diff options
| author | jim <> | 2014-05-04 22:26:33 +0000 | 
|---|---|---|
| committer | jim <> | 2014-05-04 22:26:33 +0000 | 
| commit | cc8925bff081ec36ac69be8b3681bff98f5d07da (patch) | |
| tree | c61ab0faf9a25b5fa4c1daeb8248a7e8deff66d2 /src/lib/libssl/src | |
| parent | e591b58894a6d621ba00c14da39becb1a0d16335 (diff) | |
| download | openbsd-cc8925bff081ec36ac69be8b3681bff98f5d07da.tar.gz openbsd-cc8925bff081ec36ac69be8b3681bff98f5d07da.tar.bz2 openbsd-cc8925bff081ec36ac69be8b3681bff98f5d07da.zip | |
Improve line wrapping for lines exceeding 80 chars.
ok jmc@
Diffstat (limited to '')
82 files changed, 430 insertions, 305 deletions
| diff --git a/src/lib/libssl/src/doc/crypto/ASN1_OBJECT_new.pod b/src/lib/libssl/src/doc/crypto/ASN1_OBJECT_new.pod index 9bae40fccf..b88eb62556 100644 --- a/src/lib/libssl/src/doc/crypto/ASN1_OBJECT_new.pod +++ b/src/lib/libssl/src/doc/crypto/ASN1_OBJECT_new.pod | |||
| @@ -40,6 +40,7 @@ L<ERR_get_error(3)|ERR_get_error(3)>, L<d2i_ASN1_OBJECT(3)|d2i_ASN1_OBJECT(3)> | |||
| 40 | 40 | ||
| 41 | =head1 HISTORY | 41 | =head1 HISTORY | 
| 42 | 42 | ||
| 43 | ASN1_OBJECT_new() and ASN1_OBJECT_free() are available in all versions of SSLeay and OpenSSL. | 43 | ASN1_OBJECT_new() and ASN1_OBJECT_free() are available in all versions of | 
| 44 | SSLeay and OpenSSL. | ||
| 44 | 45 | ||
| 45 | =cut | 46 | =cut | 
| diff --git a/src/lib/libssl/src/doc/crypto/ASN1_STRING_print_ex.pod b/src/lib/libssl/src/doc/crypto/ASN1_STRING_print_ex.pod index 70ac9b8488..3b6ab8b710 100644 --- a/src/lib/libssl/src/doc/crypto/ASN1_STRING_print_ex.pod +++ b/src/lib/libssl/src/doc/crypto/ASN1_STRING_print_ex.pod | |||
| @@ -28,25 +28,27 @@ with '.'. | |||
| 28 | 28 | ||
| 29 | =head1 NOTES | 29 | =head1 NOTES | 
| 30 | 30 | ||
| 31 | ASN1_STRING_print() is a legacy function which should be avoided in new applications. | 31 | ASN1_STRING_print() is a legacy function which should be avoided in new | 
| 32 | applications. | ||
| 32 | 33 | ||
| 33 | Although there are a large number of options frequently B<ASN1_STRFLGS_RFC2253> is | 34 | Although there are a large number of options frequently B<ASN1_STRFLGS_RFC2253> | 
| 34 | suitable, or on UTF8 terminals B<ASN1_STRFLGS_RFC2253 & ~ASN1_STRFLGS_ESC_MSB>. | 35 | is suitable, or on UTF8 terminals B<ASN1_STRFLGS_RFC2253 & | 
| 36 | ~ASN1_STRFLGS_ESC_MSB>. | ||
| 35 | 37 | ||
| 36 | The complete set of supported options for B<flags> is listed below. | 38 | The complete set of supported options for B<flags> is listed below. | 
| 37 | 39 | ||
| 38 | Various characters can be escaped. If B<ASN1_STRFLGS_ESC_2253> is set the characters | 40 | Various characters can be escaped. If B<ASN1_STRFLGS_ESC_2253> is set the | 
| 39 | determined by RFC2253 are escaped. If B<ASN1_STRFLGS_ESC_CTRL> is set control | 41 | characters determined by RFC2253 are escaped. If B<ASN1_STRFLGS_ESC_CTRL> is | 
| 40 | characters are escaped. If B<ASN1_STRFLGS_ESC_MSB> is set characters with the | 42 | set control characters are escaped. If B<ASN1_STRFLGS_ESC_MSB> is set | 
| 41 | MSB set are escaped: this option should B<not> be used if the terminal correctly | 43 | characters with the MSB set are escaped: this option should B<not> be used if | 
| 42 | interprets UTF8 sequences. | 44 | the terminal correctly interprets UTF8 sequences. | 
| 43 | 45 | ||
| 44 | Escaping takes several forms. | 46 | Escaping takes several forms. | 
| 45 | 47 | ||
| 46 | If the character being escaped is a 16 bit character then the form "\UXXXX" is used | 48 | If the character being escaped is a 16 bit character then the form "\UXXXX" is | 
| 47 | using exactly four characters for the hex representation. If it is 32 bits then | 49 | used using exactly four characters for the hex representation. If it is 32 bits | 
| 48 | "\WXXXXXXXX" is used using eight characters of its hex representation. These forms | 50 | then "\WXXXXXXXX" is used using eight characters of its hex representation. | 
| 49 | will only be used if UTF8 conversion is not set (see below). | 51 | These forms will only be used if UTF8 conversion is not set (see below). | 
| 50 | 52 | ||
| 51 | Printable characters are normally escaped using the backslash '\' character. If | 53 | Printable characters are normally escaped using the backslash '\' character. If | 
| 52 | B<ASN1_STRFLGS_ESC_QUOTE> is set then the whole string is instead surrounded by | 54 | B<ASN1_STRFLGS_ESC_QUOTE> is set then the whole string is instead surrounded by | 
| @@ -58,9 +60,10 @@ If B<ASN1_STRFLGS_UTF8_CONVERT> is set then characters are converted to UTF8 | |||
| 58 | format first. If the terminal supports the display of UTF8 sequences then this | 60 | format first. If the terminal supports the display of UTF8 sequences then this | 
| 59 | option will correctly display multi byte characters. | 61 | option will correctly display multi byte characters. | 
| 60 | 62 | ||
| 61 | If B<ASN1_STRFLGS_IGNORE_TYPE> is set then the string type is not interpreted at | 63 | If B<ASN1_STRFLGS_IGNORE_TYPE> is set then the string type is not interpreted | 
| 62 | all: everything is assumed to be one byte per character. This is primarily for | 64 | at all: everything is assumed to be one byte per character. This is primarily | 
| 63 | debugging purposes and can result in confusing output in multi character strings. | 65 | for debugging purposes and can result in confusing output in multi character | 
| 66 | strings. | ||
| 64 | 67 | ||
| 65 | If B<ASN1_STRFLGS_SHOW_TYPE> is set then the string type itself is printed out | 68 | If B<ASN1_STRFLGS_SHOW_TYPE> is set then the string type itself is printed out | 
| 66 | before its value (for example "BMPSTRING"), this actually uses ASN1_tag2str(). | 69 | before its value (for example "BMPSTRING"), this actually uses ASN1_tag2str(). | 
| diff --git a/src/lib/libssl/src/doc/crypto/BIO_ctrl.pod b/src/lib/libssl/src/doc/crypto/BIO_ctrl.pod index cf203eeb96..e2d3b0aa54 100644 --- a/src/lib/libssl/src/doc/crypto/BIO_ctrl.pod +++ b/src/lib/libssl/src/doc/crypto/BIO_ctrl.pod | |||
| @@ -12,7 +12,8 @@ BIO_get_info_callback, BIO_set_info_callback - BIO control operations | |||
| 12 | #include <openssl/bio.h> | 12 | #include <openssl/bio.h> | 
| 13 | 13 | ||
| 14 | long BIO_ctrl(BIO *bp,int cmd,long larg,void *parg); | 14 | long BIO_ctrl(BIO *bp,int cmd,long larg,void *parg); | 
| 15 | long BIO_callback_ctrl(BIO *b, int cmd, void (*fp)(struct bio_st *, int, const char *, int, long, long)); | 15 | long BIO_callback_ctrl(BIO *b, int cmd, void (*fp)(struct bio_st *, int, | 
| 16 | const char *, int, long, long)); | ||
| 16 | char * BIO_ptr_ctrl(BIO *bp,int cmd,long larg); | 17 | char * BIO_ptr_ctrl(BIO *bp,int cmd,long larg); | 
| 17 | long BIO_int_ctrl(BIO *bp,int cmd,long larg,int iarg); | 18 | long BIO_int_ctrl(BIO *bp,int cmd,long larg,int iarg); | 
| 18 | 19 | ||
| @@ -31,7 +32,8 @@ BIO_get_info_callback, BIO_set_info_callback - BIO control operations | |||
| 31 | int BIO_get_info_callback(BIO *b,bio_info_cb **cbp); | 32 | int BIO_get_info_callback(BIO *b,bio_info_cb **cbp); | 
| 32 | int BIO_set_info_callback(BIO *b,bio_info_cb *cb); | 33 | int BIO_set_info_callback(BIO *b,bio_info_cb *cb); | 
| 33 | 34 | ||
| 34 | typedef void bio_info_cb(BIO *b, int oper, const char *ptr, int arg1, long arg2, long arg3); | 35 | typedef void bio_info_cb(BIO *b, int oper, const char *ptr, int arg1, | 
| 36 | long arg2, long arg3); | ||
| 35 | 37 | ||
| 36 | =head1 DESCRIPTION | 38 | =head1 DESCRIPTION | 
| 37 | 39 | ||
| diff --git a/src/lib/libssl/src/doc/crypto/BIO_f_buffer.pod b/src/lib/libssl/src/doc/crypto/BIO_f_buffer.pod index c0dccf1abe..f44d24be3f 100644 --- a/src/lib/libssl/src/doc/crypto/BIO_f_buffer.pod +++ b/src/lib/libssl/src/doc/crypto/BIO_f_buffer.pod | |||
| @@ -29,11 +29,11 @@ Calling BIO_reset() on a buffering BIO clears any buffered data. | |||
| 29 | 29 | ||
| 30 | BIO_get_buffer_num_lines() returns the number of lines currently buffered. | 30 | BIO_get_buffer_num_lines() returns the number of lines currently buffered. | 
| 31 | 31 | ||
| 32 | BIO_set_read_buffer_size(), BIO_set_write_buffer_size() and BIO_set_buffer_size() | 32 | BIO_set_read_buffer_size(), BIO_set_write_buffer_size() and | 
| 33 | set the read, write or both read and write buffer sizes to B<size>. The initial | 33 | BIO_set_buffer_size() set the read, write or both read and write buffer sizes | 
| 34 | buffer size is DEFAULT_BUFFER_SIZE, currently 4096. Any attempt to reduce the | 34 | to B<size>. The initial buffer size is DEFAULT_BUFFER_SIZE, currently 4096. Any | 
| 35 | buffer size below DEFAULT_BUFFER_SIZE is ignored. Any buffered data is cleared | 35 | attempt to reduce the buffer size below DEFAULT_BUFFER_SIZE is ignored. Any | 
| 36 | when the buffer is resized. | 36 | buffered data is cleared when the buffer is resized. | 
| 37 | 37 | ||
| 38 | BIO_set_buffer_read_data() clears the read buffer and fills it with B<num> | 38 | BIO_set_buffer_read_data() clears the read buffer and fills it with B<num> | 
| 39 | bytes of B<buf>. If B<num> is larger than the current buffer size the buffer | 39 | bytes of B<buf>. If B<num> is larger than the current buffer size the buffer | 
| @@ -58,8 +58,9 @@ BIO_f_buffer() returns the buffering BIO method. | |||
| 58 | 58 | ||
| 59 | BIO_get_buffer_num_lines() returns the number of lines buffered (may be 0). | 59 | BIO_get_buffer_num_lines() returns the number of lines buffered (may be 0). | 
| 60 | 60 | ||
| 61 | BIO_set_read_buffer_size(), BIO_set_write_buffer_size() and BIO_set_buffer_size() | 61 | BIO_set_read_buffer_size(), BIO_set_write_buffer_size() and | 
| 62 | return 1 if the buffer was successfully resized or 0 for failure. | 62 | BIO_set_buffer_size() return 1 if the buffer was successfully resized or 0 for | 
| 63 | failure. | ||
| 63 | 64 | ||
| 64 | BIO_set_buffer_read_data() returns 1 if the data was set correctly or 0 if | 65 | BIO_set_buffer_read_data() returns 1 if the data was set correctly or 0 if | 
| 65 | there was an error. | 66 | there was an error. | 
| diff --git a/src/lib/libssl/src/doc/crypto/BIO_f_cipher.pod b/src/lib/libssl/src/doc/crypto/BIO_f_cipher.pod index c0b23c680c..38453c101d 100644 --- a/src/lib/libssl/src/doc/crypto/BIO_f_cipher.pod +++ b/src/lib/libssl/src/doc/crypto/BIO_f_cipher.pod | |||
| @@ -2,7 +2,8 @@ | |||
| 2 | 2 | ||
| 3 | =head1 NAME | 3 | =head1 NAME | 
| 4 | 4 | ||
| 5 | BIO_f_cipher, BIO_set_cipher, BIO_get_cipher_status, BIO_get_cipher_ctx - cipher BIO filter | 5 | BIO_f_cipher, BIO_set_cipher, BIO_get_cipher_status, BIO_get_cipher_ctx - | 
| 6 | cipher BIO filter | ||
| 6 | 7 | ||
| 7 | =head1 SYNOPSIS | 8 | =head1 SYNOPSIS | 
| 8 | 9 | ||
| diff --git a/src/lib/libssl/src/doc/crypto/BIO_find_type.pod b/src/lib/libssl/src/doc/crypto/BIO_find_type.pod index bd3b256196..99b1626f56 100644 --- a/src/lib/libssl/src/doc/crypto/BIO_find_type.pod +++ b/src/lib/libssl/src/doc/crypto/BIO_find_type.pod | |||
| @@ -47,7 +47,8 @@ B<BIO_TYPE_SOURCE_SINK>) then the next matching BIO of the given general type is | |||
| 47 | searched for. BIO_find_type() returns the next matching BIO or NULL if none is | 47 | searched for. BIO_find_type() returns the next matching BIO or NULL if none is | 
| 48 | found. | 48 | found. | 
| 49 | 49 | ||
| 50 | Note: not all the B<BIO_TYPE_*> types above have corresponding BIO implementations. | 50 | Note: not all the B<BIO_TYPE_*> types above have corresponding BIO | 
| 51 | implementations. | ||
| 51 | 52 | ||
| 52 | BIO_next() returns the next BIO in a chain. It can be used to traverse all BIOs | 53 | BIO_next() returns the next BIO in a chain. It can be used to traverse all BIOs | 
| 53 | in a chain or used in conjunction with BIO_find_type() to find all BIOs of a | 54 | in a chain or used in conjunction with BIO_find_type() to find all BIOs of a | 
| diff --git a/src/lib/libssl/src/doc/crypto/BIO_new.pod b/src/lib/libssl/src/doc/crypto/BIO_new.pod index 2a245fc8de..8c7aeac6de 100644 --- a/src/lib/libssl/src/doc/crypto/BIO_new.pod +++ b/src/lib/libssl/src/doc/crypto/BIO_new.pod | |||
| @@ -2,7 +2,8 @@ | |||
| 2 | 2 | ||
| 3 | =head1 NAME | 3 | =head1 NAME | 
| 4 | 4 | ||
| 5 | BIO_new, BIO_set, BIO_free, BIO_vfree, BIO_free_all - BIO allocation and freeing functions | 5 | BIO_new, BIO_set, BIO_free, BIO_vfree, BIO_free_all - BIO allocation and | 
| 6 | freeing functions | ||
| 6 | 7 | ||
| 7 | =head1 SYNOPSIS | 8 | =head1 SYNOPSIS | 
| 8 | 9 | ||
| diff --git a/src/lib/libssl/src/doc/crypto/BIO_s_bio.pod b/src/lib/libssl/src/doc/crypto/BIO_s_bio.pod index 39ae79fd30..61ded32a02 100644 --- a/src/lib/libssl/src/doc/crypto/BIO_s_bio.pod +++ b/src/lib/libssl/src/doc/crypto/BIO_s_bio.pod | |||
| @@ -33,18 +33,19 @@ BIO_ctrl_get_read_request, BIO_ctrl_reset_read_request - BIO pair BIO | |||
| 33 | 33 | ||
| 34 | =head1 DESCRIPTION | 34 | =head1 DESCRIPTION | 
| 35 | 35 | ||
| 36 | BIO_s_bio() returns the method for a BIO pair. A BIO pair is a pair of source/sink | 36 | BIO_s_bio() returns the method for a BIO pair. A BIO pair is a pair of | 
| 37 | BIOs where data written to either half of the pair is buffered and can be read from | 37 | source/sink BIOs where data written to either half of the pair is buffered and | 
| 38 | the other half. Both halves must usually by handled by the same application thread | 38 | can be read from the other half. Both halves must usually by handled by the | 
| 39 | since no locking is done on the internal data structures. | 39 | same application thread since no locking is done on the internal data | 
| 40 | structures. | ||
| 40 | 41 | ||
| 41 | Since BIO chains typically end in a source/sink BIO it is possible to make this | 42 | Since BIO chains typically end in a source/sink BIO it is possible to make this | 
| 42 | one half of a BIO pair and have all the data processed by the chain under application | 43 | one half of a BIO pair and have all the data processed by the chain under | 
| 43 | control. | 44 | application control. | 
| 44 | 45 | ||
| 45 | One typical use of BIO pairs is to place TLS/SSL I/O under application control, this | 46 | One typical use of BIO pairs is to place TLS/SSL I/O under application control, | 
| 46 | can be used when the application wishes to use a non standard transport for | 47 | this can be used when the application wishes to use a non standard transport | 
| 47 | TLS/SSL or the normal socket routines are inappropriate. | 48 | for TLS/SSL or the normal socket routines are inappropriate. | 
| 48 | 49 | ||
| 49 | Calls to BIO_read() will read data from the buffer or request a retry if no | 50 | Calls to BIO_read() will read data from the buffer or request a retry if no | 
| 50 | data is available. | 51 | data is available. | 
| @@ -81,10 +82,10 @@ B<bio1> or B<bio2> do point to some other BIO, the values are overwritten, | |||
| 81 | BIO_free() is not called. | 82 | BIO_free() is not called. | 
| 82 | 83 | ||
| 83 | BIO_get_write_guarantee() and BIO_ctrl_get_write_guarantee() return the maximum | 84 | BIO_get_write_guarantee() and BIO_ctrl_get_write_guarantee() return the maximum | 
| 84 | length of data that can be currently written to the BIO. Writes larger than this | 85 | length of data that can be currently written to the BIO. Writes larger than | 
| 85 | value will return a value from BIO_write() less than the amount requested or if the | 86 | this value will return a value from BIO_write() less than the amount requested | 
| 86 | buffer is full request a retry. BIO_ctrl_get_write_guarantee() is a function | 87 | or if the buffer is full request a retry. BIO_ctrl_get_write_guarantee() is a | 
| 87 | whereas BIO_get_write_guarantee() is a macro. | 88 | function whereas BIO_get_write_guarantee() is a macro. | 
| 88 | 89 | ||
| 89 | BIO_get_read_request() and BIO_ctrl_get_read_request() return the | 90 | BIO_get_read_request() and BIO_ctrl_get_read_request() return the | 
