diff options
author | schwarze <> | 2016-11-03 10:02:57 +0000 |
---|---|---|
committer | schwarze <> | 2016-11-03 10:02:57 +0000 |
commit | 05264184755e9ad926b368969ae307f8b4784f6e (patch) | |
tree | e46d47f822cc196cab18580b945e031bb59a4186 /src | |
parent | 4d607f17ea3eb38ed9f7703afd423f6055c686d4 (diff) | |
download | openbsd-05264184755e9ad926b368969ae307f8b4784f6e.tar.gz openbsd-05264184755e9ad926b368969ae307f8b4784f6e.tar.bz2 openbsd-05264184755e9ad926b368969ae307f8b4784f6e.zip |
convert HMAC and MD5 manuals from pod to mdoc
Diffstat (limited to 'src')
-rw-r--r-- | src/lib/libcrypto/doc/HMAC.pod | 106 | ||||
-rw-r--r-- | src/lib/libcrypto/doc/MD5.pod | 101 | ||||
-rw-r--r-- | src/lib/libcrypto/man/HMAC.3 | 206 | ||||
-rw-r--r-- | src/lib/libcrypto/man/MD5.3 | 184 | ||||
-rw-r--r-- | src/lib/libcrypto/man/Makefile | 6 |
5 files changed, 393 insertions, 210 deletions
diff --git a/src/lib/libcrypto/doc/HMAC.pod b/src/lib/libcrypto/doc/HMAC.pod deleted file mode 100644 index d92138d273..0000000000 --- a/src/lib/libcrypto/doc/HMAC.pod +++ /dev/null | |||
@@ -1,106 +0,0 @@ | |||
1 | =pod | ||
2 | |||
3 | =head1 NAME | ||
4 | |||
5 | HMAC, HMAC_Init, HMAC_Update, HMAC_Final, HMAC_cleanup - HMAC message | ||
6 | authentication code | ||
7 | |||
8 | =head1 SYNOPSIS | ||
9 | |||
10 | #include <openssl/hmac.h> | ||
11 | |||
12 | unsigned char *HMAC(const EVP_MD *evp_md, const void *key, | ||
13 | int key_len, const unsigned char *d, int n, | ||
14 | unsigned char *md, unsigned int *md_len); | ||
15 | |||
16 | void HMAC_CTX_init(HMAC_CTX *ctx); | ||
17 | |||
18 | int HMAC_Init(HMAC_CTX *ctx, const void *key, int key_len, | ||
19 | const EVP_MD *md); | ||
20 | int HMAC_Init_ex(HMAC_CTX *ctx, const void *key, int key_len, | ||
21 | const EVP_MD *md, ENGINE *impl); | ||
22 | int HMAC_Update(HMAC_CTX *ctx, const unsigned char *data, int len); | ||
23 | int HMAC_Final(HMAC_CTX *ctx, unsigned char *md, unsigned int *len); | ||
24 | |||
25 | void HMAC_CTX_cleanup(HMAC_CTX *ctx); | ||
26 | void HMAC_cleanup(HMAC_CTX *ctx); | ||
27 | |||
28 | =head1 DESCRIPTION | ||
29 | |||
30 | HMAC is a MAC (message authentication code), i.e. a keyed hash | ||
31 | function used for message authentication, which is based on a hash | ||
32 | function. | ||
33 | |||
34 | HMAC() computes the message authentication code of the B<n> bytes at | ||
35 | B<d> using the hash function B<evp_md> and the key B<key> which is | ||
36 | B<key_len> bytes long. | ||
37 | |||
38 | It places the result in B<md> (which must have space for the output of | ||
39 | the hash function, which is no more than B<EVP_MAX_MD_SIZE> bytes). | ||
40 | If B<md> is NULL, the digest is placed in a static array. The size of | ||
