mirror of https://github.com/openssl/openssl.git
docs: Be case specific with links to man headers
Signed-off-by: Norbert Pocs <norbertp@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Paul Dale <ppzgs1@gmail.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/28356)
This commit is contained in:
parent
27bc102914
commit
56ce30abb7
|
@ -850,7 +850,7 @@ See also EVP_CIPHER_CTX_get_key_length() and EVP_CIPHER_CTX_set_key_length().
|
||||||
=item "tag" (B<OSSL_CIPHER_PARAM_AEAD_TAG>) <octet string>
|
=item "tag" (B<OSSL_CIPHER_PARAM_AEAD_TAG>) <octet string>
|
||||||
|
|
||||||
Gets or sets the AEAD tag for the associated cipher context I<ctx>.
|
Gets or sets the AEAD tag for the associated cipher context I<ctx>.
|
||||||
See L<EVP_EncryptInit(3)/AEAD Interface>.
|
See L<EVP_EncryptInit(3)/AEAD INTERFACE>.
|
||||||
|
|
||||||
=item "pipeline-tag" (B<OSSL_CIPHER_PARAM_PIPELINE_AEAD_TAG>) <octet ptr>
|
=item "pipeline-tag" (B<OSSL_CIPHER_PARAM_PIPELINE_AEAD_TAG>) <octet ptr>
|
||||||
|
|
||||||
|
|
|
@ -127,7 +127,7 @@ EVP_aes_256_ocb()
|
||||||
|
|
||||||
AES for 128, 192 and 256 bit keys in CBC-MAC Mode (CCM), Galois Counter Mode
|
AES for 128, 192 and 256 bit keys in CBC-MAC Mode (CCM), Galois Counter Mode
|
||||||
(GCM) and OCB Mode respectively. These ciphers require additional control
|
(GCM) and OCB Mode respectively. These ciphers require additional control
|
||||||
operations to function correctly, see the L<EVP_EncryptInit(3)/AEAD Interface>
|
operations to function correctly, see the L<EVP_EncryptInit(3)/AEAD INTERFACE>
|
||||||
section for details.
|
section for details.
|
||||||
|
|
||||||
=item EVP_aes_128_wrap(),
|
=item EVP_aes_128_wrap(),
|
||||||
|
|
|
@ -88,7 +88,7 @@ EVP_aria_256_gcm(),
|
||||||
|
|
||||||
ARIA for 128, 192 and 256 bit keys in CBC-MAC Mode (CCM) and Galois Counter
|
ARIA for 128, 192 and 256 bit keys in CBC-MAC Mode (CCM) and Galois Counter
|
||||||
Mode (GCM). These ciphers require additional control operations to function
|
Mode (GCM). These ciphers require additional control operations to function
|
||||||
correctly, see the L<EVP_EncryptInit(3)/AEAD Interface> section for details.
|
correctly, see the L<EVP_EncryptInit(3)/AEAD INTERFACE> section for details.
|
||||||
|
|
||||||
=back
|
=back
|
||||||
|
|
||||||
|
|
|
@ -36,7 +36,7 @@ With an initial counter of 42 (2a in hex) would be expressed as:
|
||||||
Authenticated encryption with ChaCha20-Poly1305. Like EVP_chacha20(), the key
|
Authenticated encryption with ChaCha20-Poly1305. Like EVP_chacha20(), the key
|
||||||
is 256 bits and the IV is 96 bits. This supports additional authenticated data
|
is 256 bits and the IV is 96 bits. This supports additional authenticated data
|
||||||
(AAD) and produces a 128-bit authentication tag. See the
|
(AAD) and produces a 128-bit authentication tag. See the
|
||||||
L<EVP_EncryptInit(3)/AEAD Interface> section for more information.
|
L<EVP_EncryptInit(3)/AEAD INTERFACE> section for more information.
|
||||||
|
|
||||||
=back
|
=back
|
||||||
|
|
||||||
|
|
Loading…
Reference in New Issue