/openssl-master/test/ |
A D | rc4test.c | 25 static unsigned char keys[6][30] = { variable 69 RC4_set_key(&key, keys[i][0], &(keys[i][1])); in test_rc4_encrypt() 80 RC4_set_key(&key, keys[3][0], &(keys[3][1])); in test_rc4_end_processing() 93 RC4_set_key(&key, keys[3][0], &(keys[3][1])); in test_rc4_multi_call() 112 RC4_set_key(&key, keys[0][0], &(keys[3][1])); in test_rc_bulk()
|
A D | ssl_test.tmpl | 28 foreach my $key (sort keys %server) { 35 foreach my $key (sort keys %server2) { 42 foreach my $key (sort keys %resume_server) { 50 foreach my $key (sort keys %client) { 56 foreach my $key (sort keys %resume_client) { 64 foreach my $key (sort keys %test) { 93 foreach my $key (sort keys %{$server{"extra"}}) { 100 foreach my $key (sort keys %{$server2{"extra"}}) { 107 foreach my $key (sort keys %{$resume_server{"extra"}}) { 114 foreach my $key (sort keys %{$client{"extra"}}) { [all …]
|
A D | endecoder_legacy_test.c | 222 } keys[] = { variable 279 for (i = 0; i < OSSL_NELEM(keys); i++) { in lookup_key() 280 if (strcmp(keys[i].keytype, type) == 0) in lookup_key() 281 return &keys[i]; in lookup_key() 696 for (i = 0; i < OSSL_NELEM(keys); i++) { in OPT_TEST_DECLARE_USAGE() 699 if (!TEST_ptr(keys[i].key = in OPT_TEST_DECLARE_USAGE() 707 if (!TEST_ptr(keys[i].key = in OPT_TEST_DECLARE_USAGE() 714 if (!TEST_ptr(keys[i].key = in OPT_TEST_DECLARE_USAGE() 715 make_key(keys[i].keytype, keys[i].template_params))) in OPT_TEST_DECLARE_USAGE() 729 for (i = 0; i < OSSL_NELEM(keys); i++) in cleanup_tests() [all …]
|
/openssl-master/Configurations/ |
A D | common0.tmpl | 14 keys %{$unified_info{sources}} ), 18 keys %{$unified_info{shared_sources}} ), 21 keys %{$unified_info{depends}} )); 24 sort keys %generatables ),
|
/openssl-master/doc/man3/ |
A D | SSL_CTX_set_security_level.pod | 77 DSA and DH keys shorter than 1024 bits and ECC keys shorter than 160 bits 85 Security level set to 112 bits of security. As a result RSA, DSA and DH keys 86 shorter than 2048 bits and ECC keys shorter than 224 bits are prohibited. 92 Security level set to 128 bits of security. As a result RSA, DSA and DH keys 93 shorter than 3072 bits and ECC keys shorter than 256 bits are prohibited. 101 DH keys shorter than 7680 bits and ECC keys shorter than 384 bits are 107 Security level set to 256 bits of security. As a result RSA, DSA and DH keys 108 shorter than 15360 bits and ECC keys shorter than 512 bits are prohibited. 142 of security requires the use of RSA keys of at least 15360 bits in size.
|
A D | EVP_aes_128_gcm.pod | 94 AES for 128, 192 and 256 bit keys in the following modes: CBC, CFB with 128-bit 100 Authenticated encryption with AES in CBC mode using SHA-1 as HMAC, with keys of 111 HMAC, with keys of 128 and 256 bits length respectively. The authentication tag 128 AES for 128, 192 and 256 bit keys in CBC-MAC Mode (CCM), Galois Counter Mode 146 AES key wrap with 128, 192 and 256 bit keys, as according to RFC 3394 section
|
A D | BN_num_bytes.pod | 36 Some have tried using BN_num_bits() on individual numbers in RSA keys, 37 DH keys and DSA keys, and found that they don't always come up with
|
A D | EVP_PKEY_copy_parameters.pod | 37 The function EVP_PKEY_parameters_eq() checks the parameters of keys 41 (if present) of keys B<a> and B<b> for equality. 46 EVP_PKEY_copy_parameters() is to handle public keys in certificates where the 50 Since OpenSSL private keys contain public key components too the function
|
A D | EVP_PKEY_get_default_digest_nid.pod | 28 to NID_undef. This function is only reliable for legacy keys, which 29 are keys with a B<EVP_PKEY_ASN1_METHOD>; these keys have typically
|
A D | EVP_PKEY_new.pod | 62 B<EVP_PKEY> is a generic structure to hold diverse types of asymmetric keys 64 signing, verifying signatures, key derivation, etc. The asymmetric keys 82 used by OpenSSL to store public and private keys. The reference count is set to 97 string for a public key algorithm that supports raw private keys, i.e one of 109 algorithm that supports raw private keys, i.e. one of B<EVP_PKEY_X25519>, 121 private key information. Algorithm types that support raw public keys are 127 information. Algorithm types that support raw public keys are 139 key data. This function only works for algorithms that support raw private keys. 149 key data. This function only works for algorithms that support raw public keys.
