Home
last modified time | relevance | path

Searched refs:keys (Results 1 – 25 of 186) sorted by relevance

12345678

/openssl-master/test/
A Drc4test.c25 static unsigned char keys[6][30] = { variable
69 RC4_set_key(&key, keys[i][0], &(keys[i][1])); in test_rc4_encrypt()
80 RC4_set_key(&key, keys[3][0], &(keys[3][1])); in test_rc4_end_processing()
93 RC4_set_key(&key, keys[3][0], &(keys[3][1])); in test_rc4_multi_call()
112 RC4_set_key(&key, keys[0][0], &(keys[3][1])); in test_rc_bulk()
A Dssl_test.tmpl28 foreach my $key (sort keys %server) {
35 foreach my $key (sort keys %server2) {
42 foreach my $key (sort keys %resume_server) {
50 foreach my $key (sort keys %client) {
56 foreach my $key (sort keys %resume_client) {
64 foreach my $key (sort keys %test) {
93 foreach my $key (sort keys %{$server{"extra"}}) {
100 foreach my $key (sort keys %{$server2{"extra"}}) {
107 foreach my $key (sort keys %{$resume_server{"extra"}}) {
114 foreach my $key (sort keys %{$client{"extra"}}) {
[all …]
A Dendecoder_legacy_test.c222 } keys[] = { variable
279 for (i = 0; i < OSSL_NELEM(keys); i++) { in lookup_key()
280 if (strcmp(keys[i].keytype, type) == 0) in lookup_key()
281 return &keys[i]; in lookup_key()
696 for (i = 0; i < OSSL_NELEM(keys); i++) { in OPT_TEST_DECLARE_USAGE()
699 if (!TEST_ptr(keys[i].key = in OPT_TEST_DECLARE_USAGE()
707 if (!TEST_ptr(keys[i].key = in OPT_TEST_DECLARE_USAGE()
714 if (!TEST_ptr(keys[i].key = in OPT_TEST_DECLARE_USAGE()
715 make_key(keys[i].keytype, keys[i].template_params))) in OPT_TEST_DECLARE_USAGE()
729 for (i = 0; i < OSSL_NELEM(keys); i++) in cleanup_tests()
[all …]
/openssl-master/Configurations/
A Dcommon0.tmpl14 keys %{$unified_info{sources}} ),
18 keys %{$unified_info{shared_sources}} ),
21 keys %{$unified_info{depends}} ));
24 sort keys %generatables ),
/openssl-master/doc/man3/
A DSSL_CTX_set_security_level.pod77 DSA and DH keys shorter than 1024 bits and ECC keys shorter than 160 bits
85 Security level set to 112 bits of security. As a result RSA, DSA and DH keys
86 shorter than 2048 bits and ECC keys shorter than 224 bits are prohibited.
92 Security level set to 128 bits of security. As a result RSA, DSA and DH keys
93 shorter than 3072 bits and ECC keys shorter than 256 bits are prohibited.
101 DH keys shorter than 7680 bits and ECC keys shorter than 384 bits are
107 Security level set to 256 bits of security. As a result RSA, DSA and DH keys
108 shorter than 15360 bits and ECC keys shorter than 512 bits are prohibited.
142 of security requires the use of RSA keys of at least 15360 bits in size.
A DEVP_aes_128_gcm.pod94 AES for 128, 192 and 256 bit keys in the following modes: CBC, CFB with 128-bit
100 Authenticated encryption with AES in CBC mode using SHA-1 as HMAC, with keys of
111 HMAC, with keys of 128 and 256 bits length respectively. The authentication tag
128 AES for 128, 192 and 256 bit keys in CBC-MAC Mode (CCM), Galois Counter Mode
146 AES key wrap with 128, 192 and 256 bit keys, as according to RFC 3394 section
A DBN_num_bytes.pod36 Some have tried using BN_num_bits() on individual numbers in RSA keys,
37 DH keys and DSA keys, and found that they don't always come up with
A DEVP_PKEY_copy_parameters.pod37 The function EVP_PKEY_parameters_eq() checks the parameters of keys
41 (if present) of keys B<a> and B<b> for equality.
46 EVP_PKEY_copy_parameters() is to handle public keys in certificates where the
50 Since OpenSSL private keys contain public key components too the function
A DEVP_PKEY_get_default_digest_nid.pod28 to NID_undef. This function is only reliable for legacy keys, which
29 are keys with a B<EVP_PKEY_ASN1_METHOD>; these keys have typically
A DEVP_PKEY_new.pod62 B<EVP_PKEY> is a generic structure to hold diverse types of asymmetric keys
64 signing, verifying signatures, key derivation, etc. The asymmetric keys
82 used by OpenSSL to store public and private keys. The reference count is set to
97 string for a public key algorithm that supports raw private keys, i.e one of
109 algorithm that supports raw private keys, i.e. one of B<EVP_PKEY_X25519>,
121 private key information. Algorithm types that support raw public keys are
127 information. Algorithm types that support raw public keys are
139 key data. This function only works for algorithms that support raw private keys.
149 key data. This function only works for algorithms that support raw public keys.
A DRSA_check_key.pod5 RSA_check_key_ex, RSA_check_key - validate private RSA keys
25 RSA_check_key_ex() function validates RSA keys.
29 It does not work on RSA public keys that have only the modulus
59 support for HSM keys - in which case the RSA structure may contain B<no>
A DSSL_key_update.pod10 - initiate and obtain information about updating connection keys
25 SSL_key_update() schedules an update of the keys for the current TLS connection.
