summaryrefslogtreecommitdiff
path: root/src/lib
diff options
context:
space:
mode:
authortb <>2021-03-31 16:48:43 +0000
committertb <>2021-03-31 16:48:43 +0000
commitbf7cad06b63ad7e7f3873e3c60cf00919ef6526c (patch)
tree0d66cc5d072dc1020c1ab4899670ae6f39f35ac8 /src/lib
parent252a88b0b394b1325df5ea2487a693f987d2fd1b (diff)
downloadopenbsd-bf7cad06b63ad7e7f3873e3c60cf00919ef6526c.tar.gz
openbsd-bf7cad06b63ad7e7f3873e3c60cf00919ef6526c.tar.bz2
openbsd-bf7cad06b63ad7e7f3873e3c60cf00919ef6526c.zip
Document EVP_PKEY_new_CMAC_key(3)
ok bcook inoguchi jsing
Diffstat (limited to 'src/lib')
-rw-r--r--src/lib/libcrypto/man/EVP_PKEY_new.320
1 files changed, 4 insertions, 16 deletions
diff --git a/src/lib/libcrypto/man/EVP_PKEY_new.3 b/src/lib/libcrypto/man/EVP_PKEY_new.3
index 51f9d9b4b0..939d5f0d8a 100644
--- a/src/lib/libcrypto/man/EVP_PKEY_new.3
+++ b/src/lib/libcrypto/man/EVP_PKEY_new.3
@@ -1,4 +1,4 @@
1.\" $OpenBSD: EVP_PKEY_new.3,v 1.12 2021/03/29 17:58:29 tb Exp $ 1.\" $OpenBSD: EVP_PKEY_new.3,v 1.13 2021/03/31 16:48:43 tb Exp $
2.\" full merge up to: OpenSSL 99d63d46 Oct 26 13:56:48 2016 -0400 2.\" full merge up to: OpenSSL 99d63d46 Oct 26 13:56:48 2016 -0400
3.\" selective merge up to: OpenSSL df75c2bf Dec 9 01:02:36 2018 +0100 3.\" selective merge up to: OpenSSL df75c2bf Dec 9 01:02:36 2018 +0100
4.\" 4.\"
@@ -50,16 +50,14 @@
50.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED 50.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
51.\" OF THE POSSIBILITY OF SUCH DAMAGE. 51.\" OF THE POSSIBILITY OF SUCH DAMAGE.
52.\" 52.\"
53.Dd $Mdocdate: March 29 2021 $ 53.Dd $Mdocdate: March 31 2021 $
54.Dt EVP_PKEY_NEW 3 54.Dt EVP_PKEY_NEW 3
55.Os 55.Os
56.Sh NAME 56.Sh NAME
57.Nm EVP_PKEY_new , 57.Nm EVP_PKEY_new ,
58.Nm EVP_PKEY_up_ref , 58.Nm EVP_PKEY_up_ref ,
59.Nm EVP_PKEY_free , 59.Nm EVP_PKEY_free ,
60.ig \" will appear in a library bump before Ox 6.9 60.Nm EVP_PKEY_new_CMAC_key ,
61.Nm EVP_PKEY_new_CMAC_key
62..
63.Nm EVP_PKEY_new_mac_key 61.Nm EVP_PKEY_new_mac_key
64.Nd private key allocation functions 62.Nd private key allocation functions
65.Sh SYNOPSIS 63.Sh SYNOPSIS
@@ -74,7 +72,6 @@
74.Fo EVP_PKEY_free 72.Fo EVP_PKEY_free
75.Fa "EVP_PKEY *key" 73.Fa "EVP_PKEY *key"
76.Fc 74.Fc
77.ig
78.Ft EVP_PKEY * 75.Ft EVP_PKEY *
79.Fo EVP_PKEY_new_CMAC_key 76.Fo EVP_PKEY_new_CMAC_key
80.Fa "ENGINE *e" 77.Fa "ENGINE *e"
@@ -82,7 +79,6 @@
82.Fa "size_t len" 79.Fa "size_t len"
83.Fa "const EVP_CIPHER *cipher" 80.Fa "const EVP_CIPHER *cipher"
84.Fc 81.Fc
85..
86.Ft EVP_PKEY * 82.Ft EVP_PKEY *
87.Fo EVP_PKEY_new_mac_key 83.Fo EVP_PKEY_new_mac_key
88.Fa "int type" 84.Fa "int type"
@@ -119,7 +115,6 @@ If
119is a 115is a
120.Dv NULL 116.Dv NULL
121pointer, no action occurs. 117pointer, no action occurs.
122.ig
123.Pp 118.Pp
124.Fn EVP_PKEY_new_CMAC_key 119.Fn EVP_PKEY_new_CMAC_key
125allocates a new 120allocates a new
@@ -146,7 +141,6 @@ specifies a cipher algorithm to be used during creation of the CMAC.
146.Fa cipher 141.Fa cipher
147should be a standard encryption only cipher. 142should be a standard encryption only cipher.
148For example, AEAD and XTS ciphers should not be used. 143For example, AEAD and XTS ciphers should not be used.
149..
150.Pp 144.Pp
151.Fn EVP_PKEY_new_mac_key 145.Fn EVP_PKEY_new_mac_key
152allocates a new 146allocates a new
@@ -174,10 +168,8 @@ The length should be appropriate for the type of the key.
174The public key data will be automatically derived from the given 168The public key data will be automatically derived from the given
175private key data (if appropriate for the algorithm type). 169private key data (if appropriate for the algorithm type).
176.Sh RETURN VALUES 170.Sh RETURN VALUES
177.Fn EVP_PKEY_new 171.Fn EVP_PKEY_new ,
178.ig
179.Fn EVP_PKEY_new_CMAC_key , 172.Fn EVP_PKEY_new_CMAC_key ,
180..
181and 173and
182.Fn EVP_PKEY_new_mac_key 174.Fn EVP_PKEY_new_mac_key
183return either the newly allocated 175return either the newly allocated
@@ -189,9 +181,7 @@ if an error occurred.
189.Fn EVP_PKEY_up_ref 181.Fn EVP_PKEY_up_ref
190returns 1 for success or 0 for failure. 182returns 1 for success or 0 for failure.
191.Sh SEE ALSO 183.Sh SEE ALSO
192.ig
193.Xr CMAC_Init 3 , 184.Xr CMAC_Init 3 ,
194..
195.Xr d2i_PrivateKey 3 , 185.Xr d2i_PrivateKey 3 ,
196.Xr evp 3 , 186.Xr evp 3 ,
197.Xr EVP_PKEY_asn1_new 3 , 187.Xr EVP_PKEY_asn1_new 3 ,
@@ -207,12 +197,10 @@ and
207.Fn EVP_PKEY_free 197.Fn EVP_PKEY_free
208first appeared in SSLeay 0.6.0 and have been available since 198first appeared in SSLeay 0.6.0 and have been available since
209.Ox 2.4 . 199.Ox 2.4 .
210.ig
211.Pp 200.Pp
212.Fn EVP_PKEY_new_CMAC_key 201.Fn EVP_PKEY_new_CMAC_key
213first appeared in OpenSSL 1.1.1 and has been available since 202first appeared in OpenSSL 1.1.1 and has been available since
214.Ox 6.9 . 203.Ox 6.9 .
215..
216.Pp 204.Pp
217.Fn EVP_PKEY_new_mac_key 205.Fn EVP_PKEY_new_mac_key
218first appeared in OpenSSL 1.0.0 and has been available since 206first appeared in OpenSSL 1.0.0 and has been available since