41 | the output is placed in B<md_len>, unless it is B<NULL>. | ||
42 | |||
43 | B<evp_md> can be EVP_sha1(), EVP_ripemd160() etc. | ||
44 | |||
45 | HMAC_CTX_init() initialises a B<HMAC_CTX> before first use. It must be | ||
46 | called. | ||
47 | |||
48 | HMAC_CTX_cleanup() erases the key and other data from the B<HMAC_CTX> | ||
49 | and releases any associated resources. It must be called when an | ||
50 | B<HMAC_CTX> is no longer required. | ||
51 | |||
52 | HMAC_cleanup() is an alias for HMAC_CTX_cleanup() included for back | ||
53 | compatibility with 0.9.6b, it is deprecated. | ||
54 | |||
55 | The following functions may be used if the message is not completely | ||
56 | stored in memory: | ||
57 | |||
58 | HMAC_Init() initializes a B<HMAC_CTX> structure to use the hash | ||
59 | function B<evp_md> and the key B<key> which is B<key_len> bytes | ||
60 | long. It is deprecated and only included for backward compatibility | ||
61 | with OpenSSL 0.9.6b. | ||
62 | |||
63 | HMAC_Init_ex() initializes or reuses a B<HMAC_CTX> structure to use | ||
64 | the function B<evp_md> and key B<key>. Either can be NULL, in which | ||
65 | case the existing one will be reused. HMAC_CTX_init() must have been | ||
66 | called before the first use of an B<HMAC_CTX> in this | ||
67 | function. B<N.B. HMAC_Init() had this undocumented behaviour in | ||
68 | previous versions of OpenSSL - failure to switch to HMAC_Init_ex() in | ||
69 | programs that expect it will cause them to stop working>. | ||
70 | |||
71 | HMAC_Update() can be called repeatedly with chunks of the message to | ||
72 | be authenticated (B<len> bytes at B<data>). | ||
73 | |||
74 | HMAC_Final() places the message authentication code in B<md>, which | ||
75 | must have space for the hash function output. | ||
76 | |||
77 | =head1 RETURN VALUES | ||
78 | |||
79 | HMAC() returns a pointer to the message authentication code or NULL if | ||
80 | an error occurred. | ||
81 | |||
82 | HMAC_Init_ex(), HMAC_Update() and HMAC_Final() return 1 for success or 0 if | ||
83 | an error occurred. | ||
84 | |||
85 | HMAC_CTX_init() and HMAC_CTX_cleanup() do not return values. | ||
86 | |||
87 | =head1 CONFORMING TO | ||
88 | |||
89 | RFC 2104 | ||
90 | |||
91 | =head1 SEE ALSO | ||
92 | |||
93 | L<sha(3)|sha(3)>, L<evp(3)|evp(3)> | ||
94 | |||
95 | =head1 HISTORY | ||
96 | |||
97 | HMAC(), HMAC_Init(), HMAC_Update(), HMAC_Final() and HMAC_cleanup() | ||
98 | are available since SSLeay 0.9.0. | ||
99 | |||
100 | HMAC_CTX_init(), HMAC_Init_ex() and HMAC_CTX_cleanup() are available | ||
101 | since OpenSSL 0.9.7. | ||
102 | |||
103 | HMAC_Init_ex(), HMAC_Update() and HMAC_Final() did not return values in | ||
104 | versions of OpenSSL before 1.0.0. | ||
