Home
last modified time | relevance | path

Searched refs:RSA (Results 126 – 150 of 268) sorted by relevance

1234567891011

/openssl/include/crypto/
H A Dtypes.h17 typedef struct rsa_st RSA; typedef
H A Dx509.h343 RSA *ossl_d2i_RSA_PSS_PUBKEY(RSA **a, const unsigned char **pp, long length);
344 int ossl_i2d_RSA_PSS_PUBKEY(const RSA *a, unsigned char **pp);
/openssl/doc/man3/
H A DEVP_PKEY_encrypt.pod54 Encrypt data using OAEP (for RSA keys). See also L<PEM_read_PUBKEY(3)> or
56 set 'eng = NULL;' to start with the default OpenSSL RSA implementation:
70 * and that key is an RSA public key
H A DPKCS7_encrypt.pod26 Only RSA keys are supported in PKCS#7 and envelopedData so the recipient
27 certificates supplied to this function must all contain RSA public keys, though
28 they do not have to be signed using the RSA algorithm.
H A DEVP_PKEY_check.pod56 L<EVP_PKEY-RSA(7)/RSA key validation>.
82 L<EVP_PKEY-RSA(7)>,
H A DEVP_PKEY_set1_RSA.pod31 int EVP_PKEY_set1_RSA(EVP_PKEY *pkey, RSA *key);
36 RSA *EVP_PKEY_get1_RSA(EVP_PKEY *pkey);
44 const RSA *EVP_PKEY_get0_RSA(const EVP_PKEY *pkey);
50 int EVP_PKEY_assign_RSA(EVP_PKEY *pkey, RSA *key);
63 an RSA key will return B<EVP_PKEY_RSA>.
68 For example an RSA key could use the NIDs corresponding to
/openssl/test/ssl-tests/
H A D04-client_auth.cnf143 ExpectedClientCertType = RSA
234 ExpectedClientCertType = RSA
379 ExpectedClientCertType = RSA
413 ExpectedClientCertType = RSA
562 ExpectedClientCertType = RSA
596 ExpectedClientCertType = RSA
746 ExpectedClientCertType = RSA
748 ExpectedClientSignType = RSA
852 ExpectedClientCertType = RSA
854 ExpectedClientSignType = RSA
[all …]
H A D01-simple.cnf44 ClientSignatureAlgorithms = PSS+SHA512:RSA+SHA512
49 SignatureAlgorithms = PSS+SHA256:RSA+SHA256
/openssl/test/smime-certs/
H A Dca.cnf37 # certificate with key usage restrictions compatible with RSA keys
64 # end-entity certificate compatible with RSA and ECC keys
/openssl/include/openssl/
H A Dx509.h.in387 OSSL_DEPRECATEDIN_3_0 RSA *d2i_RSAPrivateKey_fp(FILE *fp, RSA **rsa);
388 OSSL_DEPRECATEDIN_3_0 int i2d_RSAPrivateKey_fp(FILE *fp, const RSA *rsa);
389 OSSL_DEPRECATEDIN_3_0 RSA *d2i_RSAPublicKey_fp(FILE *fp, RSA **rsa);
390 OSSL_DEPRECATEDIN_3_0 int i2d_RSAPublicKey_fp(FILE *fp, const RSA *rsa);
391 OSSL_DEPRECATEDIN_3_0 RSA *d2i_RSA_PUBKEY_fp(FILE *fp, RSA **rsa);
392 OSSL_DEPRECATEDIN_3_0 int i2d_RSA_PUBKEY_fp(FILE *fp, const RSA *rsa);
435 OSSL_DEPRECATEDIN_3_0 RSA *d2i_RSAPrivateKey_bio(BIO *bp, RSA **rsa);
437 OSSL_DEPRECATEDIN_3_0 RSA *d2i_RSAPublicKey_bio(BIO *bp, RSA **rsa);
438 OSSL_DEPRECATEDIN_3_0 int i2d_RSAPublicKey_bio(BIO *bp, const RSA *rsa);
439 OSSL_DEPRECATEDIN_3_0 RSA *d2i_RSA_PUBKEY_bio(BIO *bp, RSA **rsa);
[all …]
H A Dcore_names.h.in83 /* RSA padding modes */
90 /* RSA pss padding salt length */
/openssl/doc/man1/
H A Dopenssl-pkeyutl.pod.in73 used. For signature algorithms like RSA, DSA and ECDSA, SHA-256 will be the
217 the key modulus with RSA. In case of ECDSA and DSA the data shouldn't be longer
225 =head1 RSA ALGORITHM
227 The RSA algorithm generally supports the encrypt, decrypt, sign,
236 This sets the RSA padding mode. Acceptable values for I<mode> are B<pkcs1> for
289 =head1 RSA-PSS ALGORITHM
291 The RSA-PSS algorithm is a restricted version of the RSA algorithm which only
300 These have the same meaning as the B<RSA> algorithm with some additional
374 Recover the signed data (e.g. if an RSA key is used):
382 Sign data using a message digest value (this is currently only valid for RSA):
/openssl/apps/
H A Drsa8192.pem1 -----BEGIN RSA PRIVATE KEY-----
99 -----END RSA PRIVATE KEY-----
/openssl/crypto/rsa/
H A Drsa_sign.c272 unsigned char *sigret, unsigned int *siglen, RSA *rsa) in RSA_sign()
331 const unsigned char *sigbuf, size_t siglen, RSA *rsa) in ossl_rsa_verify()
446 const unsigned char *sigbuf, unsigned int siglen, RSA *rsa) in RSA_verify()
H A Drsa_acvp_test_params.c79 int ossl_rsa_acvp_test_set_params(RSA *r, const OSSL_PARAM params[]) in ossl_rsa_acvp_test_set_params()
125 int ossl_rsa_acvp_test_get_params(RSA *r, OSSL_PARAM params[]) in ossl_rsa_acvp_test_get_params()
/openssl/crypto/pem/
H A Dpvkfmt.c448 RSA *ossl_b2i_RSA_after_header(const unsigned char **in, unsigned int bitlen, in ossl_b2i_RSA_after_header()
454 RSA *rsa = NULL; in ossl_b2i_RSA_after_header()
559 static int check_bitlen_rsa(const RSA *rsa, int ispub, unsigned int *magic);
560 static void write_rsa(unsigned char **out, const RSA *rsa, int ispub);
636 static int check_bitlen_rsa(const RSA *rsa, int ispub, unsigned int *pmagic) in check_bitlen_rsa()
676 static void write_rsa(unsigned char **out, const RSA *rsa, int ispub) in write_rsa()
982 RSA *b2i_RSA_PVK_bio_ex(BIO *in, pem_password_cb *cb, void *u, in b2i_RSA_PVK_bio_ex()
991 RSA *b2i_RSA_PVK_bio(BIO *in, pem_password_cb *cb, void *u) in b2i_RSA_PVK_bio()
/openssl/crypto/evp/
H A Dp_enc.c25 RSA *rsa = NULL; in EVP_PKEY_encrypt_old()
H A Dp_dec.c25 RSA *rsa = NULL; in EVP_PKEY_decrypt_old()
/openssl/test/recipes/90-test_sysdefault_data/
H A Dsysdefault-ignore.cnf21 SignatureAlgorithms = RSA+SHA256:nonex
H A Dsysdefault.cnf21 SignatureAlgorithms = RSA+SHA256:?nonex
H A Dsysdefault-bad.cnf21 SignatureAlgorithms = RSA+SHA256:nonex
/openssl/doc/designs/
H A Dpassing-algorithmidentifier-parameters.md120 (for example, the `RSA` structure can also carry RSA-PSS parameters).
148 - [RSA-OAEP](https://www.rfc-editor.org/rfc/rfc8017#appendix-A.2.1)
149 - [RSA-PSS](https://www.rfc-editor.org/rfc/rfc8017#appendix-A.2.3)
/openssl/demos/bio/
H A Dconnect.cnf15 SignatureAlgorithms = RSA+SHA512:ECDSA+SHA512
/openssl/test/
H A Drsa_x931_test.c24 RSA *rsa = NULL; in test_rsa_x931_keygen()
/openssl/providers/common/include/prov/
H A Dsecuritycheck.h13 int ossl_rsa_check_key(OSSL_LIB_CTX *ctx, const RSA *rsa, int operation);

Completed in 66 milliseconds

1234567891011