/openssl/doc/man7/ |
H A D | EVP_ASYM_CIPHER-RSA.pod | 5 EVP_ASYM_CIPHER-RSA 6 - RSA Asymmetric Cipher algorithm support 10 Asymmetric Cipher support for the B<RSA> key type. 12 =head2 RSA Asymmetric Cipher parameters 18 The default provider understands these RSA padding modes in string form: 34 The default provider understands these RSA padding modes in integer form: 74 L<EVP_PKEY-RSA(7)>,
|
H A D | OSSL_PROVIDER-default.pod | 184 =item RSA, see L<EVP_SIGNATURE-RSA(7)> 208 =item RSA, see L<EVP_ASYM_CIPHER-RSA(7)> 218 =item RSA, see L<EVP_KEM-RSA(7)> 238 =item RSA, see L<EVP_KEYMGMT-RSA(7)> 240 =item RSA-PSS 293 =item RSA 295 =item RSA-PSS 325 =item RSA 327 =item RSA-PSS
|
H A D | EVP_SIGNATURE-RSA.pod | 5 EVP_SIGNATURE-RSA 6 - The EVP_PKEY RSA signature implementation 10 Support for computing RSA signatures. 11 See L<EVP_PKEY-RSA(7)> for information related to RSA keys.
|
/openssl/test/ |
H A D | rsa_test.c | 48 static int key1(RSA *key, unsigned char *c) in key1() 97 static int key2(RSA *key, unsigned char *c) in key2() 142 static int key3(RSA *key, unsigned char *c) in key3() 236 RSA **retkey) in test_rsa_simple() 239 RSA *key; in test_rsa_simple() 284 RSA *key = NULL; in test_rsa_oaep() 362 RSA *key = RSA_new(); in test_rsa_security_bit() 406 RSA *rsa; in test_EVP_rsa_legacy_key() 509 static RSA *load_key(int priv) in load_key() 511 RSA *rsa = NULL; in load_key() [all …]
|
H A D | rsa_mp_test.c | 139 static int key2048_key(RSA *key) in key2048_key() 150 static int key2048p3_v1(RSA *key) in key2048p3_v1() 200 static int key2048p3_v2(RSA *key) in key2048p3_v2() 253 RSA *key; in test_rsa_mp() 260 static int (*param_set[])(RSA *) = { in test_rsa_mp() 295 RSA *rsa = NULL; in test_rsa_mp_gen_bad_input()
|
/openssl/doc/man3/ |
H A D | RSA_generate_key.pod | 7 RSA_generate_multi_prime_key - generate RSA key pair 19 int RSA_generate_key_ex(RSA *rsa, int bits, BIGNUM *e, BN_GENCB *cb); 20 int RSA_generate_multi_prime_key(RSA *rsa, int bits, int primes, BIGNUM *e, BN_GENCB *cb); 26 RSA *RSA_generate_key(int bits, unsigned long e, 31 EVP_RSA_gen() generates a new RSA key pair with modulus size I<bits>. 37 RSA_generate_key_ex() generates a 2-prime RSA key pair and stores it in the 38 B<RSA> structure provided in I<rsa>. 40 RSA_generate_multi_prime_key() generates a multi-prime RSA key pair and stores 41 it in the B<RSA> structure provided in I<rsa>. The number of primes is given by 97 RSA_generate_key() returns a pointer to the RSA structure or [all …]
|
H A D | RSA_new.pod | 5 RSA_new, RSA_free - allocate and free RSA objects 15 RSA *RSA_new(void); 17 void RSA_free(RSA *rsa); 21 RSA_new() allocates and initializes an B<RSA> structure. It is equivalent to 24 RSA_free() frees the B<RSA> structure and its components. The key is 45 For replacement see EVP_PKEY-RSA(7).
|
H A D | RSA_blinding_on.pod | 5 RSA_blinding_on, RSA_blinding_off - protect the RSA operation from timing attacks 15 int RSA_blinding_on(RSA *rsa, BN_CTX *ctx); 17 void RSA_blinding_off(RSA *rsa); 23 RSA is vulnerable to timing attacks. In a setup where attackers can 24 measure the time of RSA decryption or signature operations, blinding 25 must be used to protect the RSA operation from that attack.
