aboutsummaryrefslogtreecommitdiffstats
path: root/doc/doxyout/hcrypto/man/man3
diff options
context:
space:
mode:
Diffstat (limited to 'doc/doxyout/hcrypto/man/man3')
-rw-r--r--doc/doxyout/hcrypto/man/man3/OSSL_CIPHER_ALGORITHM.31
-rw-r--r--doc/doxyout/hcrypto/man/man3/PKCS5_PBKDF2_HMAC.31
-rw-r--r--doc/doxyout/hcrypto/man/man3/WINCNG_CIPHER_ALGORITHM.31
-rw-r--r--doc/doxyout/hcrypto/man/man3/WINCNG_CIPHER_ALGORITHM_UNAVAILABLE.31
-rw-r--r--doc/doxyout/hcrypto/man/man3/hcrypto_core.339
-rw-r--r--doc/doxyout/hcrypto/man/man3/hcrypto_des.3135
-rw-r--r--doc/doxyout/hcrypto/man/man3/hcrypto_dh.3140
-rw-r--r--doc/doxyout/hcrypto/man/man3/hcrypto_evp.3660
-rw-r--r--doc/doxyout/hcrypto/man/man3/hcrypto_misc.358
-rw-r--r--doc/doxyout/hcrypto/man/man3/hcrypto_rand.390
-rw-r--r--doc/doxyout/hcrypto/man/man3/hcrypto_rsa.360
-rw-r--r--doc/doxyout/hcrypto/man/man3/page_des.335
-rw-r--r--doc/doxyout/hcrypto/man/man3/page_dh.38
-rw-r--r--doc/doxyout/hcrypto/man/man3/page_evp.38
-rw-r--r--doc/doxyout/hcrypto/man/man3/page_rand.36
-rw-r--r--doc/doxyout/hcrypto/man/man3/page_rsa.311
16 files changed, 719 insertions, 535 deletions
diff --git a/doc/doxyout/hcrypto/man/man3/OSSL_CIPHER_ALGORITHM.3 b/doc/doxyout/hcrypto/man/man3/OSSL_CIPHER_ALGORITHM.3
new file mode 100644
index 000000000000..d526f956e4fb
--- /dev/null
+++ b/doc/doxyout/hcrypto/man/man3/OSSL_CIPHER_ALGORITHM.3
@@ -0,0 +1 @@
+.so man3/hcrypto_evp.3
diff --git a/doc/doxyout/hcrypto/man/man3/PKCS5_PBKDF2_HMAC.3 b/doc/doxyout/hcrypto/man/man3/PKCS5_PBKDF2_HMAC.3
new file mode 100644
index 000000000000..a6545bd8d828
--- /dev/null
+++ b/doc/doxyout/hcrypto/man/man3/PKCS5_PBKDF2_HMAC.3
@@ -0,0 +1 @@
+.so man3/hcrypto_misc.3
diff --git a/doc/doxyout/hcrypto/man/man3/WINCNG_CIPHER_ALGORITHM.3 b/doc/doxyout/hcrypto/man/man3/WINCNG_CIPHER_ALGORITHM.3
new file mode 100644
index 000000000000..d526f956e4fb
--- /dev/null
+++ b/doc/doxyout/hcrypto/man/man3/WINCNG_CIPHER_ALGORITHM.3
@@ -0,0 +1 @@
+.so man3/hcrypto_evp.3
diff --git a/doc/doxyout/hcrypto/man/man3/WINCNG_CIPHER_ALGORITHM_UNAVAILABLE.3 b/doc/doxyout/hcrypto/man/man3/WINCNG_CIPHER_ALGORITHM_UNAVAILABLE.3
new file mode 100644
index 000000000000..d526f956e4fb
--- /dev/null
+++ b/doc/doxyout/hcrypto/man/man3/WINCNG_CIPHER_ALGORITHM_UNAVAILABLE.3
@@ -0,0 +1 @@
+.so man3/hcrypto_evp.3
diff --git a/doc/doxyout/hcrypto/man/man3/hcrypto_core.3 b/doc/doxyout/hcrypto/man/man3/hcrypto_core.3
index f7d829aee197..dbb50b0fab84 100644
--- a/doc/doxyout/hcrypto/man/man3/hcrypto_core.3
+++ b/doc/doxyout/hcrypto/man/man3/hcrypto_core.3
@@ -1,8 +1,11 @@
-.TH "hcrypto function controlling behavior" 3 "11 Jan 2012" "Version 1.5.2" "Heimdal crypto library" \" -*- nroff -*-
+.TH "hcrypto_core" 3 "Fri Dec 8 2017" "Version 7.5.0" "Heimdal crypto library" \" -*- nroff -*-
.ad l
.nh
.SH NAME
-hcrypto function controlling behavior \-
+hcrypto_core
+.SH SYNOPSIS
+.br
+.PP
.SS "Functions"
.in +1c
@@ -28,49 +31,47 @@ hcrypto function controlling behavior \-
.SH "Function Documentation"
.PP
.SS "int EVP_CIPHER_CTX_ctrl (EVP_CIPHER_CTX * ctx, int type, int arg, void * data)"
-.PP
Perform a operation on a ctx
.PP
\fBParameters:\fP
.RS 4
-\fIctx\fP context to perform operation on.
+\fIctx\fP context to perform operation on\&.
.br
-\fItype\fP type of operation.
+\fItype\fP type of operation\&.
.br
-\fIarg\fP argument to operation.
+\fIarg\fP argument to operation\&.
.br
-\fIdata\fP addition data to operation.
+\fIdata\fP addition data to operation\&.
.RE
.PP
\fBReturns:\fP
.RS 4
-1 for success, 0 for failure.
+1 for success, 0 for failure\&.
.RE
.PP
.SS "int EVP_CIPHER_CTX_rand_key (EVP_CIPHER_CTX * ctx, void * key)"
-.PP
-Generate a random key for the specificed EVP_CIPHER.
+Generate a random key for the specificed EVP_CIPHER\&.
.PP
\fBParameters:\fP
.RS 4
-\fIctx\fP EVP_CIPHER_CTX type to build the key for.
+\fIctx\fP EVP_CIPHER_CTX type to build the key for\&.
.br
-\fIkey\fP return key, must be at least \fBEVP_CIPHER_key_length()\fP byte long.
+\fIkey\fP return key, must be at least \fBEVP_CIPHER_key_length()\fP byte long\&.
.RE
.PP
\fBReturns:\fP
.RS 4
-1 for success, 0 for failure.
+1 for success, 0 for failure\&.
.RE
.PP
.SS "void OpenSSL_add_all_algorithms (void)"
-.PP
-Add all algorithms to the crypto core.
+Add all algorithms to the crypto core\&.
.SS "void OpenSSL_add_all_algorithms_conf (void)"
-.PP
-Add all algorithms to the crypto core using configuration file.
+Add all algorithms to the crypto core using configuration file\&.
.SS "void OpenSSL_add_all_algorithms_noconf (void)"
-.PP
-Add all algorithms to the crypto core, but don't use the configuration file.
+Add all algorithms to the crypto core, but don't use the configuration file\&.
+.SH "Author"
+.PP
+Generated automatically by Doxygen for Heimdal crypto library from the source code\&.
diff --git a/doc/doxyout/hcrypto/man/man3/hcrypto_des.3 b/doc/doxyout/hcrypto/man/man3/hcrypto_des.3
index fd70a60a30e8..5459961fb3ca 100644
--- a/doc/doxyout/hcrypto/man/man3/hcrypto_des.3
+++ b/doc/doxyout/hcrypto/man/man3/hcrypto_des.3
@@ -1,8 +1,11 @@
-.TH "DES crypto functions" 3 "11 Jan 2012" "Version 1.5.2" "Heimdal crypto library" \" -*- nroff -*-
+.TH "hcrypto_des" 3 "Fri Dec 8 2017" "Version 7.5.0" "Heimdal crypto library" \" -*- nroff -*-
.ad l
.nh
.SH NAME
-DES crypto functions \-
+hcrypto_des
+.SH SYNOPSIS
+.br
+.PP
.SS "Functions"
.in +1c
@@ -66,14 +69,13 @@ DES crypto functions \-
.in -1c
.SH "Detailed Description"
.PP
-See the \fBDES - Data Encryption Standard crypto interface\fP for description and examples.
+See the \fBDES - Data Encryption Standard crypto interface\fP for description and examples\&.
.SH "Function Documentation"
.PP
.SS "uint32_t DES_cbc_cksum (const void * in, DES_cblock * output, long length, DES_key_schedule * ks, DES_cblock * iv)"
+Crete a checksum using DES in CBC encryption mode\&. This mode is only used for Kerberos 4, and it should stay that way\&.
.PP
-Crete a checksum using DES in CBC encryption mode. This mode is only used for Kerberos 4, and it should stay that way.
-.PP
-The IV must always be diffrent for diffrent input data blocks.
+The IV must always be diffrent for diffrent input data blocks\&.
.PP
\fBParameters:\fP
.RS 4
@@ -90,10 +92,9 @@ The IV must always be diffrent for diffrent input data blocks.
.PP
.SS "void DES_cbc_encrypt (const void * in, void * out, long length, DES_key_schedule * ks, DES_cblock * iv, int encp)"
+Encrypt/decrypt a block using DES in Chain Block Cipher mode (cbc)\&.
.PP
-Encrypt/decrypt a block using DES in Chain Block Cipher mode (cbc).
-.PP
-The IV must always be diffrent for diffrent input data blocks.
+The IV must always be diffrent for diffrent input data blocks\&.
.PP
\fBParameters:\fP
.RS 4
@@ -107,15 +108,14 @@ The IV must always be diffrent for diffrent input data blocks.
.br
\fIiv\fP initial vector to use
.br
-\fIencp\fP if non zero, encrypt. if zero, decrypt.
+\fIencp\fP if non zero, encrypt\&. if zero, decrypt\&.
.RE
.PP
.SS "void DES_cfb64_encrypt (const void * in, void * out, long length, DES_key_schedule * ks, DES_cblock * iv, int * num, int encp)"
+Encrypt/decrypt using DES in cipher feedback mode with 64 bit feedback\&.
.PP
-Encrypt/decrypt using DES in cipher feedback mode with 64 bit feedback.
-.PP
-The IV must always be diffrent for diffrent input data blocks.
+The IV must always be diffrent for diffrent input data blocks\&.
.PP
\fBParameters:\fP
.RS 4
@@ -129,30 +129,28 @@ The IV must always be diffrent for diffrent input data blocks.
.br
\fIiv\fP initial vector to use
.br
-\fInum\fP offset into in cipher block encryption/decryption stop last time.
+\fInum\fP offset into in cipher block encryption/decryption stop last time\&.
.br
-\fIencp\fP if non zero, encrypt. if zero, decrypt.
+\fIencp\fP if non zero, encrypt\&. if zero, decrypt\&.
.RE
.PP
.SS "int HC_DEPRECATED DES_check_key_parity (DES_cblock * key)"
-.PP
-Check if the key have correct parity.
+Check if the key have correct parity\&.
.PP
\fBParameters:\fP
.RS 4
-\fIkey\fP key to check the parity.
+\fIkey\fP key to check the parity\&.
.RE
.PP
\fBReturns:\fP
.RS 4
-1 on success, 0 on failure.
+1 on success, 0 on failure\&.
.RE
.PP
.SS "void DES_ecb3_encrypt (DES_cblock * input, DES_cblock * output, DES_key_schedule * ks1, DES_key_schedule * ks2, DES_key_schedule * ks3, int encp)"
-.PP
-Encrypt/decrypt a block using triple DES using EDE mode, encrypt/decrypt/encrypt.
+Encrypt/decrypt a block using triple DES using EDE mode, encrypt/decrypt/encrypt\&.
.PP
\fBParameters:\fP
.RS 4
@@ -166,13 +164,12 @@ Encrypt/decrypt a block using triple DES using EDE mode, encrypt/decrypt/encrypt
.br
\fIks3\fP key schedule to use
.br
-\fIencp\fP if non zero, encrypt. if zero, decrypt.
+\fIencp\fP if non zero, encrypt\&. if zero, decrypt\&.
.RE
.PP
.SS "void DES_ecb_encrypt (DES_cblock * input, DES_cblock * output, DES_key_schedule * ks, int encp)"
-.PP
-Encrypt/decrypt a block using DES.
+Encrypt/decrypt a block using DES\&.
.PP
\fBParameters:\fP
.RS 4
@@ -182,15 +179,14 @@ Encrypt/decrypt a block using DES.
.br
\fIks\fP key schedule to use
.br
-\fIencp\fP if non zero, encrypt. if zero, decrypt.
+\fIencp\fP if non zero, encrypt\&. if zero, decrypt\&.
.RE
.PP
.SS "void DES_ede3_cbc_encrypt (const void * in, void * out, long length, DES_key_schedule * ks1, DES_key_schedule * ks2, DES_key_schedule * ks3, DES_cblock * iv, int encp)"
+Encrypt/decrypt using Triple DES in Chain Block Cipher mode (cbc)\&.
.PP
-Encrypt/decrypt using Triple DES in Chain Block Cipher mode (cbc).
-.PP
-The IV must always be diffrent for diffrent input data blocks.
+The IV must always be diffrent for diffrent input data blocks\&.
.PP
\fBParameters:\fP
.RS 4
@@ -208,13 +204,12 @@ The IV must always be diffrent for diffrent input data blocks.
.br
\fIiv\fP initial vector to use
.br
-\fIencp\fP if non zero, encrypt. if zero, decrypt.
+\fIencp\fP if non zero, encrypt\&. if zero, decrypt\&.
