diff options
author | djm <> | 2018-09-12 06:35:38 +0000 |
---|---|---|
committer | djm <> | 2018-09-12 06:35:38 +0000 |
commit | 8862867fd25d4b58970fbba6b27ed2a36347500d (patch) | |
tree | aaeca881a5b92a89a54597eeb5aacdbd9d58fe30 /src/lib/libcrypto/man | |
parent | 55621332fb7374cfcfccae0561ed84e62513e575 (diff) | |
download | openbsd-8862867fd25d4b58970fbba6b27ed2a36347500d.tar.gz openbsd-8862867fd25d4b58970fbba6b27ed2a36347500d.tar.bz2 openbsd-8862867fd25d4b58970fbba6b27ed2a36347500d.zip |
Add some accessor functions:
RSA_meth_get_finish() RSA_meth_set1_name() EVP_CIPHER_CTX_(get|set)_iv()
feedback and ok jsing@ tb@
Diffstat (limited to 'src/lib/libcrypto/man')
-rw-r--r-- | src/lib/libcrypto/man/EVP_EncryptInit.3 | 35 | ||||
-rw-r--r-- | src/lib/libcrypto/man/RSA_meth_new.3 | 44 |
2 files changed, 67 insertions, 12 deletions
diff --git a/src/lib/libcrypto/man/EVP_EncryptInit.3 b/src/lib/libcrypto/man/EVP_EncryptInit.3 index 1409bfed69..0dbaa6c848 100644 --- a/src/lib/libcrypto/man/EVP_EncryptInit.3 +++ b/src/lib/libcrypto/man/EVP_EncryptInit.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: EVP_EncryptInit.3,v 1.23 2018/08/28 17:47:29 tb Exp $ | 1 | .\" $OpenBSD: EVP_EncryptInit.3,v 1.24 2018/09/12 06:35:38 djm Exp $ |
2 | .\" full merge up to: OpenSSL 5211e094 Nov 11 14:39:11 2014 -0800 | 2 | .\" full merge up to: OpenSSL 5211e094 Nov 11 14:39:11 2014 -0800 |
3 | .\" selective merge up to: OpenSSL 16cfc2c9 Mar 8 22:30:28 2018 +0100 | 3 | .\" selective merge up to: OpenSSL 16cfc2c9 Mar 8 22:30:28 2018 +0100 |
4 | .\" | 4 | .\" |
@@ -51,7 +51,7 @@ | |||
51 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 51 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
52 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 52 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
53 | .\" | 53 | .\" |
54 | .Dd $Mdocdate: August 28 2018 $ | 54 | .Dd $Mdocdate: September 12 2018 $ |
55 | .Dt EVP_ENCRYPTINIT 3 | 55 | .Dt EVP_ENCRYPTINIT 3 |
56 | .Os | 56 | .Os |
57 | .Sh NAME | 57 | .Sh NAME |
@@ -94,6 +94,8 @@ | |||
94 | .Nm EVP_CIPHER_CTX_block_size , | 94 | .Nm EVP_CIPHER_CTX_block_size , |
95 | .Nm EVP_CIPHER_CTX_key_length , | 95 | .Nm EVP_CIPHER_CTX_key_length , |
96 | .Nm EVP_CIPHER_CTX_iv_length , | 96 | .Nm EVP_CIPHER_CTX_iv_length , |
97 | .Nm EVP_CIPHER_CTX_get_iv , | ||
98 | .Nm EVP_CIPHER_CTX_set_iv , | ||
97 | .Nm EVP_CIPHER_CTX_get_app_data , | 99 | .Nm EVP_CIPHER_CTX_get_app_data , |
98 | .Nm EVP_CIPHER_CTX_set_app_data , | 100 | .Nm EVP_CIPHER_CTX_set_app_data , |
99 | .Nm EVP_CIPHER_CTX_type , | 101 | .Nm EVP_CIPHER_CTX_type , |
@@ -367,6 +369,18 @@ | |||
367 | .Fo EVP_CIPHER_CTX_iv_length | 369 | .Fo EVP_CIPHER_CTX_iv_length |
368 | .Fa "const EVP_CIPHER_CTX *ctx" | 370 | .Fa "const EVP_CIPHER_CTX *ctx" |
369 | .Fc | 371 | .Fc |
372 | .Ft int | ||
373 | .Fo EVP_CIPHER_CTX_get_iv | ||
374 | .Fa "const EVP_CIPHER_CTX *ctx" | ||
375 | .Fa "u_char *iv" | ||
376 | .Fa "size_t len" | ||
377 | .Fc | ||
378 | .Ft int | ||
379 | .Fo EVP_CIPHER_CTX_set_iv | ||
380 | .Fa "EVP_CIPHER_CTX *ctx" | ||
381 | .Fa "const u_char *iv" | ||
382 | .Fa "size_t len" | ||
383 | .Fc | ||
370 | .Ft void * | 384 | .Ft void * |
