summaryrefslogtreecommitdiff
path: root/cipher/rsa.c
Commit message (Expand)AuthorAgeFilesLines
* fips,rsa: Prevent usage of X9.31 keygen in FIPS mode.Jakub Jelen2022-12-061-0/+5
* cipher: Do not run RSA encryption selftest by defaultJakub Jelen2022-10-191-4/+7
* Revert "Do not allow PKCS #1.5 padding for encryption in FIPS"Jakub Jelen2022-10-191-5/+0
* Revert "fips: Disable RSA-OAEP padding in FIPS mode."Jakub Jelen2022-10-191-2/+1
* fips: Skip PCT if RSA keygen test-parms specifiedClemens Lang2022-09-221-1/+4
* fips: Disable RSA-OAEP padding in FIPS mode.Jakub Jelen2022-08-231-1/+2
* Simplify the PCT for RSA and ECDSAJakub Jelen2022-08-231-35/+12
* rsa: Run PCT in FIPS mode also with digest step.Jakub Jelen2022-08-231-1/+68
* fips: Run digest&sign self tests for RSA and ECC in FIPS mode.Jakub Jelen2022-08-231-6/+102
* cipher: Allow verification of small RSA signatures in FIPS modeJakub Jelen2022-05-191-2/+24
* Do not allow PKCS #1.5 padding for encryption in FIPSJakub Jelen2022-04-211-0/+5
* cipher: Change the bounds for RSA key generation round.NIIBE Yutaka2022-04-201-4/+4
* cipher: Fix rsa key generation.NIIBE Yutaka2022-04-181-0/+2
* rsa: Fix regression in not returning an error for prime generation.Werner Koch2022-01-311-2/+5
* Update documentation related to FIPSJakub Jelen2022-01-171-1/+1
* rsa: Allow e=0 to select 65537 for keygeneration under X931.NIIBE Yutaka2021-12-031-1/+3
* rsa: Check keylen constraints for key operations.Jakub Jelen2021-11-081-15/+43
* cipher: Allow generation of RSA keys > 2kJakub Jelen2021-10-141-1/+1
* Remove the forced fips modeJakub Jelen2021-09-201-1/+1
* rsa: Do not allow 1024 RSA keys in FIPS modeJakub Jelen2021-08-171-9/+1
* cipher: Extend RSA-PSS internal function for verify, too.NIIBE Yutaka2021-07-231-1/+1
* rsa: Use modern MPI allocation function.Werner Koch2017-07-061-1/+1
* rsa: Add exponent blinding.NIIBE Yutaka2017-06-291-5/+26
* rsa: Minor refactoring.Werner Koch2017-06-241-32/+56
* doc: Comment fixesWerner Koch2017-05-231-1/+1
* Spelling fixes in docs and comments.NIIBE Yutaka2017-04-281-1/+1
* Improve robustness and help lint.Werner Koch2016-06-251-1/+1
* rsa: Implement blinding also for signing.Werner Koch2016-06-081-44/+48
* rsa: Add FIPS 186-4 compliant RSA probable prime key generator.Tomáš Mráz2016-03-221-3/+295
* rsa: Use 2048 bit RSA keys for selftest.Vitezslav Cizek2016-03-181-49/+118
* rsa: Add verify after sign to avoid Lenstra's CRT attack.Werner Koch2015-08-311-1/+18
* rsa: Fix error in comments.Peter Wu2015-07-161-1/+1
* Fix RSA Blinding.NIIBE Yutaka2014-01-291-5/+4
* cipher: Normalize the MPIs used as input to secret key functions.Werner Koch2013-12-161-0/+10
* Remove macro hacks for internal vs. external functions. Part 2 and last.Werner Koch2013-12-121-3/+3
* Remove macro hacks for internal vs. external functions. Part 1.Werner Koch2013-12-051-229/+221
* sexp: Add function gcry_sexp_extract_param.Werner Koch2013-10-161-13/+13
* pubkey: Support flags list in gcry_pk_genkey.Werner Koch2013-10-141-9/+22
* pubkey: Move sexp parsing of remaining fucntions to the modules.Werner Koch2013-10-111-21/+25
* pubkey: Move sexp parsing for gcry_pk_decrypt to the modules.Werner Koch2013-10-111-62/+104
* pubkey: Move sexp parsing for gcry_pk_encrypt to the modules.Werner Koch2013-10-111-16/+45
* pubkey: Move sexp parsing for gcry_pk_sign to the modules.Werner Koch2013-10-111-25/+62
* pubkey: Move sexp parsing for gcry_pk_verify to the modules.Werner Koch2013-10-091-33/+66
* pubkey: Move sexp parsing for gcry_pk_get_nbits to the modules.Werner Koch2013-10-081-3/+24
* pubkey: Move sexp parsing for gcry_pk_getkey to the modules.Werner Koch2013-10-081-5/+12
* sexp: Change internal versions to always use gpg_err_code_t.Werner Koch2013-09-201-31/+23
* pk: Move s-exp creation for gcry_pk_decrypt to the modules.Werner Koch2013-09-201-76/+69
* pk: Move s-expr creation for genkey to the modules.Werner Koch2013-09-191-34/+25
* pk: Move s-expr creation for sign and encrypt to the modules.Werner Koch2013-09-191-8/+54
* pk: Simplify the public key dispatcher pubkey.c.Werner Koch2013-09-181-1/+2