Home
last modified time | relevance | path

Searched refs:RSA (Results 176 – 200 of 275) sorted by relevance

1234567891011

/openssl/crypto/x509/
H A Dx_pubkey.c605 RSA *d2i_RSA_PUBKEY(RSA **a, const unsigned char **pp, long length) in d2i_RSA_PUBKEY()
608 RSA *key = NULL; in d2i_RSA_PUBKEY()
627 int i2d_RSA_PUBKEY(const RSA *a, unsigned char **pp) in i2d_RSA_PUBKEY()
638 (void)EVP_PKEY_assign_RSA(pktmp, (RSA *)a); in i2d_RSA_PUBKEY()
/openssl/doc/man1/
H A Dopenssl-cms.pod.in365 currently be used to set RSA-PSS for signing, RSA-OAEP for encryption
397 required (for example to specify RSA-OAEP).
399 Only certificates carrying RSA, Diffie-Hellman or EC keys are supported by this
679 (Bleichenbacher's attack on PKCS #1 v1.5 RSA padding) all recipients are
772 The use of OAEP or non-RSA keys with B<-encrypt>.
854 Sign a message using RSA-PSS:
859 Create an encrypted message using RSA-OAEP:
904 Support for RSA-OAEP and RSA-PSS was added in OpenSSL 1.0.2.
906 The use of non-RSA keys with B<-encrypt> and B<-decrypt>
H A Dopenssl-format-options.pod114 RSA PRIVATE KEY
125 RSA PUBLIC KEY
H A Dopenssl-speed.pod.in113 Generate a I<num>-prime RSA key and use it to run the benchmarks. This option
114 is only effective if RSA algorithm is specified to test.
/openssl/doc/man7/
H A Dfips_module.pod514 =item RSA Encryption
518 See L<EVP_ASYM_CIPHER-RSA(7)/RSA Asymmetric Cipher parameters> and
519 L<EVP_KEM-RSA(7)/RSA KEM parameters>
521 =item RSA Signatures
523 See L<EVP_SIGNATURE-RSA(7)/Signature Parameters>
580 =item ECDSA and RSA Signatures support the indicator "verify-message".
583 L<EVP_SIGNATURE-RSA(7)/Signature Parameters> /for further information.
H A Dx509.pod22 RSA Security, Inc, also reflected in RFC2896. In OpenSSL, the type
/openssl/doc/man3/
H A DOSSL_PARAM_BLD.pod148 Both examples creating an OSSL_PARAM array that contains an RSA key.
160 This example shows how to create an OSSL_PARAM array that contains an RSA
184 This example shows how to create an OSSL_PARAM array that contains an RSA
H A DEVP_PKEY_decrypt.pod77 Decrypt data using OAEP (for RSA keys):
90 * and that key is an RSA private key
H A DEVP_PKEY_verify_recover.pod58 in this way (for example RSA in PKCS padding mode).
91 * and that verify_key is an RSA public key
H A DEVP_PKEY_keygen.pod99 If I<type> is C<RSA>,
100 a B<size_t> parameter must be given to specify the size of the RSA key.
143 Generate a 2048 bit RSA key:
H A DBN_security_bits.pod22 key. For IFC, e.g., RSA, only B<L> is used and it's commonly considered
H A DX509_check_private_key.pod37 They merely compare the public materials (e.g., exponent and modulus of an RSA
H A DSSL_get_peer_signature_nid.pod37 uses RSA key exchange or is anonymous), the TLS version is below 1.2 or
H A DBN_num_bytes.pod36 Some have tried using BN_num_bits() on individual numbers in RSA keys,
H A DSSL_CTX_config.pod49 RSA.Certificate = server-rsa.pem
H A DEVP_PKEY_todata.pod46 L<EVP_PKEY-RSA(7)>, L<EVP_PKEY-DSA(7)>, L<EVP_PKEY-DH(7)>, L<EVP_PKEY-EC(7)>,
H A DSSL_get_certificate.pod21 RSA and ECDSA certificates. The certificate which is returned by
/openssl/test/
H A Dx509_test.c134 RSA *rsa = NULL; in test_asn1_item_verify()
H A Dasn1_internal_test.c126 RSA *rsa = NULL; in test_empty_nonoptional_content()
/openssl/providers/fips/include/fips/
H A Dfipsindicator.h126 const RSA *rsa, const char *desc, int protect);
/openssl/providers/implementations/encode_decode/
H A Dencode_key2text.c632 const RSA *rsa = key; in rsa_to_text()
641 const RSA_PSS_PARAMS_30 *pss_params = ossl_rsa_get0_pss_params_30((RSA *)rsa); in rsa_to_text()
669 ossl_rsa_get0_all_params((RSA *)rsa, factors, exps, coeffs); in rsa_to_text()
/openssl/include/openssl/
H A Dtypes.h152 typedef struct rsa_st RSA; typedef
H A Dpem.h452 DECLARE_PEM_rw_cb_attr(OSSL_DEPRECATEDIN_3_0, RSAPrivateKey, RSA)
453 DECLARE_PEM_rw_attr(OSSL_DEPRECATEDIN_3_0, RSAPublicKey, RSA)
454 DECLARE_PEM_rw_attr(OSSL_DEPRECATEDIN_3_0, RSA_PUBKEY, RSA)
/openssl/fuzz/
H A Ddtlsserver.c600 RSA *privkey; in FuzzerTestOneInput()
H A Dserver.c521 RSA *privkey; in FuzzerTestOneInput()

Completed in 42 milliseconds

1234567891011