life_cycle-cipher.7ossl 14 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283
  1. .\" Automatically generated by Pod::Man 4.14 (Pod::Simple 3.42)
  2. .\"
  3. .\" Standard preamble:
  4. .\" ========================================================================
  5. .de Sp \" Vertical space (when we can't use .PP)
  6. .if t .sp .5v
  7. .if n .sp
  8. ..
  9. .de Vb \" Begin verbatim text
  10. .ft CW
  11. .nf
  12. .ne \\$1
  13. ..
  14. .de Ve \" End verbatim text
  15. .ft R
  16. .fi
  17. ..
  18. .\" Set up some character translations and predefined strings. \*(-- will
  19. .\" give an unbreakable dash, \*(PI will give pi, \*(L" will give a left
  20. .\" double quote, and \*(R" will give a right double quote. \*(C+ will
  21. .\" give a nicer C++. Capital omega is used to do unbreakable dashes and
  22. .\" therefore won't be available. \*(C` and \*(C' expand to `' in nroff,
  23. .\" nothing in troff, for use with C<>.
  24. .tr \(*W-
  25. .ds C+ C\v'-.1v'\h'-1p'\s-2+\h'-1p'+\s0\v'.1v'\h'-1p'
  26. .ie n \{\
  27. . ds -- \(*W-
  28. . ds PI pi
  29. . if (\n(.H=4u)&(1m=24u) .ds -- \(*W\h'-12u'\(*W\h'-12u'-\" diablo 10 pitch
  30. . if (\n(.H=4u)&(1m=20u) .ds -- \(*W\h'-12u'\(*W\h'-8u'-\" diablo 12 pitch
  31. . ds L" ""
  32. . ds R" ""
  33. . ds C` ""
  34. . ds C' ""
  35. 'br\}
  36. .el\{\
  37. . ds -- \|\(em\|
  38. . ds PI \(*p
  39. . ds L" ``
  40. . ds R" ''
  41. . ds C`
  42. . ds C'
  43. 'br\}
  44. .\"
  45. .\" Escape single quotes in literal strings from groff's Unicode transform.
  46. .ie \n(.g .ds Aq \(aq
  47. .el .ds Aq '
  48. .\"
  49. .\" If the F register is >0, we'll generate index entries on stderr for
  50. .\" titles (.TH), headers (.SH), subsections (.SS), items (.Ip), and index
  51. .\" entries marked with X<> in POD. Of course, you'll have to process the
  52. .\" output yourself in some meaningful fashion.
  53. .\"
  54. .\" Avoid warning from groff about undefined register 'F'.
  55. .de IX
  56. ..
  57. .nr rF 0
  58. .if \n(.g .if rF .nr rF 1
  59. .if (\n(rF:(\n(.g==0)) \{\
  60. . if \nF \{\
  61. . de IX
  62. . tm Index:\\$1\t\\n%\t"\\$2"
  63. ..
  64. . if !\nF==2 \{\
  65. . nr % 0
  66. . nr F 2
  67. . \}
  68. . \}
  69. .\}
  70. .rr rF
  71. .\"
  72. .\" Accent mark definitions (@(#)ms.acc 1.5 88/02/08 SMI; from UCB 4.2).
  73. .\" Fear. Run. Save yourself. No user-serviceable parts.
  74. . \" fudge factors for nroff and troff
  75. .if n \{\
  76. . ds #H 0
  77. . ds #V .8m
  78. . ds #F .3m
  79. . ds #[ \f1
  80. . ds #] \fP
  81. .\}
  82. .if t \{\
  83. . ds #H ((1u-(\\\\n(.fu%2u))*.13m)
  84. . ds #V .6m
  85. . ds #F 0
  86. . ds #[ \&
  87. . ds #] \&
  88. .\}
  89. . \" simple accents for nroff and troff
  90. .if n \{\
  91. . ds ' \&
  92. . ds ` \&
  93. . ds ^ \&
  94. . ds , \&
  95. . ds ~ ~
  96. . ds /
  97. .\}
  98. .if t \{\
  99. . ds ' \\k:\h'-(\\n(.wu*8/10-\*(#H)'\'\h"|\\n:u"
  100. . ds ` \\k:\h'-(\\n(.wu*8/10-\*(#H)'\`\h'|\\n:u'
  101. . ds ^ \\k:\h'-(\\n(.wu*10/11-\*(#H)'^\h'|\\n:u'
  102. . ds , \\k:\h'-(\\n(.wu*8/10)',\h'|\\n:u'
  103. . ds ~ \\k:\h'-(\\n(.wu-\*(#H-.1m)'~\h'|\\n:u'
  104. . ds / \\k:\h'-(\\n(.wu*8/10-\*(#H)'\z\(sl\h'|\\n:u'
  105. .\}
  106. . \" troff and (daisy-wheel) nroff accents
