summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto/man/EVP_PKEY_size.3
diff options
context:
space:
mode:
Diffstat (limited to 'src/lib/libcrypto/man/EVP_PKEY_size.3')
-rw-r--r--src/lib/libcrypto/man/EVP_PKEY_size.318
1 files changed, 4 insertions, 14 deletions
diff --git a/src/lib/libcrypto/man/EVP_PKEY_size.3 b/src/lib/libcrypto/man/EVP_PKEY_size.3
index f49678d0a9..cd25eec9c2 100644
--- a/src/lib/libcrypto/man/EVP_PKEY_size.3
+++ b/src/lib/libcrypto/man/EVP_PKEY_size.3
@@ -1,4 +1,4 @@
1.\" $OpenBSD: EVP_PKEY_size.3,v 1.3 2024/03/05 19:21:31 tb Exp $ 1.\" $OpenBSD: EVP_PKEY_size.3,v 1.4 2024/12/06 12:51:13 schwarze Exp $
2.\" full merge up to: OpenSSL eed9d03b Jan 8 11:04:15 2020 +0100 2.\" full merge up to: OpenSSL eed9d03b Jan 8 11:04:15 2020 +0100
3.\" 3.\"
4.\" This file is a derived work. 4.\" This file is a derived work.
@@ -65,7 +65,7 @@
65.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED 65.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
66.\" OF THE POSSIBILITY OF SUCH DAMAGE. 66.\" OF THE POSSIBILITY OF SUCH DAMAGE.
67.\" 67.\"
68.Dd $Mdocdate: March 5 2024 $ 68.Dd $Mdocdate: December 6 2024 $
69.Dt EVP_PKEY_SIZE 3 69.Dt EVP_PKEY_SIZE 3
70.Os 70.Os
71.Sh NAME 71.Sh NAME
@@ -134,7 +134,6 @@ For those functions, it isn't strictly necessary to call
134to find out the buffer size, but it may still be useful in cases 134to find out the buffer size, but it may still be useful in cases
135where it's desirable to know the upper limit in advance. 135where it's desirable to know the upper limit in advance.
136.Pp 136.Pp
137By default,
138.Fn EVP_PKEY_size 137.Fn EVP_PKEY_size
139is supported for the following algorithms: 138is supported for the following algorithms:
140.Bl -column ED25519 "EVP_MAX_BLOCK_LENGTH = 32" 139.Bl -column ED25519 "EVP_MAX_BLOCK_LENGTH = 32"
@@ -156,15 +155,12 @@ the situation is special: while the key size is
156.Fn EVP_PKEY_size 155.Fn EVP_PKEY_size
157returns 64 because the signature is longer than the keys. 156returns 64 because the signature is longer than the keys.
158.Pp 157.Pp
159The application program can support additional algorithms by calling
160.Xr EVP_PKEY_asn1_set_public 3 .
161.Pp
162.Fn EVP_PKEY_bits 158.Fn EVP_PKEY_bits
163returns the cryptographic length of the cryptosystem to which the key in 159returns the cryptographic length of the cryptosystem to which the key in
164.Fa pkey 160.Fa pkey
165belongs, in bits. 161belongs, in bits.
166The definition of cryptographic length is specific to the key cryptosystem. 162The definition of cryptographic length is specific to the key cryptosystem.
167By default, the following algorithms are supported: 163The following algorithms are supported:
168.Bl -column ED25519 "the public domain parameter p" DSA_bits(3) 164.Bl -column ED25519 "the public domain parameter p" DSA_bits(3)
169.It Ta cryptographic length = Ta same result as from: 165.It Ta cryptographic length = Ta same result as from:
170.It Ta significant bits in ... Ta 166.It Ta significant bits in ... Ta
@@ -176,14 +172,11 @@ By default, the following algorithms are supported:
176.It X25519 Ta 253 Ta \(em 172.It X25519 Ta 253 Ta \(em
177.El 173.El
178.Pp 174.Pp
179The application program can support additional algorithms by calling
180.Xr EVP_PKEY_asn1_set_public 3 .
181.Pp
182.Fn EVP_PKEY_security_bits 175.Fn EVP_PKEY_security_bits
183returns the security strength measured in bits of the given 176returns the security strength measured in bits of the given
184.Fa pkey 177.Fa pkey
185as defined in NIST SP800-57. 178as defined in NIST SP800-57.
186By default, the following algorithms are supported: 179The following algorithms are supported:
187.Bl -column ED25519 DSA_security_bits(3) 180.Bl -column ED25519 DSA_security_bits(3)
188.It Ta same result as from: 181.It Ta same result as from:
189.It DH Ta Xr DH_security_bits 3 182.It DH Ta Xr DH_security_bits 3
@@ -196,9 +189,6 @@ By default, the following algorithms are supported:
196.Pp 189.Pp
197For EC keys, if the result is greater than 80, it is rounded down 190For EC keys, if the result is greater than 80, it is rounded down
198to 256, 192, 128, 112, or 80. 191to 256, 192, 128, 112, or 80.
199.Pp
200The application program can support additional algorithms by calling
201.Xr EVP_PKEY_asn1_set_security_bits 3 .
202.Sh RETURN VALUES 192.Sh RETURN VALUES
203.Fn EVP_PKEY_size 193.Fn EVP_PKEY_size
204and 194and