openssl/crypto/rsa
Joachim Vandersmissen 6c39d21a48 Replace PKCS#1 v1.5 padding in RSA PCT
After December 31, 2023, SP 800-131Ar2 [0] no longer allows PKCS#1 v1.5
padding for RSA "key-transport" (aka encryption and decryption).
There's a few good options to replace this usage in the RSA PCT, but
the simplest is verifying m = (m^e)^d mod n, (where 1 < m < (n − 1)).
This is specified in SP 800-56Br2 (Section 6.4.1.1) [1] and allowed by
FIPS 140-3 IG 10.3.A. In OpenSSL, this corresponds to RSA_NO_PADDING.

[0]: https://doi.org/10.6028/NIST.SP.800-131Ar2
[1]: https://doi.org/10.6028/NIST.SP.800-56Br2

Reviewed-by: Tomas Mraz <tomas@openssl.org>
Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Paul Dale <pauli@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/23832)
2024-08-22 07:24:29 +10:00
..
build.info
rsa_acvp_test_params.c
rsa_ameth.c
rsa_asn1.c
rsa_backend.c
rsa_chk.c
rsa_crpt.c
rsa_depr.c
rsa_err.c
rsa_gen.c Replace PKCS#1 v1.5 padding in RSA PCT 2024-08-22 07:24:29 +10:00
rsa_lib.c
rsa_local.h
rsa_meth.c
rsa_mp_names.c
rsa_mp.c Removed hard coded value for cap in function ossl_rsa_multip_cap 2024-05-30 14:46:06 +02:00
rsa_none.c
rsa_oaep.c Fix coverity-1604666 2024-07-17 16:30:55 +02:00
rsa_ossl.c Add RSA Signature restrictions for X9.31 padding in the FIPS provider. 2024-07-29 10:16:30 +10:00
rsa_pk1.c
rsa_pmeth.c
rsa_prn.c
rsa_pss.c Restrict salt length for RSA-PSS in the FIPS provider 2024-08-13 09:55:36 +10:00
rsa_saos.c
rsa_schemes.c Remove trailing whitespace 2024-07-22 06:55:35 -04:00
rsa_sign.c Enable RSA-SM3 in the default provider 2024-08-21 08:21:06 +02:00
rsa_sp800_56b_check.c
rsa_sp800_56b_gen.c
rsa_x931.c Add RSA Signature restrictions for X9.31 padding in the FIPS provider. 2024-07-29 10:16:30 +10:00
rsa_x931g.c