From b4dc705a73ba2e8257ea3438ee39e661973e2a13 Mon Sep 17 00:00:00 2001 From: Richard Levitte Date: Sat, 7 Mar 2020 08:23:16 +0100 Subject: [PATCH] DOCS: Fix documentation on asymmetric keydata types Some type specs didn't correspond to actual use. Reviewed-by: Shane Lontis (Merged from https://github.com/openssl/openssl/pull/11275) --- doc/man7/provider-keymgmt.pod | 24 ++++++++++++------------ 1 file changed, 12 insertions(+), 12 deletions(-) diff --git a/doc/man7/provider-keymgmt.pod b/doc/man7/provider-keymgmt.pod index 0f765f775a..0a2768b5db 100644 --- a/doc/man7/provider-keymgmt.pod +++ b/doc/man7/provider-keymgmt.pod @@ -279,29 +279,29 @@ The following Import/Export types are available for the built-in RSA algorithm: =over 4 -=item "n" (B) +=item "n" (B) The RSA "n" value. -=item "e" (B) +=item "e" (B) The RSA "e" value. -=item "d" (B) +=item "d" (B) The RSA "d" value. -=item "rsa-factor" (B) +=item "rsa-factor" (B) An RSA factor. In 2 prime RSA these are often known as "p" or "q". This value may be repeated up to 10 times in a single key. -=item "rsa-exponent" (B) +=item "rsa-exponent" (B) An RSA CRT (Chinese Remainder Theorem) exponent. This value may be repeated up to 10 times in a single key. -=item "rsa-coefficient" (B) +=item "rsa-coefficient" (B) An RSA CRT (Chinese Remainder Theorem) coefficient. This value may be repeated up to 9 times in a single key. @@ -315,23 +315,23 @@ Diffie-Hellman algorithms: =over 4 -=item "pub" (B) or +=item "pub" (B) The public key value. -=item "priv" (B) or +=item "priv" (B) The private key value. -=item "p" (B) +=item "p" (B) A DSA or Diffie-Hellman "p" value. -=item "q" (B) +=item "q" (B) A DSA or Diffie-Hellman "q" value. -=item "g" (B) +=item "g" (B) A DSA or Diffie-Hellman "g" value. @@ -374,7 +374,7 @@ EC curve's cofactor (note for some curves the cofactor is 1). The public key value in EC point format. -=item "priv" (B) +=item "priv" (B) The private key value. -- 2.25.1