diff options
Diffstat (limited to '')
| -rw-r--r-- | src/lib/libcrypto/man/BN_generate_prime.3 | 6 | ||||
| -rw-r--r-- | src/lib/libcrypto/man/CMS_add1_signer.3 | 10 | ||||
| -rw-r--r-- | src/lib/libcrypto/man/CMS_sign.3 | 10 | ||||
| -rw-r--r-- | src/lib/libcrypto/man/ChaCha.3 | 12 | ||||
| -rw-r--r-- | src/lib/libcrypto/man/EVP_aes_128_cbc.3 | 12 | ||||
| -rw-r--r-- | src/lib/libcrypto/man/EVP_camellia_128_cbc.3 | 6 | 
6 files changed, 28 insertions, 28 deletions
| diff --git a/src/lib/libcrypto/man/BN_generate_prime.3 b/src/lib/libcrypto/man/BN_generate_prime.3 index 7db27fd627..764ea6f873 100644 --- a/src/lib/libcrypto/man/BN_generate_prime.3 +++ b/src/lib/libcrypto/man/BN_generate_prime.3 | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | .\" $OpenBSD: BN_generate_prime.3,v 1.18 2019/08/25 19:24:00 schwarze Exp $ | 1 | .\" $OpenBSD: BN_generate_prime.3,v 1.19 2020/06/24 18:15:00 jmc Exp $ | 
| 2 | .\" full merge up to: OpenSSL f987a4dd Jun 27 10:12:08 2019 +0200 | 2 | .\" full merge up to: OpenSSL f987a4dd Jun 27 10:12:08 2019 +0200 | 
| 3 | .\" | 3 | .\" | 
| 4 | .\" This file was written by Ulf Moeller <ulf@openssl.org> | 4 | .\" This file was written by Ulf Moeller <ulf@openssl.org> | 
| @@ -50,7 +50,7 @@ | |||
| 50 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 50 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 
| 51 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 51 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 
| 52 | .\" | 52 | .\" | 
| 53 | .Dd $Mdocdate: August 25 2019 $ | 53 | .Dd $Mdocdate: June 24 2020 $ | 
| 54 | .Dt BN_GENERATE_PRIME 3 | 54 | .Dt BN_GENERATE_PRIME 3 | 
| 55 | .Os | 55 | .Os | 
| 56 | .Sh NAME | 56 | .Sh NAME | 
| @@ -262,7 +262,7 @@ When the source of the prime is not random or not trusted, the | |||
| 262 | number of checks needs to be much higher to reach the same level | 262 | number of checks needs to be much higher to reach the same level | 
| 263 | of assurance: It should equal half of the targeted security level | 263 | of assurance: It should equal half of the targeted security level | 
| 264 | in bits (rounded up to the next integer if necessary). | 264 | in bits (rounded up to the next integer if necessary). | 
| 265 | For instance, to reach the 128 bit security level, | 265 | For instance, to reach the 128-bit security level, | 
| 266 | .Fa nchecks | 266 | .Fa nchecks | 
| 267 | should be set to 64. | 267 | should be set to 64. | 
| 268 | .Pp | 268 | .Pp | 
| diff --git a/src/lib/libcrypto/man/CMS_add1_signer.3 b/src/lib/libcrypto/man/CMS_add1_signer.3 index 7f8183f93f..9ee97dfaf4 100644 --- a/src/lib/libcrypto/man/CMS_add1_signer.3 +++ b/src/lib/libcrypto/man/CMS_add1_signer.3 | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | .\" $OpenBSD: CMS_add1_signer.3,v 1.7 2019/11/02 15:39:46 schwarze Exp $ | 1 | .\" $OpenBSD: CMS_add1_signer.3,v 1.8 2020/06/24 18:15:00 jmc Exp $ | 
| 2 | .\" full merge up to: OpenSSL e9b77246 Jan 20 19:58:49 2017 +0100 | 2 | .\" full merge up to: OpenSSL e9b77246 Jan 20 19:58:49 2017 +0100 | 
