summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto/doc/EVP_EncryptInit.pod
diff options
context:
space:
mode:
authorjim <>2014-05-04 21:46:36 +0000
committerjim <>2014-05-04 21:46:36 +0000
commitadc2a0a37a306f738da40a5a46f14e7fc9f1f571 (patch)
treea8892de8fd6e54fc93e929516a1ed1c754ef77fd /src/lib/libcrypto/doc/EVP_EncryptInit.pod
parentc247b29180fe4c94ba872da4fd237eab43c0df48 (diff)
downloadopenbsd-adc2a0a37a306f738da40a5a46f14e7fc9f1f571.tar.gz
openbsd-adc2a0a37a306f738da40a5a46f14e7fc9f1f571.tar.bz2
openbsd-adc2a0a37a306f738da40a5a46f14e7fc9f1f571.zip
Remove trailing whitespace.
fine jmc@
Diffstat (limited to 'src/lib/libcrypto/doc/EVP_EncryptInit.pod')
-rw-r--r--src/lib/libcrypto/doc/EVP_EncryptInit.pod16
1 files changed, 8 insertions, 8 deletions
diff --git a/src/lib/libcrypto/doc/EVP_EncryptInit.pod b/src/lib/libcrypto/doc/EVP_EncryptInit.pod
index 1c4bf184a1..84875e0fe0 100644
--- a/src/lib/libcrypto/doc/EVP_EncryptInit.pod
+++ b/src/lib/libcrypto/doc/EVP_EncryptInit.pod
@@ -128,7 +128,7 @@ calls to EVP_EncryptUpdate() should be made.
128 128
129If padding is disabled then EVP_EncryptFinal_ex() will not encrypt any more 129If padding is disabled then EVP_EncryptFinal_ex() will not encrypt any more
130data and it will return an error if any data remains in a partial block: 130data and it will return an error if any data remains in a partial block:
131that is if the total data length is not a multiple of the block size. 131that is if the total data length is not a multiple of the block size.
132 132
133EVP_DecryptInit_ex(), EVP_DecryptUpdate() and EVP_DecryptFinal_ex() are the 133EVP_DecryptInit_ex(), EVP_DecryptUpdate() and EVP_DecryptFinal_ex() are the
134corresponding decryption operations. EVP_DecryptFinal() will return an 134corresponding decryption operations. EVP_DecryptFinal() will return an
@@ -157,7 +157,7 @@ initialized and they always use the default cipher implementation.
157 157
158EVP_EncryptFinal(), EVP_DecryptFinal() and EVP_CipherFinal() behave in a 158EVP_EncryptFinal(), EVP_DecryptFinal() and EVP_CipherFinal() behave in a
159similar way to EVP_EncryptFinal_ex(), EVP_DecryptFinal_ex() and 159similar way to EVP_EncryptFinal_ex(), EVP_DecryptFinal_ex() and
160EVP_CipherFinal_ex() except B<ctx> is automatically cleaned up 160EVP_CipherFinal_ex() except B<ctx> is automatically cleaned up
161after the call. 161after the call.
162 162
163EVP_get_cipherbyname(), EVP_get_cipherbynid() and EVP_get_cipherbyobj() 163EVP_get_cipherbyname(), EVP_get_cipherbynid() and EVP_get_cipherbyobj()
@@ -268,7 +268,7 @@ OBJECT IDENTIFIER or NID_undef if it has no defined OBJECT IDENTIFIER.
268 268
269EVP_CIPHER_CTX_cipher() returns an B<EVP_CIPHER> structure. 269EVP_CIPHER_CTX_cipher() returns an B<EVP_CIPHER> structure.
270 270
271EVP_CIPHER_param_to_asn1() and EVP_CIPHER_asn1_to_param() return 1 for 271EVP_CIPHER_param_to_asn1() and EVP_CIPHER_asn1_to_param() return 1 for
272success or zero for failure. 272success or zero for failure.
