | ||
| 98 | 104 | ||
| 99 | the public key in the certificate SubjectPublicKeyInfo could not be read. | 105 | the public key in the certificate SubjectPublicKeyInfo could not be read. |
| 100 | 106 | ||
| @@ -112,7 +118,8 @@ the certificate is not yet valid: the notBefore date is after the current time. | |||
| 112 | 118 | ||
| 113 | =item B<X509_V_ERR_CERT_HAS_EXPIRED: certificate has expired> | 119 | =item B<X509_V_ERR_CERT_HAS_EXPIRED: certificate has expired> |
| 114 | 120 | ||
| 115 | the certificate has expired: that is the notAfter date is before the current time. | 121 | the certificate has expired: that is the notAfter date is before the current |
| 122 | time. | ||
| 116 | 123 | ||
| 117 | =item B<X509_V_ERR_CRL_NOT_YET_VALID: CRL is not yet valid> | 124 | =item B<X509_V_ERR_CRL_NOT_YET_VALID: CRL is not yet valid> |
| 118 | 125 | ||
| @@ -122,19 +129,23 @@ the CRL is not yet valid. | |||
| 122 | 129 | ||
| 123 | the CRL has expired. | 130 | the CRL has expired. |
| 124 | 131 | ||
| 125 | =item B<X509_V_ERR_ERROR_IN_CERT_NOT_BEFORE_FIELD: format error in certificate's notBefore field> | 132 | =item B<X509_V_ERR_ERROR_IN_CERT_NOT_BEFORE_FIELD: format error in |
| 133 | certificate's notBefore field> | ||
| 126 | 134 | ||
| 127 | the certificate notBefore field contains an invalid time. | 135 | the certificate notBefore field contains an invalid time. |
| 128 | 136 | ||
| 129 | =item B<X509_V_ERR_ERROR_IN_CERT_NOT_AFTER_FIELD: format error in certificate's notAfter field> | 137 | =item B<X509_V_ERR_ERROR_IN_CERT_NOT_AFTER_FIELD: format error in certificate's |
| 138 | notAfter field> | ||
| 130 | 139 | ||
| 131 | the certificate notAfter field contains an invalid time. | 140 | the certificate notAfter field contains an invalid time. |
| 132 | 141 | ||
| 133 | =item B<X509_V_ERR_ERROR_IN_CRL_LAST_UPDATE_FIELD: format error in CRL's lastUpdate field> | 142 | =item B<X509_V_ERR_ERROR_IN_CRL_LAST_UPDATE_FIELD: format error in CRL's |
| 143 | lastUpdate field> | ||
| 134 | 144 | ||
| 135 | the CRL lastUpdate field contains an invalid time. | 145 | the CRL lastUpdate field contains an invalid time. |
| 136 | 146 | ||
| 137 | =item B<X509_V_ERR_ERROR_IN_CRL_NEXT_UPDATE_FIELD: format error in CRL's nextUpdate field> | 147 | =item B<X509_V_ERR_ERROR_IN_CRL_NEXT_UPDATE_FIELD: format error in CRL's |
| 148 | nextUpdate field> | ||
| 138 | 149 | ||
| 139 | the CRL nextUpdate field contains an invalid time. | 150 | the CRL nextUpdate field contains an invalid time. |
| 140 | 151 | ||
| @@ -147,17 +158,20 @@ an error occurred trying to allocate memory. This should never happen. | |||
| 147 | the passed certificate is self signed and the same certificate cannot be found | 158 | the passed certificate is self signed and the same certificate cannot be found |
| 148 | in the list of trusted certificates. | 159 | in the list of trusted certificates. |
| 149 | 160 | ||
| 150 | =item B<X509_V_ERR_SELF_SIGNED_CERT_IN_CHAIN: self signed certificate in certificate chain> | 161 | =item B<X509_V_ERR_SELF_SIGNED_CERT_IN_CHAIN: self signed certificate in |
