X-Git-Url: https://code.wpia.club/?a=blobdiff_plain;f=lib%2Fopenssl%2Fdoc%2Fssl%2FSSL_CIPHER_get_name.pod;fp=lib%2Fopenssl%2Fdoc%2Fssl%2FSSL_CIPHER_get_name.pod;h=b7ee3c84f54dd7550bf8be9ad9ac2322dd958812;hb=02ed66432c92de70694700164f986190aad3cbc5;hp=2e113be6065cd3174dbfcec1ac5145fd39e928bf;hpb=89016837dcbf2775cd15dc8cbaba00dc6379f86e;p=cassiopeia.git diff --git a/lib/openssl/doc/ssl/SSL_CIPHER_get_name.pod b/lib/openssl/doc/ssl/SSL_CIPHER_get_name.pod index 2e113be..b7ee3c8 100644 --- a/lib/openssl/doc/ssl/SSL_CIPHER_get_name.pod +++ b/lib/openssl/doc/ssl/SSL_CIPHER_get_name.pod @@ -2,7 +2,11 @@ =head1 NAME -SSL_CIPHER_get_name, SSL_CIPHER_get_bits, SSL_CIPHER_get_version, SSL_CIPHER_description - get SSL_CIPHER properties +SSL_CIPHER_get_cipher_nid, SSL_CIPHER_get_digest_nid, SSL_CIPHER_get_kx_nid, +SSL_CIPHER_get_auth_nid, SSL_CIPHER_is_aead, +SSL_CIPHER_get_name, SSL_CIPHER_get_bits, +SSL_CIPHER_get_version, SSL_CIPHER_description +- get SSL_CIPHER properties =head1 SYNOPSIS @@ -12,41 +16,58 @@ SSL_CIPHER_get_name, SSL_CIPHER_get_bits, SSL_CIPHER_get_version, SSL_CIPHER_des int SSL_CIPHER_get_bits(const SSL_CIPHER *cipher, int *alg_bits); char *SSL_CIPHER_get_version(const SSL_CIPHER *cipher); char *SSL_CIPHER_description(const SSL_CIPHER *cipher, char *buf, int size); + int SSL_CIPHER_get_cipher_nid(const SSL_CIPHER *c); + int SSL_CIPHER_get_digest_nid(const SSL_CIPHER *c); + int SSL_CIPHER_get_kx_nid(const SSL_CIPHER *c); + int SSL_CIPHER_get_auth_nid(const SSL_CIPHER *c); + int SSL_CIPHER_is_aead(const SSL_CIPHER *c); =head1 DESCRIPTION SSL_CIPHER_get_name() returns a pointer to the name of B. If the -argument is the NULL pointer, a pointer to the constant value "NONE" is -returned. +B is NULL, it returns "(NONE)". -SSL_CIPHER_get_bits() returns the number of secret bits used for B. If -B is not NULL, it contains the number of bits processed by the -chosen algorithm. If B is NULL, 0 is returned. +SSL_CIPHER_get_bits() returns the number of secret bits used for B. +If B is NULL, 0 is returned. SSL_CIPHER_get_version() returns string which indicates the SSL/TLS protocol -version that first defined the cipher. -This is currently B or B. -In some cases it should possibly return "TLSv1.2" but does not; -use SSL_CIPHER_description() instead. -If B is NULL, "(NONE)" is returned. +version that first defined the cipher. It returns "(NONE)" if B is NULL. -SSL_CIPHER_description() returns a textual description of the cipher used -into the buffer B of length B provided. B must be at least -128 bytes, otherwise a pointer to the string "Buffer too small" is -returned. If B is NULL, a buffer of 128 bytes is allocated using -OPENSSL_malloc(). If the allocation fails, a pointer to the string -"OPENSSL_malloc Error" is returned. +SSL_CIPHER_get_cipher_nid() returns the cipher NID corresponding to B. +If there is no cipher (e.g. for ciphersuites with no encryption) then +B is returned. + +SSL_CIPHER_get_digest_nid() returns the digest NID corresponding to the MAC +used by B. If there is no digest (e.g. for AEAD ciphersuites) then +B is returned. + +SSL_CIPHER_get_kx_nid() returns the key exchange NID corresponding to the method +used by B. If there is no key exchange, then B is returned. Examples (not comprehensive): + + NID_kx_rsa + NID_kx_ecdhe + NID_kx_dhe + NID_kx_psk -=head1 NOTES +SSL_CIPHER_get_auth_nid() returns the authentication NID corresponding to the method +used by B. If there is no authentication, then B is returned. +Examples (not comprehensive): -The number of bits processed can be different from the secret bits. An -export cipher like e.g. EXP-RC4-MD5 has only 40 secret bits. The algorithm -does use the full 128 bits (which would be returned for B), of -which however 88bits are fixed. The search space is hence only 40 bits. + NID_auth_rsa + NID_auth_ecdsa + NID_auth_psk + +SSL_CIPHER_is_aead() returns 1 if the cipher B is AEAD (e.g. GCM or +ChaCha20/Poly1305), and 0 if it is not AEAD. + +SSL_CIPHER_description() returns a textual description of the cipher used +into the buffer B of length B provided. If B is provided, it +must be at least 128 bytes, otherwise a buffer will be allocated using +OPENSSL_malloc(). If the provided buffer is too small, or the allocation fails, +B is returned. -The string returned by SSL_CIPHER_description() in case of success consists -of cleartext information separated by one or more blanks in the following -sequence: +The string returned by SSL_CIPHER_description() consists of several fields +separated by whitespace: =over 4 @@ -56,66 +77,52 @@ Textual representation of the cipher name. =item -Protocol version: B, B, B. The TLSv1.0 ciphers are -flagged with SSLv3. No new ciphers were added by TLSv1.1. +Protocol version, such as B, when the cipher was first defined. =item Kx= -Key exchange method: B (for export ciphers as B or -B), B (for export ciphers as B or B), -B, B, B. +Key exchange method such as B, B, etc. =item Au= -Authentication method: B, B, B, B. None is the +Authentication method such as B, B, etc.. None is the representation of anonymous ciphers. =item Enc= -Encryption method with number of secret bits: B, B, -B<3DES(168)>, B, B, B, B, -B, B, B, B, B, B. +Encryption method, with number of secret bits, such as B. =item Mac= -Message digest: B, B. - -=item - -If the cipher is flagged exportable with respect to old US crypto -regulations, the word "B" is printed. +Message digest, such as B. =back -=head1 EXAMPLES - Some examples for the output of SSL_CIPHER_description(): - EDH-RSA-DES-CBC3-SHA SSLv3 Kx=DH Au=RSA Enc=3DES(168) Mac=SHA1 - EDH-DSS-DES-CBC3-SHA SSLv3 Kx=DH Au=DSS Enc=3DES(168) Mac=SHA1 - RC4-MD5 SSLv3 Kx=RSA Au=RSA Enc=RC4(128) Mac=MD5 - EXP-RC4-MD5 SSLv3 Kx=RSA(512) Au=RSA Enc=RC4(40) Mac=MD5 export + ECDHE-RSA-AES256-GCM-SHA256 TLSv1.2 Kx=ECDH Au=RSA Enc=AESGCM(256) Mac=AEAD + RSA-PSK-AES256-CBC-SHA384 TLSv1.0 Kx=RSAPSK Au=RSA Enc=AES(256) Mac=SHA384 -A comp[lete list can be retrieved by invoking the following command: +=head1 HISTORY - openssl ciphers -v ALL +SSL_CIPHER_get_version() was updated to always return the correct protocol +string in OpenSSL 1.1. -=head1 BUGS +SSL_CIPHER_description() was changed to return B on error, +rather than a fixed string, in OpenSSL 1.1 -If SSL_CIPHER_description() is called with B being NULL, the -library crashes. - -If SSL_CIPHER_description() cannot handle a built-in cipher, the according -description of the cipher property is B. This case should not -occur. +=head1 SEE ALSO -=head1 RETURN VALUES +L, L, +L, L -See DESCRIPTION +=head1 COPYRIGHT -=head1 SEE ALSO +Copyright 2000-2016 The OpenSSL Project Authors. All Rights Reserved. -L, L, -L, L +Licensed under the OpenSSL license (the "License"). You may not use +this file except in compliance with the License. You can obtain a copy +in the file LICENSE in the source distribution or at +L. =cut