273 273
274=head1 CIPHER LISTING 274=head1 CIPHER LISTING
@@ -283,7 +283,7 @@ Null cipher: does nothing.
283 283
284=item EVP_des_cbc(void), EVP_des_ecb(void), EVP_des_cfb(void), EVP_des_ofb(void) 284=item EVP_des_cbc(void), EVP_des_ecb(void), EVP_des_cfb(void), EVP_des_ofb(void)
285 285
286DES in CBC, ECB, CFB and OFB modes respectively. 286DES in CBC, ECB, CFB and OFB modes respectively.
287 287
288=item EVP_des_ede_cbc(void), EVP_des_ede(), EVP_des_ede_ofb(void), EVP_des_ede_cfb(void) 288=item EVP_des_ede_cbc(void), EVP_des_ede(), EVP_des_ede_ofb(void), EVP_des_ede_cfb(void)
289 289
@@ -346,7 +346,7 @@ Where possible the B<EVP> interface to symmetric ciphers should be used in
346preference to the low level interfaces. This is because the code then becomes 346preference to the low level interfaces. This is because the code then becomes
347transparent to the cipher used and much more flexible. 347transparent to the cipher used and much more flexible.
348 348
349PKCS padding works by adding B<n> padding bytes of value B<n> to make the total 349PKCS padding works by adding B<n> padding bytes of value B<n> to make the total
350length of the encrypted data a multiple of the block size. Padding is always 350length of the encrypted data a multiple of the block size. Padding is always
351added so if the data is already a multiple of the block size B<n> will equal 351added so if the data is already a multiple of the block size B<n> will equal
352the block size. For example if the block size is 8 and 11 bytes are to be 352the block size. For example if the block size is 8 and 11 bytes are to be
@@ -376,7 +376,7 @@ a limitation of the current RC5 code rather than the EVP interface.
376 376
377EVP_MAX_KEY_LENGTH and EVP_MAX_IV_LENGTH only refer to the internal ciphers with 377EVP_MAX_KEY_LENGTH and EVP_MAX_IV_LENGTH only refer to the internal ciphers with
378default key lengths. If custom ciphers exceed these values the results are 378default key lengths. If custom ciphers exceed these values the results are
379unpredictable. This is because it has become standard practice to define a 379unpredictable. This is because it has become standard practice to define a
380generic key as a fixed unsigned char array containing EVP_MAX_KEY_LENGTH bytes. 380generic key as a fixed unsigned char array containing EVP_MAX_KEY_LENGTH bytes.
381 381
382The ASN1 code is incomplete (and sometimes inaccurate) it has only been tested 382The ASN1 code is incomplete (and sometimes inaccurate) it has only been tested
@@ -449,7 +449,7 @@ Encrypt a string using blowfish:
449 449
450The ciphertext from the above example can be decrypted using the B<openssl> 450The ciphertext from the above example can be decrypted using the B<openssl>
451utility with the command line: 451utility with the command line:
452 452
453 S<openssl bf -in cipher.bin -K 000102030405060708090A0B0C0D0E0F -iv 0102030405060708 -d> 453 S<openssl bf -in cipher.bin -K 000102030405060708090A0B0C0D0E0F -iv 0102030405060708 -d>
454 454
455General encryption, decryption function example using FILE I/O and RC2 with an 455General encryption, decryption function example using FILE I/O and RC2 with an
@@ -472,7 +472,7 @@ General encryption, decryption function example using FILE I/O and RC2 with an
472 /* We finished modifying parameters so now we can set key and IV */ 472 /* We finished modifying parameters so now we can set key and IV */
473 EVP_CipherInit_ex(&ctx, NULL, NULL, key, iv, do_encrypt); 473 EVP_CipherInit_ex(&ctx, NULL, NULL, key, iv, do_encrypt);
474 474
475 for(;;) 475 for(;;)
476 { 476 {
477 inlen = fread(inbuf, 1, 1024, in); 477 inlen = fread(inbuf, 1, 1024, in);
478 if(inlen <= 0) break; 478 if(inlen <= 0) break;