| /src/crypto/openssl/test/ssl-tests/ |
| H A D | 25-cipher.cnf.in | 25 "CipherString" => "ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA256", 29 "CipherString" => "ECDHE-RSA-AES256-SHA384" 32 "ExpectedCipher" => "ECDHE-RSA-AES256-SHA384", 39 "CipherString" => "ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA256", 43 "CipherString" => "ECDHE-RSA-AES128-SHA256" 46 "ExpectedCipher" => "ECDHE-RSA-AES128-SHA256", 53 "CipherString" => "ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA256", 57 "CipherString" => "ECDHE-RSA-AES128-SHA256:ECDHE-RSA-AES256-SHA384", 60 "ExpectedCipher" => "ECDHE-RSA-AES128-SHA256", 67 "CipherString" => "ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA256", [all …]
|
| H A D | 25-cipher.cnf | 25 CipherString = ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA256 30 CipherString = ECDHE-RSA-AES256-SHA384 36 ExpectedCipher = ECDHE-RSA-AES256-SHA384 50 CipherString = ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA256 55 CipherString = ECDHE-RSA-AES128-SHA256 61 ExpectedCipher = ECDHE-RSA-AES128-SHA256 75 CipherString = ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA256 80 CipherString = ECDHE-RSA-AES128-SHA256:ECDHE-RSA-AES256-SHA384 86 ExpectedCipher = ECDHE-RSA-AES128-SHA256 100 CipherString = ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA256 [all …]
|
| H A D | 20-cert-select.cnf | 8 test-3 = 3-RSA CipherString Selection 15 test-10 = 10-RSA Signature Algorithm Selection 16 test-11 = 11-RSA-PSS Signature Algorithm Selection 17 test-12 = 12-RSA key exchange with all RSA certificate types 28 test-23 = 23-RSA-PSS Certificate CipherString Selection 29 test-24 = 24-RSA-PSS Certificate Legacy Signature Algorithm Selection 30 test-25 = 25-RSA-PSS Certificate Unified Signature Algorithm Selection 31 test-26 = 26-Only RSA-PSS Certificate 32 test-27 = 27-Only RSA-PSS Certificate Valid Signature Algorithms 33 test-28 = 28-RSA-PSS Certificate, no PSS signature algorithms [all …]
|
| H A D | 20-cert-select.cnf.in | 139 name => "RSA CipherString Selection", 146 "ExpectedServerCertType" =>, "RSA", 147 "ExpectedServerSignType" =>, "RSA-PSS", 235 name => "RSA Signature Algorithm Selection", 238 "SignatureAlgorithms" => randcase("RSA+SHA256"), 241 "ExpectedServerCertType" => "RSA", 243 "ExpectedServerSignType" => "RSA", 248 name => "RSA-PSS Signature Algorithm Selection", 251 "SignatureAlgorithms" => randcase("RSA-PSS+SHA256"), 254 "ExpectedServerCertType" => "RSA", [all …]
|
| /src/crypto/openssl/include/openssl/ |
| H A D | rsa.h | 212 OSSL_DEPRECATEDIN_3_0 RSA *RSA_new(void); 213 OSSL_DEPRECATEDIN_3_0 RSA *RSA_new_method(ENGINE *engine); 214 OSSL_DEPRECATEDIN_3_0 int RSA_bits(const RSA *rsa); 215 OSSL_DEPRECATEDIN_3_0 int RSA_size(const RSA *rsa); 216 OSSL_DEPRECATEDIN_3_0 int RSA_security_bits(const RSA *rsa); 218 OSSL_DEPRECATEDIN_3_0 int RSA_set0_key(RSA *r, BIGNUM *n, BIGNUM *e, BIGNUM *d); 219 OSSL_DEPRECATEDIN_3_0 int RSA_set0_factors(RSA *r, BIGNUM *p, BIGNUM *q); 220 OSSL_DEPRECATEDIN_3_0 int RSA_set0_crt_params(RSA *r, 223 OSSL_DEPRECATEDIN_3_0 int RSA_set0_multi_prime_params(RSA *r, 228 OSSL_DEPRECATEDIN_3_0 void RSA_get0_key(const RSA *r, [all …]