| 3 | .\" | 3 | .\" | 
| 4 | .\" This file is a derived work. | 4 | .\" This file is a derived work. | 
| @@ -65,7 +65,7 @@ | |||
| 65 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 65 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 
| 66 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 66 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 
| 67 | .\" | 67 | .\" | 
| 68 | .Dd $Mdocdate: November 2 2019 $ | 68 | .Dd $Mdocdate: June 24 2020 $ | 
| 69 | .Dt CMS_ADD1_SIGNER 3 | 69 | .Dt CMS_ADD1_SIGNER 3 | 
| 70 | .Os | 70 | .Os | 
| 71 | .Sh NAME | 71 | .Sh NAME | 
| @@ -196,9 +196,9 @@ By default, issuer name and serial number are used instead. | |||
| 196 | If present, the | 196 | If present, the | 
| 197 | .Vt SMIMECapabilities | 197 | .Vt SMIMECapabilities | 
| 198 | attribute indicates support for the | 198 | attribute indicates support for the | 
| 199 | following algorithms in preference order: 256 bit AES, Gost R3411-94, | 199 | following algorithms in preference order: 256-bit AES, Gost R3411-94, | 
| 200 | Gost 28147-89, 192 bit AES, 128 bit AES, triple DES, 128 bit RC2, 64 bit | 200 | Gost 28147-89, 192-bit AES, 128-bit AES, triple DES, 128-bit RC2, 64-bit | 
| 201 | RC2, DES and 40 bit RC2. | 201 | RC2, DES and 40-bit RC2. | 
| 202 | If any of these algorithms is not available then it will not be | 202 | If any of these algorithms is not available then it will not be | 
| 203 | included. | 203 | included. | 
| 204 | .Pp | 204 | .Pp | 
| diff --git a/src/lib/libcrypto/man/CMS_sign.3 b/src/lib/libcrypto/man/CMS_sign.3 index f8cae4018d..64461959dd 100644 --- a/src/lib/libcrypto/man/CMS_sign.3 +++ b/src/lib/libcrypto/man/CMS_sign.3 | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | .\" $OpenBSD: CMS_sign.3,v 1.8 2019/11/02 15:39:46 schwarze Exp $ | 1 | .\" $OpenBSD: CMS_sign.3,v 1.9 2020/06/24 18:15:00 jmc Exp $ | 
| 2 | .\" full merge up to: OpenSSL e9b77246 Jan 20 19:58:49 2017 +0100 | 2 | .\" full merge up to: OpenSSL e9b77246 Jan 20 19:58:49 2017 +0100 | 
| 3 | .\" | 3 | .\" | 
| 4 | .\" This file was written by Dr. Stephen Henson <steve@openssl.org>. | 4 | .\" This file was written by Dr. Stephen Henson <steve@openssl.org>. | 
| @@ -48,7 +48,7 @@ | |||
| 48 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 48 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 
| 49 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 49 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 
| 50 | .\" | 50 | .\" | 
| 51 | .Dd $Mdocdate: November 2 2019 $ | 51 | .Dd $Mdocdate: June 24 2020 $ | 
| 52 | .Dt CMS_SIGN 3 | 52 | .Dt CMS_SIGN 3 | 
| 53 | .Os | 53 | .Os | 
| 54 | .Sh NAME | 54 | .Sh NAME | 
| @@ -127,9 +127,9 @@ attribute. | |||
| 127 | Omit just the | 127 | Omit just the | 
| 128 | .Vt SMIMECapabilities . | 128 | .Vt SMIMECapabilities . | 
| 129 | If present, the SMIMECapabilities attribute indicates support for the | 129 | If present, the SMIMECapabilities attribute indicates support for the | 
