diff options
Diffstat (limited to 'src/lib/libcrypto/man')
| -rw-r--r-- | src/lib/libcrypto/man/BIO_new_CMS.3 | 83 | ||||
| -rw-r--r-- | src/lib/libcrypto/man/CMS_add0_cert.3 | 127 | ||||
| -rw-r--r-- | src/lib/libcrypto/man/CMS_add1_recipient_cert.3 | 115 | ||||
| -rw-r--r-- | src/lib/libcrypto/man/CMS_add1_signer.3 | 161 | ||||
| -rw-r--r-- | src/lib/libcrypto/man/CMS_compress.3 | 110 | ||||
| -rw-r--r-- | src/lib/libcrypto/man/CMS_decrypt.3 | 127 | ||||
| -rw-r--r-- | src/lib/libcrypto/man/CMS_encrypt.3 | 152 | ||||
| -rw-r--r-- | src/lib/libcrypto/man/CMS_final.3 | 48 | ||||
| -rw-r--r-- | src/lib/libcrypto/man/CMS_get0_RecipientInfos.3 | 251 | ||||
| -rw-r--r-- | src/lib/libcrypto/man/CMS_get0_SignerInfos.3 | 119 | ||||
| -rw-r--r-- | src/lib/libcrypto/man/CMS_get0_type.3 | 95 | ||||
| -rw-r--r-- | src/lib/libcrypto/man/CMS_get1_ReceiptRequest.3 | 143 | ||||
| -rw-r--r-- | src/lib/libcrypto/man/CMS_sign.3 | 199 | ||||
| -rw-r--r-- | src/lib/libcrypto/man/CMS_sign_receipt.3 | 61 | ||||
| -rw-r--r-- | src/lib/libcrypto/man/CMS_uncompress.3 | 70 | ||||
| -rw-r--r-- | src/lib/libcrypto/man/CMS_verify.3 | 188 | ||||
| -rw-r--r-- | src/lib/libcrypto/man/CMS_verify_receipt.3 | 55 | ||||
| -rw-r--r-- | src/lib/libcrypto/man/Makefile | 24 |
18 files changed, 1 insertions, 2127 deletions
diff --git a/src/lib/libcrypto/man/BIO_new_CMS.3 b/src/lib/libcrypto/man/BIO_new_CMS.3 deleted file mode 100644 index 312c39ad1c..0000000000 --- a/src/lib/libcrypto/man/BIO_new_CMS.3 +++ /dev/null | |||
| @@ -1,83 +0,0 @@ | |||
| 1 | .Dd $Mdocdate: September 9 2015 $ | ||
| 2 | .Dt BIO_NEW_CMS 3 | ||
| 3 | .Os | ||
| 4 | .Sh NAME | ||
| 5 | .Nm BIO_new_CMS | ||
| 6 | .Nd CMS streaming filter BIO | ||
| 7 | .Sh SYNOPSIS | ||
| 8 | .In openssl/cms.h | ||
| 9 | .Ft BIO * | ||
| 10 | .Fo BIO_new_CMS | ||
| 11 | .Fa "BIO *out" | ||
| 12 | .Fa "CMS_ContentInfo *cms" | ||
| 13 | .Fc | ||
| 14 | .Sh DESCRIPTION | ||
| 15 | .Fn BIO_new_CMS | ||
| 16 | returns a streaming filter BIO chain based on | ||
| 17 | .Fa cms . | ||
| 18 | The output of the filter is written to | ||
| 19 | .Fa out . | ||
| 20 | Any data written to the chain is automatically translated | ||
| 21 | to a BER format CMS structure of the appropriate type. | ||
| 22 | .Sh RETURN VALUES | ||
| 23 | .Fn BIO_new_CMS | ||
| 24 | returns a BIO chain when successful or | ||
| 25 | .Dv NULL | ||
| 26 | if an error occurred. | ||
| 27 | The error can be obtained from | ||
| 28 | .Xr ERR_get_error 3 . | ||
| 29 | .Sh NOTES | ||
| 30 | The chain returned by this function behaves like a standard filter BIO. | ||
| 31 | It supports non blocking I/O. | ||
| 32 | Content is processed and streamed on the fly and not all held in memory | ||
| 33 | at once: so it is possible to encode very large structures. | ||
| 34 | After all content has been written through the chain | ||
| 35 | .Xr BIO_flush 3 | ||
| 36 | must be called to finalise the structure. | ||
| 37 | .Pp | ||
| 38 | The | ||
| 39 | .Dv CMS_STREAM | ||
| 40 | flag must be included in the corresponding | ||
| 41 | .Fa flags | ||
| 42 | parameter of the | ||
| 43 | .Fa cms | ||
| 44 | creation function. | ||
| 45 | .Pp | ||
| 46 | If an application wishes to write additional data to | ||
| 47 | .Fa out , | ||
| 48 | BIOs should be removed from the chain using | ||
| 49 | .Xr BIO_pop 3 | ||
| 50 | and freed with | ||
| 51 | .Xr BIO_free 3 | ||
| 52 | until | ||
| 53 | .Fa out | ||
| 54 | is reached. | ||
| 55 | If no additional data needs to be written, | ||
| 56 | .Xr BIO_free_all 3 | ||
| 57 | can be called to free up the whole chain. | ||
| 58 | .Pp | ||
| 59 | Any content written through the filter is used verbatim: | ||
| 60 | no canonical translation is performed. | ||
| 61 | .Pp | ||
| 62 | It is possible to chain multiple BIOs to, for example, | ||
| 63 | create a triple wrapped signed, enveloped, signed structure. | ||
| 64 | In this case it is the application's responsibility | ||
| 65 | to set the inner content type of any outer | ||
| 66 | .Vt CMS_ContentInfo | ||
| 67 | structures. | ||
| 68 | .Pp | ||
| 69 | Large numbers of small writes through the chain should be avoided as this | ||
| 70 | will produce an output consisting of lots of OCTET STRING structures. | ||
| 71 | Prepending a | ||
| 72 | .Xr BIO_f_buffer 3 | ||
| 73 | buffering BIO will prevent this. | ||
| 74 | .Sh SEE ALSO | ||
| 75 | .Xr CMS_encrypt 3 , | ||
| 76 | .Xr CMS_sign 3 , | ||
| 77 | .Xr ERR_get_error 3 | ||
| 78 | .Sh HISTORY | ||
| 79 | .Fn BIO_new_CMS | ||
| 80 | was added to OpenSSL 1.0.0. | ||
| 81 | .Sh BUGS | ||
| 82 | There is currently no corresponding inverse BIO | ||
| 83 | which can decode a CMS structure on the fly. | ||
diff --git a/src/lib/libcrypto/man/CMS_add0_cert.3 b/src/lib/libcrypto/man/CMS_add0_cert.3 deleted file mode 100644 index b02eb06673..0000000000 --- a/src/lib/libcrypto/man/CMS_add0_cert.3 +++ /dev/null | |||
| @@ -1,127 +0,0 @@ | |||
| 1 | .Dd $Mdocdate: November 11 2015 $ | ||
| 2 | .Dt CMS_ADD0_CERT 3 | ||
| 3 | .Os | ||
| 4 | .Sh NAME | ||
| 5 | .Nm CMS_add0_cert , | ||
| 6 | .Nm CMS_add1_cert , | ||
| 7 | .Nm CMS_get1_certs , | ||
| 8 | .Nm CMS_add0_crl , | ||
| 9 | .Nm CMS_add1_crl , | ||
| 10 | .Nm CMS_get1_crls | ||
| 11 | .Nd CMS certificate and CRL utility functions | ||
| 12 | .Sh SYNOPSIS | ||
| 13 | .In openssl/cms.h | ||
| 14 | .Ft int | ||
| 15 | .Fo CMS_add0_cert | ||
| 16 | .Fa "CMS_ContentInfo *cms" | ||
| 17 | .Fa "X509 *cert" | ||
| 18 | .Fc | ||
| 19 | .Ft int | ||
| 20 | .Fo CMS_add1_cert | ||
| 21 | .Fa "CMS_ContentInfo *cms" | ||
| 22 | .Fa "X509 *cert" | ||
| 23 | .Fc | ||
| 24 | .Ft STACK_OF(X509) * | ||
| 25 | .Fo CMS_get1_certs | ||
| 26 | .Fa "CMS_ContentInfo *cms" | ||
| 27 | .Fc | ||
| 28 | .Ft int | ||
| 29 | .Fo CMS_add0_crl | ||
| 30 | .Fa "CMS_ContentInfo *cms" | ||
| 31 | .Fa "X509_CRL *crl" | ||
| 32 | .Fc | ||
| 33 | .Ft int | ||
| 34 | .Fo CMS_add1_crl | ||
| 35 | .Fa "CMS_ContentInfo *cms" | ||
| 36 | .Fa "X509_CRL *crl" | ||
| 37 | .Fc | ||
| 38 | .Ft STACK_OF(X509_CRL) * | ||
| 39 | .Fo CMS_get1_crls | ||
| 40 | .Fa "CMS_ContentInfo *cms" | ||
| 41 | .Fc | ||
| 42 | .Sh DESCRIPTION | ||
| 43 | .Fn CMS_add0_cert | ||
| 44 | and | ||
| 45 | .Fn CMS_add1_cert | ||
| 46 | add certificate | ||
| 47 | .Fa cert | ||
| 48 | to | ||
| 49 | .Fa cms . | ||
| 50 | .Fa cms | ||
| 51 | must be of type signed data or enveloped data. | ||
| 52 | .Pp | ||
| 53 | .Fn CMS_get1_certs | ||
| 54 | returns all certificates in | ||
| 55 | .Fa cms . | ||
| 56 | .Pp | ||
| 57 | .Fn CMS_add0_crl | ||
| 58 | and | ||
| 59 | .Fn CMS_add1_crl | ||
| 60 | add CRL | ||
| 61 | .Fa crl | ||
| 62 | to | ||
| 63 | .Fa cms . | ||
| 64 | .Fn CMS_get1_crls | ||
| 65 | returns any CRLs in | ||
| 66 | .Fa cms . | ||
| 67 | .Sh NOTES | ||
| 68 | The | ||
| 69 | .Vt CMS_ContentInfo | ||
| 70 | structure | ||
| 71 | .Fa cms | ||
| 72 | must be of type signed data or enveloped data or an error will be | ||
| 73 | returned. | ||
| 74 | .Pp | ||
| 75 | For signed data, certificates and CRLs are added to the | ||
| 76 | .Fa certificates | ||
| 77 | and | ||
| 78 | .Fa crls | ||
| 79 | fields of the SignedData structure. | ||
| 80 | For enveloped data, they are added to | ||
| 81 | .Fa OriginatorInfo . | ||
| 82 | .Pp | ||
| 83 | As the | ||
| 84 | .Sq 0 | ||
| 85 | implies, | ||
| 86 | .Fn CMS_add0_cert | ||
| 87 | adds | ||
| 88 | .Fa cert | ||
| 89 | internally to | ||
| 90 | .Fa cms | ||
| 91 | and it must not be freed up after the call, as opposed to | ||
| 92 | .Fn CMS_add1_cert | ||
| 93 | where | ||
| 94 | .Fa cert | ||
| 95 | must be freed up. | ||
| 96 | .Pp | ||
| 97 | The same certificate or CRL must not be added to the same cms structure | ||
| 98 | more than once. | ||
| 99 | .Sh RETURN VALUES | ||
| 100 | .Fn CMS_add0_cert , | ||
| 101 | .Fn CMS_add1_cert , | ||
| 102 | .Fn CMS_add0_crl , | ||
| 103 | and | ||
| 104 | .Fn CMS_add1_crl | ||
| 105 | return 1 for success and 0 for failure. | ||
| 106 | .Pp | ||
| 107 | .Fn CMS_get1_certs | ||
| 108 | and | ||
| 109 | .Fn CMS_get1_crls | ||
| 110 | return the STACK of certificates or CRLs or | ||
| 111 | .Dv NULL | ||
| 112 | if there are none or an error occurs. | ||
| 113 | The only error which will occur in practice is if the | ||
| 114 | .Fa cms | ||
| 115 | type is invalid. | ||
| 116 | .Sh SEE ALSO | ||
| 117 | .Xr CMS_encrypt 3 , | ||
| 118 | .Xr CMS_sign 3 , | ||
| 119 | .Xr ERR_get_error 3 | ||
| 120 | .Sh HISTORY | ||
| 121 | .Fn CMS_add0_cert , | ||
| 122 | .Fn CMS_add1_cert , | ||
| 123 | .Fn CMS_get1_certs , | ||
| 124 | .Fn CMS_add0_crl | ||
| 125 | and | ||
| 126 | .Fn CMS_get1_crls | ||
| 127 | were all first added to OpenSSL 0.9.8. | ||
diff --git a/src/lib/libcrypto/man/CMS_add1_recipient_cert.3 b/src/lib/libcrypto/man/CMS_add1_recipient_cert.3 deleted file mode 100644 index 4e848446a6..0000000000 --- a/src/lib/libcrypto/man/CMS_add1_recipient_cert.3 +++ /dev/null | |||
| @@ -1,115 +0,0 @@ | |||
| 1 | .Dd $Mdocdate: November 11 2015 $ | ||
| 2 | .Dt CMS_ADD1_RECIPIENT_CERT 3 | ||
| 3 | .Os | ||
| 4 | .Sh NAME | ||
| 5 | .Nm CMS_add1_recipient_cert , | ||
| 6 | .Nm CMS_add0_recipient_key | ||
| 7 | .Nd add recipients to a CMS enveloped data structure | ||
| 8 | .Sh SYNOPSIS | ||
| 9 | .In openssl/cms.h | ||
| 10 | .Ft CMS_RecipientInfo * | ||
| 11 | .Fo CMS_add1_recipient_cert | ||
| 12 | .Fa "CMS_ContentInfo *cms" | ||
| 13 | .Fa "X509 *recip" | ||
| 14 | .Fa "unsigned int flags" | ||
| 15 | .Fc | ||
| 16 | .Ft CMS_RecipientInfo * | ||
| 17 | .Fo CMS_add0_recipient_key | ||
| 18 | .Fa "CMS_ContentInfo *cms" | ||
| 19 | .Fa "int nid" | ||
| 20 | .Fa "unsigned char *key" | ||
| 21 | .Fa "size_t keylen" | ||
| 22 | .Fa "unsigned char *id" | ||
| 23 | .Fa "size_t idlen" | ||
| 24 | .Fa "ASN1_GENERALIZEDTIME *date" | ||
| 25 | .Fa "ASN1_OBJECT *otherTypeId" | ||
| 26 | .Fa "ASN1_TYPE *otherType" | ||
| 27 | .Fc | ||
| 28 | .Sh DESCRIPTION | ||
| 29 | .Fn CMS_add1_recipient_cert | ||
| 30 | adds recipient | ||
| 31 | .Fa recip | ||
| 32 | to the | ||
| 33 | .Vt CMS_ContentInfo | ||
| 34 | enveloped data structure | ||
| 35 | .Fa cms | ||
| 36 | as a KeyTransRecipientInfo structure. | ||
| 37 | .Pp | ||
| 38 | .Fn CMS_add0_recipient_key | ||
| 39 | adds the symmetric key | ||
