summaryrefslogtreecommitdiff
path: root/src
diff options
context:
space:
mode:
authorschwarze <>2024-12-06 12:51:13 +0000
committerschwarze <>2024-12-06 12:51:13 +0000
commit1f4a0f25fae63c118c3bfa63b3a130d45c788288 (patch)
treea723342983f4f053624289df9ff99b8a53ae1334 /src
parentd8f769ca48f14cb8455dfa8f2334c3c683502fe4 (diff)
downloadopenbsd-1f4a0f25fae63c118c3bfa63b3a130d45c788288.tar.gz
openbsd-1f4a0f25fae63c118c3bfa63b3a130d45c788288.tar.bz2
openbsd-1f4a0f25fae63c118c3bfa63b3a130d45c788288.zip
Delete the manual page EVP_PKEY_asn1_new(3).
All the functions documented in this page were deleted from the API by tb@ in evp.h rev. 1.126 on March 2 this year.
Diffstat (limited to 'src')
-rw-r--r--src/lib/libcrypto/man/ASN1_item_sign.312
-rw-r--r--src/lib/libcrypto/man/EVP_PKEY_asn1_get_count.317
-rw-r--r--src/lib/libcrypto/man/EVP_PKEY_asn1_new.3502
-rw-r--r--src/lib/libcrypto/man/EVP_PKEY_cmp.35
-rw-r--r--src/lib/libcrypto/man/EVP_PKEY_get_default_digest_nid.35
-rw-r--r--src/lib/libcrypto/man/EVP_PKEY_new.35
-rw-r--r--src/lib/libcrypto/man/EVP_PKEY_print_private.35
-rw-r--r--src/lib/libcrypto/man/EVP_PKEY_size.318
-rw-r--r--src/lib/libcrypto/man/EVP_SignInit.35
-rw-r--r--src/lib/libcrypto/man/Makefile3
-rw-r--r--src/lib/libcrypto/man/PKCS8_PRIV_KEY_INFO_new.35
-rw-r--r--src/lib/libcrypto/man/X509_PUBKEY_new.35
-rw-r--r--src/lib/libcrypto/man/X509_signature_dump.36
-rw-r--r--src/lib/libcrypto/man/evp.33
14 files changed, 30 insertions, 566 deletions
diff --git a/src/lib/libcrypto/man/ASN1_item_sign.3 b/src/lib/libcrypto/man/ASN1_item_sign.3
index b47fd1d04d..8c09fe77ff 100644
--- a/src/lib/libcrypto/man/ASN1_item_sign.3
+++ b/src/lib/libcrypto/man/ASN1_item_sign.3
@@ -1,4 +1,4 @@
1.\" $OpenBSD: ASN1_item_sign.3,v 1.2 2021/12/18 17:47:44 schwarze Exp $ 1.\" $OpenBSD: ASN1_item_sign.3,v 1.3 2024/12/06 12:51:13 schwarze Exp $
2.\" 2.\"
3.\" Copyright (c) 2021 Ingo Schwarze <schwarze@openbsd.org> 3.\" Copyright (c) 2021 Ingo Schwarze <schwarze@openbsd.org>
4.\" 4.\"
@@ -14,7 +14,7 @@
14.\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF 14.\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
15.\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. 15.\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
16.\" 16.\"
17.Dd $Mdocdate: December 18 2021 $ 17.Dd $Mdocdate: December 6 2024 $
18.Dt ASN1_ITEM_SIGN 3 18.Dt ASN1_ITEM_SIGN 3
19.Os 19.Os
20.Sh NAME 20.Sh NAME
@@ -91,12 +91,6 @@ Unless
91is 91is
92.Dv NULL , 92.Dv NULL ,
93the same data is copied into it. 93the same data is copied into it.
94.\" The following is not yet supported by LibreSSL
95.\" because we do not provide EVP_PKEY_asn1_set_item(3).
96.\" except that user-defined key types set up with
97.\" .Xr EVP_PKEY_asn1_new 3
98.\" may optionally provide information about a second algorithm in
99.\" .Fa algor2 .
100.Sh RETURN VALUES 94.Sh RETURN VALUES
101These functions return the length of the signature in bytes 95These functions return the length of the signature in bytes
102or 0 if memory allocation, encoding, or signing fails. 96or 0 if memory allocation, encoding, or signing fails.
@@ -113,8 +107,6 @@ is not fully initialized.
113.Xr EVP_Digest 3 , 107.Xr EVP_Digest 3 ,
114.Xr EVP_DigestSign 3 , 108.Xr EVP_DigestSign 3 ,
115.Xr EVP_MD_CTX_new 3 , 109.Xr EVP_MD_CTX_new 3 ,
116.\" We do not provide EVP_PKEY_asn1_set_item(3).
117.\" .Xr EVP_PKEY_asn1_new 3 ,
118.Xr EVP_PKEY_new 3 , 110.Xr EVP_PKEY_new 3 ,
119.Xr OBJ_find_sigid_by_algs 3 , 111.Xr OBJ_find_sigid_by_algs 3 ,
120.Xr X509_ALGOR_new 3 112.Xr X509_ALGOR_new 3
diff --git a/src/lib/libcrypto/man/EVP_PKEY_asn1_get_count.3 b/src/lib/libcrypto/man/EVP_PKEY_asn1_get_count.3
index 6e6c25e253..f7810789b6 100644
--- a/src/lib/libcrypto/man/EVP_PKEY_asn1_get_count.3
+++ b/src/lib/libcrypto/man/EVP_PKEY_asn1_get_count.3
@@ -1,4 +1,4 @@
1.\" $OpenBSD: EVP_PKEY_asn1_get_count.3,v 1.9 2024/07/21 08:36:43 tb Exp $ 1.\" $OpenBSD: EVP_PKEY_asn1_get_count.3,v 1.10 2024/12/06 12:51:13 schwarze Exp $
2.\" full merge up to: OpenSSL 72a7a702 Feb 26 14:05:09 2019 +0000 2.\" full merge up to: OpenSSL 72a7a702 Feb 26 14:05:09 2019 +0000
3.\" 3.\"
4.\" This file is a derived work. 4.\" This file is a derived work.
@@ -65,7 +65,7 @@
65.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED 65.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
66.\" OF THE POSSIBILITY OF SUCH DAMAGE. 66.\" OF THE POSSIBILITY OF SUCH DAMAGE.
67.\" 67.\"
68.Dd $Mdocdate: July 21 2024 $ 68.Dd $Mdocdate: December 6 2024 $
69.Dt EVP_PKEY_ASN1_GET_COUNT 3 69.Dt EVP_PKEY_ASN1_GET_COUNT 3
70.Os 70.Os
71.Sh NAME 71.Sh NAME
@@ -185,16 +185,10 @@ object and will never be returned from
185or 185or
186.Fn EVP_PKEY_asn1_find_str . 186.Fn EVP_PKEY_asn1_find_str .
