diff options
author | jim <> | 2014-05-04 22:26:33 +0000 |
---|---|---|
committer | jim <> | 2014-05-04 22:26:33 +0000 |
commit | cc8925bff081ec36ac69be8b3681bff98f5d07da (patch) | |
tree | c61ab0faf9a25b5fa4c1daeb8248a7e8deff66d2 /src/lib/libcrypto | |
parent | e591b58894a6d621ba00c14da39becb1a0d16335 (diff) | |
download | openbsd-cc8925bff081ec36ac69be8b3681bff98f5d07da.tar.gz openbsd-cc8925bff081ec36ac69be8b3681bff98f5d07da.tar.bz2 openbsd-cc8925bff081ec36ac69be8b3681bff98f5d07da.zip |
Improve line wrapping for lines exceeding 80 chars.
ok jmc@
Diffstat (limited to 'src/lib/libcrypto')
46 files changed, 284 insertions, 192 deletions
diff --git a/src/lib/libcrypto/doc/DH_generate_key.pod b/src/lib/libcrypto/doc/DH_generate_key.pod index 81f09fdf45..148e13762b 100644 --- a/src/lib/libcrypto/doc/DH_generate_key.pod +++ b/src/lib/libcrypto/doc/DH_generate_key.pod | |||
@@ -40,7 +40,8 @@ The error codes can be obtained by L<ERR_get_error(3)|ERR_get_error(3)>. | |||
40 | 40 | ||
41 | =head1 SEE ALSO | 41 | =head1 SEE ALSO |
42 | 42 | ||
43 | L<dh(3)|dh(3)>, L<ERR_get_error(3)|ERR_get_error(3)>, L<rand(3)|rand(3)>, L<DH_size(3)|DH_size(3)> | 43 | L<dh(3)|dh(3)>, L<ERR_get_error(3)|ERR_get_error(3)>, L<rand(3)|rand(3)>, |
44 | L<DH_size(3)|DH_size(3)> | ||
44 | 45 | ||
45 | =head1 HISTORY | 46 | =head1 HISTORY |
46 | 47 | ||
diff --git a/src/lib/libcrypto/doc/DH_generate_parameters.pod b/src/lib/libcrypto/doc/DH_generate_parameters.pod index 862aa0c39a..d19e0217ee 100644 --- a/src/lib/libcrypto/doc/DH_generate_parameters.pod +++ b/src/lib/libcrypto/doc/DH_generate_parameters.pod | |||
@@ -23,11 +23,11 @@ seeded prior to calling DH_generate_parameters(). | |||
23 | B<prime_len> is the length in bits of the safe prime to be generated. | 23 | B<prime_len> is the length in bits of the safe prime to be generated. |
24 | B<generator> is a small number E<gt> 1, typically 2 or 5. | 24 | B<generator> is a small number E<gt> 1, typically 2 or 5. |
25 | 25 | ||
26 | A callback function may be used to provide feedback about the progress | 26 | A callback function may be used to provide feedback about the progress of the |
27 | of the key generation. If B<callback> is not B<NULL>, it will be | 27 | key generation. If B<callback> is not B<NULL>, it will be called as described |
28 | called as described in L<BN_generate_prime(3)|BN_generate_prime(3)> while a random prime | 28 | in L<BN_generate_prime(3)|BN_generate_prime(3)> while a random prime number is |
29 | number is generated, and when a prime has been found, B<callback(3, | 29 | generated, and when a prime has been found, B<callback(3, 0, cb_arg)> is |
30 | 0, cb_arg)> is called. | 30 | called. |
31 | 31 | ||
32 | DH_check() validates Diffie-Hellman parameters. It checks that B<p> is | 32 | DH_check() validates Diffie-Hellman parameters. It checks that B<p> is |
33 | a safe prime, and that B<g> is a suitable generator. In the case of an | 33 | a safe prime, and that B<g> is a suitable generator. In the case of an |
diff --git a/src/lib/libcrypto/doc/DH_get_ex_new_index.pod b/src/lib/libcrypto/doc/DH_get_ex_new_index.pod index fa5eab2650..934ec094bb 100644 --- a/src/lib/libcrypto/doc/DH_get_ex_new_index.pod +++ b/src/lib/libcrypto/doc/DH_get_ex_new_index.pod | |||
@@ -2,7 +2,8 @@ | |||
2 | 2 | ||
3 | =head1 NAME | 3 | =head1 NAME |
4 | 4 | ||
5 | DH_get_ex_new_index, DH_set_ex_data, DH_get_ex_data - add application specific data to DH structures | 5 | DH_get_ex_new_index, DH_set_ex_data, DH_get_ex_data - add application specific |
6 | data to DH structures | ||
6 | 7 | ||
7 | =head1 SYNOPSIS | 8 | =head1 SYNOPSIS |
8 | 9 | ||
diff --git a/src/lib/libcrypto/doc/DH_new.pod b/src/lib/libcrypto/doc/DH_new.pod index 60c930093e..d6c3ca82b5 100644 --- a/src/lib/libcrypto/doc/DH_new.pod +++ b/src/lib/libcrypto/doc/DH_new.pod | |||
@@ -21,9 +21,9 @@ erased before the memory is returned to the system. | |||
21 | 21 | ||
22 | =head1 RETURN VALUES | 22 | =head1 RETURN VALUES |
23 | 23 | ||
24 | If the allocation fails, DH_new() returns B<NULL> and sets an error | 24 | If the allocation fails, DH_new() returns B<NULL> and sets an error code that |
25 | code that can be obtained by L<ERR_get_error(3)|ERR_get_error(3)>. Otherwise it returns | 25 | can be obtained by L<ERR_get_error(3)|ERR_get_error(3)>. Otherwise it returns a |
26 | a pointer to the newly allocated structure. | 26 | pointer to the newly allocated structure. |
27 | 27 | ||
28 | DH_free() returns no value. | 28 | DH_free() returns no value. |
29 | 29 | ||
diff --git a/src/lib/libcrypto/doc/DSA_get_ex_new_index.pod b/src/lib/libcrypto/doc/DSA_get_ex_new_index.pod index fb6efc1182..e2fcabf370 100644 --- a/src/lib/libcrypto/doc/DSA_get_ex_new_index.pod +++ b/src/lib/libcrypto/doc/DSA_get_ex_new_index.pod | |||
@@ -2,7 +2,8 @@ | |||
2 | 2 | ||
3 | =head1 NAME | 3 | =head1 NAME |
4 | 4 | ||
5 | DSA_get_ex_new_index, DSA_set_ex_data, DSA_get_ex_data - add application specific data to DSA structures | 5 | DSA_get_ex_new_index, DSA_set_ex_data, DSA_get_ex_data - add application |
6 | specific data to DSA structures | ||
6 | 7 | ||
7 | =head1 SYNOPSIS | 8 | =head1 SYNOPSIS |
8 | 9 | ||
diff --git a/src/lib/libcrypto/doc/DSA_set_method.pod b/src/lib/libcrypto/doc/DSA_set_method.pod index 5ad7362f58..707370adf7 100644 --- a/src/lib/libcrypto/doc/DSA_set_method.pod +++ b/src/lib/libcrypto/doc/DSA_set_method.pod | |||
@@ -103,8 +103,8 @@ B<DSA_METHOD>s. | |||
103 | 103 | ||
104 | DSA_set_default_method() returns no value. | 104 | DSA_set_default_method() returns no value. |
105 | 105 | ||
106 | DSA_set_method() returns non-zero if the provided B<meth> was successfully set as | 106 | DSA_set_method() returns non-zero if the provided B<meth> was successfully set |
107 | the method for B<dsa> (including unloading the ENGINE handle if the previous | 107 | as the method for B<dsa> (including unloading the ENGINE handle if the previous |
108 | method was supplied by an ENGINE). | 108 | method was supplied by an ENGINE). |
109 | 109 | ||
110 | DSA_new_method() returns NULL and sets an error code that can be | 110 | DSA_new_method() returns NULL and sets an error code that can be |
@@ -117,8 +117,8 @@ As of version 0.9.7, DSA_METHOD implementations are grouped together with other | |||
117 | algorithmic APIs (eg. RSA_METHOD, EVP_CIPHER, etc) in B<ENGINE> modules. If a | 117 | algorithmic APIs (eg. RSA_METHOD, EVP_CIPHER, etc) in B<ENGINE> modules. If a |
118 | default ENGINE is specified for DSA functionality using an ENGINE API function, | 118 | default ENGINE is specified for DSA functionality using an ENGINE API function, |
119 | that will override any DSA defaults set using the DSA API (ie. | 119 | that will override any DSA defaults set using the DSA API (ie. |
120 | DSA_set_default_method()). For this reason, the ENGINE API is the recommended way | 120 | DSA_set_default_method()). For this reason, the ENGINE API is the recommended |
121 | to control default implementations for use in DSA and other cryptographic | 121 | way to control default implementations for use in DSA and other cryptographic |
122 | algorithms. | 122 | algorithms. |
123 | 123 | ||
124 | =head1 SEE ALSO | 124 | =head1 SEE ALSO |
diff --git a/src/lib/libcrypto/doc/EVP_DigestInit.pod b/src/lib/libcrypto/doc/EVP_DigestInit.pod index dcc5d73f69..2ff01b9c7c 100644 --- a/src/lib/libcrypto/doc/EVP_DigestInit.pod +++ b/src/lib/libcrypto/doc/EVP_DigestInit.pod | |||
@@ -4,12 +4,12 @@ | |||
4 | 4 | ||
5 | EVP_MD_CTX_init, EVP_MD_CTX_create, EVP_DigestInit_ex, EVP_DigestUpdate, | 5 | EVP_MD_CTX_init, EVP_MD_CTX_create, EVP_DigestInit_ex, EVP_DigestUpdate, |
6 | EVP_DigestFinal_ex, EVP_MD_CTX_cleanup, EVP_MD_CTX_destroy, EVP_MAX_MD_SIZE, | 6 | EVP_DigestFinal_ex, EVP_MD_CTX_cleanup, EVP_MD_CTX_destroy, EVP_MAX_MD_SIZE, |
7 | EVP_MD_CTX_copy_ex, EVP_MD_CTX_copy, EVP_MD_type, EVP_MD_pkey_type, EVP_MD_size, | 7 | EVP_MD_CTX_copy_ex, EVP_MD_CTX_copy, EVP_MD_type, EVP_MD_pkey_type, |
8 | EVP_MD_block_size, EVP_MD_CTX_md, EVP_MD_CTX_size, EVP_MD_CTX_block_size, EVP_MD_CTX_type, | 8 | EVP_MD_size, EVP_MD_block_size, EVP_MD_CTX_md, EVP_MD_CTX_size, |
9 | EVP_md_null, EVP_md2, EVP_md5, EVP_sha, EVP_sha1, EVP_sha224, EVP_sha256, | 9 | EVP_MD_CTX_block_size, EVP_MD_CTX_type, EVP_md_null, EVP_md2, EVP_md5, EVP_sha, |
10 | EVP_sha384, EVP_sha512, EVP_dss, EVP_dss1, EVP_mdc2, | 10 | EVP_sha1, EVP_sha224, EVP_sha256, EVP_sha384, EVP_sha512, EVP_dss, EVP_dss1, |
11 | EVP_ripemd160, EVP_get_digestbyname, EVP_get_digestbynid, EVP_get_digestbyobj - | 11 | EVP_mdc2, EVP_ripemd160, EVP_get_digestbyname, EVP_get_digestbynid, |
12 | EVP digest routines | 12 | EVP_get_digestbyobj - EVP digest routines |
13 | 13 | ||
14 | =head1 SYNOPSIS | 14 | =head1 SYNOPSIS |
15 | 15 | ||
@@ -127,11 +127,11 @@ normally used when setting ASN1 OIDs. | |||
127 | EVP_MD_CTX_md() returns the B<EVP_MD> structure corresponding to the passed | 127 | EVP_MD_CTX_md() returns the B<EVP_MD> structure corresponding to the passed |
128 | B<EVP_MD_CTX>. | 128 | B<EVP_MD_CTX>. |
129 | 129 | ||
130 | EVP_MD_pkey_type() returns the NID of the public key signing algorithm associated | 130 | EVP_MD_pkey_type() returns the NID of the public key signing algorithm |
131 | with this digest. For example EVP_sha1() is associated with RSA so this will | 131 | associated with this digest. For example EVP_sha1() is associated with RSA so |
132 | return B<NID_sha1WithRSAEncryption>. Since digests and signature algorithms | 132 | this will return B<NID_sha1WithRSAEncryption>. Since digests and signature |
133 | are no longer linked this function is only retained for compatibility | 133 | algorithms are no longer linked this function is only retained for |
134 | reasons. | 134 | compatibility reasons. |
135 | 135 | ||
136 | EVP_md2(), EVP_md5(), EVP_sha(), EVP_sha1(), EVP_sha224(), EVP_sha256(), | 136 | EVP_md2(), EVP_md5(), EVP_sha(), EVP_sha1(), EVP_sha224(), EVP_sha256(), |
