1*e71b7053SJung-uk Kim=pod 2*e71b7053SJung-uk Kim 3*e71b7053SJung-uk Kim=head1 NAME 4*e71b7053SJung-uk Kim 5*e71b7053SJung-uk KimEVP_rc2_cbc, 6*e71b7053SJung-uk KimEVP_rc2_cfb, 7*e71b7053SJung-uk KimEVP_rc2_ecb, 8*e71b7053SJung-uk KimEVP_rc2_ofb, 9*e71b7053SJung-uk KimEVP_rc2_40_cbc, 10*e71b7053SJung-uk KimEVP_rc2_64_cbc 11*e71b7053SJung-uk Kim- EVP RC2 cipher 12*e71b7053SJung-uk Kim 13*e71b7053SJung-uk Kim=head1 SYNOPSIS 14*e71b7053SJung-uk Kim 15*e71b7053SJung-uk Kim #include <openssl/evp.h> 16*e71b7053SJung-uk Kim 17*e71b7053SJung-uk Kim const EVP_CIPHER *EVP_rc2_cbc(void) 18*e71b7053SJung-uk Kim const EVP_CIPHER *EVP_rc2_cfb(void) 19*e71b7053SJung-uk Kim const EVP_CIPHER *EVP_rc2_ecb(void) 20*e71b7053SJung-uk Kim const EVP_CIPHER *EVP_rc2_ofb(void) 21*e71b7053SJung-uk Kim const EVP_CIPHER *EVP_rc2_40_cbc(void) 22*e71b7053SJung-uk Kim const EVP_CIPHER *EVP_rc2_64_cbc(void) 23*e71b7053SJung-uk Kim 24*e71b7053SJung-uk Kim=head1 DESCRIPTION 25*e71b7053SJung-uk Kim 26*e71b7053SJung-uk KimThe RC2 encryption algorithm for EVP. 27*e71b7053SJung-uk Kim 28*e71b7053SJung-uk Kim=over 4 29*e71b7053SJung-uk Kim 30*e71b7053SJung-uk Kim=item EVP_rc2_cbc(), 31*e71b7053SJung-uk KimEVP_rc2_cfb(), 32*e71b7053SJung-uk KimEVP_rc2_ecb(), 33*e71b7053SJung-uk KimEVP_rc2_ofb() 34*e71b7053SJung-uk Kim 35*e71b7053SJung-uk KimRC2 encryption algorithm in CBC, CFB, ECB and OFB modes respectively. This is a 36*e71b7053SJung-uk Kimvariable key length cipher with an additional parameter called "effective key 37*e71b7053SJung-uk Kimbits" or "effective key length". By default both are set to 128 bits. 38*e71b7053SJung-uk Kim 39*e71b7053SJung-uk Kim=item EVP_rc2_40_cbc(), 40*e71b7053SJung-uk KimEVP_rc2_64_cbc() 41*e71b7053SJung-uk Kim 42*e71b7053SJung-uk KimRC2 algorithm in CBC mode with a default key length and effective key length of 43*e71b7053SJung-uk Kim40 and 64 bits. 44*e71b7053SJung-uk Kim 45*e71b7053SJung-uk KimWARNING: these functions are obsolete. Their usage should be replaced with the 46*e71b7053SJung-uk KimEVP_rc2_cbc(), EVP_CIPHER_CTX_set_key_length() and EVP_CIPHER_CTX_ctrl() 47*e71b7053SJung-uk Kimfunctions to set the key length and effective key length. 48*e71b7053SJung-uk Kim 49*e71b7053SJung-uk Kim=back 50*e71b7053SJung-uk Kim 51*e71b7053SJung-uk Kim=head1 RETURN VALUES 52*e71b7053SJung-uk Kim 53*e71b7053SJung-uk KimThese functions return an B<EVP_CIPHER> structure that contains the 54*e71b7053SJung-uk Kimimplementation of the symmetric cipher. See L<EVP_CIPHER_meth_new(3)> for 55*e71b7053SJung-uk Kimdetails of the B<EVP_CIPHER> structure. 56*e71b7053SJung-uk Kim 57*e71b7053SJung-uk Kim=head1 SEE ALSO 58*e71b7053SJung-uk Kim 59*e71b7053SJung-uk KimL<evp(7)>, 60*e71b7053SJung-uk KimL<EVP_EncryptInit(3)>, 61*e71b7053SJung-uk KimL<EVP_CIPHER_meth_new(3)> 62*e71b7053SJung-uk Kim 63*e71b7053SJung-uk Kim=head1 COPYRIGHT 64*e71b7053SJung-uk Kim 65*e71b7053SJung-uk KimCopyright 2017 The OpenSSL Project Authors. All Rights Reserved. 66*e71b7053SJung-uk Kim 67*e71b7053SJung-uk KimLicensed under the OpenSSL license (the "License"). You may not use 68*e71b7053SJung-uk Kimthis file except in compliance with the License. You can obtain a copy 69*e71b7053SJung-uk Kimin the file LICENSE in the source distribution or at 70*e71b7053SJung-uk KimL<https://www.openssl.org/source/license.html>. 71*e71b7053SJung-uk Kim 72*e71b7053SJung-uk Kim=cut 73*e71b7053SJung-uk Kim 74