aboutsummaryrefslogtreecommitdiff
path: root/doc/doxyout/hcrypto/man
diff options
context:
space:
mode:
Diffstat (limited to 'doc/doxyout/hcrypto/man')
-rw-r--r--doc/doxyout/hcrypto/man/man3/EVP_hcrypto_md2.31
-rw-r--r--doc/doxyout/hcrypto/man/man3/EVP_md2.31
-rw-r--r--doc/doxyout/hcrypto/man/man3/hcrypto_core.312
-rw-r--r--doc/doxyout/hcrypto/man/man3/hcrypto_des.356
-rw-r--r--doc/doxyout/hcrypto/man/man3/hcrypto_dh.356
-rw-r--r--doc/doxyout/hcrypto/man/man3/hcrypto_evp.3382
-rw-r--r--doc/doxyout/hcrypto/man/man3/hcrypto_misc.312
-rw-r--r--doc/doxyout/hcrypto/man/man3/hcrypto_rand.340
-rw-r--r--doc/doxyout/hcrypto/man/man3/hcrypto_rsa.332
-rw-r--r--doc/doxyout/hcrypto/man/man3/page_des.36
-rw-r--r--doc/doxyout/hcrypto/man/man3/page_dh.36
-rw-r--r--doc/doxyout/hcrypto/man/man3/page_evp.36
-rw-r--r--doc/doxyout/hcrypto/man/man3/page_rand.36
-rw-r--r--doc/doxyout/hcrypto/man/man3/page_rsa.310
14 files changed, 299 insertions, 327 deletions
diff --git a/doc/doxyout/hcrypto/man/man3/EVP_hcrypto_md2.3 b/doc/doxyout/hcrypto/man/man3/EVP_hcrypto_md2.3
deleted file mode 100644
index d526f956e4fb..000000000000
--- a/doc/doxyout/hcrypto/man/man3/EVP_hcrypto_md2.3
+++ /dev/null
@@ -1 +0,0 @@
-.so man3/hcrypto_evp.3
diff --git a/doc/doxyout/hcrypto/man/man3/EVP_md2.3 b/doc/doxyout/hcrypto/man/man3/EVP_md2.3
deleted file mode 100644
index d526f956e4fb..000000000000
--- a/doc/doxyout/hcrypto/man/man3/EVP_md2.3
+++ /dev/null
@@ -1 +0,0 @@
-.so man3/hcrypto_evp.3
diff --git a/doc/doxyout/hcrypto/man/man3/hcrypto_core.3 b/doc/doxyout/hcrypto/man/man3/hcrypto_core.3
index 44c0f7407638..5089d5ee9797 100644
--- a/doc/doxyout/hcrypto/man/man3/hcrypto_core.3
+++ b/doc/doxyout/hcrypto/man/man3/hcrypto_core.3
@@ -1,8 +1,8 @@
-.TH "hcrypto_core" 3 "Fri Jun 7 2019" "Version 7.7.0" "Heimdal crypto library" \" -*- nroff -*-
+.TH "hcrypto_core" 3 "Tue Nov 15 2022" "Version 7.8.0" "Heimdal crypto library" \" -*- nroff -*-
.ad l
.nh
.SH NAME
-hcrypto_core
+hcrypto_core \- hcrypto function controlling behavior
.SH SYNOPSIS
.br
.PP
@@ -33,7 +33,7 @@ hcrypto_core
.SS "int EVP_CIPHER_CTX_ctrl (EVP_CIPHER_CTX * ctx, int type, int arg, void * data)"
Perform a operation on a ctx
.PP
-\fBParameters:\fP
+\fBParameters\fP
.RS 4
\fIctx\fP context to perform operation on\&.
.br
@@ -44,7 +44,7 @@ Perform a operation on a ctx
\fIdata\fP addition data to operation\&.
.RE
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
1 for success, 0 for failure\&.
.RE
@@ -53,14 +53,14 @@ Perform a operation on a ctx
.SS "int EVP_CIPHER_CTX_rand_key (EVP_CIPHER_CTX * ctx, void * key)"
Generate a random key for the specificed EVP_CIPHER\&.
.PP
-\fBParameters:\fP
+\fBParameters\fP
.RS 4
\fIctx\fP EVP_CIPHER_CTX type to build the key for\&.
.br
\fIkey\fP return key, must be at least \fBEVP_CIPHER_key_length()\fP byte long\&.
.RE
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
1 for success, 0 for failure\&.
.RE
diff --git a/doc/doxyout/hcrypto/man/man3/hcrypto_des.3 b/doc/doxyout/hcrypto/man/man3/hcrypto_des.3
index cd3a379dddd6..8c9c8cc4fd9a 100644
--- a/doc/doxyout/hcrypto/man/man3/hcrypto_des.3
+++ b/doc/doxyout/hcrypto/man/man3/hcrypto_des.3
@@ -1,8 +1,8 @@
-.TH "hcrypto_des" 3 "Fri Jun 7 2019" "Version 7.7.0" "Heimdal crypto library" \" -*- nroff -*-
+.TH "hcrypto_des" 3 "Tue Nov 15 2022" "Version 7.8.0" "Heimdal crypto library" \" -*- nroff -*-
.ad l
.nh
.SH NAME
-hcrypto_des
+hcrypto_des \- DES crypto functions
.SH SYNOPSIS
.br
.PP
@@ -77,7 +77,7 @@ Crete a checksum using DES in CBC encryption mode\&. This mode is only used for
.PP
The IV must always be diffrent for diffrent input data blocks\&.
.PP
-\fBParameters:\fP
+\fBParameters\fP
.RS 4
\fIin\fP data to checksum
.br
@@ -96,7 +96,7 @@ Encrypt/decrypt a block using DES in Chain Block Cipher mode (cbc)\&.
.PP
The IV must always be diffrent for diffrent input data blocks\&.
.PP
-\fBParameters:\fP
+\fBParameters\fP
.RS 4
\fIin\fP data to encrypt
.br
@@ -117,7 +117,7 @@ Encrypt/decrypt using DES in cipher feedback mode with 64 bit feedback\&.
.PP
The IV must always be diffrent for diffrent input data blocks\&.
.PP
-\fBParameters:\fP
+\fBParameters\fP
.RS 4
\fIin\fP data to encrypt
.br
@@ -138,12 +138,12 @@ The IV must always be diffrent for diffrent input data blocks\&.
.SS "int HC_DEPRECATED DES_check_key_parity (DES_cblock * key)"
Check if the key have correct parity\&.
.PP
-\fBParameters:\fP
+\fBParameters\fP
.RS 4
\fIkey\fP key to check the parity\&.
.RE
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
1 on success, 0 on failure\&.
.RE
@@ -152,7 +152,7 @@ Check if the key have correct parity\&.
.SS "void DES_ecb3_encrypt (DES_cblock * input, DES_cblock * output, DES_key_schedule * ks1, DES_key_schedule * ks2, DES_key_schedule * ks3, int encp)"
Encrypt/decrypt a block using triple DES using EDE mode, encrypt/decrypt/encrypt\&.
.PP
-\fBParameters:\fP
+\fBParameters\fP
.RS 4
\fIinput\fP data to encrypt
.br
@@ -171,7 +171,7 @@ Encrypt/decrypt a block using triple DES using EDE mode, encrypt/decrypt/encrypt
.SS "void DES_ecb_encrypt (DES_cblock * input, DES_cblock * output, DES_key_schedule * ks, int encp)"
Encrypt/decrypt a block using DES\&.
.PP
-\fBParameters:\fP
+\fBParameters\fP
.RS 4
\fIinput\fP data to encrypt
.br
@@ -188,7 +188,7 @@ Encrypt/decrypt using Triple DES in Chain Block Cipher mode (cbc)\&.
.PP
The IV must always be diffrent for diffrent input data blocks\&.
.PP
-\fBParameters:\fP
+\fBParameters\fP
.RS 4
\fIin\fP data to encrypt
.br
@@ -211,7 +211,7 @@ The IV must always be diffrent for diffrent input data blocks\&.
.SS "void DES_encrypt (uint32_t u[2], DES_key_schedule * ks, int encp)"
Encrypt/decrypt a block using DES\&. Also called ECB mode
.PP
-\fBParameters:\fP
+\fBParameters\fP
.RS 4
\fIu\fP data to encrypt
.br
@@ -224,7 +224,7 @@ Encrypt/decrypt a block using DES\&. Also called ECB mode
.SS "void HC_DEPRECATED DES_init_random_number_generator (DES_cblock * seed)"
Seed the random number generator\&. Deprecated, use \fBRAND - random number\fP
.PP
-\fBParameters:\fP
+\fBParameters\fP
.RS 4
\fIseed\fP a seed to seed that random number generate with\&.
.RE
@@ -233,12 +233,12 @@ Seed the random number generator\&. Deprecated, use \fBRAND - random number\fP
.SS "int DES_is_weak_key (DES_cblock * key)"
Checks if the key is any of the weaks keys that makes DES attacks trival\&.
.PP
-\fBParameters:\fP
+\fBParameters\fP
.RS 4
\fIkey\fP key to check\&.
.RE
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
1 if the key is weak, 0 otherwise\&.
.RE
@@ -247,14 +247,14 @@ Checks if the key is any of the weaks keys that makes DES attacks trival\&.
.SS "int DES_key_sched (DES_cblock * key, DES_key_schedule * ks)"
Compatibility function for eay libdes, works just like \fBDES_set_key_checked()\fP\&.
.PP
-\fBParameters:\fP
+\fBParameters\fP
.RS 4
\fIkey\fP a key to initialize the key schedule with\&.
.br
\fIks\fP a key schedule to initialize\&.
.RE
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
0 on success, -1 on invalid parity, -2 on weak key\&.
.RE
@@ -263,12 +263,12 @@ Compatibility function for eay libdes, works just like \fBDES_set_key_checked()\
.SS "int HC_DEPRECATED DES_new_random_key (DES_cblock * key)"
Generate a random des key using a random block, fixup parity and skip weak keys\&.