187.It Dv ASN1_PKEY_DYNAMIC 187.It Dv ASN1_PKEY_DYNAMIC
188This 188This flag is unused.
189It could formerly be used to mark an
189.Fa ameth 190.Fa ameth
190object is marked as dynamically allocated. 191object as dynamically allocated.
191If this flag is set,
192.Xr EVP_PKEY_asn1_free 3
193can free
194.Fa ameth ;
195otherwise,
196.Xr EVP_PKEY_asn1_free 3
197has no effect on it.
198.It Dv ASN1_PKEY_SIGPARAM_NULL 192.It Dv ASN1_PKEY_SIGPARAM_NULL
199If the signing 193If the signing
200.Fa ctx 194.Fa ctx
@@ -240,7 +234,6 @@ if no match is found.
240.Fn EVP_PKEY_asn1_get0_info 234.Fn EVP_PKEY_asn1_get0_info
241returns 1 on success or 0 on failure. 235returns 1 on success or 0 on failure.
242.Sh SEE ALSO 236.Sh SEE ALSO
243.Xr EVP_PKEY_asn1_new 3 ,
244.Xr EVP_PKEY_base_id 3 , 237.Xr EVP_PKEY_base_id 3 ,
245.Xr EVP_PKEY_new 3 238.Xr EVP_PKEY_new 3
246.Sh HISTORY 239.Sh HISTORY
diff --git a/src/lib/libcrypto/man/EVP_PKEY_asn1_new.3 b/src/lib/libcrypto/man/EVP_PKEY_asn1_new.3
deleted file mode 100644
index e7a987861e..0000000000
--- a/src/lib/libcrypto/man/EVP_PKEY_asn1_new.3
+++ /dev/null
@@ -1,502 +0,0 @@
1.\" $OpenBSD: EVP_PKEY_asn1_new.3,v 1.12 2024/12/05 15:06:27 schwarze Exp $
2.\" selective merge up to:
3.\" OpenSSL man3/EVP_PKEY_ASN1_METHOD b0004708 Nov 1 00:45:24 2017 +0800
4.\"
5.\" This file is a derived work.
6.\" The changes are covered by the following Copyright and license:
7.\"
8.\" Copyright (c) 2023 Ingo Schwarze <schwarze@openbsd.org>
9.\"
10.\" Permission to use, copy, modify, and distribute this software for any
11.\" purpose with or without fee is hereby granted, provided that the above
12.\" copyright notice and this permission notice appear in all copies.
13.\"
14.\" THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
15.\" WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
16.\" MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
17.\" ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
18.\" WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
19.\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
20.\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
21.\"
22.\" The original file was written by Richard Levitte <levitte@openssl.org>
23.\" and Paul Yang <yang.yang@baishancloud.com>.
24.\" Copyright (c) 2017 The OpenSSL Project. All rights reserved.
25.\"
26.\" Redistribution and use in source and binary forms, with or without
27.\" modification, are permitted provided that the following conditions
28.\" are met:
29.\"
30.\" 1. Redistributions of source code must retain the above copyright
31.\" notice, this list of conditions and the following disclaimer.
32.\"
33.\" 2. Redistributions in binary form must reproduce the above copyright
34.\" notice, this list of conditions and the following disclaimer in
35.\" the documentation and/or other materials provided with the
36.\" distribution.
37.\"
38.\" 3. All advertising materials mentioning features or use of this
39.\" software must display the following acknowledgment:
40.\" "This product includes software developed by the OpenSSL Project
41.\" for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
42.\"
43.\" 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
44.\" endorse or promote products derived from this software without
45.\" prior written permission. For written permission, please contact
46.\" openssl-core@openssl.org.
47.\"
48.\" 5. Products derived from this software may not be called "OpenSSL"
49.\" nor may "OpenSSL" appear in their names without prior written
50.\" permission of the OpenSSL Project.
51.\"
52.\" 6. Redistributions of any form whatsoever must retain the following
53.\" acknowledgment:
54.\" "This product includes software developed by the OpenSSL Project
55.\" for use in the OpenSSL Toolkit (http://www.openssl.org/)"
56.\"
57.\" THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
58.\" EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
59.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
60.\" PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
61.\" ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
62.\" SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
63.\" NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
64.\" LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
65.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
66.\" STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
67.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
68.\" OF THE POSSIBILITY OF SUCH DAMAGE.
69.\"
70.Dd $Mdocdate: December 5 2024 $
71.Dt EVP_PKEY_ASN1_NEW 3
72.Os
73.Sh NAME
74.\" .Nm EVP_PKEY_asn1_add0 and
75.\" .Nm EVP_PKEY_asn1_add_alias are intentionally undocumented
76.\" because they will be removed in the next major bump
77.Nm EVP_PKEY_asn1_new ,
78.Nm EVP_PKEY_asn1_copy ,
79.Nm EVP_PKEY_asn1_free ,
80.Nm EVP_PKEY_asn1_set_public ,
81.Nm EVP_PKEY_asn1_set_private ,
82.Nm EVP_PKEY_asn1_set_param ,
83.Nm EVP_PKEY_asn1_set_free ,
84.Nm EVP_PKEY_asn1_set_ctrl ,
85.Nm EVP_PKEY_asn1_set_check ,
86.Nm EVP_PKEY_asn1_set_public_check ,
87.Nm EVP_PKEY_asn1_set_param_check ,
88.Nm EVP_PKEY_asn1_set_security_bits
89.Nd manipulating and registering an EVP_PKEY_ASN1_METHOD structure
90.Sh SYNOPSIS
91.In openssl/evp.h
92.Ft EVP_PKEY_ASN1_METHOD *
93.Fo EVP_PKEY_asn1_new
94.Fa "int id"
95.Fa "int flags"
