summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authortb <>2024-03-05 19:21:31 +0000
committertb <>2024-03-05 19:21:31 +0000
commit45dca709040c35c7a9a61acbdbe692fca0fb7af9 (patch)
tree6f9156398041cbb969a1a760a5d8d6a49e3a3ff7
parentf00f40684a806cf07c843cf80d4bd3b5495181ac (diff)
downloadopenbsd-45dca709040c35c7a9a61acbdbe692fca0fb7af9.tar.gz
openbsd-45dca709040c35c7a9a61acbdbe692fca0fb7af9.tar.bz2
openbsd-45dca709040c35c7a9a61acbdbe692fca0fb7af9.zip
Remove GOST documentation
-rw-r--r--src/lib/libcrypto/man/ERR_load_crypto_strings.35
-rw-r--r--src/lib/libcrypto/man/EVP_PKCS82PKEY.36
-rw-r--r--src/lib/libcrypto/man/EVP_PKEY_cmp.36
-rw-r--r--src/lib/libcrypto/man/EVP_PKEY_derive.35
-rw-r--r--src/lib/libcrypto/man/EVP_PKEY_get_default_digest_nid.36
-rw-r--r--src/lib/libcrypto/man/EVP_PKEY_set1_RSA.324
-rw-r--r--src/lib/libcrypto/man/EVP_PKEY_size.37
7 files changed, 17 insertions, 42 deletions
diff --git a/src/lib/libcrypto/man/ERR_load_crypto_strings.3 b/src/lib/libcrypto/man/ERR_load_crypto_strings.3
index 72d10b030c..2bca8af60f 100644
--- a/src/lib/libcrypto/man/ERR_load_crypto_strings.3
+++ b/src/lib/libcrypto/man/ERR_load_crypto_strings.3
@@ -1,4 +1,4 @@
1.\" $OpenBSD: ERR_load_crypto_strings.3,v 1.11 2023/07/21 10:45:44 tb Exp $ 1.\" $OpenBSD: ERR_load_crypto_strings.3,v 1.12 2024/03/05 19:21:31 tb Exp $
2.\" full merge up to: OpenSSL f672aee4 Feb 9 11:52:40 2016 -0500 2.\" full merge up to: OpenSSL f672aee4 Feb 9 11:52:40 2016 -0500
3.\" selective merge up to: OpenSSL b3696a55 Sep 2 09:35:50 2017 -0400 3.\" selective merge up to: OpenSSL b3696a55 Sep 2 09:35:50 2017 -0400
4.\" 4.\"
@@ -66,7 +66,7 @@
66.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED 66.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
67.\" OF THE POSSIBILITY OF SUCH DAMAGE. 67.\" OF THE POSSIBILITY OF SUCH DAMAGE.
68.\" 68.\"
69.Dd $Mdocdate: July 21 2023 $ 69.Dd $Mdocdate: March 5 2024 $
70.Dt ERR_LOAD_CRYPTO_STRINGS 3 70.Dt ERR_LOAD_CRYPTO_STRINGS 3
71.Os 71.Os
72.Sh NAME 72.Sh NAME
@@ -89,7 +89,6 @@
89.\" ERR_load_EC_strings() 89.\" ERR_load_EC_strings()
90.\" ERR_load_ERR_strings() 90.\" ERR_load_ERR_strings()
91.\" ERR_load_EVP_strings() 91.\" ERR_load_EVP_strings()
92.\" ERR_load_GOST_strings()
93.\" ERR_load_OBJ_strings() 92.\" ERR_load_OBJ_strings()
94.\" ERR_load_OCSP_strings() 93.\" ERR_load_OCSP_strings()
95.\" ERR_load_PEM_strings() 94.\" ERR_load_PEM_strings()
diff --git a/src/lib/libcrypto/man/EVP_PKCS82PKEY.3 b/src/lib/libcrypto/man/EVP_PKCS82PKEY.3
index 0f66673886..30a43b8dca 100644
--- a/src/lib/libcrypto/man/EVP_PKCS82PKEY.3
+++ b/src/lib/libcrypto/man/EVP_PKCS82PKEY.3
@@ -1,4 +1,4 @@
1.\" $OpenBSD: EVP_PKCS82PKEY.3,v 1.2 2023/12/21 21:32:01 tb Exp $ 1.\" $OpenBSD: EVP_PKCS82PKEY.3,v 1.3 2024/03/05 19:21:31 tb Exp $
2.\" 2.\"
3.\" Copyright (c) 2021 Ingo Schwarze <schwarze@openbsd.org> 3.\" Copyright (c) 2021 Ingo Schwarze <schwarze@openbsd.org>
4.\" 4.\"
@@ -14,7 +14,7 @@
14.\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF 14.\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
15.\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. 15.\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
16.\" 16.\"
17.Dd $Mdocdate: December 21 2023 $ 17.Dd $Mdocdate: March 5 2024 $
18.Dt EVP_PKCS82PKEY 3 18.Dt EVP_PKCS82PKEY 3
19.Os 19.Os
20.Sh NAME 20.Sh NAME
@@ -39,7 +39,7 @@ creates a PKCS#8
39structure representing the private key contained in 39structure representing the private key contained in
40.Fa pkey . 40.Fa pkey .