  107. .ds : \\k:\h'-(\\n(.wu*8/10-\*(#H+.1m+\*(#F)'\v'-\*(#V'\z.\h'.2m+\*(#F'.\h'|\\n:u'\v'\*(#V'
  108. .ds 8 \h'\*(#H'\(*b\h'-\*(#H'
  109. .ds o \\k:\h'-(\\n(.wu+\w'\(de'u-\*(#H)/2u'\v'-.3n'\*(#[\z\(de\v'.3n'\h'|\\n:u'\*(#]
  110. .ds d- \h'\*(#H'\(pd\h'-\w'~'u'\v'-.25m'\f2\(hy\fP\v'.25m'\h'-\*(#H'
  111. .ds D- D\\k:\h'-\w'D'u'\v'-.11m'\z\(hy\v'.11m'\h'|\\n:u'
  112. .ds th \*(#[\v'.3m'\s+1I\s-1\v'-.3m'\h'-(\w'I'u*2/3)'\s-1o\s+1\*(#]
  113. .ds Th \*(#[\s+2I\s-2\h'-\w'I'u*3/5'\v'-.3m'o\v'.3m'\*(#]
  114. .ds ae a\h'-(\w'a'u*4/10)'e
  115. .ds Ae A\h'-(\w'A'u*4/10)'E
  116. . \" corrections for vroff
  117. .if v .ds ~ \\k:\h'-(\\n(.wu*9/10-\*(#H)'\s-2\u~\d\s+2\h'|\\n:u'
  118. .if v .ds ^ \\k:\h'-(\\n(.wu*10/11-\*(#H)'\v'-.4m'^\v'.4m'\h'|\\n:u'
  119. . \" for low resolution devices (crt and lpr)
  120. .if \n(.H>23 .if \n(.V>19 \
  121. \{\
  122. . ds : e
  123. . ds 8 ss
  124. . ds o a
  125. . ds d- d\h'-1'\(ga
  126. . ds D- D\h'-1'\(hy
  127. . ds th \o'bp'
  128. . ds Th \o'LP'
  129. . ds ae ae
  130. . ds Ae AE
  131. .\}
  132. .rm #[ #] #H #V #F C
  133. .\" ========================================================================
  134. .\"
  135. .IX Title "LIFE_CYCLE-CIPHER 7ossl"
  136. .TH LIFE_CYCLE-CIPHER 7ossl "2024-09-03" "3.3.2" "OpenSSL"
  137. .\" For nroff, turn off justification. Always turn off hyphenation; it makes
  138. .\" way too many mistakes in technical documents.
  139. .if n .ad l
  140. .nh
  141. .SH "NAME"
  142. life_cycle\-cipher \- The cipher algorithm life\-cycle
  143. .SH "DESCRIPTION"
  144. .IX Header "DESCRIPTION"
  145. All symmetric ciphers (CIPHERs) go through a number of stages in their
  146. life-cycle:
  147. .IP "start" 4
  148. .IX Item "start"
  149. This state represents the \s-1CIPHER\s0 before it has been allocated. It is the
  150. starting state for any life-cycle transitions.
  151. .IP "newed" 4
  152. .IX Item "newed"
  153. This state represents the \s-1CIPHER\s0 after it has been allocated.
  154. .IP "initialised" 4
  155. .IX Item "initialised"
  156. These states represent the \s-1CIPHER\s0 when it is set up and capable of processing
  157. input. There are three possible initialised states:
  158. .RS 4
  159. .IP "initialised using EVP_CipherInit" 4
  160. .IX Item "initialised using EVP_CipherInit"
  161. .PD 0
  162. .IP "initialised for decryption using EVP_DecryptInit" 4
  163. .IX Item "initialised for decryption using EVP_DecryptInit"
  164. .IP "initialised for encryption using EVP_EncryptInit" 4
  165. .IX Item "initialised for encryption using EVP_EncryptInit"
  166. .RE
  167. .RS 4
  168. .RE
  169. .IP "updated" 4
  170. .IX Item "updated"
  171. .PD
  172. These states represent the \s-1CIPHER\s0 when it is set up and capable of processing
  173. additional input or generating output. The three possible states directly
  174. correspond to those for initialised above. The three different streams should
  175. not be mixed.
  176. .IP "finaled" 4
  177. .IX Item "finaled"
  178. This state represents the \s-1CIPHER\s0 when it has generated output.
  179. .IP "freed" 4
  180. .IX Item "freed"
  181. This state is entered when the \s-1CIPHER\s0 is freed. It is the terminal state
  182. for all life-cycle transitions.
