diff options
author | schwarze <> | 2024-12-06 12:51:13 +0000 |
---|---|---|
committer | schwarze <> | 2024-12-06 12:51:13 +0000 |
commit | 1f4a0f25fae63c118c3bfa63b3a130d45c788288 (patch) | |
tree | a723342983f4f053624289df9ff99b8a53ae1334 /src | |
parent | d8f769ca48f14cb8455dfa8f2334c3c683502fe4 (diff) | |
download | openbsd-1f4a0f25fae63c118c3bfa63b3a130d45c788288.tar.gz openbsd-1f4a0f25fae63c118c3bfa63b3a130d45c788288.tar.bz2 openbsd-1f4a0f25fae63c118c3bfa63b3a130d45c788288.zip |
Delete the manual page EVP_PKEY_asn1_new(3).
All the functions documented in this page were deleted from the API
by tb@ in evp.h rev. 1.126 on March 2 this year.
Diffstat (limited to 'src')
-rw-r--r-- | src/lib/libcrypto/man/ASN1_item_sign.3 | 12 | ||||
-rw-r--r-- | src/lib/libcrypto/man/EVP_PKEY_asn1_get_count.3 | 17 | ||||
-rw-r--r-- | src/lib/libcrypto/man/EVP_PKEY_asn1_new.3 | 502 | ||||
-rw-r--r-- | src/lib/libcrypto/man/EVP_PKEY_cmp.3 | 5 | ||||
-rw-r--r-- | src/lib/libcrypto/man/EVP_PKEY_get_default_digest_nid.3 | 5 | ||||
-rw-r--r-- | src/lib/libcrypto/man/EVP_PKEY_new.3 | 5 | ||||
-rw-r--r-- | src/lib/libcrypto/man/EVP_PKEY_print_private.3 | 5 | ||||
-rw-r--r-- | src/lib/libcrypto/man/EVP_PKEY_size.3 | 18 | ||||
-rw-r--r-- | src/lib/libcrypto/man/EVP_SignInit.3 | 5 | ||||
-rw-r--r-- | src/lib/libcrypto/man/Makefile | 3 | ||||
-rw-r--r-- | src/lib/libcrypto/man/PKCS8_PRIV_KEY_INFO_new.3 | 5 | ||||
-rw-r--r-- | src/lib/libcrypto/man/X509_PUBKEY_new.3 | 5 | ||||
-rw-r--r-- | src/lib/libcrypto/man/X509_signature_dump.3 | 6 | ||||
-rw-r--r-- | src/lib/libcrypto/man/evp.3 | 3 |
14 files changed, 30 insertions, 566 deletions
diff --git a/src/lib/libcrypto/man/ASN1_item_sign.3 b/src/lib/libcrypto/man/ASN1_item_sign.3 index b47fd1d04d..8c09fe77ff 100644 --- a/src/lib/libcrypto/man/ASN1_item_sign.3 +++ b/src/lib/libcrypto/man/ASN1_item_sign.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: ASN1_item_sign.3,v 1.2 2021/12/18 17:47:44 schwarze Exp $ | 1 | .\" $OpenBSD: ASN1_item_sign.3,v 1.3 2024/12/06 12:51:13 schwarze Exp $ |
2 | .\" | 2 | .\" |
3 | .\" Copyright (c) 2021 Ingo Schwarze <schwarze@openbsd.org> | 3 | .\" Copyright (c) 2021 Ingo Schwarze <schwarze@openbsd.org> |
4 | .\" | 4 | .\" |
@@ -14,7 +14,7 @@ | |||
14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | 14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF |
15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | 15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
16 | .\" | 16 | .\" |
17 | .Dd $Mdocdate: December 18 2021 $ | 17 | .Dd $Mdocdate: December 6 2024 $ |
18 | .Dt ASN1_ITEM_SIGN 3 | 18 | .Dt ASN1_ITEM_SIGN 3 |
19 | .Os | 19 | .Os |
20 | .Sh NAME | 20 | .Sh NAME |
@@ -91,12 +91,6 @@ Unless | |||
91 | is | 91 | is |
92 | .Dv NULL , | 92 | .Dv NULL , |
93 | the same data is copied into it. | 93 | the same data is copied into it. |
94 | .\" The following is not yet supported by LibreSSL | ||
95 | .\" because we do not provide EVP_PKEY_asn1_set_item(3). | ||
96 | .\" except that user-defined key types set up with | ||
97 | .\" .Xr EVP_PKEY_asn1_new 3 | ||
98 | .\" may optionally provide information about a second algorithm in | ||
99 | .\" .Fa algor2 . | ||
100 | .Sh RETURN VALUES | 94 | .Sh RETURN VALUES |
101 | These functions return the length of the signature in bytes | 95 | These functions return the length of the signature in bytes |
102 | or 0 if memory allocation, encoding, or signing fails. | 96 | or 0 if memory allocation, encoding, or signing fails. |
@@ -113,8 +107,6 @@ is not fully initialized. | |||
113 | .Xr EVP_Digest 3 , | 107 | .Xr EVP_Digest 3 , |
114 | .Xr EVP_DigestSign 3 , | 108 | .Xr EVP_DigestSign 3 , |
115 | .Xr EVP_MD_CTX_new 3 , | 109 | .Xr EVP_MD_CTX_new 3 , |
116 | .\" We do not provide EVP_PKEY_asn1_set_item(3). | ||
117 | .\" .Xr EVP_PKEY_asn1_new 3 , | ||
118 | .Xr EVP_PKEY_new 3 , | 110 | .Xr EVP_PKEY_new 3 , |
119 | .Xr OBJ_find_sigid_by_algs 3 , | 111 | .Xr OBJ_find_sigid_by_algs 3 , |
120 | .Xr X509_ALGOR_new 3 | 112 | .Xr X509_ALGOR_new 3 |
diff --git a/src/lib/libcrypto/man/EVP_PKEY_asn1_get_count.3 b/src/lib/libcrypto/man/EVP_PKEY_asn1_get_count.3 index 6e6c25e253..f7810789b6 100644 --- a/src/lib/libcrypto/man/EVP_PKEY_asn1_get_count.3 +++ b/src/lib/libcrypto/man/EVP_PKEY_asn1_get_count.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: EVP_PKEY_asn1_get_count.3,v 1.9 2024/07/21 08:36:43 tb Exp $ | 1 | .\" $OpenBSD: EVP_PKEY_asn1_get_count.3,v 1.10 2024/12/06 12:51:13 schwarze Exp $ |
2 | .\" full merge up to: OpenSSL 72a7a702 Feb 26 14:05:09 2019 +0000 | 2 | .\" full merge up to: OpenSSL 72a7a702 Feb 26 14:05:09 2019 +0000 |
3 | .\" | 3 | .\" |
4 | .\" This file is a derived work. | 4 | .\" This file is a derived work. |
@@ -65,7 +65,7 @@ | |||
65 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 65 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
66 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 66 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
67 | .\" | 67 | .\" |
68 | .Dd $Mdocdate: July 21 2024 $ | 68 | .Dd $Mdocdate: December 6 2024 $ |
69 | .Dt EVP_PKEY_ASN1_GET_COUNT 3 | 69 | .Dt EVP_PKEY_ASN1_GET_COUNT 3 |
70 | .Os | 70 | .Os |
71 | .Sh NAME | 71 | .Sh NAME |
@@ -185,16 +185,10 @@ object and will never be returned from | |||
185 | or | 185 | or |
186 | .Fn EVP_PKEY_asn1_find_str . | 186 | .Fn EVP_PKEY_asn1_find_str . |
187 | .It Dv ASN1_PKEY_DYNAMIC | 187 | .It Dv ASN1_PKEY_DYNAMIC |
188 | This | 188 | This flag is unused. |
189 | It could formerly be used to mark an | ||
189 | .Fa ameth | 190 | .Fa ameth |
190 | object is marked as dynamically allocated. | 191 | object as dynamically allocated. |
191 | If this flag is set, | ||
192 | .Xr EVP_PKEY_asn1_free 3 | ||
193 | can free | ||
194 | .Fa ameth ; | ||
