Skip to content
体验新版
项目
组织
正在加载...
登录
切换导航
打开侧边栏
OpenHarmony
Third Party Openssl
提交
c8973693
T
Third Party Openssl
项目概览
OpenHarmony
/
Third Party Openssl
大约 1 年 前同步成功
通知
9
Star
18
Fork
1
代码
文件
提交
分支
Tags
贡献者
分支图
Diff
Issue
0
列表
看板
标记
里程碑
合并请求
0
Wiki
0
Wiki
分析
仓库
DevOps
项目成员
Pages
T
Third Party Openssl
项目概览
项目概览
详情
发布
仓库
仓库
文件
提交
分支
标签
贡献者
分支图
比较
Issue
0
Issue
0
列表
看板
标记
里程碑
合并请求
0
合并请求
0
Pages
分析
分析
仓库分析
DevOps
Wiki
0
Wiki
成员
成员
收起侧边栏
关闭侧边栏
动态
分支图
创建新Issue
提交
Issue看板
体验新版 GitCode,发现更多精彩内容 >>
提交
c8973693
编写于
9月 20, 2000
作者:
U
Ulf Möller
浏览文件
操作
浏览文件
下载
电子邮件补丁
差异文件
ispell.
上级
4e87e05b
变更
16
隐藏空白更改
内联
并排
Showing
16 changed file
with
44 addition
and
44 deletion
+44
-44
doc/crypto/EVP_DigestInit.pod
doc/crypto/EVP_DigestInit.pod
+4
-4
doc/crypto/EVP_EncryptInit.pod
doc/crypto/EVP_EncryptInit.pod
+3
-3
doc/crypto/EVP_OpenInit.pod
doc/crypto/EVP_OpenInit.pod
+2
-2
doc/crypto/EVP_SealInit.pod
doc/crypto/EVP_SealInit.pod
+2
-2
doc/crypto/EVP_SignInit.pod
doc/crypto/EVP_SignInit.pod
+3
-3
doc/crypto/EVP_VerifyInit.pod
doc/crypto/EVP_VerifyInit.pod
+3
-3
doc/crypto/OPENSSL_VERSION_NUMBER.pod
doc/crypto/OPENSSL_VERSION_NUMBER.pod
+1
-1
doc/crypto/OpenSSL_add_all_algorithms.pod
doc/crypto/OpenSSL_add_all_algorithms.pod
+1
-1
doc/crypto/blowfish.pod
doc/crypto/blowfish.pod
+9
-9
doc/crypto/bn_internal.pod
doc/crypto/bn_internal.pod
+1
-1
doc/crypto/buffer.pod
doc/crypto/buffer.pod
+1
-1
doc/crypto/des.pod
doc/crypto/des.pod
+5
-5
doc/crypto/des_modes.pod
doc/crypto/des_modes.pod
+4
-4
doc/crypto/err.pod
doc/crypto/err.pod
+1
-1
doc/crypto/threads.pod
doc/crypto/threads.pod
+2
-2
doc/ssl/SSL_library_init.pod
doc/ssl/SSL_library_init.pod
+2
-2
未找到文件。
doc/crypto/EVP_DigestInit.pod
浏览文件 @
c8973693
...
...
@@ -50,12 +50,12 @@ EVP digest routines
The EVP digest routines are a high level interface to message digests.
EVP_DigestInit() initiali
s
es a digest context B<ctx> to use a digest
EVP_DigestInit() initiali
z
es a digest context B<ctx> to use a digest
B<type>: this will typically be supplied by a function such as
EVP_sha1().
EVP_DigestUpdate() hashes B<cnt> bytes of data at B<d> into the
digest context B<ctx>. This funtion can be called several times on the
digest context B<ctx>. This fun
c
tion can be called several times on the
same B<ctx> to hash additional data.
EVP_DigestFinal() retrieves the digest value from B<ctx> and places
...
...
@@ -63,7 +63,7 @@ it in B<md>. If the B<s> parameter is not NULL then the number of
bytes of data written (i.e. the length of the digest) will be written
to the integer at B<s>, at most B<EVP_MAX_MD_SIZE> bytes will be written.
After calling EVP_DigestFinal() no additional calls to EVP_DigestUpdate()
can be made, but EVP_DigestInit() can be called to initiali
as
e a new
can be made, but EVP_DigestInit() can be called to initiali
z
e a new
digest operation.
EVP_MD_CTX_copy() can be used to copy the message digest state from
...
...
@@ -102,7 +102,7 @@ returns is of zero length.
EVP_get_digestbyname(), EVP_get_digestbynid() and EVP_get_digestbyobj()
return an B<EVP_MD> structure when passed a digest name, a digest NID or
an ASN1_OBJECT structure respectively. The digest table must be initiali
s
ed
an ASN1_OBJECT structure respectively. The digest table must be initiali
z
ed
using, for example, OpenSSL_add_all_digests() for these functions to work.
=head1 RETURN VALUES
...
...
doc/crypto/EVP_EncryptInit.pod
浏览文件 @
c8973693
...
...
@@ -74,7 +74,7 @@ EVP_CIPHER_asn1_to_param - EVP cipher routines
The EVP cipher routines are a high level interface to certain
symmetric ciphers.
EVP_EncryptInit() initiali
s
es a cipher context B<ctx> for encryption
EVP_EncryptInit() initiali
z
es a cipher context B<ctx> for encryption
with cipher B<type>. B<type> is normally supplied by a function such
as EVP_des_cbc() . B<key> is the symmetric key to use and B<iv> is the
IV to use (if necessary), the actual number of bytes used for the
...
...
@@ -255,7 +255,7 @@ and the EVP_CIPHER_CTX_set_key_length() function.
=item EVP_idea_cbc() EVP_idea_ecb(void), EVP_idea_cfb(void), EVP_idea_ofb(void), EVP_idea_cbc(void)
IDE
S encryption algoro
thm in CBC, ECB, CFB and OFB modes respectively.
IDE
A encryption algori
thm in CBC, ECB, CFB and OFB modes respectively.
=item EVP_rc2_cbc(void), EVP_rc2_ecb(void), EVP_rc2_cfb(void), EVP_rc2_ofb(void)
...
...
@@ -325,7 +325,7 @@ default key lengths. If custom ciphers exceed these values the results are
unpredictable. This is because it has become standard practice to define a
generic key as a fixed unsigned char array containing EVP_MAX_KEY_LENGTH bytes.
The ASN1 code is incomplete (and sometimes in
na
curate) it has only been tested
The ASN1 code is incomplete (and sometimes in
ac
curate) it has only been tested
for certain common S/MIME ciphers (RC2, DES, triple DES) in CBC mode.
=head1 EXAMPLES
...
...
doc/crypto/EVP_OpenInit.pod
浏览文件 @
c8973693
...
...
@@ -21,7 +21,7 @@ The EVP envelope routines are a high level interface to envelope
decryption. They decrypt a public key encrypted symmetric key and
then decrypt data using it.
EVP_OpenInit() initiali
s
es a cipher context B<ctx> for decryption
EVP_OpenInit() initiali
z
es a cipher context B<ctx> for decryption
with cipher B<type>. It decrypts the encrypted symmetric key of length
B<ekl> bytes passed in the B<ek> parameter using the private key B<priv>.
The IV is supplied in the B<iv> parameter.
...
...
@@ -35,7 +35,7 @@ page.
It is possible to call EVP_OpenInit() twice in the same way as
EVP_DecryptInit(). The first call should have B<priv> set to NULL
and (after setting any cipher param
a
ters) it should be called again
and (after setting any cipher param
e
ters) it should be called again
with B<type> set to NULL.
If the cipher passed in the B<type> parameter is a variable length
...
...
doc/crypto/EVP_SealInit.pod
浏览文件 @
c8973693
...
...
@@ -22,7 +22,7 @@ encryption. They generate a random key and then "envelope" it by
using public key encryption. Data can then be encrypted using this
key.
EVP_SealInit() initiali
s
es a cipher context B<ctx> for encryption
EVP_SealInit() initiali
z
es a cipher context B<ctx> for encryption
with cipher B<type> using a random secret key and IV supplied in
the B<iv> parameter. B<type> is normally supplied by a function such
as EVP_des_cbc(). The secret key is encrypted using one or more public
...
...
@@ -62,7 +62,7 @@ using public key encryption.
It is possible to call EVP_SealInit() twice in the same way as
EVP_EncryptInit(). The first call should have B<npubk> set to 0
and (after setting any cipher param
a
ters) it should be called again
and (after setting any cipher param
e
ters) it should be called again
with B<type> set to NULL.
=head1 SEE ALSO
...
...
doc/crypto/EVP_SignInit.pod
浏览文件 @
c8973693
...
...
@@ -19,12 +19,12 @@ EVP_SignInit, EVP_SignUpdate, EVP_SignFinal - EVP signing functions
The EVP signature routines are a high level interface to digital
signatures.
EVP_SignInit() initiali
s
es a signing context B<ctx> to using digest
EVP_SignInit() initiali
z
es a signing context B<ctx> to using digest
B<type>: this will typically be supplied by a function such as
EVP_sha1().
EVP_SignUpdate() hashes B<cnt> bytes of data at B<d> into the
signature context B<ctx>. This funtion can be called several times on the
signature context B<ctx>. This fun
c
tion can be called several times on the
same B<ctx> to include additional data.
EVP_SignFinal() signs the data in B<ctx> using the private key B<pkey>
...
...
@@ -32,7 +32,7 @@ and places the signature in B<sig>. If the B<s> parameter is not NULL
then the number of bytes of data written (i.e. the length of the signature)
will be written to the integer at B<s>, at most EVP_PKEY_size(pkey) bytes
will be written. After calling EVP_SignFinal() no additional calls to
EVP_SignUpdate() can be made, but EVP_SignInit() can be called to initiali
as
e
EVP_SignUpdate() can be made, but EVP_SignInit() can be called to initiali
z
e
a new signature operation.
EVP_PKEY_size() returns the maximum size of a signature in bytes. The actual
...
...
doc/crypto/EVP_VerifyInit.pod
浏览文件 @
c8973693
...
...
@@ -17,17 +17,17 @@ EVP_VerifyInit, EVP_VerifyUpdate, EVP_VerifyFinal - EVP signature verification f
The EVP signature verification routines are a high level interface to digital
signatures.
EVP_VerifyInit() initiali
s
es a verification context B<ctx> to using digest
EVP_VerifyInit() initiali
z
es a verification context B<ctx> to using digest
B<type>: this will typically be supplied by a function such as EVP_sha1().
EVP_VerifyUpdate() hashes B<cnt> bytes of data at B<d> into the
verification context B<ctx>. This funtion can be called several times on the
verification context B<ctx>. This fun
c
tion can be called several times on the
same B<ctx> to include additional data.
EVP_VerifyFinal() verifies the data in B<ctx> using the public key B<pkey>
and against the B<siglen> bytes at B<sigbuf>. After calling EVP_VerifyFinal()
no additional calls to EVP_VerifyUpdate() can be made, but EVP_VerifyInit()
can be called to initiali
as
e a new verification operation.
can be called to initiali
z
e a new verification operation.
=head1 RETURN VALUES
...
...
doc/crypto/OPENSSL_VERSION_NUMBER.pod
浏览文件 @
c8973693
...
...
@@ -39,7 +39,7 @@ for example
0x000904100 == 0.9.4 release
0x000905000 == 0.9.5 dev
Version 0.9.5a had an inter
r
im interpretation that is like the current one,
Version 0.9.5a had an interim interpretation that is like the current one,
except the patch level got the highest bit set, to keep continuity. The
number was therefore 0x0090581f.
...
...
doc/crypto/OpenSSL_add_all_algorithms.pod
浏览文件 @
c8973693
...
...
@@ -44,7 +44,7 @@ by EVP_sha1(). It just needs to add them if it (or any of the functions it calls
needs to lookup algorithms.
The cipher and digest lookup functions are used in many parts of the library. If
the table is not initiali
s
ed several functions will misbehave and complain they
the table is not initiali
z
ed several functions will misbehave and complain they
cannot find algorithms. This includes the PEM, PKCS#12, SSL and S/MIME libraries.
This is a common query in the OpenSSL mailing lists.
...
...
doc/crypto/blowfish.pod
浏览文件 @
c8973693
...
...
@@ -51,35 +51,35 @@ B<in> and B<out> must be 64 bits in length, no less. If they are larger,
everything after the first 64 bits is ignored.
The mode functions BF_cbc_encrypt(), BF_cfb64_encrypt() and BF_ofb64_encrypt()
all operate on variable length data. They all take an initiali
s
ation vector
all operate on variable length data. They all take an initiali
z
ation vector
B<ivec> which needs to be passed along into the next call of the same function
for the same message. B<ivec> may be initiali
s
ed with anything, but the
recipient needs to know what it was initiali
s
ed with, or it won't be able
for the same message. B<ivec> may be initiali
z
ed with anything, but the
recipient needs to know what it was initiali
z
ed with, or it won't be able
to decrypt. Some programs and protocols simplify this, like SSH, where
B<ivec> is simply initiali
s
ed to zero.
B<ivec> is simply initiali
z
ed to zero.
BF_cbc_encrypt() operates of data that is a multiple of 8 bytes long, while
BF_cfb64_encrypt() and BF_ofb64_encrypt() are used to encrypt an variable
number of bytes (the amount does not have to be an exact multiple of 8). The
purpose of the latter two is to simulate stream ciphers, and therefore, they
need the parameter B<num>, which is a pointer to an integer where the current
offset in B<ivec> is stored between calls. This integer must be initiali
s
ed
to zero when B<ivec> is initiali
s
ed.
offset in B<ivec> is stored between calls. This integer must be initiali
z
ed
to zero when B<ivec> is initiali
z
ed.
BF_cbc_encrypt() is the Cipher Block Chaining function for Blowfish. It
encrypts or decrypts the 64 bits chunks of B<in> using the key B<schedule>,
putting the result in B<out>. B<enc> decides if encryption (BF_ENCRYPT) or
decryption (BF_DECRYPT) shall be performed. B<ivec> must point at an 8 byte
long initiali
s
ation vector.
long initiali
z
ation vector.
BF_cfb64_encrypt() is the CFB mode for Blowfish with 64 bit feedback.
It encrypts or decrypts the bytes in B<in> using the key B<schedule>,
putting the result in B<out>. B<enc> decides if encryption (B<BF_ENCRYPT>)
or decryption (B<BF_DECRYPT>) shall be performed. B<ivec> must point at an
8 byte long initiali
s
ation vector. B<num> must point at an integer which must
8 byte long initiali
z
ation vector. B<num> must point at an integer which must
be initially zero.
BF_ofb64_encrypt() is the OFB mode for Blowfish with 64 bit feedback.
It uses the same parameters as BF_cfb64_encrypt(), which must be initiali
s
ed
It uses the same parameters as BF_cfb64_encrypt(), which must be initiali
z
ed
the same way.
BF_encrypt() and BF_decrypt() are the lowest level functions for Blowfish
...
...
doc/crypto/bn_internal.pod
浏览文件 @
c8973693
...
...
@@ -149,7 +149,7 @@ word array B<a>, the B<nb> word array B<b> and the B<na>+B<nb> word
array B<r>. It computes B<a>*B<b> and places the result in B<r>.
bn_mul_low_normal(B<r>, B<a>, B<b>, B<n>) operates on the B<n> word
arrays B<r>, B<a>
u
nd B<b>. It computes the B<n> low words of
arrays B<r>, B<a>
a
nd B<b>. It computes the B<n> low words of
B<a>*B<b> and places the result in B<r>.
bn_mul_recursive(B<r>, B<a>, B<b>, B<n2>, B<t>) operates on the B<n2>
...
...
doc/crypto/buffer.pod
浏览文件 @
c8973693
...
...
@@ -68,6 +68,6 @@ L<bio(3)|bio(3)>
=head1 HISTORY
BUF_MEM_new(), BUF_MEM_free() and BUF_MEM_grow() are available in all
versions of SSLeay and OpenSSL. BUF_strdup() was add
d
ed in SSLeay 0.8.
versions of SSLeay and OpenSSL. BUF_strdup() was added in SSLeay 0.8.
=cut
doc/crypto/des.pod
浏览文件 @
c8973693
...
...
@@ -130,7 +130,7 @@ earlier versions of the library, des_random_key() did not generate
secure keys.
Before a DES key can be used, it must be converted into the
architecture depend
a
nt I<des_key_schedule> via the
architecture depend
e
nt I<des_key_schedule> via the
des_set_key_checked() or des_set_key_unchecked() function.
des_set_key_checked() will check that the key passed is of odd parity
...
...
@@ -200,7 +200,7 @@ reusing I<ks1> for the final encryption. C<C=E(ks1,D(ks2,E(ks1,M)))>.
This form of Triple-DES is used by the RSAREF library.
des_pcbc_encrypt() encrypt/decrypts using the propagating cipher block
chaing mode used by Kerberos v4. Its parameters are the same as
chain
in
g mode used by Kerberos v4. Its parameters are the same as
des_ncbc_encrypt().
des_cfb_encrypt() encrypt/decrypts using cipher feedback mode. This
...
...
