diff options
author | Dr. Matthias St. Pierre <Matthias.St.Pierre@ncp-e.com> | 2018-01-03 22:14:02 +0100 |
---|---|---|
committer | Ben Kaduk <kaduk@mit.edu> | 2018-01-04 14:52:00 +0100 |
commit | 32b28859e0e194b8995cb9bcf2c9d65d4516835b (patch) | |
tree | d463f8021db1110afc19c1d33aeb59fa69a549d9 /doc/man7 | |
parent | crypto/rand: restore the generic DRBG implementation (diff) | |
download | openssl-32b28859e0e194b8995cb9bcf2c9d65d4516835b.tar.xz openssl-32b28859e0e194b8995cb9bcf2c9d65d4516835b.zip |
Improve readability of evp.pod
The changes are analogous to the ones made in commit 0bf340e1350e
to x509.pod, see PR #4924.
Reviewed-by: Rich Salz <rsalz@openssl.org>
Reviewed-by: Richard Levitte <levitte@openssl.org>
Reviewed-by: Ben Kaduk <kaduk@mit.edu>
(Merged from https://github.com/openssl/openssl/pull/5012)
Diffstat (limited to 'doc/man7')
-rw-r--r-- | doc/man7/evp.pod | 20 |
1 files changed, 10 insertions, 10 deletions
diff --git a/doc/man7/evp.pod b/doc/man7/evp.pod index fbc357eb48..e3823bac7f 100644 --- a/doc/man7/evp.pod +++ b/doc/man7/evp.pod @@ -13,19 +13,19 @@ evp - high-level cryptographic functions The EVP library provides a high-level interface to cryptographic functions. -L<B<EVP_Seal>I<...>|EVP_SealInit(3)> and L<B<EVP_Open>I<...>|EVP_OpenInit(3)> -provide public key encryption and decryption to implement digital "envelopes". +The L<B<EVP_Seal>I<XXX>|EVP_SealInit(3)> and L<B<EVP_Open>I<XXX>|EVP_OpenInit(3)> +functions provide public key encryption and decryption to implement digital "envelopes". -The L<B<EVP_DigestSign>I<...>|EVP_DigestSignInit(3)> and -L<B<EVP_DigestVerify>I<...>|EVP_DigestVerifyInit(3)> functions implement +The L<B<EVP_DigestSign>I<XXX>|EVP_DigestSignInit(3)> and +L<B<EVP_DigestVerify>I<XXX>|EVP_DigestVerifyInit(3)> functions implement digital signatures and Message Authentication Codes (MACs). Also see the older -L<B<EVP_Sign>I<...>|EVP_SignInit(3)> and L<B<EVP_Verify>I<...>|EVP_VerifyInit(3)> +L<B<EVP_Sign>I<XXX>|EVP_SignInit(3)> and L<B<EVP_Verify>I<XXX>|EVP_VerifyInit(3)> functions. -Symmetric encryption is available with the L<B<EVP_Encrypt>I<...>|EVP_EncryptInit(3)> -functions. The L<B<EVP_Digest>I<...>|EVP_DigestInit(3)> functions provide message digests. +Symmetric encryption is available with the L<B<EVP_Encrypt>I<XXX>|EVP_EncryptInit(3)> +functions. The L<B<EVP_Digest>I<XXX>|EVP_DigestInit(3)> functions provide message digests. -The B<EVP_PKEY>I<...> functions provide a high level interface to +The B<EVP_PKEY>I<XXX> functions provide a high level interface to asymmetric algorithms. To create a new EVP_PKEY see L<EVP_PKEY_new(3)>. EVP_PKEYs can be associated with a private key of a particular algorithm by using the functions @@ -61,8 +61,8 @@ based encryption. Careful selection of the parameters will provide a PKCS#5 PBKD implementation. However, new applications should not typically use this (preferring, for example, PBKDF2 from PCKS#5). -The L<B<EVP_Encode>I<...>|EVP_EncodeInit(3)> and -L<B<EVP_Decode>I<...>|EVP_EncodeInit(3)> functions implement base 64 encoding +The L<B<EVP_Encode>I<XXX>|EVP_EncodeInit(3)> and +L<B<EVP_Decode>I<XXX>|EVP_EncodeInit(3)> functions implement base 64 encoding and decoding. All the symmetric algorithms (ciphers), digests and asymmetric algorithms |