diff options
Diffstat (limited to 'src/lib/libcrypto/man/EVP_PKEY_size.3')
-rw-r--r-- | src/lib/libcrypto/man/EVP_PKEY_size.3 | 18 |
1 files changed, 4 insertions, 14 deletions
diff --git a/src/lib/libcrypto/man/EVP_PKEY_size.3 b/src/lib/libcrypto/man/EVP_PKEY_size.3 index f49678d0a9..cd25eec9c2 100644 --- a/src/lib/libcrypto/man/EVP_PKEY_size.3 +++ b/src/lib/libcrypto/man/EVP_PKEY_size.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: EVP_PKEY_size.3,v 1.3 2024/03/05 19:21:31 tb Exp $ | 1 | .\" $OpenBSD: EVP_PKEY_size.3,v 1.4 2024/12/06 12:51:13 schwarze Exp $ |
2 | .\" full merge up to: OpenSSL eed9d03b Jan 8 11:04:15 2020 +0100 | 2 | .\" full merge up to: OpenSSL eed9d03b Jan 8 11:04:15 2020 +0100 |
3 | .\" | 3 | .\" |
4 | .\" This file is a derived work. | 4 | .\" This file is a derived work. |
@@ -65,7 +65,7 @@ | |||
65 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 65 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
66 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 66 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
67 | .\" | 67 | .\" |
68 | .Dd $Mdocdate: March 5 2024 $ | 68 | .Dd $Mdocdate: December 6 2024 $ |
69 | .Dt EVP_PKEY_SIZE 3 | 69 | .Dt EVP_PKEY_SIZE 3 |
70 | .Os | 70 | .Os |
71 | .Sh NAME | 71 | .Sh NAME |
@@ -134,7 +134,6 @@ For those functions, it isn't strictly necessary to call | |||
134 | to find out the buffer size, but it may still be useful in cases | 134 | to find out the buffer size, but it may still be useful in cases |
135 | where it's desirable to know the upper limit in advance. | 135 | where it's desirable to know the upper limit in advance. |
136 | .Pp | 136 | .Pp |
137 | By default, | ||
138 | .Fn EVP_PKEY_size | 137 | .Fn EVP_PKEY_size |
139 | is supported for the following algorithms: | 138 | is supported for the following algorithms: |
140 | .Bl -column ED25519 "EVP_MAX_BLOCK_LENGTH = 32" | 139 | .Bl -column ED25519 "EVP_MAX_BLOCK_LENGTH = 32" |
@@ -156,15 +155,12 @@ the situation is special: while the key size is | |||
156 | .Fn EVP_PKEY_size | 155 | .Fn EVP_PKEY_size |
157 | returns 64 because the signature is longer than the keys. | 156 | returns 64 because the signature is longer than the keys. |
158 | .Pp | 157 | .Pp |
159 | The application program can support additional algorithms by calling | ||
160 | .Xr EVP_PKEY_asn1_set_public 3 . | ||
161 | .Pp | ||
162 | .Fn EVP_PKEY_bits | 158 | .Fn EVP_PKEY_bits |
163 | returns the cryptographic length of the cryptosystem to which the key in | 159 | returns the cryptographic length of the cryptosystem to which the key in |
164 | .Fa pkey | 160 | .Fa pkey |
165 | belongs, in bits. | 161 | belongs, in bits. |
166 | The definition of cryptographic length is specific to the key cryptosystem. | 162 | The definition of cryptographic length is specific to the key cryptosystem. |
167 | By default, the following algorithms are supported: | 163 | The following algorithms are supported: |
168 | .Bl -column ED25519 "the public domain parameter p" DSA_bits(3) | 164 | .Bl -column ED25519 "the public domain parameter p" DSA_bits(3) |
169 | .It Ta cryptographic length = Ta same result as from: | 165 | .It Ta cryptographic length = Ta same result as from: |
170 | .It Ta significant bits in ... Ta | 166 | .It Ta significant bits in ... Ta |
@@ -176,14 +172,11 @@ By default, the following algorithms are supported: | |||
176 | .It X25519 Ta 253 Ta \(em | 172 | .It X25519 Ta 253 Ta \(em |
177 | .El | 173 | .El |
178 | .Pp | 174 | .Pp |
179 | The application program can support additional algorithms by calling | ||
180 | .Xr EVP_PKEY_asn1_set_public 3 . | ||
181 | .Pp | ||
182 | .Fn EVP_PKEY_security_bits | 175 | .Fn EVP_PKEY_security_bits |
183 | returns the security strength measured in bits of the given | 176 | returns the security strength measured in bits of the given |
184 | .Fa pkey | 177 | .Fa pkey |
185 | as defined in NIST SP800-57. | 178 | as defined in NIST SP800-57. |
186 | By default, the following algorithms are supported: | 179 | The following algorithms are supported: |
187 | .Bl -column ED25519 DSA_security_bits(3) | 180 | .Bl -column ED25519 DSA_security_bits(3) |
188 | .It Ta same result as from: | 181 | .It Ta same result as from: |
189 | .It DH Ta Xr DH_security_bits 3 | 182 | .It DH Ta Xr DH_security_bits 3 |
@@ -196,9 +189,6 @@ By default, the following algorithms are supported: | |||
196 | .Pp | 189 | .Pp |
197 | For EC keys, if the result is greater than 80, it is rounded down | 190 | For EC keys, if the result is greater than 80, it is rounded down |
198 | to 256, 192, 128, 112, or 80. | 191 | to 256, 192, 128, 112, or 80. |
199 | .Pp | ||
200 | The application program can support additional algorithms by calling | ||
201 | .Xr EVP_PKEY_asn1_set_security_bits 3 . | ||
202 | .Sh RETURN VALUES | 192 | .Sh RETURN VALUES |
203 | .Fn EVP_PKEY_size | 193 | .Fn EVP_PKEY_size |
204 | and | 194 | and |