41.Pp 41.Pp
42Supported algorithms include DH, DSA, EC, GOST2001, and RSA. 42Supported algorithms include DH, DSA, EC, and RSA.
43.Sh RETURN VALUES 43.Sh RETURN VALUES
44These functions return a newly allocated object or 44These functions return a newly allocated object or
45.Dv NULL 45.Dv NULL
diff --git a/src/lib/libcrypto/man/EVP_PKEY_cmp.3 b/src/lib/libcrypto/man/EVP_PKEY_cmp.3
index 42bfb6fec0..2e42a9946f 100644
--- a/src/lib/libcrypto/man/EVP_PKEY_cmp.3
+++ b/src/lib/libcrypto/man/EVP_PKEY_cmp.3
@@ -1,4 +1,4 @@
1.\" $OpenBSD: EVP_PKEY_cmp.3,v 1.13 2023/09/08 11:37:58 schwarze Exp $ 1.\" $OpenBSD: EVP_PKEY_cmp.3,v 1.14 2024/03/05 19:21:31 tb Exp $
2.\" full merge up to: OpenSSL 05ea606a May 20 20:52:46 2016 -0400 2.\" full merge up to: OpenSSL 05ea606a May 20 20:52:46 2016 -0400
3.\" selective merge up to: OpenSSL 99d63d46 Oct 26 13:56:48 2016 -0400 3.\" selective merge up to: OpenSSL 99d63d46 Oct 26 13:56:48 2016 -0400
4.\" 4.\"
@@ -67,7 +67,7 @@
67.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED 67.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
68.\" OF THE POSSIBILITY OF SUCH DAMAGE. 68.\" OF THE POSSIBILITY OF SUCH DAMAGE.
69.\" 69.\"
70.Dd $Mdocdate: September 8 2023 $ 70.Dd $Mdocdate: March 5 2024 $
71.Dt EVP_PKEY_CMP 3 71.Dt EVP_PKEY_CMP 3
72.Os 72.Os
73.Sh NAME 73.Sh NAME
@@ -77,7 +77,7 @@
77.Nm EVP_PKEY_cmp 77.Nm EVP_PKEY_cmp
78.\" .Nm EVP_PKEY_save_parameters is intentionally undocumented 78.\" .Nm EVP_PKEY_save_parameters is intentionally undocumented
79.\" because nothing uses it according to codesearch.debian.net 79.\" because nothing uses it according to codesearch.debian.net
80.\" and it only affects X509_PUBKEY_set(3) for DSA and GOST2001 keys, 80.\" and it only affects X509_PUBKEY_set(3) for DSA,
81.\" resulting in incomplete output without the public key parameters. 81.\" resulting in incomplete output without the public key parameters.
82.Nd public key parameter and comparison functions 82.Nd public key parameter and comparison functions
83.Sh SYNOPSIS 83.Sh SYNOPSIS
diff --git a/src/lib/libcrypto/man/EVP_PKEY_derive.3 b/src/lib/libcrypto/man/EVP_PKEY_derive.3
index c82018341d..8940572d1d 100644
--- a/src/lib/libcrypto/man/EVP_PKEY_derive.3
+++ b/src/lib/libcrypto/man/EVP_PKEY_derive.3
@@ -1,4 +1,4 @@
1.\" $OpenBSD: EVP_PKEY_derive.3,v 1.9 2023/09/09 14:26:35 schwarze Exp $ 1.\" $OpenBSD: EVP_PKEY_derive.3,v 1.10 2024/03/05 19:21:31 tb Exp $
2.\" full merge up to: OpenSSL 48e5119a Jan 19 10:49:22 2018 +0100 2.\" full merge up to: OpenSSL 48e5119a Jan 19 10:49:22 2018 +0100
3.\" 3.\"
4.\" This file is a derived work. 4.\" This file is a derived work.
