Skip to content
体验新版
项目
组织
正在加载...
登录
切换导航
打开侧边栏
OpenHarmony
Third Party Openssl
提交
d52c9734
T
Third Party Openssl
项目概览
OpenHarmony
/
Third Party Openssl
1 年多 前同步成功
通知
10
Star
18
Fork
1
代码
文件
提交
分支
Tags
贡献者
分支图
Diff
Issue
0
列表
看板
标记
里程碑
合并请求
0
Wiki
0
Wiki
分析
仓库
DevOps
项目成员
Pages
T
Third Party Openssl
项目概览
项目概览
详情
发布
仓库
仓库
文件
提交
分支
标签
贡献者
分支图
比较
Issue
0
Issue
0
列表
看板
标记
里程碑
合并请求
0
合并请求
0
Pages
分析
分析
仓库分析
DevOps
Wiki
0
Wiki
成员
成员
收起侧边栏
关闭侧边栏
动态
分支图
创建新Issue
提交
Issue看板
提交
d52c9734
编写于
2月 25, 2000
作者:
U
Ulf Möller
浏览文件
操作
浏览文件
下载
电子邮件补丁
差异文件
links
上级
dbe71133
变更
6
隐藏空白更改
内联
并排
Showing
6 changed file
with
16 addition
and
10 deletion
+16
-10
doc/crypto/blowfish.pod
doc/crypto/blowfish.pod
+3
-2
doc/crypto/md5.pod
doc/crypto/md5.pod
+2
-1
doc/crypto/mdc2.pod
doc/crypto/mdc2.pod
+4
-3
doc/crypto/rc4.pod
doc/crypto/rc4.pod
+2
-1
doc/crypto/ripemd.pod
doc/crypto/ripemd.pod
+3
-2
doc/crypto/sha.pod
doc/crypto/sha.pod
+2
-1
未找到文件。
doc/crypto/blowfish.pod
浏览文件 @
d52c9734
...
@@ -90,8 +90,9 @@ None of the functions presented here return any value.
...
@@ -90,8 +90,9 @@ None of the functions presented here return any value.
=head1 NOTE
=head1 NOTE
Applications should use the higher level functions EVP_EncryptInit(3) etc.
Applications should use the higher level functions
instead of calling the blowfish functions directly.
L<EVP_EncryptInit(3)|EVP_EncryptInit(3)> etc. instead of calling the
blowfish functions directly.
=head1 SEE ALSO
=head1 SEE ALSO
...
...
doc/crypto/md5.pod
浏览文件 @
d52c9734
...
@@ -51,7 +51,8 @@ for MD2_DIGEST_LENGTH == 16 bytes of output, and erases the B<MD2_CTX>.
...
@@ -51,7 +51,8 @@ for MD2_DIGEST_LENGTH == 16 bytes of output, and erases the B<MD2_CTX>.
MD5_Init(), MD5_Update() and MD5_Final() are analogous using an
MD5_Init(), MD5_Update() and MD5_Final() are analogous using an
B<MD5_CTX> structure.
B<MD5_CTX> structure.
Applications should use the higher level functions EVP_DigestInit(3)
Applications should use the higher level functions
L<EVP_DigestInit(3)|EVP_DigestInit(3)>
etc. instead of calling the hash functions directly.
etc. instead of calling the hash functions directly.
=head1 NOTE
=head1 NOTE
...
...
doc/crypto/mdc2.pod
浏览文件 @
d52c9734
...
@@ -38,15 +38,16 @@ be hashed (B<len> bytes at B<data>).
...
@@ -38,15 +38,16 @@ be hashed (B<len> bytes at B<data>).
MDC2_Final() places the message digest in B<md>, which must have space
MDC2_Final() places the message digest in B<md>, which must have space
for MDC2_DIGEST_LENGTH == 16 bytes of output, and erases the B<MDC2_CTX>.
for MDC2_DIGEST_LENGTH == 16 bytes of output, and erases the B<MDC2_CTX>.
Applications should use the higher level functions
L<EVP_DigestInit(3)|EVP_DigestInit(3)> etc. instead of calling the
hash functions directly.
=head1 RETURN VALUES
=head1 RETURN VALUES
MDC2() returns a pointer to the hash value.
MDC2() returns a pointer to the hash value.
MDC2_Init(), MDC2_Update() and MDC2_Final() do not return values.
MDC2_Init(), MDC2_Update() and MDC2_Final() do not return values.
Applications should use the higher level functions EVP_DigestInit(3) etc.
instead of calling the hash functions directly.
=head1 CONFORMING TO
=head1 CONFORMING TO
ISO/IEC 10118-2, with DES
ISO/IEC 10118-2, with DES
...
...
doc/crypto/rc4.pod
浏览文件 @
d52c9734
...
@@ -37,7 +37,8 @@ Since RC4 is a stream cipher (the input is XORed with a pseudo-random
...
@@ -37,7 +37,8 @@ Since RC4 is a stream cipher (the input is XORed with a pseudo-random
key stream to produce the output), decryption uses the same function
key stream to produce the output), decryption uses the same function
calls as encryption.
calls as encryption.
Applications should use the higher level functions EVP_EncryptInit(3)
Applications should use the higher level functions
L<EVP_EncryptInit(3)|EVP_EncryptInit(3)>
etc. instead of calling the RC4 functions directly.
etc. instead of calling the RC4 functions directly.
=head1 RETURN VALUES
=head1 RETURN VALUES
...
...
doc/crypto/ripemd.pod
浏览文件 @
d52c9734
...
@@ -39,8 +39,9 @@ RIPEMD160_Final() places the message digest in B<md>, which must have
...
@@ -39,8 +39,9 @@ RIPEMD160_Final() places the message digest in B<md>, which must have
space for RIPEMD160_DIGEST_LENGTH == 20 bytes of output, and erases
space for RIPEMD160_DIGEST_LENGTH == 20 bytes of output, and erases
the B<RIPEMD160_CTX>.
the B<RIPEMD160_CTX>.
Applications should use the higher level functions EVP_DigestInit(3) etc.
Applications should use the higher level functions
instead of calling the hash functions directly.
L<EVP_DigestInit(3)|EVP_DigestInit(3)> etc. instead of calling the
hash functions directly.
=head1 RETURN VALUES
=head1 RETURN VALUES
...
...
doc/crypto/sha.pod
浏览文件 @
d52c9734
...
@@ -37,7 +37,8 @@ be hashed (B<len> bytes at B<data>).
...
@@ -37,7 +37,8 @@ be hashed (B<len> bytes at B<data>).
SHA1_Final() places the message digest in B<md>, which must have space
SHA1_Final() places the message digest in B<md>, which must have space
for SHA_DIGEST_LENGTH == 20 bytes of output, and erases the B<SHA_CTX>.
for SHA_DIGEST_LENGTH == 20 bytes of output, and erases the B<SHA_CTX>.
Applications should use the higher level functions EVP_DigestInit(3)
Applications should use the higher level functions
L<EVP_DigestInit(3)|EVP_DigestInit(3)>
etc. instead of calling the hash functions directly.
etc. instead of calling the hash functions directly.
The predecessor of SHA-1, SHA, is also implemented, but it should be
The predecessor of SHA-1, SHA, is also implemented, but it should be
...
...
编辑
预览
Markdown
is supported
0%
请重试
或
添加新附件
.
添加附件
取消
You are about to add
0
people
to the discussion. Proceed with caution.
先完成此消息的编辑!
取消
想要评论请
注册
或
登录