| 40 | .Fa key | ||
| 41 | of length | ||
| 42 | .Fa keylen | ||
| 43 | using the wrapping algorithm | ||
| 44 | .Fa nid , | ||
| 45 | identifier | ||
| 46 | .Fa id | ||
| 47 | of length | ||
| 48 | .Fa idlen | ||
| 49 | and optional values | ||
| 50 | .Fa date , | ||
| 51 | .Fa otherTypeId , | ||
| 52 | and | ||
| 53 | .Fa otherType | ||
| 54 | to the | ||
| 55 | .Vt CMS_ContentInfo | ||
| 56 | enveloped data structure | ||
| 57 | .Fa cms | ||
| 58 | as a KEKRecipientInfo structure. | ||
| 59 | .Pp | ||
| 60 | The | ||
| 61 | .Vt CMS_ContentInfo | ||
| 62 | structure should be obtained from an initial call to | ||
| 63 | .Xr CMS_encrypt 3 | ||
| 64 | with the flag | ||
| 65 | .Dv CMS_PARTIAL | ||
| 66 | set. | ||
| 67 | .Sh NOTES | ||
| 68 | The main purpose of this function is to provide finer control over a CMS | ||
| 69 | enveloped data structure where the simpler | ||
| 70 | .Xr CMS_encrypt 3 | ||
| 71 | function defaults are not appropriate. | ||
| 72 | For example if one or more KEKRecipientInfo structures need to be added. | ||
| 73 | New attributes can also be added using the returned | ||
| 74 | .Vt CMS_RecipientInfo | ||
| 75 | structure and the CMS attribute utility functions. | ||
| 76 | .Pp | ||
| 77 | OpenSSL will by default identify recipient certificates using issuer | ||
| 78 | name and serial number. | ||
| 79 | If | ||
| 80 | .Dv CMS_USE_KEYID | ||
| 81 | is set, it will use the subject key identifier value instead. | ||
| 82 | An error occurs if all recipient certificates do not have a subject key | ||
| 83 | identifier extension. | ||
| 84 | .Pp | ||
| 85 | Currently only AES based key wrapping algorithms are supported for | ||
| 86 | .Fa nid , | ||
| 87 | specifically: | ||
| 88 | .Dv NID_id_aes128_wrap , | ||
| 89 | .Dv NID_id_aes192_wrap , | ||
| 90 | and | ||
| 91 | .Dv NID_id_aes256_wrap . | ||
| 92 | If | ||
| 93 | .Fa nid | ||
| 94 | is set to | ||
| 95 | .Dv NID_undef , | ||
| 96 | then an AES wrap algorithm will be used consistent with | ||
| 97 | .Fa keylen . | ||
| 98 | .Sh RETURN VALUES | ||
| 99 | .Fn CMS_add1_recipient_cert | ||
| 100 | and | ||
| 101 | .Fn CMS_add0_recipient_key | ||
| 102 | return an internal pointer to the | ||
| 103 | .Vt CMS_RecipientInfo | ||
| 104 | structure just added or | ||
| 105 | .Dv NULL | ||
| 106 | if an error occurs. | ||
| 107 | .Sh SEE ALSO | ||
| 108 | .Xr CMS_decrypt 3 , | ||
| 109 | .Xr CMS_final 3 , | ||
| 110 | .Xr ERR_get_error 3 | ||
| 111 | .Sh HISTORY | ||
| 112 | .Fn CMS_add1_recipient_cert | ||
| 113 | and | ||
| 114 | .Fn CMS_add0_recipient_key | ||
| 115 | were added to OpenSSL 0.9.8. | ||
diff --git a/src/lib/libcrypto/man/CMS_add1_signer.3 b/src/lib/libcrypto/man/CMS_add1_signer.3 deleted file mode 100644 index 403ec5b8e3..0000000000 --- a/src/lib/libcrypto/man/CMS_add1_signer.3 +++ /dev/null | |||
| @@ -1,161 +0,0 @@ | |||
| 1 | .Dd $Mdocdate: November 11 2015 $ | ||
| 2 | .Dt CMS_SIGN_ADD1_SIGNER 3 | ||
| 3 | .Os | ||
| 4 | .Sh NAME | ||
| 5 | .Nm CMS_add1_signer , | ||
| 6 | .Nm CMS_SignerInfo_sign | ||
| 7 | .Nd add a signer to a CMS_ContentInfo signed data structure | ||
| 8 | .Sh SYNOPSIS | ||
| 9 | .In openssl/cms.h | ||
| 10 | .Ft CMS_SignerInfo * | ||
| 11 | .Fo CMS_add1_signer | ||
| 12 | .Fa "CMS_ContentInfo *cms" | ||
| 13 | .Fa "X509 *signcert" | ||
| 14 | .Fa "EVP_PKEY *pkey" | ||
| 15 | .Fa "const EVP_MD *md" | ||
| 16 | .Fa "unsigned int flags" | ||
| 17 | .Fc | ||
| 18 | .Ft int | ||
| 19 | .Fo CMS_SignerInfo_sign | ||
| 20 | .Fa "CMS_SignerInfo *si" | ||
| 21 | .Fc | ||
| 22 | .Sh DESCRIPTION | ||
| 23 | .Fn CMS_add1_signer | ||
| 24 | adds a signer with certificate | ||
| 25 | .Fa signcert | ||
| 26 | and private key | ||
| 27 | .Fa pkey | ||
| 28 | using message digest | ||
| 29 | .Fa md | ||
| 30 | to the | ||
| 31 | .Vt CMS_ContentInfo | ||
| 32 | SignedData structure | ||
| 33 | .Fa cms . | ||
| 34 | .Pp | ||
| 35 | The | ||
| 36 | .Vt CMS_ContentInfo | ||
| 37 | structure should be obtained from an initial call to | ||
| 38 | .Xr CMS_sign 3 | ||
| 39 | with the flag | ||
| 40 | .Dv CMS_PARTIAL | ||
| 41 | set or in the case or re-signing a valid | ||
| 42 | .Vt CMS_ContentInfo | ||
| 43 | SignedData structure. | ||
| 44 | .Pp | ||
| 45 | If the | ||
| 46 | .Fa md | ||
| 47 | parameter is | ||
| 48 | .Dv NULL , | ||
| 49 | then the default digest for the public key algorithm will be used. | ||
| 50 | .Pp | ||
| 51 | Unless the | ||
| 52 | .Dv CMS_REUSE_DIGEST | ||
| 53 | flag is set, the returned | ||
| 54 | .Vt CMS_ContentInfo | ||
| 55 | structure is not complete and must be finalized either by streaming | ||
| 56 | (if applicable) or a call to | ||
| 57 | .Xr CMS_final 3 . | ||
| 58 | .Pp | ||
| 59 | The | ||
| 60 | .Fn CMS_SignerInfo_sign | ||
| 61 | function will explicitly sign a | ||
| 62 | .Vt CMS_SignerInfo | ||
| 63 | structure, its main use is when | ||
| 64 | .Dv CMS_REUSE_DIGEST | ||
| 65 | and | ||
| 66 | .Dv CMS_PARTIAL | ||
| 67 | flags are both set. | ||
| 68 | .Sh NOTES | ||
| 69 | The main purpose of | ||
| 70 | .Fn CMS_add1_signer | ||
| 71 | is to provide finer control over a CMS signed data structure where the | ||
| 72 | simpler | ||
| 73 | .Xr CMS_sign 3 | ||
| 74 | function defaults are not appropriate. | ||
| 75 | For example if multiple signers or non default digest algorithms are | ||
| 76 | needed. | ||
| 77 | New attributes can also be added using the returned | ||
| 78 | .Vt CMS_SignerInfo | ||
| 79 | structure and the CMS attribute utility functions or the CMS signed | ||
| 80 | receipt request functions. | ||
| 81 | .Pp | ||
| 82 | Any of the following flags (OR'ed together) can be passed in the | ||
| 83 | .Fa flags | ||
| 84 | parameter. | ||
| 85 | .Pp | ||
| 86 | If | ||
| 87 | .Dv CMS_REUSE_DIGEST | ||
| 88 | is set, then an attempt is made to copy the content digest value from the | ||
| 89 | .Dv CMS_ContentInfo | ||
| 90 | structure: to add a signer to an existing structure. | ||
| 91 | An error occurs if a matching digest value cannot be found to copy. | ||
| 92 | The returned | ||
| 93 | .Dv CMS_ContentInfo | ||
| 94 | structure will be valid and finalized when this flag is set. | ||
| 95 | .Pp | ||
| 96 | If | ||
| 97 | .Dv CMS_PARTIAL | ||
| 98 | is set in addition to | ||
| 99 | .Dv CMS_REUSE_DIGEST | ||
| 100 | then the | ||
| 101 | .Vt CMS_SignerInfo | ||
| 102 | structure will not be finalized so additional attributes can be added. | ||
| 103 | In this case an explicit call to | ||
| 104 | .Fn CMS_SignerInfo_sign | ||
| 105 | is needed to finalize it. | ||
| 106 | .Pp | ||
| 107 | If | ||
| 108 | .Dv CMS_NOCERTS | ||
| 109 | is set, the signer's certificate will not be included in the | ||
| 110 | .Vt CMS_ContentInfo | ||
| 111 | structure, the signer's certificate must still be supplied in the | ||
| 112 | .Fa signcert | ||
| 113 | parameter though. | ||
| 114 | This can reduce the size of the signature if the signers certificate can | ||
| 115 | be obtained by other means: for example a previously signed message. | ||
| 116 | .Pp | ||
| 117 | The SignedData structure includes several CMS signedAttributes including | ||
| 118 | the signing time, the CMS content type and the supported list of ciphers | ||
| 119 | in an SMIMECapabilities attribute. | ||
| 120 | If | ||
| 121 | .Dv CMS_NOATTR | ||
| 122 | is set, then no signedAttributes will be used. | ||
| 123 | If | ||
| 124 | .Dv CMS_NOSMIMECAP | ||
| 125 | is set, then just the SMIMECapabilities are omitted. | ||
| 126 | .Pp | ||
| 127 | OpenSSL will by default identify signing certificates using issuer name | ||
| 128 | and serial number. | ||
| 129 | If | ||
| 130 | .Dv CMS_USE_KEYID | ||
| 131 | is set, it will use the subject key identifier value instead. | ||
| 132 | An error occurs if the signing certificate does not have a subject key | ||
| 133 | identifier extension. | ||
| 134 | .Pp | ||
| 135 | If present, the SMIMECapabilities attribute indicates support for the | ||
| 136 | following algorithms in preference order: 256 bit AES, Gost R3411-94, | ||
| 137 | Gost 28147-89, 192 bit AES, 128 bit AES, triple DES, 128 bit RC2, 64 bit | ||
| 138 | RC2, DES and 40 bit RC2. | ||
| 139 | If any of these algorithms is not available then it will not be | ||
| 140 | included: for example the GOST algorithms will not be included if | ||
| 141 | the GOST ENGINE is not loaded. | ||
| 142 | .Pp | ||
| 143 | .Fn CMS_add1_signer | ||
| 144 | returns an internal pointer to the | ||
| 145 | .Dv CMS_SignerInfo | ||
| 146 | structure just added. | ||
| 147 | This can be used to set additional attributes before it is finalized. | ||
| 148 | .Sh RETURN VALUES | ||
| 149 | .Fn CMS_add1_signer | ||
| 150 | returns an internal pointer to the | ||
| 151 | .Vt CMS_SignerInfo | ||
| 152 | structure just added or | ||
| 153 | .Dv NULL | ||
| 154 | if an error occurs. | ||
| 155 | .Sh SEE ALSO | ||
| 156 | .Xr CMS_final 3 , | ||
| 157 | .Xr CMS_sign 3 , | ||
| 158 | .Xr ERR_get_error 3 | ||
| 159 | .Sh HISTORY | ||
| 160 | .Fn CMS_add1_signer | ||
| 161 | was added to OpenSSL 0.9.8. | ||
diff --git a/src/lib/libcrypto/man/CMS_compress.3 b/src/lib/libcrypto/man/CMS_compress.3 deleted file mode 100644 index 1330464441..0000000000 --- a/src/lib/libcrypto/man/CMS_compress.3 +++ /dev/null | |||
| @@ -1,110 +0,0 @@ | |||
| 1 | .Dd $Mdocdate: November 11 2015 $ | ||
| 2 | .Dt CMS_COMPRESS 3 | ||
| 3 | .Os | ||
| 4 | .Sh NAME | ||
| 5 | .Nm CMS_compress | ||
| 6 | .Nd create a CMS CompressedData structure | ||
| 7 | .Sh SYNOPSIS | ||
| 8 | .In openssl/cms.h | ||
| 9 | .Ft CMS_ContentInfo * | ||
| 10 | .Fo CMS_compress | ||
| 11 | .Fa "BIO *in" | ||
| 12 | .Fa "int comp_nid" | ||
| 13 | .Fa "unsigned int flags" | ||
| 14 | .Fc | ||
| 15 | .Sh DESCRIPTION | ||
| 16 | .Fn CMS_compress | ||
| 17 | creates and returns a CMS CompressedData structure. | ||
| 18 | .Fa comp_nid | ||
| 19 | is the compression algorithm to use or | ||
| 20 | .Dv NID_undef | ||
| 21 | to use the default algorithm (zlib compression). | ||
| 22 | .Fa in | ||
| 23 | is the content to be compressed. | ||
| 24 | .Fa flags | ||
| 25 | is an optional set of flags. | ||
| 26 | .Sh NOTES | ||
| 27 | The only currently supported compression algorithm is zlib using the NID | ||
| 28 | .Dv NID_zlib_compression . | ||