| 90 | amount of data requested, or the buffer size if it is less, if the | 91 | amount of data requested, or the buffer size if it is less, if the | 
| @@ -104,21 +105,23 @@ BIO_get_read_request() to zero. | |||
| 104 | =head1 NOTES | 105 | =head1 NOTES | 
| 105 | 106 | ||
| 106 | Both halves of a BIO pair should be freed. That is even if one half is implicit | 107 | Both halves of a BIO pair should be freed. That is even if one half is implicit | 
| 107 | freed due to a BIO_free_all() or SSL_free() call the other half needs to be freed. | 108 | freed due to a BIO_free_all() or SSL_free() call the other half needs to be | 
| 109 | freed. | ||
| 108 | 110 | ||
| 109 | When used in bidirectional applications (such as TLS/SSL) care should be taken to | 111 | When used in bidirectional applications (such as TLS/SSL) care should be taken | 
| 110 | flush any data in the write buffer. This can be done by calling BIO_pending() | 112 | to flush any data in the write buffer. This can be done by calling | 
| 111 | on the other half of the pair and, if any data is pending, reading it and sending | 113 | BIO_pending() on the other half of the pair and, if any data is pending, | 
| 112 | it to the underlying transport. This must be done before any normal processing | 114 | reading it and sending it to the underlying transport. This must be done before | 
| 113 | (such as calling select() ) due to a request and BIO_should_read() being true. | 115 | any normal processing (such as calling select() ) due to a request and | 
| 116 | BIO_should_read() being true. | ||
| 114 | 117 | ||
| 115 | To see why this is important consider a case where a request is sent using | 118 | To see why this is important consider a case where a request is sent using | 
| 116 | BIO_write() and a response read with BIO_read(), this can occur during an | 119 | BIO_write() and a response read with BIO_read(), this can occur during an | 
| 117 | TLS/SSL handshake for example. BIO_write() will succeed and place data in the write | 120 | TLS/SSL handshake for example. BIO_write() will succeed and place data in the | 
| 118 | buffer. BIO_read() will initially fail and BIO_should_read() will be true. If | 121 | write buffer. BIO_read() will initially fail and BIO_should_read() will be | 
| 119 | the application then waits for data to be available on the underlying transport | 122 | true. If the application then waits for data to be available on the underlying | 
| 120 | before flushing the write buffer it will never succeed because the request was | 123 | transport before flushing the write buffer it will never succeed because the | 
| 121 | never sent! | 124 | request was never sent! | 
| 122 | 125 | ||
| 123 | =head1 RETURN VALUES | 126 | =head1 RETURN VALUES | 
| 124 | 127 | ||
| diff --git a/src/lib/libssl/src/doc/crypto/BIO_s_fd.pod b/src/lib/libssl/src/doc/crypto/BIO_s_fd.pod index 9bbac29f10..98749c9b67 100644 --- a/src/lib/libssl/src/doc/crypto/BIO_s_fd.pod +++ b/src/lib/libssl/src/doc/crypto/BIO_s_fd.pod | |||
| @@ -46,10 +46,10 @@ BIO_new_fd() returns a file descriptor BIO using B<fd> and B<close_flag>. | |||
| 46 | =head1 NOTES | 46 | =head1 NOTES | 
| 47 | 47 | ||
| 48 | The behaviour of BIO_read() and BIO_write() depends on the behavior of the | 48 | The behaviour of BIO_read() and BIO_write() depends on the behavior of the | 
| 49 | platforms read() and write() calls on the descriptor. If the underlying | 49 | platforms read() and write() calls on the descriptor. If the underlying file | 
| 50 | file descriptor is in a non blocking mode then the BIO will behave in the | 50 | descriptor is in a non blocking mode then the BIO will behave in the manner | 
| 51 | manner described in the L<BIO_read(3)|BIO_read(3)> and L<BIO_should_retry(3)|BIO_should_retry(3)> | 51 | described in the L<BIO_read(3)|BIO_read(3)> and | 
| 52 | manual pages. | 52 | L<BIO_should_retry(3)|BIO_should_retry(3)> manual pages. | 
| 53 | 53 | ||
| 54 | File descriptor BIOs should not be used for socket I/O. Use socket BIOs | 54 | File descriptor BIOs should not be used for socket I/O. Use socket BIOs | 
| 55 | instead. | 55 | instead. | 
| diff --git a/src/lib/libssl/src/doc/crypto/BIO_set_callback.pod b/src/lib/libssl/src/doc/crypto/BIO_set_callback.pod index 4759556245..ab35303590 100644 --- a/src/lib/libssl/src/doc/crypto/BIO_set_callback.pod +++ b/src/lib/libssl/src/doc/crypto/BIO_set_callback.pod | |||
| @@ -81,9 +81,8 @@ after. | |||
| 81 | 81 | ||
| 82 | =item B<BIO_gets(b, out, outl)> | 82 | =item B<BIO_gets(b, out, outl)> | 
| 83 | 83 | ||
| 84 | callback(b, BIO_CB_GETS, out, outl, 0L, 1L) is called before | 84 | callback(b, BIO_CB_GETS, out, outl, 0L, 1L) is called before the operation and | 
| 85 | the operation and callback(b, BIO_CB_GETS|BIO_CB_RETURN, out, outl, 0L, retvalue) | 85 | callback(b, BIO_CB_GETS|BIO_CB_RETURN, out, outl, 0L, retvalue) after. | 
| 86 | after. | ||
| 87 | 86 | ||
| 88 | =item B<BIO_puts(b, in)> | 87 | =item B<BIO_puts(b, in)> | 
| 89 | 88 | ||
| diff --git a/src/lib/libssl/src/doc/crypto/BN_add.pod b/src/lib/libssl/src/doc/crypto/BN_add.pod index 88c7a799ee..15b28d8334 100644 --- a/src/lib/libssl/src/doc/crypto/BN_add.pod +++ b/src/lib/libssl/src/doc/crypto/BN_add.pod | |||
| @@ -111,8 +111,9 @@ The error codes can be obtained by L<ERR_get_error(3)|ERR_get_error(3)>. | |||
| 111 | 111 | ||
| 112 | =head1 SEE ALSO | 112 | =head1 SEE ALSO | 
| 113 | 113 | ||
| 114 | L<bn(3)|bn(3)>, L<ERR_get_error(3)|ERR_get_error(3)>, L<BN_CTX_new(3)|BN_CTX_new(3)>, | 114 | L<bn(3)|bn(3)>, L<ERR_get_error(3)|ERR_get_error(3)>, | 
| 115 | L<BN_add_word(3)|BN_add_word(3)>, L<BN_set_bit(3)|BN_set_bit(3)> | 115 | L<BN_CTX_new(3)|BN_CTX_new(3)>, L<BN_add_word(3)|BN_add_word(3)>, | 
| 116 | L<BN_set_bit(3)|BN_set_bit(3)> | ||
| 116 | 117 | ||
| 117 | =head1 HISTORY | 118 | =head1 HISTORY | 
| 118 | 119 | ||
| diff --git a/src/lib/libssl/src/doc/crypto/BN_add_word.pod b/src/lib/libssl/src/doc/crypto/BN_add_word.pod index 70667d2893..ba1026417d 100644 --- a/src/lib/libssl/src/doc/crypto/BN_add_word.pod +++ b/src/lib/libssl/src/doc/crypto/BN_add_word.pod | |||
| @@ -39,8 +39,8 @@ For BN_div_word() and BN_mod_word(), B<w> must not be 0. | |||
| 39 | 39 | ||
| 40 | =head1 RETURN VALUES | 40 | =head1 RETURN VALUES | 
| 41 | 41 | ||
| 42 | BN_add_word(), BN_sub_word() and BN_mul_word() return 1 for success, 0 | 42 | BN_add_word(), BN_sub_word() and BN_mul_word() return 1 for success, 0 on | 
| 43 | on error. The error codes can be obtained by L<ERR_get_error(3)|ERR_get_error(3)>. | 43 | error. The error codes can be obtained by L<ERR_get_error(3)|ERR_get_error(3)>. | 
| 44 | 44 | ||
| 45 | BN_mod_word() and BN_div_word() return B<a>%B<w> on success and | 45 | BN_mod_word() and BN_div_word() return B<a>%B<w> on success and | 
| 46 | B<(BN_ULONG)-1> if an error occurred. | 46 | B<(BN_ULONG)-1> if an error occurred. | 
| diff --git a/src/lib/libssl/src/doc/crypto/BN_cmp.pod b/src/lib/libssl/src/doc/crypto/BN_cmp.pod index 23e9ed0b4f..29df69631e 100644 --- a/src/lib/libssl/src/doc/crypto/BN_cmp.pod +++ b/src/lib/libssl/src/doc/crypto/BN_cmp.pod | |||
| @@ -2,7 +2,8 @@ | |||
| 2 | 2 | ||
| 3 | =head1 NAME | 3 | =head1 NAME | 
| 4 | 4 | ||
| 5 | BN_cmp, BN_ucmp, BN_is_zero, BN_is_one, BN_is_word, BN_is_odd - BIGNUM comparison and test functions | 5 | BN_cmp, BN_ucmp, BN_is_zero, BN_is_one, BN_is_word, BN_is_odd - BIGNUM | 
| 6 | comparison and test functions | ||
| 6 | 7 | ||
| 7 | =head1 SYNOPSIS | 8 | =head1 SYNOPSIS | 
| 8 | 9 | ||
| diff --git a/src/lib/libssl/src/doc/crypto/BN_generate_prime.pod b/src/lib/libssl/src/doc/crypto/BN_generate_prime.pod index 6f28a63517..04fc80df9c 100644 --- a/src/lib/libssl/src/doc/crypto/BN_generate_prime.pod +++ b/src/lib/libssl/src/doc/crypto/BN_generate_prime.pod | |||
| @@ -2,7 +2,8 @@ | |||
| 2 | 2 | ||
| 3 | =head1 NAME | 3 | =head1 NAME | 
| 4 | 4 | ||
| 5 | BN_generate_prime, BN_is_prime, BN_is_prime_fasttest - generate primes and test for primality | 5 | BN_generate_prime, BN_is_prime, BN_is_prime_fasttest - generate primes and test | 
| 6 | for primality | ||
| 6 | 7 | ||
| 7 | =head1 SYNOPSIS | 8 | =head1 SYNOPSIS | 
| 8 | 9 | ||
| diff --git a/src/lib/libssl/src/doc/crypto/BN_mod_inverse.pod b/src/lib/libssl/src/doc/crypto/BN_mod_inverse.pod index 3ea3975c74..aefb1d27dd 100644 --- a/src/lib/libssl/src/doc/crypto/BN_mod_inverse.pod +++ b/src/lib/libssl/src/doc/crypto/BN_mod_inverse.pod | |||
| @@ -22,8 +22,8 @@ variables. B<r> may be the same B<BIGNUM> as B<a> or B<n>. | |||
| 22 | 22 | ||
| 23 | =head1 RETURN VALUES | 23 | =head1 RETURN VALUES | 
| 24 | 24 | ||
| 25 | BN_mod_inverse() returns the B<BIGNUM> containing the inverse, and | 25 | BN_mod_inverse() returns the B<BIGNUM> containing the inverse, and NULL on | 
| 26 | NULL on error. The error codes can be obtained by L<ERR_get_error(3)|ERR_get_error(3)>. | 26 | error. The error codes can be obtained by L<ERR_get_error(3)|ERR_get_error(3)>. | 
| 27 | 27 | ||
| 28 | =head1 SEE ALSO | 28 | =head1 SEE ALSO | 
| 29 | 29 | ||
| diff --git a/src/lib/libssl/src/doc/crypto/BUF_MEM_new.pod b/src/lib/libssl/src/doc/crypto/BUF_MEM_new.pod index 781f5b11ee..52f47caa40 100644 --- a/src/lib/libssl/src/doc/crypto/BUF_MEM_new.pod +++ b/src/lib/libssl/src/doc/crypto/BUF_MEM_new.pod | |||
| @@ -44,14 +44,14 @@ BUF_MEM_grow() changes the size of an already existing buffer to | |||
| 44 | B<len>. Any data already in the buffer is preserved if it increases in | 44 | B<len>. Any data already in the buffer is preserved if it increases in | 
| 45 | size. | 45 | size. | 
| 46 | 46 | ||
| 47 | BUF_strdup() copies a null terminated string into a block of allocated | 47 | BUF_strdup() copies a null terminated string into a block of allocated memory | 
| 48 | memory and returns a pointer to the allocated block. | 48 | and returns a pointer to the allocated block. Unlike the standard C library | 
| 49 | Unlike the standard C library strdup() this function uses OPENSSL_malloc() and so | 49 | strdup() this function uses OPENSSL_malloc() and so should be used in | 
| 50 | should be used in preference to the standard library strdup() because it can | 50 | preference to the standard library strdup() because it can be used for memory | 
| 51 | be used for memory leak checking or replacing the malloc() function. | 51 | leak checking or replacing the malloc() function. | 
| 52 | 52 | ||
| 53 | The memory allocated from BUF_strdup() should be freed up using the OPENSSL_free() | 53 | The memory allocated from BUF_strdup() should be freed up using the | 
| 54 | function. | 54 | OPENSSL_free() function. | 
| 55 | 55 | ||
| 56 | =head1 RETURN VALUES | 56 | =head1 RETURN VALUES | 
| 57 | 57 | ||
| diff --git a/src/lib/libssl/src/doc/crypto/CMS_add0_cert.pod b/src/lib/libssl/src/doc/crypto/CMS_add0_cert.pod index 78095948b9..3f042dc302 100644 --- a/src/lib/libssl/src/doc/crypto/CMS_add0_cert.pod +++ b/src/lib/libssl/src/doc/crypto/CMS_add0_cert.pod | |||
| @@ -2,7 +2,8 @@ | |||
| 2 | 2 | ||
| 3 | =head1 NAME | 3 | =head1 NAME | 
| 4 | 4 | ||
| 5 | CMS_add0_cert, CMS_add1_cert, CMS_get1_certs, CMS_add0_crl, CMS_get1_crls, - CMS certificate and CRL utility functions | 5 | CMS_add0_cert, CMS_add1_cert, CMS_get1_certs, CMS_add0_crl, CMS_get1_crls, - | 
| 6 | CMS certificate and CRL utility functions | ||
| 6 | 7 | ||
| 7 | =head1 SYNOPSIS | 8 | =head1 SYNOPSIS | 
| 8 | 9 | ||
| diff --git a/src/lib/libssl/src/doc/crypto/CMS_add1_recipient_cert.pod b/src/lib/libssl/src/doc/crypto/CMS_add1_recipient_cert.pod index d7d8e2532c..8a39391aa4 100644 --- a/src/lib/libssl/src/doc/crypto/CMS_add1_recipient_cert.pod +++ b/src/lib/libssl/src/doc/crypto/CMS_add1_recipient_cert.pod | |||
| @@ -2,7 +2,8 @@ | |||
| 2 | 2 | ||
| 3 | =head1 NAME | 3 | =head1 NAME | 
| 4 | 4 | ||
| 5 | CMS_add1_recipient_cert, CMS_add0_recipient_key - add recipients to a CMS enveloped data structure | 5 | CMS_add1_recipient_cert, CMS_add0_recipient_key - add recipients to a CMS | 
| 6 | enveloped data structure | ||
| 6 | 7 | ||
| 7 | =head1 SYNOPSIS | 8 | =head1 SYNOPSIS | 
| 8 | 9 | ||
| diff --git a/src/lib/libssl/src/doc/crypto/CMS_decrypt.pod b/src/lib/libssl/src/doc/crypto/CMS_decrypt.pod index d857e4f93f..403aa98d04 100644 --- a/src/lib/libssl/src/doc/crypto/CMS_decrypt.pod +++ b/src/lib/libssl/src/doc/crypto/CMS_decrypt.pod | |||
| @@ -2,7 +2,7 @@ | |||
| 2 | 2 | ||
| 3 | =head1 NAME | 3 | =head1 NAME | 
| 4 | 4 | ||
| 5 | CMS_decrypt - decrypt content from a CMS envelopedData structure | 5 | CMS_decrypt - decrypt content from a CMS envelopedData structure | 
| 6 | 6 | ||
| 7 | =head1 SYNOPSIS | 7 | =head1 SYNOPSIS | 
| 8 | 8 | ||
| diff --git a/src/lib/libssl/src/doc/crypto/CMS_encrypt.pod b/src/lib/libssl/src/doc/crypto/CMS_encrypt.pod index 01100a6df6..4f26e24bf6 100644 --- a/src/lib/libssl/src/doc/crypto/CMS_encrypt.pod +++ b/src/lib/libssl/src/doc/crypto/CMS_encrypt.pod | |||
| @@ -2,7 +2,7 @@ | |||
| 2 | 2 | ||
| 3 | =head1 NAME | 3 | =head1 NAME | 
| 4 | 4 | ||
| 5 | CMS_encrypt - create a CMS envelopedData structure | 5 | CMS_encrypt - create a CMS envelopedData structure | 
| 6 | 6 | ||
| 7 | =head1 SYNOPSIS | 7 | =head1 SYNOPSIS | 
| 8 | 8 | ||
| diff --git a/src/lib/libssl/src/doc/crypto/CMS_final.pod b/src/lib/libssl/src/doc/crypto/CMS_final.pod index beacc531ee..c5f1722aaf 100644 --- a/src/lib/libssl/src/doc/crypto/CMS_final.pod +++ b/src/lib/libssl/src/doc/crypto/CMS_final.pod | |||
| @@ -2,7 +2,7 @@ | |||
| 2 | 2 | ||
| 3 | =head1 NAME | 3 | =head1 NAME | 
| 4 | 4 | ||
| 5 | CMS_final - finalise a CMS_ContentInfo structure | 5 | CMS_final - finalise a CMS_ContentInfo structure | 
| 6 | 6 | ||
| 7 | =head1 SYNOPSIS | 7 | =head1 SYNOPSIS | 
| 8 | 8 | ||
| diff --git a/src/lib/libssl/src/doc/crypto/CMS_get0_RecipientInfos.pod b/src/lib/libssl/src/doc/crypto/CMS_get0_RecipientInfos.pod index ba16e97b55..d9c4cb774b 100644 --- a/src/lib/libssl/src/doc/crypto/CMS_get0_RecipientInfos.pod +++ b/src/lib/libssl/src/doc/crypto/CMS_get0_RecipientInfos.pod | |||
| @@ -2,7 +2,11 @@ | |||
| 2 | 2 | ||
| 3 | =head1 NAME | 3 | =head1 NAME | 
| 4 | 4 | ||
| 5 | CMS_get0_RecipientInfos, CMS_RecipientInfo_type, CMS_RecipientInfo_ktri_get0_signer_id,CMS_RecipientInfo_ktri_cert_cmp, CMS_RecipientInfo_set0_pkey, CMS_RecipientInfo_kekri_get0_id, CMS_RecipientInfo_kekri_id_cmp, CMS_RecipientInfo_set0_key, CMS_RecipientInfo_decrypt - CMS envelopedData RecipientInfo routines | 5 | CMS_get0_RecipientInfos, CMS_RecipientInfo_type, | 
| 6 | CMS_RecipientInfo_ktri_get0_signer_id,CMS_RecipientInfo_ktri_cert_cmp, | ||
| 7 | CMS_RecipientInfo_set0_pkey, CMS_RecipientInfo_kekri_get0_id, | ||
| 8 | CMS_RecipientInfo_kekri_id_cmp, CMS_RecipientInfo_set0_key, | ||
| 9 | CMS_RecipientInfo_decrypt - CMS envelopedData RecipientInfo routines | ||
| 6 | 10 | ||
| 7 | =head1 SYNOPSIS | 11 | =head1 SYNOPSIS | 
| 8 | 12 | ||
| diff --git a/src/lib/libssl/src/doc/crypto/CMS_get0_SignerInfos.pod b/src/lib/libssl/src/doc/crypto/CMS_get0_SignerInfos.pod index 47f6d2a047..557cda6c3e 100644 --- a/src/lib/libssl/src/doc/crypto/CMS_get0_SignerInfos.pod +++ b/src/lib/libssl/src/doc/crypto/CMS_get0_SignerInfos.pod | |||
| @@ -2,7 +2,8 @@ | |||
| 2 | 2 | ||
| 3 | =head1 NAME | 3 | =head1 NAME | 
| 4 | 4 | ||
| 5 | CMS_get0_SignerInfos, CMS_SignerInfo_get0_signer_id, CMS_SignerInfo_cert_cmp, CMS_set1_signer_certs - CMS signedData signer functions. | 5 | CMS_get0_SignerInfos, CMS_SignerInfo_get0_signer_id, CMS_SignerInfo_cert_cmp, | 
| 6 | CMS_set1_signer_certs - CMS signedData signer functions. | ||
| 6 | 7 | ||
| 7 | =head1 SYNOPSIS | 8 | =head1 SYNOPSIS | 
| 8 | 9 | ||
| diff --git a/src/lib/libssl/src/doc/crypto/CMS_get0_type.pod b/src/lib/libssl/src/doc/crypto/CMS_get0_type.pod index 8ff1c3115c..bc2690ee1a 100644 --- a/src/lib/libssl/src/doc/crypto/CMS_get0_type.pod +++ b/src/lib/libssl/src/doc/crypto/CMS_get0_type.pod | |||
| @@ -2,7 +2,8 @@ | |||
| 2 | 2 | ||
| 3 | =head1 NAME | 3 | =head1 NAME | 
| 4 | 4 | ||
| 5 | CMS_get0_type, CMS_set1_eContentType, CMS_get0_eContentType - get and set CMS content types | 5 | CMS_get0_type, CMS_set1_eContentType, CMS_get0_eContentType - get and set CMS | 
| 6 | content types | ||
| 6 | 7 | ||
| 7 | =head1 SYNOPSIS | 8 | =head1 SYNOPSIS | 
| 8 | 9 | ||
| diff --git a/src/lib/libssl/src/doc/crypto/CMS_get1_ReceiptRequest.pod b/src/lib/libssl/src/doc/crypto/CMS_get1_ReceiptRequest.pod index 50c2b9b9ab..a7babb1a6e 100644 --- a/src/lib/libssl/src/doc/crypto/CMS_get1_ReceiptRequest.pod +++ b/src/lib/libssl/src/doc/crypto/CMS_get1_ReceiptRequest.pod | |||
| @@ -2,7 +2,8 @@ | |||
| 2 | 2 | ||
| 3 | =head1 NAME | 3 | =head1 NAME | 
| 4 | 4 | ||
| 5 | CMS_ReceiptRequest_create0, CMS_add1_ReceiptRequest, CMS_get1_ReceiptRequest, CMS_ReceiptRequest_get0_values - CMS signed receipt request functions. | 5 | CMS_ReceiptRequest_create0, CMS_add1_ReceiptRequest, CMS_get1_ReceiptRequest, | 
| 6 | CMS_ReceiptRequest_get0_values - CMS signed receipt request functions. | ||
| 6 | 7 | ||
| 7 | =head1 SYNOPSIS | 8 | =head1 SYNOPSIS | 
| 8 | 9 | ||
| diff --git a/src/lib/libssl/src/doc/crypto/CMS_sign.pod b/src/lib/libssl/src/doc/crypto/CMS_sign.pod index 6b58ba3bdd..cc6d17faf6 100644 --- a/src/lib/libssl/src/doc/crypto/CMS_sign.pod +++ b/src/lib/libssl/src/doc/crypto/CMS_sign.pod | |||
| @@ -2,7 +2,7 @@ | |||
| 2 | 2 | ||
| 3 | =head1 NAME | 3 | =head1 NAME | 
| 4 | 4 | ||
| 5 | CMS_sign - create a CMS SignedData structure | 5 | CMS_sign - create a CMS SignedData structure | 
| 6 | 6 | ||
| 7 | =head1 SYNOPSIS | 7 | =head1 SYNOPSIS | 
| 8 | 8 | ||
| @@ -56,8 +56,9 @@ omitted. | |||
| 56 | If present the SMIMECapabilities attribute indicates support for the following | 56 | If present the SMIMECapabilities attribute indicates support for the following | 
| 57 | algorithms in preference order: 256 bit AES, Gost R3411-94, Gost 28147-89, 192 | 57 | algorithms in preference order: 256 bit AES, Gost R3411-94, Gost 28147-89, 192 | 
| 58 | bit AES, 128 bit AES, triple DES, 128 bit RC2, 64 bit RC2, DES and 40 bit RC2. | 58 | bit AES, 128 bit AES, triple DES, 128 bit RC2, 64 bit RC2, DES and 40 bit RC2. | 
| 59 | If any of these algorithms is not available then it will not be included: for example the GOST algorithms will not be included if the GOST ENGINE is | 59 | If any of these algorithms is not available then it will not be included: for | 
| 60 | not loaded. | 60 | example the GOST algorithms will not be included if the GOST ENGINE is not | 
| 61 | loaded. | ||
| 61 | 62 | ||
| 62 | OpenSSL will by default identify signing certificates using issuer name | 63 | OpenSSL will by default identify signing certificates using issuer name | 
| 63 | and serial number. If B<CMS_USE_KEYID> is set it will use the subject key | 64 | and serial number. If B<CMS_USE_KEYID> is set it will use the subject key | 
| diff --git a/src/lib/libssl/src/doc/crypto/CMS_sign_add1_signer.pod b/src/lib/libssl/src/doc/crypto/CMS_sign_add1_signer.pod index 215e994b54..ed4d9a9234 100644 --- a/src/lib/libssl/src/doc/crypto/CMS_sign_add1_signer.pod +++ b/src/lib/libssl/src/doc/crypto/CMS_sign_add1_signer.pod | |||
| @@ -2,7 +2,8 @@ | |||
| 2 | 2 | ||
| 3 | =head1 NAME | 3 | =head1 NAME | 
| 4 | 4 | ||
| 5 | CMS_sign_add1_signer, CMS_SignerInfo_sign - add a signer to a CMS_ContentInfo signed data structure. | 5 | CMS_sign_add1_signer, CMS_SignerInfo_sign - add a signer to a CMS_ContentInfo | 
| 6 | signed data structure. | ||
| 6 | 7 | ||
| 7 | =head1 SYNOPSIS | 8 | =head1 SYNOPSIS | 
| 8 | 9 | ||
| @@ -77,8 +78,9 @@ have a subject key identifier extension. | |||
| 77 | If present the SMIMECapabilities attribute indicates support for the following | 78 | If present the SMIMECapabilities attribute indicates support for the following | 
| 78 | algorithms in preference order: 256 bit AES, Gost R3411-94, Gost 28147-89, 192 | 79 | algorithms in preference order: 256 bit AES, Gost R3411-94, Gost 28147-89, 192 | 
| 79 | bit AES, 128 bit AES, triple DES, 128 bit RC2, 64 bit RC2, DES and 40 bit RC2. | 80 | bit AES, 128 bit AES, triple DES, 128 bit RC2, 64 bit RC2, DES and 40 bit RC2. | 
| 80 | If any of these algorithms is not available then it will not be included: for example the GOST algorithms will not be included if the GOST ENGINE is | 81 | If any of these algorithms is not available then it will not be included: for | 
| 81 | not loaded. | 82 | example the GOST algorithms will not be included if the GOST ENGINE is not | 
| 83 | loaded. | ||
| 82 | 84 | ||
| 83 | CMS_sign_add1_signer() returns an internal pointer to the CMS_SignerInfo | 85 | CMS_sign_add1_signer() returns an internal pointer to the CMS_SignerInfo | 
| 84 | structure just added, this can be used to set additional attributes | 86 | structure just added, this can be used to set additional attributes | 
| diff --git a/src/lib/libssl/src/doc/crypto/CMS_sign_receipt.pod b/src/lib/libssl/src/doc/crypto/CMS_sign_receipt.pod index cae1f83384..f603ab66f0 100644 --- a/src/lib/libssl/src/doc/crypto/CMS_sign_receipt.pod +++ b/src/lib/libssl/src/doc/crypto/CMS_sign_receipt.pod | |||
| @@ -2,7 +2,7 @@ | |||
| 2 | 2 | ||
| 3 | =head1 NAME | 3 | =head1 NAME | 
| 4 | 4 | ||
| 5 | CMS_sign_receipt - create a CMS signed receipt | 5 | CMS_sign_receipt - create a CMS signed receipt | 
| 6 | 6 | ||
| 7 | =head1 SYNOPSIS | 7 | =head1 SYNOPSIS | 
| 8 | 8 | ||
| diff --git a/src/lib/libssl/src/doc/crypto/CMS_uncompress.pod b/src/lib/libssl/src/doc/crypto/CMS_uncompress.pod index c6056b027d..fcbfec128a 100644 --- a/src/lib/libssl/src/doc/crypto/CMS_uncompress.pod +++ b/src/lib/libssl/src/doc/crypto/CMS_uncompress.pod | |||
| @@ -2,7 +2,7 @@ | |||
| 2 | 2 | ||
| 3 | =head1 NAME | 3 | =head1 NAME | 
| 4 | 4 | ||
| 5 | CMS_uncompress - uncompress a CMS CompressedData structure | 5 | CMS_uncompress - uncompress a CMS CompressedData structure | 
| 6 | 6 | ||
| 7 | =head1 SYNOPSIS | 7 | =head1 SYNOPSIS | 
| 8 | 8 | ||
| diff --git a/src/lib/libssl/src/doc/crypto/CMS_verify.pod b/src/lib/libssl/src/doc/crypto/CMS_verify.pod index 4a6b3bfc97..22b4c07513 100644 --- a/src/lib/libssl/src/doc/crypto/CMS_verify.pod +++ b/src/lib/libssl/src/doc/crypto/CMS_verify.pod | |||
| @@ -2,7 +2,7 @@ | |||
| 2 | 2 | ||
| 3 | =head1 NAME | 3 | =head1 NAME | 
| 4 | 4 | ||
| 5 | CMS_verify - verify a CMS SignedData structure | 5 | CMS_verify - verify a CMS SignedData structure | 
| 6 | 6 | ||
| 7 | =head1 SYNOPSIS | 7 | =head1 SYNOPSIS | 
| 8 | 8 | ||
| diff --git a/src/lib/libssl/src/doc/crypto/CMS_verify_receipt.pod b/src/lib/libssl/src/doc/crypto/CMS_verify_receipt.pod index 573e725ec1..2beadda129 100644 --- a/src/lib/libssl/src/doc/crypto/CMS_verify_receipt.pod +++ b/src/lib/libssl/src/doc/crypto/CMS_verify_receipt.pod | |||
| @@ -2,7 +2,7 @@ | |||
| 2 | 2 | ||
| 3 | =head1 NAME | 3 | =head1 NAME | 
| 4 | 4 | ||
| 5 | CMS_verify_receipt - verify a CMS signed receipt | 5 | CMS_verify_receipt - verify a CMS signed receipt | 
| 6 | 6 | ||
| 7 | =head1 SYNOPSIS | 7 | =head1 SYNOPSIS | 
| 8 | 8 | ||
| diff --git a/src/lib/libssl/src/doc/crypto/CONF_modules_free.pod b/src/lib/libssl/src/doc/crypto/CONF_modules_free.pod index 87bc7b783c..7c61b72c13 100644 --- a/src/lib/libssl/src/doc/crypto/CONF_modules_free.pod +++ b/src/lib/libssl/src/doc/crypto/CONF_modules_free.pod | |||
| @@ -2,8 +2,8 @@ | |||
| 2 | 2 | ||
| 3 | =head1 NAME | 3 | =head1 NAME | 
| 4 | 4 | ||
| 5 | CONF_modules_free, CONF_modules_finish, CONF_modules_unload - | 5 | CONF_modules_free, CONF_modules_finish, CONF_modules_unload - OpenSSL | 
| 6 | OpenSSL configuration cleanup functions | 6 | configuration cleanup functions | 
| 7 | 7 | ||
| 8 | =head1 SYNOPSIS | 8 | =head1 SYNOPSIS | 
| 9 | 9 | ||
| diff --git a/src/lib/libssl/src/doc/crypto/CONF_modules_load_file.pod b/src/lib/libssl/src/doc/crypto/CONF_modules_load_file.pod index 64e8127280..8cde6edb2d 100644 --- a/src/lib/libssl/src/doc/crypto/CONF_modules_load_file.pod +++ b/src/lib/libssl/src/doc/crypto/CONF_modules_load_file.pod | |||
| @@ -2,7 +2,7 @@ | |||
| 2 | 2 | ||
| 3 | =head1 NAME | 3 | =head1 NAME | 
| 4 | 4 | ||
| 5 | CONF_modules_load_file, CONF_modules_load - OpenSSL configuration functions | 5 | CONF_modules_load_file, CONF_modules_load - OpenSSL configuration functions | 
| 6 | 6 | ||
| 7 | =head1 SYNOPSIS | 7 | =head1 SYNOPSIS | 
| 8 | 8 | ||
| diff --git a/src/lib/libssl/src/doc/crypto/CRYPTO_set_ex_data.pod b/src/lib/libssl/src/doc/crypto/CRYPTO_set_ex_data.pod index 7409c02aac..0c8b378854 100644 --- a/src/lib/libssl/src/doc/crypto/CRYPTO_set_ex_data.pod +++ b/src/lib/libssl/src/doc/crypto/CRYPTO_set_ex_data.pod | |||
| @@ -2,7 +2,8 @@ | |||
| 2 | 2 | ||
| 3 | =head1 NAME | 3 | =head1 NAME | 
| 4 | 4 | ||
| 5 | CRYPTO_set_ex_data, CRYPTO_get_ex_data - internal application specific data functions | 5 | CRYPTO_set_ex_data, CRYPTO_get_ex_data - internal application specific data | 
| 6 | functions | ||
| 6 | 7 | ||
| 7 | =head1 SYNOPSIS | 8 | =head1 SYNOPSIS | 
| 8 | 9 | ||
| @@ -34,11 +35,12 @@ a previous B<CRYPTO_set_ex_data()> call. | |||
| 34 | 35 | ||
| 35 | B<CRYPTO_set_ex_data()> returns 1 on success or 0 on failure. | 36 | B<CRYPTO_set_ex_data()> returns 1 on success or 0 on failure. | 
| 36 | 37 | ||
| 37 | B<CRYPTO_get_ex_data()> returns the application data or 0 on failure. 0 may also | 38 | B<CRYPTO_get_ex_data()> returns the application data or 0 on failure. 0 may | 
| 38 | be valid application data but currently it can only fail if given an invalid B<idx> | 39 | also be valid application data but currently it can only fail if given an | 
| 39 | parameter. | 40 | invalid B<idx> parameter. | 
| 40 | 41 | ||
| 41 | On failure an error code can be obtained from L<ERR_get_error(3)|ERR_get_error(3)>. | 42 | On failure an error code can be obtained from | 
| 43 | L<ERR_get_error(3)|ERR_get_error(3)>. | ||
| 42 | 44 | ||
| 43 | =head1 SEE ALSO | 45 | =head1 SEE ALSO | 
| 44 | 46 | ||
| @@ -48,6 +50,7 @@ L<DH_get_ex_new_index(3)|DH_get_ex_new_index(3)> | |||
| 48 | 50 | ||
| 49 | =head1 HISTORY | 51 | =head1 HISTORY | 
| 50 | 52 | ||
| 51 | CRYPTO_set_ex_data() and CRYPTO_get_ex_data() have been available since SSLeay 0.9.0. | 53 | CRYPTO_set_ex_data() and CRYPTO_get_ex_data() have been available since SSLeay | 
| 54 | 0.9.0. | ||
| 52 | 55 | ||
| 53 | =cut | 56 | =cut | 
| diff --git a/src/lib/libssl/src/doc/crypto/DH_generate_key.pod b/src/lib/libssl/src/doc/crypto/DH_generate_key.pod index 81f09fdf45..148e13762b 100644 --- a/src/lib/libssl/src/doc/crypto/DH_generate_key.pod +++ b/src/lib/libssl/src/doc/crypto/DH_generate_key.pod | |||
| @@ -40,7 +40,8 @@ The error codes can be obtained by L<ERR_get_error(3)|ERR_get_error(3)>. | |||
| 40 | 40 | ||
| 41 | =head1 SEE ALSO | 41 | =head1 SEE ALSO | 
| 42 | 42 | ||
| 43 | L<dh(3)|dh(3)>, L<ERR_get_error(3)|ERR_get_error(3)>, L<rand(3)|rand(3)>, L<DH_size(3)|DH_size(3)> | 43 | L<dh(3)|dh(3)>, L<ERR_get_error(3)|ERR_get_error(3)>, L<rand(3)|rand(3)>, | 
| 44 | L<DH_size(3)|DH_size(3)> | ||
| 44 | 45 | ||
| 45 | =head1 HISTORY | 46 | =head1 HISTORY | 
| 46 | 47 | ||
| diff --git a/src/lib/libssl/src/doc/crypto/DH_generate_parameters.pod b/src/lib/libssl/src/doc/crypto/DH_generate_parameters.pod index 862aa0c39a..d19e0217ee 100644 --- a/src/lib/libssl/src/doc/crypto/DH_generate_parameters.pod +++ b/src/lib/libssl/src/doc/crypto/DH_generate_parameters.pod | |||
| @@ -23,11 +23,11 @@ seeded prior to calling DH_generate_parameters(). | |||
| 23 | B<prime_len> is the length in bits of the safe prime to be generated. | 23 | B<prime_len> is the length in bits of the safe prime to be generated. | 
| 24 | B<generator> is a small number E<gt> 1, typically 2 or 5. | 24 | B<generator> is a small number E<gt> 1, typically 2 or 5. | 
| 25 | 25 | ||
| 26 | A callback function may be used to provide feedback about the progress | 26 | A callback function may be used to provide feedback about the progress of the | 
| 27 | of the key generation. If B<callback> is not B<NULL>, it will be | 27 | key generation. If B<callback> is not B<NULL>, it will be called as described | 
| 28 | called as described in L<BN_generate_prime(3)|BN_generate_prime(3)> while a random prime | 28 | in L<BN_generate_prime(3)|BN_generate_prime(3)> while a random prime number is | 
| 29 | number is generated, and when a prime has been found, B<callback(3, | 29 | generated, and when a prime has been found, B<callback(3, 0, cb_arg)> is | 
| 30 | 0, cb_arg)> is called. | 30 | called. | 
| 31 | 31 | ||
| 32 | DH_check() validates Diffie-Hellman parameters. It checks that B<p> is | 32 | DH_check() validates Diffie-Hellman parameters. It checks that B<p> is | 
| 33 | a safe prime, and that B<g> is a suitable generator. In the case of an | 33 | a safe prime, and that B<g> is a suitable generator. In the case of an | 
| diff --git a/src/lib/libssl/src/doc/crypto/DH_get_ex_new_index.pod b/src/lib/libssl/src/doc/crypto/DH_get_ex_new_index.pod index fa5eab2650..934ec094bb 100644 --- a/src/lib/libssl/src/doc/crypto/DH_get_ex_new_index.pod +++ b/src/lib/libssl/src/doc/crypto/DH_get_ex_new_index.pod | |||
| @@ -2,7 +2,8 @@ | |||
| 2 | 2 | ||
| 3 | =head1 NAME | 3 | =head1 NAME | 
| 4 | 4 | ||
| 5 | DH_get_ex_new_index, DH_set_ex_data, DH_get_ex_data - add application specific data to DH structures | 5 | DH_get_ex_new_index, DH_set_ex_data, DH_get_ex_data - add application specific | 
| 6 | data to DH structures | ||
| 6 | 7 | ||
| 7 | =head1 SYNOPSIS | 8 | =head1 SYNOPSIS | 
| 8 | 9 | ||
| diff --git a/src/lib/libssl/src/doc/crypto/DH_new.pod b/src/lib/libssl/src/doc/crypto/DH_new.pod index 60c930093e..d6c3ca82b5 100644 --- a/src/lib/libssl/src/doc/crypto/DH_new.pod +++ b/src/lib/libssl/src/doc/crypto/DH_new.pod | |||
| @@ -21,9 +21,9 @@ erased before the memory is returned to the system. | |||
| 21 | 21 | ||
| 22 | =head1 RETURN VALUES | 22 | =head1 RETURN VALUES | 
| 23 | 23 | ||
| 24 | If the allocation fails, DH_new() returns B<NULL> and sets an error | 24 | If the allocation fails, DH_new() returns B<NULL> and sets an error code that | 
| 25 | code that can be obtained by L<ERR_get_error(3)|ERR_get_error(3)>. Otherwise it returns | 25 | can be obtained by L<ERR_get_error(3)|ERR_get_error(3)>. Otherwise it returns a | 
| 26 | a pointer to the newly allocated structure. | 26 | pointer to the newly allocated structure. | 
| 27 | 27 | ||
| 28 | DH_free() returns no value. | 28 | DH_free() returns no value. | 
| 29 | 29 | ||
| diff --git a/src/lib/libssl/src/doc/crypto/DSA_get_ex_new_index.pod b/src/lib/libssl/src/doc/crypto/DSA_get_ex_new_index.pod index fb6efc1182..e2fcabf370 100644 --- a/src/lib/libssl/src/doc/crypto/DSA_get_ex_new_index.pod +++ b/src/lib/libssl/src/doc/crypto/DSA_get_ex_new_index.pod | |||
| @@ -2,7 +2,8 @@ | |||
| 2 | 2 | ||
| 3 | =head1 NAME | 3 | =head1 NAME | 
| 4 | 4 | ||
| 5 | DSA_get_ex_new_index, DSA_set_ex_data, DSA_get_ex_data - add application specific data to DSA structures | 5 | DSA_get_ex_new_index, DSA_set_ex_data, DSA_get_ex_data - add application | 
| 6 | specific data to DSA structures | ||
| 6 | 7 | ||
| 7 | =head1 SYNOPSIS | 8 | =head1 SYNOPSIS | 
| 8 | 9 | ||
| diff --git a/src/lib/libssl/src/doc/crypto/DSA_set_method.pod b/src/lib/libssl/src/doc/crypto/DSA_set_method.pod index 5ad7362f58..707370adf7 100644 --- a/src/lib/libssl/src/doc/crypto/DSA_set_method.pod +++ b/src/lib/libssl/src/doc/crypto/DSA_set_method.pod | |||
| @@ -103,8 +103,8 @@ B<DSA_METHOD>s. | |||
| 103 | 103 | ||
| 104 | DSA_set_default_method() returns no value. | 104 | DSA_set_default_method() returns no value. | 
| 105 | 105 | ||
| 106 | DSA_set_method() returns non-zero if the provided B<meth> was successfully set as | 106 | DSA_set_method() returns non-zero if the provided B<meth> was successfully set | 
| 107 | the method for B<dsa> (including unloading the ENGINE handle if the previous | 107 | as the method for B<dsa> (including unloading the ENGINE handle if the previous | 
| 108 | method was supplied by an ENGINE). | 108 | method was supplied by an ENGINE). | 
