diff options
| author | jim <> | 2014-05-04 22:26:33 +0000 |
|---|---|---|
| committer | jim <> | 2014-05-04 22:26:33 +0000 |
| commit | cd97ab584496168ea99dfe43e3be997ea086b8e6 (patch) | |
| tree | c61ab0faf9a25b5fa4c1daeb8248a7e8deff66d2 /src/lib/libcrypto/doc/EVP_PKEY_CTX_ctrl.pod | |
| parent | 18a7f65e7a1b8f6fab29266772aee3efe424a41a (diff) | |
| download | openbsd-cd97ab584496168ea99dfe43e3be997ea086b8e6.tar.gz openbsd-cd97ab584496168ea99dfe43e3be997ea086b8e6.tar.bz2 openbsd-cd97ab584496168ea99dfe43e3be997ea086b8e6.zip | |
Improve line wrapping for lines exceeding 80 chars.
ok jmc@
Diffstat (limited to 'src/lib/libcrypto/doc/EVP_PKEY_CTX_ctrl.pod')
| -rw-r--r-- | src/lib/libcrypto/doc/EVP_PKEY_CTX_ctrl.pod | 11 |
1 files changed, 6 insertions, 5 deletions
diff --git a/src/lib/libcrypto/doc/EVP_PKEY_CTX_ctrl.pod b/src/lib/libcrypto/doc/EVP_PKEY_CTX_ctrl.pod index e8d1ddda75..ba6e51100b 100644 --- a/src/lib/libcrypto/doc/EVP_PKEY_CTX_ctrl.pod +++ b/src/lib/libcrypto/doc/EVP_PKEY_CTX_ctrl.pod | |||
| @@ -65,14 +65,15 @@ RSA_PKCS1_OAEP_PADDING for OAEP padding (encrypt and decrypt only), | |||
| 65 | RSA_X931_PADDING for X9.31 padding (signature operations only) and | 65 | RSA_X931_PADDING for X9.31 padding (signature operations only) and |
| 66 | RSA_PKCS1_PSS_PADDING (sign and verify only). | 66 | RSA_PKCS1_PSS_PADDING (sign and verify only). |
| 67 | 67 | ||
| 68 | Two RSA padding modes behave differently if EVP_PKEY_CTX_set_signature_md() | 68 | Two RSA padding modes behave differently if EVP_PKEY_CTX_set_signature_md() is |
| 69 | is used. If this macro is called for PKCS#1 padding the plaintext buffer is | 69 | used. If this macro is called for PKCS#1 padding the plaintext buffer is an |
| 70 | an actual digest value and is encapsulated in a DigestInfo structure according | 70 | actual digest value and is encapsulated in a DigestInfo structure according to |
| 71 | to PKCS#1 when signing and this structure is expected (and stripped off) when | 71 | PKCS#1 when signing and this structure is expected (and stripped off) when |
| 72 | verifying. If this control is not used with RSA and PKCS#1 padding then the | 72 | verifying. If this control is not used with RSA and PKCS#1 padding then the |
| 73 | supplied data is used directly and not encapsulated. In the case of X9.31 | 73 | supplied data is used directly and not encapsulated. In the case of X9.31 |
| 74 | padding for RSA the algorithm identifier byte is added or checked and removed | 74 | padding for RSA the algorithm identifier byte is added or checked and removed |
| 75 | if this control is called. If it is not called then the first byte of the plaintext buffer is expected to be the algorithm identifier byte. | 75 | if this control is called. If it is not called then the first byte of the |
| 76 | plaintext buffer is expected to be the algorithm identifier byte. | ||
| 76 | 77 | ||
| 77 | The EVP_PKEY_CTX_set_rsa_pss_saltlen() macro sets the RSA PSS salt length to | 78 | The EVP_PKEY_CTX_set_rsa_pss_saltlen() macro sets the RSA PSS salt length to |
| 78 | B<len> as its name implies it is only supported for PSS padding. Two special | 79 | B<len> as its name implies it is only supported for PSS padding. Two special |
