Skip to content
体验新版
项目
组织
正在加载...
登录
切换导航
打开侧边栏
OpenHarmony
Third Party Openssl
提交
4d524e10
T
Third Party Openssl
项目概览
OpenHarmony
/
Third Party Openssl
大约 1 年 前同步成功
通知
9
Star
18
Fork
1
代码
文件
提交
分支
Tags
贡献者
分支图
Diff
Issue
0
列表
看板
标记
里程碑
合并请求
0
Wiki
0
Wiki
分析
仓库
DevOps
项目成员
Pages
T
Third Party Openssl
项目概览
项目概览
详情
发布
仓库
仓库
文件
提交
分支
标签
贡献者
分支图
比较
Issue
0
Issue
0
列表
看板
标记
里程碑
合并请求
0
合并请求
0
Pages
分析
分析
仓库分析
DevOps
Wiki
0
Wiki
成员
成员
收起侧边栏
关闭侧边栏
动态
分支图
创建新Issue
提交
Issue看板
体验新版 GitCode,发现更多精彩内容 >>
提交
4d524e10
编写于
2月 24, 2000
作者:
U
Ulf Möller
浏览文件
操作
浏览文件
下载
电子邮件补丁
差异文件
nicer manpages
上级
c6a33c6f
变更
55
隐藏空白更改
内联
并排
Showing
55 changed file
with
104 addition
and
87 deletion
+104
-87
INSTALL
INSTALL
+2
-3
NEWS
NEWS
+2
-1
doc/apps/version.pod
doc/apps/version.pod
+1
-1
doc/crypto/BN_add.pod
doc/crypto/BN_add.pod
+1
-1
doc/crypto/BN_add_word.pod
doc/crypto/BN_add_word.pod
+1
-1
doc/crypto/BN_bn2bin.pod
doc/crypto/BN_bn2bin.pod
+1
-1
doc/crypto/BN_generate_prime.pod
doc/crypto/BN_generate_prime.pod
+1
-1
doc/crypto/BN_mod_inverse.pod
doc/crypto/BN_mod_inverse.pod
+3
-2
doc/crypto/BN_mod_mul_reciprocal.pod
doc/crypto/BN_mod_mul_reciprocal.pod
+1
-1
doc/crypto/BN_num_bytes.pod
doc/crypto/BN_num_bytes.pod
+1
-1
doc/crypto/BN_rand.pod
doc/crypto/BN_rand.pod
+2
-2
doc/crypto/BN_set_bit.pod
doc/crypto/BN_set_bit.pod
+1
-1
doc/crypto/DH_generate_key.pod
doc/crypto/DH_generate_key.pod
+1
-1
doc/crypto/DH_generate_parameters.pod
doc/crypto/DH_generate_parameters.pod
+1
-1
doc/crypto/DH_set_method.pod
doc/crypto/DH_set_method.pod
+1
-1
doc/crypto/DH_size.pod
doc/crypto/DH_size.pod
+1
-1
doc/crypto/DSA_do_sign.pod
doc/crypto/DSA_do_sign.pod
+1
-1
doc/crypto/DSA_dup_DH.pod
doc/crypto/DSA_dup_DH.pod
+1
-1
doc/crypto/DSA_generate_key.pod
doc/crypto/DSA_generate_key.pod
+1
-1
doc/crypto/DSA_generate_parameters.pod
doc/crypto/DSA_generate_parameters.pod
+1
-1
doc/crypto/DSA_set_method.pod
doc/crypto/DSA_set_method.pod
+1
-1
doc/crypto/DSA_size.pod
doc/crypto/DSA_size.pod
+1
-1
doc/crypto/ERR_get_error.pod
doc/crypto/ERR_get_error.pod
+1
-1
doc/crypto/ERR_load_crypto_strings.pod
doc/crypto/ERR_load_crypto_strings.pod
+1
-1
doc/crypto/ERR_load_strings.pod
doc/crypto/ERR_load_strings.pod
+1
-1
doc/crypto/ERR_put_error.pod
doc/crypto/ERR_put_error.pod
+1
-1
doc/crypto/ERR_remove_state.pod
doc/crypto/ERR_remove_state.pod
+1
-1
doc/crypto/EVP_DigestInit.pod
doc/crypto/EVP_DigestInit.pod
+3
-2
doc/crypto/EVP_EncryptInit.pod
doc/crypto/EVP_EncryptInit.pod
+20
-11
doc/crypto/OPENSSL_VERSION_NUMBER.pod
doc/crypto/OPENSSL_VERSION_NUMBER.pod
+1
-1
doc/crypto/RAND_add.pod
doc/crypto/RAND_add.pod
+1
-1
doc/crypto/RAND_bytes.pod
doc/crypto/RAND_bytes.pod
+1
-1
doc/crypto/RAND_egd.pod
doc/crypto/RAND_egd.pod
+1
-1
doc/crypto/RAND_set_rand_method.pod
doc/crypto/RAND_set_rand_method.pod
+1
-1