| 109 | 109 | ||
| 110 | DSA_new_method() returns NULL and sets an error code that can be | 110 | DSA_new_method() returns NULL and sets an error code that can be | 
| @@ -117,8 +117,8 @@ As of version 0.9.7, DSA_METHOD implementations are grouped together with other | |||
| 117 | algorithmic APIs (eg. RSA_METHOD, EVP_CIPHER, etc) in B<ENGINE> modules. If a | 117 | algorithmic APIs (eg. RSA_METHOD, EVP_CIPHER, etc) in B<ENGINE> modules. If a | 
| 118 | default ENGINE is specified for DSA functionality using an ENGINE API function, | 118 | default ENGINE is specified for DSA functionality using an ENGINE API function, | 
| 119 | that will override any DSA defaults set using the DSA API (ie. | 119 | that will override any DSA defaults set using the DSA API (ie. | 
| 120 | DSA_set_default_method()). For this reason, the ENGINE API is the recommended way | 120 | DSA_set_default_method()). For this reason, the ENGINE API is the recommended | 
| 121 | to control default implementations for use in DSA and other cryptographic | 121 | way to control default implementations for use in DSA and other cryptographic | 
| 122 | algorithms. | 122 | algorithms. | 
| 123 | 123 | ||
| 124 | =head1 SEE ALSO | 124 | =head1 SEE ALSO | 
| diff --git a/src/lib/libssl/src/doc/crypto/EVP_DigestInit.pod b/src/lib/libssl/src/doc/crypto/EVP_DigestInit.pod index dcc5d73f69..2ff01b9c7c 100644 --- a/src/lib/libssl/src/doc/crypto/EVP_DigestInit.pod +++ b/src/lib/libssl/src/doc/crypto/EVP_DigestInit.pod | |||
| @@ -4,12 +4,12 @@ | |||
| 4 | 4 | ||
| 5 | EVP_MD_CTX_init, EVP_MD_CTX_create, EVP_DigestInit_ex, EVP_DigestUpdate, | 5 | EVP_MD_CTX_init, EVP_MD_CTX_create, EVP_DigestInit_ex, EVP_DigestUpdate, | 
| 6 | EVP_DigestFinal_ex, EVP_MD_CTX_cleanup, EVP_MD_CTX_destroy, EVP_MAX_MD_SIZE, | 6 | EVP_DigestFinal_ex, EVP_MD_CTX_cleanup, EVP_MD_CTX_destroy, EVP_MAX_MD_SIZE, | 
| 7 | EVP_MD_CTX_copy_ex, EVP_MD_CTX_copy, EVP_MD_type, EVP_MD_pkey_type, EVP_MD_size, | 7 | EVP_MD_CTX_copy_ex, EVP_MD_CTX_copy, EVP_MD_type, EVP_MD_pkey_type, | 
| 8 | EVP_MD_block_size, EVP_MD_CTX_md, EVP_MD_CTX_size, EVP_MD_CTX_block_size, EVP_MD_CTX_type, | 8 | EVP_MD_size, EVP_MD_block_size, EVP_MD_CTX_md, EVP_MD_CTX_size, | 
| 9 | EVP_md_null, EVP_md2, EVP_md5, EVP_sha, EVP_sha1, EVP_sha224, EVP_sha256, | 9 | EVP_MD_CTX_block_size, EVP_MD_CTX_type, EVP_md_null, EVP_md2, EVP_md5, EVP_sha, | 
| 10 | EVP_sha384, EVP_sha512, EVP_dss, EVP_dss1, EVP_mdc2, | 10 | EVP_sha1, EVP_sha224, EVP_sha256, EVP_sha384, EVP_sha512, EVP_dss, EVP_dss1, | 
| 11 | EVP_ripemd160, EVP_get_digestbyname, EVP_get_digestbynid, EVP_get_digestbyobj - | 11 | EVP_mdc2, EVP_ripemd160, EVP_get_digestbyname, EVP_get_digestbynid, | 
| 12 | EVP digest routines | 12 | EVP_get_digestbyobj - EVP digest routines | 
| 13 | 13 | ||
| 14 | =head1 SYNOPSIS | 14 | =head1 SYNOPSIS | 
| 15 | 15 | ||
| @@ -127,11 +127,11 @@ normally used when setting ASN1 OIDs. | |||
| 127 | EVP_MD_CTX_md() returns the B<EVP_MD> structure corresponding to the passed | 127 | EVP_MD_CTX_md() returns the B<EVP_MD> structure corresponding to the passed | 
| 128 | B<EVP_MD_CTX>. | 128 | B<EVP_MD_CTX>. | 
| 129 | 129 | ||
| 130 | EVP_MD_pkey_type() returns the NID of the public key signing algorithm associated | 130 | EVP_MD_pkey_type() returns the NID of the public key signing algorithm | 
| 131 | with this digest. For example EVP_sha1() is associated with RSA so this will | 131 | associated with this digest. For example EVP_sha1() is associated with RSA so | 
| 132 | return B<NID_sha1WithRSAEncryption>. Since digests and signature algorithms | 132 | this will return B<NID_sha1WithRSAEncryption>. Since digests and signature | 
| 133 | are no longer linked this function is only retained for compatibility | 133 | algorithms are no longer linked this function is only retained for | 
| 134 | reasons. | 134 | compatibility reasons. | 
| 135 | 135 | ||
| 136 | EVP_md2(), EVP_md5(), EVP_sha(), EVP_sha1(), EVP_sha224(), EVP_sha256(), | 136 | EVP_md2(), EVP_md5(), EVP_sha(), EVP_sha1(), EVP_sha224(), EVP_sha256(), | 
| 137 | EVP_sha384(), EVP_sha512(), EVP_mdc2() and EVP_ripemd160() return B<EVP_MD> | 137 | EVP_sha384(), EVP_sha512(), EVP_mdc2() and EVP_ripemd160() return B<EVP_MD> | 
| diff --git a/src/lib/libssl/src/doc/crypto/EVP_DigestSignInit.pod b/src/lib/libssl/src/doc/crypto/EVP_DigestSignInit.pod index 11e8f6f937..7aec6daecc 100644 --- a/src/lib/libssl/src/doc/crypto/EVP_DigestSignInit.pod +++ b/src/lib/libssl/src/doc/crypto/EVP_DigestSignInit.pod | |||
| @@ -2,7 +2,8 @@ | |||
| 2 | 2 | ||
| 3 | =head1 NAME | 3 | =head1 NAME | 
| 4 | 4 | ||
| 5 | EVP_DigestSignInit, EVP_DigestSignUpdate, EVP_DigestSignFinal - EVP signing functions | 5 | EVP_DigestSignInit, EVP_DigestSignUpdate, EVP_DigestSignFinal - EVP signing | 
| 6 | functions | ||
| 6 | 7 | ||
| 7 | =head1 SYNOPSIS | 8 | =head1 SYNOPSIS | 
| 8 | 9 | ||
| diff --git a/src/lib/libssl/src/doc/crypto/EVP_DigestVerifyInit.pod b/src/lib/libssl/src/doc/crypto/EVP_DigestVerifyInit.pod index 819e0d4b9f..60666bfddc 100644 --- a/src/lib/libssl/src/doc/crypto/EVP_DigestVerifyInit.pod +++ b/src/lib/libssl/src/doc/crypto/EVP_DigestVerifyInit.pod | |||
| @@ -2,7 +2,8 @@ | |||
| 2 | 2 | ||
| 3 | =head1 NAME | 3 | =head1 NAME | 
| 4 | 4 | ||
| 5 | EVP_DigestVerifyInit, EVP_DigestVerifyUpdate, EVP_DigestVerifyFinal - EVP signature verification functions | 5 | EVP_DigestVerifyInit, EVP_DigestVerifyUpdate, EVP_DigestVerifyFinal - EVP | 
| 6 | signature verification functions | ||
| 6 | 7 | ||
| 7 | =head1 SYNOPSIS | 8 | =head1 SYNOPSIS | 
| 8 | 9 | ||
| diff --git a/src/lib/libssl/src/doc/crypto/EVP_EncryptInit.pod b/src/lib/libssl/src/doc/crypto/EVP_EncryptInit.pod index 84875e0fe0..d42445cf10 100644 --- a/src/lib/libssl/src/doc/crypto/EVP_EncryptInit.pod +++ b/src/lib/libssl/src/doc/crypto/EVP_EncryptInit.pod | |||
| @@ -239,11 +239,13 @@ RC5 can be set. | |||
| 239 | EVP_EncryptInit_ex(), EVP_EncryptUpdate() and EVP_EncryptFinal_ex() | 239 | EVP_EncryptInit_ex(), EVP_EncryptUpdate() and EVP_EncryptFinal_ex() | 
| 240 | return 1 for success and 0 for failure. | 240 | return 1 for success and 0 for failure. | 
| 241 | 241 | ||
| 242 | EVP_DecryptInit_ex() and EVP_DecryptUpdate() return 1 for success and 0 for failure. | 242 | EVP_DecryptInit_ex() and EVP_DecryptUpdate() return 1 for success and 0 for | 
| 243 | EVP_DecryptFinal_ex() returns 0 if the decrypt failed or 1 for success. | 243 | failure. EVP_DecryptFinal_ex() returns 0 if the decrypt failed or 1 for | 
| 244 | success. | ||
| 244 | 245 | ||
| 245 | EVP_CipherInit_ex() and EVP_CipherUpdate() return 1 for success and 0 for failure. | 246 | EVP_CipherInit_ex() and EVP_CipherUpdate() return 1 for success and 0 for | 
| 246 | EVP_CipherFinal_ex() returns 0 for a decryption failure or 1 for success. | 247 | failure. EVP_CipherFinal_ex() returns 0 for a decryption failure or 1 for | 
| 248 | success. | ||
| 247 | 249 | ||
| 248 | EVP_CIPHER_CTX_cleanup() returns 1 for success and 0 for failure. | 250 | EVP_CIPHER_CTX_cleanup() returns 1 for success and 0 for failure. | 
| 249 | 251 | ||
| @@ -285,11 +287,13 @@ Null cipher: does nothing. | |||
| 285 | 287 | ||
| 286 | DES in CBC, ECB, CFB and OFB modes respectively. | 288 | DES in CBC, ECB, CFB and OFB modes respectively. | 
| 287 | 289 | ||
| 288 | =item EVP_des_ede_cbc(void), EVP_des_ede(), EVP_des_ede_ofb(void), EVP_des_ede_cfb(void) | 290 | =item EVP_des_ede_cbc(void), EVP_des_ede(), EVP_des_ede_ofb(void), | 
| 291 | EVP_des_ede_cfb(void) | ||
| 289 | 292 | ||
| 290 | Two key triple DES in CBC, ECB, CFB and OFB modes respectively. | 293 | Two key triple DES in CBC, ECB, CFB and OFB modes respectively. | 
| 291 | 294 | ||
| 292 | =item EVP_des_ede3_cbc(void), EVP_des_ede3(), EVP_des_ede3_ofb(void), EVP_des_ede3_cfb(void) | 295 | =item EVP_des_ede3_cbc(void), EVP_des_ede3(), EVP_des_ede3_ofb(void), | 
| 296 | EVP_des_ede3_cfb(void) | ||
| 293 | 297 | ||
| 294 | Three key triple DES in CBC, ECB, CFB and OFB modes respectively. | 298 | Three key triple DES in CBC, ECB, CFB and OFB modes respectively. | 
| 295 | 299 | ||
| @@ -299,44 +303,49 @@ DESX algorithm in CBC mode. | |||
| 299 | 303 | ||
| 300 | =item EVP_rc4(void) | 304 | =item EVP_rc4(void) | 
| 301 | 305 | ||
| 302 | RC4 stream cipher. This is a variable key length cipher with default key length 128 bits. | 306 | RC4 stream cipher. This is a variable key length cipher with default key length | 
| 307 | 128 bits. | ||
| 303 | 308 | ||
| 304 | =item EVP_rc4_40(void) | 309 | =item EVP_rc4_40(void) | 
| 305 | 310 | ||
| 306 | RC4 stream cipher with 40 bit key length. This is obsolete and new code should use EVP_rc4() | 311 | RC4 stream cipher with 40 bit key length. This is obsolete and new code should | 
| 307 | and the EVP_CIPHER_CTX_set_key_length() function. | 312 | use EVP_rc4() and the EVP_CIPHER_CTX_set_key_length() function. | 
| 308 | 313 | ||
| 309 | =item EVP_idea_cbc() EVP_idea_ecb(void), EVP_idea_cfb(void), EVP_idea_ofb(void), EVP_idea_cbc(void) | 314 | =item EVP_idea_cbc() EVP_idea_ecb(void), EVP_idea_cfb(void), | 
| 315 | EVP_idea_ofb(void), EVP_idea_cbc(void) | ||
| 310 | 316 | ||
| 311 | IDEA encryption algorithm in CBC, ECB, CFB and OFB modes respectively. | 317 | IDEA encryption algorithm in CBC, ECB, CFB and OFB modes respectively. | 
| 312 | 318 | ||
| 313 | =item EVP_rc2_cbc(void), EVP_rc2_ecb(void), EVP_rc2_cfb(void), EVP_rc2_ofb(void) | 319 | =item EVP_rc2_cbc(void), EVP_rc2_ecb(void), EVP_rc2_cfb(void), EVP_rc2_ofb(void) | 
| 314 | 320 | ||
| 315 | RC2 encryption algorithm in CBC, ECB, CFB and OFB modes respectively. This is a variable key | 321 | RC2 encryption algorithm in CBC, ECB, CFB and OFB modes respectively. This is a | 
| 316 | length cipher with an additional parameter called "effective key bits" or "effective key length". | 322 | variable key length cipher with an additional parameter called "effective key | 
| 317 | By default both are set to 128 bits. | 323 | bits" or "effective key length". By default both are set to 128 bits. | 
| 318 | 324 | ||
| 319 | =item EVP_rc2_40_cbc(void), EVP_rc2_64_cbc(void) | 325 | =item EVP_rc2_40_cbc(void), EVP_rc2_64_cbc(void) | 
| 320 | 326 | ||
| 321 | RC2 algorithm in CBC mode with a default key length and effective key length of 40 and 64 bits. | 327 | RC2 algorithm in CBC mode with a default key length and effective key length of | 
| 322 | These are obsolete and new code should use EVP_rc2_cbc(), EVP_CIPHER_CTX_set_key_length() and | 328 | 40 and 64 bits. These are obsolete and new code should use EVP_rc2_cbc(), | 
| 323 | EVP_CIPHER_CTX_ctrl() to set the key length and effective key length. | 329 | EVP_CIPHER_CTX_set_key_length() and EVP_CIPHER_CTX_ctrl() to set the key length | 
| 330 | and effective key length. | ||
| 324 | 331 | ||
| 325 | =item EVP_bf_cbc(void), EVP_bf_ecb(void), EVP_bf_cfb(void), EVP_bf_ofb(void); | 332 | =item EVP_bf_cbc(void), EVP_bf_ecb(void), EVP_bf_cfb(void), EVP_bf_ofb(void); | 
| 326 | 333 | ||
| 327 | Blowfish encryption algorithm in CBC, ECB, CFB and OFB modes respectively. This is a variable key | 334 | Blowfish encryption algorithm in CBC, ECB, CFB and OFB modes respectively. This | 
| 328 | length cipher. | 335 | is a variable key length cipher. | 
| 329 | 336 | ||
| 330 | =item EVP_cast5_cbc(void), EVP_cast5_ecb(void), EVP_cast5_cfb(void), EVP_cast5_ofb(void) | 337 | =item EVP_cast5_cbc(void), EVP_cast5_ecb(void), EVP_cast5_cfb(void), | 
| 338 | EVP_cast5_ofb(void) | ||
| 331 | 339 | ||
| 332 | CAST encryption algorithm in CBC, ECB, CFB and OFB modes respectively. This is a variable key | 340 | CAST encryption algorithm in CBC, ECB, CFB and OFB modes respectively. This is | 
| 333 | length cipher. | 341 | a variable key length cipher. | 
| 334 | 342 | ||
| 335 | =item EVP_rc5_32_12_16_cbc(void), EVP_rc5_32_12_16_ecb(void), EVP_rc5_32_12_16_cfb(void), EVP_rc5_32_12_16_ofb(void) | 343 | =item EVP_rc5_32_12_16_cbc(void), EVP_rc5_32_12_16_ecb(void), | 
| 344 | EVP_rc5_32_12_16_cfb(void), EVP_rc5_32_12_16_ofb(void) | ||
| 336 | 345 | ||
| 337 | RC5 encryption algorithm in CBC, ECB, CFB and OFB modes respectively. This is a variable key length | 346 | RC5 encryption algorithm in CBC, ECB, CFB and OFB modes respectively. This is a | 
| 338 | cipher with an additional "number of rounds" parameter. By default the key length is set to 128 | 347 | variable key length cipher with an additional "number of rounds" parameter. By | 
| 339 | bits and 12 rounds. | 348 | default the key length is set to 128 bits and 12 rounds. | 
| 340 | 349 | ||
| 341 | =back | 350 | =back | 
| 342 | 351 | ||
| diff --git a/src/lib/libssl/src/doc/crypto/EVP_PKEY_CTX_ctrl.pod b/src/lib/libssl/src/doc/crypto/EVP_PKEY_CTX_ctrl.pod index e8d1ddda75..ba6e51100b 100644 --- a/src/lib/libssl/src/doc/crypto/EVP_PKEY_CTX_ctrl.pod +++ b/src/lib/libssl/src/doc/crypto/EVP_PKEY_CTX_ctrl.pod | |||
| @@ -65,14 +65,15 @@ RSA_PKCS1_OAEP_PADDING for OAEP padding (encrypt and decrypt only), | |||
| 65 | RSA_X931_PADDING for X9.31 padding (signature operations only) and | 65 | RSA_X931_PADDING for X9.31 padding (signature operations only) and | 
| 66 | RSA_PKCS1_PSS_PADDING (sign and verify only). | 66 | RSA_PKCS1_PSS_PADDING (sign and verify only). | 
| 67 | 67 | ||
| 68 | Two RSA padding modes behave differently if EVP_PKEY_CTX_set_signature_md() | 68 | Two RSA padding modes behave differently if EVP_PKEY_CTX_set_signature_md() is | 
| 69 | is used. If this macro is called for PKCS#1 padding the plaintext buffer is | 69 | used. If this macro is called for PKCS#1 padding the plaintext buffer is an | 
| 70 | an actual digest value and is encapsulated in a DigestInfo structure according | 70 | actual digest value and is encapsulated in a DigestInfo structure according to | 
| 71 | to PKCS#1 when signing and this structure is expected (and stripped off) when | 71 | PKCS#1 when signing and this structure is expected (and stripped off) when | 
| 72 | verifying. If this control is not used with RSA and PKCS#1 padding then the | 72 | verifying. If this control is not used with RSA and PKCS#1 padding then the | 
| 73 | supplied data is used directly and not encapsulated. In the case of X9.31 | 73 | supplied data is used directly and not encapsulated. In the case of X9.31 | 
| 74 | padding for RSA the algorithm identifier byte is added or checked and removed | 74 | padding for RSA the algorithm identifier byte is added or checked and removed | 
| 75 | if this control is called. If it is not called then the first byte of the plaintext buffer is expected to be the algorithm identifier byte. | 75 | if this control is called. If it is not called then the first byte of the | 
| 76 | plaintext buffer is expected to be the algorithm identifier byte. | ||
| 76 | 77 | ||
| 77 | The EVP_PKEY_CTX_set_rsa_pss_saltlen() macro sets the RSA PSS salt length to | 78 | The EVP_PKEY_CTX_set_rsa_pss_saltlen() macro sets the RSA PSS salt length to | 
| 78 | B<len> as its name implies it is only supported for PSS padding. Two special | 79 | B<len> as its name implies it is only supported for PSS padding. Two special | 
| diff --git a/src/lib/libssl/src/doc/crypto/EVP_PKEY_CTX_new.pod b/src/lib/libssl/src/doc/crypto/EVP_PKEY_CTX_new.pod index a9af867580..9822d6806f 100644 --- a/src/lib/libssl/src/doc/crypto/EVP_PKEY_CTX_new.pod +++ b/src/lib/libssl/src/doc/crypto/EVP_PKEY_CTX_new.pod | |||
| @@ -2,7 +2,8 @@ | |||
| 2 | 2 | ||
| 3 | =head1 NAME | 3 | =head1 NAME | 
| 4 | 4 | ||
| 5 | EVP_PKEY_CTX_new, EVP_PKEY_CTX_new_id, EVP_PKEY_CTX_dup, EVP_PKEY_CTX_free - public key algorithm context functions. | 5 | EVP_PKEY_CTX_new, EVP_PKEY_CTX_new_id, EVP_PKEY_CTX_dup, EVP_PKEY_CTX_free - | 
| 6 | public key algorithm context functions. | ||
| 6 | 7 | ||
| 7 | =head1 SYNOPSIS | 8 | =head1 SYNOPSIS | 
| 8 | 9 | ||
