diff options
Diffstat (limited to 'doc/doxyout/hcrypto/man')
| -rw-r--r-- | doc/doxyout/hcrypto/man/man3/EVP_hcrypto_md2.3 | 1 | ||||
| -rw-r--r-- | doc/doxyout/hcrypto/man/man3/EVP_md2.3 | 1 | ||||
| -rw-r--r-- | doc/doxyout/hcrypto/man/man3/hcrypto_core.3 | 12 | ||||
| -rw-r--r-- | doc/doxyout/hcrypto/man/man3/hcrypto_des.3 | 56 | ||||
| -rw-r--r-- | doc/doxyout/hcrypto/man/man3/hcrypto_dh.3 | 56 | ||||
| -rw-r--r-- | doc/doxyout/hcrypto/man/man3/hcrypto_evp.3 | 382 | ||||
| -rw-r--r-- | doc/doxyout/hcrypto/man/man3/hcrypto_misc.3 | 12 | ||||
| -rw-r--r-- | doc/doxyout/hcrypto/man/man3/hcrypto_rand.3 | 40 | ||||
| -rw-r--r-- | doc/doxyout/hcrypto/man/man3/hcrypto_rsa.3 | 32 | ||||
| -rw-r--r-- | doc/doxyout/hcrypto/man/man3/page_des.3 | 6 | ||||
| -rw-r--r-- | doc/doxyout/hcrypto/man/man3/page_dh.3 | 6 | ||||
| -rw-r--r-- | doc/doxyout/hcrypto/man/man3/page_evp.3 | 6 | ||||
| -rw-r--r-- | doc/doxyout/hcrypto/man/man3/page_rand.3 | 6 | ||||
| -rw-r--r-- | doc/doxyout/hcrypto/man/man3/page_rsa.3 | 10 |
14 files changed, 299 insertions, 327 deletions
diff --git a/doc/doxyout/hcrypto/man/man3/EVP_hcrypto_md2.3 b/doc/doxyout/hcrypto/man/man3/EVP_hcrypto_md2.3 deleted file mode 100644 index d526f956e4fb..000000000000 --- a/doc/doxyout/hcrypto/man/man3/EVP_hcrypto_md2.3 +++ /dev/null @@ -1 +0,0 @@ -.so man3/hcrypto_evp.3 diff --git a/doc/doxyout/hcrypto/man/man3/EVP_md2.3 b/doc/doxyout/hcrypto/man/man3/EVP_md2.3 deleted file mode 100644 index d526f956e4fb..000000000000 --- a/doc/doxyout/hcrypto/man/man3/EVP_md2.3 +++ /dev/null @@ -1 +0,0 @@ -.so man3/hcrypto_evp.3 diff --git a/doc/doxyout/hcrypto/man/man3/hcrypto_core.3 b/doc/doxyout/hcrypto/man/man3/hcrypto_core.3 index 44c0f7407638..5089d5ee9797 100644 --- a/doc/doxyout/hcrypto/man/man3/hcrypto_core.3 +++ b/doc/doxyout/hcrypto/man/man3/hcrypto_core.3 @@ -1,8 +1,8 @@ -.TH "hcrypto_core" 3 "Fri Jun 7 2019" "Version 7.7.0" "Heimdal crypto library" \" -*- nroff -*- +.TH "hcrypto_core" 3 "Tue Nov 15 2022" "Version 7.8.0" "Heimdal crypto library" \" -*- nroff -*- .ad l .nh .SH NAME -hcrypto_core +hcrypto_core \- hcrypto function controlling behavior .SH SYNOPSIS .br .PP @@ -33,7 +33,7 @@ hcrypto_core .SS "int EVP_CIPHER_CTX_ctrl (EVP_CIPHER_CTX * ctx, int type, int arg, void * data)" Perform a operation on a ctx .PP -\fBParameters:\fP +\fBParameters\fP .RS 4 \fIctx\fP context to perform operation on\&. .br @@ -44,7 +44,7 @@ Perform a operation on a ctx \fIdata\fP addition data to operation\&. .RE .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 1 for success, 0 for failure\&. .RE @@ -53,14 +53,14 @@ Perform a operation on a ctx .SS "int EVP_CIPHER_CTX_rand_key (EVP_CIPHER_CTX * ctx, void * key)" Generate a random key for the specificed EVP_CIPHER\&. .PP -\fBParameters:\fP +\fBParameters\fP .RS 4 \fIctx\fP EVP_CIPHER_CTX type to build the key for\&. .br \fIkey\fP return key, must be at least \fBEVP_CIPHER_key_length()\fP byte long\&. .RE .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 1 for success, 0 for failure\&. .RE diff --git a/doc/doxyout/hcrypto/man/man3/hcrypto_des.3 b/doc/doxyout/hcrypto/man/man3/hcrypto_des.3 index cd3a379dddd6..8c9c8cc4fd9a 100644 --- a/doc/doxyout/hcrypto/man/man3/hcrypto_des.3 +++ b/doc/doxyout/hcrypto/man/man3/hcrypto_des.3 @@ -1,8 +1,8 @@ -.TH "hcrypto_des" 3 "Fri Jun 7 2019" "Version 7.7.0" "Heimdal crypto library" \" -*- nroff -*- +.TH "hcrypto_des" 3 "Tue Nov 15 2022" "Version 7.8.0" "Heimdal crypto library" \" -*- nroff -*- .ad l .nh .SH NAME -hcrypto_des +hcrypto_des \- DES crypto functions .SH SYNOPSIS .br .PP @@ -77,7 +77,7 @@ Crete a checksum using DES in CBC encryption mode\&. This mode is only used for .PP The IV must always be diffrent for diffrent input data blocks\&. .PP -\fBParameters:\fP +\fBParameters\fP .RS 4 \fIin\fP data to checksum .br @@ -96,7 +96,7 @@ Encrypt/decrypt a block using DES in Chain Block Cipher mode (cbc)\&. .PP The IV must always be diffrent for diffrent input data blocks\&. .PP -\fBParameters:\fP +\fBParameters\fP .RS 4 \fIin\fP data to encrypt .br @@ -117,7 +117,7 @@ Encrypt/decrypt using DES in cipher feedback mode with 64 bit feedback\&. .PP The IV must always be diffrent for diffrent input data blocks\&. .PP -\fBParameters:\fP +\fBParameters\fP .RS 4 \fIin\fP data to encrypt .br @@ -138,12 +138,12 @@ The IV must always be diffrent for diffrent input data blocks\&. .SS "int HC_DEPRECATED DES_check_key_parity (DES_cblock * key)" Check if the key have correct parity\&. .PP -\fBParameters:\fP +\fBParameters\fP .RS 4 \fIkey\fP key to check the parity\&. .RE .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 1 on success, 0 on failure\&. .RE @@ -152,7 +152,7 @@ Check if the key have correct parity\&. .SS "void DES_ecb3_encrypt (DES_cblock * input, DES_cblock * output, DES_key_schedule * ks1, DES_key_schedule * ks2, DES_key_schedule * ks3, int encp)" Encrypt/decrypt a block using triple DES using EDE mode, encrypt/decrypt/encrypt\&. .PP -\fBParameters:\fP +\fBParameters\fP .RS 4 \fIinput\fP data to encrypt .br @@ -171,7 +171,7 @@ Encrypt/decrypt a block using triple DES using EDE mode, encrypt/decrypt/encrypt .SS "void DES_ecb_encrypt (DES_cblock * input, DES_cblock * output, DES_key_schedule * ks, int encp)" Encrypt/decrypt a block using DES\&. .PP -\fBParameters:\fP +\fBParameters\fP .RS 4 \fIinput\fP data to encrypt .br @@ -188,7 +188,7 @@ Encrypt/decrypt using Triple DES in Chain Block Cipher mode (cbc)\&. .PP The IV must always be diffrent for diffrent input data blocks\&. .PP -\fBParameters:\fP +\fBParameters\fP .RS 4 \fIin\fP data to encrypt .br @@ -211,7 +211,7 @@ The IV must always be diffrent for diffrent input data blocks\&. .SS "void DES_encrypt (uint32_t u[2], DES_key_schedule * ks, int encp)" Encrypt/decrypt a block using DES\&. Also called ECB mode .PP -\fBParameters:\fP +\fBParameters\fP .RS 4 \fIu\fP data to encrypt .br @@ -224,7 +224,7 @@ Encrypt/decrypt a block using DES\&. Also called ECB mode .SS "void HC_DEPRECATED DES_init_random_number_generator (DES_cblock * seed)" Seed the random number generator\&. Deprecated, use \fBRAND - random number\fP .PP -\fBParameters:\fP +\fBParameters\fP .RS 4 \fIseed\fP a seed to seed that random number generate with\&. .RE @@ -233,12 +233,12 @@ Seed the random number generator\&. Deprecated, use \fBRAND - random number\fP .SS "int DES_is_weak_key (DES_cblock * key)" Checks if the key is any of the weaks keys that makes DES attacks trival\&. .PP -\fBParameters:\fP +\fBParameters\fP .RS 4 \fIkey\fP key to check\&. .RE .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 1 if the key is weak, 0 otherwise\&. .RE @@ -247,14 +247,14 @@ Checks if the key is any of the weaks keys that makes DES attacks trival\&. .SS "int DES_key_sched (DES_cblock * key, DES_key_schedule * ks)" Compatibility function for eay libdes, works just like \fBDES_set_key_checked()\fP\&. .PP -\fBParameters:\fP +\fBParameters\fP .RS 4 \fIkey\fP a key to initialize the key schedule with\&. .br \fIks\fP a key schedule to initialize\&. .RE .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 0 on success, -1 on invalid parity, -2 on weak key\&. .RE @@ -263,12 +263,12 @@ Compatibility function for eay libdes, works just like \fBDES_set_key_checked()\ .SS "int HC_DEPRECATED DES_new_random_key (DES_cblock * key)" Generate a random des key using a random block, fixup parity and skip weak keys\&. .PP -\fBParameters:\fP +\fBParameters\fP .RS 4 \fIkey\fP is set to a random key\&. .RE .