137 | EVP_sha384(), EVP_sha512(), EVP_mdc2() and EVP_ripemd160() return B<EVP_MD> | 137 | EVP_sha384(), EVP_sha512(), EVP_mdc2() and EVP_ripemd160() return B<EVP_MD> |
diff --git a/src/lib/libcrypto/doc/EVP_DigestSignInit.pod b/src/lib/libcrypto/doc/EVP_DigestSignInit.pod index 11e8f6f937..7aec6daecc 100644 --- a/src/lib/libcrypto/doc/EVP_DigestSignInit.pod +++ b/src/lib/libcrypto/doc/EVP_DigestSignInit.pod | |||
@@ -2,7 +2,8 @@ | |||
2 | 2 | ||
3 | =head1 NAME | 3 | =head1 NAME |
4 | 4 | ||
5 | EVP_DigestSignInit, EVP_DigestSignUpdate, EVP_DigestSignFinal - EVP signing functions | 5 | EVP_DigestSignInit, EVP_DigestSignUpdate, EVP_DigestSignFinal - EVP signing |
6 | functions | ||
6 | 7 | ||
7 | =head1 SYNOPSIS | 8 | =head1 SYNOPSIS |
8 | 9 | ||
diff --git a/src/lib/libcrypto/doc/EVP_DigestVerifyInit.pod b/src/lib/libcrypto/doc/EVP_DigestVerifyInit.pod index 819e0d4b9f..60666bfddc 100644 --- a/src/lib/libcrypto/doc/EVP_DigestVerifyInit.pod +++ b/src/lib/libcrypto/doc/EVP_DigestVerifyInit.pod | |||
@@ -2,7 +2,8 @@ | |||
2 | 2 | ||
3 | =head1 NAME | 3 | =head1 NAME |
4 | 4 | ||
5 | EVP_DigestVerifyInit, EVP_DigestVerifyUpdate, EVP_DigestVerifyFinal - EVP signature verification functions | 5 | EVP_DigestVerifyInit, EVP_DigestVerifyUpdate, EVP_DigestVerifyFinal - EVP |
6 | signature verification functions | ||
6 | 7 | ||
7 | =head1 SYNOPSIS | 8 | =head1 SYNOPSIS |
8 | 9 | ||
diff --git a/src/lib/libcrypto/doc/EVP_EncryptInit.pod b/src/lib/libcrypto/doc/EVP_EncryptInit.pod index 84875e0fe0..d42445cf10 100644 --- a/src/lib/libcrypto/doc/EVP_EncryptInit.pod +++ b/src/lib/libcrypto/doc/EVP_EncryptInit.pod | |||
@@ -239,11 +239,13 @@ RC5 can be set. | |||
239 | EVP_EncryptInit_ex(), EVP_EncryptUpdate() and EVP_EncryptFinal_ex() | 239 | EVP_EncryptInit_ex(), EVP_EncryptUpdate() and EVP_EncryptFinal_ex() |
240 | return 1 for success and 0 for failure. | 240 | return 1 for success and 0 for failure. |
241 | 241 | ||
242 | EVP_DecryptInit_ex() and EVP_DecryptUpdate() return 1 for success and 0 for failure. | 242 | EVP_DecryptInit_ex() and EVP_DecryptUpdate() return 1 for success and 0 for |
243 | EVP_DecryptFinal_ex() returns 0 if the decrypt failed or 1 for success. | 243 | failure. EVP_DecryptFinal_ex() returns 0 if the decrypt failed or 1 for |
244 | success. | ||
244 | 245 | ||
245 | EVP_CipherInit_ex() and EVP_CipherUpdate() return 1 for success and 0 for failure. | 246 | EVP_CipherInit_ex() and EVP_CipherUpdate() return 1 for success and 0 for |
246 | EVP_CipherFinal_ex() returns 0 for a decryption failure or 1 for success. | 247 | failure. EVP_CipherFinal_ex() returns 0 for a decryption failure or 1 for |
248 | success. | ||
247 | 249 | ||
248 | EVP_CIPHER_CTX_cleanup() returns 1 for success and 0 for failure. | 250 | EVP_CIPHER_CTX_cleanup() returns 1 for success and 0 for failure. |
249 | 251 | ||
@@ -285,11 +287,13 @@ Null cipher: does nothing. | |||
285 | 287 | ||
286 | DES in CBC, ECB, CFB and OFB modes respectively. | 288 | DES in CBC, ECB, CFB and OFB modes respectively. |
287 | 289 | ||
288 | =item EVP_des_ede_cbc(void), EVP_des_ede(), EVP_des_ede_ofb(void), EVP_des_ede_cfb(void) | 290 | =item EVP_des_ede_cbc(void), EVP_des_ede(), EVP_des_ede_ofb(void), |
291 | EVP_des_ede_cfb(void) | ||
289 | 292 | ||
290 | Two key triple DES in CBC, ECB, CFB and OFB modes respectively. | 293 | Two key triple DES in CBC, ECB, CFB and OFB modes respectively. |
291 | 294 | ||
292 | =item EVP_des_ede3_cbc(void), EVP_des_ede3(), EVP_des_ede3_ofb(void), EVP_des_ede3_cfb(void) | 295 | =item EVP_des_ede3_cbc(void), EVP_des_ede3(), EVP_des_ede3_ofb(void), |
296 | EVP_des_ede3_cfb(void) | ||
293 | 297 | ||
294 | Three key triple DES in CBC, ECB, CFB and OFB modes respectively. | 298 | Three key triple DES in CBC, ECB, CFB and OFB modes respectively. |
295 | 299 | ||
@@ -299,44 +303,49 @@ DESX algorithm in CBC mode. | |||
299 | 303 | ||
300 | =item EVP_rc4(void) | 304 | =item EVP_rc4(void) |
301 | 305 | ||
302 | RC4 stream cipher. This is a variable key length cipher with default key length 128 bits. | 306 | RC4 stream cipher. This is a variable key length cipher with default key length |
307 | 128 bits. | ||
303 | 308 | ||
304 | =item EVP_rc4_40(void) | 309 | =item EVP_rc4_40(void) |
305 | 310 | ||
306 | RC4 stream cipher with 40 bit key length. This is obsolete and new code should use EVP_rc4() | 311 | RC4 stream cipher with 40 bit key length. This is obsolete and new code should |
307 | and the EVP_CIPHER_CTX_set_key_length() function. | 312 | use EVP_rc4() and the EVP_CIPHER_CTX_set_key_length() function. |
308 | 313 | ||
309 | =item EVP_idea_cbc() EVP_idea_ecb(void), EVP_idea_cfb(void), EVP_idea_ofb(void), EVP_idea_cbc(void) | 314 | =item EVP_idea_cbc() EVP_idea_ecb(void), EVP_idea_cfb(void), |
315 | EVP_idea_ofb(void), EVP_idea_cbc(void) | ||
310 | 316 | ||
311 | IDEA encryption algorithm in CBC, ECB, CFB and OFB modes respectively. | 317 | IDEA encryption algorithm in CBC, ECB, CFB and OFB modes respectively. |
312 | 318 | ||
313 | =item EVP_rc2_cbc(void), EVP_rc2_ecb(void), EVP_rc2_cfb(void), EVP_rc2_ofb(void) | 319 | =item EVP_rc2_cbc(void), EVP_rc2_ecb(void), EVP_rc2_cfb(void), EVP_rc2_ofb(void) |
314 | 320 | ||
315 | RC2 encryption algorithm in CBC, ECB, CFB and OFB modes respectively. This is a variable key | 321 | RC2 encryption algorithm in CBC, ECB, CFB and OFB modes respectively. This is a |
316 | length cipher with an additional parameter called "effective key bits" or "effective key length". | 322 | variable key length cipher with an additional parameter called "effective key |
317 | By default both are set to 128 bits. | 323 | bits" or "effective key length". By default both are set to 128 bits. |
318 | 324 | ||
319 | =item EVP_rc2_40_cbc(void), EVP_rc2_64_cbc(void) | 325 | =item EVP_rc2_40_cbc(void), EVP_rc2_64_cbc(void) |
320 | 326 | ||
321 | RC2 algorithm in CBC mode with a default key length and effective key length of 40 and 64 bits. | 327 | RC2 algorithm in CBC mode with a default key length and effective key length of |
322 | These are obsolete and new code should use EVP_rc2_cbc(), EVP_CIPHER_CTX_set_key_length() and | 328 | 40 and 64 bits. These are obsolete and new code should use EVP_rc2_cbc(), |
323 | EVP_CIPHER_CTX_ctrl() to set the key length and effective key length. | 329 | EVP_CIPHER_CTX_set_key_length() and EVP_CIPHER_CTX_ctrl() to set the key length |
330 | and effective key length. | ||
324 | 331 | ||
325 | =item EVP_bf_cbc(void), EVP_bf_ecb(void), EVP_bf_cfb(void), EVP_bf_ofb(void); | 332 | =item EVP_bf_cbc(void), EVP_bf_ecb(void), EVP_bf_cfb(void), EVP_bf_ofb(void); |
326 | 333 | ||
327 | Blowfish encryption algorithm in CBC, ECB, CFB and OFB modes respectively. This is a variable key | 334 | Blowfish encryption algorithm in CBC, ECB, CFB and OFB modes respectively. This |
328 | length cipher. | 335 | is a variable key length cipher. |
329 | 336 | ||
330 | =item EVP_cast5_cbc(void), EVP_cast5_ecb(void), EVP_cast5_cfb(void), EVP_cast5_ofb(void) | 337 | =item EVP_cast5_cbc(void), EVP_cast5_ecb(void), EVP_cast5_cfb(void), |
338 | EVP_cast5_ofb(void) | ||
331 | 339 | ||
332 | CAST encryption algorithm in CBC, ECB, CFB and OFB modes respectively. This is a variable key | 340 | CAST encryption algorithm in CBC, ECB, CFB and OFB modes respectively. This is |
333 | length cipher. | 341 | a variable key length cipher. |
334 | 342 | ||
335 | =item EVP_rc5_32_12_16_cbc(void), EVP_rc5_32_12_16_ecb(void), EVP_rc5_32_12_16_cfb(void), EVP_rc5_32_12_16_ofb(void) | 343 | =item EVP_rc5_32_12_16_cbc(void), EVP_rc5_32_12_16_ecb(void), |
344 | EVP_rc5_32_12_16_cfb(void), EVP_rc5_32_12_16_ofb(void) | ||
336 | 345 | ||
337 | RC5 encryption algorithm in CBC, ECB, CFB and OFB modes respectively. This is a variable key length | 346 | RC5 encryption algorithm in CBC, ECB, CFB and OFB modes respectively. This is a |
338 | cipher with an additional "number of rounds" parameter. By default the key length is set to 128 | 347 | variable key length cipher with an additional "number of rounds" parameter. By |
339 | bits and 12 rounds. | 348 | default the key length is set to 128 bits and 12 rounds. |
340 | 349 | ||
341 | =back | 350 | =back |
342 | 351 | ||
diff --git a/src/lib/libcrypto/doc/EVP_PKEY_CTX_ctrl.pod b/src/lib/libcrypto/doc/EVP_PKEY_CTX_ctrl.pod index e8d1ddda75..ba6e51100b 100644 --- a/src/lib/libcrypto/doc/EVP_PKEY_CTX_ctrl.pod +++ b/src/lib/libcrypto/doc/EVP_PKEY_CTX_ctrl.pod | |||
@@ -65,14 +65,15 @@ RSA_PKCS1_OAEP_PADDING for OAEP padding (encrypt and decrypt only), | |||
65 | RSA_X931_PADDING for X9.31 padding (signature operations only) and | 65 | RSA_X931_PADDING for X9.31 padding (signature operations only) and |
66 | RSA_PKCS1_PSS_PADDING (sign and verify only). | 66 | RSA_PKCS1_PSS_PADDING (sign and verify only). |
67 | 67 | ||
68 | Two RSA padding modes behave differently if EVP_PKEY_CTX_set_signature_md() | 68 | Two RSA padding modes behave differently if EVP_PKEY_CTX_set_signature_md() is |
69 | is used. If this macro is called for PKCS#1 padding the plaintext buffer is | 69 | used. If this macro is called for PKCS#1 padding the plaintext buffer is an |
70 | an actual digest value and is encapsulated in a DigestInfo structure according | 70 | actual digest value and is encapsulated in a DigestInfo structure according to |
71 | to PKCS#1 when signing and this structure is expected (and stripped off) when | 71 | PKCS#1 when signing and this structure is expected (and stripped off) when |
72 | verifying. If this control is not used with RSA and PKCS#1 padding then the | 72 | verifying. If this control is not used with RSA and PKCS#1 padding then the |
73 | supplied data is used directly and not encapsulated. In the case of X9.31 | 73 | supplied data is used directly and not encapsulated. In the case of X9.31 |