96.Fa "const char *pem_str"
97.Fa "const char *info"
98.Fc
99.Ft void
100.Fo EVP_PKEY_asn1_copy
101.Fa "EVP_PKEY_ASN1_METHOD *dst"
102.Fa "const EVP_PKEY_ASN1_METHOD *src"
103.Fc
104.Ft void
105.Fo EVP_PKEY_asn1_free
106.Fa "EVP_PKEY_ASN1_METHOD *ameth"
107.Fc
108.Ft void
109.Fo EVP_PKEY_asn1_set_public
110.Fa "EVP_PKEY_ASN1_METHOD *ameth"
111.Fa "int (*pub_decode)(EVP_PKEY *pk, X509_PUBKEY *pub)"
112.Fa "int (*pub_encode)(X509_PUBKEY *pub, const EVP_PKEY *pk)"
113.Fa "int (*pub_cmp)(const EVP_PKEY *a, const EVP_PKEY *b)"
114.Fa "int (*pub_print)(BIO *out, const EVP_PKEY *pkey, int indent,\
115 ASN1_PCTX *pctx)"
116.Fa "int (*pkey_size)(const EVP_PKEY *pk)"
117.Fa "int (*pkey_bits)(const EVP_PKEY *pk)"
118.Fc
119.Ft void
120.Fo EVP_PKEY_asn1_set_private
121.Fa "EVP_PKEY_ASN1_METHOD *ameth"
122.Fa "int (*priv_decode)(EVP_PKEY *pk, const PKCS8_PRIV_KEY_INFO *p8inf)"
123.Fa "int (*priv_encode)(PKCS8_PRIV_KEY_INFO *p8, const EVP_PKEY *pk)"
124.Fa "int (*priv_print)(BIO *out, const EVP_PKEY *pkey, int indent,\
125 ASN1_PCTX *pctx)"
126.Fc
127.Ft void
128.Fo EVP_PKEY_asn1_set_param
129.Fa "EVP_PKEY_ASN1_METHOD *ameth"
130.Fa "int (*param_decode)(EVP_PKEY *pkey, const unsigned char **pder,\
131 int derlen)"
132.Fa "int (*param_encode)(const EVP_PKEY *pkey, unsigned char **pder)"
133.Fa "int (*param_missing)(const EVP_PKEY *pk)"
134.Fa "int (*param_copy)(EVP_PKEY *to, const EVP_PKEY *from)"
135.Fa "int (*param_cmp)(const EVP_PKEY *a, const EVP_PKEY *b)"
136.Fa "int (*param_print)(BIO *out, const EVP_PKEY *pkey, int indent,\
137 ASN1_PCTX *pctx)"
138.Fc
139.Ft void
140.Fo EVP_PKEY_asn1_set_free
141.Fa "EVP_PKEY_ASN1_METHOD *ameth"
142.Fa "void (*pkey_free)(EVP_PKEY *pkey)"
143.Fc
144.Ft void
145.Fo EVP_PKEY_asn1_set_ctrl
146.Fa "EVP_PKEY_ASN1_METHOD *ameth"
147.Fa "int (*pkey_ctrl)(EVP_PKEY *pkey, int op, long arg1, void *arg2)"
148.Fc
149.Ft void
150.Fo EVP_PKEY_asn1_set_check
151.Fa "EVP_PKEY_ASN1_METHOD *ameth"
152.Fa "int (*pkey_check)(const EVP_PKEY *pk)"
153.Fc
154.Ft void
155.Fo EVP_PKEY_asn1_set_public_check
156.Fa "EVP_PKEY_ASN1_METHOD *ameth"
157.Fa "int (*pkey_public_check)(const EVP_PKEY *pk)"
158.Fc
159.Ft void
160.Fo EVP_PKEY_asn1_set_param_check
161.Fa "EVP_PKEY_ASN1_METHOD *ameth"
162.Fa "int (*pkey_param_check)(const EVP_PKEY *pk)"
163.Fc
164.Ft void
165.Fo EVP_PKEY_asn1_set_security_bits
166.Fa "EVP_PKEY_ASN1_METHOD *ameth"
167.Fa "int (*pkey_security_bits)(const EVP_PKEY *pkey)"
168.Fc
169.Sh DESCRIPTION
170.Vt EVP_PKEY_ASN1_METHOD
171is a structure which holds a set of ASN.1 conversion, printing and
172information methods for a specific public key algorithm.
173.Pp
174The built-in
175.Vt EVP_PKEY_ASN1_METHOD
176objects are stored in a table containing the standard
177methods for different algorithms.
178.Ss Methods
179The methods are the underlying implementations of a particular public
180key algorithm present by the
181.Vt EVP_PKEY
182object.
183.Bd -unfilled
184.Ft int Fn (*pub_decode) "EVP_PKEY *pk" "X509_PUBKEY *pub"
185.Ft int Fn (*pub_encode) "X509_PUBKEY *pub" "const EVP_PKEY *pk"
186.Ed
187.Pp
188Decode and encode
189.Vt X509_PUBKEY
190ASN.1 parameters to and from
191.Fa pk .
192These methods must return 0 on error and 1 on success.
193They are called by
194.Xr X509_PUBKEY_get 3
195and
196.Xr X509_PUBKEY_set 3 .
197.Bd -unfilled
198.Ft int Fn (*pub_cmp) "const EVP_PKEY *a" "const EVP_PKEY *b"
199.Ed
200.Pp
201Compare two public keys.
202This method must return 1 when the keys are equal and 0 otherwise.
203It is called by
204.Xr EVP_PKEY_cmp 3 .
205.Bd -filled
206.Ft int Fo (*pub_print)
207.Fa "BIO *out"
208.Fa "const EVP_PKEY *pkey"
209.Fa "int indent"
210.Fa "ASN1_PCTX *pctx"
211.Fc
212.Ed
213.Pp
214Print a public key in humanly readable text to
215.Fa out ,
216indented
217.Fa indent
218spaces.
219This method must return 0 on error and 1 on success.
220It is called by
221.Xr EVP_PKEY_print_public 3 .
222.Bd -unfilled
223.Ft int Fn (*priv_decode) "EVP_PKEY *pk" "const PKCS8_PRIV_KEY_INFO *p8inf"
224.Ft int Fn (*priv_encode) "PKCS8_PRIV_KEY_INFO *p8" "const EVP_PKEY *pk"
225.Ed
226.Pp
227Decode and encode
228.Vt PKCS8_PRIV_KEY_INFO
229form private key to and from
230.Fa pk .
231These methods must return 0 on error, 1 on success.
232They are called by
233.Xr EVP_PKCS82PKEY 3
234and
235.Xr EVP_PKEY2PKCS8 3 .
236.Bd -filled
237.Ft int Fo (*priv_print)
238.Fa "BIO *out"
239.Fa "const EVP_PKEY *pkey"
240.Fa "int indent"
241.Fa "ASN1_PCTX *pctx"
242.Fc
243.Ed
244.Pp
245Print a private key in humanly readable text to
246.Fa out ,
247indented
248.Fa indent
249spaces.
250This method must return 0 on error and 1 on success.
251It is called by
252.Xr EVP_PKEY_print_private 3 .
253.Bd -unfilled
254.Ft int Fn (*pkey_size) "const EVP_PKEY *pk"
255.Ed
256.Pp
257Returns the key size in bytes.
258This method is called by
259.Xr EVP_PKEY_size 3 .
260.Bd -unfilled
261.Ft int Fn (*pkey_bits) "const EVP_PKEY *pk"
262.Ed
263.Pp
264Returns the key size in bits.
265This method is called by
266.Xr EVP_PKEY_bits 3 .
267.Bd -filled
268.Ft int Fo (*param_decode)
269.Fa "EVP_PKEY *pkey"
270.Fa "const unsigned char **pder"
271.Fa "int derlen"
272.Fc
273.br
274.Ft int Fo (*param_encode)
275.Fa "const EVP_PKEY *pkey"
276.Fa "unsigned char **pder"
277.Fc
278.Ed
279.Pp
280Decode and encode DER formatted parameters to and from
281.Fa pk .
