Home
last modified time | relevance | path

Searched refs:RSA (Results 101 – 125 of 275) sorted by relevance

1234567891011

/openssl/providers/common/include/prov/
H A Dder_rsa.h.in18 'providers/common/der/RSA.asn1',
27 int ossl_DER_w_algorithmIdentifier_RSA(WPACKET *pkt, int tag, RSA *rsa);
/openssl/crypto/rsa/
H A Drsa_saos.c26 RSA *rsa) in RSA_sign_ASN1_OCTET_STRING()
60 unsigned int siglen, RSA *rsa) in RSA_verify_ASN1_OCTET_STRING()
H A Drsa_gen.c30 static int rsa_keygen_pairwise_test(RSA *rsa, OSSL_CALLBACK *cb, void *cbarg);
31 static int rsa_keygen(OSSL_LIB_CTX *libctx, RSA *rsa, int bits, int primes,
41 int RSA_generate_key_ex(RSA *rsa, int bits, BIGNUM *e_value, BN_GENCB *cb) in RSA_generate_key_ex()
50 int RSA_generate_multi_prime_key(RSA *rsa, int bits, int primes, in RSA_generate_multi_prime_key()
82 int ossl_rsa_multiprime_derive(RSA *rsa, int bits, int primes, in DEFINE_STACK_OF()
258 static int rsa_multiprime_keygen(RSA *rsa, int bits, int primes, in rsa_multiprime_keygen()
604 static int rsa_keygen(OSSL_LIB_CTX *libctx, RSA *rsa, int bits, int primes, in rsa_keygen()
677 static int rsa_keygen_pairwise_test(RSA *rsa, OSSL_CALLBACK *cb, void *cbarg) in rsa_keygen_pairwise_test()
H A Drsa_sp800_56b_check.c24 int ossl_rsa_check_crt_components(const RSA *rsa, BN_CTX *ctx) in ossl_rsa_check_crt_components()
175 int ossl_rsa_check_private_exponent(const RSA *rsa, int nbits, BN_CTX *ctx) in ossl_rsa_check_private_exponent()
281 int ossl_rsa_sp800_56b_check_public(const RSA *rsa)
356 int ossl_rsa_sp800_56b_check_private(const RSA *rsa)
374 int ossl_rsa_sp800_56b_check_keypair(const RSA *rsa, const BIGNUM *efixed,
H A Drsa_ameth.c32 const RSA *rsa = pkey->pkey.rsa; in rsa_param_encode()
81 RSA *rsa = NULL; in rsa_pub_decode()
132 RSA *rsa; in old_rsa_priv_decode()
176 RSA *rsa = ossl_rsa_key_from_pkcs8(p8, NULL, NULL); in rsa_priv_decode()
302 const RSA *x = pkey->pkey.rsa; in pkey_rsa_print()
798 RSA *rsa = from->pkey.rsa; in rsa_int_export_to()
854 RSA *rsa = ossl_rsa_new_with_ctx(pctx->libctx); in rsa_int_import_from()
949 RSA *rsa = from->pkey.rsa; in rsa_pkey_copy()
950 RSA *dupkey = NULL; in rsa_pkey_copy()
H A Drsa_sp800_56b_gen.c55 int ossl_rsa_fips186_4_gen_prob_primes(RSA *rsa, RSA_ACVP_TEST *test, in ossl_rsa_fips186_4_gen_prob_primes()
237 int ossl_rsa_sp800_56b_derive_params_from_pq(RSA *rsa, int nbits, in ossl_rsa_sp800_56b_derive_params_from_pq()
365 int ossl_rsa_sp800_56b_generate_key(RSA *rsa, int nbits, const BIGNUM *efixed, in ossl_rsa_sp800_56b_generate_key()
437 int ossl_rsa_sp800_56b_pairwise_test(RSA *rsa, BN_CTX *ctx) in ossl_rsa_sp800_56b_pairwise_test()
/openssl/doc/man3/
H A DEVP_PKEY_CTX_ctrl.pod223 in a signature. It can be used in the RSA, DSA and ECDSA algorithms.
226 in a signature. It can be used in the RSA, DSA and ECDSA algorithms.
248 =head2 RSA parameters