195 | otherwise, | ||
196 | .Xr EVP_PKEY_asn1_free 3 | ||
197 | has no effect on it. | ||
198 | .It Dv ASN1_PKEY_SIGPARAM_NULL | 192 | .It Dv ASN1_PKEY_SIGPARAM_NULL |
199 | If the signing | 193 | If the signing |
200 | .Fa ctx | 194 | .Fa ctx |
@@ -240,7 +234,6 @@ if no match is found. | |||
240 | .Fn EVP_PKEY_asn1_get0_info | 234 | .Fn EVP_PKEY_asn1_get0_info |
241 | returns 1 on success or 0 on failure. | 235 | returns 1 on success or 0 on failure. |
242 | .Sh SEE ALSO | 236 | .Sh SEE ALSO |
243 | .Xr EVP_PKEY_asn1_new 3 , | ||
244 | .Xr EVP_PKEY_base_id 3 , | 237 | .Xr EVP_PKEY_base_id 3 , |
245 | .Xr EVP_PKEY_new 3 | 238 | .Xr EVP_PKEY_new 3 |
246 | .Sh HISTORY | 239 | .Sh HISTORY |
diff --git a/src/lib/libcrypto/man/EVP_PKEY_asn1_new.3 b/src/lib/libcrypto/man/EVP_PKEY_asn1_new.3 deleted file mode 100644 index e7a987861e..0000000000 --- a/src/lib/libcrypto/man/EVP_PKEY_asn1_new.3 +++ /dev/null | |||
@@ -1,502 +0,0 @@ | |||
1 | .\" $OpenBSD: EVP_PKEY_asn1_new.3,v 1.12 2024/12/05 15:06:27 schwarze Exp $ | ||
2 | .\" selective merge up to: | ||
3 | .\" OpenSSL man3/EVP_PKEY_ASN1_METHOD b0004708 Nov 1 00:45:24 2017 +0800 | ||
4 | .\" | ||
5 | .\" This file is a derived work. | ||
6 | .\" The changes are covered by the following Copyright and license: | ||
7 | .\" | ||
8 | .\" Copyright (c) 2023 Ingo Schwarze <schwarze@openbsd.org> | ||
9 | .\" | ||
10 | .\" Permission to use, copy, modify, and distribute this software for any | ||
11 | .\" purpose with or without fee is hereby granted, provided that the above | ||
12 | .\" copyright notice and this permission notice appear in all copies. | ||
13 | .\" | ||
14 | .\" THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES | ||
15 | .\" WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF | ||
16 | .\" MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR | ||
17 | .\" ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES | ||
18 | .\" WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN | ||
19 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | ||
20 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | ||
21 | .\" | ||
22 | .\" The original file was written by Richard Levitte <levitte@openssl.org> | ||
23 | .\" and Paul Yang <yang.yang@baishancloud.com>. | ||
24 | .\" Copyright (c) 2017 The OpenSSL Project. All rights reserved. | ||
25 | .\" | ||
26 | .\" Redistribution and use in source and binary forms, with or without | ||
27 | .\" modification, are permitted provided that the following conditions | ||
28 | .\" are met: | ||
29 | .\" | ||
30 | .\" 1. Redistributions of source code must retain the above copyright | ||
31 | .\" notice, this list of conditions and the following disclaimer. | ||
32 | .\" | ||
33 | .\" 2. Redistributions in binary form must reproduce the above copyright | ||
34 | .\" notice, this list of conditions and the following disclaimer in | ||
35 | .\" the documentation and/or other materials provided with the | ||
36 | .\" distribution. | ||
37 | .\" | ||
38 | .\" 3. All advertising materials mentioning features or use of this | ||
39 | .\" software must display the following acknowledgment: | ||
40 | .\" "This product includes software developed by the OpenSSL Project | ||
41 | .\" for use in the OpenSSL Toolkit. (http://www.openssl.org/)" | ||
42 | .\" | ||
43 | .\" 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to | ||
44 | .\" endorse or promote products derived from this software without | ||
45 | .\" prior written permission. For written permission, please contact | ||
46 | .\" openssl-core@openssl.org. | ||
47 | .\" | ||
48 | .\" 5. Products derived from this software may not be called "OpenSSL" | ||
49 | .\" nor may "OpenSSL" appear in their names without prior written | ||
50 | .\" permission of the OpenSSL Project. | ||
51 | .\" | ||
52 | .\" 6. Redistributions of any form whatsoever must retain the following | ||
53 | .\" acknowledgment: | ||
54 | .\" "This product includes software developed by the OpenSSL Project | ||
55 | .\" for use in the OpenSSL Toolkit (http://www.openssl.org/)" | ||
56 | .\" | ||
57 | .\" THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY | ||
58 | .\" EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | ||
59 | .\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR | ||
60 | .\" PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR | ||
61 | .\" ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, | ||
62 | .\" SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT | ||
63 | .\" NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; | ||
64 | .\" LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | ||
65 | .\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, | ||
66 | .\" STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) | ||
67 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | ||
68 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | ||
69 | .\" | ||
70 | .Dd $Mdocdate: December 5 2024 $ | ||
71 | .Dt EVP_PKEY_ASN1_NEW 3 | ||
72 | .Os | ||
73 | .Sh NAME | ||
74 | .\" .Nm EVP_PKEY_asn1_add0 and | ||
75 | .\" .Nm EVP_PKEY_asn1_add_alias are intentionally undocumented | ||
76 | .\" because they will be removed in the next major bump | ||
77 | .Nm EVP_PKEY_asn1_new , | ||
78 | .Nm EVP_PKEY_asn1_copy , | ||
79 | .Nm EVP_PKEY_asn1_free , | ||
80 | .Nm EVP_PKEY_asn1_set_public , | ||
81 | .Nm EVP_PKEY_asn1_set_private , | ||
82 | .Nm EVP_PKEY_asn1_set_param , | ||
83 | .Nm EVP_PKEY_asn1_set_free , | ||
84 | .Nm EVP_PKEY_asn1_set_ctrl , | ||
85 | .Nm EVP_PKEY_asn1_set_check , | ||
86 | .Nm EVP_PKEY_asn1_set_public_check , | ||
87 | .Nm EVP_PKEY_asn1_set_param_check , | ||
88 | .Nm EVP_PKEY_asn1_set_security_bits | ||
89 | .Nd manipulating and registering an EVP_PKEY_ASN1_METHOD structure | ||