282These methods must return 0 on error and 1 on success.
283They are called by
284.Fn PEM_read_bio_Parameters .
285.Bd -unfilled
286.Ft int Fn (*param_missing) "const EVP_PKEY *pk"
287.Ed
288.Pp
289Return 0 if a key parameter is missing or 1 otherwise.
290This method is called by
291.Xr EVP_PKEY_missing_parameters 3 .
292.Bd -unfilled
293.Ft int Fn (*param_copy) "EVP_PKEY *to" "const EVP_PKEY *from"
294.Ed
295.Pp
296Copy key parameters from
297.Fa from
298to
299.Fa to .
300This method must return 0 on error and 1 on success.
301It is called by
302.Xr EVP_PKEY_copy_parameters 3 .
303.Bd -unfilled
304.Ft int Fn (*param_cmp) "const EVP_PKEY *a" "const EVP_PKEY *b"
305.Ed
306.Pp
307Compare the parameters of the keys
308.Fa a
309and
310.Fa b .
311This method must return 1 when the keys are equal, 0 when not equal, and a
312negative number on error.
313It is called by
314.Xr EVP_PKEY_cmp_parameters 3 .
315.Bd -filled
316.Ft int Fo (*param_print)
317.Fa "BIO *out"
318.Fa "const EVP_PKEY *pkey"
319.Fa "int indent"
320.Fa "ASN1_PCTX *pctx"
321.Fc
322.Ed
323.Pp
324Print the private key parameters in humanly readable text to
325.Fa out ,
326indented
327.Fa indent
328spaces.
329This method must return 0 on error and 1 on success.
330It is called by
331.Xr EVP_PKEY_print_params 3 .
332.Bd -unfilled
333.Ft void Fn (*pkey_free) "EVP_PKEY *pkey"
334.Ed
335.Pp
336Free the internals of
337.Fa pkey .
338This method is called by
339.Xr EVP_PKEY_free 3 ,
340.Xr EVP_PKEY_set_type 3 ,
341.Xr EVP_PKEY_set_type_str 3 ,
342and
343.Xr EVP_PKEY_assign 3 .
344.Bd -filled
345.Ft int Fo (*pkey_ctrl)
346.Fa "EVP_PKEY *pkey"
347.Fa "int op"
348.Fa "long arg1"
349.Fa "void *arg2"
350.Fc
351.Ed
352.Pp
353Add extra algorithm specific control.
354.Pp
355If the
356.Fa op
357argument is
358.Dv ASN1_PKEY_CTRL_DEFAULT_MD_NID ,
359the
360.Fa pkey_ctrl
361method is supposed to write the message digest NID
362for public key signature operations with the given
363.Fa pkey
364to
365.Pf * Fa arg2
366as documented in the
367.Xr EVP_PKEY_get_default_digest_nid 3
368manual page.
369.Pp
370The
371.Fa pkey_ctrl
372method is also called by
373.Fn PKCS7_SIGNER_INFO_set ,
374.Fn PKCS7_RECIP_INFO_set ,
375and other functions.
376.\" TODO:
377.\" ASN1_PKEY_CTRL_PKCS7_ENCRYPT in pk7_lib.c rsa_ameth.c
378.\" ASN1_PKEY_CTRL_PKCS7_SIGN in pk7_lib.c dsa_ameth.c ec_ameth.c rsa_ameth.c
379.Bd -unfilled
380.Ft int Fn (*pkey_check) "const EVP_PKEY *pk"
381.Ft int Fn (*pkey_public_check) "const EVP_PKEY *pk"
382.Ft int Fn (*pkey_param_check) "const EVP_PKEY *pk"
383.Ed
384.Pp
385Check the validity of
386.Fa pk
387for key-pair, public component, and parameters, respectively.
388These methods must return 0 for an invalid key or 1 for a valid key.
389They are called by
390.Xr EVP_PKEY_check 3 ,
391.Xr EVP_PKEY_public_check 3 ,
392and
393.Xr EVP_PKEY_param_check 3 ,
394respectively.
395.Bd -unfilled
396.Ft int Fn (*pkey_security_bits) "const EVP_PKEY *pkey"
397.Ed
398.Pp
399Return the security strength measured in bits of
400.Fa pkey .
401It is called by
402.Xr EVP_PKEY_security_bits 3 .
403.Ss Functions
404.Fn EVP_PKEY_asn1_new
405creates and returns a new
406.Vt EVP_PKEY_ASN1_METHOD
407object, marks it as dynamically allocated, and associates the given
408.Fa id ,
409.Fa flags ,
410.Fa pem_str
411and
412.Fa info .
413.Fa id
414is a NID,
415.Fa pem_str
416is the PEM type string,
417.Fa info
418is a descriptive string.
419If
420.Dv ASN1_PKEY_SIGPARAM_NULL
421is set in
422.Fa flags ,
423the signature algorithm parameters are given the type
424.Dv V_ASN1_NULL
425by default, otherwise they will be given the type
426.Dv V_ASN1_UNDEF
427(i.e. the parameter is omitted).
428See
429.Xr X509_ALGOR_set0 3
430for more information.
431.Pp
432.Fn EVP_PKEY_asn1_copy
433copies all function pointers from
434.Fa src
435to
436.Fa dst .
437The data in
438.Fa dst
439that can be set with
440.Fn EVP_PKEY_asn1_new
441\(em NIDs, flags, and strings \(em
442remains unchanged.
443This function is not thread safe, it is recommended to only use this when
444initializing the application.
445.Pp
446.Fn EVP_PKEY_asn1_free
447frees the dynamically allocated
448.Fa ameth
449including all memory it refers to.
450If
451.Fa ameth
452is
453.Dv NULL
454of not marked as dynamically allocated, no action occurs.
455.Pp
456.Fn EVP_PKEY_asn1_set_public ,
457.Fn EVP_PKEY_asn1_set_private ,
458.Fn EVP_PKEY_asn1_set_param ,
459.Fn EVP_PKEY_asn1_set_free ,
460.Fn EVP_PKEY_asn1_set_ctrl ,
461.Fn EVP_PKEY_asn1_set_check ,
462.Fn EVP_PKEY_asn1_set_public_check ,
463.Fn EVP_PKEY_asn1_set_param_check ,
464and
465.Fn EVP_PKEY_asn1_set_security_bits
466set the diverse methods of the given
467.Vt EVP_PKEY_ASN1_METHOD
468object.
469.Sh RETURN VALUES
470.Fn EVP_PKEY_asn1_new
471returns a pointer to the new
472.Vt EVP_PKEY_ASN1_METHOD
473object or
474.Dv NULL
475if memory allocation fails.