304 EVP_PKEY_CTX_set_rsa_keygen_bits() sets the RSA key length for
305 RSA key generation to I<bits>. If not specified 2048 bits is used.
318 RSA key generation to I<primes>. If not specified 2 is used.
320 EVP_PKEY_CTX_set_rsa_mgf1_md_name() sets the MGF1 digest for RSA
321 padding schemes to the digest named I<mdname>. If the RSA algorithm
344 used in RSA OAEP to the digest named I<mdname>. If the RSA algorithm
372 EVP_PKEY_CTX_get0_rsa_oaep_label() gets the RSA OAEP label to
[all …]
H A DEVP_PKEY_is_a.pod31 calls I<fn> with each name and I<data>. For example, an RSA B<EVP_PKEY> may
32 be named both C<RSA> and C<rsaEncryption>.
74 that the default provider supports RSA, DH, DSA and EC keys, so we can use
81 if (EVP_PKEY_is_a(pkey, "RSA")) {
H A DSSL_CTX_set_security_level.pod76 parameters offering below 80 bits of security are excluded. As a result RSA,
86 Security level set to 112 bits of security. As a result RSA, DSA and DH keys
93 Security level set to 128 bits of security. As a result RSA, DSA and DH keys
100 Security level set to 192 bits of security. As a result RSA, DSA and
106 Security level set to 256 bits of security. As a result RSA, DSA and DH keys
141 of security requires the use of RSA keys of at least 15360 bits in size.
150 also blocked. For example trying to set a certificate using a 512 bit RSA key
H A DRSA_print.pod17 int RSA_print(BIO *bp, const RSA *x, int offset);
18 int RSA_print_fp(FILE *fp, const RSA *x, int offset);
46 A human-readable hexadecimal output of the components of the RSA
H A DRSA_sign_ASN1_OCTET_STRING.pod5 RSA_sign_ASN1_OCTET_STRING, RSA_verify_ASN1_OCTET_STRING - RSA signatures
17 unsigned int *siglen, RSA *rsa);
21 unsigned int siglen, RSA *rsa);
H A DEVP_PKEY_fromdata.pod20 provided key data, such as I<n>, I<e> and I<d> for a minimal RSA
39 L<B<EVP_PKEY-RSA>(7)|EVP_PKEY-RSA(7)/Common RSA parameters>,
106 =head2 Creating an RSA keypair using raw key data
128 EVP_PKEY_CTX *ctx = EVP_PKEY_CTX_new_from_name(NULL, "RSA", NULL);
262 L<EVP_PKEY-RSA(7)>, L<EVP_PKEY-DSA(7)>, L<EVP_PKEY-DH(7)>, L<EVP_PKEY-EC(7)>,
H A DRSA_sign.pod5 RSA_sign, RSA_verify - RSA signatures
16 unsigned char *sigret, unsigned int *siglen, RSA *rsa);
19 unsigned char *sigbuf, unsigned int siglen, RSA *rsa);
H A DRSA_public_encrypt.pod5 RSA_public_encrypt, RSA_private_decrypt - RSA public key cryptography
16 unsigned char *to, RSA *rsa, int padding);
19 unsigned char *to, RSA *rsa, int padding);
49 Raw RSA encryption. This mode should I<only> be used to implement
51 Encrypting user data directly with RSA is insecure.
H A DSSL_CIPHER_get_name.pod134 Key exchange method such as B<RSA>, B<ECDHE>, etc.
138 Authentication method such as B<RSA>, B<None>, etc.. None is the
153 ECDHE-RSA-AES256-GCM-SHA256 TLSv1.2 Kx=ECDH Au=RSA Enc=AESGCM(256) Mac=AEAD
154 RSA-PSK-AES256-CBC-SHA384 TLSv1.0 Kx=RSAPSK Au=RSA Enc=AES(256) Mac=SHA384