105 | |||
106 | =cut | ||
diff --git a/src/lib/libcrypto/doc/MD5.pod b/src/lib/libcrypto/doc/MD5.pod deleted file mode 100644 index b0edd5416f..0000000000 --- a/src/lib/libcrypto/doc/MD5.pod +++ /dev/null | |||
@@ -1,101 +0,0 @@ | |||
1 | =pod | ||
2 | |||
3 | =head1 NAME | ||
4 | |||
5 | MD2, MD4, MD5, MD2_Init, MD2_Update, MD2_Final, MD4_Init, MD4_Update, | ||
6 | MD4_Final, MD5_Init, MD5_Update, MD5_Final - MD2, MD4, and MD5 hash functions | ||
7 | |||
8 | =head1 SYNOPSIS | ||
9 | |||
10 | #include <openssl/md2.h> | ||
11 | |||
12 | unsigned char *MD2(const unsigned char *d, unsigned long n, | ||
13 | unsigned char *md); | ||
14 | |||
15 | int MD2_Init(MD2_CTX *c); | ||
16 | int MD2_Update(MD2_CTX *c, const unsigned char *data, | ||
17 | unsigned long len); | ||
18 | int MD2_Final(unsigned char *md, MD2_CTX *c); | ||
19 | |||
20 | |||
21 | #include <openssl/md4.h> | ||
22 | |||
23 | unsigned char *MD4(const unsigned char *d, unsigned long n, | ||
24 | unsigned char *md); | ||
25 | |||
26 | int MD4_Init(MD4_CTX *c); | ||
27 | int MD4_Update(MD4_CTX *c, const void *data, | ||
28 | unsigned long len); | ||
29 | int MD4_Final(unsigned char *md, MD4_CTX *c); | ||
30 | |||
31 | |||
32 | #include <openssl/md5.h> | ||
33 | |||
34 | unsigned char *MD5(const unsigned char *d, unsigned long n, | ||
35 | unsigned char *md); | ||
36 | |||
37 | int MD5_Init(MD5_CTX *c); | ||
38 | int MD5_Update(MD5_CTX *c, const void *data, | ||
39 | unsigned long len); | ||
40 | int MD5_Final(unsigned char *md, MD5_CTX *c); | ||
41 | |||
42 | =head1 DESCRIPTION | ||
43 | |||
44 | MD2, MD4, and MD5 are cryptographic hash functions with a 128 bit output. | ||
45 | |||
46 | MD2(), MD4(), and MD5() compute the MD2, MD4, and MD5 message digest | ||
47 | of the B<n> bytes at B<d> and place it in B<md> (which must have space | ||
48 | for MD2_DIGEST_LENGTH == MD4_DIGEST_LENGTH == MD5_DIGEST_LENGTH == 16 | ||
49 | bytes of output). If B<md> is NULL, the digest is placed in a static | ||
50 | array. | ||
51 | |||
52 | The following functions may be used if the message is not completely | ||
53 | stored in memory: | ||
54 | |||
55 | MD2_Init() initializes a B<MD2_CTX> structure. | ||
56 | |||
57 | MD2_Update() can be called repeatedly with chunks of the message to | ||
58 | be hashed (B<len> bytes at B<data>). | ||
59 | |||
60 | MD2_Final() places the message digest in B<md>, which must have space | ||
61 | for MD2_DIGEST_LENGTH == 16 bytes of output, and erases the B<MD2_CTX>. | ||
62 | |||
63 | MD4_Init(), MD4_Update(), MD4_Final(), MD5_Init(), MD5_Update(), and | ||
64 | MD5_Final() are analogous using an B<MD4_CTX> and B<MD5_CTX> structure. | ||
65 | |||
66 | Applications should use the higher level functions | ||