.RE
.PP
.SS "void DES_encrypt (uint32_t u[2], DES_key_schedule * ks, int encp)"
-.PP
-Encrypt/decrypt a block using DES. Also called ECB mode
+Encrypt/decrypt a block using DES\&. Also called ECB mode
.PP
\fBParameters:\fP
.RS 4
@@ -222,72 +217,67 @@ Encrypt/decrypt a block using DES. Also called ECB mode
.br
\fIks\fP key schedule to use
.br
-\fIencp\fP if non zero, encrypt. if zero, decrypt.
+\fIencp\fP if non zero, encrypt\&. if zero, decrypt\&.
.RE
.PP
.SS "void HC_DEPRECATED DES_init_random_number_generator (DES_cblock * seed)"
-.PP
-Seed the random number generator. Deprecated, use \fBRAND - random number\fP
+Seed the random number generator\&. Deprecated, use \fBRAND - random number\fP
.PP
\fBParameters:\fP
.RS 4
-\fIseed\fP a seed to seed that random number generate with.
+\fIseed\fP a seed to seed that random number generate with\&.
.RE
.PP
.SS "int DES_is_weak_key (DES_cblock * key)"
-.PP
-Checks if the key is any of the weaks keys that makes DES attacks trival.
+Checks if the key is any of the weaks keys that makes DES attacks trival\&.
.PP
\fBParameters:\fP
.RS 4
-\fIkey\fP key to check.
+\fIkey\fP key to check\&.
.RE
.PP
\fBReturns:\fP
.RS 4
-1 if the key is weak, 0 otherwise.
+1 if the key is weak, 0 otherwise\&.
.RE
.PP
.SS "int DES_key_sched (DES_cblock * key, DES_key_schedule * ks)"
-.PP
-Compatibility function for eay libdes, works just like \fBDES_set_key_checked()\fP.
+Compatibility function for eay libdes, works just like \fBDES_set_key_checked()\fP\&.
.PP
\fBParameters:\fP
.RS 4
-\fIkey\fP a key to initialize the key schedule with.
+\fIkey\fP a key to initialize the key schedule with\&.
.br
-\fIks\fP a key schedule to initialize.
+\fIks\fP a key schedule to initialize\&.
.RE
.PP
\fBReturns:\fP
.RS 4
-0 on success, -1 on invalid parity, -2 on weak key.
+0 on success, -1 on invalid parity, -2 on weak key\&.
.RE
.PP
.SS "int HC_DEPRECATED DES_new_random_key (DES_cblock * key)"
-.PP
-Generate a random des key using a random block, fixup parity and skip weak keys.
+Generate a random des key using a random block, fixup parity and skip weak keys\&.
.PP
\fBParameters:\fP
.RS 4
-\fIkey\fP is set to a random key.
+\fIkey\fP is set to a random key\&.
.RE
.PP
\fBReturns:\fP
.RS 4
-0 on success, non zero on random number generator failure.
+0 on success, non zero on random number generator failure\&.
.RE
.PP
.SS "void DES_pcbc_encrypt (const void * in, void * out, long length, DES_key_schedule * ks, DES_cblock * iv, int encp)"
+Encrypt/decrypt a block using DES in Propagating Cipher Block Chaining mode\&. This mode is only used for Kerberos 4, and it should stay that way\&.
.PP
-Encrypt/decrypt a block using DES in Propagating Cipher Block Chaining mode. This mode is only used for Kerberos 4, and it should stay that way.
-.PP
-The IV must always be diffrent for diffrent input data blocks.
+The IV must always be diffrent for diffrent input data blocks\&.
.PP
\fBParameters:\fP
.RS 4
@@ -301,29 +291,27 @@ The IV must always be diffrent for diffrent input data blocks.
.br
\fIiv\fP initial vector to use
.br
-\fIencp\fP if non zero, encrypt. if zero, decrypt.
+\fIencp\fP if non zero, encrypt\&. if zero, decrypt\&.
.RE
.PP
.SS "void HC_DEPRECATED DES_random_key (DES_cblock * key)"
-.PP
-Generate a random key, deprecated since it doesn't return an error code, use \fBDES_new_random_key()\fP.
+Generate a random key, deprecated since it doesn't return an error code, use \fBDES_new_random_key()\fP\&.
.PP
\fBParameters:\fP
.RS 4
-\fIkey\fP is set to a random key.
+\fIkey\fP is set to a random key\&.
.RE
.PP
.SS "int HC_DEPRECATED DES_set_key (DES_cblock * key, DES_key_schedule * ks)"
-.PP
-Setup a des key schedule from a key. Deprecated function, use \fBDES_set_key_unchecked()\fP or \fBDES_set_key_checked()\fP instead.
+Setup a des key schedule from a key\&. Deprecated function, use \fBDES_set_key_unchecked()\fP or \fBDES_set_key_checked()\fP instead\&.
.PP
\fBParameters:\fP
.RS 4
-\fIkey\fP a key to initialize the key schedule with.
+\fIkey\fP a key to initialize the key schedule with\&.
.br
-\fIks\fP a key schedule to initialize.
+\fIks\fP a key schedule to initialize\&.
.RE
.PP
\fBReturns:\fP
@@ -333,33 +321,31 @@ Setup a des key schedule from a key. Deprecated function, use \fBDES_set_key_unc
.PP
.SS "int DES_set_key_checked (DES_cblock * key, DES_key_schedule * ks)"
-.PP
-Just like \fBDES_set_key_unchecked()\fP except checking that the key is not weak for or have correct parity.
+Just like \fBDES_set_key_unchecked()\fP except checking that the key is not weak for or have correct parity\&.
.PP
\fBParameters:\fP
.RS 4
-\fIkey\fP a key to initialize the key schedule with.
+\fIkey\fP a key to initialize the key schedule with\&.
.br
-\fIks\fP a key schedule to initialize.
+\fIks\fP a key schedule to initialize\&.
.RE
.PP
\fBReturns:\fP
.RS 4
-0 on success, -1 on invalid parity, -2 on weak key.
+0 on success, -1 on invalid parity, -2 on weak key\&.
.RE
.PP
.SS "int DES_set_key_unchecked (DES_cblock * key, DES_key_schedule * ks)"
+Setup a des key schedule from a key\&. The key is no longer needed after this transaction and can cleared\&.
.PP
-Setup a des key schedule from a key. The key is no longer needed after this transaction and can cleared.
-.PP
-Does NOT check that the key is weak for or have wrong parity.
+Does NOT check that the key is weak for or have wrong parity\&.
.PP
\fBParameters:\fP
.RS 4
-\fIkey\fP a key to initialize the key schedule with.
+\fIkey\fP a key to initialize the key schedule with\&.
.br
-\fIks\fP a key schedule to initialize.
+\fIks\fP a key schedule to initialize\&.
.RE
.PP
\fBReturns:\fP
@@ -369,18 +355,16 @@ Does NOT check that the key is weak for or have wrong parity.
.PP
.SS "void DES_set_odd_parity (DES_cblock * key)"
-.PP
-Set the parity of the key block, used to generate a des key from a random key. See \fBDES key generation\fP.
+Set the parity of the key block, used to generate a des key from a random key\&. See \fBDES key generation\fP\&.
.PP
\fBParameters:\fP
.RS 4
-\fIkey\fP key to fixup the parity for.
+\fIkey\fP key to fixup the parity for\&.
.RE
.PP
.SS "void DES_string_to_key (const char * str, DES_cblock * key)"
-.PP
-Convert a string to a DES key. Use something like \fBPKCS5_PBKDF2_HMAC_SHA1()\fP to create key from passwords.
+Convert a string to a DES key\&. Use something like \fBPKCS5_PBKDF2_HMAC_SHA1()\fP to create key from passwords\&.
.PP
\fBParameters:\fP
.RS 4
@@ -390,3 +374,6 @@ Convert a string to a DES key. Use something like \fBPKCS5_PBKDF2_HMAC_SHA1()\fP
.RE
.PP
+.SH "Author"
+.PP
+Generated automatically by Doxygen for Heimdal crypto library from the source code\&.
diff --git a/doc/doxyout/hcrypto/man/man3/hcrypto_dh.3 b/doc/doxyout/hcrypto/man/man3/hcrypto_dh.3
index 035faf2e279c..8be0607585e3 100644
--- a/doc/doxyout/hcrypto/man/man3/hcrypto_dh.3
+++ b/doc/doxyout/hcrypto/man/man3/hcrypto_dh.3
@@ -1,8 +1,11 @@
-.TH "Diffie-Hellman functions" 3 "11 Jan 2012" "Version 1.5.2" "Heimdal crypto library" \" -*- nroff -*-
+.TH "hcrypto_dh" 3 "Fri Dec 8 2017" "Version 7.5.0" "Heimdal crypto library" \" -*- nroff -*-
.ad l
.nh
.SH NAME
-Diffie-Hellman functions \-
+hcrypto_dh
+.SH SYNOPSIS
+.br
+.PP
.SS "Functions"
.in +1c
@@ -57,20 +60,19 @@ Diffie-Hellman functions \-
.in -1c
.SH "Detailed Description"
.PP
-See the \fBDH - Diffie-Hellman key exchange\fP for description and examples.
+See the \fBDH - Diffie-Hellman key exchange\fP for description and examples\&.
.SH "Function Documentation"
.PP
.SS "int DH_check_pubkey (const DH * dh, const BIGNUM * pub_key, int * codes)"
-.PP
-Check that the public key is sane.
+Check that the public key is sane\&.
.PP
\fBParameters:\fP
.RS 4
-\fIdh\fP the local peer DH parameters.
+\fIdh\fP the local peer DH parameters\&.
.br
-\fIpub_key\fP the remote peer public key parameters.
+\fIpub_key\fP the remote peer public key parameters\&.
.br
-\fIcodes\fP return that the failures of the pub_key are.
+\fIcodes\fP return that the failures of the pub_key are\&.
.RE
.PP
\fBReturns:\fP
@@ -78,107 +80,93 @@ Check that the public key is sane.
1 on success, 0 on failure and *codes is set the the combined fail check for the public key
.RE
.PP
-
-.PP
Checks that the function performs are:
.IP "\(bu" 2
pub_key is not negative
-.PP
-.PP
.IP "\(bu" 2
-pub_key > 1 and pub_key < p - 1, to avoid small subgroups attack.
-.PP
-.PP
+pub_key > 1 and pub_key < p - 1, to avoid small subgroups attack\&.
.IP "\(bu" 2
-if g == 2, pub_key have more then one bit set, if bits set is 1, log_2(pub_key) is trival
+if g == 2, pub_key have more then one bit set, if bits set is 1, log_2(pub_key) is trival
.PP
.SS "int DH_compute_key (unsigned char * shared_key, const BIGNUM * peer_pub_key, DH * dh)"
-.PP
-Complute the shared secret key.
+Complute the shared secret key\&.
.PP
\fBParameters:\fP
.RS 4
-\fIshared_key\fP the resulting shared key, need to be at least \fBDH_size()\fP large.
+\fIshared_key\fP the resulting shared key, need to be at least \fBDH_size()\fP large\&.
.br
-\fIpeer_pub_key\fP the peer's public key.
+\fIpeer_pub_key\fP the peer's public key\&.
.br
-\fIdh\fP the dh key pair.
+\fIdh\fP the dh key pair\&.
.RE
.PP
\fBReturns:\fP
.RS 4
-1 on success.
+1 on success\&.
.RE
.PP
-
-.PP
-Checks that the pubkey passed in is valid using \fBDH_check_pubkey()\fP.
+Checks that the pubkey passed in is valid using \fBDH_check_pubkey()\fP\&.
.SS "void DH_free (DH * dh)"
-.PP
-Free a DH object and release related resources, like ENGINE, that the object was using.
+Free a DH object and release related resources, like ENGINE, that the object was using\&.
.PP
\fBParameters:\fP
.RS 4
-\fIdh\fP object to be freed.
+\fIdh\fP object to be freed\&.
.RE
.PP
.SS "int DH_generate_key (DH * dh)"
-.PP
-Generate a new DH private-public key pair. The dh parameter must be allocted first with \fBDH_new()\fP. dh->p and dp->g must be set.
+Generate a new DH private-public key pair\&. The dh parameter must be allocted first with \fBDH_new()\fP\&. dh->p and dp->g must be set\&.
.PP
\fBParameters:\fP
.RS 4
-\fIdh\fP dh parameter.
+\fIdh\fP dh parameter\&.
.RE
.PP
\fBReturns:\fP
.RS 4
-1 on success.
+1 on success\&.
.RE
.PP
.SS "int DH_generate_parameters_ex (DH * dh, int prime_len, int generator, BN_GENCB * cb)"
-.PP
-Generate DH parameters for the DH object give parameters.
+Generate DH parameters for the DH object give parameters\&.
.PP
\fBParameters:\fP
.RS 4
-\fIdh\fP The DH object to generate parameters for.
+\fIdh\fP The DH object to generate parameters for\&.
.br
\fIprime_len\fP length of the prime
.br
\fIgenerator\fP generator, g
.br
-\fIcb\fP Callback parameters to show progress, can be NULL.
+\fIcb\fP Callback parameters to show progress, can be NULL\&.
.RE
.PP
\fBReturns:\fP
.RS 4
-the maximum size in bytes of the out data.
+the maximum size in bytes of the out data\&.
.RE
.PP
.SS "const DH_METHOD* DH_get_default_method (void)"
-.PP
-Return the default DH implementation.
+Return the default DH implementation\&.
.PP
\fBReturns:\fP
.RS 4
-pointer to a DH_METHOD.
