diff options
| author | tb <> | 2024-03-05 19:21:31 +0000 |
|---|---|---|
| committer | tb <> | 2024-03-05 19:21:31 +0000 |
| commit | 45dca709040c35c7a9a61acbdbe692fca0fb7af9 (patch) | |
| tree | 6f9156398041cbb969a1a760a5d8d6a49e3a3ff7 | |
| parent | f00f40684a806cf07c843cf80d4bd3b5495181ac (diff) | |
| download | openbsd-45dca709040c35c7a9a61acbdbe692fca0fb7af9.tar.gz openbsd-45dca709040c35c7a9a61acbdbe692fca0fb7af9.tar.bz2 openbsd-45dca709040c35c7a9a61acbdbe692fca0fb7af9.zip | |
Remove GOST documentation
| -rw-r--r-- | src/lib/libcrypto/man/ERR_load_crypto_strings.3 | 5 | ||||
| -rw-r--r-- | src/lib/libcrypto/man/EVP_PKCS82PKEY.3 | 6 | ||||
| -rw-r--r-- | src/lib/libcrypto/man/EVP_PKEY_cmp.3 | 6 | ||||
| -rw-r--r-- | src/lib/libcrypto/man/EVP_PKEY_derive.3 | 5 | ||||
| -rw-r--r-- | src/lib/libcrypto/man/EVP_PKEY_get_default_digest_nid.3 | 6 | ||||
| -rw-r--r-- | src/lib/libcrypto/man/EVP_PKEY_set1_RSA.3 | 24 | ||||
| -rw-r--r-- | src/lib/libcrypto/man/EVP_PKEY_size.3 | 7 |
7 files changed, 17 insertions, 42 deletions
diff --git a/src/lib/libcrypto/man/ERR_load_crypto_strings.3 b/src/lib/libcrypto/man/ERR_load_crypto_strings.3 index 72d10b030c..2bca8af60f 100644 --- a/src/lib/libcrypto/man/ERR_load_crypto_strings.3 +++ b/src/lib/libcrypto/man/ERR_load_crypto_strings.3 | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | .\" $OpenBSD: ERR_load_crypto_strings.3,v 1.11 2023/07/21 10:45:44 tb Exp $ | 1 | .\" $OpenBSD: ERR_load_crypto_strings.3,v 1.12 2024/03/05 19:21:31 tb Exp $ |
| 2 | .\" full merge up to: OpenSSL f672aee4 Feb 9 11:52:40 2016 -0500 | 2 | .\" full merge up to: OpenSSL f672aee4 Feb 9 11:52:40 2016 -0500 |
| 3 | .\" selective merge up to: OpenSSL b3696a55 Sep 2 09:35:50 2017 -0400 | 3 | .\" selective merge up to: OpenSSL b3696a55 Sep 2 09:35:50 2017 -0400 |
| 4 | .\" | 4 | .\" |
| @@ -66,7 +66,7 @@ | |||
| 66 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 66 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
| 67 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 67 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
| 68 | .\" | 68 | .\" |
| 69 | .Dd $Mdocdate: July 21 2023 $ | 69 | .Dd $Mdocdate: March 5 2024 $ |
| 70 | .Dt ERR_LOAD_CRYPTO_STRINGS 3 | 70 | .Dt ERR_LOAD_CRYPTO_STRINGS 3 |
| 71 | .Os | 71 | .Os |
| 72 | .Sh NAME | 72 | .Sh NAME |
| @@ -89,7 +89,6 @@ | |||
| 89 | .\" ERR_load_EC_strings() | 89 | .\" ERR_load_EC_strings() |
| 90 | .\" ERR_load_ERR_strings() | 90 | .\" ERR_load_ERR_strings() |
| 91 | .\" ERR_load_EVP_strings() | 91 | .\" ERR_load_EVP_strings() |
| 92 | .\" ERR_load_GOST_strings() | ||
| 93 | .\" ERR_load_OBJ_strings() | 92 | .\" ERR_load_OBJ_strings() |
| 94 | .\" ERR_load_OCSP_strings() | 93 | .\" ERR_load_OCSP_strings() |
| 95 | .\" ERR_load_PEM_strings() | 94 | .\" ERR_load_PEM_strings() |
diff --git a/src/lib/libcrypto/man/EVP_PKCS82PKEY.3 b/src/lib/libcrypto/man/EVP_PKCS82PKEY.3 index 0f66673886..30a43b8dca 100644 --- a/src/lib/libcrypto/man/EVP_PKCS82PKEY.3 +++ b/src/lib/libcrypto/man/EVP_PKCS82PKEY.3 | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | .\" $OpenBSD: EVP_PKCS82PKEY.3,v 1.2 2023/12/21 21:32:01 tb Exp $ | 1 | .\" $OpenBSD: EVP_PKCS82PKEY.3,v 1.3 2024/03/05 19:21:31 tb Exp $ |
| 2 | .\" | 2 | .\" |
| 3 | .\" Copyright (c) 2021 Ingo Schwarze <schwarze@openbsd.org> | 3 | .\" Copyright (c) 2021 Ingo Schwarze <schwarze@openbsd.org> |
| 4 | .\" | 4 | .\" |
| @@ -14,7 +14,7 @@ | |||
| 14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | 14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF |
| 15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | 15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
| 16 | .\" | 16 | .\" |
| 17 | .Dd $Mdocdate: December 21 2023 $ | 17 | .Dd $Mdocdate: March 5 2024 $ |
| 18 | .Dt EVP_PKCS82PKEY 3 | 18 | .Dt EVP_PKCS82PKEY 3 |
| 19 | .Os | 19 | .Os |
| 20 | .Sh NAME | 20 | .Sh NAME |
| @@ -39,7 +39,7 @@ creates a PKCS#8 | |||
| 39 | structure representing the private key contained in | 39 | structure representing the private key contained in |
| 40 | .Fa pkey . | 40 | .Fa pkey . |
| 41 | .Pp | 41 | .Pp |
| 42 | Supported algorithms include DH, DSA, EC, GOST2001, and RSA. | 42 | Supported algorithms include DH, DSA, EC, and RSA. |
| 43 | .Sh RETURN VALUES | 43 | .Sh RETURN VALUES |
| 44 | These functions return a newly allocated object or | 44 | These functions return a newly allocated object or |
| 45 | .Dv NULL | 45 | .Dv NULL |
diff --git a/src/lib/libcrypto/man/EVP_PKEY_cmp.3 b/src/lib/libcrypto/man/EVP_PKEY_cmp.3 index 42bfb6fec0..2e42a9946f 100644 --- a/src/lib/libcrypto/man/EVP_PKEY_cmp.3 +++ b/src/lib/libcrypto/man/EVP_PKEY_cmp.3 | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | .\" $OpenBSD: EVP_PKEY_cmp.3,v 1.13 2023/09/08 11:37:58 schwarze Exp $ | 1 | .\" $OpenBSD: EVP_PKEY_cmp.3,v 1.14 2024/03/05 19:21:31 tb Exp $ |
| 2 | .\" full merge up to: OpenSSL 05ea606a May 20 20:52:46 2016 -0400 | 2 | .\" full merge up to: OpenSSL 05ea606a May 20 20:52:46 2016 -0400 |
| 3 | .\" selective merge up to: OpenSSL 99d63d46 Oct 26 13:56:48 2016 -0400 | 3 | .\" selective merge up to: OpenSSL 99d63d46 Oct 26 13:56:48 2016 -0400 |
| 4 | .\" | 4 | .\" |
| @@ -67,7 +67,7 @@ | |||
| 67 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 67 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
| 68 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 68 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
| 69 | .\" | 69 | .\" |
| 70 | .Dd $Mdocdate: September 8 2023 $ | 70 | .Dd $Mdocdate: March 5 2024 $ |