doc/crypto/RSA_blinding_on.pod
doc/crypto/RSA_blinding_on.pod
+1
-1
doc/crypto/RSA_check_key.pod
doc/crypto/RSA_check_key.pod
+1
-1
doc/crypto/RSA_generate_key.pod
doc/crypto/RSA_generate_key.pod
+1
-1
doc/crypto/RSA_padding_add_PKCS1_type_1.pod
doc/crypto/RSA_padding_add_PKCS1_type_1.pod
+1
-1
doc/crypto/RSA_print.pod
doc/crypto/RSA_print.pod
+1
-1
doc/crypto/RSA_private_encrypt.pod
doc/crypto/RSA_private_encrypt.pod
+3
-3
doc/crypto/RSA_set_method.pod
doc/crypto/RSA_set_method.pod
+1
-1
doc/crypto/RSA_size.pod
doc/crypto/RSA_size.pod
+1
-1
doc/crypto/blowfish.pod
doc/crypto/blowfish.pod
+10
-9
doc/crypto/bn.pod
doc/crypto/bn.pod
+7
-7
doc/crypto/buffer.pod
doc/crypto/buffer.pod
+1
-1
doc/crypto/des_modes.pod
doc/crypto/des_modes.pod
+1
-1
doc/crypto/err.pod
doc/crypto/err.pod
+1
-1
doc/crypto/lhash.pod
doc/crypto/lhash.pod
+1
-1
doc/crypto/md5.pod
doc/crypto/md5.pod
+2
-2
doc/crypto/rand.pod
doc/crypto/rand.pod
+1
-1
doc/crypto/rc4.pod
doc/crypto/rc4.pod
+3
-0
doc/crypto/ripemd.pod
doc/crypto/ripemd.pod
+1
-1
doc/crypto/sha.pod
doc/crypto/sha.pod
+2
-2
doc/crypto/threads.pod
doc/crypto/threads.pod
+2
-2
ssl/ssl_lib.c
ssl/ssl_lib.c
+2
-0
未找到文件。
INSTALL
浏览文件 @
4d524e10
...
...
@@ -117,8 +117,7 @@
If "make" fails, please report the problem to <openssl-bugs@openssl.org>
(note that your message will be forwarded to a public mailing list).
Include the output of "./config -t" and the OpenSSL version
number in your message.
Include the output of "make report" in your message.
[If you encounter assembler error messages, try the "no-asm"
configuration option as an immediate fix.]
...
...
@@ -133,7 +132,7 @@
If a test fails, try removing any compiler optimization flags from
the CFLAGS line in Makefile.ssl and run "make clean; make". Please
send a bug report to <openssl-bugs@openssl.org>, including the
output of "
openssl version -a" and of the failed test
.
output of "
make report"
.
4. If everything tests ok, install OpenSSL with
...
...
NEWS
浏览文件 @
4d524e10
...
...
@@ -35,8 +35,9 @@
o Memory leak detection now allows applications to add extra information
via a per-thread stack
o PRNG robustness improved
o EGD support
o BIGNUM library bug fixes
o
f
aster DSA parameter generation
o
F
aster DSA parameter generation
o Enhanced support for Alpha Linux
o Experimental MacOS support
...
...
doc/apps/version.pod
浏览文件 @
4d524e10
...
...
@@ -2,7 +2,7 @@
=head1 NAME
version - print version information
version - print
OpenSSL
version information
=head1 SYNOPSIS
...
...
doc/crypto/BN_add.pod
浏览文件 @
4d524e10
...
...
@@ -3,7 +3,7 @@
=head1 NAME
BN_add, BN_sub, BN_mul, BN_div, BN_sqr, BN_mod, BN_mod_mul, BN_exp,
BN_mod_exp, BN_gcd -
A
rithmetic operations on BIGNUMs
BN_mod_exp, BN_gcd -
a
rithmetic operations on BIGNUMs
=head1 SYNOPSIS
...
...
doc/crypto/BN_add_word.pod
浏览文件 @
4d524e10
...
...
