summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto/doc/evp.pod
diff options
context:
space:
mode:
authormiod <>2014-07-11 16:18:14 +0000
committermiod <>2014-07-11 16:18:14 +0000
commit42ef36c6813822962aff009ee1ca5eaf04d6c5c7 (patch)
treed06ffa1565a72fd493dbed6024d44e5daa26be91 /src/lib/libcrypto/doc/evp.pod
parent687488572f223f89cf98909e87b4d1a3fbb14bfd (diff)
downloadopenbsd-42ef36c6813822962aff009ee1ca5eaf04d6c5c7.tar.gz
openbsd-42ef36c6813822962aff009ee1ca5eaf04d6c5c7.tar.bz2
openbsd-42ef36c6813822962aff009ee1ca5eaf04d6c5c7.zip
Huge documentation update for libcrypto and libssl, mostly from Matt Caswell,
Jeff Trawick, Jean-Paul Calderone, Michal Bozon, Jeffrey Walton and Rich Salz, via OpenSSL trunk (with some parts not applying to us, such as SSLv2 support, at least partially removed).
Diffstat (limited to 'src/lib/libcrypto/doc/evp.pod')
-rw-r--r--src/lib/libcrypto/doc/evp.pod66
1 files changed, 57 insertions, 9 deletions
diff --git a/src/lib/libcrypto/doc/evp.pod b/src/lib/libcrypto/doc/evp.pod
index 33ce7cb6d6..57c761d01f 100644
--- a/src/lib/libcrypto/doc/evp.pod
+++ b/src/lib/libcrypto/doc/evp.pod
@@ -13,22 +13,58 @@ evp - high-level cryptographic functions
13The EVP library provides a high-level interface to cryptographic 13The EVP library provides a high-level interface to cryptographic
14functions. 14functions.
15 15
16B<EVP_Seal>I<...> and B<EVP_Open>I<...> provide public key encryption 16L<B<EVP_Seal>I<...>|EVP_SealInit(3)> and L<B<EVP_Open>I<...>|EVP_OpenInit(3)>
17and decryption to implement digital "envelopes". 17provide public key encryption and decryption to implement digital "envelopes".
18 18
19The B<EVP_Sign>I<...> and B<EVP_Verify>I<...> functions implement 19The L<B<EVP_DigestSign>I<...>|EVP_DigestSignInit(3)> and
20digital signatures. 20L<B<EVP_DigestVerify>I<...>|EVP_DigestVerifyInit(3)> functions implement
21digital signatures and Message Authentication Codes (MACs). Also see the older
22L<B<EVP_Sign>I<...>|EVP_SignInit(3)> and L<B<EVP_Verify>I<...>|EVP_VerifyInit(3)>
23functions.
21 24
22Symmetric encryption is available with the B<EVP_Encrypt>I<...> 25Symmetric encryption is available with the L<B<EVP_Encrypt>I<...>|EVP_EncryptInit(3)>
23functions. The B<EVP_Digest>I<...> functions provide message digests. 26functions. The L<B<EVP_Digest>I<...>|EVP_DigestInit(3)> functions provide message digests.
24 27
25The B<EVP_PKEY>I<...> functions provide a high level interface to 28The B<EVP_PKEY>I<...> functions provide a high level interface to
26asymmetric algorithms. 29asymmetric algorithms. To create a new EVP_PKEY see
30L<EVP_PKEY_new(3)|EVP_PKEY_new(3)>. EVP_PKEYs can be associated
31with a private key of a particular algorithm by using the functions
32described on the L<EVP_PKEY_set1_RSA(3)|EVP_PKEY_set1_RSA(3)> page, or
33new keys can be generated using L<EVP_PKEY_keygen(3)|EVP_PKEY_keygen(3)>.
34EVP_PKEYs can be compared using L<EVP_PKEY_cmp(3)|EVP_PKEY_cmp(3)>, or printed using
35L<EVP_PKEY_print_private(3)|EVP_PKEY_print_private(3)>.
36
37The EVP_PKEY functions support the full range of asymmetric algorithm operations:
38
39=over
40
41=item For key agreement see L<EVP_PKEY_derive(3)|EVP_PKEY_derive(3)>
42
43=item For signing and verifying see L<EVP_PKEY_sign(3)|EVP_PKEY_sign(3)>,
44L<EVP_PKEY_verify(3)|EVP_PKEY_verify(3)> and L<EVP_PKEY_verify_recover(3)|EVP_PKEY_verify_recover(3)>.
