/openssl/crypto/rsa/ |
H A D | rsa_backend.c | 545 if (rsa->pss != NULL) { in ossl_rsa_dup() 546 dupkey->pss = RSA_PSS_PARAMS_dup(rsa->pss); in ossl_rsa_dup() 569 RSA_PSS_PARAMS *pss; in ossl_rsa_pss_decode() local 574 if (pss == NULL) in ossl_rsa_pss_decode() 578 pss->maskHash = ossl_x509_algor_mgf1_decode(pss->maskGenAlgorithm); in ossl_rsa_pss_decode() 585 return pss; in ossl_rsa_pss_decode() 622 *pss = pss_params; in ossl_rsa_sync_to_pss_params_30() 636 if (pss == NULL) in ossl_rsa_pss_get_param_unverified() 644 if (pss->saltLength) in ossl_rsa_pss_get_param_unverified() 648 if (pss->trailerField) in ossl_rsa_pss_get_param_unverified() [all …]
|
H A D | rsa_ameth.c | 41 if (rsa->pss == NULL) { in rsa_param_encode() 214 if (pss == NULL) { in rsa_pss_param_print() 222 } else if (pss == NULL) { in rsa_pss_param_print() 236 if (pss->hashAlgorithm) { in rsa_pss_param_print() 272 if (pss->saltLength) { in rsa_pss_param_print() 284 if (pss->trailerField) { in rsa_pss_param_print() 499 if (pss == NULL) in ossl_rsa_pss_params_create() 516 return pss; in ossl_rsa_pss_params_create() 527 if (pss == NULL) in ossl_rsa_ctx_to_pss_string() 547 RSA_PSS_PARAMS *pss; in ossl_rsa_pss_to_ctx() local [all …]
|
H A D | rsa_asn1.c | 81 RSA_PSS_PARAMS *pss = (RSA_PSS_PARAMS *)*pval; variable 82 X509_ALGOR_free(pss->maskHash);
|
H A D | rsa_local.h | 84 RSA_PSS_PARAMS *pss; member 160 int ossl_rsa_pss_get_param(const RSA_PSS_PARAMS *pss, const EVP_MD **pmd,
|
H A D | rsa_lib.c | 181 RSA_PSS_PARAMS_free(r->pss); in RSA_free() 690 return r->pss; in RSA_get0_pss_params() 695 int ossl_rsa_set0_pss_params(RSA *r, RSA_PSS_PARAMS *pss) in ossl_rsa_set0_pss_params() argument 700 RSA_PSS_PARAMS_free(r->pss); in ossl_rsa_set0_pss_params() 701 r->pss = pss; in ossl_rsa_set0_pss_params()
|
H A D | rsa_pmeth.c | 774 rsa->pss = ossl_rsa_pss_params_create(rctx->md, rctx->mgf1md, in rsa_set_pss_param() 777 if (rsa->pss == NULL) in rsa_set_pss_param() 879 if (rsa->pss == NULL) in pkey_pss_init() 882 if (!ossl_rsa_pss_get_param(rsa->pss, &md, &mgf1md, &min_saltlen)) in pkey_pss_init()
|
/openssl/test/recipes/30-test_evp_data/ |
H A D | evppkey_rsa.txt | 263 Ctrl = rsa_padding_mode:pss 296 Ctrl = rsa_padding_mode:pss 302 Ctrl = rsa_padding_mode:pss 308 Ctrl = rsa_padding_mode:pss 314 Ctrl = rsa_padding_mode:pss 320 Ctrl = rsa_padding_mode:pss 326 Ctrl = rsa_padding_mode:pss 341 Ctrl = rsa_padding_mode:pss 347 Ctrl = rsa_padding_mode:pss 353 Ctrl = rsa_padding_mode:pss [all …]
|
H A D | evppkey_rsa_common.txt | 908 Ctrl = rsa_padding_mode:pss 915 Ctrl = rsa_padding_mode:pss 924 Ctrl = rsa_padding_mode:pss 931 Ctrl = rsa_padding_mode:pss 940 Ctrl = rsa_padding_mode:pss 949 Ctrl = rsa_padding_mode:pss 958 Ctrl = rsa_padding_mode:pss 966 Ctrl = rsa_padding_mode:pss 1016 Ctrl = rsa_padding_mode:pss 1025 Ctrl = rsa_padding_mode:pss [all …]
|
/openssl/providers/common/der/ |
H A D | der_rsa_key.c | 248 const RSA_PSS_PARAMS_30 *pss) in DER_w_MaskGenAlgorithm() argument 250 if (pss != NULL && ossl_rsa_pss_params_30_maskgenalg(pss) == NID_mgf1) { in DER_w_MaskGenAlgorithm() 284 const RSA_PSS_PARAMS_30 *pss) in ossl_DER_w_RSASSA_PSS_params() argument 300 if (!ossl_assert(pss != NULL in ossl_DER_w_RSASSA_PSS_params() 301 && !ossl_rsa_pss_params_30_is_unrestricted(pss))) in ossl_DER_w_RSASSA_PSS_params() 304 hashalg_nid = ossl_rsa_pss_params_30_hashalg(pss); in ossl_DER_w_RSASSA_PSS_params() 305 saltlen = ossl_rsa_pss_params_30_saltlen(pss); in ossl_DER_w_RSASSA_PSS_params() 306 trailerfield = ossl_rsa_pss_params_30_trailerfield(pss); in ossl_DER_w_RSASSA_PSS_params() 352 && DER_w_MaskGenAlgorithm(pkt, 1, pss) in ossl_DER_w_RSASSA_PSS_params() 387 || ossl_rsa_pss_params_30_is_unrestricted(pss) in ossl_DER_w_algorithmIdentifier_RSA_PSS() [all …]
|
/openssl/test/ssl-tests/ |
H A D | 04-client_auth.cnf | 9 test-4 = 4-client-auth-flex-rsa-pss 10 test-5 = 5-client-auth-flex-rsa-pss-bad 29 test-24 = 24-client-auth-TLSv1.2-rsa-pss 149 [4-client-auth-flex-rsa-pss] 152 [4-client-auth-flex-rsa-pss-ssl] 156 [4-client-auth-flex-rsa-pss-server] 164 [4-client-auth-flex-rsa-pss-client] 180 [5-client-auth-flex-rsa-pss-bad] 183 [5-client-auth-flex-rsa-pss-bad-ssl] 754 [24-client-auth-TLSv1.2-rsa-pss] [all …]
|
H A D | 04-client_auth.cnf.in | 160 name => "client-auth-${protocol_name}-rsa-pss" 174 "Certificate" => test_pem("client-pss-restrict-cert.pem"), 175 "PrivateKey" => test_pem("client-pss-restrict-key.pem"), 188 name => "client-auth-${protocol_name}-rsa-pss-bad" 202 "Certificate" => test_pem("client-pss-restrict-cert.pem"), 203 "PrivateKey" => test_pem("client-pss-restrict-key.pem"),
|
H A D | 20-cert-select.cnf.in | 26 "PSS.Certificate" => test_pem("server-pss-cert.pem"), 27 "PSS.PrivateKey" => test_pem("server-pss-key.pem"), 38 "Certificate" => test_pem("server-pss-cert.pem"), 39 "PrivateKey" => test_pem("server-pss-key.pem"), 43 "Certificate" => test_pem("server-pss-restrict-cert.pem"), 44 "PrivateKey" => test_pem("server-pss-restrict-key.pem"), 56 "PSS.Certificate" => test_pem("server-pss-cert.pem"), 57 "PSS.PrivateKey" => test_pem("server-pss-key.pem"), 590 "Certificate" => test_pem("server-pss-cert.pem"), 591 "PrivateKey" => test_pem("server-pss-key.pem"),
|
H A D | 20-cert-select.cnf | 457 PSS.PrivateKey = ${ENV::TEST_CERTS_DIR}/server-pss-key.pem 916 Certificate = ${ENV::TEST_CERTS_DIR}/server-pss-cert.pem 918 PrivateKey = ${ENV::TEST_CERTS_DIR}/server-pss-key.pem 942 Certificate = ${ENV::TEST_CERTS_DIR}/server-pss-cert.pem 944 PrivateKey = ${ENV::TEST_CERTS_DIR}/server-pss-key.pem 969 Certificate = ${ENV::TEST_CERTS_DIR}/server-pss-cert.pem 971 PrivateKey = ${ENV::TEST_CERTS_DIR}/server-pss-key.pem 1097 Certificate = ${ENV::TEST_CERTS_DIR}/server-pss-cert.pem 1099 PrivateKey = ${ENV::TEST_CERTS_DIR}/server-pss-key.pem 1121 Certificate = ${ENV::TEST_CERTS_DIR}/server-pss-cert.pem [all …]
|
/openssl/test/certs/ |
H A D | setup.sh | 230 openssl req -new -x509 -key ee-key.pem -subj /CN=ee-self-signed-pss -out ee-self-signed-pss.pem -da… 231 -sha256 -sigopt rsa_padding_mode:pss -sigopt rsa_pss_saltlen:digest 427 ./mkcert.sh genee PSS-SHA1 ee-key ee-pss-sha1-cert ca-key ca-cert \ 428 -sha1 -sigopt rsa_padding_mode:pss -sigopt rsa_pss_saltlen:digest 430 ./mkcert.sh genee PSS-SHA256 ee-key ee-pss-sha256-cert ca-key ca-cert \ 433 ./mkcert.sh genca "CA-PSS" ca-pss-key ca-pss-cert root-key root-cert \ 435 ./mkcert.sh genee "EE-PSS" ee-key ee-pss-cert ca-pss-key ca-pss-cert \ 445 -newkey rsa-pss -keyout server-pss-restrict-key.pem \ 448 server-pss-restrict-cert rootkey rootcert 451 -newkey rsa-pss -keyout client-pss-restrict-key.pem \ [all …]