| 71 | .Dt EVP_PKEY_CMP 3 | 71 | .Dt EVP_PKEY_CMP 3 |
| 72 | .Os | 72 | .Os |
| 73 | .Sh NAME | 73 | .Sh NAME |
| @@ -77,7 +77,7 @@ | |||
| 77 | .Nm EVP_PKEY_cmp | 77 | .Nm EVP_PKEY_cmp |
| 78 | .\" .Nm EVP_PKEY_save_parameters is intentionally undocumented | 78 | .\" .Nm EVP_PKEY_save_parameters is intentionally undocumented |
| 79 | .\" because nothing uses it according to codesearch.debian.net | 79 | .\" because nothing uses it according to codesearch.debian.net |
| 80 | .\" and it only affects X509_PUBKEY_set(3) for DSA and GOST2001 keys, | 80 | .\" and it only affects X509_PUBKEY_set(3) for DSA, |
| 81 | .\" resulting in incomplete output without the public key parameters. | 81 | .\" resulting in incomplete output without the public key parameters. |
| 82 | .Nd public key parameter and comparison functions | 82 | .Nd public key parameter and comparison functions |
| 83 | .Sh SYNOPSIS | 83 | .Sh SYNOPSIS |
diff --git a/src/lib/libcrypto/man/EVP_PKEY_derive.3 b/src/lib/libcrypto/man/EVP_PKEY_derive.3 index c82018341d..8940572d1d 100644 --- a/src/lib/libcrypto/man/EVP_PKEY_derive.3 +++ b/src/lib/libcrypto/man/EVP_PKEY_derive.3 | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | .\" $OpenBSD: EVP_PKEY_derive.3,v 1.9 2023/09/09 14:26:35 schwarze Exp $ | 1 | .\" $OpenBSD: EVP_PKEY_derive.3,v 1.10 2024/03/05 19:21:31 tb Exp $ |
| 2 | .\" full merge up to: OpenSSL 48e5119a Jan 19 10:49:22 2018 +0100 | 2 | .\" full merge up to: OpenSSL 48e5119a Jan 19 10:49:22 2018 +0100 |
| 3 | .\" | 3 | .\" |
| 4 | .\" This file is a derived work. | 4 | .\" This file is a derived work. |
| @@ -66,7 +66,7 @@ | |||
| 66 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 66 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
| 67 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 67 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
| 68 | .\" | 68 | .\" |
| 69 | .Dd $Mdocdate: September 9 2023 $ | 69 | .Dd $Mdocdate: March 5 2024 $ |
| 70 | .Dt EVP_PKEY_DERIVE 3 | 70 | .Dt EVP_PKEY_DERIVE 3 |
| 71 | .Os | 71 | .Os |
| 72 | .Sh NAME | 72 | .Sh NAME |
| @@ -109,7 +109,6 @@ The library provides built-in support for keys with an | |||
| 109 | of | 109 | of |
| 110 | .Dv EVP_PKEY_DH , | 110 | .Dv EVP_PKEY_DH , |
| 111 | .Dv EVP_PKEY_EC , | 111 | .Dv EVP_PKEY_EC , |
| 112 | .Dv EVP_PKEY_GOSTR01 , | ||
| 113 | .Dv EVP_PKEY_HKDF , | 112 | .Dv EVP_PKEY_HKDF , |
| 114 | and | 113 | and |
| 115 | .Dv EVP_PKEY_X25519 . | 114 | .Dv EVP_PKEY_X25519 . |
