The largest ECDSA key has 521 bits

Signed-off-by: Jakub Jelen <jjelen@redhat.com>
Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
This commit is contained in:
Jakub Jelen
2018-11-26 18:00:14 +01:00
committed by Andreas Schneider
parent c1fdb56d23
commit 46d8840f7e
6 changed files with 6 additions and 6 deletions

View File

@@ -1538,7 +1538,7 @@ int ssh_pki_import_cert_file(const char *filename, ssh_key *pkey)
* @param[in] parameter Parameter to the creation of key:
* rsa : length of the key in bits (e.g. 1024, 2048, 4096)
* dsa : length of the key in bits (e.g. 1024, 2048, 3072)
* ecdsa : bits of the key (e.g. 256, 384, 512)
* ecdsa : bits of the key (e.g. 256, 384, 521)
* @param[out] pkey A pointer to store the allocated private key. You need
* to free the memory.
*

View File

@@ -558,7 +558,7 @@ int pki_key_generate_ecdsa(ssh_key key, int parameter) {
case 384:
nid = NID_secp384r1;
break;
case 512:
case 521:
nid = NID_secp521r1;
break;
case 256:

View File

@@ -1348,7 +1348,7 @@ int pki_key_generate_ecdsa(ssh_key key, int parameter) {
case 384:
nid = NID_gcrypt_nistp384;
break;
case 512:
case 521:
nid = NID_gcrypt_nistp521;
break;
case 256:

View File

@@ -1439,7 +1439,7 @@ int pki_key_generate_ecdsa(ssh_key key, int parameter)
case 384:
nid = NID_mbedtls_nistp384;
break;
case 512:
case 521:
nid = NID_mbedtls_nistp521;
break;
case 256: