Fix some missing doc links.

Replace "=for openssl foreign manuals" with simpler syntax, it looks
like the "=for openssl ifdef" construct.
Fix some broken L<> links; add some missing foreign references and fixed
some typo's.
The WARNINGS in dhparam referred to non-existant commands so reword it.

Fixes #10109

Reviewed-by: Richard Levitte <levitte@openssl.org>
Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org>
(Merged from https://github.com/openssl/openssl/pull/10256)
This commit is contained in:
Rich Salz 2019-10-24 16:40:11 -04:00 committed by Tomas Mraz
parent 2280685883
commit fadb57e554
28 changed files with 75 additions and 76 deletions

View File

@ -952,7 +952,7 @@ generate: generate_apps generate_crypto_bn generate_crypto_objects \
.PHONY: doc-nits .PHONY: doc-nits
doc-nits: build_generated doc-nits: build_generated
(cd $(SRCDIR); $(PERL) util/find-doc-nits -n -e ) (cd $(SRCDIR); $(PERL) util/find-doc-nits -n -l -e )
# Test coverage is a good idea for the future # Test coverage is a good idea for the future
#coverage: $(PROGRAMS) $(TESTPROGRAMS) #coverage: $(PROGRAMS) $(TESTPROGRAMS)

View File

@ -89,7 +89,7 @@ See the individual functions above.
=head1 SEE ALSO =head1 SEE ALSO
L<OSSL_CMP_CTX_new(3)>, L<ossl_cmp_certreq_new(3)> L<OSSL_CMP_CTX_new(3)>, L<ossl_cmp_certReq_new(3)>
=head1 HISTORY =head1 HISTORY

View File

@ -149,6 +149,8 @@ Names and values of these options are algorithm-specific.
=item B<-key> I<password> =item B<-key> I<password>
=for openssl foreign manual ps(1)
The password used to encrypt the private key. Since on some The password used to encrypt the private key. Since on some
systems the command line arguments are visible (e.g. Unix with systems the command line arguments are visible (e.g. Unix with
the L<ps(1)> utility) this option should be used with caution. the L<ps(1)> utility) this option should be used with caution.

View File

@ -55,7 +55,7 @@ version,
x509 x509
- OpenSSL application commands - OpenSSL application commands
=for comment foreign manuals: apropos(1) =for openssl foreign manual apropos(1)
=head1 SYNOPSIS =head1 SYNOPSIS
@ -136,6 +136,8 @@ L<openssl-x509(1)>,
=head1 HISTORY =head1 HISTORY
=for openssl foreign manual apropos(1)
Initially, the manual page entry for the C<openssl I<cmd>> command used Initially, the manual page entry for the C<openssl I<cmd>> command used
to be available at I<cmd>(1). Later, the alias B<openssl-I<cmd>>(1) was to be available at I<cmd>(1). Later, the alias B<openssl-I<cmd>>(1) was
introduced, which made it easier to group the openssl commands using introduced, which made it easier to group the openssl commands using

View File

@ -81,6 +81,8 @@ Output the digest or signature in binary form.
=item B<-r> =item B<-r>
=for openssl foreign manual sha1sum(1)
Output the digest in the "coreutils" format, including newlines. Output the digest in the "coreutils" format, including newlines.
Used by programs like L<sha1sum(1)>. Used by programs like L<sha1sum(1)>.

View File

@ -108,19 +108,15 @@ be loaded by calling the get_dhNNNN() function.
=back =back
=head1 WARNINGS
This command combines the functionality of the L<openssl-dh(1)> and the
L<openssl-gendh(1)> commands in previous OpenSSL versions.
The L<openssl-dh(1)> and L<openssl-gendh(1)> commands are retained for now but
may have different purposes in future versions of OpenSSL.
=head1 NOTES =head1 NOTES
This command replaces the B<dh> and B<gendh> commands of previous
releases.
OpenSSL currently only supports the older PKCS#3 DH, not the newer X9.42 OpenSSL currently only supports the older PKCS#3 DH, not the newer X9.42
DH. DH.
This program manipulates DH parameters not keys. This command manipulates DH parameters not keys.
=head1 BUGS =head1 BUGS

View File

@ -608,7 +608,7 @@ You could also look at the 'test' directory for more examples.
=head1 BUGS =head1 BUGS
=for openssl foreign manuals: procmail(1), perl(1) =for openssl foreign manual procmail(1) perl(1)
=over 2 =over 2
@ -653,7 +653,7 @@ retained mainly for compatibility reasons.
=head1 SEE ALSO =head1 SEE ALSO
L<openssl(1)>, L<openssl(1)>,
L<openssl-tsget(1)>, L<tsget(1)>,
L<openssl-req(1)>, L<openssl-req(1)>,
L<openssl-x509(1)>, L<openssl-x509(1)>,
L<openssl-ca(1)>, L<openssl-ca(1)>,

View File

@ -183,7 +183,7 @@ example:
=head1 SEE ALSO =head1 SEE ALSO
=for openssl foreign manuals: WWW::Curl::Easy =for openssl foreign manual WWW::Curl::Easy
L<openssl(1)>, L<openssl(1)>,
L<openssl-ts(1)>, L<openssl-ts(1)>,