diff --git a/src/lib/libcrypto/man/EVP_PKEY_get_default_digest_nid.3 b/src/lib/libcrypto/man/EVP_PKEY_get_default_digest_nid.3 index bef39987a3..50a0ddba10 100644 --- a/src/lib/libcrypto/man/EVP_PKEY_get_default_digest_nid.3 +++ b/src/lib/libcrypto/man/EVP_PKEY_get_default_digest_nid.3 | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | .\" $OpenBSD: EVP_PKEY_get_default_digest_nid.3,v 1.7 2023/09/13 14:57:21 schwarze Exp $ | 1 | .\" $OpenBSD: EVP_PKEY_get_default_digest_nid.3,v 1.8 2024/03/05 19:21:31 tb Exp $ |
| 2 | .\" full merge up to: OpenSSL df75c2bf Dec 9 01:02:36 2018 +0100 | 2 | .\" full merge up to: OpenSSL df75c2bf Dec 9 01:02:36 2018 +0100 |
| 3 | .\" | 3 | .\" |
| 4 | .\" This file is a derived work. | 4 | .\" This file is a derived work. |
| @@ -66,7 +66,7 @@ | |||
| 66 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 66 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
| 67 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 67 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
| 68 | .\" | 68 | .\" |
| 69 | .Dd $Mdocdate: September 13 2023 $ | 69 | .Dd $Mdocdate: March 5 2024 $ |
| 70 | .Dt EVP_PKEY_GET_DEFAULT_DIGEST_NID 3 | 70 | .Dt EVP_PKEY_GET_DEFAULT_DIGEST_NID 3 |
| 71 | .Os | 71 | .Os |
| 72 | .Sh NAME | 72 | .Sh NAME |
| @@ -103,8 +103,6 @@ Support for the following public key algorithms is built into the library: | |||
| 103 | .It Dv EVP_PKEY_DSA Ta Dv NID_sha1 Ta mandatory | 103 | .It Dv EVP_PKEY_DSA Ta Dv NID_sha1 Ta mandatory |
| 104 | .It Dv EVP_PKEY_EC Ta Dv NID_sha1 Ta mandatory | 104 | .It Dv EVP_PKEY_EC Ta Dv NID_sha1 Ta mandatory |
| 105 | .It Dv EVP_PKEY_ED25519 Ta Dv NID_undef Ta mandatory | 105 | .It Dv EVP_PKEY_ED25519 Ta Dv NID_undef Ta mandatory |
| 106 | .It Dv EVP_PKEY_GOSTIMIT Ta Dv NID_id_Gost28147_89_MAC Ta mandatory | ||
| 107 | .It Dv EVP_PKEY_GOSTR01 Ta variable Ta mandatory | ||
| 108 | .It Dv EVP_PKEY_HMAC Ta Dv NID_sha1 Ta advisory | 106 | .It Dv EVP_PKEY_HMAC Ta Dv NID_sha1 Ta advisory |
| 109 | .It Dv EVP_PKEY_RSA Ta Dv NID_sha256 Ta advisory | 107 | .It Dv EVP_PKEY_RSA Ta Dv NID_sha256 Ta advisory |
| 110 | .El | 108 | .El |
diff --git a/src/lib/libcrypto/man/EVP_PKEY_set1_RSA.3 b/src/lib/libcrypto/man/EVP_PKEY_set1_RSA.3 index 4825b6056e..07db27003e 100644 --- a/src/lib/libcrypto/man/EVP_PKEY_set1_RSA.3 +++ b/src/lib/libcrypto/man/EVP_PKEY_set1_RSA.3 | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | .\" $OpenBSD: EVP_PKEY_set1_RSA.3,v 1.21 2023/12/21 21:32:01 tb Exp $ | 1 | .\" $OpenBSD: EVP_PKEY_set1_RSA.3,v 1.22 2024/03/05 19:21:31 tb Exp $ |
| 2 | .\" full merge up to: OpenSSL 99d63d46 Oct 26 13:56:48 2016 -0400 | 2 | .\" full merge up to: OpenSSL 99d63d46 Oct 26 13:56:48 2016 -0400 |
| 3 | .\" | 3 | .\" |
| 4 | .\" This file is a derived work. | 4 | .\" This file is a derived work. |
| @@ -65,7 +65,7 @@ | |||
| 65 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 65 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