476.Sh SEE ALSO
477.Xr EVP_PKEY_asn1_get_count 3 ,
478.Xr EVP_PKEY_new 3 ,
479.Xr X509_PUBKEY_new 3
480.Sh HISTORY
481.Fn EVP_PKEY_asn1_new ,
482.Fn EVP_PKEY_asn1_copy ,
483.Fn EVP_PKEY_asn1_free ,
484.Fn EVP_PKEY_asn1_set_public ,
485.Fn EVP_PKEY_asn1_set_private ,
486.Fn EVP_PKEY_asn1_set_param ,
487.Fn EVP_PKEY_asn1_set_free ,
488and
489.Fn EVP_PKEY_asn1_set_ctrl
490first appeared in OpenSSL 1.0.0 and have been available since
491.Ox 4.9 .
492.Pp
493.Fn EVP_PKEY_asn1_set_check ,
494.Fn EVP_PKEY_asn1_set_public_check ,
495and
496.Fn EVP_PKEY_asn1_set_param_check
497first appeared in OpenSSL 1.1.1 and have been available since
498.Ox 7.1 .
499.Pp
500.Fn EVP_PKEY_asn1_set_security_bits
501first appeared in OpenSSL 1.1.0 and has been available since
502.Ox 7.2 .
diff --git a/src/lib/libcrypto/man/EVP_PKEY_cmp.3 b/src/lib/libcrypto/man/EVP_PKEY_cmp.3
index 2e42a9946f..c12843854d 100644
--- a/src/lib/libcrypto/man/EVP_PKEY_cmp.3
+++ b/src/lib/libcrypto/man/EVP_PKEY_cmp.3
@@ -1,4 +1,4 @@
1.\" $OpenBSD: EVP_PKEY_cmp.3,v 1.14 2024/03/05 19:21:31 tb Exp $ 1.\" $OpenBSD: EVP_PKEY_cmp.3,v 1.15 2024/12/06 12:51:13 schwarze Exp $
2.\" full merge up to: OpenSSL 05ea606a May 20 20:52:46 2016 -0400 2.\" full merge up to: OpenSSL 05ea606a May 20 20:52:46 2016 -0400
3.\" selective merge up to: OpenSSL 99d63d46 Oct 26 13:56:48 2016 -0400 3.\" selective merge up to: OpenSSL 99d63d46 Oct 26 13:56:48 2016 -0400
4.\" 4.\"
@@ -67,7 +67,7 @@
67.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED 67.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
68.\" OF THE POSSIBILITY OF SUCH DAMAGE. 68.\" OF THE POSSIBILITY OF SUCH DAMAGE.
69.\" 69.\"
70.Dd $Mdocdate: March 5 2024 $ 70.Dd $Mdocdate: December 6 2024 $
71.Dt EVP_PKEY_CMP 3 71.Dt EVP_PKEY_CMP 3
72.Os 72.Os
73.Sh NAME 73.Sh NAME
@@ -160,7 +160,6 @@ and
160return 1 if the keys match, 0 if they don't match, -1 if the key types 160return 1 if the keys match, 0 if they don't match, -1 if the key types
161are different and -2 if the operation is not supported. 161are different and -2 if the operation is not supported.
162.Sh SEE ALSO 162.Sh SEE ALSO
163.Xr EVP_PKEY_asn1_set_public 3 ,
164.Xr EVP_PKEY_CTX_new 3 , 163.Xr EVP_PKEY_CTX_new 3 ,
165.Xr EVP_PKEY_keygen 3 , 164.Xr EVP_PKEY_keygen 3 ,
166.Xr EVP_PKEY_new 3 , 165.Xr EVP_PKEY_new 3 ,
diff --git a/src/lib/libcrypto/man/EVP_PKEY_get_default_digest_nid.3 b/src/lib/libcrypto/man/EVP_PKEY_get_default_digest_nid.3
index f0c40f3d1f..e9ff7c4609 100644
--- a/src/lib/libcrypto/man/EVP_PKEY_get_default_digest_nid.3
+++ b/src/lib/libcrypto/man/EVP_PKEY_get_default_digest_nid.3
@@ -1,4 +1,4 @@
1.\" $OpenBSD: EVP_PKEY_get_default_digest_nid.3,v 1.9 2024/04/18 16:33:33 tb Exp $ 1.\" $OpenBSD: EVP_PKEY_get_default_digest_nid.3,v 1.10 2024/12/06 12:51:13 schwarze Exp $
2.\" full merge up to: OpenSSL df75c2bf Dec 9 01:02:36 2018 +0100 2.\" full merge up to: OpenSSL df75c2bf Dec 9 01:02:36 2018 +0100
3.\" 3.\"
4.\" This file is a derived work. 4.\" This file is a derived work.
@@ -66,7 +66,7 @@
66.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED 66.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
67.\" OF THE POSSIBILITY OF SUCH DAMAGE. 67.\" OF THE POSSIBILITY OF SUCH DAMAGE.
68.\" 68.\"
69.Dd $Mdocdate: April 18 2024 $ 69.Dd $Mdocdate: December 6 2024 $
70.Dt EVP_PKEY_GET_DEFAULT_DIGEST_NID 3 70.Dt EVP_PKEY_GET_DEFAULT_DIGEST_NID 3
71.Os 71.Os
72.Sh NAME 72.Sh NAME
@@ -116,7 +116,6 @@ It returns 0 or a negative value for failure.
116In particular, a return value of -2 indicates the operation is not 116In particular, a return value of -2 indicates the operation is not
117supported by the public key algorithm. 117supported by the public key algorithm.
118.Sh SEE ALSO 118.Sh SEE ALSO
119.Xr EVP_PKEY_asn1_set_ctrl 3 ,
120.Xr EVP_PKEY_CTX_ctrl 3 , 119.Xr EVP_PKEY_CTX_ctrl 3 ,
121.Xr EVP_PKEY_CTX_new 3 , 120.Xr EVP_PKEY_CTX_new 3 ,
122.Xr EVP_PKEY_new 3 , 121.Xr EVP_PKEY_new 3 ,
diff --git a/src/lib/libcrypto/man/EVP_PKEY_new.3 b/src/lib/libcrypto/man/EVP_PKEY_new.3
index 0705c8432a..4090db990b 100644
--- a/src/lib/libcrypto/man/EVP_PKEY_new.3
+++ b/src/lib/libcrypto/man/EVP_PKEY_new.3
@@ -1,4 +1,4 @@
1.\" $OpenBSD: EVP_PKEY_new.3,v 1.22 2024/11/29 12:05:06 schwarze Exp $ 1.\" $OpenBSD: EVP_PKEY_new.3,v 1.23 2024/12/06 12:51:13 schwarze Exp $
2.\" full merge up to: OpenSSL 4dcfdfce May 27 11:50:05 2020 +0100 2.\" full merge up to: OpenSSL 4dcfdfce May 27 11:50:05 2020 +0100
3.\" 3.\"
4.\" This file is a derived work. 4.\" This file is a derived work.