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 0 on success, non zero on random number generator failure\&. .RE @@ -279,7 +279,7 @@ Encrypt/decrypt a block using DES in Propagating Cipher Block Chaining mode\&. T .PP The IV must always be diffrent for diffrent input data blocks\&. .PP -\fBParameters:\fP +\fBParameters\fP .RS 4 \fIin\fP data to encrypt .br @@ -298,7 +298,7 @@ The IV must always be diffrent for diffrent input data blocks\&. .SS "void HC_DEPRECATED DES_random_key (DES_cblock * key)" Generate a random key, deprecated since it doesn't return an error code, use \fBDES_new_random_key()\fP\&. .PP -\fBParameters:\fP +\fBParameters\fP .RS 4 \fIkey\fP is set to a random key\&. .RE @@ -307,14 +307,14 @@ Generate a random key, deprecated since it doesn't return an error code, use \fB .SS "int HC_DEPRECATED DES_set_key (DES_cblock * key, DES_key_schedule * ks)" Setup a des key schedule from a key\&. Deprecated function, use \fBDES_set_key_unchecked()\fP or \fBDES_set_key_checked()\fP instead\&. .PP -\fBParameters:\fP +\fBParameters\fP .RS 4 \fIkey\fP a key to initialize the key schedule with\&. .br \fIks\fP a key schedule to initialize\&. .RE .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 0 on success .RE @@ -323,14 +323,14 @@ Setup a des key schedule from a key\&. Deprecated function, use \fBDES_set_key_u .SS "int DES_set_key_checked (DES_cblock * key, DES_key_schedule * ks)" Just like \fBDES_set_key_unchecked()\fP except checking that the key is not weak for or have correct parity\&. .PP -\fBParameters:\fP +\fBParameters\fP .RS 4 \fIkey\fP a key to initialize the key schedule with\&. .br \fIks\fP a key schedule to initialize\&. .RE .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 0 on success, -1 on invalid parity, -2 on weak key\&. .RE @@ -341,14 +341,14 @@ Setup a des key schedule from a key\&. The key is no longer needed after this tr .PP Does NOT check that the key is weak for or have wrong parity\&. .PP -\fBParameters:\fP +\fBParameters\fP .RS 4 \fIkey\fP a key to initialize the key schedule with\&. .br \fIks\fP a key schedule to initialize\&. .RE .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 0 on success .RE @@ -357,7 +357,7 @@ Does NOT check that the key is weak for or have wrong parity\&. .SS "void DES_set_odd_parity (DES_cblock * key)" Set the parity of the key block, used to generate a des key from a random key\&. See \fBDES key generation\fP\&. .PP -\fBParameters:\fP +\fBParameters\fP .RS 4 \fIkey\fP key to fixup the parity for\&. .RE @@ -366,7 +366,7 @@ Set the parity of the key block, used to generate a des key from a random key\&. .SS "void DES_string_to_key (const char * str, DES_cblock * key)" Convert a string to a DES key\&. Use something like \fBPKCS5_PBKDF2_HMAC_SHA1()\fP to create key from passwords\&. .PP -\fBParameters:\fP +\fBParameters\fP .RS 4 \fIstr\fP The string to convert to a key .br diff --git a/doc/doxyout/hcrypto/man/man3/hcrypto_dh.3 b/doc/doxyout/hcrypto/man/man3/hcrypto_dh.3 index 709dcfe3f934..4b03476a1805 100644 --- a/doc/doxyout/hcrypto/man/man3/hcrypto_dh.3 +++ b/doc/doxyout/hcrypto/man/man3/hcrypto_dh.3 @@ -1,8 +1,8 @@ -.TH "hcrypto_dh" 3 "Fri Jun 7 2019" "Version 7.7.0" "Heimdal crypto library" \" -*- nroff -*- +.TH "hcrypto_dh" 3 "Tue Nov 15 2022" "Version 7.8.0" "Heimdal crypto library" \" -*- nroff -*- .ad l .nh .SH NAME -hcrypto_dh +hcrypto_dh \- Diffie-Hellman functions .SH SYNOPSIS .br .PP @@ -66,7 +66,7 @@ See the \fBDH - Diffie-Hellman key exchange\fP for description and examples\&. .SS "int DH_check_pubkey (const DH * dh, const BIGNUM * pub_key, int * codes)" Check that the public key is sane\&. .PP -\fBParameters:\fP +\fBParameters\fP .RS 4 \fIdh\fP the local peer DH parameters\&. .br @@ -75,7 +75,7 @@ Check that the public key is sane\&. \fIcodes\fP return that the failures of the pub_key are\&. .RE .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 1 on success, 0 on failure and *codes is set the the combined fail check for the public key .RE @@ -92,7 +92,7 @@ if g == 2, pub_key have more then one bit set, if bits set is 1, log_2(pub_key) .SS "int DH_compute_key (unsigned char * shared_key, const BIGNUM * peer_pub_key, DH * dh)" Complute the shared secret key\&. .PP -\fBParameters:\fP +\fBParameters\fP .RS 4 \fIshared_key\fP the resulting shared key, need to be at least \fBDH_size()\fP large\&. .br @@ -101,7 +101,7 @@ Complute the shared secret key\&. \fIdh\fP the dh key pair\&. .RE .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 1 on success\&. .RE @@ -110,7 +110,7 @@ Checks that the pubkey passed in is valid using \fBDH_check_pubkey()\fP\&. .SS "void DH_free (DH * dh)" Free a DH object and release related resources, like ENGINE, that the object was using\&. .PP -\fBParameters:\fP +\fBParameters\fP .RS 4 \fIdh\fP object to be freed\&. .RE @@ -119,12 +119,12 @@ Free a DH object and release related resources, like ENGINE, that the object was .SS "int DH_generate_key (DH * dh)" Generate a new DH private-public key pair\&. The dh parameter must be allocted first with \fBDH_new()\fP\&. dh->p and dp->g must be set\&. .PP -\fBParameters:\fP +\fBParameters\fP .RS 4 \fIdh\fP dh parameter\&. .RE .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 1 on success\&. .RE @@ -133,7 +133,7 @@ Generate a new DH private-public key pair\&. The dh parameter must be allocted f .SS "int DH_generate_parameters_ex (DH * dh, int prime_len, int generator, BN_GENCB * cb)" Generate DH parameters for the DH object give parameters\&. .PP -\fBParameters:\fP +\fBParameters\fP .RS 4 \fIdh\fP The DH object to generate parameters for\&. .br @@ -144,7 +144,7 @@ Generate DH parameters for the DH object give parameters\&. \fIcb\fP Callback parameters to show progress, can be NULL\&. .RE .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 the maximum size in bytes of the out data\&. .RE @@ -153,7 +153,7 @@ the maximum size in bytes of the out data\&. .SS "const DH_METHOD* DH_get_default_method (void)" Return the default DH implementation\&. .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 pointer to a DH_METHOD\&. .RE @@ -162,14 +162,14 @@ pointer to a DH_METHOD\&. .SS "void* DH_get_ex_data (DH * dh, int idx)" Get the data for index idx in the DH object\&. .PP -\fBParameters:\fP +\fBParameters\fP .RS 4 \fIdh\fP DH object\&. .br \fIidx\fP index to get the data for\&. .RE .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 the object store in index idx .RE @@ -178,7 +178,7 @@ the object store in index idx .SS "const DH_METHOD* DH_ltm_method (void)" DH implementation using libtommath\&. .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 the DH_METHOD for the DH implementation using libtommath\&. .RE @@ -187,7 +187,7 @@ the DH_METHOD for the DH implementation using libtommath\&. .SS "DH* DH_new (void)" Create a new DH object using DH_new_method(NULL), see \fBDH_new_method()\fP\&. .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 a newly allocated DH object\&. .RE @@ -196,12 +196,12 @@ a newly allocated DH object\&. .SS "DH* DH_new_method (ENGINE * engine)" Create a new DH object from the given engine, if the NULL is used, the default engine is used\&. Free the DH object with \fBDH_free()\fP\&. .PP -\fBParameters:\fP +\fBParameters\fP .RS 4 \fIengine\fP The engine to use to allocate the DH object\&. .RE .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 a newly allocated DH object\&. .RE @@ -210,7 +210,7 @@ a newly allocated DH object\&. .SS "const DH_METHOD* DH_null_method (void)" Return the dummy DH implementation\&. .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 pointer to a DH_METHOD\&. .RE @@ -219,7 +219,7 @@ pointer to a DH_METHOD\&. .SS "void DH_set_default_method (const DH_METHOD * meth)" Set the default DH implementation\&. .PP -\fBParameters:\fP +\fBParameters\fP .RS 4 \fImeth\fP pointer to a DH_METHOD\&. .RE @@ -228,7 +228,7 @@ Set the default DH implementation\&. .SS "int DH_set_ex_data (DH * dh, int idx, void * data)" Set the data index idx in the DH object to data\&. .PP -\fBParameters:\fP +\fBParameters\fP .RS 4 \fIdh\fP DH object\&. .br @@ -237,7 +237,7 @@ Set the data index idx in the DH object to data\&. \fIdata\fP data to store for the index idx\&. .RE .