| 162 | certificate chain> | ||
| 151 | 163 | ||
| 152 | the certificate chain could be built up using the untrusted certificates but | 164 | the certificate chain could be built up using the untrusted certificates but |
| 153 | the root could not be found locally. | 165 | the root could not be found locally. |
| 154 | 166 | ||
| 155 | =item B<X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT_LOCALLY: unable to get local issuer certificate> | 167 | =item B<X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT_LOCALLY: unable to get local |
| 168 | issuer certificate> | ||
| 156 | 169 | ||
| 157 | the issuer certificate of a locally looked up certificate could not be found. | 170 | the issuer certificate of a locally looked up certificate could not be found. |
| 158 | This normally means the list of trusted certificates is not complete. | 171 | This normally means the list of trusted certificates is not complete. |
| 159 | 172 | ||
| 160 | =item B<X509_V_ERR_UNABLE_TO_VERIFY_LEAF_SIGNATURE: unable to verify the first certificate> | 173 | =item B<X509_V_ERR_UNABLE_TO_VERIFY_LEAF_SIGNATURE: unable to verify the first |
| 174 | certificate> | ||
| 161 | 175 | ||
| 162 | no signatures could be verified because the chain contains only one certificate | 176 | no signatures could be verified because the chain contains only one certificate |
| 163 | and it is not self signed. | 177 | and it is not self signed. |
| @@ -198,34 +212,39 @@ did not match the issuer name of the current certificate. This is only set | |||
| 198 | if issuer check debugging is enabled it is used for status notification and | 212 | if issuer check debugging is enabled it is used for status notification and |
| 199 | is B<not> in itself an error. | 213 | is B<not> in itself an error. |
| 200 | 214 | ||
| 201 | =item B<X509_V_ERR_AKID_SKID_MISMATCH: authority and subject key identifier mismatch> | 215 | =item B<X509_V_ERR_AKID_SKID_MISMATCH: authority and subject key identifier |
| 216 | mismatch> | ||
| 202 | 217 | ||
| 203 | the current candidate issuer certificate was rejected because its subject key | 218 | the current candidate issuer certificate was rejected because its subject key |
| 204 | identifier was present and did not match the authority key identifier current | 219 | identifier was present and did not match the authority key identifier current |
| 205 | certificate. This is only set if issuer check debugging is enabled it is used | 220 | certificate. This is only set if issuer check debugging is enabled it is used |
| 206 | for status notification and is B<not> in itself an error. | 221 | for status notification and is B<not> in itself an error. |
| 207 | 222 | ||
| 208 | =item B<X509_V_ERR_AKID_ISSUER_SERIAL_MISMATCH: authority and issuer serial number mismatch> | 223 | =item B<X509_V_ERR_AKID_ISSUER_SERIAL_MISMATCH: authority and issuer serial |
| 224 | number mismatch> | ||
| 209 | 225 | ||
