diff options
Diffstat (limited to 'doc')
-rw-r--r-- | doc/man7/evp.pod | 20 |
1 files changed, 10 insertions, 10 deletions
diff --git a/doc/man7/evp.pod b/doc/man7/evp.pod index fbc357eb48..e3823bac7f 100644 --- a/doc/man7/evp.pod +++ b/doc/man7/evp.pod @@ -13,19 +13,19 @@ evp - high-level cryptographic functions The EVP library provides a high-level interface to cryptographic functions. -L<B<EVP_Seal>I<...>|EVP_SealInit(3)> and L<B<EVP_Open>I<...>|EVP_OpenInit(3)> -provide public key encryption and decryption to implement digital "envelopes". +The L<B<EVP_Seal>I<XXX>|EVP_SealInit(3)> and L<B<EVP_Open>I<XXX>|EVP_OpenInit(3)> +functions provide public key encryption and decryption to implement digital "envelopes". -The L<B<EVP_DigestSign>I<...>|EVP_DigestSignInit(3)> and -L<B<EVP_DigestVerify>I<...>|EVP_DigestVerifyInit(3)> functions implement +The L<B<EVP_DigestSign>I<XXX>|EVP_DigestSignInit(3)> and +L<B<EVP_DigestVerify>I<XXX>|EVP_DigestVerifyInit(3)> functions implement digital signatures and Message Authentication Codes (MACs). Also see the older -L<B<EVP_Sign>I<...>|EVP_SignInit(3)> and L<B<EVP_Verify>I<...>|EVP_VerifyInit(3)> +L<B<EVP_Sign>I<XXX>|EVP_SignInit(3)> and L<B<EVP_Verify>I<XXX>|EVP_VerifyInit(3)> functions. -Symmetric encryption is available with the L<B<EVP_Encrypt>I<...>|EVP_EncryptInit(3)> -functions. The L<B<EVP_Digest>I<...>|EVP_DigestInit(3)> functions provide message digests. +Symmetric encryption is available with the L<B<EVP_Encrypt>I<XXX>|EVP_EncryptInit(3)> +functions. The L<B<EVP_Digest>I<XXX>|EVP_DigestInit(3)> functions provide message digests. -The B<EVP_PKEY>I<...> functions provide a high level interface to +The B<EVP_PKEY>I<XXX> functions provide a high level interface to asymmetric algorithms. To create a new EVP_PKEY see L<EVP_PKEY_new(3)>. EVP_PKEYs can be associated with a private key of a particular algorithm by using the functions @@ -61,8 +61,8 @@ based encryption. Careful selection of the parameters will provide a PKCS#5 PBKD implementation. However, new applications should not typically use this (preferring, for example, PBKDF2 from PCKS#5). -The L<B<EVP_Encode>I<...>|EVP_EncodeInit(3)> and -L<B<EVP_Decode>I<...>|EVP_EncodeInit(3)> functions implement base 64 encoding +The L<B<EVP_Encode>I<XXX>|EVP_EncodeInit(3)> and +L<B<EVP_Decode>I<XXX>|EVP_EncodeInit(3)> functions implement base 64 encoding and decoding. All the symmetric algorithms (ciphers), digests and asymmetric algorithms |