/freebsd/crypto/openssl/test/ssl-tests/ |
H A D | 25-cipher.cnf.in | 25 "CipherString" => "ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA256", 29 "CipherString" => "ECDHE-RSA-AES256-SHA384" 32 "ExpectedCipher" => "ECDHE-RSA-AES256-SHA384", 39 "CipherString" => "ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA256", 43 "CipherString" => "ECDHE-RSA-AES128-SHA256" 46 "ExpectedCipher" => "ECDHE-RSA-AES128-SHA256", 53 "CipherString" => "ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA256", 57 "CipherString" => "ECDHE-RSA-AES128-SHA256:ECDHE-RSA-AES256-SHA384", 60 "ExpectedCipher" => "ECDHE-RSA-AES128-SHA256", 67 "CipherString" => "ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA256", [all …]
|
H A D | 25-cipher.cnf | 25 CipherString = ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA256 30 CipherString = ECDHE-RSA-AES256-SHA384 36 ExpectedCipher = ECDHE-RSA-AES256-SHA384 50 CipherString = ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA256 55 CipherString = ECDHE-RSA-AES128-SHA256 61 ExpectedCipher = ECDHE-RSA-AES128-SHA256 75 CipherString = ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA256 80 CipherString = ECDHE-RSA-AES128-SHA256:ECDHE-RSA-AES256-SHA384 86 ExpectedCipher = ECDHE-RSA-AES128-SHA256 100 CipherString = ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA256 [all …]
|
H A D | 20-cert-select.cnf | 8 test-3 = 3-RSA CipherString Selection 15 test-10 = 10-RSA Signature Algorithm Selection 16 test-11 = 11-RSA-PSS Signature Algorithm Selection 17 test-12 = 12-RSA key exchange with all RSA certificate types 28 test-23 = 23-RSA-PSS Certificate CipherString Selection 29 test-24 = 24-RSA-PSS Certificate Legacy Signature Algorithm Selection 30 test-25 = 25-RSA-PSS Certificate Unified Signature Algorithm Selection 31 test-26 = 26-Only RSA-PSS Certificate 32 test-27 = 27-Only RSA [all...] |
H A D | 20-cert-select.cnf.in | 125 name => "RSA CipherString Selection", 132 "ExpectedServerCertType" =>, "RSA", 133 "ExpectedServerSignType" =>, "RSA-PSS", 221 name => "RSA Signature Algorithm Selection", 224 "SignatureAlgorithms" => "RSA+SHA256", 227 "ExpectedServerCertType" => "RSA", 229 "ExpectedServerSignType" => "RSA", 234 name => "RSA-PSS Signature Algorithm Selection", 237 "SignatureAlgorithms" => "RSA-PSS+SHA256", 240 "ExpectedServerCertType" => "RSA", [all...] |
/freebsd/crypto/openssl/include/openssl/ |
H A D | rsa.h | 201 OSSL_DEPRECATEDIN_3_0 RSA *RSA_new(void); 202 OSSL_DEPRECATEDIN_3_0 RSA *RSA_new_method(ENGINE *engine); 203 OSSL_DEPRECATEDIN_3_0 int RSA_bits(const RSA *rsa); 204 OSSL_DEPRECATEDIN_3_0 int RSA_size(const RSA *rsa); 205 OSSL_DEPRECATEDIN_3_0 int RSA_security_bits(const RSA *rsa); 207 OSSL_DEPRECATEDIN_3_0 int RSA_set0_key(RSA *r, BIGNUM *n, BIGNUM *e, BIGNUM *d); 208 OSSL_DEPRECATEDIN_3_0 int RSA_set0_factors(RSA *r, BIGNUM *p, BIGNUM *q); 209 OSSL_DEPRECATEDIN_3_0 int RSA_set0_crt_params(RSA *r, 212 OSSL_DEPRECATEDIN_3_0 int RSA_set0_multi_prime_params(RSA *r, 217 OSSL_DEPRECATEDIN_3_0 void RSA_get0_key(const RSA *r, [all …]
