Home
last modified time | relevance | path

Searched refs:pss (Results 1 – 25 of 28) sorted by relevance

12

/openssl/crypto/rsa/
H A Drsa_backend.c545 if (rsa->pss != NULL) { in ossl_rsa_dup()
546 dupkey->pss = RSA_PSS_PARAMS_dup(rsa->pss); in ossl_rsa_dup()
569 RSA_PSS_PARAMS *pss; in ossl_rsa_pss_decode() local
574 if (pss == NULL) in ossl_rsa_pss_decode()
578 pss->maskHash = ossl_x509_algor_mgf1_decode(pss->maskGenAlgorithm); in ossl_rsa_pss_decode()
585 return pss; in ossl_rsa_pss_decode()
622 *pss = pss_params; in ossl_rsa_sync_to_pss_params_30()
636 if (pss == NULL) in ossl_rsa_pss_get_param_unverified()
644 if (pss->saltLength) in ossl_rsa_pss_get_param_unverified()
648 if (pss->trailerField) in ossl_rsa_pss_get_param_unverified()
[all …]
H A Drsa_ameth.c41 if (rsa->pss == NULL) { in rsa_param_encode()
214 if (pss == NULL) { in rsa_pss_param_print()
222 } else if (pss == NULL) { in rsa_pss_param_print()
236 if (pss->hashAlgorithm) { in rsa_pss_param_print()
272 if (pss->saltLength) { in rsa_pss_param_print()
284 if (pss->trailerField) { in rsa_pss_param_print()
499 if (pss == NULL) in ossl_rsa_pss_params_create()
516 return pss; in ossl_rsa_pss_params_create()
527 if (pss == NULL) in ossl_rsa_ctx_to_pss_string()
547 RSA_PSS_PARAMS *pss; in ossl_rsa_pss_to_ctx() local
[all …]
H A Drsa_asn1.c81 RSA_PSS_PARAMS *pss = (RSA_PSS_PARAMS *)*pval; variable
82 X509_ALGOR_free(pss->maskHash);
H A Drsa_local.h84 RSA_PSS_PARAMS *pss; member
160 int ossl_rsa_pss_get_param(const RSA_PSS_PARAMS *pss, const EVP_MD **pmd,
H A Drsa_lib.c181 RSA_PSS_PARAMS_free(r->pss); in RSA_free()
690 return r->pss; in RSA_get0_pss_params()
695 int ossl_rsa_set0_pss_params(RSA *r, RSA_PSS_PARAMS *pss) in ossl_rsa_set0_pss_params() argument
700 RSA_PSS_PARAMS_free(r->pss); in ossl_rsa_set0_pss_params()
701 r->pss = pss; in ossl_rsa_set0_pss_params()
H A Drsa_pmeth.c774 rsa->pss = ossl_rsa_pss_params_create(rctx->md, rctx->mgf1md, in rsa_set_pss_param()
777 if (rsa->pss == NULL) in rsa_set_pss_param()
879 if (rsa->pss == NULL) in pkey_pss_init()
882 if (!ossl_rsa_pss_get_param(rsa->pss, &md, &mgf1md, &min_saltlen)) in pkey_pss_init()
/openssl/test/recipes/30-test_evp_data/
H A Devppkey_rsa.txt263 Ctrl = rsa_padding_mode:pss
296 Ctrl = rsa_padding_mode:pss
302 Ctrl = rsa_padding_mode:pss
308 Ctrl = rsa_padding_mode:pss
314 Ctrl = rsa_padding_mode:pss
320 Ctrl = rsa_padding_mode:pss
326 Ctrl = rsa_padding_mode:pss
341 Ctrl = rsa_padding_mode:pss
347 Ctrl = rsa_padding_mode:pss
353 Ctrl = rsa_padding_mode:pss
[all …]
H A Devppkey_rsa_common.txt908 Ctrl = rsa_padding_mode:pss
915 Ctrl = rsa_padding_mode:pss
924 Ctrl = rsa_padding_mode:pss
931 Ctrl = rsa_padding_mode:pss
940 Ctrl = rsa_padding_mode:pss
949 Ctrl = rsa_padding_mode:pss
958 Ctrl = rsa_padding_mode:pss
966 Ctrl = rsa_padding_mode:pss
1016 Ctrl = rsa_padding_mode:pss
1025 Ctrl = rsa_padding_mode:pss
[all …]
/openssl/providers/common/der/
H A Dder_rsa_key.c248 const RSA_PSS_PARAMS_30 *pss) in DER_w_MaskGenAlgorithm() argument
250 if (pss != NULL && ossl_rsa_pss_params_30_maskgenalg(pss) == NID_mgf1) { in DER_w_MaskGenAlgorithm()
284 const RSA_PSS_PARAMS_30 *pss) in ossl_DER_w_RSASSA_PSS_params() argument
300 if (!ossl_assert(pss != NULL in ossl_DER_w_RSASSA_PSS_params()
301 && !ossl_rsa_pss_params_30_is_unrestricted(pss))) in ossl_DER_w_RSASSA_PSS_params()
304 hashalg_nid = ossl_rsa_pss_params_30_hashalg(pss); in ossl_DER_w_RSASSA_PSS_params()
305 saltlen = ossl_rsa_pss_params_30_saltlen(pss); in ossl_DER_w_RSASSA_PSS_params()
306 trailerfield = ossl_rsa_pss_params_30_trailerfield(pss); in ossl_DER_w_RSASSA_PSS_params()
352 && DER_w_MaskGenAlgorithm(pkt, 1, pss) in ossl_DER_w_RSASSA_PSS_params()
387 || ossl_rsa_pss_params_30_is_unrestricted(pss) in ossl_DER_w_algorithmIdentifier_RSA_PSS()
[all …]
/openssl/test/ssl-tests/
H A D04-client_auth.cnf9 test-4 = 4-client-auth-flex-rsa-pss
10 test-5 = 5-client-auth-flex-rsa-pss-bad
29 test-24 = 24-client-auth-TLSv1.2-rsa-pss
149 [4-client-auth-flex-rsa-pss]
152 [4-client-auth-flex-rsa-pss-ssl]
156 [4-client-auth-flex-rsa-pss-server]
164 [4-client-auth-flex-rsa-pss-client]
180 [5-client-auth-flex-rsa-pss-bad]
183 [5-client-auth-flex-rsa-pss-bad-ssl]
754 [24-client-auth-TLSv1.2-rsa-pss]
[all …]
H A D04-client_auth.cnf.in160 name => "client-auth-${protocol_name}-rsa-pss"
174 "Certificate" => test_pem("client-pss-restrict-cert.pem"),
175 "PrivateKey" => test_pem("client-pss-restrict-key.pem"),
188 name => "client-auth-${protocol_name}-rsa-pss-bad"
202 "Certificate" => test_pem("client-pss-restrict-cert.pem"),
203 "PrivateKey" => test_pem("client-pss-restrict-key.pem"),
H A D20-cert-select.cnf.in26 "PSS.Certificate" => test_pem("server-pss-cert.pem"),
27 "PSS.PrivateKey" => test_pem("server-pss-key.pem"),
38 "Certificate" => test_pem("server-pss-cert.pem"),
39 "PrivateKey" => test_pem("server-pss-key.pem"),
43 "Certificate" => test_pem("server-pss-restrict-cert.pem"),
44 "PrivateKey" => test_pem("server-pss-restrict-key.pem"),
56 "PSS.Certificate" => test_pem("server-pss-cert.pem"),
57 "PSS.PrivateKey" => test_pem("server-pss-key.pem"),
590 "Certificate" => test_pem("server-pss-cert.pem"),
591 "PrivateKey" => test_pem("server-pss-key.pem"),
H A D20-cert-select.cnf457 PSS.PrivateKey = ${ENV::TEST_CERTS_DIR}/server-pss-key.pem
916 Certificate = ${ENV::TEST_CERTS_DIR}/server-pss-cert.pem
918 PrivateKey = ${ENV::TEST_CERTS_DIR}/server-pss-key.pem
942 Certificate = ${ENV::TEST_CERTS_DIR}/server-pss-cert.pem
944 PrivateKey = ${ENV::TEST_CERTS_DIR}/server-pss-key.pem
969 Certificate = ${ENV::TEST_CERTS_DIR}/server-pss-cert.pem
971 PrivateKey = ${ENV::TEST_CERTS_DIR}/server-pss-key.pem
1097 Certificate = ${ENV::TEST_CERTS_DIR}/server-pss-cert.pem
1099 PrivateKey = ${ENV::TEST_CERTS_DIR}/server-pss-key.pem
1121 Certificate = ${ENV::TEST_CERTS_DIR}/server-pss-cert.pem
[all …]
/openssl/test/certs/
H A Dsetup.sh230 openssl req -new -x509 -key ee-key.pem -subj /CN=ee-self-signed-pss -out ee-self-signed-pss.pem -da…
231 -sha256 -sigopt rsa_padding_mode:pss -sigopt rsa_pss_saltlen:digest
427 ./mkcert.sh genee PSS-SHA1 ee-key ee-pss-sha1-cert ca-key ca-cert \
428 -sha1 -sigopt rsa_padding_mode:pss -sigopt rsa_pss_saltlen:digest