90 | .Sh SYNOPSIS | ||
91 | .In openssl/evp.h | ||
92 | .Ft EVP_PKEY_ASN1_METHOD * | ||
93 | .Fo EVP_PKEY_asn1_new | ||
94 | .Fa "int id" | ||
95 | .Fa "int flags" | ||
96 | .Fa "const char *pem_str" | ||
97 | .Fa "const char *info" | ||
98 | .Fc | ||
99 | .Ft void | ||
100 | .Fo EVP_PKEY_asn1_copy | ||
101 | .Fa "EVP_PKEY_ASN1_METHOD *dst" | ||
102 | .Fa "const EVP_PKEY_ASN1_METHOD *src" | ||
103 | .Fc | ||
104 | .Ft void | ||
105 | .Fo EVP_PKEY_asn1_free | ||
106 | .Fa "EVP_PKEY_ASN1_METHOD *ameth" | ||
107 | .Fc | ||
108 | .Ft void | ||
109 | .Fo EVP_PKEY_asn1_set_public | ||
110 | .Fa "EVP_PKEY_ASN1_METHOD *ameth" | ||
111 | .Fa "int (*pub_decode)(EVP_PKEY *pk, X509_PUBKEY *pub)" | ||
112 | .Fa "int (*pub_encode)(X509_PUBKEY *pub, const EVP_PKEY *pk)" | ||
113 | .Fa "int (*pub_cmp)(const EVP_PKEY *a, const EVP_PKEY *b)" | ||
114 | .Fa "int (*pub_print)(BIO *out, const EVP_PKEY *pkey, int indent,\ | ||
115 | ASN1_PCTX *pctx)" | ||
116 | .Fa "int (*pkey_size)(const EVP_PKEY *pk)" | ||
117 | .Fa "int (*pkey_bits)(const EVP_PKEY *pk)" | ||
118 | .Fc | ||
119 | .Ft void | ||
120 | .Fo EVP_PKEY_asn1_set_private | ||
121 | .Fa "EVP_PKEY_ASN1_METHOD *ameth" | ||
122 | .Fa "int (*priv_decode)(EVP_PKEY *pk, const PKCS8_PRIV_KEY_INFO *p8inf)" | ||
123 | .Fa "int (*priv_encode)(PKCS8_PRIV_KEY_INFO *p8, const EVP_PKEY *pk)" | ||
124 | .Fa "int (*priv_print)(BIO *out, const EVP_PKEY *pkey, int indent,\ | ||
125 | ASN1_PCTX *pctx)" | ||
126 | .Fc | ||
127 | .Ft void | ||
128 | .Fo EVP_PKEY_asn1_set_param | ||
129 | .Fa "EVP_PKEY_ASN1_METHOD *ameth" | ||
130 | .Fa "int (*param_decode)(EVP_PKEY *pkey, const unsigned char **pder,\ | ||
131 | int derlen)" | ||
132 | .Fa "int (*param_encode)(const EVP_PKEY *pkey, unsigned char **pder)" | ||
133 | .Fa "int (*param_missing)(const EVP_PKEY *pk)" | ||
134 | .Fa "int (*param_copy)(EVP_PKEY *to, const EVP_PKEY *from)" | ||
135 | .Fa "int (*param_cmp)(const EVP_PKEY *a, const EVP_PKEY *b)" | ||
136 | .Fa "int (*param_print)(BIO *out, const EVP_PKEY *pkey, int indent,\ | ||
137 | ASN1_PCTX *pctx)" | ||
138 | .Fc | ||
139 | .Ft void | ||
140 | .Fo EVP_PKEY_asn1_set_free | ||
141 | .Fa "EVP_PKEY_ASN1_METHOD *ameth" | ||
142 | .Fa "void (*pkey_free)(EVP_PKEY *pkey)" | ||
143 | .Fc | ||
144 | .Ft void | ||
145 | .Fo EVP_PKEY_asn1_set_ctrl | ||
146 | .Fa "EVP_PKEY_ASN1_METHOD *ameth" | ||
147 | .Fa "int (*pkey_ctrl)(EVP_PKEY *pkey, int op, long arg1, void *arg2)" | ||
148 | .Fc | ||
149 | .Ft void | ||
150 | .Fo EVP_PKEY_asn1_set_check | ||
151 | .Fa "EVP_PKEY_ASN1_METHOD *ameth" | ||
152 | .Fa "int (*pkey_check)(const EVP_PKEY *pk)" | ||
153 | .Fc | ||
154 | .Ft void | ||
155 | .Fo EVP_PKEY_asn1_set_public_check | ||
156 | .Fa "EVP_PKEY_ASN1_METHOD *ameth" | ||
157 | .Fa "int (*pkey_public_check)(const EVP_PKEY *pk)" | ||
158 | .Fc | ||
159 | .Ft void | ||
160 | .Fo EVP_PKEY_asn1_set_param_check | ||
161 | .Fa "EVP_PKEY_ASN1_METHOD *ameth" | ||
162 | .Fa "int (*pkey_param_check)(const EVP_PKEY *pk)" | ||
163 | .Fc | ||
164 | .Ft void | ||
165 | .Fo EVP_PKEY_asn1_set_security_bits | ||
166 | .Fa "EVP_PKEY_ASN1_METHOD *ameth" | ||
167 | .Fa "int (*pkey_security_bits)(const EVP_PKEY *pkey)" | ||
168 | .Fc | ||
169 | .Sh DESCRIPTION | ||
170 | .Vt EVP_PKEY_ASN1_METHOD | ||
171 | is a structure which holds a set of ASN.1 conversion, printing and | ||
172 | information methods for a specific public key algorithm. | ||
173 | .Pp | ||
174 | The built-in | ||
175 | .Vt EVP_PKEY_ASN1_METHOD | ||
176 | objects are stored in a table containing the standard | ||
177 | methods for different algorithms. | ||
178 | .Ss Methods | ||
179 | The methods are the underlying implementations of a particular public | ||
180 | key algorithm present by the | ||
181 | .Vt EVP_PKEY | ||
182 | object. | ||
183 | .Bd -unfilled | ||
184 | .Ft int Fn (*pub_decode) "EVP_PKEY *pk" "X509_PUBKEY *pub" | ||
185 | .Ft int Fn (*pub_encode) "X509_PUBKEY *pub" "const EVP_PKEY *pk" | ||
186 | .Ed | ||
187 | .Pp | ||
188 | Decode and encode | ||
189 | .Vt X509_PUBKEY | ||
190 | ASN.1 parameters to and from | ||
191 | .Fa pk . | ||
192 | These methods must return 0 on error and 1 on success. | ||
193 | They are called by | ||
194 | .Xr X509_PUBKEY_get 3 | ||
195 | and | ||
196 | .Xr X509_PUBKEY_set 3 . | ||
197 | .Bd -unfilled | ||
198 | .Ft int Fn (*pub_cmp) "const EVP_PKEY *a" "const EVP_PKEY *b" | ||
199 | .Ed | ||
200 | .Pp | ||
201 | Compare two public keys. | ||
202 | This method must return 1 when the keys are equal and 0 otherwise. | ||
203 | It is called by | ||
204 | .Xr EVP_PKEY_cmp 3 . | ||
205 | .Bd -filled | ||
206 | .Ft int Fo (*pub_print) | ||
207 | .Fa "BIO *out" | ||
208 | .Fa "const EVP_PKEY *pkey" | ||
209 | .Fa "int indent" | ||
210 | .Fa "ASN1_PCTX *pctx" | ||
211 | .Fc | ||
212 | .Ed | ||
213 | .Pp | ||
214 | Print a public key in humanly readable text to | ||
215 | .Fa out , | ||
216 | indented | ||
217 | .Fa indent | ||
218 | spaces. | ||
219 | This method must return 0 on error and 1 on success. | ||
220 | It is called by | ||
221 | .Xr EVP_PKEY_print_public 3 . | ||
222 | .Bd -unfilled | ||
223 | .Ft int Fn (*priv_decode) "EVP_PKEY *pk" "const PKCS8_PRIV_KEY_INFO *p8inf" | ||
224 | .Ft int Fn (*priv_encode) "PKCS8_PRIV_KEY_INFO *p8" "const EVP_PKEY *pk" | ||
225 | .Ed | ||
226 | .Pp | ||
227 | Decode and encode | ||
228 | .Vt PKCS8_PRIV_KEY_INFO | ||
229 | form private key to and from | ||
230 | .Fa pk . | ||
231 | These methods must return 0 on error, 1 on success. | ||
232 | They are called by | ||
233 | .Xr EVP_PKCS82PKEY 3 | ||
234 | and | ||
235 | .Xr EVP_PKEY2PKCS8 3 . | ||
236 | .Bd -filled | ||
237 | .Ft int Fo (*priv_print) | ||
238 | .Fa "BIO *out" | ||
239 | .Fa "const EVP_PKEY *pkey" | ||