| 130 | following algorithms in preference order: 256 bit AES, Gost R3411-94, | 130 | following algorithms in preference order: 256-bit AES, Gost R3411-94, | 
| 131 | Gost 28147-89, 192 bit AES, 128 bit AES, triple DES, 128 bit RC2, 64 bit | 131 | Gost 28147-89, 192-bit AES, 128-bit AES, triple DES, 128-bit RC2, 64-bit | 
| 132 | RC2, DES and 40 bit RC2. | 132 | RC2, DES and 40-bit RC2. | 
| 133 | If any of these algorithms is not available, then it will not be | 133 | If any of these algorithms is not available, then it will not be | 
| 134 | included. | 134 | included. | 
| 135 | .It Dv CMS_USE_KEYID | 135 | .It Dv CMS_USE_KEYID | 
| diff --git a/src/lib/libcrypto/man/ChaCha.3 b/src/lib/libcrypto/man/ChaCha.3 index 909d8ca77d..6b037f80ad 100644 --- a/src/lib/libcrypto/man/ChaCha.3 +++ b/src/lib/libcrypto/man/ChaCha.3 | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | .\" $OpenBSD: ChaCha.3,v 1.1 2020/06/24 17:00:38 schwarze Exp $ | 1 | .\" $OpenBSD: ChaCha.3,v 1.2 2020/06/24 18:15:00 jmc Exp $ | 
| 2 | .\" | 2 | .\" | 
| 3 | .\" Copyright (c) 2020 Ingo Schwarze <schwarze@openbsd.org> | 3 | .\" Copyright (c) 2020 Ingo Schwarze <schwarze@openbsd.org> | 
| 4 | .\" | 4 | .\" | 
| @@ -71,7 +71,7 @@ | |||
| 71 | .Fc | 71 | .Fc | 
| 72 | .Sh DESCRIPTION | 72 | .Sh DESCRIPTION | 
| 73 | These functions provide a low-level implementation | 73 | These functions provide a low-level implementation | 
| 74 | of the ChaCha stream cipher with 256 and 128 bit keys. | 74 | of the ChaCha stream cipher with 256 and 128-bit keys. | 
| 75 | The number of rounds is hardcoded to 20; | 75 | The number of rounds is hardcoded to 20; | 
| 76 | variants with 8 or 12 rounds are not supported. | 76 | variants with 8 or 12 rounds are not supported. | 
| 77 | .Pp | 77 | .Pp | 
| @@ -216,16 +216,16 @@ from the first two thirds of | |||
| 216 | RFC 8439: ChaCha20 and Poly1305 for IETF Protocols | 216 | RFC 8439: ChaCha20 and Poly1305 for IETF Protocols | 
| 217 | .Pp | 217 | .Pp | 
| 218 | Note that the standard specifies | 218 | Note that the standard specifies | 
| 219 | a 32 bit counter and a 96 bit initialization vector whereas | 219 | a 32-bit counter and a 96-bit initialization vector whereas | 
| 220 | this implementation follows Bernstein's original specification | 220 | this implementation follows Bernstein's original specification | 
| 221 | and uses a 64 bit counter and a 64 bit initialization vector. | 221 | and uses a 64-bit counter and a 64-bit initialization vector. | 
| 222 | .Pp | 222 | .Pp | 
| 223 | These functions are specific to LibreSSL and not provided by OpenSSL. | 223 | These functions are specific to LibreSSL and not provided by OpenSSL. | 
| 224 | BoringSSL does provide | 224 | BoringSSL does provide | 
| 225 | .Fn CRYPTO_chacha_20 , | 225 | .Fn CRYPTO_chacha_20 , | 
| 226 | but with an incompatible interface, taking a 96 bit | 226 | but with an incompatible interface, taking a 96-bit | 
