diff options
Diffstat (limited to 'secure/lib/libcrypto/man/man7/EVP_PKEY-SLH-DSA.7')
| -rw-r--r-- | secure/lib/libcrypto/man/man7/EVP_PKEY-SLH-DSA.7 | 21 |
1 files changed, 12 insertions, 9 deletions
diff --git a/secure/lib/libcrypto/man/man7/EVP_PKEY-SLH-DSA.7 b/secure/lib/libcrypto/man/man7/EVP_PKEY-SLH-DSA.7 index 2b3a66fe55c0..a3f693f2b287 100644 --- a/secure/lib/libcrypto/man/man7/EVP_PKEY-SLH-DSA.7 +++ b/secure/lib/libcrypto/man/man7/EVP_PKEY-SLH-DSA.7 @@ -1,5 +1,5 @@ .\" -*- mode: troff; coding: utf-8 -*- -.\" Automatically generated by Pod::Man 5.0102 (Pod::Simple 3.45) +.\" Automatically generated by Pod::Man v6.0.2 (Pod::Simple 3.45) .\" .\" Standard preamble: .\" ======================================================================== @@ -52,10 +52,13 @@ . \} .\} .rr rF +.\" +.\" Required to disable full justification in groff 1.23.0. +.if n .ds AD l .\" ======================================================================== .\" .IX Title "EVP_PKEY-SLH-DSA 7ossl" -.TH EVP_PKEY-SLH-DSA 7ossl 2025-09-30 3.5.4 OpenSSL +.TH EVP_PKEY-SLH-DSA 7ossl 2026-04-07 3.5.6 OpenSSL .\" For nroff, turn off justification. Always turn off hyphenation; it makes .\" way too many mistakes in technical documents. .if n .ad l @@ -77,13 +80,13 @@ The \fBSLH\-DSA\-SHA2\-128s\fR, \fBEVP_PKEY\-SLH\-DSA\-SHA2\-128f\fR, \&\fBSLH\-DSA\-SHAKE\-128s\fR, \fBEVP_PKEY\-SLH\-DSA\-SHAKE\-128f\fR, \&\fBSLH\-DSA\-SHAKE\-192s\fR, \fBEVP_PKEY\-SLH\-DSA\-SHAKE\-192f\fR, \&\fBSLH\-DSA\-SHAKE\-256s\fR and \fBEVP_PKEY\-SLH\-DSA\-SHAKE\-256f\fR key types are -implemented in OpenSSL's default and FIPS providers. These implementations +implemented in OpenSSL\*(Aqs default and FIPS providers. These implementations support the associated key, containing the public key \fIpub\fR and the private key \fIpriv\fR. .PP -SLH-DSA (Stateless Hash-based Digital Signature Standard) uses small keys, +SLH\-DSA (Stateless Hash\-based Digital Signature Standard) uses small keys, but has relatively large signatures and is relatively slow performing all -operations compared to \fBML-DSA\fR. It does however have proven security proofs, +operations compared to \fBML\-DSA\fR. It does however have proven security proofs, since it relies only on hash functions. .PP Each of the different key types has an associated security parameter \fBn\fR. @@ -123,10 +126,10 @@ purposes only. The length of the value supplied must be 3 * \fBn\fR. .IP """properties"" (\fBOSSL_PKEY_PARAM_PROPERTIES\fR) <utf8_string>" 4 .IX Item """properties"" (OSSL_PKEY_PARAM_PROPERTIES) <utf8_string>" Sets properties to be used when fetching algorithm implementations used for -SLH-DSA hashing operations. +SLH\-DSA hashing operations. .PP Use \fBEVP_PKEY_CTX_set_params()\fR after calling \fBEVP_PKEY_keygen_init()\fR. -.SS "Common SLH-DSA parameters" +.SS "Common SLH\-DSA parameters" .IX Subsection "Common SLH-DSA parameters" In addition to the common parameters that all keytypes should support (see "Common Information Parameters" in \fBprovider\-keymgmt\fR\|(7)), the implementation of @@ -144,7 +147,7 @@ as defined by FIPS 205 Figure 16. The private key has a size of 4 * \fBn\fR bytes, which includes the public key components. i.e. It consists of the concatenation of SK.seed, SK.prf, PK.seed and PF.root as defined by FIPS 205 Figure 15. -.IP """mandatory-digest"" (\fBOSSL_PKEY_PARAM_MANDATORY_DIGEST\fR) <UTF8 string>" 4 +.IP """mandatory\-digest"" (\fBOSSL_PKEY_PARAM_MANDATORY_DIGEST\fR) <UTF8 string>" 4 .IX Item """mandatory-digest"" (OSSL_PKEY_PARAM_MANDATORY_DIGEST) <UTF8 string>" The empty string, signifying that no digest may be specified. .SH "CONFORMING TO" @@ -160,7 +163,7 @@ An \fBEVP_PKEY\fR context can be obtained by calling: \& EVP_PKEY_CTX_new_from_name(NULL, "SLH\-DSA\-SHA2\-128f", NULL); .Ve .PP -An \fBSLH-DSA\fR key can be generated like this: +An \fBSLH\-DSA\fR key can be generated like this: .PP .Vb 1 \& pkey = EVP_PKEY_Q_keygen(NULL, NULL, "SLH\-DSA\-SHA2\-128f"); |
