1e71b7053SJung-uk Kim=pod 2e71b7053SJung-uk Kim 3e71b7053SJung-uk Kim=head1 NAME 4e71b7053SJung-uk Kim 5e71b7053SJung-uk KimEVP_rc2_cbc, 6e71b7053SJung-uk KimEVP_rc2_cfb, 7*c9cf7b5cSJung-uk KimEVP_rc2_cfb64, 8e71b7053SJung-uk KimEVP_rc2_ecb, 9e71b7053SJung-uk KimEVP_rc2_ofb, 10e71b7053SJung-uk KimEVP_rc2_40_cbc, 11e71b7053SJung-uk KimEVP_rc2_64_cbc 12e71b7053SJung-uk Kim- EVP RC2 cipher 13e71b7053SJung-uk Kim 14e71b7053SJung-uk Kim=head1 SYNOPSIS 15e71b7053SJung-uk Kim 16e71b7053SJung-uk Kim #include <openssl/evp.h> 17e71b7053SJung-uk Kim 18e71b7053SJung-uk Kim const EVP_CIPHER *EVP_rc2_cbc(void) 19e71b7053SJung-uk Kim const EVP_CIPHER *EVP_rc2_cfb(void) 20*c9cf7b5cSJung-uk Kim const EVP_CIPHER *EVP_rc2_cfb64(void) 21e71b7053SJung-uk Kim const EVP_CIPHER *EVP_rc2_ecb(void) 22e71b7053SJung-uk Kim const EVP_CIPHER *EVP_rc2_ofb(void) 23e71b7053SJung-uk Kim const EVP_CIPHER *EVP_rc2_40_cbc(void) 24e71b7053SJung-uk Kim const EVP_CIPHER *EVP_rc2_64_cbc(void) 25e71b7053SJung-uk Kim 26e71b7053SJung-uk Kim=head1 DESCRIPTION 27e71b7053SJung-uk Kim 28e71b7053SJung-uk KimThe RC2 encryption algorithm for EVP. 29e71b7053SJung-uk Kim 30e71b7053SJung-uk Kim=over 4 31e71b7053SJung-uk Kim 32e71b7053SJung-uk Kim=item EVP_rc2_cbc(), 33e71b7053SJung-uk KimEVP_rc2_cfb(), 34*c9cf7b5cSJung-uk KimEVP_rc2_cfb64(), 35e71b7053SJung-uk KimEVP_rc2_ecb(), 36e71b7053SJung-uk KimEVP_rc2_ofb() 37e71b7053SJung-uk Kim 38e71b7053SJung-uk KimRC2 encryption algorithm in CBC, CFB, ECB and OFB modes respectively. This is a 39e71b7053SJung-uk Kimvariable key length cipher with an additional parameter called "effective key 40e71b7053SJung-uk Kimbits" or "effective key length". By default both are set to 128 bits. 41e71b7053SJung-uk Kim 42e71b7053SJung-uk Kim=item EVP_rc2_40_cbc(), 43e71b7053SJung-uk KimEVP_rc2_64_cbc() 44e71b7053SJung-uk Kim 45e71b7053SJung-uk KimRC2 algorithm in CBC mode with a default key length and effective key length of 46e71b7053SJung-uk Kim40 and 64 bits. 47e71b7053SJung-uk Kim 48e71b7053SJung-uk KimWARNING: these functions are obsolete. Their usage should be replaced with the 49e71b7053SJung-uk KimEVP_rc2_cbc(), EVP_CIPHER_CTX_set_key_length() and EVP_CIPHER_CTX_ctrl() 50e71b7053SJung-uk Kimfunctions to set the key length and effective key length. 51e71b7053SJung-uk Kim 52e71b7053SJung-uk Kim=back 53e71b7053SJung-uk Kim 54e71b7053SJung-uk Kim=head1 RETURN VALUES 55e71b7053SJung-uk Kim 56e71b7053SJung-uk KimThese functions return an B<EVP_CIPHER> structure that contains the 57e71b7053SJung-uk Kimimplementation of the symmetric cipher. See L<EVP_CIPHER_meth_new(3)> for 58e71b7053SJung-uk Kimdetails of the B<EVP_CIPHER> structure. 59e71b7053SJung-uk Kim 60e71b7053SJung-uk Kim=head1 SEE ALSO 61e71b7053SJung-uk Kim 62e71b7053SJung-uk KimL<evp(7)>, 63e71b7053SJung-uk KimL<EVP_EncryptInit(3)>, 64e71b7053SJung-uk KimL<EVP_CIPHER_meth_new(3)> 65e71b7053SJung-uk Kim 66e71b7053SJung-uk Kim=head1 COPYRIGHT 67e71b7053SJung-uk Kim 68*c9cf7b5cSJung-uk KimCopyright 2017-2018 The OpenSSL Project Authors. All Rights Reserved. 69e71b7053SJung-uk Kim 70e71b7053SJung-uk KimLicensed under the OpenSSL license (the "License"). You may not use 71e71b7053SJung-uk Kimthis file except in compliance with the License. You can obtain a copy 72e71b7053SJung-uk Kimin the file LICENSE in the source distribution or at 73e71b7053SJung-uk KimL<https://www.openssl.org/source/license.html>. 74e71b7053SJung-uk Kim 75e71b7053SJung-uk Kim=cut 76e71b7053SJung-uk Kim 77