430 ./mkcert.sh genee PSS-SHA256 ee-key ee-pss-sha256-cert ca-key ca-cert \
433 ./mkcert.sh genca "CA-PSS" ca-pss-key ca-pss-cert root-key root-cert \
435 ./mkcert.sh genee "EE-PSS" ee-key ee-pss-cert ca-pss-key ca-pss-cert \
445 -newkey rsa-pss -keyout server-pss-restrict-key.pem \
448 server-pss-restrict-cert rootkey rootcert
451 -newkey rsa-pss -keyout client-pss-restrict-key.pem \
[all …]
/openssl/include/crypto/
H A Drsa.h77 int ossl_rsa_pss_params_30_todata(const RSA_PSS_PARAMS_30 *pss,
83 int ossl_rsa_set0_pss_params(RSA *r, RSA_PSS_PARAMS *pss);
84 int ossl_rsa_pss_get_param_unverified(const RSA_PSS_PARAMS *pss,
/openssl/providers/common/include/prov/
H A Dder_rsa.h.in25 const RSA_PSS_PARAMS_30 *pss);
30 const RSA_PSS_PARAMS_30 *pss);
/openssl/doc/man7/
H A DEVP_SIGNATURE-RSA.pod96 =item "pss" (B<OSSL_PKEY_RSA_PAD_MODE_PSS>)
102 The digest algorithm name to use for the maskGenAlgorithm used by "pss" mode.
111 The "pss" mode minimum salt length. The value can either be an integer,
149 =item "rsa-pss-saltlen-check" (B<OSSL_SIGNATURE_PARAM_FIPS_RSA_PSS_SALTLEN_CHECK>) <integer>
/openssl/include/openssl/
H A Dcore_names.h.in88 # define OSSL_PKEY_RSA_PAD_MODE_PSS "pss"
90 /* RSA pss padding salt length */
/openssl/crypto/x509/
H A Dx_all.c541 RSA_PSS_PARAMS *pss = ossl_rsa_pss_decode(&cert->sig_alg); in X509_digest_sig() local
545 if (pss == NULL in X509_digest_sig()
546 || !ossl_rsa_pss_get_param_unverified(pss, &mmd, &mgf1md, in X509_digest_sig()
550 RSA_PSS_PARAMS_free(pss); in X509_digest_sig()
554 RSA_PSS_PARAMS_free(pss); in X509_digest_sig()
/openssl/providers/implementations/signature/
H A Drsa_sig.c544 const RSA_PSS_PARAMS_30 *pss = in rsa_signverify_init() local
547 if (!ossl_rsa_pss_params_30_is_unrestricted(pss)) { in rsa_signverify_init()
548 int md_nid = ossl_rsa_pss_params_30_hashalg(pss); in rsa_signverify_init()
549 int mgf1md_nid = ossl_rsa_pss_params_30_maskgenhashalg(pss); in rsa_signverify_init()
550 int min_saltlen = ossl_rsa_pss_params_30_saltlen(pss); in rsa_signverify_init()
/openssl/doc/man1/
H A Dopenssl-pkeyutl.pod.in271 for B<OAEP> mode, B<x931> for X9.31 mode and B<pss> for PSS.
289 For B<pss> mode only sign and verify are supported and the digest type must be
294 For B<pss> mode only this option specifies the salt length. Three special
334 restrictions. The padding mode can only be set to B<pss> which is the
/openssl/providers/implementations/encode_decode/
H A Dencode_key2any.c838 const RSA_PSS_PARAMS_30 *pss = ossl_rsa_get0_pss_params_30((RSA *)rsa); in prepare_rsa_params() local
848 if (ossl_rsa_pss_params_30_is_unrestricted(pss)) { in prepare_rsa_params()
872 if (!ossl_DER_w_RSASSA_PSS_params(&pkt, -1, pss) in prepare_rsa_params()
/openssl/doc/man5/
H A Dfips_config.pod149 =item B<rsa-pss-saltlen-check>
/openssl/crypto/objects/
H A Dobj_mac.num435 pss 435
/openssl/crypto/err/
H A Dopenssl.txt1143 PROV_R_PSS_SALTLEN_TOO_SMALL:172:pss saltlen too small
1257 RSA_R_INVALID_PSS_PARAMETERS:149:invalid pss parameters
1258 RSA_R_INVALID_PSS_SALTLEN:146:invalid pss saltlen
1284 RSA_R_PSS_SALTLEN_TOO_SMALL:164:pss saltlen too small

Completed in 85 milliseconds

12