+pointer to a DH_METHOD\&.
.RE
.PP
.SS "void* DH_get_ex_data (DH * dh, int idx)"
-.PP
-Get the data for index idx in the DH object.
+Get the data for index idx in the DH object\&.
.PP
\fBParameters:\fP
.RS 4
-\fIdh\fP DH object.
+\fIdh\fP DH object\&.
.br
-\fIidx\fP index to get the data for.
+\fIidx\fP index to get the data for\&.
.RE
.PP
\fBReturns:\fP
@@ -188,123 +176,117 @@ the object store in index idx
.PP
.SS "const DH_METHOD* DH_ltm_method (void)"
-.PP
-DH implementation using libtommath.
+DH implementation using libtommath\&.
.PP
\fBReturns:\fP
.RS 4
-the DH_METHOD for the DH implementation using libtommath.
+the DH_METHOD for the DH implementation using libtommath\&.
.RE
.PP
.SS "DH* DH_new (void)"
-.PP
-Create a new DH object using DH_new_method(NULL), see \fBDH_new_method()\fP.
+Create a new DH object using DH_new_method(NULL), see \fBDH_new_method()\fP\&.
.PP
\fBReturns:\fP
.RS 4
-a newly allocated DH object.
+a newly allocated DH object\&.
.RE
.PP
.SS "DH* DH_new_method (ENGINE * engine)"
-.PP
-Create a new DH object from the given engine, if the NULL is used, the default engine is used. Free the DH object with \fBDH_free()\fP.
+Create a new DH object from the given engine, if the NULL is used, the default engine is used\&. Free the DH object with \fBDH_free()\fP\&.
.PP
\fBParameters:\fP
.RS 4
-\fIengine\fP The engine to use to allocate the DH object.
+\fIengine\fP The engine to use to allocate the DH object\&.
.RE
.PP
\fBReturns:\fP
.RS 4
-a newly allocated DH object.
+a newly allocated DH object\&.
.RE
.PP
.SS "const DH_METHOD* DH_null_method (void)"
-.PP
-Return the dummy DH implementation.
+Return the dummy DH implementation\&.
.PP
\fBReturns:\fP
.RS 4
-pointer to a DH_METHOD.
+pointer to a DH_METHOD\&.
.RE
.PP
.SS "void DH_set_default_method (const DH_METHOD * meth)"
-.PP
-Set the default DH implementation.
+Set the default DH implementation\&.
.PP
\fBParameters:\fP
.RS 4
-\fImeth\fP pointer to a DH_METHOD.
+\fImeth\fP pointer to a DH_METHOD\&.
.RE
.PP
.SS "int DH_set_ex_data (DH * dh, int idx, void * data)"
-.PP
-Set the data index idx in the DH object to data.
+Set the data index idx in the DH object to data\&.
.PP
\fBParameters:\fP
.RS 4
-\fIdh\fP DH object.
+\fIdh\fP DH object\&.
.br
-\fIidx\fP index to set the data for.
+\fIidx\fP index to set the data for\&.
.br
-\fIdata\fP data to store for the index idx.
+\fIdata\fP data to store for the index idx\&.
.RE
.PP
\fBReturns:\fP
.RS 4
-1 on success.
+1 on success\&.
.RE
.PP
.SS "int DH_set_method (DH * dh, const DH_METHOD * method)"
-.PP
-Set a new method for the DH keypair.
+Set a new method for the DH keypair\&.
.PP
\fBParameters:\fP
.RS 4
-\fIdh\fP dh parameter.
+\fIdh\fP dh parameter\&.
.br
-\fImethod\fP the new method for the DH parameter.
+\fImethod\fP the new method for the DH parameter\&.
.RE
.PP
\fBReturns:\fP
.RS 4
-1 on success.
+1 on success\&.
.RE
.PP
.SS "int DH_size (const DH * dh)"
-.PP
-The maximum output size of the \fBDH_compute_key()\fP function.
+The maximum output size of the \fBDH_compute_key()\fP function\&.
.PP
\fBParameters:\fP
.RS 4
-\fIdh\fP The DH object to get the size from.
+\fIdh\fP The DH object to get the size from\&.
.RE
.PP
\fBReturns:\fP
.RS 4
-the maximum size in bytes of the out data.
+the maximum size in bytes of the out data\&.
.RE
.PP
.SS "int DH_up_ref (DH * dh)"
-.PP
-Add a reference to the DH object. The object should be free with \fBDH_free()\fP to drop the reference.
+Add a reference to the DH object\&. The object should be free with \fBDH_free()\fP to drop the reference\&.
.PP
\fBParameters:\fP
.RS 4
-\fIdh\fP the object to increase the reference count too.
+\fIdh\fP the object to increase the reference count too\&.
.RE
.PP
\fBReturns:\fP
.RS 4
-the updated reference count, can't safely be used except for debug printing.
+the updated reference count, can't safely be used except for debug printing\&.
.RE
.PP
+.SH "Author"
+.PP
+Generated automatically by Doxygen for Heimdal crypto library from the source code\&.
diff --git a/doc/doxyout/hcrypto/man/man3/hcrypto_evp.3 b/doc/doxyout/hcrypto/man/man3/hcrypto_evp.3
index 0997d55d5090..bc5487706999 100644
--- a/doc/doxyout/hcrypto/man/man3/hcrypto_evp.3
+++ b/doc/doxyout/hcrypto/man/man3/hcrypto_evp.3
@@ -1,8 +1,11 @@
-.TH "EVP generic crypto functions" 3 "11 Jan 2012" "Version 1.5.2" "Heimdal crypto library" \" -*- nroff -*-
+.TH "hcrypto_evp" 3 "Fri Dec 8 2017" "Version 7.5.0" "Heimdal crypto library" \" -*- nroff -*-
.ad l
.nh
.SH NAME
-EVP generic crypto functions \-
+hcrypto_evp
+.SH SYNOPSIS
+.br
+.PP
.SS "Functions"
.in +1c
@@ -73,6 +76,60 @@ EVP generic crypto functions \-
.RI "const EVP_CIPHER * \fBEVP_hcrypto_camellia_256_cbc\fP (void)"
.br
.ti -1c
+.RI "\fBOSSL_CIPHER_ALGORITHM\fP (rc2_cbc, hc_EVP_CIPH_CBC_MODE|hc_EVP_CIPH_VARIABLE_LENGTH) OSSL_CIPHER_ALGORITHM(rc2_40_cbc"
+.br
+.ti -1c
+.RI "hc_EVP_CIPH_CBC_MODE \fBOSSL_CIPHER_ALGORITHM\fP (rc2_64_cbc, hc_EVP_CIPH_CBC_MODE|hc_EVP_CIPH_VARIABLE_LENGTH) OSSL_CIPHER_ALGORITHM(rc4"
+.br
+.ti -1c
+.RI "\fBWINCNG_CIPHER_ALGORITHM\fP (des_ede3_cbc, BCRYPT_3DES_ALGORITHM, 8, 24, 8, EVP_CIPH_CBC_MODE)"
+.br
+.ti -1c
+.RI "\fBWINCNG_CIPHER_ALGORITHM\fP (des_cbc, BCRYPT_DES_ALGORITHM, 8, 8, 8, EVP_CIPH_CBC_MODE)"
+.br
+.ti -1c
+.RI "\fBWINCNG_CIPHER_ALGORITHM\fP (aes_128_cbc, BCRYPT_AES_ALGORITHM, 16, 16, 16, EVP_CIPH_CBC_MODE)"
+.br
+.ti -1c
+.RI "\fBWINCNG_CIPHER_ALGORITHM\fP (aes_192_cbc, BCRYPT_AES_ALGORITHM, 16, 24, 16, EVP_CIPH_CBC_MODE)"
+.br
+.ti -1c
+.RI "\fBWINCNG_CIPHER_ALGORITHM\fP (aes_256_cbc, BCRYPT_AES_ALGORITHM, 16, 32, 16, EVP_CIPH_CBC_MODE)"
+.br
+.ti -1c
+.RI "\fBWINCNG_CIPHER_ALGORITHM\fP (aes_128_cfb8, BCRYPT_AES_ALGORITHM, 16, 16, 16, EVP_CIPH_CFB8_MODE)"
+.br
+.ti -1c
+.RI "\fBWINCNG_CIPHER_ALGORITHM\fP (aes_192_cfb8, BCRYPT_AES_ALGORITHM, 16, 24, 16, EVP_CIPH_CFB8_MODE)"
+.br
+.ti -1c
+.RI "\fBWINCNG_CIPHER_ALGORITHM\fP (aes_256_cfb8, BCRYPT_AES_ALGORITHM, 16, 32, 16, EVP_CIPH_CFB8_MODE)"
+.br
+.ti -1c
+.RI "\fBWINCNG_CIPHER_ALGORITHM\fP (rc2_cbc, BCRYPT_RC2_ALGORITHM, 8, 16, 8, EVP_CIPH_CBC_MODE)"
+.br
+.ti -1c
+.RI "\fBWINCNG_CIPHER_ALGORITHM\fP (rc2_40_cbc, BCRYPT_RC2_ALGORITHM, 8, 5, 8, EVP_CIPH_CBC_MODE)"
+.br
+.ti -1c
+.RI "\fBWINCNG_CIPHER_ALGORITHM\fP (rc2_64_cbc, BCRYPT_RC2_ALGORITHM, 8, 8, 8, EVP_CIPH_CBC_MODE)"
+.br
+.ti -1c
+.RI "\fBWINCNG_CIPHER_ALGORITHM_UNAVAILABLE\fP (camellia_128_cbc)"
+.br
+.ti -1c
+.RI "\fBWINCNG_CIPHER_ALGORITHM_UNAVAILABLE\fP (camellia_192_cbc)"
+.br
+.ti -1c
+.RI "\fBWINCNG_CIPHER_ALGORITHM_UNAVAILABLE\fP (camellia_256_cbc)"
+.br
+.ti -1c
+.RI "\fBWINCNG_CIPHER_ALGORITHM\fP (rc4, BCRYPT_RC4_ALGORITHM, 1, 16, 0, EVP_CIPH_STREAM_CIPHER|EVP_CIPH_VARIABLE_LENGTH)"
+.br
+.ti -1c
+.RI "\fBWINCNG_CIPHER_ALGORITHM\fP (rc4_40, BCRYPT_RC4_ALGORITHM, 1, 5, 0, EVP_CIPH_STREAM_CIPHER|EVP_CIPH_VARIABLE_LENGTH)"
+.br
+.ti -1c
.RI "size_t \fBEVP_MD_size\fP (const EVP_MD *md)"
.br
.ti -1c
@@ -249,78 +306,71 @@ EVP generic crypto functions \-
.in -1c
.SH "Detailed Description"
.PP
-See the \fBEVP - generic crypto interface\fP for description and examples.
+See the \fBEVP - generic crypto interface\fP for description and examples\&.
.SH "Function Documentation"
.PP
.SS "const EVP_CIPHER* EVP_aes_128_cbc (void)"
-.PP
The AES-128 cipher type
.PP
\fBReturns:\fP
.RS 4
-the AES-128 EVP_CIPHER pointer.
+the AES-128 EVP_CIPHER pointer\&.
.RE
.PP
.PP
\fBExamples: \fP
.in +1c
-\fBexample_evp_cipher.c\fP.
+\fBexample_evp_cipher\&.c\fP\&.
.SS "const EVP_CIPHER* EVP_aes_128_cfb8 (void)"
-.PP
The AES-128 cipher type
.PP
\fBReturns:\fP
.RS 4
-the AES-128 EVP_CIPHER pointer.
+the AES-128 EVP_CIPHER pointer\&.
.RE
.PP
.SS "const EVP_CIPHER* EVP_aes_192_cbc (void)"
-.PP
The AES-192 cipher type
.PP
\fBReturns:\fP
.RS 4
-the AES-192 EVP_CIPHER pointer.
+the AES-192 EVP_CIPHER pointer\&.
.RE
.PP
.SS "const EVP_CIPHER* EVP_aes_192_cfb8 (void)"
-.PP
The AES-192 cipher type
.PP
\fBReturns:\fP
.RS 4
-the AES-192 EVP_CIPHER pointer.
+the AES-192 EVP_CIPHER pointer\&.
.RE
.PP
.SS "const EVP_CIPHER* EVP_aes_256_cbc (void)"
-.PP
The AES-256 cipher type
.PP
\fBReturns:\fP
.RS 4
-the AES-256 EVP_CIPHER pointer.
+the AES-256 EVP_CIPHER pointer\&.
.RE
.PP
.SS "const EVP_CIPHER* EVP_aes_256_cfb8 (void)"
-.PP
The AES-256 cipher type
.PP
\fBReturns:\fP
.RS 4
-the AES-256 EVP_CIPHER pointer.
+the AES-256 EVP_CIPHER pointer\&.
.RE
.PP
.SS "int EVP_BytesToKey (const EVP_CIPHER * type, const EVP_MD * md, const void * salt, const void * data, size_t datalen, unsigned int count, void * keydata, void * ivdata)"
+Provides a legancy string to key function, used in PEM files\&.
.PP
-Provides a legancy string to key function, used in PEM files.
-.PP
-New protocols should use new string to key functions like NIST SP56-800A or PKCS#5 v2.0 (see \fBPKCS5_PBKDF2_HMAC_SHA1()\fP).
+New protocols should use new string to key functions like NIST SP56-800A or PKCS#5 v2\&.0 (see \fBPKCS5_PBKDF2_HMAC_SHA1()\fP)\&.