45However, note that
46these functions do not perform a digest of the data to be signed. Therefore
47normally you would use the L<B<EVP_DigestSign>I<...>|EVP_DigestSignInit(3)>
48functions for this purpose.
49
50=item For encryption and decryption see L<EVP_PKEY_encrypt(3)|EVP_PKEY_encrypt(3)>
51and L<EVP_PKEY_decrypt(3)|EVP_PKEY_decrypt(3)> respectively. However, note that
52these functions perform encryption and decryption only. As public key
53encryption is an expensive operation, normally you would wrap
54an encrypted message in a "digital envelope" using the L<B<EVP_Seal>I<...>|EVP_SealInit(3)> and
55L<B<EVP_Open>I<...>|EVP_OpenInit(3)> functions.
56
57=back
58
59The L<EVP_BytesToKey(3)|EVP_BytesToKey(3)> function provides some limited support for password
60based encryption. Careful selection of the parameters will provide a PKCS#5 PBKDF1 compatible
61implementation. However, new applications should not typically use this (preferring, for example,
62PBKDF2 from PCKS#5).
27 63
28Algorithms are loaded with OpenSSL_add_all_algorithms(3). 64Algorithms are loaded with L<OpenSSL_add_all_algorithms(3)|OpenSSL_add_all_algorithms(3)>.
29 65
30All the symmetric algorithms (ciphers), digests and asymmetric algorithms 66All the symmetric algorithms (ciphers), digests and asymmetric algorithms
31(public key algorithms) can be replaced by ENGINE modules providing alternative 67(public key algorithms) can be replaced by L<ENGINE|engine(3)> modules providing alternative
32implementations. If ENGINE implementations of ciphers or digests are registered 68implementations. If ENGINE implementations of ciphers or digests are registered
33as defaults, then the various EVP functions will automatically use those 69as defaults, then the various EVP functions will automatically use those
34implementations automatically in preference to built in software 70implementations automatically in preference to built in software
@@ -47,8 +83,20 @@ L<EVP_DigestInit(3)|EVP_DigestInit(3)>,
47L<EVP_EncryptInit(3)|EVP_EncryptInit(3)>, 83L<EVP_EncryptInit(3)|EVP_EncryptInit(3)>,
48L<EVP_OpenInit(3)|EVP_OpenInit(3)>, 84L<EVP_OpenInit(3)|EVP_OpenInit(3)>,
49L<EVP_SealInit(3)|EVP_SealInit(3)>, 85L<EVP_SealInit(3)|EVP_SealInit(3)>,
86L<EVP_DigestSignInit(3)|EVP_DigestSignInit(3)>,
50L<EVP_SignInit(3)|EVP_SignInit(3)>, 87L<EVP_SignInit(3)|EVP_SignInit(3)>,
51L<EVP_VerifyInit(3)|EVP_VerifyInit(3)>, 88L<EVP_VerifyInit(3)|EVP_VerifyInit(3)>,
89L<EVP_PKEY_new(3)|EVP_PKEY_new(3)>,
90L<EVP_PKEY_set1_RSA(3)|EVP_PKEY_set1_RSA(3)>,
91L<EVP_PKEY_keygen(3)|EVP_PKEY_keygen(3)>,
92L<EVP_PKEY_print_private(3)|EVP_PKEY_print_private(3)>,
93L<EVP_PKEY_decrypt(3)|EVP_PKEY_decrypt(3)>,
94L<EVP_PKEY_encrypt(3)|EVP_PKEY_encrypt(3)>,
95L<EVP_PKEY_sign(3)|EVP_PKEY_sign(3)>,
96L<EVP_PKEY_verify(3)|EVP_PKEY_verify(3)>,
97L<EVP_PKEY_verify_recover(3)|EVP_PKEY_verify_recover(3)>,
98L<EVP_PKEY_derive(3)|EVP_PKEY_derive(3)>,
99L<EVP_BytesToKey(3)|EVP_BytesToKey(3)>,
52L<OpenSSL_add_all_algorithms(3)|OpenSSL_add_all_algorithms(3)>, 100L<OpenSSL_add_all_algorithms(3)|OpenSSL_add_all_algorithms(3)>,
53L<engine(3)|engine(3)> 101L<engine(3)|engine(3)>
54 102