@@ -241,7 +241,7 @@ compatibility with the MIT Kerberos library. des_read_pw_string()
is also available under the name EVP_read_pw_string().
des_read_pw_string() writes the string specified by I<prompt> to
standar
f
output, turns echo off and reads in input string from the
standar
d
output, turns echo off and reads in input string from the
terminal. The string is returned in I<buf>, which must have space for
at least I<length> bytes. If I<verify> is set, the user is asked for
the password twice and unless the two copies match, an error is
...
...
@@ -268,9 +268,9 @@ input, depending on I<out_count>, 1, 2, 3 or 4 times. If I<output> is
non-NULL, the 8 bytes generated by each pass are written into
I<output>.
The following are DES-based tranformations:
The following are DES-based tran
s
formations:
des_fcrypt() is a fast version of the
u
nix crypt(3) function. This
des_fcrypt() is a fast version of the
U
nix crypt(3) function. This
version takes only a small amount of space relative to other fast
crypt() implementations. This is different to the normal crypt in
that the third parameter is the buffer that the return value is
...
...
doc/crypto/des_modes.pod
浏览文件 @
c8973693
...
...
@@ -6,7 +6,7 @@ Modes of DES - the variants of DES and other crypto algorithms of OpenSSL
=head1 DESCRIPTION
Several crypto algorithms fo OpenSSL can be used in a number of modes. Those
Several crypto algorithms fo
r
OpenSSL can be used in a number of modes. Those
are used for using block ciphers in a way similar to stream ciphers, among
other things.
...
...
@@ -165,13 +165,13 @@ only one bit to be in error in the deciphered plaintext.
=item *
OFB mode is not self-synchroni
s
ing. If the two operation of
OFB mode is not self-synchroni
z
ing. If the two operation of
encipherment and decipherment get out of synchronism, the system needs
to be re-initiali
s
ed.
to be re-initiali
z
ed.
=item *
Each re-initiali
s
ation should use a value of the start variable
Each re-initiali
z
ation should use a value of the start variable
different from the start variable values used before with the same
key. The reason for this is that an identical bit stream would be
produced each time from the same parameters. This would be
...
...
doc/crypto/err.pod
浏览文件 @
c8973693
...
...
@@ -143,7 +143,7 @@ The closing #endif etc will be automatically added by the script.
The generated C error code file B<xxx_err.c> will load the header
files B<stdio.h>, B<openssl/err.h> and B<openssl/xxx.h> so the
header file must load any additional header files containg any
header file must load any additional header files contain
in
g any
definitions it uses.
=head1 USING ERROR CODES IN EXTERNAL LIBRARIES
...
...
doc/crypto/threads.pod
浏览文件 @
c8973693
...
...
@@ -53,7 +53,7 @@ OpenSSL can safely be used in multi-threaded applications provided
that at least two callback functions are set.
locking_function(int mode, int n, const char *file, int line) is
needed to perform locking on shared data stuctures. Multi-threaded
needed to perform locking on shared data st
r
uctures. Multi-threaded
applications will crash at random if it is not set.
locking_function() must be able to handle up to CRYPTO_num_locks()
...
...
@@ -89,7 +89,7 @@ dyn_create_function(const char *file, int line) is needed to create a
lock. Multi-threaded applications might crash at random if it is not set.
dyn_lock_function(int mode, CRYPTO_dynlock *l, const char *file, int line)
is needed to perform locking off dynamic lock nu
n
mbered n. Multi-threaded
is needed to perform locking off dynamic lock numbered n. Multi-threaded
applications might crash at random if it is not set.
dyn_destroy_function(CRYPTO_dynlock *l, const char *file, int line) is
...
...
doc/ssl/SSL_library_init.pod
浏览文件 @
c8973693
...
...
@@ -27,8 +27,8 @@ SSL_library_init() must be called before any other action takes place.
=head1 IMPORTANT
SSL_library_init() only registers ciphers. Another important initialization
is the seeding of the PRNG (Pseud
e
Random Number Generator), which has to
be performed sep
e
rately.
is the seeding of the PRNG (Pseud
o
Random Number Generator), which has to
be performed sep
a
rately.
=head1 EXAMPLES
...
...
编辑
预览
Markdown
is supported
0%
请重试
或
添加新附件
.
添加附件
取消
You are about to add
0
people
to the discussion. Proceed with caution.
先完成此消息的编辑!
取消
想要评论请
注册
或
登录