  183. .SS "State Transition Diagram"
  184. .IX Subsection "State Transition Diagram"
  185. The usual life-cycle of a \s-1CIPHER\s0 is illustrated:
  186. +---------------------------+
  187. | |
  188. | start |
  189. | |
  190. +---------------------------+ + - - - - - - - - - - - - - +
  191. | ' any of the initialised '
  192. | EVP_CIPHER_CTX_new ' updated or finaled states '
  193. v ' '
  194. +---------------------------+ + - - - - - - - - - - - - - +
  195. | | |
  196. | newed | | EVP_CIPHER_CTX_reset
  197. | | <----+
  198. +---------------------------+
  199. | | |
  200. +---------+ | +---------+
  201. EVP_DecryptInit | | EVP_CipherInit | EVP_EncryptInit
  202. v v v
  203. +---------------------------+ +---------------------------+ +---------------------------+
  204. | | | | | |
  205. | initialised | | initialised | | initialised |
  206. | for decryption | | | | for encryption |
  207. +---------------------------+ +---------------------------+ +---------------------------+
  208. | | |
  209. | EVP_DecryptUpdate | EVP_CipherUpdate EVP_EncryptUpdate |
  210. | v |
  211. | +---------------------------+ |
  212. | | |--------------------+ |
  213. | | updated | EVP_CipherUpdate | |
  214. | | | <------------------+ |
  215. v +---------------------------+ v
  216. +---------------------------+ | +---------------------------+
  217. | |---------------------+ | | |
  218. | updated | EVP_DecryptUpdate | | | updated |------+
  219. | for decryption | <-------------------+ | | for encryption | |
  220. +---------------------------+ | +---------------------------+ |
  221. | EVP_CipherFinal | | ^ |
  222. +-------+ | +--------+ | |
  223. EVP_DecryptFinal | | | EVP_EncryptFinal +-------------------+
  224. v v v EVP_EncryptUpdate
  225. +---------------------------+
  226. | |-----------------------------+
  227. | finaled | |
  228. | | <---------------------------+
  229. +---------------------------+ EVP_CIPHER_CTX_get_params
  230. | (AEAD encryption)
  231. | EVP_CIPHER_CTX_free
  232. v
  233. +---------------------------+
  234. | |
  235. | freed |
  236. | |
  237. +---------------------------+
  238. .SS "Formal State Transitions"
  239. .IX Subsection "Formal State Transitions"
  240. This section defines all of the legal state transitions.
  241. This is the canonical list.
  242. Function Call ---------------------------------------------- Current State -----------------------------------------------
  243. start newed initialised updated finaled initialised updated initialised updated freed
  244. decryption decryption encryption encryption
  245. EVP_CIPHER_CTX_new newed
  246. EVP_CipherInit initialised initialised initialised initialised initialised initialised initialised initialised
  247. EVP_DecryptInit initialised initialised initialised initialised initialised initialised initialised initialised
  248. decryption decryption decryption decryption decryption decryption decryption decryption
  249. EVP_EncryptInit initialised initialised initialised initialised initialised initialised initialised initialised
  250. encryption encryption encryption encryption encryption encryption encryption encryption
  251. EVP_CipherUpdate updated updated
  252. EVP_DecryptUpdate updated updated
  253. decryption decryption
  254. EVP_EncryptUpdate updated updated
  255. encryption encryption
  256. EVP_CipherFinal finaled
  257. EVP_DecryptFinal finaled
  258. EVP_EncryptFinal finaled
  259. EVP_CIPHER_CTX_free freed freed freed freed freed freed freed freed freed
  260. EVP_CIPHER_CTX_reset newed newed newed newed newed newed newed newed
  261. EVP_CIPHER_CTX_get_params newed initialised updated initialised updated initialised updated
  262. decryption decryption encryption encryption
  263. EVP_CIPHER_CTX_set_params newed initialised updated initialised updated initialised updated
  264. decryption decryption encryption encryption
  265. EVP_CIPHER_CTX_gettable_params newed initialised updated initialised updated initialised updated
  266. decryption decryption encryption encryption
  267. EVP_CIPHER_CTX_settable_params newed initialised updated initialised updated initialised updated
  268. decryption decryption encryption encryption
  269. .SH "NOTES"
  270. .IX Header "NOTES"
  271. At some point the \s-1EVP\s0 layer will begin enforcing the transitions described
  272. herein.
  273. .SH "SEE ALSO"
  274. .IX Header "SEE ALSO"
  275. \&\fBprovider\-cipher\fR\|(7), \fBEVP_EncryptInit\fR\|(3)
  276. .SH "COPYRIGHT"
  277. .IX Header "COPYRIGHT"
  278. Copyright 2021 The OpenSSL Project Authors. All Rights Reserved.
  279. .PP
  280. Licensed under the Apache License 2.0 (the \*(L"License\*(R"). You may not use
  281. this file except in compliance with the License. You can obtain a copy
  282. in the file \s-1LICENSE\s0 in the source distribution or at
  283. <https://www.openssl.org/source/license.html>.