| 227 | .Fa iv | 227 | .Fa iv | 
| 228 | and a 32 bit | 228 | and a 32-bit | 
| 229 | .Fa counter . | 229 | .Fa counter . | 
| 230 | .Sh HISTORY | 230 | .Sh HISTORY | 
| 231 | .Fn ChaCha_set_key , | 231 | .Fn ChaCha_set_key , | 
| diff --git a/src/lib/libcrypto/man/EVP_aes_128_cbc.3 b/src/lib/libcrypto/man/EVP_aes_128_cbc.3 index f25df8c7eb..ac63f7f1f2 100644 --- a/src/lib/libcrypto/man/EVP_aes_128_cbc.3 +++ b/src/lib/libcrypto/man/EVP_aes_128_cbc.3 | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | .\" $OpenBSD: EVP_aes_128_cbc.3,v 1.3 2019/08/28 10:37:42 schwarze Exp $ | 1 | .\" $OpenBSD: EVP_aes_128_cbc.3,v 1.4 2020/06/24 18:15:00 jmc Exp $ | 
| 2 | .\" selective merge up to: OpenSSL 7c6d372a Nov 20 13:20:01 2018 +0000 | 2 | .\" selective merge up to: OpenSSL 7c6d372a Nov 20 13:20:01 2018 +0000 | 
| 3 | .\" | 3 | .\" | 
| 4 | .\" This file was written by Ronald Tse <ronald.tse@ribose.com> | 4 | .\" This file was written by Ronald Tse <ronald.tse@ribose.com> | 
| @@ -48,7 +48,7 @@ | |||
| 48 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 48 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 
| 49 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 49 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 
| 50 | .\" | 50 | .\" | 
| 51 | .Dd $Mdocdate: August 28 2019 $ | 51 | .Dd $Mdocdate: June 24 2020 $ | 
| 52 | .Dt EVP_AES_128_CBC 3 | 52 | .Dt EVP_AES_128_CBC 3 | 
| 53 | .Os | 53 | .Os | 
| 54 | .Sh NAME | 54 | .Sh NAME | 
| @@ -193,7 +193,7 @@ framework. | |||
| 193 | .Fn EVP_aes_192_ofb , | 193 | .Fn EVP_aes_192_ofb , | 
| 194 | and | 194 | and | 
| 195 | .Fn EVP_aes_256_ofb | 195 | .Fn EVP_aes_256_ofb | 
| 196 | provide AES for 128, 192, and 256 bit keys in the following modes: | 196 | provide AES for 128, 192, and 256-bit keys in the following modes: | 
| 197 | CBC, CFB with 1-bit shift, CFB with 8-bit shift, CFB with 128-bit shift, | 197 | CBC, CFB with 1-bit shift, CFB with 8-bit shift, CFB with 128-bit shift, | 
| 198 | CTR, ECB, and OFB. | 198 | CTR, ECB, and OFB. | 
| 199 | .Pp | 199 | .Pp | 
| @@ -211,7 +211,7 @@ and | |||
| 211 | and | 211 | and | 
| 212 | .Fn EVP_aes_256_cbc_hmac_sha1 | 212 | .Fn EVP_aes_256_cbc_hmac_sha1 | 
| 213 | provide authenticated encryption with AES in CBC mode using SHA-1 as HMAC, | 213 | provide authenticated encryption with AES in CBC mode using SHA-1 as HMAC, | 
| 214 | with keys of 128 and 256 bits length respectively. | 214 | with keys of 128 and 256-bit length respectively. | 
| 215 | The authentication tag is 160 bits long. | 215 | The authentication tag is 160 bits long. | 
| 216 | This is not intended for usage outside of TLS and requires | 216 | This is not intended for usage outside of TLS and requires | 
| 217 | calling of some undocumented control functions. | 217 | calling of some undocumented control functions. | 
| @@ -224,7 +224,7 @@ These ciphers do not conform to the EVP AEAD interface. | |||
| 224 | .Fn EVP_aes_192_gcm , | 224 | .Fn EVP_aes_192_gcm , | 
| 225 | and | 225 | and | 