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 1 on success\&. .RE @@ -246,14 +246,14 @@ Set the data index idx in the DH object to data\&. .SS "int DH_set_method (DH * dh, const DH_METHOD * method)" Set a new method for the DH keypair\&. .PP -\fBParameters:\fP +\fBParameters\fP .RS 4 \fIdh\fP dh parameter\&. .br \fImethod\fP the new method for the DH parameter\&. .RE .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 1 on success\&. .RE @@ -262,12 +262,12 @@ Set a new method for the DH keypair\&. .SS "int DH_size (const DH * dh)" The maximum output size of the \fBDH_compute_key()\fP function\&. .PP -\fBParameters:\fP +\fBParameters\fP .RS 4 \fIdh\fP The DH object to get the size from\&. .RE .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 the maximum size in bytes of the out data\&. .RE @@ -276,12 +276,12 @@ the maximum size in bytes of the out data\&. .SS "int DH_up_ref (DH * dh)" Add a reference to the DH object\&. The object should be free with \fBDH_free()\fP to drop the reference\&. .PP -\fBParameters:\fP +\fBParameters\fP .RS 4 \fIdh\fP the object to increase the reference count too\&. .RE .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 the updated reference count, can't safely be used except for debug printing\&. .RE diff --git a/doc/doxyout/hcrypto/man/man3/hcrypto_evp.3 b/doc/doxyout/hcrypto/man/man3/hcrypto_evp.3 index b6cf2c72094f..2e0471d7fca5 100644 --- a/doc/doxyout/hcrypto/man/man3/hcrypto_evp.3 +++ b/doc/doxyout/hcrypto/man/man3/hcrypto_evp.3 @@ -1,8 +1,8 @@ -.TH "hcrypto_evp" 3 "Fri Jun 7 2019" "Version 7.7.0" "Heimdal crypto library" \" -*- nroff -*- +.TH "hcrypto_evp" 3 "Tue Nov 15 2022" "Version 7.8.0" "Heimdal crypto library" \" -*- nroff -*- .ad l .nh .SH NAME -hcrypto_evp +hcrypto_evp \- EVP generic crypto functions .SH SYNOPSIS .br .PP @@ -49,9 +49,6 @@ hcrypto_evp .RI "const EVP_MD * \fBEVP_hcrypto_md4\fP (void)" .br .ti -1c -.RI "const EVP_MD * \fBEVP_hcrypto_md2\fP (void)" -.br -.ti -1c .RI "const EVP_CIPHER * \fBEVP_hcrypto_des_cbc\fP (void)" .br .ti -1c @@ -190,9 +187,6 @@ hcrypto_evp .RI "const EVP_MD * \fBEVP_md4\fP (void)" .br .ti -1c -.RI "const EVP_MD * \fBEVP_md2\fP (void)" -.br -.ti -1c .RI "const EVP_MD * \fBEVP_md_null\fP (void)" .br .ti -1c @@ -312,20 +306,20 @@ See the \fBEVP - generic crypto interface\fP for description and examples\&. .SS "const EVP_CIPHER* EVP_aes_128_cbc (void)" The AES-128 cipher type .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 the AES-128 EVP_CIPHER pointer\&. .RE .PP .PP -\fBExamples: \fP +\fBExamples\fP .in +1c \fBexample_evp_cipher\&.c\fP\&. .SS "const EVP_CIPHER* EVP_aes_128_cfb8 (void)" The AES-128 cipher type .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 the AES-128 EVP_CIPHER pointer\&. .RE @@ -334,7 +328,7 @@ the AES-128 EVP_CIPHER pointer\&. .SS "const EVP_CIPHER* EVP_aes_192_cbc (void)" The AES-192 cipher type .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 the AES-192 EVP_CIPHER pointer\&. .RE @@ -343,7 +337,7 @@ the AES-192 EVP_CIPHER pointer\&. .SS "const EVP_CIPHER* EVP_aes_192_cfb8 (void)" The AES-192 cipher type .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 the AES-192 EVP_CIPHER pointer\&. .RE @@ -352,7 +346,7 @@ the AES-192 EVP_CIPHER pointer\&. .SS "const EVP_CIPHER* EVP_aes_256_cbc (void)" The AES-256 cipher type .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 the AES-256 EVP_CIPHER pointer\&. .RE @@ -361,7 +355,7 @@ the AES-256 EVP_CIPHER pointer\&. .SS "const EVP_CIPHER* EVP_aes_256_cfb8 (void)" The AES-256 cipher type .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 the AES-256 EVP_CIPHER pointer\&. .RE @@ -372,7 +366,7 @@ Provides a legancy string to key function, used in PEM files\&. .PP New protocols should use new string to key functions like NIST SP56-800A or PKCS#5 v2\&.0 (see \fBPKCS5_PBKDF2_HMAC_SHA1()\fP)\&. .PP -\fBParameters:\fP +\fBParameters\fP .RS 4 \fItype\fP type of cipher to use .br @@ -391,7 +385,7 @@ New protocols should use new string to key functions like NIST SP56-800A or PKCS \fIivdata\fP output ivdata, needs to of the size \fBEVP_CIPHER_block_size()\fP\&. .RE .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 the size of derived key\&. .RE @@ -400,7 +394,7 @@ the size of derived key\&. .SS "const EVP_CIPHER* EVP_camellia_128_cbc (void)" The Camellia-128 cipher type .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 the Camellia-128 EVP_CIPHER pointer\&. .RE @@ -409,7 +403,7 @@ the Camellia-128 EVP_CIPHER pointer\&. .SS "const EVP_CIPHER* EVP_camellia_192_cbc (void)" The Camellia-198 cipher type .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 the Camellia-198 EVP_CIPHER pointer\&. .RE @@ -418,7 +412,7 @@ the Camellia-198 EVP_CIPHER pointer\&. .SS "const EVP_CIPHER* EVP_camellia_256_cbc (void)" The Camellia-256 cipher type .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 the Camellia-256 EVP_CIPHER pointer\&. .RE @@ -427,30 +421,30 @@ the Camellia-256 EVP_CIPHER pointer\&. .SS "size_t EVP_CIPHER_block_size (const EVP_CIPHER * c)" Return the block size of the cipher\&. .PP -\fBParameters:\fP +\fBParameters\fP .RS 4 \fIc\fP cipher to get the block size from\&. .RE .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 the block size of the cipher\&. .RE .PP .PP -\fBExamples: \fP +\fBExamples\fP .in +1c \fBexample_evp_cipher\&.c\fP\&. .SS "size_t EVP_CIPHER_CTX_block_size (const EVP_CIPHER_CTX * ctx)" Return the block size of the cipher context\&. .PP -\fBParameters:\fP +\fBParameters\fP .RS 4 \fIctx\fP cipher context to get the block size from\&. .RE .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 the block size of the cipher context\&. .RE @@ -459,12 +453,12 @@ the block size of the cipher context\&. .SS "const EVP_CIPHER* EVP_CIPHER_CTX_cipher (EVP_CIPHER_CTX * ctx)" Return the EVP_CIPHER for a EVP_CIPHER_CTX context\&. .PP -\fBParameters:\fP +\fBParameters\fP .RS 4 \fIctx\fP the context to get the cipher type from\&. .RE .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 the EVP_CIPHER pointer\&. .RE @@ -473,30 +467,30 @@ the EVP_CIPHER pointer\&. .SS "int EVP_CIPHER_CTX_cleanup (EVP_CIPHER_CTX * c)" Clean up the EVP_CIPHER_CTX context\&. .PP -\fBParameters:\fP +\fBParameters\fP .RS 4 \fIc\fP the cipher to clean up\&. .RE .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 1 on success\&. .RE .PP .PP -\fBExamples: \fP +\fBExamples\fP .in +1c \fBexample_evp_cipher\&.c\fP\&. .SS "unsigned long EVP_CIPHER_CTX_flags (const EVP_CIPHER_CTX * ctx)" Get the flags for an EVP_CIPHER_CTX context\&. .PP -\fBParameters:\fP +\fBParameters\fP .RS 4 \fIctx\fP the EVP_CIPHER_CTX to get the flags from .RE .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 the flags for an EVP_CIPHER_CTX\&. .RE @@ -505,12 +499,12 @@ the flags for an EVP_CIPHER_CTX\&. .SS "void* EVP_CIPHER_CTX_get_app_data (EVP_CIPHER_CTX * ctx)" Get the app data for an EVP_CIPHER_CTX context\&. .PP -\fBParameters:\fP +\fBParameters\fP .RS 4 \fIctx\fP the EVP_CIPHER_CTX to get the app data from .RE .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 the app data for an EVP_CIPHER_CTX\&. .RE @@ -519,25 +513,25 @@ the app data for an EVP_CIPHER_CTX\&. .SS "void EVP_CIPHER_CTX_init (EVP_CIPHER_CTX * c)" Initiate a EVP_CIPHER_CTX context\&. Clean up with \fBEVP_CIPHER_CTX_cleanup()\fP\&. .PP -\fBParameters:\fP +\fBParameters\fP .RS 4 \fIc\fP the cipher initiate\&. .RE .PP .PP -\fBExamples: \fP +\fBExamples\fP .in +1c \fBexample_evp_cipher\&.c\fP\&. .SS "size_t EVP_CIPHER_CTX_iv_length (const EVP_CIPHER_CTX * ctx)" Return the IV size of the cipher context\&. .PP -\fBParameters:\fP +\fBParameters\fP .RS 4 \fIctx\fP cipher context to get the IV size from\&. .RE .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 the IV size of the cipher context\&. .RE @@ -546,12 +540,12 @@ the IV size of the cipher context\&. .SS "size_t EVP_CIPHER_CTX_key_length (const EVP_CIPHER_CTX * ctx)" Return the key size of the cipher context\&. .PP -\fBParameters:\fP +\fBParameters\fP .RS 4 \fIctx\fP cipher context to get the key size from\&. .RE .