Loading openssl/src/aes.rs +5 −5 Original line number Diff line number Diff line Loading @@ -121,14 +121,14 @@ impl AesKey { /// Performs AES IGE encryption or decryption /// /// AES IGE (Infinite Garble Extension) is a form of AES block cipher utilized in /// OpenSSL. Infinite Garble referes to propogating forward errors. IGE, like other /// block ciphers implemented for AES requires an initalization vector. The IGE mode /// OpenSSL. Infinite Garble refers to propagating forward errors. IGE, like other /// block ciphers implemented for AES requires an initialization vector. The IGE mode /// allows a stream of blocks to be encrypted or decrypted without having the entire /// plaintext available. For more information, visit [AES IGE Encryption]. /// /// This block cipher uses 16 byte blocks. The rust implmentation will panic /// if the input or output does not meet this 16-byte boundry. Attention must /// be made in this low level implementation to pad the value to the 128-bit boundry. /// This block cipher uses 16 byte blocks. The rust implementation will panic /// if the input or output does not meet this 16-byte boundary. Attention must /// be made in this low level implementation to pad the value to the 128-bit boundary. /// /// [AES IGE Encryption]: http://www.links.org/files/openssl-ige.pdf /// Loading openssl/src/asn1.rs +1 −1 Original line number Diff line number Diff line Loading @@ -53,7 +53,7 @@ foreign_type_and_impl_send_sync! { /// example outside the year range of 1950-2049. /// /// [ASN1_GENERALIZEDTIME_set] documentation from OpenSSL provides /// further details of implmentation. Note: these docs are from the master /// further details of implementation. Note: these docs are from the master /// branch as documentation on the 1.1.0 branch did not include this page. /// /// [ASN1_GENERALIZEDTIME_set]: https://www.openssl.org/docs/manmaster/man3/ASN1_GENERALIZEDTIME_set.html Loading openssl/src/bn.rs +1 −1 Original line number Diff line number Diff line Loading @@ -120,7 +120,7 @@ foreign_type_and_impl_send_sync! { /// with [`new`]. Perform standard mathematics on large numbers using /// methods from [`Dref<Target = BigNumRef>`] /// /// OpenSSL documenation at [`BN_new`]. /// OpenSSL documentation at [`BN_new`]. /// /// [`new`]: struct.BigNum.html#method.new /// [`Dref<Target = BigNumRef>`]: struct.BigNum.html#deref-methods Loading openssl/src/cms.rs +2 −2 Original line number Diff line number Diff line //! SMIME implementation using CMS //! //! CMS (PKCS#7) is an encyption standard. It allows signing and encrypting data using //! CMS (PKCS#7) is an encryption standard. It allows signing and encrypting data using //! X.509 certificates. The OpenSSL implementation of CMS is used in email encryption //! generated from a `Vec` of bytes. This `Vec` follows the smime protocol standards. //! Data accepted by this module will be smime type `enveloped-data`. Loading Loading @@ -56,7 +56,7 @@ foreign_type_and_impl_send_sync! { /// CMS supports nesting various types of data, including signatures, certificates, /// encrypted data, smime messages (encrypted email), and data digest. The ContentInfo /// content type is the encapsulation of all those content types. [`RFC 5652`] describes /// CMS and OpenSSL follows this RFC's implmentation. /// CMS and OpenSSL follows this RFC's implementation. /// /// [`RFC 5652`]: https://tools.ietf.org/html/rfc5652#page-6 pub struct CmsContentInfo; Loading openssl/src/dsa.rs +2 −2 Original line number Diff line number Diff line //! Digital Signatures //! //! DSA ensures a message originated from a known sender, and was not modified. //! DSA uses asymetrical keys and an algorithm to output a signature of the message //! DSA uses asymmetrical keys and an algorithm to output a signature of the message //! using the private key that can be validated with the public key but not be generated //! without the private key. Loading Loading @@ -31,7 +31,7 @@ generic_foreign_type_and_impl_send_sync! { /// * `q`: DSA sub-prime parameter /// * `g`: DSA base parameter /// /// These values are used to calculate a pair of asymetrical keys used for /// These values are used to calculate a pair of asymmetrical keys used for /// signing. /// /// OpenSSL documentation at [`DSA_new`] Loading Loading