240 | .Fa "int indent" | ||
241 | .Fa "ASN1_PCTX *pctx" | ||
242 | .Fc | ||
243 | .Ed | ||
244 | .Pp | ||
245 | Print a private key in humanly readable text to | ||
246 | .Fa out , | ||
247 | indented | ||
248 | .Fa indent | ||
249 | spaces. | ||
250 | This method must return 0 on error and 1 on success. | ||
251 | It is called by | ||
252 | .Xr EVP_PKEY_print_private 3 . | ||
253 | .Bd -unfilled | ||
254 | .Ft int Fn (*pkey_size) "const EVP_PKEY *pk" | ||
255 | .Ed | ||
256 | .Pp | ||
257 | Returns the key size in bytes. | ||
258 | This method is called by | ||
259 | .Xr EVP_PKEY_size 3 . | ||
260 | .Bd -unfilled | ||
261 | .Ft int Fn (*pkey_bits) "const EVP_PKEY *pk" | ||
262 | .Ed | ||
263 | .Pp | ||
264 | Returns the key size in bits. | ||
265 | This method is called by | ||
266 | .Xr EVP_PKEY_bits 3 . | ||
267 | .Bd -filled | ||
268 | .Ft int Fo (*param_decode) | ||
269 | .Fa "EVP_PKEY *pkey" | ||
270 | .Fa "const unsigned char **pder" | ||
271 | .Fa "int derlen" | ||
272 | .Fc | ||
273 | .br | ||
274 | .Ft int Fo (*param_encode) | ||
275 | .Fa "const EVP_PKEY *pkey" | ||
276 | .Fa "unsigned char **pder" | ||
277 | .Fc | ||
278 | .Ed | ||
279 | .Pp | ||
280 | Decode and encode DER formatted parameters to and from | ||
281 | .Fa pk . | ||
282 | These methods must return 0 on error and 1 on success. | ||
283 | They are called by | ||
284 | .Fn PEM_read_bio_Parameters . | ||
285 | .Bd -unfilled | ||
286 | .Ft int Fn (*param_missing) "const EVP_PKEY *pk" | ||
287 | .Ed | ||
288 | .Pp | ||
289 | Return 0 if a key parameter is missing or 1 otherwise. | ||
290 | This method is called by | ||
291 | .Xr EVP_PKEY_missing_parameters 3 . | ||
292 | .Bd -unfilled | ||
293 | .Ft int Fn (*param_copy) "EVP_PKEY *to" "const EVP_PKEY *from" | ||
294 | .Ed | ||
295 | .Pp | ||
296 | Copy key parameters from | ||
297 | .Fa from | ||
298 | to | ||
299 | .Fa to . | ||
300 | This method must return 0 on error and 1 on success. | ||
301 | It is called by | ||
302 | .Xr EVP_PKEY_copy_parameters 3 . | ||
303 | .Bd -unfilled | ||
304 | .Ft int Fn (*param_cmp) "const EVP_PKEY *a" "const EVP_PKEY *b" | ||
305 | .Ed | ||
306 | .Pp | ||
307 | Compare the parameters of the keys | ||
308 | .Fa a | ||
309 | and | ||
310 | .Fa b . | ||
311 | This method must return 1 when the keys are equal, 0 when not equal, and a | ||
312 | negative number on error. | ||
313 | It is called by | ||
314 | .Xr EVP_PKEY_cmp_parameters 3 . | ||
315 | .Bd -filled | ||
316 | .Ft int Fo (*param_print) | ||
317 | .Fa "BIO *out" | ||
318 | .Fa "const EVP_PKEY *pkey" | ||
319 | .Fa "int indent" | ||
320 | .Fa "ASN1_PCTX *pctx" | ||
321 | .Fc | ||
322 | .Ed | ||
323 | .Pp | ||
324 | Print the private key parameters in humanly readable text to | ||
325 | .Fa out , | ||
326 | indented | ||
327 | .Fa indent | ||
328 | spaces. | ||
329 | This method must return 0 on error and 1 on success. | ||
330 | It is called by | ||
331 | .Xr EVP_PKEY_print_params 3 . | ||
332 | .Bd -unfilled | ||
333 | .Ft void Fn (*pkey_free) "EVP_PKEY *pkey" | ||
334 | .Ed | ||
335 | .Pp | ||
336 | Free the internals of | ||
337 | .Fa pkey . | ||
338 | This method is called by | ||
339 | .Xr EVP_PKEY_free 3 , | ||
340 | .Xr EVP_PKEY_set_type 3 , | ||
341 | .Xr EVP_PKEY_set_type_str 3 , | ||
342 | and | ||
343 | .Xr EVP_PKEY_assign 3 . | ||
344 | .Bd -filled | ||
345 | .Ft int Fo (*pkey_ctrl) | ||
346 | .Fa "EVP_PKEY *pkey" | ||
347 | .Fa "int op" | ||
348 | .Fa "long arg1" | ||
349 | .Fa "void *arg2" | ||
350 | .Fc | ||
351 | .Ed | ||
352 | .Pp | ||
353 | Add extra algorithm specific control. | ||
354 | .Pp | ||
355 | If the | ||
356 | .Fa op | ||
357 | argument is | ||
358 | .Dv ASN1_PKEY_CTRL_DEFAULT_MD_NID , | ||
359 | the | ||
360 | .Fa pkey_ctrl | ||
361 | method is supposed to write the message digest NID | ||
362 | for public key signature operations with the given | ||
363 | .Fa pkey | ||
364 | to | ||
365 | .Pf * Fa arg2 | ||
366 | as documented in the | ||
367 | .Xr EVP_PKEY_get_default_digest_nid 3 | ||
368 | manual page. | ||
369 | .Pp | ||
370 | The | ||
371 | .Fa pkey_ctrl | ||
372 | method is also called by | ||
373 | .Fn PKCS7_SIGNER_INFO_set , | ||
374 | .Fn PKCS7_RECIP_INFO_set , | ||
375 | and other functions. | ||
376 | .\" TODO: | ||
377 | .\" ASN1_PKEY_CTRL_PKCS7_ENCRYPT in pk7_lib.c rsa_ameth.c | ||
378 | .\" ASN1_PKEY_CTRL_PKCS7_SIGN in pk7_lib.c dsa_ameth.c ec_ameth.c rsa_ameth.c | ||
379 | .Bd -unfilled | ||
380 | .Ft int Fn (*pkey_check) "const EVP_PKEY *pk" | ||
381 | .Ft int Fn (*pkey_public_check) "const EVP_PKEY *pk" | ||
382 | .Ft int Fn (*pkey_param_check) "const EVP_PKEY *pk" | ||
383 | .Ed | ||
384 | .Pp | ||
385 | Check the validity of | ||
386 | .Fa pk | ||
387 | for key-pair, public component, and parameters, respectively. | ||
388 | These methods must return 0 for an invalid key or 1 for a valid key. | ||
389 | They are called by | ||
390 | .Xr EVP_PKEY_check 3 , | ||
391 | .Xr EVP_PKEY_public_check 3 , | ||
392 | and | ||
393 | .Xr EVP_PKEY_param_check 3 , | ||
394 | respectively. | ||
395 | .Bd -unfilled | ||
396 | .Ft int Fn (*pkey_security_bits) "const EVP_PKEY *pkey" | ||
397 | .Ed | ||
398 | .Pp | ||
399 | Return the security strength measured in bits of | ||
400 | .Fa pkey . | ||
401 | It is called by | ||
402 | .Xr EVP_PKEY_security_bits 3 . | ||
403 | .Ss Functions | ||
404 | .Fn EVP_PKEY_asn1_new | ||
405 | creates and returns a new | ||
406 | .Vt EVP_PKEY_ASN1_METHOD | ||
407 | object, marks it as dynamically allocated, and associates the given | ||
408 | .Fa id , | ||
409 | .Fa flags , | ||
410 | .Fa pem_str | ||
411 | and | ||
412 | .Fa info . | ||
413 | .Fa id | ||
414 | is a NID, | ||
415 | .Fa pem_str | ||
416 | is the PEM type string, | ||
417 | .Fa info | ||
418 | is a descriptive string. | ||