@@ -66,7 +66,7 @@
66.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED 66.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
67.\" OF THE POSSIBILITY OF SUCH DAMAGE. 67.\" OF THE POSSIBILITY OF SUCH DAMAGE.
68.\" 68.\"
69.Dd $Mdocdate: November 29 2024 $ 69.Dd $Mdocdate: December 6 2024 $
70.Dt EVP_PKEY_NEW 3 70.Dt EVP_PKEY_NEW 3
71.Os 71.Os
72.Sh NAME 72.Sh NAME
@@ -311,7 +311,6 @@ with
311.Xr d2i_PrivateKey 3 , 311.Xr d2i_PrivateKey 3 ,
312.Xr evp 3 , 312.Xr evp 3 ,
313.Xr EVP_PKCS82PKEY 3 , 313.Xr EVP_PKCS82PKEY 3 ,
314.Xr EVP_PKEY_asn1_new 3 ,
315.Xr EVP_PKEY_check 3 , 314.Xr EVP_PKEY_check 3 ,
316.Xr EVP_PKEY_cmp 3 , 315.Xr EVP_PKEY_cmp 3 ,
317.Xr EVP_PKEY_CTX_new 3 , 316.Xr EVP_PKEY_CTX_new 3 ,
diff --git a/src/lib/libcrypto/man/EVP_PKEY_print_private.3 b/src/lib/libcrypto/man/EVP_PKEY_print_private.3
index c1e6899818..a4b51a4bbb 100644
--- a/src/lib/libcrypto/man/EVP_PKEY_print_private.3
+++ b/src/lib/libcrypto/man/EVP_PKEY_print_private.3
@@ -1,4 +1,4 @@
1.\" $OpenBSD: EVP_PKEY_print_private.3,v 1.7 2019/06/06 01:06:58 schwarze Exp $ 1.\" $OpenBSD: EVP_PKEY_print_private.3,v 1.8 2024/12/06 12:51:13 schwarze Exp $
2.\" OpenSSL 99d63d46 Oct 26 13:56:48 2016 -0400 2.\" OpenSSL 99d63d46 Oct 26 13:56:48 2016 -0400
3.\" 3.\"
4.\" This file was written by Dr. Stephen Henson <steve@openssl.org>. 4.\" This file was written by Dr. Stephen Henson <steve@openssl.org>.
@@ -48,7 +48,7 @@
48.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED 48.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
49.\" OF THE POSSIBILITY OF SUCH DAMAGE. 49.\" OF THE POSSIBILITY OF SUCH DAMAGE.
50.\" 50.\"
51.Dd $Mdocdate: June 6 2019 $ 51.Dd $Mdocdate: December 6 2024 $
52.Dt EVP_PKEY_PRINT_PRIVATE 3 52.Dt EVP_PKEY_PRINT_PRIVATE 3
53.Os 53.Os
54.Sh NAME 54.Sh NAME
@@ -120,7 +120,6 @@ failure.
120In particular, a return value of -2 indicates the operation is not 120In particular, a return value of -2 indicates the operation is not
121supported by the public key algorithm. 121supported by the public key algorithm.
122.Sh SEE ALSO 122.Sh SEE ALSO
123.Xr EVP_PKEY_asn1_set_public 3 ,
124.Xr EVP_PKEY_CTX_new 3 , 123.Xr EVP_PKEY_CTX_new 3 ,
125.Xr EVP_PKEY_keygen 3 , 124.Xr EVP_PKEY_keygen 3 ,
126.Xr EVP_PKEY_new 3 125.Xr EVP_PKEY_new 3
diff --git a/src/lib/libcrypto/man/EVP_PKEY_size.3 b/src/lib/libcrypto/man/EVP_PKEY_size.3
index f49678d0a9..cd25eec9c2 100644
--- a/src/lib/libcrypto/man/EVP_PKEY_size.3
+++ b/src/lib/libcrypto/man/EVP_PKEY_size.3
@@ -1,4 +1,4 @@
1.\" $OpenBSD: EVP_PKEY_size.3,v 1.3 2024/03/05 19:21:31 tb Exp $ 1.\" $OpenBSD: EVP_PKEY_size.3,v 1.4 2024/12/06 12:51:13 schwarze Exp $
2.\" full merge up to: OpenSSL eed9d03b Jan 8 11:04:15 2020 +0100 2.\" full merge up to: OpenSSL eed9d03b Jan 8 11:04:15 2020 +0100
3.\" 3.\"
4.\" This file is a derived work. 4.\" This file is a derived work.
@@ -65,7 +65,7 @@
65.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED 65.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
66.\" OF THE POSSIBILITY OF SUCH DAMAGE. 66.\" OF THE POSSIBILITY OF SUCH DAMAGE.
67.\" 67.\"
68.Dd $Mdocdate: March 5 2024 $ 68.Dd $Mdocdate: December 6 2024 $
69.Dt EVP_PKEY_SIZE 3 69.Dt EVP_PKEY_SIZE 3
70.Os 70.Os
71.Sh NAME 71.Sh NAME
@@ -134,7 +134,6 @@ For those functions, it isn't strictly necessary to call
134to find out the buffer size, but it may still be useful in cases 134to find out the buffer size, but it may still be useful in cases
135where it's desirable to know the upper limit in advance. 135where it's desirable to know the upper limit in advance.
136.Pp 136.Pp
137By default,
138.Fn EVP_PKEY_size 137.Fn EVP_PKEY_size
139is supported for the following algorithms: 138is supported for the following algorithms:
140.Bl -column ED25519 "EVP_MAX_BLOCK_LENGTH = 32" 139.Bl -column ED25519 "EVP_MAX_BLOCK_LENGTH = 32"
@@ -156,15 +155,12 @@ the situation is special: while the key size is
156.Fn EVP_PKEY_size 155.Fn EVP_PKEY_size
157returns 64 because the signature is longer than the keys. 156returns 64 because the signature is longer than the keys.
158.Pp 157.Pp
159The application program can support additional algorithms by calling
160.Xr EVP_PKEY_asn1_set_public 3 .
161.Pp
162.Fn EVP_PKEY_bits 158.Fn EVP_PKEY_bits
163returns the cryptographic length of the cryptosystem to which the key in 159returns the cryptographic length of the cryptosystem to which the key in
164.Fa pkey 160.Fa pkey
165belongs, in bits. 161belongs, in bits.
166The definition of cryptographic length is specific to the key cryptosystem. 162The definition of cryptographic length is specific to the key cryptosystem.