openssl/src/aes.rs +5 −5 Original line number Diff line number Diff line Loading @@ -121,14 +121,14 @@ impl AesKey { /// Performs AES IGE encryption or decryption /// /// AES IGE (Infinite Garble Extension) is a form of AES block cipher utilized in /// OpenSSL. Infinite Garble referes to propogating forward errors. IGE, like other /// block ciphers implemented for AES requires an initalization vector. The IGE mode /// OpenSSL. Infinite Garble refers to propagating forward errors. IGE, like other /// block ciphers implemented for AES requires an initialization vector. The IGE mode /// allows a stream of blocks to be encrypted or decrypted without having the entire /// plaintext available. For more information, visit [AES IGE Encryption]. /// /// This block cipher uses 16 byte blocks. The rust implmentation will panic /// if the input or output does not meet this 16-byte boundry. Attention must /// be made in this low level implementation to pad the value to the 128-bit boundry. /// This block cipher uses 16 byte blocks. The rust implementation will panic /// if the input or output does not meet this 16-byte boundary. Attention must /// be made in this low level implementation to pad the value to the 128-bit boundary. /// /// [AES IGE Encryption]: http://www.links.org/files/openssl-ige.pdf /// Loading
openssl/src/asn1.rs +1 −1 Original line number Diff line number Diff line Loading @@ -53,7 +53,7 @@ foreign_type_and_impl_send_sync! { /// example outside the year range of 1950-2049. /// /// [ASN1_GENERALIZEDTIME_set] documentation from OpenSSL provides /// further details of implmentation. Note: these docs are from the master /// further details of implementation. Note: these docs are from the master /// branch as documentation on the 1.1.0 branch did not include this page. /// /// [ASN1_GENERALIZEDTIME_set]: https://www.openssl.org/docs/manmaster/man3/ASN1_GENERALIZEDTIME_set.html Loading
openssl/src/bn.rs +1 −1 Original line number Diff line number Diff line Loading @@ -120,7 +120,7 @@ foreign_type_and_impl_send_sync! { /// with [`new`]. Perform standard mathematics on large numbers using /// methods from [`Dref<Target = BigNumRef>`] /// /// OpenSSL documenation at [`BN_new`]. /// OpenSSL documentation at [`BN_new`]. /// /// [`new`]: struct.BigNum.html#method.new /// [`Dref<Target = BigNumRef>`]: struct.BigNum.html#deref-methods Loading
openssl/src/cms.rs +2 −2 Original line number Diff line number Diff line //! SMIME implementation using CMS //! //! CMS (PKCS#7) is an encyption standard. It allows signing and encrypting data using //! CMS (PKCS#7) is an encryption standard. It allows signing and encrypting data using //! X.509 certificates. The OpenSSL implementation of CMS is used in email encryption //! generated from a `Vec` of bytes. This `Vec` follows the smime protocol standards. //! Data accepted by this module will be smime type `enveloped-data`. Loading Loading @@ -56,7 +56,7 @@ foreign_type_and_impl_send_sync! { /// CMS supports nesting various types of data, including signatures, certificates, /// encrypted data, smime messages (encrypted email), and data digest. The ContentInfo /// content type is the encapsulation of all those content types. [`RFC 5652`] describes /// CMS and OpenSSL follows this RFC's implmentation. /// CMS and OpenSSL follows this RFC's implementation. /// /// [`RFC 5652`]: https://tools.ietf.org/html/rfc5652#page-6 pub struct CmsContentInfo; Loading
openssl/src/dsa.rs +2 −2 Original line number Diff line number Diff line //! Digital Signatures //! //! DSA ensures a message originated from a known sender, and was not modified. //! DSA uses asymetrical keys and an algorithm to output a signature of the message //! DSA uses asymmetrical keys and an algorithm to output a signature of the message //! using the private key that can be validated with the public key but not be generated //! without the private key. Loading Loading @@ -31,7 +31,7 @@ generic_foreign_type_and_impl_send_sync! { /// * `q`: DSA sub-prime parameter /// * `g`: DSA base parameter /// /// These values are used to calculate a pair of asymetrical keys used for /// These values are used to calculate a pair of asymmetrical keys used for /// signing. /// /// OpenSSL documentation at [`DSA_new`] Loading