/freebsd/crypto/heimdal/doc/doxyout/hcrypto/man/man3/ |
H A D | hcrypto_rsa.3 | 1 .TH "RSA functions" 3 "11 Jan 2012" "Version 1.5.2" "Heimdal crypto library" \" -*- nroff -*- 10 .RI "RSA * \fBRSA_new\fP (void)" 13 .RI "RSA * \fBRSA_new_method\fP (ENGINE *engine)" 16 .RI "void \fBRSA_free\fP (RSA *rsa)" 19 .RI "int \fBRSA_up_ref\fP (RSA *rsa)" 22 .RI "const RSA_METHOD * \fBRSA_get_method\fP (const RSA *rsa)" 25 .RI "int \fBRSA_set_method\fP (RSA *rsa, const RSA_METHOD *method)" 28 .RI "int \fBRSA_set_app_data\fP (RSA *rsa, void *arg)" 31 .RI "void * \fBRSA_get_app_data\fP (const RSA *rsa)" 36 See the \fBRSA - public-key cryptography\fP for description and examples. [all …]
|
/freebsd/crypto/openssl/include/openssl/ |
H A D | rsa.h | 43 /* The types RSA and RSA_METHOD are defined in ossl_typ.h */ 76 * RSA implementation now uses blinding by 90 * new with 0.9.7h; the built-in RSA 102 * New with 3.0: use part of the flags to denote exact type of RSA key, 104 * These different types share the same RSA structure, but indicate the 107 * RSA - this is the "normal" unlimited RSA structure (typenum 0) 201 OSSL_DEPRECATEDIN_3_0 RSA *RSA_new(void); 202 OSSL_DEPRECATEDIN_3_0 RSA *RSA_new_method(ENGINE *engine); 203 OSSL_DEPRECATEDIN_3_0 int RSA_bits(const RSA *rsa); 204 OSSL_DEPRECATEDIN_3_0 int RSA_size(const RSA *rsa); [all …]
|
/freebsd/crypto/openssl/crypto/rsa/ |
H A D | rsa_ossl.c | 11 * RSA low level APIs are deprecated for public use, but still ok for 22 unsigned char *to, RSA *rsa, int padding); 24 unsigned char *to, RSA *rsa, int padding); 26 unsigned char *to, RSA *rsa, int padding); 28 unsigned char *to, RSA *rsa, int padding); 29 static int rsa_ossl_mod_exp(BIGNUM *r0, const BIGNUM *i, RSA *rsa, 31 static int rsa_ossl_init(RSA *rsa); 32 static int rsa_ossl_finish(RSA *rsa); 34 "OpenSSL PKCS#1 RSA", 75 unsigned char *to, RSA *rsa, int padding) in rsa_ossl_public_encrypt() argument [all …]
|
H A D | rsa_crpt.c | 11 * RSA low level APIs are deprecated for public use, but still ok for 23 int RSA_bits(const RSA *r) in RSA_bits() 28 int RSA_size(const RSA *r) in RSA_size() 34 RSA *rsa, int padding) in RSA_public_encrypt() argument 36 return rsa->meth->rsa_pub_enc(flen, from, to, rsa, padding); in RSA_public_encrypt() 40 unsigned char *to, RSA *rsa, int padding) in RSA_private_encrypt() argument 42 return rsa->meth->rsa_priv_enc(flen, from, to, rsa, padding); in RSA_private_encrypt() 46 unsigned char *to, RSA *rsa, int padding) in RSA_private_decrypt() argument 48 return rsa->meth->rsa_priv_dec(flen, from, to, rsa, padding); in RSA_private_decrypt() 52 RSA *rsa, int padding) in RSA_public_decrypt() argument [all …]
|
H A D | rsa_x931g.c | 11 * RSA low level APIs are deprecated for public use, but still ok for 23 /* X9.31 RSA key derivation and generation */ 25 int RSA_X931_derive_ex(RSA *rsa, BIGNUM *p1, BIGNUM *p2, BIGNUM *q1, in RSA_X931_derive_ex() argument 34 if (!rsa) in RSA_X931_derive_ex() 49 if (!rsa->e) { in RSA_X931_derive_ex() 50 rsa->e = BN_dup(e); in RSA_X931_derive_ex() 51 if (!rsa->e) in RSA_X931_derive_ex() 54 e = rsa->e; in RSA_X931_derive_ex() 62 if (Xp && rsa->p == NULL) { in RSA_X931_derive_ex() 63 rsa->p = BN_new(); in RSA_X931_derive_ex() [all …]