67 | L<EVP_DigestInit(3)|EVP_DigestInit(3)> | ||
68 | etc. instead of calling the hash functions directly. | ||
69 | |||
70 | =head1 NOTE | ||
71 | |||
72 | MD2, MD4, and MD5 are recommended only for compatibility with existing | ||
73 | applications. In new applications, SHA-1 or RIPEMD-160 should be | ||
74 | preferred. | ||
75 | |||
76 | =head1 RETURN VALUES | ||
77 | |||
78 | MD2(), MD4(), and MD5() return pointers to the hash value. | ||
79 | |||
80 | MD2_Init(), MD2_Update(), MD2_Final(), MD4_Init(), MD4_Update(), | ||
81 | MD4_Final(), MD5_Init(), MD5_Update(), and MD5_Final() return 1 for | ||
82 | success, 0 otherwise. | ||
83 | |||
84 | =head1 CONFORMING TO | ||
85 | |||
86 | RFC 1319, RFC 1320, RFC 1321 | ||
87 | |||
88 | =head1 SEE ALSO | ||
89 | |||
90 | L<sha(3)|sha(3)>, L<ripemd(3)|ripemd(3)>, L<EVP_DigestInit(3)|EVP_DigestInit(3)> | ||
91 | |||
92 | =head1 HISTORY | ||
93 | |||
94 | MD2(), MD2_Init(), MD2_Update() MD2_Final(), MD5(), MD5_Init(), | ||
95 | MD5_Update() and MD5_Final() are available in all versions of SSLeay | ||
96 | and OpenSSL. | ||
97 | |||
98 | MD4(), MD4_Init(), and MD4_Update() are available in OpenSSL 0.9.6 and | ||
99 | above. | ||
100 | |||
101 | =cut | ||
diff --git a/src/lib/libcrypto/man/HMAC.3 b/src/lib/libcrypto/man/HMAC.3 new file mode 100644 index 0000000000..577070afb0 --- /dev/null +++ b/src/lib/libcrypto/man/HMAC.3 | |||
@@ -0,0 +1,206 @@ | |||
1 | .Dd $Mdocdate: November 3 2016 $ | ||
2 | .Dt HMAC 3 | ||
3 | .Os | ||
4 | .Sh NAME | ||
5 | .Nm HMAC , | ||
6 | .Nm HMAC_Init , | ||
7 | .Nm HMAC_Update , | ||
8 | .Nm HMAC_Final , | ||
9 | .Nm HMAC_cleanup | ||
10 | .Nd HMAC message authentication code | ||
11 | .Sh SYNOPSIS | ||
12 | .In openssl/hmac.h | ||
13 | .Ft unsigned char * | ||
14 | .Fo HMAC | ||
15 | .Fa "const EVP_MD *evp_md" | ||
16 | .Fa "const void *key" | ||
17 | .Fa "int key_len" | ||
18 | .Fa "const unsigned char *d" | ||
19 | .Fa "int n" | ||
20 | .Fa "unsigned char *md" | ||
21 | .Fa "unsigned int *md_len" | ||
22 | .Fc | ||
23 | .Ft void | ||
24 | .Fo HMAC_CTX_init | ||
25 | .Fa "HMAC_CTX *ctx" | ||
26 | .Fc | ||
27 | .Ft int | ||
28 | .Fo HMAC_Init | ||
29 | .Fa "HMAC_CTX *ctx" | ||
30 | .Fa "const void *key" | ||
31 | .Fa "int key_len" | ||
32 | .Fa "const EVP_MD *md" | ||
33 | .Fc | ||
34 | .Ft int | ||
35 | .Fo HMAC_Init_ex | ||
36 | .Fa "HMAC_CTX *ctx" | ||
37 | .Fa "const void *key" | ||
38 | .Fa "int key_len" | ||
39 | .Fa "const EVP_MD *md" | ||
40 | .Fa "ENGINE *impl" | ||
41 | .Fc | ||
42 | .Ft int | ||
43 | .Fo HMAC_Update | ||
44 | .Fa "HMAC_CTX *ctx" | ||
45 | .Fa "const unsigned char *data" | ||
46 | .Fa "int len" | ||
47 | .Fc | ||
48 | .Ft int | ||
49 | .Fo HMAC_Final | ||