View File

@ -168,8 +168,7 @@ Not all parameters may be supported by all providers.
See L<OSSL_PROVIDER(3)> for more information on providers. See L<OSSL_PROVIDER(3)> for more information on providers.
See L<OSSL_PARAM(3)> for more information on parameters. See L<OSSL_PARAM(3)> for more information on parameters.
These functions must only be called after the EVP_PKEY_CTX has been initialised These functions must only be called after the EVP_PKEY_CTX has been initialised
for use in an operation (for example by L<EVP_PKEY_sign_init_ex(3)>, for use in an operation.
L<EVP_PKEY_derive_init_ex(3)> or other similar functions).
The parameters currently supported by the default provider are: The parameters currently supported by the default provider are:
@ -204,8 +203,7 @@ that can be used with EVP_PKEY_CTX_get_params() and EVP_PKEY_CTX_set_params()
respectively. respectively.
See L<OSSL_PARAM(3)> for the use of B<OSSL_PARAM> as parameter descriptor. See L<OSSL_PARAM(3)> for the use of B<OSSL_PARAM> as parameter descriptor.
These functions must only be called after the EVP_PKEY_CTX has been initialised These functions must only be called after the EVP_PKEY_CTX has been initialised
for use in an operation (for example by L<EVP_PKEY_sign_init_ex(3)>, for use in an operation.
L<EVP_PKEY_derive_init_ex(3)> or other similar functions).
The function EVP_PKEY_CTX_ctrl() sends a control operation to the context The function EVP_PKEY_CTX_ctrl() sends a control operation to the context
B<ctx>. The key type used must match B<keytype> if it is not -1. The parameter B<ctx>. The key type used must match B<keytype> if it is not -1. The parameter

View File

@ -29,7 +29,7 @@ EVP_PKEY_CTX_set_scrypt_maxmem_bytes
These functions are used to set up the necessary data to use the These functions are used to set up the necessary data to use the
scrypt KDF. scrypt KDF.
For more information on scrypt, see L<EVP_KDF_SCRYPT(7)>. For more information on scrypt, see L<EVP_KDF-SCRYPT(7)>.
EVP_PKEY_CTX_set1_scrypt_salt() sets the B<saltlen> bytes long salt EVP_PKEY_CTX_set1_scrypt_salt() sets the B<saltlen> bytes long salt
value. value.

View File

@ -33,7 +33,7 @@ written to I<keylen>.
=head1 NOTES =head1 NOTES
After the call to EVP_PKEY_derive_init() or EVP_PKEY_derive_init_ex() algorithm After the call to EVP_PKEY_derive_init(), algorithm
specific control operations can be performed to set any appropriate parameters specific control operations can be performed to set any appropriate parameters
for the operation. for the operation.
@ -42,7 +42,7 @@ context if several operations are performed using the same parameters.
=head1 RETURN VALUES =head1 RETURN VALUES
EVP_PKEY_derive_init_ex(), EVP_PKEY_derive_init() and EVP_PKEY_derive() return 1 EVP_PKEY_derive_init() and EVP_PKEY_derive() return 1
for success and 0 or a negative value for failure. for success and 0 or a negative value for failure.
In particular a return value of -2 indicates the operation is not supported by In particular a return value of -2 indicates the operation is not supported by
the public key algorithm. the public key algorithm.
@ -95,8 +95,7 @@ L<EVP_KEYEXCH_fetch(3)>
=head1 HISTORY =head1 HISTORY
These functions were added in OpenSSL 1.0.0. The EVP_PKEY_derive_init_ex() These functions were added in OpenSSL 1.0.0.
function was added in OpenSSL 3.0.
=head1 COPYRIGHT =head1 COPYRIGHT

View File

@ -105,7 +105,6 @@ L<EVP_PKEY_derive(3)>
=head1 HISTORY =head1 HISTORY
EVP_PKEY_sign_init_ex() was added in OpenSSL 3.0.
These functions were added in OpenSSL 1.0.0. These functions were added in OpenSSL 1.0.0.
=head1 COPYRIGHT =head1 COPYRIGHT

View File

@ -93,8 +93,7 @@ L<EVP_PKEY_derive(3)>
=head1 HISTORY =head1 HISTORY
EVP_PKEY_verify_init_ex() was added in OpenSSL 3.0. These functions were added in OpenSSL 1.0.0.
All other functions were added in OpenSSL 1.0.0.
=head1 COPYRIGHT =head1 COPYRIGHT

View File

@ -1,6 +1,6 @@
=pod =pod
=for openssl foreign manuals: atexit(3) =for openssl foreign manual atexit(3)
=head1 NAME =head1 NAME

View File

@ -35,7 +35,6 @@ is still owned by the B<PKCS12_SAFEBAG> in which it resides.
=head1 SEE ALSO =head1 SEE ALSO
L<PKCS12_get_friendlyname(3)>, L<PKCS12_get_friendlyname(3)>,
L<PKCS12_get_localkeyid(3)>,
L<PKCS12_add_friendlyname_asc(3)> L<PKCS12_add_friendlyname_asc(3)>
=head1 COPYRIGHT =head1 COPYRIGHT