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 the key size of the cipher context\&. .RE @@ -560,12 +554,12 @@ the key size of the cipher context\&. .SS "int EVP_CIPHER_CTX_mode (const EVP_CIPHER_CTX * ctx)" Get the mode for an EVP_CIPHER_CTX context\&. .PP -\fBParameters:\fP +\fBParameters\fP .RS 4 \fIctx\fP the EVP_CIPHER_CTX to get the mode from .RE .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 the mode for an EVP_CIPHER_CTX\&. .RE @@ -574,7 +568,7 @@ the mode for an EVP_CIPHER_CTX\&. .SS "void EVP_CIPHER_CTX_set_app_data (EVP_CIPHER_CTX * ctx, void * data)" Set the app data for an EVP_CIPHER_CTX context\&. .PP -\fBParameters:\fP +\fBParameters\fP .RS 4 \fIctx\fP the EVP_CIPHER_CTX to set the app data for .br @@ -585,14 +579,14 @@ Set the app data for an EVP_CIPHER_CTX context\&. .SS "int EVP_CIPHER_CTX_set_key_length (EVP_CIPHER_CTX * c, int length)" If the cipher type supports it, change the key length .PP -\fBParameters:\fP +\fBParameters\fP .RS 4 \fIc\fP the cipher context to change the key length for .br \fIlength\fP new key length .RE .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 1 on success\&. .RE @@ -601,43 +595,43 @@ If the cipher type supports it, change the key length .SS "size_t EVP_CIPHER_iv_length (const EVP_CIPHER * c)" Return the IV size of the cipher\&. .PP -\fBParameters:\fP +\fBParameters\fP .RS 4 \fIc\fP cipher to get the IV size from\&. .RE .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 the IV size of the cipher\&. .RE .PP .PP -\fBExamples: \fP +\fBExamples\fP .in +1c \fBexample_evp_cipher\&.c\fP\&. .SS "size_t EVP_CIPHER_key_length (const EVP_CIPHER * c)" Return the key size of the cipher\&. .PP -\fBParameters:\fP +\fBParameters\fP .RS 4 \fIc\fP cipher to get the key size from\&. .RE .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 the key size of the cipher\&. .RE .PP .PP -\fBExamples: \fP +\fBExamples\fP .in +1c \fBexample_evp_cipher\&.c\fP\&. .SS "int EVP_CipherFinal_ex (EVP_CIPHER_CTX * ctx, void * out, int * outlen)" Encipher/decipher final data .PP -\fBParameters:\fP +\fBParameters\fP .RS 4 \fIctx\fP the cipher context\&. .br @@ -650,20 +644,20 @@ The input length needs to be at least \fBEVP_CIPHER_block_size()\fP bytes long\& .PP See \fBEVP Cipher\fP for an example how to use this function\&. .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 1 on success\&. .RE .PP .PP -\fBExamples: \fP +\fBExamples\fP .in +1c \fBexample_evp_cipher\&.c\fP\&. .SS "int EVP_CipherInit_ex (EVP_CIPHER_CTX * ctx, const EVP_CIPHER * c, ENGINE * engine, const void * key, const void * iv, int encp)" Initiate the EVP_CIPHER_CTX context to encrypt or decrypt data\&. Clean up with \fBEVP_CIPHER_CTX_cleanup()\fP\&. .PP -\fBParameters:\fP +\fBParameters\fP .RS 4 \fIctx\fP context to initiate .br @@ -678,20 +672,20 @@ Initiate the EVP_CIPHER_CTX context to encrypt or decrypt data\&. Clean up with \fIencp\fP non zero will encrypt, -1 use the previous value\&. .RE .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 1 on success\&. .RE .PP .PP -\fBExamples: \fP +\fBExamples\fP .in +1c \fBexample_evp_cipher\&.c\fP\&. .SS "int EVP_CipherUpdate (EVP_CIPHER_CTX * ctx, void * out, int * outlen, void * in, size_t inlen)" Encipher/decipher partial data .PP -\fBParameters:\fP +\fBParameters\fP .RS 4 \fIctx\fP the cipher context\&. .br @@ -708,20 +702,20 @@ The output buffer length should at least be \fBEVP_CIPHER_block_size()\fP byte l .PP See \fBEVP Cipher\fP for an example how to use this function\&. .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 1 on success\&. .RE .PP If there in no spare bytes in the left from last Update and the input length is on the block boundery, the \fBEVP_CipherUpdate()\fP function can take a shortcut (and preformance gain) and directly encrypt the data, otherwise we hav to fix it up and store extra it the EVP_CIPHER_CTX\&. .PP -\fBExamples: \fP +\fBExamples\fP .in +1c \fBexample_evp_cipher\&.c\fP\&. .SS "const EVP_CIPHER* EVP_des_cbc (void)" The DES cipher type .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 the DES-CBC EVP_CIPHER pointer\&. .RE @@ -730,7 +724,7 @@ the DES-CBC EVP_CIPHER pointer\&. .SS "const EVP_CIPHER* EVP_des_ede3_cbc (void)" The triple DES cipher type .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 the DES-EDE3-CBC EVP_CIPHER pointer\&. .RE @@ -739,7 +733,7 @@ the DES-EDE3-CBC EVP_CIPHER pointer\&. .SS "int EVP_Digest (const void * data, size_t dsize, void * hash, unsigned int * hsize, const EVP_MD * md, ENGINE * engine)" Do the whole \fBEVP_MD_CTX_create()\fP, \fBEVP_DigestInit_ex()\fP, \fBEVP_DigestUpdate()\fP, \fBEVP_DigestFinal_ex()\fP, \fBEVP_MD_CTX_destroy()\fP dance in one call\&. .PP -\fBParameters:\fP +\fBParameters\fP .RS 4 \fIdata\fP the data to update the context with .br @@ -754,7 +748,7 @@ Do the whole \fBEVP_MD_CTX_create()\fP, \fBEVP_DigestInit_ex()\fP, \fBEVP_Digest \fIengine\fP engine to use, NULL for default engine\&. .RE .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 1 on success\&. .RE @@ -763,7 +757,7 @@ Do the whole \fBEVP_MD_CTX_create()\fP, \fBEVP_DigestInit_ex()\fP, \fBEVP_Digest .SS "int EVP_DigestFinal_ex (EVP_MD_CTX * ctx, void * hash, unsigned int * size)" Complete the message digest\&. .PP -\fBParameters:\fP +\fBParameters\fP .RS 4 \fIctx\fP the context to complete\&. .br @@ -772,7 +766,7 @@ Complete the message digest\&. \fIsize\fP the output size of hash\&. .RE .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 1 on success\&. .RE @@ -781,7 +775,7 @@ Complete the message digest\&. .SS "int EVP_DigestInit_ex (EVP_MD_CTX * ctx, const EVP_MD * md, ENGINE * engine)" Init a EVP_MD_CTX for use a specific message digest and engine\&. .PP -\fBParameters:\fP +\fBParameters\fP .RS 4 \fIctx\fP the message digest context to init\&. .br @@ -790,7 +784,7 @@ Init a EVP_MD_CTX for use a specific message digest and engine\&. \fIengine\fP the engine to use, NULL to use the default engine\&. .RE .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 1 on success\&. .RE @@ -799,7 +793,7 @@ Init a EVP_MD_CTX for use a specific message digest and engine\&. .SS "int EVP_DigestUpdate (EVP_MD_CTX * ctx, const void * data, size_t size)" Update the digest with some data\&. .PP -\fBParameters:\fP +\fBParameters\fP .RS 4 \fIctx\fP the context to update .br @@ -808,7 +802,7 @@ Update the digest with some data\&. \fIsize\fP length of data .RE .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 1 on success\&. .RE @@ -817,7 +811,7 @@ Update the digest with some data\&. .SS "const EVP_CIPHER* EVP_enc_null (void)" The NULL cipher type, does no encryption/decryption\&. .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 the null EVP_CIPHER pointer\&. .RE @@ -826,12 +820,12 @@ the null EVP_CIPHER pointer\&. .SS "const EVP_CIPHER* EVP_get_cipherbyname (const char * name)" Get the cipher type using their name\&. .PP -\fBParameters:\fP +\fBParameters\fP .RS 4 \fIname\fP the name of the cipher\&. .RE .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 the selected EVP_CIPHER pointer or NULL if not found\&. .RE @@ -840,7 +834,7 @@ the selected EVP_CIPHER pointer or NULL if not found\&. .SS "const EVP_CIPHER* EVP_hcrypto_aes_128_cbc (void)" The AES-128 cipher type (hcrypto) .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 the AES-128 EVP_CIPHER pointer\&. .RE @@ -849,7 +843,7 @@ the AES-128 EVP_CIPHER pointer\&. .SS "const EVP_CIPHER* EVP_hcrypto_aes_128_cfb8 (void)" The AES-128 CFB8 cipher type (hcrypto) .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 the AES-128 EVP_CIPHER pointer\&. .RE @@ -858,7 +852,7 @@ the AES-128 EVP_CIPHER pointer\&. .SS "const EVP_CIPHER* EVP_hcrypto_aes_192_cbc (void)" The AES-192 cipher type (hcrypto) .