@@ -66,7 +66,7 @@
66.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED 66.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
67.\" OF THE POSSIBILITY OF SUCH DAMAGE. 67.\" OF THE POSSIBILITY OF SUCH DAMAGE.
68.\" 68.\"
69.Dd $Mdocdate: September 9 2023 $ 69.Dd $Mdocdate: March 5 2024 $
70.Dt EVP_PKEY_DERIVE 3 70.Dt EVP_PKEY_DERIVE 3
71.Os 71.Os
72.Sh NAME 72.Sh NAME
@@ -109,7 +109,6 @@ The library provides built-in support for keys with an
109of 109of
110.Dv EVP_PKEY_DH , 110.Dv EVP_PKEY_DH ,
111.Dv EVP_PKEY_EC , 111.Dv EVP_PKEY_EC ,
112.Dv EVP_PKEY_GOSTR01 ,
113.Dv EVP_PKEY_HKDF , 112.Dv EVP_PKEY_HKDF ,
114and 113and
115.Dv EVP_PKEY_X25519 . 114.Dv EVP_PKEY_X25519 .
diff --git a/src/lib/libcrypto/man/EVP_PKEY_get_default_digest_nid.3 b/src/lib/libcrypto/man/EVP_PKEY_get_default_digest_nid.3
index bef39987a3..50a0ddba10 100644
--- a/src/lib/libcrypto/man/EVP_PKEY_get_default_digest_nid.3
+++ b/src/lib/libcrypto/man/EVP_PKEY_get_default_digest_nid.3
@@ -1,4 +1,4 @@
1.\" $OpenBSD: EVP_PKEY_get_default_digest_nid.3,v 1.7 2023/09/13 14:57:21 schwarze Exp $ 1.\" $OpenBSD: EVP_PKEY_get_default_digest_nid.3,v 1.8 2024/03/05 19:21:31 tb Exp $
2.\" full merge up to: OpenSSL df75c2bf Dec 9 01:02:36 2018 +0100 2.\" full merge up to: OpenSSL df75c2bf Dec 9 01:02:36 2018 +0100
3.\" 3.\"
4.\" This file is a derived work. 4.\" This file is a derived work.
@@ -66,7 +66,7 @@
66.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED 66.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
67.\" OF THE POSSIBILITY OF SUCH DAMAGE. 67.\" OF THE POSSIBILITY OF SUCH DAMAGE.
68.\" 68.\"
69.Dd $Mdocdate: September 13 2023 $ 69.Dd $Mdocdate: March 5 2024 $
70.Dt EVP_PKEY_GET_DEFAULT_DIGEST_NID 3 70.Dt EVP_PKEY_GET_DEFAULT_DIGEST_NID 3
71.Os 71.Os
72.Sh NAME 72.Sh NAME
@@ -103,8 +103,6 @@ Support for the following public key algorithms is built into the library:
103.It Dv EVP_PKEY_DSA Ta Dv NID_sha1 Ta mandatory 103.It Dv EVP_PKEY_DSA Ta Dv NID_sha1 Ta mandatory
104.It Dv EVP_PKEY_EC Ta Dv NID_sha1 Ta mandatory 104.It Dv EVP_PKEY_EC Ta Dv NID_sha1 Ta mandatory
105.It Dv EVP_PKEY_ED25519 Ta Dv NID_undef Ta mandatory 105.It Dv EVP_PKEY_ED25519 Ta Dv NID_undef Ta mandatory
106.It Dv EVP_PKEY_GOSTIMIT Ta Dv NID_id_Gost28147_89_MAC Ta mandatory
107.It Dv EVP_PKEY_GOSTR01 Ta variable Ta mandatory
108.It Dv EVP_PKEY_HMAC Ta Dv NID_sha1 Ta advisory 106.It Dv EVP_PKEY_HMAC Ta Dv NID_sha1 Ta advisory
109.It Dv EVP_PKEY_RSA Ta Dv NID_sha256 Ta advisory 107.It Dv EVP_PKEY_RSA Ta Dv NID_sha256 Ta advisory
110.El 108.El
diff --git a/src/lib/libcrypto/man/EVP_PKEY_set1_RSA.3 b/src/lib/libcrypto/man/EVP_PKEY_set1_RSA.3
index 4825b6056e..07db27003e 100644
--- a/src/lib/libcrypto/man/EVP_PKEY_set1_RSA.3
+++ b/src/lib/libcrypto/man/EVP_PKEY_set1_RSA.3
@@ -1,4 +1,4 @@
1.\" $OpenBSD: EVP_PKEY_set1_RSA.3,v 1.21 2023/12/21 21:32:01 tb Exp $ 1.\" $OpenBSD: EVP_PKEY_set1_RSA.3,v 1.22 2024/03/05 19:21:31 tb Exp $
2.\" full merge up to: OpenSSL 99d63d46 Oct 26 13:56:48 2016 -0400 2.\" full merge up to: OpenSSL 99d63d46 Oct 26 13:56:48 2016 -0400
3.\" 3.\"
4.\" This file is a derived work. 4.\" This file is a derived work.