50 | .Fa "HMAC_CTX *ctx" | ||
51 | .Fa "unsigned char *md" | ||
52 | .Fa "unsigned int *len" | ||
53 | .Fc | ||
54 | .Ft void | ||
55 | .Fo HMAC_CTX_cleanup | ||
56 | .Fa "HMAC_CTX *ctx" | ||
57 | .Fc | ||
58 | .Ft void | ||
59 | .Fo HMAC_cleanup | ||
60 | .Fa "HMAC_CTX *ctx" | ||
61 | .Fc | ||
62 | .Sh DESCRIPTION | ||
63 | HMAC is a MAC (message authentication code), i.e. a keyed hash | ||
64 | function used for message authentication, which is based on a hash | ||
65 | function. | ||
66 | .Pp | ||
67 | .Fn HMAC | ||
68 | computes the message authentication code of the | ||
69 | .Fa n | ||
70 | bytes at | ||
71 | .Fa d | ||
72 | using the hash function | ||
73 | .Fa evp_md | ||
74 | and the key | ||
75 | .Fa key | ||
76 | which is | ||
77 | .Fa key_len | ||
78 | bytes long. | ||
79 | .Pp | ||
80 | It places the result in | ||
81 | .Fa md , | ||
82 | which must have space for the output of the hash function, which is no | ||
83 | more than | ||
84 | .Dv EVP_MAX_MD_SIZE | ||
85 | bytes. | ||
86 | If | ||
87 | .Fa md | ||
88 | is | ||
89 | .Dv NULL , | ||
90 | the digest is placed in a static array. | ||
91 | The size of the output is placed in | ||
92 | .Fa md_len , | ||
93 | unless it is | ||
94 | .Dv NULL . | ||
95 | .Pp | ||
96 | .Fa evp_md | ||
97 | can be | ||
98 | .Xr EVP_sha1 3 , | ||
99 | .Xr EVP_ripemd160 3 , | ||
100 | etc. | ||
101 | .Pp | ||
102 | .Fn HMAC_CTX_init | ||
103 | initialises a | ||
104 | .Vt HMAC_CTX | ||
105 | before first use. | ||
106 | It must be called. | ||
107 | .Pp | ||
108 | .Fn HMAC_CTX_cleanup | ||
109 | erases the key and other data from the | ||
110 | .Vt HMAC_CTX | ||
111 | and releases any associated resources. | ||
112 | It must be called when an | ||
113 | .Vt HMAC_CTX | ||
114 | is no longer required. | ||
115 | .Pp | ||
116 | .Fn HMAC_cleanup | ||
117 | is an alias for | ||
118 | .Fn HMAC_CTX_cleanup | ||
119 | included for backward compatibility with 0.9.6b. | ||
120 | It is deprecated. | ||
121 | .Pp | ||
122 | The following functions may be used if the message is not completely | ||
123 | stored in memory: | ||
124 | .Pp | ||
125 | .Fn HMAC_Init | ||
126 | initializes a | ||
127 | .Vt HMAC_CTX | ||
128 | structure to use the hash function | ||
129 | .Fa evp_md | ||
130 | and the key | ||
131 | .Fa key | ||
132 | which is | ||
133 | .Fa key_len | ||
134 | bytes long. | ||
135 | It is deprecated and only included for backward compatibility with | ||
136 | OpenSSL 0.9.6b. | ||
137 | .Pp | ||
138 | .Fn HMAC_Init_ex | ||
139 | initializes or reuses a | ||
140 | .Vt HMAC_CTX | ||
141 | structure to use the function | ||
142 | .Fa evp_md | ||
143 | and key | ||
144 | .Fa key . | ||
145 | Either can be | ||
146 | .Dv NULL , | ||