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 the AES-192 EVP_CIPHER pointer\&. .RE @@ -867,7 +861,7 @@ the AES-192 EVP_CIPHER pointer\&. .SS "const EVP_CIPHER* EVP_hcrypto_aes_192_cfb8 (void)" The AES-192 CFB8 cipher type (hcrypto) .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 the AES-192 EVP_CIPHER pointer\&. .RE @@ -876,7 +870,7 @@ the AES-192 EVP_CIPHER pointer\&. .SS "const EVP_CIPHER* EVP_hcrypto_aes_256_cbc (void)" The AES-256 cipher type (hcrypto) .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 the AES-256 EVP_CIPHER pointer\&. .RE @@ -885,7 +879,7 @@ the AES-256 EVP_CIPHER pointer\&. .SS "const EVP_CIPHER* EVP_hcrypto_aes_256_cfb8 (void)" The AES-256 CFB8 cipher type (hcrypto) .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 the AES-256 EVP_CIPHER pointer\&. .RE @@ -894,7 +888,7 @@ the AES-256 EVP_CIPHER pointer\&. .SS "const EVP_CIPHER* EVP_hcrypto_camellia_128_cbc (void)" The Camellia-128 cipher type - hcrypto .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 the Camellia-128 EVP_CIPHER pointer\&. .RE @@ -903,7 +897,7 @@ the Camellia-128 EVP_CIPHER pointer\&. .SS "const EVP_CIPHER* EVP_hcrypto_camellia_192_cbc (void)" The Camellia-198 cipher type - hcrypto .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 the Camellia-198 EVP_CIPHER pointer\&. .RE @@ -912,7 +906,7 @@ the Camellia-198 EVP_CIPHER pointer\&. .SS "const EVP_CIPHER* EVP_hcrypto_camellia_256_cbc (void)" The Camellia-256 cipher type - hcrypto .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 the Camellia-256 EVP_CIPHER pointer\&. .RE @@ -921,7 +915,7 @@ the Camellia-256 EVP_CIPHER pointer\&. .SS "const EVP_CIPHER* EVP_hcrypto_des_cbc (void)" The DES cipher type .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 the DES-CBC EVP_CIPHER pointer\&. .RE @@ -930,25 +924,16 @@ the DES-CBC EVP_CIPHER pointer\&. .SS "const EVP_CIPHER* EVP_hcrypto_des_ede3_cbc (void)" The triple DES cipher type - hcrypto .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 the DES-EDE3-CBC EVP_CIPHER pointer\&. .RE .PP -.SS "const EVP_MD* EVP_hcrypto_md2 (void)" -The message digest MD2 - hcrypto -.PP -\fBReturns:\fP -.RS 4 -the message digest type\&. -.RE -.PP - .SS "const EVP_MD* EVP_hcrypto_md4 (void)" The message digest MD4 - hcrypto .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 the message digest type\&. .RE @@ -957,7 +942,7 @@ the message digest type\&. .SS "const EVP_MD* EVP_hcrypto_md5 (void)" The message digest MD5 - hcrypto .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 the message digest type\&. .RE @@ -966,7 +951,7 @@ the message digest type\&. .SS "const EVP_CIPHER* EVP_hcrypto_rc2_40_cbc (void)" The RC2-40 cipher type .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 the RC2-40 EVP_CIPHER pointer\&. .RE @@ -975,7 +960,7 @@ the RC2-40 EVP_CIPHER pointer\&. .SS "const EVP_CIPHER* EVP_hcrypto_rc2_64_cbc (void)" The RC2-64 cipher type .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 the RC2-64 EVP_CIPHER pointer\&. .RE @@ -984,7 +969,7 @@ the RC2-64 EVP_CIPHER pointer\&. .SS "const EVP_CIPHER* EVP_hcrypto_rc2_cbc (void)" The RC2 cipher type - hcrypto .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 the RC2 EVP_CIPHER pointer\&. .RE @@ -993,7 +978,7 @@ the RC2 EVP_CIPHER pointer\&. .SS "const EVP_MD* EVP_hcrypto_sha1 (void)" The message digest SHA1 - hcrypto .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 the message digest type\&. .RE @@ -1002,7 +987,7 @@ the message digest type\&. .SS "const EVP_MD* EVP_hcrypto_sha256 (void)" The message digest SHA256 - hcrypto .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 the message digest type\&. .RE @@ -1011,7 +996,7 @@ the message digest type\&. .SS "const EVP_MD* EVP_hcrypto_sha384 (void)" The message digest SHA384 - hcrypto .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 the message digest type\&. .RE @@ -1020,16 +1005,7 @@ the message digest type\&. .SS "const EVP_MD* EVP_hcrypto_sha512 (void)" The message digest SHA512 - hcrypto .PP -\fBReturns:\fP -.RS 4 -the message digest type\&. -.RE -.PP - -.SS "const EVP_MD* EVP_md2 (void)" -The message digest MD2 -.PP -\fBReturns:\fP +\fBReturns\fP .RS 4 the message digest type\&. .RE @@ -1038,7 +1014,7 @@ the message digest type\&. .SS "const EVP_MD* EVP_md4 (void)" The message digest MD4 .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 the message digest type\&. .RE @@ -1047,7 +1023,7 @@ the message digest type\&. .SS "const EVP_MD* EVP_md5 (void)" The message digest MD5 .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 the message digest type\&. .RE @@ -1056,12 +1032,12 @@ the message digest type\&. .SS "size_t EVP_MD_block_size (const EVP_MD * md)" Return the blocksize of the message digest function\&. .PP -\fBParameters:\fP +\fBParameters\fP .RS 4 \fImd\fP the evp message .RE .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 size size of the message digest block size .RE @@ -1070,12 +1046,12 @@ size size of the message digest block size .SS "size_t EVP_MD_CTX_block_size (EVP_MD_CTX * ctx)" Return the blocksize of the message digest function\&. .PP -\fBParameters:\fP +\fBParameters\fP .RS 4 \fIctx\fP the evp message digest context .RE .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 size size of the message digest block size .RE @@ -1084,12 +1060,12 @@ size size of the message digest block size .SS "int EVP_MD_CTX_cleanup (EVP_MD_CTX * ctx)" Free the resources used by the EVP_MD context\&. .PP -\fBParameters:\fP +\fBParameters\fP .RS 4 \fIctx\fP the context to free the resources from\&. .RE .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 1 on success\&. .RE @@ -1098,7 +1074,7 @@ Free the resources used by the EVP_MD context\&. .SS "EVP_MD_CTX* EVP_MD_CTX_create (void)" Allocate a messsage digest context object\&. Free with \fBEVP_MD_CTX_destroy()\fP\&. .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 a newly allocated message digest context object\&. .RE @@ -1107,7 +1083,7 @@ a newly allocated message digest context object\&. .SS "void EVP_MD_CTX_destroy (EVP_MD_CTX * ctx)" Free a messsage digest context object\&. .PP -\fBParameters:\fP +\fBParameters\fP .RS 4 \fIctx\fP context to free\&. .RE @@ -1116,7 +1092,7 @@ Free a messsage digest context object\&. .SS "void EVP_MD_CTX_init (EVP_MD_CTX * ctx)" Initiate a messsage digest context object\&. Deallocate with \fBEVP_MD_CTX_cleanup()\fP\&. Please use \fBEVP_MD_CTX_create()\fP instead\&. .PP -\fBParameters:\fP +\fBParameters\fP .RS 4 \fIctx\fP variable to initiate\&. .RE @@ -1125,12 +1101,12 @@ Initiate a messsage digest context object\&. Deallocate with \fBEVP_MD_CTX_clean .SS "const EVP_MD* EVP_MD_CTX_md (EVP_MD_CTX * ctx)" Get the EVP_MD use for a specified context\&. .PP -\fBParameters:\fP +\fBParameters\fP .RS 4 \fIctx\fP the EVP_MD context to get the EVP_MD for\&. .RE .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 the EVP_MD used for the context\&. .RE @@ -1139,12 +1115,12 @@ the EVP_MD used for the context\&. .SS "size_t EVP_MD_CTX_size (EVP_MD_CTX * ctx)" Return the output size of the message digest function\&. .PP -\fBParameters:\fP +\fBParameters\fP .RS 4 \fIctx\fP the evp message digest context .RE .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 size output size of the message digest function\&. .RE @@ -1153,7 +1129,7 @@ size output size of the message digest function\&. .SS "const EVP_MD* EVP_md_null (void)" The null message digest .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 the message digest type\&. .RE @@ -1162,12 +1138,12 @@ the message digest type\&. .SS "size_t EVP_MD_size (const EVP_MD * md)" Return the output size of the message digest function\&. .PP -\fBParameters:\fP +\fBParameters\fP .RS 4 \fImd\fP the evp message .RE .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 size output size of the message digest function\&. .RE @@ -1176,7 +1152,7 @@ size output size of the message digest function\&. .SS "const EVP_CIPHER* EVP_rc2_40_cbc (void)" The RC2 cipher type .