371 | .Fo EVP_CIPHER_CTX_get_app_data | 385 | .Fo EVP_CIPHER_CTX_get_app_data |
372 | .Fa "const EVP_CIPHER_CTX *ctx" | 386 | .Fa "const EVP_CIPHER_CTX *ctx" |
@@ -651,6 +665,15 @@ The constant | |||
651 | .Dv EVP_MAX_IV_LENGTH | 665 | .Dv EVP_MAX_IV_LENGTH |
652 | is the maximum IV length for all ciphers. | 666 | is the maximum IV length for all ciphers. |
653 | .Pp | 667 | .Pp |
668 | .Fn EVP_CIPHER_CTX_get_iv | ||
669 | and | ||
670 | .Fn EVP_CIPHER_CTX_set_iv | ||
671 | will respectively retrieve and set the IV for a | ||
672 | .Vt EVP_CIPHER_CTX . | ||
673 | In both cases, the specified IV length must exactly equal the expected | ||
674 | IV length for the context as returned by | ||
675 | .Fn EVP_CIPHER_CTX_iv_length . | ||
676 | .Pp | ||
654 | .Fn EVP_CIPHER_block_size | 677 | .Fn EVP_CIPHER_block_size |
655 | and | 678 | and |
656 | .Fn EVP_CIPHER_CTX_block_size | 679 | .Fn EVP_CIPHER_CTX_block_size |
@@ -804,6 +827,8 @@ for failure. | |||
804 | .Pp | 827 | .Pp |
805 | .Fn EVP_CIPHER_CTX_reset , | 828 | .Fn EVP_CIPHER_CTX_reset , |
806 | .Fn EVP_CIPHER_CTX_cleanup , | 829 | .Fn EVP_CIPHER_CTX_cleanup , |
830 | .Fn EVP_CIPHER_CTX_get_iv , | ||
831 | .Fn EVP_CIPHER_CTX_set_iv , | ||
807 | .Fn EVP_EncryptInit_ex , | 832 | .Fn EVP_EncryptInit_ex , |
808 | .Fn EVP_EncryptUpdate , | 833 | .Fn EVP_EncryptUpdate , |
809 | .Fn EVP_EncryptFinal_ex , | 834 | .Fn EVP_EncryptFinal_ex , |
@@ -1330,6 +1355,12 @@ first appeared in OpenSSL 1.0.1 and have been available since | |||
1330 | .Fn EVP_CIPHER_CTX_reset | 1355 | .Fn EVP_CIPHER_CTX_reset |
1331 | first appeared in OpenSSL 1.1.0 and has been available since | 1356 | first appeared in OpenSSL 1.1.0 and has been available since |
1332 | .Ox 6.3 . | 1357 | .Ox 6.3 . |
1358 | .Pp | ||
1359 | .Fn EVP_CIPHER_CTX_get_iv | ||
1360 | and | ||
1361 | .Fn EVP_CIPHER_CTX_set_iv | ||
1362 | first appeared in LibreSSL 2.8.1 and has been available since | ||
1363 | .Ox 6.4 . | ||
1333 | .Sh BUGS | 1364 | .Sh BUGS |
1334 | .Dv EVP_MAX_KEY_LENGTH | 1365 | .Dv EVP_MAX_KEY_LENGTH |
1335 | and | 1366 | and |
diff --git a/src/lib/libcrypto/man/RSA_meth_new.3 b/src/lib/libcrypto/man/RSA_meth_new.3 index ae3ca88adb..6eabcc5bf8 100644 --- a/src/lib/libcrypto/man/RSA_meth_new.3 +++ b/src/lib/libcrypto/man/RSA_meth_new.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: RSA_meth_new.3,v 1.1 2018/03/18 13:06:36 schwarze Exp $ | 1 | .\" $OpenBSD: RSA_meth_new.3,v 1.2 2018/09/12 06:35:38 djm Exp $ |
2 | .\" selective merge up to: OpenSSL a970b14f Jul 31 18:58:40 2017 -0400 | 2 | .\" selective merge up to: OpenSSL a970b14f Jul 31 18:58:40 2017 -0400 |
3 | .\" | 3 | .\" |
4 | .\" This file is a derived work. | 4 | .\" This file is a derived work. |
@@ -65,13 +65,15 @@ | |||
65 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 65 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
66 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 66 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
67 | .\" | 67 | .\" |
68 | .Dd $Mdocdate: March 18 2018 $ | 68 | .Dd $Mdocdate: September 12 2018 $ |
69 | .Dt RSA_METH_NEW 3 | 69 | .Dt RSA_METH_NEW 3 |
70 | .Os | 70 | .Os |