419 | If | ||
420 | .Dv ASN1_PKEY_SIGPARAM_NULL | ||
421 | is set in | ||
422 | .Fa flags , | ||
423 | the signature algorithm parameters are given the type | ||
424 | .Dv V_ASN1_NULL | ||
425 | by default, otherwise they will be given the type | ||
426 | .Dv V_ASN1_UNDEF | ||
427 | (i.e. the parameter is omitted). | ||
428 | See | ||
429 | .Xr X509_ALGOR_set0 3 | ||
430 | for more information. | ||
431 | .Pp | ||
432 | .Fn EVP_PKEY_asn1_copy | ||
433 | copies all function pointers from | ||
434 | .Fa src | ||
435 | to | ||
436 | .Fa dst . | ||
437 | The data in | ||
438 | .Fa dst | ||
439 | that can be set with | ||
440 | .Fn EVP_PKEY_asn1_new | ||
441 | \(em NIDs, flags, and strings \(em | ||
442 | remains unchanged. | ||
443 | This function is not thread safe, it is recommended to only use this when | ||
444 | initializing the application. | ||
445 | .Pp | ||
446 | .Fn EVP_PKEY_asn1_free | ||
447 | frees the dynamically allocated | ||
448 | .Fa ameth | ||
449 | including all memory it refers to. | ||
450 | If | ||
451 | .Fa ameth | ||
452 | is | ||
453 | .Dv NULL | ||
454 | of not marked as dynamically allocated, no action occurs. | ||
455 | .Pp | ||
456 | .Fn EVP_PKEY_asn1_set_public , | ||
457 | .Fn EVP_PKEY_asn1_set_private , | ||
458 | .Fn EVP_PKEY_asn1_set_param , | ||
459 | .Fn EVP_PKEY_asn1_set_free , | ||
460 | .Fn EVP_PKEY_asn1_set_ctrl , | ||
461 | .Fn EVP_PKEY_asn1_set_check , | ||
462 | .Fn EVP_PKEY_asn1_set_public_check , | ||
463 | .Fn EVP_PKEY_asn1_set_param_check , | ||
464 | and | ||
465 | .Fn EVP_PKEY_asn1_set_security_bits | ||
466 | set the diverse methods of the given | ||
467 | .Vt EVP_PKEY_ASN1_METHOD | ||
468 | object. | ||
469 | .Sh RETURN VALUES | ||
470 | .Fn EVP_PKEY_asn1_new | ||
471 | returns a pointer to the new | ||
472 | .Vt EVP_PKEY_ASN1_METHOD | ||
473 | object or | ||
474 | .Dv NULL | ||
475 | if memory allocation fails. | ||
476 | .Sh SEE ALSO | ||
477 | .Xr EVP_PKEY_asn1_get_count 3 , | ||
478 | .Xr EVP_PKEY_new 3 , | ||
479 | .Xr X509_PUBKEY_new 3 | ||
480 | .Sh HISTORY | ||
481 | .Fn EVP_PKEY_asn1_new , | ||
482 | .Fn EVP_PKEY_asn1_copy , | ||
483 | .Fn EVP_PKEY_asn1_free , | ||
484 | .Fn EVP_PKEY_asn1_set_public , | ||
485 | .Fn EVP_PKEY_asn1_set_private , | ||
486 | .Fn EVP_PKEY_asn1_set_param , | ||
487 | .Fn EVP_PKEY_asn1_set_free , | ||
488 | and | ||
489 | .Fn EVP_PKEY_asn1_set_ctrl | ||
490 | first appeared in OpenSSL 1.0.0 and have been available since | ||
491 | .Ox 4.9 . | ||
492 | .Pp | ||
493 | .Fn EVP_PKEY_asn1_set_check , | ||
494 | .Fn EVP_PKEY_asn1_set_public_check , | ||
495 | and | ||
496 | .Fn EVP_PKEY_asn1_set_param_check | ||
497 | first appeared in OpenSSL 1.1.1 and have been available since | ||
498 | .Ox 7.1 . | ||
499 | .Pp | ||
500 | .Fn EVP_PKEY_asn1_set_security_bits | ||
501 | first appeared in OpenSSL 1.1.0 and has been available since | ||
502 | .Ox 7.2 . | ||
diff --git a/src/lib/libcrypto/man/EVP_PKEY_cmp.3 b/src/lib/libcrypto/man/EVP_PKEY_cmp.3 index 2e42a9946f..c12843854d 100644 --- a/src/lib/libcrypto/man/EVP_PKEY_cmp.3 +++ b/src/lib/libcrypto/man/EVP_PKEY_cmp.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: EVP_PKEY_cmp.3,v 1.14 2024/03/05 19:21:31 tb Exp $ | 1 | .\" $OpenBSD: EVP_PKEY_cmp.3,v 1.15 2024/12/06 12:51:13 schwarze Exp $ |
2 | .\" full merge up to: OpenSSL 05ea606a May 20 20:52:46 2016 -0400 | 2 | .\" full merge up to: OpenSSL 05ea606a May 20 20:52:46 2016 -0400 |
3 | .\" selective merge up to: OpenSSL 99d63d46 Oct 26 13:56:48 2016 -0400 | 3 | .\" selective merge up to: OpenSSL 99d63d46 Oct 26 13:56:48 2016 -0400 |
4 | .\" | 4 | .\" |
@@ -67,7 +67,7 @@ | |||
67 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 67 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
68 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 68 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
69 | .\" | 69 | .\" |
70 | .Dd $Mdocdate: March 5 2024 $ | 70 | .Dd $Mdocdate: December 6 2024 $ |
71 | .Dt EVP_PKEY_CMP 3 | 71 | .Dt EVP_PKEY_CMP 3 |
72 | .Os | 72 | .Os |
73 | .Sh NAME | 73 | .Sh NAME |
@@ -160,7 +160,6 @@ and | |||
160 | return 1 if the keys match, 0 if they don't match, -1 if the key types | 160 | return 1 if the keys match, 0 if they don't match, -1 if the key types |
161 | are different and -2 if the operation is not supported. | 161 | are different and -2 if the operation is not supported. |
162 | .Sh SEE ALSO | 162 | .Sh SEE ALSO |
163 | .Xr EVP_PKEY_asn1_set_public 3 , | ||
164 | .Xr EVP_PKEY_CTX_new 3 , | 163 | .Xr EVP_PKEY_CTX_new 3 , |
165 | .Xr EVP_PKEY_keygen 3 , | 164 | .Xr EVP_PKEY_keygen 3 , |
166 | .Xr EVP_PKEY_new 3 , | 165 | .Xr EVP_PKEY_new 3 , |
diff --git a/src/lib/libcrypto/man/EVP_PKEY_get_default_digest_nid.3 b/src/lib/libcrypto/man/EVP_PKEY_get_default_digest_nid.3 index f0c40f3d1f..e9ff7c4609 100644 --- a/src/lib/libcrypto/man/EVP_PKEY_get_default_digest_nid.3 +++ b/src/lib/libcrypto/man/EVP_PKEY_get_default_digest_nid.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: EVP_PKEY_get_default_digest_nid.3,v 1.9 2024/04/18 16:33:33 tb Exp $ | 1 | .\" $OpenBSD: EVP_PKEY_get_default_digest_nid.3,v 1.10 2024/12/06 12:51:13 schwarze Exp $ |
2 | .\" full merge up to: OpenSSL df75c2bf Dec 9 01:02:36 2018 +0100 | 2 | .\" full merge up to: OpenSSL df75c2bf Dec 9 01:02:36 2018 +0100 |
3 | .\" | 3 | .\" |
4 | .\" This file is a derived work. | 4 | .\" This file is a derived work. |
@@ -66,7 +66,7 @@ | |||
66 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 66 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
67 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 67 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
68 | .\" | 68 | .\" |
69 | .Dd $Mdocdate: April 18 2024 $ | 69 | .Dd $Mdocdate: December 6 2024 $ |
