/openssl/providers/common/include/prov/ |
H A D | der_rsa.h.in | 18 'providers/common/der/RSA.asn1', 27 int ossl_DER_w_algorithmIdentifier_RSA(WPACKET *pkt, int tag, RSA *rsa);
|
/openssl/crypto/rsa/ |
H A D | rsa_saos.c | 26 RSA *rsa) in RSA_sign_ASN1_OCTET_STRING() 60 unsigned int siglen, RSA *rsa) in RSA_verify_ASN1_OCTET_STRING()
|
H A D | rsa_gen.c | 30 static int rsa_keygen_pairwise_test(RSA *rsa, OSSL_CALLBACK *cb, void *cbarg); 31 static int rsa_keygen(OSSL_LIB_CTX *libctx, RSA *rsa, int bits, int primes, 41 int RSA_generate_key_ex(RSA *rsa, int bits, BIGNUM *e_value, BN_GENCB *cb) in RSA_generate_key_ex() 50 int RSA_generate_multi_prime_key(RSA *rsa, int bits, int primes, in RSA_generate_multi_prime_key() 82 int ossl_rsa_multiprime_derive(RSA *rsa, int bits, int primes, in DEFINE_STACK_OF() 258 static int rsa_multiprime_keygen(RSA *rsa, int bits, int primes, in rsa_multiprime_keygen() 604 static int rsa_keygen(OSSL_LIB_CTX *libctx, RSA *rsa, int bits, int primes, in rsa_keygen() 677 static int rsa_keygen_pairwise_test(RSA *rsa, OSSL_CALLBACK *cb, void *cbarg) in rsa_keygen_pairwise_test()
|
H A D | rsa_sp800_56b_check.c | 24 int ossl_rsa_check_crt_components(const RSA *rsa, BN_CTX *ctx) in ossl_rsa_check_crt_components() 175 int ossl_rsa_check_private_exponent(const RSA *rsa, int nbits, BN_CTX *ctx) in ossl_rsa_check_private_exponent() 281 int ossl_rsa_sp800_56b_check_public(const RSA *rsa) 356 int ossl_rsa_sp800_56b_check_private(const RSA *rsa) 374 int ossl_rsa_sp800_56b_check_keypair(const RSA *rsa, const BIGNUM *efixed,
|
H A D | rsa_ameth.c | 32 const RSA *rsa = pkey->pkey.rsa; in rsa_param_encode() 81 RSA *rsa = NULL; in rsa_pub_decode() 132 RSA *rsa; in old_rsa_priv_decode() 176 RSA *rsa = ossl_rsa_key_from_pkcs8(p8, NULL, NULL); in rsa_priv_decode() 302 const RSA *x = pkey->pkey.rsa; in pkey_rsa_print() 798 RSA *rsa = from->pkey.rsa; in rsa_int_export_to() 854 RSA *rsa = ossl_rsa_new_with_ctx(pctx->libctx); in rsa_int_import_from() 949 RSA *rsa = from->pkey.rsa; in rsa_pkey_copy() 950 RSA *dupkey = NULL; in rsa_pkey_copy()
|
H A D | rsa_sp800_56b_gen.c | 55 int ossl_rsa_fips186_4_gen_prob_primes(RSA *rsa, RSA_ACVP_TEST *test, in ossl_rsa_fips186_4_gen_prob_primes() 237 int ossl_rsa_sp800_56b_derive_params_from_pq(RSA *rsa, int nbits, in ossl_rsa_sp800_56b_derive_params_from_pq() 365 int ossl_rsa_sp800_56b_generate_key(RSA *rsa, int nbits, const BIGNUM *efixed, in ossl_rsa_sp800_56b_generate_key() 437 int ossl_rsa_sp800_56b_pairwise_test(RSA *rsa, BN_CTX *ctx) in ossl_rsa_sp800_56b_pairwise_test()
|
/openssl/doc/man3/ |
