diff options
Diffstat (limited to 'src/lib/libcrypto/man/EVP_CIPHER_CTX_init.3')
-rw-r--r-- | src/lib/libcrypto/man/EVP_CIPHER_CTX_init.3 | 12 |
1 files changed, 6 insertions, 6 deletions
diff --git a/src/lib/libcrypto/man/EVP_CIPHER_CTX_init.3 b/src/lib/libcrypto/man/EVP_CIPHER_CTX_init.3 index 50df2e764d..f328fc05b2 100644 --- a/src/lib/libcrypto/man/EVP_CIPHER_CTX_init.3 +++ b/src/lib/libcrypto/man/EVP_CIPHER_CTX_init.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: EVP_CIPHER_CTX_init.3,v 1.2 2023/12/26 19:09:08 schwarze Exp $ | 1 | .\" $OpenBSD: EVP_CIPHER_CTX_init.3,v 1.3 2023/12/26 22:13:00 schwarze Exp $ |
2 | .\" full merge up to: | 2 | .\" full merge up to: |
3 | .\" OpenSSL EVP_EncryptInit.pod 0874d7f2 Oct 11 13:13:47 2022 +0100 | 3 | .\" OpenSSL EVP_EncryptInit.pod 0874d7f2 Oct 11 13:13:47 2022 +0100 |
4 | .\" | 4 | .\" |
@@ -91,7 +91,7 @@ | |||
91 | .Fa "EVP_CIPHER_CTX *ctx" | 91 | .Fa "EVP_CIPHER_CTX *ctx" |
92 | .Fa "unsigned char *out" | 92 | .Fa "unsigned char *out" |
93 | .Fa "const unsigned char *in" | 93 | .Fa "const unsigned char *in" |
94 | .Fa "unsigned int inl" | 94 | .Fa "unsigned int in_len" |
95 | .Fc | 95 | .Fc |
96 | .Sh DESCRIPTION | 96 | .Sh DESCRIPTION |
97 | .Fn EVP_CIPHER_CTX_init | 97 | .Fn EVP_CIPHER_CTX_init |
@@ -133,11 +133,11 @@ behaviour depends on | |||
133 | If that argument is | 133 | If that argument is |
134 | .Dv NULL | 134 | .Dv NULL |
135 | and | 135 | and |
136 | .Fa inl | 136 | .Fa in_len |
137 | is 0, behaviour is similar to | 137 | is 0, behaviour is similar to |
138 | .Xr EVP_CipherFinal 3 ; | 138 | .Xr EVP_CipherFinal 3 ; |
139 | if | 139 | if |
140 | .Fa inl | 140 | .Fa in_len |
141 | is not 0, behaviour is undefined. | 141 | is not 0, behaviour is undefined. |
142 | If | 142 | If |
143 | .Fa in | 143 | .Fa in |
@@ -158,7 +158,7 @@ It requires that the previous encryption or decryption operation | |||
158 | using the same | 158 | using the same |
159 | .Fa ctx , | 159 | .Fa ctx , |
160 | if there was any, ended exactly on a block boundary and that | 160 | if there was any, ended exactly on a block boundary and that |
161 | .Fa inl | 161 | .Fa in_len |
162 | is an integer multiple of the cipher block size. | 162 | is an integer multiple of the cipher block size. |
163 | If either of these conditions is violated, | 163 | If either of these conditions is violated, |
164 | .Fn EVP_Cipher | 164 | .Fn EVP_Cipher |
@@ -167,7 +167,7 @@ For that reason, using the function | |||
167 | .Xr EVP_CipherUpdate 3 | 167 | .Xr EVP_CipherUpdate 3 |
168 | instead is strongly recommended. | 168 | instead is strongly recommended. |
169 | The latter can safely handle partial blocks, and even if | 169 | The latter can safely handle partial blocks, and even if |
170 | .Fa inl | 170 | .Fa in_len |
171 | actually is a multiple of the cipher block size for all calls, | 171 | actually is a multiple of the cipher block size for all calls, |
172 | the overhead incurred by using | 172 | the overhead incurred by using |
173 | .Xr EVP_CipherUpdate 3 | 173 | .Xr EVP_CipherUpdate 3 |