diff options
author | tb <> | 2021-03-31 16:48:43 +0000 |
---|---|---|
committer | tb <> | 2021-03-31 16:48:43 +0000 |
commit | bf7cad06b63ad7e7f3873e3c60cf00919ef6526c (patch) | |
tree | 0d66cc5d072dc1020c1ab4899670ae6f39f35ac8 /src/lib | |
parent | 252a88b0b394b1325df5ea2487a693f987d2fd1b (diff) | |
download | openbsd-bf7cad06b63ad7e7f3873e3c60cf00919ef6526c.tar.gz openbsd-bf7cad06b63ad7e7f3873e3c60cf00919ef6526c.tar.bz2 openbsd-bf7cad06b63ad7e7f3873e3c60cf00919ef6526c.zip |
Document EVP_PKEY_new_CMAC_key(3)
ok bcook inoguchi jsing
Diffstat (limited to 'src/lib')
-rw-r--r-- | src/lib/libcrypto/man/EVP_PKEY_new.3 | 20 |
1 files changed, 4 insertions, 16 deletions
diff --git a/src/lib/libcrypto/man/EVP_PKEY_new.3 b/src/lib/libcrypto/man/EVP_PKEY_new.3 index 51f9d9b4b0..939d5f0d8a 100644 --- a/src/lib/libcrypto/man/EVP_PKEY_new.3 +++ b/src/lib/libcrypto/man/EVP_PKEY_new.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: EVP_PKEY_new.3,v 1.12 2021/03/29 17:58:29 tb Exp $ | 1 | .\" $OpenBSD: EVP_PKEY_new.3,v 1.13 2021/03/31 16:48:43 tb Exp $ |
2 | .\" full merge up to: OpenSSL 99d63d46 Oct 26 13:56:48 2016 -0400 | 2 | .\" full merge up to: OpenSSL 99d63d46 Oct 26 13:56:48 2016 -0400 |
3 | .\" selective merge up to: OpenSSL df75c2bf Dec 9 01:02:36 2018 +0100 | 3 | .\" selective merge up to: OpenSSL df75c2bf Dec 9 01:02:36 2018 +0100 |
4 | .\" | 4 | .\" |
@@ -50,16 +50,14 @@ | |||
50 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 50 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
51 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 51 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
52 | .\" | 52 | .\" |
53 | .Dd $Mdocdate: March 29 2021 $ | 53 | .Dd $Mdocdate: March 31 2021 $ |
54 | .Dt EVP_PKEY_NEW 3 | 54 | .Dt EVP_PKEY_NEW 3 |
55 | .Os | 55 | .Os |
56 | .Sh NAME | 56 | .Sh NAME |
57 | .Nm EVP_PKEY_new , | 57 | .Nm EVP_PKEY_new , |
58 | .Nm EVP_PKEY_up_ref , | 58 | .Nm EVP_PKEY_up_ref , |
59 | .Nm EVP_PKEY_free , | 59 | .Nm EVP_PKEY_free , |
60 | .ig \" will appear in a library bump before Ox 6.9 | 60 | .Nm EVP_PKEY_new_CMAC_key , |
61 | .Nm EVP_PKEY_new_CMAC_key | ||
62 | .. | ||
63 | .Nm EVP_PKEY_new_mac_key | 61 | .Nm EVP_PKEY_new_mac_key |
64 | .Nd private key allocation functions | 62 | .Nd private key allocation functions |
65 | .Sh SYNOPSIS | 63 | .Sh SYNOPSIS |
@@ -74,7 +72,6 @@ | |||
74 | .Fo EVP_PKEY_free | 72 | .Fo EVP_PKEY_free |
75 | .Fa "EVP_PKEY *key" | 73 | .Fa "EVP_PKEY *key" |
76 | .Fc | 74 | .Fc |
77 | .ig | ||
78 | .Ft EVP_PKEY * | 75 | .Ft EVP_PKEY * |
79 | .Fo EVP_PKEY_new_CMAC_key | 76 | .Fo EVP_PKEY_new_CMAC_key |
80 | .Fa "ENGINE *e" | 77 | .Fa "ENGINE *e" |
@@ -82,7 +79,6 @@ | |||
82 | .Fa "size_t len" | 79 | .Fa "size_t len" |
83 | .Fa "const EVP_CIPHER *cipher" | 80 | .Fa "const EVP_CIPHER *cipher" |
84 | .Fc | 81 | .Fc |
85 | .. | ||
86 | .Ft EVP_PKEY * | 82 | .Ft EVP_PKEY * |
87 | .Fo EVP_PKEY_new_mac_key | 83 | .Fo EVP_PKEY_new_mac_key |