167By default, the following algorithms are supported: 163The following algorithms are supported:
168.Bl -column ED25519 "the public domain parameter p" DSA_bits(3) 164.Bl -column ED25519 "the public domain parameter p" DSA_bits(3)
169.It Ta cryptographic length = Ta same result as from: 165.It Ta cryptographic length = Ta same result as from:
170.It Ta significant bits in ... Ta 166.It Ta significant bits in ... Ta
@@ -176,14 +172,11 @@ By default, the following algorithms are supported:
176.It X25519 Ta 253 Ta \(em 172.It X25519 Ta 253 Ta \(em
177.El 173.El
178.Pp 174.Pp
179The application program can support additional algorithms by calling
180.Xr EVP_PKEY_asn1_set_public 3 .
181.Pp
182.Fn EVP_PKEY_security_bits 175.Fn EVP_PKEY_security_bits
183returns the security strength measured in bits of the given 176returns the security strength measured in bits of the given
184.Fa pkey 177.Fa pkey
185as defined in NIST SP800-57. 178as defined in NIST SP800-57.
186By default, the following algorithms are supported: 179The following algorithms are supported:
187.Bl -column ED25519 DSA_security_bits(3) 180.Bl -column ED25519 DSA_security_bits(3)
188.It Ta same result as from: 181.It Ta same result as from:
189.It DH Ta Xr DH_security_bits 3 182.It DH Ta Xr DH_security_bits 3
@@ -196,9 +189,6 @@ By default, the following algorithms are supported:
196.Pp 189.Pp
197For EC keys, if the result is greater than 80, it is rounded down 190For EC keys, if the result is greater than 80, it is rounded down
198to 256, 192, 128, 112, or 80. 191to 256, 192, 128, 112, or 80.
199.Pp
200The application program can support additional algorithms by calling
201.Xr EVP_PKEY_asn1_set_security_bits 3 .
202.Sh RETURN VALUES 192.Sh RETURN VALUES
203.Fn EVP_PKEY_size 193.Fn EVP_PKEY_size
204and 194and
diff --git a/src/lib/libcrypto/man/EVP_SignInit.3 b/src/lib/libcrypto/man/EVP_SignInit.3
index 9a6c743876..8158b21dbf 100644
--- a/src/lib/libcrypto/man/EVP_SignInit.3
+++ b/src/lib/libcrypto/man/EVP_SignInit.3
@@ -1,4 +1,4 @@
1.\" $OpenBSD: EVP_SignInit.3,v 1.20 2024/11/08 22:23:35 schwarze Exp $ 1.\" $OpenBSD: EVP_SignInit.3,v 1.21 2024/12/06 12:51:13 schwarze Exp $
2.\" full merge up to: OpenSSL 6328d367 Jul 4 21:58:30 2020 +0200 2.\" full merge up to: OpenSSL 6328d367 Jul 4 21:58:30 2020 +0200
3.\" 3.\"
4.\" This file was written by Dr. Stephen Henson <steve@openssl.org>. 4.\" This file was written by Dr. Stephen Henson <steve@openssl.org>.
@@ -49,7 +49,7 @@
49.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED 49.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
50.\" OF THE POSSIBILITY OF SUCH DAMAGE. 50.\" OF THE POSSIBILITY OF SUCH DAMAGE.
51.\" 51.\"
52.Dd $Mdocdate: November 8 2024 $ 52.Dd $Mdocdate: December 6 2024 $
53.Dt EVP_SIGNINIT 3 53.Dt EVP_SIGNINIT 3
54.Os 54.Os
55.Sh NAME 55.Sh NAME
@@ -179,7 +179,6 @@ The error codes can be obtained by
179.Sh SEE ALSO 179.Sh SEE ALSO
180.Xr evp 3 , 180.Xr evp 3 ,
181.Xr EVP_DigestInit 3 , 181.Xr EVP_DigestInit 3 ,
182.Xr EVP_PKEY_asn1_set_public 3 ,
183.Xr EVP_PKEY_size 3 , 182.Xr EVP_PKEY_size 3 ,
184.Xr EVP_VerifyInit 3 183.Xr EVP_VerifyInit 3
185.Sh HISTORY 184.Sh HISTORY
diff --git a/src/lib/libcrypto/man/Makefile b/src/lib/libcrypto/man/Makefile
index 5d791d183e..da93f14a43 100644
--- a/src/lib/libcrypto/man/Makefile
+++ b/src/lib/libcrypto/man/Makefile
@@ -1,4 +1,4 @@
1# $OpenBSD: Makefile,v 1.296 2024/11/12 20:15:24 schwarze Exp $ 1# $OpenBSD: Makefile,v 1.297 2024/12/06 12:51:13 schwarze Exp $
2 2
3.include <bsd.own.mk> 3.include <bsd.own.mk>
4 4
@@ -178,7 +178,6 @@ MAN= \
178 EVP_PKEY_CTX_set_hkdf_md.3 \ 178 EVP_PKEY_CTX_set_hkdf_md.3 \
179 EVP_PKEY_CTX_set_tls1_prf_md.3 \ 179 EVP_PKEY_CTX_set_tls1_prf_md.3 \
180 EVP_PKEY_asn1_get_count.3 \ 180 EVP_PKEY_asn1_get_count.3 \
181 EVP_PKEY_asn1_new.3 \
182 EVP_PKEY_check.3 \ 181 EVP_PKEY_check.3 \
183 EVP_PKEY_cmp.3 \ 182 EVP_PKEY_cmp.3 \
184 EVP_PKEY_decrypt.3 \ 183 EVP_PKEY_decrypt.3 \
diff --git a/src/lib/libcrypto/man/PKCS8_PRIV_KEY_INFO_new.3 b/src/lib/libcrypto/man/PKCS8_PRIV_KEY_INFO_new.3
index 2eb9aef054..822968f58d 100644
--- a/src/lib/libcrypto/man/PKCS8_PRIV_KEY_INFO_new.3
+++ b/src/lib/libcrypto/man/PKCS8_PRIV_KEY_INFO_new.3
@@ -1,4 +1,4 @@
1.\" $OpenBSD: PKCS8_PRIV_KEY_INFO_new.3,v 1.6 2021/10/25 13:48:12 schwarze Exp $ 1.\" $OpenBSD: PKCS8_PRIV_KEY_INFO_new.3,v 1.7 2024/12/06 12:51:13 schwarze Exp $
2.\" 2.\"
3.\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org> 3.\" Copyright (c) 2016 Ingo Schwarze <schwarze@openbsd.org>
4.\" 4.\"
@@ -14,7 +14,7 @@
14.\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF 14.\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
15.\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. 15.\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
16.\" 16.\"
17.Dd $Mdocdate: October 25 2021 $ 17.Dd $Mdocdate: December 6 2024 $
18.Dt PKCS8_PRIV_KEY_INFO_NEW 3 18.Dt PKCS8_PRIV_KEY_INFO_NEW 3
19.Os 19.Os
20.Sh NAME 20.Sh NAME
@@ -51,7 +51,6 @@ if an error occurs.