147 | in which case the existing one will be reused. | ||
148 | .Fn HMAC_CTX_init | ||
149 | must have been called before the first use of an | ||
150 | .Vt HMAC_CTX | ||
151 | in this function. | ||
152 | .Sy N.B. | ||
153 | .Fn HMAC_Init | ||
154 | had this undocumented behaviour in previous versions of OpenSSL - | ||
155 | failure to switch to | ||
156 | .Fn HMAC_Init_ex | ||
157 | in programs that expect it will cause them to stop working. | ||
158 | .Pp | ||
159 | .Fn HMAC_Update | ||
160 | can be called repeatedly with chunks of the message to be authenticated | ||
161 | .Pq Fa len No bytes at Fa data . | ||
162 | .Pp | ||
163 | .Fn HMAC_Final | ||
164 | places the message authentication code in | ||
165 | .Fa md , | ||
166 | which must have space for the hash function output. | ||
167 | .Sh RETURN VALUES | ||
168 | .Fn HMAC | ||
169 | returns a pointer to the message authentication code or | ||
170 | .Dv NULL | ||
171 | if an error occurred. | ||
172 | .Pp | ||
173 | .Fn HMAC_Init_ex , | ||
174 | .Fn HMAC_Update , | ||
175 | and | ||
176 | .Fn HMAC_Final | ||
177 | return 1 for success or 0 if an error occurred. | ||
178 | .Pp | ||
179 | .Fn HMAC_CTX_init | ||
180 | and | ||
181 | .Fn HMAC_CTX_cleanup | ||
182 | do not return values. | ||
183 | .Sh SEE ALSO | ||
184 | .Xr evp 3 | ||
185 | .Sh STANDARDS | ||
186 | RFC 2104 | ||
187 | .Sh HISTORY | ||
188 | .Fn HMAC , | ||
189 | .Fn HMAC_Init , | ||
190 | .Fn HMAC_Update , | ||
191 | .Fn HMAC_Final , | ||
192 | and | ||
193 | .Fn HMAC_cleanup | ||
194 | are available since SSLeay 0.9.0. | ||
195 | .Pp | ||
196 | .Fn HMAC_CTX_init , | ||
197 | .Fn HMAC_Init_ex , | ||
198 | and | ||
199 | .Fn HMAC_CTX_cleanup | ||
200 | are available since OpenSSL 0.9.7. | ||
201 | .Pp | ||
202 | .Fn HMAC_Init_ex , | ||
203 | .Fn HMAC_Update , | ||
204 | and | ||
205 | .Fn HMAC_Final | ||
206 | did not return values in versions of OpenSSL before 1.0.0. | ||
diff --git a/src/lib/libcrypto/man/MD5.3 b/src/lib/libcrypto/man/MD5.3 new file mode 100644 index 0000000000..b0053c1acd --- /dev/null +++ b/src/lib/libcrypto/man/MD5.3 | |||
@@ -0,0 +1,184 @@ | |||
1 | .Dd $Mdocdate: November 3 2016 $ | ||
2 | .Dt MD5 3 | ||
3 | .Os | ||
4 | .Sh NAME | ||
5 | .Nm MD2 , | ||
6 | .Nm MD4 , | ||
7 | .Nm MD5 , | ||
8 | .Nm MD2_Init , | ||
9 | .Nm MD2_Update , | ||
10 | .Nm MD2_Final , | ||
11 | .Nm MD4_Init , | ||
12 | .Nm MD4_Update , | ||
13 | .Nm MD4_Final , | ||
14 | .Nm MD5_Init , | ||
15 | .Nm MD5_Update , | ||
16 | .Nm MD5_Final | ||
17 | .Nd MD2, MD4, and MD5 hash functions | ||
18 | .Sh SYNOPSIS | ||
19 | .In openssl/md2.h | ||
20 | .Ft unsigned char * | ||
21 | .Fo MD2 | ||
22 | .Fa "const unsigned char *d" | ||
23 | .Fa "unsigned long n" | ||
24 | .Fa "unsigned char *md" | ||
