Home
last modified time | relevance | path

Searched refs:RSA (Results 26 – 50 of 268) sorted by relevance

1234567891011

/openssl/doc/man7/
H A DEVP_ASYM_CIPHER-RSA.pod5 EVP_ASYM_CIPHER-RSA
6 - RSA Asymmetric Cipher algorithm support
10 Asymmetric Cipher support for the B<RSA> key type.
12 =head2 RSA Asymmetric Cipher parameters
18 The default provider understands these RSA padding modes in string form:
34 The default provider understands these RSA padding modes in integer form:
74 L<EVP_PKEY-RSA(7)>,
H A DOSSL_PROVIDER-default.pod184 =item RSA, see L<EVP_SIGNATURE-RSA(7)>
208 =item RSA, see L<EVP_ASYM_CIPHER-RSA(7)>
218 =item RSA, see L<EVP_KEM-RSA(7)>
238 =item RSA, see L<EVP_KEYMGMT-RSA(7)>
240 =item RSA-PSS
293 =item RSA
295 =item RSA-PSS
325 =item RSA
327 =item RSA-PSS
H A DEVP_SIGNATURE-RSA.pod5 EVP_SIGNATURE-RSA
6 - The EVP_PKEY RSA signature implementation
10 Support for computing RSA signatures.
11 See L<EVP_PKEY-RSA(7)> for information related to RSA keys.
/openssl/test/
H A Drsa_test.c48 static int key1(RSA *key, unsigned char *c) in key1()
97 static int key2(RSA *key, unsigned char *c) in key2()
142 static int key3(RSA *key, unsigned char *c) in key3()
236 RSA **retkey) in test_rsa_simple()
239 RSA *key; in test_rsa_simple()
284 RSA *key = NULL; in test_rsa_oaep()
362 RSA *key = RSA_new(); in test_rsa_security_bit()
406 RSA *rsa; in test_EVP_rsa_legacy_key()
509 static RSA *load_key(int priv) in load_key()
511 RSA *rsa = NULL; in load_key()
[all …]
H A Drsa_mp_test.c139 static int key2048_key(RSA *key) in key2048_key()
150 static int key2048p3_v1(RSA *key) in key2048p3_v1()
200 static int key2048p3_v2(RSA *key) in key2048p3_v2()
253 RSA *key; in test_rsa_mp()
260 static int (*param_set[])(RSA *) = { in test_rsa_mp()
295 RSA *rsa = NULL; in test_rsa_mp_gen_bad_input()
/openssl/doc/man3/
H A DRSA_generate_key.pod7 RSA_generate_multi_prime_key - generate RSA key pair
19 int RSA_generate_key_ex(RSA *rsa, int bits, BIGNUM *e, BN_GENCB *cb);
20 int RSA_generate_multi_prime_key(RSA *rsa, int bits, int primes, BIGNUM *e, BN_GENCB *cb);
26 RSA *RSA_generate_key(int bits, unsigned long e,
31 EVP_RSA_gen() generates a new RSA key pair with modulus size I<bits>.
37 RSA_generate_key_ex() generates a 2-prime RSA key pair and stores it in the
38 B<RSA> structure provided in I<rsa>.
40 RSA_generate_multi_prime_key() generates a multi-prime RSA key pair and stores
41 it in the B<RSA> structure provided in I<rsa>. The number of primes is given by
97 RSA_generate_key() returns a pointer to the RSA structure or
[all …]
H A DRSA_new.pod5 RSA_new, RSA_free - allocate and free RSA objects
15 RSA *RSA_new(void);
17 void RSA_free(RSA *rsa);
21 RSA_new() allocates and initializes an B<RSA> structure. It is equivalent to
24 RSA_free() frees the B<RSA> structure and its components. The key is
45 For replacement see EVP_PKEY-RSA(7).
H A DRSA_blinding_on.pod5 RSA_blinding_on, RSA_blinding_off - protect the RSA operation from timing attacks
15 int RSA_blinding_on(RSA *rsa, BN_CTX *ctx);
17 void RSA_blinding_off(RSA *rsa);
23 RSA is vulnerable to timing attacks. In a setup where attackers can
24 measure the time of RSA decryption or signature operations, blinding
25 must be used to protect the RSA operation from that attack.
H A DEVP_PKEY_CTX_set_rsa_pss_keygen_md.pod10 - EVP_PKEY RSA-PSS algorithm support functions
30 These are the functions that implement L<RSA-PSS(7)>.