70 | .Dt EVP_PKEY_GET_DEFAULT_DIGEST_NID 3 | 70 | .Dt EVP_PKEY_GET_DEFAULT_DIGEST_NID 3 |
71 | .Os | 71 | .Os |
72 | .Sh NAME | 72 | .Sh NAME |
@@ -116,7 +116,6 @@ It returns 0 or a negative value for failure. | |||
116 | In particular, a return value of -2 indicates the operation is not | 116 | In particular, a return value of -2 indicates the operation is not |
117 | supported by the public key algorithm. | 117 | supported by the public key algorithm. |
118 | .Sh SEE ALSO | 118 | .Sh SEE ALSO |
119 | .Xr EVP_PKEY_asn1_set_ctrl 3 , | ||
120 | .Xr EVP_PKEY_CTX_ctrl 3 , | 119 | .Xr EVP_PKEY_CTX_ctrl 3 , |
121 | .Xr EVP_PKEY_CTX_new 3 , | 120 | .Xr EVP_PKEY_CTX_new 3 , |
122 | .Xr EVP_PKEY_new 3 , | 121 | .Xr EVP_PKEY_new 3 , |
diff --git a/src/lib/libcrypto/man/EVP_PKEY_new.3 b/src/lib/libcrypto/man/EVP_PKEY_new.3 index 0705c8432a..4090db990b 100644 --- a/src/lib/libcrypto/man/EVP_PKEY_new.3 +++ b/src/lib/libcrypto/man/EVP_PKEY_new.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: EVP_PKEY_new.3,v 1.22 2024/11/29 12:05:06 schwarze Exp $ | 1 | .\" $OpenBSD: EVP_PKEY_new.3,v 1.23 2024/12/06 12:51:13 schwarze Exp $ |
2 | .\" full merge up to: OpenSSL 4dcfdfce May 27 11:50:05 2020 +0100 | 2 | .\" full merge up to: OpenSSL 4dcfdfce May 27 11:50:05 2020 +0100 |
3 | .\" | 3 | .\" |
4 | .\" This file is a derived work. | 4 | .\" This file is a derived work. |
@@ -66,7 +66,7 @@ | |||
66 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 66 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
67 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 67 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
68 | .\" | 68 | .\" |
69 | .Dd $Mdocdate: November 29 2024 $ | 69 | .Dd $Mdocdate: December 6 2024 $ |
70 | .Dt EVP_PKEY_NEW 3 | 70 | .Dt EVP_PKEY_NEW 3 |
71 | .Os | 71 | .Os |
72 | .Sh NAME | 72 | .Sh NAME |
@@ -311,7 +311,6 @@ with | |||
311 | .Xr d2i_PrivateKey 3 , | 311 | .Xr d2i_PrivateKey 3 , |
312 | .Xr evp 3 , | 312 | .Xr evp 3 , |
313 | .Xr EVP_PKCS82PKEY 3 , | 313 | .Xr EVP_PKCS82PKEY 3 , |
314 | .Xr EVP_PKEY_asn1_new 3 , | ||
315 | .Xr EVP_PKEY_check 3 , | 314 | .Xr EVP_PKEY_check 3 , |
316 | .Xr EVP_PKEY_cmp 3 , | 315 | .Xr EVP_PKEY_cmp 3 , |
317 | .Xr EVP_PKEY_CTX_new 3 , | 316 | .Xr EVP_PKEY_CTX_new 3 , |
diff --git a/src/lib/libcrypto/man/EVP_PKEY_print_private.3 b/src/lib/libcrypto/man/EVP_PKEY_print_private.3 index c1e6899818..a4b51a4bbb 100644 --- a/src/lib/libcrypto/man/EVP_PKEY_print_private.3 +++ b/src/lib/libcrypto/man/EVP_PKEY_print_private.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: EVP_PKEY_print_private.3,v 1.7 2019/06/06 01:06:58 schwarze Exp $ | 1 | .\" $OpenBSD: EVP_PKEY_print_private.3,v 1.8 2024/12/06 12:51:13 schwarze Exp $ |
2 | .\" OpenSSL 99d63d46 Oct 26 13:56:48 2016 -0400 | 2 | .\" OpenSSL 99d63d46 Oct 26 13:56:48 2016 -0400 |
3 | .\" | 3 | .\" |
4 | .\" This file was written by Dr. Stephen Henson <steve@openssl.org>. | 4 | .\" This file was written by Dr. Stephen Henson <steve@openssl.org>. |
@@ -48,7 +48,7 @@ | |||
48 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 48 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
49 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 49 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
50 | .\" | 50 | .\" |
51 | .Dd $Mdocdate: June 6 2019 $ | 51 | .Dd $Mdocdate: December 6 2024 $ |
52 | .Dt EVP_PKEY_PRINT_PRIVATE 3 | 52 | .Dt EVP_PKEY_PRINT_PRIVATE 3 |
53 | .Os | 53 | .Os |
54 | .Sh NAME | 54 | .Sh NAME |
@@ -120,7 +120,6 @@ failure. | |||
120 | In particular, a return value of -2 indicates the operation is not | 120 | In particular, a return value of -2 indicates the operation is not |
121 | supported by the public key algorithm. | 121 | supported by the public key algorithm. |
122 | .Sh SEE ALSO | 122 | .Sh SEE ALSO |
123 | .Xr EVP_PKEY_asn1_set_public 3 , | ||
124 | .Xr EVP_PKEY_CTX_new 3 , | 123 | .Xr EVP_PKEY_CTX_new 3 , |
125 | .Xr EVP_PKEY_keygen 3 , | 124 | .Xr EVP_PKEY_keygen 3 , |
126 | .Xr EVP_PKEY_new 3 | 125 | .Xr EVP_PKEY_new 3 |
diff --git a/src/lib/libcrypto/man/EVP_PKEY_size.3 b/src/lib/libcrypto/man/EVP_PKEY_size.3 index f49678d0a9..cd25eec9c2 100644 --- a/src/lib/libcrypto/man/EVP_PKEY_size.3 +++ b/src/lib/libcrypto/man/EVP_PKEY_size.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: EVP_PKEY_size.3,v 1.3 2024/03/05 19:21:31 tb Exp $ | 1 | .\" $OpenBSD: EVP_PKEY_size.3,v 1.4 2024/12/06 12:51:13 schwarze Exp $ |
2 | .\" full merge up to: OpenSSL eed9d03b Jan 8 11:04:15 2020 +0100 | 2 | .\" full merge up to: OpenSSL eed9d03b Jan 8 11:04:15 2020 +0100 |
3 | .\" | 3 | .\" |
4 | .\" This file is a derived work. | 4 | .\" This file is a derived work. |
@@ -65,7 +65,7 @@ | |||
65 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 65 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
66 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 66 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
67 | .\" | 67 | .\" |
68 | .Dd $Mdocdate: March 5 2024 $ | 68 | .Dd $Mdocdate: December 6 2024 $ |
69 | .Dt EVP_PKEY_SIZE 3 | 69 | .Dt EVP_PKEY_SIZE 3 |
70 | .Os | 70 | .Os |
71 | .Sh NAME | 71 | .Sh NAME |
@@ -134,7 +134,6 @@ For those functions, it isn't strictly necessary to call | |||
134 | to find out the buffer size, but it may still be useful in cases | 134 | to find out the buffer size, but it may still be useful in cases |
135 | where it's desirable to know the upper limit in advance. | 135 | where it's desirable to know the upper limit in advance. |
136 | .Pp | 136 | .Pp |
137 | By default, | ||
138 | .Fn EVP_PKEY_size | 137 | .Fn EVP_PKEY_size |
139 | is supported for the following algorithms: | 138 | is supported for the following algorithms: |
140 | .Bl -column ED25519 "EVP_MAX_BLOCK_LENGTH = 32" | 139 | .Bl -column ED25519 "EVP_MAX_BLOCK_LENGTH = 32" |