.PP
-\fBParameters:\fP
+\fBParameters\fP
.RS 4
\fIkey\fP is set to a random key\&.
.RE
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
0 on success, non zero on random number generator failure\&.
.RE
@@ -279,7 +279,7 @@ Encrypt/decrypt a block using DES in Propagating Cipher Block Chaining mode\&. T
.PP
The IV must always be diffrent for diffrent input data blocks\&.
.PP
-\fBParameters:\fP
+\fBParameters\fP
.RS 4
\fIin\fP data to encrypt
.br
@@ -298,7 +298,7 @@ The IV must always be diffrent for diffrent input data blocks\&.
.SS "void HC_DEPRECATED DES_random_key (DES_cblock * key)"
Generate a random key, deprecated since it doesn't return an error code, use \fBDES_new_random_key()\fP\&.
.PP
-\fBParameters:\fP
+\fBParameters\fP
.RS 4
\fIkey\fP is set to a random key\&.
.RE
@@ -307,14 +307,14 @@ Generate a random key, deprecated since it doesn't return an error code, use \fB
.SS "int HC_DEPRECATED DES_set_key (DES_cblock * key, DES_key_schedule * ks)"
Setup a des key schedule from a key\&. Deprecated function, use \fBDES_set_key_unchecked()\fP or \fBDES_set_key_checked()\fP instead\&.
.PP
-\fBParameters:\fP
+\fBParameters\fP
.RS 4
\fIkey\fP a key to initialize the key schedule with\&.
.br
\fIks\fP a key schedule to initialize\&.
.RE
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
0 on success
.RE
@@ -323,14 +323,14 @@ Setup a des key schedule from a key\&. Deprecated function, use \fBDES_set_key_u
.SS "int DES_set_key_checked (DES_cblock * key, DES_key_schedule * ks)"
Just like \fBDES_set_key_unchecked()\fP except checking that the key is not weak for or have correct parity\&.
.PP
-\fBParameters:\fP
+\fBParameters\fP
.RS 4
\fIkey\fP a key to initialize the key schedule with\&.
.br
\fIks\fP a key schedule to initialize\&.
.RE
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
0 on success, -1 on invalid parity, -2 on weak key\&.
.RE
@@ -341,14 +341,14 @@ Setup a des key schedule from a key\&. The key is no longer needed after this tr
.PP
Does NOT check that the key is weak for or have wrong parity\&.
.PP
-\fBParameters:\fP
+\fBParameters\fP
.RS 4
\fIkey\fP a key to initialize the key schedule with\&.
.br
\fIks\fP a key schedule to initialize\&.
.RE
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
0 on success
.RE
@@ -357,7 +357,7 @@ Does NOT check that the key is weak for or have wrong parity\&.
.SS "void DES_set_odd_parity (DES_cblock * key)"
Set the parity of the key block, used to generate a des key from a random key\&. See \fBDES key generation\fP\&.
.PP
-\fBParameters:\fP
+\fBParameters\fP
.RS 4
\fIkey\fP key to fixup the parity for\&.
.RE
@@ -366,7 +366,7 @@ Set the parity of the key block, used to generate a des key from a random key\&.
.SS "void DES_string_to_key (const char * str, DES_cblock * key)"
Convert a string to a DES key\&. Use something like \fBPKCS5_PBKDF2_HMAC_SHA1()\fP to create key from passwords\&.
.PP
-\fBParameters:\fP
+\fBParameters\fP
.RS 4
\fIstr\fP The string to convert to a key
.br
diff --git a/doc/doxyout/hcrypto/man/man3/hcrypto_dh.3 b/doc/doxyout/hcrypto/man/man3/hcrypto_dh.3
index 709dcfe3f934..4b03476a1805 100644
--- a/doc/doxyout/hcrypto/man/man3/hcrypto_dh.3
+++ b/doc/doxyout/hcrypto/man/man3/hcrypto_dh.3
@@ -1,8 +1,8 @@
-.TH "hcrypto_dh" 3 "Fri Jun 7 2019" "Version 7.7.0" "Heimdal crypto library" \" -*- nroff -*-
+.TH "hcrypto_dh" 3 "Tue Nov 15 2022" "Version 7.8.0" "Heimdal crypto library" \" -*- nroff -*-
.ad l
.nh
.SH NAME
-hcrypto_dh
+hcrypto_dh \- Diffie-Hellman functions
.SH SYNOPSIS
.br
.PP
@@ -66,7 +66,7 @@ See the \fBDH - Diffie-Hellman key exchange\fP for description and examples\&.
.SS "int DH_check_pubkey (const DH * dh, const BIGNUM * pub_key, int * codes)"
Check that the public key is sane\&.
.PP
-\fBParameters:\fP
+\fBParameters\fP
.RS 4
\fIdh\fP the local peer DH parameters\&.
.br
@@ -75,7 +75,7 @@ Check that the public key is sane\&.
\fIcodes\fP return that the failures of the pub_key are\&.
.RE
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
1 on success, 0 on failure and *codes is set the the combined fail check for the public key
.RE
@@ -92,7 +92,7 @@ if g == 2, pub_key have more then one bit set, if bits set is 1, log_2(pub_key)
.SS "int DH_compute_key (unsigned char * shared_key, const BIGNUM * peer_pub_key, DH * dh)"
Complute the shared secret key\&.
.PP
-\fBParameters:\fP
+\fBParameters\fP
.RS 4
\fIshared_key\fP the resulting shared key, need to be at least \fBDH_size()\fP large\&.
.br
@@ -101,7 +101,7 @@ Complute the shared secret key\&.
\fIdh\fP the dh key pair\&.
.RE
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
1 on success\&.
.RE
@@ -110,7 +110,7 @@ Checks that the pubkey passed in is valid using \fBDH_check_pubkey()\fP\&.
.SS "void DH_free (DH * dh)"
Free a DH object and release related resources, like ENGINE, that the object was using\&.
.PP
-\fBParameters:\fP
+\fBParameters\fP
.RS 4
\fIdh\fP object to be freed\&.
.RE
@@ -119,12 +119,12 @@ Free a DH object and release related resources, like ENGINE, that the object was
.SS "int DH_generate_key (DH * dh)"
Generate a new DH private-public key pair\&. The dh parameter must be allocted first with \fBDH_new()\fP\&. dh->p and dp->g must be set\&.
.PP
-\fBParameters:\fP
+\fBParameters\fP
.RS 4
\fIdh\fP dh parameter\&.
.RE
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
1 on success\&.
.RE
@@ -133,7 +133,7 @@ Generate a new DH private-public key pair\&. The dh parameter must be allocted f
.SS "int DH_generate_parameters_ex (DH * dh, int prime_len, int generator, BN_GENCB * cb)"
Generate DH parameters for the DH object give parameters\&.
.PP
-\fBParameters:\fP
+\fBParameters\fP
.RS 4
\fIdh\fP The DH object to generate parameters for\&.
.br
@@ -144,7 +144,7 @@ Generate DH parameters for the DH object give parameters\&.
\fIcb\fP Callback parameters to show progress, can be NULL\&.
.RE
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
the maximum size in bytes of the out data\&.
.RE
@@ -153,7 +153,7 @@ the maximum size in bytes of the out data\&.
.SS "const DH_METHOD* DH_get_default_method (void)"
Return the default DH implementation\&.
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
pointer to a DH_METHOD\&.
.RE
@@ -162,14 +162,14 @@ pointer to a DH_METHOD\&.
.SS "void* DH_get_ex_data (DH * dh, int idx)"
Get the data for index idx in the DH object\&.
.PP
-\fBParameters:\fP
+\fBParameters\fP
.RS 4
\fIdh\fP DH object\&.
.br
\fIidx\fP index to get the data for\&.
.RE
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
the object store in index idx
.RE
@@ -178,7 +178,7 @@ the object store in index idx
.SS "const DH_METHOD* DH_ltm_method (void)"
DH implementation using libtommath\&.
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
the DH_METHOD for the DH implementation using libtommath\&.
.RE
@@ -187,7 +187,7 @@ the DH_METHOD for the DH implementation using libtommath\&.
.SS "DH* DH_new (void)"
Create a new DH object using DH_new_method(NULL), see \fBDH_new_method()\fP\&.
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
a newly allocated DH object\&.
.RE
@@ -196,12 +196,12 @@ a newly allocated DH object\&.
.SS "DH* DH_new_method (ENGINE * engine)"
Create a new DH object from the given engine, if the NULL is used, the default engine is used\&. Free the DH object with \fBDH_free()\fP\&.
.PP
-\fBParameters:\fP
+\fBParameters\fP
.RS 4
\fIengine\fP The engine to use to allocate the DH object\&.
.RE
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
a newly allocated DH object\&.
.RE
@@ -210,7 +210,7 @@ a newly allocated DH object\&.
.SS "const DH_METHOD* DH_null_method (void)"
Return the dummy DH implementation\&.
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
pointer to a DH_METHOD\&.
.RE
@@ -219,7 +219,7 @@ pointer to a DH_METHOD\&.
.SS "void DH_set_default_method (const DH_METHOD * meth)"
Set the default DH implementation\&.
.PP
-\fBParameters:\fP
+\fBParameters\fP
.RS 4
\fImeth\fP pointer to a DH_METHOD\&.
.RE
@@ -228,7 +228,7 @@ Set the default DH implementation\&.
.SS "int DH_set_ex_data (DH * dh, int idx, void * data)"
Set the data index idx in the DH object to data\&.
.PP
-\fBParameters:\fP
+\fBParameters\fP
.RS 4
\fIdh\fP DH object\&.
.br
@@ -237,7 +237,7 @@ Set the data index idx in the DH object to data\&.
\fIdata\fP data to store for the index idx\&.
.RE
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
1 on success\&.
.RE
@@ -246,14 +246,14 @@ Set the data index idx in the DH object to data\&.
.SS "int DH_set_method (DH * dh, const DH_METHOD * method)"
Set a new method for the DH keypair\&.
.PP
-\fBParameters:\fP
+\fBParameters\fP
.RS 4
\fIdh\fP dh parameter\&.
