/openssl/demos/bio/ |
H A D | connect.cnf | 15 SignatureAlgorithms = RSA+SHA512:ECDSA+SHA512
|
H A D | accept.cnf | 15 SignatureAlgorithms = RSA+SHA512:ECDSA+SHA512
|
/openssl/doc/man3/ |
H A D | EVP_PKEY_set1_RSA.pod | 31 int EVP_PKEY_set1_RSA(EVP_PKEY *pkey, RSA *key); 36 RSA *EVP_PKEY_get1_RSA(EVP_PKEY *pkey); 44 const RSA *EVP_PKEY_get0_RSA(const EVP_PKEY *pkey); 50 int EVP_PKEY_assign_RSA(EVP_PKEY *pkey, RSA *key); 63 an RSA key will return B<EVP_PKEY_RSA>. 68 For example an RSA key could use the NIDs corresponding to
|
H A D | X509_dup.pod | 391 RSA *RSAPrivateKey_dup(const RSA *rsa); 392 RSA *RSAPublicKey_dup(const RSA *rsa);
|
H A D | OSSL_ALGORITHM.pod | 44 fetched multiple ways. For example, the RSA algorithm has the following 51 C<RSA> 70 "RSA:rsaEncryption:1.2.840.113549.1.1.1"
|
H A D | EVP_DigestSignInit.pod | 71 Poly1305, DSA, ECDSA, HMAC, RSA, SipHash, Ed25519 and Ed448. 85 =item RSA with no padding 89 =item RSA with X931 padding 93 =item All other RSA padding types 112 If RSA-PSS is used and restrictions apply then the digest must match.
|
H A D | SSL_CTX_use_serverinfo.pod | 60 If more than one certificate (RSA/DSA) is installed using 62 last certificate installed. If e.g. the last item was an RSA certificate, the
|
H A D | OSSL_DECODER_from_bio.pod | 50 To decode an RSA key encoded with PEM from a bio: 56 const char *keytype = "RSA"; /* NULL for any key */
|
H A D | RSA_padding_add_PKCS1_type_1.pod | 61 The RSA_padding_xxx_xxx() functions are called from the RSA encrypt, 103 a valid encoding for a B<rsa_len> byte RSA key in the respective 134 Do not remove the zero-padding from the decrypted raw RSA data
|
H A D | EVP_DigestVerifyInit.pod | 76 =item RSA with no padding 80 =item RSA with X931 padding 84 =item All other RSA padding types 103 If RSA-PSS is used and restrictions apply then the digest must match.
|
H A D | EVP_PKEY_encapsulate.pod | 60 Encapsulate an RSASVE key (for RSA keys). 102 L<EVP_KEM-RSA(7)>, L<EVP_KEM-X25519(7)>, L<EVP_KEM-EC(7)>
|
/openssl/test/ |
H A D | rsa_x931_test.c | 24 RSA *rsa = NULL; in test_rsa_x931_keygen()
|
/openssl/include/openssl/ |
H A D | core_names.h.in | 83 /* RSA padding modes */ 90 /* RSA pss padding salt length */
|
/openssl/doc/man1/ |
H A D | openssl-rsa.pod.in | 10 openssl-rsa - RSA key processing command 50 This command processes RSA keys. They can be converted between 120 This option checks the consistency of an RSA private key. 166 To remove the pass phrase on an RSA private key:
|
/openssl/crypto/rsa/ |
H A D | rsa_x931g.c | 25 int RSA_X931_derive_ex(RSA *rsa, BIGNUM *p1, BIGNUM *p2, BIGNUM *q1, in RSA_X931_derive_ex() 150 int RSA_X931_generate_key_ex(RSA *rsa, int bits, const BIGNUM *e, in RSA_X931_generate_key_ex()
|
H A D | rsa_mp.c | 59 int ossl_rsa_multip_calc_product(RSA *rsa) in ossl_rsa_multip_calc_product()
|
/openssl/doc/designs/ |
H A D | passing-algorithmidentifier-parameters.md | 139 (for example, the `RSA` structure can also carry RSA-PSS parameters). 167 - [RSA-OAEP](https://www.rfc-editor.org/rfc/rfc8017#appendix-A.2.1) 168 - [RSA-PSS](https://www.rfc-editor.org/rfc/rfc8017#appendix-A.2.3)
|
H A D | fetching-composite-algorithms.md | 48 explicit fetches of simple algorithms, say "RSA". In that case, the caller 61 For non-composite operation algorithms (like "RSA"), this is not necessary, 93 is useful when someone fetched the `EVP_SIGNATURE` "RSA".
|
/openssl/providers/common/der/ |
H A D | der_rsa_gen.c.in | 17 'providers/common/der/RSA.asn1',
|
/openssl/crypto/err/ |
H A D | err_all_legacy.c | 98 IMPLEMENT_LEGACY_ERR_LOAD(RSA)
|
/openssl/providers/common/ |
H A D | securitycheck_fips.c | 38 const RSA *rsa, const char *desc, int protect) in ossl_fips_ind_rsa_key_check()
|
/openssl/engines/ |
H A D | e_capi.c | 130 unsigned int *siglen, const RSA *rsa); 132 unsigned char *to, RSA *rsa, int padding); 134 unsigned char *to, RSA *rsa, int padding); 135 static int capi_rsa_free(RSA *rsa); 647 RSA *rkey = NULL; in capi_get_pkey() 843 unsigned char *to, RSA *rsa, int padding) in capi_rsa_priv_enc() 850 unsigned char *sigret, unsigned int *siglen, const RSA *rsa) in capi_rsa_sign() 945 unsigned char *to, RSA *rsa, int padding) in capi_rsa_priv_dec() 1009 static int capi_rsa_free(RSA *rsa) in capi_rsa_free()
|
/openssl/providers/implementations/kem/ |
H A D | rsa_kem.c | 55 RSA *rsa; 231 static int rsasve_gen_rand_bytes(RSA *rsa_pub, in rsasve_gen_rand_bytes()
|
/openssl/ |
H A D | NEWS.md | 84 RSA-SHA2-256 including new API functions 670 * Multi-prime RSA 965 * CMS support for RSA-PSS, RSA-OAEP, ECDH and X9.42 DH. 1466 * Added support for the RSA-PSS encryption scheme 1467 * Added support for the RSA X.931 padding. 1543 * Security: make RSA blinding default. 1616 * Security: make RSA blinding default. 1659 * RSA OAEP and random number generation fixes. 1671 * Security fix: RSA OAEP check. 1760 RSA functionality [all …]
|
/openssl/crypto/objects/ |
H A D | objects.txt | 173 rsadsi 1 : pkcs : RSA Data Security, Inc. PKCS 177 pkcs1 2 : RSA-MD2 : md2WithRSAEncryption 178 pkcs1 3 : RSA-MD4 : md4WithRSAEncryption 179 pkcs1 4 : RSA-MD5 : md5WithRSAEncryption 180 pkcs1 5 : RSA-SHA1 : sha1WithRSAEncryption 187 pkcs1 11 : RSA-SHA256 : sha256WithRSAEncryption 188 pkcs1 12 : RSA-SHA384 : sha384WithRSAEncryption 731 algorithm 3 : RSA-NP-MD5 : md5WithRSA 761 algorithm 29 : RSA-SHA1-2 : sha1WithRSA 838 X500algorithms 1 1 : RSA : rsa [all …]
|