| diff --git a/src/lib/libssl/src/doc/crypto/EVP_PKEY_cmp.pod b/src/lib/libssl/src/doc/crypto/EVP_PKEY_cmp.pod index 4145245299..c389216086 100644 --- a/src/lib/libssl/src/doc/crypto/EVP_PKEY_cmp.pod +++ b/src/lib/libssl/src/doc/crypto/EVP_PKEY_cmp.pod | |||
| @@ -2,7 +2,8 @@ | |||
| 2 | 2 | ||
| 3 | =head1 NAME | 3 | =head1 NAME | 
| 4 | 4 | ||
| 5 | EVP_PKEY_copy_parameters, EVP_PKEY_missing_parameters, EVP_PKEY_cmp_parameters, EVP_PKEY_cmp - public key parameter and comparison functions | 5 | EVP_PKEY_copy_parameters, EVP_PKEY_missing_parameters, EVP_PKEY_cmp_parameters, | 
| 6 | EVP_PKEY_cmp - public key parameter and comparison functions | ||
| 6 | 7 | ||
| 7 | =head1 SYNOPSIS | 8 | =head1 SYNOPSIS | 
| 8 | 9 | ||
| diff --git a/src/lib/libssl/src/doc/crypto/EVP_PKEY_derive.pod b/src/lib/libssl/src/doc/crypto/EVP_PKEY_derive.pod index de877ead1a..2424ce0e54 100644 --- a/src/lib/libssl/src/doc/crypto/EVP_PKEY_derive.pod +++ b/src/lib/libssl/src/doc/crypto/EVP_PKEY_derive.pod | |||
| @@ -2,7 +2,8 @@ | |||
| 2 | 2 | ||
| 3 | =head1 NAME | 3 | =head1 NAME | 
| 4 | 4 | ||
| 5 | EVP_PKEY_derive_init, EVP_PKEY_derive_set_peer, EVP_PKEY_derive - derive public key algorithm shared secret. | 5 | EVP_PKEY_derive_init, EVP_PKEY_derive_set_peer, EVP_PKEY_derive - derive public | 
| 6 | key algorithm shared secret. | ||
| 6 | 7 | ||
| 7 | =head1 SYNOPSIS | 8 | =head1 SYNOPSIS | 
| 8 | 9 | ||
| diff --git a/src/lib/libssl/src/doc/crypto/EVP_PKEY_keygen.pod b/src/lib/libssl/src/doc/crypto/EVP_PKEY_keygen.pod index b6102da036..378fb310ff 100644 --- a/src/lib/libssl/src/doc/crypto/EVP_PKEY_keygen.pod +++ b/src/lib/libssl/src/doc/crypto/EVP_PKEY_keygen.pod | |||
| @@ -2,7 +2,10 @@ | |||
| 2 | 2 | ||
| 3 | =head1 NAME | 3 | =head1 NAME | 
| 4 | 4 | ||
| 5 | EVP_PKEY_keygen_init, EVP_PKEY_keygen, EVP_PKEY_paramgen_init, EVP_PKEY_paramgen, EVP_PKEY_CTX_set_cb, EVP_PKEY_CTX_get_cb, EVP_PKEY_CTX_get_keygen_info, EVP_PKEVP_PKEY_CTX_set_app_data, EVP_PKEY_CTX_get_app_data - key and parameter generation functions | 5 | EVP_PKEY_keygen_init, EVP_PKEY_keygen, EVP_PKEY_paramgen_init, | 
| 6 | EVP_PKEY_paramgen, EVP_PKEY_CTX_set_cb, EVP_PKEY_CTX_get_cb, | ||
| 7 | EVP_PKEY_CTX_get_keygen_info, EVP_PKEVP_PKEY_CTX_set_app_data, | ||
| 8 | EVP_PKEY_CTX_get_app_data - key and parameter generation functions | ||
| 6 | 9 | ||
| 7 | =head1 SYNOPSIS | 10 | =head1 SYNOPSIS | 
| 8 | 11 | ||
| diff --git a/src/lib/libssl/src/doc/crypto/EVP_PKEY_print_private.pod b/src/lib/libssl/src/doc/crypto/EVP_PKEY_print_private.pod index c9b7a89821..eabbaed264 100644 --- a/src/lib/libssl/src/doc/crypto/EVP_PKEY_print_private.pod +++ b/src/lib/libssl/src/doc/crypto/EVP_PKEY_print_private.pod | |||
| @@ -2,7 +2,8 @@ | |||
| 2 | 2 | ||
| 3 | =head1 NAME | 3 | =head1 NAME | 
| 4 | 4 | ||
| 5 | EVP_PKEY_print_public, EVP_PKEY_print_private, EVP_PKEY_print_params - public key algorithm printing routines. | 5 | EVP_PKEY_print_public, EVP_PKEY_print_private, EVP_PKEY_print_params - public | 
| 6 | key algorithm printing routines. | ||
| 6 | 7 | ||
| 7 | =head1 SYNOPSIS | 8 | =head1 SYNOPSIS | 
| 8 | 9 | ||
| diff --git a/src/lib/libssl/src/doc/crypto/EVP_PKEY_set1_RSA.pod b/src/lib/libssl/src/doc/crypto/EVP_PKEY_set1_RSA.pod index 8afb1b22e1..c2031c3d0b 100644 --- a/src/lib/libssl/src/doc/crypto/EVP_PKEY_set1_RSA.pod +++ b/src/lib/libssl/src/doc/crypto/EVP_PKEY_set1_RSA.pod | |||
| @@ -4,8 +4,8 @@ | |||
| 4 | 4 | ||
| 5 | EVP_PKEY_set1_RSA, EVP_PKEY_set1_DSA, EVP_PKEY_set1_DH, EVP_PKEY_set1_EC_KEY, | 5 | EVP_PKEY_set1_RSA, EVP_PKEY_set1_DSA, EVP_PKEY_set1_DH, EVP_PKEY_set1_EC_KEY, | 
| 6 | EVP_PKEY_get1_RSA, EVP_PKEY_get1_DSA, EVP_PKEY_get1_DH, EVP_PKEY_get1_EC_KEY, | 6 | EVP_PKEY_get1_RSA, EVP_PKEY_get1_DSA, EVP_PKEY_get1_DH, EVP_PKEY_get1_EC_KEY, | 
| 7 | EVP_PKEY_assign_RSA, EVP_PKEY_assign_DSA, EVP_PKEY_assign_DH, EVP_PKEY_assign_EC_KEY, | 7 | EVP_PKEY_assign_RSA, EVP_PKEY_assign_DSA, EVP_PKEY_assign_DH, | 
| 8 | EVP_PKEY_type - EVP_PKEY assignment functions. | 8 | EVP_PKEY_assign_EC_KEY, EVP_PKEY_type - EVP_PKEY assignment functions. | 
| 9 | 9 | ||
| 10 | =head1 SYNOPSIS | 10 | =head1 SYNOPSIS | 
| 11 | 11 | ||
| diff --git a/src/lib/libssl/src/doc/crypto/EVP_PKEY_verify.pod b/src/lib/libssl/src/doc/crypto/EVP_PKEY_verify.pod index f7ae4f9ebe..ba317b4e7b 100644 --- a/src/lib/libssl/src/doc/crypto/EVP_PKEY_verify.pod +++ b/src/lib/libssl/src/doc/crypto/EVP_PKEY_verify.pod | |||
| @@ -2,7 +2,8 @@ | |||
| 2 | 2 | ||
| 3 | =head1 NAME | 3 | =head1 NAME | 
| 4 | 4 | ||
| 5 | EVP_PKEY_verify_init, EVP_PKEY_verify - signature verification using a public key algorithm | 5 | EVP_PKEY_verify_init, EVP_PKEY_verify - signature verification using a public | 
| 6 | key algorithm | ||
| 6 | 7 | ||
| 7 | =head1 SYNOPSIS | 8 | =head1 SYNOPSIS | 
| 8 | 9 | ||
| diff --git a/src/lib/libssl/src/doc/crypto/EVP_PKEY_verify_recover.pod b/src/lib/libssl/src/doc/crypto/EVP_PKEY_verify_recover.pod index 00d53db783..4debf7bff0 100644 --- a/src/lib/libssl/src/doc/crypto/EVP_PKEY_verify_recover.pod +++ b/src/lib/libssl/src/doc/crypto/EVP_PKEY_verify_recover.pod | |||
| @@ -2,7 +2,8 @@ | |||
| 2 | 2 | ||
| 3 | =head1 NAME | 3 | =head1 NAME | 
| 4 | 4 | ||
| 5 | EVP_PKEY_verify_recover_init, EVP_PKEY_verify_recover - recover signature using a public key algorithm | 5 | EVP_PKEY_verify_recover_init, EVP_PKEY_verify_recover - recover signature using | 
| 6 | a public key algorithm | ||
| 6 | 7 | ||
| 7 | =head1 SYNOPSIS | 8 | =head1 SYNOPSIS | 
| 8 | 9 | ||
| @@ -45,7 +46,8 @@ context if several operations are performed using the same parameters. | |||
| 45 | 46 | ||
| 46 | =head1 RETURN VALUES | 47 | =head1 RETURN VALUES | 
| 47 | 48 | ||
| 48 | EVP_PKEY_verify_recover_init() and EVP_PKEY_verify_recover() return 1 for success | 49 | EVP_PKEY_verify_recover_init() and EVP_PKEY_verify_recover() return 1 for | 
| 50 | success | ||
| 49 | and 0 or a negative value for failure. In particular a return value of -2 | 51 | and 0 or a negative value for failure. In particular a return value of -2 | 
| 50 | indicates the operation is not supported by the public key algorithm. | 52 | indicates the operation is not supported by the public key algorithm. | 
| 51 | 53 | ||
| diff --git a/src/lib/libssl/src/doc/crypto/EVP_VerifyInit.pod b/src/lib/libssl/src/doc/crypto/EVP_VerifyInit.pod index 0ffb0a8077..c665ee2ebc 100644 --- a/src/lib/libssl/src/doc/crypto/EVP_VerifyInit.pod +++ b/src/lib/libssl/src/doc/crypto/EVP_VerifyInit.pod | |||
| @@ -2,7 +2,8 @@ | |||
| 2 | 2 | ||
| 3 | =head1 NAME | 3 | =head1 NAME | 
| 4 | 4 | ||
| 5 | EVP_VerifyInit, EVP_VerifyUpdate, EVP_VerifyFinal - EVP signature verification functions | 5 | EVP_VerifyInit, EVP_VerifyUpdate, EVP_VerifyFinal - EVP signature verification | 
| 6 | functions | ||
| 6 | 7 | ||
| 7 | =head1 SYNOPSIS | 8 | =head1 SYNOPSIS | 
| 8 | 9 | ||
| @@ -38,8 +39,8 @@ implementation of digest B<type>. | |||
| 38 | EVP_VerifyInit_ex() and EVP_VerifyUpdate() return 1 for success and 0 for | 39 | EVP_VerifyInit_ex() and EVP_VerifyUpdate() return 1 for success and 0 for | 
| 39 | failure. | 40 | failure. | 
| 40 | 41 | ||
| 41 | EVP_VerifyFinal() returns 1 for a correct signature, 0 for failure and -1 if some | 42 | EVP_VerifyFinal() returns 1 for a correct signature, 0 for failure and -1 if | 
| 42 | other error occurred. | 43 | some other error occurred. | 
| 43 | 44 | ||
| 44 | The error codes can be obtained by L<ERR_get_error(3)|ERR_get_error(3)>. | 45 | The error codes can be obtained by L<ERR_get_error(3)|ERR_get_error(3)>. | 
| 45 | 46 | ||
| diff --git a/src/lib/libssl/src/doc/crypto/OBJ_nid2obj.pod b/src/lib/libssl/src/doc/crypto/OBJ_nid2obj.pod index 458ef025f0..b2b8af990c 100644 --- a/src/lib/libssl/src/doc/crypto/OBJ_nid2obj.pod +++ b/src/lib/libssl/src/doc/crypto/OBJ_nid2obj.pod | |||
| @@ -2,9 +2,9 @@ | |||
| 2 | 2 | ||
| 3 | =head1 NAME | 3 | =head1 NAME | 
| 4 | 4 | ||
| 5 | OBJ_nid2obj, OBJ_nid2ln, OBJ_nid2sn, OBJ_obj2nid, OBJ_txt2nid, OBJ_ln2nid, OBJ_sn2nid, | 5 | OBJ_nid2obj, OBJ_nid2ln, OBJ_nid2sn, OBJ_obj2nid, OBJ_txt2nid, OBJ_ln2nid, | 
| 6 | OBJ_cmp, OBJ_dup, OBJ_txt2obj, OBJ_obj2txt, OBJ_create, OBJ_cleanup - ASN1 object utility | 6 | OBJ_sn2nid, OBJ_cmp, OBJ_dup, OBJ_txt2obj, OBJ_obj2txt, OBJ_create, OBJ_cleanup | 
| 7 | functions | 7 | - ASN1 object utility functions | 
| 8 | 8 | ||
| 9 | =head1 SYNOPSIS | 9 | =head1 SYNOPSIS | 
| 10 | 10 | ||
| diff --git a/src/lib/libssl/src/doc/crypto/OPENSSL_VERSION_NUMBER.pod b/src/lib/libssl/src/doc/crypto/OPENSSL_VERSION_NUMBER.pod index c39ac35e78..2f63a18a71 100644 --- a/src/lib/libssl/src/doc/crypto/OPENSSL_VERSION_NUMBER.pod +++ b/src/lib/libssl/src/doc/crypto/OPENSSL_VERSION_NUMBER.pod | |||
| @@ -94,8 +94,8 @@ L<crypto(3)|crypto(3)> | |||
| 94 | 94 | ||
| 95 | =head1 HISTORY | 95 | =head1 HISTORY | 
| 96 | 96 | ||
| 97 | SSLeay() and SSLEAY_VERSION_NUMBER are available in all versions of SSLeay and OpenSSL. | 97 | SSLeay() and SSLEAY_VERSION_NUMBER are available in all versions of SSLeay and | 
| 98 | OPENSSL_VERSION_NUMBER is available in all versions of OpenSSL. | 98 | OpenSSL. OPENSSL_VERSION_NUMBER is available in all versions of OpenSSL. | 
| 99 | B<SSLEAY_DIR> was added in OpenSSL 0.9.7. | 99 | B<SSLEAY_DIR> was added in OpenSSL 0.9.7. | 
| 100 | 100 | ||
| 101 | =cut | 101 | =cut | 
| diff --git a/src/lib/libssl/src/doc/crypto/OpenSSL_add_all_algorithms.pod b/src/lib/libssl/src/doc/crypto/OpenSSL_add_all_algorithms.pod index e63411b5bb..cc6c07fa24 100644 --- a/src/lib/libssl/src/doc/crypto/OpenSSL_add_all_algorithms.pod +++ b/src/lib/libssl/src/doc/crypto/OpenSSL_add_all_algorithms.pod | |||
| @@ -39,24 +39,24 @@ None of the functions return a value. | |||
| 39 | A typical application will call OpenSSL_add_all_algorithms() initially and | 39 | A typical application will call OpenSSL_add_all_algorithms() initially and | 
| 40 | EVP_cleanup() before exiting. | 40 | EVP_cleanup() before exiting. | 
| 41 | 41 | ||
| 42 | An application does not need to add algorithms to use them explicitly, for example | 42 | An application does not need to add algorithms to use them explicitly, for | 
| 43 | by EVP_sha1(). It just needs to add them if it (or any of the functions it calls) | 43 | example by EVP_sha1(). It just needs to add them if it (or any of the functions | 
| 44 | needs to lookup algorithms. | 44 | it calls) needs to lookup algorithms. | 
| 45 | 45 | ||
| 46 | The cipher and digest lookup functions are used in many parts of the library. If | 46 | The cipher and digest lookup functions are used in many parts of the library. | 
| 47 | the table is not initialized several functions will misbehave and complain they | 47 | If the table is not initialized several functions will misbehave and complain | 
| 48 | cannot find algorithms. This includes the PEM, PKCS#12, SSL and S/MIME libraries. | 48 | they cannot find algorithms. This includes the PEM, PKCS#12, SSL and S/MIME | 
| 49 | This is a common query in the OpenSSL mailing lists. | 49 | libraries. This is a common query in the OpenSSL mailing lists. | 
| 50 | 50 | ||
| 51 | Calling OpenSSL_add_all_algorithms() links in all algorithms: as a result a | 51 | Calling OpenSSL_add_all_algorithms() links in all algorithms: as a result a | 
| 52 | statically linked executable can be quite large. If this is important it is possible | 52 | statically linked executable can be quite large. If this is important it is | 
| 53 | to just add the required ciphers and digests. | 53 | possible to just add the required ciphers and digests. | 
| 54 | 54 | ||
| 55 | =head1 BUGS | 55 | =head1 BUGS | 
| 56 | 56 | ||
| 57 | Although the functions do not return error codes it is possible for them to fail. | 57 | Although the functions do not return error codes it is possible for them to | 
| 58 | This will only happen as a result of a memory allocation failure so this is not | 58 | fail. This will only happen as a result of a memory allocation failure so this | 
| 59 | too much of a problem in practice. | 59 | is not too much of a problem in practice. | 
| 60 | 60 | ||
| 61 | =head1 SEE ALSO | 61 | =head1 SEE ALSO | 
| 62 | 62 | ||
| diff --git a/src/lib/libssl/src/doc/crypto/PEM_read_bio_PrivateKey.pod b/src/lib/libssl/src/doc/crypto/PEM_read_bio_PrivateKey.pod index e196bf1498..7e821f69c3 100644 --- a/src/lib/libssl/src/doc/crypto/PEM_read_bio_PrivateKey.pod +++ b/src/lib/libssl/src/doc/crypto/PEM_read_bio_PrivateKey.pod | |||
| @@ -2,7 +2,29 @@ | |||
| 2 | 2 | ||
| 3 | =head1 NAME | 3 | =head1 NAME | 
| 4 | 4 | ||
| 5 | PEM, PEM_read_bio_PrivateKey, PEM_read_PrivateKey, PEM_write_bio_PrivateKey, PEM_write_PrivateKey, PEM_write_bio_PKCS8PrivateKey, PEM_write_PKCS8PrivateKey, PEM_write_bio_PKCS8PrivateKey_nid, PEM_write_PKCS8PrivateKey_nid, PEM_read_bio_PUBKEY, PEM_read_PUBKEY, PEM_write_bio_PUBKEY, PEM_write_PUBKEY, PEM_read_bio_RSAPrivateKey, PEM_read_RSAPrivateKey, PEM_write_bio_RSAPrivateKey, PEM_write_RSAPrivateKey, PEM_read_bio_RSAPublicKey, PEM_read_RSAPublicKey, PEM_write_bio_RSAPublicKey, PEM_write_RSAPublicKey, PEM_read_bio_RSA_PUBKEY, PEM_read_RSA_PUBKEY, PEM_write_bio_RSA_PUBKEY, PEM_write_RSA_PUBKEY, PEM_read_bio_DSAPrivateKey, PEM_read_DSAPrivateKey, PEM_write_bio_DSAPrivateKey, PEM_write_DSAPrivateKey, PEM_read_bio_DSA_PUBKEY, PEM_read_DSA_PUBKEY, PEM_write_bio_DSA_PUBKEY, PEM_write_DSA_PUBKEY, PEM_read_bio_DSAparams, PEM_read_DSAparams, PEM_write_bio_DSAparams, PEM_write_DSAparams, PEM_read_bio_DHparams, PEM_read_DHparams, PEM_write_bio_DHparams, PEM_write_DHparams, PEM_read_bio_X509, PEM_read_X509, PEM_write_bio_X509, PEM_write_X509, PEM_read_bio_X509_AUX, PEM_read_X509_AUX, PEM_write_bio_X509_AUX, PEM_write_X509_AUX, PEM_read_bio_X509_REQ, PEM_read_X509_REQ, PEM_write_bio_X509_REQ, PEM_write_X509_REQ, PEM_write_bio_X509_REQ_NEW, PEM_write_X509_REQ_NEW, PEM_read_bio_X509_CRL, PEM_read_X509_CRL, PEM_write_bio_X509_CRL, PEM_write_X509_CRL, PEM_read_bio_PKCS7, PEM_read_PKCS7, PEM_write_bio_PKCS7, PEM_write_PKCS7, PEM_read_bio_NETSCAPE_CERT_SEQUENCE, PEM_read_NETSCAPE_CERT_SEQUENCE, PEM_write_bio_NETSCAPE_CERT_SEQUENCE, PEM_write_NETSCAPE_CERT_SEQUENCE - PEM routines | 5 | PEM, PEM_read_bio_PrivateKey, PEM_read_PrivateKey, PEM_write_bio_PrivateKey, | 
| 6 | PEM_write_PrivateKey, PEM_write_bio_PKCS8PrivateKey, PEM_write_PKCS8PrivateKey, | ||
| 7 | PEM_write_bio_PKCS8PrivateKey_nid, PEM_write_PKCS8PrivateKey_nid, | ||
| 8 | PEM_read_bio_PUBKEY, PEM_read_PUBKEY, PEM_write_bio_PUBKEY, PEM_write_PUBKEY, | ||
| 9 | PEM_read_bio_RSAPrivateKey, PEM_read_RSAPrivateKey, | ||
| 10 | PEM_write_bio_RSAPrivateKey, PEM_write_RSAPrivateKey, | ||
| 11 | PEM_read_bio_RSAPublicKey, PEM_read_RSAPublicKey, PEM_write_bio_RSAPublicKey, | ||
| 12 | PEM_write_RSAPublicKey, PEM_read_bio_RSA_PUBKEY, PEM_read_RSA_PUBKEY, | ||
| 13 | PEM_write_bio_RSA_PUBKEY, PEM_write_RSA_PUBKEY, PEM_read_bio_DSAPrivateKey, | ||
| 14 | PEM_read_DSAPrivateKey, PEM_write_bio_DSAPrivateKey, PEM_write_DSAPrivateKey, | ||
| 15 | PEM_read_bio_DSA_PUBKEY, PEM_read_DSA_PUBKEY, PEM_write_bio_DSA_PUBKEY, | ||
| 16 | PEM_write_DSA_PUBKEY, PEM_read_bio_DSAparams, PEM_read_DSAparams, | ||
| 17 | PEM_write_bio_DSAparams, PEM_write_DSAparams, PEM_read_bio_DHparams, | ||
| 18 | PEM_read_DHparams, PEM_write_bio_DHparams, PEM_write_DHparams, | ||
| 19 | PEM_read_bio_X509, PEM_read_X509, PEM_write_bio_X509, PEM_write_X509, | ||
| 20 | PEM_read_bio_X509_AUX, PEM_read_X509_AUX, PEM_write_bio_X509_AUX, | ||
| 21 | PEM_write_X509_AUX, PEM_read_bio_X509_REQ, PEM_read_X509_REQ, | ||
| 22 | PEM_write_bio_X509_REQ, PEM_write_X509_REQ, PEM_write_bio_X509_REQ_NEW, | ||
| 23 | PEM_write_X509_REQ_NEW, PEM_read_bio_X509_CRL, PEM_read_X509_CRL, | ||
| 24 | PEM_write_bio_X509_CRL, PEM_write_X509_CRL, PEM_read_bio_PKCS7, PEM_read_PKCS7, | ||
| 25 | PEM_write_bio_PKCS7, PEM_write_PKCS7, PEM_read_bio_NETSCAPE_CERT_SEQUENCE, | ||
| 26 | PEM_read_NETSCAPE_CERT_SEQUENCE, PEM_write_bio_NETSCAPE_CERT_SEQUENCE, | ||
| 27 | PEM_write_NETSCAPE_CERT_SEQUENCE - PEM routines | ||
| 6 | 28 | ||
| 7 | =head1 SYNOPSIS | 29 | =head1 SYNOPSIS | 
| 8 | 30 | ||