|
A D | RSA_check_key.pod | 5 RSA_check_key_ex, RSA_check_key - validate private RSA keys 25 RSA_check_key_ex() function validates RSA keys. 29 It does not work on RSA public keys that have only the modulus 59 support for HSM keys - in which case the RSA structure may contain B<no>
|
A D | SSL_key_update.pod | 10 - initiate and obtain information about updating connection keys 25 SSL_key_update() schedules an update of the keys for the current TLS connection. 27 the sending keys for this connection will be updated and the peer will be 29 B<SSL_KEY_UPDATE_REQUESTED> then the sending keys for this connection will be 31 peer to additionally update its sending keys. It is an error if B<updatetype> is
|
A D | DSA_dup_DH.pod | 23 DSA_dup_DH() duplicates DSA parameters/keys as DH parameters/keys. q
|
/openssl-master/doc/man1/ |
A D | openssl-pkcs12.pod.in | 124 No private keys will be output. 194 Use AES to encrypt private keys before outputting. 198 Use ARIA to encrypt private keys before outputting. 202 Use Camellia to encrypt private keys before outputting. 206 Use DES to encrypt private keys before outputting. 210 Use triple DES to encrypt private keys before outputting. 214 Use IDEA to encrypt private keys before outputting. 218 Don't encrypt private keys at all. 317 "export grade" software will only allow 512 bit RSA keys to be used for 322 the use of signing only keys for SSL client authentication. [all …]
|
A D | openssl-pkcs8.pod.in | 35 This command processes private keys in PKCS#8 format. It can handle 110 PKCS#8 keys generated or input are normally PKCS#8 EncryptedPrivateKeyInfo 113 This option does not encrypt private keys at all and should only be used 115 code signing software used unencrypted private keys. 168 Private keys encrypted using PKCS#5 v2.0 algorithms and high iteration 171 important the keys should be converted. 173 It is possible to write out DER encoded encrypted private keys in 252 keys produced and therefore, it can be assumed that the PKCS#5 v2.0 256 The format of PKCS#8 DSA (and other) private keys is not well documented:
|
/openssl-master/doc/internal/man7/ |
A D | EVP_PKEY.pod | 64 The B<EVP_PKEY> internal keys are mutable. 66 This is especially visible with internal legacy keys, since they can 73 Internal provider native keys are also possible to be modified, if the 95 For provider native origin keys, this doesn't require any help from 99 For legacy origin keys, this requires the associated 121 the key data that the cached keys came from is the "origin", and since 138 (ENGINE for legacy origin keys, provider for provider side origin 139 keys). 172 For legacy origin keys, that's done with the help of the 175 For provider native origin keys, that's done by retrieving the key [all …]
|
/openssl-master/doc/HOWTO/ |
A D | keys.txt | 2 HOWTO keys 12 Public keys come in several flavors, using different cryptographic 31 higher is recommended for RSA keys, as fewer amount of bits is 46 higher is recommended for DSA keys, as fewer amount of bits is 50 question (actually, several keys can be generated from the same 77 keys can be produced from the same parameters):
|
A D | certificates.txt | 24 2. Relationship with keys 28 somewhere. With OpenSSL, public keys are easily derived from private 29 keys, so before you create a certificate or a certificate request, you 32 Private keys are generated with 'openssl genrsa -out privkey.pem' if 36 The private keys created by these commands are not passphrase protected; 38 create private keys can be found at https://www.openssl.org/docs/HOWTO/keys.txt.
|
/openssl-master/doc/ |
A D | fingerprints.txt | 3 OpenSSL releases are signed with PGP/GnuPG keys. This file contains 12 The following is the list of fingerprints for the keys that are
|
A D | build.info.in | 20 foreach (keys %podinfiles) { 25 foreach my $p (sort keys %podfiles) { 69 foreach my $p (sort keys %pngfiles) {
|
/openssl-master/util/ |
A D | local_shlib.com.in | 17 $ NAMES := {- join(",", keys %names); -} 19 join("\n", map { "\$ __$_ = \"".$names{$_}."\"" } sort keys %names);
|
/openssl-master/doc/man7/ |
A D | EVP_SIGNATURE-ED25519.pod | 23 See L<EVP_PKEY-X25519(7)> for information related to B<X25519> and B<X448> keys. 50 Ed25519 or Ed448 private keys can be set directly using 52 using L<PEM_read_bio_PrivateKey(3)> (or similar function). Completely new keys 56 Ed25519 or Ed448 public keys can be set directly using
|
A D | X25519.pod | 30 X25519 or X448 private keys can be set directly using 32 using L<PEM_read_bio_PrivateKey(3)> (or similar function). Completely new keys 36 X25519 or X448 public keys can be set directly using
|
A D | openssl-glossary.pod | 33 An OpenSSL Provider that contains encoders and decoders for OpenSSL keys. All 41 A decoder is a type of algorithm used for decoding keys and parameters from some 59 such as private and public keys, certificates, CRLs, ... 67 An encoder is a type of algorithm used for encoding keys and parameters to some 122 MSBLOB is a Microsoft specific binary format for RSA and DSA keys, both 204 PVK is a Microsoft specific binary format for RSA and DSA private keys.
|
/openssl-master/ |
A D | configdata.pm.in | 239 foreach (sort keys %target) { 260 foreach (sort keys %{$config{perlenv}}) { 309 foreach (sort keys %{$config{perlenv}}) { 331 foreach sort keys %$result;
|