/openssl/include/crypto/ |
H A D | types.h | 17 typedef struct rsa_st RSA; typedef
|
H A D | x509.h | 343 RSA *ossl_d2i_RSA_PSS_PUBKEY(RSA **a, const unsigned char **pp, long length); 344 int ossl_i2d_RSA_PSS_PUBKEY(const RSA *a, unsigned char **pp);
|
/openssl/doc/man3/ |
H A D | EVP_PKEY_encrypt.pod | 54 Encrypt data using OAEP (for RSA keys). See also L<PEM_read_PUBKEY(3)> or 56 set 'eng = NULL;' to start with the default OpenSSL RSA implementation: 70 * and that key is an RSA public key
|
H A D | PKCS7_encrypt.pod | 26 Only RSA keys are supported in PKCS#7 and envelopedData so the recipient 27 certificates supplied to this function must all contain RSA public keys, though 28 they do not have to be signed using the RSA algorithm.
|
H A D | EVP_PKEY_check.pod | 56 L<EVP_PKEY-RSA(7)/RSA key validation>. 82 L<EVP_PKEY-RSA(7)>,
|
H A D | EVP_PKEY_set1_RSA.pod | 31 int EVP_PKEY_set1_RSA(EVP_PKEY *pkey, RSA *key); 36 RSA *EVP_PKEY_get1_RSA(EVP_PKEY *pkey); 44 const RSA *EVP_PKEY_get0_RSA(const EVP_PKEY *pkey); 50 int EVP_PKEY_assign_RSA(EVP_PKEY *pkey, RSA *key); 63 an RSA key will return B<EVP_PKEY_RSA>. 68 For example an RSA key could use the NIDs corresponding to
|
/openssl/test/ssl-tests/ |
H A D | 04-client_auth.cnf | 143 ExpectedClientCertType = RSA 234 ExpectedClientCertType = RSA 379 ExpectedClientCertType = RSA 413 ExpectedClientCertType = RSA 562 ExpectedClientCertType = RSA 596 ExpectedClientCertType = RSA 746 ExpectedClientCertType = RSA 748 ExpectedClientSignType = RSA 852 ExpectedClientCertType = RSA 854 ExpectedClientSignType = RSA [all …]
|
H A D | 01-simple.cnf | 44 ClientSignatureAlgorithms = PSS+SHA512:RSA+SHA512 49 SignatureAlgorithms = PSS+SHA256:RSA+SHA256
|
/openssl/test/smime-certs/ |
H A D | ca.cnf | 37 # certificate with key usage restrictions compatible with RSA keys 64 # end-entity certificate compatible with RSA and ECC keys
|
/openssl/include/openssl/ |
H A D | x509.h.in | 387 OSSL_DEPRECATEDIN_3_0 RSA *d2i_RSAPrivateKey_fp(FILE *fp, RSA **rsa); 388 OSSL_DEPRECATEDIN_3_0 int i2d_RSAPrivateKey_fp(FILE *fp, const RSA *rsa); 389 OSSL_DEPRECATEDIN_3_0 RSA *d2i_RSAPublicKey_fp(FILE *fp, RSA **rsa); 390 OSSL_DEPRECATEDIN_3_0 int i2d_RSAPublicKey_fp(FILE *fp, const RSA *rsa); 391 OSSL_DEPRECATEDIN_3_0 RSA *d2i_RSA_PUBKEY_fp(FILE *fp, RSA **rsa); 392 OSSL_DEPRECATEDIN_3_0 int i2d_RSA_PUBKEY_fp(FILE *fp, const RSA *rsa); 435 OSSL_DEPRECATEDIN_3_0 RSA *d2i_RSAPrivateKey_bio(BIO *bp, RSA **rsa); 437 OSSL_DEPRECATEDIN_3_0 RSA *d2i_RSAPublicKey_bio(BIO *bp, RSA **rsa); 438 OSSL_DEPRECATEDIN_3_0 int i2d_RSAPublicKey_bio(BIO *bp, const RSA *rsa); 439 OSSL_DEPRECATEDIN_3_0 RSA *d2i_RSA_PUBKEY_bio(BIO *bp, RSA **rsa); [all …]
|
H A D | core_names.h.in | 83 /* RSA padding modes */ 90 /* RSA pss padding salt length */
|
/openssl/doc/man1/ |