|
| /src/crypto/openssl/test/recipes/30-test_evp_data/ |
| H A D | evppkey_rsa_sigalg.txt | 17 # RSA 2048 bit key. 19 PrivateKey = RSA-2048 51 PublicKey = RSA-2048-PUBLIC 62 PrivPubKeyPair = RSA-2048:RSA-2048-PUBLIC 64 Title = RSA tests with EVP_PKEY_sign, EVP_PKEY_verify, EVP_PKEY_verify_recover 66 # Demonstrate the possibility to use the RSA (not RSA-SHA1) signature 70 Sign = RSA:RSA-2048 76 Sign = RSA-SHA1:RSA-2048 82 Sign = RSA-SHA1:RSA-2048 89 Sign = RSA-SHA1:RSA-2048 [all …]
|
| H A D | evppkey_rsa_common.txt | 17 # RSA 2048 bit key. 19 PrivateKey = RSA-2048 51 PublicKey = RSA-2048-PUBLIC 62 PrivPubKeyPair = RSA-2048:RSA-2048-PUBLIC 66 # generated using (openssl genpkey -algorithm RSA -pkeyopt bits:1024) 67 PrivateKey = RSA-1024 85 PrivateKey = RSA-512 97 Title = RSA tests 99 Verify = RSA-2048 105 Sign = RSA-2048 [all …]
|
| H A D | evppkey_rsa.txt | 19 # RSA 2048 bit key. 21 PrivateKey = RSA-2048 53 PublicKey = RSA-2048-PUBLIC 64 PrivPubKeyPair = RSA-2048:RSA-2048-PUBLIC 66 Title = RSA tests 69 Sign = RSA-2048 76 Sign = RSA-2048 84 Sign = RSA-2048 91 VerifyRecover = RSA-2048 98 Verify = RSA-2048 [all …]
|
| H A D | evppkey_rsa_kem.txt | 9 Title = Test RSA KEM 11 PrivateKey = RSA-2048 43 PublicKey = RSA-2048-PUBLIC 54 # We only keep the private key for RSA-512 since it is only used for 57 PrivateKey = RSA-512 69 # RSA Encapsulate/Decapsulate 70 Kem = RSA 71 KeyName = RSA-2048 76 Kem = RSA 77 KeyName = RSA-2048 [all …]
|
| /src/crypto/openssl/crypto/rsa/ |
| H A D | rsa_asn1.c | 37 RSA_free((RSA *)*pval); in rsa_cb() 41 if (((RSA *)*pval)->version != RSA_ASN1_VERSION_MULTI) { in rsa_cb() 45 return (ossl_rsa_multip_calc_product((RSA *)*pval) == 1) ? 2 : 0; in rsa_cb() 58 ASN1_EMBED(RSA, version, INT32), 59 ASN1_SIMPLE(RSA, n, BIGNUM), 60 ASN1_SIMPLE(RSA, e, BIGNUM), 61 ASN1_SIMPLE(RSA, d, CBIGNUM), 62 ASN1_SIMPLE(RSA, p, CBIGNUM), 63 ASN1_SIMPLE(RSA, q, CBIGNUM), 64 ASN1_SIMPLE(RSA, dmp1, CBIGNUM), [all …]
|
| H A D | rsa_local.h | 106 unsigned char *to, RSA *rsa, int padding); 108 unsigned char *to, RSA *rsa, int padding); 110 unsigned char *to, RSA *rsa, int padding); 112 unsigned char *to, RSA *rsa, int padding); 114 int (*rsa_mod_exp)(BIGNUM *r0, const BIGNUM *I, RSA *rsa, BN_CTX *ctx); 119 int (*init)(RSA *rsa); 121 int (*finish)(RSA *rsa); 135 const RSA *rsa); 138 unsigned int siglen, const RSA *rsa); 145 int (*rsa_keygen)(RSA *rsa, int bits, BIGNUM *e, BN_GENCB *cb); [all …]
|
| H A D | rsa_meth.c | 103 unsigned char *to, RSA *rsa, int padding) in RSA_meth_get_pub_enc() 110 unsigned char *to, RSA *rsa, in RSA_meth_set_pub_enc() 118 unsigned char *to, RSA *rsa, int padding) in RSA_meth_get_pub_dec() 125 unsigned char *to, RSA *rsa, in RSA_meth_set_pub_dec() 133 unsigned char *to, RSA *rsa, int padding) in RSA_meth_get_priv_enc() 140 unsigned char *to, RSA *rsa, in RSA_meth_set_priv_enc() 148 unsigned char *to, RSA *rsa, int padding) in RSA_meth_get_priv_dec() 155 unsigned char *to, RSA *rsa, in RSA_meth_set_priv_dec() 163 int (*RSA_meth_get_mod_exp(const RSA_METHOD *meth))(BIGNUM *r0, const BIGNUM *i, RSA *rsa, BN_CTX *… in RSA_meth_get_mod_exp() 169 int (*mod_exp)(BIGNUM *r0, const BIGNUM *i, RSA *rsa, in RSA_meth_set_mod_exp() [all …]
|
| H A D | rsa_lib.c | 31 static RSA *rsa_new_intern(ENGINE *engine, OSSL_LIB_CTX *libctx); 34 RSA *RSA_new(void) in RSA_new() 39 const RSA_METHOD *RSA_get_method(const RSA *rsa) in RSA_get_method() 44 int RSA_set_method(RSA *rsa, const RSA_METHOD *meth) in RSA_set_method() 64 RSA *RSA_new_method(ENGINE *engine) in RSA_new_method() 70 RSA *ossl_rsa_new_with_ctx(OSSL_LIB_CTX *libctx) in ossl_rsa_new_with_ctx() 75 static RSA *rsa_new_intern(ENGINE *engine, OSSL_LIB_CTX *libctx) in rsa_new_intern() 77 RSA *ret = OPENSSL_zalloc(sizeof(*ret)); in rsa_new_intern() 136 void RSA_free(RSA *r) in RSA_free() 189 int RSA_up_ref(RSA *r) in RSA_up_ref() [all …]
|
| H A D | rsa_crpt.c | 23 int RSA_bits(const RSA *r) in RSA_bits() 28 int RSA_size(const RSA *r) in RSA_size() 34 RSA *rsa, int padding) in RSA_public_encrypt() 40 unsigned char *to, RSA *rsa, int padding) in RSA_private_encrypt() 46 unsigned char *to, RSA *rsa, int padding) in RSA_private_decrypt() 52 RSA *rsa, int padding) in RSA_public_decrypt() 57 int RSA_flags(const RSA *r) in RSA_flags() 62 void RSA_blinding_off(RSA *rsa) in RSA_blinding_off() 70 int RSA_blinding_on(RSA *rsa, BN_CTX *ctx) in RSA_blinding_on() 116 BN_BLINDING *RSA_setup_blinding(RSA *rsa, BN_CTX *in_ctx) in RSA_setup_blinding()
|
| /src/crypto/openssl/include/crypto/ |
| H A D | rsa.h | 30 RSA_PSS_PARAMS_30 *ossl_rsa_get0_pss_params_30(RSA *r); 49 int ossl_rsa_verify_PKCS1_PSS_mgf1(RSA *rsa, const unsigned char *mHash, 52 int ossl_rsa_padding_add_PKCS1_PSS_mgf1(RSA *rsa, unsigned char *EM, 61 RSA *ossl_rsa_new_with_ctx(OSSL_LIB_CTX *libctx); 62 OSSL_LIB_CTX *ossl_rsa_get0_libctx(RSA *r); 63 void ossl_rsa_set0_libctx(RSA *r, OSSL_LIB_CTX *libctx); 65 int ossl_rsa_set0_all_params(RSA *r, STACK_OF(BIGNUM) *primes, 68 int ossl_rsa_get0_all_params(RSA *r, STACK_OF(BIGNUM_const) *primes, 71 int ossl_rsa_is_foreign(const RSA *rsa); 72 RSA *ossl_rsa_dup(const RSA *rsa, int selection); [all …]
|
| /src/crypto/openssl/doc/man3/ |