@@ -2,7 +2,7 @@
=head1 NAME
BN_add_word, BN_sub_word, BN_mul_word, BN_div_word, BN_mod_word -
A
rithmetic
BN_add_word, BN_sub_word, BN_mul_word, BN_div_word, BN_mod_word -
a
rithmetic
functions on BIGNUMs with integers
=head1 SYNOPSIS
...
...
doc/crypto/BN_bn2bin.pod
浏览文件 @
4d524e10
...
...
@@ -3,7 +3,7 @@
=head1 NAME
BN_bn2bin, BN_bin2bn, BN_bn2hex, BN_bn2dec, BN_hex2bn, BN_dec2bn,
BN_print, BN_print_fp, BN_bn2mpi, BN_mpi2bn -
F
ormat conversions
BN_print, BN_print_fp, BN_bn2mpi, BN_mpi2bn -
f
ormat conversions
=head1 SYNOPSIS
...
...
doc/crypto/BN_generate_prime.pod
浏览文件 @
4d524e10
...
...
@@ -2,7 +2,7 @@
=head1 NAME
BN_generate_prime, BN_is_prime, BN_is_prime_fasttest -
G
enerate primes and test for primality
BN_generate_prime, BN_is_prime, BN_is_prime_fasttest -
g
enerate primes and test for primality
=head1 SYNOPSIS
...
...
doc/crypto/BN_mod_inverse.pod
浏览文件 @
4d524e10
...
...
@@ -2,13 +2,14 @@
=head1 NAME
BN_mod_inverse -
C
ompute inverse modulo n
BN_mod_inverse -
c
ompute inverse modulo n
=head1 SYNOPSIS
#include <openssl/bn.h>
BIGNUM *BN_mod_inverse(BIGNUM *r, BIGNUM *a, const BIGNUM *n, BN_CTX *ctx);
BIGNUM *BN_mod_inverse(BIGNUM *r, BIGNUM *a, const BIGNUM *n,
BN_CTX *ctx);
=head1 DESCRIPTION
...
...
doc/crypto/BN_mod_mul_reciprocal.pod
浏览文件 @
4d524e10
...
...
@@ -3,7 +3,7 @@
=head1 NAME
BN_mod_mul_reciprocal, BN_RECP_CTX_new, BN_RECP_CTX_init,
BN_RECP_CTX_free, BN_RECP_CTX_set -
M
odular multiplication using
BN_RECP_CTX_free, BN_RECP_CTX_set -
m
odular multiplication using
reciprocal
=head1 SYNOPSIS
...
...
doc/crypto/BN_num_bytes.pod
浏览文件 @
4d524e10
...
...
@@ -2,7 +2,7 @@
=head1 NAME
BN_num_bits, BN_num_bytes, BN_num_bits_word -
G
et BIGNUM size
BN_num_bits, BN_num_bytes, BN_num_bits_word -
g
et BIGNUM size
=head1 SYNOPSIS
...
...
doc/crypto/BN_rand.pod
浏览文件 @
4d524e10
...
...
@@ -2,7 +2,7 @@
=head1 NAME
BN_rand, BN_pseudo_rand -
G
enerate pseudo-random number
BN_rand, BN_pseudo_rand -
g
enerate pseudo-random number
=head1 SYNOPSIS
...
...
@@ -10,7 +10,7 @@ BN_rand, BN_pseudo_rand - Generate pseudo-random number
int BN_rand(BIGNUM *rnd, int bits, int top, int bottom);
int BN_pseudo_rand(BIGNUM *rnd, int bits, int top,int bottom);
int BN_pseudo_rand(BIGNUM *rnd, int bits, int top,
int bottom);
=head1 DESCRIPTION
...
...
doc/crypto/BN_set_bit.pod
浏览文件 @
4d524e10
...
...
@@ -3,7 +3,7 @@
=head1 NAME
BN_set_bit, BN_clear_bit, BN_is_bit_set, BN_mask_bits, BN_lshift,
BN_lshift1, BN_rshift, BN_rshift1 -
B
it operations on BIGNUMs
BN_lshift1, BN_rshift, BN_rshift1 -
b
it operations on BIGNUMs
=head1 SYNOPSIS
...
...
doc/crypto/DH_generate_key.pod
浏览文件 @
4d524e10
...
...
@@ -2,7 +2,7 @@
=head1 NAME
DH_generate_key, DH_compute_key -
P
erform Diffie-Hellman key exchange
DH_generate_key, DH_compute_key -
p
erform Diffie-Hellman key exchange
=head1 SYNOPSIS
...