View File

@ -58,7 +58,7 @@ if an error occurred. The error can be obtained from ERR_get_error(3).
=head1 SEE ALSO =head1 SEE ALSO
L<ERR_get_error(3)>, L<CMS_type(3)>, L<ERR_get_error(3)>,
L<SMIME_read_CMS(3)>, L<CMS_sign(3)>, L<SMIME_read_CMS(3)>, L<CMS_sign(3)>,
L<CMS_verify(3)>, L<CMS_encrypt(3)>, L<CMS_verify(3)>, L<CMS_encrypt(3)>,
L<CMS_decrypt(3)> L<CMS_decrypt(3)>

View File

@ -116,14 +116,14 @@ hashed names for all files with F<.pem> suffix in a given directory.
B<X509_LOOKUP_store> is a method that allows access to any store of B<X509_LOOKUP_store> is a method that allows access to any store of
certificates and CRLs through any loader supported by certificates and CRLs through any loader supported by
L<OSSL_STORE(3)>. L<ossl_store(7)>.
It works with the help of URIs, which can be direct references to It works with the help of URIs, which can be direct references to
certificates or CRLs, but can also be references to catalogues of such certificates or CRLs, but can also be references to catalogues of such
objects (that behave like directories). objects (that behave like directories).
This method overlaps the L</File Method> and L</Hashed Directory Method> This method overlaps the L</File Method> and L</Hashed Directory Method>
because of the 'file:' scheme loader. because of the 'file:' scheme loader.
It does no caching of its own, but can use a caching L<OSSL_STORE(3)> It does no caching of its own, but can use a caching L<ossl_store(7)>
loader, and therefore depends on the loader's capability. loader, and therefore depends on the loader's capability.
=head1 RETURN VALUES =head1 RETURN VALUES
@ -141,7 +141,7 @@ L<X509_STORE_load_locations(3)>,
L<X509_store_add_lookup(3)>, L<X509_store_add_lookup(3)>,
L<SSL_CTX_load_verify_locations(3)>, L<SSL_CTX_load_verify_locations(3)>,
L<X509_LOOKUP_meth_new(3)>, L<X509_LOOKUP_meth_new(3)>,
L<OSSL_STORE(3)> L<ossl_store(7)>
=head1 HISTORY =head1 HISTORY

View File

@ -96,7 +96,6 @@ RFC 3961
=head1 SEE ALSO =head1 SEE ALSO
L<EVP_KDF(3)>, L<EVP_KDF(3)>,
L<EVP_KDF_CTX_new_id(3)>,
L<EVP_KDF_CTX_free(3)>, L<EVP_KDF_CTX_free(3)>,
L<EVP_KDF_ctrl(3)>, L<EVP_KDF_ctrl(3)>,
L<EVP_KDF_size(3)>, L<EVP_KDF_size(3)>,

View File

@ -15,7 +15,7 @@ accredited testing laboratory.
One of the requirements for the FIPS module is self testing. An optional callback One of the requirements for the FIPS module is self testing. An optional callback
mechanism is available to return information to the user using mechanism is available to return information to the user using
L<OSSL_SELF_TEST_set_callback(7)>. L<OSSL_SELF_TEST_set_callback(3)>.
The OPENSSL FIPS module uses the following mechanism to provide information The OPENSSL FIPS module uses the following mechanism to provide information
about the self tests as they run. about the self tests as they run.
@ -240,7 +240,7 @@ A simple self test callback is shown below for illustrative purposes.
L<openssl-fipsinstall(1)>, L<openssl-fipsinstall(1)>,
L<fips_config(5)>, L<fips_config(5)>,
L<OSSL_SELF_TEST_set_callback(7)>, L<OSSL_SELF_TEST_set_callback(3)>,
L<OSSL_PARAM(3)>, L<OSSL_PARAM(3)>,
L<openssl-core.h(7)> L<openssl-core.h(7)>

View File

@ -37,7 +37,7 @@ See L<openssl-engine(1)>.
=item B<OPENSSL_MALLOC_FD>, B<OPENSSL_MALLOC_FAILURES> =item B<OPENSSL_MALLOC_FD>, B<OPENSSL_MALLOC_FAILURES>
If built with debugging, this allows memory allocation to fail. If built with debugging, this allows memory allocation to fail.
See L<OPENSSSL_malloc(3)>. See L<OPENSSL_malloc(3)>.
=item B<OPENSSL_MODULES> =item B<OPENSSL_MODULES>