|
H A D | EVP_PKEY_CTX_set_rsa_pss_keygen_md.pod | 10 - EVP_PKEY RSA-PSS algorithm support functions 30 These are the functions that implement L<RSA-PSS(7)>. 36 than B<PSS>. It is otherwise similar to the B<RSA> version. 41 to the B<RSA> operation except detection of the salt length (using 49 similar to the B<RSA> versions. 53 As with RSA key generation the EVP_PKEY_CTX_set_rsa_keygen_bits() 54 and EVP_PKEY_CTX_set_rsa_keygen_pubexp() macros are supported for RSA-PSS: 55 they have exactly the same meaning as for the RSA algorithm. 79 A context for the B<RSA-PSS> algorithm can be obtained by calling: 91 L<RSA-PSS(7)>,
|
H A D | RSA_size.pod | 5 RSA_size, RSA_bits, RSA_security_bits - get RSA modulus size or security bits 11 int RSA_bits(const RSA *rsa); 17 int RSA_size(const RSA *rsa); 19 int RSA_security_bits(const RSA *rsa); 31 RSA_size() returns the RSA modulus size in bytes. It can be used to 32 determine how much memory must be allocated for an RSA encrypted
|
H A D | PEM_read_bio_PrivateKey.pod | 150 RSA *PEM_read_bio_RSAPrivateKey(BIO *bp, RSA **x, 152 RSA *PEM_read_RSAPrivateKey(FILE *fp, RSA **x, 161 RSA *PEM_read_bio_RSAPublicKey(BIO *bp, RSA **x, 163 RSA *PEM_read_RSAPublicKey(FILE *fp, RSA **x, 166 int PEM_write_RSAPublicKey(FILE *fp, RSA *x); 168 RSA *PEM_read_bio_RSA_PUBKEY(BIO *bp, RSA **x, 170 RSA *PEM_read_RSA_PUBKEY(FILE *fp, RSA **x, 173 int PEM_write_RSA_PUBKEY(FILE *fp, RSA *x); 269 key is not RSA. 417 -----BEGIN RSA PRIVATE KEY----- [all …]
|
H A D | RSA_private_encrypt.pod | 16 unsigned char *to, RSA *rsa, int padding); 19 unsigned char *to, RSA *rsa, int padding); 28 These functions handle RSA signatures at a low-level. 48 Raw RSA signature. This mode should I<only> be used to implement 50 Signing user data directly with RSA is insecure.
|
/openssl/providers/ |
H A D | decoders.inc | 77 DECODER_w_structure("RSA", der, PrivateKeyInfo, rsa, yes), 78 DECODER_w_structure("RSA", der, SubjectPublicKeyInfo, rsa, yes), 79 DECODER_w_structure("RSA", der, type_specific_keypair, rsa, yes), 80 DECODER_w_structure("RSA", der, RSA, rsa, yes), 81 DECODER_w_structure("RSA-PSS", der, PrivateKeyInfo, rsapss, yes), 82 DECODER_w_structure("RSA-PSS", der, SubjectPublicKeyInfo, rsapss, yes), 83 DECODER("RSA", msblob, rsa, yes), 84 DECODER("RSA", pvk, rsa, yes),
|
/openssl/ssl/ |
H A D | ssl_rsa_legacy.c | 17 int SSL_use_RSAPrivateKey(SSL *ssl, RSA *rsa) in SSL_use_RSAPrivateKey() 47 RSA *rsa = NULL; in SSL_use_RSAPrivateKey_file() 86 RSA *rsa; in SSL_use_RSAPrivateKey_ASN1() 99 int SSL_CTX_use_RSAPrivateKey(SSL_CTX *ctx, RSA *rsa) in SSL_CTX_use_RSAPrivateKey() 129 RSA *rsa = NULL; in SSL_CTX_use_RSAPrivateKey_file() 169 RSA *rsa; in SSL_CTX_use_RSAPrivateKey_ASN1()
|
/openssl/crypto/rsa/ |
H A D | rsa_prn.c | 22 int RSA_print_fp(FILE *fp, const RSA *x, int off) in RSA_print_fp() 38 int RSA_print(BIO *bp, const RSA *x, int off) in RSA_print() 45 ret = EVP_PKEY_set1_RSA(pk, (RSA *)x); in RSA_print()
|
H A D | rsa_chk.c | 22 static int rsa_validate_keypair_multiprime(const RSA *key, BN_GENCB *cb) in rsa_validate_keypair_multiprime() 237 int ossl_rsa_validate_public(const RSA *key) in ossl_rsa_validate_public() 242 int ossl_rsa_validate_private(const RSA *key) in ossl_rsa_validate_private() 247 int ossl_rsa_validate_pairwise(const RSA *key) in ossl_rsa_validate_pairwise() 256 int RSA_check_key(const RSA *key) in RSA_check_key() 261 int RSA_check_key_ex(const RSA *key, BN_GENCB *cb) in RSA_check_key_ex()
|
