Lines Matching +full:fips +full:- +full:provider +full:- +full:validation
5 EVP_PKEY-DSA, EVP_KEYMGMT-DSA - EVP_PKEY DSA keytype and algorithm support
9 For B<DSA> the FIPS186-4 standard specifies that the values used for FFC
10 parameter generation are also required for parameter validation.
12 and I<gindex> may need to be stored for validation purposes. For B<DSA> these
14 validation is required.
19 L<EVP_PKEY-FFC(7)/FFC parameters>).
24 L<EVP_PKEY-FFC(7)/FFC key generation parameters>
32 =head2 DSA key validation
35 The OpenSSL FIPS provider conforms to the rules within the FIPS186-4
36 standard for FFC parameter validation. For backwards compatibility the OpenSSL
37 default provider uses a much simpler check (see below) for parameter validation,
41 A simple check of L and N and partial g is performed. The default provider
42 also supports validation of legacy "fips186_2" keys.
45 L<EVP_PKEY_pairwise_check(3)> the OpenSSL default and FIPS providers conform to
46 the rules within SP800-56Ar3 for public, private and pairwise tests respectively.
92 The following sections of FIPS186-4:
106 L<EVP_PKEY-FFC(7)>,
107 L<EVP_SIGNATURE-DSA(7)>
109 L<provider-keymgmt(7)>,
111 L<OSSL_PROVIDER-default(7)>,
112 L<OSSL_PROVIDER-FIPS(7)>
116 Copyright 2020-2022 The OpenSSL Project Authors. All Rights Reserved.