diff options
Diffstat (limited to 'src/lib/libcrypto/man/EVP_PKEY_size.3')
-rw-r--r-- | src/lib/libcrypto/man/EVP_PKEY_size.3 | 7 |
1 files changed, 2 insertions, 5 deletions
diff --git a/src/lib/libcrypto/man/EVP_PKEY_size.3 b/src/lib/libcrypto/man/EVP_PKEY_size.3 index b45cda7f91..f49678d0a9 100644 --- a/src/lib/libcrypto/man/EVP_PKEY_size.3 +++ b/src/lib/libcrypto/man/EVP_PKEY_size.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: EVP_PKEY_size.3,v 1.2 2023/09/12 15:29:03 schwarze Exp $ | 1 | .\" $OpenBSD: EVP_PKEY_size.3,v 1.3 2024/03/05 19:21:31 tb Exp $ |
2 | .\" full merge up to: OpenSSL eed9d03b Jan 8 11:04:15 2020 +0100 | 2 | .\" full merge up to: OpenSSL eed9d03b Jan 8 11:04:15 2020 +0100 |
3 | .\" | 3 | .\" |
4 | .\" This file is a derived work. | 4 | .\" This file is a derived work. |
@@ -65,7 +65,7 @@ | |||
65 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 65 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
66 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 66 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
67 | .\" | 67 | .\" |
68 | .Dd $Mdocdate: September 12 2023 $ | 68 | .Dd $Mdocdate: March 5 2024 $ |
69 | .Dt EVP_PKEY_SIZE 3 | 69 | .Dt EVP_PKEY_SIZE 3 |
70 | .Os | 70 | .Os |
71 | .Sh NAME | 71 | .Sh NAME |
@@ -144,7 +144,6 @@ is supported for the following algorithms: | |||
144 | .It DSA Ta Xr DSA_size 3 | 144 | .It DSA Ta Xr DSA_size 3 |
145 | .It EC Ta Xr ECDSA_size 3 | 145 | .It EC Ta Xr ECDSA_size 3 |
146 | .It ED25519 Ta 64, but see below | 146 | .It ED25519 Ta 64, but see below |
147 | .It GOST01 Ta 64 or 128 | ||
148 | .It HMAC Ta Dv EVP_MAX_MD_SIZE No = 64 | 147 | .It HMAC Ta Dv EVP_MAX_MD_SIZE No = 64 |
149 | .It RSA Ta Xr RSA_size 3 | 148 | .It RSA Ta Xr RSA_size 3 |
150 | .It X25519 Ta Dv X25519_KEYLEN No = 32 | 149 | .It X25519 Ta Dv X25519_KEYLEN No = 32 |
@@ -173,7 +172,6 @@ By default, the following algorithms are supported: | |||
173 | .It DSA Ta the public domain parameter Fa p Ta Xr DSA_bits 3 | 172 | .It DSA Ta the public domain parameter Fa p Ta Xr DSA_bits 3 |
174 | .It EC Ta the order of the group Ta Xr EC_GROUP_order_bits 3 | 173 | .It EC Ta the order of the group Ta Xr EC_GROUP_order_bits 3 |
175 | .It ED25519 Ta 253 Ta \(em | 174 | .It ED25519 Ta 253 Ta \(em |
176 | .It GOST01 Ta 256 or 512 Ta \(em | ||
177 | .It RSA Ta the public modulus Ta Xr RSA_bits 3 | 175 | .It RSA Ta the public modulus Ta Xr RSA_bits 3 |
178 | .It X25519 Ta 253 Ta \(em | 176 | .It X25519 Ta 253 Ta \(em |
179 | .El | 177 | .El |
@@ -192,7 +190,6 @@ By default, the following algorithms are supported: | |||
192 | .It DSA Ta Xr DSA_security_bits 3 | 190 | .It DSA Ta Xr DSA_security_bits 3 |
193 | .It EC Ta Xr EC_GROUP_order_bits 3 divided by 2 | 191 | .It EC Ta Xr EC_GROUP_order_bits 3 divided by 2 |
194 | .It ED25519 Ta 128 | 192 | .It ED25519 Ta 128 |
195 | .It GOST01 Ta not supported, return value is \-2 | ||
196 | .It RSA Ta Xr RSA_security_bits 3 | 193 | .It RSA Ta Xr RSA_security_bits 3 |
197 | .It X25519 Ta 128 | 194 | .It X25519 Ta 128 |
198 | .El | 195 | .El |