74 | padding for RSA the algorithm identifier byte is added or checked and removed | 74 | padding for RSA the algorithm identifier byte is added or checked and removed |
75 | if this control is called. If it is not called then the first byte of the plaintext buffer is expected to be the algorithm identifier byte. | 75 | if this control is called. If it is not called then the first byte of the |
76 | plaintext buffer is expected to be the algorithm identifier byte. | ||
76 | 77 | ||
77 | The EVP_PKEY_CTX_set_rsa_pss_saltlen() macro sets the RSA PSS salt length to | 78 | The EVP_PKEY_CTX_set_rsa_pss_saltlen() macro sets the RSA PSS salt length to |
78 | B<len> as its name implies it is only supported for PSS padding. Two special | 79 | B<len> as its name implies it is only supported for PSS padding. Two special |
diff --git a/src/lib/libcrypto/doc/EVP_PKEY_CTX_new.pod b/src/lib/libcrypto/doc/EVP_PKEY_CTX_new.pod index a9af867580..9822d6806f 100644 --- a/src/lib/libcrypto/doc/EVP_PKEY_CTX_new.pod +++ b/src/lib/libcrypto/doc/EVP_PKEY_CTX_new.pod | |||
@@ -2,7 +2,8 @@ | |||
2 | 2 | ||
3 | =head1 NAME | 3 | =head1 NAME |
4 | 4 | ||
5 | EVP_PKEY_CTX_new, EVP_PKEY_CTX_new_id, EVP_PKEY_CTX_dup, EVP_PKEY_CTX_free - public key algorithm context functions. | 5 | EVP_PKEY_CTX_new, EVP_PKEY_CTX_new_id, EVP_PKEY_CTX_dup, EVP_PKEY_CTX_free - |
6 | public key algorithm context functions. | ||
6 | 7 | ||
7 | =head1 SYNOPSIS | 8 | =head1 SYNOPSIS |
8 | 9 | ||
diff --git a/src/lib/libcrypto/doc/EVP_PKEY_cmp.pod b/src/lib/libcrypto/doc/EVP_PKEY_cmp.pod index 4145245299..c389216086 100644 --- a/src/lib/libcrypto/doc/EVP_PKEY_cmp.pod +++ b/src/lib/libcrypto/doc/EVP_PKEY_cmp.pod | |||
@@ -2,7 +2,8 @@ | |||
2 | 2 | ||
3 | =head1 NAME | 3 | =head1 NAME |
4 | 4 | ||
5 | EVP_PKEY_copy_parameters, EVP_PKEY_missing_parameters, EVP_PKEY_cmp_parameters, EVP_PKEY_cmp - public key parameter and comparison functions | 5 | EVP_PKEY_copy_parameters, EVP_PKEY_missing_parameters, EVP_PKEY_cmp_parameters, |
6 | EVP_PKEY_cmp - public key parameter and comparison functions | ||
6 | 7 | ||
7 | =head1 SYNOPSIS | 8 | =head1 SYNOPSIS |
8 | 9 | ||
diff --git a/src/lib/libcrypto/doc/EVP_PKEY_derive.pod b/src/lib/libcrypto/doc/EVP_PKEY_derive.pod index de877ead1a..2424ce0e54 100644 --- a/src/lib/libcrypto/doc/EVP_PKEY_derive.pod +++ b/src/lib/libcrypto/doc/EVP_PKEY_derive.pod | |||
@@ -2,7 +2,8 @@ | |||
2 | 2 | ||
3 | =head1 NAME | 3 | =head1 NAME |
4 | 4 | ||
5 | EVP_PKEY_derive_init, EVP_PKEY_derive_set_peer, EVP_PKEY_derive - derive public key algorithm shared secret. | 5 | EVP_PKEY_derive_init, EVP_PKEY_derive_set_peer, EVP_PKEY_derive - derive public |
6 | key algorithm shared secret. | ||
6 | 7 | ||
7 | =head1 SYNOPSIS | 8 | =head1 SYNOPSIS |
8 | 9 | ||
diff --git a/src/lib/libcrypto/doc/EVP_PKEY_keygen.pod b/src/lib/libcrypto/doc/EVP_PKEY_keygen.pod index b6102da036..378fb310ff 100644 --- a/src/lib/libcrypto/doc/EVP_PKEY_keygen.pod +++ b/src/lib/libcrypto/doc/EVP_PKEY_keygen.pod | |||
@@ -2,7 +2,10 @@ | |||
2 | 2 | ||
3 | =head1 NAME | 3 | =head1 NAME |
4 | 4 | ||
5 | EVP_PKEY_keygen_init, EVP_PKEY_keygen, EVP_PKEY_paramgen_init, EVP_PKEY_paramgen, EVP_PKEY_CTX_set_cb, EVP_PKEY_CTX_get_cb, EVP_PKEY_CTX_get_keygen_info, EVP_PKEVP_PKEY_CTX_set_app_data, EVP_PKEY_CTX_get_app_data - key and parameter generation functions | 5 | EVP_PKEY_keygen_init, EVP_PKEY_keygen, EVP_PKEY_paramgen_init, |
6 | EVP_PKEY_paramgen, EVP_PKEY_CTX_set_cb, EVP_PKEY_CTX_get_cb, | ||
7 | EVP_PKEY_CTX_get_keygen_info, EVP_PKEVP_PKEY_CTX_set_app_data, | ||
8 | EVP_PKEY_CTX_get_app_data - key and parameter generation functions | ||
6 | 9 | ||
7 | =head1 SYNOPSIS | 10 | =head1 SYNOPSIS |
8 | 11 | ||
diff --git a/src/lib/libcrypto/doc/EVP_PKEY_print_private.pod b/src/lib/libcrypto/doc/EVP_PKEY_print_private.pod index c9b7a89821..eabbaed264 100644 --- a/src/lib/libcrypto/doc/EVP_PKEY_print_private.pod +++ b/src/lib/libcrypto/doc/EVP_PKEY_print_private.pod | |||
@@ -2,7 +2,8 @@ | |||
2 | 2 | ||
3 | =head1 NAME | 3 | =head1 NAME |
4 | 4 | ||
5 | EVP_PKEY_print_public, EVP_PKEY_print_private, EVP_PKEY_print_params - public key algorithm printing routines. | 5 | EVP_PKEY_print_public, EVP_PKEY_print_private, EVP_PKEY_print_params - public |
6 | key algorithm printing routines. | ||
6 | 7 | ||
7 | =head1 SYNOPSIS | 8 | =head1 SYNOPSIS |
8 | 9 | ||
diff --git a/src/lib/libcrypto/doc/EVP_PKEY_set1_RSA.pod b/src/lib/libcrypto/doc/EVP_PKEY_set1_RSA.pod index 8afb1b22e1..c2031c3d0b 100644 --- a/src/lib/libcrypto/doc/EVP_PKEY_set1_RSA.pod +++ b/src/lib/libcrypto/doc/EVP_PKEY_set1_RSA.pod | |||
@@ -4,8 +4,8 @@ | |||
4 | 4 | ||
5 | EVP_PKEY_set1_RSA, EVP_PKEY_set1_DSA, EVP_PKEY_set1_DH, EVP_PKEY_set1_EC_KEY, | 5 | EVP_PKEY_set1_RSA, EVP_PKEY_set1_DSA, EVP_PKEY_set1_DH, EVP_PKEY_set1_EC_KEY, |
6 | EVP_PKEY_get1_RSA, EVP_PKEY_get1_DSA, EVP_PKEY_get1_DH, EVP_PKEY_get1_EC_KEY, | 6 | EVP_PKEY_get1_RSA, EVP_PKEY_get1_DSA, EVP_PKEY_get1_DH, EVP_PKEY_get1_EC_KEY, |
7 | EVP_PKEY_assign_RSA, EVP_PKEY_assign_DSA, EVP_PKEY_assign_DH, EVP_PKEY_assign_EC_KEY, | 7 | EVP_PKEY_assign_RSA, EVP_PKEY_assign_DSA, EVP_PKEY_assign_DH, |
8 | EVP_PKEY_type - EVP_PKEY assignment functions. | 8 | EVP_PKEY_assign_EC_KEY, EVP_PKEY_type - EVP_PKEY assignment functions. |
9 | 9 | ||
10 | =head1 SYNOPSIS | 10 | =head1 SYNOPSIS |
11 | 11 | ||
diff --git a/src/lib/libcrypto/doc/EVP_PKEY_verify.pod b/src/lib/libcrypto/doc/EVP_PKEY_verify.pod index f7ae4f9ebe..ba317b4e7b 100644 --- a/src/lib/libcrypto/doc/EVP_PKEY_verify.pod +++ b/src/lib/libcrypto/doc/EVP_PKEY_verify.pod | |||
@@ -2,7 +2,8 @@ | |||
2 | 2 | ||
3 | =head1 NAME | 3 | =head1 NAME |
4 | 4 | ||
5 | EVP_PKEY_verify_init, EVP_PKEY_verify - signature verification using a public key algorithm | 5 | EVP_PKEY_verify_init, EVP_PKEY_verify - signature verification using a public |
6 | key algorithm | ||
6 | 7 | ||
7 | =head1 SYNOPSIS | 8 | =head1 SYNOPSIS |
8 | 9 | ||
diff --git a/src/lib/libcrypto/doc/EVP_PKEY_verify_recover.pod b/src/lib/libcrypto/doc/EVP_PKEY_verify_recover.pod index 00d53db783..4debf7bff0 100644 --- a/src/lib/libcrypto/doc/EVP_PKEY_verify_recover.pod +++ b/src/lib/libcrypto/doc/EVP_PKEY_verify_recover.pod | |||
@@ -2,7 +2,8 @@ | |||
2 | 2 | ||
3 | =head1 NAME | 3 | =head1 NAME |
4 | 4 | ||
5 | EVP_PKEY_verify_recover_init, EVP_PKEY_verify_recover - recover signature using a public key algorithm | 5 | EVP_PKEY_verify_recover_init, EVP_PKEY_verify_recover - recover signature using |
6 | a public key algorithm | ||
6 | 7 | ||
7 | =head1 SYNOPSIS | 8 | =head1 SYNOPSIS |
8 | 9 | ||
@@ -45,7 +46,8 @@ context if several operations are performed using the same parameters. | |||
45 | 46 | ||
46 | =head1 RETURN VALUES | 47 | =head1 RETURN VALUES |
47 | 48 | ||
48 | EVP_PKEY_verify_recover_init() and EVP_PKEY_verify_recover() return 1 for success | 49 | EVP_PKEY_verify_recover_init() and EVP_PKEY_verify_recover() return 1 for |
50 | success | ||
49 | and 0 or a negative value for failure. In particular a return value of -2 | 51 | and 0 or a negative value for failure. In particular a return value of -2 |
50 | indicates the operation is not supported by the public key algorithm. | 52 | indicates the operation is not supported by the public key algorithm. |
51 | 53 | ||
diff --git a/src/lib/libcrypto/doc/EVP_VerifyInit.pod b/src/lib/libcrypto/doc/EVP_VerifyInit.pod index 0ffb0a8077..c665ee2ebc 100644 --- a/src/lib/libcrypto/doc/EVP_VerifyInit.pod +++ b/src/lib/libcrypto/doc/EVP_VerifyInit.pod | |||
@@ -2,7 +2,8 @@ | |||
2 | 2 | ||
3 | =head1 NAME | 3 | =head1 NAME |
4 | 4 | ||
5 | EVP_VerifyInit, EVP_VerifyUpdate, EVP_VerifyFinal - EVP signature verification functions | 5 | EVP_VerifyInit, EVP_VerifyUpdate, EVP_VerifyFinal - EVP signature verification |
6 | functions | ||
6 | 7 | ||
7 | =head1 SYNOPSIS | 8 | =head1 SYNOPSIS |
8 | 9 | ||
@@ -38,8 +39,8 @@ implementation of digest B<type>. | |||
38 | EVP_VerifyInit_ex() and EVP_VerifyUpdate() return 1 for success and 0 for | 39 | EVP_VerifyInit_ex() and EVP_VerifyUpdate() return 1 for success and 0 for |
39 | failure. | 40 | failure. |
40 | 41 | ||
41 | EVP_VerifyFinal() returns 1 for a correct signature, 0 for failure and -1 if some | 42 | EVP_VerifyFinal() returns 1 for a correct signature, 0 for failure and -1 if |
42 | other error occurred. | 43 | some other error occurred. |
43 | 44 | ||
44 | The error codes can be obtained by L<ERR_get_error(3)|ERR_get_error(3)>. | 45 | The error codes can be obtained by L<ERR_get_error(3)|ERR_get_error(3)>. |
45 | 46 | ||
diff --git a/src/lib/libcrypto/doc/OBJ_nid2obj.pod b/src/lib/libcrypto/doc/OBJ_nid2obj.pod index 458ef025f0..b2b8af990c 100644 --- a/src/lib/libcrypto/doc/OBJ_nid2obj.pod +++ b/src/lib/libcrypto/doc/OBJ_nid2obj.pod | |||
@@ -2,9 +2,9 @@ | |||
2 | 2 | ||
3 | =head1 NAME | 3 | =head1 NAME |
4 | 4 | ||
5 | OBJ_nid2obj, OBJ_nid2ln, OBJ_nid2sn, OBJ_obj2nid, OBJ_txt2nid, OBJ_ln2nid, OBJ_sn2nid, | 5 | OBJ_nid2obj, OBJ_nid2ln, OBJ_nid2sn, OBJ_obj2nid, OBJ_txt2nid, OBJ_ln2nid, |
6 | OBJ_cmp, OBJ_dup, OBJ_txt2obj, OBJ_obj2txt, OBJ_create, OBJ_cleanup - ASN1 object utility | 6 | OBJ_sn2nid, OBJ_cmp, OBJ_dup, OBJ_txt2obj, OBJ_obj2txt, OBJ_create, OBJ_cleanup |
7 | functions | 7 | - ASN1 object utility functions |
8 | 8 | ||
9 | =head1 SYNOPSIS | 9 | =head1 SYNOPSIS |
10 | 10 | ||
diff --git a/src/lib/libcrypto/doc/OPENSSL_VERSION_NUMBER.pod b/src/lib/libcrypto/doc/OPENSSL_VERSION_NUMBER.pod index c39ac35e78..2f63a18a71 100644 --- a/src/lib/libcrypto/doc/OPENSSL_VERSION_NUMBER.pod +++ b/src/lib/libcrypto/doc/OPENSSL_VERSION_NUMBER.pod | |||
@@ -94,8 +94,8 @@ L<crypto(3)|crypto(3)> | |||
94 | 94 | ||
95 | =head1 HISTORY | 95 | =head1 HISTORY |
96 | 96 | ||
97 | SSLeay() and SSLEAY_VERSION_NUMBER are available in all versions of SSLeay and OpenSSL. | 97 | SSLeay() and SSLEAY_VERSION_NUMBER are available in all versions of SSLeay and |
98 | OPENSSL_VERSION_NUMBER is available in all versions of OpenSSL. | 98 | OpenSSL. OPENSSL_VERSION_NUMBER is available in all versions of OpenSSL. |
