diff options
author | schwarze <> | 2023-09-12 15:29:03 +0000 |
---|---|---|
committer | schwarze <> | 2023-09-12 15:29:03 +0000 |
commit | 75bca4a005736ae4002dab2255f87a1cd7821356 (patch) | |
tree | c372026c1c101135a2ace4f1aab1eb8d6d933629 /src/lib | |
parent | b1e593790192a372a3976ce859bd1708b43dc952 (diff) | |
download | openbsd-75bca4a005736ae4002dab2255f87a1cd7821356.tar.gz openbsd-75bca4a005736ae4002dab2255f87a1cd7821356.tar.bz2 openbsd-75bca4a005736ae4002dab2255f87a1cd7821356.zip |
document sizes for ED25519 and X25519,
including the constants ED25519_KEYLEN and X25519_KEYLEN
Diffstat (limited to 'src/lib')
-rw-r--r-- | src/lib/libcrypto/man/EVP_PKEY_size.3 | 25 |
1 files changed, 19 insertions, 6 deletions
diff --git a/src/lib/libcrypto/man/EVP_PKEY_size.3 b/src/lib/libcrypto/man/EVP_PKEY_size.3 index 3070aee017..b45cda7f91 100644 --- a/src/lib/libcrypto/man/EVP_PKEY_size.3 +++ b/src/lib/libcrypto/man/EVP_PKEY_size.3 | |||
@@ -1,10 +1,10 @@ | |||
1 | .\" $OpenBSD: EVP_PKEY_size.3,v 1.1 2022/07/13 19:10:40 schwarze Exp $ | 1 | .\" $OpenBSD: EVP_PKEY_size.3,v 1.2 2023/09/12 15:29:03 schwarze Exp $ |
2 | .\" full merge up to: OpenSSL eed9d03b Jan 8 11:04:15 2020 +0100 | 2 | .\" full merge up to: OpenSSL eed9d03b Jan 8 11:04:15 2020 +0100 |
3 | .\" | 3 | .\" |
4 | .\" This file is a derived work. | 4 | .\" This file is a derived work. |
5 | .\" The changes are covered by the following Copyright and license: | 5 | .\" The changes are covered by the following Copyright and license: |
6 | .\" | 6 | .\" |
7 | .\" Copyright (c) 2022 Ingo Schwarze <schwarze@openbsd.org> | 7 | .\" Copyright (c) 2022, 2023 Ingo Schwarze <schwarze@openbsd.org> |
8 | .\" | 8 | .\" |
9 | .\" Permission to use, copy, modify, and distribute this software for any | 9 | .\" Permission to use, copy, modify, and distribute this software for any |
10 | .\" purpose with or without fee is hereby granted, provided that the above | 10 | .\" purpose with or without fee is hereby granted, provided that the above |
@@ -65,7 +65,7 @@ | |||
65 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 65 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
66 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 66 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
67 | .\" | 67 | .\" |
68 | .Dd $Mdocdate: July 13 2022 $ | 68 | .Dd $Mdocdate: September 12 2023 $ |
69 | .Dt EVP_PKEY_SIZE 3 | 69 | .Dt EVP_PKEY_SIZE 3 |
70 | .Os | 70 | .Os |
71 | .Sh NAME | 71 | .Sh NAME |
@@ -137,17 +137,26 @@ where it's desirable to know the upper limit in advance. | |||
137 | By default, | 137 | By default, |
138 | .Fn EVP_PKEY_size | 138 | .Fn EVP_PKEY_size |
139 | is supported for the following algorithms: | 139 | is supported for the following algorithms: |
140 | .Bl -column GOST01 "EVP_MAX_BLOCK_LENGTH = 32" | 140 | .Bl -column ED25519 "EVP_MAX_BLOCK_LENGTH = 32" |
141 | .It Ta same result as from: | 141 | .It Ta same result as from: |
142 | .It CMAC Ta Dv EVP_MAX_BLOCK_LENGTH No = 32 | 142 | .It CMAC Ta Dv EVP_MAX_BLOCK_LENGTH No = 32 |
143 | .It DH Ta Xr DH_size 3 | 143 | .It DH Ta Xr DH_size 3 |
144 | .It DSA Ta Xr DSA_size 3 | 144 | .It DSA Ta Xr DSA_size 3 |
145 | .It EC Ta Xr ECDSA_size 3 | 145 | .It EC Ta Xr ECDSA_size 3 |
146 | .It ED25519 Ta 64, but see below | ||
146 | .It GOST01 Ta 64 or 128 | 147 | .It GOST01 Ta 64 or 128 |
147 | .It HMAC Ta Dv EVP_MAX_MD_SIZE No = 64 | 148 | .It HMAC Ta Dv EVP_MAX_MD_SIZE No = 64 |
148 | .It RSA Ta Xr RSA_size 3 | 149 | .It RSA Ta Xr RSA_size 3 |
