diff options
author | schwarze <> | 2024-11-06 18:58:01 +0000 |
---|---|---|
committer | schwarze <> | 2024-11-06 18:58:01 +0000 |
commit | 3c7809f104306e228f210b4c8014374874d96581 (patch) | |
tree | 16d748d1b60baafeca898cbb66a5bbae0765846a /src/lib | |
parent | aa1ae0e00e5594505e705410ab56a2a5786c8f14 (diff) | |
download | openbsd-3c7809f104306e228f210b4c8014374874d96581.tar.gz openbsd-3c7809f104306e228f210b4c8014374874d96581.tar.bz2 openbsd-3c7809f104306e228f210b4c8014374874d96581.zip |
document EVP_PKEY_CTRL_CIPHER, providing a bit of context
Diffstat (limited to 'src/lib')
-rw-r--r-- | src/lib/libcrypto/man/EVP_PKEY_CTX_ctrl.3 | 35 |
1 files changed, 33 insertions, 2 deletions
diff --git a/src/lib/libcrypto/man/EVP_PKEY_CTX_ctrl.3 b/src/lib/libcrypto/man/EVP_PKEY_CTX_ctrl.3 index f07d02c825..075ee19f46 100644 --- a/src/lib/libcrypto/man/EVP_PKEY_CTX_ctrl.3 +++ b/src/lib/libcrypto/man/EVP_PKEY_CTX_ctrl.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: EVP_PKEY_CTX_ctrl.3,v 1.23 2023/09/13 13:32:01 schwarze Exp $ | 1 | .\" $OpenBSD: EVP_PKEY_CTX_ctrl.3,v 1.24 2024/11/06 18:58:01 schwarze Exp $ |
2 | .\" full merge up to: OpenSSL 99d63d46 Oct 26 13:56:48 2016 -0400 | 2 | .\" full merge up to: OpenSSL 99d63d46 Oct 26 13:56:48 2016 -0400 |
3 | .\" selective merge up to: OpenSSL 24a535ea Sep 22 13:14:20 2020 +0100 | 3 | .\" selective merge up to: OpenSSL 24a535ea Sep 22 13:14:20 2020 +0100 |
4 | .\" Parts were split out into RSA_pkey_ctx_ctrl(3). | 4 | .\" Parts were split out into RSA_pkey_ctx_ctrl(3). |
@@ -69,7 +69,7 @@ | |||
69 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 69 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
70 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 70 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
71 | .\" | 71 | .\" |
72 | .Dd $Mdocdate: September 13 2023 $ | 72 | .Dd $Mdocdate: November 6 2024 $ |
73 | .Dt EVP_PKEY_CTX_CTRL 3 | 73 | .Dt EVP_PKEY_CTX_CTRL 3 |
74 | .Os | 74 | .Os |
75 | .Sh NAME | 75 | .Sh NAME |
@@ -410,6 +410,37 @@ macro gets the user key material for | |||
410 | The return value is the user key material length. | 410 | The return value is the user key material length. |
411 | The resulting pointer is owned by the library and should not be | 411 | The resulting pointer is owned by the library and should not be |
412 | freed by the caller. | 412 | freed by the caller. |
413 | .Ss CMAC parameters | ||
414 | Application programs normally initialize an | ||
415 | .Vt EVP_PKEY_CTX | ||
416 | object using | ||
417 | .Xr EVP_PKEY_CTX_new 3 , | ||
418 | specifying the | ||
419 | .Vt EVP_PKEY | ||
420 | object containing the symmetric key right away. | ||
421 | Alternatively, an empty | ||
422 | .Vt EVP_PKEY_CTX | ||
423 | object can be created by passing the | ||
424 | .Dv EVP_PKEY_CMAC | ||
425 | constant to | ||
426 | .Xr EVP_PKEY_CTX_new_id 3 . | ||
427 | After that, the block cipher can be selected by calling | ||
428 | .Fn EVP_PKEY_CTX_ctrl | ||
429 | with an | ||
430 | .Fa optype | ||
431 | of \-1, a | ||
432 | .Fa cmd | ||
433 | of | ||
434 | .Dv EVP_PKEY_CTRL_CIPHER , | ||
435 | and | ||
436 | .Fa p2 | ||
437 | pointing to an | ||
438 | .Vt EVP_CIPHER | ||
439 | object, which can be obtained from the functions in the CIPHER LISTING in | ||
440 | .Xr EVP_EncryptInit 3 . | ||
441 | The | ||
442 | .Fa p1 | ||
443 | argument is ignored; passing 0 is recommended. | ||
413 | .Ss Other parameters | 444 | .Ss Other parameters |
414 | The | 445 | The |
415 | .Fn EVP_PKEY_CTX_set1_id , | 446 | .Fn EVP_PKEY_CTX_set1_id , |