99 | B<SSLEAY_DIR> was added in OpenSSL 0.9.7. | 99 | B<SSLEAY_DIR> was added in OpenSSL 0.9.7. |
100 | 100 | ||
101 | =cut | 101 | =cut |
diff --git a/src/lib/libcrypto/doc/OpenSSL_add_all_algorithms.pod b/src/lib/libcrypto/doc/OpenSSL_add_all_algorithms.pod index e63411b5bb..cc6c07fa24 100644 --- a/src/lib/libcrypto/doc/OpenSSL_add_all_algorithms.pod +++ b/src/lib/libcrypto/doc/OpenSSL_add_all_algorithms.pod | |||
@@ -39,24 +39,24 @@ None of the functions return a value. | |||
39 | A typical application will call OpenSSL_add_all_algorithms() initially and | 39 | A typical application will call OpenSSL_add_all_algorithms() initially and |
40 | EVP_cleanup() before exiting. | 40 | EVP_cleanup() before exiting. |
41 | 41 | ||
42 | An application does not need to add algorithms to use them explicitly, for example | 42 | An application does not need to add algorithms to use them explicitly, for |
43 | by EVP_sha1(). It just needs to add them if it (or any of the functions it calls) | 43 | example by EVP_sha1(). It just needs to add them if it (or any of the functions |
44 | needs to lookup algorithms. | 44 | it calls) needs to lookup algorithms. |
45 | 45 | ||
46 | The cipher and digest lookup functions are used in many parts of the library. If | 46 | The cipher and digest lookup functions are used in many parts of the library. |
47 | the table is not initialized several functions will misbehave and complain they | 47 | If the table is not initialized several functions will misbehave and complain |
48 | cannot find algorithms. This includes the PEM, PKCS#12, SSL and S/MIME libraries. | 48 | they cannot find algorithms. This includes the PEM, PKCS#12, SSL and S/MIME |
49 | This is a common query in the OpenSSL mailing lists. | 49 | libraries. This is a common query in the OpenSSL mailing lists. |
50 | 50 | ||
51 | Calling OpenSSL_add_all_algorithms() links in all algorithms: as a result a | 51 | Calling OpenSSL_add_all_algorithms() links in all algorithms: as a result a |
52 | statically linked executable can be quite large. If this is important it is possible | 52 | statically linked executable can be quite large. If this is important it is |
53 | to just add the required ciphers and digests. | 53 | possible to just add the required ciphers and digests. |
54 | 54 | ||
55 | =head1 BUGS | 55 | =head1 BUGS |
56 | 56 | ||
57 | Although the functions do not return error codes it is possible for them to fail. | 57 | Although the functions do not return error codes it is possible for them to |
58 | This will only happen as a result of a memory allocation failure so this is not | 58 | fail. This will only happen as a result of a memory allocation failure so this |
59 | too much of a problem in practice. | 59 | is not too much of a problem in practice. |
60 | 60 | ||
61 | =head1 SEE ALSO | 61 | =head1 SEE ALSO |
62 | 62 | ||
diff --git a/src/lib/libcrypto/doc/PEM_read_bio_PrivateKey.pod b/src/lib/libcrypto/doc/PEM_read_bio_PrivateKey.pod index e196bf1498..7e821f69c3 100644 --- a/src/lib/libcrypto/doc/PEM_read_bio_PrivateKey.pod +++ b/src/lib/libcrypto/doc/PEM_read_bio_PrivateKey.pod | |||
@@ -2,7 +2,29 @@ | |||
2 | 2 | ||
3 | =head1 NAME | 3 | =head1 NAME |
4 | 4 | ||
5 | PEM, PEM_read_bio_PrivateKey, PEM_read_PrivateKey, PEM_write_bio_PrivateKey, PEM_write_PrivateKey, PEM_write_bio_PKCS8PrivateKey, PEM_write_PKCS8PrivateKey, PEM_write_bio_PKCS8PrivateKey_nid, PEM_write_PKCS8PrivateKey_nid, PEM_read_bio_PUBKEY, PEM_read_PUBKEY, PEM_write_bio_PUBKEY, PEM_write_PUBKEY, PEM_read_bio_RSAPrivateKey, PEM_read_RSAPrivateKey, PEM_write_bio_RSAPrivateKey, PEM_write_RSAPrivateKey, PEM_read_bio_RSAPublicKey, PEM_read_RSAPublicKey, PEM_write_bio_RSAPublicKey, PEM_write_RSAPublicKey, PEM_read_bio_RSA_PUBKEY, PEM_read_RSA_PUBKEY, PEM_write_bio_RSA_PUBKEY, PEM_write_RSA_PUBKEY, PEM_read_bio_DSAPrivateKey, PEM_read_DSAPrivateKey, PEM_write_bio_DSAPrivateKey, PEM_write_DSAPrivateKey, PEM_read_bio_DSA_PUBKEY, PEM_read_DSA_PUBKEY, PEM_write_bio_DSA_PUBKEY, PEM_write_DSA_PUBKEY, PEM_read_bio_DSAparams, PEM_read_DSAparams, PEM_write_bio_DSAparams, PEM_write_DSAparams, PEM_read_bio_DHparams, PEM_read_DHparams, PEM_write_bio_DHparams, PEM_write_DHparams, PEM_read_bio_X509, PEM_read_X509, PEM_write_bio_X509, PEM_write_X509, PEM_read_bio_X509_AUX, PEM_read_X509_AUX, PEM_write_bio_X509_AUX, PEM_write_X509_AUX, PEM_read_bio_X509_REQ, PEM_read_X509_REQ, PEM_write_bio_X509_REQ, PEM_write_X509_REQ, PEM_write_bio_X509_REQ_NEW, PEM_write_X509_REQ_NEW, PEM_read_bio_X509_CRL, PEM_read_X509_CRL, PEM_write_bio_X509_CRL, PEM_write_X509_CRL, PEM_read_bio_PKCS7, PEM_read_PKCS7, PEM_write_bio_PKCS7, PEM_write_PKCS7, PEM_read_bio_NETSCAPE_CERT_SEQUENCE, PEM_read_NETSCAPE_CERT_SEQUENCE, PEM_write_bio_NETSCAPE_CERT_SEQUENCE, PEM_write_NETSCAPE_CERT_SEQUENCE - PEM routines | 5 | PEM, PEM_read_bio_PrivateKey, PEM_read_PrivateKey, PEM_write_bio_PrivateKey, |
6 | PEM_write_PrivateKey, PEM_write_bio_PKCS8PrivateKey, PEM_write_PKCS8PrivateKey, | ||
7 | PEM_write_bio_PKCS8PrivateKey_nid, PEM_write_PKCS8PrivateKey_nid, | ||
8 | PEM_read_bio_PUBKEY, PEM_read_PUBKEY, PEM_write_bio_PUBKEY, PEM_write_PUBKEY, | ||
9 | PEM_read_bio_RSAPrivateKey, PEM_read_RSAPrivateKey, | ||
10 | PEM_write_bio_RSAPrivateKey, PEM_write_RSAPrivateKey, | ||
11 | PEM_read_bio_RSAPublicKey, PEM_read_RSAPublicKey, PEM_write_bio_RSAPublicKey, | ||
12 | PEM_write_RSAPublicKey, PEM_read_bio_RSA_PUBKEY, PEM_read_RSA_PUBKEY, | ||
13 | PEM_write_bio_RSA_PUBKEY, PEM_write_RSA_PUBKEY, PEM_read_bio_DSAPrivateKey, | ||
14 | PEM_read_DSAPrivateKey, PEM_write_bio_DSAPrivateKey, PEM_write_DSAPrivateKey, | ||
15 | PEM_read_bio_DSA_PUBKEY, PEM_read_DSA_PUBKEY, PEM_write_bio_DSA_PUBKEY, | ||
16 | PEM_write_DSA_PUBKEY, PEM_read_bio_DSAparams, PEM_read_DSAparams, | ||
17 | PEM_write_bio_DSAparams, PEM_write_DSAparams, PEM_read_bio_DHparams, | ||
18 | PEM_read_DHparams, PEM_write_bio_DHparams, PEM_write_DHparams, | ||
19 | PEM_read_bio_X509, PEM_read_X509, PEM_write_bio_X509, PEM_write_X509, | ||
20 | PEM_read_bio_X509_AUX, PEM_read_X509_AUX, PEM_write_bio_X509_AUX, | ||
21 | PEM_write_X509_AUX, PEM_read_bio_X509_REQ, PEM_read_X509_REQ, | ||
22 | PEM_write_bio_X509_REQ, PEM_write_X509_REQ, PEM_write_bio_X509_REQ_NEW, | ||
23 | PEM_write_X509_REQ_NEW, PEM_read_bio_X509_CRL, PEM_read_X509_CRL, | ||
24 | PEM_write_bio_X509_CRL, PEM_write_X509_CRL, PEM_read_bio_PKCS7, PEM_read_PKCS7, | ||
25 | PEM_write_bio_PKCS7, PEM_write_PKCS7, PEM_read_bio_NETSCAPE_CERT_SEQUENCE, | ||
26 | PEM_read_NETSCAPE_CERT_SEQUENCE, PEM_write_bio_NETSCAPE_CERT_SEQUENCE, | ||
27 | PEM_write_NETSCAPE_CERT_SEQUENCE - PEM routines | ||
6 | 28 | ||
7 | =head1 SYNOPSIS | 29 | =head1 SYNOPSIS |
8 | 30 | ||
diff --git a/src/lib/libcrypto/doc/PEM_write_bio_CMS_stream.pod b/src/lib/libcrypto/doc/PEM_write_bio_CMS_stream.pod index e070c45c2e..f9946adebf 100644 --- a/src/lib/libcrypto/doc/PEM_write_bio_CMS_stream.pod +++ b/src/lib/libcrypto/doc/PEM_write_bio_CMS_stream.pod | |||
@@ -2,7 +2,7 @@ | |||
2 | 2 | ||
3 | =head1 NAME | 3 | =head1 NAME |
4 | 4 | ||
5 | PEM_write_bio_CMS_stream - output CMS_ContentInfo structure in PEM format. | 5 | PEM_write_bio_CMS_stream - output CMS_ContentInfo structure in PEM format. |
6 | 6 | ||
7 | =head1 SYNOPSIS | 7 | =head1 SYNOPSIS |
8 | 8 | ||
diff --git a/src/lib/libcrypto/doc/PKCS12_create.pod b/src/lib/libcrypto/doc/PKCS12_create.pod index 0a1e460cf1..382193ec95 100644 --- a/src/lib/libcrypto/doc/PKCS12_create.pod +++ b/src/lib/libcrypto/doc/PKCS12_create.pod | |||
@@ -38,13 +38,13 @@ The default MAC iteration count is 1 in order to retain compatibility with | |||
38 | old software which did not interpret MAC iteration counts. If such compatibility | 38 | old software which did not interpret MAC iteration counts. If such compatibility |
39 | is not required then B<mac_iter> should be set to PKCS12_DEFAULT_ITER. | 39 | is not required then B<mac_iter> should be set to PKCS12_DEFAULT_ITER. |
40 | 40 | ||
41 | B<keytype> adds a flag to the store private key. This is a non standard extension | 41 | B<keytype> adds a flag to the store private key. This is a non standard |
42 | that is only currently interpreted by MSIE. If set to zero the flag is omitted, | 42 | extension that is only currently interpreted by MSIE. If set to zero the flag |
43 | if set to B<KEY_SIG> the key can be used for signing only, if set to B<KEY_EX> | 43 | is omitted, if set to B<KEY_SIG> the key can be used for signing only, if set |
44 | it can be used for signing and encryption. This option was useful for old | 44 | to B<KEY_EX> it can be used for signing and encryption. This option was useful |
45 | export grade software which could use signing only keys of arbitrary size but | 45 | for old export grade software which could use signing only keys of arbitrary |
46 | had restrictions on the permissible sizes of keys which could be used for | 46 | size but had restrictions on the permissible sizes of keys which could be used |
47 | encryption. | 47 | for encryption. |
48 | 48 | ||
49 | =head1 NEW FUNCTIONALITY IN OPENSSL 0.9.8 | 49 | =head1 NEW FUNCTIONALITY IN OPENSSL 0.9.8 |
50 | 50 | ||
diff --git a/src/lib/libcrypto/doc/PKCS7_decrypt.pod b/src/lib/libcrypto/doc/PKCS7_decrypt.pod index 325699d0b6..78919998ce 100644 --- a/src/lib/libcrypto/doc/PKCS7_decrypt.pod +++ b/src/lib/libcrypto/doc/PKCS7_decrypt.pod | |||
@@ -22,8 +22,9 @@ B<flags> is an optional set of flags. | |||
22 | OpenSSL_add_all_algorithms() (or equivalent) should be called before using this | 22 | OpenSSL_add_all_algorithms() (or equivalent) should be called before using this |
23 | function or errors about unknown algorithms will occur. | 23 | function or errors about unknown algorithms will occur. |
24 | 24 | ||
25 | Although the recipients certificate is not needed to decrypt the data it is needed | 25 | Although the recipients certificate is not needed to decrypt the data it is |
