aboutsummaryrefslogtreecommitdiff
path: root/secure/lib/libcrypto/man/man7/EVP_PKEY-SLH-DSA.7
diff options
context:
space:
mode:
Diffstat (limited to 'secure/lib/libcrypto/man/man7/EVP_PKEY-SLH-DSA.7')
-rw-r--r--secure/lib/libcrypto/man/man7/EVP_PKEY-SLH-DSA.721
1 files changed, 12 insertions, 9 deletions
diff --git a/secure/lib/libcrypto/man/man7/EVP_PKEY-SLH-DSA.7 b/secure/lib/libcrypto/man/man7/EVP_PKEY-SLH-DSA.7
index 2b3a66fe55c0..a3f693f2b287 100644
--- a/secure/lib/libcrypto/man/man7/EVP_PKEY-SLH-DSA.7
+++ b/secure/lib/libcrypto/man/man7/EVP_PKEY-SLH-DSA.7
@@ -1,5 +1,5 @@
.\" -*- mode: troff; coding: utf-8 -*-
-.\" Automatically generated by Pod::Man 5.0102 (Pod::Simple 3.45)
+.\" Automatically generated by Pod::Man v6.0.2 (Pod::Simple 3.45)
.\"
.\" Standard preamble:
.\" ========================================================================
@@ -52,10 +52,13 @@
. \}
.\}
.rr rF
+.\"
+.\" Required to disable full justification in groff 1.23.0.
+.if n .ds AD l
.\" ========================================================================
.\"
.IX Title "EVP_PKEY-SLH-DSA 7ossl"
-.TH EVP_PKEY-SLH-DSA 7ossl 2025-09-30 3.5.4 OpenSSL
+.TH EVP_PKEY-SLH-DSA 7ossl 2026-04-07 3.5.6 OpenSSL
.\" For nroff, turn off justification. Always turn off hyphenation; it makes
.\" way too many mistakes in technical documents.
.if n .ad l
@@ -77,13 +80,13 @@ The \fBSLH\-DSA\-SHA2\-128s\fR, \fBEVP_PKEY\-SLH\-DSA\-SHA2\-128f\fR,
\&\fBSLH\-DSA\-SHAKE\-128s\fR, \fBEVP_PKEY\-SLH\-DSA\-SHAKE\-128f\fR,
\&\fBSLH\-DSA\-SHAKE\-192s\fR, \fBEVP_PKEY\-SLH\-DSA\-SHAKE\-192f\fR,
\&\fBSLH\-DSA\-SHAKE\-256s\fR and \fBEVP_PKEY\-SLH\-DSA\-SHAKE\-256f\fR key types are
-implemented in OpenSSL's default and FIPS providers. These implementations
+implemented in OpenSSL\*(Aqs default and FIPS providers. These implementations
support the associated key, containing the public key \fIpub\fR and the
private key \fIpriv\fR.
.PP
-SLH-DSA (Stateless Hash-based Digital Signature Standard) uses small keys,
+SLH\-DSA (Stateless Hash\-based Digital Signature Standard) uses small keys,
but has relatively large signatures and is relatively slow performing all
-operations compared to \fBML-DSA\fR. It does however have proven security proofs,
+operations compared to \fBML\-DSA\fR. It does however have proven security proofs,
since it relies only on hash functions.
.PP
Each of the different key types has an associated security parameter \fBn\fR.
@@ -123,10 +126,10 @@ purposes only. The length of the value supplied must be 3 * \fBn\fR.
.IP """properties"" (\fBOSSL_PKEY_PARAM_PROPERTIES\fR) <utf8_string>" 4
.IX Item """properties"" (OSSL_PKEY_PARAM_PROPERTIES) <utf8_string>"
Sets properties to be used when fetching algorithm implementations used for
-SLH-DSA hashing operations.
+SLH\-DSA hashing operations.
.PP
Use \fBEVP_PKEY_CTX_set_params()\fR after calling \fBEVP_PKEY_keygen_init()\fR.
-.SS "Common SLH-DSA parameters"
+.SS "Common SLH\-DSA parameters"
.IX Subsection "Common SLH-DSA parameters"
In addition to the common parameters that all keytypes should support (see
"Common Information Parameters" in \fBprovider\-keymgmt\fR\|(7)), the implementation of
@@ -144,7 +147,7 @@ as defined by FIPS 205 Figure 16.
The private key has a size of 4 * \fBn\fR bytes, which includes the public key components.
i.e. It consists of the concatenation of SK.seed, SK.prf, PK.seed and PF.root
as defined by FIPS 205 Figure 15.
-.IP """mandatory-digest"" (\fBOSSL_PKEY_PARAM_MANDATORY_DIGEST\fR) <UTF8 string>" 4
+.IP """mandatory\-digest"" (\fBOSSL_PKEY_PARAM_MANDATORY_DIGEST\fR) <UTF8 string>" 4
.IX Item """mandatory-digest"" (OSSL_PKEY_PARAM_MANDATORY_DIGEST) <UTF8 string>"
The empty string, signifying that no digest may be specified.
.SH "CONFORMING TO"
@@ -160,7 +163,7 @@ An \fBEVP_PKEY\fR context can be obtained by calling:
\& EVP_PKEY_CTX_new_from_name(NULL, "SLH\-DSA\-SHA2\-128f", NULL);
.Ve
.PP
-An \fBSLH-DSA\fR key can be generated like this:
+An \fBSLH\-DSA\fR key can be generated like this:
.PP
.Vb 1
\& pkey = EVP_PKEY_Q_keygen(NULL, NULL, "SLH\-DSA\-SHA2\-128f");