.PP
\fBParameters:\fP
.RS 4
@@ -328,126 +378,118 @@ New protocols should use new string to key functions like NIST SP56-800A or PKCS
.br
\fImd\fP message digest to use
.br
-\fIsalt\fP salt salt string, should be an binary 8 byte buffer.
+\fIsalt\fP salt salt string, should be an binary 8 byte buffer\&.
.br
-\fIdata\fP the password/input key string.
+\fIdata\fP the password/input key string\&.
.br
-\fIdatalen\fP length of data parameter.
+\fIdatalen\fP length of data parameter\&.
.br
-\fIcount\fP iteration counter.
+\fIcount\fP iteration counter\&.
.br
-\fIkeydata\fP output keydata, needs to of the size \fBEVP_CIPHER_key_length()\fP.
+\fIkeydata\fP output keydata, needs to of the size \fBEVP_CIPHER_key_length()\fP\&.
.br
-\fIivdata\fP output ivdata, needs to of the size \fBEVP_CIPHER_block_size()\fP.
+\fIivdata\fP output ivdata, needs to of the size \fBEVP_CIPHER_block_size()\fP\&.
.RE
.PP
\fBReturns:\fP
.RS 4
-the size of derived key.
+the size of derived key\&.
.RE
.PP
.SS "const EVP_CIPHER* EVP_camellia_128_cbc (void)"
-.PP
The Camellia-128 cipher type
.PP
\fBReturns:\fP
.RS 4
-the Camellia-128 EVP_CIPHER pointer.
+the Camellia-128 EVP_CIPHER pointer\&.
.RE
.PP
.SS "const EVP_CIPHER* EVP_camellia_192_cbc (void)"
-.PP
The Camellia-198 cipher type
.PP
\fBReturns:\fP
.RS 4
-the Camellia-198 EVP_CIPHER pointer.
+the Camellia-198 EVP_CIPHER pointer\&.
.RE
.PP
.SS "const EVP_CIPHER* EVP_camellia_256_cbc (void)"
-.PP
The Camellia-256 cipher type
.PP
\fBReturns:\fP
.RS 4
-the Camellia-256 EVP_CIPHER pointer.
+the Camellia-256 EVP_CIPHER pointer\&.
.RE
.PP
.SS "size_t EVP_CIPHER_block_size (const EVP_CIPHER * c)"
-.PP
-Return the block size of the cipher.
+Return the block size of the cipher\&.
.PP
\fBParameters:\fP
.RS 4
-\fIc\fP cipher to get the block size from.
+\fIc\fP cipher to get the block size from\&.
.RE
.PP
\fBReturns:\fP
.RS 4
-the block size of the cipher.
+the block size of the cipher\&.
.RE
.PP
.PP
\fBExamples: \fP
.in +1c
-\fBexample_evp_cipher.c\fP.
+\fBexample_evp_cipher\&.c\fP\&.
.SS "size_t EVP_CIPHER_CTX_block_size (const EVP_CIPHER_CTX * ctx)"
-.PP
-Return the block size of the cipher context.
+Return the block size of the cipher context\&.
.PP
\fBParameters:\fP
.RS 4
-\fIctx\fP cipher context to get the block size from.
+\fIctx\fP cipher context to get the block size from\&.
.RE
.PP
\fBReturns:\fP
.RS 4
-the block size of the cipher context.
+the block size of the cipher context\&.
.RE
.PP
.SS "const EVP_CIPHER* EVP_CIPHER_CTX_cipher (EVP_CIPHER_CTX * ctx)"
-.PP
-Return the EVP_CIPHER for a EVP_CIPHER_CTX context.
+Return the EVP_CIPHER for a EVP_CIPHER_CTX context\&.
.PP
\fBParameters:\fP
.RS 4
-\fIctx\fP the context to get the cipher type from.
+\fIctx\fP the context to get the cipher type from\&.
.RE
.PP
\fBReturns:\fP
.RS 4
-the EVP_CIPHER pointer.
+the EVP_CIPHER pointer\&.
.RE
.PP
.SS "int EVP_CIPHER_CTX_cleanup (EVP_CIPHER_CTX * c)"
-.PP
-Clean up the EVP_CIPHER_CTX context.
+Clean up the EVP_CIPHER_CTX context\&.
.PP
\fBParameters:\fP
.RS 4
-\fIc\fP the cipher to clean up.
+\fIc\fP the cipher to clean up\&.
.RE
.PP
\fBReturns:\fP
.RS 4
-1 on success.
+1 on success\&.
.RE
.PP
.PP
\fBExamples: \fP
.in +1c
-\fBexample_evp_cipher.c\fP.
+\fBexample_evp_cipher\&.c\fP\&.
.SS "unsigned long EVP_CIPHER_CTX_flags (const EVP_CIPHER_CTX * ctx)"
-.PP
-Get the flags for an EVP_CIPHER_CTX context.
+Get the flags for an EVP_CIPHER_CTX context\&.
.PP
\fBParameters:\fP
.RS 4
@@ -456,13 +498,12 @@ Get the flags for an EVP_CIPHER_CTX context.
.PP
\fBReturns:\fP
.RS 4
-the flags for an EVP_CIPHER_CTX.
+the flags for an EVP_CIPHER_CTX\&.
.RE
.PP
.SS "void* EVP_CIPHER_CTX_get_app_data (EVP_CIPHER_CTX * ctx)"
-.PP
-Get the app data for an EVP_CIPHER_CTX context.
+Get the app data for an EVP_CIPHER_CTX context\&.
.PP
\fBParameters:\fP
.RS 4
@@ -471,57 +512,53 @@ Get the app data for an EVP_CIPHER_CTX context.
.PP
\fBReturns:\fP
.RS 4
-the app data for an EVP_CIPHER_CTX.
+the app data for an EVP_CIPHER_CTX\&.
.RE
.PP
.SS "void EVP_CIPHER_CTX_init (EVP_CIPHER_CTX * c)"
-.PP
-Initiate a EVP_CIPHER_CTX context. Clean up with \fBEVP_CIPHER_CTX_cleanup()\fP.
+Initiate a EVP_CIPHER_CTX context\&. Clean up with \fBEVP_CIPHER_CTX_cleanup()\fP\&.
.PP
\fBParameters:\fP
.RS 4
-\fIc\fP the cipher initiate.
+\fIc\fP the cipher initiate\&.
.RE
.PP
.PP
\fBExamples: \fP
.in +1c
-\fBexample_evp_cipher.c\fP.
+\fBexample_evp_cipher\&.c\fP\&.
.SS "size_t EVP_CIPHER_CTX_iv_length (const EVP_CIPHER_CTX * ctx)"
-.PP
-Return the IV size of the cipher context.
+Return the IV size of the cipher context\&.
.PP
\fBParameters:\fP
.RS 4
-\fIctx\fP cipher context to get the IV size from.
+\fIctx\fP cipher context to get the IV size from\&.
.RE
.PP
\fBReturns:\fP
.RS 4
-the IV size of the cipher context.
+the IV size of the cipher context\&.
.RE
.PP
.SS "size_t EVP_CIPHER_CTX_key_length (const EVP_CIPHER_CTX * ctx)"
-.PP
-Return the key size of the cipher context.
+Return the key size of the cipher context\&.
.PP
\fBParameters:\fP
.RS 4
-\fIctx\fP cipher context to get the key size from.
+\fIctx\fP cipher context to get the key size from\&.
.RE
.PP
\fBReturns:\fP
.RS 4
-the key size of the cipher context.
+the key size of the cipher context\&.
.RE
.PP
.SS "int EVP_CIPHER_CTX_mode (const EVP_CIPHER_CTX * ctx)"
-.PP
-Get the mode for an EVP_CIPHER_CTX context.
+Get the mode for an EVP_CIPHER_CTX context\&.
.PP
\fBParameters:\fP
.RS 4
@@ -530,24 +567,22 @@ Get the mode for an EVP_CIPHER_CTX context.
.PP
\fBReturns:\fP
.RS 4
-the mode for an EVP_CIPHER_CTX.
+the mode for an EVP_CIPHER_CTX\&.
.RE
.PP
.SS "void EVP_CIPHER_CTX_set_app_data (EVP_CIPHER_CTX * ctx, void * data)"
-.PP
-Set the app data for an EVP_CIPHER_CTX context.
+Set the app data for an EVP_CIPHER_CTX context\&.
.PP
\fBParameters:\fP
.RS 4
\fIctx\fP the EVP_CIPHER_CTX to set the app data for
.br
-\fIdata\fP the app data to set for an EVP_CIPHER_CTX.
+\fIdata\fP the app data to set for an EVP_CIPHER_CTX\&.
.RE
.PP
.SS "int EVP_CIPHER_CTX_set_key_length (EVP_CIPHER_CTX * c, int length)"
-.PP
If the cipher type supports it, change the key length
.PP
\fBParameters:\fP
@@ -559,160 +594,150 @@ If the cipher type supports it, change the key length
.PP
\fBReturns:\fP
.RS 4
-1 on success.
+1 on success\&.
.RE
.PP
.SS "size_t EVP_CIPHER_iv_length (const EVP_CIPHER * c)"
-.PP
-Return the IV size of the cipher.
+Return the IV size of the cipher\&.
.PP
\fBParameters:\fP
.RS 4
-\fIc\fP cipher to get the IV size from.
+\fIc\fP cipher to get the IV size from\&.
.RE
.PP
\fBReturns:\fP
.RS 4
-the IV size of the cipher.
+the IV size of the cipher\&.
.RE
.PP
.PP
\fBExamples: \fP
.in +1c
-\fBexample_evp_cipher.c\fP.
+\fBexample_evp_cipher\&.c\fP\&.
.SS "size_t EVP_CIPHER_key_length (const EVP_CIPHER * c)"
-.PP
-Return the key size of the cipher.
+Return the key size of the cipher\&.
.PP
\fBParameters:\fP
.RS 4
-\fIc\fP cipher to get the key size from.
+\fIc\fP cipher to get the key size from\&.
.RE
.PP
\fBReturns:\fP
.RS 4
-the key size of the cipher.
+the key size of the cipher\&.
.RE
.PP
.PP
\fBExamples: \fP
.in +1c
-\fBexample_evp_cipher.c\fP.
+\fBexample_evp_cipher\&.c\fP\&.
.SS "int EVP_CipherFinal_ex (EVP_CIPHER_CTX * ctx, void * out, int * outlen)"
-.PP
Encipher/decipher final data
.PP
\fBParameters:\fP
.RS 4
-\fIctx\fP the cipher context.
+\fIctx\fP the cipher context\&.
.br
-\fIout\fP output data from the operation.
+\fIout\fP output data from the operation\&.
.br
\fIoutlen\fP output length
.RE
.PP
-The input length needs to be at least \fBEVP_CIPHER_block_size()\fP bytes long.
+The input length needs to be at least \fBEVP_CIPHER_block_size()\fP bytes long\&.
.PP
-See \fBEVP Cipher\fP for an example how to use this function.
+See \fBEVP Cipher\fP for an example how to use this function\&.
.PP
\fBReturns:\fP
.RS 4
-1 on success.
+1 on success\&.
.RE
.PP
.PP
\fBExamples: \fP
.in +1c
-\fBexample_evp_cipher.c\fP.
+\fBexample_evp_cipher\&.c\fP\&.
.SS "int EVP_CipherInit_ex (EVP_CIPHER_CTX * ctx, const EVP_CIPHER * c, ENGINE * engine, const void * key, const void * iv, int encp)"
-.PP
-Initiate the EVP_CIPHER_CTX context to encrypt or decrypt data. Clean up with \fBEVP_CIPHER_CTX_cleanup()\fP.
+Initiate the EVP_CIPHER_CTX context to encrypt or decrypt data\&. Clean up with \fBEVP_CIPHER_CTX_cleanup()\fP\&.
.PP
\fBParameters:\fP
.RS 4
\fIctx\fP context to initiate
.br
-\fIc\fP cipher to use.
+\fIc\fP cipher to use\&.
.br
-\fIengine\fP crypto engine to use, NULL to select default.
+\fIengine\fP crypto engine to use, NULL to select default\&.
.br
-\fIkey\fP the crypto key to use, NULL will use the previous value.
+\fIkey\fP the crypto key to use, NULL will use the previous value\&.
.br
-\fIiv\fP the IV to use, NULL will use the previous value.
+\fIiv\fP the IV to use, NULL will use the previous value\&.
.br
-\fIencp\fP non zero will encrypt, -1 use the previous value.
+\fIencp\fP non zero will encrypt, -1 use the previous value\&.
.RE
.PP
\fBReturns:\fP
.RS 4
-1 on success.
+1 on success\&.
.RE
.PP
.PP
\fBExamples: \fP
.in +1c
-\fBexample_evp_cipher.c\fP.
+\fBexample_evp_cipher\&.c\fP\&.
.SS "int EVP_CipherUpdate (EVP_CIPHER_CTX * ctx, void * out, int * outlen, void * in, size_t inlen)"
-.PP
Encipher/decipher partial data
.PP
\fBParameters:\fP
.RS 4
-\fIctx\fP the cipher context.
+\fIctx\fP the cipher context\&.
.br
-\fIout\fP output data from the operation.
+\fIout\fP output data from the operation\&.
.br
\fIoutlen\fP output length
.br
-\fIin\fP input data to the operation.
+\fIin\fP input data to the operation\&.
.br
-\fIinlen\fP length of data.
+\fIinlen\fP length of data\&.
.RE
.PP
-The output buffer length should at least be \fBEVP_CIPHER_block_size()\fP byte longer then the input length.
+The output buffer length should at least be \fBEVP_CIPHER_block_size()\fP byte longer then the input length\&.