26 | to locate the appropriate (of possible several) recipients in the PKCS#7 structure. | 26 | needed to locate the appropriate (of possible several) recipients in the PKCS#7 |
27 | structure. | ||
27 | 28 | ||
28 | The following flags can be passed in the B<flags> parameter. | 29 | The following flags can be passed in the B<flags> parameter. |
29 | 30 | ||
@@ -38,8 +39,9 @@ The error can be obtained from ERR_get_error(3) | |||
38 | 39 | ||
39 | =head1 BUGS | 40 | =head1 BUGS |
40 | 41 | ||
41 | PKCS7_decrypt() must be passed the correct recipient key and certificate. It would | 42 | PKCS7_decrypt() must be passed the correct recipient key and certificate. It |
42 | be better if it could look up the correct key and certificate from a database. | 43 | would be better if it could look up the correct key and certificate from a |
44 | database. | ||
43 | 45 | ||
44 | The lack of single pass processing and need to hold all data in memory as | 46 | The lack of single pass processing and need to hold all data in memory as |
45 | mentioned in PKCS7_sign() also applies to PKCS7_verify(). | 47 | mentioned in PKCS7_sign() also applies to PKCS7_verify(). |
diff --git a/src/lib/libcrypto/doc/PKCS7_verify.pod b/src/lib/libcrypto/doc/PKCS7_verify.pod index 51ada03f2d..f88e66632b 100644 --- a/src/lib/libcrypto/doc/PKCS7_verify.pod +++ b/src/lib/libcrypto/doc/PKCS7_verify.pod | |||
@@ -37,9 +37,9 @@ be signedData. There must be at least one signature on the data and if | |||
37 | the content is detached B<indata> cannot be B<NULL>. | 37 | the content is detached B<indata> cannot be B<NULL>. |
38 | 38 | ||
39 | An attempt is made to locate all the signer's certificates, first looking in | 39 | An attempt is made to locate all the signer's certificates, first looking in |
40 | the B<certs> parameter (if it is not B<NULL>) and then looking in any certificates | 40 | the B<certs> parameter (if it is not B<NULL>) and then looking in any |
41 | contained in the B<p7> structure itself. If any signer's certificates cannot be | 41 | certificates contained in the B<p7> structure itself. If any signer's |
42 | located the operation fails. | 42 | certificates cannot be located the operation fails. |
43 | 43 | ||
44 | Each signer's certificate is chain verified using the B<smimesign> purpose and | 44 | Each signer's certificate is chain verified using the B<smimesign> purpose and |
45 | the supplied trusted certificate store. Any internal certificates in the message | 45 | the supplied trusted certificate store. Any internal certificates in the message |
@@ -50,9 +50,9 @@ the signature's checked. | |||
50 | 50 | ||
51 | If all signature's verify correctly then the function is successful. | 51 | If all signature's verify correctly then the function is successful. |
52 | 52 | ||
53 | Any of the following flags (ored together) can be passed in the B<flags> parameter | 53 | Any of the following flags (ored together) can be passed in the B<flags> |
54 | to change the default verify behaviour. Only the flag B<PKCS7_NOINTERN> is | 54 | parameter to change the default verify behaviour. Only the flag |
55 | meaningful to PKCS7_get0_signers(). | 55 | B<PKCS7_NOINTERN> is meaningful to PKCS7_get0_signers(). |
56 | 56 | ||
57 | If B<PKCS7_NOINTERN> is set the certificates in the message itself are not | 57 | If B<PKCS7_NOINTERN> is set the certificates in the message itself are not |
58 | searched when locating the signer's certificate. This means that all the signers | 58 | searched when locating the signer's certificate. This means that all the signers |
diff --git a/src/lib/libcrypto/doc/RAND_bytes.pod b/src/lib/libcrypto/doc/RAND_bytes.pod index 1a9b91e281..34c945b4e5 100644 --- a/src/lib/libcrypto/doc/RAND_bytes.pod +++ b/src/lib/libcrypto/doc/RAND_bytes.pod | |||
@@ -30,11 +30,10 @@ the new pseudo-random bytes unless disabled at compile time (see FAQ). | |||
30 | 30 | ||
31 | =head1 RETURN VALUES | 31 | =head1 RETURN VALUES |
32 | 32 | ||
33 | RAND_bytes() returns 1 on success, 0 otherwise. The error code can be | 33 | RAND_bytes() returns 1 on success, 0 otherwise. The error code can be obtained |
34 | obtained by L<ERR_get_error(3)|ERR_get_error(3)>. RAND_pseudo_bytes() returns 1 if the | 34 | by L<ERR_get_error(3)|ERR_get_error(3)>. RAND_pseudo_bytes() returns 1 if the |
35 | bytes generated are cryptographically strong, 0 otherwise. Both | 35 | bytes generated are cryptographically strong, 0 otherwise. Both functions |
36 | functions return -1 if they are not supported by the current RAND | 36 | return -1 if they are not supported by the current RAND method. |
37 | method. | ||
38 | 37 | ||
39 | =head1 SEE ALSO | 38 | =head1 SEE ALSO |
40 | 39 | ||
diff --git a/src/lib/libcrypto/doc/RAND_load_file.pod b/src/lib/libcrypto/doc/RAND_load_file.pod index 3f7e944d86..28118e3c2e 100644 --- a/src/lib/libcrypto/doc/RAND_load_file.pod +++ b/src/lib/libcrypto/doc/RAND_load_file.pod | |||
@@ -43,7 +43,8 @@ error. | |||
43 | 43 | ||
44 | =head1 SEE ALSO | 44 | =head1 SEE ALSO |
45 | 45 | ||
46 | L<rand(3)|rand(3)>, L<RAND_add(3)|RAND_add(3)>, L<RAND_cleanup(3)|RAND_cleanup(3)> | 46 | L<rand(3)|rand(3)>, L<RAND_add(3)|RAND_add(3)>, |
47 | L<RAND_cleanup(3)|RAND_cleanup(3)> | ||
47 | 48 | ||
48 | =head1 HISTORY | 49 | =head1 HISTORY |
49 | 50 | ||
diff --git a/src/lib/libcrypto/doc/RSA_blinding_on.pod b/src/lib/libcrypto/doc/RSA_blinding_on.pod index fd2c69abd8..e6af8d4355 100644 --- a/src/lib/libcrypto/doc/RSA_blinding_on.pod +++ b/src/lib/libcrypto/doc/RSA_blinding_on.pod | |||
@@ -2,7 +2,8 @@ | |||
2 | 2 | ||
3 | =head1 NAME | 3 | =head1 NAME |
4 | 4 | ||
5 | RSA_blinding_on, RSA_blinding_off - protect the RSA operation from timing attacks | 5 | RSA_blinding_on, RSA_blinding_off - protect the RSA operation from timing |
6 | attacks | ||
6 | 7 | ||
7 | =head1 SYNOPSIS | 8 | =head1 SYNOPSIS |
8 | 9 | ||
diff --git a/src/lib/libcrypto/doc/RSA_get_ex_new_index.pod b/src/lib/libcrypto/doc/RSA_get_ex_new_index.pod index 7d0fd1f91d..b1ac1167dd 100644 --- a/src/lib/libcrypto/doc/RSA_get_ex_new_index.pod +++ b/src/lib/libcrypto/doc/RSA_get_ex_new_index.pod | |||
@@ -2,7 +2,8 @@ | |||
2 | 2 | ||
3 | =head1 NAME | 3 | =head1 NAME |
4 | 4 | ||
5 | RSA_get_ex_new_index, RSA_set_ex_data, RSA_get_ex_data - add application specific data to RSA structures | 5 | RSA_get_ex_new_index, RSA_set_ex_data, RSA_get_ex_data - add application |
6 | specific data to RSA structures | ||
6 | 7 | ||
7 | =head1 SYNOPSIS | 8 | =head1 SYNOPSIS |
8 | 9 | ||
@@ -78,26 +79,27 @@ corresponding parameters when B<RSA_get_ex_new_index()> was called. | |||
78 | B<dup_func()> is called when a structure is being copied. Pointers to the | 79 | B<dup_func()> is called when a structure is being copied. Pointers to the |
79 | destination and source B<CRYPTO_EX_DATA> structures are passed in the B<to> and | 80 | destination and source B<CRYPTO_EX_DATA> structures are passed in the B<to> and |
80 | B<from> parameters respectively. The B<from_d> parameter is passed a pointer to | 81 | B<from> parameters respectively. The B<from_d> parameter is passed a pointer to |
81 | the source application data when the function is called, when the function returns | 82 | the source application data when the function is called, when the function |
82 | the value is copied to the destination: the application can thus modify the data | 83 | returns the value is copied to the destination: the application can thus modify |
83 | pointed to by B<from_d> and have different values in the source and destination. | 84 | the data pointed to by B<from_d> and have different values in the source and |
84 | The B<idx>, B<argl> and B<argp> parameters are the same as those in B<new_func()> | 85 | destination. The B<idx>, B<argl> and B<argp> parameters are the same as those |
85 | and B<free_func()>. | 86 | in B<new_func()> and B<free_func()>. |
86 | 87 | ||
87 | =head1 RETURN VALUES | 88 | =head1 RETURN VALUES |
88 | 89 | ||
89 | B<RSA_get_ex_new_index()> returns a new index or -1 on failure (note 0 is a valid | 90 | B<RSA_get_ex_new_index()> returns a new index or -1 on failure (note 0 is a |
90 | index value). | 91 | valid index value). |
91 | 92 | ||
92 | B<RSA_set_ex_data()> returns 1 on success or 0 on failure. | 93 | B<RSA_set_ex_data()> returns 1 on success or 0 on failure. |
93 | 94 | ||
94 | B<RSA_get_ex_data()> returns the application data or 0 on failure. 0 may also | 95 | B<RSA_get_ex_data()> returns the application data or 0 on failure. 0 may also |
95 | be valid application data but currently it can only fail if given an invalid B<idx> | 96 | be valid application data but currently it can only fail if given an invalid |
96 | parameter. | 97 | B<idx> parameter. |
97 | 98 | ||
98 | B<new_func()> and B<dup_func()> should return 0 for failure and 1 for success. | 99 | B<new_func()> and B<dup_func()> should return 0 for failure and 1 for success. |
99 | 100 | ||
100 | On failure an error code can be obtained from L<ERR_get_error(3)|ERR_get_error(3)>. | 101 | On failure an error code can be obtained from |
102 | L<ERR_get_error(3)|ERR_get_error(3)>. | ||
101 | 103 | ||
102 | =head1 BUGS | 104 | =head1 BUGS |
103 | 105 | ||
diff --git a/src/lib/libcrypto/doc/RSA_new.pod b/src/lib/libcrypto/doc/RSA_new.pod index 3d15b92824..41e5e60340 100644 --- a/src/lib/libcrypto/doc/RSA_new.pod +++ b/src/lib/libcrypto/doc/RSA_new.pod | |||
@@ -22,9 +22,9 @@ erased before the memory is returned to the system. | |||
22 | 22 | ||
23 | =head1 RETURN VALUES | 23 | =head1 RETURN VALUES |
24 | 24 | ||
25 | If the allocation fails, RSA_new() returns B<NULL> and sets an error | 25 | If the allocation fails, RSA_new() returns B<NULL> and sets an error code that |
26 | code that can be obtained by L<ERR_get_error(3)|ERR_get_error(3)>. Otherwise it returns | 26 | can be obtained by L<ERR_get_error(3)|ERR_get_error(3)>. Otherwise it returns a |
