=head1 DESCRIPTION
-This command has been deprecated.
-The L<openssl-pkeyparam(1)> command should be used instead.
-
This command is used to manipulate DH parameter files.
=head1 OPTIONS
=item B<-dsaparam>
+This option is deprecated.
+
If this option is used, DSA rather than DH parameters are read or created;
they are converted to DH format. Otherwise, "strong" primes (such
that (p-1)/2 is also prime) will be used for DH parameter generation.
=head1 HISTORY
-This command was deprecated in OpenSSL 3.0.
+The B<-dsaparam> option was deprecated in OpenSSL 3.0.
=head1 COPYRIGHT
=head1 DESCRIPTION
-This command has been deprecated.
-The L<openssl-pkey(1)> command should be used instead.
-
This command processes DSA keys. They can be converted between various
forms and their components printed out. B<Note> This command uses the
traditional SSLeay compatible format for private key encryption: newer
L<openssl-rsa(1)>,
L<openssl-genrsa(1)>
-=head1 HISTORY
-
-This command was deprecated in OpenSSL 3.0.
-
=head1 COPYRIGHT
Copyright 2000-2020 The OpenSSL Project Authors. All Rights Reserved.
=head1 DESCRIPTION
-This command has been deprecated.
-The L<openssl-pkeyparam(1)> command should be used instead.
-
This command is used to manipulate or generate DSA parameter files.
DSA parameter generation can be a slow process and as a result the same set of
L<openssl-genrsa(1)>,
L<openssl-rsa(1)>
-=head1 HISTORY
-
-This command was deprecated in OpenSSL 3.0.
-
=head1 COPYRIGHT
Copyright 2000-2020 The OpenSSL Project Authors. All Rights Reserved.
=head1 DESCRIPTION
-This command has been deprecated.
-The L<openssl-pkey(1)> command should be used instead.
-
The L<openssl-ec(1)> command processes EC keys. They can be converted between
various forms and their components printed out. B<Note> OpenSSL uses the
private key format specified in 'SEC 1: Elliptic Curve Cryptography'
L<openssl-dsa(1)>,
L<openssl-rsa(1)>
-=head1 HISTORY
-
-This command was deprecated in OpenSSL 3.0.
-
=head1 COPYRIGHT
Copyright 2003-2020 The OpenSSL Project Authors. All Rights Reserved.
=head1 DESCRIPTION
-This command has been deprecated.
-The L<openssl-genpkey(1)> and L<openssl-pkeyparam(1)> commands
-should be used instead.
-
This command is used to manipulate or generate EC parameter files.
OpenSSL is currently not able to generate new groups and therefore
L<openssl-ec(1)>,
L<openssl-dsaparam(1)>
-=head1 HISTORY
-
-This command was deprecated in OpenSSL 3.0.
-
=head1 COPYRIGHT
Copyright 2003-2020 The OpenSSL Project Authors. All Rights Reserved.
=head1 DESCRIPTION
-This command has been deprecated.
-The L<openssl-genpkey(1)> command should be used instead.
-
This command generates a DSA private key from a DSA parameter file
(which will be typically generated by the L<openssl-dsaparam(1)> command).
L<openssl-genrsa(1)>,
L<openssl-rsa(1)>
-=head1 HISTORY
-
-This command was deprecated in OpenSSL 3.0.
-
=head1 COPYRIGHT
Copyright 2000-2020 The OpenSSL Project Authors. All Rights Reserved.
=head1 DESCRIPTION
-This command has been deprecated.
-The L<openssl-pkey(1)> command should be used instead.
-
This command processes RSA keys. They can be converted between
various forms and their components printed out. B<Note> this command uses the
traditional SSLeay compatible format for private key encryption: newer
L<openssl-genrsa(1)>,
L<openssl-gendsa(1)>
-=head1 HISTORY
-
-This command was deprecated in OpenSSL 3.0.
-
=head1 COPYRIGHT
Copyright 2000-2020 The OpenSSL Project Authors. All Rights Reserved.
=head1 DESCRIPTION
The B<X25519>, B<X448>, B<ED25519> and B<ED448> keytypes are
-implemented in OpenSSL's default provider.
+implemented in OpenSSL's default and FIPS providers. These implementations
+support the associated key, containing the public key I<pub> and the
+private key I<priv>.
+
+In the FIPS provider they are non-approved algorithms and do not have the
+"fips=yes" property set.
=head2 Common X25519, X448, ED25519 and ED448 parameters
-The following Import/Export types are available for the built-in X25519, X448,
-ED25519 and X448 algorithms:
+In addition to the common parameters that all keytypes should support (see
+L<provider-keymgmt(7)/Common parameters>), the implementation of these keytypes
+support the following.
=over 4