| 29 | .Pp | ||
| 30 | If zlib support is not compiled into OpenSSL then | ||
| 31 | .Fn CMS_compress | ||
| 32 | will return an error. | ||
| 33 | .Pp | ||
| 34 | If the | ||
| 35 | .Dv CMS_TEXT | ||
| 36 | flag is set, MIME headers for type | ||
| 37 | .Sy text/plain | ||
| 38 | are prepended to the data. | ||
| 39 | .Pp | ||
| 40 | Normally the supplied content is translated into MIME canonical format | ||
| 41 | (as required by the S/MIME specifications); if | ||
| 42 | .Dv CMS_BINARY | ||
| 43 | is set, no translation occurs. | ||
| 44 | This option should be used if the supplied data is in binary format; | ||
| 45 | otherwise the translation will corrupt it. | ||
| 46 | If | ||
| 47 | .Dv CMS_BINARY | ||
| 48 | is set then | ||
| 49 | .Dv CMS_TEXT | ||
| 50 | is ignored. | ||
| 51 | .Pp | ||
| 52 | If the | ||
| 53 | .Dv CMS_STREAM | ||
| 54 | flag is set a partial | ||
| 55 | .Vt CMS_ContentInfo | ||
| 56 | structure is returned suitable for streaming I/O: no data is read from | ||
| 57 | the | ||
| 58 | .Vt BIO | ||
| 59 | .Fa in . | ||
| 60 | .Pp | ||
| 61 | The compressed data is included in the | ||
| 62 | .Vt CMS_ContentInfo | ||
| 63 | structure, unless | ||
| 64 | .Dv CMS_DETACHED | ||
| 65 | is set, in which case it is omitted. | ||
| 66 | This is rarely used in practice and is not supported by | ||
| 67 | .Xr SMIME_write_CMS 3 . | ||
| 68 | .Sh NOTES | ||
| 69 | If the flag | ||
| 70 | .Dv CMS_STREAM | ||
| 71 | is set, the returned | ||
| 72 | .Vt CMS_ContentInfo | ||
| 73 | structure is | ||
| 74 | .Em not | ||
| 75 | complete and outputting its contents via a function that does not | ||
| 76 | properly finalize the | ||
| 77 | .Vt CMS_ContentInfo | ||
| 78 | structure will give unpredictable results. | ||
| 79 | .Pp | ||
| 80 | Several functions including | ||
| 81 | .Xr SMIME_write_CMS 3 , | ||
| 82 | .Xr i2d_CMS_bio_stream 3 , | ||
| 83 | .Xr PEM_write_bio_CMS_stream 3 | ||
| 84 | finalize the structure. | ||
| 85 | Alternatively finalization can be performed by obtaining the streaming | ||
| 86 | ASN1 | ||
| 87 | .Vt BIO | ||
| 88 | directly using | ||
| 89 | .Xr BIO_new_CMS 3 . | ||
| 90 | .Pp | ||
| 91 | Additional compression parameters such as the zlib compression level | ||
| 92 | cannot currently be set. | ||
| 93 | .Sh RETURN VALUES | ||
| 94 | .Fn CMS_compress | ||
| 95 | returns either a | ||
| 96 | .Vt CMS_ContentInfo | ||
| 97 | structure or | ||
| 98 | .Dv NULL | ||
| 99 | if an error occurred. | ||
| 100 | The error can be obtained from | ||
| 101 | .Xr ERR_get_error 3 . | ||
| 102 | .Sh SEE ALSO | ||
| 103 | .Xr CMS_uncompress 3 , | ||
| 104 | .Xr ERR_get_error 3 | ||
| 105 | .Sh HISTORY | ||
| 106 | .Fn CMS_compress | ||
| 107 | was added to OpenSSL 0.9.8. | ||
| 108 | The | ||
| 109 | .Dv CMS_STREAM | ||
| 110 | flag was first supported in OpenSSL 1.0.0. | ||
diff --git a/src/lib/libcrypto/man/CMS_decrypt.3 b/src/lib/libcrypto/man/CMS_decrypt.3 deleted file mode 100644 index 3a34f10783..0000000000 --- a/src/lib/libcrypto/man/CMS_decrypt.3 +++ /dev/null | |||
| @@ -1,127 +0,0 @@ | |||
| 1 | .Dd $Mdocdate: November 11 2015 $ | ||
| 2 | .Dt CMS_DECRYPT 3 | ||
| 3 | .Os | ||
| 4 | .Sh NAME | ||
| 5 | .Nm CMS_decrypt | ||
| 6 | .Nd decrypt content from a CMS envelopedData structure | ||
| 7 | .Sh SYNOPSIS | ||
| 8 | .In openssl/cms.h | ||
| 9 | .Ft int | ||
| 10 | .Fo CMS_decrypt | ||
| 11 | .Fa "CMS_ContentInfo *cms" | ||
| 12 | .Fa "EVP_PKEY *pkey" | ||
| 13 | .Fa "X509 *cert" | ||
| 14 | .Fa "BIO *dcont" | ||
| 15 | .Fa "BIO *out" | ||
| 16 | .Fa "unsigned int flags" | ||
| 17 | .Fc | ||
| 18 | .Sh DESCRIPTION | ||
| 19 | .Fn CMS_decrypt | ||
| 20 | extracts and decrypts the content from a CMS EnvelopedData structure. | ||
| 21 | .Fa pkey | ||
| 22 | is the private key of the recipient, | ||
| 23 | .Fa cert | ||
| 24 | is the recipient's certificate, | ||
| 25 | .Fa out | ||
| 26 | is a | ||
| 27 | .Vt BIO | ||
| 28 | to write the content to and | ||
| 29 | .Fa flags | ||
| 30 | is an optional set of flags. | ||
| 31 | .Pp | ||
| 32 | The | ||
| 33 | .Fa dcont | ||
| 34 | parameter is used in the rare case where the encrypted content is | ||
| 35 | detached. | ||
| 36 | It will normally be set to | ||
| 37 | .Dv NULL . | ||
| 38 | .Sh NOTES | ||
| 39 | .Xr OpenSSL_add_all_algorithms 3 | ||
| 40 | (or equivalent) should be called before using this function or errors | ||
| 41 | about unknown algorithms will occur. | ||
| 42 | .Pp | ||
| 43 | Although the recipients certificate is not needed to decrypt the data it | ||
| 44 | is needed to locate the appropriate (of possible several) recipients in | ||
| 45 | the CMS structure. | ||
| 46 | .Pp | ||
| 47 | If | ||
| 48 | .Fa cert | ||
| 49 | is set to | ||
| 50 | .Dv NULL , | ||
| 51 | all possible recipients are tried. | ||
| 52 | This case however is problematic. | ||
| 53 | To thwart the MMA attack (Bleichenbacher's attack on PKCS #1 v1.5 RSA | ||
| 54 | padding) all recipients are tried whether they succeed or not. | ||
| 55 | If no recipient succeeds then a random symmetric key is used to decrypt | ||
| 56 | the content: this will typically output garbage and may (but is not | ||
| 57 | guaranteed to) ultimately return a padding error only. | ||
| 58 | If | ||
| 59 | .Fn CMS_decrypt | ||
| 60 | just returned an error when all recipient encrypted keys failed to | ||
| 61 | decrypt an attacker could use this in a timing attack. | ||
| 62 | If the special flag | ||
| 63 | .Dv CMS_DEBUG_DECRYPT | ||
| 64 | is set then the above behaviour is modified and an error | ||
| 65 | .Em is | ||
| 66 | returned if no recipient encrypted key can be decrypted | ||
| 67 | .Em without | ||
| 68 | generating a random content encryption key. | ||
| 69 | Applications should use this flag with | ||
| 70 | .Sy extreme caution | ||
| 71 | especially in automated gateways as it can leave them open to attack. | ||
| 72 | .Pp | ||
| 73 | It is possible to determine the correct recipient key by other means | ||
| 74 | (for example looking them up in a database) and setting them in the CMS | ||
| 75 | structure in advance using the CMS utility functions such as | ||
| 76 | .Xr CMS_set1_pkey 3 . | ||
| 77 | In this case both | ||
| 78 | .Fa cert | ||
| 79 | and | ||
| 80 | .Fa pkey | ||
| 81 | should be set to | ||
| 82 | .Dv NULL . | ||
| 83 | .Pp | ||
| 84 | To process KEKRecipientInfo types | ||
| 85 | .Xr CMS_set1_key 3 | ||
| 86 | or | ||
| 87 | .Xr CMS_RecipientInfo_set0_key 3 | ||
| 88 | and | ||
| 89 | .Xr CMS_ReceipientInfo_decrypt 3 | ||
| 90 | should be called before | ||
| 91 | .Fn CMS_decrypt | ||
| 92 | and | ||
| 93 | .Fa cert | ||
| 94 | and | ||
| 95 | .Fa pkey | ||
| 96 | set to | ||
| 97 | .Dv NULL . | ||
| 98 | .Pp | ||
| 99 | The following flags can be passed in the | ||
| 100 | .Fa flags | ||
| 101 | parameter: | ||
| 102 | .Pp | ||
| 103 | If the | ||
| 104 | .Dv CMS_TEXT | ||
| 105 | flag is set MIME headers for type | ||
| 106 | .Sy text/plain | ||
| 107 | are deleted from the content. | ||
| 108 | If the content is not of type | ||
| 109 | .Sy text/plain | ||
| 110 | then an error is returned. | ||
| 111 | .Sh RETURN VALUES | ||
| 112 | .Fn CMS_decrypt | ||
| 113 | returns either 1 for success or 0 for failure. | ||
| 114 | The error can be obtained from | ||
| 115 | .Xr ERR_get_error 3 . | ||
| 116 | .Sh BUGS | ||
| 117 | The lack of single pass processing and the need to hold all data in | ||
| 118 | memory as mentioned in | ||
| 119 | .Xr CMS_verify 3 | ||
| 120 | also applies to | ||
| 121 | .Fn CMS_decrypt . | ||
| 122 | .Sh SEE ALSO | ||
| 123 | .Xr CMS_encrypt 3 , | ||
| 124 | .Xr ERR_get_error 3 | ||
| 125 | .Sh HISTORY | ||
| 126 | .Fn CMS_decrypt | ||
| 127 | was added to OpenSSL 0.9.8. | ||
diff --git a/src/lib/libcrypto/man/CMS_encrypt.3 b/src/lib/libcrypto/man/CMS_encrypt.3 deleted file mode 100644 index 5d7b0bf470..0000000000 --- a/src/lib/libcrypto/man/CMS_encrypt.3 +++ /dev/null | |||
| @@ -1,152 +0,0 @@ | |||
| 1 | .Dd $Mdocdate: November 11 2015 $ | ||
| 2 | .Dt CMS_ENCRYPT 3 | ||
| 3 | .Os | ||
| 4 | .Sh NAME | ||
| 5 | .Nm CMS_encrypt | ||
| 6 | .Nd create a CMS envelopedData structure | ||
| 7 | .Sh SYNOPSIS | ||
| 8 | .In openssl/cms.h | ||
| 9 | .Ft CMS_ContentInfo * | ||
| 10 | .Fo CMS_encrypt | ||
| 11 | .Fa "STACK_OF(X509) *certs" | ||
| 12 | .Fa "BIO *in" | ||
| 13 | .Fa "const EVP_CIPHER *cipher" | ||
| 14 | .Fa "unsigned int flags" | ||
| 15 | .Fc | ||
| 16 | .Sh DESCRIPTION | ||
| 17 | .Fn CMS_encrypt | ||
| 18 | creates and returns a CMS EnvelopedData structure. | ||
| 19 | .Fa certs | ||
| 20 | is a list of recipient certificates. | ||
| 21 | .Fa in | ||
| 22 | is the content to be encrypted. | ||
| 23 | .Fa cipher | ||
| 24 | is the symmetric cipher to use. | ||
| 25 | .Fa flags | ||
| 26 | is an optional set of flags. | ||
| 27 | .Sh NOTES | ||
| 28 | Only certificates carrying RSA keys are supported so the recipient | ||
| 29 | certificates supplied to this function must all contain RSA public keys, | ||
| 30 | though they do not have to be signed using the RSA algorithm. | ||
| 31 | .Pp | ||
| 32 | The algorithm passed in the | ||
| 33 | .Fa cipher | ||
| 34 | parameter must support ASN1 encoding of its parameters. | ||
| 35 | .Pp | ||
| 36 | Many browsers implement a "sign and encrypt" option which is simply an | ||
| 37 | S/MIME envelopedData containing an S/MIME signed message. | ||
| 38 | This can be readily produced by storing the S/MIME signed message in a | ||
| 39 | memory BIO and passing it to | ||
| 40 | .Fn CMS_encrypt . | ||
| 41 | .Pp | ||
| 42 | The following flags can be passed in the | ||
| 43 | .Fa flags | ||
| 44 | parameter: | ||
| 45 | .Pp | ||
| 46 | If the | ||
| 47 | .Dv CMS_TEXT | ||
| 48 | flag is set, MIME headers for type | ||
| 49 | .Sy text/plain | ||
| 50 | are prepended to the data. | ||
| 51 | .Pp | ||
| 52 | Normally the supplied content is translated into MIME canonical format | ||
| 53 | (as required by the S/MIME specifications); if | ||
| 54 | .Dv CMS_BINARY | ||
| 55 | is set, no translation occurs. | ||
| 56 | This option should be used if the supplied data is in binary format; | ||
| 57 | otherwise the translation will corrupt it. | ||
| 58 | If | ||
| 59 | .Dv CMS_BINARY | ||
| 60 | is set then | ||
| 61 | .Dv CMS_TEXT | ||
| 62 | is ignored. | ||
| 63 | .Pp | ||
| 64 | OpenSSL will by default identify recipient certificates using issuer | ||
| 65 | name and serial number. | ||
| 66 | If | ||
| 67 | .Dv CMS_USE_KEYID | ||
| 68 | is set, it will use the subject key identifier value instead. | ||
| 69 | An error occurs if all recipient certificates do not have a subject key | ||
| 70 | identifier extension. | ||
| 71 | .Pp | ||
| 72 | If the | ||
| 73 | .Dv CMS_STREAM | ||
| 74 | flag is set, a partial | ||
| 75 | .Vt CMS_ContentInfo | ||
| 76 | structure is returned suitable for streaming I/O: no data is read from the | ||
| 77 | .Vt BIO | ||
| 78 | .Fa in . | ||
| 79 | .Pp | ||
| 80 | If the | ||
| 81 | .Dv CMS_PARTIAL | ||
| 82 | flag is set, a partial | ||
| 83 | .Vt CMS_ContentInfo | ||
| 84 | structure is returned to which additional recipients and attributes can | ||
| 85 | be added before finalization. | ||
| 86 | .Pp | ||
| 87 | The data being encrypted is included in the | ||
| 88 | .Vt CMS_ContentInfo | ||
| 89 | structure, unless | ||
| 90 | .Dv CMS_DETACHED | ||
| 91 | is set, in which case it is omitted. | ||
| 92 | This is rarely used in practice and is not supported by | ||
| 93 | .Xr SMIME_write_CMS 3 . | ||
| 94 | .Pp | ||
| 95 | If the flag | ||
| 96 | .Dv CMS_STREAM | ||
| 97 | is set, the returned | ||
| 98 | .Vt CMS_ContentInfo | ||
| 99 | structure is | ||
| 100 | .Em not | ||
| 101 | complete and outputting its contents via a function that does not | ||
| 102 | properly finalize the | ||
| 103 | .Vt CMS_ContentInfo | ||
| 104 | structure will give unpredictable results. | ||
| 105 | .Pp | ||
| 106 | Several functions including | ||
| 107 | .Xr SMIME_write_CMS 3 , | ||
| 108 | .Xr i2d_CMS_bio_stream 3 , | ||
| 109 | .Xr PEM_write_bio_CMS_stream 3 | ||
| 110 | finalize the structure. | ||
| 111 | Alternatively finalization can be performed by obtaining the streaming | ||
| 112 | ASN1 | ||
| 113 | .Vt BIO | ||
| 114 | directly using | ||
| 115 | .Xr BIO_new_CMS 3 . | ||
| 116 | .Pp | ||
| 117 | The recipients specified in | ||
| 118 | .Fa certs | ||
| 119 | use a CMS KeyTransRecipientInfo info structure. | ||
| 120 | KEKRecipientInfo is also supported using the flag | ||
| 121 | .Dv CMS_PARTIAL | ||
| 122 | and | ||
| 123 | .Xr CMS_add0_recipient_key 3 . | ||
| 124 | .Pp | ||
| 125 | The parameter | ||
| 126 | .Fa certs | ||
| 127 | may be | ||
| 128 | .Dv NULL | ||
| 129 | if | ||
| 130 | .Dv CMS_PARTIAL | ||
| 131 | is set and recipients are added later using | ||
| 132 | .Xr CMS_add1_recipient_cert 3 | ||
| 133 | or | ||
| 134 | .Xr CMS_add0_recipient_key 3 . | ||
| 135 | .Sh RETURN VALUES | ||
| 136 | .Fn CMS_encrypt | ||
| 137 | returns either a | ||
| 138 | .Vt CMS_ContentInfo | ||
| 139 | structure or | ||
| 140 | .Dv NULL | ||
| 141 | if an error occurred. | ||
| 142 | The error can be obtained from | ||
| 143 | .Xr ERR_get_error 3 . | ||
| 144 | .Sh SEE ALSO | ||
| 145 | .Xr CMS_decrypt 3 , | ||
| 146 | .Xr ERR_get_error 3 | ||
| 147 | .Sh HISTORY | ||
| 148 | .Fn CMS_encrypt | ||
| 149 | was added to OpenSSL 0.9.8. | ||
| 150 | The | ||
| 151 | .Dv CMS_STREAM | ||
| 152 | flag was first supported in OpenSSL 1.0.0. | ||
diff --git a/src/lib/libcrypto/man/CMS_final.3 b/src/lib/libcrypto/man/CMS_final.3 deleted file mode 100644 index 4e7912a4e0..0000000000 --- a/src/lib/libcrypto/man/CMS_final.3 +++ /dev/null | |||
| @@ -1,48 +0,0 @@ | |||
| 1 | .Dd $Mdocdate: November 11 2015 $ | ||
| 2 | .Dt CMS_FINAL 3 | ||
| 3 | .Os | ||
| 4 | .Sh NAME | ||
| 5 | .Nm CMS_final | ||
| 6 | .Nd finalise a CMS_ContentInfo structure | ||
| 7 | .Sh SYNOPSIS | ||
| 8 | .In openssl/cms.h | ||
| 9 | .Ft int | ||
| 10 | .Fo CMS_final | ||
| 11 | .Fa "CMS_ContentInfo *cms" | ||
| 12 | .Fa "BIO *data" | ||
| 13 | .Fa "BIO *dcont" | ||
| 14 | .Fa "unsigned int flags" | ||
| 15 | .Fc | ||
| 16 | .Sh DESCRIPTION | ||
| 17 | .Fn CMS_final | ||
| 18 | finalises the structure | ||
| 19 | .Fa cms . | ||
| 20 | Its purpose is to perform any operations necessary on | ||
| 21 | .Fa cms | ||
| 22 | (digest computation for example) and set the appropriate fields. | ||
| 23 | The parameter | ||
| 24 | .Fa data | ||
| 25 | contains the content to be processed. | ||
| 26 | The | ||
| 27 | .Fa dcont | ||
| 28 | parameter contains a | ||
| 29 | .Vt BIO | ||
| 30 | to write content to after processing: this is | ||
| 31 | only used with detached data and will usually be set to | ||
| 32 | .Dv NULL . | ||
| 33 | .Sh NOTES | ||
| 34 | This function will normally be called when the | ||
| 35 | .Dv CMS_PARTIAL | ||
| 36 | flag is used. | ||
| 37 | It should only be used when streaming is not performed because the | ||
| 38 | streaming I/O functions perform finalisation operations internally. | ||
| 39 | .Sh RETURN VALUES | ||
| 40 | .Fn CMS_final | ||
| 41 | returns 1 for success or 0 for failure. | ||
| 42 | .Sh SEE ALSO | ||
| 43 | .Xr CMS_encrypt 3 , | ||
| 44 | .Xr CMS_sign 3 , | ||
| 45 | .Xr ERR_get_error 3 | ||
| 46 | .Sh HISTORY | ||
| 47 | .Fn CMS_final | ||
| 48 | was added to OpenSSL 0.9.8. | ||
diff --git a/src/lib/libcrypto/man/CMS_get0_RecipientInfos.3 b/src/lib/libcrypto/man/CMS_get0_RecipientInfos.3 deleted file mode 100644 index 4db69b57b8..0000000000 --- a/src/lib/libcrypto/man/CMS_get0_RecipientInfos.3 +++ /dev/null | |||
| @@ -1,251 +0,0 @@ | |||
| 1 | .Dd $Mdocdate: November 11 2015 $ | ||
| 2 | .Dt CMS_GET0_RECIPIENTINFOS 3 | ||
| 3 | .Os | ||
| 4 | .Sh NAME | ||
| 5 | .Nm CMS_get0_RecipientInfos , | ||
| 6 | .Nm CMS_RecipientInfo_type , | ||
| 7 | .Nm CMS_RecipientInfo_ktri_get0_signer_id , | ||
| 8 | .Nm CMS_RecipientInfo_ktri_cert_cmp , | ||
| 9 | .Nm CMS_RecipientInfo_set0_pkey , | ||
| 10 | .Nm CMS_RecipientInfo_kekri_get0_id , | ||
| 11 | .Nm CMS_RecipientInfo_kekri_id_cmp , | ||
| 12 | .Nm CMS_RecipientInfo_set0_key , | ||
| 13 | .Nm CMS_RecipientInfo_decrypt , | ||
| 14 | .Nm CMS_RecipientInfo_encrypt | ||
| 15 | .Nd CMS envelopedData RecipientInfo routines | ||
| 16 | .Sh SYNOPSIS | ||
| 17 | .In openssl/cms.h | ||
| 18 | .Ft STACK_OF(CMS_RecipientInfo) * | ||
| 19 | .Fo CMS_get0_RecipientInfos | ||
| 20 | .Fa "CMS_ContentInfo *cms" | ||
| 21 | .Fc | ||
| 22 | .Ft int | ||
| 23 | .Fo CMS_RecipientInfo_type | ||
| 24 | .Fa "CMS_RecipientInfo *ri" | ||
| 25 | .Fc | ||
| 26 | .Ft int | ||
| 27 | .Fo CMS_RecipientInfo_ktri_get0_signer_id | ||
| 28 | .Fa "CMS_RecipientInfo *ri" | ||
| 29 | .Fa "ASN1_OCTET_STRING **keyid" | ||
| 30 | .Fa "X509_NAME **issuer" | ||
| 31 | .Fa "ASN1_INTEGER **sno" | ||
| 32 | .Fc | ||
| 33 | .Ft int | ||
| 34 | .Fo CMS_RecipientInfo_ktri_cert_cmp | ||
| 35 | .Fa "CMS_RecipientInfo *ri" | ||
| 36 | .Fa "X509 *cert" | ||
| 37 | .Fc | ||
| 38 | .Ft int | ||
| 39 | .Fo CMS_RecipientInfo_set0_pkey | ||
| 40 | .Fa "CMS_RecipientInfo *ri" | ||
| 41 | .Fa "EVP_PKEY *pkey" | ||
| 42 | .Fc | ||
| 43 | .Ft int | ||
| 44 | .Fo CMS_RecipientInfo_kekri_get0_id | ||
| 45 | .Fa "CMS_RecipientInfo *ri" | ||
| 46 | .Fa "X509_ALGOR **palg" | ||
| 47 | .Fa "ASN1_OCTET_STRING **pid" | ||
| 48 | .Fa "ASN1_GENERALIZEDTIME **pdate" | ||
| 49 | .Fa "ASN1_OBJECT **potherid" | ||
| 50 | .Fa "ASN1_TYPE **pothertype" | ||
| 51 | .Fc | ||
| 52 | .Ft int | ||
| 53 | .Fo CMS_RecipientInfo_kekri_id_cmp | ||
| 54 | .Fa "CMS_RecipientInfo *ri" | ||
| 55 | .Fa "const unsigned char *id" | ||
| 56 | .Fa "size_t idlen" | ||
| 57 | .Fc | ||
| 58 | .Ft int | ||
| 59 | .Fo CMS_RecipientInfo_set0_key | ||
| 60 | .Fa "CMS_RecipientInfo *ri" | ||
| 61 | .Fa "unsigned char *key" | ||
| 62 | .Fa "size_t keylen" | ||
| 63 | .Fc | ||
| 64 | .Ft int | ||
| 65 | .Fo CMS_RecipientInfo_decrypt | ||
| 66 | .Fa "CMS_ContentInfo *cms" | ||
| 67 | .Fa "CMS_RecipientInfo *ri" | ||
| 68 | .Fc | ||
| 69 | .Sh DESCRIPTION | ||
| 70 | The function | ||
| 71 | .Fn CMS_get0_RecipientInfos | ||
| 72 | returns all the | ||
| 73 | .Vt CMS_RecipientInfo | ||
| 74 | structures associated with a CMS EnvelopedData structure. | ||
| 75 | .Pp | ||
| 76 | .Fn CMS_RecipientInfo_type | ||
| 77 | returns the type of the | ||
| 78 | .Vt CMS_RecipientInfo | ||
| 79 | structure | ||
| 80 | .Fa ri . | ||
| 81 | It will currently return | ||
| 82 | .Dv CMS_RECIPINFO_TRANS , | ||
| 83 | .Dv CMS_RECIPINFO_AGREE , | ||
| 84 | .Dv CMS_RECIPINFO_KEK , | ||
| 85 | .Dv CMS_RECIPINFO_PASS , | ||
| 86 | or | ||
| 87 | .Dv CMS_RECIPINFO_OTHER . | ||
| 88 | .Pp | ||
| 89 | .Fn CMS_RecipientInfo_ktri_get0_signer_id | ||
| 90 | retrieves the certificate recipient identifier associated with a | ||
| 91 | specific | ||
| 92 | .Vt CMS_RecipientInfo | ||
| 93 | structure | ||
| 94 | .Fa ri , | ||
| 95 | which must be of type | ||
| 96 | .Dv CMS_RECIPINFO_TRANS . | ||
| 97 | Either the keyidentifier will be set in | ||
| 98 | .Fa keyid | ||
| 99 | or | ||
| 100 | .Em both | ||
| 101 | issuer name and serial number in | ||
| 102 | .Fa issuer | ||
| 103 | and | ||
| 104 | .Fa sno . | ||
| 105 | .Pp | ||
| 106 | .Fn CMS_RecipientInfo_ktri_cert_cmp | ||
| 107 | compares the certificate | ||
| 108 | .Fa cert | ||
| 109 | against the | ||
| 110 | .Vt CMS_RecipientInfo | ||
| 111 | structure | ||
| 112 | .Fa ri , | ||
| 113 | which must be of type | ||
| 114 | .Dv CMS_RECIPINFO_TRANS . | ||
| 115 | It returns zero if the | ||
| 116 | comparison is successful and non zero if not. | ||
| 117 | .Pp | ||
| 118 | .Fn CMS_RecipientInfo_set0_pkey | ||
| 119 | associates the private key | ||
| 120 | .Fa pkey | ||
| 121 | with the | ||
| 122 | .Vt CMS_RecipientInfo | ||
| 123 | structure | ||
| 124 | .Fa ri , | ||
| 125 | which must be of type | ||
| 126 | .Dv CMS_RECIPINFO_TRANS . | ||
| 127 | .Pp | ||
| 128 | .Fn CMS_RecipientInfo_kekri_get0_id | ||
| 129 | retrieves the key information from the | ||
| 130 | .Vt CMS_RecipientInfo | ||
| 131 | structure | ||
| 132 | .Fa ri | ||
| 133 | which must be of type | ||
| 134 | .Dv CMS_RECIPINFO_KEK . | ||
| 135 | Any of the remaining parameters can be | ||
| 136 | .Dv NULL | ||
| 137 | if the application is not interested in the value of a field. | ||
| 138 | Where a field is optional and absent, | ||
| 139 | .Dv NULL | ||
| 140 | will be written to the corresponding parameter. | ||
| 141 | The | ||
| 142 | .Sy keyEncryptionAlgorithm | ||
| 143 | field is written to | ||
| 144 | .Fa palg , | ||
| 145 | the | ||
| 146 | .Sy keyIdentifier | ||
| 147 | field is written to | ||
| 148 | .Fa pid , | ||
| 149 | the | ||
| 150 | .Sy date | ||
| 151 | field if present is written to | ||
| 152 | .Fa pdate , | ||
| 153 | if the | ||
| 154 | .Sy other | ||
| 155 | field is present the components | ||
| 156 | .Sy keyAttrId | ||
| 157 | and | ||
| 158 | .Sy keyAttr | ||
| 159 | are written to the parameters | ||
| 160 | .Fa potherid | ||
| 161 | and | ||
| 162 | .Fa pothertype . | ||
| 163 | .Pp | ||
| 164 | .Fn CMS_RecipientInfo_kekri_id_cmp | ||
| 165 | compares the ID in the | ||
| 166 | .Fa id | ||
| 167 | and | ||
| 168 | .Fa idlen | ||
| 169 | parameters against the | ||
| 170 | .Sy keyIdentifier | ||
| 171 | .Vt CMS_RecipientInfo | ||
| 172 | structure | ||
| 173 | .Fa ri , | ||
| 174 | which must be of type | ||
| 175 | .Dv CMS_RECIPINFO_KEK . | ||
| 176 | It returns zero if the comparison is successful and non zero if not. | ||
| 177 | .Pp | ||
| 178 | .Fn CMS_RecipientInfo_set0_key | ||
| 179 | associates the symmetric key | ||
| 180 | .Fa key | ||
| 181 | of length | ||
| 182 | .Fa keylen | ||
| 183 | with the | ||
| 184 | .Vt CMS_RecipientInfo | ||
| 185 | structure | ||
| 186 | .Fa ri , | ||
| 187 | which must be of type | ||
| 188 | .Dv CMS_RECIPINFO_KEK . | ||
| 189 | .Pp | ||
| 190 | .Fn CMS_RecipientInfo_decrypt | ||
| 191 | attempts to decrypt the | ||
| 192 | .Vt CMS_RecipientInfo | ||
| 193 | structure | ||
| 194 | .Fa ri | ||
| 195 | in structure | ||
| 196 | .Fa cms . | ||
| 197 | A key must have been associated with the structure first. | ||
| 198 | .Sh NOTES | ||
| 199 | The main purpose of these functions is to enable an application to | ||
| 200 | lookup recipient keys using any appropriate technique when the simpler | ||
| 201 | method of | ||
| 202 | .Xr CMS_decrypt 3 | ||
| 203 | is not appropriate. | ||
| 204 | .Pp | ||
| 205 | In typical usage, an application will retrieve all | ||
| 206 | .Vt CMS_RecipientInfo | ||
| 207 | structures using | ||
| 208 | .Fn CMS_get0_RecipientInfos | ||
| 209 | and check the type of each using | ||
| 210 | .Fn CMS_RecipientInfo_type . | ||
| 211 | Depending on the type, the | ||
| 212 | .Vt CMS_RecipientInfo | ||
| 213 | structure can be ignored or its key identifier data retrieved using | ||
| 214 | an appropriate function. | ||
| 215 | Then if the corresponding secret or private key can be obtained by any | ||
| 216 | appropriate means it can then associated with the structure and | ||
| 217 | .Xr CMS_RecpientInfo_decrypt 3 | ||
| 218 | called. | ||
| 219 | If successful, | ||
| 220 | .Xr CMS_decrypt 3 | ||
| 221 | can be called with a | ||
| 222 | .Dv NULL | ||
| 223 | key to decrypt the enveloped content. | ||
| 224 | .Sh RETURN VALUES | ||
| 225 | .Fn CMS_get0_RecipientInfos | ||
| 226 | returns all | ||
| 227 | .Vt CMS_RecipientInfo | ||
| 228 | structures, or | ||
| 229 | .Dv NULL | ||
| 230 | if an error occurs. | ||
| 231 | .Pp | ||
| 232 | .Fn CMS_RecipientInfo_ktri_get0_signer_id , | ||
| 233 | .Fn CMS_RecipientInfo_set0_pkey , | ||
| 234 | .Fn CMS_RecipientInfo_kekri_get0_id , | ||
| 235 | .Fn CMS_RecipientInfo_set0_key , | ||
| 236 | and | ||
| 237 | .Fn CMS_RecipientInfo_decrypt | ||
| 238 | return 1 for success or 0 if an error occurs. | ||
| 239 | .Pp | ||
| 240 | .Fn CMS_RecipientInfo_ktri_cert_cmp | ||
| 241 | and | ||
| 242 | .Fn CMS_RecipientInfo_kekri_id_cmp | ||
| 243 | return 0 for a successful comparison and non zero otherwise. | ||
| 244 | .Pp | ||
| 245 | Any error can be obtained from | ||
| 246 | .Xr ERR_get_error 3 . | ||
| 247 | .Sh SEE ALSO | ||
| 248 | .Xr CMS_decrypt 3 , | ||
| 249 | .Xr ERR_get_error 3 | ||
| 250 | .Sh HISTORY | ||
| 251 | These functions were first was added to OpenSSL 0.9.8. | ||
diff --git a/src/lib/libcrypto/man/CMS_get0_SignerInfos.3 b/src/lib/libcrypto/man/CMS_get0_SignerInfos.3 deleted file mode 100644 index 99aab48193..0000000000 --- a/src/lib/libcrypto/man/CMS_get0_SignerInfos.3 +++ /dev/null | |||
| @@ -1,119 +0,0 @@ | |||
| 1 | .Dd $Mdocdate: November 11 2015 $ | ||
| 2 | .Dt CMS_GET0_SIGNERINFOS 3 | ||
| 3 | .Os | ||
| 4 | .Sh NAME | ||
| 5 | .Nm CMS_get0_SignerInfos , | ||
| 6 | .Nm CMS_SignerInfo_get0_signer_id , | ||
| 7 | .Nm CMS_SignerInfo_cert_cmp , | ||
| 8 | .Nm CMS_set1_signer_certs | ||
| 9 | .Nd CMS signedData signer functions | ||
| 10 | .Sh SYNOPSIS | ||
| 11 | .In openssl/cms.h | ||
| 12 | .Ft STACK_OF(CMS_SignerInfo) * | ||
| 13 | .Fo CMS_get0_SignerInfos | ||
| 14 | .Fa "CMS_ContentInfo *cms" | ||
| 15 | .Fc | ||
| 16 | .Ft int | ||
| 17 | .Fo CMS_SignerInfo_get0_signer_id | ||
| 18 | .Fa "CMS_SignerInfo *si" | ||
| 19 | .Fa "ASN1_OCTET_STRING **keyid" | ||
| 20 | .Fa "X509_NAME **issuer" | ||
| 21 | .Fa "ASN1_INTEGER **sno" | ||
| 22 | .Fc | ||
| 23 | .Ft int | ||
| 24 | .Fo CMS_SignerInfo_cert_cmp | ||
| 25 | .Fa "CMS_SignerInfo *si" | ||
| 26 | .Fa "X509 *cert" | ||
| 27 | .Fc | ||
| 28 | .Ft void | ||
| 29 | .Fo CMS_SignerInfo_set1_signer_cert | ||
| 30 | .Fa "CMS_SignerInfo *si" | ||
| 31 | .Fa "X509 *signer" | ||
| 32 | .Fc | ||
| 33 | .Sh DESCRIPTION | ||
| 34 | The function | ||
| 35 | .Fn CMS_get0_SignerInfos | ||
| 36 | returns all the | ||
| 37 | .Vt CMS_SignerInfo | ||
| 38 | structures associated with a CMS signedData structure. | ||
| 39 | .Pp | ||
| 40 | .Fn CMS_SignerInfo_get0_signer_id | ||
| 41 | retrieves the certificate signer identifier associated with a specific | ||
| 42 | .Vt CMS_SignerInfo | ||
| 43 | structure | ||
| 44 | .Fa si . | ||
| 45 | Either the keyidentifier will be set in | ||
| 46 | .Fa keyid | ||
| 47 | or | ||
| 48 | .Em both | ||
| 49 | issuer name and serial number in | ||
| 50 | .Fa issuer | ||
| 51 | and | ||
| 52 | .Fa sno . | ||
| 53 | .Pp | ||
| 54 | .Fn CMS_SignerInfo_cert_cmp | ||
| 55 | compares the certificate | ||
| 56 | .Fa cert | ||
| 57 | against the signer identifier | ||
| 58 | .Fa si . | ||
| 59 | It returns zero if the comparison is successful and non zero if not. | ||
| 60 | .Pp | ||
| 61 | .Fn CMS_SignerInfo_set1_signer_cert | ||
| 62 | sets the signers certificate of | ||
| 63 | .Fa si | ||
| 64 | to | ||
| 65 | .Fa signer . | ||
| 66 | .Sh NOTES | ||
| 67 | The main purpose of these functions is to enable an application to | ||
| 68 | lookup signers certificates using any appropriate technique when the | ||
| 69 | simpler method of | ||
| 70 | .Xr CMS_verify 3 | ||
| 71 | is not appropriate. | ||
| 72 | .Pp | ||
| 73 | In typical usage and application will retrieve all | ||
| 74 | .Vt CMS_SignerInfo | ||
| 75 | structures using | ||
| 76 | .Fn CMS_get0_SignerInfo | ||
| 77 | and retrieve the identifier information using CMS. | ||
| 78 | It will then obtain the signer certificate by some unspecified means | ||
| 79 | (or return and error if it cannot be found) and set it using | ||
| 80 | .Fn CMS_SignerInfo_set1_signer_cert . | ||
| 81 | .Pp | ||
| 82 | Once all signer certificates have been set, | ||
| 83 | .Xr CMS_verify 3 | ||
| 84 | can be used. | ||
| 85 | .Pp | ||
| 86 | Although | ||
| 87 | .Fn CMS_get0_SignerInfos | ||
| 88 | can return | ||
| 89 | .Dv NULL | ||
| 90 | if an error occur | ||
| 91 | .Em or | ||
| 92 | if there are no signers, this is not a problem in practice because the | ||
| 93 | only error which can occur is if the | ||
| 94 | .Fa cms | ||
| 95 | structure is not of type signedData due to application error. | ||
| 96 | .Sh RETURN VALUES | ||
| 97 | .Fn CMS_get0_SignerInfos | ||
| 98 | returns all | ||
| 99 | .Vt CMS_SignerInfo | ||
| 100 | structures, or | ||
| 101 | .Dv NULL | ||
| 102 | if there are no signers or an error occurs. | ||
| 103 | .Pp | ||
| 104 | .Fn CMS_SignerInfo_get0_signer_id | ||
| 105 | returns 1 for success and 0 for failure. | ||
| 106 | .Pp | ||
| 107 | .Fn CMS_SignerInfo_cert_cmp | ||
| 108 | returns 0 for a successful comparison and non zero otherwise. | ||
| 109 | .Pp | ||
| 110 | .Fn CMS_SignerInfo_set1_signer_cert | ||
| 111 | does not return a value. | ||
| 112 | .Pp | ||
| 113 | Any error can be obtained from | ||
| 114 | .Xr ERR_get_error 3 . | ||
| 115 | .Sh SEE ALSO | ||
| 116 | .Xr CMS_verify 3 , | ||
| 117 | .Xr ERR_get_error 3 | ||
| 118 | .Sh HISTORY | ||
| 119 | These functions were first was added to OpenSSL 0.9.8. | ||
diff --git a/src/lib/libcrypto/man/CMS_get0_type.3 b/src/lib/libcrypto/man/CMS_get0_type.3 deleted file mode 100644 index e77dd655e6..0000000000 --- a/src/lib/libcrypto/man/CMS_get0_type.3 +++ /dev/null | |||
| @@ -1,95 +0,0 @@ | |||
| 1 | .Dd $Mdocdate: November 11 2015 $ | ||
| 2 | .Dt CMS_GET0_TYPE 3 | ||
| 3 | .Os | ||
| 4 | .Sh NAME | ||
| 5 | .Nm CMS_get0_type , | ||
| 6 | .Nm CMS_set1_eContentType , | ||
| 7 | .Nm CMS_get0_eContentType | ||
| 8 | .Nd get and set CMS content types | ||
| 9 | .Sh SYNOPSIS | ||
| 10 | .In openssl/cms.h | ||
| 11 | .Ft const ASN1_OBJECT * | ||
| 12 | .Fo CMS_get0_type | ||
| 13 | .Fa "CMS_ContentInfo *cms" | ||
| 14 | .Fc | ||
| 15 | .Ft int | ||
| 16 | .Fo CMS_set1_eContentType | ||
| 17 | .Fa "CMS_ContentInfo *cms" | ||
| 18 | .Fa "const ASN1_OBJECT *oid" | ||
| 19 | .Fc | ||
| 20 | .Ft const ASN1_OBJECT * | ||
| 21 | .Fo CMS_get0_eContentType | ||
| 22 | .Fa "CMS_ContentInfo *cms" | ||
| 23 | .Fc | ||
| 24 | .Sh DESCRIPTION | ||
| 25 | .Fn CMS_get0_type | ||
| 26 | returns the content type of a | ||
| 27 | .Vt CMS_ContentInfo | ||
| 28 | structure as an | ||
| 29 | .Vt ASN1_OBJECT | ||
| 30 | pointer. | ||
| 31 | An application can then decide how to process the | ||
| 32 | .Vt CMS_ContentInfo | ||
| 33 | structure based on this value. | ||
| 34 | .Pp | ||
| 35 | .Fn CMS_set1_eContentType | ||
| 36 | sets the embedded content type of a | ||
| 37 | .Vt CMS_ContentInfo | ||
| 38 | structure. | ||
| 39 | It should be called with CMS functions with the | ||
| 40 | .Dv CMS_PARTIAL | ||
| 41 | flag and | ||
| 42 | .Em before | ||
| 43 | the structure is finalised, otherwise the results are undefined. | ||
| 44 | .Pp | ||
| 45 | .Fn CMS_get0_eContentType | ||
| 46 | returns a pointer to the embedded content type. | ||
| 47 | .Sh NOTES | ||
| 48 | As the | ||
| 49 | .Sq 0 | ||
| 50 | implies, | ||
| 51 | .Fn CMS_get0_type | ||
| 52 | and | ||
| 53 | .Fn CMS_get0_eContentType | ||