@@ -65,7 +65,7 @@
65.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED 65.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
66.\" OF THE POSSIBILITY OF SUCH DAMAGE. 66.\" OF THE POSSIBILITY OF SUCH DAMAGE.
67.\" 67.\"
68.Dd $Mdocdate: December 21 2023 $ 68.Dd $Mdocdate: March 5 2024 $
69.Dt EVP_PKEY_SET1_RSA 3 69.Dt EVP_PKEY_SET1_RSA 3
70.Os 70.Os
71.Sh NAME 71.Sh NAME
@@ -87,7 +87,6 @@
87.Nm EVP_PKEY_assign_DSA , 87.Nm EVP_PKEY_assign_DSA ,
88.Nm EVP_PKEY_assign_DH , 88.Nm EVP_PKEY_assign_DH ,
89.Nm EVP_PKEY_assign_EC_KEY , 89.Nm EVP_PKEY_assign_EC_KEY ,
90.Nm EVP_PKEY_assign_GOST ,
91.Nm EVP_PKEY_assign , 90.Nm EVP_PKEY_assign ,
92.Nm EVP_PKEY_base_id , 91.Nm EVP_PKEY_base_id ,
93.Nm EVP_PKEY_id , 92.Nm EVP_PKEY_id ,
@@ -182,11 +181,6 @@
182.Fa "EC_KEY *key" 181.Fa "EC_KEY *key"
183.Fc 182.Fc
184.Ft int 183.Ft int
185.Fo EVP_PKEY_assign_GOST
186.Fa "EVP_PKEY *pkey"
187.Fa "GOST_KEY *key"
188.Fc
189.Ft int
190.Fo EVP_PKEY_assign 184.Fo EVP_PKEY_assign
191.Fa "EVP_PKEY *pkey" 185.Fa "EVP_PKEY *pkey"
192.Fa "int type" 186.Fa "int type"
@@ -268,7 +262,6 @@ becomes unspecified.
268.Fn EVP_PKEY_assign_DSA , 262.Fn EVP_PKEY_assign_DSA ,
269.Fn EVP_PKEY_assign_DH , 263.Fn EVP_PKEY_assign_DH ,
270.Fn EVP_PKEY_assign_EC_KEY , 264.Fn EVP_PKEY_assign_EC_KEY ,
271.Fn EVP_PKEY_assign_GOST ,
272and 265and
273.Fn EVP_PKEY_assign 266.Fn EVP_PKEY_assign
274also set the referenced key to 267also set the referenced key to
@@ -292,9 +285,8 @@ The following types are supported:
292.Dv EVP_PKEY_RSA , 285.Dv EVP_PKEY_RSA ,
293.Dv EVP_PKEY_DSA , 286.Dv EVP_PKEY_DSA ,
294.Dv EVP_PKEY_DH , 287.Dv EVP_PKEY_DH ,
295.Dv EVP_PKEY_EC ,
296and 288and
297.Dv EVP_PKEY_GOSTR01 . 289.Dv EVP_PKEY_EC .
