summaryrefslogtreecommitdiff
path: root/src/lib
diff options
context:
space:
mode:
authorschwarze <>2024-11-06 18:58:01 +0000
committerschwarze <>2024-11-06 18:58:01 +0000
commit3c7809f104306e228f210b4c8014374874d96581 (patch)
tree16d748d1b60baafeca898cbb66a5bbae0765846a /src/lib
parentaa1ae0e00e5594505e705410ab56a2a5786c8f14 (diff)
downloadopenbsd-3c7809f104306e228f210b4c8014374874d96581.tar.gz
openbsd-3c7809f104306e228f210b4c8014374874d96581.tar.bz2
openbsd-3c7809f104306e228f210b4c8014374874d96581.zip
document EVP_PKEY_CTRL_CIPHER, providing a bit of context
Diffstat (limited to 'src/lib')
-rw-r--r--src/lib/libcrypto/man/EVP_PKEY_CTX_ctrl.335
1 files changed, 33 insertions, 2 deletions
diff --git a/src/lib/libcrypto/man/EVP_PKEY_CTX_ctrl.3 b/src/lib/libcrypto/man/EVP_PKEY_CTX_ctrl.3
index f07d02c825..075ee19f46 100644
--- a/src/lib/libcrypto/man/EVP_PKEY_CTX_ctrl.3
+++ b/src/lib/libcrypto/man/EVP_PKEY_CTX_ctrl.3
@@ -1,4 +1,4 @@
1.\" $OpenBSD: EVP_PKEY_CTX_ctrl.3,v 1.23 2023/09/13 13:32:01 schwarze Exp $ 1.\" $OpenBSD: EVP_PKEY_CTX_ctrl.3,v 1.24 2024/11/06 18:58:01 schwarze Exp $
2.\" full merge up to: OpenSSL 99d63d46 Oct 26 13:56:48 2016 -0400 2.\" full merge up to: OpenSSL 99d63d46 Oct 26 13:56:48 2016 -0400
3.\" selective merge up to: OpenSSL 24a535ea Sep 22 13:14:20 2020 +0100 3.\" selective merge up to: OpenSSL 24a535ea Sep 22 13:14:20 2020 +0100
4.\" Parts were split out into RSA_pkey_ctx_ctrl(3). 4.\" Parts were split out into RSA_pkey_ctx_ctrl(3).
@@ -69,7 +69,7 @@
69.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED 69.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
70.\" OF THE POSSIBILITY OF SUCH DAMAGE. 70.\" OF THE POSSIBILITY OF SUCH DAMAGE.
71.\" 71.\"
72.Dd $Mdocdate: September 13 2023 $ 72.Dd $Mdocdate: November 6 2024 $
73.Dt EVP_PKEY_CTX_CTRL 3 73.Dt EVP_PKEY_CTX_CTRL 3
74.Os 74.Os
75.Sh NAME 75.Sh NAME
@@ -410,6 +410,37 @@ macro gets the user key material for
410The return value is the user key material length. 410The return value is the user key material length.
411The resulting pointer is owned by the library and should not be 411The resulting pointer is owned by the library and should not be
412freed by the caller. 412freed by the caller.
413.Ss CMAC parameters
414Application programs normally initialize an
415.Vt EVP_PKEY_CTX
416object using
417.Xr EVP_PKEY_CTX_new 3 ,
418specifying the
419.Vt EVP_PKEY
420object containing the symmetric key right away.
421Alternatively, an empty
422.Vt EVP_PKEY_CTX
423object can be created by passing the
424.Dv EVP_PKEY_CMAC
425constant to
426.Xr EVP_PKEY_CTX_new_id 3 .
427After that, the block cipher can be selected by calling
428.Fn EVP_PKEY_CTX_ctrl
429with an
430.Fa optype
431of \-1, a
432.Fa cmd
433of
434.Dv EVP_PKEY_CTRL_CIPHER ,
435and
436.Fa p2
437pointing to an
438.Vt EVP_CIPHER
439object, which can be obtained from the functions in the CIPHER LISTING in
440.Xr EVP_EncryptInit 3 .
441The
442.Fa p1
443argument is ignored; passing 0 is recommended.
413.Ss Other parameters 444.Ss Other parameters
414The 445The
415.Fn EVP_PKEY_CTX_set1_id , 446.Fn EVP_PKEY_CTX_set1_id ,