|
/freebsd/crypto/openssl/test/recipes/30-test_evp_data/ |
H A D | evppkey_rsa_common.txt | 17 # RSA 2048 bit key. 19 PrivateKey = RSA-2048 51 PublicKey = RSA-2048-PUBLIC 62 PrivPubKeyPair = RSA-2048:RSA-2048-PUBLIC 66 # generated using (openssl genpkey -algorithm RSA -pkeyopt bits:1024) 67 PrivateKey = RSA-1024 85 PrivateKey = RSA-512 97 Title = RSA tests 99 Verify = RSA-2048 105 Sign = RSA-2048 [all …]
|
H A D | evppkey_rsa.txt | 19 # RSA 2048 bit key. 21 PrivateKey = RSA-2048 53 PublicKey = RSA-2048-PUBLIC 64 PrivPubKeyPair = RSA-2048:RSA-2048-PUBLIC 66 Title = RSA tests 68 Sign = RSA-2048 74 Sign = RSA-2048 81 Sign = RSA-2048 87 VerifyRecover = RSA-2048 93 Verify = RSA-2048 [all …]
|
/freebsd/crypto/openssl/crypto/rsa/ |
H A D | rsa_asn1.c | 37 RSA_free((RSA *)*pval); in rsa_cb() 41 if (((RSA *)*pval)->version != RSA_ASN1_VERSION_MULTI) { in rsa_cb() 45 return (ossl_rsa_multip_calc_product((RSA *)*pval) == 1) ? 2 : 0; in rsa_cb() 58 ASN1_EMBED(RSA, version, INT32), 59 ASN1_SIMPLE(RSA, n, BIGNUM), 60 ASN1_SIMPLE(RSA, e, BIGNUM), 61 ASN1_SIMPLE(RSA, d, CBIGNUM), 62 ASN1_SIMPLE(RSA, p, CBIGNUM), 63 ASN1_SIMPLE(RSA, q, CBIGNUM), 64 ASN1_SIMPLE(RSA, dmp1, CBIGNUM), [all …]
|
H A D | rsa_local.h | 106 unsigned char *to, RSA *rsa, int padding); 108 unsigned char *to, RSA *rsa, int padding); 110 unsigned char *to, RSA *rsa, int padding); 112 unsigned char *to, RSA *rsa, int padding); 114 int (*rsa_mod_exp) (BIGNUM *r0, const BIGNUM *I, RSA *rsa, BN_CTX *ctx); 119 int (*init) (RSA *rsa); 121 int (*finish) (RSA *rsa); 135 const RSA *rsa); 138 unsigned int siglen, const RSA *rsa); 145 int (*rsa_keygen) (RSA *rsa, int bits, BIGNUM *e, BN_GENCB *cb); [all …]
|
H A D | rsa_meth.c | 108 unsigned char *to, RSA *rsa, int padding) in RSA_meth_get_pub_enc() 115 unsigned char *to, RSA *rsa, in RSA_meth_set_pub_enc() 124 unsigned char *to, RSA *rsa, int padding) in RSA_meth_get_pub_dec() 131 unsigned char *to, RSA *rsa, in RSA_meth_set_pub_dec() 140 unsigned char *to, RSA *rsa, int padding) in RSA_meth_get_priv_enc() 147 unsigned char *to, RSA *rsa, in RSA_meth_set_priv_enc() 156 unsigned char *to, RSA *rsa, int padding) in RSA_meth_get_priv_dec() 163 unsigned char *to, RSA *rsa, in RSA_meth_set_priv_dec() 172 (BIGNUM *r0, const BIGNUM *i, RSA *rsa, BN_CTX *ctx) in RSA_meth_get_mod_exp() 178 int (*mod_exp) (BIGNUM *r0, const BIGNUM *i, RSA *rsa, in RSA_meth_set_mod_exp() [all …]
|
H A D | rsa_lib.c | 31 static RSA *rsa_new_intern(ENGINE *engine, OSSL_LIB_CTX *libctx); 34 RSA *RSA_new(void) in RSA_new() 39 const RSA_METHOD *RSA_get_method(const RSA *rsa) in RSA_get_method() 44 int RSA_set_method(RSA *rsa, const RSA_METHOD *meth) in RSA_set_method() 64 RSA *RSA_new_method(ENGINE *engine) in RSA_new_method() 70 RSA *ossl_rsa_new_with_ctx(OSSL_LIB_CTX *libctx) in ossl_rsa_new_with_ctx() 75 static RSA *rsa_new_intern(ENGINE *engine, OSSL_LIB_CTX *libctx) in rsa_new_intern() 77 RSA *ret = OPENSSL_zalloc(sizeof(*ret)); in rsa_new_intern() 133 void RSA_free(RSA *r) in RSA_free() 180 int RSA_up_ref(RSA *r) in RSA_up_ref() [all …]
