summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto/man/EVP_aes_128_cbc.3
diff options
context:
space:
mode:
Diffstat (limited to 'src/lib/libcrypto/man/EVP_aes_128_cbc.3')
-rw-r--r--src/lib/libcrypto/man/EVP_aes_128_cbc.312
1 files changed, 6 insertions, 6 deletions
diff --git a/src/lib/libcrypto/man/EVP_aes_128_cbc.3 b/src/lib/libcrypto/man/EVP_aes_128_cbc.3
index f25df8c7eb..ac63f7f1f2 100644
--- a/src/lib/libcrypto/man/EVP_aes_128_cbc.3
+++ b/src/lib/libcrypto/man/EVP_aes_128_cbc.3
@@ -1,4 +1,4 @@
1.\" $OpenBSD: EVP_aes_128_cbc.3,v 1.3 2019/08/28 10:37:42 schwarze Exp $ 1.\" $OpenBSD: EVP_aes_128_cbc.3,v 1.4 2020/06/24 18:15:00 jmc Exp $
2.\" selective merge up to: OpenSSL 7c6d372a Nov 20 13:20:01 2018 +0000 2.\" selective merge up to: OpenSSL 7c6d372a Nov 20 13:20:01 2018 +0000
3.\" 3.\"
4.\" This file was written by Ronald Tse <ronald.tse@ribose.com> 4.\" This file was written by Ronald Tse <ronald.tse@ribose.com>
@@ -48,7 +48,7 @@
48.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED 48.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
49.\" OF THE POSSIBILITY OF SUCH DAMAGE. 49.\" OF THE POSSIBILITY OF SUCH DAMAGE.
50.\" 50.\"
51.Dd $Mdocdate: August 28 2019 $ 51.Dd $Mdocdate: June 24 2020 $
52.Dt EVP_AES_128_CBC 3 52.Dt EVP_AES_128_CBC 3
53.Os 53.Os
54.Sh NAME 54.Sh NAME
@@ -193,7 +193,7 @@ framework.
193.Fn EVP_aes_192_ofb , 193.Fn EVP_aes_192_ofb ,
194and 194and
195.Fn EVP_aes_256_ofb 195.Fn EVP_aes_256_ofb
196provide AES for 128, 192, and 256 bit keys in the following modes: 196provide AES for 128, 192, and 256-bit keys in the following modes:
197CBC, CFB with 1-bit shift, CFB with 8-bit shift, CFB with 128-bit shift, 197CBC, CFB with 1-bit shift, CFB with 8-bit shift, CFB with 128-bit shift,
198CTR, ECB, and OFB. 198CTR, ECB, and OFB.
199.Pp 199.Pp
@@ -211,7 +211,7 @@ and
211and 211and
212.Fn EVP_aes_256_cbc_hmac_sha1 212.Fn EVP_aes_256_cbc_hmac_sha1
213provide authenticated encryption with AES in CBC mode using SHA-1 as HMAC, 213provide authenticated encryption with AES in CBC mode using SHA-1 as HMAC,
214with keys of 128 and 256 bits length respectively. 214with keys of 128 and 256-bit length respectively.
215The authentication tag is 160 bits long. 215The authentication tag is 160 bits long.
216This is not intended for usage outside of TLS and requires 216This is not intended for usage outside of TLS and requires
217calling of some undocumented control functions. 217calling of some undocumented control functions.
@@ -224,7 +224,7 @@ These ciphers do not conform to the EVP AEAD interface.
224.Fn EVP_aes_192_gcm , 224.Fn EVP_aes_192_gcm ,
225and 225and
226.Fn EVP_aes_256_gcm 226.Fn EVP_aes_256_gcm
227provide AES for 128, 192 and 256 bit keys in CBC-MAC Mode (CCM) 227provide AES for 128, 192 and 256-bit keys in CBC-MAC Mode (CCM)
228and Galois Counter Mode (GCM), respectively. 228and Galois Counter Mode (GCM), respectively.
229These ciphers require additional control operations to function 229These ciphers require additional control operations to function
230correctly; see 230correctly; see
@@ -235,7 +235,7 @@ for details.
235.Fn EVP_aes_192_wrap , 235.Fn EVP_aes_192_wrap ,
236and 236and
237.Fn EVP_aes_256_wrap 237.Fn EVP_aes_256_wrap
238provide AES key wrap with 128, 192 and 256 bit keys 238provide AES key wrap with 128, 192 and 256-bit keys
239according to RFC 3394 section 2.2.1 ("wrap"). 239according to RFC 3394 section 2.2.1 ("wrap").
240When the returned 240When the returned
241.Vt EVP_CIPHER 241.Vt EVP_CIPHER