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 the RC2 EVP_CIPHER pointer\&. .RE @@ -1185,7 +1161,7 @@ the RC2 EVP_CIPHER pointer\&. .SS "const EVP_CIPHER* EVP_rc2_64_cbc (void)" The RC2 cipher type .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 the RC2 EVP_CIPHER pointer\&. .RE @@ -1194,7 +1170,7 @@ the RC2 EVP_CIPHER pointer\&. .SS "const EVP_CIPHER* EVP_rc2_cbc (void)" The RC2 cipher type .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 the RC2 EVP_CIPHER pointer\&. .RE @@ -1203,7 +1179,7 @@ the RC2 EVP_CIPHER pointer\&. .SS "const EVP_CIPHER* EVP_rc4 (void)" The RC4 cipher type .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 the RC4 EVP_CIPHER pointer\&. .RE @@ -1212,7 +1188,7 @@ the RC4 EVP_CIPHER pointer\&. .SS "const EVP_CIPHER* EVP_rc4_40 (void)" The RC4-40 cipher type .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 the RC4-40 EVP_CIPHER pointer\&. .RE @@ -1221,7 +1197,7 @@ the RC4-40 EVP_CIPHER pointer\&. .SS "const EVP_MD* EVP_sha (void)" The message digest SHA1 .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 the message digest type\&. .RE @@ -1230,7 +1206,7 @@ the message digest type\&. .SS "const EVP_MD* EVP_sha1 (void)" The message digest SHA1 .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 the message digest type\&. .RE @@ -1239,7 +1215,7 @@ the message digest type\&. .SS "const EVP_MD* EVP_sha256 (void)" The message digest SHA256 .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 the message digest type\&. .RE @@ -1248,7 +1224,7 @@ the message digest type\&. .SS "const EVP_MD* EVP_sha384 (void)" The message digest SHA384 .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 the message digest type\&. .RE @@ -1257,7 +1233,7 @@ the message digest type\&. .SS "const EVP_MD* EVP_sha512 (void)" The message digest SHA512 .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 the message digest type\&. .RE @@ -1266,16 +1242,33 @@ the message digest type\&. .SS "const EVP_CIPHER* EVP_wincrypt_des_ede3_cbc (void)" The triple DES cipher type (Micrsoft crypt provider) .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 the DES-EDE3-CBC EVP_CIPHER pointer\&. .RE .PP +.SS "hc_EVP_CIPH_CBC_MODE OSSL_CIPHER_ALGORITHM (rc2_64_cbc, hc_EVP_CIPH_CBC_MODE| hc_EVP_CIPH_VARIABLE_LENGTH)" +The RC2-64 cipher type - OpenSSL +.PP +\fBReturns\fP +.RS 4 +the RC2-64 EVP_CIPHER pointer\&. The Camellia-128 cipher type - OpenSSL +.PP +the Camellia-128 EVP_CIPHER pointer\&. The Camellia-198 cipher type - OpenSSL +.PP +the Camellia-198 EVP_CIPHER pointer\&. The Camellia-256 cipher type - OpenSSL +.PP +the Camellia-256 EVP_CIPHER pointer\&. The RC4 cipher type (OpenSSL provider) +.PP +the RC4 EVP_CIPHER pointer\&. +.RE +.PP + .SS "OSSL_CIPHER_ALGORITHM (rc2_cbc, hc_EVP_CIPH_CBC_MODE| hc_EVP_CIPH_VARIABLE_LENGTH)" The triple DES cipher type (OpenSSL provider) .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 the DES-EDE3-CBC EVP_CIPHER pointer\&. The DES cipher type (OpenSSL provider) .PP @@ -1299,108 +1292,82 @@ the RC2-40 EVP_CIPHER pointer\&. .RE .PP -.SS "hc_EVP_CIPH_CBC_MODE OSSL_CIPHER_ALGORITHM (rc2_64_cbc, hc_EVP_CIPH_CBC_MODE| hc_EVP_CIPH_VARIABLE_LENGTH)" -The RC2-64 cipher type - OpenSSL -.PP -\fBReturns:\fP -.RS 4 -the RC2-64 EVP_CIPHER pointer\&. The Camellia-128 cipher type - OpenSSL -.PP -the Camellia-128 EVP_CIPHER pointer\&. The Camellia-198 cipher type - OpenSSL -.PP -the Camellia-198 EVP_CIPHER pointer\&. The Camellia-256 cipher type - OpenSSL -.PP -the Camellia-256 EVP_CIPHER pointer\&. The RC4 cipher type (OpenSSL provider) -.PP -the RC4 EVP_CIPHER pointer\&. -.RE -.PP - -.SS "WINCNG_CIPHER_ALGORITHM (des_ede3_cbc, BCRYPT_3DES_ALGORITHM, 8, 24, 8, EVP_CIPH_CBC_MODE)" -The triple DES cipher type (Windows CNG provider) -.PP -\fBReturns:\fP -.RS 4 -the DES-EDE3-CBC EVP_CIPHER pointer\&. -.RE -.PP - -.SS "WINCNG_CIPHER_ALGORITHM (des_cbc, BCRYPT_DES_ALGORITHM, 8, 8, 8, EVP_CIPH_CBC_MODE)" -The DES cipher type (Windows CNG provider) +.SS "WINCNG_CIPHER_ALGORITHM (aes_128_cbc, BCRYPT_AES_ALGORITHM, 16, 16, 16, EVP_CIPH_CBC_MODE)" +The AES-128 cipher type (Windows CNG provider) .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 -the DES-CBC EVP_CIPHER pointer\&. +the AES-128-CBC EVP_CIPHER pointer\&. .RE .PP -.SS "WINCNG_CIPHER_ALGORITHM (aes_128_cbc, BCRYPT_AES_ALGORITHM, 16, 16, 16, EVP_CIPH_CBC_MODE)" -The AES-128 cipher type (Windows CNG provider) +.SS "WINCNG_CIPHER_ALGORITHM (aes_128_cfb8, BCRYPT_AES_ALGORITHM, 16, 16, 16, EVP_CIPH_CFB8_MODE)" +The AES-128 CFB8 cipher type (Windows CNG provider) .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 -the AES-128-CBC EVP_CIPHER pointer\&. +the AES-128-CFB8 EVP_CIPHER pointer\&. .RE .PP .SS "WINCNG_CIPHER_ALGORITHM (aes_192_cbc, BCRYPT_AES_ALGORITHM, 16, 24, 16, EVP_CIPH_CBC_MODE)" The AES-192 cipher type (Windows CNG provider) .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 the AES-192-CBC EVP_CIPHER pointer\&. .RE .PP -.SS "WINCNG_CIPHER_ALGORITHM (aes_256_cbc, BCRYPT_AES_ALGORITHM, 16, 32, 16, EVP_CIPH_CBC_MODE)" -The AES-256 cipher type (Windows CNG provider) +.SS "WINCNG_CIPHER_ALGORITHM (aes_192_cfb8, BCRYPT_AES_ALGORITHM, 16, 24, 16, EVP_CIPH_CFB8_MODE)" +The AES-192 CFB8 cipher type (Windows CNG provider) .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 -the AES-256-CBC EVP_CIPHER pointer\&. +the AES-192-CFB8 EVP_CIPHER pointer\&. .RE .PP -.SS "WINCNG_CIPHER_ALGORITHM (aes_128_cfb8, BCRYPT_AES_ALGORITHM, 16, 16, 16, EVP_CIPH_CFB8_MODE)" -The AES-128 CFB8 cipher type (Windows CNG provider) +.SS "WINCNG_CIPHER_ALGORITHM (aes_256_cbc, BCRYPT_AES_ALGORITHM, 16, 32, 16, EVP_CIPH_CBC_MODE)" +The AES-256 cipher type (Windows CNG provider) .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 -the AES-128-CFB8 EVP_CIPHER pointer\&. +the AES-256-CBC EVP_CIPHER pointer\&. .RE .PP -.SS "WINCNG_CIPHER_ALGORITHM (aes_192_cfb8, BCRYPT_AES_ALGORITHM, 16, 24, 16, EVP_CIPH_CFB8_MODE)" -The AES-192 CFB8 cipher type (Windows CNG provider) +.SS "WINCNG_CIPHER_ALGORITHM (aes_256_cfb8, BCRYPT_AES_ALGORITHM, 16, 32, 16, EVP_CIPH_CFB8_MODE)" +The AES-256 CFB8 cipher type (Windows CNG provider) .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 -the AES-192-CFB8 EVP_CIPHER pointer\&. +the AES-256-CFB8 EVP_CIPHER pointer\&. .RE .PP -.SS "WINCNG_CIPHER_ALGORITHM (aes_256_cfb8, BCRYPT_AES_ALGORITHM, 16, 32, 16, EVP_CIPH_CFB8_MODE)" -The AES-256 CFB8 cipher type (Windows CNG provider) +.SS "WINCNG_CIPHER_ALGORITHM (des_cbc, BCRYPT_DES_ALGORITHM, 8, 8, 8, EVP_CIPH_CBC_MODE)" +The DES cipher type (Windows CNG provider) .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 -the AES-256-CFB8 EVP_CIPHER pointer\&. +the DES-CBC EVP_CIPHER pointer\&. .RE .PP -.SS "WINCNG_CIPHER_ALGORITHM (rc2_cbc, BCRYPT_RC2_ALGORITHM, 8, 16, 8, EVP_CIPH_CBC_MODE)" -The RC2 cipher type - Windows CNG +.SS "WINCNG_CIPHER_ALGORITHM (des_ede3_cbc, BCRYPT_3DES_ALGORITHM, 8, 24, 8, EVP_CIPH_CBC_MODE)" +The triple DES cipher type (Windows CNG provider) .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 -the RC2 EVP_CIPHER pointer\&. +the DES-EDE3-CBC EVP_CIPHER pointer\&. .RE .PP .SS "WINCNG_CIPHER_ALGORITHM (rc2_40_cbc, BCRYPT_RC2_ALGORITHM, 8, 5, 8, EVP_CIPH_CBC_MODE)" The RC2-40 cipher type - Windows CNG .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 the RC2-40 EVP_CIPHER pointer\&. .RE @@ -1409,16 +1376,25 @@ the RC2-40 EVP_CIPHER pointer\&. .SS "WINCNG_CIPHER_ALGORITHM (rc2_64_cbc, BCRYPT_RC2_ALGORITHM, 8, 8, 8, EVP_CIPH_CBC_MODE)" The RC2-64 cipher type - Windows CNG .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 the RC2-64 EVP_CIPHER pointer\&. .RE .PP +.SS "WINCNG_CIPHER_ALGORITHM (rc2_cbc, BCRYPT_RC2_ALGORITHM, 8, 16, 8, EVP_CIPH_CBC_MODE)" +The RC2 cipher type - Windows CNG +.PP +\fBReturns\fP +.RS 4 +the RC2 EVP_CIPHER pointer\&. +.RE +.PP + .SS "WINCNG_CIPHER_ALGORITHM (rc4, BCRYPT_RC4_ALGORITHM, 1, 16, 0, EVP_CIPH_STREAM_CIPHER| EVP_CIPH_VARIABLE_LENGTH)" The RC4 cipher type (Windows CNG provider) .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 the RC4 EVP_CIPHER pointer\&. .RE @@ -1427,7 +1403,7 @@ the RC4 EVP_CIPHER pointer\&. .SS "WINCNG_CIPHER_ALGORITHM (rc4_40, BCRYPT_RC4_ALGORITHM, 1, 5, 0, EVP_CIPH_STREAM_CIPHER| EVP_CIPH_VARIABLE_LENGTH)" The RC4-40 cipher type (Windows CNG provider) .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 the RC4 EVP_CIPHER pointer\&. .RE @@ -1436,7 +1412,7 @@ the RC4 EVP_CIPHER pointer\&. .SS "WINCNG_CIPHER_ALGORITHM_UNAVAILABLE (camellia_128_cbc)" The Camellia-128 cipher type - CommonCrypto .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 the Camellia-128 EVP_CIPHER pointer\&. .RE @@ -1445,7 +1421,7 @@ the Camellia-128 EVP_CIPHER pointer\&. .SS "WINCNG_CIPHER_ALGORITHM_UNAVAILABLE (camellia_192_cbc)" The Camellia-198 cipher type - CommonCrypto .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 the Camellia-198 EVP_CIPHER pointer\&. .RE @@ -1454,7 +1430,7 @@ the Camellia-198 EVP_CIPHER pointer\&. .SS "WINCNG_CIPHER_ALGORITHM_UNAVAILABLE (camellia_256_cbc)" The Camellia-256 cipher type - CommonCrypto .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 the Camellia-256 EVP_CIPHER pointer\&. .RE diff --git a/doc/doxyout/hcrypto/man/man3/hcrypto_misc.3 b/doc/doxyout/hcrypto/man/man3/hcrypto_misc.3 index 863971e9d277..46a8fd8f76e9 100644 --- a/doc/doxyout/hcrypto/man/man3/hcrypto_misc.3 +++ b/doc/doxyout/hcrypto/man/man3/hcrypto_misc.3 @@ -1,8 +1,8 @@ -.TH "hcrypto_misc" 3 "Fri Jun 7 2019" "Version 7.7.0" "Heimdal crypto library" \" -*- nroff -*- +.TH "hcrypto_misc" 3 "Tue Nov 15 2022" "Version 7.8.0" "Heimdal crypto library" \" -*- nroff -*- .ad l .nh .SH NAME -hcrypto_misc +hcrypto_misc \- hcrypto miscellaneous functions .SH SYNOPSIS .br .PP @@ -24,7 +24,7 @@ hcrypto_misc .SS "int PKCS5_PBKDF2_HMAC (const void * password, size_t password_len, const void * salt, size_t salt_len, unsigned long iter, const EVP_MD * md, size_t keylen, void * key)" As descriped in PKCS5, convert a password, salt, and iteration counter into a crypto key\&. .PP -\fBParameters:\fP +\fBParameters\fP .RS 4 \fIpassword\fP Password\&. .br @@ -43,7 +43,7 @@ As descriped in PKCS5, convert a password, salt, and iteration counter into a cr \fIkey\fP the output key\&. .RE .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 1 on success, non 1 on failure\&. .RE @@ -52,7 +52,7 @@ As descriped in PKCS5, convert a password, salt, and iteration counter into a cr .SS "int PKCS5_PBKDF2_HMAC_SHA1 (const void * password, size_t password_len, const void * salt, size_t salt_len, unsigned long iter, size_t keylen, void * key)" As descriped in PKCS5, convert a password, salt, and iteration counter into a crypto key\&. .PP -\fBParameters:\fP +\fBParameters\fP .RS 4 \fIpassword\fP Password\&. .br @@ -69,7 +69,7 @@ As descriped in PKCS5, convert a password, salt, and iteration counter into a cr \fIkey\fP the output key\&. .RE .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 1 on success, non 1 on failure\&. .RE diff --git a/doc/doxyout/hcrypto/man/man3/hcrypto_rand.3 b/doc/doxyout/hcrypto/man/man3/hcrypto_rand.3 index 610f79c9c6a6..918c2e847e56 100644 --- a/doc/doxyout/hcrypto/man/man3/hcrypto_rand.3 +++ b/doc/doxyout/hcrypto/man/man3/hcrypto_rand.3 @@ -1,8 +1,8 @@ -.TH "hcrypto_rand" 3 "Fri Jun 7 2019" "Version 7.7.0" "Heimdal crypto library" \" -*- nroff -*- +.TH "hcrypto_rand" 3 "Tue Nov 15 2022" "Version 7.8.0" "Heimdal crypto library" \" -*- nroff -*- .ad l .nh .SH NAME -hcrypto_rand +hcrypto_rand \- RAND crypto functions .SH SYNOPSIS .br .PP @@ -54,7 +54,7 @@ See the \fBRAND - random number\fP for description and examples\&. .SS "void RAND_add (const void * indata, size_t size, double entropi)" Seed that random number generator\&. Secret material can securely be feed into the function, they will never be returned\&. .PP -\fBParameters:\fP +\fBParameters\fP .RS 4 \fIindata\fP the input data\&. .br @@ -67,14 +67,14 @@ Seed that random number generator\&. Secret material can securely be feed into t .SS "int RAND_bytes (void * outdata, size_t size)" Get a random block from the random generator, can be used for key material\&. .PP -\fBParameters:\fP +\fBParameters\fP .RS 4 \fIoutdata\fP random data .br \fIsize\fP length random data .RE .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 1 on success, 0 on failure\&. .RE @@ -85,14 +85,14 @@ Reset and free memory used by the random generator\&. .SS "const char* RAND_file_name (char * filename, size_t size)" Return the default random state filename for a user to use for \fBRAND_load_file()\fP, and \fBRAND_write_file()\fP\&. .PP -\fBParameters:\fP +\fBParameters\fP .RS 4 \fIfilename\fP buffer to hold file name\&. .br \fIsize\fP size of buffer filename\&. .RE .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 the buffer filename or NULL on failure\&. .RE @@ -101,7 +101,7 @@ the buffer filename or NULL on failure\&. .SS "const RAND_METHOD* RAND_get_rand_method (void)" Get the default random method\&. .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 Returns a RAND_METHOD .RE @@ -110,14 +110,14 @@ Returns a RAND_METHOD .SS "int RAND_load_file (const char * filename, size_t size)" Load a a file and feed it into \fBRAND_seed()\fP\&. .PP -\fBParameters:\fP +\fBParameters\fP .RS 4 \fIfilename\fP name of file to read\&. .br \fIsize\fP minimum size to read\&. .RE .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 Returns the number of seed bytes loaded (0 indicates failure) .RE @@ -126,14 +126,14 @@ Returns the number of seed bytes loaded (0 indicates failure) .SS "int RAND_pseudo_bytes (void * outdata, size_t size)" Get a random block from the random generator, should NOT be used for key material\&. .PP -\fBParameters:\fP +\fBParameters\fP .RS 4 \fIoutdata\fP random data .br \fIsize\fP length random data .RE .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 1 on success, 0 on failure\&. .RE @@ -142,7 +142,7 @@ Get a random block from the random generator, should NOT be used for key materia .SS "void RAND_seed (const void * indata, size_t size)" Seed that random number generator\&. Secret material can securely be feed into the function, they will never be returned\&. .PP -\fBParameters:\fP +\fBParameters\fP .RS 4 \fIindata\fP seed data .br @@ -153,12 +153,12 @@ Seed that random number generator\&. Secret material can securely be feed into t .SS "int RAND_set_rand_engine (ENGINE * engine)" Set the default random method from engine\&. .PP -\fBParameters:\fP +\fBParameters\fP .RS 4 \fIengine\fP use engine, if NULL is passed it, old method and engine is cleared\&. .RE .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 1 on success, 0 on failure\&. .RE @@ -167,12 +167,12 @@ Set the default random method from engine\&. .SS "int RAND_set_rand_method (const RAND_METHOD * meth)" Set the default random method\&. .PP -\fBParameters:\fP +\fBParameters\fP .RS 4 \fImeth\fP set the new default method\&. .RE .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 1 on success\&. .RE @@ -181,7 +181,7 @@ Set the default random method\&. .SS "int RAND_status (void)" Return status of the random generator .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 1 if the random generator can deliver random data\&. .RE @@ -190,12 +190,12 @@ Return status of the random generator .SS "int RAND_write_file (const char * filename)" Write of random numbers to a file to store for later initiation with \fBRAND_load_file()\fP\&. .PP -\fBParameters:\fP +\fBParameters\fP .RS 4 \fIfilename\fP name of file to write\&. .RE .