View File

@ -47,9 +47,9 @@ for further information.
The asymmetric cipher (OSSL_OP_ASYM_CIPHER) operation enables providers to The asymmetric cipher (OSSL_OP_ASYM_CIPHER) operation enables providers to
implement asymmetric cipher algorithms and make them available to applications implement asymmetric cipher algorithms and make them available to applications
via the API functions L<EVP_PKEY_encrypt_init_ex(3)>, L<EVP_PKEY_encrypt(3)>, via the API functions L<EVP_PKEY_encrypt(3)>,
L<EVP_PKEY_decrypt_init_ex(3)>, L<EVP_PKEY_decrypt(3)> (as well L<EVP_PKEY_decrypt(3)> and
as other related functions). other related functions).
All "functions" mentioned here are passed as function pointers between All "functions" mentioned here are passed as function pointers between
F<libcrypto> and the provider in B<OSSL_DISPATCH> arrays via F<libcrypto> and the provider in B<OSSL_DISPATCH> arrays via
@ -108,7 +108,7 @@ structure for holding context information during an asymmetric cipher operation.
A pointer to this context will be passed back in a number of the other A pointer to this context will be passed back in a number of the other
asymmetric cipher operation function calls. asymmetric cipher operation function calls.
The parameter I<provctx> is the provider context generated during provider The parameter I<provctx> is the provider context generated during provider
initialisation (see L<provider(3)>). initialisation (see L<provider(7)>).
OP_asym_cipher_freectx() is passed a pointer to the provider side asymmetric OP_asym_cipher_freectx() is passed a pointer to the provider side asymmetric
cipher context in the I<ctx> parameter. cipher context in the I<ctx> parameter.

View File

@ -38,8 +38,8 @@ This documentation is primarily aimed at provider authors. See L<provider(7)>
for further information. for further information.
The key exchange (OSSL_OP_KEYEXCH) operation enables providers to implement key The key exchange (OSSL_OP_KEYEXCH) operation enables providers to implement key
exchange algorithms and make them available to applications via the API exchange algorithms and make them available to applications via
functions L<EVP_PKEY_derive_init_ex(3)>, and L<EVP_PKEY_derive(3)> (as well as L<EVP_PKEY_derive(3)> and
other related functions). other related functions).
All "functions" mentioned here are passed as function pointers between All "functions" mentioned here are passed as function pointers between

View File

@ -51,9 +51,9 @@ for further information.
The signature (OSSL_OP_SIGNATURE) operation enables providers to implement The signature (OSSL_OP_SIGNATURE) operation enables providers to implement
signature algorithms and make them available to applications via the API signature algorithms and make them available to applications via the API
functions L<EVP_PKEY_sign_init_ex(3)>, L<EVP_PKEY_sign(3)>, functions L<EVP_PKEY_sign(3)>,
L<EVP_PKEY_verify_init_ex(3)>, L<EVP_PKEY_verify(3)>, L<EVP_PKEY_verify(3)>,
L<EVP_PKEY_verify_recover_init_ex(3)> and L<EVP_PKEY_verify_recover(3)> (as well and L<EVP_PKEY_verify_recover(3)> (as well
as other related functions). as other related functions).
All "functions" mentioned here are passed as function pointers between All "functions" mentioned here are passed as function pointers between

View File

@ -217,8 +217,7 @@ When they are used with functions like L<EVP_DigestInit_ex(3)> or
L<EVP_CipherInit_ex(3)>, the actual implementation to be used is L<EVP_CipherInit_ex(3)>, the actual implementation to be used is
fetched implicitly using default search criteria. fetched implicitly using default search criteria.
Implicit fetching can also occur with functions such as Implicit fetching can also occur when a NULL algorithm parameter is
L<EVP_PKEY_derive_init_ex(3)> where a NULL algorithm parameter is
supplied. supplied.
In this case an algorithm implementation is implicitly fetched using In this case an algorithm implementation is implicitly fetched using
default search criteria and an algorithm name that is consistent with default search criteria and an algorithm name that is consistent with
@ -349,7 +348,6 @@ other providers:
=head1 SEE ALSO =head1 SEE ALSO
L<EVP_DigestInit_ex(3)>, L<EVP_EncryptInit_ex(3)>, L<EVP_DigestInit_ex(3)>, L<EVP_EncryptInit_ex(3)>,
L<EVP_PKEY_derive_init_ex(3)>,
L<OPENSSL_CTX(3)>, L<OPENSSL_CTX(3)>,
L<EVP_set_default_properties(3)>, L<EVP_set_default_properties(3)>,
L<EVP_MD_fetch(3)>, L<EVP_MD_fetch(3)>,

View File

@ -597,7 +597,7 @@ sub loadmissing($)
my @missing; my @missing;
open FH, $missingfile open FH, $missingfile
|| die "Can't open $missingfile"; or die "Can't open $missingfile";
while ( <FH> ) { while ( <FH> ) {
chomp; chomp;
next if /^#/; next if /^#/;
@ -631,7 +631,8 @@ sub checkmacros {
next if $f eq 'include/openssl/asn1.h'; next if $f eq 'include/openssl/asn1.h';
next if $f eq 'include/openssl/asn1t.h'; next if $f eq 'include/openssl/asn1t.h';
next if $f eq 'include/openssl/err.h'; next if $f eq 'include/openssl/err.h';
open(IN, $f) || die "Can't open $f, $!"; open(IN, $f)
or die "Can't open $f, $!";
while ( <IN> ) { while ( <IN> ) {
next unless /^#\s*define\s*(\S+)\(/; next unless /^#\s*define\s*(\S+)\(/;
my $macro = "$1(3)"; # We know they're all in section 3 my $macro = "$1(3)"; # We know they're all in section 3
@ -666,7 +667,7 @@ sub printem {
my $count = 0; my $count = 0;
my %seen; my %seen;
my @missing = loadmissing($missingfile) if ( $opt_v ); my @missing = loadmissing($missingfile) if $opt_v;
foreach my $func ( parsenum($numfile) ) { foreach my $func ( parsenum($numfile) ) {
$func .= '(3)'; # We know they're all in section 3 $func .= '(3)'; # We know they're all in section 3
@ -700,7 +701,7 @@ sub collectnames {
err($id, "$simplename not in NAME section"); err($id, "$simplename not in NAME section");
push @{$podinfo{names}}, $simplename; push @{$podinfo{names}}, $simplename;
} }
foreach my $name (@{$podinfo{names}}) { foreach my $name ( @{$podinfo{names}} ) {
next if $name eq ""; next if $name eq "";
err($id, "'$name' contains white space") err($id, "'$name' contains white space")
if $name =~ /\s/; if $name =~ /\s/;
@ -716,11 +717,10 @@ sub collectnames {
} }
} }
my @foreign_names = if ( $podinfo{contents} =~ /=for openssl foreign manual (.*)\n/ ) {
map { map { s/\s+//g; $_ } split(/,/, $_) } foreach my $f ( split / /, $1 ) {
$podinfo{contents} =~ /=for\s+openssl\s+foreign\s+manuals:\s*(.*)\n\n/; $name_map{$f} = undef; # It still exists!
foreach ( @foreign_names ) { }
$name_map{$_} = undef; # It still exists!
} }
my @links = my @links =
@ -738,8 +738,8 @@ sub collectnames {
# Look for L<> ("link") references that point to files that do not exist. # Look for L<> ("link") references that point to files that do not exist.
sub checklinks { sub checklinks {
foreach my $filename (sort keys %link_map) { foreach my $filename ( sort keys %link_map ) {
foreach my $link (@{$link_map{$filename}}) { foreach my $link ( @{$link_map{$filename}} ) {
err("${filename}:1:", "reference to non-existing $link") err("${filename}:1:", "reference to non-existing $link")
unless exists $name_map{$link}; unless exists $name_map{$link};
} }
@ -788,7 +788,7 @@ sub checkflags {
# Get the list of options in the command. # Get the list of options in the command.
open CFH, "./apps/openssl list --options $cmd|" open CFH, "./apps/openssl list --options $cmd|"
|| die "Can list options for $cmd, $!"; or die "Can list options for $cmd, $!";
while ( <CFH> ) { while ( <CFH> ) {
chop; chop;
s/ .$//; s/ .$//;
@ -798,7 +798,7 @@ sub checkflags {
# Get the list of flags from the synopsis # Get the list of flags from the synopsis
open CFH, "<$doc" open CFH, "<$doc"
|| die "Can't open $doc, $!"; or die "Can't open $doc, $!";
while ( <CFH> ) { while ( <CFH> ) {
chop; chop;
last if /DESCRIPTION/; last if /DESCRIPTION/;
@ -842,7 +842,7 @@ if ( $opt_c ) {
# Get list of commands. # Get list of commands.
open FH, "./apps/openssl list -1 -commands|" open FH, "./apps/openssl list -1 -commands|"
|| die "Can't list commands, $!"; or die "Can't list commands, $!";
while ( <FH> ) { while ( <FH> ) {
chop; chop;
push @commands, $_; push @commands, $_;
@ -863,7 +863,7 @@ if ( $opt_c ) {
# See what help is missing. # See what help is missing.
open FH, "./apps/openssl list --missing-help |" open FH, "./apps/openssl list --missing-help |"
|| die "Can't list missing help, $!"; or die "Can't list missing help, $!";
while ( <FH> ) { while ( <FH> ) {
chop; chop;
my ($cmd, $flag) = split; my ($cmd, $flag) = split;
@ -882,6 +882,9 @@ if ( $opt_l || $opt_u || $opt_v ) {
} }
if ( $opt_l ) { if ( $opt_l ) {
foreach my $func ( loadmissing("util/missingcrypto.txt") ) {
$name_map{$func} = undef;
}
checklinks(); checklinks();
} }
@ -893,7 +896,7 @@ if ( $opt_n ) {
# If not given args, check that all man1 commands are named properly. # If not given args, check that all man1 commands are named properly.
if ( scalar @ARGV == 0 ) { if ( scalar @ARGV == 0 ) {
foreach (glob('doc/man1/*.pod')) { foreach ( glob('doc/man1/*.pod') ) {
next if /CA.pl/ || /openssl\.pod/ || /tsget\.pod/; next if /CA.pl/ || /openssl\.pod/ || /tsget\.pod/;
err("$_ doesn't start with openssl-") unless /openssl-/; err("$_ doesn't start with openssl-") unless /openssl-/;
} }