36 than B<PSS>. It is otherwise similar to the B<RSA> version.
41 to the B<RSA> operation except detection of the salt length (using
49 similar to the B<RSA> versions.
53 As with RSA key generation the EVP_PKEY_CTX_set_rsa_keygen_bits()
54 and EVP_PKEY_CTX_set_rsa_keygen_pubexp() macros are supported for RSA-PSS:
55 they have exactly the same meaning as for the RSA algorithm.
79 A context for the B<RSA-PSS> algorithm can be obtained by calling:
91 L<RSA-PSS(7)>,
H A DRSA_size.pod5 RSA_size, RSA_bits, RSA_security_bits - get RSA modulus size or security bits
11 int RSA_bits(const RSA *rsa);
17 int RSA_size(const RSA *rsa);
19 int RSA_security_bits(const RSA *rsa);
31 RSA_size() returns the RSA modulus size in bytes. It can be used to
32 determine how much memory must be allocated for an RSA encrypted
H A DPEM_read_bio_PrivateKey.pod150 RSA *PEM_read_bio_RSAPrivateKey(BIO *bp, RSA **x,
152 RSA *PEM_read_RSAPrivateKey(FILE *fp, RSA **x,
161 RSA *PEM_read_bio_RSAPublicKey(BIO *bp, RSA **x,
163 RSA *PEM_read_RSAPublicKey(FILE *fp, RSA **x,
166 int PEM_write_RSAPublicKey(FILE *fp, RSA *x);
168 RSA *PEM_read_bio_RSA_PUBKEY(BIO *bp, RSA **x,
170 RSA *PEM_read_RSA_PUBKEY(FILE *fp, RSA **x,
173 int PEM_write_RSA_PUBKEY(FILE *fp, RSA *x);
269 key is not RSA.
417 -----BEGIN RSA PRIVATE KEY-----
[all …]
H A DRSA_private_encrypt.pod16 unsigned char *to, RSA *rsa, int padding);
19 unsigned char *to, RSA *rsa, int padding);
28 These functions handle RSA signatures at a low-level.
48 Raw RSA signature. This mode should I<only> be used to implement
50 Signing user data directly with RSA is insecure.
/openssl/providers/
H A Ddecoders.inc77 DECODER_w_structure("RSA", der, PrivateKeyInfo, rsa, yes),
78 DECODER_w_structure("RSA", der, SubjectPublicKeyInfo, rsa, yes),
79 DECODER_w_structure("RSA", der, type_specific_keypair, rsa, yes),
80 DECODER_w_structure("RSA", der, RSA, rsa, yes),
81 DECODER_w_structure("RSA-PSS", der, PrivateKeyInfo, rsapss, yes),
82 DECODER_w_structure("RSA-PSS", der, SubjectPublicKeyInfo, rsapss, yes),
83 DECODER("RSA", msblob, rsa, yes),
84 DECODER("RSA", pvk, rsa, yes),
/openssl/ssl/
H A Dssl_rsa_legacy.c17 int SSL_use_RSAPrivateKey(SSL *ssl, RSA *rsa) in SSL_use_RSAPrivateKey()
47 RSA *rsa = NULL; in SSL_use_RSAPrivateKey_file()
86 RSA *rsa; in SSL_use_RSAPrivateKey_ASN1()
99 int SSL_CTX_use_RSAPrivateKey(SSL_CTX *ctx, RSA *rsa) in SSL_CTX_use_RSAPrivateKey()
129 RSA *rsa = NULL; in SSL_CTX_use_RSAPrivateKey_file()
169 RSA *rsa; in SSL_CTX_use_RSAPrivateKey_ASN1()
/openssl/crypto/rsa/
H A Drsa_prn.c22 int RSA_print_fp(FILE *fp, const RSA *x, int off) in RSA_print_fp()
38 int RSA_print(BIO *bp, const RSA *x, int off) in RSA_print()
45 ret = EVP_PKEY_set1_RSA(pk, (RSA *)x); in RSA_print()
H A Drsa_chk.c22 static int rsa_validate_keypair_multiprime(const RSA *key, BN_GENCB *cb) in rsa_validate_keypair_multiprime()
237 int ossl_rsa_validate_public(const RSA *key) in ossl_rsa_validate_public()
242 int ossl_rsa_validate_private(const RSA *key) in ossl_rsa_validate_private()
247 int ossl_rsa_validate_pairwise(const RSA *key) in ossl_rsa_validate_pairwise()
256 int RSA_check_key(const RSA *key) in RSA_check_key()
261 int RSA_check_key_ex(const RSA *key, BN_GENCB *cb) in RSA_check_key_ex()
H A Drsa_pmeth.c146 RSA *rsa = (RSA *)EVP_PKEY_get0_RSA(ctx->pkey); in pkey_rsa_sign()
223 RSA *rsa = (RSA *)EVP_PKEY_get0_RSA(ctx->pkey); in pkey_rsa_verifyrecover()
274 RSA *rsa = (RSA *)EVP_PKEY_get0_RSA(ctx->pkey); in pkey_rsa_verify()
