From 79ea67855b9eef418a5f9c5e0c2f89215a361e7b Mon Sep 17 00:00:00 2001 From: tb Date: Sat, 12 Aug 2023 08:26:38 +0000 Subject: [PATCH] Remove a blatant lie about DSA_dup_DH q is copied across since OpenSSL 31360957 which hit our tree with OpenSSL 1.0.1c in October 2012. --- lib/libcrypto/man/DSA_dup_DH.3 | 8 ++------ 1 file changed, 2 insertions(+), 6 deletions(-) diff --git a/lib/libcrypto/man/DSA_dup_DH.3 b/lib/libcrypto/man/DSA_dup_DH.3 index d82defa378d..d6163fd3c38 100644 --- a/lib/libcrypto/man/DSA_dup_DH.3 +++ b/lib/libcrypto/man/DSA_dup_DH.3 @@ -1,4 +1,4 @@ -.\" $OpenBSD: DSA_dup_DH.3,v 1.8 2019/06/10 14:58:48 schwarze Exp $ +.\" $OpenBSD: DSA_dup_DH.3,v 1.9 2023/08/12 08:26:38 tb Exp $ .\" OpenSSL b97fdb57 Nov 11 09:33:09 2016 +0100 .\" .\" This file was written by Ulf Moeller . @@ -48,7 +48,7 @@ .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED .\" OF THE POSSIBILITY OF SUCH DAMAGE. .\" -.Dd $Mdocdate: June 10 2019 $ +.Dd $Mdocdate: August 12 2023 $ .Dt DSA_DUP_DH 3 .Os .Sh NAME @@ -67,10 +67,6 @@ duplicates parameters/keys as .Vt DH parameters/keys. -.Fa r->q -is lost during that conversion, but the resulting -.Vt DH -parameters contain its length. .Sh RETURN VALUES .Fn DSA_dup_DH returns the new -- 2.20.1