H A D | EVP_PKEY_CTX_ctrl.pod | 223 in a signature. It can be used in the RSA, DSA and ECDSA algorithms. 226 in a signature. It can be used in the RSA, DSA and ECDSA algorithms. 248 =head2 RSA parameters 304 EVP_PKEY_CTX_set_rsa_keygen_bits() sets the RSA key length for 305 RSA key generation to I<bits>. If not specified 2048 bits is used. 318 RSA key generation to I<primes>. If not specified 2 is used. 320 EVP_PKEY_CTX_set_rsa_mgf1_md_name() sets the MGF1 digest for RSA 321 padding schemes to the digest named I<mdname>. If the RSA algorithm 344 used in RSA OAEP to the digest named I<mdname>. If the RSA algorithm 372 EVP_PKEY_CTX_get0_rsa_oaep_label() gets the RSA OAEP label to [all …]
|
H A D | EVP_PKEY_is_a.pod | 31 calls I<fn> with each name and I<data>. For example, an RSA B<EVP_PKEY> may 32 be named both C<RSA> and C<rsaEncryption>. 74 that the default provider supports RSA, DH, DSA and EC keys, so we can use 81 if (EVP_PKEY_is_a(pkey, "RSA")) {
|
H A D | SSL_CTX_set_security_level.pod | 76 parameters offering below 80 bits of security are excluded. As a result RSA, 86 Security level set to 112 bits of security. As a result RSA, DSA and DH keys 93 Security level set to 128 bits of security. As a result RSA, DSA and DH keys 100 Security level set to 192 bits of security. As a result RSA, DSA and 106 Security level set to 256 bits of security. As a result RSA, DSA and DH keys 141 of security requires the use of RSA keys of at least 15360 bits in size. 150 also blocked. For example trying to set a certificate using a 512 bit RSA key
|
H A D | RSA_print.pod | 17 int RSA_print(BIO *bp, const RSA *x, int offset); 18 int RSA_print_fp(FILE *fp, const RSA *x, int offset); 46 A human-readable hexadecimal output of the components of the RSA
|
H A D | RSA_sign_ASN1_OCTET_STRING.pod | 5 RSA_sign_ASN1_OCTET_STRING, RSA_verify_ASN1_OCTET_STRING - RSA signatures 17 unsigned int *siglen, RSA *rsa); 21 unsigned int siglen, RSA *rsa);
|
H A D | EVP_PKEY_fromdata.pod | 20 provided key data, such as I<n>, I<e> and I<d> for a minimal RSA 39 L<B<EVP_PKEY-RSA>(7)|EVP_PKEY-RSA(7)/Common RSA parameters>, 106 =head2 Creating an RSA keypair using raw key data 128 EVP_PKEY_CTX *ctx = EVP_PKEY_CTX_new_from_name(NULL, "RSA", NULL); 262 L<EVP_PKEY-RSA(7)>, L<EVP_PKEY-DSA(7)>, L<EVP_PKEY-DH(7)>, L<EVP_PKEY-EC(7)>,
|
H A D | RSA_sign.pod | 5 RSA_sign, RSA_verify - RSA signatures 16 unsigned char *sigret, unsigned int *siglen, RSA *rsa); 19 unsigned char *sigbuf, unsigned int siglen, RSA *rsa);
|
H A D | RSA_public_encrypt.pod | 5 RSA_public_encrypt, RSA_private_decrypt - RSA public key cryptography 16 unsigned char *to, RSA *rsa, int padding); 19 unsigned char *to, RSA *rsa, int padding); 49 Raw RSA encryption. This mode should I<only> be used to implement 51 Encrypting user data directly with RSA is insecure.