...
doc/crypto/DH_generate_parameters.pod
浏览文件 @
4d524e10
...
...
@@ -2,7 +2,7 @@
=head1 NAME
DH_generate_parameters, DH_check -
G
enerate and check Diffie-Hellman parameters
DH_generate_parameters, DH_check -
g
enerate and check Diffie-Hellman parameters
=head1 SYNOPSIS
...
...
doc/crypto/DH_set_method.pod
浏览文件 @
4d524e10
...
...
@@ -3,7 +3,7 @@
=head1 NAME
DH_set_default_method, DH_get_default_method, DH_set_method,
DH_new_method, DH_OpenSSL -
Select RSA
method
DH_new_method, DH_OpenSSL -
select DH
method
=head1 SYNOPSIS
...
...
doc/crypto/DH_size.pod
浏览文件 @
4d524e10
...
...
@@ -2,7 +2,7 @@
=head1 NAME
DH_size -
G
et Diffie-Hellman prime size
DH_size -
g
et Diffie-Hellman prime size
=head1 SYNOPSIS
...
...
doc/crypto/DSA_do_sign.pod
浏览文件 @
4d524e10
...
...
@@ -2,7 +2,7 @@
=head1 NAME
DSA_do_sign, DSA_do_verify -
R
aw DSA signature operations
DSA_do_sign, DSA_do_verify -
r
aw DSA signature operations
=head1 SYNOPSIS
...
...
doc/crypto/DSA_dup_DH.pod
浏览文件 @
4d524e10
...
...
@@ -2,7 +2,7 @@
=head1 NAME
DSA_dup_DH -
C
reate a DH structure out of DSA structure
DSA_dup_DH -
c
reate a DH structure out of DSA structure
=head1 SYNOPSIS
...
...
doc/crypto/DSA_generate_key.pod
浏览文件 @
4d524e10
...
...
@@ -2,7 +2,7 @@
=head1 NAME
DSA_generate_key -
G
enerate DSA key pair
DSA_generate_key -
g
enerate DSA key pair
=head1 SYNOPSIS
...
...
doc/crypto/DSA_generate_parameters.pod
浏览文件 @
4d524e10
...
...
@@ -2,7 +2,7 @@
=head1 NAME
DSA_generate_parameters -
G
enerate DSA parameters
DSA_generate_parameters -
g
enerate DSA parameters
=head1 SYNOPSIS
...
...
doc/crypto/DSA_set_method.pod
浏览文件 @
4d524e10
...
...
@@ -3,7 +3,7 @@
=head1 NAME
DSA_set_default_method, DSA_get_default_method, DSA_set_method,
DSA_new_method, DSA_OpenSSL -
S
elect RSA method
DSA_new_method, DSA_OpenSSL -
s
elect RSA method
=head1 SYNOPSIS
...
...
doc/crypto/DSA_size.pod
浏览文件 @
4d524e10
...
...
@@ -2,7 +2,7 @@
=head1 NAME
DSA_size -
G
et DSA signature size
DSA_size -
g
et DSA signature size
=head1 SYNOPSIS
...
...
doc/crypto/ERR_get_error.pod
浏览文件 @
4d524e10
...
...
@@ -2,7 +2,7 @@
=head1 NAME
ERR_get_error, ERR_peek_error -
O
btain error code
ERR_get_error, ERR_peek_error -
o
btain error code
=head1 SYNOPSIS
...
...
doc/crypto/ERR_load_crypto_strings.pod
浏览文件 @
4d524e10
...
...
@@ -3,7 +3,7 @@
=head1 NAME
ERR_load_crypto_strings, SSL_load_error_strings, ERR_free_strings -
L
oad and free error strings
l
oad and free error strings
=head1 SYNOPSIS
...
...
doc/crypto/ERR_load_strings.pod
浏览文件 @
4d524e10
...
...
@@ -2,7 +2,7 @@
=head1 NAME
ERR_load_strings, ERR_PACK, ERR_get_next_error_library -
L
oad
ERR_load_strings, ERR_PACK, ERR_get_next_error_library -
l
oad
arbitrary error strings
=head1 SYNOPSIS
...
...
doc/crypto/ERR_put_error.pod
浏览文件 @
4d524e10
...
...
@@ -2,7 +2,7 @@
=head1 NAME
ERR_put_error, ERR_add_error_data -
R
ecord an error
ERR_put_error, ERR_add_error_data -
r
ecord an error
=head1 SYNOPSIS
...
...
doc/crypto/ERR_remove_state.pod
浏览文件 @
4d524e10
...
...
@@ -2,7 +2,7 @@
=head1 NAME
ERR_remove_state -
F
ree a thread's error queue
ERR_remove_state -
f
ree a thread's error queue
=head1 SYNOPSIS
...
...
doc/crypto/EVP_DigestInit.pod
浏览文件 @
4d524e10
...
...
@@ -9,8 +9,9 @@ EVP_DigestInit, EVP_DigestUpdate, EVP_DigestFinal - EVP digest routines
#include <openssl/evp.h>
void EVP_DigestInit(EVP_MD_CTX *ctx, const EVP_MD *type);
void EVP_DigestUpdate(EVP_MD_CTX *ctx,const void *d, unsigned int cnt);
void EVP_DigestFinal(EVP_MD_CTX *ctx,unsigned char *md,unsigned int *s);
void EVP_DigestUpdate(EVP_MD_CTX *ctx, const void *d, unsigned int cnt);
void EVP_DigestFinal(EVP_MD_CTX *ctx, unsigned char *md,
unsigned int *s);
#define EVP_MAX_MD_SIZE (16+20) /* The SSLv3 md5+sha1 type */
...
...
doc/crypto/EVP_EncryptInit.pod
浏览文件 @
4d524e10
...
...
@@ -8,17 +8,26 @@ EVP_EncryptInit, EVP_EncryptUpdate, EVP_EncryptFinal - EVP cipher routines
#include <openssl/evp.h>
void EVP_EncryptInit(EVP_CIPHER_CTX *ctx,const EVP_CIPHER *type, unsigned char *key, unsigned char *iv);
void EVP_EncryptUpdate(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl, unsigned char *in, int inl);
void EVP_EncryptFinal(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl);
void EVP_DecryptInit(EVP_CIPHER_CTX *ctx,const EVP_CIPHER *type, unsigned char *key, unsigned char *iv);
void EVP_DecryptUpdate(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl, unsigned char *in, int inl);
int EVP_DecryptFinal(EVP_CIPHER_CTX *ctx, unsigned char *outm, int *outl);
void EVP_CipherInit(EVP_CIPHER_CTX *ctx,const EVP_CIPHER *type, unsigned char *key,unsigned char *iv,int enc);
void EVP_CipherUpdate(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl, unsigned char *in, int inl);
int EVP_CipherFinal(EVP_CIPHER_CTX *ctx, unsigned char *outm, int *outl);
void EVP_EncryptInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *type,
unsigned char *key, unsigned char *iv);
void EVP_EncryptUpdate(EVP_CIPHER_CTX *ctx, unsigned char *out,
int *outl, unsigned char *in, int inl);
void EVP_EncryptFinal(EVP_CIPHER_CTX *ctx, unsigned char *out,
int *outl);
void EVP_DecryptInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *type,
unsigned char *key, unsigned char *iv);
void EVP_DecryptUpdate(EVP_CIPHER_CTX *ctx, unsigned char *out,
int *outl, unsigned char *in, int inl);
int EVP_DecryptFinal(EVP_CIPHER_CTX *ctx, unsigned char *outm,
int *outl);
void EVP_CipherInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *type,
unsigned char *key, unsigned char *iv, int enc);
void EVP_CipherUpdate(EVP_CIPHER_CTX *ctx, unsigned char *out,
int *outl, unsigned char *in, int inl);
int EVP_CipherFinal(EVP_CIPHER_CTX *ctx, unsigned char *outm,
int *outl);
void EVP_CIPHER_CTX_cleanup(EVP_CIPHER_CTX *a);
...
...
doc/crypto/OPENSSL_VERSION_NUMBER.pod
浏览文件 @
4d524e10
...
...
@@ -2,7 +2,7 @@
=head1 NAME
OPENSSL_VERSION_NUMBER, SSLeay -
G
et OpenSSL version number
OPENSSL_VERSION_NUMBER, SSLeay -
g
et OpenSSL version number
=head1 SYNOPSIS
...
...
doc/crypto/RAND_add.pod
浏览文件 @
4d524e10
...
...
@@ -2,7 +2,7 @@
=head1 NAME
RAND_add, RAND_seed, RAND_screen -
A
dd entropy to the PRNG
RAND_add, RAND_seed, RAND_screen -
a
dd entropy to the PRNG
=head1 SYNOPSIS
...
...
doc/crypto/RAND_bytes.pod
浏览文件 @
4d524e10
...
...
@@ -2,7 +2,7 @@
=head1 NAME
RAND_bytes, RAND_pseudo_bytes -
G
enerate random data
RAND_bytes, RAND_pseudo_bytes -
g
enerate random data
=head1 SYNOPSIS
...
...
doc/crypto/RAND_egd.pod
浏览文件 @
4d524e10
...
...
@@ -2,7 +2,7 @@
=head1 NAME
RAND_egd -
Q
uery entropy gathering daemon
RAND_egd -
q
uery entropy gathering daemon
=head1 SYNOPSIS
...
...
doc/crypto/RAND_set_rand_method.pod
浏览文件 @
4d524e10
...
...
@@ -2,7 +2,7 @@
=head1 NAME
RAND_set_rand_method, RAND_get_rand_method, RAND_SSLeay -
S
elect RAND method
RAND_set_rand_method, RAND_get_rand_method, RAND_SSLeay -
s
elect RAND method
=head1 SYNOPSIS
...
...
doc/crypto/RSA_blinding_on.pod
浏览文件 @
4d524e10
...
...
@@ -2,7 +2,7 @@
=head1 NAME
RSA_blinding_on, RSA_blinding_off -
P
rotect the RSA operation from timing attacks
RSA_blinding_on, RSA_blinding_off -
p
rotect the RSA operation from timing attacks
=head1 SYNOPSIS
...
...
doc/crypto/RSA_check_key.pod
浏览文件 @
4d524e10
...
...
@@ -2,7 +2,7 @@
=head1 NAME
RSA_check_key -
Valid
ate RSA keys
RSA_check_key -
validate priv
ate RSA keys
=head1 SYNOPSIS
...
...
doc/crypto/RSA_generate_key.pod
浏览文件 @
4d524e10
...
...
@@ -2,7 +2,7 @@
=head1 NAME
RSA_generate_key -
G
enerate RSA key pair
RSA_generate_key -
g
enerate RSA key pair
=head1 SYNOPSIS
...
...
doc/crypto/RSA_padding_add_PKCS1_type_1.pod
浏览文件 @
4d524e10
...
...
@@ -6,7 +6,7 @@ RSA_padding_add_PKCS1_type_1, RSA_padding_check_PKCS1_type_1,
RSA_padding_add_PKCS1_type_2, RSA_padding_check_PKCS1_type_2,
RSA_padding_add_PKCS1_OAEP, RSA_padding_check_PKCS1_OAEP,
RSA_padding_add_SSLv23, RSA_padding_check_SSLv23,
RSA_padding_add_none, RSA_padding_check_none -
A
symmetric encryption
RSA_padding_add_none, RSA_padding_check_none -
a
symmetric encryption
padding
=head1 SYNOPSIS
...
...
doc/crypto/RSA_print.pod
浏览文件 @
4d524e10
...
...
@@ -2,7 +2,7 @@
=head1 NAME
RSA_print, RSA_print_fp, DHparams_print, DHparams_print_fp -
P
rint
RSA_print, RSA_print_fp, DHparams_print, DHparams_print_fp -
p
rint
cryptographic parameters
=head1 SYNOPSIS
...
...
doc/crypto/RSA_private_encrypt.pod
浏览文件 @
4d524e10
...
...
@@ -2,17 +2,17 @@
=head1 NAME
RSA_private_encrypt, RSA_public_decrypt -
L
ow level signature operations
RSA_private_encrypt, RSA_public_decrypt -
l
ow level signature operations
=head1 SYNOPSIS
#include <openssl/rsa.h>
int RSA_private_encrypt(int flen, unsigned char *from,
unsigned char *to, RSA *rsa,int padding);
unsigned char *to, RSA *rsa,
int padding);
int RSA_public_decrypt(int flen, unsigned char *from,
unsigned char *to, RSA *rsa,int padding);
unsigned char *to, RSA *rsa,
int padding);
=head1 DESCRIPTION
...
...
doc/crypto/RSA_set_method.pod
浏览文件 @
4d524e10
...
...
@@ -4,7 +4,7 @@
RSA_set_default_method, RSA_get_default_method, RSA_set_method,
RSA_get_method, RSA_PKCS1_SSLeay, RSA_PKCS1_RSAref,
RSA_PKCS1_null_method, RSA_flags, RSA_new_method -
S
elect RSA method
RSA_PKCS1_null_method, RSA_flags, RSA_new_method -
s
elect RSA method
=head1 SYNOPSIS
...
...
doc/crypto/RSA_size.pod
浏览文件 @
4d524e10
...
...
@@ -2,7 +2,7 @@
=head1 NAME
RSA_size -
G
et RSA modulus size
RSA_size -
g
et RSA modulus size
=head1 SYNOPSIS
...