| 210 | the current candidate issuer certificate was rejected because its issuer name | 226 | the current candidate issuer certificate was rejected because its issuer name |
| 211 | and serial number was present and did not match the authority key identifier of | 227 | and serial number was present and did not match the authority key identifier of |
| 212 | the current certificate. This is only set if issuer check debugging is enabled | 228 | the current certificate. This is only set if issuer check debugging is enabled |
| 213 | it is used for status notification and is B<not> in itself an error. | 229 | it is used for status notification and is B<not> in itself an error. |
| 214 | 230 | ||
| 215 | =item B<X509_V_ERR_KEYUSAGE_NO_CERTSIGN:key usage does not include certificate signing> | 231 | =item B<X509_V_ERR_KEYUSAGE_NO_CERTSIGN:key usage does not include certificate |
| 232 | signing> | ||
| 216 | 233 | ||
| 217 | the current candidate issuer certificate was rejected because its keyUsage | 234 | the current candidate issuer certificate was rejected because its keyUsage |
| 218 | extension does not permit certificate signing. This is only set if issuer check | 235 | extension does not permit certificate signing. This is only set if issuer check |
| 219 | debugging is enabled it is used for status notification and is B<not> in itself | 236 | debugging is enabled it is used for status notification and is B<not> in itself |
| 220 | an error. | 237 | an error. |
| 221 | 238 | ||
| 222 | =item B<X509_V_ERR_INVALID_EXTENSION: invalid or inconsistent certificate extension> | 239 | =item B<X509_V_ERR_INVALID_EXTENSION: invalid or inconsistent certificate |
| 240 | extension> | ||
| 223 | 241 | ||
| 224 | A certificate extension had an invalid value (for example an incorrect | 242 | A certificate extension had an invalid value (for example an incorrect |
| 225 | encoding) or some value inconsistent with other extensions. | 243 | encoding) or some value inconsistent with other extensions. |
| 226 | 244 | ||
| 227 | 245 | ||
| 228 | =item B<X509_V_ERR_INVALID_POLICY_EXTENSION: invalid or inconsistent certificate policy extension> | 246 | =item B<X509_V_ERR_INVALID_POLICY_EXTENSION: invalid or inconsistent |
| 247 | certificate policy extension> | ||
| 229 | 248 | ||
| 230 | A certificate policies extension had an invalid value (for example an incorrect | 249 | A certificate policies extension had an invalid value (for example an incorrect |
| 231 | encoding) or some value inconsistent with other extensions. This error only | 250 | encoding) or some value inconsistent with other extensions. This error only |
| @@ -252,17 +271,20 @@ A name constraint violation occured in the permitted subtrees. | |||
| 252 | 271 | ||
| 253 | A name constraint violation occured in the excluded subtrees. | 272 | A name constraint violation occured in the excluded subtrees. |
| 254 | 273 | ||
| 255 | =item B<X509_V_ERR_SUBTREE_MINMAX: name constraints minimum and maximum not supported> | 274 | =item B<X509_V_ERR_SUBTREE_MINMAX: name constraints minimum and maximum not |
