Fix some missing doc links.

Replace "=for openssl foreign manuals" with simpler syntax, it looks
like the "=for openssl ifdef" construct.
Fix some broken L<> links; add some missing foreign references and fixed
some typo's.
The WARNINGS in dhparam referred to non-existant commands so reword it.

Fixes #10109

Reviewed-by: Richard Levitte <levitte@openssl.org>
Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org>
(Merged from https://github.com/openssl/openssl/pull/10256)
This commit is contained in:
Rich Salz 2019-10-24 16:40:11 -04:00 committed by Tomas Mraz
parent 2280685883
commit fadb57e554
28 changed files with 75 additions and 76 deletions

View File

@ -952,7 +952,7 @@ generate: generate_apps generate_crypto_bn generate_crypto_objects \
.PHONY: doc-nits
doc-nits: build_generated
(cd $(SRCDIR); $(PERL) util/find-doc-nits -n -e )
(cd $(SRCDIR); $(PERL) util/find-doc-nits -n -l -e )
# Test coverage is a good idea for the future
#coverage: $(PROGRAMS) $(TESTPROGRAMS)

View File

@ -89,7 +89,7 @@ See the individual functions above.
=head1 SEE ALSO
L<OSSL_CMP_CTX_new(3)>, L<ossl_cmp_certreq_new(3)>
L<OSSL_CMP_CTX_new(3)>, L<ossl_cmp_certReq_new(3)>
=head1 HISTORY

View File

@ -149,6 +149,8 @@ Names and values of these options are algorithm-specific.
=item B<-key> I<password>
=for openssl foreign manual ps(1)
The password used to encrypt the private key. Since on some
systems the command line arguments are visible (e.g. Unix with
the L<ps(1)> utility) this option should be used with caution.

View File

@ -55,7 +55,7 @@ version,
x509
- OpenSSL application commands
=for comment foreign manuals: apropos(1)
=for openssl foreign manual apropos(1)
=head1 SYNOPSIS
@ -136,6 +136,8 @@ L<openssl-x509(1)>,
=head1 HISTORY
=for openssl foreign manual apropos(1)
Initially, the manual page entry for the C<openssl I<cmd>> command used
to be available at I<cmd>(1). Later, the alias B<openssl-I<cmd>>(1) was
introduced, which made it easier to group the openssl commands using

View File

@ -81,6 +81,8 @@ Output the digest or signature in binary form.
=item B<-r>
=for openssl foreign manual sha1sum(1)
Output the digest in the "coreutils" format, including newlines.
Used by programs like L<sha1sum(1)>.

View File

@ -108,19 +108,15 @@ be loaded by calling the get_dhNNNN() function.
=back
=head1 WARNINGS
This command combines the functionality of the L<openssl-dh(1)> and the
L<openssl-gendh(1)> commands in previous OpenSSL versions.
The L<openssl-dh(1)> and L<openssl-gendh(1)> commands are retained for now but
may have different purposes in future versions of OpenSSL.
=head1 NOTES
This command replaces the B<dh> and B<gendh> commands of previous
releases.
OpenSSL currently only supports the older PKCS#3 DH, not the newer X9.42
DH.
This program manipulates DH parameters not keys.
This command manipulates DH parameters not keys.
=head1 BUGS

View File

@ -608,7 +608,7 @@ You could also look at the 'test' directory for more examples.
=head1 BUGS
=for openssl foreign manuals: procmail(1), perl(1)
=for openssl foreign manual procmail(1) perl(1)
=over 2
@ -653,7 +653,7 @@ retained mainly for compatibility reasons.
=head1 SEE ALSO
L<openssl(1)>,
L<openssl-tsget(1)>,
L<tsget(1)>,
L<openssl-req(1)>,
L<openssl-x509(1)>,
L<openssl-ca(1)>,

View File

@ -183,7 +183,7 @@ example:
=head1 SEE ALSO
=for openssl foreign manuals: WWW::Curl::Easy
=for openssl foreign manual WWW::Curl::Easy
L<openssl(1)>,
L<openssl-ts(1)>,

View File

@ -168,8 +168,7 @@ Not all parameters may be supported by all providers.
See L<OSSL_PROVIDER(3)> for more information on providers.
See L<OSSL_PARAM(3)> for more information on parameters.
These functions must only be called after the EVP_PKEY_CTX has been initialised
for use in an operation (for example by L<EVP_PKEY_sign_init_ex(3)>,
L<EVP_PKEY_derive_init_ex(3)> or other similar functions).
for use in an operation.
The parameters currently supported by the default provider are:
@ -204,8 +203,7 @@ that can be used with EVP_PKEY_CTX_get_params() and EVP_PKEY_CTX_set_params()
respectively.
See L<OSSL_PARAM(3)> for the use of B<OSSL_PARAM> as parameter descriptor.
These functions must only be called after the EVP_PKEY_CTX has been initialised
for use in an operation (for example by L<EVP_PKEY_sign_init_ex(3)>,
L<EVP_PKEY_derive_init_ex(3)> or other similar functions).
for use in an operation.
The function EVP_PKEY_CTX_ctrl() sends a control operation to the context
B<ctx>. The key type used must match B<keytype> if it is not -1. The parameter

View File

@ -29,7 +29,7 @@ EVP_PKEY_CTX_set_scrypt_maxmem_bytes
These functions are used to set up the necessary data to use the
scrypt KDF.
For more information on scrypt, see L<EVP_KDF_SCRYPT(7)>.
For more information on scrypt, see L<EVP_KDF-SCRYPT(7)>.
EVP_PKEY_CTX_set1_scrypt_salt() sets the B<saltlen> bytes long salt
value.

View File

@ -33,7 +33,7 @@ written to I<keylen>.
=head1 NOTES
After the call to EVP_PKEY_derive_init() or EVP_PKEY_derive_init_ex() algorithm
After the call to EVP_PKEY_derive_init(), algorithm
specific control operations can be performed to set any appropriate parameters
for the operation.
@ -42,7 +42,7 @@ context if several operations are performed using the same parameters.
=head1 RETURN VALUES
EVP_PKEY_derive_init_ex(), EVP_PKEY_derive_init() and EVP_PKEY_derive() return 1
EVP_PKEY_derive_init() and EVP_PKEY_derive() return 1
for success and 0 or a negative value for failure.
In particular a return value of -2 indicates the operation is not supported by
the public key algorithm.
@ -95,8 +95,7 @@ L<EVP_KEYEXCH_fetch(3)>
=head1 HISTORY
These functions were added in OpenSSL 1.0.0. The EVP_PKEY_derive_init_ex()
function was added in OpenSSL 3.0.
These functions were added in OpenSSL 1.0.0.
=head1 COPYRIGHT

View File

@ -105,7 +105,6 @@ L<EVP_PKEY_derive(3)>
=head1 HISTORY
EVP_PKEY_sign_init_ex() was added in OpenSSL 3.0.
These functions were added in OpenSSL 1.0.0.
=head1 COPYRIGHT

View File

@ -93,8 +93,7 @@ L<EVP_PKEY_derive(3)>
=head1 HISTORY
EVP_PKEY_verify_init_ex() was added in OpenSSL 3.0.
All other functions were added in OpenSSL 1.0.0.
These functions were added in OpenSSL 1.0.0.
=head1 COPYRIGHT

View File

@ -1,6 +1,6 @@
=pod
=for openssl foreign manuals: atexit(3)
=for openssl foreign manual atexit(3)
=head1 NAME

View File

@ -35,7 +35,6 @@ is still owned by the B<PKCS12_SAFEBAG> in which it resides.
=head1 SEE ALSO
L<PKCS12_get_friendlyname(3)>,
L<PKCS12_get_localkeyid(3)>,
L<PKCS12_add_friendlyname_asc(3)>
=head1 COPYRIGHT