| diff --git a/src/lib/libssl/src/doc/crypto/PEM_write_bio_CMS_stream.pod b/src/lib/libssl/src/doc/crypto/PEM_write_bio_CMS_stream.pod index e070c45c2e..f9946adebf 100644 --- a/src/lib/libssl/src/doc/crypto/PEM_write_bio_CMS_stream.pod +++ b/src/lib/libssl/src/doc/crypto/PEM_write_bio_CMS_stream.pod | |||
| @@ -2,7 +2,7 @@ | |||
| 2 | 2 | ||
| 3 | =head1 NAME | 3 | =head1 NAME | 
| 4 | 4 | ||
| 5 | PEM_write_bio_CMS_stream - output CMS_ContentInfo structure in PEM format. | 5 | PEM_write_bio_CMS_stream - output CMS_ContentInfo structure in PEM format. | 
| 6 | 6 | ||
| 7 | =head1 SYNOPSIS | 7 | =head1 SYNOPSIS | 
| 8 | 8 | ||
| diff --git a/src/lib/libssl/src/doc/crypto/PKCS12_create.pod b/src/lib/libssl/src/doc/crypto/PKCS12_create.pod index 0a1e460cf1..382193ec95 100644 --- a/src/lib/libssl/src/doc/crypto/PKCS12_create.pod +++ b/src/lib/libssl/src/doc/crypto/PKCS12_create.pod | |||
| @@ -38,13 +38,13 @@ The default MAC iteration count is 1 in order to retain compatibility with | |||
| 38 | old software which did not interpret MAC iteration counts. If such compatibility | 38 | old software which did not interpret MAC iteration counts. If such compatibility | 
| 39 | is not required then B<mac_iter> should be set to PKCS12_DEFAULT_ITER. | 39 | is not required then B<mac_iter> should be set to PKCS12_DEFAULT_ITER. | 
| 40 | 40 | ||
| 41 | B<keytype> adds a flag to the store private key. This is a non standard extension | 41 | B<keytype> adds a flag to the store private key. This is a non standard | 
| 42 | that is only currently interpreted by MSIE. If set to zero the flag is omitted, | 42 | extension that is only currently interpreted by MSIE. If set to zero the flag | 
| 43 | if set to B<KEY_SIG> the key can be used for signing only, if set to B<KEY_EX> | 43 | is omitted, if set to B<KEY_SIG> the key can be used for signing only, if set | 
| 44 | it can be used for signing and encryption. This option was useful for old | 44 | to B<KEY_EX> it can be used for signing and encryption. This option was useful | 
| 45 | export grade software which could use signing only keys of arbitrary size but | 45 | for old export grade software which could use signing only keys of arbitrary | 
| 46 | had restrictions on the permissible sizes of keys which could be used for | 46 | size but had restrictions on the permissible sizes of keys which could be used | 
| 47 | encryption. | 47 | for encryption. | 
| 48 | 48 | ||
| 49 | =head1 NEW FUNCTIONALITY IN OPENSSL 0.9.8 | 49 | =head1 NEW FUNCTIONALITY IN OPENSSL 0.9.8 | 
| 50 | 50 | ||
| diff --git a/src/lib/libssl/src/doc/crypto/PKCS7_decrypt.pod b/src/lib/libssl/src/doc/crypto/PKCS7_decrypt.pod index 325699d0b6..78919998ce 100644 --- a/src/lib/libssl/src/doc/crypto/PKCS7_decrypt.pod +++ b/src/lib/libssl/src/doc/crypto/PKCS7_decrypt.pod | |||
| @@ -22,8 +22,9 @@ B<flags> is an optional set of flags. | |||
| 22 | OpenSSL_add_all_algorithms() (or equivalent) should be called before using this | 22 | OpenSSL_add_all_algorithms() (or equivalent) should be called before using this | 
| 23 | function or errors about unknown algorithms will occur. | 23 | function or errors about unknown algorithms will occur. | 
| 24 | 24 | ||
| 25 | Although the recipients certificate is not needed to decrypt the data it is needed | 25 | Although the recipients certificate is not needed to decrypt the data it is | 
| 26 | to locate the appropriate (of possible several) recipients in the PKCS#7 structure. | 26 | needed to locate the appropriate (of possible several) recipients in the PKCS#7 | 
| 27 | structure. | ||
| 27 | 28 | ||
| 28 | The following flags can be passed in the B<flags> parameter. | 29 | The following flags can be passed in the B<flags> parameter. | 
| 29 | 30 | ||
| @@ -38,8 +39,9 @@ The error can be obtained from ERR_get_error(3) | |||
| 38 | 39 | ||
| 39 | =head1 BUGS | 40 | =head1 BUGS | 
| 40 | 41 | ||
| 41 | PKCS7_decrypt() must be passed the correct recipient key and certificate. It would | 42 | PKCS7_decrypt() must be passed the correct recipient key and certificate. It | 
| 42 | be better if it could look up the correct key and certificate from a database. | 43 | would be better if it could look up the correct key and certificate from a | 
| 44 | database. | ||
| 43 | 45 | ||
| 44 | The lack of single pass processing and need to hold all data in memory as | 46 | The lack of single pass processing and need to hold all data in memory as | 
| 45 | mentioned in PKCS7_sign() also applies to PKCS7_verify(). | 47 | mentioned in PKCS7_sign() also applies to PKCS7_verify(). | 
| diff --git a/src/lib/libssl/src/doc/crypto/PKCS7_verify.pod b/src/lib/libssl/src/doc/crypto/PKCS7_verify.pod index 51ada03f2d..f88e66632b 100644 --- a/src/lib/libssl/src/doc/crypto/PKCS7_verify.pod +++ b/src/lib/libssl/src/doc/crypto/PKCS7_verify.pod | |||
| @@ -37,9 +37,9 @@ be signedData. There must be at least one signature on the data and if | |||
| 37 | the content is detached B<indata> cannot be B<NULL>. | 37 | the content is detached B<indata> cannot be B<NULL>. | 
| 38 | 38 | ||
| 39 | An attempt is made to locate all the signer's certificates, first looking in | 39 | An attempt is made to locate all the signer's certificates, first looking in | 
| 40 | the B<certs> parameter (if it is not B<NULL>) and then looking in any certificates | 40 | the B<certs> parameter (if it is not B<NULL>) and then looking in any | 
| 41 | contained in the B<p7> structure itself. If any signer's certificates cannot be | 41 | certificates contained in the B<p7> structure itself. If any signer's | 
| 42 | located the operation fails. | 42 | certificates cannot be located the operation fails. | 
| 43 | 43 | ||
| 44 | Each signer's certificate is chain verified using the B<smimesign> purpose and | 44 | Each signer's certificate is chain verified using the B<smimesign> purpose and | 
| 45 | the supplied trusted certificate store. Any internal certificates in the message | 45 | the supplied trusted certificate store. Any internal certificates in the message | 
| @@ -50,9 +50,9 @@ the signature's checked. | |||
| 50 | 50 | ||
| 51 | If all signature's verify correctly then the function is successful. | 51 | If all signature's verify correctly then the function is successful. | 
| 52 | 52 | ||
| 53 | Any of the following flags (ored together) can be passed in the B<flags> parameter | 53 | Any of the following flags (ored together) can be passed in the B<flags> | 
| 54 | to change the default verify behaviour. Only the flag B<PKCS7_NOINTERN> is | 54 | parameter to change the default verify behaviour. Only the flag | 
| 55 | meaningful to PKCS7_get0_signers(). | 55 | B<PKCS7_NOINTERN> is meaningful to PKCS7_get0_signers(). | 
| 56 | 56 | ||
| 57 | If B<PKCS7_NOINTERN> is set the certificates in the message itself are not | 57 | If B<PKCS7_NOINTERN> is set the certificates in the message itself are not | 
| 58 | searched when locating the signer's certificate. This means that all the signers | 58 | searched when locating the signer's certificate. This means that all the signers | 
| diff --git a/src/lib/libssl/src/doc/crypto/RAND_bytes.pod b/src/lib/libssl/src/doc/crypto/RAND_bytes.pod index 1a9b91e281..34c945b4e5 100644 --- a/src/lib/libssl/src/doc/crypto/RAND_bytes.pod +++ b/src/lib/libssl/src/doc/crypto/RAND_bytes.pod | |||
| @@ -30,11 +30,10 @@ the new pseudo-random bytes unless disabled at compile time (see FAQ). | |||
| 30 | 30 | ||
| 31 | =head1 RETURN VALUES | 31 | =head1 RETURN VALUES | 
| 32 | 32 | ||
| 33 | RAND_bytes() returns 1 on success, 0 otherwise. The error code can be | 33 | RAND_bytes() returns 1 on success, 0 otherwise. The error code can be obtained | 
| 34 | obtained by L<ERR_get_error(3)|ERR_get_error(3)>. RAND_pseudo_bytes() returns 1 if the | 34 | by L<ERR_get_error(3)|ERR_get_error(3)>. RAND_pseudo_bytes() returns 1 if the | 
| 35 | bytes generated are cryptographically strong, 0 otherwise. Both | 35 | bytes generated are cryptographically strong, 0 otherwise. Both functions | 
| 36 | functions return -1 if they are not supported by the current RAND | 36 | return -1 if they are not supported by the current RAND method. | 
| 37 | method. | ||
| 38 | 37 | ||
| 39 | =head1 SEE ALSO | 38 | =head1 SEE ALSO | 
| 40 | 39 | ||
| diff --git a/src/lib/libssl/src/doc/crypto/RAND_load_file.pod b/src/lib/libssl/src/doc/crypto/RAND_load_file.pod index 3f7e944d86..28118e3c2e 100644 --- a/src/lib/libssl/src/doc/crypto/RAND_load_file.pod +++ b/src/lib/libssl/src/doc/crypto/RAND_load_file.pod | |||
| @@ -43,7 +43,8 @@ error. | |||
| 43 | 43 | ||
| 44 | =head1 SEE ALSO | 44 | =head1 SEE ALSO | 
| 45 | 45 | ||
| 46 | L<rand(3)|rand(3)>, L<RAND_add(3)|RAND_add(3)>, L<RAND_cleanup(3)|RAND_cleanup(3)> | 46 | L<rand(3)|rand(3)>, L<RAND_add(3)|RAND_add(3)>, | 
| 47 | L<RAND_cleanup(3)|RAND_cleanup(3)> | ||
| 47 | 48 | ||
| 48 | =head1 HISTORY | 49 | =head1 HISTORY | 
| 49 | 50 | ||
| diff --git a/src/lib/libssl/src/doc/crypto/RSA_blinding_on.pod b/src/lib/libssl/src/doc/crypto/RSA_blinding_on.pod index fd2c69abd8..e6af8d4355 100644 --- a/src/lib/libssl/src/doc/crypto/RSA_blinding_on.pod +++ b/src/lib/libssl/src/doc/crypto/RSA_blinding_on.pod | |||
| @@ -2,7 +2,8 @@ | |||
| 2 | 2 | ||
| 3 | =head1 NAME | 3 | =head1 NAME | 
| 4 | 4 | ||
| 5 | RSA_blinding_on, RSA_blinding_off - protect the RSA operation from timing attacks | 5 | RSA_blinding_on, RSA_blinding_off - protect the RSA operation from timing | 
| 6 | attacks | ||
| 6 | 7 | ||
| 7 | =head1 SYNOPSIS | 8 | =head1 SYNOPSIS | 
| 8 | 9 | ||
| diff --git a/src/lib/libssl/src/doc/crypto/RSA_get_ex_new_index.pod b/src/lib/libssl/src/doc/crypto/RSA_get_ex_new_index.pod index 7d0fd1f91d..b1ac1167dd 100644 --- a/src/lib/libssl/src/doc/crypto/RSA_get_ex_new_index.pod +++ b/src/lib/libssl/src/doc/crypto/RSA_get_ex_new_index.pod | |||
| @@ -2,7 +2,8 @@ | |||
| 2 | 2 | ||
| 3 | =head1 NAME | 3 | =head1 NAME | 
| 4 | 4 | ||
| 5 | RSA_get_ex_new_index, RSA_set_ex_data, RSA_get_ex_data - add application specific data to RSA structures | 5 | RSA_get_ex_new_index, RSA_set_ex_data, RSA_get_ex_data - add application | 
| 6 | specific data to RSA structures | ||
| 6 | 7 | ||
| 7 | =head1 SYNOPSIS | 8 | =head1 SYNOPSIS | 
| 8 | 9 | ||
| @@ -78,26 +79,27 @@ corresponding parameters when B<RSA_get_ex_new_index()> was called. | |||
| 78 | B<dup_func()> is called when a structure is being copied. Pointers to the | 79 | B<dup_func()> is called when a structure is being copied. Pointers to the | 
| 79 | destination and source B<CRYPTO_EX_DATA> structures are passed in the B<to> and | 80 | destination and source B<CRYPTO_EX_DATA> structures are passed in the B<to> and | 
| 80 | B<from> parameters respectively. The B<from_d> parameter is passed a pointer to | 81 | B<from> parameters respectively. The B<from_d> parameter is passed a pointer to | 
| 81 | the source application data when the function is called, when the function returns | 82 | the source application data when the function is called, when the function | 
| 82 | the value is copied to the destination: the application can thus modify the data | 83 | returns the value is copied to the destination: the application can thus modify | 
| 83 | pointed to by B<from_d> and have different values in the source and destination. | 84 | the data pointed to by B<from_d> and have different values in the source and | 
| 84 | The B<idx>, B<argl> and B<argp> parameters are the same as those in B<new_func()> | 85 | destination. The B<idx>, B<argl> and B<argp> parameters are the same as those | 
| 85 | and B<free_func()>. | 86 | in B<new_func()> and B<free_func()>. | 
| 86 | 87 | ||
| 87 | =head1 RETURN VALUES | 88 | =head1 RETURN VALUES | 
| 88 | 89 | ||
| 89 | B<RSA_get_ex_new_index()> returns a new index or -1 on failure (note 0 is a valid | 90 | B<RSA_get_ex_new_index()> returns a new index or -1 on failure (note 0 is a | 
| 90 | index value). | 91 | valid index value). | 
| 91 | 92 | ||
| 92 | B<RSA_set_ex_data()> returns 1 on success or 0 on failure. | 93 | B<RSA_set_ex_data()> returns 1 on success or 0 on failure. | 
| 93 | 94 | ||
| 94 | B<RSA_get_ex_data()> returns the application data or 0 on failure. 0 may also | 95 | B<RSA_get_ex_data()> returns the application data or 0 on failure. 0 may also | 
| 95 | be valid application data but currently it can only fail if given an invalid B<idx> | 96 | be valid application data but currently it can only fail if given an invalid | 
| 96 | parameter. | 97 | B<idx> parameter. | 
| 97 | 98 | ||
| 98 | B<new_func()> and B<dup_func()> should return 0 for failure and 1 for success. | 99 | B<new_func()> and B<dup_func()> should return 0 for failure and 1 for success. | 
| 99 | 100 | ||
| 100 | On failure an error code can be obtained from L<ERR_get_error(3)|ERR_get_error(3)>. | 101 | On failure an error code can be obtained from | 
| 102 | L<ERR_get_error(3)|ERR_get_error(3)>. | ||
| 101 | 103 | ||
| 102 | =head1 BUGS | 104 | =head1 BUGS | 
| 103 | 105 | ||
| diff --git a/src/lib/libssl/src/doc/crypto/RSA_new.pod b/src/lib/libssl/src/doc/crypto/RSA_new.pod index 3d15b92824..41e5e60340 100644 --- a/src/lib/libssl/src/doc/crypto/RSA_new.pod +++ b/src/lib/libssl/src/doc/crypto/RSA_new.pod | |||
| @@ -22,9 +22,9 @@ erased before the memory is returned to the system. | |||
| 22 | 22 | ||
| 23 | =head1 RETURN VALUES | 23 | =head1 RETURN VALUES | 
| 24 | 24 | ||
| 25 | If the allocation fails, RSA_new() returns B<NULL> and sets an error | 25 | If the allocation fails, RSA_new() returns B<NULL> and sets an error code that | 
| 26 | code that can be obtained by L<ERR_get_error(3)|ERR_get_error(3)>. Otherwise it returns | 26 | can be obtained by L<ERR_get_error(3)|ERR_get_error(3)>. Otherwise it returns a | 
| 27 | a pointer to the newly allocated structure. | 27 | pointer to the newly allocated structure. | 
| 28 | 28 | ||
| 29 | RSA_free() returns no value. | 29 | RSA_free() returns no value. | 
| 30 | 30 | ||
| diff --git a/src/lib/libssl/src/doc/crypto/RSA_private_encrypt.pod b/src/lib/libssl/src/doc/crypto/RSA_private_encrypt.pod index 4c4d131172..aa2bc1bd76 100644 --- a/src/lib/libssl/src/doc/crypto/RSA_private_encrypt.pod +++ b/src/lib/libssl/src/doc/crypto/RSA_private_encrypt.pod | |||
| @@ -29,10 +29,9 @@ B<padding> denotes one of the following modes: | |||
| 29 | 29 | ||
| 30 | =item RSA_PKCS1_PADDING | 30 | =item RSA_PKCS1_PADDING | 
| 31 | 31 | ||
| 32 | PKCS #1 v1.5 padding. This function does not handle the | 32 | PKCS #1 v1.5 padding. This function does not handle the B<algorithmIdentifier> | 
| 33 | B<algorithmIdentifier> specified in PKCS #1. When generating or | 33 | specified in PKCS #1. When generating or verifying PKCS #1 signatures, | 
| 34 | verifying PKCS #1 signatures, L<RSA_sign(3)|RSA_sign(3)> and L<RSA_verify(3)|RSA_verify(3)> should be | 34 | L<RSA_sign(3)|RSA_sign(3)> and L<RSA_verify(3)|RSA_verify(3)> should be used. | 
| 35 | used. | ||
| 36 | 35 | ||
| 37 | =item RSA_NO_PADDING | 36 | =item RSA_NO_PADDING | 
| 38 | 37 | ||
| diff --git a/src/lib/libssl/src/doc/crypto/RSA_sign_ASN1_OCTET_STRING.pod b/src/lib/libssl/src/doc/crypto/RSA_sign_ASN1_OCTET_STRING.pod index e70380bbfc..315a9af9e8 100644 --- a/src/lib/libssl/src/doc/crypto/RSA_sign_ASN1_OCTET_STRING.pod +++ b/src/lib/libssl/src/doc/crypto/RSA_sign_ASN1_OCTET_STRING.pod | |||
| @@ -26,7 +26,8 @@ memory. | |||
| 26 | 26 | ||
| 27 | B<dummy> is ignored. | 27 | B<dummy> is ignored. | 
| 28 | 28 | ||
| 29 | The random number generator must be seeded prior to calling RSA_sign_ASN1_OCTET_STRING(). | 29 | The random number generator must be seeded prior to calling | 
| 30 | RSA_sign_ASN1_OCTET_STRING(). | ||
| 30 | 31 | ||
| 31 | RSA_verify_ASN1_OCTET_STRING() verifies that the signature B<sigbuf> | 32 | RSA_verify_ASN1_OCTET_STRING() verifies that the signature B<sigbuf> | 
| 32 | of size B<siglen> is the DER representation of a given octet string | 33 | of size B<siglen> is the DER representation of a given octet string | 