|
/openssl/include/crypto/ |
H A D | rsa.h | 77 int ossl_rsa_pss_params_30_todata(const RSA_PSS_PARAMS_30 *pss, 83 int ossl_rsa_set0_pss_params(RSA *r, RSA_PSS_PARAMS *pss); 84 int ossl_rsa_pss_get_param_unverified(const RSA_PSS_PARAMS *pss,
|
/openssl/providers/common/include/prov/ |
H A D | der_rsa.h.in | 25 const RSA_PSS_PARAMS_30 *pss); 30 const RSA_PSS_PARAMS_30 *pss);
|
/openssl/doc/man7/ |
H A D | EVP_SIGNATURE-RSA.pod | 96 =item "pss" (B<OSSL_PKEY_RSA_PAD_MODE_PSS>) 102 The digest algorithm name to use for the maskGenAlgorithm used by "pss" mode. 111 The "pss" mode minimum salt length. The value can either be an integer, 149 =item "rsa-pss-saltlen-check" (B<OSSL_SIGNATURE_PARAM_FIPS_RSA_PSS_SALTLEN_CHECK>) <integer>
|
/openssl/include/openssl/ |
H A D | core_names.h.in | 88 # define OSSL_PKEY_RSA_PAD_MODE_PSS "pss" 90 /* RSA pss padding salt length */
|
/openssl/crypto/x509/ |
H A D | x_all.c | 543 RSA_PSS_PARAMS *pss = ossl_rsa_pss_decode(&cert->sig_alg); in X509_digest_sig() local 547 if (pss == NULL in X509_digest_sig() 548 || !ossl_rsa_pss_get_param_unverified(pss, &mmd, &mgf1md, in X509_digest_sig() 552 RSA_PSS_PARAMS_free(pss); in X509_digest_sig() 556 RSA_PSS_PARAMS_free(pss); in X509_digest_sig()
|
/openssl/providers/implementations/signature/ |
H A D | rsa_sig.c | 544 const RSA_PSS_PARAMS_30 *pss = in rsa_signverify_init() local 547 if (!ossl_rsa_pss_params_30_is_unrestricted(pss)) { in rsa_signverify_init() 548 int md_nid = ossl_rsa_pss_params_30_hashalg(pss); in rsa_signverify_init() 549 int mgf1md_nid = ossl_rsa_pss_params_30_maskgenhashalg(pss); in rsa_signverify_init() 550 int min_saltlen = ossl_rsa_pss_params_30_saltlen(pss); in rsa_signverify_init()
|
/openssl/doc/man1/ |
H A D | openssl-pkeyutl.pod.in | 308 for B<OAEP> mode, B<x931> for X9.31 mode and B<pss> for PSS. 326 For B<pss> mode only sign and verify are supported and the digest type must be 331 For B<pss> mode only this option specifies the salt length. Three special 371 restrictions. The padding mode can only be set to B<pss> which is the
|
/openssl/providers/implementations/encode_decode/ |
H A D | encode_key2any.c | 838 const RSA_PSS_PARAMS_30 *pss = ossl_rsa_get0_pss_params_30((RSA *)rsa); in prepare_rsa_params() local 848 if (ossl_rsa_pss_params_30_is_unrestricted(pss)) { in prepare_rsa_params() 872 if (!ossl_DER_w_RSASSA_PSS_params(&pkt, -1, pss) in prepare_rsa_params()
|
/openssl/doc/man5/ |
H A D | fips_config.pod | 149 =item B<rsa-pss-saltlen-check>
|
/openssl/crypto/objects/ |
H A D | obj_mac.num | 435 pss 435
|
/openssl/crypto/err/ |
H A D | openssl.txt | 1143 PROV_R_PSS_SALTLEN_TOO_SMALL:172:pss saltlen too small 1257 RSA_R_INVALID_PSS_PARAMETERS:149:invalid pss parameters 1258 RSA_R_INVALID_PSS_SALTLEN:146:invalid pss saltlen 1284 RSA_R_PSS_SALTLEN_TOO_SMALL:164:pss saltlen too small
|