.br
\fImethod\fP the new method for the DH parameter\&.
.RE
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
1 on success\&.
.RE
@@ -262,12 +262,12 @@ Set a new method for the DH keypair\&.
.SS "int DH_size (const DH * dh)"
The maximum output size of the \fBDH_compute_key()\fP function\&.
.PP
-\fBParameters:\fP
+\fBParameters\fP
.RS 4
\fIdh\fP The DH object to get the size from\&.
.RE
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
the maximum size in bytes of the out data\&.
.RE
@@ -276,12 +276,12 @@ the maximum size in bytes of the out data\&.
.SS "int DH_up_ref (DH * dh)"
Add a reference to the DH object\&. The object should be free with \fBDH_free()\fP to drop the reference\&.
.PP
-\fBParameters:\fP
+\fBParameters\fP
.RS 4
\fIdh\fP the object to increase the reference count too\&.
.RE
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
the updated reference count, can't safely be used except for debug printing\&.
.RE
diff --git a/doc/doxyout/hcrypto/man/man3/hcrypto_evp.3 b/doc/doxyout/hcrypto/man/man3/hcrypto_evp.3
index b6cf2c72094f..2e0471d7fca5 100644
--- a/doc/doxyout/hcrypto/man/man3/hcrypto_evp.3
+++ b/doc/doxyout/hcrypto/man/man3/hcrypto_evp.3
@@ -1,8 +1,8 @@
-.TH "hcrypto_evp" 3 "Fri Jun 7 2019" "Version 7.7.0" "Heimdal crypto library" \" -*- nroff -*-
+.TH "hcrypto_evp" 3 "Tue Nov 15 2022" "Version 7.8.0" "Heimdal crypto library" \" -*- nroff -*-
.ad l
.nh
.SH NAME
-hcrypto_evp
+hcrypto_evp \- EVP generic crypto functions
.SH SYNOPSIS
.br
.PP
@@ -49,9 +49,6 @@ hcrypto_evp
.RI "const EVP_MD * \fBEVP_hcrypto_md4\fP (void)"
.br
.ti -1c
-.RI "const EVP_MD * \fBEVP_hcrypto_md2\fP (void)"
-.br
-.ti -1c
.RI "const EVP_CIPHER * \fBEVP_hcrypto_des_cbc\fP (void)"
.br
.ti -1c
@@ -190,9 +187,6 @@ hcrypto_evp
.RI "const EVP_MD * \fBEVP_md4\fP (void)"
.br
.ti -1c
-.RI "const EVP_MD * \fBEVP_md2\fP (void)"
-.br
-.ti -1c
.RI "const EVP_MD * \fBEVP_md_null\fP (void)"
.br
.ti -1c
@@ -312,20 +306,20 @@ See the \fBEVP - generic crypto interface\fP for description and examples\&.
.SS "const EVP_CIPHER* EVP_aes_128_cbc (void)"
The AES-128 cipher type
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
the AES-128 EVP_CIPHER pointer\&.
.RE
.PP
.PP
-\fBExamples: \fP
+\fBExamples\fP
.in +1c
\fBexample_evp_cipher\&.c\fP\&.
.SS "const EVP_CIPHER* EVP_aes_128_cfb8 (void)"
The AES-128 cipher type
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
the AES-128 EVP_CIPHER pointer\&.
.RE
@@ -334,7 +328,7 @@ the AES-128 EVP_CIPHER pointer\&.
.SS "const EVP_CIPHER* EVP_aes_192_cbc (void)"
The AES-192 cipher type
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
the AES-192 EVP_CIPHER pointer\&.
.RE
@@ -343,7 +337,7 @@ the AES-192 EVP_CIPHER pointer\&.
.SS "const EVP_CIPHER* EVP_aes_192_cfb8 (void)"
The AES-192 cipher type
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
the AES-192 EVP_CIPHER pointer\&.
.RE
@@ -352,7 +346,7 @@ the AES-192 EVP_CIPHER pointer\&.
.SS "const EVP_CIPHER* EVP_aes_256_cbc (void)"
The AES-256 cipher type
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
the AES-256 EVP_CIPHER pointer\&.
.RE
@@ -361,7 +355,7 @@ the AES-256 EVP_CIPHER pointer\&.
.SS "const EVP_CIPHER* EVP_aes_256_cfb8 (void)"
The AES-256 cipher type
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
the AES-256 EVP_CIPHER pointer\&.
.RE
@@ -372,7 +366,7 @@ Provides a legancy string to key function, used in PEM files\&.
.PP
New protocols should use new string to key functions like NIST SP56-800A or PKCS#5 v2\&.0 (see \fBPKCS5_PBKDF2_HMAC_SHA1()\fP)\&.
.PP
-\fBParameters:\fP
+\fBParameters\fP
.RS 4
\fItype\fP type of cipher to use
.br
@@ -391,7 +385,7 @@ New protocols should use new string to key functions like NIST SP56-800A or PKCS
\fIivdata\fP output ivdata, needs to of the size \fBEVP_CIPHER_block_size()\fP\&.
.RE
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
the size of derived key\&.
.RE
@@ -400,7 +394,7 @@ the size of derived key\&.
.SS "const EVP_CIPHER* EVP_camellia_128_cbc (void)"
The Camellia-128 cipher type
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
the Camellia-128 EVP_CIPHER pointer\&.
.RE
@@ -409,7 +403,7 @@ the Camellia-128 EVP_CIPHER pointer\&.
.SS "const EVP_CIPHER* EVP_camellia_192_cbc (void)"
The Camellia-198 cipher type
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
the Camellia-198 EVP_CIPHER pointer\&.
.RE
@@ -418,7 +412,7 @@ the Camellia-198 EVP_CIPHER pointer\&.
.SS "const EVP_CIPHER* EVP_camellia_256_cbc (void)"
The Camellia-256 cipher type
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
the Camellia-256 EVP_CIPHER pointer\&.
.RE
@@ -427,30 +421,30 @@ the Camellia-256 EVP_CIPHER pointer\&.
.SS "size_t EVP_CIPHER_block_size (const EVP_CIPHER * c)"
Return the block size of the cipher\&.
.PP
-\fBParameters:\fP
+\fBParameters\fP
.RS 4
\fIc\fP cipher to get the block size from\&.
.RE
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
the block size of the cipher\&.
.RE
.PP
.PP
-\fBExamples: \fP
+\fBExamples\fP
.in +1c
\fBexample_evp_cipher\&.c\fP\&.
.SS "size_t EVP_CIPHER_CTX_block_size (const EVP_CIPHER_CTX * ctx)"
Return the block size of the cipher context\&.
.PP
-\fBParameters:\fP
+\fBParameters\fP
.RS 4
\fIctx\fP cipher context to get the block size from\&.
.RE
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
the block size of the cipher context\&.
.RE
@@ -459,12 +453,12 @@ the block size of the cipher context\&.
.SS "const EVP_CIPHER* EVP_CIPHER_CTX_cipher (EVP_CIPHER_CTX * ctx)"
Return the EVP_CIPHER for a EVP_CIPHER_CTX context\&.
.PP
-\fBParameters:\fP
+\fBParameters\fP
.RS 4
\fIctx\fP the context to get the cipher type from\&.
.RE
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
the EVP_CIPHER pointer\&.
.RE
@@ -473,30 +467,30 @@ the EVP_CIPHER pointer\&.
.SS "int EVP_CIPHER_CTX_cleanup (EVP_CIPHER_CTX * c)"
Clean up the EVP_CIPHER_CTX context\&.
.PP
-\fBParameters:\fP
+\fBParameters\fP
.RS 4
\fIc\fP the cipher to clean up\&.
.RE
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
1 on success\&.
.RE
.PP
.PP
-\fBExamples: \fP
+\fBExamples\fP
.in +1c
\fBexample_evp_cipher\&.c\fP\&.
.SS "unsigned long EVP_CIPHER_CTX_flags (const EVP_CIPHER_CTX * ctx)"
Get the flags for an EVP_CIPHER_CTX context\&.
.PP
-\fBParameters:\fP
+\fBParameters\fP
.RS 4
\fIctx\fP the EVP_CIPHER_CTX to get the flags from
.RE
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
the flags for an EVP_CIPHER_CTX\&.
.RE
@@ -505,12 +499,12 @@ the flags for an EVP_CIPHER_CTX\&.
.SS "void* EVP_CIPHER_CTX_get_app_data (EVP_CIPHER_CTX * ctx)"
Get the app data for an EVP_CIPHER_CTX context\&.
.PP
-\fBParameters:\fP
+\fBParameters\fP
.RS 4
\fIctx\fP the EVP_CIPHER_CTX to get the app data from
.RE
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
the app data for an EVP_CIPHER_CTX\&.
.RE
@@ -519,25 +513,25 @@ the app data for an EVP_CIPHER_CTX\&.
.SS "void EVP_CIPHER_CTX_init (EVP_CIPHER_CTX * c)"
Initiate a EVP_CIPHER_CTX context\&. Clean up with \fBEVP_CIPHER_CTX_cleanup()\fP\&.
.PP
-\fBParameters:\fP
+\fBParameters\fP
.RS 4
\fIc\fP the cipher initiate\&.
.RE
.PP
.PP
-\fBExamples: \fP
+\fBExamples\fP
.in +1c
\fBexample_evp_cipher\&.c\fP\&.
.SS "size_t EVP_CIPHER_CTX_iv_length (const EVP_CIPHER_CTX * ctx)"
Return the IV size of the cipher context\&.
.PP
-\fBParameters:\fP
+\fBParameters\fP
.RS 4
\fIctx\fP cipher context to get the IV size from\&.
.RE
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
the IV size of the cipher context\&.
.RE
@@ -546,12 +540,12 @@ the IV size of the cipher context\&.
.SS "size_t EVP_CIPHER_CTX_key_length (const EVP_CIPHER_CTX * ctx)"
Return the key size of the cipher context\&.
