> On Mar 26, 2018, at 10:08 AM, Matt Caswell <matt@xxxxxxxxxxx> wrote: > > Note that for Ed25519 the raw public key is 32 bytes not 40. I see so the DKIM key encoding for Ed25519 was slimmed down to bare essentials, which slightly complicates the interface for using it on the verifier side (at least for OpenSSL), since now one needs to create the SPKI key handle in an algorithm-specific manner, loading the public key into a new Ed25519 public key object, ... https://tools.ietf.org/html/draft-ietf-dcrup-dkim-crypto-08#section-4.2 The p= value in the key record is the ed25519 public key encoded in base64. Since the key is 256 bits long, the base64 text is 44 octets long. -- Viktor. -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users