Lines Matching +full:in +full:- +full:functions
18 .\" Set up some character translations and predefined strings. \*(-- will
22 .\" therefore won't be available. \*(C` and \*(C' expand to `' in nroff,
23 .\" nothing in troff, for use with C<>.
24 .tr \(*W-
27 . ds -- \(*W-
29 . if (\n(.H=4u)&(1m=24u) .ds -- \(*W\h'-12u'\(*W\h'-12u'-\" diablo 10 pitch
30 . if (\n(.H=4u)&(1m=20u) .ds -- \(*W\h'-12u'\(*W\h'-8u'-\" diablo 12 pitch
37 . ds -- \|\(em\|
45 .\" Escape single quotes in literal strings from groff's Unicode transform.
51 .\" entries marked with X<> in POD. Of course, you'll have to process the
52 .\" output yourself in some meaningful fashion.
71 .\" Fear. Run. Save yourself. No user-serviceable parts.
81 . ds #H ((1u-(\\\\n(.fu%2u))*.13m)
97 . ds ' \\k:\h'-(\\n(.wu*8/10-\*(#H)'\'\h"|\\n:u"
98 . ds ` \\k:\h'-(\\n(.wu*8/10-\*(#H)'\`\h'|\\n:u'
99 . ds ^ \\k:\h'-(\\n(.wu*10/11-\*(#H)'^\h'|\\n:u'
100 . ds , \\k:\h'-(\\n(.wu*8/10)',\h'|\\n:u'
101 . ds ~ \\k:\h'-(\\n(.wu-\*(#H-.1m)'~\h'|\\n:u'
102 . ds / \\k:\h'-(\\n(.wu*8/10-\*(#H)'\z\(sl\h'|\\n:u'
104 . \" troff and (daisy-wheel) nroff accents
123 . ds d- d\h'-1'\(ga
124 . ds D- D\h'-1'\(hy
134 .TH EVP 7ossl "2023-09-19" "3.0.11" "OpenSSL"
136 .\" way too many mistakes in technical documents.
140 evp \- high\-level cryptographic functions
148 The \s-1EVP\s0 library provides a high-level interface to cryptographic
149 functions.
151 The \fBEVP_Seal\fR\fI\s-1XXX\s0\fR and \fBEVP_Open\fR\fI\s-1XXX\s0\fR
152 functions provide public key encryption and decryption to implement digital \*(L"envelopes\*(R".
154 The \fBEVP_DigestSign\fR\fI\s-1XXX\s0\fR and
155 \&\fBEVP_DigestVerify\fR\fI\s-1XXX\s0\fR functions implement
157 \&\fBEVP_Sign\fR\fI\s-1XXX\s0\fR and \fBEVP_Verify\fR\fI\s-1XXX\s0\fR
158 functions.
160 Symmetric encryption is available with the \fBEVP_Encrypt\fR\fI\s-1XXX\s0\fR
161 functions. The \fBEVP_Digest\fR\fI\s-1XXX\s0\fR functions provide message digests.
163 The \fB\s-1EVP_PKEY\s0\fR\fI\s-1XXX\s0\fR functions provide a high-level interface to
164 asymmetric algorithms. To create a new \s-1EVP_PKEY\s0 see
166 with a private key of a particular algorithm by using the functions
171 key back into an \s-1\fBOSSL_PARAM\s0\fR\|(3) array.
173 The \s-1EVP_PKEY\s0 functions support the full range of asymmetric algorithm operations:
177 …t these functions do not perform a digest of the data to be signed. Therefore, normally you would …
178 …e that these functions do not perform a digest of the data to be signed. Therefore, normally you w…
181 …functions perform encryption and decryption only. As public key encryption is an expensive operati…
185 based encryption. Careful selection of the parameters will provide a PKCS#5 \s-1PBKDF1\s0 compatible
187 \&\s-1PBKDF2\s0 from PCKS#5).
189 The \fBEVP_Encode\fR\fI\s-1XXX\s0\fR and
190 \&\fBEVP_Decode\fR\fI\s-1XXX\s0\fR functions implement base 64 encoding
194 (public key algorithms) can be replaced by \s-1ENGINE\s0 modules providing alternative
195 implementations. If \s-1ENGINE\s0 implementations of ciphers or digests are registered
196 as defaults, then the various \s-1EVP\s0 functions will automatically use those
197 implementations automatically in preference to built in software
200 Although low-level algorithm specific functions exist for many algorithms
201 their use is discouraged. They cannot be used with an \s-1ENGINE\s0 and \s-1ENGINE\s0
202 versions of new algorithms cannot be accessed using the low-level functions.
204 cleanly supported at the low-level and some operations are more efficient
205 using the high-level interface.
231 Copyright 2000\-2021 The OpenSSL Project Authors. All Rights Reserved.
234 this file except in compliance with the License. You can obtain a copy
235 in the file \s-1LICENSE\s0 in the source distribution or at