| 66 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 66 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
| 67 | .\" | 67 | .\" |
| 68 | .Dd $Mdocdate: December 21 2023 $ | 68 | .Dd $Mdocdate: March 5 2024 $ |
| 69 | .Dt EVP_PKEY_SET1_RSA 3 | 69 | .Dt EVP_PKEY_SET1_RSA 3 |
| 70 | .Os | 70 | .Os |
| 71 | .Sh NAME | 71 | .Sh NAME |
| @@ -87,7 +87,6 @@ | |||
| 87 | .Nm EVP_PKEY_assign_DSA , | 87 | .Nm EVP_PKEY_assign_DSA , |
| 88 | .Nm EVP_PKEY_assign_DH , | 88 | .Nm EVP_PKEY_assign_DH , |
| 89 | .Nm EVP_PKEY_assign_EC_KEY , | 89 | .Nm EVP_PKEY_assign_EC_KEY , |
| 90 | .Nm EVP_PKEY_assign_GOST , | ||
| 91 | .Nm EVP_PKEY_assign , | 90 | .Nm EVP_PKEY_assign , |
| 92 | .Nm EVP_PKEY_base_id , | 91 | .Nm EVP_PKEY_base_id , |
| 93 | .Nm EVP_PKEY_id , | 92 | .Nm EVP_PKEY_id , |
| @@ -182,11 +181,6 @@ | |||
| 182 | .Fa "EC_KEY *key" | 181 | .Fa "EC_KEY *key" |
| 183 | .Fc | 182 | .Fc |
| 184 | .Ft int | 183 | .Ft int |
| 185 | .Fo EVP_PKEY_assign_GOST | ||
| 186 | .Fa "EVP_PKEY *pkey" | ||
| 187 | .Fa "GOST_KEY *key" | ||
| 188 | .Fc | ||
| 189 | .Ft int | ||
| 190 | .Fo EVP_PKEY_assign | 184 | .Fo EVP_PKEY_assign |
| 191 | .Fa "EVP_PKEY *pkey" | 185 | .Fa "EVP_PKEY *pkey" |
| 192 | .Fa "int type" | 186 | .Fa "int type" |
| @@ -268,7 +262,6 @@ becomes unspecified. | |||
| 268 | .Fn EVP_PKEY_assign_DSA , | 262 | .Fn EVP_PKEY_assign_DSA , |
| 269 | .Fn EVP_PKEY_assign_DH , | 263 | .Fn EVP_PKEY_assign_DH , |
| 270 | .Fn EVP_PKEY_assign_EC_KEY , | 264 | .Fn EVP_PKEY_assign_EC_KEY , |
| 271 | .Fn EVP_PKEY_assign_GOST , | ||
| 272 | and | 265 | and |
| 273 | .Fn EVP_PKEY_assign | 266 | .Fn EVP_PKEY_assign |
| 274 | also set the referenced key to | 267 | also set the referenced key to |
| @@ -292,9 +285,8 @@ The following types are supported: | |||
| 292 | .Dv EVP_PKEY_RSA , | 285 | .Dv EVP_PKEY_RSA , |
| 293 | .Dv EVP_PKEY_DSA , | 286 | .Dv EVP_PKEY_DSA , |
| 294 | .Dv EVP_PKEY_DH , | 287 | .Dv EVP_PKEY_DH , |
| 295 | .Dv EVP_PKEY_EC , | ||
| 296 | and | 288 | and |
| 297 | .Dv EVP_PKEY_GOSTR01 . | 289 | .Dv EVP_PKEY_EC . |
| 298 | .Pp | 290 | .Pp |
| 299 | .Fn EVP_PKEY_base_id | 291 | .Fn EVP_PKEY_base_id |
| 300 | returns the type of | 292 | returns the type of |
| @@ -307,8 +299,6 @@ according to the following table: | |||
| 307 | .It Dv EVP_PKEY_DH Ta = Dv NID_dhKeyAgreement Ta DH | 299 | .It Dv EVP_PKEY_DH Ta = Dv NID_dhKeyAgreement Ta DH |
| 308 | .It Dv EVP_PKEY_DSA Ta = Dv NID_dsa Ta DSA | 300 | .It Dv EVP_PKEY_DSA Ta = Dv NID_dsa Ta DSA |
| 309 | .It Dv EVP_PKEY_EC Ta = Dv NID_X9_62_id_ecPublicKey Ta EC | 301 | .It Dv EVP_PKEY_EC Ta = Dv NID_X9_62_id_ecPublicKey Ta EC |
| 310 | .It Dv EVP_PKEY_GOSTIMIT Ta = Dv NID_id_Gost28147_89_MAC Ta GOST-MAC | ||
| 311 | .It Dv EVP_PKEY_GOSTR01 Ta = Dv NID_id_GostR3410_2001 Ta GOST2001 | ||