|
H A D | rsa_crpt.c | 23 int RSA_bits(const RSA *r) in RSA_bits() 28 int RSA_size(const RSA *r) in RSA_size() 34 RSA *rsa, int padding) in RSA_public_encrypt() 40 unsigned char *to, RSA *rsa, int padding) in RSA_private_encrypt() 46 unsigned char *to, RSA *rsa, int padding) in RSA_private_decrypt() 52 RSA *rsa, int padding) in RSA_public_decrypt() 57 int RSA_flags(const RSA *r) in RSA_flags() 62 void RSA_blinding_off(RSA *rsa) in RSA_blinding_off() 70 int RSA_blinding_on(RSA *rsa, BN_CTX *ctx) in RSA_blinding_on() 116 BN_BLINDING *RSA_setup_blinding(RSA *rsa, BN_CTX *in_ctx) in RSA_setup_blinding()
|
/freebsd/crypto/openssl/include/crypto/ |
H A D | rsa.h | 30 RSA_PSS_PARAMS_30 *ossl_rsa_get0_pss_params_30(RSA *r); 55 RSA *ossl_rsa_new_with_ctx(OSSL_LIB_CTX *libctx); 56 OSSL_LIB_CTX *ossl_rsa_get0_libctx(RSA *r); 57 void ossl_rsa_set0_libctx(RSA *r, OSSL_LIB_CTX *libctx); 59 int ossl_rsa_set0_all_params(RSA *r, const STACK_OF(BIGNUM) *primes, 62 int ossl_rsa_get0_all_params(RSA *r, STACK_OF(BIGNUM_const) *primes, 65 int ossl_rsa_is_foreign(const RSA *rsa); 66 RSA *ossl_rsa_dup(const RSA *rsa, int selection); 68 int ossl_rsa_todata(RSA *rsa, OSSL_PARAM_BLD *bld, OSSL_PARAM params[], 70 int ossl_rsa_fromdata(RSA *rsa, const OSSL_PARAM params[], int include_private); [all …]
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | RSA_get0_key.pod | 13 - Routines for getting and setting data in an RSA object 23 int RSA_set0_key(RSA *r, BIGNUM *n, BIGNUM *e, BIGNUM *d); 24 int RSA_set0_factors(RSA *r, BIGNUM *p, BIGNUM *q); 25 int RSA_set0_crt_params(RSA *r, BIGNUM *dmp1, BIGNUM *dmq1, BIGNUM *iqmp); 26 void RSA_get0_key(const RSA *r, 28 void RSA_get0_factors(const RSA *r, const BIGNUM **p, const BIGNUM **q); 29 void RSA_get0_crt_params(const RSA *r, 32 const BIGNUM *RSA_get0_n(const RSA *d); 33 const BIGNUM *RSA_get0_e(const RSA *d); 34 const BIGNUM *RSA_get0_d(const RSA *d); [all …]
|
H A D | RSA_set_method.pod | 7 RSA_new_method - select RSA method 21 int RSA_set_method(RSA *rsa, const RSA_METHOD *meth); 23 const RSA_METHOD *RSA_get_method(const RSA *rsa); 27 int RSA_flags(const RSA *rsa); 29 RSA *RSA_new_method(ENGINE *engine); 36 An B<RSA_METHOD> specifies the functions that OpenSSL uses for RSA 39 important information about how these RSA API functions are affected by the 45 RSA_set_default_method() makes B<meth> the default method for all RSA 48 been set as a default for RSA, so this function is no longer recommended. 58 B<rsa>. This will replace the RSA_METHOD used by the RSA key and if the [all …]
|
H A D | RSA_meth_new.pod | 17 - Routines to build up RSA methods 42 unsigned char *to, RSA *rsa, int padding); 45 unsigned char *to, RSA *rsa, 50 unsigned char *to, RSA *rsa, int padding); 53 unsigned char *to, RSA *rsa, 57 unsigned char *to, RSA *rsa, 61 unsigned char *to, RSA *rsa, int padding)); 64 unsigned char *to, RSA *rsa, 68 unsigned char *to, RSA *rsa, int padding)); 72 RSA *rsa, BN_CTX *ctx); [all …]
|