/openssl/demos/cms/
H A Dsigner.pem26 -----BEGIN RSA PRIVATE KEY-----
52 -----END RSA PRIVATE KEY-----
/openssl/demos/smime/
H A Dsigner.pem26 -----BEGIN RSA PRIVATE KEY-----
52 -----END RSA PRIVATE KEY-----
/openssl/test/ssl-tests/
H A D01-simple.cnf.in25 server => { "ClientSignatureAlgorithms" => "PSS+SHA512:RSA+SHA512" },
26 client => { "SignatureAlgorithms" => "PSS+SHA256:RSA+SHA256" },
/openssl/apps/
H A Dserver2.pem26 -----BEGIN RSA PRIVATE KEY-----
52 -----END RSA PRIVATE KEY-----
H A Dclient.pem26 -----BEGIN RSA PRIVATE KEY-----
52 -----END RSA PRIVATE KEY-----
/openssl/doc/designs/
H A Dfips_indicator.md27 …d Algorithms not allowed in the approved mode of operation’. An example is RSA with a keysize of <…
280 - RSA encryption(for key agreement/key transport) using PKCSV15 is no longer allowed. (Note that th…
281 Padding mode updates required. Check RSA KEM also.
282 - RSA signing using PKCS1 is still allowed (i.e. signature uses shaXXXWithRSAEncryption)
283 - RSA signing using X931 is no longer allowed. (Still allowed for verification). Check if PSS saltl…
284RSA (From SP800-131Ar2) RSA >= 2048 is approved for keygen, signatures and key transport. Verifica…
304 - Any signature algorithms such as RSA, DSA, ECDSA.
310 ECDSA and RSA-PSS Signatures allow use of SHAKE.
/openssl/test/
H A Drsa_sp800_56b_test.c224 RSA *key = NULL; in test_check_private_exponent()
285 RSA *key = NULL; in test_check_crt_components()
359 RSA *key = NULL; in test_derive_params_from_pq_fail()
413 RSA *key = NULL; in test_invalid_keypair()
489 RSA *key = NULL; in test_sp80056b_keygen()
507 RSA *key = NULL; in test_check_private_key()
540 RSA *key = NULL; in test_check_public_key()
/openssl/providers/common/
H A Dsecuritycheck.c25 int ossl_rsa_key_op_get_protect(const RSA *rsa, int operation, int *outprotect) in ossl_rsa_key_op_get_protect()
67 int ossl_rsa_check_key_size(const RSA *rsa, int protect) in ossl_rsa_check_key_size()
/openssl/providers/common/der/
H A Dbuild.info14 #----- RSA
22 DEPEND[$DER_RSA_GEN]=oids_to_c.pm NIST.asn1 RSA.asn1
27 DEPEND[$DER_RSA_H]=oids_to_c.pm NIST.asn1 RSA.asn1
/openssl/doc/man1/
H A Dopenssl-genpkey.pod.in87 Valid built-in algorithm names for private key generation are RSA, RSA-PSS, EC,
141 =head2 RSA Key Generation Options
155 The RSA public exponent value. This can be a large decimal or
160 =head2 RSA-PSS Key Generation Options
162 Note: by default an B<RSA-PSS> key has no parameter restrictions.
169 These options have the same meaning as the B<RSA> algorithm.
413 Generate an RSA private key using default parameters:
415 openssl genpkey -algorithm RSA -out key.pem
419 openssl genpkey -algorithm RSA -out key.pem -aes-128-cbc -pass pass:hello
421 Generate a 2048 bit RSA key using 3 as the public exponent:
[all …]

Completed in 44 milliseconds

1234567891011