diff options
author | schwarze <> | 2020-06-03 13:41:27 +0000 |
---|---|---|
committer | schwarze <> | 2020-06-03 13:41:27 +0000 |
commit | 19f9a4a6a75ddb174cd77d6e0749b6fe9979e7c0 (patch) | |
tree | a20bd946e865f05d6bc35d05ac42fc545068567d /src/lib/libcrypto/man/PKCS7_final.3 | |
parent | c34de2c3490495ca1d9afcbc43593161c810b669 (diff) | |
download | openbsd-19f9a4a6a75ddb174cd77d6e0749b6fe9979e7c0.tar.gz openbsd-19f9a4a6a75ddb174cd77d6e0749b6fe9979e7c0.tar.bz2 openbsd-19f9a4a6a75ddb174cd77d6e0749b6fe9979e7c0.zip |
Properly document PKCS7_final(3), which was already mentioned
in passing in some other manual pages.
Diffstat (limited to 'src/lib/libcrypto/man/PKCS7_final.3')
-rw-r--r-- | src/lib/libcrypto/man/PKCS7_final.3 | 201 |
1 files changed, 201 insertions, 0 deletions
diff --git a/src/lib/libcrypto/man/PKCS7_final.3 b/src/lib/libcrypto/man/PKCS7_final.3 new file mode 100644 index 0000000000..593483bb6d --- /dev/null +++ b/src/lib/libcrypto/man/PKCS7_final.3 | |||
@@ -0,0 +1,201 @@ | |||
1 | .\" $OpenBSD: PKCS7_final.3,v 1.1 2020/06/03 13:41:27 schwarze Exp $ | ||
2 | .\" | ||
3 | .\" Copyright (c) 2020 Ingo Schwarze <schwarze@openbsd.org> | ||
4 | .\" | ||
5 | .\" Permission to use, copy, modify, and distribute this software for any | ||
6 | .\" purpose with or without fee is hereby granted, provided that the above | ||
7 | .\" copyright notice and this permission notice appear in all copies. | ||
8 | .\" | ||
9 | .\" THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES | ||
10 | .\" WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF | ||
11 | .\" MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR | ||
12 | .\" ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES | ||
13 | .\" WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN | ||
14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | ||
15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | ||
16 | .\" | ||
17 | .Dd $Mdocdate: June 3 2020 $ | ||
18 | .Dt PKCS7_FINAL 3 | ||
19 | .Os | ||
20 | .Sh NAME | ||
21 | .Nm PKCS7_final | ||
22 | .Nd read data from a BIO into a ContentInfo object | ||
23 | .Sh SYNOPSIS | ||
24 | .In openssl/pkcs7.h | ||
25 | .Ft int | ||
26 | .Fo PKCS7_final | ||
27 | .Fa "PKCS7 *p7" | ||
28 | .Fa "BIO *data" | ||
29 | .Fa "int flags" | ||
30 | .Fc | ||
31 | .Sh DESCRIPTION | ||
32 | .Fn PKCS7_final | ||
33 | reads | ||
34 | .Fa data | ||
35 | and puts it into the appropriate content field of | ||
36 | .Fa p7 | ||
37 | itself or of its appropriate substructure, which can be of type | ||
38 | .Vt SignedData , | ||
39 | .Vt EnvelopedData , | ||
40 | .Vt SignedAndEnvelopedData , | ||
41 | .Vt DigestedData , | ||
42 | or arbitrary data. | ||
43 | The | ||
44 | .Xr PKCS7_dataFinal 3 | ||
45 | manual explains which field exactly the data is put into. | ||
46 | .Pp | ||
47 | The following | ||
48 | .Fa flags | ||
49 | are recognized: | ||
50 | .Bl -tag -width PKCS7_BINARY | ||
51 | .It Dv PKCS7_BINARY | ||
52 | Copy the data verbatim without changing any bytes. | ||
53 | By default, line endings are replaced with two-byte | ||
54 | .Qq \er\en | ||
55 | sequences (ASCII CR+LF). | ||
56 | If this flag is set, | ||
57 | .Dv PKCS7_TEXT | ||
58 | is ignored. | ||
59 | .It Dv PKCS7_TEXT | ||
60 | Prepend | ||
61 | .Qq Content-Type: text/plain | ||
62 | followed by a blank line to the data. | ||
63 | This flag is ignored if | ||
64 | .Dv PKCS7_BINARY | ||
65 | is also set. | ||
66 | .El | ||
67 | .Pp | ||
68 | If any other bits are set in | ||
69 | .Fa flags , | ||
70 | for example | ||
71 | .Dv PKCS7_STREAM | ||
72 | or | ||
73 | .Dv PKCS7_PARTIAL , | ||
74 | they are ignored, allowing to pass the same | ||
75 | .Fa flags | ||
76 | argument that was already passed to | ||