51.Xr d2i_PKCS8_PRIV_KEY_INFO 3 , 51.Xr d2i_PKCS8_PRIV_KEY_INFO 3 ,
52.Xr d2i_PKCS8PrivateKey_bio 3 , 52.Xr d2i_PKCS8PrivateKey_bio 3 ,
53.Xr EVP_PKCS82PKEY 3 , 53.Xr EVP_PKCS82PKEY 3 ,
54.Xr EVP_PKEY_asn1_set_private 3 ,
55.Xr PEM_read_PKCS8_PRIV_KEY_INFO 3 , 54.Xr PEM_read_PKCS8_PRIV_KEY_INFO 3 ,
56.Xr PKCS12_parse 3 , 55.Xr PKCS12_parse 3 ,
57.Xr PKCS8_pkey_set0 3 , 56.Xr PKCS8_pkey_set0 3 ,
diff --git a/src/lib/libcrypto/man/X509_PUBKEY_new.3 b/src/lib/libcrypto/man/X509_PUBKEY_new.3
index 648b028d5d..df1c50bda2 100644
--- a/src/lib/libcrypto/man/X509_PUBKEY_new.3
+++ b/src/lib/libcrypto/man/X509_PUBKEY_new.3
@@ -1,4 +1,4 @@
1.\" $OpenBSD: X509_PUBKEY_new.3,v 1.17 2021/10/26 10:01:23 schwarze Exp $ 1.\" $OpenBSD: X509_PUBKEY_new.3,v 1.18 2024/12/06 12:51:13 schwarze Exp $
2.\" full merge up to: OpenSSL 99d63d46 Oct 26 13:56:48 2016 -0400 2.\" full merge up to: OpenSSL 99d63d46 Oct 26 13:56:48 2016 -0400
3.\" 3.\"
4.\" This file is a derived work. 4.\" This file is a derived work.
@@ -65,7 +65,7 @@
65.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED 65.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
66.\" OF THE POSSIBILITY OF SUCH DAMAGE. 66.\" OF THE POSSIBILITY OF SUCH DAMAGE.
67.\" 67.\"
68.Dd $Mdocdate: October 26 2021 $ 68.Dd $Mdocdate: December 6 2024 $
69.Dt X509_PUBKEY_NEW 3 69.Dt X509_PUBKEY_NEW 3
70.Os 70.Os
71.Sh NAME 71.Sh NAME
@@ -354,7 +354,6 @@ or does not contain a public key,
354these functions fail but no error is pushed onto the stack. 354these functions fail but no error is pushed onto the stack.
355.Sh SEE ALSO 355.Sh SEE ALSO
356.Xr d2i_X509 3 , 356.Xr d2i_X509 3 ,
357.Xr EVP_PKEY_asn1_set_public 3 ,
358.Xr X509_ALGOR_new 3 , 357.Xr X509_ALGOR_new 3 ,
359.Xr X509_get_pubkey 3 , 358.Xr X509_get_pubkey 3 ,
360.Xr X509_new 3 359.Xr X509_new 3
diff --git a/src/lib/libcrypto/man/X509_signature_dump.3 b/src/lib/libcrypto/man/X509_signature_dump.3
index bc41cc8b61..3333a615bf 100644
--- a/src/lib/libcrypto/man/X509_signature_dump.3
+++ b/src/lib/libcrypto/man/X509_signature_dump.3
@@ -1,4 +1,4 @@
1.\" $OpenBSD: X509_signature_dump.3,v 1.2 2021/12/18 17:47:45 schwarze Exp $ 1.\" $OpenBSD: X509_signature_dump.3,v 1.3 2024/12/06 12:51:13 schwarze Exp $
2.\" 2.\"
3.\" Copyright (c) 2021 Ingo Schwarze <schwarze@openbsd.org> 3.\" Copyright (c) 2021 Ingo Schwarze <schwarze@openbsd.org>
4.\" 4.\"
@@ -14,7 +14,7 @@
14.\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF 14.\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
15.\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. 15.\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
16.\" 16.\"
17.Dd $Mdocdate: December 18 2021 $ 17.Dd $Mdocdate: December 6 2024 $
18.Dt X509_SIGNATURE_DUMP 3 18.Dt X509_SIGNATURE_DUMP 3
19.Os 19.Os
20.Sh NAME 20.Sh NAME
@@ -71,7 +71,7 @@ They fail and return as soon as any write operation fails.
71.Xr ASN1_STRING_new 3 , 71.Xr ASN1_STRING_new 3 ,
72.Xr ASN1_STRING_print_ex 3 , 72.Xr ASN1_STRING_print_ex 3 ,
73.Xr BIO_new 3 , 73.Xr BIO_new 3 ,
74.Xr EVP_PKEY_asn1_new 3 , 74.Xr EVP_PKEY_asn1_find 3 ,
75.Xr OBJ_find_sigid_algs 3 , 75.Xr OBJ_find_sigid_algs 3 ,
76.Xr X509_ALGOR_new 3 , 76.Xr X509_ALGOR_new 3 ,
77.Xr X509_get0_signature 3 77.Xr X509_get0_signature 3
diff --git a/src/lib/libcrypto/man/evp.3 b/src/lib/libcrypto/man/evp.3
index 6ccf9898d1..0168d95875 100644
--- a/src/lib/libcrypto/man/evp.3
+++ b/src/lib/libcrypto/man/evp.3
@@ -1,4 +1,4 @@
1.\" $OpenBSD: evp.3,v 1.33 2024/12/06 11:56:21 schwarze Exp $ 1.\" $OpenBSD: evp.3,v 1.34 2024/12/06 12:51:13 schwarze Exp $
2.\" full merge up to: OpenSSL man7/evp 24a535ea Sep 22 13:14:20 2020 +0100 2.\" full merge up to: OpenSSL man7/evp 24a535ea Sep 22 13:14:20 2020 +0100
3.\" 3.\"
4.\" This file was written by Ulf Moeller <ulf@openssl.org>, 4.\" This file was written by Ulf Moeller <ulf@openssl.org>,
@@ -204,7 +204,6 @@ family of functions provides base64 encoding and decoding.
204.Xr EVP_OpenInit 3 , 204.Xr EVP_OpenInit 3 ,
205.Xr EVP_PKCS82PKEY 3 , 205.Xr EVP_PKCS82PKEY 3 ,
206.Xr EVP_PKEY_asn1_get_count 3 , 206.Xr EVP_PKEY_asn1_get_count 3 ,
207.Xr EVP_PKEY_asn1_new 3 ,
208.Xr EVP_PKEY_check 3 , 207.Xr EVP_PKEY_check 3 ,
209.Xr EVP_PKEY_cmp 3 , 208.Xr EVP_PKEY_cmp 3 ,
210.Xr EVP_PKEY_CTX_ctrl 3 , 209.Xr EVP_PKEY_CTX_ctrl 3 ,