Loading doc/ssl/SSL_CTX_set_security_level.pod +1 −1 Original line number Diff line number Diff line Loading @@ -137,7 +137,7 @@ then only ciphersuites consistent with the security level are permissible. See SP800-57 for how the security limits are related to individual algorithms. Some security levels require large key sizes for none-ECC public key Some security levels require large key sizes for non-ECC public key algorithms which can severely degrade performance. For example 256 bits of security requires the use of RSA keys of at least 15360 bits in size. Loading Loading
doc/ssl/SSL_CTX_set_security_level.pod +1 −1 Original line number Diff line number Diff line Loading @@ -137,7 +137,7 @@ then only ciphersuites consistent with the security level are permissible. See SP800-57 for how the security limits are related to individual algorithms. Some security levels require large key sizes for none-ECC public key Some security levels require large key sizes for non-ECC public key algorithms which can severely degrade performance. For example 256 bits of security requires the use of RSA keys of at least 15360 bits in size. Loading