.PP
-See \fBEVP Cipher\fP for an example how to use this function.
+See \fBEVP Cipher\fP for an example how to use this function\&.
.PP
\fBReturns:\fP
.RS 4
-1 on success.
+1 on success\&.
.RE
.PP
-
-.PP
-If there in no spare bytes in the left from last Update and the input length is on the block boundery, the \fBEVP_CipherUpdate()\fP function can take a shortcut (and preformance gain) and directly encrypt the data, otherwise we hav to fix it up and store extra it the EVP_CIPHER_CTX.
+If there in no spare bytes in the left from last Update and the input length is on the block boundery, the \fBEVP_CipherUpdate()\fP function can take a shortcut (and preformance gain) and directly encrypt the data, otherwise we hav to fix it up and store extra it the EVP_CIPHER_CTX\&.
.PP
\fBExamples: \fP
.in +1c
-\fBexample_evp_cipher.c\fP.
+\fBexample_evp_cipher\&.c\fP\&.
.SS "const EVP_CIPHER* EVP_des_cbc (void)"
-.PP
The DES cipher type
.PP
\fBReturns:\fP
.RS 4
-the DES-CBC EVP_CIPHER pointer.
+the DES-CBC EVP_CIPHER pointer\&.
.RE
.PP
.SS "const EVP_CIPHER* EVP_des_ede3_cbc (void)"
-.PP
-The tripple DES cipher type
+The triple DES cipher type
.PP
\fBReturns:\fP
.RS 4
-the DES-EDE3-CBC EVP_CIPHER pointer.
+the DES-EDE3-CBC EVP_CIPHER pointer\&.
.RE
.PP
.SS "int EVP_Digest (const void * data, size_t dsize, void * hash, unsigned int * hsize, const EVP_MD * md, ENGINE * engine)"
-.PP
-Do the whole \fBEVP_MD_CTX_create()\fP, \fBEVP_DigestInit_ex()\fP, \fBEVP_DigestUpdate()\fP, \fBEVP_DigestFinal_ex()\fP, \fBEVP_MD_CTX_destroy()\fP dance in one call.
+Do the whole \fBEVP_MD_CTX_create()\fP, \fBEVP_DigestInit_ex()\fP, \fBEVP_DigestUpdate()\fP, \fBEVP_DigestFinal_ex()\fP, \fBEVP_MD_CTX_destroy()\fP dance in one call\&.
.PP
\fBParameters:\fP
.RS 4
@@ -720,62 +745,59 @@ Do the whole \fBEVP_MD_CTX_create()\fP, \fBEVP_DigestInit_ex()\fP, \fBEVP_Digest
.br
\fIdsize\fP length of data
.br
-\fIhash\fP output data of at least \fBEVP_MD_size()\fP length.
+\fIhash\fP output data of at least \fBEVP_MD_size()\fP length\&.
.br
-\fIhsize\fP output length of hash.
+\fIhsize\fP output length of hash\&.
.br
\fImd\fP message digest to use
.br
-\fIengine\fP engine to use, NULL for default engine.
+\fIengine\fP engine to use, NULL for default engine\&.
.RE
.PP
\fBReturns:\fP
.RS 4
-1 on success.
+1 on success\&.
.RE
.PP
.SS "int EVP_DigestFinal_ex (EVP_MD_CTX * ctx, void * hash, unsigned int * size)"
-.PP
-Complete the message digest.
+Complete the message digest\&.
.PP
\fBParameters:\fP
.RS 4
-\fIctx\fP the context to complete.
+\fIctx\fP the context to complete\&.
.br
-\fIhash\fP the output of the message digest function. At least \fBEVP_MD_size()\fP.
+\fIhash\fP the output of the message digest function\&. At least \fBEVP_MD_size()\fP\&.
.br
-\fIsize\fP the output size of hash.
+\fIsize\fP the output size of hash\&.
.RE
.PP
\fBReturns:\fP
.RS 4
-1 on success.
+1 on success\&.
.RE
.PP
.SS "int EVP_DigestInit_ex (EVP_MD_CTX * ctx, const EVP_MD * md, ENGINE * engine)"
-.PP
-Init a EVP_MD_CTX for use a specific message digest and engine.
+Init a EVP_MD_CTX for use a specific message digest and engine\&.
.PP
\fBParameters:\fP
.RS 4
-\fIctx\fP the message digest context to init.
+\fIctx\fP the message digest context to init\&.
.br
-\fImd\fP the message digest to use.
+\fImd\fP the message digest to use\&.
.br
-\fIengine\fP the engine to use, NULL to use the default engine.
+\fIengine\fP the engine to use, NULL to use the default engine\&.
.RE
.PP
\fBReturns:\fP
.RS 4
-1 on success.
+1 on success\&.
.RE
.PP
.SS "int EVP_DigestUpdate (EVP_MD_CTX * ctx, const void * data, size_t size)"
-.PP
-Update the digest with some data.
+Update the digest with some data\&.
.PP
\fBParameters:\fP
.RS 4
@@ -788,278 +810,251 @@ Update the digest with some data.
.PP
\fBReturns:\fP
.RS 4
-1 on success.
+1 on success\&.
.RE
.PP
.SS "const EVP_CIPHER* EVP_enc_null (void)"
-.PP
-The NULL cipher type, does no encryption/decryption.
+The NULL cipher type, does no encryption/decryption\&.
.PP
\fBReturns:\fP
.RS 4
-the null EVP_CIPHER pointer.
+the null EVP_CIPHER pointer\&.
.RE
.PP
.SS "const EVP_CIPHER* EVP_get_cipherbyname (const char * name)"
-.PP
-Get the cipher type using their name.
+Get the cipher type using their name\&.
.PP
\fBParameters:\fP
.RS 4
-\fIname\fP the name of the cipher.
+\fIname\fP the name of the cipher\&.
.RE
.PP
\fBReturns:\fP
.RS 4
-the selected EVP_CIPHER pointer or NULL if not found.
+the selected EVP_CIPHER pointer or NULL if not found\&.
.RE
.PP
.SS "const EVP_CIPHER* EVP_hcrypto_aes_128_cbc (void)"
-.PP
The AES-128 cipher type (hcrypto)
.PP
\fBReturns:\fP
.RS 4
-the AES-128 EVP_CIPHER pointer.
+the AES-128 EVP_CIPHER pointer\&.
.RE
.PP
.SS "const EVP_CIPHER* EVP_hcrypto_aes_128_cfb8 (void)"
-.PP
The AES-128 CFB8 cipher type (hcrypto)
.PP
\fBReturns:\fP
.RS 4
-the AES-128 EVP_CIPHER pointer.
+the AES-128 EVP_CIPHER pointer\&.
.RE
.PP
.SS "const EVP_CIPHER* EVP_hcrypto_aes_192_cbc (void)"
-.PP
The AES-192 cipher type (hcrypto)
.PP
\fBReturns:\fP
.RS 4
-the AES-192 EVP_CIPHER pointer.
+the AES-192 EVP_CIPHER pointer\&.
.RE
.PP
.SS "const EVP_CIPHER* EVP_hcrypto_aes_192_cfb8 (void)"
-.PP
The AES-192 CFB8 cipher type (hcrypto)
.PP
\fBReturns:\fP
.RS 4
-the AES-192 EVP_CIPHER pointer.
+the AES-192 EVP_CIPHER pointer\&.
.RE
.PP
.SS "const EVP_CIPHER* EVP_hcrypto_aes_256_cbc (void)"
-.PP
The AES-256 cipher type (hcrypto)
.PP
\fBReturns:\fP
.RS 4
-the AES-256 EVP_CIPHER pointer.
+the AES-256 EVP_CIPHER pointer\&.
.RE
.PP
.SS "const EVP_CIPHER* EVP_hcrypto_aes_256_cfb8 (void)"
-.PP
The AES-256 CFB8 cipher type (hcrypto)
.PP
\fBReturns:\fP
.RS 4
-the AES-256 EVP_CIPHER pointer.
+the AES-256 EVP_CIPHER pointer\&.
.RE
.PP
.SS "const EVP_CIPHER* EVP_hcrypto_camellia_128_cbc (void)"
-.PP
The Camellia-128 cipher type - hcrypto
.PP
\fBReturns:\fP
.RS 4
-the Camellia-128 EVP_CIPHER pointer.
+the Camellia-128 EVP_CIPHER pointer\&.
.RE
.PP
.SS "const EVP_CIPHER* EVP_hcrypto_camellia_192_cbc (void)"
-.PP
The Camellia-198 cipher type - hcrypto
.PP
\fBReturns:\fP
.RS 4
-the Camellia-198 EVP_CIPHER pointer.
+the Camellia-198 EVP_CIPHER pointer\&.
.RE
.PP
.SS "const EVP_CIPHER* EVP_hcrypto_camellia_256_cbc (void)"
-.PP
The Camellia-256 cipher type - hcrypto
.PP
\fBReturns:\fP
.RS 4
-the Camellia-256 EVP_CIPHER pointer.
+the Camellia-256 EVP_CIPHER pointer\&.
.RE
.PP
.SS "const EVP_CIPHER* EVP_hcrypto_des_cbc (void)"
-.PP
The DES cipher type
.PP
\fBReturns:\fP
.RS 4
-the DES-CBC EVP_CIPHER pointer.
+the DES-CBC EVP_CIPHER pointer\&.
.RE
.PP
.SS "const EVP_CIPHER* EVP_hcrypto_des_ede3_cbc (void)"
-.PP
-The tripple DES cipher type - hcrypto
+The triple DES cipher type - hcrypto
.PP
\fBReturns:\fP
.RS 4
-the DES-EDE3-CBC EVP_CIPHER pointer.
+the DES-EDE3-CBC EVP_CIPHER pointer\&.
.RE
.PP
.SS "const EVP_MD* EVP_hcrypto_md2 (void)"
-.PP
The message digest MD2 - hcrypto
.PP
\fBReturns:\fP
.RS 4
-the message digest type.
+the message digest type\&.
.RE
.PP
.SS "const EVP_MD* EVP_hcrypto_md4 (void)"
-.PP
The message digest MD4 - hcrypto
.PP
\fBReturns:\fP
.RS 4
-the message digest type.
+the message digest type\&.
.RE
.PP
.SS "const EVP_MD* EVP_hcrypto_md5 (void)"
-.PP
The message digest MD5 - hcrypto
.PP
\fBReturns:\fP
.RS 4
-the message digest type.
+the message digest type\&.
.RE
.PP
.SS "const EVP_CIPHER* EVP_hcrypto_rc2_40_cbc (void)"
-.PP
The RC2-40 cipher type
.PP
\fBReturns:\fP
.RS 4
-the RC2-40 EVP_CIPHER pointer.
+the RC2-40 EVP_CIPHER pointer\&.
.RE
.PP
.SS "const EVP_CIPHER* EVP_hcrypto_rc2_64_cbc (void)"
-.PP
The RC2-64 cipher type
.PP
\fBReturns:\fP
.RS 4
-the RC2-64 EVP_CIPHER pointer.
+the RC2-64 EVP_CIPHER pointer\&.
.RE
.PP
.SS "const EVP_CIPHER* EVP_hcrypto_rc2_cbc (void)"
-.PP
The RC2 cipher type - hcrypto
.PP
\fBReturns:\fP
.RS 4
-the RC2 EVP_CIPHER pointer.
+the RC2 EVP_CIPHER pointer\&.
.RE
.PP
.SS "const EVP_MD* EVP_hcrypto_sha1 (void)"
-.PP
The message digest SHA1 - hcrypto
.PP
\fBReturns:\fP
.RS 4
-the message digest type.
+the message digest type\&.
.RE
.PP
.SS "const EVP_MD* EVP_hcrypto_sha256 (void)"
-.PP
The message digest SHA256 - hcrypto
.PP
\fBReturns:\fP
.RS 4
-the message digest type.
+the message digest type\&.
.RE
.PP
.SS "const EVP_MD* EVP_hcrypto_sha384 (void)"
-.PP
The message digest SHA384 - hcrypto
.PP
\fBReturns:\fP
.RS 4
-the message digest type.
+the message digest type\&.
.RE
.PP
.SS "const EVP_MD* EVP_hcrypto_sha512 (void)"
-.PP
The message digest SHA512 - hcrypto
.PP
\fBReturns:\fP
.RS 4
-the message digest type.
+the message digest type\&.
.RE
.PP
.SS "const EVP_MD* EVP_md2 (void)"
-.PP
The message digest MD2
.PP
\fBReturns:\fP
.RS 4
-the message digest type.
+the message digest type\&.
.RE
.PP
.SS "const EVP_MD* EVP_md4 (void)"
-.PP
The message digest MD4
.PP
\fBReturns:\fP
.RS 4
-the message digest type.
+the message digest type\&.
.RE
.PP
.SS "const EVP_MD* EVP_md5 (void)"
-.PP
The message digest MD5
.PP
\fBReturns:\fP
.RS 4
-the message digest type.
+the message digest type\&.
.RE
.PP
.SS "size_t EVP_MD_block_size (const EVP_MD * md)"
-.PP
-Return the blocksize of the message digest function.
+Return the blocksize of the message digest function\&.
.PP
\fBParameters:\fP
.RS 4
@@ -1073,8 +1068,7 @@ size size of the message digest block size
.PP
.SS "size_t EVP_MD_CTX_block_size (EVP_MD_CTX * ctx)"
-.PP
-Return the blocksize of the message digest function.
+Return the blocksize of the message digest function\&.
.PP
\fBParameters:\fP
.RS 4
@@ -1088,68 +1082,62 @@ size size of the message digest block size
.PP
.SS "int EVP_MD_CTX_cleanup (EVP_MD_CTX * ctx)"
-.PP
-Free the resources used by the EVP_MD context.