.PP
-\fBParameters:\fP
+\fBParameters\fP
.RS 4
\fIctx\fP cipher context to get the key size from\&.
.RE
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
the key size of the cipher context\&.
.RE
@@ -560,12 +554,12 @@ the key size of the cipher context\&.
.SS "int EVP_CIPHER_CTX_mode (const EVP_CIPHER_CTX * ctx)"
Get the mode for an EVP_CIPHER_CTX context\&.
.PP
-\fBParameters:\fP
+\fBParameters\fP
.RS 4
\fIctx\fP the EVP_CIPHER_CTX to get the mode from
.RE
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
the mode for an EVP_CIPHER_CTX\&.
.RE
@@ -574,7 +568,7 @@ the mode for an EVP_CIPHER_CTX\&.
.SS "void EVP_CIPHER_CTX_set_app_data (EVP_CIPHER_CTX * ctx, void * data)"
Set the app data for an EVP_CIPHER_CTX context\&.
.PP
-\fBParameters:\fP
+\fBParameters\fP
.RS 4
\fIctx\fP the EVP_CIPHER_CTX to set the app data for
.br
@@ -585,14 +579,14 @@ Set the app data for an EVP_CIPHER_CTX context\&.
.SS "int EVP_CIPHER_CTX_set_key_length (EVP_CIPHER_CTX * c, int length)"
If the cipher type supports it, change the key length
.PP
-\fBParameters:\fP
+\fBParameters\fP
.RS 4
\fIc\fP the cipher context to change the key length for
.br
\fIlength\fP new key length
.RE
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
1 on success\&.
.RE
@@ -601,43 +595,43 @@ If the cipher type supports it, change the key length
.SS "size_t EVP_CIPHER_iv_length (const EVP_CIPHER * c)"
Return the IV size of the cipher\&.
.PP
-\fBParameters:\fP
+\fBParameters\fP
.RS 4
\fIc\fP cipher to get the IV size from\&.
.RE
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
the IV size of the cipher\&.
.RE
.PP
.PP
-\fBExamples: \fP
+\fBExamples\fP
.in +1c
\fBexample_evp_cipher\&.c\fP\&.
.SS "size_t EVP_CIPHER_key_length (const EVP_CIPHER * c)"
Return the key size of the cipher\&.
.PP
-\fBParameters:\fP
+\fBParameters\fP
.RS 4
\fIc\fP cipher to get the key size from\&.
.RE
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
the key size of the cipher\&.
.RE
.PP
.PP
-\fBExamples: \fP
+\fBExamples\fP
.in +1c
\fBexample_evp_cipher\&.c\fP\&.
.SS "int EVP_CipherFinal_ex (EVP_CIPHER_CTX * ctx, void * out, int * outlen)"
Encipher/decipher final data
.PP
-\fBParameters:\fP
+\fBParameters\fP
.RS 4
\fIctx\fP the cipher context\&.
.br
@@ -650,20 +644,20 @@ The input length needs to be at least \fBEVP_CIPHER_block_size()\fP bytes long\&
.PP
See \fBEVP Cipher\fP for an example how to use this function\&.
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
1 on success\&.
.RE
.PP
.PP
-\fBExamples: \fP
+\fBExamples\fP
.in +1c
\fBexample_evp_cipher\&.c\fP\&.
.SS "int EVP_CipherInit_ex (EVP_CIPHER_CTX * ctx, const EVP_CIPHER * c, ENGINE * engine, const void * key, const void * iv, int encp)"
Initiate the EVP_CIPHER_CTX context to encrypt or decrypt data\&. Clean up with \fBEVP_CIPHER_CTX_cleanup()\fP\&.
.PP
-\fBParameters:\fP
+\fBParameters\fP
.RS 4
\fIctx\fP context to initiate
.br
@@ -678,20 +672,20 @@ Initiate the EVP_CIPHER_CTX context to encrypt or decrypt data\&. Clean up with
\fIencp\fP non zero will encrypt, -1 use the previous value\&.
.RE
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
1 on success\&.
.RE
.PP
.PP
-\fBExamples: \fP
+\fBExamples\fP
.in +1c
\fBexample_evp_cipher\&.c\fP\&.
.SS "int EVP_CipherUpdate (EVP_CIPHER_CTX * ctx, void * out, int * outlen, void * in, size_t inlen)"
Encipher/decipher partial data
.PP
-\fBParameters:\fP
+\fBParameters\fP
.RS 4
\fIctx\fP the cipher context\&.
.br
@@ -708,20 +702,20 @@ The output buffer length should at least be \fBEVP_CIPHER_block_size()\fP byte l
.PP
See \fBEVP Cipher\fP for an example how to use this function\&.
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
1 on success\&.
.RE
.PP
If there in no spare bytes in the left from last Update and the input length is on the block boundery, the \fBEVP_CipherUpdate()\fP function can take a shortcut (and preformance gain) and directly encrypt the data, otherwise we hav to fix it up and store extra it the EVP_CIPHER_CTX\&.
.PP
-\fBExamples: \fP
+\fBExamples\fP
.in +1c
\fBexample_evp_cipher\&.c\fP\&.
.SS "const EVP_CIPHER* EVP_des_cbc (void)"
The DES cipher type
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
the DES-CBC EVP_CIPHER pointer\&.
.RE
@@ -730,7 +724,7 @@ the DES-CBC EVP_CIPHER pointer\&.
.SS "const EVP_CIPHER* EVP_des_ede3_cbc (void)"
The triple DES cipher type
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
the DES-EDE3-CBC EVP_CIPHER pointer\&.
.RE
@@ -739,7 +733,7 @@ the DES-EDE3-CBC EVP_CIPHER pointer\&.
.SS "int EVP_Digest (const void * data, size_t dsize, void * hash, unsigned int * hsize, const EVP_MD * md, ENGINE * engine)"
Do the whole \fBEVP_MD_CTX_create()\fP, \fBEVP_DigestInit_ex()\fP, \fBEVP_DigestUpdate()\fP, \fBEVP_DigestFinal_ex()\fP, \fBEVP_MD_CTX_destroy()\fP dance in one call\&.
.PP
-\fBParameters:\fP
+\fBParameters\fP
.RS 4
\fIdata\fP the data to update the context with
.br
@@ -754,7 +748,7 @@ Do the whole \fBEVP_MD_CTX_create()\fP, \fBEVP_DigestInit_ex()\fP, \fBEVP_Digest
\fIengine\fP engine to use, NULL for default engine\&.
.RE
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
1 on success\&.
.RE
@@ -763,7 +757,7 @@ Do the whole \fBEVP_MD_CTX_create()\fP, \fBEVP_DigestInit_ex()\fP, \fBEVP_Digest
.SS "int EVP_DigestFinal_ex (EVP_MD_CTX * ctx, void * hash, unsigned int * size)"
Complete the message digest\&.
.PP
-\fBParameters:\fP
+\fBParameters\fP
.RS 4
\fIctx\fP the context to complete\&.
.br
@@ -772,7 +766,7 @@ Complete the message digest\&.
\fIsize\fP the output size of hash\&.
.RE
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
1 on success\&.
.RE
@@ -781,7 +775,7 @@ Complete the message digest\&.
.SS "int EVP_DigestInit_ex (EVP_MD_CTX * ctx, const EVP_MD * md, ENGINE * engine)"
Init a EVP_MD_CTX for use a specific message digest and engine\&.
.PP
-\fBParameters:\fP
+\fBParameters\fP
.RS 4
\fIctx\fP the message digest context to init\&.
.br
@@ -790,7 +784,7 @@ Init a EVP_MD_CTX for use a specific message digest and engine\&.
\fIengine\fP the engine to use, NULL to use the default engine\&.
.RE
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
1 on success\&.
.RE
@@ -799,7 +793,7 @@ Init a EVP_MD_CTX for use a specific message digest and engine\&.
.SS "int EVP_DigestUpdate (EVP_MD_CTX * ctx, const void * data, size_t size)"
Update the digest with some data\&.
.PP
-\fBParameters:\fP
+\fBParameters\fP
.RS 4
\fIctx\fP the context to update
.br
@@ -808,7 +802,7 @@ Update the digest with some data\&.
\fIsize\fP length of data
.RE
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
1 on success\&.
.RE
@@ -817,7 +811,7 @@ Update the digest with some data\&.
.SS "const EVP_CIPHER* EVP_enc_null (void)"
The NULL cipher type, does no encryption/decryption\&.
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
the null EVP_CIPHER pointer\&.
.RE
@@ -826,12 +820,12 @@ the null EVP_CIPHER pointer\&.
.SS "const EVP_CIPHER* EVP_get_cipherbyname (const char * name)"
Get the cipher type using their name\&.
.PP
-\fBParameters:\fP
+\fBParameters\fP
.RS 4
\fIname\fP the name of the cipher\&.
.RE
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
the selected EVP_CIPHER pointer or NULL if not found\&.
.RE
@@ -840,7 +834,7 @@ the selected EVP_CIPHER pointer or NULL if not found\&.
.SS "const EVP_CIPHER* EVP_hcrypto_aes_128_cbc (void)"
The AES-128 cipher type (hcrypto)
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
the AES-128 EVP_CIPHER pointer\&.
.RE
@@ -849,7 +843,7 @@ the AES-128 EVP_CIPHER pointer\&.
.SS "const EVP_CIPHER* EVP_hcrypto_aes_128_cfb8 (void)"
The AES-128 CFB8 cipher type (hcrypto)
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
the AES-128 EVP_CIPHER pointer\&.
.RE
@@ -858,7 +852,7 @@ the AES-128 EVP_CIPHER pointer\&.
.SS "const EVP_CIPHER* EVP_hcrypto_aes_192_cbc (void)"
The AES-192 cipher type (hcrypto)
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
the AES-192 EVP_CIPHER pointer\&.
.RE
@@ -867,7 +861,7 @@ the AES-192 EVP_CIPHER pointer\&.
.SS "const EVP_CIPHER* EVP_hcrypto_aes_192_cfb8 (void)"
The AES-192 CFB8 cipher type (hcrypto)
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
the AES-192 EVP_CIPHER pointer\&.
