diff options
author | 2008-09-06 12:17:47 +0000 | |
---|---|---|
committer | 2008-09-06 12:17:47 +0000 | |
commit | 4fcf65c5c59fcf6124cf9f1fd81aa546850f974c (patch) | |
tree | 3c0b4c46d91bcb87c8eef7a1e84711159b17f71b /lib/libssl/src/doc/crypto | |
parent | import of OpenSSL 0.9.8h (diff) | |
download | wireguard-openbsd-4fcf65c5c59fcf6124cf9f1fd81aa546850f974c.tar.xz wireguard-openbsd-4fcf65c5c59fcf6124cf9f1fd81aa546850f974c.zip |
resolve conflicts
Diffstat (limited to 'lib/libssl/src/doc/crypto')
21 files changed, 87 insertions, 55 deletions
diff --git a/lib/libssl/src/doc/crypto/BIO_f_base64.pod b/lib/libssl/src/doc/crypto/BIO_f_base64.pod index 929557d22f0..438af3b6b66 100644 --- a/lib/libssl/src/doc/crypto/BIO_f_base64.pod +++ b/lib/libssl/src/doc/crypto/BIO_f_base64.pod @@ -63,7 +63,7 @@ data to standard output: bio = BIO_new_fp(stdin, BIO_NOCLOSE); bio_out = BIO_new_fp(stdout, BIO_NOCLOSE); bio = BIO_push(b64, bio); - while((inlen = BIO_read(bio, inbuf, 512) > 0) + while((inlen = BIO_read(bio, inbuf, 512)) > 0) BIO_write(bio_out, inbuf, inlen); BIO_free_all(bio); diff --git a/lib/libssl/src/doc/crypto/BN_add_word.pod b/lib/libssl/src/doc/crypto/BN_add_word.pod index 94244adea4c..70667d28934 100644 --- a/lib/libssl/src/doc/crypto/BN_add_word.pod +++ b/lib/libssl/src/doc/crypto/BN_add_word.pod @@ -29,11 +29,11 @@ BN_add_word() adds B<w> to B<a> (C<a+=w>). BN_sub_word() subtracts B<w> from B<a> (C<a-=w>). -BN_mul_word() multiplies B<a> and B<w> (C<a*=b>). +BN_mul_word() multiplies B<a> and B<w> (C<a*=w>). BN_div_word() divides B<a> by B<w> (C<a/=w>) and returns the remainder. -BN_mod_word() returns the remainder of B<a> divided by B<w> (C<a%m>). +BN_mod_word() returns the remainder of B<a> divided by B<w> (C<a%w>). For BN_div_word() and BN_mod_word(), B<w> must not be 0. @@ -42,7 +42,8 @@ For BN_div_word() and BN_mod_word(), B<w> must not be 0. BN_add_word(), BN_sub_word() and BN_mul_word() return 1 for success, 0 on error. The error codes can be obtained by L<ERR_get_error(3)|ERR_get_error(3)>. -BN_mod_word() and BN_div_word() return B<a>%B<w>. +BN_mod_word() and BN_div_word() return B<a>%B<w> on success and +B<(BN_ULONG)-1> if an error occurred. =head1 SEE ALSO @@ -54,4 +55,7 @@ BN_add_word() and BN_mod_word() are available in all versions of SSLeay and OpenSSL. BN_div_word() was added in SSLeay 0.8, and BN_sub_word() and BN_mul_word() in SSLeay 0.9.0. +Before 0.9.8a the return value for BN_div_word() and BN_mod_word() +in case of an error was 0. + =cut diff --git a/lib/libssl/src/doc/crypto/BN_new.pod b/lib/libssl/src/doc/crypto/BN_new.pod index 3033789c514..ab7a105e3ad 100644 --- a/lib/libssl/src/doc/crypto/BN_new.pod +++ b/lib/libssl/src/doc/crypto/BN_new.pod @@ -20,7 +20,7 @@ BN_new, BN_init, BN_clear, BN_free, BN_clear_free - allocate and free BIGNUMs =head1 DESCRIPTION -BN_new() allocated and initializes a B<BIGNUM> structure. BN_init() +BN_new() allocates and initializes a B<BIGNUM> structure. BN_init() initializes an existing uninitialized B<BIGNUM>. BN_clear() is used to destroy sensitive data such as keys when they diff --git a/lib/libssl/src/doc/crypto/DH_set_method.pod b/lib/libssl/src/doc/crypto/DH_set_method.pod index 73261fc4675..d5cdc3be0ce 100644 --- a/lib/libssl/src/doc/crypto/DH_set_method.pod +++ b/lib/libssl/src/doc/crypto/DH_set_method.pod @@ -36,7 +36,7 @@ structures created later. B<NB>: This is true only whilst no ENGINE has been set as a default for DH, so this function is no longer recommended. DH_get_default_method() returns a pointer to the current default DH_METHOD. -However, the meaningfulness of this result is dependant on whether the ENGINE +However, the meaningfulness of this result is dependent on whether the ENGINE API is being used, so this function is no longer recommended. DH_set_method() selects B<meth> to perform all operations using the key B<dh>. diff --git a/lib/libssl/src/doc/crypto/DSA_set_method.pod b/lib/libssl/src/doc/crypto/DSA_set_method.pod index bc3cfb1f0a7..9c1434bd8d4 100644 --- a/lib/libssl/src/doc/crypto/DSA_set_method.pod +++ b/lib/libssl/src/doc/crypto/DSA_set_method.pod @@ -36,7 +36,7 @@ structures created later. B<NB>: This is true only whilst no ENGINE has been set as a default for DSA, so this function is no longer recommended. DSA_get_default_method() returns a pointer to the current default -DSA_METHOD. However, the meaningfulness of this result is dependant on +DSA_METHOD. However, the meaningfulness of this result is dependent on whether the ENGINE API is being used, so this function is no longer recommended. diff --git a/lib/libssl/src/doc/crypto/EVP_BytesToKey.pod b/lib/libssl/src/doc/crypto/EVP_BytesToKey.pod index 016381f3e99..d375c46e03d 100644 --- a/lib/libssl/src/doc/crypto/EVP_BytesToKey.pod +++ b/lib/libssl/src/doc/crypto/EVP_BytesToKey.pod @@ -60,7 +60,7 @@ EVP_BytesToKey() returns the size of the derived key in bytes. =head1 SEE ALSO L<evp(3)|evp(3)>, L<rand(3)|rand(3)>, -L<EVP_EncryptInit(3)|EVP_EncryptInit(3)>, +L<EVP_EncryptInit(3)|EVP_EncryptInit(3)> =head1 HISTORY diff --git a/lib/libssl/src/doc/crypto/EVP_DigestInit.pod b/lib/libssl/src/doc/crypto/EVP_DigestInit.pod index faa992286b1..236e2fa8d12 100644 --- a/lib/libssl/src/doc/crypto/EVP_DigestInit.pod +++ b/lib/libssl/src/doc/crypto/EVP_DigestInit.pod @@ -18,7 +18,7 @@ EVP digest routines EVP_MD_CTX *EVP_MD_CTX_create(void); int EVP_DigestInit_ex(EVP_MD_CTX *ctx, const EVP_MD *type, ENGINE *impl); - int EVP_DigestUpdate(EVP_MD_CTX *ctx, const void *d, unsigned int cnt); + int EVP_DigestUpdate(EVP_MD_CTX *ctx, const void *d, size_t cnt); int EVP_DigestFinal_ex(EVP_MD_CTX *ctx, unsigned char *md, unsigned int *s); diff --git a/lib/libssl/src/doc/crypto/EVP_SealInit.pod b/lib/libssl/src/doc/crypto/EVP_SealInit.pod index 48a0e299542..7d793e19ef7 100644 --- a/lib/libssl/src/doc/crypto/EVP_SealInit.pod +++ b/lib/libssl/src/doc/crypto/EVP_SealInit.pod @@ -8,9 +8,9 @@ EVP_SealInit, EVP_SealUpdate, EVP_SealFinal - EVP envelope encryption #include <openssl/evp.h> - int EVP_SealInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *type, - unsigned char **ek, int *ekl, unsigned char *iv, - EVP_PKEY **pubk, int npubk); + int EVP_SealInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *type, + unsigned char **ek, int *ekl, unsigned char *iv, + EVP_PKEY **pubk, int npubk); int EVP_SealUpdate(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl, unsigned char *in, int inl); int EVP_SealFinal(EVP_CIPHER_CTX *ctx, unsigned char *out, diff --git a/lib/libssl/src/doc/crypto/RAND_bytes.pod b/lib/libssl/src/doc/crypto/RAND_bytes.pod index ce6329ce54a..1a9b91e2814 100644 --- a/lib/libssl/src/doc/crypto/RAND_bytes.pod +++ b/lib/libssl/src/doc/crypto/RAND_bytes.pod @@ -25,6 +25,9 @@ unpredictable. They can be used for non-cryptographic purposes and for certain purposes in cryptographic protocols, but usually not for key generation etc. +The contents of B<buf> is mixed into the entropy pool before retrieving +the new pseudo-random bytes unless disabled at compile time (see FAQ). + =head1 RETURN VALUES RAND_bytes() returns 1 on success, 0 otherwise. The error code can be diff --git a/lib/libssl/src/doc/crypto/RAND_egd.pod b/lib/libssl/src/doc/crypto/RAND_egd.pod index 62adbe19b29..079838ea2e4 100644 --- a/lib/libssl/src/doc/crypto/RAND_egd.pod +++ b/lib/libssl/src/doc/crypto/RAND_egd.pod @@ -50,7 +50,7 @@ non-blocking mode. Alternatively, the EGD-interface compatible daemon PRNGD can be used. It is available from -http://www.aet.tu-cottbus.de/personen/jaenicke/postfix_tls/prngd.html . +http://prngd.sourceforge.net/ . PRNGD does employ an internal PRNG itself and can therefore never run out of entropy. diff --git a/lib/libssl/src/doc/crypto/RAND_set_rand_method.pod b/lib/libssl/src/doc/crypto/RAND_set_rand_method.pod index c9bb6d9f27b..e5b780fad06 100644 --- a/lib/libssl/src/doc/crypto/RAND_set_rand_method.pod +++ b/lib/libssl/src/doc/crypto/RAND_set_rand_method.pod @@ -30,7 +30,7 @@ true only whilst no ENGINE has been set as a default for RAND, so this function is no longer recommended. RAND_get_default_method() returns a pointer to the current RAND_METHOD. -However, the meaningfulness of this result is dependant on whether the ENGINE +However, the meaningfulness of this result is dependent on whether the ENGINE API is being used, so this function is no longer recommended. =head1 THE RAND_METHOD STRUCTURE diff --git a/lib/libssl/src/doc/crypto/RSA_get_ex_new_index.pod b/lib/libssl/src/doc/crypto/RSA_get_ex_new_index.pod index 46cc8f53597..7d0fd1f91de 100644 --- a/lib/libssl/src/doc/crypto/RSA_get_ex_new_index.pod +++ b/lib/libssl/src/doc/crypto/RSA_get_ex_new_index.pod @@ -17,12 +17,12 @@ RSA_get_ex_new_index, RSA_set_ex_data, RSA_get_ex_data - add application specifi void *RSA_get_ex_data(RSA *r, int idx); - typedef int new_func(void *parent, void *ptr, CRYPTO_EX_DATA *ad, - int idx, long argl, void *argp); - typedef void free_func(void *parent, void *ptr, CRYPTO_EX_DATA *ad, - int idx, long argl, void *argp); - typedef int dup_func(CRYPTO_EX_DATA *to, CRYPTO_EX_DATA *from, void *from_d, - int idx, long argl, void *argp); + typedef int CRYPTO_EX_new(void *parent, void *ptr, CRYPTO_EX_DATA *ad, + int idx, long argl, void *argp); + typedef void CRYPTO_EX_free(void *parent, void *ptr, CRYPTO_EX_DATA *ad, + int idx, long argl, void *argp); + typedef int CRYPTO_EX_dup(CRYPTO_EX_DATA *to, CRYPTO_EX_DATA *from, void *from_d, + int idx, long argl, void *argp); =head1 DESCRIPTION diff --git a/lib/libssl/src/doc/crypto/RSA_set_method.pod b/lib/libssl/src/doc/crypto/RSA_set_method.pod index 0a305f6b140..2c963d7e5bb 100644 --- a/lib/libssl/src/doc/crypto/RSA_set_method.pod +++ b/lib/libssl/src/doc/crypto/RSA_set_method.pod @@ -42,7 +42,7 @@ structures created later. B<NB>: This is true only whilst no ENGINE has been set as a default for RSA, so this function is no longer recommended. RSA_get_default_method() returns a pointer to the current default -RSA_METHOD. However, the