RSA icon indicating copy to clipboard operation
RSA copied to clipboard

RSA implementation in pure Rust

Results 65 RSA issues
Sort by recently updated
recently updated
newest added

Hey there, I just noticed that it is extremely easy when using the PEM encoding traits to accidentally generate a public key when you mean to generate a private key...

discussion
api

I was testing PKCS#1 v1.5 signature verification as implemented in RustCrypto-RSA and noticed it rejects valid signature whose encoded message uses an implicit NULL parameter for hash algorithm (where digestAlgorithm...

needs response from author

Extracted from https://github.com/RustCrypto/RSA/pull/104#discussion_r676037649

good first issue
tests

Hi there, I'm the author of sidefuzz (https://github.com/phayes/sidefuzz) and I have found what appears to be variable-time behavior in the `rsa::internals::encrypt()` function. Specifically, `rsa::internals::encrypt()` appears to be variable-time in relation...

security

Hi there, I was wondering if you could hook up code-coverage reporting (I personally like codecov, but coveralls and others would be fine too). Once this is done, I will...

help wanted
ci

We could add how to use this crate : dependency to add in cargo.toml file how to import the package in our own crate ? how to generate private and...

help wanted
docs

Probably using: https://github.com/rust-fuzz/cargo-fuzz

enhancement

Hi, encrypting a 3789 byte size string with a 4096 bit public key will trigger a crash with the following message: "MessageTooLong" The padding I was using is pkcs1v15 What's...

`EncodePublicKey`/`DecodePublicKey` implementations are limited to plain RSA keys only. Add support for encoding and decoding RSASSA-PSS (and RSAEP-OAEP) keys to/from DER data. Additional notice: ideally the code should be able...

enhancement

This is rather intrusive implementation. It reworks the way `RsaPrivateKey` is organized. Unfortunately it also meant that default `Serialize` an `Deserilialize` derivations provide a list of tokens that are not...