| 54 | return internal pointers which should | ||
| 55 | .Em not | ||
| 56 | be freed up. | ||
| 57 | .Fn CMS_set1_eContentType | ||
| 58 | copies the supplied OID and it | ||
| 59 | .Em should | ||
| 60 | be freed up after use. | ||
| 61 | .Pp | ||
| 62 | The | ||
| 63 | .Vt ASN1_OBJECT | ||
| 64 | values returned can be converted to an integer NID value using | ||
| 65 | .Xr OBJ_obj2nid 3 . | ||
| 66 | For the currently supported content types the following values are | ||
| 67 | returned: | ||
| 68 | .Bd -unfilled -offset indent | ||
| 69 | .Dv NID_pkcs7_data | ||
| 70 | .Dv NID_pkcs7_signed | ||
| 71 | .Dv NID_pkcs7_digest | ||
| 72 | .Dv NID_id_smime_ct_compressedData | ||
| 73 | .Dv NID_pkcs7_encrypted | ||
| 74 | .Dv NID_pkcs7_enveloped | ||
| 75 | .Ed | ||
| 76 | .Sh RETURN VALUES | ||
| 77 | .Fn CMS_get0_type | ||
| 78 | and | ||
| 79 | .Fn CMS_get0_eContentType | ||
| 80 | return an | ||
| 81 | .Vt ASN1_OBJECT | ||
| 82 | structure. | ||
| 83 | .Pp | ||
| 84 | .Fn CMS_set1_eContentType | ||
| 85 | returns 1 for success or 0 if an error occurred. | ||
| 86 | The error can be obtained from | ||
| 87 | .Xr ERR_get_error 3 . | ||
| 88 | .Sh SEE ALSO | ||
| 89 | .Xr ERR_get_error 3 | ||
| 90 | .Sh HISTORY | ||
| 91 | .Fn CMS_get0_type , | ||
| 92 | .Fn CMS_set1_eContentType , | ||
| 93 | and | ||
| 94 | .Fn CMS_get0_eContentType | ||
| 95 | were all first added to OpenSSL 0.9.8. | ||
diff --git a/src/lib/libcrypto/man/CMS_get1_ReceiptRequest.3 b/src/lib/libcrypto/man/CMS_get1_ReceiptRequest.3 deleted file mode 100644 index ab19f87fab..0000000000 --- a/src/lib/libcrypto/man/CMS_get1_ReceiptRequest.3 +++ /dev/null | |||
| @@ -1,143 +0,0 @@ | |||
| 1 | .Dd $Mdocdate: November 11 2015 $ | ||
| 2 | .Dt CMS_GET1_RECEIPTREQUEST 3 | ||
| 3 | .Os | ||
| 4 | .Sh NAME | ||
| 5 | .Nm CMS_ReceiptRequest_create0 , | ||
| 6 | .Nm CMS_add1_ReceiptRequest , | ||
| 7 | .Nm CMS_get1_ReceiptRequest , | ||
| 8 | .Nm CMS_ReceiptRequest_get0_values | ||
| 9 | .Nd CMS signed receipt request functions | ||
| 10 | .Sh SYNOPSIS | ||
| 11 | .In openssl/cms.h | ||
| 12 | .Ft CMS_ReceiptRequest * | ||
| 13 | .Fo CMS_ReceiptRequest_create0 | ||
| 14 | .Fa "unsigned char *id" | ||
| 15 | .Fa "int idlen" | ||
| 16 | .Fa "int allorfirst" | ||
| 17 | .Fa "STACK_OF(GENERAL_NAMES) *receiptList" | ||
| 18 | .Fa "STACK_OF(GENERAL_NAMES) *receiptsTo" | ||
| 19 | .Fc | ||
| 20 | .Ft int | ||
| 21 | .Fo CMS_add1_ReceiptRequest | ||
| 22 | .Fa "CMS_SignerInfo *si" | ||
| 23 | .Fa "CMS_ReceiptRequest *rr" | ||
| 24 | .Fc | ||
| 25 | .Ft int | ||
| 26 | .Fo CMS_get1_ReceiptRequest | ||
| 27 | .Fa "CMS_SignerInfo *si" | ||
| 28 | .Fa "CMS_ReceiptRequest **prr" | ||
| 29 | .Fc | ||
| 30 | .Ft void | ||
| 31 | .Fo CMS_ReceiptRequest_get0_values | ||
| 32 | .Fa "CMS_ReceiptRequest *rr" | ||
| 33 | .Fa "ASN1_STRING **pcid" | ||
| 34 | .Fa "int *pallorfirst" | ||
| 35 | .Fa "STACK_OF(GENERAL_NAMES) **plist" | ||
| 36 | .Fa "STACK_OF(GENERAL_NAMES) **prto" | ||
| 37 | .Fc | ||
| 38 | .Sh DESCRIPTION | ||
| 39 | .Fn CMS_ReceiptRequest_create0 | ||
| 40 | creates a signed receipt request structure. | ||
| 41 | The | ||
| 42 | .Sy signedContentIdentifier | ||
| 43 | field is set using | ||
| 44 | .Fa id | ||
| 45 | and | ||
| 46 | .Fa idlen , | ||
| 47 | or it is set to 32 bytes of pseudo random data if | ||
| 48 | .Fa id | ||
| 49 | is | ||
| 50 | .Dv NULL . | ||
| 51 | If | ||
| 52 | .Fa receiptList | ||
| 53 | is | ||
| 54 | .Dv NULL , | ||
| 55 | the | ||
| 56 | .Sy allOrFirstTier | ||
| 57 | option in | ||
| 58 | .Sy receiptsFrom | ||
| 59 | is used and set to the value of the | ||
| 60 | .Fa allorfirst | ||
| 61 | parameter. | ||
| 62 | If | ||
| 63 | .Fa receiptList | ||
| 64 | is not | ||
| 65 | .Dv NULL , | ||
| 66 | the | ||
| 67 | .Sy receiptList | ||
| 68 | option in | ||
| 69 | .Sy receiptsFrom | ||
| 70 | is used. | ||
| 71 | The | ||
| 72 | .Fa receiptsTo | ||
| 73 | parameter specifies the | ||
| 74 | .Sy receiptsTo | ||
| 75 | field value. | ||
| 76 | .Pp | ||
| 77 | The | ||
| 78 | .Fn CMS_add1_ReceiptRequest | ||
| 79 | function adds a signed receipt request | ||
| 80 | .Fa rr | ||
| 81 | to the | ||
| 82 | .Vt CMS_SignerInfo | ||
| 83 | structure | ||
| 84 | .Fa si . | ||
| 85 | .Pp | ||
| 86 | .Fn CMS_get1_ReceiptRequest | ||
| 87 | looks for a signed receipt request in | ||
| 88 | .Fa si . | ||
| 89 | If any is found, it is decoded and written to | ||
| 90 | .Fa prr . | ||
| 91 | .Pp | ||
| 92 | .Fn CMS_ReceiptRequest_get0_values | ||
| 93 | retrieves the values of a receipt request. | ||
| 94 | The signedContentIdentifier is copied to | ||
| 95 | .Fa pcid . | ||
| 96 | If the | ||
| 97 | .Sy allOrFirstTier | ||
| 98 | option of | ||
| 99 | .Sy receiptsFrom | ||
| 100 | is used, its value is copied to | ||
| 101 | .Fa pallorfirst ; | ||
| 102 | otherwise the | ||
| 103 | .Sy receiptList | ||
| 104 | field is copied to | ||
| 105 | .Fa plist . | ||
| 106 | The | ||
| 107 | .Sy receiptsTo | ||
| 108 | parameter is copied to | ||
| 109 | .Fa prto . | ||
| 110 | .Sh NOTES | ||
| 111 | For more details of the meaning of the fields see RFC2634. | ||
| 112 | .Pp | ||
| 113 | The contents of a signed receipt should only be considered meaningful if | ||
| 114 | the corresponding | ||
| 115 | .Vt CMS_ContentInfo | ||
| 116 | structure can be successfully verified using | ||
| 117 | .Xr CMS_verify 3 . | ||
| 118 | .Sh RETURN VALUES | ||
| 119 | .Fn CMS_ReceiptRequest_create0 | ||
| 120 | returns a signed receipt request structure or | ||
| 121 | .Dv NULL | ||
| 122 | if an error occurred. | ||
| 123 | .Pp | ||
| 124 | .Fn CMS_add1_ReceiptRequest | ||
| 125 | returns 1 for success or 0 is an error occurred. | ||
| 126 | .Pp | ||
| 127 | .Fn CMS_get1_ReceiptRequest | ||
| 128 | returns 1 is a signed receipt request is found and decoded. | ||
| 129 | It returns 0 if a signed receipt request is not present and -1 if it is | ||
| 130 | present but malformed. | ||
| 131 | .Sh SEE ALSO | ||
| 132 | .Xr CMS_sign 3 , | ||
| 133 | .Xr CMS_sign_receipt 3 , | ||
| 134 | .Xr CMS_verify 3 , | ||
| 135 | .Xr CMS_verify_receipt 3 , | ||
| 136 | .Xr ERR_get_error 3 | ||
| 137 | .Sh HISTORY | ||
| 138 | .Fn CMS_ReceiptRequest_create0 , | ||
| 139 | .Fn CMS_add1_ReceiptRequest , | ||
| 140 | .Fn CMS_get1_ReceiptRequest , | ||
| 141 | and | ||
| 142 | .Fn CMS_ReceiptRequest_get0_values | ||
| 143 | were added to OpenSSL 0.9.8. | ||
diff --git a/src/lib/libcrypto/man/CMS_sign.3 b/src/lib/libcrypto/man/CMS_sign.3 deleted file mode 100644 index af75a20d6b..0000000000 --- a/src/lib/libcrypto/man/CMS_sign.3 +++ /dev/null | |||
| @@ -1,199 +0,0 @@ | |||
| 1 | .Dd $Mdocdate: November 11 2015 $ | ||
| 2 | .Dt CMS_SIGN 3 | ||
| 3 | .Os | ||
| 4 | .Sh NAME | ||
| 5 | .Nm CMS_sign | ||
| 6 | .Nd create a CMS SignedData structure | ||
| 7 | .Sh SYNOPSIS | ||
| 8 | .In openssl/cms.h | ||
| 9 | .Ft CMS_ContentInfo * | ||
| 10 | .Fo CMS_sign | ||
| 11 | .Fa "X509 *signcert" | ||
| 12 | .Fa "EVP_PKEY *pkey" | ||
| 13 | .Fa "STACK_OF(X509) *certs" | ||
| 14 | .Fa "BIO *data" | ||
| 15 | .Fa "unsigned int flags" | ||
| 16 | .Fc | ||
| 17 | .Sh DESCRIPTION | ||
| 18 | .Fn CMS_sign | ||
| 19 | creates and returns a CMS SignedData structure. | ||
| 20 | .Fa signcert | ||
| 21 | is the certificate to sign with, | ||
| 22 | .Fa pkey | ||
| 23 | is the corresponding private key. | ||
| 24 | .Fa certs | ||
| 25 | is an optional additional set of certificates to include in the CMS | ||
| 26 | structure (for example any intermediate CAs in the chain). | ||
| 27 | Any or all of these parameters can be | ||
| 28 | .Dv NULL , | ||
| 29 | see | ||
| 30 | .Sx NOTES | ||
| 31 | below. | ||
| 32 | .Pp | ||
| 33 | The data to be signed is read from | ||
| 34 | .Fa data . | ||
| 35 | .Pp | ||
| 36 | .Fa flags | ||
| 37 | is an optional set of flags. | ||
| 38 | .Sh NOTES | ||
| 39 | Any of the following flags (OR'ed together) can be passed in the | ||
| 40 | .Fa flags | ||
| 41 | parameter. | ||
| 42 | .Pp | ||
| 43 | Many S/MIME clients expect the signed content to include valid MIME | ||
| 44 | headers. | ||
| 45 | If the | ||
| 46 | .Dv CMS_TEXT | ||
| 47 | flag is set, MIME headers for type | ||
| 48 | .Sy text/plain | ||
| 49 | are prepended to the data. | ||
| 50 | .Pp | ||
| 51 | If | ||
| 52 | .Dv CMS_NOCERTS | ||
| 53 | is set, the signer's certificate will not be included in the | ||
| 54 | .Vt CMS_ContentInfo | ||
| 55 | structure, the signer's certificate must still be supplied in the | ||
| 56 | .Fa signcert | ||
| 57 | parameter though. | ||
| 58 | This can reduce the size of the signature if the signers certificate can | ||
| 59 | be obtained by other means: for example a previously signed message. | ||
| 60 | .Pp | ||
| 61 | The data being signed is included in the | ||
| 62 | .Vt CMS_ContentInfo | ||
| 63 | structure, unless | ||
| 64 | .Dv CMS_DETACHED | ||
| 65 | is set, in which case it is omitted. | ||
| 66 | This is used for | ||
| 67 | .Vt CMS_ContentInfo | ||
| 68 | detached signatures which are used in S/MIME plaintext signed | ||
| 69 | messages for example. | ||
| 70 | .Pp | ||
| 71 | Normally the supplied content is translated into MIME canonical format | ||
| 72 | (as required by the S/MIME specifications); if | ||
| 73 | .Dv CMS_BINARY | ||
| 74 | is set, no translation occurs. | ||
| 75 | This option should be used if the supplied data is in binary format; | ||
| 76 | otherwise the translation will corrupt it. | ||
| 77 | .Pp | ||
| 78 | The SignedData structure includes several CMS signedAttributes including | ||
| 79 | the signing time, the CMS content type and the supported list of ciphers | ||
| 80 | in an SMIMECapabilities attribute. | ||
| 81 | If | ||
| 82 | .Dv CMS_NOATTR | ||
| 83 | is set, then no signedAttributes will be used. | ||
| 84 | If | ||
| 85 | .Dv CMS_NOSMIMECAP | ||
| 86 | is set, then just the SMIMECapabilities are omitted. | ||
| 87 | .Pp | ||
| 88 | If present, the SMIMECapabilities attribute indicates support for the | ||
| 89 | following algorithms in preference order: 256 bit AES, Gost R3411-94, | ||
| 90 | Gost 28147-89, 192 bit AES, 128 bit AES, triple DES, 128 bit RC2, 64 bit | ||
| 91 | RC2, DES and 40 bit RC2. | ||
| 92 | If any of these algorithms is not available, then it will not be | ||