338 RSA *rsa = (RSA *)EVP_PKEY_get0_RSA(ctx->pkey); in pkey_rsa_encrypt()
372 RSA *rsa = (RSA *)EVP_PKEY_get0_RSA(ctx->pkey); in pkey_rsa_decrypt()
765 static int rsa_set_pss_param(RSA *rsa, EVP_PKEY_CTX *ctx) in rsa_set_pss_param()
784 RSA *rsa = NULL; in pkey_rsa_keygen()
868 const RSA *rsa; in pkey_pss_init()
H A Drsa_ossl.c25 unsigned char *to, RSA *rsa, int padding);
27 unsigned char *to, RSA *rsa, int padding);
29 unsigned char *to, RSA *rsa, int padding);
32 static int rsa_ossl_mod_exp(BIGNUM *r0, const BIGNUM *i, RSA *rsa,
34 static int rsa_ossl_init(RSA *rsa);
35 static int rsa_ossl_finish(RSA *rsa);
37 static int rsa_ossl_s390x_mod_exp(BIGNUM *r0, const BIGNUM *i, RSA *rsa,
210 static BN_BLINDING *rsa_get_blinding(RSA *rsa, int *local, BN_CTX *ctx) in rsa_get_blinding()
434 static int derive_kdk(int flen, const unsigned char *from, RSA *rsa, in derive_kdk()
1175 static int rsa_ossl_init(RSA *rsa) in rsa_ossl_init()
[all …]
/openssl/test/ssl-tests/
H A D26-tls13_client_auth.cnf.in84 "ExpectedClientCertType" => "RSA",
85 "ExpectedClientSignType" => "RSA-PSS",
108 "ExpectedClientCertType" => "RSA",
109 "ExpectedClientSignType" => "RSA-PSS",
186 "ExpectedClientCertType" => "RSA",
187 "ExpectedClientSignType" => "RSA-PSS",
214 "ExpectedClientCertType" => "RSA",
215 "ExpectedClientSignType" => "RSA-PSS",
H A D04-client_auth.cnf.in53 $clisigtype = "RSA";
54 $clisigalgs = "SHA256+RSA";
149 "ExpectedClientCertType" => "RSA",
158 # Successful handshake with client RSA-PSS cert, StrictCertCheck
180 "ExpectedClientCertType" => "RSA-PSS",
186 # Failed handshake with client RSA-PSS cert, StrictCertCheck, bad CA
239 "ExpectedClientCertType" => "RSA",
/openssl/include/crypto/
H A Dpem.h34 RSA *ossl_b2i_RSA_after_header(const unsigned char **in, unsigned int bitlen,
46 RSA *b2i_RSA_PVK_bio(BIO *in, pem_password_cb *cb, void *u);
47 RSA *b2i_RSA_PVK_bio_ex(BIO *in, pem_password_cb *cb, void *u,
/openssl/crypto/x509/
H A Dx_all.c337 RSA *d2i_RSAPrivateKey_fp(FILE *fp, RSA **rsa) in d2i_RSAPrivateKey_fp()
342 int i2d_RSAPrivateKey_fp(FILE *fp, const RSA *rsa) in i2d_RSAPrivateKey_fp()
347 RSA *d2i_RSAPublicKey_fp(FILE *fp, RSA **rsa) in d2i_RSAPublicKey_fp()
352 RSA *d2i_RSA_PUBKEY_fp(FILE *fp, RSA **rsa) in d2i_RSA_PUBKEY_fp()
359 int i2d_RSAPublicKey_fp(FILE *fp, const RSA *rsa) in i2d_RSAPublicKey_fp()
364 int i2d_RSA_PUBKEY_fp(FILE *fp, const RSA *rsa) in i2d_RSA_PUBKEY_fp()
370 RSA *d2i_RSAPrivateKey_bio(BIO *bp, RSA **rsa) in d2i_RSAPrivateKey_bio()
380 RSA *d2i_RSAPublicKey_bio(BIO *bp, RSA **rsa) in d2i_RSAPublicKey_bio()
385 RSA *d2i_RSA_PUBKEY_bio(BIO *bp, RSA **rsa) in d2i_RSA_PUBKEY_bio()
390 int i2d_RSAPublicKey_bio(BIO *bp, const RSA *rsa) in i2d_RSAPublicKey_bio()
[all …]
/openssl/providers/implementations/keymgmt/
H A Drsa_kmgmt.c81 RSA *rsa; in rsa_newdata()
97 RSA *rsa; in rsapss_newdata()
117 const RSA *rsa = keydata; in rsa_has()
137 const RSA *rsa1 = keydata1; in rsa_match()
138 const RSA *rsa2 = keydata2; in rsa_match()
175 RSA *rsa = keydata; in rsa_import()
206 RSA *rsa = keydata; in rsa_export()
332 RSA *rsa = key; in rsa_get_params()
394 const RSA *rsa = keydata; in rsa_validate()
656 RSA *rsa = NULL; in common_load()
[all …]
/openssl/apps/
H A Ds512-key.pem1 -----BEGIN RSA PRIVATE KEY-----
9 -----END RSA PRIVATE KEY-----
H A Ds1024key.pem1 -----BEGIN RSA PRIVATE KEY-----
15 -----END RSA PRIVATE KEY-----

Completed in 94 milliseconds

1234567891011