H A D | rsa_pmeth.c | 146 RSA *rsa = (RSA *)EVP_PKEY_get0_RSA(ctx->pkey); in pkey_rsa_sign() 223 RSA *rsa = (RSA *)EVP_PKEY_get0_RSA(ctx->pkey); in pkey_rsa_verifyrecover() 274 RSA *rsa = (RSA *)EVP_PKEY_get0_RSA(ctx->pkey); in pkey_rsa_verify() 338 RSA *rsa = (RSA *)EVP_PKEY_get0_RSA(ctx->pkey); in pkey_rsa_encrypt() 372 RSA *rsa = (RSA *)EVP_PKEY_get0_RSA(ctx->pkey); in pkey_rsa_decrypt() 765 static int rsa_set_pss_param(RSA *rsa, EVP_PKEY_CTX *ctx) in rsa_set_pss_param() 784 RSA *rsa = NULL; in pkey_rsa_keygen() 868 const RSA *rsa; in pkey_pss_init()
|
H A D | rsa_ossl.c | 25 unsigned char *to, RSA *rsa, int padding); 27 unsigned char *to, RSA *rsa, int padding); 29 unsigned char *to, RSA *rsa, int padding); 32 static int rsa_ossl_mod_exp(BIGNUM *r0, const BIGNUM *i, RSA *rsa, 34 static int rsa_ossl_init(RSA *rsa); 35 static int rsa_ossl_finish(RSA *rsa); 37 static int rsa_ossl_s390x_mod_exp(BIGNUM *r0, const BIGNUM *i, RSA *rsa, 210 static BN_BLINDING *rsa_get_blinding(RSA *rsa, int *local, BN_CTX *ctx) in rsa_get_blinding() 434 static int derive_kdk(int flen, const unsigned char *from, RSA *rsa, in derive_kdk() 1175 static int rsa_ossl_init(RSA *rsa) in rsa_ossl_init() [all …]
|
/openssl/test/ssl-tests/ |
H A D | 26-tls13_client_auth.cnf.in | 84 "ExpectedClientCertType" => "RSA", 85 "ExpectedClientSignType" => "RSA-PSS", 108 "ExpectedClientCertType" => "RSA", 109 "ExpectedClientSignType" => "RSA-PSS", 186 "ExpectedClientCertType" => "RSA", 187 "ExpectedClientSignType" => "RSA-PSS", 214 "ExpectedClientCertType" => "RSA", 215 "ExpectedClientSignType" => "RSA-PSS",
|
H A D | 04-client_auth.cnf.in | 53 $clisigtype = "RSA"; 54 $clisigalgs = "SHA256+RSA"; 149 "ExpectedClientCertType" => "RSA", 158 # Successful handshake with client RSA-PSS cert, StrictCertCheck 180 "ExpectedClientCertType" => "RSA-PSS", 186 # Failed handshake with client RSA-PSS cert, StrictCertCheck, bad CA 239 "ExpectedClientCertType" => "RSA",
|
/openssl/include/crypto/ |
H A D | pem.h | 34 RSA *ossl_b2i_RSA_after_header(const unsigned char **in, unsigned int bitlen, 46 RSA *b2i_RSA_PVK_bio(BIO *in, pem_password_cb *cb, void *u); 47 RSA *b2i_RSA_PVK_bio_ex(BIO *in, pem_password_cb *cb, void *u,
|
/openssl/crypto/x509/ |
H A D | x_all.c | 337 RSA *d2i_RSAPrivateKey_fp(FILE *fp, RSA **rsa) in d2i_RSAPrivateKey_fp() 342 int i2d_RSAPrivateKey_fp(FILE *fp, const RSA *rsa) in i2d_RSAPrivateKey_fp() 347 RSA *d2i_RSAPublicKey_fp(FILE *fp, RSA **rsa) in d2i_RSAPublicKey_fp() 352 RSA *d2i_RSA_PUBKEY_fp(FILE *fp, RSA **rsa) in d2i_RSA_PUBKEY_fp() 359 int i2d_RSAPublicKey_fp(FILE *fp, const RSA *rsa) in i2d_RSAPublicKey_fp() 364 int i2d_RSA_PUBKEY_fp(FILE *fp, const RSA *rsa) in i2d_RSA_PUBKEY_fp() 370 RSA *d2i_RSAPrivateKey_bio(BIO *bp, RSA **rsa) in d2i_RSAPrivateKey_bio() 380 RSA *d2i_RSAPublicKey_bio(BIO *bp, RSA **rsa) in d2i_RSAPublicKey_bio() 385 RSA *d2i_RSA_PUBKEY_bio(BIO *bp, RSA **rsa) in d2i_RSA_PUBKEY_bio() 390 int i2d_RSAPublicKey_bio(BIO *bp, const RSA *rsa) in i2d_RSAPublicKey_bio() [all …]
|
/openssl/providers/implementations/keymgmt/ |
H A D | rsa_kmgmt.c | 81 RSA *rsa; in rsa_newdata() 97 RSA *rsa; in rsapss_newdata() 117 const RSA *rsa = keydata; in rsa_has() 137 const RSA *rsa1 = keydata1; in rsa_match() 138 const RSA *rsa2 = keydata2; in rsa_match() 175 RSA *rsa = keydata; in rsa_import() 206 RSA *rsa = keydata; in rsa_export() 332 RSA *rsa = key; in rsa_get_params() 394 const RSA *rsa = keydata; in rsa_validate() 656 RSA *rsa = NULL; in common_load() [all …]
|
/openssl/apps/ |
H A D | s512-key.pem | 1 -----BEGIN RSA PRIVATE KEY----- 9 -----END RSA PRIVATE KEY-----
|
H A D | s1024key.pem | 1 -----BEGIN RSA PRIVATE KEY----- 15 -----END RSA PRIVATE KEY-----
|