| 93 | included: for example the GOST algorithms will not be included if | ||
| 94 | the GOST ENGINE is not loaded. | ||
| 95 | .Pp | ||
| 96 | OpenSSL will by default identify signing certificates using issuer name | ||
| 97 | and serial number. | ||
| 98 | If | ||
| 99 | .Dv CMS_USE_KEYID | ||
| 100 | is set, it will use the subject key identifier value instead. | ||
| 101 | An error occurs if the signing certificate does not have a subject key | ||
| 102 | identifier extension. | ||
| 103 | .Pp | ||
| 104 | If the flag | ||
| 105 | .Dv CMS_STREAM | ||
| 106 | is set, then the returned | ||
| 107 | .Vt CMS_ContentInfo | ||
| 108 | structure is just initialized ready to perform the signing operation. | ||
| 109 | The signing is however | ||
| 110 | .Em not | ||
| 111 | performed and the data to be signed is not read from the | ||
| 112 | .Fa data | ||
| 113 | parameter. | ||
| 114 | Signing is deferred until after the data has been written. | ||
| 115 | In this way, data can be signed in a single pass. | ||
| 116 | .Pp | ||
| 117 | If the | ||
| 118 | .Dv CMS_PARTIAL | ||
| 119 | flag is set, a partial | ||
| 120 | .Vt CMS_ContentInfo | ||
| 121 | structure is output to which additional signers and capabilities can be | ||
| 122 | added before finalization. | ||
| 123 | .Pp | ||
| 124 | If the flag | ||
| 125 | .Dv CMS_STREAM | ||
| 126 | is set, the returned | ||
| 127 | .Vt CMS_ContentInfo | ||
| 128 | structure is | ||
| 129 | .Em not | ||
| 130 | complete and outputting its contents via a function that does not | ||
| 131 | properly finalize the | ||
| 132 | .Vt CMS_ContentInfo | ||
| 133 | structure will give unpredictable results. | ||
| 134 | .Pp | ||
| 135 | Several functions including | ||
| 136 | .Xr SMIME_write_CMS 3 , | ||
| 137 | .Xr i2d_CMS_bio_stream 3 , | ||
| 138 | .Xr PEM_write_bio_CMS_stream 3 | ||
| 139 | finalize the structure. | ||
| 140 | Alternatively finalization can be performed by obtaining the streaming | ||
| 141 | ASN1 | ||
| 142 | .Vt BIO | ||
| 143 | directly using | ||
| 144 | .Xr BIO_new_CMS 3 . | ||
| 145 | .Pp | ||
| 146 | If a signer is specified, it will use the default digest for the signing | ||
| 147 | algorithm. | ||
| 148 | This is SHA1 for both RSA and DSA keys. | ||
| 149 | .Pp | ||
| 150 | If | ||
| 151 | .Fa signcert | ||
| 152 | and | ||
| 153 | .Fa pkey | ||
| 154 | are | ||
| 155 | .Dv NULL , | ||
| 156 | then a certificates only CMS structure is output. | ||
| 157 | .Pp | ||
| 158 | The function | ||
| 159 | .Fn CMS_sign | ||
| 160 | is a basic CMS signing function whose output will be suitable for many | ||
| 161 | purposes. | ||
| 162 | For finer control of the output format the | ||
| 163 | .Fa certs , | ||
| 164 | .Fa signcert | ||
| 165 | and | ||
| 166 | .Fa pkey | ||
| 167 | parameters can all be | ||
| 168 | .Dv NULL | ||
| 169 | and the | ||
| 170 | .Dv CMS_PARTIAL | ||
| 171 | flag set. | ||
| 172 | Then one or more signers can be added using the function | ||
| 173 | .Xr CMS_sign_add1_signer 3 , | ||
| 174 | non default digests can be used and custom attributes added. | ||
| 175 | .Xr CMS_final 3 | ||
| 176 | must then be called to finalize the structure if streaming is not | ||
| 177 | enabled. | ||
| 178 | .Sh RETURN VALUES | ||
| 179 | .Fn CMS_sign | ||
| 180 | returns either a valid | ||
| 181 | .Vt CMS_ContentInfo | ||
| 182 | structure or | ||
| 183 | .Dv NULL | ||
| 184 | if an error occurred. | ||
| 185 | The error can be obtained from | ||
| 186 | .Xr ERR_get_error 3 . | ||
| 187 | .Sh SEE ALSO | ||
| 188 | .Xr CMS_verify 3 , | ||
| 189 | .Xr ERR_get_error 3 | ||
| 190 | .Sh HISTORY | ||
| 191 | .Fn CMS_sign | ||
| 192 | was added to OpenSSL 0.9.8. | ||
| 193 | .Pp | ||
| 194 | The | ||
| 195 | .Dv CMS_STREAM | ||
| 196 | flag is only supported for detached data in OpenSSL 0.9.8. | ||
| 197 | It is supported for embedded data in OpenSSL 1.0.0 and later. | ||
| 198 | .Sh BUGS | ||
| 199 | Some attributes such as counter signatures are not supported. | ||
diff --git a/src/lib/libcrypto/man/CMS_sign_receipt.3 b/src/lib/libcrypto/man/CMS_sign_receipt.3 deleted file mode 100644 index de7a8c0e10..0000000000 --- a/src/lib/libcrypto/man/CMS_sign_receipt.3 +++ /dev/null | |||
| @@ -1,61 +0,0 @@ | |||
| 1 | .Dd $Mdocdate: November 11 2015 $ | ||
| 2 | .Dt CMS_SIGN_RECEIPT 3 | ||
| 3 | .Os | ||
| 4 | .Sh NAME | ||
| 5 | .Nm CMS_sign_receipt | ||
| 6 | .Nd create a CMS signed receipt | ||
| 7 | .Sh SYNOPSIS | ||
| 8 | .In openssl/cms.h | ||
| 9 | .Ft CMS_ContentInfo * | ||
| 10 | .Fo CMS_sign_receipt | ||
| 11 | .Fa "CMS_SignerInfo *si" | ||
| 12 | .Fa "X509 *signcert" | ||
| 13 | .Fa "EVP_PKEY *pkey" | ||
| 14 | .Fa "STACK_OF(X509) *certs" | ||
| 15 | .Fa "unsigned int flags" | ||
| 16 | .Fc | ||
| 17 | .Sh DESCRIPTION | ||
| 18 | .Fn CMS_sign_receipt | ||
| 19 | creates and returns a CMS signed receipt structure. | ||
| 20 | .Fa si | ||
| 21 | is the | ||
| 22 | .Vt CMS_SignerInfo | ||
| 23 | structure containing the signed receipt request. | ||
| 24 | .Fa signcert | ||
| 25 | is the certificate to sign with, | ||
| 26 | .Fa pkey | ||
| 27 | is the corresponding private key. | ||
| 28 | .Fa certs | ||
| 29 | is an optional additional set of certificates to include in the CMS | ||
| 30 | structure (for example any intermediate CAs in the chain). | ||
| 31 | .Pp | ||
| 32 | .Fa flags | ||
| 33 | is an optional set of flags. | ||
| 34 | .Sh NOTES | ||
| 35 | This functions behaves in a similar way to | ||
| 36 | .Xr CMS_sign 3 | ||
| 37 | except the flag values | ||
| 38 | .Dv CMS_DETACHED , | ||
| 39 | .Dv CMS_BINARY , | ||
| 40 | .Dv CMS_NOATTR , | ||
| 41 | .Dv CMS_TEXT , | ||
| 42 | and | ||
| 43 | .Dv CMS_STREAM | ||
| 44 | are not supported, since they do not make sense in the context of | ||
| 45 | signed receipts. | ||
| 46 | .Sh RETURN VALUES | ||
| 47 | .Fn CMS_sign_receipt | ||
| 48 | returns either a valid | ||
| 49 | .Vt CMS_ContentInfo | ||
| 50 | structure or | ||
| 51 | .Dv NULL | ||
| 52 | if an error occurred. | ||
| 53 | The error can be obtained from | ||
| 54 | .Xr ERR_get_error 3 . | ||
| 55 | .Sh SEE ALSO | ||
| 56 | .Xr CMS_sign 3 , | ||
| 57 | .Xr CMS_verify_receipt 3 , | ||
| 58 | .Xr ERR_get_error 3 | ||
| 59 | .Sh HISTORY | ||
| 60 | .Fn CMS_sign_receipt | ||
| 61 | was added to OpenSSL 0.9.8. | ||
diff --git a/src/lib/libcrypto/man/CMS_uncompress.3 b/src/lib/libcrypto/man/CMS_uncompress.3 deleted file mode 100644 index c651f24de2..0000000000 --- a/src/lib/libcrypto/man/CMS_uncompress.3 +++ /dev/null | |||
| @@ -1,70 +0,0 @@ | |||
| 1 | .Dd $Mdocdate: November 11 2015 $ | ||
| 2 | .Dt CMS_UNCOMPRESS 3 | ||
| 3 | .Os | ||
| 4 | .Sh NAME | ||
| 5 | .Nm CMS_uncompress | ||
| 6 | .Nd uncompress a CMS CompressedData structure | ||
| 7 | .Sh SYNOPSIS | ||
| 8 | .In openssl/cms.h | ||
| 9 | .Ft int | ||
| 10 | .Fo CMS_uncompress | ||
| 11 | .Fa "CMS_ContentInfo *cms" | ||
| 12 | .Fa "BIO *dcont" | ||
| 13 | .Fa "BIO *out" | ||
| 14 | .Fa "unsigned int flags" | ||
| 15 | .Fc | ||
| 16 | .Sh DESCRIPTION | ||
| 17 | .Fn CMS_uncompress | ||
| 18 | extracts and uncompresses the content from a CMS CompressedData | ||
| 19 | structure | ||
| 20 | .Fa cms . | ||
| 21 | .Fa data | ||
| 22 | is a | ||
| 23 | .Vt BIO | ||
| 24 | to write the content to and | ||
| 25 | .Fa flags | ||
| 26 | is an optional set of flags. | ||
| 27 | .Pp | ||
| 28 | The | ||
| 29 | .Fa dcont | ||
| 30 | parameter is used in the rare case where the compressed content is | ||
| 31 | detached. | ||
| 32 | It will normally be set to | ||
| 33 | .Dv NULL . | ||
| 34 | .Sh NOTES | ||
| 35 | The only currently supported compression algorithm is zlib: if the | ||
| 36 | structure indicates the use of any other algorithm, an error is returned. | ||
| 37 | .Pp | ||
| 38 | If zlib support is not compiled into OpenSSL, then | ||
| 39 | .Fn CMS_uncompress | ||
| 40 | will always return an error. | ||
| 41 | .Pp | ||
| 42 | The following flags can be passed in the | ||
| 43 | .Fa flags | ||
| 44 | parameter: | ||
| 45 | .Pp | ||
| 46 | If the | ||
| 47 | .Dv CMS_TEXT | ||
| 48 | flag is set, MIME headers for type | ||
| 49 | .Sy text/plain | ||
| 50 | are deleted from the content. | ||
| 51 | If the content is not of type | ||
| 52 | .Sy text/plain , | ||
| 53 | then an error is returned. | ||
| 54 | .Sh RETURN VALUES | ||
| 55 | .Fn CMS_uncompress | ||
| 56 | returns either 1 for success or 0 for failure. | ||
| 57 | The error can be obtained from | ||
| 58 | .Xr ERR_get_error 3 . | ||
| 59 | .Sh SEE ALSO | ||
| 60 | .Xr CMS_compress 3 , | ||
| 61 | .Xr ERR_get_error 3 | ||
| 62 | .Sh HISTORY | ||
| 63 | .Fn CMS_uncompress | ||
| 64 | was added to OpenSSL 0.9.8. | ||
| 65 | .Sh BUGS | ||
| 66 | The lack of single pass processing and the need to hold all data in | ||
| 67 | memory as mentioned in | ||
| 68 | .Xr CMS_verify 3 | ||
| 69 | also applies to | ||
| 70 | .Xr CMS_decompress 3 . | ||
diff --git a/src/lib/libcrypto/man/CMS_verify.3 b/src/lib/libcrypto/man/CMS_verify.3 deleted file mode 100644 index 0ab1baf6b3..0000000000 --- a/src/lib/libcrypto/man/CMS_verify.3 +++ /dev/null | |||
| @@ -1,188 +0,0 @@ | |||
| 1 | .Dd $Mdocdate: November 11 2015 $ | ||
| 2 | .Dt CMS_VERIFY 3 | ||
| 3 | .Os | ||
| 4 | .Sh NAME | ||
| 5 | .Nm CMS_verify , | ||
| 6 | .Nm CMS_get0_signers | ||
| 7 | .Nd verify a CMS SignedData structure | ||
| 8 | .Sh SYNOPSIS | ||
| 9 | .In openssl/cms.h | ||
| 10 | .Ft int | ||
| 11 | .Fo CMS_verify | ||
| 12 | .Fa "CMS_ContentInfo *cms" | ||
| 13 | .Fa "STACK_OF(X509) *certs" | ||
| 14 | .Fa "X509_STORE *store" | ||
| 15 | .Fa "BIO *indata" | ||
| 16 | .Fa "BIO *out" | ||
| 17 | .Fa "unsigned int flags" | ||
| 18 | .Fc | ||
| 19 | .Ft STACK_OF(X509) * | ||
| 20 | .Fo CMS_get0_signers | ||
| 21 | .Fa "CMS_ContentInfo *cms" | ||
| 22 | .Fc | ||
| 23 | .Sh DESCRIPTION | ||
| 24 | .Fn CMS_verify | ||
| 25 | verifies a CMS SignedData structure. | ||
| 26 | .Fa cms | ||
| 27 | is the | ||
| 28 | .Vt CMS_ContentInfo | ||
| 29 | structure to verify. | ||
| 30 | .Fa certs | ||
| 31 | is a set of certificates in which to search for the signing | ||
| 32 | certificate(s). | ||
| 33 | .Fa store | ||
| 34 | is a trusted certificate store used for chain verification. | ||
