Go to file
Sebastian Andrzej Siewior cac19d19e7 rsa: Do not allow less than 512 bit RSA keys
As per documentation, the RSA keys should not be smaller than 64bit (the
documentation mentions something about a quirk in the prime generation
algorithm). I am adding check into the code which used to be 16 for some
reason.
My primary motivation is to get rid of the last sentence in the
documentation which suggest that typical keys have 1024 bits (instead
updating it to the now default 2048).
I *assume* that keys less than the 2048 bits (say 512) are used for
education purposes.
The 512 bits as the minimum have been suggested by Bernd Edlinger.

Signed-off-by: Sebastian Andrzej Siewior <sebastian@breakpoint.cc>

Reviewed-by: Bernd Edlinger <bernd.edlinger@hotmail.de>
Reviewed-by: Tim Hudson <tjh@openssl.org>
Reviewed-by: Richard Levitte <levitte@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/4547)
2017-12-11 12:53:07 +01:00
.github
apps Useless conf != NULL test 2017-12-09 23:59:56 +01:00
boringssl@2070f8ad91
Configurations Have all relevant config targets use the env() function rather than $ENV 2017-12-08 00:36:21 +01:00
crypto rsa: Do not allow less than 512 bit RSA keys 2017-12-11 12:53:07 +01:00
demos Add "friendly name" extractor 2017-11-30 14:53:46 -05:00
doc rsa: Do not allow less than 512 bit RSA keys 2017-12-11 12:53:07 +01:00
engines putting the missing static 2017-12-08 10:39:52 +00:00
external/perl
fuzz SM3: restructure to EVP internal and update doc to right location 2017-11-06 07:21:15 +08:00
include Convert the remaining functions in the record layer to use SSLfatal() 2017-12-08 16:42:02 +00:00
krb5@b9ad6c4950
ms Many spelling fixes/typo's corrected. 2017-11-11 19:03:10 -05:00
os-dep
pyca-cryptography@c1f8e46033
ssl Make BIO_METHOD struct definitions consistent 2017-12-09 21:27:29 +01:00
test rsa: Do not allow less than 512 bit RSA keys 2017-12-11 12:53:07 +01:00
tools
util Make possible variant SONAMEs and symbol versions 2017-11-30 18:33:58 -05:00
VMS
.gitattributes
.gitignore Reduce the things we ignore in test/ 2017-10-09 17:58:50 +02:00
.gitmodules
.travis-apt-pin.preferences
.travis-create-release.sh
.travis.yml Travis: if "make update" created a diff, please show it 2017-11-03 09:26:44 +01:00
ACKNOWLEDGEMENTS
appveyor.yml
AUTHORS
build.info
CHANGES Document the possibility for command line argument env assignments 2017-12-08 00:36:21 +01:00
config Make sure ./config passes options to ./Configure correctly 2017-12-08 00:36:21 +01:00
config.com
Configure Configure: die if there are other arguments with 'reconf' 2017-12-08 00:36:21 +01:00
CONTRIBUTING
e_os.h e_os.h: add prandom and hwrng to the list of random devices on s390x. 2017-10-22 22:56:18 +02:00
FAQ
INSTALL Document how the configuration option 'reconf' works 2017-12-08 00:36:21 +01:00
LICENSE
Makefile.shared
NEWS Update CHANGES and NEWS for new release 2017-12-06 15:44:39 +00:00
NOTES.DJGPP
NOTES.PERL
NOTES.UNIX
NOTES.VMS
NOTES.WIN
README Many spelling fixes/typo's corrected. 2017-11-11 19:03:10 -05:00
README.ECC
README.ENGINE
README.FIPS

 OpenSSL 1.1.1-dev

 Copyright (c) 1998-2016 The OpenSSL Project
 Copyright (c) 1995-1998 Eric A. Young, Tim J. Hudson
 All rights reserved.

 DESCRIPTION
 -----------

 The OpenSSL Project is a collaborative effort to develop a robust,
 commercial-grade, fully featured, and Open Source toolkit implementing the
 Transport Layer Security (TLS) protocols (including SSLv3) as well as a
 full-strength general purpose cryptographic library.

 OpenSSL is descended from the SSLeay library developed by Eric A. Young
 and Tim J. Hudson.  The OpenSSL toolkit is licensed under a dual-license (the
 OpenSSL license plus the SSLeay license), which means that you are free to
 get and use it for commercial and non-commercial purposes as long as you
 fulfill the conditions of both licenses.

 OVERVIEW
 --------

 The OpenSSL toolkit includes:

 libssl (with platform specific naming):
     Provides the client and server-side implementations for SSLv3 and TLS.

 libcrypto (with platform specific naming):
     Provides general cryptographic and X.509 support needed by SSL/TLS but
     not logically part of it.

 openssl:
     A command line tool that can be used for:
        Creation of key parameters
        Creation of X.509 certificates, CSRs and CRLs
        Calculation of message digests
        Encryption and decryption
        SSL/TLS client and server tests
        Handling of S/MIME signed or encrypted mail
        And more...

 INSTALLATION
 ------------

 See the appropriate file:
        INSTALL         Linux, Unix, Windows, OpenVMS, ...
        NOTES.*         INSTALL addendums for different platforms

 SUPPORT
 -------

 See the OpenSSL website www.openssl.org for details on how to obtain
 commercial technical support. Free community support is available through the
 openssl-users email list (see
 https://www.openssl.org/community/mailinglists.html for further details).

 If you have any problems with OpenSSL then please take the following steps
 first:

    - Download the latest version from the repository
      to see if the problem has already been addressed
    - Configure with no-asm
    - Remove compiler optimization flags

 If you wish to report a bug then please include the following information
 and create an issue on GitHub:

    - OpenSSL version: output of 'openssl version -a'
    - Any "Configure" options that you selected during compilation of the
      library if applicable (see INSTALL)
    - OS Name, Version, Hardware platform
    - Compiler Details (name, version)
    - Application Details (name, version)
    - Problem Description (steps that will reproduce the problem, if known)
    - Stack Traceback (if the application dumps core)

 Just because something doesn't work the way you expect does not mean it
 is necessarily a bug in OpenSSL. Use the openssl-users email list for this type
 of query.

 HOW TO CONTRIBUTE TO OpenSSL
 ----------------------------

 See CONTRIBUTING

 LEGALITIES
 ----------

 A number of nations restrict the use or export of cryptography. If you
 are potentially subject to such restrictions you should seek competent
 professional legal advice before attempting to develop or distribute
 cryptographic code.