150 | .It X25519 Ta Dv X25519_KEYLEN No = 32 | ||
149 | .El | 151 | .El |
150 | .Pp | 152 | .Pp |
153 | For | ||
154 | .Dv EVP_PKEY_ED25519 , | ||
155 | the situation is special: while the key size is | ||
156 | .Dv ED25519_KEYLEN No = 32 bytes , | ||
157 | .Fn EVP_PKEY_size | ||
158 | returns 64 because the signature is longer than the keys. | ||
159 | .Pp | ||
151 | The application program can support additional algorithms by calling | 160 | The application program can support additional algorithms by calling |
152 | .Xr EVP_PKEY_asn1_set_public 3 . | 161 | .Xr EVP_PKEY_asn1_set_public 3 . |
153 | .Pp | 162 | .Pp |
@@ -157,14 +166,16 @@ returns the cryptographic length of the cryptosystem to which the key in | |||
157 | belongs, in bits. | 166 | belongs, in bits. |
158 | The definition of cryptographic length is specific to the key cryptosystem. | 167 | The definition of cryptographic length is specific to the key cryptosystem. |
159 | By default, the following algorithms are supported: | 168 | By default, the following algorithms are supported: |
160 | .Bl -column GOST01 "the public domain parameter p" DSA_bits(3) | 169 | .Bl -column ED25519 "the public domain parameter p" DSA_bits(3) |
161 | .It Ta cryptographic length = Ta same result as from: | 170 | .It Ta cryptographic length = Ta same result as from: |
162 | .It Ta significant bits in ... Ta | 171 | .It Ta significant bits in ... Ta |
163 | .It DH Ta the public domain parameter Fa p Ta Xr DH_bits 3 | 172 | .It DH Ta the public domain parameter Fa p Ta Xr DH_bits 3 |
164 | .It DSA Ta the public domain parameter Fa p Ta Xr DSA_bits 3 | 173 | .It DSA Ta the public domain parameter Fa p Ta Xr DSA_bits 3 |
165 | .It EC Ta the order of the group Ta Xr EC_GROUP_order_bits 3 | 174 | .It EC Ta the order of the group Ta Xr EC_GROUP_order_bits 3 |
175 | .It ED25519 Ta 253 Ta \(em | ||
166 | .It GOST01 Ta 256 or 512 Ta \(em | 176 | .It GOST01 Ta 256 or 512 Ta \(em |
167 | .It RSA Ta the public modulus Ta Xr RSA_bits 3 | 177 | .It RSA Ta the public modulus Ta Xr RSA_bits 3 |
178 | .It X25519 Ta 253 Ta \(em | ||
168 | .El | 179 | .El |
169 | .Pp | 180 | .Pp |
170 | The application program can support additional algorithms by calling | 181 | The application program can support additional algorithms by calling |
@@ -175,13 +186,15 @@ returns the security strength measured in bits of the given | |||
175 | .Fa pkey | 186 | .Fa pkey |
176 | as defined in NIST SP800-57. | 187 | as defined in NIST SP800-57. |
177 | By default, the following algorithms are supported: | 188 | By default, the following algorithms are supported: |
178 | .Bl -column GOST01 DSA_security_bits(3) | 189 | .Bl -column ED25519 DSA_security_bits(3) |
179 | .It Ta same result as from: | 190 | .It Ta same result as from: |
180 | .It DH Ta Xr DH_security_bits 3 | 191 | .It DH Ta Xr DH_security_bits 3 |
181 | .It DSA Ta Xr DSA_security_bits 3 | 192 | .It DSA Ta Xr DSA_security_bits 3 |
182 | .It EC Ta Xr EC_GROUP_order_bits 3 divided by 2 | 193 | .It EC Ta Xr EC_GROUP_order_bits 3 divided by 2 |
194 | .It ED25519 Ta 128 | ||
183 | .It GOST01 Ta not supported, return value is \-2 | 195 | .It GOST01 Ta not supported, return value is \-2 |
184 | .It RSA Ta Xr RSA_security_bits 3 | 196 | .It RSA Ta Xr RSA_security_bits 3 |
197 | .It X25519 Ta 128 | ||
185 | .El | 198 | .El |
186 | .Pp | 199 | .Pp |
187 | For EC keys, if the result is greater than 80, it is rounded down | 200 | For EC keys, if the result is greater than 80, it is rounded down |