| 312 | .It Dv EVP_PKEY_HMAC Ta = Dv NID_hmac Ta HMAC | 302 | .It Dv EVP_PKEY_HMAC Ta = Dv NID_hmac Ta HMAC |
| 313 | .It Dv EVP_PKEY_RSA Ta = Dv NID_rsaEncryption Ta RSA | 303 | .It Dv EVP_PKEY_RSA Ta = Dv NID_rsaEncryption Ta RSA |
| 314 | .It Dv EVP_PKEY_RSA_PSS Ta = Dv NID_rsassaPss Ta RSA-PSS | 304 | .It Dv EVP_PKEY_RSA_PSS Ta = Dv NID_rsassaPss Ta RSA-PSS |
| @@ -326,8 +316,6 @@ The following deprecated aliases are still supported: | |||
| 326 | .It Dv EVP_PKEY_DSA2 Ta = Dv NID_dsaWithSHA Ta DSA | 316 | .It Dv EVP_PKEY_DSA2 Ta = Dv NID_dsaWithSHA Ta DSA |
| 327 | .It Dv EVP_PKEY_DSA3 Ta = Dv NID_dsaWithSHA1 Ta DSA | 317 | .It Dv EVP_PKEY_DSA3 Ta = Dv NID_dsaWithSHA1 Ta DSA |
| 328 | .It Dv EVP_PKEY_DSA4 Ta = Dv NID_dsaWithSHA1_2 Ta DSA | 318 | .It Dv EVP_PKEY_DSA4 Ta = Dv NID_dsaWithSHA1_2 Ta DSA |
| 329 | .It Dv EVP_PKEY_GOSTR12_256 Ta = Dv NID_id_tc26_gost3410_2012_256 Ta GOST2001 | ||
| 330 | .It Dv EVP_PKEY_GOSTR12_512 Ta = Dv NID_id_tc26_gost3410_2012_512 Ta GOST2001 | ||
| 331 | .It Dv EVP_PKEY_RSA2 Ta = Dv NID_rsa Ta RSA | 319 | .It Dv EVP_PKEY_RSA2 Ta = Dv NID_rsa Ta RSA |
| 332 | .El | 320 | .El |
| 333 | .Pp | 321 | .Pp |
| @@ -408,7 +396,6 @@ functions must be freed as well as | |||
| 408 | .Fn EVP_PKEY_assign_DSA , | 396 | .Fn EVP_PKEY_assign_DSA , |
| 409 | .Fn EVP_PKEY_assign_DH , | 397 | .Fn EVP_PKEY_assign_DH , |
| 410 | .Fn EVP_PKEY_assign_EC_KEY , | 398 | .Fn EVP_PKEY_assign_EC_KEY , |
| 411 | .Fn EVP_PKEY_assign_GOST , | ||
| 412 | .Fn EVP_PKEY_assign , | 399 | .Fn EVP_PKEY_assign , |
| 413 | .Fn EVP_PKEY_set_type , | 400 | .Fn EVP_PKEY_set_type , |
| 414 | and | 401 | and |
| @@ -436,7 +423,6 @@ the return value points to an | |||
| 436 | .Vt DSA , | 423 | .Vt DSA , |
| 437 | .Vt DH , | 424 | .Vt DH , |
| 438 | .Vt EC_KEY , | 425 | .Vt EC_KEY , |
| 439 | .Vt GOST_KEY , | ||
| 440 | or | 426 | or |
| 441 | .Vt ASN1_OCTET_STRING | 427 | .Vt ASN1_OCTET_STRING |
| 442 | object depending on the type of | 428 | object depending on the type of |
| @@ -494,10 +480,6 @@ and | |||
| 494 | first appeared in OpenSSL 1.0.0 and have been available since | 480 | first appeared in OpenSSL 1.0.0 and have been available since |
| 495 | .Ox 4.9 . | 481 | .Ox 4.9 . |
| 496 | .Pp | 482 | .Pp |
| 497 | .Fn EVP_PKEY_assign_GOST | ||
| 498 | first appeared in | ||
| 499 | .Ox 5.7 . | ||
| 500 | .Pp | ||
| 501 | .Fn EVP_PKEY_get0_RSA , | 483 | .Fn EVP_PKEY_get0_RSA , |
| 502 | .Fn EVP_PKEY_get0_DSA , | 484 | .Fn EVP_PKEY_get0_DSA , |
| 503 | .Fn EVP_PKEY_get0_DH , | 485 | .Fn EVP_PKEY_get0_DH , |
diff --git a/src/lib/libcrypto/man/EVP_PKEY_size.3 b/src/lib/libcrypto/man/EVP_PKEY_size.3 index b45cda7f91..f49678d0a9 100644 --- a/src/lib/libcrypto/man/EVP_PKEY_size.3 +++ b/src/lib/libcrypto/man/EVP_PKEY_size.3 | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | .\" $OpenBSD: EVP_PKEY_size.3,v 1.2 2023/09/12 15:29:03 schwarze Exp $ | 1 | .\" $OpenBSD: EVP_PKEY_size.3,v 1.3 2024/03/05 19:21:31 tb Exp $ |