H A D | openssl-pkeyutl.pod.in | 73 used. For signature algorithms like RSA, DSA and ECDSA, SHA-256 will be the 217 the key modulus with RSA. In case of ECDSA and DSA the data shouldn't be longer 225 =head1 RSA ALGORITHM 227 The RSA algorithm generally supports the encrypt, decrypt, sign, 236 This sets the RSA padding mode. Acceptable values for I<mode> are B<pkcs1> for 289 =head1 RSA-PSS ALGORITHM 291 The RSA-PSS algorithm is a restricted version of the RSA algorithm which only 300 These have the same meaning as the B<RSA> algorithm with some additional 374 Recover the signed data (e.g. if an RSA key is used): 382 Sign data using a message digest value (this is currently only valid for RSA):
|
/openssl/apps/ |
H A D | rsa8192.pem | 1 -----BEGIN RSA PRIVATE KEY----- 99 -----END RSA PRIVATE KEY-----
|
/openssl/crypto/rsa/ |
H A D | rsa_sign.c | 272 unsigned char *sigret, unsigned int *siglen, RSA *rsa) in RSA_sign() 331 const unsigned char *sigbuf, size_t siglen, RSA *rsa) in ossl_rsa_verify() 446 const unsigned char *sigbuf, unsigned int siglen, RSA *rsa) in RSA_verify()
|
H A D | rsa_acvp_test_params.c | 79 int ossl_rsa_acvp_test_set_params(RSA *r, const OSSL_PARAM params[]) in ossl_rsa_acvp_test_set_params() 125 int ossl_rsa_acvp_test_get_params(RSA *r, OSSL_PARAM params[]) in ossl_rsa_acvp_test_get_params()
|
/openssl/crypto/pem/ |
H A D | pvkfmt.c | 448 RSA *ossl_b2i_RSA_after_header(const unsigned char **in, unsigned int bitlen, in ossl_b2i_RSA_after_header() 454 RSA *rsa = NULL; in ossl_b2i_RSA_after_header() 559 static int check_bitlen_rsa(const RSA *rsa, int ispub, unsigned int *magic); 560 static void write_rsa(unsigned char **out, const RSA *rsa, int ispub); 636 static int check_bitlen_rsa(const RSA *rsa, int ispub, unsigned int *pmagic) in check_bitlen_rsa() 676 static void write_rsa(unsigned char **out, const RSA *rsa, int ispub) in write_rsa() 982 RSA *b2i_RSA_PVK_bio_ex(BIO *in, pem_password_cb *cb, void *u, in b2i_RSA_PVK_bio_ex() 991 RSA *b2i_RSA_PVK_bio(BIO *in, pem_password_cb *cb, void *u) in b2i_RSA_PVK_bio()
|
/openssl/crypto/evp/ |
H A D | p_enc.c | 25 RSA *rsa = NULL; in EVP_PKEY_encrypt_old()
|
H A D | p_dec.c | 25 RSA *rsa = NULL; in EVP_PKEY_decrypt_old()
|
/openssl/test/recipes/90-test_sysdefault_data/ |
H A D | sysdefault-ignore.cnf | 21 SignatureAlgorithms = RSA+SHA256:nonex
|
H A D | sysdefault.cnf | 21 SignatureAlgorithms = RSA+SHA256:?nonex
|
H A D | sysdefault-bad.cnf | 21 SignatureAlgorithms = RSA+SHA256:nonex
|
/openssl/doc/designs/ |
H A D | passing-algorithmidentifier-parameters.md | 120 (for example, the `RSA` structure can also carry RSA-PSS parameters). 148 - [RSA-OAEP](https://www.rfc-editor.org/rfc/rfc8017#appendix-A.2.1) 149 - [RSA-PSS](https://www.rfc-editor.org/rfc/rfc8017#appendix-A.2.3)
|
/openssl/demos/bio/ |
H A D | connect.cnf | 15 SignatureAlgorithms = RSA+SHA512:ECDSA+SHA512
|
/openssl/test/ |
H A D | rsa_x931_test.c | 24 RSA *rsa = NULL; in test_rsa_x931_keygen()
|
/openssl/providers/common/include/prov/ |
H A D | securitycheck.h | 13 int ossl_rsa_check_key(OSSL_LIB_CTX *ctx, const RSA *rsa, int operation);
|