298.Pp 290.Pp
299.Fn EVP_PKEY_base_id 291.Fn EVP_PKEY_base_id
300returns the type of 292returns the type of
@@ -307,8 +299,6 @@ according to the following table:
307.It Dv EVP_PKEY_DH Ta = Dv NID_dhKeyAgreement Ta DH 299.It Dv EVP_PKEY_DH Ta = Dv NID_dhKeyAgreement Ta DH
308.It Dv EVP_PKEY_DSA Ta = Dv NID_dsa Ta DSA 300.It Dv EVP_PKEY_DSA Ta = Dv NID_dsa Ta DSA
309.It Dv EVP_PKEY_EC Ta = Dv NID_X9_62_id_ecPublicKey Ta EC 301.It Dv EVP_PKEY_EC Ta = Dv NID_X9_62_id_ecPublicKey Ta EC
310.It Dv EVP_PKEY_GOSTIMIT Ta = Dv NID_id_Gost28147_89_MAC Ta GOST-MAC
311.It Dv EVP_PKEY_GOSTR01 Ta = Dv NID_id_GostR3410_2001 Ta GOST2001
312.It Dv EVP_PKEY_HMAC Ta = Dv NID_hmac Ta HMAC 302.It Dv EVP_PKEY_HMAC Ta = Dv NID_hmac Ta HMAC
313.It Dv EVP_PKEY_RSA Ta = Dv NID_rsaEncryption Ta RSA 303.It Dv EVP_PKEY_RSA Ta = Dv NID_rsaEncryption Ta RSA
314.It Dv EVP_PKEY_RSA_PSS Ta = Dv NID_rsassaPss Ta RSA-PSS 304.It Dv EVP_PKEY_RSA_PSS Ta = Dv NID_rsassaPss Ta RSA-PSS
@@ -326,8 +316,6 @@ The following deprecated aliases are still supported:
326.It Dv EVP_PKEY_DSA2 Ta = Dv NID_dsaWithSHA Ta DSA 316.It Dv EVP_PKEY_DSA2 Ta = Dv NID_dsaWithSHA Ta DSA
327.It Dv EVP_PKEY_DSA3 Ta = Dv NID_dsaWithSHA1 Ta DSA 317.It Dv EVP_PKEY_DSA3 Ta = Dv NID_dsaWithSHA1 Ta DSA
328.It Dv EVP_PKEY_DSA4 Ta = Dv NID_dsaWithSHA1_2 Ta DSA 318.It Dv EVP_PKEY_DSA4 Ta = Dv NID_dsaWithSHA1_2 Ta DSA
329.It Dv EVP_PKEY_GOSTR12_256 Ta = Dv NID_id_tc26_gost3410_2012_256 Ta GOST2001
330.It Dv EVP_PKEY_GOSTR12_512 Ta = Dv NID_id_tc26_gost3410_2012_512 Ta GOST2001
331.It Dv EVP_PKEY_RSA2 Ta = Dv NID_rsa Ta RSA 319.It Dv EVP_PKEY_RSA2 Ta = Dv NID_rsa Ta RSA
332.El 320.El
333.Pp 321.Pp
@@ -408,7 +396,6 @@ functions must be freed as well as
408.Fn EVP_PKEY_assign_DSA , 396.Fn EVP_PKEY_assign_DSA ,
409.Fn EVP_PKEY_assign_DH , 397.Fn EVP_PKEY_assign_DH ,
410.Fn EVP_PKEY_assign_EC_KEY , 398.Fn EVP_PKEY_assign_EC_KEY ,
411.Fn EVP_PKEY_assign_GOST ,
412.Fn EVP_PKEY_assign , 399.Fn EVP_PKEY_assign ,
413.Fn EVP_PKEY_set_type , 400.Fn EVP_PKEY_set_type ,
414and 401and
@@ -436,7 +423,6 @@ the return value points to an
436.Vt DSA , 423.Vt DSA ,
437.Vt DH , 424.Vt DH ,
438.Vt EC_KEY , 425.Vt EC_KEY ,
439.Vt GOST_KEY ,
440or 426or
441.Vt ASN1_OCTET_STRING 427.Vt ASN1_OCTET_STRING
442object depending on the type of 428object depending on the type of
@@ -494,10 +480,6 @@ and
494first appeared in OpenSSL 1.0.0 and have been available since 480first appeared in OpenSSL 1.0.0 and have been available since
495.Ox 4.9 . 481.Ox 4.9 .
