<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title><![CDATA[wolfSSL - Embedded SSL Library — Question on Key Size.]]></title>
		<link>https://www.wolfssl.com/forums/topic2305-question-on-key-size.html</link>
		<atom:link href="https://www.wolfssl.com/forums/feed-rss-topic2305.xml" rel="self" type="application/rss+xml" />
		<description><![CDATA[The most recent posts in Question on Key Size..]]></description>
		<lastBuildDate>Fri, 18 Apr 2025 12:33:04 +0000</lastBuildDate>
		<generator>PunBB</generator>
		<item>
			<title><![CDATA[Re: Question on Key Size.]]></title>
			<link>https://www.wolfssl.com/forums/post8316.html#p8316</link>
			<description><![CDATA[<p>Andy,<br />I&#039;ll continue to post here since this isn&#039;t confidential material, and it will help others who are searching.<br />Also it&#039;s not a priority question.</p><p>So, <br /></p><div class="quotebox"><blockquote><p>This affects, both keys that are generated and loaded</p></blockquote></div><p>I&#039;m asking only from the point of view of certificates that customers already have saved on a device. </p><p>So this means it would reject a cert that is created with a small key?&nbsp; And fail a handshake?</p><p>Also, reject a cert that is loaded locally (as a server loads from storage) and/or sent to a client during a TLS handshake?</p><p>And I see it can also be updated with<br /></p><div class="codebox"><pre><code>wolfSSL_CTX_SetMinRsaKey_Sz(ctx, minRsaKeyBits);</code></pre></div><p>So if not already setting a size, this would be added updating to 5-7-4.</p><p>This RAS-512 = 1024 is a bit confusing... Is that explained in an RFC somewhere?</p><p>Lastly what is the ECC (elliptic) key size for?&nbsp; It&#039;s not a certificate key.&nbsp; Where is it used?</p><div class="codebox"><pre><code>wolfSSL_CTX_SetMinEccKey_Sz(...)</code></pre></div><p>I assume this is not certificate based, so updating to the next version having this restriction would not affect customer certificates already on the device?</p><p>Thanks.</p>]]></description>
			<author><![CDATA[null@example.com (Scotty2541)]]></author>
			<pubDate>Fri, 18 Apr 2025 12:33:04 +0000</pubDate>
			<guid>https://www.wolfssl.com/forums/post8316.html#p8316</guid>
		</item>
		<item>
			<title><![CDATA[Re: Question on Key Size.]]></title>
			<link>https://www.wolfssl.com/forums/post8312.html#p8312</link>
			<description><![CDATA[<p>Hi Scott, </p><p>That happened in the following pull request: <a href="https://github.com/wolfSSL/wolfssl/pull/7923">https://github.com/wolfSSL/wolfssl/pull/7923</a> and that made it into wolfSSL Release 5.7.4 (Oct 24, 2024).&nbsp; Note that the previous value was 1024 which would allow RSA-512 keys.&nbsp; Now that it is set to 2048 is will no longer allow RSA-512 but will allow RSA-1024.&nbsp; I understand if this is somewhat confusing.&nbsp; Sorry about that. </p><br /><p>This affects, both keys that are generated and loaded.&nbsp; Note that you can override this default by defining RSA_MIN_SIZE yourself. </p><p>If you have further questions, please do send to support@wolfssl.com as I can see you are a commercial customer of wolfSSL. </p><p>Warm regards, Anthony</p>]]></description>
			<author><![CDATA[null@example.com (anthony)]]></author>
			<pubDate>Thu, 17 Apr 2025 16:53:35 +0000</pubDate>
			<guid>https://www.wolfssl.com/forums/post8312.html#p8312</guid>
		</item>
		<item>
			<title><![CDATA[Question on Key Size.]]></title>
			<link>https://www.wolfssl.com/forums/post8310.html#p8310</link>
			<description><![CDATA[<p>Hello.</p><p>This article<br /><a href="https://www.wolfssl.com/strengthening-rsa-default-minimum-to-2048-bits/">https://www.wolfssl.com/strengthening-r … 2048-bits/</a><br />Says the new min is 2048...</p><p>And it applies to wc_MakeRsaKey()</p><p>Question:</p><p>Which version did that happen?</p><p>-and-</p><p>Is that part of the handshake, and even if the user has supplied a cert/key that is 1024, it will create the asymmetrical key of 2048?<br />-or-<br />Is this only for creating NEW cert/keys?<br />-or-<br />does this mean it will fail to load a certificate that was made with a 1024 bit key pair?</p><p>I ask because there are existing customers supplying certs that are 1024.&nbsp; So a firmware update which contains the newer version would (or would not) break any stored key they have currently loaded into the device?</p>]]></description>
			<author><![CDATA[null@example.com (Scotty2541)]]></author>
			<pubDate>Thu, 17 Apr 2025 12:51:54 +0000</pubDate>
			<guid>https://www.wolfssl.com/forums/post8310.html#p8310</guid>
		</item>
	</channel>
</rss>
