Print this page
Raise max RSA keysize (WIP)

Split Close
Expand all
Collapse all
          --- old/usr/src/uts/common/crypto/io/dprov.c
          +++ new/usr/src/uts/common/crypto/io/dprov.c
↓ open down ↓ 281 lines elided ↑ open up ↑
 282  282  #define BLOWFISH_MIN_KEY_LEN    32      /* Blowfish min key length in bits */
 283  283  #define BLOWFISH_MAX_KEY_LEN    448     /* Blowfish max key length in bits */
 284  284  
 285  285  #define AES_MIN_KEY_LEN         16      /* AES min key length in bytes */
 286  286  #define AES_MAX_KEY_LEN         32      /* AES max key length in bytes */
 287  287  
 288  288  #define ARCFOUR_MIN_KEY_BITS    40      /* RC4 min supported key size */
 289  289  #define ARCFOUR_MAX_KEY_BITS    2048    /* RC4 max supported key size */
 290  290  
 291  291  #define RSA_MIN_KEY_LEN         256     /* RSA min key length in bits */
 292      -#define RSA_MAX_KEY_LEN         4096    /* RSA max key length in bits */
      292 +#define RSA_MAX_KEY_LEN         16384   /* RSA max key length in bits */
 293  293  
 294  294  #define DH_MIN_KEY_LEN          64      /* DH min key length in bits */
 295      -#define DH_MAX_KEY_LEN          4096    /* DH max key length in bits */
      295 +#define DH_MAX_KEY_LEN          16384   /* DH max key length in bits */
 296  296  
 297  297  #define DPROV_CKM_MD5_KEY_DERIVATION    "CKM_MD5_KEY_DERIVATION"
 298  298  #define DPROV_CKM_SHA1_KEY_DERIVATION   "CKM_SHA1_KEY_DERIVATION"
 299  299  #define DPROV_CKM_SHA256_KEY_DERIVATION "CKM_SHA256_KEY_DERIVATION"
 300  300  #define DPROV_CKM_SHA384_KEY_DERIVATION "CKM_SHA384_KEY_DERIVATION"
 301  301  #define DPROV_CKM_SHA512_KEY_DERIVATION "CKM_SHA512_KEY_DERIVATION"
 302  302  #define DPROV_CKM_DES_KEY_GEN           "CKM_DES_KEY_GEN"
 303  303  #define DPROV_CKM_DES3_KEY_GEN          "CKM_DES3_KEY_GEN"
 304  304  #define DPROV_CKM_AES_KEY_GEN           "CKM_AES_KEY_GEN"
 305  305  #define DPROV_CKM_BLOWFISH_KEY_GEN      "CKM_BLOWFISH_KEY_GEN"
↓ open down ↓ 9500 lines elided ↑ open up ↑
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX