{"schema":"libjg2-1",
"vpath":"/git/",
"avatar":"/git/avatar/",
"alang":"",
"gen_ut":1749728778,
"reponame":"openssl",
"desc":"OpenSSL",
"owner": { "name": "Andy Green", "email": "andy@warmcat.com", "md5": "c50933ca2aa61e0fe2c43d46bb6b59cb" },"url":"https://warmcat.com/repo/openssl",
"f":3,
"items": [
{"schema":"libjg2-1",
"cid":"366ef184a6ce05c60c915f01479b6f30",
"commit": {"type":"commit",
"time": 1484253640,
"time_ofs": 18446744073709551316,
"oid_tree": { "oid": "268d65bb2734ae8e95cdff6e85b220cb7577c32c", "alias": []},
"oid":{ "oid": "d49661ced5c2b426ce57f1016077674bfcfa7daf", "alias": []},
"msg": "Rename file so \u0022ls\u0022 works on 80 columns",
"sig_commit": { "git_time": { "time": 1484253640, "offset": -300 }, "name": "Rich Salz", "email": "rsalz@openssl.org", "md5": "3ed6b9cf7bbe83902a044f6590346d26" },
"sig_author": { "git_time": { "time": 1484248513, "offset": -300 }, "name": "Rich Salz", "email": "rsalz@openssl.org", "md5": "3ed6b9cf7bbe83902a044f6590346d26" }},
"body": "Rename file so \u0022ls\u0022 works on 80 columns\n\nReviewed-by: Richard Levitte \u003clevitte@openssl.org\u003e\n(Merged from https://github.com/openssl/openssl/pull/2221)"
,
"diff": "diff --git a/doc/man3/EVP_PKEY_CTX_set_rsa_pss_keygen_md.pod b/doc/man3/EVP_PKEY_CTX_set_rsa_pss_keygen_md.pod\nnew file mode 100644\nindex 0000000..eb7dfd8\n--- /dev/null\n+++ b/doc/man3/EVP_PKEY_CTX_set_rsa_pss_keygen_md.pod\n@@ -0,0 +1,99 @@\n+\u003dpod\n+\n+\u003dhead1 NAME\n+\n+EVP_PKEY_CTX_set_rsa_pss_keygen_md, EVP_PKEY_CTX_set_rsa_pss_keygen_mgf1_md,\n+EVP_PKEY_CTX_set_rsa_pss_keygen_saltlen - RSA PSS signature algorithm\n+\n+\u003dhead1 SYNOPSIS\n+\n+ #include \u003copenssl/rsa.h\u003e\n+\n+ int EVP_PKEY_CTX_set_rsa_pss_keygen_md(EVP_PKEY_CTX *pctx,\n+ const EVP_MD *md);\n+ int EVP_PKEY_CTX_set_rsa_pss_keygen_mgf1_md(EVP_PKEY_CTX *pctx,\n+ const EVP_MD *md);\n+ int EVP_PKEY_CTX_set_rsa_pss_keygen_saltlen(EVP_PKEY_CTX *pctx,\n+ int saltlen);\n+\n+\u003dhead1 DESCRIPTION\n+\n+The B\u003cEVP_PKEY_RSA_PSS\u003e algorithm implements the RSA PSS signature algorithm.\n+It is a restricted version of the RSA algorithm which only supports signing,\n+verification and key generation using PSS padding modes with optional\n+parameter restrictions.\n+\n+It has associated private key and public key formats.\n+\n+This algorithm shares several control operations with the B\u003cRSA\u003e algorithm\n+but with some restrictions described below.\n+\n+\u003dhead1 SIGNING AND VERIFICATION\n+\n+Siging and verification is similar to the B\u003cRSA\u003e algorithm except the\n+padding mode is always PSS. If the key in use has parameter restrictions then\n+the corresponding signature parameters are set to the restrictions:\n+for example, if the key can only be used with digest SHA256, MGF1 SHA256\n+and minimum salt length 32 then the digest, MGF1 digest and salt length\n+will be set to SHA256, SHA256 and 32 respectively.\n+\n+The macro EVP_PKEY_CTX_set_rsa_padding() is supported but an error is\n+returned if an attempt is made to set the padding mode to anything other\n+than B\u003cPSS\u003e. It is otherwise similar to the B\u003cRSA\u003e version.\n+\n+The EVP_PKEY_CTX_set_rsa_pss_saltlen() macro is used to set the salt length.\n+If the key has usage restrictionsthen an error is returned if an attempt is\n+made to set the salt length below the minimum value. It is otherwise similar\n+to the B\u003cRSA\u003e operation except special negative values are not supported.\n+\n+The EVP_PKEY_CTX_set_signature_md() and EVP_PKEY_CTX_set_rsa_mgf1_md() macros\n+are used to set the digest and MGF1 algorithms respectively. If the key has\n+usage restrictions then an error is returned if an attempt is made to set the\n+digest to anything other than the restricted value. Otherwise these are\n+similar to the B\u003cRSA\u003e versions.\n+\n+\u003dhead1 KEY GENERATION\n+\n+As with RSA key generation the EVP_PKEY_CTX_set_rsa_rsa_keygen_bits()\n+and EVP_PKEY_CTX_set_rsa_keygen_pubexp() macros are supported for RSA PSS:\n+they have exactly the same meaning as for the RSA algorithm.\n+\n+Optional parameter restrictions can be specified when generating a PSS key. By\n+default no parameter restrictions are placed on the generated key. If any\n+restrictions are set (using the macros described below) then B\u003call\u003e parameters\n+are restricted. For example, setting a minimum salt length also restricts the\n+digest and MGF1 algorithms. If any restrictions are in place then they are\n+reflected in the corresponding parameters of the public key when (for example)\n+a certificate request is signed.\n+\n+EVP_PKEY_CTX_set_rsa_pss_keygen_md() restricts the digest algorithm the\n+generated key can use to B\u003cmd\u003e.\n+\n+EVP_PKEY_CTX_set_rsa_pss_keygen_mgf1_md() restricts the MGF1 algorithm the\n+generated key can use to B\u003cmd\u003e.\n+\n+EVP_PKEY_CTX_set_rsa_pss_keygen_saltlen() restricts the minimum salt length\n+to B\u003csaltlen\u003e.\n+\n+\u003dhead1 RETURN VALUES\n+\n+All these functions return 1 for success and 0 or a negative value for failure.\n+In particular a return value of -2 indicates the operation is not supported by\n+the public key algorithm.\n+\n+\u003dhead1 SEE ALSO\n+\n+L\u003cEVP_PKEY_CTX_new(3)\u003e,\n+L\u003cEVP_PKEY_CTX_ctrl_str(3)\u003e,\n+L\u003cEVP_PKEY_derive(3)\u003e\n+\n+\u003dhead1 COPYRIGHT\n+\n+Copyright 2017 The OpenSSL Project Authors. All Rights Reserved.\n+\n+Licensed under the OpenSSL license (the \u0022License\u0022). You may not use\n+this file except in compliance with the License. You can obtain a copy\n+in the file LICENSE in the source distribution or at\n+L\u003chttps://www.openssl.org/source/license.html\u003e.\n+\n+\u003dcut\ndiff --git a/doc/man3/EVP_PKEY_CTX_set_rsa_pss_keygen_mgf1_md.pod b/doc/man3/EVP_PKEY_CTX_set_rsa_pss_keygen_mgf1_md.pod\ndeleted file mode 100644\nindex eb7dfd8..0000000\n--- a/doc/man3/EVP_PKEY_CTX_set_rsa_pss_keygen_mgf1_md.pod\n+++ /dev/null\n@@ -1,99 +0,0 @@\n-\u003dpod\n-\n-\u003dhead1 NAME\n-\n-EVP_PKEY_CTX_set_rsa_pss_keygen_md, EVP_PKEY_CTX_set_rsa_pss_keygen_mgf1_md,\n-EVP_PKEY_CTX_set_rsa_pss_keygen_saltlen - RSA PSS signature algorithm\n-\n-\u003dhead1 SYNOPSIS\n-\n- #include \u003copenssl/rsa.h\u003e\n-\n- int EVP_PKEY_CTX_set_rsa_pss_keygen_md(EVP_PKEY_CTX *pctx,\n- const EVP_MD *md);\n- int EVP_PKEY_CTX_set_rsa_pss_keygen_mgf1_md(EVP_PKEY_CTX *pctx,\n- const EVP_MD *md);\n- int EVP_PKEY_CTX_set_rsa_pss_keygen_saltlen(EVP_PKEY_CTX *pctx,\n- int saltlen);\n-\n-\u003dhead1 DESCRIPTION\n-\n-The B\u003cEVP_PKEY_RSA_PSS\u003e algorithm implements the RSA PSS signature algorithm.\n-It is a restricted version of the RSA algorithm which only supports signing,\n-verification and key generation using PSS padding modes with optional\n-parameter restrictions.\n-\n-It has associated private key and public key formats.\n-\n-This algorithm shares several control operations with the B\u003cRSA\u003e algorithm\n-but with some restrictions described below.\n-\n-\u003dhead1 SIGNING AND VERIFICATION\n-\n-Siging and verification is similar to the B\u003cRSA\u003e algorithm except the\n-padding mode is always PSS. If the key in use has parameter restrictions then\n-the corresponding signature parameters are set to the restrictions:\n-for example, if the key can only be used with digest SHA256, MGF1 SHA256\n-and minimum salt length 32 then the digest, MGF1 digest and salt length\n-will be set to SHA256, SHA256 and 32 respectively.\n-\n-The macro EVP_PKEY_CTX_set_rsa_padding() is supported but an error is\n-returned if an attempt is made to set the padding mode to anything other\n-than B\u003cPSS\u003e. It is otherwise similar to the B\u003cRSA\u003e version.\n-\n-The EVP_PKEY_CTX_set_rsa_pss_saltlen() macro is used to set the salt length.\n-If the key has usage restrictionsthen an error is returned if an attempt is\n-made to set the salt length below the minimum value. It is otherwise similar\n-to the B\u003cRSA\u003e operation except special negative values are not supported.\n-\n-The EVP_PKEY_CTX_set_signature_md() and EVP_PKEY_CTX_set_rsa_mgf1_md() macros\n-are used to set the digest and MGF1 algorithms respectively. If the key has\n-usage restrictions then an error is returned if an attempt is made to set the\n-digest to anything other than the restricted value. Otherwise these are\n-similar to the B\u003cRSA\u003e versions.\n-\n-\u003dhead1 KEY GENERATION\n-\n-As with RSA key generation the EVP_PKEY_CTX_set_rsa_rsa_keygen_bits()\n-and EVP_PKEY_CTX_set_rsa_keygen_pubexp() macros are supported for RSA PSS:\n-they have exactly the same meaning as for the RSA algorithm.\n-\n-Optional parameter restrictions can be specified when generating a PSS key. By\n-default no parameter restrictions are placed on the generated key. If any\n-restrictions are set (using the macros described below) then B\u003call\u003e parameters\n-are restricted. For example, setting a minimum salt length also restricts the\n-digest and MGF1 algorithms. If any restrictions are in place then they are\n-reflected in the corresponding parameters of the public key when (for example)\n-a certificate request is signed.\n-\n-EVP_PKEY_CTX_set_rsa_pss_keygen_md() restricts the digest algorithm the\n-generated key can use to B\u003cmd\u003e.\n-\n-EVP_PKEY_CTX_set_rsa_pss_keygen_mgf1_md() restricts the MGF1 algorithm the\n-generated key can use to B\u003cmd\u003e.\n-\n-EVP_PKEY_CTX_set_rsa_pss_keygen_saltlen() restricts the minimum salt length\n-to B\u003csaltlen\u003e.\n-\n-\u003dhead1 RETURN VALUES\n-\n-All these functions return 1 for success and 0 or a negative value for failure.\n-In particular a return value of -2 indicates the operation is not supported by\n-the public key algorithm.\n-\n-\u003dhead1 SEE ALSO\n-\n-L\u003cEVP_PKEY_CTX_new(3)\u003e,\n-L\u003cEVP_PKEY_CTX_ctrl_str(3)\u003e,\n-L\u003cEVP_PKEY_derive(3)\u003e\n-\n-\u003dhead1 COPYRIGHT\n-\n-Copyright 2017 The OpenSSL Project Authors. All Rights Reserved.\n-\n-Licensed under the OpenSSL license (the \u0022License\u0022). You may not use\n-this file except in compliance with the License. You can obtain a copy\n-in the file LICENSE in the source distribution or at\n-L\u003chttps://www.openssl.org/source/license.html\u003e.\n-\n-\u003dcut\n","s":{"c":1749728778,"u": 24043}}
],"g": 26227,"chitpc": 0,"ehitpc": 0,"indexed":0
,
"ab": 0, "si": 0, "db":0, "di":0, "sat":0, "lfc": "0000"}