88 | .Fa "int type" | 84 | .Fa "int type" |
@@ -119,7 +115,6 @@ If | |||
119 | is a | 115 | is a |
120 | .Dv NULL | 116 | .Dv NULL |
121 | pointer, no action occurs. | 117 | pointer, no action occurs. |
122 | .ig | ||
123 | .Pp | 118 | .Pp |
124 | .Fn EVP_PKEY_new_CMAC_key | 119 | .Fn EVP_PKEY_new_CMAC_key |
125 | allocates a new | 120 | allocates a new |
@@ -146,7 +141,6 @@ specifies a cipher algorithm to be used during creation of the CMAC. | |||
146 | .Fa cipher | 141 | .Fa cipher |
147 | should be a standard encryption only cipher. | 142 | should be a standard encryption only cipher. |
148 | For example, AEAD and XTS ciphers should not be used. | 143 | For example, AEAD and XTS ciphers should not be used. |
149 | .. | ||
150 | .Pp | 144 | .Pp |
151 | .Fn EVP_PKEY_new_mac_key | 145 | .Fn EVP_PKEY_new_mac_key |
152 | allocates a new | 146 | allocates a new |
@@ -174,10 +168,8 @@ The length should be appropriate for the type of the key. | |||
174 | The public key data will be automatically derived from the given | 168 | The public key data will be automatically derived from the given |
175 | private key data (if appropriate for the algorithm type). | 169 | private key data (if appropriate for the algorithm type). |
176 | .Sh RETURN VALUES | 170 | .Sh RETURN VALUES |
177 | .Fn EVP_PKEY_new | 171 | .Fn EVP_PKEY_new , |
178 | .ig | ||
179 | .Fn EVP_PKEY_new_CMAC_key , | 172 | .Fn EVP_PKEY_new_CMAC_key , |
180 | .. | ||
181 | and | 173 | and |
182 | .Fn EVP_PKEY_new_mac_key | 174 | .Fn EVP_PKEY_new_mac_key |
183 | return either the newly allocated | 175 | return either the newly allocated |
@@ -189,9 +181,7 @@ if an error occurred. | |||
189 | .Fn EVP_PKEY_up_ref | 181 | .Fn EVP_PKEY_up_ref |
190 | returns 1 for success or 0 for failure. | 182 | returns 1 for success or 0 for failure. |
191 | .Sh SEE ALSO | 183 | .Sh SEE ALSO |
192 | .ig | ||
193 | .Xr CMAC_Init 3 , | 184 | .Xr CMAC_Init 3 , |
194 | .. | ||
195 | .Xr d2i_PrivateKey 3 , | 185 | .Xr d2i_PrivateKey 3 , |
196 | .Xr evp 3 , | 186 | .Xr evp 3 , |
197 | .Xr EVP_PKEY_asn1_new 3 , | 187 | .Xr EVP_PKEY_asn1_new 3 , |
@@ -207,12 +197,10 @@ and | |||
207 | .Fn EVP_PKEY_free | 197 | .Fn EVP_PKEY_free |
208 | first appeared in SSLeay 0.6.0 and have been available since | 198 | first appeared in SSLeay 0.6.0 and have been available since |
209 | .Ox 2.4 . | 199 | .Ox 2.4 . |
210 | .ig | ||
211 | .Pp | 200 | .Pp |
212 | .Fn EVP_PKEY_new_CMAC_key | 201 | .Fn EVP_PKEY_new_CMAC_key |
213 | first appeared in OpenSSL 1.1.1 and has been available since | 202 | first appeared in OpenSSL 1.1.1 and has been available since |
214 | .Ox 6.9 . | 203 | .Ox 6.9 . |
215 | .. | ||
216 | .Pp | 204 | .Pp |
217 | .Fn EVP_PKEY_new_mac_key | 205 | .Fn EVP_PKEY_new_mac_key |
218 | first appeared in OpenSSL 1.0.0 and has been available since | 206 | first appeared in OpenSSL 1.0.0 and has been available since |