71 | .Sh NAME | 71 | .Sh NAME |
72 | .Nm RSA_meth_new , | 72 | .Nm RSA_meth_new , |
73 | .Nm RSA_meth_free , | ||
74 | .Nm RSA_meth_dup , | 73 | .Nm RSA_meth_dup , |
74 | .Nm RSA_meth_free , | ||
75 | .Nm RSA_meth_get_finish , | ||
76 | .Nm RSA_meth_set1_name , | ||
75 | .Nm RSA_meth_set_finish , | 77 | .Nm RSA_meth_set_finish , |
76 | .Nm RSA_meth_set_priv_enc , | 78 | .Nm RSA_meth_set_priv_enc , |
77 | .Nm RSA_meth_set_priv_dec | 79 | .Nm RSA_meth_set_priv_dec |
@@ -83,15 +85,22 @@ | |||
83 | .Fa "const char *name" | 85 | .Fa "const char *name" |
84 | .Fa "int flags" | 86 | .Fa "int flags" |
85 | .Fc | 87 | .Fc |
88 | .Ft RSA_METHOD * | ||
89 | .Fo RSA_meth_dup | ||
90 | .Fa "const RSA_METHOD *meth" | ||
91 | .Fc | ||
86 | .Ft void | 92 | .Ft void |
87 | .Fo RSA_meth_free | 93 | .Fo RSA_meth_free |
88 | .Fa "RSA_METHOD *meth" | 94 | .Fa "RSA_METHOD *meth" |
89 | .Fc | 95 | .Fc |
90 | .Ft RSA_METHOD * | 96 | .Ft int |
91 | .Fo RSA_meth_dup | 97 | .Fo RSA_meth_set1_name |
92 | .Fa "const RSA_METHOD *meth" | 98 | .Fa "RSA_METHOD *meth" |
99 | .Fa "const char *name" | ||
93 | .Fc | 100 | .Fc |
94 | .Ft int | 101 | .Ft int |
102 | .Fn "(*RSA_meth_get_finish(const RSA_METHOD *meth))" "RSA *rsa" | ||
103 | .Ft int | ||
95 | .Fo RSA_meth_set_finish | 104 | .Fo RSA_meth_set_finish |
96 | .Fa "RSA_METHOD *meth" | 105 | .Fa "RSA_METHOD *meth" |
97 | .Fa "int (*finish)(RSA *rsa)" | 106 | .Fa "int (*finish)(RSA *rsa)" |
@@ -142,8 +151,18 @@ destroys | |||
142 | .Fa meth | 151 | .Fa meth |
143 | and frees any memory associated with it. | 152 | and frees any memory associated with it. |
144 | .Pp | 153 | .Pp |
154 | .Fn RSA_meth_set1_name | ||
155 | Stores a copy of the NUL-terminated | ||
156 | .Fa name | ||
157 | in the | ||
158 | .Vt RSA_METHOD | ||
159 | object after freeing the previously stored | ||
160 | .Fa name. | ||
161 | .Pp | ||
162 | .Fn RSA_meth_get_finish | ||
163 | and | ||
145 | .Fn RSA_meth_set_finish | 164 | .Fn RSA_meth_set_finish |
146 | sets an optional function for destroying an | 165 | get and set an optional function for destroying an |
147 | .Vt RSA | 166 | .Vt RSA |
148 | object. | 167 | object. |
149 | Unless | 168 | Unless |
@@ -180,7 +199,7 @@ object or | |||
180 | on failure. | 199 | on failure. |
181 | .Pp | 200 | .Pp |
182 | All | 201 | All |
183 | .Fn RSA_meth_set_* | 202 | .Fn RSA_meth_set* |
184 | functions return 1 on success or 0 on failure. | 203 | functions return 1 on success or 0 on failure. |
185 | .Sh SEE ALSO | 204 | .Sh SEE ALSO |
186 | .Xr RSA_new 3 , | 205 | .Xr RSA_new 3 , |
@@ -188,6 +207,11 @@ functions return 1 on success or 0 on failure. | |||
188 | .Xr RSA_private_encrypt 3 , | 207 | .Xr RSA_private_encrypt 3 , |
189 | .Xr RSA_set_method 3 | 208 | .Xr RSA_set_method 3 |
190 | .Sh HISTORY | 209 | .Sh HISTORY |
191 | These functions first appeared in OpenSSL 1.1.0 | 210 | These functions first appeared in OpenSSL 1.1.0. |
192 | and have been available since | 211 | .Fn RSA_meth_get_finish |
212 | and | ||
213 | .Fn RSA_meth_set1_name | ||
214 | have been available since | ||
215 | .Ox 6.4 , | ||
216 | all the other functions since | ||
193 | .Ox 6.3 . | 217 | .Ox 6.3 . |