27 the sending keys for this connection will be updated and the peer will be
29 B<SSL_KEY_UPDATE_REQUESTED> then the sending keys for this connection will be
31 peer to additionally update its sending keys. It is an error if B<updatetype> is
A DDSA_dup_DH.pod23 DSA_dup_DH() duplicates DSA parameters/keys as DH parameters/keys. q
/openssl-master/doc/man1/
A Dopenssl-pkcs12.pod.in124 No private keys will be output.
194 Use AES to encrypt private keys before outputting.
198 Use ARIA to encrypt private keys before outputting.
202 Use Camellia to encrypt private keys before outputting.
206 Use DES to encrypt private keys before outputting.
210 Use triple DES to encrypt private keys before outputting.
214 Use IDEA to encrypt private keys before outputting.
218 Don't encrypt private keys at all.
317 "export grade" software will only allow 512 bit RSA keys to be used for
322 the use of signing only keys for SSL client authentication.
[all …]
A Dopenssl-pkcs8.pod.in35 This command processes private keys in PKCS#8 format. It can handle
110 PKCS#8 keys generated or input are normally PKCS#8 EncryptedPrivateKeyInfo
113 This option does not encrypt private keys at all and should only be used
115 code signing software used unencrypted private keys.
168 Private keys encrypted using PKCS#5 v2.0 algorithms and high iteration
171 important the keys should be converted.
173 It is possible to write out DER encoded encrypted private keys in
252 keys produced and therefore, it can be assumed that the PKCS#5 v2.0
256 The format of PKCS#8 DSA (and other) private keys is not well documented:
/openssl-master/doc/internal/man7/
A DEVP_PKEY.pod64 The B<EVP_PKEY> internal keys are mutable.
66 This is especially visible with internal legacy keys, since they can
73 Internal provider native keys are also possible to be modified, if the
95 For provider native origin keys, this doesn't require any help from
99 For legacy origin keys, this requires the associated
121 the key data that the cached keys came from is the "origin", and since
138 (ENGINE for legacy origin keys, provider for provider side origin
139 keys).
172 For legacy origin keys, that's done with the help of the
175 For provider native origin keys, that's done by retrieving the key
[all …]
/openssl-master/doc/HOWTO/
A Dkeys.txt2 HOWTO keys
12 Public keys come in several flavors, using different cryptographic
31 higher is recommended for RSA keys, as fewer amount of bits is
46 higher is recommended for DSA keys, as fewer amount of bits is
50 question (actually, several keys can be generated from the same
77 keys can be produced from the same parameters):
A Dcertificates.txt24 2. Relationship with keys
28 somewhere. With OpenSSL, public keys are easily derived from private
29 keys, so before you create a certificate or a certificate request, you
32 Private keys are generated with 'openssl genrsa -out privkey.pem' if
36 The private keys created by these commands are not passphrase protected;
38 create private keys can be found at https://www.openssl.org/docs/HOWTO/keys.txt.
/openssl-master/doc/
A Dfingerprints.txt3 OpenSSL releases are signed with PGP/GnuPG keys. This file contains
12 The following is the list of fingerprints for the keys that are
A Dbuild.info.in20 foreach (keys %podinfiles) {
25 foreach my $p (sort keys %podfiles) {
69 foreach my $p (sort keys %pngfiles) {
/openssl-master/util/
A Dlocal_shlib.com.in17 $ NAMES := {- join(",", keys %names); -}
19 join("\n", map { "\$ __$_ = \"".$names{$_}."\"" } sort keys %names);
/openssl-master/doc/man7/
A DEVP_SIGNATURE-ED25519.pod23 See L<EVP_PKEY-X25519(7)> for information related to B<X25519> and B<X448> keys.
50 Ed25519 or Ed448 private keys can be set directly using
52 using L<PEM_read_bio_PrivateKey(3)> (or similar function). Completely new keys
56 Ed25519 or Ed448 public keys can be set directly using
A DX25519.pod30 X25519 or X448 private keys can be set directly using
32 using L<PEM_read_bio_PrivateKey(3)> (or similar function). Completely new keys
36 X25519 or X448 public keys can be set directly using
A Dopenssl-glossary.pod33 An OpenSSL Provider that contains encoders and decoders for OpenSSL keys. All
41 A decoder is a type of algorithm used for decoding keys and parameters from some
59 such as private and public keys, certificates, CRLs, ...
67 An encoder is a type of algorithm used for encoding keys and parameters to some
122 MSBLOB is a Microsoft specific binary format for RSA and DSA keys, both
204 PVK is a Microsoft specific binary format for RSA and DSA private keys.
/openssl-master/
A Dconfigdata.pm.in239 foreach (sort keys %target) {
260 foreach (sort keys %{$config{perlenv}}) {
309 foreach (sort keys %{$config{perlenv}}) {
331 foreach sort keys %$result;

Completed in 25 milliseconds

12345678