|
H A D | SSL_CIPHER_get_name.pod | 134 Key exchange method such as B<RSA>, B<ECDHE>, etc. 138 Authentication method such as B<RSA>, B<None>, etc.. None is the 153 ECDHE-RSA-AES256-GCM-SHA256 TLSv1.2 Kx=ECDH Au=RSA Enc=AESGCM(256) Mac=AEAD 154 RSA-PSK-AES256-CBC-SHA384 TLSv1.0 Kx=RSAPSK Au=RSA Enc=AES(256) Mac=SHA384
|
/openssl/demos/cms/ |
H A D | signer.pem | 26 -----BEGIN RSA PRIVATE KEY----- 52 -----END RSA PRIVATE KEY-----
|
/openssl/demos/smime/ |
H A D | signer.pem | 26 -----BEGIN RSA PRIVATE KEY----- 52 -----END RSA PRIVATE KEY-----
|
/openssl/test/ssl-tests/ |
H A D | 01-simple.cnf.in | 25 server => { "ClientSignatureAlgorithms" => "PSS+SHA512:RSA+SHA512" }, 26 client => { "SignatureAlgorithms" => "PSS+SHA256:RSA+SHA256" },
|
/openssl/apps/ |
H A D | server2.pem | 26 -----BEGIN RSA PRIVATE KEY----- 52 -----END RSA PRIVATE KEY-----
|
H A D | client.pem | 26 -----BEGIN RSA PRIVATE KEY----- 52 -----END RSA PRIVATE KEY-----
|
/openssl/doc/designs/ |
H A D | fips_indicator.md | 27 …d Algorithms not allowed in the approved mode of operation’. An example is RSA with a keysize of <… 280 - RSA encryption(for key agreement/key transport) using PKCSV15 is no longer allowed. (Note that th… 281 Padding mode updates required. Check RSA KEM also. 282 - RSA signing using PKCS1 is still allowed (i.e. signature uses shaXXXWithRSAEncryption) 283 - RSA signing using X931 is no longer allowed. (Still allowed for verification). Check if PSS saltl… 284 …RSA (From SP800-131Ar2) RSA >= 2048 is approved for keygen, signatures and key transport. Verifica… 304 - Any signature algorithms such as RSA, DSA, ECDSA. 310 ECDSA and RSA-PSS Signatures allow use of SHAKE.
|
/openssl/test/ |
H A D | rsa_sp800_56b_test.c | 224 RSA *key = NULL; in test_check_private_exponent() 285 RSA *key = NULL; in test_check_crt_components() 359 RSA *key = NULL; in test_derive_params_from_pq_fail() 413 RSA *key = NULL; in test_invalid_keypair() 489 RSA *key = NULL; in test_sp80056b_keygen() 507 RSA *key = NULL; in test_check_private_key() 540 RSA *key = NULL; in test_check_public_key()
|
/openssl/providers/common/ |
H A D | securitycheck.c | 25 int ossl_rsa_key_op_get_protect(const RSA *rsa, int operation, int *outprotect) in ossl_rsa_key_op_get_protect() 67 int ossl_rsa_check_key_size(const RSA *rsa, int protect) in ossl_rsa_check_key_size()
|
/openssl/providers/common/der/ |
H A D | build.info | 14 #----- RSA 22 DEPEND[$DER_RSA_GEN]=oids_to_c.pm NIST.asn1 RSA.asn1 27 DEPEND[$DER_RSA_H]=oids_to_c.pm NIST.asn1 RSA.asn1
|
/openssl/doc/man1/ |
H A D | openssl-genpkey.pod.in | 87 Valid built-in algorithm names for private key generation are RSA, RSA-PSS, EC, 141 =head2 RSA Key Generation Options 155 The RSA public exponent value. This can be a large decimal or 160 =head2 RSA-PSS Key Generation Options 162 Note: by default an B<RSA-PSS> key has no parameter restrictions. 169 These options have the same meaning as the B<RSA> algorithm. 413 Generate an RSA private key using default parameters: 415 openssl genpkey -algorithm RSA -out key.pem 419 openssl genpkey -algorithm RSA -out key.pem -aes-128-cbc -pass pass:hello 421 Generate a 2048 bit RSA key using 3 as the public exponent: [all …]
|