...
doc/crypto/blowfish.pod
浏览文件 @
4d524e10
...
...
@@ -14,14 +14,15 @@ BF_cfb64_encrypt, BF_ofb64_encrypt, BF_options - Blowfish encryption
void BF_encrypt(BF_LONG *data,const BF_KEY *key);
void BF_decrypt(BF_LONG *data,const BF_KEY *key);
void BF_ecb_encrypt(const unsigned char *in,unsigned char *out,BF_KEY *key,
int enc);
void BF_cbc_encrypt(const unsigned char *in, unsigned char *out, long length,
BF_KEY *schedule, unsigned char *ivec, int enc);
void BF_cfb64_encrypt(const unsigned char *in, unsigned char *out, long length,
BF_KEY *schedule, unsigned char *ivec, int *num, int enc);
void BF_ofb64_encrypt(const unsigned char *in, unsigned char *out, long length,
BF_KEY *schedule, unsigned char *ivec, int *num);
void BF_ecb_encrypt(const unsigned char *in, unsigned char *out,
BF_KEY *key, int enc);
void BF_cbc_encrypt(const unsigned char *in, unsigned char *out,
long length, BF_KEY *schedule, unsigned char *ivec, int enc);
void BF_cfb64_encrypt(const unsigned char *in, unsigned char *out,
long length, BF_KEY *schedule, unsigned char *ivec, int *num,
int enc);
void BF_ofb64_encrypt(const unsigned char *in, unsigned char *out,
long length, BF_KEY *schedule, unsigned char *ivec, int *num);
const char *BF_options(void);
=head1 DESCRIPTION
...
...
@@ -89,7 +90,7 @@ None of the functions presented here return any value.
=head1 NOTE
Applications should use the higher level functions EVP_
Diges
tInit(3) etc.
Applications should use the higher level functions EVP_
Encryp
tInit(3) etc.
instead of calling the blowfish functions directly.
=head1 SEE ALSO
...
...
doc/crypto/bn.pod
浏览文件 @
4d524e10
...
...
@@ -2,7 +2,7 @@
=head1 NAME
bn -
M
ultiprecision integer arithmetics
bn -
m
ultiprecision integer arithmetics
=head1 SYNOPSIS
...
...
@@ -58,13 +58,13 @@ bn - Multiprecision integer arithmetics
int BN_set_word(BIGNUM *a, unsigned long w);
unsigned long BN_get_word(BIGNUM *a);
int BN_rand(BIGNUM *rnd, int bits, int top,int bottom);
int BN_pseudo_rand(BIGNUM *rnd, int bits, int top,int bottom);
int BN_rand(BIGNUM *rnd, int bits, int top,
int bottom);
int BN_pseudo_rand(BIGNUM *rnd, int bits, int top,
int bottom);
BIGNUM *BN_generate_prime(BIGNUM *ret,
int bits,int safe,
BIGNUM *add,
BIGNUM *rem,
void (*callback)(int,int,void *),
void *cb_arg);
int BN_is_prime(const BIGNUM *p,
int nchecks,void (*callback)(int,int,void *)
,
BN_CTX *ctx,
void *cb_arg);
BIGNUM *BN_generate_prime(BIGNUM *ret,
int bits,int safe,
BIGNUM *add,
BIGNUM *rem,
void (*callback)(int, int, void *),
void *cb_arg);
int BN_is_prime(const BIGNUM *p,
int nchecks
,
void (*callback)(int, int, void *), BN_CTX *ctx,
void *cb_arg);
int BN_set_bit(BIGNUM *a, int n);
int BN_clear_bit(BIGNUM *a, int n);
...
...
doc/crypto/buffer.pod
浏览文件 @
4d524e10
...
...
@@ -2,7 +2,7 @@
=head1 NAME
BUF_MEM_new, BUF_MEM_free, BUF_MEM_grow, BUF_strdup -
S
imple
BUF_MEM_new, BUF_MEM_free, BUF_MEM_grow, BUF_strdup -
s
imple
character arrays structure
=head1 SYNOPSIS
...
...
doc/crypto/des_modes.pod
浏览文件 @
4d524e10
...
...
@@ -2,7 +2,7 @@
=head1 NAME
Modes of DES -
T
he variants of DES and other crypto algorithms of OpenSSL
Modes of DES -
t
he variants of DES and other crypto algorithms of OpenSSL
=head1 DESCRIPTION
...
...
doc/crypto/err.pod
浏览文件 @
4d524e10
...
...