27 | a pointer to the newly allocated structure. | 27 | pointer to the newly allocated structure. |
28 | 28 | ||
29 | RSA_free() returns no value. | 29 | RSA_free() returns no value. |
30 | 30 | ||
diff --git a/src/lib/libcrypto/doc/RSA_private_encrypt.pod b/src/lib/libcrypto/doc/RSA_private_encrypt.pod index 4c4d131172..aa2bc1bd76 100644 --- a/src/lib/libcrypto/doc/RSA_private_encrypt.pod +++ b/src/lib/libcrypto/doc/RSA_private_encrypt.pod | |||
@@ -29,10 +29,9 @@ B<padding> denotes one of the following modes: | |||
29 | 29 | ||
30 | =item RSA_PKCS1_PADDING | 30 | =item RSA_PKCS1_PADDING |
31 | 31 | ||
32 | PKCS #1 v1.5 padding. This function does not handle the | 32 | PKCS #1 v1.5 padding. This function does not handle the B<algorithmIdentifier> |
33 | B<algorithmIdentifier> specified in PKCS #1. When generating or | 33 | specified in PKCS #1. When generating or verifying PKCS #1 signatures, |
34 | verifying PKCS #1 signatures, L<RSA_sign(3)|RSA_sign(3)> and L<RSA_verify(3)|RSA_verify(3)> should be | 34 | L<RSA_sign(3)|RSA_sign(3)> and L<RSA_verify(3)|RSA_verify(3)> should be used. |
35 | used. | ||
36 | 35 | ||
37 | =item RSA_NO_PADDING | 36 | =item RSA_NO_PADDING |
38 | 37 | ||
diff --git a/src/lib/libcrypto/doc/RSA_sign_ASN1_OCTET_STRING.pod b/src/lib/libcrypto/doc/RSA_sign_ASN1_OCTET_STRING.pod index e70380bbfc..315a9af9e8 100644 --- a/src/lib/libcrypto/doc/RSA_sign_ASN1_OCTET_STRING.pod +++ b/src/lib/libcrypto/doc/RSA_sign_ASN1_OCTET_STRING.pod | |||
@@ -26,7 +26,8 @@ memory. | |||
26 | 26 | ||
27 | B<dummy> is ignored. | 27 | B<dummy> is ignored. |
28 | 28 | ||
29 | The random number generator must be seeded prior to calling RSA_sign_ASN1_OCTET_STRING(). | 29 | The random number generator must be seeded prior to calling |
30 | RSA_sign_ASN1_OCTET_STRING(). | ||
30 | 31 | ||
31 | RSA_verify_ASN1_OCTET_STRING() verifies that the signature B<sigbuf> | 32 | RSA_verify_ASN1_OCTET_STRING() verifies that the signature B<sigbuf> |
32 | of size B<siglen> is the DER representation of a given octet string | 33 | of size B<siglen> is the DER representation of a given octet string |
diff --git a/src/lib/libcrypto/doc/SHA1.pod b/src/lib/libcrypto/doc/SHA1.pod index 232af9227e..9fffdf59e7 100644 --- a/src/lib/libcrypto/doc/SHA1.pod +++ b/src/lib/libcrypto/doc/SHA1.pod | |||
@@ -60,7 +60,8 @@ ANSI X9.30 | |||
60 | 60 | ||
61 | =head1 SEE ALSO | 61 | =head1 SEE ALSO |
62 | 62 | ||
63 | L<ripemd(3)|ripemd(3)>, L<hmac(3)|hmac(3)>, L<EVP_DigestInit(3)|EVP_DigestInit(3)> | 63 | L<ripemd(3)|ripemd(3)>, L<hmac(3)|hmac(3)>, |
64 | L<EVP_DigestInit(3)|EVP_DigestInit(3)> | ||
64 | 65 | ||
65 | =head1 HISTORY | 66 | =head1 HISTORY |
66 | 67 | ||
diff --git a/src/lib/libcrypto/doc/X509_NAME_add_entry_by_txt.pod b/src/lib/libcrypto/doc/X509_NAME_add_entry_by_txt.pod index 5b9e81b922..c6442b947f 100644 --- a/src/lib/libcrypto/doc/X509_NAME_add_entry_by_txt.pod +++ b/src/lib/libcrypto/doc/X509_NAME_add_entry_by_txt.pod | |||
@@ -2,8 +2,9 @@ | |||
2 | 2 | ||
3 | =head1 NAME | 3 | =head1 NAME |
4 | 4 | ||
5 | X509_NAME_add_entry_by_txt, X509_NAME_add_entry_by_OBJ, X509_NAME_add_entry_by_NID, | 5 | X509_NAME_add_entry_by_txt, X509_NAME_add_entry_by_OBJ, |
6 | X509_NAME_add_entry, X509_NAME_delete_entry - X509_NAME modification functions | 6 | X509_NAME_add_entry_by_NID, X509_NAME_add_entry, X509_NAME_delete_entry - |
7 | X509_NAME modification functions | ||
7 | 8 | ||
8 | =head1 SYNOPSIS | 9 | =head1 SYNOPSIS |
9 | 10 | ||
diff --git a/src/lib/libcrypto/doc/X509_NAME_print_ex.pod b/src/lib/libcrypto/doc/X509_NAME_print_ex.pod index b2d86d4ddb..ff5d788d88 100644 --- a/src/lib/libcrypto/doc/X509_NAME_print_ex.pod +++ b/src/lib/libcrypto/doc/X509_NAME_print_ex.pod | |||
@@ -16,16 +16,16 @@ X509_NAME_oneline - X509_NAME printing routines. | |||
16 | 16 | ||
17 | =head1 DESCRIPTION | 17 | =head1 DESCRIPTION |
18 | 18 | ||
19 | X509_NAME_print_ex() prints a human readable version of B<nm> to BIO B<out>. Each | 19 | X509_NAME_print_ex() prints a human readable version of B<nm> to BIO B<out>. |
20 | line (for multiline formats) is indented by B<indent> spaces. The output format | 20 | Each line (for multiline formats) is indented by B<indent> spaces. The output |
21 | can be extensively customised by use of the B<flags> parameter. | 21 | format can be extensively customised by use of the B<flags> parameter. |
22 | 22 | ||
23 | X509_NAME_print_ex_fp() is identical to X509_NAME_print_ex() except the output is | 23 | X509_NAME_print_ex_fp() is identical to X509_NAME_print_ex() except the output |
24 | written to FILE pointer B<fp>. | 24 | is written to FILE pointer B<fp>. |
25 | 25 | ||
26 | X509_NAME_oneline() prints an ASCII version of B<a> to B<buf>. At most B<size> | 26 | X509_NAME_oneline() prints an ASCII version of B<a> to B<buf>. At most B<size> |
27 | bytes will be written. If B<buf> is B<NULL> then a buffer is dynamically allocated | 27 | bytes will be written. If B<buf> is B<NULL> then a buffer is dynamically |
28 | and returned, otherwise B<buf> is returned. | 28 | allocated and returned, otherwise B<buf> is returned. |
29 | 29 | ||
30 | X509_NAME_print() prints out B<name> to B<bp> indenting each line by B<obase> | 30 | X509_NAME_print() prints out B<name> to B<bp> indenting each line by B<obase> |
31 | characters. Multiple lines are used if the output (including indent) exceeds | 31 | characters. Multiple lines are used if the output (including indent) exceeds |
@@ -33,10 +33,10 @@ characters. Multiple lines are used if the output (including indent) exceeds | |||
33 | 33 | ||
34 | =head1 NOTES | 34 | =head1 NOTES |
35 | 35 | ||
36 | The functions X509_NAME_oneline() and X509_NAME_print() are legacy functions which | 36 | The functions X509_NAME_oneline() and X509_NAME_print() are legacy functions |
37 | produce a non standard output form, they don't handle multi character fields and | 37 | which produce a non standard output form, they don't handle multi character |
38 | have various quirks and inconsistencies. Their use is strongly discouraged in new | 38 | fields and have various quirks and inconsistencies. Their use is strongly |
39 | applications. | 39 | discouraged in new applications. |
40 | 40 | ||
41 | Although there are a large number of possible flags for most purposes | 41 | Although there are a large number of possible flags for most purposes |
42 | B<XN_FLAG_ONELINE>, B<XN_FLAG_MULTILINE> or B<XN_FLAG_RFC2253> will suffice. | 42 | B<XN_FLAG_ONELINE>, B<XN_FLAG_MULTILINE> or B<XN_FLAG_RFC2253> will suffice. |
@@ -49,15 +49,16 @@ The complete set of the flags supported by X509_NAME_print_ex() is listed below. | |||
49 | Several options can be ored together. | 49 | Several options can be ored together. |
50 | 50 | ||
51 | The options B<XN_FLAG_SEP_COMMA_PLUS>, B<XN_FLAG_SEP_CPLUS_SPC>, | 51 | The options B<XN_FLAG_SEP_COMMA_PLUS>, B<XN_FLAG_SEP_CPLUS_SPC>, |
52 | B<XN_FLAG_SEP_SPLUS_SPC> and B<XN_FLAG_SEP_MULTILINE> determine the field separators | 52 | B<XN_FLAG_SEP_SPLUS_SPC> and B<XN_FLAG_SEP_MULTILINE> determine the field |
53 | to use. Two distinct separators are used between distinct RelativeDistinguishedName | 53 | separators to use. Two distinct separators are used between distinct |
54 | components and separate values in the same RDN for a multi-valued RDN. Multi-valued | 54 | RelativeDistinguishedName components and separate values in the same RDN for a |
55 | RDNs are currently very rare so the second separator will hardly ever be used. | 55 | multi-valued RDN. Multi-valued RDNs are currently very rare so the second |
56 | separator will hardly ever be used. | ||
56 | 57 | ||
57 | B<XN_FLAG_SEP_COMMA_PLUS> uses comma and plus as separators. B<XN_FLAG_SEP_CPLUS_SPC> | 58 | B<XN_FLAG_SEP_COMMA_PLUS> uses comma and plus as separators. |
58 | uses comma and plus with spaces: this is more readable that plain comma and plus. | 59 | B<XN_FLAG_SEP_CPLUS_SPC> uses comma and plus with spaces: this is more readable |
59 | B<XN_FLAG_SEP_SPLUS_SPC> uses spaced semicolon and plus. B<XN_FLAG_SEP_MULTILINE> uses | 60 | that plain comma and plus. B<XN_FLAG_SEP_SPLUS_SPC> uses spaced semicolon and |
60 | spaced newline and plus respectively. | 61 | plus. B<XN_FLAG_SEP_MULTILINE> uses spaced newline and plus respectively. |
61 | 62 | ||
62 | If B<XN_FLAG_DN_REV> is set the whole DN is printed in reversed order. | 63 | If B<XN_FLAG_DN_REV> is set the whole DN is printed in reversed order. |
63 | 64 | ||
@@ -92,7 +93,8 @@ B<XN_FLAG_ONELINE> is a more readable one line format which is the same as: | |||
92 | B<XN_FLAG_MULTILINE> is a multiline format which is the same as: | 93 | B<XN_FLAG_MULTILINE> is a multiline format which is the same as: |
93 | B<ASN1_STRFLGS_ESC_CTRL | ASN1_STRFLGS_ESC_MSB | XN_FLAG_SEP_MULTILINE | XN_FLAG_SPC_EQ | XN_FLAG_FN_LN | XN_FLAG_FN_ALIGN> | 94 | B<ASN1_STRFLGS_ESC_CTRL | ASN1_STRFLGS_ESC_MSB | XN_FLAG_SEP_MULTILINE | XN_FLAG_SPC_EQ | XN_FLAG_FN_LN | XN_FLAG_FN_ALIGN> |
94 | 95 | ||
95 | B<XN_FLAG_COMPAT> uses a format identical to X509_NAME_print(): in fact it calls X509_NAME_print() internally. | 96 | B<XN_FLAG_COMPAT> uses a format identical to X509_NAME_print(): in fact it |
97 | calls X509_NAME_print() internally. | ||
96 | 98 | ||
97 | =head1 SEE ALSO | 99 | =head1 SEE ALSO |
98 | 100 | ||
diff --git a/src/lib/libcrypto/doc/X509_STORE_CTX_get_error.pod b/src/lib/libcrypto/doc/X509_STORE_CTX_get_error.pod index 60e8332ae9..5760f64fcb 100644 --- a/src/lib/libcrypto/doc/X509_STORE_CTX_get_error.pod +++ b/src/lib/libcrypto/doc/X509_STORE_CTX_get_error.pod | |||
@@ -2,7 +2,10 @@ | |||
2 | 2 | ||
3 | =head1 NAME | 3 | =head1 NAME |
4 | 4 | ||
5 | X509_STORE_CTX_get_error, X509_STORE_CTX_set_error, X509_STORE_CTX_get_error_depth, X509_STORE_CTX_get_current_cert, X509_STORE_CTX_get1_chain, X509_verify_cert_error_string - get or set certificate verification status information | 5 | X509_STORE_CTX_get_error, X509_STORE_CTX_set_error, |