| 275 | supported> | ||
| 256 | 276 | ||
| 257 | A certificate name constraints extension included a minimum or maximum field: | 277 | A certificate name constraints extension included a minimum or maximum field: |
| 258 | this is not supported. | 278 | this is not supported. |
| 259 | 279 | ||
| 260 | =item B<X509_V_ERR_UNSUPPORTED_CONSTRAINT_TYPE: unsupported name constraint type> | 280 | =item B<X509_V_ERR_UNSUPPORTED_CONSTRAINT_TYPE: unsupported name constraint |
| 281 | type> | ||
| 261 | 282 | ||
| 262 | An unsupported name constraint type was encountered. OpenSSL currently only | 283 | An unsupported name constraint type was encountered. OpenSSL currently only |
| 263 | supports directory name, DNS name, email and URI types. | 284 | supports directory name, DNS name, email and URI types. |
| 264 | 285 | ||
| 265 | =item B<X509_V_ERR_UNSUPPORTED_CONSTRAINT_SYNTAX: unsupported or invalid name constraint syntax> | 286 | =item B<X509_V_ERR_UNSUPPORTED_CONSTRAINT_SYNTAX: unsupported or invalid name |
| 287 | constraint syntax> | ||
| 266 | 288 | ||
| 267 | The format of the name constraint is not recognised: for example an email | 289 | The format of the name constraint is not recognised: for example an email |
| 268 | address format of a form not mentioned in RFC3280. This could be caused by | 290 | address format of a form not mentioned in RFC3280. This could be caused by |
diff --git a/src/lib/libcrypto/doc/X509_STORE_CTX_get_ex_new_index.pod b/src/lib/libcrypto/doc/X509_STORE_CTX_get_ex_new_index.pod index 1b75967ccd..392b36c3ae 100644 --- a/src/lib/libcrypto/doc/X509_STORE_CTX_get_ex_new_index.pod +++ b/src/lib/libcrypto/doc/X509_STORE_CTX_get_ex_new_index.pod | |||
| @@ -2,7 +2,9 @@ | |||
| 2 | 2 | ||
| 3 | =head1 NAME | 3 | =head1 NAME |
| 4 | 4 | ||
| 5 | X509_STORE_CTX_get_ex_new_index, X509_STORE_CTX_set_ex_data, X509_STORE_CTX_get_ex_data - add application specific data to X509_STORE_CTX structures | 5 | X509_STORE_CTX_get_ex_new_index, X509_STORE_CTX_set_ex_data, |
| 6 | X509_STORE_CTX_get_ex_data - add application specific data to X509_STORE_CTX | ||
| 7 | structures | ||
| 6 | 8 | ||
| 7 | =head1 SYNOPSIS | 9 | =head1 SYNOPSIS |
| 8 | 10 | ||
diff --git a/src/lib/libcrypto/doc/X509_STORE_CTX_new.pod b/src/lib/libcrypto/doc/X509_STORE_CTX_new.pod index 1c55236aa2..8f602274ee 100644 --- a/src/lib/libcrypto/doc/X509_STORE_CTX_new.pod +++ b/src/lib/libcrypto/doc/X509_STORE_CTX_new.pod | |||
| @@ -2,7 +2,11 @@ | |||
| 2 | 2 | ||
| 3 | =head1 NAME | 3 | =head1 NAME |
| 4 | 4 | ||
| 5 | X509_STORE_CTX_new, X509_STORE_CTX_cleanup, X509_STORE_CTX_free, X509_STORE_CTX_init, X509_STORE_CTX_trusted_stack, X509_STORE_CTX_set_cert, X509_STORE_CTX_set_chain, X509_STORE_CTX_set0_crls, X509_STORE_CTX_get0_param, X509_STORE_CTX_set0_param, X509_STORE_CTX_set_default - X509_STORE_CTX initialisation | 5 | X509_STORE_CTX_new, X509_STORE_CTX_cleanup, X509_STORE_CTX_free, |
| 6 | X509_STORE_CTX_init, X509_STORE_CTX_trusted_stack, X509_STORE_CTX_set_cert, | ||