| H A D | RSA_get0_key.pod | 13 - Routines for getting and setting data in an RSA object 23 int RSA_set0_key(RSA *r, BIGNUM *n, BIGNUM *e, BIGNUM *d); 24 int RSA_set0_factors(RSA *r, BIGNUM *p, BIGNUM *q); 25 int RSA_set0_crt_params(RSA *r, BIGNUM *dmp1, BIGNUM *dmq1, BIGNUM *iqmp); 26 void RSA_get0_key(const RSA *r, 28 void RSA_get0_factors(const RSA *r, const BIGNUM **p, const BIGNUM **q); 29 void RSA_get0_crt_params(const RSA *r, 32 const BIGNUM *RSA_get0_n(const RSA *d); 33 const BIGNUM *RSA_get0_e(const RSA *d); 34 const BIGNUM *RSA_get0_d(const RSA *d); [all …]
|
| H A D | RSA_set_method.pod | 7 RSA_new_method - select RSA method 21 int RSA_set_method(RSA *rsa, const RSA_METHOD *meth); 23 const RSA_METHOD *RSA_get_method(const RSA *rsa); 27 int RSA_flags(const RSA *rsa); 29 RSA *RSA_new_method(ENGINE *engine); 36 An B<RSA_METHOD> specifies the functions that OpenSSL uses for RSA 39 important information about how these RSA API functions are affected by the 45 RSA_set_default_method() makes B<meth> the default method for all RSA 48 been set as a default for RSA, so this function is no longer recommended. 58 B<rsa>. This will replace the RSA_METHOD used by the RSA key and if the [all …]
|
| H A D | RSA_meth_new.pod | 17 - Routines to build up RSA methods 42 unsigned char *to, RSA *rsa, int padding); 45 unsigned char *to, RSA *rsa, 50 unsigned char *to, RSA *rsa, int padding); 53 unsigned char *to, RSA *rsa, 57 unsigned char *to, RSA *rsa, 61 unsigned char *to, RSA *rsa, int padding)); 64 unsigned char *to, RSA *rsa, 68 unsigned char *to, RSA *rsa, int padding)); 72 RSA *rsa, BN_CTX *ctx); [all …]
|
| H A D | RSA_check_key.pod | 5 RSA_check_key_ex, RSA_check_key - validate private RSA keys 15 int RSA_check_key_ex(const RSA *rsa, BN_GENCB *cb); 17 int RSA_check_key(const RSA *rsa); 25 RSA_check_key_ex() function validates RSA keys. 29 It does not work on RSA public keys that have only the modulus 34 the RSA key material, so the RSA key structure must contain all the private 36 Therefore, it cannot be used with any arbitrary RSA key object, 37 even if it is otherwise fit for regular RSA operation. 47 return 1 if B<rsa> is a valid RSA key, and 0 otherwise. 55 Unlike most other RSA functions, this function does B<not> work [all …]
|
| /src/crypto/openssl/doc/man7/ |
| H A D | EVP_PKEY-RSA.pod | 5 EVP_PKEY-RSA, EVP_KEYMGMT-RSA, RSA 6 - EVP_PKEY RSA keytype and algorithm support 10 The B<RSA> keytype is implemented in OpenSSL's default and FIPS providers. 11 That implementation supports the basic RSA keys, containing the modulus I<n>, 16 =head2 Common RSA parameters 19 L<provider-keymgmt(7)/Common parameters>), the B<RSA> keytype implementation 26 The RSA modulus "n" value. 30 The RSA public exponent "e" value. 37 The RSA private exponent "d" value. 59 RSA prime factors. The factors are known as "p", "q" and "r_i" in RFC8017. [all …]
|