meaningfulness of this result is dependant on +RSA_METHOD. However, the meaningfulness of this result is dependent on whether the ENGINE API is being used, so this function is no longer recommended. diff --git a/lib/libssl/src/doc/crypto/RSA_sign.pod b/lib/libssl/src/doc/crypto/RSA_sign.pod index 71688a665e1..8553be8e99b 100644 --- a/lib/libssl/src/doc/crypto/RSA_sign.pod +++ b/lib/libssl/src/doc/crypto/RSA_sign.pod @@ -8,10 +8,10 @@ RSA_sign, RSA_verify - RSA signatures #include <openssl/rsa.h> - int RSA_sign(int type, unsigned char *m, unsigned int m_len, + int RSA_sign(int type, const unsigned char *m, unsigned int m_len, unsigned char *sigret, unsigned int *siglen, RSA *rsa); - int RSA_verify(int type, unsigned char *m, unsigned int m_len, + int RSA_verify(int type, const unsigned char *m, unsigned int m_len, unsigned char *sigbuf, unsigned int siglen, RSA *rsa); =head1 DESCRIPTION diff --git a/lib/libssl/src/doc/crypto/bn.pod b/lib/libssl/src/doc/crypto/bn.pod index 210dfeac08c..cd2f8e50c6c 100644 --- a/lib/libssl/src/doc/crypto/bn.pod +++ b/lib/libssl/src/doc/crypto/bn.pod @@ -27,6 +27,9 @@ bn - multiprecision integer arithmetics int BN_num_bits(const BIGNUM *a); int BN_num_bits_word(BN_ULONG w); + void BN_set_negative(BIGNUM *a, int n); + int BN_is_negative(const BIGNUM *a); + int BN_add(BIGNUM *r, const BIGNUM *a, const BIGNUM *b); int BN_sub(BIGNUM *r, const BIGNUM *a, const BIGNUM *b); int BN_mul(BIGNUM *r, BIGNUM *a, BIGNUM *b, BN_CTX *ctx); @@ -118,6 +121,25 @@ bn - multiprecision integer arithmetics int BN_to_montgomery(BIGNUM *r, BIGNUM *a, BN_MONT_CTX *mont, BN_CTX *ctx); + BN_BLINDING *BN_BLINDING_new(const BIGNUM *A, const BIGNUM *Ai, + BIGNUM *mod); + void BN_BLINDING_free(BN_BLINDING *b); + int BN_BLINDING_update(BN_BLINDING *b,BN_CTX *ctx); + int BN_BLINDING_convert(BIGNUM *n, BN_BLINDING *b, BN_CTX *ctx); + int BN_BLINDING_invert(BIGNUM *n, BN_BLINDING *b, BN_CTX *ctx); + int BN_BLINDING_convert_ex(BIGNUM *n, BIGNUM *r, BN_BLINDING *b, + BN_CTX *ctx); + int BN_BLINDING_invert_ex(BIGNUM *n,const BIGNUM *r,BN_BLINDING *b, + BN_CTX *ctx); + unsigned long BN_BLINDING_get_thread_id(const BN_BLINDING *); + void BN_BLINDING_set_thread_id(BN_BLINDING *, unsigned long); + unsigned long BN_BLINDING_get_flags(const BN_BLINDING *); + void BN_BLINDING_set_flags(BN_BLINDING *, unsigned long); + BN_BLINDING *BN_BLINDING_create_param(BN_BLINDING *b, + const BIGNUM *e, BIGNUM *m, BN_CTX *ctx, + int (*bn_mod_exp)(BIGNUM *r, const BIGNUM *a, const BIGNUM *p, + const BIGNUM *m, BN_CTX *ctx, BN_MONT_CTX *m_ctx), + BN_MONT_CTX *m_ctx); =head1 DESCRIPTION @@ -153,6 +175,7 @@ L<BN_cmp(3)|BN_cmp(3)>, L<BN_zero(3)|BN_zero(3)>, L<BN_rand(3)|BN_rand(3)>, L<BN_generate_prime(3)|BN_generate_prime(3)>, L<BN_set_bit(3)|BN_set_bit(3)>, L<BN_bn2bin(3)|BN_bn2bin(3)>, L<BN_mod_inverse(3)|BN_mod_inverse(3)>, L<BN_mod_mul_reciprocal(3)|BN_mod_mul_reciprocal(3)>, -L<BN_mod_mul_montgomery(3)|BN_mod_mul_montgomery(3)> +L<BN_mod_mul_montgomery(3)|BN_mod_mul_montgomery(3)>, +L<BN_BLINDING_new(3)|BN_BLINDING_new(3)> =cut diff --git a/lib/libssl/src/doc/crypto/bn_internal.pod b/lib/libssl/src/doc/crypto/bn_internal.pod index 9805a7c9f29..891914678c4 100644 --- a/lib/libssl/src/doc/crypto/bn_internal.pod +++ b/lib/libssl/src/doc/crypto/bn_internal.pod @@ -72,19 +72,19 @@ applications. typedef struct bignum_st { - int top; /* index of last used d (most significant word) */ - BN_ULONG *d; /* pointer to an array of 'BITS2' bit chunks */ + int top; /* number of words used in d */ + BN_ULONG *d; /* pointer to an array containing the integer value */ int max; /* size of the d array */ int neg; /* sign */ } BIGNUM; -The big number is stored in B<d>, a malloc()ed array of B<BN_ULONG>s, -least significant first. A B<BN_ULONG> can be either 16, 32 or 64 bits -in size (B<BITS2>), depending on the 'number of bits' specified in +The integer value is stored in B<d>, a malloc()ed array of words (B<BN_ULONG>), +least significant word first. A B<BN_ULONG> can be either 16, 32 or 64 bits +in size, depending on the 'number of bits' (B<BITS2>) specified in C<openssl/bn.h>. B<max> is the size of the B<d> array that has been allocated. B<top> -is the 'last' entry being used, so for a value of 4, bn.d[0]=4 and +is the number of words being used, so for a value of 4, bn.d[0]=4 and bn.top=1. B<neg> is 1 if the number is negative. When a B<BIGNUM> is B<0>, the B<d> field can be B<NULL> and B<top> == B<0>. @@ -202,7 +202,7 @@ call bn_expand2(), which allocates a new B<d> array and copies the data. They return B<NULL> on error, B<b> otherwise. The bn_fix_top() macro reduces B<a-E<gt>top> to point to the most -significant non-zero word when B<a> has shrunk. +significant non-zero word plus one when B<a> has shrunk. =head2 Debugging diff --git a/lib/libssl/src/doc/crypto/des_modes.pod b/lib/libssl/src/doc/crypto/des_modes.pod index 0cc22150e7e..0ad01eafe28 100644 --- a/lib/libssl/src/doc/crypto/des_modes.pod +++ b/lib/libssl/src/doc/crypto/des_modes.pod @@ -1,5 +1,7 @@ =pod +=for comment openssl_manual_section:7 + =head1 NAME des_modes - the variants of DES and other crypto algorithms of OpenSSL diff --git a/lib/libssl/src/doc/crypto/md5.pod b/lib/libssl/src/doc/crypto/md5.pod index 6e6322dcdcc..d11d5c32cbf 100644 --- a/lib/libssl/src/doc/crypto/md5.pod +++ b/lib/libssl/src/doc/crypto/md5.pod @@ -12,10 +12,10 @@ MD4_Final, MD5_Init, MD5_Update, MD5_Final - MD2, MD4, and MD5 hash functions unsigned char *MD2(const unsigned char *d, unsigned long n, unsigned char *md); - void MD2_Init(MD2_CTX *c); - void MD2_Update(MD2_CTX *c, const unsigned char *data, + int MD2_Init(MD2_CTX *c); + int MD2_Update(MD2_CTX *c, const unsigned char *data, unsigned long len); - void MD2_Final(unsigned char *md, MD2_CTX *c); + int MD2_Final(unsigned char *md, MD2_CTX *c); #include <openssl/md4.h> @@ -23,10 +23,10 @@ MD4_Final, MD5_Init, MD5_Update, MD5_Final - MD2, MD4, and MD5 hash functions unsigned char *MD4(const unsigned char *d, unsigned long n, unsigned char *md); - void MD4_Init(MD4_CTX *c); - void MD4_Update(MD4_CTX *c, const void *data, + int MD4_Init(MD4_CTX *c); + int MD4_Update(MD4_CTX *c, const void *data, unsigned long len); - void MD4_Final(unsigned char *md, MD4_CTX *c); + int MD4_Final(unsigned char *md, MD4_CTX *c); #include <openssl/md5.h> @@ -34,10 +34,10 @@ MD4_Final, MD5_Init, MD5_Update, MD5_Final - MD2, MD4, and MD5 hash functions unsigned char *MD5(const unsigned char *d, unsigned long n, unsigned char *md); - void MD5_Init(MD5_CTX *c); - void MD5_Update(MD5_CTX *c, const void *data, + int MD5_Init(MD5_CTX *c); + int MD5_Update(MD5_CTX *c, const void *data, unsigned long len); - void MD5_Final(unsigned char *md, MD5_CTX *c); + int MD5_Final(unsigned char *md, MD5_CTX *c); =head1 DESCRIPTION @@ -78,8 +78,8 @@ preferred. MD2(), MD4(), and MD5() return pointers to the hash value. MD2_Init(), MD2_Update(), MD2_Final(), MD4_Init(), MD4_Update(), -MD4_Final(), MD5_Init(), MD5_Update(), and MD5_Final() do not return -values. +MD4_Final(), MD5_Init(), MD5_Update(), and MD5_Final() return 1 for +success, 0 otherwise. =head1 CONFORMING TO diff --git a/lib/libssl/src/doc/crypto/mdc2.pod b/lib/libssl/src/doc/crypto/mdc2.pod index 538f474e30d..2fab9a98717 100644 --- a/lib/libssl/src/doc/crypto/mdc2.pod +++ b/lib/libssl/src/doc/crypto/mdc2.pod @@ -11,10 +11,10 @@ MDC2, MDC2_Init, MDC2_Update, MDC2_Final - MDC2 hash function unsigned char *MDC2(const unsigned char *d, unsigned long n, unsigned char *md); - void MDC2_Init(MDC2_CTX *c); - void MDC2_Update(MDC2_CTX *c, const unsigned char *data, + int MDC2_Init(MDC2_CTX *c); + int MDC2_Update(MDC2_CTX *c, const unsigned char *data, unsigned long len); - void MDC2_Final(unsigned char *md, MDC2_CTX *c); + int MDC2_Final(unsigned char *md, MDC2_CTX *c); =head1 DESCRIPTION @@ -46,7 +46,7 @@ hash functions directly. MDC2() returns a pointer to the hash value. -MDC2_Init(), MDC2_Update() and MDC2_Final() do not return values. +MDC2_Init(), MDC2_Update() and MDC2_Final() return 1 for success, 0 otherwise. =head1 CONFORMING TO diff --git a/lib/libssl/src/doc/crypto/ripemd.pod b/lib/libssl/src/doc/crypto/ripemd.pod index 9a634ca866e..348ef7c9617 100644 --- a/lib/libssl/src/doc/crypto/ripemd.pod +++ b/lib/libssl/src/doc/crypto/ripemd.pod @@ -12,10 +12,10 @@ RIPEMD-160 hash function unsigned char *RIPEMD160(const unsigned char *d, unsigned long n, unsigned char *md); - void RIPEMD160_Init(RIPEMD160_CTX *c); - void RIPEMD160_Update(RIPEMD_CTX *c, const void *data, + int RIPEMD160_Init(RIPEMD160_CTX *c); + int RIPEMD160_Update(RIPEMD_CTX *c, const void *data, unsigned long len); - void RIPEMD160_Final(unsigned char *md, RIPEMD160_CTX *c); + int RIPEMD160_Final(unsigned char *md, RIPEMD160_CTX *c); =head1 DESCRIPTION @@ -47,8 +47,8 @@ hash functions directly. RIPEMD160() returns a pointer to the hash value. -RIPEMD160_Init(), RIPEMD160_Update() and RIPEMD160_Final() do not -return values. +RIPEMD160_Init(), RIPEMD160_Update() and RIPEMD160_Final() return 1 for +success, 0 otherwise. =head1 CONFORMING TO diff --git a/lib/libssl/src/doc/crypto/sha.pod b/lib/libssl/src/doc/crypto/sha.pod index 158457270f2..d7a56accd3a 100644 --- a/lib/libssl/src/doc/crypto/sha.pod +++ b/lib/libssl/src/doc/crypto/sha.pod @@ -11,10 +11,10 @@ SHA1, SHA1_Init, SHA1_Update, SHA1_Final - Secure Hash Algorithm unsigned char *SHA1(const unsigned char *d, unsigned long n, unsigned char *md); - void SHA1_Init(SHA_CTX *c); - void SHA1_Update(SHA_CTX *c, const void *data, + int SHA1_Init(SHA_CTX *c); + int SHA1_Update(SHA_CTX *c, const void *data, unsigned long len); - void SHA1_Final(unsigned char *md, SHA_CTX *c); + int SHA1_Final(unsigned char *md, SHA_CTX *c); =head1 DESCRIPTION @@ -48,7 +48,7 @@ used only when backward compatibility is required. SHA1() returns a pointer to the hash value. -SHA1_Init(), SHA1_Update() and SHA1_Final() do not return values. +SHA1_Init(), SHA1_Update() and SHA1_Final() return 1 for success, 0 otherwise. =head1 CONFORMING TO |