|
H A D | rsa_sp800_56b_gen.c | 29 * rsa Object used to store primes p & q. 57 int ossl_rsa_fips186_4_gen_prob_primes(RSA *rsa, RSA_ACVP_TEST *test, in ossl_rsa_fips186_4_gen_prob_primes() argument 88 * NOTE: SP800-131A Rev1 Disallows key lengths of < 2048 bits for RSA in ossl_rsa_fips186_4_gen_prob_primes() 115 if (rsa->p == NULL) in ossl_rsa_fips186_4_gen_prob_primes() 116 rsa->p = BN_secure_new(); in ossl_rsa_fips186_4_gen_prob_primes() 117 if (rsa->q == NULL) in ossl_rsa_fips186_4_gen_prob_primes() 118 rsa->q = BN_secure_new(); in ossl_rsa_fips186_4_gen_prob_primes() 119 if (rsa->p == NULL || rsa->q == NULL) in ossl_rsa_fips186_4_gen_prob_primes() 121 BN_set_flags(rsa->p, BN_FLG_CONSTTIME); in ossl_rsa_fips186_4_gen_prob_primes() 122 BN_set_flags(rsa->q, BN_FLG_CONSTTIME); in ossl_rsa_fips186_4_gen_prob_primes() [all …]
|
H A D | rsa_gen.c | 17 * RSA low level APIs are deprecated for public use, but still ok for 30 static int rsa_keygen_pairwise_test(RSA *rsa, OSSL_CALLBACK *cb, void *cbarg); 31 static int rsa_keygen(OSSL_LIB_CTX *libctx, RSA *rsa, int bits, int primes, 41 int RSA_generate_key_ex(RSA *rsa, int bits, BIGNUM *e_value, BN_GENCB *cb) in RSA_generate_key_ex() argument 43 if (rsa->meth->rsa_keygen != NULL) in RSA_generate_key_ex() 44 return rsa->meth->rsa_keygen(rsa, bits, e_value, cb); in RSA_generate_key_ex() 46 return RSA_generate_multi_prime_key(rsa, bits, RSA_DEFAULT_PRIME_NUM, in RSA_generate_key_ex() 50 int RSA_generate_multi_prime_key(RSA *rsa, int bits, int primes, in RSA_generate_multi_prime_key() argument 55 if (rsa->meth->rsa_multi_prime_keygen != NULL) { in RSA_generate_multi_prime_key() 56 return rsa->meth->rsa_multi_prime_keygen(rsa, bits, primes, in RSA_generate_multi_prime_key() [all …]
|
H A D | rsa_local.h | 14 #include "crypto/rsa.h" 85 /* for multi-prime RSA, defined in RFC 8017 */ 87 /* Be careful using this if the RSA structure is shared */ 106 unsigned char *to, RSA *rsa, int padding); 108 unsigned char *to, RSA *rsa, int padding); 110 unsigned char *to, RSA *rsa, int padding); 112 unsigned char *to, RSA *rsa, int padding); 114 int (*rsa_mod_exp) (BIGNUM *r0, const BIGNUM *I, RSA *rsa, BN_CTX *ctx); 119 int (*init) (RSA *rsa); 121 int (*finish) (RSA *rsa); [all …]
|
H A D | rsa_sp800_56b_check.c | 17 * Part of the RSA keypair test. 24 int ossl_rsa_check_crt_components(const RSA *rsa, BN_CTX *ctx) in ossl_rsa_check_crt_components() argument 30 if (rsa->dmp1 == NULL || rsa->dmq1 == NULL || rsa->iqmp == NULL) { in ossl_rsa_check_crt_components() 31 if (rsa->dmp1 != NULL || rsa->dmq1 != NULL || rsa->iqmp != NULL) in ossl_rsa_check_crt_components() 50 && (BN_copy(p1, rsa->p) != NULL) in ossl_rsa_check_crt_components() 53 && (BN_copy(q1, rsa->q) != NULL) in ossl_rsa_check_crt_components() 56 && (BN_cmp(rsa->dmp1, BN_value_one()) > 0) in ossl_rsa_check_crt_components() 57 && (BN_cmp(rsa->dmp1, p1) < 0) in ossl_rsa_check_crt_components() 59 && (BN_cmp(rsa->dmq1, BN_value_one()) > 0) in ossl_rsa_check_crt_components() 60 && (BN_cmp(rsa->dmq1, q1) < 0) in ossl_rsa_check_crt_components() [all …]