View File

@ -58,7 +58,7 @@ if an error occurred. The error can be obtained from ERR_get_error(3).
=head1 SEE ALSO
L<ERR_get_error(3)>, L<CMS_type(3)>,
L<ERR_get_error(3)>,
L<SMIME_read_CMS(3)>, L<CMS_sign(3)>,
L<CMS_verify(3)>, L<CMS_encrypt(3)>,
L<CMS_decrypt(3)>

View File

@ -116,14 +116,14 @@ hashed names for all files with F<.pem> suffix in a given directory.
B<X509_LOOKUP_store> is a method that allows access to any store of
certificates and CRLs through any loader supported by
L<OSSL_STORE(3)>.
L<ossl_store(7)>.
It works with the help of URIs, which can be direct references to
certificates or CRLs, but can also be references to catalogues of such
objects (that behave like directories).
This method overlaps the L</File Method> and L</Hashed Directory Method>
because of the 'file:' scheme loader.
It does no caching of its own, but can use a caching L<OSSL_STORE(3)>
It does no caching of its own, but can use a caching L<ossl_store(7)>
loader, and therefore depends on the loader's capability.
=head1 RETURN VALUES
@ -141,7 +141,7 @@ L<X509_STORE_load_locations(3)>,
L<X509_store_add_lookup(3)>,
L<SSL_CTX_load_verify_locations(3)>,
L<X509_LOOKUP_meth_new(3)>,
L<OSSL_STORE(3)>
L<ossl_store(7)>
=head1 HISTORY

View File

@ -96,7 +96,6 @@ RFC 3961
=head1 SEE ALSO
L<EVP_KDF(3)>,
L<EVP_KDF_CTX_new_id(3)>,
L<EVP_KDF_CTX_free(3)>,
L<EVP_KDF_ctrl(3)>,
L<EVP_KDF_size(3)>,

View File

@ -15,7 +15,7 @@ accredited testing laboratory.
One of the requirements for the FIPS module is self testing. An optional callback
mechanism is available to return information to the user using
L<OSSL_SELF_TEST_set_callback(7)>.
L<OSSL_SELF_TEST_set_callback(3)>.
The OPENSSL FIPS module uses the following mechanism to provide information
about the self tests as they run.
@ -240,7 +240,7 @@ A simple self test callback is shown below for illustrative purposes.
L<openssl-fipsinstall(1)>,
L<fips_config(5)>,
L<OSSL_SELF_TEST_set_callback(7)>,
L<OSSL_SELF_TEST_set_callback(3)>,
L<OSSL_PARAM(3)>,
L<openssl-core.h(7)>

View File

@ -37,7 +37,7 @@ See L<openssl-engine(1)>.
=item B<OPENSSL_MALLOC_FD>, B<OPENSSL_MALLOC_FAILURES>
If built with debugging, this allows memory allocation to fail.
See L<OPENSSSL_malloc(3)>.
See L<OPENSSL_malloc(3)>.
=item B<OPENSSL_MODULES>

View File

@ -47,9 +47,9 @@ for further information.
The asymmetric cipher (OSSL_OP_ASYM_CIPHER) operation enables providers to
implement asymmetric cipher algorithms and make them available to applications
via the API functions L<EVP_PKEY_encrypt_init_ex(3)>, L<EVP_PKEY_encrypt(3)>,
L<EVP_PKEY_decrypt_init_ex(3)>, L<EVP_PKEY_decrypt(3)> (as well
as other related functions).
via the API functions L<EVP_PKEY_encrypt(3)>,
L<EVP_PKEY_decrypt(3)> and
other related functions).
All "functions" mentioned here are passed as function pointers between
F<libcrypto> and the provider in B<OSSL_DISPATCH> arrays via
@ -108,7 +108,7 @@ structure for holding context information during an asymmetric cipher operation.
A pointer to this context will be passed back in a number of the other
asymmetric cipher operation function calls.
The parameter I<provctx> is the provider context generated during provider
initialisation (see L<provider(3)>).
initialisation (see L<provider(7)>).
OP_asym_cipher_freectx() is passed a pointer to the provider side asymmetric
cipher context in the I<ctx> parameter.