| 35 | .Fa indata | ||
| 36 | is the detached content if the content is not present in | ||
| 37 | .Fa cms . | ||
| 38 | The content is written to | ||
| 39 | .Fa out | ||
| 40 | if it is not | ||
| 41 | .Dv NULL . | ||
| 42 | .Pp | ||
| 43 | .Fa flags | ||
| 44 | is an optional set of flags, which can be used to modify the verify | ||
| 45 | operation. | ||
| 46 | .Pp | ||
| 47 | .Fn CMS_get0_signers | ||
| 48 | retrieves the signing certificate(s) from | ||
| 49 | .Fa cms , | ||
| 50 | it must be called after a successful | ||
| 51 | .Fn CMS_verify | ||
| 52 | operation. | ||
| 53 | .Sh VERIFY PROCESS | ||
| 54 | Normally the verify process proceeds as follows. | ||
| 55 | .Pp | ||
| 56 | Initially some sanity checks are performed on | ||
| 57 | .Fa cms . | ||
| 58 | The type of | ||
| 59 | .Fa cms | ||
| 60 | must be SignedData. | ||
| 61 | There must be at least one signature on the data and if the content is | ||
| 62 | detached | ||
| 63 | .Fa indata | ||
| 64 | cannot be | ||
| 65 | .Dv NULL . | ||
| 66 | .Pp | ||
| 67 | An attempt is made to locate all the signing certificate(s), first | ||
| 68 | looking in the | ||
| 69 | .Fa certs | ||
| 70 | parameter (if it is not | ||
| 71 | .Dv NULL ) | ||
| 72 | and then looking in any certificates contained in the | ||
| 73 | .Fa cms | ||
| 74 | structure itself. | ||
| 75 | If no signing certificate can be located, the operation fails. | ||
| 76 | .Pp | ||
| 77 | Each signing certificate is chain verified using the | ||
| 78 | .Sy smimesign | ||
| 79 | purpose and the supplied trusted certificate store. | ||
| 80 | Any internal certificates in the message are used as untrusted CAs. | ||
| 81 | If CRL checking is enabled in | ||
| 82 | .Fa store , | ||
| 83 | any internal CRLs are used in addition to attempting to look them up in | ||
| 84 | .Fa store . | ||
| 85 | If any chain verify fails, an error code is returned. | ||
| 86 | .Pp | ||
| 87 | Finally the signed content is read (and written to | ||
| 88 | .Fa out | ||
| 89 | is it is not | ||
| 90 | .Dv NULL ) | ||
| 91 | and the signature is checked. | ||
| 92 | .Pp | ||
| 93 | If all signatures verify correctly, then the function is successful. | ||
| 94 | .Pp | ||
| 95 | Any of the following flags (OR'ed together) can be passed in the | ||
| 96 | .Fa flags | ||
| 97 | parameter to change the default verify behaviour. | ||
| 98 | .Pp | ||
| 99 | If | ||
| 100 | .Dv CMS_NOINTERN | ||
| 101 | is set, the certificates in the message itself are not searched when | ||
| 102 | locating the signing certificate(s). | ||
| 103 | This means that all the signing certificates must be in the | ||
| 104 | .Fa certs | ||
| 105 | parameter. | ||
| 106 | .Pp | ||
| 107 | If | ||
| 108 | .Dv CMS_NOCRL | ||
| 109 | is set, and CRL checking is enabled in | ||
| 110 | .Fa store , | ||
| 111 | then any CRLs in the message itself are ignored. | ||
| 112 | .Pp | ||
| 113 | If the | ||
| 114 | .Dv CMS_TEXT | ||
| 115 | flag is set, MIME headers for type | ||
| 116 | .Sy text/plain | ||
| 117 | are deleted from the content. | ||
| 118 | If the content is not of type | ||
| 119 | .Sy text/plain , | ||
| 120 | then an error is returned. | ||
| 121 | .Pp | ||
| 122 | If | ||
| 123 | .Dv CMS_NO_SIGNER_CERT_VERIFY | ||
| 124 | is set, the signing certificates are not verified. | ||
| 125 | .Pp | ||
| 126 | If | ||
| 127 | .Dv CMS_NO_ATTR_VERIFY | ||
| 128 | is set, the signed attributes signature is not verified. | ||
| 129 | .Pp | ||
| 130 | If | ||
| 131 | .Dv CMS_NO_CONTENT_VERIFY | ||
| 132 | is set, then the content digest is not checked. | ||
| 133 | .Sh NOTES | ||
| 134 | One application of | ||
| 135 | .Dv CMS_NOINTERN | ||
| 136 | is to only accept messages signed by a small number of certificates. | ||
| 137 | The acceptable certificates would be passed in the | ||
| 138 | .Fa certs | ||
| 139 | parameter. | ||
| 140 | In this case, if the signer is not one of the certificates supplied in | ||
| 141 | .Fa certs , | ||
| 142 | then the verify will fail because the signer cannot be found. | ||
| 143 | .Pp | ||
| 144 | In some cases the standard techniques for looking up and validating | ||
| 145 | certificates are not appropriate: for example an application may wish to | ||
| 146 | lookup certificates in a database or perform customised verification. | ||
| 147 | This can be achieved by setting and verifying the signers certificates | ||
| 148 | manually using the signed data utility functions. | ||
| 149 | .Pp | ||
| 150 | Care should be taken when modifying the default verify behaviour, for | ||
| 151 | example setting | ||
| 152 | .Dv CMS_NO_CONTENT_VERIFY | ||
| 153 | will totally disable all content verification and any modified content | ||
| 154 | will be considered valid. | ||
| 155 | This combination is however useful if one merely wishes to write the | ||
| 156 | content to | ||
| 157 | .Fa out | ||
| 158 | and its validity is not considered important. | ||
| 159 | .Pp | ||
| 160 | Chain verification should arguably be performed using the signing time | ||
| 161 | rather than the current time. | ||
| 162 | However since the signing time is supplied by the signer it cannot be | ||
| 163 | trusted without additional evidence (such as a trusted timestamp). | ||
| 164 | .Sh RETURN VALUES | ||
| 165 | .Fn CMS_verify | ||
| 166 | returns 1 for a successful verification and zero if an error occurred. | ||
| 167 | .Pp | ||
| 168 | .Fn CMS_get0_signers | ||
| 169 | returns all signers or | ||
| 170 | .Dv NULL | ||
| 171 | if an error occurred. | ||
| 172 | .Pp | ||
| 173 | The error can be obtained from | ||
| 174 | .Xr ERR_get_error 3 . | ||
| 175 | .Sh SEE ALSO | ||
| 176 | .Xr CMS_sign 3 , | ||
| 177 | .Xr ERR_get_error 3 | ||
| 178 | .Sh HISTORY | ||
| 179 | .Fn CMS_verify | ||
| 180 | was added to OpenSSL 0.9.8. | ||
| 181 | .Sh BUGS | ||
| 182 | The trusted certificate store is not searched for the signing | ||
| 183 | certificate, this is primarily due to the inadequacies of the current | ||
| 184 | .Vt X509_STORE | ||
| 185 | functionality. | ||
| 186 | .Pp | ||
| 187 | The lack of single pass processing means that the signed content must | ||
| 188 | all be held in memory if it is not detached. | ||
diff --git a/src/lib/libcrypto/man/CMS_verify_receipt.3 b/src/lib/libcrypto/man/CMS_verify_receipt.3 deleted file mode 100644 index 0977f267bc..0000000000 --- a/src/lib/libcrypto/man/CMS_verify_receipt.3 +++ /dev/null | |||
| @@ -1,55 +0,0 @@ | |||
| 1 | .Dd $Mdocdate: November 11 2015 $ | ||
| 2 | .Dt CMS_VERIFY_RECEIPT 3 | ||
| 3 | .Os | ||
| 4 | .Sh NAME | ||
| 5 | .Nm CMS_verify_receipt | ||
| 6 | .Nd verify a CMS signed receipt | ||
| 7 | .Sh SYNOPSIS | ||
| 8 | .In openssl/cms.h | ||
| 9 | .Ft int | ||
| 10 | .Fo CMS_verify_receipt | ||
| 11 | .Fa "CMS_ContentInfo *rcms" | ||
| 12 | .Fa "CMS_ContentInfo *ocms" | ||
| 13 | .Fa "STACK_OF(X509) *certs" | ||
| 14 | .Fa "X509_STORE *store" | ||
| 15 | .Fa "unsigned int flags" | ||
| 16 | .Fc | ||
| 17 | .Sh DESCRIPTION | ||
| 18 | .Fn CMS_verify_receipt | ||
| 19 | verifies a CMS signed receipt. | ||
| 20 | .Fa rcms | ||
| 21 | is the signed receipt to verify. | ||
| 22 | .Fa ocms | ||
| 23 | is the original SignedData structure containing the receipt request. | ||
| 24 | .Fa certs | ||
| 25 | is a set of certificates in which to search for the signing certificate. | ||
| 26 | .Fa store | ||
| 27 | is a trusted certificate store (used for chain verification). | ||
| 28 | .Pp | ||
| 29 | .Fa flags | ||
| 30 | is an optional set of flags, which can be used to modify the verify | ||
| 31 | operation. | ||
| 32 | .Sh NOTES | ||
| 33 | This functions behaves in a similar way to | ||
| 34 | .Xr CMS_verify 3 | ||
| 35 | except the flag values | ||
| 36 | .Dv CMS_DETACHED , | ||
| 37 | .Dv CMS_BINARY , | ||
| 38 | .Dv CMS_TEXT , | ||
| 39 | and | ||
| 40 | .Dv CMS_STREAM | ||
| 41 | are not supported since they do not make sense in the context of signed | ||
| 42 | receipts. | ||
| 43 | .Sh RETURN VALUES | ||
| 44 | .Fn CMS_verify_receipt | ||
| 45 | returns 1 for a successful verification and zero if an error occurred. | ||
| 46 | .Pp | ||
| 47 | The error can be obtained from | ||
| 48 | .Xr ERR_get_error 3 . | ||
| 49 | .Sh SEE ALSO | ||
| 50 | .Xr CMS_sign_receipt 3 , | ||
| 51 | .Xr CMS_verify 3 , | ||
| 52 | .Xr ERR_get_error 3 | ||
| 53 | .Sh HISTORY | ||
| 54 | .Fn CMS_verify_receipt | ||
| 55 | was added to OpenSSL 0.9.8. | ||
diff --git a/src/lib/libcrypto/man/Makefile b/src/lib/libcrypto/man/Makefile index e74a6d56bf..1dfcf8700d 100644 --- a/src/lib/libcrypto/man/Makefile +++ b/src/lib/libcrypto/man/Makefile | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | # $OpenBSD: Makefile,v 1.33 2016/09/03 12:42:47 beck Exp $ | 1 | # $OpenBSD: Makefile,v 1.34 2016/09/05 10:43:42 schwarze Exp $ |
| 2 | 2 | ||
| 3 | .include <bsd.own.mk> # for NOMAN | 3 | .include <bsd.own.mk> # for NOMAN |
| 4 | 4 | ||
| @@ -21,7 +21,6 @@ MAN= \ | |||
| 21 | BIO_f_null.3 \ | 21 | BIO_f_null.3 \ |
| 22 | BIO_find_type.3 \ | 22 | BIO_find_type.3 \ |
| 23 | BIO_new.3 \ | 23 | BIO_new.3 \ |
| 24 | BIO_new_CMS.3 \ | ||
| 25 | BIO_push.3 \ | 24 | BIO_push.3 \ |
| 26 | BIO_read.3 \ | 25 | BIO_read.3 \ |
| 27 | BIO_s_accept.3 \ | 26 | BIO_s_accept.3 \ |
| @@ -201,27 +200,6 @@ GENMAN= \ | |||
| 201 | 200 | ||
| 202 | MAN+= ${GENMAN} | 201 | MAN+= ${GENMAN} |
| 203 | 202 | ||
| 204 | #MAN+= CMS_add0_cert.3 \ | ||
| 205 | # CMS_add1_recipient_cert.3 \ | ||
| 206 | # CMS_add1_signer.3 \ | ||
| 207 | # CMS_compress.3 \ | ||
| 208 | # CMS_decrypt.3 \ | ||
| 209 | # CMS_encrypt.3 \ | ||
| 210 | # CMS_final.3 \ | ||
| 211 | # CMS_get0_RecipientInfos.3 \ | ||
| 212 | # CMS_get0_SignerInfos.3 \ | ||
| 213 | # CMS_get0_type.3 \ | ||
| 214 | # CMS_get1_ReceiptRequest.3 \ | ||
| 215 | # CMS_sign.3 \ | ||
| 216 | # CMS_sign_receipt.3 \ | ||
| 217 | # CMS_uncompress.3 \ | ||
| 218 | # CMS_verify.3 \ | ||
| 219 | # CMS_verify_receipt.3 \ | ||
| 220 | # PEM_write_bio_CMS_stream.3 \ | ||
| 221 | # SMIME_read_CMS.3 \ | ||
| 222 | # SMIME_write_CMS.3 \ | ||
| 223 | # i2d_CMS_bio_stream.3 \ | ||
| 224 | |||
| 225 | .include <bsd.man.mk> | 203 | .include <bsd.man.mk> |
| 226 | .else | 204 | .else |
| 227 | maninstall: | 205 | maninstall: |