|
H A D | rsa_meth.c | 11 * RSA low level APIs are deprecated for public use, but still ok for 108 unsigned char *to, RSA *rsa, int padding) in RSA_meth_get_pub_enc() 115 unsigned char *to, RSA *rsa, in RSA_meth_set_pub_enc() argument 124 unsigned char *to, RSA *rsa, int padding) in RSA_meth_get_pub_dec() 131 unsigned char *to, RSA *rsa, in RSA_meth_set_pub_dec() argument 140 unsigned char *to, RSA *rsa, int padding) in RSA_meth_get_priv_enc() 147 unsigned char *to, RSA *rsa, in RSA_meth_set_priv_enc() argument 156 unsigned char *to, RSA *rsa, int padding) in RSA_meth_get_priv_dec() 163 unsigned char *to, RSA *rsa, in RSA_meth_set_priv_dec() argument 172 (BIGNUM *r0, const BIGNUM *i, RSA *rsa, BN_CTX *ctx) in RSA_meth_get_mod_exp() [all …]
|
H A D | rsa_asn1.c | 11 * RSA low level APIs are deprecated for public use, but still ok for 26 * RSA keys. 37 RSA_free((RSA *)*pval); in rsa_cb() 41 if (((RSA *)*pval)->version != RSA_ASN1_VERSION_MULTI) { in rsa_cb() 45 return (ossl_rsa_multip_calc_product((RSA *)*pval) == 1) ? 2 : 0; in rsa_cb() 58 ASN1_EMBED(RSA, version, INT32), 59 ASN1_SIMPLE(RSA, n, BIGNUM), 60 ASN1_SIMPLE(RSA, e, BIGNUM), 61 ASN1_SIMPLE(RSA, d, CBIGNUM), 62 ASN1_SIMPLE(RSA, p, CBIGNUM), [all …]
|
/freebsd/crypto/openssl/test/recipes/30-test_evp_data/ |
H A D | evppkey_rsa_common.txt | 17 # RSA 2048 bit key. 19 PrivateKey = RSA-2048 51 PublicKey = RSA-2048-PUBLIC 62 PrivPubKeyPair = RSA-2048:RSA-2048-PUBLIC 66 # generated using (openssl genpkey -algorithm RSA -pkeyopt bits:1024) 67 PrivateKey = RSA-1024 85 PrivateKey = RSA-512 97 Title = RSA tests 99 Verify = RSA-2048 105 Sign = RSA-2048 [all …]
|
H A D | evppkey_rsa.txt | 19 # RSA 2048 bit key. 21 PrivateKey = RSA-2048 53 PublicKey = RSA-2048-PUBLIC 64 PrivPubKeyPair = RSA-2048:RSA-2048-PUBLIC 66 Title = RSA tests 68 Sign = RSA-2048 74 Sign = RSA-2048 81 Sign = RSA-2048 87 VerifyRecover = RSA-2048 93 Verify = RSA-2048 [all …]
|
/freebsd/crypto/openssl/doc/man7/ |
H A D | EVP_PKEY-RSA.pod | 5 EVP_PKEY-RSA, EVP_KEYMGMT-RSA, RSA 6 - EVP_PKEY RSA keytype and algorithm support 10 The B<RSA> keytype is implemented in OpenSSL's default and FIPS providers. 11 That implementation supports the basic RSA keys, containing the modulus I<n>, 16 =head2 Common RSA parameters 19 L<provider-keymgmt(7)/Common parameters>), the B<RSA> keytype implementation 26 The RSA modulus "n" value. 30 The RSA public exponent "e" value. 37 The RSA private exponent "d" value. 39 =item "rsa-factor1" (B<OSSL_PKEY_PARAM_RSA_FACTOR1>) <unsigned integer> [all …]
|
/freebsd/secure/lib/libcrypto/man/man7/ |
H A D | EVP_PKEY-RSA.7 | 133 .IX Title "EVP_PKEY-RSA 7ossl" 134 .TH EVP_PKEY-RSA 7ossl "2023-09-19" "3.0.11" "OpenSSL" 140 EVP_PKEY\-RSA, EVP_KEYMGMT\-RSA, RSA 141 \&\- EVP_PKEY RSA keytype and algorithm support 144 The \fB\s-1RSA\s0\fR keytype is implemented in OpenSSL's default and \s-1FIPS\s0 providers. 145 That implementation supports the basic \s-1RSA\s0 keys, containing the modulus \fIn\fR, 149 .SS "Common \s-1RSA\s0 parameters" 150 .IX Subsection "Common RSA parameters" 152 \&\*(L"Common parameters\*(R" in \fBprovider\-keymgmt\fR\|(7)), the \fB\s-1RSA\s0\fR keytype implem… 157 The \s-1RSA\s0 modulus \*(L"n\*(R" value. [all …]