| 226 | .Fn EVP_aes_256_gcm | 226 | .Fn EVP_aes_256_gcm | 
| 227 | provide AES for 128, 192 and 256 bit keys in CBC-MAC Mode (CCM) | 227 | provide AES for 128, 192 and 256-bit keys in CBC-MAC Mode (CCM) | 
| 228 | and Galois Counter Mode (GCM), respectively. | 228 | and Galois Counter Mode (GCM), respectively. | 
| 229 | These ciphers require additional control operations to function | 229 | These ciphers require additional control operations to function | 
| 230 | correctly; see | 230 | correctly; see | 
| @@ -235,7 +235,7 @@ for details. | |||
| 235 | .Fn EVP_aes_192_wrap , | 235 | .Fn EVP_aes_192_wrap , | 
| 236 | and | 236 | and | 
| 237 | .Fn EVP_aes_256_wrap | 237 | .Fn EVP_aes_256_wrap | 
| 238 | provide AES key wrap with 128, 192 and 256 bit keys | 238 | provide AES key wrap with 128, 192 and 256-bit keys | 
| 239 | according to RFC 3394 section 2.2.1 ("wrap"). | 239 | according to RFC 3394 section 2.2.1 ("wrap"). | 
| 240 | When the returned | 240 | When the returned | 
| 241 | .Vt EVP_CIPHER | 241 | .Vt EVP_CIPHER | 
| diff --git a/src/lib/libcrypto/man/EVP_camellia_128_cbc.3 b/src/lib/libcrypto/man/EVP_camellia_128_cbc.3 index dd7f15d86c..190247a68b 100644 --- a/src/lib/libcrypto/man/EVP_camellia_128_cbc.3 +++ b/src/lib/libcrypto/man/EVP_camellia_128_cbc.3 | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | .\" $OpenBSD: EVP_camellia_128_cbc.3,v 1.1 2019/03/21 14:15:13 schwarze Exp $ | 1 | .\" $OpenBSD: EVP_camellia_128_cbc.3,v 1.2 2020/06/24 18:15:00 jmc Exp $ | 
| 2 | .\" selective merge up to: OpenSSL 7c6d372a Nov 20 13:20:01 2018 +0000 | 2 | .\" selective merge up to: OpenSSL 7c6d372a Nov 20 13:20:01 2018 +0000 | 
| 3 | .\" | 3 | .\" | 
| 4 | .\" This file was written by Ronald Tse <ronald.tse@ribose.com> | 4 | .\" This file was written by Ronald Tse <ronald.tse@ribose.com> | 
| @@ -48,7 +48,7 @@ | |||
| 48 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 48 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 
| 49 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 49 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 
| 50 | .\" | 50 | .\" | 
| 51 | .Dd $Mdocdate: March 21 2019 $ | 51 | .Dd $Mdocdate: June 24 2020 $ | 
| 52 | .Dt EVP_CAMELLIA_128_CBC 3 | 52 | .Dt EVP_CAMELLIA_128_CBC 3 | 
| 53 | .Os | 53 | .Os | 
| 54 | .Sh NAME | 54 | .Sh NAME | 
| @@ -122,7 +122,7 @@ | |||
| 122 | These functions provide the Camellia encryption algorithm in the | 122 | These functions provide the Camellia encryption algorithm in the | 
| 123 | .Xr evp 3 | 123 | .Xr evp 3 | 
| 124 | framework. | 124 | framework. | 
| 125 | They use 128, 192, and 256 bit keys in the following modes, respectively: | 125 | They use 128, 192, and 256-bit keys in the following modes, respectively: | 
| 126 | CBC, CFB with 1-bit shift, CFB with 8-bit shift, CFB with 128-bit shift, | 126 | CBC, CFB with 1-bit shift, CFB with 8-bit shift, CFB with 128-bit shift, | 
| 127 | ECB, and OFB. | 127 | ECB, and OFB. | 
| 128 | .Pp | 128 | .Pp | 