77 | .Xr PKCS7_sign 3 | ||
78 | or | ||
79 | .Xr PKCS7_encrypt 3 . | ||
80 | .Pp | ||
81 | .Fn PKCS7_final | ||
82 | is most commonly used to finalize a | ||
83 | .Fa p7 | ||
84 | object returned from a call to | ||
85 | .Xr PKCS7_sign 3 | ||
86 | that used | ||
87 | .Fa flags | ||
88 | including | ||
89 | .Dv PKCS7_PARTIAL | ||
90 | or | ||
91 | .Dv PKCS7_STREAM . | ||
92 | With these flags, | ||
93 | .Xr PKCS7_sign 3 | ||
94 | ignores its | ||
95 | .Fa data | ||
96 | argument. | ||
97 | The partial | ||
98 | .Fa p7 | ||
99 | object returned can then be customized, for example setting up | ||
100 | multiple signers or non-default digest algorithms with | ||
101 | .Xr PKCS7_sign_add_signer 3 , | ||
102 | before calling | ||
103 | .Fn PKCS7_final . | ||
104 | .Pp | ||
105 | Similarly, | ||
106 | .Fn PKCS7_final | ||
107 | can be used to finalize a | ||
108 | .Fa p7 | ||
109 | object returned from a call to | ||
110 | .Xr PKCS7_encrypt 3 | ||
111 | that used | ||
112 | .Fa flags | ||
113 | including | ||
114 | .Dv PKCS7_STREAM . | ||
115 | .Pp | ||
116 | Since | ||
117 | .Fn PKCS7_final | ||
118 | starts by calling | ||
119 | .Xr PKCS7_dataInit 3 | ||
120 | internally, using it to finalize a | ||
121 | .Fa p7 | ||
122 | object containing | ||
123 | .Vt SignedAndEnvelopedData , | ||
124 | .Vt DigestedData , | ||
125 | or arbitrary data requires the setup described in the | ||
126 | .Xr PKCS7_dataInit 3 | ||
127 | manual. | ||
128 | For | ||
129 | .Vt SignedData | ||
130 | and | ||
131 | .Vt EnvelopedData , | ||
132 | such manual setup is also feasible, but it is more easily performed with | ||
133 | .Xr PKCS7_sign 3 | ||
134 | or | ||
135 | .Xr PKCS7_encrypt 3 , | ||
136 | respectively. | ||
137 | .Pp | ||
138 | .Fn PKCS7_final | ||
139 | is only one among several functions that can be used to finalize | ||
140 | .Fa p7 ; | ||
141 | alternatives include | ||
142 | .Xr SMIME_write_PKCS7 3 , | ||
143 | .Xr PEM_write_bio_PKCS7_stream 3 , | ||
144 | and | ||
145 | .Xr i2d_PKCS7_bio_stream 3 . | ||
146 | .Sh RETURN VALUES | ||
147 | .Fn PKCS7_final | ||
148 | returns 1 on success or 0 on failure. | ||
149 | .Pp | ||
150 | Possible reasons for failure include: | ||
151 | .Pp | ||
152 | .Bl -dash -compact -offset 2n -width 1n | ||
153 | .It | ||
154 | .Fa p7 | ||
155 | is | ||
156 | .Dv NULL . | ||
157 | .It | ||
158 | The | ||
159 | .Fa content | ||
160 | field of | ||
161 | .Fa p7 | ||
162 | is empty. | ||
163 | .It | ||
164 | The | ||
165 | .Fa contentType | ||
166 | of | ||
167 | .Fa p7 | ||
168 | is unsupported. | ||
169 | .It | ||
170 | Signing or digesting is requested and | ||
171 | .Fa p7 | ||
172 | is not configured to store a detached signature, but does not contain | ||
173 | the required field to store the content either. | ||
174 | .It | ||
175 | At least one signer lacks a useable digest algorithm. | ||
176 | .It | ||
177 | A cipher is required but none is configured. | ||
178 | .It | ||
179 | Any required operation fails, for example signing or digesting. | ||
180 | .It | ||
181 | Memory allocation fails. | ||
182 | .El | ||
183 | .Pp | ||
184 | Signers lacking private keys do not cause failure but are silently skipped. | ||
185 | .Sh SEE ALSO | ||
186 | .Xr BIO_new 3 , | ||
187 | .Xr i2d_PKCS7_bio_stream 3 , | ||
188 | .Xr PEM_write_bio_PKCS7_stream 3 , | ||
189 | .Xr PKCS7_dataFinal 3 , | ||
190 | .Xr PKCS7_dataInit 3 , | ||
191 | .Xr PKCS7_encrypt 3 , | ||
192 | .Xr PKCS7_new 3 , | ||
193 | .Xr PKCS7_sign 3 , | ||
194 | .Xr SMIME_write_PKCS7 3 | ||
195 | .Sh HISTORY | ||
196 | .Fn PKCS7_final | ||
197 | first appeared in OpenSSL 1.0.0 and has been available since | ||
198 | .Ox 4.9 . | ||
199 | .Sh CAVEATS | ||
200 | This function does not support | ||
201 | .Vt EncryptedData . | ||