/openssl/crypto/sm4/asm/ |
H A D | sm4-riscv64-zvksed.pl | 97 addi $keys, $keys, 16 99 addi $keys, $keys, 16 101 addi $keys, $keys, 16 103 addi $keys, $keys, 16 105 addi $keys, $keys, 16 107 addi $keys, $keys, 16 109 addi $keys, $keys, 16 152 addi $keys, $keys, 12 155 addi $keys, $keys, 16 157 addi $keys, $keys, 16 [all …]
|
/openssl/test/ |
H A D | rc4test.c | 25 static unsigned char keys[6][30] = { variable 69 RC4_set_key(&key, keys[i][0], &(keys[i][1])); in test_rc4_encrypt() 80 RC4_set_key(&key, keys[3][0], &(keys[3][1])); in test_rc4_end_processing() 93 RC4_set_key(&key, keys[3][0], &(keys[3][1])); in test_rc4_multi_call() 112 RC4_set_key(&key, keys[0][0], &(keys[3][1])); in test_rc_bulk()
|
H A D | evp_pkey_dparams_test.c | 218 struct pubkey keys[NUM_KEYS]; member 279 const struct pubkey *keys = pkey_params[id].keys; in set_enc_pubkey_test() local 281 if (keys[0].key_bin == NULL) in set_enc_pubkey_test() 289 for (i = 0; ret && i < NUM_KEYS && keys[i].key_bin != NULL; i++) { in set_enc_pubkey_test() 290 if (keys[i].bad) { in set_enc_pubkey_test() 294 keys[i].key_bin, in set_enc_pubkey_test() 295 keys[i].key_bin_len), in set_enc_pubkey_test() 301 keys[i].key_bin, in set_enc_pubkey_test() 302 keys[i].key_bin_len), in set_enc_pubkey_test()
|
H A D | ssl_test.tmpl | 28 foreach my $key (sort keys %server) { 35 foreach my $key (sort keys %server2) { 42 foreach my $key (sort keys %resume_server) { 50 foreach my $key (sort keys %client) { 56 foreach my $key (sort keys %resume_client) { 64 foreach my $key (sort keys %test) { 93 foreach my $key (sort keys %{$server{"extra"}}) { 100 foreach my $key (sort keys %{$server2{"extra"}}) { 107 foreach my $key (sort keys %{$resume_server{"extra"}}) { 114 foreach my $key (sort keys %{$client{"extra"}}) { [all …]
|
H A D | endecoder_legacy_test.c | 222 } keys[] = { variable 279 for (i = 0; i < OSSL_NELEM(keys); i++) { in lookup_key() 280 if (strcmp(keys[i].keytype, type) == 0) in lookup_key() 281 return &keys[i]; in lookup_key() 696 for (i = 0; i < OSSL_NELEM(keys); i++) { in OPT_TEST_DECLARE_USAGE() 699 if (!TEST_ptr(keys[i].key = in OPT_TEST_DECLARE_USAGE() 707 if (!TEST_ptr(keys[i].key = in OPT_TEST_DECLARE_USAGE() 714 if (!TEST_ptr(keys[i].key = in OPT_TEST_DECLARE_USAGE() 715 make_key(keys[i].keytype, keys[i].template_params))) in OPT_TEST_DECLARE_USAGE() 729 for (i = 0; i < OSSL_NELEM(keys); i++) in cleanup_tests() [all …]
|
/openssl/Configurations/ |
H A D | common0.tmpl | 14 keys %{$unified_info{sources}} ), 18 keys %{$unified_info{shared_sources}} ), 21 keys %{$unified_info{depends}} )); 24 sort keys %generatables ),
|
/openssl/util/ |
H A D | mkinstallvars.pl | 40 my %keys = (); 44 $keys{$k} = 1; 50 warn "No value given for $k\n" unless $keys{$k}; 52 foreach my $k (sort keys %keys) {
|
/openssl/doc/man3/ |
H A D | SSL_CTX_set_security_level.pod | 77 DSA and DH keys shorter than 1024 bits and ECC keys shorter than 160 bits 86 Security level set to 112 bits of security. As a result RSA, DSA and DH keys 87 shorter than 2048 bits and ECC keys shorter than 224 bits are prohibited. 93 Security level set to 128 bits of security. As a result RSA, DSA and DH keys 94 shorter than 3072 bits and ECC keys shorter than 256 bits are prohibited. 101 DH keys shorter than 7680 bits and ECC keys shorter than 384 bits are 106 Security level set to 256 bits of security. As a result RSA, DSA and DH keys 107 shorter than 15360 bits and ECC keys shorter than 512 bits are prohibited. 141 of security requires the use of RSA keys of at least 15360 bits in size.