| 7 | X509_STORE_CTX_set_chain, X509_STORE_CTX_set0_crls, X509_STORE_CTX_get0_param, | ||
| 8 | X509_STORE_CTX_set0_param, X509_STORE_CTX_set_default - X509_STORE_CTX | ||
| 9 | initialisation | ||
| 6 | 10 | ||
| 7 | =head1 SYNOPSIS | 11 | =head1 SYNOPSIS |
| 8 | 12 | ||
diff --git a/src/lib/libcrypto/doc/X509_STORE_set_verify_cb_func.pod b/src/lib/libcrypto/doc/X509_STORE_set_verify_cb_func.pod index 012f2d2c75..f9602b3e77 100644 --- a/src/lib/libcrypto/doc/X509_STORE_set_verify_cb_func.pod +++ b/src/lib/libcrypto/doc/X509_STORE_set_verify_cb_func.pod | |||
| @@ -2,7 +2,8 @@ | |||
| 2 | 2 | ||
| 3 | =head1 NAME | 3 | =head1 NAME |
| 4 | 4 | ||
| 5 | X509_STORE_set_verify_cb_func, X509_STORE_set_verify_cb - set verification callback | 5 | X509_STORE_set_verify_cb_func, X509_STORE_set_verify_cb - set verification |
| 6 | callback | ||
| 6 | 7 | ||
| 7 | =head1 SYNOPSIS | 8 | =head1 SYNOPSIS |
| 8 | 9 | ||
diff --git a/src/lib/libcrypto/doc/X509_VERIFY_PARAM_set_flags.pod b/src/lib/libcrypto/doc/X509_VERIFY_PARAM_set_flags.pod index e5da5bec08..f213a9c117 100644 --- a/src/lib/libcrypto/doc/X509_VERIFY_PARAM_set_flags.pod +++ b/src/lib/libcrypto/doc/X509_VERIFY_PARAM_set_flags.pod | |||
| @@ -2,7 +2,12 @@ | |||
| 2 | 2 | ||
| 3 | =head1 NAME | 3 | =head1 NAME |
| 4 | 4 | ||
| 5 | X509_VERIFY_PARAM_set_flags, X509_VERIFY_PARAM_clear_flags, X509_VERIFY_PARAM_get_flags, X509_VERIFY_PARAM_set_purpose, X509_VERIFY_PARAM_set_trust, X509_VERIFY_PARAM_set_depth, X509_VERIFY_PARAM_get_depth, X509_VERIFY_PARAM_set_time, X509_VERIFY_PARAM_add0_policy, X509_VERIFY_PARAM_set1_policies - X509 verification parameters | 5 | X509_VERIFY_PARAM_set_flags, X509_VERIFY_PARAM_clear_flags, |
| 6 | X509_VERIFY_PARAM_get_flags, X509_VERIFY_PARAM_set_purpose, | ||
| 7 | X509_VERIFY_PARAM_set_trust, X509_VERIFY_PARAM_set_depth, | ||
| 8 | X509_VERIFY_PARAM_get_depth, X509_VERIFY_PARAM_set_time, | ||
| 9 | X509_VERIFY_PARAM_add0_policy, X509_VERIFY_PARAM_set1_policies - X509 | ||
| 10 | verification parameters | ||
| 6 | 11 | ||
| 7 | =head1 SYNOPSIS | 12 | =head1 SYNOPSIS |
| 8 | 13 | ||
diff --git a/src/lib/libcrypto/doc/bn.pod b/src/lib/libcrypto/doc/bn.pod index cd2f8e50c6..4a3f24ba30 100644 --- a/src/lib/libcrypto/doc/bn.pod +++ b/src/lib/libcrypto/doc/bn.pod | |||
| @@ -166,10 +166,10 @@ of B<BIGNUM>s to external formats is described in L<BN_bn2bin(3)|BN_bn2bin(3)>. | |||
| 166 | 166 | ||
| 167 | =head1 SEE ALSO | 167 | =head1 SEE ALSO |
| 168 | 168 | ||
| 169 | L<bn_internal(3)|bn_internal(3)>, | 169 | L<bn_internal(3)|bn_internal(3)>, L<dh(3)|dh(3)>, L<err(3)|err(3)>, |
| 170 | L<dh(3)|dh(3)>, L<err(3)|err(3)>, L<rand(3)|rand(3)>, L<rsa(3)|rsa(3)>, | 170 | L<rand(3)|rand(3)>, L<rsa(3)|rsa(3)>, L<BN_new(3)|BN_new(3)>, |
| 171 | L<BN_new(3)|BN_new(3)>, L<BN_CTX_new(3)|BN_CTX_new(3)>, | 171 | L<BN_CTX_new(3)|BN_CTX_new(3)>, L<BN_copy(3)|BN_copy(3)>, |
| 172 | L<BN_copy(3)|BN_copy(3)>, L<BN_swap(3)|BN_swap(3)>, L<BN_num_bytes(3)|BN_num_bytes(3)>, | 172 | L<BN_swap(3)|BN_swap(3)>, L<BN_num_bytes(3)|BN_num_bytes(3)>, |
| 173 | L<BN_add(3)|BN_add(3)>, L<BN_add_word(3)|BN_add_word(3)>, | 173 | L<BN_add(3)|BN_add(3)>, L<BN_add_word(3)|BN_add_word(3)>, |
| 174 | L<BN_cmp(3)|BN_cmp(3)>, L<BN_zero(3)|BN_zero(3)>, L<BN_rand(3)|BN_rand(3)>, | 174 | L<BN_cmp(3)|BN_cmp(3)>, L<BN_zero(3)|BN_zero(3)>, L<BN_rand(3)|BN_rand(3)>, |
| 175 | L<BN_generate_prime(3)|BN_generate_prime(3)>, L<BN_set_bit(3)|BN_set_bit(3)>, | 175 | L<BN_generate_prime(3)|BN_generate_prime(3)>, L<BN_set_bit(3)|BN_set_bit(3)>, |
diff --git a/src/lib/libcrypto/doc/d2i_RSAPublicKey.pod b/src/lib/libcrypto/doc/d2i_RSAPublicKey.pod index 1711dc038f..68e7f27de5 100644 --- a/src/lib/libcrypto/doc/d2i_RSAPublicKey.pod +++ b/src/lib/libcrypto/doc/d2i_RSAPublicKey.pod | |||
| @@ -29,14 +29,14 @@ d2i_Netscape_RSA - RSA public and private key encoding functions. | |||
| 29 | 29 | ||
| 30 | =head1 DESCRIPTION | 30 | =head1 DESCRIPTION |
| 31 | 31 | ||
| 32 | d2i_RSAPublicKey() and i2d_RSAPublicKey() decode and encode a PKCS#1 RSAPublicKey | 32 | d2i_RSAPublicKey() and i2d_RSAPublicKey() decode and encode a PKCS#1 |
| 33 | structure. | 33 | RSAPublicKey structure. |
| 34 | 34 | ||
| 35 | d2i_RSA_PUBKEY() and i2d_RSA_PUBKEY() decode and encode an RSA public key using | 35 | d2i_RSA_PUBKEY() and i2d_RSA_PUBKEY() decode and encode an RSA public key using |
| 36 | a SubjectPublicKeyInfo (certificate public key) structure. | 36 | a SubjectPublicKeyInfo (certificate public key) structure. |
| 37 | 37 | ||
| 38 | d2i_RSAPrivateKey(), i2d_RSAPrivateKey() decode and encode a PKCS#1 RSAPrivateKey | 38 | d2i_RSAPrivateKey(), i2d_RSAPrivateKey() decode and encode a PKCS#1 |
| 39 | structure. | 39 | RSAPrivateKey structure. |
| 40 | 40 | ||
| 41 | d2i_Netscape_RSA(), i2d_Netscape_RSA() decode and encode an RSA private key in | 41 | d2i_Netscape_RSA(), i2d_Netscape_RSA() decode and encode an RSA private key in |
| 42 | NET format. | 42 | NET format. |
diff --git a/src/lib/libcrypto/doc/dh.pod b/src/lib/libcrypto/doc/dh.pod index 97aaa75731..5fb9890a77 100644 --- a/src/lib/libcrypto/doc/dh.pod +++ b/src/lib/libcrypto/doc/dh.pod | |||
| @@ -40,10 +40,11 @@ dh - Diffie-Hellman key agreement | |||
| 40 | 40 | ||
| 41 | =head1 DESCRIPTION | 41 | =head1 DESCRIPTION |
| 42 | 42 | ||
| 43 | These functions implement the Diffie-Hellman key agreement protocol. | 43 | These functions implement the Diffie-Hellman key agreement protocol. The |
| 44 | The generation of shared DH parameters is described in | 44 | generation of shared DH parameters is described in |
| 45 | L<DH_generate_parameters(3)|DH_generate_parameters(3)>; L<DH_generate_key(3)|DH_generate_key(3)> describes how | 45 | L<DH_generate_parameters(3)|DH_generate_parameters(3)>; |
| 46 | to perform a key agreement. | 46 | L<DH_generate_key(3)|DH_generate_key(3)> describes how to perform a key |
| 47 | agreement. | ||
| 47 | 48 | ||
| 48 | The B<DH> structure consists of several BIGNUM components. | 49 | The B<DH> structure consists of several BIGNUM components. |
| 49 | 50 | ||