+Free the resources used by the EVP_MD context\&.
.PP
\fBParameters:\fP
.RS 4
-\fIctx\fP the context to free the resources from.
+\fIctx\fP the context to free the resources from\&.
.RE
.PP
\fBReturns:\fP
.RS 4
-1 on success.
+1 on success\&.
.RE
.PP
.SS "EVP_MD_CTX* EVP_MD_CTX_create (void)"
-.PP
-Allocate a messsage digest context object. Free with \fBEVP_MD_CTX_destroy()\fP.
+Allocate a messsage digest context object\&. Free with \fBEVP_MD_CTX_destroy()\fP\&.
.PP
\fBReturns:\fP
.RS 4
-a newly allocated message digest context object.
+a newly allocated message digest context object\&.
.RE
.PP
.SS "void EVP_MD_CTX_destroy (EVP_MD_CTX * ctx)"
-.PP
-Free a messsage digest context object.
+Free a messsage digest context object\&.
.PP
\fBParameters:\fP
.RS 4
-\fIctx\fP context to free.
+\fIctx\fP context to free\&.
.RE
.PP
.SS "void EVP_MD_CTX_init (EVP_MD_CTX * ctx)"
-.PP
-Initiate a messsage digest context object. Deallocate with \fBEVP_MD_CTX_cleanup()\fP. Please use \fBEVP_MD_CTX_create()\fP instead.
+Initiate a messsage digest context object\&. Deallocate with \fBEVP_MD_CTX_cleanup()\fP\&. Please use \fBEVP_MD_CTX_create()\fP instead\&.
.PP
\fBParameters:\fP
.RS 4
-\fIctx\fP variable to initiate.
+\fIctx\fP variable to initiate\&.
.RE
.PP
.SS "const EVP_MD* EVP_MD_CTX_md (EVP_MD_CTX * ctx)"
-.PP
-Get the EVP_MD use for a specified context.
+Get the EVP_MD use for a specified context\&.
.PP
\fBParameters:\fP
.RS 4
-\fIctx\fP the EVP_MD context to get the EVP_MD for.
+\fIctx\fP the EVP_MD context to get the EVP_MD for\&.
.RE
.PP
\fBReturns:\fP
.RS 4
-the EVP_MD used for the context.
+the EVP_MD used for the context\&.
.RE
.PP
.SS "size_t EVP_MD_CTX_size (EVP_MD_CTX * ctx)"
-.PP
-Return the output size of the message digest function.
+Return the output size of the message digest function\&.
.PP
\fBParameters:\fP
.RS 4
@@ -1158,23 +1146,21 @@ Return the output size of the message digest function.
.PP
\fBReturns:\fP
.RS 4
-size output size of the message digest function.
+size output size of the message digest function\&.
.RE
.PP
.SS "const EVP_MD* EVP_md_null (void)"
-.PP
The null message digest
.PP
\fBReturns:\fP
.RS 4
-the message digest type.
+the message digest type\&.
.RE
.PP
.SS "size_t EVP_MD_size (const EVP_MD * md)"
-.PP
-Return the output size of the message digest function.
+Return the output size of the message digest function\&.
.PP
\fBParameters:\fP
.RS 4
@@ -1183,117 +1169,297 @@ Return the output size of the message digest function.
.PP
\fBReturns:\fP
.RS 4
-size output size of the message digest function.
+size output size of the message digest function\&.
.RE
.PP
.SS "const EVP_CIPHER* EVP_rc2_40_cbc (void)"
-.PP
The RC2 cipher type
.PP
\fBReturns:\fP
.RS 4
-the RC2 EVP_CIPHER pointer.
+the RC2 EVP_CIPHER pointer\&.
.RE
.PP
.SS "const EVP_CIPHER* EVP_rc2_64_cbc (void)"
-.PP
The RC2 cipher type
.PP
\fBReturns:\fP
.RS 4
-the RC2 EVP_CIPHER pointer.
+the RC2 EVP_CIPHER pointer\&.
.RE
.PP
.SS "const EVP_CIPHER* EVP_rc2_cbc (void)"
-.PP
The RC2 cipher type
.PP
\fBReturns:\fP
.RS 4
-the RC2 EVP_CIPHER pointer.
+the RC2 EVP_CIPHER pointer\&.
.RE
.PP
.SS "const EVP_CIPHER* EVP_rc4 (void)"
-.PP
The RC4 cipher type
.PP
\fBReturns:\fP
.RS 4
-the RC4 EVP_CIPHER pointer.
+the RC4 EVP_CIPHER pointer\&.
.RE
.PP
.SS "const EVP_CIPHER* EVP_rc4_40 (void)"
-.PP
The RC4-40 cipher type
.PP
\fBReturns:\fP
.RS 4
-the RC4-40 EVP_CIPHER pointer.
+the RC4-40 EVP_CIPHER pointer\&.
.RE
.PP
.SS "const EVP_MD* EVP_sha (void)"
-.PP
The message digest SHA1
.PP
\fBReturns:\fP
.RS 4
-the message digest type.
+the message digest type\&.
.RE
.PP
.SS "const EVP_MD* EVP_sha1 (void)"
-.PP
The message digest SHA1
.PP
\fBReturns:\fP
.RS 4
-the message digest type.
+the message digest type\&.
.RE
.PP
.SS "const EVP_MD* EVP_sha256 (void)"
-.PP
The message digest SHA256
.PP
\fBReturns:\fP
.RS 4
-the message digest type.
+the message digest type\&.
.RE
.PP
.SS "const EVP_MD* EVP_sha384 (void)"
-.PP
The message digest SHA384
.PP
\fBReturns:\fP
.RS 4
-the message digest type.
+the message digest type\&.
.RE
.PP
.SS "const EVP_MD* EVP_sha512 (void)"
-.PP
The message digest SHA512
.PP
\fBReturns:\fP
.RS 4
-the message digest type.
+the message digest type\&.
.RE
.PP
.SS "const EVP_CIPHER* EVP_wincrypt_des_ede3_cbc (void)"
+The triple DES cipher type (Micrsoft crypt provider)
+.PP
+\fBReturns:\fP
+.RS 4
+the DES-EDE3-CBC EVP_CIPHER pointer\&.
+.RE
+.PP
+
+.SS "OSSL_CIPHER_ALGORITHM (rc2_cbc, hc_EVP_CIPH_CBC_MODE| hc_EVP_CIPH_VARIABLE_LENGTH)"
+The triple DES cipher type (OpenSSL provider)
+.PP
+\fBReturns:\fP
+.RS 4
+the DES-EDE3-CBC EVP_CIPHER pointer\&. The DES cipher type (OpenSSL provider)
+.PP
+the DES-CBC EVP_CIPHER pointer\&. The AES-128 cipher type (OpenSSL provider)
+.PP
+the AES-128-CBC EVP_CIPHER pointer\&. The AES-192 cipher type (OpenSSL provider)
+.PP
+the AES-192-CBC EVP_CIPHER pointer\&. The AES-256 cipher type (OpenSSL provider)
+.PP
+the AES-256-CBC EVP_CIPHER pointer\&. The AES-128 CFB8 cipher type (OpenSSL provider)
+.PP
+the AES-128-CFB8 EVP_CIPHER pointer\&. The AES-192 CFB8 cipher type (OpenSSL provider)
+.PP
+the AES-192-CFB8 EVP_CIPHER pointer\&. The AES-256 CFB8 cipher type (OpenSSL provider)
+.PP
+the AES-256-CFB8 EVP_CIPHER pointer\&. The RC2 cipher type - OpenSSL
+.PP
+the RC2 EVP_CIPHER pointer\&. The RC2-40 cipher type - OpenSSL
+.PP
+the RC2-40 EVP_CIPHER pointer\&.
+.RE
+.PP
+
+.SS "hc_EVP_CIPH_CBC_MODE OSSL_CIPHER_ALGORITHM (rc2_64_cbc, hc_EVP_CIPH_CBC_MODE| hc_EVP_CIPH_VARIABLE_LENGTH)"
+The RC2-64 cipher type - OpenSSL
+.PP
+\fBReturns:\fP
+.RS 4
+the RC2-64 EVP_CIPHER pointer\&. The Camellia-128 cipher type - OpenSSL
+.PP
+the Camellia-128 EVP_CIPHER pointer\&. The Camellia-198 cipher type - OpenSSL
+.PP
+the Camellia-198 EVP_CIPHER pointer\&. The Camellia-256 cipher type - OpenSSL
+.PP
+the Camellia-256 EVP_CIPHER pointer\&. The RC4 cipher type (OpenSSL provider)
+.PP
+the RC4 EVP_CIPHER pointer\&.
+.RE
+.PP
+
+.SS "WINCNG_CIPHER_ALGORITHM (des_ede3_cbc, BCRYPT_3DES_ALGORITHM, 8, 24, 8, EVP_CIPH_CBC_MODE)"
+The triple DES cipher type (Windows CNG provider)
+.PP
+\fBReturns:\fP
+.RS 4
+the DES-EDE3-CBC EVP_CIPHER pointer\&.
+.RE
+.PP
+
+.SS "WINCNG_CIPHER_ALGORITHM (des_cbc, BCRYPT_DES_ALGORITHM, 8, 8, 8, EVP_CIPH_CBC_MODE)"
+The DES cipher type (Windows CNG provider)
+.PP
+\fBReturns:\fP
+.RS 4
+the DES-CBC EVP_CIPHER pointer\&.
+.RE
+.PP
+
+.SS "WINCNG_CIPHER_ALGORITHM (aes_128_cbc, BCRYPT_AES_ALGORITHM, 16, 16, 16, EVP_CIPH_CBC_MODE)"
+The AES-128 cipher type (Windows CNG provider)
+.PP
+\fBReturns:\fP
+.RS 4
+the AES-128-CBC EVP_CIPHER pointer\&.
+.RE
+.PP
+
+.SS "WINCNG_CIPHER_ALGORITHM (aes_192_cbc, BCRYPT_AES_ALGORITHM, 16, 24, 16, EVP_CIPH_CBC_MODE)"
+The AES-192 cipher type (Windows CNG provider)
+.PP
+\fBReturns:\fP
+.RS 4
+the AES-192-CBC EVP_CIPHER pointer\&.
+.RE
+.PP
+
+.SS "WINCNG_CIPHER_ALGORITHM (aes_256_cbc, BCRYPT_AES_ALGORITHM, 16, 32, 16, EVP_CIPH_CBC_MODE)"
+The AES-256 cipher type (Windows CNG provider)
+.PP
+\fBReturns:\fP
+.RS 4
+the AES-256-CBC EVP_CIPHER pointer\&.
+.RE
+.PP
+
+.SS "WINCNG_CIPHER_ALGORITHM (aes_128_cfb8, BCRYPT_AES_ALGORITHM, 16, 16, 16, EVP_CIPH_CFB8_MODE)"
+The AES-128 CFB8 cipher type (Windows CNG provider)
.PP
-The tripple DES cipher type (Micrsoft crypt provider)
+\fBReturns:\fP
+.RS 4
+the AES-128-CFB8 EVP_CIPHER pointer\&.
+.RE
+.PP
+
+.SS "WINCNG_CIPHER_ALGORITHM (aes_192_cfb8, BCRYPT_AES_ALGORITHM, 16, 24, 16, EVP_CIPH_CFB8_MODE)"
+The AES-192 CFB8 cipher type (Windows CNG provider)
+.PP
+\fBReturns:\fP
+.RS 4
+the AES-192-CFB8 EVP_CIPHER pointer\&.
+.RE
+.PP
+
+.SS "WINCNG_CIPHER_ALGORITHM (aes_256_cfb8, BCRYPT_AES_ALGORITHM, 16, 32, 16, EVP_CIPH_CFB8_MODE)"
+The AES-256 CFB8 cipher type (Windows CNG provider)
+.PP
+\fBReturns:\fP
+.RS 4
+the AES-256-CFB8 EVP_CIPHER pointer\&.
+.RE
+.PP
+
+.SS "WINCNG_CIPHER_ALGORITHM (rc2_cbc, BCRYPT_RC2_ALGORITHM, 8, 16, 8, EVP_CIPH_CBC_MODE)"
+The RC2 cipher type - Windows CNG
+.PP
+\fBReturns:\fP
+.RS 4
+the RC2 EVP_CIPHER pointer\&.
+.RE
+.PP
+
+.SS "WINCNG_CIPHER_ALGORITHM (rc2_40_cbc, BCRYPT_RC2_ALGORITHM, 8, 5, 8, EVP_CIPH_CBC_MODE)"
+The RC2-40 cipher type - Windows CNG
+.PP
+\fBReturns:\fP
+.RS 4
+the RC2-40 EVP_CIPHER pointer\&.
+.RE
+.PP
+
+.SS "WINCNG_CIPHER_ALGORITHM (rc2_64_cbc, BCRYPT_RC2_ALGORITHM, 8, 8, 8, EVP_CIPH_CBC_MODE)"
+The RC2-64 cipher type - Windows CNG
+.PP
+\fBReturns:\fP
+.RS 4
+the RC2-64 EVP_CIPHER pointer\&.
+.RE
+.PP
+
+.SS "WINCNG_CIPHER_ALGORITHM (rc4, BCRYPT_RC4_ALGORITHM, 1, 16, 0, EVP_CIPH_STREAM_CIPHER| EVP_CIPH_VARIABLE_LENGTH)"
+The RC4 cipher type (Windows CNG provider)
+.PP
+\fBReturns:\fP
+.RS 4
+the RC4 EVP_CIPHER pointer\&.
+.RE
+.PP
+
+.SS "WINCNG_CIPHER_ALGORITHM (rc4_40, BCRYPT_RC4_ALGORITHM, 1, 5, 0, EVP_CIPH_STREAM_CIPHER| EVP_CIPH_VARIABLE_LENGTH)"
+The RC4-40 cipher type (Windows CNG provider)
+.PP
+\fBReturns:\fP
+.RS 4
+the RC4 EVP_CIPHER pointer\&.
+.RE
+.PP
+
+.SS "WINCNG_CIPHER_ALGORITHM_UNAVAILABLE (camellia_128_cbc)"
+The Camellia-128 cipher type - CommonCrypto
+.PP
+\fBReturns:\fP
+.RS 4
+the Camellia-128 EVP_CIPHER pointer\&.
+.RE
+.PP
+
+.SS "WINCNG_CIPHER_ALGORITHM_UNAVAILABLE (camellia_192_cbc)"
+The Camellia-198 cipher type - CommonCrypto
.PP
\fBReturns:\fP
.RS 4
-the DES-EDE3-CBC EVP_CIPHER pointer.
+the Camellia-198 EVP_CIPHER pointer\&.
.RE
.PP
+.SS "WINCNG_CIPHER_ALGORITHM_UNAVAILABLE (camellia_256_cbc)"
+The Camellia-256 cipher type - CommonCrypto
+.PP
+\fBReturns:\fP
+.RS 4
+the Camellia-256 EVP_CIPHER pointer\&.
+.RE
+.PP
+
+.SH "Author"
+.PP
+Generated automatically by Doxygen for Heimdal crypto library from the source code\&.
diff --git a/doc/doxyout/hcrypto/man/man3/hcrypto_misc.3 b/doc/doxyout/hcrypto/man/man3/hcrypto_misc.3
index 1335d23a4236..c93ac5761a63 100644
--- a/doc/doxyout/hcrypto/man/man3/hcrypto_misc.3
+++ b/doc/doxyout/hcrypto/man/man3/hcrypto_misc.3
@@ -1,12 +1,18 @@
-.TH "hcrypto miscellaneous functions" 3 "11 Jan 2012" "Version 1.5.2" "Heimdal crypto library" \" -*- nroff -*-
+.TH "hcrypto_misc" 3 "Fri Dec 8 2017" "Version 7.5.0" "Heimdal crypto library" \" -*- nroff -*-
.ad l
.nh
.SH NAME
-hcrypto miscellaneous functions \-
+hcrypto_misc
+.SH SYNOPSIS
+.br
+.PP
.SS "Functions"
.in +1c
.ti -1c
+.RI "int \fBPKCS5_PBKDF2_HMAC\fP (const void *password, size_t password_len, const void *salt, size_t salt_len, unsigned long iter, const EVP_MD *md, size_t keylen, void *key)"
+.br
+.ti -1c
.RI "int \fBPKCS5_PBKDF2_HMAC_SHA1\fP (const void *password, size_t password_len, const void *salt, size_t salt_len, unsigned long iter, size_t keylen, void *key)"
.br
.in -1c
@@ -15,30 +21,60 @@ hcrypto miscellaneous functions \-
.SH "Function Documentation"
.PP
-.SS "int PKCS5_PBKDF2_HMAC_SHA1 (const void * password, size_t password_len, const void * salt, size_t salt_len, unsigned long iter, size_t keylen, void * key)"
+.SS "int PKCS5_PBKDF2_HMAC (const void * password, size_t password_len, const void * salt, size_t salt_len, unsigned long iter, const EVP_MD * md, size_t keylen, void * key)"
+As descriped in PKCS5, convert a password, salt, and iteration counter into a crypto key\&.
+.PP
+\fBParameters:\fP
+.RS 4
+\fIpassword\fP Password\&.
+.br
+\fIpassword_len\fP Length of password\&.
+.br
+\fIsalt\fP Salt
+.br
+\fIsalt_len\fP Length of salt\&.
+.br
+\fIiter\fP iteration counter\&.
+.br
+\fImd\fP the digest function\&.
+.br
+\fIkeylen\fP the output key length\&.
+.br
+\fIkey\fP the output key\&.
+.RE
+.PP
+\fBReturns:\fP
+.RS 4
+1 on success, non 1 on failure\&.
+.RE
.PP
-As descriped in PKCS5, convert a password, salt, and iteration counter into a crypto key.
+
+.SS "int PKCS5_PBKDF2_HMAC_SHA1 (const void * password, size_t password_len, const void * salt, size_t salt_len, unsigned long iter, size_t keylen, void * key)"
+As descriped in PKCS5, convert a password, salt, and iteration counter into a crypto key\&.
.PP
\fBParameters:\fP
.RS 4
-\fIpassword\fP Password.
+\fIpassword\fP Password\&.
.br
-\fIpassword_len\fP Length of password.
+\fIpassword_len\fP Length of password\&.
.br
\fIsalt\fP Salt
.br
-\fIsalt_len\fP Length of salt.
+\fIsalt_len\fP Length of salt\&.
.br
-\fIiter\fP iteration counter.
+\fIiter\fP iteration counter\&.
.br
-\fIkeylen\fP the output key length.
+\fIkeylen\fP the output key length\&.
.br
-\fIkey\fP the output key.
+\fIkey\fP the output key\&.
.RE
.PP
\fBReturns:\fP
.RS 4
-1 on success, non 1 on failure.
+1 on success, non 1 on failure\&.
.RE
.PP
+.SH "Author"
+.PP
+Generated automatically by Doxygen for Heimdal crypto library from the source code\&.
diff --git a/doc/doxyout/hcrypto/man/man3/hcrypto_rand.3 b/doc/doxyout/hcrypto/man/man3/hcrypto_rand.3
index 075ec81569ec..e7505bc06afa 100644
--- a/doc/doxyout/hcrypto/man/man3/hcrypto_rand.3
+++ b/doc/doxyout/hcrypto/man/man3/hcrypto_rand.3
@@ -1,8 +1,11 @@
-.TH "RAND crypto functions" 3 "11 Jan 2012" "Version 1.5.2" "Heimdal crypto library" \" -*- nroff -*-
+.TH "hcrypto_rand" 3 "Fri Dec 8 2017" "Version 7.5.0" "Heimdal crypto library" \" -*- nroff -*-
.ad l
.nh
.SH NAME
-RAND crypto functions \-
+hcrypto_rand
+.SH SYNOPSIS
+.br
+.PP
.SS "Functions"
.in +1c
@@ -45,26 +48,24 @@ RAND crypto functions \-
.in -1c
.SH "Detailed Description"
.PP
-See the \fBRAND - random number\fP for description and examples.
+See the \fBRAND - random number\fP for description and examples\&.
.SH "Function Documentation"
.PP
.SS "void RAND_add (const void * indata, size_t size, double entropi)"
-.PP
-Seed that random number generator. Secret material can securely be feed into the function, they will never be returned.
+Seed that random number generator\&. Secret material can securely be feed into the function, they will never be returned\&.
.PP
\fBParameters:\fP
.RS 4
-\fIindata\fP the input data.
+\fIindata\fP the input data\&.
.br
-\fIsize\fP size of in data.
+\fIsize\fP size of in data\&.
.br
-\fIentropi\fP entropi in data.
+\fIentropi\fP entropi in data\&.
.RE
.PP
.SS "int RAND_bytes (void * outdata, size_t size)"
-.PP
-Get a random block from the random generator, can be used for key material.
+Get a random block from the random generator, can be used for key material\&.
.PP
\fBParameters:\fP
.RS 4
@@ -75,48 +76,55 @@ Get a random block from the random generator, can be used for key material.
.PP
\fBReturns:\fP
.RS 4
-1 on success, 0 on failure.
+1 on success, 0 on failure\&.
.RE
.PP
.SS "void RAND_cleanup (void)"
-.PP
-Reset and free memory used by the random generator.
+Reset and free memory used by the random generator\&.
.SS "const char* RAND_file_name (char * filename, size_t size)"
-.PP
-Return the default random state filename for a user to use for \fBRAND_load_file()\fP, and \fBRAND_write_file()\fP.
+Return the default random state filename for a user to use for \fBRAND_load_file()\fP, and \fBRAND_write_file()\fP\&.
.PP
\fBParameters:\fP
.RS 4
-\fIfilename\fP buffer to hold file name.
+\fIfilename\fP buffer to hold file name\&.
.br
-\fIsize\fP size of buffer filename.
+\fIsize\fP size of buffer filename\&.
.RE
.PP
\fBReturns:\fP
.RS 4
-the buffer filename or NULL on failure.
+the buffer filename or NULL on failure\&.
.RE
.PP
.SS "const RAND_METHOD* RAND_get_rand_method (void)"
+Get the default random method\&.
.PP
-Get the default random method.
-.SS "int RAND_load_file (const char * filename, size_t size)"
+\fBReturns:\fP
+.RS 4
+Returns a RAND_METHOD
+.RE
.PP
-Load a a file and feed it into \fBRAND_seed()\fP.
+
+.SS "int RAND_load_file (const char * filename, size_t size)"
+Load a a file and feed it into \fBRAND_seed()\fP\&.
.PP
\fBParameters:\fP
.RS 4
-\fIfilename\fP name of file to read.
+\fIfilename\fP name of file to read\&.
.br
-\fIsize\fP minimum size to read.
+\fIsize\fP minimum size to read\&.
+.RE
+.PP
+\fBReturns:\fP
+.RS 4
+Returns the number of seed bytes loaded (0 indicates failure)
.RE
.PP
.SS "int RAND_pseudo_bytes (void * outdata, size_t size)"
-.PP
-Get a random block from the random generator, should NOT be used for key material.
+Get a random block from the random generator, should NOT be used for key material\&.
.PP
\fBParameters:\fP
.RS 4
@@ -127,13 +135,12 @@ Get a random block from the random generator, should NOT be used for key materia
.PP
\fBReturns:\fP
.RS 4
-1 on success, 0 on failure.
+1 on success, 0 on failure\&.
.RE
.PP
.SS "void RAND_seed (const void * indata, size_t size)"
-.PP
-Seed that random number generator. Secret material can securely be feed into the function, they will never be returned.
+Seed that random number generator\&. Secret material can securely be feed into the function, they will never be returned\&.
.PP
\fBParameters:\fP
.RS 4
@@ -144,57 +151,56 @@ Seed that random number generator. Secret material can securely be feed into the
.PP
.SS "int RAND_set_rand_engine (ENGINE * engine)"
-.PP
-Set the default random method from engine.
+Set the default random method from engine\&.
.PP
\fBParameters:\fP
.RS 4
-\fIengine\fP use engine, if NULL is passed it, old method and engine is cleared.
+\fIengine\fP use engine, if NULL is passed it, old method and engine is cleared\&.
.RE
.PP
\fBReturns:\fP
.RS 4
-1 on success, 0 on failure.
+1 on success, 0 on failure\&.
.RE
.PP
.SS "int RAND_set_rand_method (const RAND_METHOD * meth)"
-.PP
-Set the default random method.
+Set the default random method\&.
.PP
\fBParameters:\fP
.RS 4
-\fImeth\fP set the new default method.
+\fImeth\fP set the new default method\&.
.RE
.PP
\fBReturns:\fP
.RS 4
-1 on success.
+1 on success\&.
.RE
.PP
.SS "int RAND_status (void)"
-.PP
Return status of the random generator
.PP
\fBReturns:\fP
.RS 4
-1 if the random generator can deliver random data.
+1 if the random generator can deliver random data\&.
.RE
.PP
.SS "int RAND_write_file (const char * filename)"
-.PP
-Write of random numbers to a file to store for later initiation with \fBRAND_load_file()\fP.
+Write of random numbers to a file to store for later initiation with \fBRAND_load_file()\fP\&.
.PP
\fBParameters:\fP
.RS 4
-\fIfilename\fP name of file to write.
+\fIfilename\fP name of file to write\&.
.RE
.PP
\fBReturns:\fP
.RS 4
-1 on success and non-one on failure.
+1 on success and non-one on failure\&.
.RE
.PP
+.SH "Author"
+.PP
+Generated automatically by Doxygen for Heimdal crypto library from the source code\&.
diff --git a/doc/doxyout/hcrypto/man/man3/hcrypto_rsa.3 b/doc/doxyout/hcrypto/man/man3/hcrypto_rsa.3
index 662a1706bc37..96c1330a1f96 100644
--- a/doc/doxyout/hcrypto/man/man3/hcrypto_rsa.3
+++ b/doc/doxyout/hcrypto/man/man3/hcrypto_rsa.3
@@ -1,8 +1,11 @@
-.TH "RSA functions" 3 "11 Jan 2012" "Version 1.5.2" "Heimdal crypto library" \" -*- nroff -*-
+.TH "hcrypto_rsa" 3 "Fri Dec 8 2017" "Version 7.5.0" "Heimdal crypto library" \" -*- nroff -*-
.ad l
.nh
.SH NAME
-RSA functions \-
+hcrypto_rsa
+.SH SYNOPSIS
+.br
+.PP
.SS "Functions"
.in +1c
@@ -33,22 +36,20 @@ RSA functions \-
.in -1c
.SH "Detailed Description"
.PP
-See the \fBRSA - public-key cryptography\fP for description and examples.
+See the \fBRSA - public-key cryptography\fP for description and examples\&.
.SH "Function Documentation"
.PP
.SS "void RSA_free (RSA * rsa)"
-.PP
-Free an allocation RSA object.
+Free an allocation RSA object\&.