25 | .Fc | ||
26 | .Ft int | ||
27 | .Fo MD2_Init | ||
28 | .Fa "MD2_CTX *c" | ||
29 | .Fc | ||
30 | .Ft int | ||
31 | .Fo MD2_Update | ||
32 | .Fa "MD2_CTX *c" | ||
33 | .Fa "const unsigned char *data" | ||
34 | .Fa "unsigned long len" | ||
35 | .Fc | ||
36 | .Ft int | ||
37 | .Fo MD2_Final | ||
38 | .Fa "unsigned char *md" | ||
39 | .Fa "MD2_CTX *c" | ||
40 | .Fc | ||
41 | .In openssl/md4.h | ||
42 | .Ft unsigned char * | ||
43 | .Fo MD4 | ||
44 | .Fa "const unsigned char *d" | ||
45 | .Fa "unsigned long n" | ||
46 | .Fa "unsigned char *md" | ||
47 | .Fc | ||
48 | .Ft int | ||
49 | .Fo MD4_Init | ||
50 | .Fa "MD4_CTX *c" | ||
51 | .Fc | ||
52 | .Ft int | ||
53 | .Fo MD4_Update | ||
54 | .Fa "MD4_CTX *c" | ||
55 | .Fa "const void *data" | ||
56 | .Fa "unsigned long len" | ||
57 | .Fc | ||
58 | .Ft int | ||
59 | .Fo MD4_Final | ||
60 | .Fa "unsigned char *md" | ||
61 | .Fa "MD4_CTX *c" | ||
62 | .Fc | ||
63 | .In openssl/md5.h | ||
64 | .Ft unsigned char * | ||
65 | .Fo MD5 | ||
66 | .Fa "const unsigned char *d" | ||
67 | .Fa "unsigned long n" | ||
68 | .Fa "unsigned char *md" | ||
69 | .Fc | ||
70 | .Ft int | ||
71 | .Fo MD5_Init | ||
72 | .Fa "MD5_CTX *c" | ||
73 | .Fc | ||
74 | .Ft int | ||
75 | .Fo MD5_Update | ||
76 | .Fa "MD5_CTX *c" | ||
77 | .Fa "const void *data" | ||
78 | .Fa "unsigned long len" | ||
79 | .Fc | ||
80 | .Ft int | ||
81 | .Fo MD5_Final | ||
82 | .Fa "unsigned char *md" | ||
83 | .Fa "MD5_CTX *c" | ||
84 | .Fc | ||
85 | .Sh DESCRIPTION | ||
86 | MD2, MD4, and MD5 are cryptographic hash functions with a 128 bit | ||
87 | output. | ||
88 | .Pp | ||
89 | .Fn MD2 , | ||
90 | .Fn MD4 , | ||
91 | and | ||
92 | .Fn MD5 | ||
93 | compute the MD2, MD4, and MD5 message digest of the | ||
94 | .Fa n | ||
95 | bytes at | ||
96 | .Fa d | ||
97 | and place it in | ||
98 | .Fa md , | ||
99 | which must have space for | ||
100 | .Dv MD2_DIGEST_LENGTH No == | ||
101 | .Dv MD4_DIGEST_LENGTH No == | ||
102 | .Dv MD5_DIGEST_LENGTH No == 16 | ||
103 | bytes of output. | ||
104 | If | ||
105 | .Fa md | ||
106 | is | ||
107 | .Dv NULL , | ||
108 | the digest is placed in a static array. | ||
109 | .Pp | ||
110 | The following functions may be used if the message is not completely | ||
111 | stored in memory: | ||
112 | .Pp | ||
113 | .Fn MD2_Init | ||
114 | initializes a | ||
115 | .Vt MD2_CTX | ||
116 | structure. | ||
117 | .Pp | ||
118 | .Fn MD2_Update | ||
119 | can be called repeatedly with chunks of the message to be hashed | ||
120 | .Pq Fa len No bytes at Fa data . | ||
121 | .Pp | ||
122 | .Fn MD2_Final | ||
123 | places the message digest in | ||
124 | .Fa md , | ||
125 | which must have space for | ||
126 | .Dv MD2_DIGEST_LENGTH No == 16 | ||
