Home
last modified time | relevance | path

Searched refs:keys (Results 1 – 25 of 229) sorted by relevance

12345678910

/openssl/crypto/sm4/asm/
H A Dsm4-riscv64-zvksed.pl97 addi $keys, $keys, 16
99 addi $keys, $keys, 16
101 addi $keys, $keys, 16
103 addi $keys, $keys, 16
105 addi $keys, $keys, 16
107 addi $keys, $keys, 16
109 addi $keys, $keys, 16
152 addi $keys, $keys, 12
155 addi $keys, $keys, 16
157 addi $keys, $keys, 16
[all …]
/openssl/test/
H A Drc4test.c25 static unsigned char keys[6][30] = { variable
69 RC4_set_key(&key, keys[i][0], &(keys[i][1])); in test_rc4_encrypt()
80 RC4_set_key(&key, keys[3][0], &(keys[3][1])); in test_rc4_end_processing()
93 RC4_set_key(&key, keys[3][0], &(keys[3][1])); in test_rc4_multi_call()
112 RC4_set_key(&key, keys[0][0], &(keys[3][1])); in test_rc_bulk()
H A Devp_pkey_dparams_test.c218 struct pubkey keys[NUM_KEYS]; member
279 const struct pubkey *keys = pkey_params[id].keys; in set_enc_pubkey_test() local
281 if (keys[0].key_bin == NULL) in set_enc_pubkey_test()
289 for (i = 0; ret && i < NUM_KEYS && keys[i].key_bin != NULL; i++) { in set_enc_pubkey_test()
290 if (keys[i].bad) { in set_enc_pubkey_test()
294 keys[i].key_bin, in set_enc_pubkey_test()
295 keys[i].key_bin_len), in set_enc_pubkey_test()
301 keys[i].key_bin, in set_enc_pubkey_test()
302 keys[i].key_bin_len), in set_enc_pubkey_test()
H A Dssl_test.tmpl28 foreach my $key (sort keys %server) {
35 foreach my $key (sort keys %server2) {
42 foreach my $key (sort keys %resume_server) {
50 foreach my $key (sort keys %client) {
56 foreach my $key (sort keys %resume_client) {
64 foreach my $key (sort keys %test) {
93 foreach my $key (sort keys %{$server{"extra"}}) {
100 foreach my $key (sort keys %{$server2{"extra"}}) {
107 foreach my $key (sort keys %{$resume_server{"extra"}}) {
114 foreach my $key (sort keys %{$client{"extra"}}) {
[all …]
H A Dendecoder_legacy_test.c222 } keys[] = { variable
279 for (i = 0; i < OSSL_NELEM(keys); i++) { in lookup_key()
280 if (strcmp(keys[i].keytype, type) == 0) in lookup_key()
281 return &keys[i]; in lookup_key()
696 for (i = 0; i < OSSL_NELEM(keys); i++) { in OPT_TEST_DECLARE_USAGE()
699 if (!TEST_ptr(keys[i].key = in OPT_TEST_DECLARE_USAGE()
707 if (!TEST_ptr(keys[i].key = in OPT_TEST_DECLARE_USAGE()
714 if (!TEST_ptr(keys[i].key = in OPT_TEST_DECLARE_USAGE()
715 make_key(keys[i].keytype, keys[i].template_params))) in OPT_TEST_DECLARE_USAGE()
729 for (i = 0; i < OSSL_NELEM(keys); i++) in cleanup_tests()
[all …]
/openssl/Configurations/
H A Dcommon0.tmpl14 keys %{$unified_info{sources}} ),
18 keys %{$unified_info{shared_sources}} ),
21 keys %{$unified_info{depends}} ));
24 sort keys %generatables ),
/openssl/util/
H A Dmkinstallvars.pl40 my %keys = ();
44 $keys{$k} = 1;
50 warn "No value given for $k\n" unless $keys{$k};
52 foreach my $k (sort keys %keys) {
/openssl/doc/man3/
H A DSSL_CTX_set_security_level.pod77 DSA and DH keys shorter than 1024 bits and ECC keys shorter than 160 bits
86 Security level set to 112 bits of security. As a result RSA, DSA and DH keys
87 shorter than 2048 bits and ECC keys shorter than 224 bits are prohibited.
93 Security level set to 128 bits of security. As a result RSA, DSA and DH keys
94 shorter than 3072 bits and ECC keys shorter than 256 bits are prohibited.
101 DH keys shorter than 7680 bits and ECC keys shorter than 384 bits are
106 Security level set to 256 bits of security. As a result RSA, DSA and DH keys
107 shorter than 15360 bits and ECC keys shorter than 512 bits are prohibited.
141 of security requires the use of RSA keys of at least 15360 bits in size.
H A DSSL_get0_peer_rpk.pod39 Raw public keys are used in place of certificates when the option is
42 multiple trusted keys, this makes it possible to allow for key rotation,
46 When raw public keys are used, the certificate verify callback is called, and
48 Raw public keys have no subject, issuer, validity dates nor digital signature
H A DEVP_PKEY_copy_parameters.pod37 The function EVP_PKEY_parameters_eq() checks the parameters of keys
40 The function EVP_PKEY_eq() checks the keys B<a> and B<b> for equality,
46 EVP_PKEY_copy_parameters() is to handle public keys in certificates where the
71 the public keys or the private keys of the two B<EVP_PKEY>s, depending on
H A DBN_num_bytes.pod36 Some have tried using BN_num_bits() on individual numbers in RSA keys,
37 DH keys and DSA keys, and found that they don't always come up with
H A DEVP_aes_128_gcm.pod94 AES for 128, 192 and 256 bit keys in the following modes: CBC, CFB with 128-bit
100 Authenticated encryption with AES in CBC mode using SHA-1 as HMAC, with keys of
111 HMAC, with keys of 128 and 256 bits length respectively. The authentication tag
128 AES for 128, 192 and 256 bit keys in CBC-MAC Mode (CCM), Galois Counter Mode
140 AES key wrap with 128, 192 and 256 bit keys, as according to RFC 3394 section
H A DEVP_PKEY_get_default_digest_nid.pod28 to NID_undef. This function is only reliable for legacy keys, which