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 1 on success and non-one on failure\&. .RE diff --git a/doc/doxyout/hcrypto/man/man3/hcrypto_rsa.3 b/doc/doxyout/hcrypto/man/man3/hcrypto_rsa.3 index 5fa2c5cd36a9..f7636b277ea3 100644 --- a/doc/doxyout/hcrypto/man/man3/hcrypto_rsa.3 +++ b/doc/doxyout/hcrypto/man/man3/hcrypto_rsa.3 @@ -1,8 +1,8 @@ -.TH "hcrypto_rsa" 3 "Fri Jun 7 2019" "Version 7.7.0" "Heimdal crypto library" \" -*- nroff -*- +.TH "hcrypto_rsa" 3 "Tue Nov 15 2022" "Version 7.8.0" "Heimdal crypto library" \" -*- nroff -*- .ad l .nh .SH NAME -hcrypto_rsa +hcrypto_rsa \- RSA functions .SH SYNOPSIS .br .PP @@ -42,7 +42,7 @@ See the \fBRSA - public-key cryptography\fP for description and examples\&. .SS "void RSA_free (RSA * rsa)" Free an allocation RSA object\&. .PP -\fBParameters:\fP +\fBParameters\fP .RS 4 \fIrsa\fP the RSA object to free\&. .RE @@ -51,12 +51,12 @@ Free an allocation RSA object\&. .SS "void* RSA_get_app_data (const RSA * rsa)" Get the application data for the RSA object\&. .PP -\fBParameters:\fP +\fBParameters\fP .RS 4 \fIrsa\fP the rsa object to get the parameter for .RE .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 the data object .RE @@ -65,12 +65,12 @@ the data object .SS "const RSA_METHOD* RSA_get_method (const RSA * rsa)" Return the RSA_METHOD used for this RSA object\&. .PP -\fBParameters:\fP +\fBParameters\fP .RS 4 \fIrsa\fP the object to get the method from\&. .RE .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 the method used for this RSA object\&. .RE @@ -79,7 +79,7 @@ the method used for this RSA object\&. .SS "RSA* RSA_new (void)" Same as \fBRSA_new_method()\fP using NULL as engine\&. .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 a newly allocated RSA object\&. Free with \fBRSA_free()\fP\&. .RE @@ -88,12 +88,12 @@ a newly allocated RSA object\&. Free with \fBRSA_free()\fP\&. .SS "RSA* RSA_new_method (ENGINE * engine)" Allocate a new RSA object using the engine, if NULL is specified as the engine, use the default RSA engine as returned by ENGINE_get_default_RSA()\&. .PP -\fBParameters:\fP +\fBParameters\fP .RS 4 \fIengine\fP Specific what ENGINE RSA provider should be used\&. .RE .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 a newly allocated RSA object\&. Free with \fBRSA_free()\fP\&. .RE @@ -102,14 +102,14 @@ a newly allocated RSA object\&. Free with \fBRSA_free()\fP\&. .SS "int RSA_set_app_data (RSA * rsa, void * arg)" Set the application data for the RSA object\&. .PP -\fBParameters:\fP +\fBParameters\fP .RS 4 \fIrsa\fP the rsa object to set the parameter for .br \fIarg\fP the data object to store .RE .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 1 on success\&. .RE @@ -118,14 +118,14 @@ Set the application data for the RSA object\&. .SS "int RSA_set_method (RSA * rsa, const RSA_METHOD * method)" Set a new method for the RSA keypair\&. .PP -\fBParameters:\fP +\fBParameters\fP .RS 4 \fIrsa\fP rsa parameter\&. .br \fImethod\fP the new method for the RSA parameter\&. .RE .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 1 on success\&. .RE @@ -134,12 +134,12 @@ Set a new method for the RSA keypair\&. .SS "int RSA_up_ref (RSA * rsa)" Add an extra reference to the RSA object\&. The object should be free with \fBRSA_free()\fP to drop the reference\&. .PP -\fBParameters:\fP +\fBParameters\fP .RS 4 \fIrsa\fP the object to add reference counting too\&. .RE .PP -\fBReturns:\fP +\fBReturns\fP .RS 4 the current reference count, can't safely be used except for debug printing\&. .RE diff --git a/doc/doxyout/hcrypto/man/man3/page_des.3 b/doc/doxyout/hcrypto/man/man3/page_des.3 index bf532f7b5578..74203517a210 100644 --- a/doc/doxyout/hcrypto/man/man3/page_des.3 +++ b/doc/doxyout/hcrypto/man/man3/page_des.3 @@ -1,9 +1,9 @@ -.TH "page_des" 3 "Fri Jun 7 2019" "Version 7.7.0" "Heimdal crypto library" \" -*- nroff -*- +.TH "page_des" 3 "Tue Nov 15 2022" "Version 7.8.0" "Heimdal crypto library" \" -*- nroff -*- .ad l .nh .SH NAME -page_desDES - Data Encryption Standard crypto interface - \- See the library functions here: \fBDES crypto functions\fP +page_des \- DES - Data Encryption Standard crypto interface +See the library functions here: \fBDES crypto functions\fP .PP DES was created by IBM, modififed by NSA and then adopted by NBS (now NIST) and published ad FIPS PUB 46 (updated by FIPS 46-1)\&. .PP diff --git a/doc/doxyout/hcrypto/man/man3/page_dh.3 b/doc/doxyout/hcrypto/man/man3/page_dh.3 index 9828a495c95d..2c83f159edf0 100644 --- a/doc/doxyout/hcrypto/man/man3/page_dh.3 +++ b/doc/doxyout/hcrypto/man/man3/page_dh.3 @@ -1,9 +1,9 @@ -.TH "page_dh" 3 "Fri Jun 7 2019" "Version 7.7.0" "Heimdal crypto library" \" -*- nroff -*- +.TH "page_dh" 3 "Tue Nov 15 2022" "Version 7.8.0" "Heimdal crypto library" \" -*- nroff -*- .ad l .nh .SH NAME -page_dhDH - Diffie-Hellman key exchange - \- Diffie-Hellman key exchange is a protocol that allows two parties to establish a shared secret key\&. +page_dh \- DH - Diffie-Hellman key exchange +Diffie-Hellman key exchange is a protocol that allows two parties to establish a shared secret key\&. .PP Include and example how to use \fBDH_new()\fP and friends here\&. .PP diff --git a/doc/doxyout/hcrypto/man/man3/page_evp.3 b/doc/doxyout/hcrypto/man/man3/page_evp.3 index f152be1b4da1..45bf8d6272f3 100644 --- a/doc/doxyout/hcrypto/man/man3/page_evp.3 +++ b/doc/doxyout/hcrypto/man/man3/page_evp.3 @@ -1,9 +1,9 @@ -.TH "page_evp" 3 "Fri Jun 7 2019" "Version 7.7.0" "Heimdal crypto library" \" -*- nroff -*- +.TH "page_evp" 3 "Tue Nov 15 2022" "Version 7.8.0" "Heimdal crypto library" \" -*- nroff -*- .ad l .nh .SH NAME -page_evpEVP - generic crypto interface - \- See the library functions here: \fBEVP generic crypto functions\fP +page_evp \- EVP - generic crypto interface +See the library functions here: \fBEVP generic crypto functions\fP .SH "EVP Cipher" .PP The use of \fBEVP_CipherInit_ex()\fP and EVP_Cipher() is pretty easy to understand forward, then \fBEVP_CipherUpdate()\fP and \fBEVP_CipherFinal_ex()\fP really needs an example to explain \fBexample_evp_cipher\&.c\fP \&. diff --git a/doc/doxyout/hcrypto/man/man3/page_rand.3 b/doc/doxyout/hcrypto/man/man3/page_rand.3 index fd66b5341cde..8ad6111f403e 100644 --- a/doc/doxyout/hcrypto/man/man3/page_rand.3 +++ b/doc/doxyout/hcrypto/man/man3/page_rand.3 @@ -1,6 +1,6 @@ -.TH "page_rand" 3 "Fri Jun 7 2019" "Version 7.7.0" "Heimdal crypto library" \" -*- nroff -*- +.TH "page_rand" 3 "Tue Nov 15 2022" "Version 7.8.0" "Heimdal crypto library" \" -*- nroff -*- .ad l .nh .SH NAME -page_randRAND - random number - \- See the library functions here: \fBRAND crypto functions\fP +page_rand \- RAND - random number +See the library functions here: \fBRAND crypto functions\fP diff --git a/doc/doxyout/hcrypto/man/man3/page_rsa.3 b/doc/doxyout/hcrypto/man/man3/page_rsa.3 index c8372abb71e5..44e9c7cd7529 100644 --- a/doc/doxyout/hcrypto/man/man3/page_rsa.3 +++ b/doc/doxyout/hcrypto/man/man3/page_rsa.3 @@ -1,14 +1,12 @@ -.TH "page_rsa" 3 "Fri Jun 7 2019" "Version 7.7.0" "Heimdal crypto library" \" -*- nroff -*- +.TH "page_rsa" 3 "Tue Nov 15 2022" "Version 7.8.0" "Heimdal crypto library" \" -*- nroff -*- .ad l .nh .SH NAME -page_rsaRSA - public-key cryptography - \- RSA is named by its inventors (Ron Rivest, Adi Shamir, and Leonard Adleman) (published in 1977), patented expired in 21 September 2000\&. +page_rsa \- RSA - public-key cryptography +RSA is named by its inventors (Ron Rivest, Adi Shamir, and Leonard Adleman) (published in 1977), patented expired in 21 September 2000\&. .PP Speed for RSA in seconds no key blinding 1000 iteration, same rsa keys (1024 and 2048) operation performed each eteration sign, verify, encrypt, decrypt on a random bit pattern -.PP -.SH "name 1024 2048 4098 " -.PP +.SH "name 1024 2048 4098" .PP gmp: 0\&.73 6\&.60 44\&.80 tfm: 2\&.45 -- -- ltm: 3\&.79 20\&.74 105\&.41 (default in hcrypto) openssl: 4\&.04 11\&.90 82\&.59 cdsa: 15\&.89 102\&.89 721\&.40 imath: 40\&.62 -- -- .PP |