127 | bytes of output, and erases the | ||
128 | .Vt MD2_CTX . | ||
129 | .Pp | ||
130 | .Fn MD4_Init , | ||
131 | .Fn MD4_Update , | ||
132 | .Fn MD4_Final , | ||
133 | .Fn MD5_Init , | ||
134 | .Fn MD5_Update , | ||
135 | and | ||
136 | .Fn MD5_Final | ||
137 | are analogous using an | ||
138 | .Vt MD4_CTX | ||
139 | and | ||
140 | .Vt MD5_CTX | ||
141 | structure. | ||
142 | .Pp | ||
143 | Applications should use the higher level functions | ||
144 | .Xr EVP_DigestInit 3 | ||
145 | etc. instead of calling these hash functions directly. | ||
146 | .Sh RETURN VALUES | ||
147 | .Fn MD2 , | ||
148 | .Fn MD4 , | ||
149 | and | ||
150 | .Fn MD5 | ||
151 | return pointers to the hash value. | ||
152 | .Pp | ||
153 | .Fn MD2_Init , | ||
154 | .Fn MD2_Update , | ||
155 | .Fn MD2_Final , | ||
156 | .Fn MD4_Init , | ||
157 | .Fn MD4_Update , | ||
158 | .Fn MD4_Final , | ||
159 | .Fn MD5_Init , | ||
160 | .Fn MD5_Update , | ||
161 | and | ||
162 | .Fn MD5_Final | ||
163 | return 1 for success or 0 otherwise. | ||
164 | .Sh SEE ALSO | ||
165 | .Xr EVP_DigestInit 3 | ||
166 | .Sh STANDARDS | ||
167 | RFC 1319, RFC 1320, RFC 1321 | ||
168 | .Sh HISTORY | ||
169 | .Fn MD2 , | ||
170 | .Fn MD2_Init , | ||
171 | .Fn MD2_Update , | ||
172 | .Fn MD2_Final , | ||
173 | .Fn MD5 , | ||
174 | .Fn MD5_Init , | ||
175 | .Fn MD5_Update , | ||
176 | and | ||
177 | .Fn MD5_Final | ||
178 | are available in all versions of SSLeay and OpenSSL. | ||
179 | .Pp | ||
180 | .Fn MD4 , | ||
181 | .Fn MD4_Init , | ||
182 | and | ||
183 | .Fn MD4_Update | ||
184 | are available in OpenSSL 0.9.6 and above. | ||
diff --git a/src/lib/libcrypto/man/Makefile b/src/lib/libcrypto/man/Makefile index f4fd152ff7..1989a25092 100644 --- a/src/lib/libcrypto/man/Makefile +++ b/src/lib/libcrypto/man/Makefile | |||
@@ -1,4 +1,4 @@ | |||
1 | # $OpenBSD: Makefile,v 1.38 2016/11/03 09:35:34 schwarze Exp $ | 1 | # $OpenBSD: Makefile,v 1.39 2016/11/03 10:02:57 schwarze Exp $ |
2 | 2 | ||
3 | .include <bsd.own.mk> # for NOMAN | 3 | .include <bsd.own.mk> # for NOMAN |
4 | 4 | ||
@@ -115,6 +115,8 @@ MAN= \ | |||
115 | EVP_SealInit.3 \ | 115 | EVP_SealInit.3 \ |
116 | EVP_SignInit.3 \ | 116 | EVP_SignInit.3 \ |
117 | EVP_VerifyInit.3 \ | 117 | EVP_VerifyInit.3 \ |
118 | HMAC.3 \ | ||
119 | MD5.3 \ | ||
118 | UI_new.3 \ | 120 | UI_new.3 \ |
119 | bn_dump.3 \ | 121 | bn_dump.3 \ |
120 | crypto.3 \ | 122 | crypto.3 \ |
@@ -124,8 +126,6 @@ MAN= \ | |||
124 | lh_new.3 \ | 126 | lh_new.3 \ |
125 | 127 | ||
126 | GENMAN= \ | 128 | GENMAN= \ |
127 | HMAC.3 \ | ||
128 | MD5.3 \ | ||
129 | OBJ_nid2obj.3 \ | 129 | OBJ_nid2obj.3 \ |
130 | OPENSSL_VERSION_NUMBER.3 \ | 130 | OPENSSL_VERSION_NUMBER.3 \ |
131 | OPENSSL_config.3 \ | 131 | OPENSSL_config.3 \ |