| 2 | .\" full merge up to: OpenSSL eed9d03b Jan 8 11:04:15 2020 +0100 | 2 | .\" full merge up to: OpenSSL eed9d03b Jan 8 11:04:15 2020 +0100 |
| 3 | .\" | 3 | .\" |
| 4 | .\" This file is a derived work. | 4 | .\" This file is a derived work. |
| @@ -65,7 +65,7 @@ | |||
| 65 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 65 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
| 66 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 66 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
| 67 | .\" | 67 | .\" |
| 68 | .Dd $Mdocdate: September 12 2023 $ | 68 | .Dd $Mdocdate: March 5 2024 $ |
| 69 | .Dt EVP_PKEY_SIZE 3 | 69 | .Dt EVP_PKEY_SIZE 3 |
| 70 | .Os | 70 | .Os |
| 71 | .Sh NAME | 71 | .Sh NAME |
| @@ -144,7 +144,6 @@ is supported for the following algorithms: | |||
| 144 | .It DSA Ta Xr DSA_size 3 | 144 | .It DSA Ta Xr DSA_size 3 |
| 145 | .It EC Ta Xr ECDSA_size 3 | 145 | .It EC Ta Xr ECDSA_size 3 |
| 146 | .It ED25519 Ta 64, but see below | 146 | .It ED25519 Ta 64, but see below |
| 147 | .It GOST01 Ta 64 or 128 | ||
| 148 | .It HMAC Ta Dv EVP_MAX_MD_SIZE No = 64 | 147 | .It HMAC Ta Dv EVP_MAX_MD_SIZE No = 64 |
| 149 | .It RSA Ta Xr RSA_size 3 | 148 | .It RSA Ta Xr RSA_size 3 |
| 150 | .It X25519 Ta Dv X25519_KEYLEN No = 32 | 149 | .It X25519 Ta Dv X25519_KEYLEN No = 32 |
| @@ -173,7 +172,6 @@ By default, the following algorithms are supported: | |||
| 173 | .It DSA Ta the public domain parameter Fa p Ta Xr DSA_bits 3 | 172 | .It DSA Ta the public domain parameter Fa p Ta Xr DSA_bits 3 |
| 174 | .It EC Ta the order of the group Ta Xr EC_GROUP_order_bits 3 | 173 | .It EC Ta the order of the group Ta Xr EC_GROUP_order_bits 3 |
| 175 | .It ED25519 Ta 253 Ta \(em | 174 | .It ED25519 Ta 253 Ta \(em |
| 176 | .It GOST01 Ta 256 or 512 Ta \(em | ||
| 177 | .It RSA Ta the public modulus Ta Xr RSA_bits 3 | 175 | .It RSA Ta the public modulus Ta Xr RSA_bits 3 |
| 178 | .It X25519 Ta 253 Ta \(em | 176 | .It X25519 Ta 253 Ta \(em |
| 179 | .El | 177 | .El |
| @@ -192,7 +190,6 @@ By default, the following algorithms are supported: | |||
| 192 | .It DSA Ta Xr DSA_security_bits 3 | 190 | .It DSA Ta Xr DSA_security_bits 3 |
| 193 | .It EC Ta Xr EC_GROUP_order_bits 3 divided by 2 | 191 | .It EC Ta Xr EC_GROUP_order_bits 3 divided by 2 |
| 194 | .It ED25519 Ta 128 | 192 | .It ED25519 Ta 128 |
| 195 | .It GOST01 Ta not supported, return value is \-2 | ||
| 196 | .It RSA Ta Xr RSA_security_bits 3 | 193 | .It RSA Ta Xr RSA_security_bits 3 |
| 197 | .It X25519 Ta 128 | 194 | .It X25519 Ta 128 |
| 198 | .El | 195 | .El |