|
H A D | SSL_get0_peer_rpk.pod | 39 Raw public keys are used in place of certificates when the option is 42 multiple trusted keys, this makes it possible to allow for key rotation, 46 When raw public keys are used, the certificate verify callback is called, and 48 Raw public keys have no subject, issuer, validity dates nor digital signature
|
H A D | EVP_PKEY_copy_parameters.pod | 37 The function EVP_PKEY_parameters_eq() checks the parameters of keys 40 The function EVP_PKEY_eq() checks the keys B<a> and B<b> for equality, 46 EVP_PKEY_copy_parameters() is to handle public keys in certificates where the 71 the public keys or the private keys of the two B<EVP_PKEY>s, depending on
|
H A D | BN_num_bytes.pod | 36 Some have tried using BN_num_bits() on individual numbers in RSA keys, 37 DH keys and DSA keys, and found that they don't always come up with
|
H A D | EVP_aes_128_gcm.pod | 94 AES for 128, 192 and 256 bit keys in the following modes: CBC, CFB with 128-bit 100 Authenticated encryption with AES in CBC mode using SHA-1 as HMAC, with keys of 111 HMAC, with keys of 128 and 256 bits length respectively. The authentication tag 128 AES for 128, 192 and 256 bit keys in CBC-MAC Mode (CCM), Galois Counter Mode 140 AES key wrap with 128, 192 and 256 bit keys, as according to RFC 3394 section
|
H A D | EVP_PKEY_get_default_digest_nid.pod | 28 to NID_undef. This function is only reliable for legacy keys, which 29 are keys with a B<EVP_PKEY_ASN1_METHOD>; these keys have typically
|
H A D | EVP_PKEY_new.pod | 62 B<EVP_PKEY> is a generic structure to hold diverse types of asymmetric keys 64 signing, verifying signatures, key derivation, etc. The asymmetric keys 82 used by OpenSSL to store public and private keys. The reference count is set to 97 string for a public key algorithm that supports raw private keys, i.e one of 109 algorithm that supports raw private keys, i.e. one of B<EVP_PKEY_X25519>, 121 private key information. Algorithm types that support raw public keys are 127 information. Algorithm types that support raw public keys are 139 key data. This function only works for algorithms that support raw private keys. 149 key data. This function only works for algorithms that support raw public keys.