View File

@ -38,8 +38,8 @@ This documentation is primarily aimed at provider authors. See L<provider(7)>
for further information.
The key exchange (OSSL_OP_KEYEXCH) operation enables providers to implement key
exchange algorithms and make them available to applications via the API
functions L<EVP_PKEY_derive_init_ex(3)>, and L<EVP_PKEY_derive(3)> (as well as
exchange algorithms and make them available to applications via
L<EVP_PKEY_derive(3)> and
other related functions).
All "functions" mentioned here are passed as function pointers between

View File

@ -51,9 +51,9 @@ for further information.
The signature (OSSL_OP_SIGNATURE) operation enables providers to implement
signature algorithms and make them available to applications via the API
functions L<EVP_PKEY_sign_init_ex(3)>, L<EVP_PKEY_sign(3)>,
L<EVP_PKEY_verify_init_ex(3)>, L<EVP_PKEY_verify(3)>,
L<EVP_PKEY_verify_recover_init_ex(3)> and L<EVP_PKEY_verify_recover(3)> (as well
functions L<EVP_PKEY_sign(3)>,
L<EVP_PKEY_verify(3)>,
and L<EVP_PKEY_verify_recover(3)> (as well
as other related functions).
All "functions" mentioned here are passed as function pointers between

View File

@ -217,8 +217,7 @@ When they are used with functions like L<EVP_DigestInit_ex(3)> or
L<EVP_CipherInit_ex(3)>, the actual implementation to be used is
fetched implicitly using default search criteria.
Implicit fetching can also occur with functions such as
L<EVP_PKEY_derive_init_ex(3)> where a NULL algorithm parameter is
Implicit fetching can also occur when a NULL algorithm parameter is
supplied.
In this case an algorithm implementation is implicitly fetched using
default search criteria and an algorithm name that is consistent with
@ -349,7 +348,6 @@ other providers:
=head1 SEE ALSO
L<EVP_DigestInit_ex(3)>, L<EVP_EncryptInit_ex(3)>,
L<EVP_PKEY_derive_init_ex(3)>,
L<OPENSSL_CTX(3)>,
L<EVP_set_default_properties(3)>,
L<EVP_MD_fetch(3)>,