29 are keys with a B<EVP_PKEY_ASN1_METHOD>; these keys have typically
H A DEVP_PKEY_new.pod62 B<EVP_PKEY> is a generic structure to hold diverse types of asymmetric keys
64 signing, verifying signatures, key derivation, etc. The asymmetric keys
82 used by OpenSSL to store public and private keys. The reference count is set to
97 string for a public key algorithm that supports raw private keys, i.e one of
109 algorithm that supports raw private keys, i.e. one of B<EVP_PKEY_X25519>,
121 private key information. Algorithm types that support raw public keys are
127 information. Algorithm types that support raw public keys are
139 key data. This function only works for algorithms that support raw private keys.
149 key data. This function only works for algorithms that support raw public keys.
H A DRSA_check_key.pod5 RSA_check_key_ex, RSA_check_key - validate private RSA keys
25 RSA_check_key_ex() function validates RSA keys.
29 It does not work on RSA public keys that have only the modulus
59 support for HSM keys - in which case the RSA structure may contain B<no>
/openssl/test/quic-openssl-docker/
H A Drun_endpoint.sh57 …SSLKEYLOGFILE=/logs/keys.log SSL_CERT_FILE=/certs/ca.pem SSL_CERT_DIR=/certs quic-hq-interop $HOST…
67 …SSL_SESSION_FILE=./session.db SSLKEYLOGFILE=/logs/keys.log SSL_CERT_FILE=/certs/ca.pem SSL_CERT_DI…
79 …HACHA20_POLY1305_SHA256 SSL_SESSION_FILE=./session.db SSLKEYLOGFILE=/logs/keys.log SSL_CERT_FILE=/…
/openssl/doc/internal/man7/
H A DEVP_PKEY.pod64 The B<EVP_PKEY> internal keys are mutable.
66 This is especially visible with internal legacy keys, since they can
73 Internal provider native keys are also possible to be modified, if the
95 For provider native origin keys, this doesn't require any help from
99 For legacy origin keys, this requires the associated
121 the key data that the cached keys came from is the "origin", and since
138 (ENGINE for legacy origin keys, provider for provider side origin
139 keys).
172 For legacy origin keys, that's done with the help of the
175 For provider native origin keys, that's done by retrieving the key
[all …]
/openssl/doc/man1/
H A Dopenssl-pkcs12.pod.in128 No private keys will be output.
198 Use AES to encrypt private keys before outputting.
202 Use ARIA to encrypt private keys before outputting.
206 Use Camellia to encrypt private keys before outputting.
210 Use DES to encrypt private keys before outputting.
214 Use triple DES to encrypt private keys before outputting.
218 Use IDEA to encrypt private keys before outputting.
222 Don't encrypt private keys at all.
321 "export grade" software will only allow 512 bit RSA keys to be used for
326 the use of signing only keys for SSL client authentication.
[all …]
H A Dopenssl-storeutl.pod.in22 [B<-keys>]
74 =item B<-keys>
78 Only select the certificates, keys or CRLs from the given URI.
84 Note I<-keys> selects exclusively private keys, there is no selector for public
85 keys only.
/openssl/doc/HOWTO/
H A Dkeys.txt2 HOWTO keys
12 Public keys come in several flavors, using different cryptographic
31 higher is recommended for RSA keys, as fewer amount of bits is
46 higher is recommended for DSA keys, as fewer amount of bits is
50 question (actually, several keys can be generated from the same
77 keys can be produced from the same parameters):
H A Dcertificates.txt24 2. Relationship with keys
28 somewhere. With OpenSSL, public keys are easily derived from private
29 keys, so before you create a certificate or a certificate request, you
32 Private keys are generated with 'openssl genrsa -out privkey.pem' if
36 The private keys created by these commands are not passphrase protected;
38 create private keys can be found at https://www.openssl.org/docs/HOWTO/keys.txt.
/openssl/doc/man7/
H A DEVP_PKEY-RSA.pod11 That implementation supports the basic RSA keys, containing the modulus I<n>,
112 When generating RSA keys, the following key generation parameters may be used.
148 When generating RSA keys, the following additional key generation parameters may
150 RSA keys for a production environment.
196 For RSA keys, L<EVP_PKEY_param_check(3)> and L<EVP_PKEY_param_check_quick(3)>
199 For RSA keys, L<EVP_PKEY_public_check(3)> conforms to the SP800-56Br1 I<public key
204 For RSA keys, L<EVP_PKEY_public_check_quick(3)> is the same as
207 For RSA keys, L<EVP_PKEY_private_check(3)> conforms to the SP800-56Br1
210 For RSA keys, L<EVP_PKEY_pairwise_check(3)> conforms to the
H A DX25519.pod30 X25519 or X448 private keys can be set directly using
32 using L<PEM_read_bio_PrivateKey(3)> (or similar function). Completely new keys
36 X25519 or X448 public keys can be set directly using
/openssl/doc/
H A Dbuild.info.in20 foreach (keys %podinfiles) {
25 foreach my $p (sort keys %podfiles) {
69 foreach my $p (sort keys %pngfiles) {
H A Dfingerprints.txt3 OpenSSL releases are signed with PGP/GnuPG keys. This file contains
12 The following is the list of fingerprints for the keys that are

Completed in 28 milliseconds

12345678910