H A D | RSA_check_key.pod | 5 RSA_check_key_ex, RSA_check_key - validate private RSA keys 15 int RSA_check_key_ex(const RSA *rsa, BN_GENCB *cb); 17 int RSA_check_key(const RSA *rsa); 25 RSA_check_key_ex() function validates RSA keys. 29 It does not work on RSA public keys that have only the modulus 34 the RSA key material, so the RSA key structure must contain all the private 36 Therefore, it cannot be used with any arbitrary RSA key object, 37 even if it is otherwise fit for regular RSA operation. 47 return 1 if B<rsa> is a valid RSA key, and 0 otherwise. 55 Unlike most other RSA functions, this function does B<not> work [all …]
|
/freebsd/crypto/openssl/doc/man7/ |
H A D | EVP_PKEY-RSA.pod | 5 EVP_PKEY-RSA, EVP_KEYMGMT-RSA, RSA 6 - EVP_PKEY RSA keytype and algorithm support 10 The B<RSA> keytype is implemented in OpenSSL's default and FIPS providers. 11 That implementation supports the basic RSA keys, containing the modulus I<n>, 16 =head2 Common RSA parameters 19 L<provider-keymgmt(7)/Common parameters>), the B<RSA> keytype implementation 26 The RSA modulus "n" value. 30 The RSA public exponent "e" value. 37 The RSA private exponent "d" value. 59 RSA prime factors. The factors are known as "p", "q" and "r_i" in RFC8017. [all …]
|
H A D | EVP_KEM-RSA.pod | 5 EVP_KEM-RSA 6 - EVP_KEM RSA keytype and algorithm support 10 The B<RSA> keytype and its parameters are described in L<EVP_PKEY-RSA(7)>. 13 =head2 RSA KEM parameters 19 The OpenSSL RSA Key Encapsulation Mechanism only currently supports the 27 encrypts the secret using the RSA public key (with no padding). 28 The decapsulate function recovers the secret using the RSA private key.
|
/freebsd/crypto/openssh/regress/ |
H A D | agent-pkcs11-cert.sh | 20 $SSHKEYGEN -qs $OBJ/ca -I "rsa_key" -n $USER -z 2 ${SSH_SOFTHSM_DIR}/RSA.pub || 47 ${SSH_SOFTHSM_DIR}/RSA.pub \ 48 ${SSH_SOFTHSM_DIR}/RSA-cert.pub || 53 ${SSH_SOFTHSM_DIR}/RSA.pub \ 55 ${SSH_SOFTHSM_DIR}/RSA-cert.pub | sort > $OBJ/expect_list 60 for x in ${SSH_SOFTHSM_DIR}/EC.pub ${SSH_SOFTHSM_DIR}/RSA.pub \ 61 ${SSH_SOFTHSM_DIR}/EC-cert.pub ${SSH_SOFTHSM_DIR}/RSA-cert.pub ; do 66 $SSHADD -qd ${SSH_SOFTHSM_DIR}/EC.pub ${SSH_SOFTHSM_DIR}/RSA.pub 68 for x in ${SSH_SOFTHSM_DIR}/EC-cert.pub ${SSH_SOFTHSM_DIR}/RSA-cert.pub ; do 79 ${SSH_SOFTHSM_DIR}/RSA.pub \ [all …]
|
/freebsd/crypto/openssl/doc/internal/man3/ |
H A D | ossl_rsa_get0_all_params.pod | 6 - Internal routines for getting and setting data in an RSA object 12 int ossl_rsa_get0_all_params(RSA *r, STACK_OF(BIGNUM_const) *primes, 15 int ossl_rsa_set0_all_params(RSA *r, const STACK_OF(BIGNUM) *primes, 22 in the B<RSA> object I<r> to the contents of the stacks of BIGNUMs I<primes>, 23 I<exps> and I<coeffs>. The B<RSA> object takes ownership of the BIGNUMs, 27 in the B<RSA> object I<r> and pushes them on the stacks of constant BIGNUMs 28 I<primes>, I<exps> and I<coeffs>. The B<RSA> object retains ownership of the 40 if the B<RSA> object is a multi-prime RSA key. 45 if the B<RSA> object is a multi-prime RSA key. 50 if the B<RSA> object is a multi-prime RSA key.