6 | X509_STORE_CTX_get_error_depth, X509_STORE_CTX_get_current_cert, | ||
7 | X509_STORE_CTX_get1_chain, X509_verify_cert_error_string - get or set | ||
8 | certificate verification status information | ||
6 | 9 | ||
7 | =head1 SYNOPSIS | 10 | =head1 SYNOPSIS |
8 | 11 | ||
@@ -82,19 +85,22 @@ of an untrusted certificate cannot be found. | |||
82 | 85 | ||
83 | the CRL of a certificate could not be found. | 86 | the CRL of a certificate could not be found. |
84 | 87 | ||
85 | =item B<X509_V_ERR_UNABLE_TO_DECRYPT_CERT_SIGNATURE: unable to decrypt certificate's signature> | 88 | =item B<X509_V_ERR_UNABLE_TO_DECRYPT_CERT_SIGNATURE: unable to decrypt |
89 | certificate's signature> | ||
86 | 90 | ||
87 | the certificate signature could not be decrypted. This means that the actual | 91 | the certificate signature could not be decrypted. This means that the actual |
88 | signature value could not be determined rather than it not matching the | 92 | signature value could not be determined rather than it not matching the |
89 | expected value, this is only meaningful for RSA keys. | 93 | expected value, this is only meaningful for RSA keys. |
90 | 94 | ||
91 | =item B<X509_V_ERR_UNABLE_TO_DECRYPT_CRL_SIGNATURE: unable to decrypt CRL's signature> | 95 | =item B<X509_V_ERR_UNABLE_TO_DECRYPT_CRL_SIGNATURE: unable to decrypt CRL's |
96 | signature> | ||
92 | 97 | ||
93 | the CRL signature could not be decrypted: this means that the actual signature | 98 | the CRL signature could not be decrypted: this means that the actual signature |
94 | value could not be determined rather than it not matching the expected value. | 99 | value could not be determined rather than it not matching the expected value. |
95 | Unused. | 100 | Unused. |
96 | 101 | ||
97 | =item B<X509_V_ERR_UNABLE_TO_DECODE_ISSUER_PUBLIC_KEY: unable to decode issuer public key> | 102 | =item B<X509_V_ERR_UNABLE_TO_DECODE_ISSUER_PUBLIC_KEY: unable to decode issuer |
103 | public key> | ||
98 | 104 | ||
99 | the public key in the certificate SubjectPublicKeyInfo could not be read. | 105 | the public key in the certificate SubjectPublicKeyInfo could not be read. |
100 | 106 | ||
@@ -112,7 +118,8 @@ the certificate is not yet valid: the notBefore date is after the current time. | |||
112 | 118 | ||
113 | =item B<X509_V_ERR_CERT_HAS_EXPIRED: certificate has expired> | 119 | =item B<X509_V_ERR_CERT_HAS_EXPIRED: certificate has expired> |
114 | 120 | ||
115 | the certificate has expired: that is the notAfter date is before the current time. | 121 | the certificate has expired: that is the notAfter date is before the current |
122 | time. | ||
116 | 123 | ||
117 | =item B<X509_V_ERR_CRL_NOT_YET_VALID: CRL is not yet valid> | 124 | =item B<X509_V_ERR_CRL_NOT_YET_VALID: CRL is not yet valid> |
118 | 125 | ||
@@ -122,19 +129,23 @@ the CRL is not yet valid. | |||
122 | 129 | ||
123 | the CRL has expired. | 130 | the CRL has expired. |
124 | 131 | ||
125 | =item B<X509_V_ERR_ERROR_IN_CERT_NOT_BEFORE_FIELD: format error in certificate's notBefore field> | 132 | =item B<X509_V_ERR_ERROR_IN_CERT_NOT_BEFORE_FIELD: format error in |
133 | certificate's notBefore field> | ||
126 | 134 | ||
127 | the certificate notBefore field contains an invalid time. | 135 | the certificate notBefore field contains an invalid time. |
128 | 136 | ||
129 | =item B<X509_V_ERR_ERROR_IN_CERT_NOT_AFTER_FIELD: format error in certificate's notAfter field> | 137 | =item B<X509_V_ERR_ERROR_IN_CERT_NOT_AFTER_FIELD: format error in certificate's |
138 | notAfter field> | ||
130 | 139 | ||
131 | the certificate notAfter field contains an invalid time. | 140 | the certificate notAfter field contains an invalid time. |
132 | 141 | ||
133 | =item B<X509_V_ERR_ERROR_IN_CRL_LAST_UPDATE_FIELD: format error in CRL's lastUpdate field> | 142 | =item B<X509_V_ERR_ERROR_IN_CRL_LAST_UPDATE_FIELD: format error in CRL's |
143 | lastUpdate field> | ||
134 | 144 | ||
135 | the CRL lastUpdate field contains an invalid time. | 145 | the CRL lastUpdate field contains an invalid time. |
136 | 146 | ||
137 | =item B<X509_V_ERR_ERROR_IN_CRL_NEXT_UPDATE_FIELD: format error in CRL's nextUpdate field> | 147 | =item B<X509_V_ERR_ERROR_IN_CRL_NEXT_UPDATE_FIELD: format error in CRL's |
148 | nextUpdate field> | ||
138 | 149 | ||
139 | the CRL nextUpdate field contains an invalid time. | 150 | the CRL nextUpdate field contains an invalid time. |
140 | 151 | ||
@@ -147,17 +158,20 @@ an error occurred trying to allocate memory. This should never happen. | |||
147 | the passed certificate is self signed and the same certificate cannot be found | 158 | the passed certificate is self signed and the same certificate cannot be found |
148 | in the list of trusted certificates. | 159 | in the list of trusted certificates. |
149 | 160 | ||
150 | =item B<X509_V_ERR_SELF_SIGNED_CERT_IN_CHAIN: self signed certificate in certificate chain> | 161 | =item B<X509_V_ERR_SELF_SIGNED_CERT_IN_CHAIN: self signed certificate in |
162 | certificate chain> | ||
151 | 163 | ||
152 | the certificate chain could be built up using the untrusted certificates but | 164 | the certificate chain could be built up using the untrusted certificates but |
153 | the root could not be found locally. | 165 | the root could not be found locally. |
154 | 166 | ||
155 | =item B<X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT_LOCALLY: unable to get local issuer certificate> | 167 | =item B<X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT_LOCALLY: unable to get local |
168 | issuer certificate> | ||
156 | 169 | ||
157 | the issuer certificate of a locally looked up certificate could not be found. | 170 | the issuer certificate of a locally looked up certificate could not be found. |
158 | This normally means the list of trusted certificates is not complete. | 171 | This normally means the list of trusted certificates is not complete. |
159 | 172 | ||
160 | =item B<X509_V_ERR_UNABLE_TO_VERIFY_LEAF_SIGNATURE: unable to verify the first certificate> | 173 | =item B<X509_V_ERR_UNABLE_TO_VERIFY_LEAF_SIGNATURE: unable to verify the first |
174 | certificate> | ||
161 | 175 | ||
162 | no signatures could be verified because the chain contains only one certificate | 176 | no signatures could be verified because the chain contains only one certificate |
163 | and it is not self signed. | 177 | and it is not self signed. |
@@ -198,34 +212,39 @@ did not match the issuer name of the current certificate. This is only set | |||
198 | if issuer check debugging is enabled it is used for status notification and | 212 | if issuer check debugging is enabled it is used for status notification and |
199 | is B<not> in itself an error. | 213 | is B<not> in itself an error. |
200 | 214 | ||
201 | =item B<X509_V_ERR_AKID_SKID_MISMATCH: authority and subject key identifier mismatch> | 215 | =item B<X509_V_ERR_AKID_SKID_MISMATCH: authority and subject key identifier |
216 | mismatch> | ||
202 | 217 | ||
203 | the current candidate issuer certificate was rejected because its subject key | 218 | the current candidate issuer certificate was rejected because its subject key |
204 | identifier was present and did not match the authority key identifier current | 219 | identifier was present and did not match the authority key identifier current |
205 | certificate. This is only set if issuer check debugging is enabled it is used | 220 | certificate. This is only set if issuer check debugging is enabled it is used |
206 | for status notification and is B<not> in itself an error. | 221 | for status notification and is B<not> in itself an error. |
207 | 222 | ||
208 | =item B<X509_V_ERR_AKID_ISSUER_SERIAL_MISMATCH: authority and issuer serial number mismatch> | 223 | =item B<X509_V_ERR_AKID_ISSUER_SERIAL_MISMATCH: authority and issuer serial |
224 | number mismatch> | ||
209 | 225 | ||
210 | the current candidate issuer certificate was rejected because its issuer name | 226 | the current candidate issuer certificate was rejected because its issuer name |
211 | and serial number was present and did not match the authority key identifier of | 227 | and serial number was present and did not match the authority key identifier of |
212 | the current certificate. This is only set if issuer check debugging is enabled | 228 | the current certificate. This is only set if issuer check debugging is enabled |
213 | it is used for status notification and is B<not> in itself an error. | 229 | it is used for status notification and is B<not> in itself an error. |
214 | 230 | ||
215 | =item B<X509_V_ERR_KEYUSAGE_NO_CERTSIGN:key usage does not include certificate signing> | 231 | =item B<X509_V_ERR_KEYUSAGE_NO_CERTSIGN:key usage does not include certificate |
232 | signing> | ||
216 | 233 | ||
217 | the current candidate issuer certificate was rejected because its keyUsage | 234 | the current candidate issuer certificate was rejected because its keyUsage |
218 | extension does not permit certificate signing. This is only set if issuer check | 235 | extension does not permit certificate signing. This is only set if issuer check |
219 | debugging is enabled it is used for status notification and is B<not> in itself | 236 | debugging is enabled it is used for status notification and is B<not> in itself |
220 | an error. | 237 | an error. |
221 | 238 | ||
222 | =item B<X509_V_ERR_INVALID_EXTENSION: invalid or inconsistent certificate extension> | 239 | =item B<X509_V_ERR_INVALID_EXTENSION: invalid or inconsistent certificate |
240 | extension> | ||
223 | 241 | ||
224 | A certificate extension had an invalid value (for example an incorrect | 242 | A certificate extension had an invalid value (for example an incorrect |
225 | encoding) or some value inconsistent with other extensions. | 243 | encoding) or some value inconsistent with other extensions. |
226 | 244 | ||