.RE
@@ -876,7 +870,7 @@ the AES-192 EVP_CIPHER pointer\&.
.SS "const EVP_CIPHER* EVP_hcrypto_aes_256_cbc (void)"
The AES-256 cipher type (hcrypto)
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
the AES-256 EVP_CIPHER pointer\&.
.RE
@@ -885,7 +879,7 @@ the AES-256 EVP_CIPHER pointer\&.
.SS "const EVP_CIPHER* EVP_hcrypto_aes_256_cfb8 (void)"
The AES-256 CFB8 cipher type (hcrypto)
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
the AES-256 EVP_CIPHER pointer\&.
.RE
@@ -894,7 +888,7 @@ the AES-256 EVP_CIPHER pointer\&.
.SS "const EVP_CIPHER* EVP_hcrypto_camellia_128_cbc (void)"
The Camellia-128 cipher type - hcrypto
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
the Camellia-128 EVP_CIPHER pointer\&.
.RE
@@ -903,7 +897,7 @@ the Camellia-128 EVP_CIPHER pointer\&.
.SS "const EVP_CIPHER* EVP_hcrypto_camellia_192_cbc (void)"
The Camellia-198 cipher type - hcrypto
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
the Camellia-198 EVP_CIPHER pointer\&.
.RE
@@ -912,7 +906,7 @@ the Camellia-198 EVP_CIPHER pointer\&.
.SS "const EVP_CIPHER* EVP_hcrypto_camellia_256_cbc (void)"
The Camellia-256 cipher type - hcrypto
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
the Camellia-256 EVP_CIPHER pointer\&.
.RE
@@ -921,7 +915,7 @@ the Camellia-256 EVP_CIPHER pointer\&.
.SS "const EVP_CIPHER* EVP_hcrypto_des_cbc (void)"
The DES cipher type
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
the DES-CBC EVP_CIPHER pointer\&.
.RE
@@ -930,25 +924,16 @@ the DES-CBC EVP_CIPHER pointer\&.
.SS "const EVP_CIPHER* EVP_hcrypto_des_ede3_cbc (void)"
The triple DES cipher type - hcrypto
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
the DES-EDE3-CBC EVP_CIPHER pointer\&.
.RE
.PP
-.SS "const EVP_MD* EVP_hcrypto_md2 (void)"
-The message digest MD2 - hcrypto
-.PP
-\fBReturns:\fP
-.RS 4
-the message digest type\&.
-.RE
-.PP
-
.SS "const EVP_MD* EVP_hcrypto_md4 (void)"
The message digest MD4 - hcrypto
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
the message digest type\&.
.RE
@@ -957,7 +942,7 @@ the message digest type\&.
.SS "const EVP_MD* EVP_hcrypto_md5 (void)"
The message digest MD5 - hcrypto
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
the message digest type\&.
.RE
@@ -966,7 +951,7 @@ the message digest type\&.
.SS "const EVP_CIPHER* EVP_hcrypto_rc2_40_cbc (void)"
The RC2-40 cipher type
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
the RC2-40 EVP_CIPHER pointer\&.
.RE
@@ -975,7 +960,7 @@ the RC2-40 EVP_CIPHER pointer\&.
.SS "const EVP_CIPHER* EVP_hcrypto_rc2_64_cbc (void)"
The RC2-64 cipher type
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
the RC2-64 EVP_CIPHER pointer\&.
.RE
@@ -984,7 +969,7 @@ the RC2-64 EVP_CIPHER pointer\&.
.SS "const EVP_CIPHER* EVP_hcrypto_rc2_cbc (void)"
The RC2 cipher type - hcrypto
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
the RC2 EVP_CIPHER pointer\&.
.RE
@@ -993,7 +978,7 @@ the RC2 EVP_CIPHER pointer\&.
.SS "const EVP_MD* EVP_hcrypto_sha1 (void)"
The message digest SHA1 - hcrypto
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
the message digest type\&.
.RE
@@ -1002,7 +987,7 @@ the message digest type\&.
.SS "const EVP_MD* EVP_hcrypto_sha256 (void)"
The message digest SHA256 - hcrypto
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
the message digest type\&.
.RE
@@ -1011,7 +996,7 @@ the message digest type\&.
.SS "const EVP_MD* EVP_hcrypto_sha384 (void)"
The message digest SHA384 - hcrypto
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
the message digest type\&.
.RE
@@ -1020,16 +1005,7 @@ the message digest type\&.
.SS "const EVP_MD* EVP_hcrypto_sha512 (void)"
The message digest SHA512 - hcrypto
.PP
-\fBReturns:\fP
-.RS 4
-the message digest type\&.
-.RE
-.PP
-
-.SS "const EVP_MD* EVP_md2 (void)"
-The message digest MD2
-.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
the message digest type\&.
.RE
@@ -1038,7 +1014,7 @@ the message digest type\&.
.SS "const EVP_MD* EVP_md4 (void)"
The message digest MD4
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
the message digest type\&.
.RE
@@ -1047,7 +1023,7 @@ the message digest type\&.
.SS "const EVP_MD* EVP_md5 (void)"
The message digest MD5
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
the message digest type\&.
.RE
@@ -1056,12 +1032,12 @@ the message digest type\&.
.SS "size_t EVP_MD_block_size (const EVP_MD * md)"
Return the blocksize of the message digest function\&.
.PP
-\fBParameters:\fP
+\fBParameters\fP
.RS 4
\fImd\fP the evp message
.RE
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
size size of the message digest block size
.RE
@@ -1070,12 +1046,12 @@ size size of the message digest block size
.SS "size_t EVP_MD_CTX_block_size (EVP_MD_CTX * ctx)"
Return the blocksize of the message digest function\&.
.PP
-\fBParameters:\fP
+\fBParameters\fP
.RS 4
\fIctx\fP the evp message digest context
.RE
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
size size of the message digest block size
.RE
@@ -1084,12 +1060,12 @@ size size of the message digest block size
.SS "int EVP_MD_CTX_cleanup (EVP_MD_CTX * ctx)"
Free the resources used by the EVP_MD context\&.
.PP
-\fBParameters:\fP
+\fBParameters\fP
.RS 4
\fIctx\fP the context to free the resources from\&.
.RE
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
1 on success\&.
.RE
@@ -1098,7 +1074,7 @@ Free the resources used by the EVP_MD context\&.
.SS "EVP_MD_CTX* EVP_MD_CTX_create (void)"
Allocate a messsage digest context object\&. Free with \fBEVP_MD_CTX_destroy()\fP\&.
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
a newly allocated message digest context object\&.
.RE
@@ -1107,7 +1083,7 @@ a newly allocated message digest context object\&.
.SS "void EVP_MD_CTX_destroy (EVP_MD_CTX * ctx)"
Free a messsage digest context object\&.
.PP
-\fBParameters:\fP
+\fBParameters\fP
.RS 4
\fIctx\fP context to free\&.
.RE
@@ -1116,7 +1092,7 @@ Free a messsage digest context object\&.
.SS "void EVP_MD_CTX_init (EVP_MD_CTX * ctx)"
Initiate a messsage digest context object\&. Deallocate with \fBEVP_MD_CTX_cleanup()\fP\&. Please use \fBEVP_MD_CTX_create()\fP instead\&.
.PP
-\fBParameters:\fP
+\fBParameters\fP
.RS 4
\fIctx\fP variable to initiate\&.
.RE
@@ -1125,12 +1101,12 @@ Initiate a messsage digest context object\&. Deallocate with \fBEVP_MD_CTX_clean
.SS "const EVP_MD* EVP_MD_CTX_md (EVP_MD_CTX * ctx)"
Get the EVP_MD use for a specified context\&.
.PP
-\fBParameters:\fP
+\fBParameters\fP
.RS 4
\fIctx\fP the EVP_MD context to get the EVP_MD for\&.
.RE
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
the EVP_MD used for the context\&.
.RE
@@ -1139,12 +1115,12 @@ the EVP_MD used for the context\&.
.SS "size_t EVP_MD_CTX_size (EVP_MD_CTX * ctx)"
Return the output size of the message digest function\&.
.PP
-\fBParameters:\fP
+\fBParameters\fP
.RS 4
\fIctx\fP the evp message digest context
.RE
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
size output size of the message digest function\&.
.RE
@@ -1153,7 +1129,7 @@ size output size of the message digest function\&.
.SS "const EVP_MD* EVP_md_null (void)"
The null message digest
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
the message digest type\&.
.RE
@@ -1162,12 +1138,12 @@ the message digest type\&.
.SS "size_t EVP_MD_size (const EVP_MD * md)"
Return the output size of the message digest function\&.
.PP
-\fBParameters:\fP
+\fBParameters\fP
.RS 4
\fImd\fP the evp message
.RE
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
size output size of the message digest function\&.
.RE
@@ -1176,7 +1152,7 @@ size output size of the message digest function\&.
.SS "const EVP_CIPHER* EVP_rc2_40_cbc (void)"
The RC2 cipher type
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
the RC2 EVP_CIPHER pointer\&.
.RE
@@ -1185,7 +1161,7 @@ the RC2 EVP_CIPHER pointer\&.
.SS "const EVP_CIPHER* EVP_rc2_64_cbc (void)"
The RC2 cipher type
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
the RC2 EVP_CIPHER pointer\&.
.RE
@@ -1194,7 +1170,7 @@ the RC2 EVP_CIPHER pointer\&.
.SS "const EVP_CIPHER* EVP_rc2_cbc (void)"
The RC2 cipher type
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
the RC2 EVP_CIPHER pointer\&.
.RE
@@ -1203,7 +1179,7 @@ the RC2 EVP_CIPHER pointer\&.
.SS "const EVP_CIPHER* EVP_rc4 (void)"
The RC4 cipher type
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
the RC4 EVP_CIPHER pointer\&.
.RE
@@ -1212,7 +1188,7 @@ the RC4 EVP_CIPHER pointer\&.
.SS "const EVP_CIPHER* EVP_rc4_40 (void)"
The RC4-40 cipher type
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
the RC4-40 EVP_CIPHER pointer\&.
.RE
@@ -1221,7 +1197,7 @@ the RC4-40 EVP_CIPHER pointer\&.
.SS "const EVP_MD* EVP_sha (void)"
The message digest SHA1
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
the message digest type\&.
.RE
@@ -1230,7 +1206,7 @@ the message digest type\&.
.SS "const EVP_MD* EVP_sha1 (void)"
The message digest SHA1
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
the message digest type\&.
.RE
@@ -1239,7 +1215,7 @@ the message digest type\&.
.SS "const EVP_MD* EVP_sha256 (void)"
The message digest SHA256
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
the message digest type\&.
.RE
@@ -1248,7 +1224,7 @@ the message digest type\&.
.SS "const EVP_MD* EVP_sha384 (void)"
The message digest SHA384
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
the message digest type\&.
.RE
@@ -1257,7 +1233,7 @@ the message digest type\&.
.SS "const EVP_MD* EVP_sha512 (void)"
The message digest SHA512
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
the message digest type\&.
.RE
@@ -1266,16 +1242,33 @@ the message digest type\&.
.SS "const EVP_CIPHER* EVP_wincrypt_des_ede3_cbc (void)"
The triple DES cipher type (Micrsoft crypt provider)
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
the DES-EDE3-CBC EVP_CIPHER pointer\&.
.RE
.PP
+.SS "hc_EVP_CIPH_CBC_MODE OSSL_CIPHER_ALGORITHM (rc2_64_cbc, hc_EVP_CIPH_CBC_MODE| hc_EVP_CIPH_VARIABLE_LENGTH)"
+The RC2-64 cipher type - OpenSSL
+.PP
+\fBReturns\fP
+.RS 4
+the RC2-64 EVP_CIPHER pointer\&. The Camellia-128 cipher type - OpenSSL
+.PP
+the Camellia-128 EVP_CIPHER pointer\&. The Camellia-198 cipher type - OpenSSL
+.PP
+the Camellia-198 EVP_CIPHER pointer\&. The Camellia-256 cipher type - OpenSSL
+.PP
+the Camellia-256 EVP_CIPHER pointer\&. The RC4 cipher type (OpenSSL provider)
+.PP
+the RC4 EVP_CIPHER pointer\&.
+.RE
+.PP
+
.SS "OSSL_CIPHER_ALGORITHM (rc2_cbc, hc_EVP_CIPH_CBC_MODE| hc_EVP_CIPH_VARIABLE_LENGTH)"
The triple DES cipher type (OpenSSL provider)
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
the DES-EDE3-CBC EVP_CIPHER pointer\&. The DES cipher type (OpenSSL provider)
.PP
@@ -1299,108 +1292,82 @@ the RC2-40 EVP_CIPHER pointer\&.
.RE
.PP
-.SS "hc_EVP_CIPH_CBC_MODE OSSL_CIPHER_ALGORITHM (rc2_64_cbc, hc_EVP_CIPH_CBC_MODE| hc_EVP_CIPH_VARIABLE_LENGTH)"
-The RC2-64 cipher type - OpenSSL
-.PP
-\fBReturns:\fP
-.RS 4
-the RC2-64 EVP_CIPHER pointer\&. The Camellia-128 cipher type - OpenSSL
-.PP
-the Camellia-128 EVP_CIPHER pointer\&. The Camellia-198 cipher type - OpenSSL
-.PP
-the Camellia-198 EVP_CIPHER pointer\&. The Camellia-256 cipher type - OpenSSL
-.PP
-the Camellia-256 EVP_CIPHER pointer\&. The RC4 cipher type (OpenSSL provider)
-.PP
-the RC4 EVP_CIPHER pointer\&.
-.RE
-.PP
-
-.SS "WINCNG_CIPHER_ALGORITHM (des_ede3_cbc, BCRYPT_3DES_ALGORITHM, 8, 24, 8, EVP_CIPH_CBC_MODE)"
-The triple DES cipher type (Windows CNG provider)
-.PP
-\fBReturns:\fP
-.RS 4
-the DES-EDE3-CBC EVP_CIPHER pointer\&.
-.RE
-.PP
-
-.SS "WINCNG_CIPHER_ALGORITHM (des_cbc, BCRYPT_DES_ALGORITHM, 8, 8, 8, EVP_CIPH_CBC_MODE)"
-The DES cipher type (Windows CNG provider)
+.SS "WINCNG_CIPHER_ALGORITHM (aes_128_cbc, BCRYPT_AES_ALGORITHM, 16, 16, 16, EVP_CIPH_CBC_MODE)"
+The AES-128 cipher type (Windows CNG provider)
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
-the DES-CBC EVP_CIPHER pointer\&.
+the AES-128-CBC EVP_CIPHER pointer\&.
.RE
.PP
-.SS "WINCNG_CIPHER_ALGORITHM (aes_128_cbc, BCRYPT_AES_ALGORITHM, 16, 16, 16, EVP_CIPH_CBC_MODE)"
-The AES-128 cipher type (Windows CNG provider)
+.SS "WINCNG_CIPHER_ALGORITHM (aes_128_cfb8, BCRYPT_AES_ALGORITHM, 16, 16, 16, EVP_CIPH_CFB8_MODE)"
+The AES-128 CFB8 cipher type (Windows CNG provider)
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
-the AES-128-CBC EVP_CIPHER pointer\&.
+the AES-128-CFB8 EVP_CIPHER pointer\&.
.RE
.PP
.SS "WINCNG_CIPHER_ALGORITHM (aes_192_cbc, BCRYPT_AES_ALGORITHM, 16, 24, 16, EVP_CIPH_CBC_MODE)"
The AES-192 cipher type (Windows CNG provider)
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
the AES-192-CBC EVP_CIPHER pointer\&.
.RE
.PP
-.SS "WINCNG_CIPHER_ALGORITHM (aes_256_cbc, BCRYPT_AES_ALGORITHM, 16, 32, 16, EVP_CIPH_CBC_MODE)"
-The AES-256 cipher type (Windows CNG provider)
+.SS "WINCNG_CIPHER_ALGORITHM (aes_192_cfb8, BCRYPT_AES_ALGORITHM, 16, 24, 16, EVP_CIPH_CFB8_MODE)"
+The AES-192 CFB8 cipher type (Windows CNG provider)
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
-the AES-256-CBC EVP_CIPHER pointer\&.
+the AES-192-CFB8 EVP_CIPHER pointer\&.
.RE
.PP
-.SS "WINCNG_CIPHER_ALGORITHM (aes_128_cfb8, BCRYPT_AES_ALGORITHM, 16, 16, 16, EVP_CIPH_CFB8_MODE)"
-The AES-128 CFB8 cipher type (Windows CNG provider)
+.SS "WINCNG_CIPHER_ALGORITHM (aes_256_cbc, BCRYPT_AES_ALGORITHM, 16, 32, 16, EVP_CIPH_CBC_MODE)"
+The AES-256 cipher type (Windows CNG provider)
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
-the AES-128-CFB8 EVP_CIPHER pointer\&.
+the AES-256-CBC EVP_CIPHER pointer\&.
.RE
.PP
-.SS "WINCNG_CIPHER_ALGORITHM (aes_192_cfb8, BCRYPT_AES_ALGORITHM, 16, 24, 16, EVP_CIPH_CFB8_MODE)"
-The AES-192 CFB8 cipher type (Windows CNG provider)
+.SS "WINCNG_CIPHER_ALGORITHM (aes_256_cfb8, BCRYPT_AES_ALGORITHM, 16, 32, 16, EVP_CIPH_CFB8_MODE)"
+The AES-256 CFB8 cipher type (Windows CNG provider)
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
-the AES-192-CFB8 EVP_CIPHER pointer\&.
+the AES-256-CFB8 EVP_CIPHER pointer\&.
.RE
.PP
-.SS "WINCNG_CIPHER_ALGORITHM (aes_256_cfb8, BCRYPT_AES_ALGORITHM, 16, 32, 16, EVP_CIPH_CFB8_MODE)"
-The AES-256 CFB8 cipher type (Windows CNG provider)
+.SS "WINCNG_CIPHER_ALGORITHM (des_cbc, BCRYPT_DES_ALGORITHM, 8, 8, 8, EVP_CIPH_CBC_MODE)"
+The DES cipher type (Windows CNG provider)
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
-the AES-256-CFB8 EVP_CIPHER pointer\&.
+the DES-CBC EVP_CIPHER pointer\&.
.RE
.PP
-.SS "WINCNG_CIPHER_ALGORITHM (rc2_cbc, BCRYPT_RC2_ALGORITHM, 8, 16, 8, EVP_CIPH_CBC_MODE)"
-The RC2 cipher type - Windows CNG
+.SS "WINCNG_CIPHER_ALGORITHM (des_ede3_cbc, BCRYPT_3DES_ALGORITHM, 8, 24, 8, EVP_CIPH_CBC_MODE)"
+The triple DES cipher type (Windows CNG provider)
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
-the RC2 EVP_CIPHER pointer\&.
+the DES-EDE3-CBC EVP_CIPHER pointer\&.
.RE
.PP
.SS "WINCNG_CIPHER_ALGORITHM (rc2_40_cbc, BCRYPT_RC2_ALGORITHM, 8, 5, 8, EVP_CIPH_CBC_MODE)"
The RC2-40 cipher type - Windows CNG
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
the RC2-40 EVP_CIPHER pointer\&.
.RE
@@ -1409,16 +1376,25 @@ the RC2-40 EVP_CIPHER pointer\&.
.SS "WINCNG_CIPHER_ALGORITHM (rc2_64_cbc, BCRYPT_RC2_ALGORITHM, 8, 8, 8, EVP_CIPH_CBC_MODE)"
The RC2-64 cipher type - Windows CNG
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
the RC2-64 EVP_CIPHER pointer\&.
.RE
.PP
+.SS "WINCNG_CIPHER_ALGORITHM (rc2_cbc, BCRYPT_RC2_ALGORITHM, 8, 16, 8, EVP_CIPH_CBC_MODE)"
+The RC2 cipher type - Windows CNG
+.PP
+\fBReturns\fP
+.RS 4
+the RC2 EVP_CIPHER pointer\&.
+.RE
+.PP
+
.SS "WINCNG_CIPHER_ALGORITHM (rc4, BCRYPT_RC4_ALGORITHM, 1, 16, 0, EVP_CIPH_STREAM_CIPHER| EVP_CIPH_VARIABLE_LENGTH)"
The RC4 cipher type (Windows CNG provider)
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
the RC4 EVP_CIPHER pointer\&.
.RE
@@ -1427,7 +1403,7 @@ the RC4 EVP_CIPHER pointer\&.
.SS "WINCNG_CIPHER_ALGORITHM (rc4_40, BCRYPT_RC4_ALGORITHM, 1, 5, 0, EVP_CIPH_STREAM_CIPHER| EVP_CIPH_VARIABLE_LENGTH)"
The RC4-40 cipher type (Windows CNG provider)
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
the RC4 EVP_CIPHER pointer\&.
.RE
@@ -1436,7 +1412,7 @@ the RC4 EVP_CIPHER pointer\&.
.SS "WINCNG_CIPHER_ALGORITHM_UNAVAILABLE (camellia_128_cbc)"
The Camellia-128 cipher type - CommonCrypto
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
the Camellia-128 EVP_CIPHER pointer\&.
.RE
@@ -1445,7 +1421,7 @@ the Camellia-128 EVP_CIPHER pointer\&.
.SS "WINCNG_CIPHER_ALGORITHM_UNAVAILABLE (camellia_192_cbc)"
The Camellia-198 cipher type - CommonCrypto
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
the Camellia-198 EVP_CIPHER pointer\&.
.RE
@@ -1454,7 +1430,7 @@ the Camellia-198 EVP_CIPHER pointer\&.
.SS "WINCNG_CIPHER_ALGORITHM_UNAVAILABLE (camellia_256_cbc)"
The Camellia-256 cipher type - CommonCrypto
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
the Camellia-256 EVP_CIPHER pointer\&.
.RE
diff --git a/doc/doxyout/hcrypto/man/man3/hcrypto_misc.3 b/doc/doxyout/hcrypto/man/man3/hcrypto_misc.3
index 863971e9d277..46a8fd8f76e9 100644
--- a/doc/doxyout/hcrypto/man/man3/hcrypto_misc.3
+++ b/doc/doxyout/hcrypto/man/man3/hcrypto_misc.3
@@ -1,8 +1,8 @@
-.TH "hcrypto_misc" 3 "Fri Jun 7 2019" "Version 7.7.0" "Heimdal crypto library" \" -*- nroff -*-
+.TH "hcrypto_misc" 3 "Tue Nov 15 2022" "Version 7.8.0" "Heimdal crypto library" \" -*- nroff -*-
.ad l
.nh
.SH NAME
-hcrypto_misc
+hcrypto_misc \- hcrypto miscellaneous functions
.SH SYNOPSIS
.br
.PP
@@ -24,7 +24,7 @@ hcrypto_misc
.SS "int PKCS5_PBKDF2_HMAC (const void * password, size_t password_len, const void * salt, size_t salt_len, unsigned long iter, const EVP_MD * md, size_t keylen, void * key)"
As descriped in PKCS5, convert a password, salt, and iteration counter into a crypto key\&.
.PP
-\fBParameters:\fP
+\fBParameters\fP
.RS 4
\fIpassword\fP Password\&.
.br
@@ -43,7 +43,7 @@ As descriped in PKCS5, convert a password, salt, and iteration counter into a cr
\fIkey\fP the output key\&.
.RE
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
1 on success, non 1 on failure\&.
.RE
@@ -52,7 +52,7 @@ As descriped in PKCS5, convert a password, salt, and iteration counter into a cr
.SS "int PKCS5_PBKDF2_HMAC_SHA1 (const void * password, size_t password_len, const void * salt, size_t salt_len, unsigned long iter, size_t keylen, void * key)"
As descriped in PKCS5, convert a password, salt, and iteration counter into a crypto key\&.
.PP
-\fBParameters:\fP
+\fBParameters\fP
.RS 4
\fIpassword\fP Password\&.
.br
@@ -69,7 +69,7 @@ As descriped in PKCS5, convert a password, salt, and iteration counter into a cr
\fIkey\fP the output key\&.
.RE
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
1 on success, non 1 on failure\&.
.RE
diff --git a/doc/doxyout/hcrypto/man/man3/hcrypto_rand.3 b/doc/doxyout/hcrypto/man/man3/hcrypto_rand.3
index 610f79c9c6a6..918c2e847e56 100644
--- a/doc/doxyout/hcrypto/man/man3/hcrypto_rand.3
+++ b/doc/doxyout/hcrypto/man/man3/hcrypto_rand.3
@@ -1,8 +1,8 @@
-.TH "hcrypto_rand" 3 "Fri Jun 7 2019" "Version 7.7.0" "Heimdal crypto library" \" -*- nroff -*-
+.TH "hcrypto_rand" 3 "Tue Nov 15 2022" "Version 7.8.0" "Heimdal crypto library" \" -*- nroff -*-
.ad l
.nh
.SH NAME
-hcrypto_rand
+hcrypto_rand \- RAND crypto functions
.SH SYNOPSIS
.br
.PP
@@ -54,7 +54,7 @@ See the \fBRAND - random number\fP for description and examples\&.
.SS "void RAND_add (const void * indata, size_t size, double entropi)"
Seed that random number generator\&. Secret material can securely be feed into the function, they will never be returned\&.
.PP
-\fBParameters:\fP
+\fBParameters\fP
.RS 4
\fIindata\fP the input data\&.
.br
@@ -67,14 +67,14 @@ Seed that random number generator\&. Secret material can securely be feed into t
.SS "int RAND_bytes (void * outdata, size_t size)"
Get a random block from the random generator, can be used for key material\&.
.PP
-\fBParameters:\fP
+\fBParameters\fP
.RS 4
\fIoutdata\fP random data
.br
\fIsize\fP length random data
.RE
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
1 on success, 0 on failure\&.
.RE
@@ -85,14 +85,14 @@ Reset and free memory used by the random generator\&.
.SS "const char* RAND_file_name (char * filename, size_t size)"
Return the default random state filename for a user to use for \fBRAND_load_file()\fP, and \fBRAND_write_file()\fP\&.
.PP
-\fBParameters:\fP
+\fBParameters\fP
.RS 4
\fIfilename\fP buffer to hold file name\&.
.br
\fIsize\fP size of buffer filename\&.
.RE
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
the buffer filename or NULL on failure\&.
.RE
@@ -101,7 +101,7 @@ the buffer filename or NULL on failure\&.
.SS "const RAND_METHOD* RAND_get_rand_method (void)"
Get the default random method\&.
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
Returns a RAND_METHOD
.RE
@@ -110,14 +110,14 @@ Returns a RAND_METHOD
.SS "int RAND_load_file (const char * filename, size_t size)"
Load a a file and feed it into \fBRAND_seed()\fP\&.
.PP
-\fBParameters:\fP
+\fBParameters\fP
.RS 4
\fIfilename\fP name of file to read\&.
.br
\fIsize\fP minimum size to read\&.
.RE
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
Returns the number of seed bytes loaded (0 indicates failure)
.RE
@@ -126,14 +126,14 @@ Returns the number of seed bytes loaded (0 indicates failure)
.SS "int RAND_pseudo_bytes (void * outdata, size_t size)"
Get a random block from the random generator, should NOT be used for key material\&.
.PP
-\fBParameters:\fP
+\fBParameters\fP
.RS 4
\fIoutdata\fP random data
.br
\fIsize\fP length random data
.RE
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
1 on success, 0 on failure\&.
.RE
@@ -142,7 +142,7 @@ Get a random block from the random generator, should NOT be used for key materia
.SS "void RAND_seed (const void * indata, size_t size)"
Seed that random number generator\&. Secret material can securely be feed into the function, they will never be returned\&.
.PP
-\fBParameters:\fP
+\fBParameters\fP
.RS 4
\fIindata\fP seed data
.br
@@ -153,12 +153,12 @@ Seed that random number generator\&. Secret material can securely be feed into t
.SS "int RAND_set_rand_engine (ENGINE * engine)"
Set the default random method from engine\&.
.PP
-\fBParameters:\fP
+\fBParameters\fP
.RS 4
\fIengine\fP use engine, if NULL is passed it, old method and engine is cleared\&.
.RE
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
1 on success, 0 on failure\&.
.RE
@@ -167,12 +167,12 @@ Set the default random method from engine\&.
.SS "int RAND_set_rand_method (const RAND_METHOD * meth)"
Set the default random method\&.
.PP
-\fBParameters:\fP
+\fBParameters\fP
.RS 4
\fImeth\fP set the new default method\&.
.RE
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
1 on success\&.
.RE
@@ -181,7 +181,7 @@ Set the default random method\&.
.SS "int RAND_status (void)"
Return status of the random generator
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
1 if the random generator can deliver random data\&.
.RE
@@ -190,12 +190,12 @@ Return status of the random generator
.SS "int RAND_write_file (const char * filename)"
Write of random numbers to a file to store for later initiation with \fBRAND_load_file()\fP\&.
.PP
-\fBParameters:\fP
+\fBParameters\fP
.RS 4
\fIfilename\fP name of file to write\&.
.RE
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
1 on success and non-one on failure\&.
.RE
diff --git a/doc/doxyout/hcrypto/man/man3/hcrypto_rsa.3 b/doc/doxyout/hcrypto/man/man3/hcrypto_rsa.3
index 5fa2c5cd36a9..f7636b277ea3 100644
--- a/doc/doxyout/hcrypto/man/man3/hcrypto_rsa.3
+++ b/doc/doxyout/hcrypto/man/man3/hcrypto_rsa.3
@@ -1,8 +1,8 @@
-.TH "hcrypto_rsa" 3 "Fri Jun 7 2019" "Version 7.7.0" "Heimdal crypto library" \" -*- nroff -*-
+.TH "hcrypto_rsa" 3 "Tue Nov 15 2022" "Version 7.8.0" "Heimdal crypto library" \" -*- nroff -*-
.ad l
.nh
.SH NAME
-hcrypto_rsa
+hcrypto_rsa \- RSA functions
.SH SYNOPSIS
.br
.PP
@@ -42,7 +42,7 @@ See the \fBRSA - public-key cryptography\fP for description and examples\&.
.SS "void RSA_free (RSA * rsa)"
Free an allocation RSA object\&.
.PP
-\fBParameters:\fP
+\fBParameters\fP
.RS 4
\fIrsa\fP the RSA object to free\&.
.RE
@@ -51,12 +51,12 @@ Free an allocation RSA object\&.
.SS "void* RSA_get_app_data (const RSA * rsa)"
Get the application data for the RSA object\&.
.PP
-\fBParameters:\fP
+\fBParameters\fP
.RS 4
\fIrsa\fP the rsa object to get the parameter for
.RE
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
the data object
.RE
@@ -65,12 +65,12 @@ the data object
.SS "const RSA_METHOD* RSA_get_method (const RSA * rsa)"
Return the RSA_METHOD used for this RSA object\&.
.PP
-\fBParameters:\fP
+\fBParameters\fP
.RS 4
\fIrsa\fP the object to get the method from\&.
.RE
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
the method used for this RSA object\&.
.RE
@@ -79,7 +79,7 @@ the method used for this RSA object\&.
.SS "RSA* RSA_new (void)"
Same as \fBRSA_new_method()\fP using NULL as engine\&.
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
a newly allocated RSA object\&. Free with \fBRSA_free()\fP\&.
.RE
@@ -88,12 +88,12 @@ a newly allocated RSA object\&. Free with \fBRSA_free()\fP\&.
.SS "RSA* RSA_new_method (ENGINE * engine)"
Allocate a new RSA object using the engine, if NULL is specified as the engine, use the default RSA engine as returned by ENGINE_get_default_RSA()\&.
.PP
-\fBParameters:\fP
+\fBParameters\fP
.RS 4
\fIengine\fP Specific what ENGINE RSA provider should be used\&.
.RE
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
a newly allocated RSA object\&. Free with \fBRSA_free()\fP\&.
.RE
@@ -102,14 +102,14 @@ a newly allocated RSA object\&. Free with \fBRSA_free()\fP\&.
.SS "int RSA_set_app_data (RSA * rsa, void * arg)"
Set the application data for the RSA object\&.
.PP
-\fBParameters:\fP
+\fBParameters\fP
.RS 4
\fIrsa\fP the rsa object to set the parameter for
.br
\fIarg\fP the data object to store
.RE
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
1 on success\&.
.RE
@@ -118,14 +118,14 @@ Set the application data for the RSA object\&.
.SS "int RSA_set_method (RSA * rsa, const RSA_METHOD * method)"
Set a new method for the RSA keypair\&.
.PP
-\fBParameters:\fP
+\fBParameters\fP
.RS 4
\fIrsa\fP rsa parameter\&.
.br
\fImethod\fP the new method for the RSA parameter\&.
.RE
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
1 on success\&.
.RE
@@ -134,12 +134,12 @@ Set a new method for the RSA keypair\&.
.SS "int RSA_up_ref (RSA * rsa)"
Add an extra reference to the RSA object\&. The object should be free with \fBRSA_free()\fP to drop the reference\&.
.PP
-\fBParameters:\fP
+\fBParameters\fP
.RS 4
\fIrsa\fP the object to add reference counting too\&.
.RE
.PP
-\fBReturns:\fP
+\fBReturns\fP
.RS 4
the current reference count, can't safely be used except for debug printing\&.
.RE
diff --git a/doc/doxyout/hcrypto/man/man3/page_des.3 b/doc/doxyout/hcrypto/man/man3/page_des.3
index bf532f7b5578..74203517a210 100644
--- a/doc/doxyout/hcrypto/man/man3/page_des.3
+++ b/doc/doxyout/hcrypto/man/man3/page_des.3
@@ -1,9 +1,9 @@
-.TH "page_des" 3 "Fri Jun 7 2019" "Version 7.7.0" "Heimdal crypto library" \" -*- nroff -*-
+.TH "page_des" 3 "Tue Nov 15 2022" "Version 7.8.0" "Heimdal crypto library" \" -*- nroff -*-
.ad l
.nh
.SH NAME
-page_desDES - Data Encryption Standard crypto interface
- \- See the library functions here: \fBDES crypto functions\fP
+page_des \- DES - Data Encryption Standard crypto interface
+See the library functions here: \fBDES crypto functions\fP
.PP
DES was created by IBM, modififed by NSA and then adopted by NBS (now NIST) and published ad FIPS PUB 46 (updated by FIPS 46-1)\&.
.PP
diff --git a/doc/doxyout/hcrypto/man/man3/page_dh.3 b/doc/doxyout/hcrypto/man/man3/page_dh.3
index 9828a495c95d..2c83f159edf0 100644
--- a/doc/doxyout/hcrypto/man/man3/page_dh.3
+++ b/doc/doxyout/hcrypto/man/man3/page_dh.3
@@ -1,9 +1,9 @@
-.TH "page_dh" 3 "Fri Jun 7 2019" "Version 7.7.0" "Heimdal crypto library" \" -*- nroff -*-
+.TH "page_dh" 3 "Tue Nov 15 2022" "Version 7.8.0" "Heimdal crypto library" \" -*- nroff -*-
.ad l
.nh
.SH NAME
-page_dhDH - Diffie-Hellman key exchange
- \- Diffie-Hellman key exchange is a protocol that allows two parties to establish a shared secret key\&.
+page_dh \- DH - Diffie-Hellman key exchange
+Diffie-Hellman key exchange is a protocol that allows two parties to establish a shared secret key\&.
.PP
Include and example how to use \fBDH_new()\fP and friends here\&.
.PP
diff --git a/doc/doxyout/hcrypto/man/man3/page_evp.3 b/doc/doxyout/hcrypto/man/man3/page_evp.3
index f152be1b4da1..45bf8d6272f3 100644
--- a/doc/doxyout/hcrypto/man/man3/page_evp.3
+++ b/doc/doxyout/hcrypto/man/man3/page_evp.3
@@ -1,9 +1,9 @@
-.TH "page_evp" 3 "Fri Jun 7 2019" "Version 7.7.0" "Heimdal crypto library" \" -*- nroff -*-
+.TH "page_evp" 3 "Tue Nov 15 2022" "Version 7.8.0" "Heimdal crypto library" \" -*- nroff -*-
.ad l
.nh
.SH NAME
-page_evpEVP - generic crypto interface
- \- See the library functions here: \fBEVP generic crypto functions\fP
+page_evp \- EVP - generic crypto interface
+See the library functions here: \fBEVP generic crypto functions\fP
.SH "EVP Cipher"
.PP
The use of \fBEVP_CipherInit_ex()\fP and EVP_Cipher() is pretty easy to understand forward, then \fBEVP_CipherUpdate()\fP and \fBEVP_CipherFinal_ex()\fP really needs an example to explain \fBexample_evp_cipher\&.c\fP \&.
diff --git a/doc/doxyout/hcrypto/man/man3/page_rand.3 b/doc/doxyout/hcrypto/man/man3/page_rand.3
index fd66b5341cde..8ad6111f403e 100644
--- a/doc/doxyout/hcrypto/man/man3/page_rand.3
+++ b/doc/doxyout/hcrypto/man/man3/page_rand.3
@@ -1,6 +1,6 @@
-.TH "page_rand" 3 "Fri Jun 7 2019" "Version 7.7.0" "Heimdal crypto library" \" -*- nroff -*-
+.TH "page_rand" 3 "Tue Nov 15 2022" "Version 7.8.0" "Heimdal crypto library" \" -*- nroff -*-
.ad l
.nh
.SH NAME
-page_randRAND - random number
- \- See the library functions here: \fBRAND crypto functions\fP
+page_rand \- RAND - random number
+See the library functions here: \fBRAND crypto functions\fP
diff --git a/doc/doxyout/hcrypto/man/man3/page_rsa.3 b/doc/doxyout/hcrypto/man/man3/page_rsa.3
index c8372abb71e5..44e9c7cd7529 100644
--- a/doc/doxyout/hcrypto/man/man3/page_rsa.3
+++ b/doc/doxyout/hcrypto/man/man3/page_rsa.3
@@ -1,14 +1,12 @@
-.TH "page_rsa" 3 "Fri Jun 7 2019" "Version 7.7.0" "Heimdal crypto library" \" -*- nroff -*-
+.TH "page_rsa" 3 "Tue Nov 15 2022" "Version 7.8.0" "Heimdal crypto library" \" -*- nroff -*-
.ad l
.nh
.SH NAME
-page_rsaRSA - public-key cryptography
- \- RSA is named by its inventors (Ron Rivest, Adi Shamir, and Leonard Adleman) (published in 1977), patented expired in 21 September 2000\&.
+page_rsa \- RSA - public-key cryptography
+RSA is named by its inventors (Ron Rivest, Adi Shamir, and Leonard Adleman) (published in 1977), patented expired in 21 September 2000\&.
.PP
Speed for RSA in seconds no key blinding 1000 iteration, same rsa keys (1024 and 2048) operation performed each eteration sign, verify, encrypt, decrypt on a random bit pattern
-.PP
-.SH "name 1024 2048 4098 "
-.PP
+.SH "name 1024 2048 4098"
.PP
gmp: 0\&.73 6\&.60 44\&.80 tfm: 2\&.45 -- -- ltm: 3\&.79 20\&.74 105\&.41 (default in hcrypto) openssl: 4\&.04 11\&.90 82\&.59 cdsa: 15\&.89 102\&.89 721\&.40 imath: 40\&.62 -- --
.PP