/openssl/crypto/rsa/ |
H A D | rsa_ossl.c | 25 unsigned char *to, RSA *rsa, int padding); 27 unsigned char *to, RSA *rsa, int padding); 29 unsigned char *to, RSA *rsa, int padding); 32 static int rsa_ossl_mod_exp(BIGNUM *r0, const BIGNUM *i, RSA *rsa, 34 static int rsa_ossl_init(RSA *rsa); 35 static int rsa_ossl_finish(RSA *rsa); 37 static int rsa_ossl_s390x_mod_exp(BIGNUM *r0, const BIGNUM *i, RSA *rsa, 210 static BN_BLINDING *rsa_get_blinding(RSA *rsa, int *local, BN_CTX *ctx) in rsa_get_blinding() 434 static int derive_kdk(int flen, const unsigned char *from, RSA *rsa, in derive_kdk() 1176 static int rsa_ossl_init(RSA *rsa) in rsa_ossl_init() [all …]
|
H A D | rsa_pss.c | 31 int RSA_verify_PKCS1_PSS(RSA *rsa, const unsigned char *mHash, in RSA_verify_PKCS1_PSS() 38 int RSA_verify_PKCS1_PSS_mgf1(RSA *rsa, const unsigned char *mHash, in RSA_verify_PKCS1_PSS_mgf1() 45 int ossl_rsa_verify_PKCS1_PSS_mgf1(RSA *rsa, const unsigned char *mHash, in ossl_rsa_verify_PKCS1_PSS_mgf1() 158 int RSA_padding_add_PKCS1_PSS(RSA *rsa, unsigned char *EM, in RSA_padding_add_PKCS1_PSS() 165 int RSA_padding_add_PKCS1_PSS_mgf1(RSA *rsa, unsigned char *EM, in RSA_padding_add_PKCS1_PSS_mgf1() 173 int ossl_rsa_padding_add_PKCS1_PSS_mgf1(RSA *rsa, unsigned char *EM, in ossl_rsa_padding_add_PKCS1_PSS_mgf1()
|
H A D | rsa_backend.c | 64 int ossl_rsa_fromdata(RSA *rsa, const OSSL_PARAM params[], int include_private) in ossl_rsa_fromdata() 259 int ossl_rsa_todata(RSA *rsa, OSSL_PARAM_BLD *bld, OSSL_PARAM params[], in DEFINE_SPECIAL_STACK_OF_CONST() 455 int ossl_rsa_is_foreign(const RSA *rsa) in ossl_rsa_is_foreign() 471 RSA *ossl_rsa_dup(const RSA *rsa, int selection) in ossl_rsa_dup() 473 RSA *dupkey = NULL; in ossl_rsa_dup() 588 static int ossl_rsa_sync_to_pss_params_30(RSA *rsa) in ossl_rsa_sync_to_pss_params_30() 656 int ossl_rsa_param_decode(RSA *rsa, const X509_ALGOR *alg) in ossl_rsa_param_decode() 682 RSA *ossl_rsa_key_from_pkcs8(const PKCS8_PRIV_KEY_INFO *p8inf, in ossl_rsa_key_from_pkcs8() 686 RSA *rsa; in ossl_rsa_key_from_pkcs8()
|
H A D | rsa_depr.c | 29 RSA *RSA_generate_key(int bits, unsigned long e_value, in RSA_generate_key() 34 RSA *rsa = RSA_new(); in RSA_generate_key()
|
/openssl/apps/ |
H A D | s1024key.pem | 1 -----BEGIN RSA PRIVATE KEY----- 15 -----END RSA PRIVATE KEY-----
|
/openssl/test/ssl-tests/ |
H A D | 04-client_auth.cnf.in | 53 $clisigtype = "RSA"; 54 $clisigalgs = "SHA256+RSA"; 149 "ExpectedClientCertType" => "RSA", 158 # Successful handshake with client RSA-PSS cert, StrictCertCheck 180 "ExpectedClientCertType" => "RSA-PSS", 186 # Failed handshake with client RSA-PSS cert, StrictCertCheck, bad CA 239 "ExpectedClientCertType" => "RSA",
|
/openssl/providers/common/include/prov/ |
H A D | securitycheck.h | 16 int ossl_rsa_key_op_get_protect(const RSA *rsa, int operation, int *outprotect); 17 int ossl_rsa_check_key_size(const RSA *rsa, int protect);
|
/openssl/demos/ |