View File

@ -597,7 +597,7 @@ sub loadmissing($)
my @missing;
open FH, $missingfile
|| die "Can't open $missingfile";
or die "Can't open $missingfile";
while ( <FH> ) {
chomp;
next if /^#/;
@ -631,7 +631,8 @@ sub checkmacros {
next if $f eq 'include/openssl/asn1.h';
next if $f eq 'include/openssl/asn1t.h';
next if $f eq 'include/openssl/err.h';
open(IN, $f) || die "Can't open $f, $!";
open(IN, $f)
or die "Can't open $f, $!";
while ( <IN> ) {
next unless /^#\s*define\s*(\S+)\(/;
my $macro = "$1(3)"; # We know they're all in section 3
@ -666,7 +667,7 @@ sub printem {
my $count = 0;
my %seen;
my @missing = loadmissing($missingfile) if ( $opt_v );
my @missing = loadmissing($missingfile) if $opt_v;
foreach my $func ( parsenum($numfile) ) {
$func .= '(3)'; # We know they're all in section 3
@ -700,7 +701,7 @@ sub collectnames {
err($id, "$simplename not in NAME section");
push @{$podinfo{names}}, $simplename;
}
foreach my $name (@{$podinfo{names}}) {
foreach my $name ( @{$podinfo{names}} ) {
next if $name eq "";
err($id, "'$name' contains white space")
if $name =~ /\s/;
@ -716,11 +717,10 @@ sub collectnames {
}
}
my @foreign_names =
map { map { s/\s+//g; $_ } split(/,/, $_) }
$podinfo{contents} =~ /=for\s+openssl\s+foreign\s+manuals:\s*(.*)\n\n/;
foreach ( @foreign_names ) {
$name_map{$_} = undef; # It still exists!
if ( $podinfo{contents} =~ /=for openssl foreign manual (.*)\n/ ) {
foreach my $f ( split / /, $1 ) {
$name_map{$f} = undef; # It still exists!
}
}
my @links =
@ -738,8 +738,8 @@ sub collectnames {
# Look for L<> ("link") references that point to files that do not exist.
sub checklinks {
foreach my $filename (sort keys %link_map) {
foreach my $link (@{$link_map{$filename}}) {
foreach my $filename ( sort keys %link_map ) {
foreach my $link ( @{$link_map{$filename}} ) {
err("${filename}:1:", "reference to non-existing $link")
unless exists $name_map{$link};
}
@ -788,7 +788,7 @@ sub checkflags {
# Get the list of options in the command.
open CFH, "./apps/openssl list --options $cmd|"
|| die "Can list options for $cmd, $!";
or die "Can list options for $cmd, $!";
while ( <CFH> ) {
chop;
s/ .$//;
@ -798,7 +798,7 @@ sub checkflags {
# Get the list of flags from the synopsis
open CFH, "<$doc"
|| die "Can't open $doc, $!";
or die "Can't open $doc, $!";
while ( <CFH> ) {
chop;
last if /DESCRIPTION/;
@ -842,7 +842,7 @@ if ( $opt_c ) {
# Get list of commands.
open FH, "./apps/openssl list -1 -commands|"
|| die "Can't list commands, $!";
or die "Can't list commands, $!";
while ( <FH> ) {
chop;
push @commands, $_;
@ -863,7 +863,7 @@ if ( $opt_c ) {
# See what help is missing.
open FH, "./apps/openssl list --missing-help |"
|| die "Can't list missing help, $!";
or die "Can't list missing help, $!";
while ( <FH> ) {
chop;
my ($cmd, $flag) = split;
@ -882,6 +882,9 @@ if ( $opt_l || $opt_u || $opt_v ) {
}
if ( $opt_l ) {
foreach my $func ( loadmissing("util/missingcrypto.txt") ) {
$name_map{$func} = undef;
}
checklinks();
}
@ -893,7 +896,7 @@ if ( $opt_n ) {
# If not given args, check that all man1 commands are named properly.
if ( scalar @ARGV == 0 ) {
foreach (glob('doc/man1/*.pod')) {
foreach ( glob('doc/man1/*.pod') ) {
next if /CA.pl/ || /openssl\.pod/ || /tsget\.pod/;
err("$_ doesn't start with openssl-") unless /openssl-/;
}