.PP
\fBParameters:\fP
.RS 4
-\fIrsa\fP the RSA object to free.
+\fIrsa\fP the RSA object to free\&.
.RE
.PP
.SS "void* RSA_get_app_data (const RSA * rsa)"
-.PP
-Get the application data for the RSA object.
+Get the application data for the RSA object\&.
.PP
\fBParameters:\fP
.RS 4
@@ -62,48 +63,44 @@ the data object
.PP
.SS "const RSA_METHOD* RSA_get_method (const RSA * rsa)"
-.PP
-Return the RSA_METHOD used for this RSA object.
+Return the RSA_METHOD used for this RSA object\&.
.PP
\fBParameters:\fP
.RS 4
-\fIrsa\fP the object to get the method from.
+\fIrsa\fP the object to get the method from\&.
.RE
.PP
\fBReturns:\fP
.RS 4
-the method used for this RSA object.
+the method used for this RSA object\&.
.RE
.PP
.SS "RSA* RSA_new (void)"
-.PP
-Same as \fBRSA_new_method()\fP using NULL as engine.
+Same as \fBRSA_new_method()\fP using NULL as engine\&.
.PP
\fBReturns:\fP
.RS 4
-a newly allocated RSA object. Free with \fBRSA_free()\fP.
+a newly allocated RSA object\&. Free with \fBRSA_free()\fP\&.
.RE
.PP
.SS "RSA* RSA_new_method (ENGINE * engine)"
-.PP
-Allocate a new RSA object using the engine, if NULL is specified as the engine, use the default RSA engine as returned by ENGINE_get_default_RSA().
+Allocate a new RSA object using the engine, if NULL is specified as the engine, use the default RSA engine as returned by ENGINE_get_default_RSA()\&.
.PP
\fBParameters:\fP
.RS 4
-\fIengine\fP Specific what ENGINE RSA provider should be used.
+\fIengine\fP Specific what ENGINE RSA provider should be used\&.
.RE
.PP
\fBReturns:\fP
.RS 4
-a newly allocated RSA object. Free with \fBRSA_free()\fP.
+a newly allocated RSA object\&. Free with \fBRSA_free()\fP\&.
.RE
.PP
.SS "int RSA_set_app_data (RSA * rsa, void * arg)"
-.PP
-Set the application data for the RSA object.
+Set the application data for the RSA object\&.
.PP
\fBParameters:\fP
.RS 4
@@ -114,39 +111,40 @@ Set the application data for the RSA object.
.PP
\fBReturns:\fP
.RS 4
-1 on success.
+1 on success\&.
.RE
.PP
.SS "int RSA_set_method (RSA * rsa, const RSA_METHOD * method)"
-.PP
-Set a new method for the RSA keypair.
+Set a new method for the RSA keypair\&.
.PP
\fBParameters:\fP
.RS 4
-\fIrsa\fP rsa parameter.
+\fIrsa\fP rsa parameter\&.
.br
-\fImethod\fP the new method for the RSA parameter.
+\fImethod\fP the new method for the RSA parameter\&.
.RE
.PP
\fBReturns:\fP
.RS 4
-1 on success.
+1 on success\&.
.RE
.PP
.SS "int RSA_up_ref (RSA * rsa)"
-.PP
-Add an extra reference to the RSA object. The object should be free with \fBRSA_free()\fP to drop the reference.
+Add an extra reference to the RSA object\&. The object should be free with \fBRSA_free()\fP to drop the reference\&.
.PP
\fBParameters:\fP
.RS 4
-\fIrsa\fP the object to add reference counting too.
+\fIrsa\fP the object to add reference counting too\&.
.RE
.PP
\fBReturns:\fP
.RS 4
-the current reference count, can't safely be used except for debug printing.
+the current reference count, can't safely be used except for debug printing\&.
.RE
.PP
+.SH "Author"
+.PP
+Generated automatically by Doxygen for Heimdal crypto library from the source code\&.
diff --git a/doc/doxyout/hcrypto/man/man3/page_des.3 b/doc/doxyout/hcrypto/man/man3/page_des.3
index 056bf05cb7d4..b5066afc336b 100644
--- a/doc/doxyout/hcrypto/man/man3/page_des.3
+++ b/doc/doxyout/hcrypto/man/man3/page_des.3
@@ -1,35 +1,36 @@
-.TH "page_des" 3 "11 Jan 2012" "Version 1.5.2" "Heimdal crypto library" \" -*- nroff -*-
+.TH "page_des" 3 "Fri Dec 8 2017" "Version 7.5.0" "Heimdal crypto library" \" -*- nroff -*-
.ad l
.nh
.SH NAME
-page_des \- DES - Data Encryption Standard crypto interface
-See the library functions here: \fBDES crypto functions\fP
+page_desDES - Data Encryption Standard crypto interface
+ \- See the library functions here: \fBDES crypto functions\fP
.PP
-DES was created by IBM, modififed by NSA and then adopted by NBS (now NIST) and published ad FIPS PUB 46 (updated by FIPS 46-1).
+DES was created by IBM, modififed by NSA and then adopted by NBS (now NIST) and published ad FIPS PUB 46 (updated by FIPS 46-1)\&.
.PP
-Since the 19th May 2005 DES was withdrawn by NIST and should no longer be used. See \fBEVP - generic crypto interface\fP for replacement encryption algorithms and interfaces.
+Since the 19th May 2005 DES was withdrawn by NIST and should no longer be used\&. See \fBEVP - generic crypto interface\fP for replacement encryption algorithms and interfaces\&.
.PP
-Read more the iteresting history of DES on Wikipedia http://www.wikipedia.org/wiki/Data_Encryption_Standard .
+Read more the iteresting history of DES on Wikipedia http://www.wikipedia.org/wiki/Data_Encryption_Standard \&.
.SH "DES key generation"
.PP
-To generate a DES key safely you have to use the code-snippet below. This is because the \fBDES_random_key()\fP can fail with an abort() in case of and failure to start the random generator.
+To generate a DES key safely you have to use the code-snippet below\&. This is because the \fBDES_random_key()\fP can fail with an abort() in case of and failure to start the random generator\&.
.PP
-There is a replacement function \fBDES_new_random_key()\fP, however that function does not exists in OpenSSL.
+There is a replacement function \fBDES_new_random_key()\fP, however that function does not exists in OpenSSL\&.
.PP
.PP
.nf
- DES_cblock key;
- do {
- if (RAND_rand(&key, sizeof(key)) != 1)
- goto failure;
- DES_set_odd_parity(key);
- } while (DES_is_weak_key(&key));
+DES_cblock key;
+do {
+ if (RAND_rand(&key, sizeof(key)) != 1)
+ goto failure;
+ DES_set_odd_parity(key);
+} while (DES_is_weak_key(&key));
.fi
.PP
.SH "DES implementation history"
.PP
-There was no complete BSD licensed, fast, GPL compatible implementation of DES, so Love wrote the part that was missing, fast key schedule setup and adapted the interface to the orignal libdes.
+There was no complete BSD licensed, fast, GPL compatible implementation of DES, so Love wrote the part that was missing, fast key schedule setup and adapted the interface to the orignal libdes\&.
.PP
-The document that got me started for real was 'Efficient Implementation of the Data Encryption Standard' by Dag Arne Osvik. I never got to the PC1 transformation was working, instead I used table-lookup was used for all key schedule setup. The document was very useful since it de-mystified other implementations for me.
+The document that got me started for real was 'Efficient
+Implementation of the Data Encryption Standard' by Dag Arne Osvik\&. I never got to the PC1 transformation was working, instead I used table-lookup was used for all key schedule setup\&. The document was very useful since it de-mystified other implementations for me\&.
.PP
-The core DES function (SBOX + P transformation) is from Richard Outerbridge public domain DES implementation. My sanity is saved thanks to his work. Thank you Richard.
+The core DES function (SBOX + P transformation) is from Richard Outerbridge public domain DES implementation\&. My sanity is saved thanks to his work\&. Thank you Richard\&.
diff --git a/doc/doxyout/hcrypto/man/man3/page_dh.3 b/doc/doxyout/hcrypto/man/man3/page_dh.3
index 2b3d6be53008..8dad9d2f737a 100644
--- a/doc/doxyout/hcrypto/man/man3/page_dh.3
+++ b/doc/doxyout/hcrypto/man/man3/page_dh.3
@@ -1,10 +1,10 @@
-.TH "page_dh" 3 "11 Jan 2012" "Version 1.5.2" "Heimdal crypto library" \" -*- nroff -*-
+.TH "page_dh" 3 "Fri Dec 8 2017" "Version 7.5.0" "Heimdal crypto library" \" -*- nroff -*-
.ad l
.nh
.SH NAME
-page_dh \- DH - Diffie-Hellman key exchange
-Diffie-Hellman key exchange is a protocol that allows two parties to establish a shared secret key.
+page_dhDH - Diffie-Hellman key exchange
+ \- Diffie-Hellman key exchange is a protocol that allows two parties to establish a shared secret key\&.
.PP
-Include and example how to use \fBDH_new()\fP and friends here.
+Include and example how to use \fBDH_new()\fP and friends here\&.
.PP
See the library functions here: \fBDiffie-Hellman functions\fP
diff --git a/doc/doxyout/hcrypto/man/man3/page_evp.3 b/doc/doxyout/hcrypto/man/man3/page_evp.3
index ab210428df91..c97d894714c7 100644
--- a/doc/doxyout/hcrypto/man/man3/page_evp.3
+++ b/doc/doxyout/hcrypto/man/man3/page_evp.3
@@ -1,9 +1,9 @@
-.TH "page_evp" 3 "11 Jan 2012" "Version 1.5.2" "Heimdal crypto library" \" -*- nroff -*-
+.TH "page_evp" 3 "Fri Dec 8 2017" "Version 7.5.0" "Heimdal crypto library" \" -*- nroff -*-
.ad l
.nh
.SH NAME
-page_evp \- EVP - generic crypto interface
-See the library functions here: \fBEVP generic crypto functions\fP
+page_evpEVP - generic crypto interface
+ \- See the library functions here: \fBEVP generic crypto functions\fP
.SH "EVP Cipher"
.PP
-The use of \fBEVP_CipherInit_ex()\fP and EVP_Cipher() is pretty easy to understand forward, then \fBEVP_CipherUpdate()\fP and \fBEVP_CipherFinal_ex()\fP really needs an example to explain \fBexample_evp_cipher::c\fP .
+The use of \fBEVP_CipherInit_ex()\fP and EVP_Cipher() is pretty easy to understand forward, then \fBEVP_CipherUpdate()\fP and \fBEVP_CipherFinal_ex()\fP really needs an example to explain \fBexample_evp_cipher\&.c\fP \&.
diff --git a/doc/doxyout/hcrypto/man/man3/page_rand.3 b/doc/doxyout/hcrypto/man/man3/page_rand.3
index 07a394246e1d..c4051f083889 100644
--- a/doc/doxyout/hcrypto/man/man3/page_rand.3
+++ b/doc/doxyout/hcrypto/man/man3/page_rand.3
@@ -1,6 +1,6 @@
-.TH "page_rand" 3 "11 Jan 2012" "Version 1.5.2" "Heimdal crypto library" \" -*- nroff -*-
+.TH "page_rand" 3 "Fri Dec 8 2017" "Version 7.5.0" "Heimdal crypto library" \" -*- nroff -*-
.ad l
.nh
.SH NAME
-page_rand \- RAND - random number
-See the library functions here: \fBRAND crypto functions\fP
+page_randRAND - random number
+ \- See the library functions here: \fBRAND crypto functions\fP
diff --git a/doc/doxyout/hcrypto/man/man3/page_rsa.3 b/doc/doxyout/hcrypto/man/man3/page_rsa.3
index 97e326d9b82a..bc257ec59d87 100644
--- a/doc/doxyout/hcrypto/man/man3/page_rsa.3
+++ b/doc/doxyout/hcrypto/man/man3/page_rsa.3
@@ -1,12 +1,15 @@
-.TH "page_rsa" 3 "11 Jan 2012" "Version 1.5.2" "Heimdal crypto library" \" -*- nroff -*-
+.TH "page_rsa" 3 "Fri Dec 8 2017" "Version 7.5.0" "Heimdal crypto library" \" -*- nroff -*-
.ad l
.nh
.SH NAME
-page_rsa \- RSA - public-key cryptography
-RSA is named by its inventors (Ron Rivest, Adi Shamir, and Leonard Adleman) (published in 1977), patented expired in 21 September 2000.
+page_rsaRSA - public-key cryptography
+ \- RSA is named by its inventors (Ron Rivest, Adi Shamir, and Leonard Adleman) (published in 1977), patented expired in 21 September 2000\&.
.PP
Speed for RSA in seconds no key blinding 1000 iteration, same rsa keys (1024 and 2048) operation performed each eteration sign, verify, encrypt, decrypt on a random bit pattern
.PP
-name 1024 2048 4098 ================================= gmp: 0.73 6.60 44.80 tfm: 2.45 -- -- ltm: 3.79 20.74 105.41 (default in hcrypto) openssl: 4.04 11.90 82.59 cdsa: 15.89 102.89 721.40 imath: 40.62 -- --
+.SH "name 1024 2048 4098 "
+.PP
+.PP
+gmp: 0\&.73 6\&.60 44\&.80 tfm: 2\&.45 -- -- ltm: 3\&.79 20\&.74 105\&.41 (default in hcrypto) openssl: 4\&.04 11\&.90 82\&.59 cdsa: 15\&.89 102\&.89 721\&.40 imath: 40\&.62 -- --
.PP
See the library functions here: \fBRSA functions\fP