227 | 245 | ||
228 | =item B<X509_V_ERR_INVALID_POLICY_EXTENSION: invalid or inconsistent certificate policy extension> | 246 | =item B<X509_V_ERR_INVALID_POLICY_EXTENSION: invalid or inconsistent |
247 | certificate policy extension> | ||
229 | 248 | ||
230 | A certificate policies extension had an invalid value (for example an incorrect | 249 | A certificate policies extension had an invalid value (for example an incorrect |
231 | encoding) or some value inconsistent with other extensions. This error only | 250 | encoding) or some value inconsistent with other extensions. This error only |
@@ -252,17 +271,20 @@ A name constraint violation occured in the permitted subtrees. | |||
252 | 271 | ||
253 | A name constraint violation occured in the excluded subtrees. | 272 | A name constraint violation occured in the excluded subtrees. |
254 | 273 | ||
255 | =item B<X509_V_ERR_SUBTREE_MINMAX: name constraints minimum and maximum not supported> | 274 | =item B<X509_V_ERR_SUBTREE_MINMAX: name constraints minimum and maximum not |
275 | supported> | ||
256 | 276 | ||
257 | A certificate name constraints extension included a minimum or maximum field: | 277 | A certificate name constraints extension included a minimum or maximum field: |
258 | this is not supported. | 278 | this is not supported. |
259 | 279 | ||
260 | =item B<X509_V_ERR_UNSUPPORTED_CONSTRAINT_TYPE: unsupported name constraint type> | 280 | =item B<X509_V_ERR_UNSUPPORTED_CONSTRAINT_TYPE: unsupported name constraint |
281 | type> | ||
261 | 282 | ||
262 | An unsupported name constraint type was encountered. OpenSSL currently only | 283 | An unsupported name constraint type was encountered. OpenSSL currently only |
263 | supports directory name, DNS name, email and URI types. | 284 | supports directory name, DNS name, email and URI types. |
264 | 285 | ||
265 | =item B<X509_V_ERR_UNSUPPORTED_CONSTRAINT_SYNTAX: unsupported or invalid name constraint syntax> | 286 | =item B<X509_V_ERR_UNSUPPORTED_CONSTRAINT_SYNTAX: unsupported or invalid name |
287 | constraint syntax> | ||
266 | 288 | ||
267 | The format of the name constraint is not recognised: for example an email | 289 | The format of the name constraint is not recognised: for example an email |
268 | address format of a form not mentioned in RFC3280. This could be caused by | 290 | address format of a form not mentioned in RFC3280. This could be caused by |
diff --git a/src/lib/libcrypto/doc/X509_STORE_CTX_get_ex_new_index.pod b/src/lib/libcrypto/doc/X509_STORE_CTX_get_ex_new_index.pod index 1b75967ccd..392b36c3ae 100644 --- a/src/lib/libcrypto/doc/X509_STORE_CTX_get_ex_new_index.pod +++ b/src/lib/libcrypto/doc/X509_STORE_CTX_get_ex_new_index.pod | |||
@@ -2,7 +2,9 @@ | |||
2 | 2 | ||
3 | =head1 NAME | 3 | =head1 NAME |
4 | 4 | ||
5 | X509_STORE_CTX_get_ex_new_index, X509_STORE_CTX_set_ex_data, X509_STORE_CTX_get_ex_data - add application specific data to X509_STORE_CTX structures | 5 | X509_STORE_CTX_get_ex_new_index, X509_STORE_CTX_set_ex_data, |
6 | X509_STORE_CTX_get_ex_data - add application specific data to X509_STORE_CTX | ||
7 | structures | ||
6 | 8 | ||
7 | =head1 SYNOPSIS | 9 | =head1 SYNOPSIS |
8 | 10 | ||
diff --git a/src/lib/libcrypto/doc/X509_STORE_CTX_new.pod b/src/lib/libcrypto/doc/X509_STORE_CTX_new.pod index 1c55236aa2..8f602274ee 100644 --- a/src/lib/libcrypto/doc/X509_STORE_CTX_new.pod +++ b/src/lib/libcrypto/doc/X509_STORE_CTX_new.pod | |||
@@ -2,7 +2,11 @@ | |||
2 | 2 | ||
3 | =head1 NAME | 3 | =head1 NAME |
4 | 4 | ||
5 | X509_STORE_CTX_new, X509_STORE_CTX_cleanup, X509_STORE_CTX_free, X509_STORE_CTX_init, X509_STORE_CTX_trusted_stack, X509_STORE_CTX_set_cert, X509_STORE_CTX_set_chain, X509_STORE_CTX_set0_crls, X509_STORE_CTX_get0_param, X509_STORE_CTX_set0_param, X509_STORE_CTX_set_default - X509_STORE_CTX initialisation | 5 | X509_STORE_CTX_new, X509_STORE_CTX_cleanup, X509_STORE_CTX_free, |
6 | X509_STORE_CTX_init, X509_STORE_CTX_trusted_stack, X509_STORE_CTX_set_cert, | ||
7 | X509_STORE_CTX_set_chain, X509_STORE_CTX_set0_crls, X509_STORE_CTX_get0_param, | ||
8 | X509_STORE_CTX_set0_param, X509_STORE_CTX_set_default - X509_STORE_CTX | ||
9 | initialisation | ||
6 | 10 | ||
7 | =head1 SYNOPSIS | 11 | =head1 SYNOPSIS |
8 | 12 | ||
diff --git a/src/lib/libcrypto/doc/X509_STORE_set_verify_cb_func.pod b/src/lib/libcrypto/doc/X509_STORE_set_verify_cb_func.pod index 012f2d2c75..f9602b3e77 100644 --- a/src/lib/libcrypto/doc/X509_STORE_set_verify_cb_func.pod +++ b/src/lib/libcrypto/doc/X509_STORE_set_verify_cb_func.pod | |||
@@ -2,7 +2,8 @@ | |||
2 | 2 | ||
3 | =head1 NAME | 3 | =head1 NAME |
4 | 4 | ||
5 | X509_STORE_set_verify_cb_func, X509_STORE_set_verify_cb - set verification callback | 5 | X509_STORE_set_verify_cb_func, X509_STORE_set_verify_cb - set verification |
6 | callback | ||
6 | 7 | ||
7 | =head1 SYNOPSIS | 8 | =head1 SYNOPSIS |
8 | 9 | ||
diff --git a/src/lib/libcrypto/doc/X509_VERIFY_PARAM_set_flags.pod b/src/lib/libcrypto/doc/X509_VERIFY_PARAM_set_flags.pod index e5da5bec08..f213a9c117 100644 --- a/src/lib/libcrypto/doc/X509_VERIFY_PARAM_set_flags.pod +++ b/src/lib/libcrypto/doc/X509_VERIFY_PARAM_set_flags.pod | |||
@@ -2,7 +2,12 @@ | |||
2 | 2 | ||
3 | =head1 NAME | 3 | =head1 NAME |
4 | 4 | ||
5 | X509_VERIFY_PARAM_set_flags, X509_VERIFY_PARAM_clear_flags, X509_VERIFY_PARAM_get_flags, X509_VERIFY_PARAM_set_purpose, X509_VERIFY_PARAM_set_trust, X509_VERIFY_PARAM_set_depth, X509_VERIFY_PARAM_get_depth, X509_VERIFY_PARAM_set_time, X509_VERIFY_PARAM_add0_policy, X509_VERIFY_PARAM_set1_policies - X509 verification parameters | 5 | X509_VERIFY_PARAM_set_flags, X509_VERIFY_PARAM_clear_flags, |
6 | X509_VERIFY_PARAM_get_flags, X509_VERIFY_PARAM_set_purpose, | ||
7 | X509_VERIFY_PARAM_set_trust, X509_VERIFY_PARAM_set_depth, | ||
8 | X509_VERIFY_PARAM_get_depth, X509_VERIFY_PARAM_set_time, | ||
9 | X509_VERIFY_PARAM_add0_policy, X509_VERIFY_PARAM_set1_policies - X509 | ||
10 | verification parameters | ||
6 | 11 | ||
7 | =head1 SYNOPSIS | 12 | =head1 SYNOPSIS |
8 | 13 | ||
diff --git a/src/lib/libcrypto/doc/bn.pod b/src/lib/libcrypto/doc/bn.pod index cd2f8e50c6..4a3f24ba30 100644 --- a/src/lib/libcrypto/doc/bn.pod +++ b/src/lib/libcrypto/doc/bn.pod | |||
@@ -166,10 +166,10 @@ of B<BIGNUM>s to external formats is described in L<BN_bn2bin(3)|BN_bn2bin(3)>. | |||
166 | 166 | ||
167 | =head1 SEE ALSO | 167 | =head1 SEE ALSO |
168 | 168 | ||
169 | L<bn_internal(3)|bn_internal(3)>, | 169 | L<bn_internal(3)|bn_internal(3)>, L<dh(3)|dh(3)>, L<err(3)|err(3)>, |
170 | L<dh(3)|dh(3)>, L<err(3)|err(3)>, L<rand(3)|rand(3)>, L<rsa(3)|rsa(3)>, | 170 | L<rand(3)|rand(3)>, L<rsa(3)|rsa(3)>, L<BN_new(3)|BN_new(3)>, |
171 | L<BN_new(3)|BN_new(3)>, L<BN_CTX_new(3)|BN_CTX_new(3)>, | 171 | L<BN_CTX_new(3)|BN_CTX_new(3)>, L<BN_copy(3)|BN_copy(3)>, |
172 | L<BN_copy(3)|BN_copy(3)>, L<BN_swap(3)|BN_swap(3)>, L<BN_num_bytes(3)|BN_num_bytes(3)>, | 172 | L<BN_swap(3)|BN_swap(3)>, L<BN_num_bytes(3)|BN_num_bytes(3)>, |
173 | L<BN_add(3)|BN_add(3)>, L<BN_add_word(3)|BN_add_word(3)>, | 173 | L<BN_add(3)|BN_add(3)>, L<BN_add_word(3)|BN_add_word(3)>, |
174 | L<BN_cmp(3)|BN_cmp(3)>, L<BN_zero(3)|BN_zero(3)>, L<BN_rand(3)|BN_rand(3)>, | 174 | L<BN_cmp(3)|BN_cmp(3)>, L<BN_zero(3)|BN_zero(3)>, L<BN_rand(3)|BN_rand(3)>, |
175 | L<BN_generate_prime(3)|BN_generate_prime(3)>, L<BN_set_bit(3)|BN_set_bit(3)>, | 175 | L<BN_generate_prime(3)|BN_generate_prime(3)>, L<BN_set_bit(3)|BN_set_bit(3)>, |
diff --git a/src/lib/libcrypto/doc/d2i_RSAPublicKey.pod b/src/lib/libcrypto/doc/d2i_RSAPublicKey.pod index 1711dc038f..68e7f27de5 100644 --- a/src/lib/libcrypto/doc/d2i_RSAPublicKey.pod +++ b/src/lib/libcrypto/doc/d2i_RSAPublicKey.pod | |||
@@ -29,14 +29,14 @@ d2i_Netscape_RSA - RSA public and private key encoding functions. | |||
29 | 29 | ||
30 | =head1 DESCRIPTION | 30 | =head1 DESCRIPTION |
31 | 31 | ||
32 | d2i_RSAPublicKey() and i2d_RSAPublicKey() decode and encode a PKCS#1 RSAPublicKey | 32 | d2i_RSAPublicKey() and i2d_RSAPublicKey() decode and encode a PKCS#1 |
33 | structure. | 33 | RSAPublicKey structure. |
34 | 34 | ||
35 | d2i_RSA_PUBKEY() and i2d_RSA_PUBKEY() decode and encode an RSA public key using | 35 | d2i_RSA_PUBKEY() and i2d_RSA_PUBKEY() decode and encode an RSA public key using |
36 | a SubjectPublicKeyInfo (certificate public key) structure. | 36 | a SubjectPublicKeyInfo (certificate public key) structure. |
37 | 37 | ||
38 | d2i_RSAPrivateKey(), i2d_RSAPrivateKey() decode and encode a PKCS#1 RSAPrivateKey | 38 | d2i_RSAPrivateKey(), i2d_RSAPrivateKey() decode and encode a PKCS#1 |
39 | structure. | 39 | RSAPrivateKey structure. |
40 | 40 | ||
41 | d2i_Netscape_RSA(), i2d_Netscape_RSA() decode and encode an RSA private key in | 41 | d2i_Netscape_RSA(), i2d_Netscape_RSA() decode and encode an RSA private key in |
42 | NET format. | 42 | NET format. |
diff --git a/src/lib/libcrypto/doc/dh.pod b/src/lib/libcrypto/doc/dh.pod index 97aaa75731..5fb9890a77 100644 --- a/src/lib/libcrypto/doc/dh.pod +++ b/src/lib/libcrypto/doc/dh.pod | |||
@@ -40,10 +40,11 @@ dh - Diffie-Hellman key agreement | |||
40 | 40 | ||
41 | =head1 DESCRIPTION | 41 | =head1 DESCRIPTION |
42 | 42 | ||
43 | These functions implement the Diffie-Hellman key agreement protocol. | 43 | These functions implement the Diffie-Hellman key agreement protocol. The |
44 | The generation of shared DH parameters is described in | 44 | generation of shared DH parameters is described in |
45 | L<DH_generate_parameters(3)|DH_generate_parameters(3)>; L<DH_generate_key(3)|DH_generate_key(3)> describes how | 45 | L<DH_generate_parameters(3)|DH_generate_parameters(3)>; |
46 | to perform a key agreement. | 46 | L<DH_generate_key(3)|DH_generate_key(3)> describes how to perform a key |
47 | agreement. | ||
47 | 48 | ||
48 | The B<DH> structure consists of several BIGNUM components. | 49 | The B<DH> structure consists of several BIGNUM components. |
49 | 50 | ||