@@ -2,7 +2,7 @@
=head1 NAME
err -
E
rror codes
err -
e
rror codes
=head1 SYNOPSIS
...
...
doc/crypto/lhash.pod
浏览文件 @
4d524e10
...
...
@@ -3,7 +3,7 @@
=head1 NAME
lh_new, lh_free, lh_insert, lh_delete, lh_retrieve, lh_doall,
lh_doall_arg, lh_error -
D
ynamic hash table
lh_doall_arg, lh_error -
d
ynamic hash table
=head1 SYNOPSIS
...
...
doc/crypto/md5.pod
浏览文件 @
4d524e10
...
...
@@ -51,8 +51,8 @@ for MD2_DIGEST_LENGTH == 16 bytes of output, and erases the B<MD2_CTX>.
MD5_Init(), MD5_Update() and MD5_Final() are analogous using an
B<MD5_CTX> structure.
Applications should use the higher level functions EVP_DigestInit(3)
etc.
instead of calling the hash functions directly.
Applications should use the higher level functions EVP_DigestInit(3)
etc.
instead of calling the hash functions directly.
=head1 NOTE
...
...
doc/crypto/rand.pod
浏览文件 @
4d524e10
...
...
@@ -2,7 +2,7 @@
=head1 NAME
rand -
P
seudo-random number generator
rand -
p
seudo-random number generator
=head1 SYNOPSIS
...
...
doc/crypto/rc4.pod
浏览文件 @
4d524e10
...
...
@@ -37,6 +37,9 @@ Since RC4 is a stream cipher (the input is XORed with a pseudo-random
key stream to produce the output), decryption uses the same function
calls as encryption.
Applications should use the higher level functions EVP_EncryptInit(3)
etc. instead of calling the RC4 functions directly.
=head1 RETURN VALUES
RC4_set_key() and RC4() do not return values.
...
...
doc/crypto/ripemd.pod
浏览文件 @
4d524e10
...
...
@@ -13,7 +13,7 @@ RIPEMD-160 hash function
unsigned char *md);
void RIPEMD160_Init(RIPEMD160_CTX *c);
void RIPEMD160_Update(RIPEMD_CTX *c, const
unsigned char
*data,
void RIPEMD160_Update(RIPEMD_CTX *c, const
void
*data,
unsigned long len);
void RIPEMD160_Final(unsigned char *md, RIPEMD160_CTX *c);
...
...
doc/crypto/sha.pod
浏览文件 @
4d524e10
...
...
@@ -37,8 +37,8 @@ be hashed (B<len> bytes at B<data>).
SHA1_Final() places the message digest in B<md>, which must have space
for SHA_DIGEST_LENGTH == 20 bytes of output, and erases the B<SHA_CTX>.
Applications should use the higher level functions EVP_DigestInit(3)
etc.
instead of calling the hash functions directly.
Applications should use the higher level functions EVP_DigestInit(3)
etc.
instead of calling the hash functions directly.
The predecessor of SHA-1, SHA, is also implemented, but it should be
used only when backward compatibility is required.
...
...
doc/crypto/threads.pod
浏览文件 @
4d524e10
...
...
@@ -20,12 +20,12 @@ CRYPTO_set_locking_callback, CRYPTO_set_id_callback - OpenSSL thread support
OpenSSL can safely be used in multi-threaded applications provided
that two callback functions are set.
locking_function(int mode, int
type
, const char *file, int line) is
locking_function(int mode, int
n
, const char *file, int line) is
needed to perform locking on shared data stuctures. Multi-threaded
applications will crash at random if it is not set.
locking_function() must be able to handle up to CRYPTO_num_locks()
different mutex locks. It sets the B<n>th lock if B<mode> &
different mutex locks. It sets the B<n>
-
th lock if B<mode> &
B<CRYPTO_LOCK>, and releases it otherwise.
B<file> and B<line> are the file number of the function setting the
...
...
ssl/ssl_lib.c
浏览文件 @
4d524e10
...
...
@@ -89,11 +89,13 @@ union rsa_fn_to_char_u
};
#endif
#ifndef NO_DH
union
dh_fn_to_char_u
{
char
*
char_p
;
DH
*
(
*
fn_p
)(
SSL
*
,
int
,
int
);
};
#endif
int
SSL_clear
(
SSL
*
s
)
{
...
...
编辑
预览
Markdown
is supported
0%
请重试
或
添加新附件
.
添加附件
取消
You are about to add
0
people
to the discussion. Proceed with caution.
先完成此消息的编辑!
取消
想要评论请
注册
或
登录