|
/freebsd/crypto/openssl/providers/ |
H A D | encoders.inc | 49 ENCODER_TEXT("RSA", rsa, yes), 50 ENCODER_TEXT("RSA-PSS", rsapss, yes), 93 /* The RSA encoders only support private key and public key output */ 94 ENCODER_w_structure("RSA", rsa, yes, der, type_specific_keypair), 95 ENCODER_w_structure("RSA", rsa, yes, pem, type_specific_keypair), 123 ENCODER("RSA", rsa, yes, msblob), 124 ENCODER("RSA", rsa, yes, pvk), 137 ENCODER_w_structure("RSA", rsa, yes, der, EncryptedPrivateKeyInfo), 138 ENCODER_w_structure("RSA", rsa, yes, pem, EncryptedPrivateKeyInfo), 139 ENCODER_w_structure("RSA", rsa, yes, der, PrivateKeyInfo), [all …]
|
/freebsd/contrib/bearssl/test/x509/ |
H A D | alltests.txt | 11 type = RSA 41 type = RSA 47 type = RSA 53 type = RSA 137 keytype = RSA 149 keytype = RSA 159 keytype = RSA 170 keytype = RSA 181 keytype = RSA 192 keytype = RSA [all …]
|
/freebsd/crypto/openssl/crypto/pem/ |
H A D | pem_all.c | 28 static RSA *pkey_get_rsa(EVP_PKEY *key, RSA **rsa); 53 static RSA *pkey_get_rsa(EVP_PKEY *key, RSA **rsa) in IMPLEMENT_PEM_rw() 55 RSA *rtmp; in IMPLEMENT_PEM_rw() 69 RSA *PEM_read_bio_RSAPrivateKey(BIO *bp, RSA **rsa, pem_password_cb *cb, in PEM_read_bio_RSAPrivateKey() 79 RSA *PEM_read_RSAPrivateKey(FILE *fp, RSA **rsa, pem_password_cb *cb, void *u) in PEM_read_RSAPrivateKey() 88 IMPLEMENT_PEM_write_cb(RSAPrivateKey, RSA, PEM_STRING_RSA, RSAPrivateKey) in IMPLEMENT_PEM_write_cb() argument 89 IMPLEMENT_PEM_rw(RSAPublicKey, RSA, PEM_STRING_RSA_PUBLIC, RSAPublicKey) in IMPLEMENT_PEM_write_cb() 90 IMPLEMENT_PEM_rw(RSA_PUBKEY, RSA, PEM_STRING_PUBLIC, RSA_PUBKEY) in IMPLEMENT_PEM_write_cb()
|
/freebsd/crypto/openssl/doc/man1/ |
H A D | openssl-ciphers.pod.in | 225 =item B<kRSA>, B<aRSA>, B<RSA> 227 Cipher suites using RSA key exchange or authentication. B<RSA> is an alias for 233 with RSA and DSS keys or either respectively. 419 e.g. DES-CBC3-SHA. In these cases, RSA authentication is used. 431 SSL_DH_RSA_WITH_3DES_EDE_CBC_SHA DH-RSA-DES-CBC3-SHA 433 SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA DHE-RSA-DES-CBC3-SHA 454 TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA DHE-RSA-DES-CBC3-SHA 466 TLS_DH_RSA_WITH_AES_128_CBC_SHA DH-RSA-AES128-SHA 467 TLS_DH_RSA_WITH_AES_256_CBC_SHA DH-RSA-AES256-SHA 471 TLS_DHE_RSA_WITH_AES_128_CBC_SHA DHE-RSA-AES128-SHA [all …]
|