@@ -156,15 +155,12 @@ the situation is special: while the key size is | |||
156 | .Fn EVP_PKEY_size | 155 | .Fn EVP_PKEY_size |
157 | returns 64 because the signature is longer than the keys. | 156 | returns 64 because the signature is longer than the keys. |
158 | .Pp | 157 | .Pp |
159 | The application program can support additional algorithms by calling | ||
160 | .Xr EVP_PKEY_asn1_set_public 3 . | ||
161 | .Pp | ||
162 | .Fn EVP_PKEY_bits | 158 | .Fn EVP_PKEY_bits |
163 | returns the cryptographic length of the cryptosystem to which the key in | 159 | returns the cryptographic length of the cryptosystem to which the key in |
164 | .Fa pkey | 160 | .Fa pkey |
165 | belongs, in bits. | 161 | belongs, in bits. |
166 | The definition of cryptographic length is specific to the key cryptosystem. | 162 | The definition of cryptographic length is specific to the key cryptosystem. |
167 | By default, the following algorithms are supported: | 163 | The following algorithms are supported: |
168 | .Bl -column ED25519 "the public domain parameter p" DSA_bits(3) | 164 | .Bl -column ED25519 "the public domain parameter p" DSA_bits(3) |
169 | .It Ta cryptographic length = Ta same result as from: | 165 | .It Ta cryptographic length = Ta same result as from: |
170 | .It Ta significant bits in ... Ta | 166 | .It Ta significant bits in ... Ta |
@@ -176,14 +172,11 @@ By default, the following algorithms are supported: | |||
176 | .It X25519 Ta 253 Ta \(em | 172 | .It X25519 Ta 253 Ta \(em |
177 | .El | 173 | .El |
178 | .Pp | 174 | .Pp |
179 | The application program can support additional algorithms by calling | ||
180 | .Xr EVP_PKEY_asn1_set_public 3 . | ||
181 | .Pp | ||
182 | .Fn EVP_PKEY_security_bits | 175 | .Fn EVP_PKEY_security_bits |
183 | returns the security strength measured in bits of the given | 176 | returns the security strength measured in bits of the given |
184 | .Fa pkey | 177 | .Fa pkey |
185 | as defined in NIST SP800-57. | 178 | as defined in NIST SP800-57. |
186 | By default, the following algorithms are supported: | 179 | The following algorithms are supported: |
187 | .Bl -column ED25519 DSA_security_bits(3) | 180 | .Bl -column ED25519 DSA_security_bits(3) |
188 | .It Ta same result as from: | 181 | .It Ta same result as from: |
189 | .It DH Ta Xr DH_security_bits 3 | 182 | .It DH Ta Xr DH_security_bits 3 |
@@ -196,9 +189,6 @@ By default, the following algorithms are supported: | |||
196 | .Pp | 189 | .Pp |
197 | For EC keys, if the result is greater than 80, it is rounded down | 190 | For EC keys, if the result is greater than 80, it is rounded down |
198 | to 256, 192, 128, 112, or 80. | 191 | to 256, 192, 128, 112, or 80. |
199 | .Pp | ||
200 | The application program can support additional algorithms by calling | ||
201 | .Xr EVP_PKEY_asn1_set_security_bits 3 . | ||
202 | .Sh RETURN VALUES | 192 | .Sh RETURN VALUES |
203 | .Fn EVP_PKEY_size | 193 | .Fn EVP_PKEY_size |
204 | and | 194 | and |
diff --git a/src/lib/libcrypto/man/EVP_SignInit.3 b/src/lib/libcrypto/man/EVP_SignInit.3 index 9a6c743876..8158b21dbf 100644 --- a/src/lib/libcrypto/man/EVP_SignInit.3 +++ b/src/lib/libcrypto/man/EVP_SignInit.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: EVP_SignInit.3,v 1.20 2024/11/08 22:23:35 schwarze Exp $ | 1 | .\" $OpenBSD: EVP_SignInit.3,v 1.21 2024/12/06 12:51:13 schwarze Exp $ |
2 | .\" full merge up to: OpenSSL 6328d367 Jul 4 21:58:30 2020 +0200 | 2 | .\" full merge up to: OpenSSL 6328d367 Jul 4 21:58:30 2020 +0200 |
3 | .\" | 3 | .\" |
4 | .\" This file was written by Dr. Stephen Henson <steve@openssl.org>. | 4 | .\" This file was written by Dr. Stephen Henson <steve@openssl.org>. |
@@ -49,7 +49,7 @@ | |||
49 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 49 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
50 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 50 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
51 | .\" | 51 | .\" |
52 | .Dd $Mdocdate: November 8 2024 $ | 52 | .Dd $Mdocdate: December 6 2024 $ |
53 | .Dt EVP_SIGNINIT 3 | 53 | .Dt EVP_SIGNINIT 3 |
54 | .Os | 54 | .Os |
55 | .Sh NAME | 55 | .Sh NAME |
@@ -179,7 +179,6 @@ The error codes can be obtained by | |||
179 | .Sh SEE ALSO | 179 | .Sh SEE ALSO |
180 | .Xr evp 3 , | 180 | .Xr evp 3 , |
181 | .Xr EVP_DigestInit 3 , | 181 | .Xr EVP_DigestInit 3 , |
182 | .Xr EVP_PKEY_asn1_set_public 3 , | ||
183 | .Xr EVP_PKEY_size 3 , | 182 | .Xr EVP_PKEY_size 3 , |
184 | .Xr EVP_VerifyInit 3 | 183 | .Xr EVP_VerifyInit 3 |
185 | .Sh HISTORY | 184 | .Sh HISTORY |
diff --git a/src/lib/libcrypto/man/Makefile b/src/lib/libcrypto/man/Makefile index 5d791d183e..da93f14a43 100644 --- a/src/lib/libcrypto/man/Makefile +++ b/src/lib/libcrypto/man/Makefile | |||
@@ -1,4 +1,4 @@ | |||
1 | # $OpenBSD: Makefile,v 1.296 2024/11/12 20:15:24 schwarze Exp $ | 1 | # $OpenBSD: Makefile,v 1.297 2024/12/06 12:51:13 schwarze Exp $ |
2 | 2 | ||
3 | .include <bsd.own.mk> | 3 | .include <bsd.own.mk> |
4 | 4 | ||
@@ -178,7 +178,6 @@ MAN= \ | |||
178 | EVP_PKEY_CTX_set_hkdf_md.3 \ | 178 | EVP_PKEY_CTX_set_hkdf_md.3 \ |
179 | EVP_PKEY_CTX_set_tls1_prf_md.3 \ | 179 | EVP_PKEY_CTX_set_tls1_prf_md.3 \ |
180 | EVP_PKEY_asn1_get_count.3 \ | 180 | EVP_PKEY_asn1_get_count.3 \ |
181 | EVP_PKEY_asn1_new.3 \ | ||
182 | EVP_PKEY_check.3 \ | 181 | EVP_PKEY_check.3 \ |
183 | EVP_PKEY_cmp.3 \ | 182 | EVP_PKEY_cmp.3 \ |
184 | EVP_PKEY_decrypt.3 \ | 183 | EVP_PKEY_decrypt.3 \ |
diff --git a/src/lib/libcrypto/man/PKCS8_PRIV_KEY_INFO_new.3 b/src/lib/libcrypto/man/PKCS8_PRIV_KEY_INFO_new.3 index 2eb9aef054..822968f58d 100644 --- a/src/lib/libcrypto/man/PKCS8_PRIV_KEY_INFO_new.3 +++ b/src/lib/libcrypto/man/PKCS8_PRIV_KEY_INFO_new.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: PKCS8_PRIV_KEY_INFO_new.3,v 1.6 2021/10/25 13:48:12 schwarze Exp $ | 1 | .\" $OpenBSD: PKCS8_PRIV_KEY_INFO_new.3,v 1.7 2024/12/06 12:51:13 schwarze Exp $ |