H A D | README.txt | 29 rsa_encode.c Encode and decode PEM-encoded RSA keys 32 rsa_encrypt.c Encrypt and decrypt data using an RSA keypair. 65 EVP_PKEY_RSA_keygen.c Generate an RSA key. 75 rsa_pss_direct.c Compute and verify an RSA-PSS signature from a hash 76 rsa_pss_hash.c Compute and verify an RSA-PSS signature over a buffer
|
/openssl/test/recipes/04-test_pem_reading_data/ |
H A D | beermug.pem | 1 -----BEGIN RSA PRIVATE KEY----- 30 -----END RSA PRIVATE KEY-----
|
/openssl/crypto/engine/ |
H A D | README.md | 60 Already there is a problem with the way ENGINE supports RSA, DSA, etc whereby 65 RSA functions (eg. "RSA_free(RSA_new());") will result in large quantities of 72 hooking to ENGINE works from RSA, DSA, DH, RAND, as well as adding new hooking 76 work prior to ENGINE :-). Ie. RSA now has a "RSA_METHOD" pointer again - this 77 was previously replaced by an "ENGINE" pointer and all RSA code that required 83 have our RSA structure pointing its RSA_METHOD pointer to the software 127 class-specific ENGINE code for digests, RSA, etc nor will it bleed over into 128 other APIs, such as the RSA/DSA/etc library code. 158 RSA, DSA, DH, and RAND all have their own ENGINE_TABLE code as well, and the 165 represents ENGINEs that implement the single "type" of RSA there is. [all …]
|
/openssl/test/recipes/65-test_cmp_protect_data/ |
H A D | server.pem | 1 -----BEGIN RSA PRIVATE KEY----- 27 -----END RSA PRIVATE KEY-----
|
H A D | prot_RSA.pem | 1 -----BEGIN RSA PRIVATE KEY----- 27 -----END RSA PRIVATE KEY-----
|
/openssl/test/recipes/65-test_cmp_vfy_data/ |
H A D | server.key | 1 -----BEGIN RSA PRIVATE KEY----- 27 -----END RSA PRIVATE KEY-----
|
H A D | insta.priv.pem | 1 -----BEGIN RSA PRIVATE KEY----- 27 -----END RSA PRIVATE KEY-----
|
/openssl/test/recipes/65-test_cmp_client_data/ |
H A D | server.key | 1 -----BEGIN RSA PRIVATE KEY----- 27 -----END RSA PRIVATE KEY-----
|
/openssl/test/certs/ |
H A D | embeddedSCTs1-key.pem | 1 -----BEGIN RSA PRIVATE KEY----- 27 -----END RSA PRIVATE KEY-----
|
H A D | interCA.key | 1 -----BEGIN RSA PRIVATE KEY----- 27 -----END RSA PRIVATE KEY-----
|
H A D | leaf.key | 1 -----BEGIN RSA PRIVATE KEY----- 27 -----END RSA PRIVATE KEY-----
|
/openssl/test/ |
H A D | insta.priv.pem | 1 -----BEGIN RSA PRIVATE KEY----- 27 -----END RSA PRIVATE KEY-----
|
/openssl/demos/bio/ |
H A D | cmod.cnf | 24 SignatureAlgorithms = RSA+SHA512:ECDSA+SHA512 26 RSA.Certificate=server.pem
|
/openssl/demos/certs/apps/ |
H A D | skey2.pem | 1 -----BEGIN RSA PRIVATE KEY----- 27 -----END RSA PRIVATE KEY-----
|
/openssl/test/recipes/80-test_ca_data/ |
H A D | revoked.key | 1 -----BEGIN RSA PRIVATE KEY----- 27 -----END RSA PRIVATE KEY-----
|
/openssl/test/recipes/80-test_cmp_http_data/Mock/ |
H A D | signer.key | 1 -----BEGIN RSA PRIVATE KEY----- 27 -----END RSA PRIVATE KEY-----
|
H A D | new.key | 1 -----BEGIN RSA PRIVATE KEY----- 27 -----END RSA PRIVATE KEY-----
|
/openssl/test/recipes/30-test_evp_data/ |
H A D | evppkey_mismatch.txt | 29 PrivateKey = RSA-2048 61 PrivPubKeyPair = RSA-2048:P-256-PUBLIC 64 PrivPubKeyPair = RSA-2048:KAS-ECC-CDH_K-163_C0-PUBLIC
|