diff options
| author | reyk <> | 2015-10-14 07:41:28 +0000 |
|---|---|---|
| committer | reyk <> | 2015-10-14 07:41:28 +0000 |
| commit | 9fee752a9626100a2cde1d90c2e54aabef4f5397 (patch) | |
| tree | 7f4867395e575d1b4040494f072e867f05b550b7 /src/lib/libcrypto/doc/evp.pod | |
| parent | 96da573f99f59914fdb5787f3b7529300fea564b (diff) | |
| download | openbsd-9fee752a9626100a2cde1d90c2e54aabef4f5397.tar.gz openbsd-9fee752a9626100a2cde1d90c2e54aabef4f5397.tar.bz2 openbsd-9fee752a9626100a2cde1d90c2e54aabef4f5397.zip | |
Add EVP_AEAD_CTX_init(3) manpage to document the new(ish) AEAD API.
The "authenticated encryption with additional data" API is used for
ciphers like AES-GCM or ChaCha20-Poly1305. The manpage is a beginning
and certainly needs more work, especially improvements in the EXAMPLES
section.
Based on agl's source code comments.
Converted from pod to mandoc by schwarze@
OK schwarze@ jsing@
Diffstat (limited to 'src/lib/libcrypto/doc/evp.pod')
| -rw-r--r-- | src/lib/libcrypto/doc/evp.pod | 4 |
1 files changed, 4 insertions, 0 deletions
diff --git a/src/lib/libcrypto/doc/evp.pod b/src/lib/libcrypto/doc/evp.pod index 57c761d01f..dfd96d3b98 100644 --- a/src/lib/libcrypto/doc/evp.pod +++ b/src/lib/libcrypto/doc/evp.pod | |||
| @@ -25,6 +25,9 @@ functions. | |||
| 25 | Symmetric encryption is available with the L<B<EVP_Encrypt>I<...>|EVP_EncryptInit(3)> | 25 | Symmetric encryption is available with the L<B<EVP_Encrypt>I<...>|EVP_EncryptInit(3)> |
| 26 | functions. The L<B<EVP_Digest>I<...>|EVP_DigestInit(3)> functions provide message digests. | 26 | functions. The L<B<EVP_Digest>I<...>|EVP_DigestInit(3)> functions provide message digests. |
| 27 | 27 | ||
| 28 | Authenticated encryption with additional data (AEAD) is available with | ||
| 29 | the L<B<EVP_AEAD>I<...>|EVP_AEAD_CTX_init(3)> functions. | ||
| 30 | |||
| 28 | The B<EVP_PKEY>I<...> functions provide a high level interface to | 31 | The B<EVP_PKEY>I<...> functions provide a high level interface to |
| 29 | asymmetric algorithms. To create a new EVP_PKEY see | 32 | asymmetric algorithms. To create a new EVP_PKEY see |
| 30 | L<EVP_PKEY_new(3)|EVP_PKEY_new(3)>. EVP_PKEYs can be associated | 33 | L<EVP_PKEY_new(3)|EVP_PKEY_new(3)>. EVP_PKEYs can be associated |
| @@ -81,6 +84,7 @@ using the high level interface. | |||
| 81 | 84 | ||
| 82 | L<EVP_DigestInit(3)|EVP_DigestInit(3)>, | 85 | L<EVP_DigestInit(3)|EVP_DigestInit(3)>, |
| 83 | L<EVP_EncryptInit(3)|EVP_EncryptInit(3)>, | 86 | L<EVP_EncryptInit(3)|EVP_EncryptInit(3)>, |
| 87 | L<EVP_AEAD_CTX_init(3)|EVP_AEAD_CTX_init(3)>, | ||
| 84 | L<EVP_OpenInit(3)|EVP_OpenInit(3)>, | 88 | L<EVP_OpenInit(3)|EVP_OpenInit(3)>, |
| 85 | L<EVP_SealInit(3)|EVP_SealInit(3)>, | 89 | L<EVP_SealInit(3)|EVP_SealInit(3)>, |
| 86 | L<EVP_DigestSignInit(3)|EVP_DigestSignInit(3)>, | 90 | L<EVP_DigestSignInit(3)|EVP_DigestSignInit(3)>, |