496.Pp 482.Pp
497.Fn EVP_PKEY_assign_GOST
498first appeared in
499.Ox 5.7 .
500.Pp
501.Fn EVP_PKEY_get0_RSA , 483.Fn EVP_PKEY_get0_RSA ,
502.Fn EVP_PKEY_get0_DSA , 484.Fn EVP_PKEY_get0_DSA ,
503.Fn EVP_PKEY_get0_DH , 485.Fn EVP_PKEY_get0_DH ,
diff --git a/src/lib/libcrypto/man/EVP_PKEY_size.3 b/src/lib/libcrypto/man/EVP_PKEY_size.3
index b45cda7f91..f49678d0a9 100644
--- a/src/lib/libcrypto/man/EVP_PKEY_size.3
+++ b/src/lib/libcrypto/man/EVP_PKEY_size.3
@@ -1,4 +1,4 @@
1.\" $OpenBSD: EVP_PKEY_size.3,v 1.2 2023/09/12 15:29:03 schwarze Exp $ 1.\" $OpenBSD: EVP_PKEY_size.3,v 1.3 2024/03/05 19:21:31 tb Exp $
2.\" full merge up to: OpenSSL eed9d03b Jan 8 11:04:15 2020 +0100 2.\" full merge up to: OpenSSL eed9d03b Jan 8 11:04:15 2020 +0100
3.\" 3.\"
4.\" This file is a derived work. 4.\" This file is a derived work.
@@ -65,7 +65,7 @@
65.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED 65.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
66.\" OF THE POSSIBILITY OF SUCH DAMAGE. 66.\" OF THE POSSIBILITY OF SUCH DAMAGE.
67.\" 67.\"
68.Dd $Mdocdate: September 12 2023 $ 68.Dd $Mdocdate: March 5 2024 $
69.Dt EVP_PKEY_SIZE 3 69.Dt EVP_PKEY_SIZE 3
70.Os 70.Os
71.Sh NAME 71.Sh NAME
@@ -144,7 +144,6 @@ is supported for the following algorithms:
144.It DSA Ta Xr DSA_size 3 144.It DSA Ta Xr DSA_size 3
145.It EC Ta Xr ECDSA_size 3 145.It EC Ta Xr ECDSA_size 3
146.It ED25519 Ta 64, but see below 146.It ED25519 Ta 64, but see below
147.It GOST01 Ta 64 or 128
148.It HMAC Ta Dv EVP_MAX_MD_SIZE No = 64 147.It HMAC Ta Dv EVP_MAX_MD_SIZE No = 64
149.It RSA Ta Xr RSA_size 3 148.It RSA Ta Xr RSA_size 3
150.It X25519 Ta Dv X25519_KEYLEN No = 32 149.It X25519 Ta Dv X25519_KEYLEN No = 32
@@ -173,7 +172,6 @@ By default, the following algorithms are supported:
173.It DSA Ta the public domain parameter Fa p Ta Xr DSA_bits 3 172.It DSA Ta the public domain parameter Fa p Ta Xr DSA_bits 3
174.It EC Ta the order of the group Ta Xr EC_GROUP_order_bits 3 173.It EC Ta the order of the group Ta Xr EC_GROUP_order_bits 3
175.It ED25519 Ta 253 Ta \(em 174.It ED25519 Ta 253 Ta \(em
176.It GOST01 Ta 256 or 512 Ta \(em
177.It RSA Ta the public modulus Ta Xr RSA_bits 3 175.It RSA Ta the public modulus Ta Xr RSA_bits 3
178.It X25519 Ta 253 Ta \(em 176.It X25519 Ta 253 Ta \(em
179.El 177.El
@@ -192,7 +190,6 @@ By default, the following algorithms are supported:
192.It DSA Ta Xr DSA_security_bits 3 190.It DSA Ta Xr DSA_security_bits 3
193.It EC Ta Xr EC_GROUP_order_bits 3 divided by 2 191.It EC Ta Xr EC_GROUP_order_bits 3 divided by 2
194.It ED25519 Ta 128 192.It ED25519 Ta 128
195.It GOST01 Ta not supported, return value is \-2
196.It RSA Ta Xr RSA_security_bits 3 193.It RSA Ta Xr RSA_security_bits 3
197.It X25519 Ta 128 194.It X25519 Ta 128
198.El 195.El