mirror of
https://github.com/openssl/openssl.git
synced 2024-12-27 06:21:43 +08:00
6c39d21a48
After December 31, 2023, SP 800-131Ar2 [0] no longer allows PKCS#1 v1.5 padding for RSA "key-transport" (aka encryption and decryption). There's a few good options to replace this usage in the RSA PCT, but the simplest is verifying m = (m^e)^d mod n, (where 1 < m < (n − 1)). This is specified in SP 800-56Br2 (Section 6.4.1.1) [1] and allowed by FIPS 140-3 IG 10.3.A. In OpenSSL, this corresponds to RSA_NO_PADDING. [0]: https://doi.org/10.6028/NIST.SP.800-131Ar2 [1]: https://doi.org/10.6028/NIST.SP.800-56Br2 Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Shane Lontis <shane.lontis@oracle.com> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/23832) |
||
---|---|---|
.. | ||
build.info | ||
rsa_acvp_test_params.c | ||
rsa_ameth.c | ||
rsa_asn1.c | ||
rsa_backend.c | ||
rsa_chk.c | ||
rsa_crpt.c | ||
rsa_depr.c | ||
rsa_err.c | ||
rsa_gen.c | ||
rsa_lib.c | ||
rsa_local.h | ||
rsa_meth.c | ||
rsa_mp_names.c | ||
rsa_mp.c | ||
rsa_none.c | ||
rsa_oaep.c | ||
rsa_ossl.c | ||
rsa_pk1.c | ||
rsa_pmeth.c | ||
rsa_prn.c | ||
rsa_pss.c | ||
rsa_saos.c | ||
rsa_schemes.c | ||
rsa_sign.c | ||
rsa_sp800_56b_check.c | ||
rsa_sp800_56b_gen.c | ||
rsa_x931.c | ||
rsa_x931g.c |