View File

@ -4426,7 +4426,6 @@ EVP_MD_CTX_set_pkey_ctx 4531 3_0_0 EXIST::FUNCTION:
EVP_PKEY_meth_set_digest_custom 4532 3_0_0 EXIST::FUNCTION: EVP_PKEY_meth_set_digest_custom 4532 3_0_0 EXIST::FUNCTION:
EVP_PKEY_meth_get_digest_custom 4533 3_0_0 EXIST::FUNCTION: EVP_PKEY_meth_get_digest_custom 4533 3_0_0 EXIST::FUNCTION:
EVP_MAC_CTX_new ? 3_0_0 EXIST::FUNCTION: EVP_MAC_CTX_new ? 3_0_0 EXIST::FUNCTION:
EVP_MAC_CTX_new_id ? 3_0_0 NOEXIST::FUNCTION:
EVP_MAC_CTX_free ? 3_0_0 EXIST::FUNCTION: EVP_MAC_CTX_free ? 3_0_0 EXIST::FUNCTION:
EVP_MAC_CTX_dup ? 3_0_0 EXIST::FUNCTION: EVP_MAC_CTX_dup ? 3_0_0 EXIST::FUNCTION:
EVP_MAC_CTX_mac ? 3_0_0 EXIST::FUNCTION: EVP_MAC_CTX_mac ? 3_0_0 EXIST::FUNCTION:
@ -4658,7 +4657,6 @@ BN_priv_rand_ex ? 3_0_0 EXIST::FUNCTION:
BN_rand_range_ex ? 3_0_0 EXIST::FUNCTION: BN_rand_range_ex ? 3_0_0 EXIST::FUNCTION:
BN_priv_rand_range_ex ? 3_0_0 EXIST::FUNCTION: BN_priv_rand_range_ex ? 3_0_0 EXIST::FUNCTION:
BN_generate_prime_ex2 ? 3_0_0 EXIST::FUNCTION: BN_generate_prime_ex2 ? 3_0_0 EXIST::FUNCTION:
EVP_PKEY_derive_init_ex ? 3_0_0 NOEXIST::FUNCTION:
EVP_KEYEXCH_free ? 3_0_0 EXIST::FUNCTION: EVP_KEYEXCH_free ? 3_0_0 EXIST::FUNCTION:
EVP_KEYEXCH_up_ref ? 3_0_0 EXIST::FUNCTION: EVP_KEYEXCH_up_ref ? 3_0_0 EXIST::FUNCTION:
EVP_KEYEXCH_fetch ? 3_0_0 EXIST::FUNCTION: EVP_KEYEXCH_fetch ? 3_0_0 EXIST::FUNCTION:
@ -4669,7 +4667,6 @@ EVP_KEYMGMT_up_ref ? 3_0_0 EXIST::FUNCTION:
EVP_KEYMGMT_free ? 3_0_0 EXIST::FUNCTION: EVP_KEYMGMT_free ? 3_0_0 EXIST::FUNCTION:
EVP_KEYMGMT_provider ? 3_0_0 EXIST::FUNCTION: EVP_KEYMGMT_provider ? 3_0_0 EXIST::FUNCTION:
X509_PUBKEY_dup ? 3_0_0 EXIST::FUNCTION: X509_PUBKEY_dup ? 3_0_0 EXIST::FUNCTION:
ERR_put_func_error ? 3_0_0 NOEXIST::FUNCTION:
EVP_MD_name ? 3_0_0 EXIST::FUNCTION: EVP_MD_name ? 3_0_0 EXIST::FUNCTION:
EVP_CIPHER_name ? 3_0_0 EXIST::FUNCTION: EVP_CIPHER_name ? 3_0_0 EXIST::FUNCTION:
EVP_MD_provider ? 3_0_0 EXIST::FUNCTION: EVP_MD_provider ? 3_0_0 EXIST::FUNCTION:
@ -4710,7 +4707,6 @@ EVP_MAC_CTX_get_params ? 3_0_0 EXIST::FUNCTION:
EVP_MAC_gettable_ctx_params ? 3_0_0 EXIST::FUNCTION: EVP_MAC_gettable_ctx_params ? 3_0_0 EXIST::FUNCTION:
EVP_MAC_free ? 3_0_0 EXIST::FUNCTION: EVP_MAC_free ? 3_0_0 EXIST::FUNCTION:
EVP_MAC_up_ref ? 3_0_0 EXIST::FUNCTION: EVP_MAC_up_ref ? 3_0_0 EXIST::FUNCTION:
EVP_MAC_name ? 3_0_0 NOEXIST::FUNCTION:
EVP_MAC_get_params ? 3_0_0 EXIST::FUNCTION: EVP_MAC_get_params ? 3_0_0 EXIST::FUNCTION:
EVP_MAC_gettable_params ? 3_0_0 EXIST::FUNCTION: EVP_MAC_gettable_params ? 3_0_0 EXIST::FUNCTION:
EVP_MAC_provider ? 3_0_0 EXIST::FUNCTION: EVP_MAC_provider ? 3_0_0 EXIST::FUNCTION:
@ -4721,7 +4717,6 @@ EVP_KDF_up_ref ? 3_0_0 EXIST::FUNCTION:
EVP_KDF_free ? 3_0_0 EXIST::FUNCTION: EVP_KDF_free ? 3_0_0 EXIST::FUNCTION:
EVP_KDF_fetch ? 3_0_0 EXIST::FUNCTION: EVP_KDF_fetch ? 3_0_0 EXIST::FUNCTION:
EVP_KDF_CTX_dup ? 3_0_0 EXIST::FUNCTION: EVP_KDF_CTX_dup ? 3_0_0 EXIST::FUNCTION:
EVP_KDF_name ? 3_0_0 NOEXIST::FUNCTION:
EVP_KDF_provider ? 3_0_0 EXIST::FUNCTION: EVP_KDF_provider ? 3_0_0 EXIST::FUNCTION:
EVP_KDF_get_params ? 3_0_0 EXIST::FUNCTION: EVP_KDF_get_params ? 3_0_0 EXIST::FUNCTION:
EVP_KDF_CTX_get_params ? 3_0_0 EXIST::FUNCTION: EVP_KDF_CTX_get_params ? 3_0_0 EXIST::FUNCTION:
@ -4734,10 +4729,7 @@ EVP_SIGNATURE_free ? 3_0_0 EXIST::FUNCTION:
EVP_SIGNATURE_up_ref ? 3_0_0 EXIST::FUNCTION: EVP_SIGNATURE_up_ref ? 3_0_0 EXIST::FUNCTION:
EVP_SIGNATURE_provider ? 3_0_0 EXIST::FUNCTION: EVP_SIGNATURE_provider ? 3_0_0 EXIST::FUNCTION:
EVP_SIGNATURE_fetch ? 3_0_0 EXIST::FUNCTION: EVP_SIGNATURE_fetch ? 3_0_0 EXIST::FUNCTION:
EVP_PKEY_sign_init_ex ? 3_0_0 NOEXIST::FUNCTION:
EVP_PKEY_CTX_set_signature_md ? 3_0_0 EXIST::FUNCTION: EVP_PKEY_CTX_set_signature_md ? 3_0_0 EXIST::FUNCTION:
EVP_PKEY_verify_init_ex ? 3_0_0 NOEXIST::FUNCTION:
EVP_PKEY_verify_recover_init_ex ? 3_0_0 NOEXIST::FUNCTION:
EVP_PKEY_CTX_get_signature_md ? 3_0_0 EXIST::FUNCTION: EVP_PKEY_CTX_get_signature_md ? 3_0_0 EXIST::FUNCTION:
EVP_PKEY_CTX_get_params ? 3_0_0 EXIST::FUNCTION: EVP_PKEY_CTX_get_params ? 3_0_0 EXIST::FUNCTION:
EVP_PKEY_CTX_gettable_params ? 3_0_0 EXIST::FUNCTION: EVP_PKEY_CTX_gettable_params ? 3_0_0 EXIST::FUNCTION:

View File

@ -1,4 +1,3 @@
# Missing functions in libcrypto, as of Tue Oct 1 16:13:38 EDT 2019
ACCESS_DESCRIPTION_it(3) ACCESS_DESCRIPTION_it(3)
ADMISSIONS_it(3) ADMISSIONS_it(3)
ADMISSION_SYNTAX_it(3) ADMISSION_SYNTAX_it(3)
@ -20,6 +19,8 @@ AES_wrap_key(3)
ASIdOrRange_it(3) ASIdOrRange_it(3)
ASIdentifierChoice_it(3) ASIdentifierChoice_it(3)
ASIdentifiers_it(3) ASIdentifiers_it(3)
ASN1_item_sign(3)
ASN1_item_verify(3)
ASRange_it(3) ASRange_it(3)
AUTHORITY_INFO_ACCESS_it(3) AUTHORITY_INFO_ACCESS_it(3)
AUTHORITY_KEYID_it(3) AUTHORITY_KEYID_it(3)
@ -448,13 +449,13 @@ ERR_load_EVP_strings(3)
ERR_load_KDF_strings(3) ERR_load_KDF_strings(3)
ERR_load_OBJ_strings(3) ERR_load_OBJ_strings(3)
ERR_load_OCSP_strings(3) ERR_load_OCSP_strings(3)
ERR_load_OSSL_SERIALIZER_strings(3)
ERR_load_OSSL_STORE_strings(3) ERR_load_OSSL_STORE_strings(3)
ERR_load_PEM_strings(3) ERR_load_PEM_strings(3)
ERR_load_PKCS12_strings(3) ERR_load_PKCS12_strings(3)
ERR_load_PKCS7_strings(3) ERR_load_PKCS7_strings(3)
ERR_load_RAND_strings(3) ERR_load_RAND_strings(3)
ERR_load_RSA_strings(3) ERR_load_RSA_strings(3)
ERR_load_OSSL_SERIALIZER_strings(3)
ERR_load_TS_strings(3) ERR_load_TS_strings(3)
ERR_load_UI_strings(3) ERR_load_UI_strings(3)
ERR_load_X509V3_strings(3) ERR_load_X509V3_strings(3)
@ -479,6 +480,7 @@ EVP_CIPHER_do_all_sorted(3)
EVP_CIPHER_get_asn1_iv(3) EVP_CIPHER_get_asn1_iv(3)
EVP_CIPHER_impl_ctx_size(3) EVP_CIPHER_impl_ctx_size(3)
EVP_CIPHER_set_asn1_iv(3) EVP_CIPHER_set_asn1_iv(3)
EVP_KDF_ctrl(3)
EVP_MD_do_all(3) EVP_MD_do_all(3)
EVP_MD_do_all_sorted(3) EVP_MD_do_all_sorted(3)
EVP_PBE_CipherInit(3) EVP_PBE_CipherInit(3)
@ -730,6 +732,10 @@ OPENSSL_strnlen(3)
OPENSSL_uni2asc(3) OPENSSL_uni2asc(3)
OPENSSL_uni2utf8(3) OPENSSL_uni2utf8(3)
OPENSSL_utf82uni(3) OPENSSL_utf82uni(3)
OSSL_CMP_MSG_http_perform(3)
OSSL_CMP_exec_GENM_ses(3)
OSSL_CMP_exec_IR_ses(3)
OSSL_CMP_exec_KUR_ses(3)
OSSL_STORE_do_all_loaders(3) OSSL_STORE_do_all_loaders(3)
OSSL_STORE_vctrl(3) OSSL_STORE_vctrl(3)
OTHERNAME_cmp(3) OTHERNAME_cmp(3)
@ -941,6 +947,7 @@ SRP_Calc_u(3)
SRP_Calc_x(3) SRP_Calc_x(3)
SRP_Verify_A_mod_N(3) SRP_Verify_A_mod_N(3)
SRP_Verify_B_mod_N(3) SRP_Verify_B_mod_N(3)
SSL_CTX_set0_ctlog_store(3)
SXNETID_it(3) SXNETID_it(3)
SXNET_add_id_INTEGER(3) SXNET_add_id_INTEGER(3)
SXNET_add_id_asc(3) SXNET_add_id_asc(3)
@ -1074,6 +1081,7 @@ TS_VERIFY_CTX_cleanup(3)
TS_VERIFY_CTX_free(3) TS_VERIFY_CTX_free(3)
TS_VERIFY_CTX_init(3) TS_VERIFY_CTX_init(3)
TS_VERIFY_CTX_new(3) TS_VERIFY_CTX_new(3)
TS_VERIFY_CTX_set_certs(3)
TS_VERIFY_CTX_set_data(3) TS_VERIFY_CTX_set_data(3)
TS_VERIFY_CTX_set_flags(3) TS_VERIFY_CTX_set_flags(3)
TS_VERIFY_CTX_set_imprint(3) TS_VERIFY_CTX_set_imprint(3)
@ -1274,6 +1282,7 @@ X509_VERIFY_PARAM_lookup(3)
X509_VERIFY_PARAM_move_peername(3) X509_VERIFY_PARAM_move_peername(3)
X509_VERIFY_PARAM_new(3) X509_VERIFY_PARAM_new(3)
X509_VERIFY_PARAM_set1(3) X509_VERIFY_PARAM_set1(3)
X509_VERIFY_PARAM_set1_ipasc(3)
X509_VERIFY_PARAM_set1_name(3) X509_VERIFY_PARAM_set1_name(3)
X509_VERIFY_PARAM_table_cleanup(3) X509_VERIFY_PARAM_table_cleanup(3)
X509_add1_reject_object(3) X509_add1_reject_object(3)
@ -1329,6 +1338,7 @@ X509_print_fp(3)
X509_reject_clear(3) X509_reject_clear(3)
X509_signature_dump(3) X509_signature_dump(3)
X509_signature_print(3) X509_signature_print(3)
X509_store_add_lookup(3)
X509_subject_name_hash(3) X509_subject_name_hash(3)
X509_subject_name_hash_old(3) X509_subject_name_hash_old(3)
X509_supported_extension(3) X509_supported_extension(3)
@ -1409,6 +1419,9 @@ i2v_ASN1_BIT_STRING(3)
i2v_GENERAL_NAME(3) i2v_GENERAL_NAME(3)
i2v_GENERAL_NAMES(3) i2v_GENERAL_NAMES(3)
o2i_ECPublicKey(3) o2i_ECPublicKey(3)
openssl-core_numbers.h(7)
ossl_cmp_certReq_new(3)
provider-kdf(7)
s2i_ASN1_IA5STRING(3) s2i_ASN1_IA5STRING(3)
s2i_ASN1_INTEGER(3) s2i_ASN1_INTEGER(3)
s2i_ASN1_OCTET_STRING(3) s2i_ASN1_OCTET_STRING(3)

View File

@ -209,8 +209,6 @@ ERR_raise define
ERR_raise_data define ERR_raise_data define
EVP_DigestSignUpdate define EVP_DigestSignUpdate define
EVP_DigestVerifyUpdate define EVP_DigestVerifyUpdate define
EVP_KDF_name define
EVP_MAC_name define
EVP_MD_CTX_block_size define EVP_MD_CTX_block_size define
EVP_MD_CTX_name define EVP_MD_CTX_name define
EVP_MD_CTX_size define EVP_MD_CTX_size define