2 | .\" | 2 | .\" |
3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> | 3 | .\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> |
4 | .\" | 4 | .\" |
@@ -14,7 +14,7 @@ | |||
14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | 14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF |
15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | 15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
16 | .\" | 16 | .\" |
17 | .Dd $Mdocdate: October 25 2021 $ | 17 | .Dd $Mdocdate: December 6 2024 $ |
18 | .Dt PKCS8_PRIV_KEY_INFO_NEW 3 | 18 | .Dt PKCS8_PRIV_KEY_INFO_NEW 3 |
19 | .Os | 19 | .Os |
20 | .Sh NAME | 20 | .Sh NAME |
@@ -51,7 +51,6 @@ if an error occurs. | |||
51 | .Xr d2i_PKCS8_PRIV_KEY_INFO 3 , | 51 | .Xr d2i_PKCS8_PRIV_KEY_INFO 3 , |
52 | .Xr d2i_PKCS8PrivateKey_bio 3 , | 52 | .Xr d2i_PKCS8PrivateKey_bio 3 , |
53 | .Xr EVP_PKCS82PKEY 3 , | 53 | .Xr EVP_PKCS82PKEY 3 , |
54 | .Xr EVP_PKEY_asn1_set_private 3 , | ||
55 | .Xr PEM_read_PKCS8_PRIV_KEY_INFO 3 , | 54 | .Xr PEM_read_PKCS8_PRIV_KEY_INFO 3 , |
56 | .Xr PKCS12_parse 3 , | 55 | .Xr PKCS12_parse 3 , |
57 | .Xr PKCS8_pkey_set0 3 , | 56 | .Xr PKCS8_pkey_set0 3 , |
diff --git a/src/lib/libcrypto/man/X509_PUBKEY_new.3 b/src/lib/libcrypto/man/X509_PUBKEY_new.3 index 648b028d5d..df1c50bda2 100644 --- a/src/lib/libcrypto/man/X509_PUBKEY_new.3 +++ b/src/lib/libcrypto/man/X509_PUBKEY_new.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: X509_PUBKEY_new.3,v 1.17 2021/10/26 10:01:23 schwarze Exp $ | 1 | .\" $OpenBSD: X509_PUBKEY_new.3,v 1.18 2024/12/06 12:51:13 schwarze Exp $ |
2 | .\" full merge up to: OpenSSL 99d63d46 Oct 26 13:56:48 2016 -0400 | 2 | .\" full merge up to: OpenSSL 99d63d46 Oct 26 13:56:48 2016 -0400 |
3 | .\" | 3 | .\" |
4 | .\" This file is a derived work. | 4 | .\" This file is a derived work. |
@@ -65,7 +65,7 @@ | |||
65 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 65 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
66 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 66 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
67 | .\" | 67 | .\" |
68 | .Dd $Mdocdate: October 26 2021 $ | 68 | .Dd $Mdocdate: December 6 2024 $ |
69 | .Dt X509_PUBKEY_NEW 3 | 69 | .Dt X509_PUBKEY_NEW 3 |
70 | .Os | 70 | .Os |
71 | .Sh NAME | 71 | .Sh NAME |
@@ -354,7 +354,6 @@ or does not contain a public key, | |||
354 | these functions fail but no error is pushed onto the stack. | 354 | these functions fail but no error is pushed onto the stack. |
355 | .Sh SEE ALSO | 355 | .Sh SEE ALSO |
356 | .Xr d2i_X509 3 , | 356 | .Xr d2i_X509 3 , |
357 | .Xr EVP_PKEY_asn1_set_public 3 , | ||
358 | .Xr X509_ALGOR_new 3 , | 357 | .Xr X509_ALGOR_new 3 , |
359 | .Xr X509_get_pubkey 3 , | 358 | .Xr X509_get_pubkey 3 , |
360 | .Xr X509_new 3 | 359 | .Xr X509_new 3 |
diff --git a/src/lib/libcrypto/man/X509_signature_dump.3 b/src/lib/libcrypto/man/X509_signature_dump.3 index bc41cc8b61..3333a615bf 100644 --- a/src/lib/libcrypto/man/X509_signature_dump.3 +++ b/src/lib/libcrypto/man/X509_signature_dump.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: X509_signature_dump.3,v 1.2 2021/12/18 17:47:45 schwarze Exp $ | 1 | .\" $OpenBSD: X509_signature_dump.3,v 1.3 2024/12/06 12:51:13 schwarze Exp $ |
2 | .\" | 2 | .\" |
3 | .\" Copyright (c) 2021 Ingo Schwarze <schwarze@openbsd.org> | 3 | .\" Copyright (c) 2021 Ingo Schwarze <schwarze@openbsd.org> |
4 | .\" | 4 | .\" |
@@ -14,7 +14,7 @@ | |||
14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | 14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF |
15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | 15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
16 | .\" | 16 | .\" |
17 | .Dd $Mdocdate: December 18 2021 $ | 17 | .Dd $Mdocdate: December 6 2024 $ |
18 | .Dt X509_SIGNATURE_DUMP 3 | 18 | .Dt X509_SIGNATURE_DUMP 3 |
19 | .Os | 19 | .Os |
20 | .Sh NAME | 20 | .Sh NAME |
@@ -71,7 +71,7 @@ They fail and return as soon as any write operation fails. | |||
71 | .Xr ASN1_STRING_new 3 , | 71 | .Xr ASN1_STRING_new 3 , |
72 | .Xr ASN1_STRING_print_ex 3 , | 72 | .Xr ASN1_STRING_print_ex 3 , |
73 | .Xr BIO_new 3 , | 73 | .Xr BIO_new 3 , |
74 | .Xr EVP_PKEY_asn1_new 3 , | 74 | .Xr EVP_PKEY_asn1_find 3 , |
75 | .Xr OBJ_find_sigid_algs 3 , | 75 | .Xr OBJ_find_sigid_algs 3 , |
76 | .Xr X509_ALGOR_new 3 , | 76 | .Xr X509_ALGOR_new 3 , |
77 | .Xr X509_get0_signature 3 | 77 | .Xr X509_get0_signature 3 |
diff --git a/src/lib/libcrypto/man/evp.3 b/src/lib/libcrypto/man/evp.3 index 6ccf9898d1..0168d95875 100644 --- a/src/lib/libcrypto/man/evp.3 +++ b/src/lib/libcrypto/man/evp.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: evp.3,v 1.33 2024/12/06 11:56:21 schwarze Exp $ | 1 | .\" $OpenBSD: evp.3,v 1.34 2024/12/06 12:51:13 schwarze Exp $ |
2 | .\" full merge up to: OpenSSL man7/evp 24a535ea Sep 22 13:14:20 2020 +0100 | 2 | .\" full merge up to: OpenSSL man7/evp 24a535ea Sep 22 13:14:20 2020 +0100 |
3 | .\" | 3 | .\" |
4 | .\" This file was written by Ulf Moeller <ulf@openssl.org>, | 4 | .\" This file was written by Ulf Moeller <ulf@openssl.org>, |
@@ -204,7 +204,6 @@ family of functions provides base64 encoding and decoding. | |||
204 | .Xr EVP_OpenInit 3 , | 204 | .Xr EVP_OpenInit 3 , |
205 | .Xr EVP_PKCS82PKEY 3 , | 205 | .Xr EVP_PKCS82PKEY 3 , |
206 | .Xr EVP_PKEY_asn1_get_count 3 , | 206 | .Xr EVP_PKEY_asn1_get_count 3 , |
207 | .Xr EVP_PKEY_asn1_new 3 , | ||
208 | .Xr EVP_PKEY_check 3 , | 207 | .Xr EVP_PKEY_check 3 , |
209 | .Xr EVP_PKEY_cmp 3 , | 208 | .Xr EVP_PKEY_cmp 3 , |
210 | .Xr EVP_PKEY_CTX_ctrl 3 , | 209 | .Xr EVP_PKEY_CTX_ctrl 3 , |