| H A D | EVP_SIGNATURE-RSA.pod | 5 EVP_SIGNATURE-RSA 6 - The EVP_PKEY RSA signature implementation 10 Support for computing RSA signatures. 11 See L<EVP_PKEY-RSA(7)> for information related to RSA keys. 22 =item "RSA", "rsaEncryption", "1.2.840.113549.1.1.1" 26 L<RSA keys|EVP_PKEY-RSA(7)>) with L<EVP_DigestSignInit(3)> and 31 =item "RSA-RIPEMD160", "ripemd160WithRSA", "1.3.36.3.3.1.2" 33 =item "RSA-SHA2-256", "RSA-SHA256", "sha256WithRSAEncryption", "1.2.840.113549.1.1.11" 35 =item "RSA-SHA2-384", "RSA-SHA384", "sha384WithRSAEncryption", "1.2.840.113549.1.1.12" 37 =item "RSA-SHA2-512", "RSA-SHA512", "sha512WithRSAEncryption", "1.2.840.113549.1.1.13" [all …]
|
| /src/crypto/openssh/regress/ |
| H A D | agent-pkcs11-cert.sh | 20 $SSHKEYGEN -qs $OBJ/ca -I "rsa_key" -n $USER -z 2 ${SSH_SOFTHSM_DIR}/RSA.pub || 47 ${SSH_SOFTHSM_DIR}/RSA.pub \ 48 ${SSH_SOFTHSM_DIR}/RSA-cert.pub || 53 ${SSH_SOFTHSM_DIR}/RSA.pub \ 55 ${SSH_SOFTHSM_DIR}/RSA-cert.pub | sort > $OBJ/expect_list 60 for x in ${SSH_SOFTHSM_DIR}/EC.pub ${SSH_SOFTHSM_DIR}/RSA.pub \ 61 ${SSH_SOFTHSM_DIR}/EC-cert.pub ${SSH_SOFTHSM_DIR}/RSA-cert.pub ; do 66 $SSHADD -qd ${SSH_SOFTHSM_DIR}/EC.pub ${SSH_SOFTHSM_DIR}/RSA.pub 68 for x in ${SSH_SOFTHSM_DIR}/EC-cert.pub ${SSH_SOFTHSM_DIR}/RSA-cert.pub ; do 79 ${SSH_SOFTHSM_DIR}/RSA.pub \ [all …]
|
| /src/crypto/openssl/doc/internal/man3/ |
| H A D | ossl_rsa_get0_all_params.pod | 6 - Internal routines for getting and setting data in an RSA object 12 int ossl_rsa_get0_all_params(RSA *r, STACK_OF(BIGNUM_const) *primes, 15 int ossl_rsa_set0_all_params(RSA *r, const STACK_OF(BIGNUM) *primes, 22 in the B<RSA> object I<r> to the contents of the stacks of BIGNUMs I<primes>, 23 I<exps> and I<coeffs>. The B<RSA> object takes ownership of the BIGNUMs, 27 in the B<RSA> object I<r> and pushes them on the stacks of constant BIGNUMs 28 I<primes>, I<exps> and I<coeffs>. The B<RSA> object retains ownership of the 40 if the B<RSA> object is a multi-prime RSA key. 45 if the B<RSA> object is a multi-prime RSA key. 50 if the B<RSA> object is a multi-prime RSA key.
|
| /src/contrib/bearssl/test/x509/ |
| H A D | alltests.txt | 11 type = RSA 41 type = RSA 47 type = RSA 53 type = RSA 137 keytype = RSA 149 keytype = RSA 159 keytype = RSA 170 keytype = RSA 181 keytype = RSA 192 keytype = RSA [all …]
|
| /src/crypto/openssl/crypto/pem/ |
| H A D | pem_all.c | 28 static RSA *pkey_get_rsa(EVP_PKEY *key, RSA **rsa); 53 static RSA *pkey_get_rsa(EVP_PKEY *key, RSA **rsa) in IMPLEMENT_PEM_rw() 55 RSA *rtmp; in IMPLEMENT_PEM_rw() 69 RSA *PEM_read_bio_RSAPrivateKey(BIO *bp, RSA **rsa, pem_password_cb *cb, in PEM_read_bio_RSAPrivateKey() 79 RSA *PEM_read_RSAPrivateKey(FILE *fp, RSA **rsa, pem_password_cb *cb, void *u) in PEM_read_RSAPrivateKey() 88 IMPLEMENT_PEM_write_cb(RSAPrivateKey, RSA, PEM_STRING_RSA, RSAPrivateKey) in IMPLEMENT_PEM_write_cb() argument 89 IMPLEMENT_PEM_rw(RSAPublicKey, RSA, PEM_STRING_RSA_PUBLIC, RSAPublicKey) in IMPLEMENT_PEM_write_cb() 90 IMPLEMENT_PEM_rw(RSA_PUBKEY, RSA, PEM_STRING_PUBLIC, RSA_PUBKEY) in IMPLEMENT_PEM_write_cb()
|