View File

@ -4426,7 +4426,6 @@ EVP_MD_CTX_set_pkey_ctx 4531 3_0_0 EXIST::FUNCTION:
EVP_PKEY_meth_set_digest_custom 4532 3_0_0 EXIST::FUNCTION:
EVP_PKEY_meth_get_digest_custom 4533 3_0_0 EXIST::FUNCTION:
EVP_MAC_CTX_new ? 3_0_0 EXIST::FUNCTION:
EVP_MAC_CTX_new_id ? 3_0_0 NOEXIST::FUNCTION:
EVP_MAC_CTX_free ? 3_0_0 EXIST::FUNCTION:
EVP_MAC_CTX_dup ? 3_0_0 EXIST::FUNCTION:
EVP_MAC_CTX_mac ? 3_0_0 EXIST::FUNCTION:
@ -4658,7 +4657,6 @@ BN_priv_rand_ex ? 3_0_0 EXIST::FUNCTION:
BN_rand_range_ex ? 3_0_0 EXIST::FUNCTION:
BN_priv_rand_range_ex ? 3_0_0 EXIST::FUNCTION:
BN_generate_prime_ex2 ? 3_0_0 EXIST::FUNCTION:
EVP_PKEY_derive_init_ex ? 3_0_0 NOEXIST::FUNCTION:
EVP_KEYEXCH_free ? 3_0_0 EXIST::FUNCTION:
EVP_KEYEXCH_up_ref ? 3_0_0 EXIST::FUNCTION:
EVP_KEYEXCH_fetch ? 3_0_0 EXIST::FUNCTION:
@ -4669,7 +4667,6 @@ EVP_KEYMGMT_up_ref ? 3_0_0 EXIST::FUNCTION:
EVP_KEYMGMT_free ? 3_0_0 EXIST::FUNCTION:
EVP_KEYMGMT_provider ? 3_0_0 EXIST::FUNCTION:
X509_PUBKEY_dup ? 3_0_0 EXIST::FUNCTION:
ERR_put_func_error ? 3_0_0 NOEXIST::FUNCTION:
EVP_MD_name ? 3_0_0 EXIST::FUNCTION:
EVP_CIPHER_name ? 3_0_0 EXIST::FUNCTION:
EVP_MD_provider ? 3_0_0 EXIST::FUNCTION:
@ -4710,7 +4707,6 @@ EVP_MAC_CTX_get_params ? 3_0_0 EXIST::FUNCTION:
EVP_MAC_gettable_ctx_params ? 3_0_0 EXIST::FUNCTION:
EVP_MAC_free ? 3_0_0 EXIST::FUNCTION:
EVP_MAC_up_ref ? 3_0_0 EXIST::FUNCTION:
EVP_MAC_name ? 3_0_0 NOEXIST::FUNCTION:
EVP_MAC_get_params ? 3_0_0 EXIST::FUNCTION:
EVP_MAC_gettable_params ? 3_0_0 EXIST::FUNCTION:
EVP_MAC_provider ? 3_0_0 EXIST::FUNCTION:
@ -4721,7 +4717,6 @@ EVP_KDF_up_ref ? 3_0_0 EXIST::FUNCTION:
EVP_KDF_free ? 3_0_0 EXIST::FUNCTION:
EVP_KDF_fetch ? 3_0_0 EXIST::FUNCTION:
EVP_KDF_CTX_dup ? 3_0_0 EXIST::FUNCTION:
EVP_KDF_name ? 3_0_0 NOEXIST::FUNCTION:
EVP_KDF_provider ? 3_0_0 EXIST::FUNCTION:
EVP_KDF_get_params ? 3_0_0 EXIST::FUNCTION:
EVP_KDF_CTX_get_params ? 3_0_0 EXIST::FUNCTION:
@ -4734,10 +4729,7 @@ EVP_SIGNATURE_free ? 3_0_0 EXIST::FUNCTION:
EVP_SIGNATURE_up_ref ? 3_0_0 EXIST::FUNCTION:
EVP_SIGNATURE_provider ? 3_0_0 EXIST::FUNCTION:
EVP_SIGNATURE_fetch ? 3_0_0 EXIST::FUNCTION:
EVP_PKEY_sign_init_ex ? 3_0_0 NOEXIST::FUNCTION:
EVP_PKEY_CTX_set_signature_md ? 3_0_0 EXIST::FUNCTION:
EVP_PKEY_verify_init_ex ? 3_0_0 NOEXIST::FUNCTION:
EVP_PKEY_verify_recover_init_ex ? 3_0_0 NOEXIST::FUNCTION:
EVP_PKEY_CTX_get_signature_md ? 3_0_0 EXIST::FUNCTION:
EVP_PKEY_CTX_get_params ? 3_0_0 EXIST::FUNCTION:
EVP_PKEY_CTX_gettable_params ? 3_0_0 EXIST::FUNCTION:

View File

@ -1,4 +1,3 @@
# Missing functions in libcrypto, as of Tue Oct 1 16:13:38 EDT 2019
ACCESS_DESCRIPTION_it(3)
ADMISSIONS_it(3)
ADMISSION_SYNTAX_it(3)
@ -20,6 +19,8 @@ AES_wrap_key(3)
ASIdOrRange_it(3)
ASIdentifierChoice_it(3)
ASIdentifiers_it(3)
ASN1_item_sign(3)
ASN1_item_verify(3)
ASRange_it(3)
AUTHORITY_INFO_ACCESS_it(3)
AUTHORITY_KEYID_it(3)
@ -448,13 +449,13 @@ ERR_load_EVP_strings(3)
ERR_load_KDF_strings(3)
ERR_load_OBJ_strings(3)
ERR_load_OCSP_strings(3)
ERR_load_OSSL_SERIALIZER_strings(3)
ERR_load_OSSL_STORE_strings(3)
ERR_load_PEM_strings(3)
ERR_load_PKCS12_strings(3)
ERR_load_PKCS7_strings(3)
ERR_load_RAND_strings(3)
ERR_load_RSA_strings(3)
ERR_load_OSSL_SERIALIZER_strings(3)
ERR_load_TS_strings(3)
ERR_load_UI_strings(3)
ERR_load_X509V3_strings(3)
@ -479,6 +480,7 @@ EVP_CIPHER_do_all_sorted(3)
EVP_CIPHER_get_asn1_iv(3)
EVP_CIPHER_impl_ctx_size(3)
EVP_CIPHER_set_asn1_iv(3)
EVP_KDF_ctrl(3)
EVP_MD_do_all(3)
EVP_MD_do_all_sorted(3)
EVP_PBE_CipherInit(3)
@ -730,6 +732,10 @@ OPENSSL_strnlen(3)
OPENSSL_uni2asc(3)
OPENSSL_uni2utf8(3)
OPENSSL_utf82uni(3)
OSSL_CMP_MSG_http_perform(3)
OSSL_CMP_exec_GENM_ses(3)
OSSL_CMP_exec_IR_ses(3)
OSSL_CMP_exec_KUR_ses(3)
OSSL_STORE_do_all_loaders(3)
OSSL_STORE_vctrl(3)
OTHERNAME_cmp(3)
@ -941,6 +947,7 @@ SRP_Calc_u(3)
SRP_Calc_x(3)
SRP_Verify_A_mod_N(3)
SRP_Verify_B_mod_N(3)
SSL_CTX_set0_ctlog_store(3)
SXNETID_it(3)
SXNET_add_id_INTEGER(3)
SXNET_add_id_asc(3)
@ -1074,6 +1081,7 @@ TS_VERIFY_CTX_cleanup(3)
TS_VERIFY_CTX_free(3)
TS_VERIFY_CTX_init(3)
TS_VERIFY_CTX_new(3)
TS_VERIFY_CTX_set_certs(3)
TS_VERIFY_CTX_set_data(3)
TS_VERIFY_CTX_set_flags(3)
TS_VERIFY_CTX_set_imprint(3)
@ -1274,6 +1282,7 @@ X509_VERIFY_PARAM_lookup(3)
X509_VERIFY_PARAM_move_peername(3)
X509_VERIFY_PARAM_new(3)
X509_VERIFY_PARAM_set1(3)
X509_VERIFY_PARAM_set1_ipasc(3)
X509_VERIFY_PARAM_set1_name(3)
X509_VERIFY_PARAM_table_cleanup(3)
X509_add1_reject_object(3)
@ -1329,6 +1338,7 @@ X509_print_fp(3)
X509_reject_clear(3)
X509_signature_dump(3)
X509_signature_print(3)
X509_store_add_lookup(3)
X509_subject_name_hash(3)
X509_subject_name_hash_old(3)
X509_supported_extension(3)
@ -1409,6 +1419,9 @@ i2v_ASN1_BIT_STRING(3)
i2v_GENERAL_NAME(3)
i2v_GENERAL_NAMES(3)
o2i_ECPublicKey(3)
openssl-core_numbers.h(7)
ossl_cmp_certReq_new(3)
provider-kdf(7)
s2i_ASN1_IA5STRING(3)
s2i_ASN1_INTEGER(3)
s2i_ASN1_OCTET_STRING(3)

View File

@ -209,8 +209,6 @@ ERR_raise define
ERR_raise_data define
EVP_DigestSignUpdate define
EVP_DigestVerifyUpdate define
EVP_KDF_name define
EVP_MAC_name define
EVP_MD_CTX_block_size define
EVP_MD_CTX_name define
EVP_MD_CTX_size define