| diff --git a/src/lib/libssl/src/doc/crypto/SHA1.pod b/src/lib/libssl/src/doc/crypto/SHA1.pod index 232af9227e..9fffdf59e7 100644 --- a/src/lib/libssl/src/doc/crypto/SHA1.pod +++ b/src/lib/libssl/src/doc/crypto/SHA1.pod | |||
| @@ -60,7 +60,8 @@ ANSI X9.30 | |||
| 60 | 60 | ||
| 61 | =head1 SEE ALSO | 61 | =head1 SEE ALSO | 
| 62 | 62 | ||
| 63 | L<ripemd(3)|ripemd(3)>, L<hmac(3)|hmac(3)>, L<EVP_DigestInit(3)|EVP_DigestInit(3)> | 63 | L<ripemd(3)|ripemd(3)>, L<hmac(3)|hmac(3)>, | 
| 64 | L<EVP_DigestInit(3)|EVP_DigestInit(3)> | ||
| 64 | 65 | ||
| 65 | =head1 HISTORY | 66 | =head1 HISTORY | 
| 66 | 67 | ||
| diff --git a/src/lib/libssl/src/doc/crypto/X509_NAME_add_entry_by_txt.pod b/src/lib/libssl/src/doc/crypto/X509_NAME_add_entry_by_txt.pod index 5b9e81b922..c6442b947f 100644 --- a/src/lib/libssl/src/doc/crypto/X509_NAME_add_entry_by_txt.pod +++ b/src/lib/libssl/src/doc/crypto/X509_NAME_add_entry_by_txt.pod | |||
| @@ -2,8 +2,9 @@ | |||
| 2 | 2 | ||
| 3 | =head1 NAME | 3 | =head1 NAME | 
| 4 | 4 | ||
| 5 | X509_NAME_add_entry_by_txt, X509_NAME_add_entry_by_OBJ, X509_NAME_add_entry_by_NID, | 5 | X509_NAME_add_entry_by_txt, X509_NAME_add_entry_by_OBJ, | 
| 6 | X509_NAME_add_entry, X509_NAME_delete_entry - X509_NAME modification functions | 6 | X509_NAME_add_entry_by_NID, X509_NAME_add_entry, X509_NAME_delete_entry - | 
| 7 | X509_NAME modification functions | ||
| 7 | 8 | ||
| 8 | =head1 SYNOPSIS | 9 | =head1 SYNOPSIS | 
| 9 | 10 | ||
| diff --git a/src/lib/libssl/src/doc/crypto/X509_NAME_print_ex.pod b/src/lib/libssl/src/doc/crypto/X509_NAME_print_ex.pod index b2d86d4ddb..ff5d788d88 100644 --- a/src/lib/libssl/src/doc/crypto/X509_NAME_print_ex.pod +++ b/src/lib/libssl/src/doc/crypto/X509_NAME_print_ex.pod | |||
| @@ -16,16 +16,16 @@ X509_NAME_oneline - X509_NAME printing routines. | |||
| 16 | 16 | ||
| 17 | =head1 DESCRIPTION | 17 | =head1 DESCRIPTION | 
| 18 | 18 | ||
| 19 | X509_NAME_print_ex() prints a human readable version of B<nm> to BIO B<out>. Each | 19 | X509_NAME_print_ex() prints a human readable version of B<nm> to BIO B<out>. | 
| 20 | line (for multiline formats) is indented by B<indent> spaces. The output format | 20 | Each line (for multiline formats) is indented by B<indent> spaces. The output | 
| 21 | can be extensively customised by use of the B<flags> parameter. | 21 | format can be extensively customised by use of the B<flags> parameter. | 
| 22 | 22 | ||
| 23 | X509_NAME_print_ex_fp() is identical to X509_NAME_print_ex() except the output is | 23 | X509_NAME_print_ex_fp() is identical to X509_NAME_print_ex() except the output | 
| 24 | written to FILE pointer B<fp>. | 24 | is written to FILE pointer B<fp>. | 
| 25 | 25 | ||
| 26 | X509_NAME_oneline() prints an ASCII version of B<a> to B<buf>. At most B<size> | 26 | X509_NAME_oneline() prints an ASCII version of B<a> to B<buf>. At most B<size> | 
| 27 | bytes will be written. If B<buf> is B<NULL> then a buffer is dynamically allocated | 27 | bytes will be written. If B<buf> is B<NULL> then a buffer is dynamically | 
| 28 | and returned, otherwise B<buf> is returned. | 28 | allocated and returned, otherwise B<buf> is returned. | 
| 29 | 29 | ||
| 30 | X509_NAME_print() prints out B<name> to B<bp> indenting each line by B<obase> | 30 | X509_NAME_print() prints out B<name> to B<bp> indenting each line by B<obase> | 
| 31 | characters. Multiple lines are used if the output (including indent) exceeds | 31 | characters. Multiple lines are used if the output (including indent) exceeds | 
| @@ -33,10 +33,10 @@ characters. Multiple lines are used if the output (including indent) exceeds | |||
| 33 | 33 | ||
| 34 | =head1 NOTES | 34 | =head1 NOTES | 
| 35 | 35 | ||
| 36 | The functions X509_NAME_oneline() and X509_NAME_print() are legacy functions which | 36 | The functions X509_NAME_oneline() and X509_NAME_print() are legacy functions | 
| 37 | produce a non standard output form, they don't handle multi character fields and | 37 | which produce a non standard output form, they don't handle multi character | 
| 38 | have various quirks and inconsistencies. Their use is strongly discouraged in new | 38 | fields and have various quirks and inconsistencies. Their use is strongly | 
| 39 | applications. | 39 | discouraged in new applications. | 
| 40 | 40 | ||
| 41 | Although there are a large number of possible flags for most purposes | 41 | Although there are a large number of possible flags for most purposes | 
| 42 | B<XN_FLAG_ONELINE>, B<XN_FLAG_MULTILINE> or B<XN_FLAG_RFC2253> will suffice. | 42 | B<XN_FLAG_ONELINE>, B<XN_FLAG_MULTILINE> or B<XN_FLAG_RFC2253> will suffice. | 
| @@ -49,15 +49,16 @@ The complete set of the flags supported by X509_NAME_print_ex() is listed below. | |||
| 49 | Several options can be ored together. | 49 | Several options can be ored together. | 
| 50 | 50 | ||
| 51 | The options B<XN_FLAG_SEP_COMMA_PLUS>, B<XN_FLAG_SEP_CPLUS_SPC>, | 51 | The options B<XN_FLAG_SEP_COMMA_PLUS>, B<XN_FLAG_SEP_CPLUS_SPC>, | 
| 52 | B<XN_FLAG_SEP_SPLUS_SPC> and B<XN_FLAG_SEP_MULTILINE> determine the field separators | 52 | B<XN_FLAG_SEP_SPLUS_SPC> and B<XN_FLAG_SEP_MULTILINE> determine the field | 
| 53 | to use. Two distinct separators are used between distinct RelativeDistinguishedName | 53 | separators to use. Two distinct separators are used between distinct | 
| 54 | components and separate values in the same RDN for a multi-valued RDN. Multi-valued | 54 | RelativeDistinguishedName components and separate values in the same RDN for a | 
| 55 | RDNs are currently very rare so the second separator will hardly ever be used. | 55 | multi-valued RDN. Multi-valued RDNs are currently very rare so the second | 
| 56 | separator will hardly ever be used. | ||
| 56 | 57 | ||
| 57 | B<XN_FLAG_SEP_COMMA_PLUS> uses comma and plus as separators. B<XN_FLAG_SEP_CPLUS_SPC> | 58 | B<XN_FLAG_SEP_COMMA_PLUS> uses comma and plus as separators. | 
| 58 | uses comma and plus with spaces: this is more readable that plain comma and plus. | 59 | B<XN_FLAG_SEP_CPLUS_SPC> uses comma and plus with spaces: this is more readable | 
| 59 | B<XN_FLAG_SEP_SPLUS_SPC> uses spaced semicolon and plus. B<XN_FLAG_SEP_MULTILINE> uses | 60 | that plain comma and plus. B<XN_FLAG_SEP_SPLUS_SPC> uses spaced semicolon and | 
| 60 | spaced newline and plus respectively. | 61 | plus. B<XN_FLAG_SEP_MULTILINE> uses spaced newline and plus respectively. | 
| 61 | 62 | ||
| 62 | If B<XN_FLAG_DN_REV> is set the whole DN is printed in reversed order. | 63 | If B<XN_FLAG_DN_REV> is set the whole DN is printed in reversed order. | 
| 63 | 64 | ||
| @@ -92,7 +93,8 @@ B<XN_FLAG_ONELINE> is a more readable one line format which is the same as: | |||
| 92 | B<XN_FLAG_MULTILINE> is a multiline format which is the same as: | 93 | B<XN_FLAG_MULTILINE> is a multiline format which is the same as: | 
| 93 | B<ASN1_STRFLGS_ESC_CTRL | ASN1_STRFLGS_ESC_MSB | XN_FLAG_SEP_MULTILINE | XN_FLAG_SPC_EQ | XN_FLAG_FN_LN | XN_FLAG_FN_ALIGN> | 94 | B<ASN1_STRFLGS_ESC_CTRL | ASN1_STRFLGS_ESC_MSB | XN_FLAG_SEP_MULTILINE | XN_FLAG_SPC_EQ | XN_FLAG_FN_LN | XN_FLAG_FN_ALIGN> | 
| 94 | 95 | ||
| 95 | B<XN_FLAG_COMPAT> uses a format identical to X509_NAME_print(): in fact it calls X509_NAME_print() internally. | 96 | B<XN_FLAG_COMPAT> uses a format identical to X509_NAME_print(): in fact it | 
| 97 | calls X509_NAME_print() internally. | ||
| 96 | 98 | ||
| 97 | =head1 SEE ALSO | 99 | =head1 SEE ALSO | 
| 98 | 100 | ||
| diff --git a/src/lib/libssl/src/doc/crypto/X509_STORE_CTX_get_error.pod b/src/lib/libssl/src/doc/crypto/X509_STORE_CTX_get_error.pod index 60e8332ae9..5760f64fcb 100644 --- a/src/lib/libssl/src/doc/crypto/X509_STORE_CTX_get_error.pod +++ b/src/lib/libssl/src/doc/crypto/X509_STORE_CTX_get_error.pod | |||
| @@ -2,7 +2,10 @@ | |||
| 2 | 2 | ||
| 3 | =head1 NAME | 3 | =head1 NAME | 
| 4 | 4 | ||
| 5 | X509_STORE_CTX_get_error, X509_STORE_CTX_set_error, X509_STORE_CTX_get_error_depth, X509_STORE_CTX_get_current_cert, X509_STORE_CTX_get1_chain, X509_verify_cert_error_string - get or set certificate verification status information | 5 | X509_STORE_CTX_get_error, X509_STORE_CTX_set_error, | 
| 6 | X509_STORE_CTX_get_error_depth, X509_STORE_CTX_get_current_cert, | ||
| 7 | X509_STORE_CTX_get1_chain, X509_verify_cert_error_string - get or set | ||
| 8 | certificate verification status information | ||
| 6 | 9 | ||
| 7 | =head1 SYNOPSIS | 10 | =head1 SYNOPSIS | 
| 8 | 11 | ||
| @@ -82,19 +85,22 @@ of an untrusted certificate cannot be found. | |||
| 82 | 85 | ||
| 83 | the CRL of a certificate could not be found. | 86 | the CRL of a certificate could not be found. | 
| 84 | 87 | ||
| 85 | =item B<X509_V_ERR_UNABLE_TO_DECRYPT_CERT_SIGNATURE: unable to decrypt certificate's signature> | 88 | =item B<X509_V_ERR_UNABLE_TO_DECRYPT_CERT_SIGNATURE: unable to decrypt | 
| 89 | certificate's signature> | ||
| 86 | 90 | ||
| 87 | the certificate signature could not be decrypted. This means that the actual | 91 | the certificate signature could not be decrypted. This means that the actual | 
| 88 | signature value could not be determined rather than it not matching the | 92 | signature value could not be determined rather than it not matching the | 
| 89 | expected value, this is only meaningful for RSA keys. | 93 | expected value, this is only meaningful for RSA keys. | 
| 90 | 94 | ||
| 91 | =item B<X509_V_ERR_UNABLE_TO_DECRYPT_CRL_SIGNATURE: unable to decrypt CRL's signature> | 95 | =item B<X509_V_ERR_UNABLE_TO_DECRYPT_CRL_SIGNATURE: unable to decrypt CRL's | 
| 96 | signature> | ||
| 92 | 97 | ||
| 93 | the CRL signature could not be decrypted: this means that the actual signature | 98 | the CRL signature could not be decrypted: this means that the actual signature | 
| 94 | value could not be determined rather than it not matching the expected value. | 99 | value could not be determined rather than it not matching the expected value. | 
| 95 | Unused. | 100 | Unused. | 
| 96 | 101 | ||
| 97 | =item B<X509_V_ERR_UNABLE_TO_DECODE_ISSUER_PUBLIC_KEY: unable to decode issuer public key> | 102 | =item B<X509_V_ERR_UNABLE_TO_DECODE_ISSUER_PUBLIC_KEY: unable to decode issuer | 
| 103 | public key> | ||
| 98 | 104 | ||
| 99 | the public key in the certificate SubjectPublicKeyInfo could not be read. | 105 | the public key in the certificate SubjectPublicKeyInfo could not be read. | 
| 100 | 106 | ||
| @@ -112,7 +118,8 @@ the certificate is not yet valid: the notBefore date is after the current time. | |||
| 112 | 118 | ||
| 113 | =item B<X509_V_ERR_CERT_HAS_EXPIRED: certificate has expired> | 119 | =item B<X509_V_ERR_CERT_HAS_EXPIRED: certificate has expired> | 
| 114 | 120 | ||
| 115 | the certificate has expired: that is the notAfter date is before the current time. | 121 | the certificate has expired: that is the notAfter date is before the current | 
| 122 | time. | ||
| 116 | 123 | ||
| 117 | =item B<X509_V_ERR_CRL_NOT_YET_VALID: CRL is not yet valid> | 124 | =item B<X509_V_ERR_CRL_NOT_YET_VALID: CRL is not yet valid> | 
| 118 | 125 | ||
| @@ -122,19 +129,23 @@ the CRL is not yet valid. | |||
| 122 | 129 | ||
| 123 | the CRL has expired. | 130 | the CRL has expired. | 
| 124 | 131 | ||
| 125 | =item B<X509_V_ERR_ERROR_IN_CERT_NOT_BEFORE_FIELD: format error in certificate's notBefore field> | 132 | =item B<X509_V_ERR_ERROR_IN_CERT_NOT_BEFORE_FIELD: format error in | 
| 133 | certificate's notBefore field> | ||
| 126 | 134 | ||
| 127 | the certificate notBefore field contains an invalid time. | 135 | the certificate notBefore field contains an invalid time. | 
| 128 | 136 | ||
| 129 | =item B<X509_V_ERR_ERROR_IN_CERT_NOT_AFTER_FIELD: format error in certificate's notAfter field> | 137 | =item B<X509_V_ERR_ERROR_IN_CERT_NOT_AFTER_FIELD: format error in certificate's | 
| 138 | notAfter field> | ||
| 130 | 139 | ||
| 131 | the certificate notAfter field contains an invalid time. | 140 | the certificate notAfter field contains an invalid time. | 
| 132 | 141 | ||
| 133 | =item B<X509_V_ERR_ERROR_IN_CRL_LAST_UPDATE_FIELD: format error in CRL's lastUpdate field> | 142 | =item B<X509_V_ERR_ERROR_IN_CRL_LAST_UPDATE_FIELD: format error in CRL's | 
| 143 | lastUpdate field> | ||
| 134 | 144 | ||
| 135 | the CRL lastUpdate field contains an invalid time. | 145 | the CRL lastUpdate field contains an invalid time. | 
| 136 | 146 | ||
| 137 | =item B<X509_V_ERR_ERROR_IN_CRL_NEXT_UPDATE_FIELD: format error in CRL's nextUpdate field> | 147 | =item B<X509_V_ERR_ERROR_IN_CRL_NEXT_UPDATE_FIELD: format error in CRL's | 
| 148 | nextUpdate field> | ||
| 138 | 149 | ||
| 139 | the CRL nextUpdate field contains an invalid time. | 150 | the CRL nextUpdate field contains an invalid time. | 
| 140 | 151 | ||
| @@ -147,17 +158,20 @@ an error occurred trying to allocate memory. This should never happen. | |||
| 147 | the passed certificate is self signed and the same certificate cannot be found | 158 | the passed certificate is self signed and the same certificate cannot be found | 
| 148 | in the list of trusted certificates. | 159 | in the list of trusted certificates. | 
| 149 | 160 | ||
| 150 | =item B<X509_V_ERR_SELF_SIGNED_CERT_IN_CHAIN: self signed certificate in certificate chain> | 161 | =item B<X509_V_ERR_SELF_SIGNED_CERT_IN_CHAIN: self signed certificate in | 
| 162 | certificate chain> | ||
| 151 | 163 | ||
| 152 | the certificate chain could be built up using the untrusted certificates but | 164 | the certificate chain could be built up using the untrusted certificates but | 
| 153 | the root could not be found locally. | 165 | the root could not be found locally. | 
| 154 | 166 | ||
| 155 | =item B<X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT_LOCALLY: unable to get local issuer certificate> | 167 | =item B<X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT_LOCALLY: unable to get local | 
| 168 | issuer certificate> | ||
| 156 | 169 | ||
| 157 | the issuer certificate of a locally looked up certificate could not be found. | 170 | the issuer certificate of a locally looked up certificate could not be found. | 
| 158 | This normally means the list of trusted certificates is not complete. | 171 | This normally means the list of trusted certificates is not complete. | 
| 159 | 172 | ||
| 160 | =item B<X509_V_ERR_UNABLE_TO_VERIFY_LEAF_SIGNATURE: unable to verify the first certificate> | 173 | =item B<X509_V_ERR_UNABLE_TO_VERIFY_LEAF_SIGNATURE: unable to verify the first | 
| 174 | certificate> | ||
| 161 | 175 | ||
| 162 | no signatures could be verified because the chain contains only one certificate | 176 | no signatures could be verified because the chain contains only one certificate | 
| 163 | and it is not self signed. | 177 | and it is not self signed. | 
| @@ -198,34 +212,39 @@ did not match the issuer name of the current certificate. This is only set | |||
| 198 | if issuer check debugging is enabled it is used for status notification and | 212 | if issuer check debugging is enabled it is used for status notification and | 
| 199 | is B<not> in itself an error. | 213 | is B<not> in itself an error. | 
| 200 | 214 | ||
| 201 | =item B<X509_V_ERR_AKID_SKID_MISMATCH: authority and subject key identifier mismatch> | 215 | =item B<X509_V_ERR_AKID_SKID_MISMATCH: authority and subject key identifier | 
| 216 | mismatch> | ||
| 202 | 217 | ||
| 203 | the current candidate issuer certificate was rejected because its subject key | 218 | the current candidate issuer certificate was rejected because its subject key | 
| 204 | identifier was present and did not match the authority key identifier current | 219 | identifier was present and did not match the authority key identifier current | 
| 205 | certificate. This is only set if issuer check debugging is enabled it is used | 220 | certificate. This is only set if issuer check debugging is enabled it is used | 