|
H A D | RSA_check_key.pod | 5 RSA_check_key_ex, RSA_check_key - validate private RSA keys 25 RSA_check_key_ex() function validates RSA keys. 29 It does not work on RSA public keys that have only the modulus 59 support for HSM keys - in which case the RSA structure may contain B<no>
|
/openssl/test/quic-openssl-docker/ |
H A D | run_endpoint.sh | 57 …SSLKEYLOGFILE=/logs/keys.log SSL_CERT_FILE=/certs/ca.pem SSL_CERT_DIR=/certs quic-hq-interop $HOST… 67 …SSL_SESSION_FILE=./session.db SSLKEYLOGFILE=/logs/keys.log SSL_CERT_FILE=/certs/ca.pem SSL_CERT_DI… 79 …HACHA20_POLY1305_SHA256 SSL_SESSION_FILE=./session.db SSLKEYLOGFILE=/logs/keys.log SSL_CERT_FILE=/…
|
/openssl/doc/internal/man7/ |
H A D | EVP_PKEY.pod | 64 The B<EVP_PKEY> internal keys are mutable. 66 This is especially visible with internal legacy keys, since they can 73 Internal provider native keys are also possible to be modified, if the 95 For provider native origin keys, this doesn't require any help from 99 For legacy origin keys, this requires the associated 121 the key data that the cached keys came from is the "origin", and since 138 (ENGINE for legacy origin keys, provider for provider side origin 139 keys). 172 For legacy origin keys, that's done with the help of the 175 For provider native origin keys, that's done by retrieving the key [all …]
|
/openssl/doc/man1/ |
H A D | openssl-pkcs12.pod.in | 128 No private keys will be output. 198 Use AES to encrypt private keys before outputting. 202 Use ARIA to encrypt private keys before outputting. 206 Use Camellia to encrypt private keys before outputting. 210 Use DES to encrypt private keys before outputting. 214 Use triple DES to encrypt private keys before outputting. 218 Use IDEA to encrypt private keys before outputting. 222 Don't encrypt private keys at all. 321 "export grade" software will only allow 512 bit RSA keys to be used for 326 the use of signing only keys for SSL client authentication. [all …]
|
H A D | openssl-storeutl.pod.in | 22 [B<-keys>] 74 =item B<-keys> 78 Only select the certificates, keys or CRLs from the given URI. 84 Note I<-keys> selects exclusively private keys, there is no selector for public 85 keys only.
|
/openssl/doc/HOWTO/ |
H A D | keys.txt | 2 HOWTO keys 12 Public keys come in several flavors, using different cryptographic 31 higher is recommended for RSA keys, as fewer amount of bits is 46 higher is recommended for DSA keys, as fewer amount of bits is 50 question (actually, several keys can be generated from the same 77 keys can be produced from the same parameters):
|
H A D | certificates.txt | 24 2. Relationship with keys 28 somewhere. With OpenSSL, public keys are easily derived from private 29 keys, so before you create a certificate or a certificate request, you 32 Private keys are generated with 'openssl genrsa -out privkey.pem' if 36 The private keys created by these commands are not passphrase protected; 38 create private keys can be found at https://www.openssl.org/docs/HOWTO/keys.txt.
|
/openssl/doc/man7/ |
H A D | EVP_PKEY-RSA.pod | 11 That implementation supports the basic RSA keys, containing the modulus I<n>, 112 When generating RSA keys, the following key generation parameters may be used. 148 When generating RSA keys, the following additional key generation parameters may 150 RSA keys for a production environment. 196 For RSA keys, L<EVP_PKEY_param_check(3)> and L<EVP_PKEY_param_check_quick(3)> 199 For RSA keys, L<EVP_PKEY_public_check(3)> conforms to the SP800-56Br1 I<public key 204 For RSA keys, L<EVP_PKEY_public_check_quick(3)> is the same as 207 For RSA keys, L<EVP_PKEY_private_check(3)> conforms to the SP800-56Br1 210 For RSA keys, L<EVP_PKEY_pairwise_check(3)> conforms to the
|
H A D | X25519.pod | 30 X25519 or X448 private keys can be set directly using 32 using L<PEM_read_bio_PrivateKey(3)> (or similar function). Completely new keys 36 X25519 or X448 public keys can be set directly using
|
/openssl/doc/ |
H A D | build.info.in | 20 foreach (keys %podinfiles) { 25 foreach my $p (sort keys %podfiles) { 69 foreach my $p (sort keys %pngfiles) {
|
H A D | fingerprints.txt | 3 OpenSSL releases are signed with PGP/GnuPG keys. This file contains 12 The following is the list of fingerprints for the keys that are
|