| 206 | for status notification and is B<not> in itself an error. | 221 | for status notification and is B<not> in itself an error. | 
| 207 | 222 | ||
| 208 | =item B<X509_V_ERR_AKID_ISSUER_SERIAL_MISMATCH: authority and issuer serial number mismatch> | 223 | =item B<X509_V_ERR_AKID_ISSUER_SERIAL_MISMATCH: authority and issuer serial | 
| 224 | number mismatch> | ||
| 209 | 225 | ||
| 210 | the current candidate issuer certificate was rejected because its issuer name | 226 | the current candidate issuer certificate was rejected because its issuer name | 
| 211 | and serial number was present and did not match the authority key identifier of | 227 | and serial number was present and did not match the authority key identifier of | 
| 212 | the current certificate. This is only set if issuer check debugging is enabled | 228 | the current certificate. This is only set if issuer check debugging is enabled | 
| 213 | it is used for status notification and is B<not> in itself an error. | 229 | it is used for status notification and is B<not> in itself an error. | 
| 214 | 230 | ||
| 215 | =item B<X509_V_ERR_KEYUSAGE_NO_CERTSIGN:key usage does not include certificate signing> | 231 | =item B<X509_V_ERR_KEYUSAGE_NO_CERTSIGN:key usage does not include certificate | 
| 232 | signing> | ||
| 216 | 233 | ||
| 217 | the current candidate issuer certificate was rejected because its keyUsage | 234 | the current candidate issuer certificate was rejected because its keyUsage | 
| 218 | extension does not permit certificate signing. This is only set if issuer check | 235 | extension does not permit certificate signing. This is only set if issuer check | 
| 219 | debugging is enabled it is used for status notification and is B<not> in itself | 236 | debugging is enabled it is used for status notification and is B<not> in itself | 
| 220 | an error. | 237 | an error. | 
| 221 | 238 | ||
| 222 | =item B<X509_V_ERR_INVALID_EXTENSION: invalid or inconsistent certificate extension> | 239 | =item B<X509_V_ERR_INVALID_EXTENSION: invalid or inconsistent certificate | 
| 240 | extension> | ||
| 223 | 241 | ||
| 224 | A certificate extension had an invalid value (for example an incorrect | 242 | A certificate extension had an invalid value (for example an incorrect | 
| 225 | encoding) or some value inconsistent with other extensions. | 243 | encoding) or some value inconsistent with other extensions. | 
| 226 | 244 | ||
| 227 | 245 | ||
| 228 | =item B<X509_V_ERR_INVALID_POLICY_EXTENSION: invalid or inconsistent certificate policy extension> | 246 | =item B<X509_V_ERR_INVALID_POLICY_EXTENSION: invalid or inconsistent | 
| 247 | certificate policy extension> | ||
| 229 | 248 | ||
| 230 | A certificate policies extension had an invalid value (for example an incorrect | 249 | A certificate policies extension had an invalid value (for example an incorrect | 
| 231 | encoding) or some value inconsistent with other extensions. This error only | 250 | encoding) or some value inconsistent with other extensions. This error only | 
| @@ -252,17 +271,20 @@ A name constraint violation occured in the permitted subtrees. | |||
| 252 | 271 | ||
| 253 | A name constraint violation occured in the excluded subtrees. | 272 | A name constraint violation occured in the excluded subtrees. | 
| 254 | 273 | ||
| 255 | =item B<X509_V_ERR_SUBTREE_MINMAX: name constraints minimum and maximum not supported> | 274 | =item B<X509_V_ERR_SUBTREE_MINMAX: name constraints minimum and maximum not | 
| 275 | supported> | ||
| 256 | 276 | ||
| 257 | A certificate name constraints extension included a minimum or maximum field: | 277 | A certificate name constraints extension included a minimum or maximum field: | 
| 258 | this is not supported. | 278 | this is not supported. | 
| 259 | 279 | ||
| 260 | =item B<X509_V_ERR_UNSUPPORTED_CONSTRAINT_TYPE: unsupported name constraint type> | 280 | =item B<X509_V_ERR_UNSUPPORTED_CONSTRAINT_TYPE: unsupported name constraint | 
| 281 | type> | ||
| 261 | 282 | ||
| 262 | An unsupported name constraint type was encountered. OpenSSL currently only | 283 | An unsupported name constraint type was encountered. OpenSSL currently only | 
| 263 | supports directory name, DNS name, email and URI types. | 284 | supports directory name, DNS name, email and URI types. | 
| 264 | 285 | ||
| 265 | =item B<X509_V_ERR_UNSUPPORTED_CONSTRAINT_SYNTAX: unsupported or invalid name constraint syntax> | 286 | =item B<X509_V_ERR_UNSUPPORTED_CONSTRAINT_SYNTAX: unsupported or invalid name | 
| 287 | constraint syntax> | ||
| 266 | 288 | ||
| 267 | The format of the name constraint is not recognised: for example an email | 289 | The format of the name constraint is not recognised: for example an email | 
| 268 | address format of a form not mentioned in RFC3280. This could be caused by | 290 | address format of a form not mentioned in RFC3280. This could be caused by | 
| diff --git a/src/lib/libssl/src/doc/crypto/X509_STORE_CTX_get_ex_new_index.pod b/src/lib/libssl/src/doc/crypto/X509_STORE_CTX_get_ex_new_index.pod index 1b75967ccd..392b36c3ae 100644 --- a/src/lib/libssl/src/doc/crypto/X509_STORE_CTX_get_ex_new_index.pod +++ b/src/lib/libssl/src/doc/crypto/X509_STORE_CTX_get_ex_new_index.pod | |||
| @@ -2,7 +2,9 @@ | |||
| 2 | 2 | ||
| 3 | =head1 NAME | 3 | =head1 NAME | 
| 4 | 4 | ||
| 5 | X509_STORE_CTX_get_ex_new_index, X509_STORE_CTX_set_ex_data, X509_STORE_CTX_get_ex_data - add application specific data to X509_STORE_CTX structures | 5 | X509_STORE_CTX_get_ex_new_index, X509_STORE_CTX_set_ex_data, | 
| 6 | X509_STORE_CTX_get_ex_data - add application specific data to X509_STORE_CTX | ||
| 7 | structures | ||
| 6 | 8 | ||
| 7 | =head1 SYNOPSIS | 9 | =head1 SYNOPSIS | 
| 8 | 10 | ||
| diff --git a/src/lib/libssl/src/doc/crypto/X509_STORE_CTX_new.pod b/src/lib/libssl/src/doc/crypto/X509_STORE_CTX_new.pod index 1c55236aa2..8f602274ee 100644 --- a/src/lib/libssl/src/doc/crypto/X509_STORE_CTX_new.pod +++ b/src/lib/libssl/src/doc/crypto/X509_STORE_CTX_new.pod | |||
| @@ -2,7 +2,11 @@ | |||
| 2 | 2 | ||
| 3 | =head1 NAME | 3 | =head1 NAME | 
| 4 | 4 | ||
| 5 | X509_STORE_CTX_new, X509_STORE_CTX_cleanup, X509_STORE_CTX_free, X509_STORE_CTX_init, X509_STORE_CTX_trusted_stack, X509_STORE_CTX_set_cert, X509_STORE_CTX_set_chain, X509_STORE_CTX_set0_crls, X509_STORE_CTX_get0_param, X509_STORE_CTX_set0_param, X509_STORE_CTX_set_default - X509_STORE_CTX initialisation | 5 | X509_STORE_CTX_new, X509_STORE_CTX_cleanup, X509_STORE_CTX_free, | 
| 6 | X509_STORE_CTX_init, X509_STORE_CTX_trusted_stack, X509_STORE_CTX_set_cert, | ||
| 7 | X509_STORE_CTX_set_chain, X509_STORE_CTX_set0_crls, X509_STORE_CTX_get0_param, | ||
| 8 | X509_STORE_CTX_set0_param, X509_STORE_CTX_set_default - X509_STORE_CTX | ||
| 9 | initialisation | ||
| 6 | 10 | ||
| 7 | =head1 SYNOPSIS | 11 | =head1 SYNOPSIS | 
| 8 | 12 | ||
| diff --git a/src/lib/libssl/src/doc/crypto/X509_STORE_set_verify_cb_func.pod b/src/lib/libssl/src/doc/crypto/X509_STORE_set_verify_cb_func.pod index 012f2d2c75..f9602b3e77 100644 --- a/src/lib/libssl/src/doc/crypto/X509_STORE_set_verify_cb_func.pod +++ b/src/lib/libssl/src/doc/crypto/X509_STORE_set_verify_cb_func.pod | |||
| @@ -2,7 +2,8 @@ | |||
| 2 | 2 | ||
| 3 | =head1 NAME | 3 | =head1 NAME | 
| 4 | 4 | ||
| 5 | X509_STORE_set_verify_cb_func, X509_STORE_set_verify_cb - set verification callback | 5 | X509_STORE_set_verify_cb_func, X509_STORE_set_verify_cb - set verification | 
| 6 | callback | ||
| 6 | 7 | ||
| 7 | =head1 SYNOPSIS | 8 | =head1 SYNOPSIS | 
| 8 | 9 | ||
| diff --git a/src/lib/libssl/src/doc/crypto/X509_VERIFY_PARAM_set_flags.pod b/src/lib/libssl/src/doc/crypto/X509_VERIFY_PARAM_set_flags.pod index e5da5bec08..f213a9c117 100644 --- a/src/lib/libssl/src/doc/crypto/X509_VERIFY_PARAM_set_flags.pod +++ b/src/lib/libssl/src/doc/crypto/X509_VERIFY_PARAM_set_flags.pod | |||
| @@ -2,7 +2,12 @@ | |||
| 2 | 2 | ||
| 3 | =head1 NAME | 3 | =head1 NAME | 
| 4 | 4 | ||
| 5 | X509_VERIFY_PARAM_set_flags, X509_VERIFY_PARAM_clear_flags, X509_VERIFY_PARAM_get_flags, X509_VERIFY_PARAM_set_purpose, X509_VERIFY_PARAM_set_trust, X509_VERIFY_PARAM_set_depth, X509_VERIFY_PARAM_get_depth, X509_VERIFY_PARAM_set_time, X509_VERIFY_PARAM_add0_policy, X509_VERIFY_PARAM_set1_policies - X509 verification parameters | 5 | X509_VERIFY_PARAM_set_flags, X509_VERIFY_PARAM_clear_flags, | 
| 6 | X509_VERIFY_PARAM_get_flags, X509_VERIFY_PARAM_set_purpose, | ||
| 7 | X509_VERIFY_PARAM_set_trust, X509_VERIFY_PARAM_set_depth, | ||
| 8 | X509_VERIFY_PARAM_get_depth, X509_VERIFY_PARAM_set_time, | ||
| 9 | X509_VERIFY_PARAM_add0_policy, X509_VERIFY_PARAM_set1_policies - X509 | ||
| 10 | verification parameters | ||
| 6 | 11 | ||
| 7 | =head1 SYNOPSIS | 12 | =head1 SYNOPSIS | 
| 8 | 13 | ||
| diff --git a/src/lib/libssl/src/doc/crypto/bn.pod b/src/lib/libssl/src/doc/crypto/bn.pod index cd2f8e50c6..4a3f24ba30 100644 --- a/src/lib/libssl/src/doc/crypto/bn.pod +++ b/src/lib/libssl/src/doc/crypto/bn.pod | |||
| @@ -166,10 +166,10 @@ of B<BIGNUM>s to external formats is described in L<BN_bn2bin(3)|BN_bn2bin(3)>. | |||
| 166 | 166 | ||
| 167 | =head1 SEE ALSO | 167 | =head1 SEE ALSO | 
| 168 | 168 | ||
| 169 | L<bn_internal(3)|bn_internal(3)>, | 169 | L<bn_internal(3)|bn_internal(3)>, L<dh(3)|dh(3)>, L<err(3)|err(3)>, | 
| 170 | L<dh(3)|dh(3)>, L<err(3)|err(3)>, L<rand(3)|rand(3)>, L<rsa(3)|rsa(3)>, | 170 | L<rand(3)|rand(3)>, L<rsa(3)|rsa(3)>, L<BN_new(3)|BN_new(3)>, | 
| 171 | L<BN_new(3)|BN_new(3)>, L<BN_CTX_new(3)|BN_CTX_new(3)>, | 171 | L<BN_CTX_new(3)|BN_CTX_new(3)>, L<BN_copy(3)|BN_copy(3)>, | 
| 172 | L<BN_copy(3)|BN_copy(3)>, L<BN_swap(3)|BN_swap(3)>, L<BN_num_bytes(3)|BN_num_bytes(3)>, | 172 | L<BN_swap(3)|BN_swap(3)>, L<BN_num_bytes(3)|BN_num_bytes(3)>, | 
| 173 | L<BN_add(3)|BN_add(3)>, L<BN_add_word(3)|BN_add_word(3)>, | 173 | L<BN_add(3)|BN_add(3)>, L<BN_add_word(3)|BN_add_word(3)>, | 
| 174 | L<BN_cmp(3)|BN_cmp(3)>, L<BN_zero(3)|BN_zero(3)>, L<BN_rand(3)|BN_rand(3)>, | 174 | L<BN_cmp(3)|BN_cmp(3)>, L<BN_zero(3)|BN_zero(3)>, L<BN_rand(3)|BN_rand(3)>, | 
| 175 | L<BN_generate_prime(3)|BN_generate_prime(3)>, L<BN_set_bit(3)|BN_set_bit(3)>, | 175 | L<BN_generate_prime(3)|BN_generate_prime(3)>, L<BN_set_bit(3)|BN_set_bit(3)>, | 
| diff --git a/src/lib/libssl/src/doc/crypto/d2i_PKCS8PrivateKey.pod b/src/lib/libssl/src/doc/crypto/d2i_PKCS8PrivateKey.pod index 466f99ab42..fc7335c7a1 100644 --- a/src/lib/libssl/src/doc/crypto/d2i_PKCS8PrivateKey.pod +++ b/src/lib/libssl/src/doc/crypto/d2i_PKCS8PrivateKey.pod | |||
| @@ -2,9 +2,9 @@ | |||
| 2 | 2 | ||
| 3 | =head1 NAME | 3 | =head1 NAME | 
| 4 | 4 | ||
| 5 | d2i_PKCS8PrivateKey_bio, d2i_PKCS8PrivateKey_fp, | 5 | d2i_PKCS8PrivateKey_bio, d2i_PKCS8PrivateKey_fp, i2d_PKCS8PrivateKey_bio, | 
| 6 | i2d_PKCS8PrivateKey_bio, i2d_PKCS8PrivateKey_fp, | 6 | i2d_PKCS8PrivateKey_fp, i2d_PKCS8PrivateKey_nid_bio, i2d_PKCS8PrivateKey_nid_fp | 
| 7 | i2d_PKCS8PrivateKey_nid_bio, i2d_PKCS8PrivateKey_nid_fp - PKCS#8 format private key functions | 7 | - PKCS#8 format private key functions | 
| 8 | 8 | ||
| 9 | =head1 SYNOPSIS | 9 | =head1 SYNOPSIS | 
| 10 | 10 | ||
| @@ -39,15 +39,17 @@ corresponding B<PEM> function as described in the L<pem(3)|pem(3)> manual page. | |||
| 39 | 39 | ||
| 40 | =head1 NOTES | 40 | =head1 NOTES | 
| 41 | 41 | ||
| 42 | Before using these functions L<OpenSSL_add_all_algorithms(3)|OpenSSL_add_all_algorithms(3)> | 42 | Before using these functions | 
| 43 | should be called to initialize the internal algorithm lookup tables otherwise errors about | 43 | L<OpenSSL_add_all_algorithms(3)|OpenSSL_add_all_algorithms(3)> should be called | 
| 44 | to initialize the internal algorithm lookup tables otherwise errors about | ||
| 44 | unknown algorithms will occur if an attempt is made to decrypt a private key. | 45 | unknown algorithms will occur if an attempt is made to decrypt a private key. | 
| 45 | 46 | ||
| 46 | These functions are currently the only way to store encrypted private keys using DER format. | 47 | These functions are currently the only way to store encrypted private keys | 
| 48 | using DER format. | ||
| 47 | 49 | ||
| 48 | Currently all the functions use BIOs or FILE pointers, there are no functions which | 50 | Currently all the functions use BIOs or FILE pointers, there are no functions | 
| 49 | work directly on memory: this can be readily worked around by converting the buffers | 51 | which work directly on memory: this can be readily worked around by converting | 
| 50 | to memory BIOs, see L<BIO_s_mem(3)|BIO_s_mem(3)> for details. | 52 | the buffers to memory BIOs, see L<BIO_s_mem(3)|BIO_s_mem(3)> for details. | 
| 51 | 53 | ||
| 52 | =head1 SEE ALSO | 54 | =head1 SEE ALSO | 
| 53 | 55 | ||
| diff --git a/src/lib/libssl/src/doc/crypto/d2i_RSAPublicKey.pod b/src/lib/libssl/src/doc/crypto/d2i_RSAPublicKey.pod index 1711dc038f..68e7f27de5 100644 --- a/src/lib/libssl/src/doc/crypto/d2i_RSAPublicKey.pod +++ b/src/lib/libssl/src/doc/crypto/d2i_RSAPublicKey.pod | |||
| @@ -29,14 +29,14 @@ d2i_Netscape_RSA - RSA public and private key encoding functions. | |||
| 29 | 29 | ||
| 30 | =head1 DESCRIPTION | 30 | =head1 DESCRIPTION | 
| 31 | 31 | ||
| 32 | d2i_RSAPublicKey() and i2d_RSAPublicKey() decode and encode a PKCS#1 RSAPublicKey | 32 | d2i_RSAPublicKey() and i2d_RSAPublicKey() decode and encode a PKCS#1 | 
| 33 | structure. | 33 | RSAPublicKey structure. | 
| 34 | 34 | ||
| 35 | d2i_RSA_PUBKEY() and i2d_RSA_PUBKEY() decode and encode an RSA public key using | 35 | d2i_RSA_PUBKEY() and i2d_RSA_PUBKEY() decode and encode an RSA public key using | 
| 36 | a SubjectPublicKeyInfo (certificate public key) structure. | 36 | a SubjectPublicKeyInfo (certificate public key) structure. | 
| 37 | 37 | ||
| 38 | d2i_RSAPrivateKey(), i2d_RSAPrivateKey() decode and encode a PKCS#1 RSAPrivateKey | 38 | d2i_RSAPrivateKey(), i2d_RSAPrivateKey() decode and encode a PKCS#1 | 
| 39 | structure. | 39 | RSAPrivateKey structure. | 
| 40 | 40 | ||
| 41 | d2i_Netscape_RSA(), i2d_Netscape_RSA() decode and encode an RSA private key in | 41 | d2i_Netscape_RSA(), i2d_Netscape_RSA() decode and encode an RSA private key in | 
| 42 | NET format. | 42 | NET format. | 
| diff --git a/src/lib/libssl/src/doc/crypto/dh.pod b/src/lib/libssl/src/doc/crypto/dh.pod index 97aaa75731..5fb9890a77 100644 --- a/src/lib/libssl/src/doc/crypto/dh.pod +++ b/src/lib/libssl/src/doc/crypto/dh.pod | |||
| @@ -40,10 +40,11 @@ dh - Diffie-Hellman key agreement | |||
| 40 | 40 | ||
| 41 | =head1 DESCRIPTION | 41 | =head1 DESCRIPTION | 
| 42 | 42 | ||
| 43 | These functions implement the Diffie-Hellman key agreement protocol. | 43 | These functions implement the Diffie-Hellman key agreement protocol. The | 
| 44 | The generation of shared DH parameters is described in | 44 | generation of shared DH parameters is described in | 
| 45 | L<DH_generate_parameters(3)|DH_generate_parameters(3)>; L<DH_generate_key(3)|DH_generate_key(3)> describes how | 45 | L<DH_generate_parameters(3)|DH_generate_parameters(3)>; | 
| 46 | to perform a key agreement. | 46 | L<DH_generate_key(3)|DH_generate_key(3)> describes how to perform a key | 
| 47 | agreement. | ||
| 47 | 48 | ||
| 48 | The B<DH> structure consists of several BIGNUM components. | 49 | The B<DH> structure consists of several BIGNUM components. | 
| 49 | 50 | ||
| diff --git a/src/lib/libssl/src/doc/crypto/lhash.pod b/src/lib/libssl/src/doc/crypto/lhash.pod index b5c8a10282..a9c44dd9ef 100644 --- a/src/lib/libssl/src/doc/crypto/lhash.pod +++ b/src/lib/libssl/src/doc/crypto/lhash.pod | |||
| @@ -2,7 +2,8 @@ | |||
| 2 | 2 | ||
| 3 | =head1 NAME | 3 | =head1 NAME | 
| 4 | 4 | ||
| 5 | lh_new, lh_free, lh_insert, lh_delete, lh_retrieve, lh_doall, lh_doall_arg, lh_error - dynamic hash table | 5 | lh_new, lh_free, lh_insert, lh_delete, lh_retrieve, lh_doall, lh_doall_arg, | 
| 6 | lh_error - dynamic hash table | ||
| 6 | 7 | ||
| 7 | =head1 SYNOPSIS | 8 | =head1 SYNOPSIS | 
| 8 | 9 | ||