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | RSA_meth_new.pod | 17 - Routines to build up RSA methods 21 #include <openssl/rsa.h> 42 unsigned char *to, RSA *rsa, int padding); 43 int RSA_meth_set_pub_enc(RSA_METHOD *rsa, 45 unsigned char *to, RSA *rsa, 50 unsigned char *to, RSA *rsa, int padding); 51 int RSA_meth_set_pub_dec(RSA_METHOD *rsa, 53 unsigned char *to, RSA *rsa, 57 unsigned char *to, RSA *rsa, 59 int RSA_meth_set_priv_enc(RSA_METHOD *rsa, [all …]
|
H A D | RSA_set_method.pod | 7 RSA_new_method - select RSA method 11 #include <openssl/rsa.h> 21 int RSA_set_method(RSA *rsa, const RSA_METHOD *meth); 23 const RSA_METHOD *RSA_get_method(const RSA *rsa); 27 int RSA_flags(const RSA *rsa); 29 RSA *RSA_new_method(ENGINE *engine); 36 An B<RSA_METHOD> specifies the functions that OpenSSL uses for RSA 39 important information about how these RSA API functions are affected by the 45 RSA_set_default_method() makes B<meth> the default method for all RSA 48 been set as a default for RSA, so this function is no longer recommended. [all …]
|
H A D | RSA_get0_key.pod | 13 - Routines for getting and setting data in an RSA object 17 #include <openssl/rsa.h> 23 int RSA_set0_key(RSA *r, BIGNUM *n, BIGNUM *e, BIGNUM *d); 24 int RSA_set0_factors(RSA *r, BIGNUM *p, BIGNUM *q); 25 int RSA_set0_crt_params(RSA *r, BIGNUM *dmp1, BIGNUM *dmq1, BIGNUM *iqmp); 26 void RSA_get0_key(const RSA *r, 28 void RSA_get0_factors(const RSA *r, const BIGNUM **p, const BIGNUM **q); 29 void RSA_get0_crt_params(const RSA *r, 32 const BIGNUM *RSA_get0_n(const RSA *d); 33 const BIGNUM *RSA_get0_e(const RSA *d); [all …]
|
/freebsd/crypto/openssl/test/ssl-tests/ |
H A D | 25-cipher.cnf.in | 25 "CipherString" => "ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA256", 29 "CipherString" => "ECDHE-RSA-AES256-SHA384" 32 "ExpectedCipher" => "ECDHE-RSA-AES256-SHA384", 39 "CipherString" => "ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA256", 43 "CipherString" => "ECDHE-RSA-AES128-SHA256" 46 "ExpectedCipher" => "ECDHE-RSA-AES128-SHA256", 53 "CipherString" => "ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA256", 57 "CipherString" => "ECDHE-RSA-AES128-SHA256:ECDHE-RSA-AES256-SHA384", 60 "ExpectedCipher" => "ECDHE-RSA-AES128-SHA256", 67 "CipherString" => "ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA256", [all …]
|
/freebsd/secure/lib/libcrypto/man/man3/ |
H A D | RSA_meth_new.3 | 152 \&\- Routines to build up RSA methods 156 \& #include <openssl/rsa.h> 179 \& unsigned char *to, RSA *rsa, int padding); 180 \& int RSA_meth_set_pub_enc(RSA_METHOD *rsa, 182 \& unsigned char *to, RSA *rsa, 187 \& unsigned char *to, RSA *rsa, int padding); 188 \& int RSA_meth_set_pub_dec(RSA_METHOD *rsa, 190 \& unsigned char *to, RSA *rsa, 194 \& unsigned char *to, RSA *rsa, 196 \& int RSA_meth_set_priv_enc(RSA_METHOD *rsa, [all …]
|
H A D | RSA_set_method.3 | 142 RSA_new_method \- select RSA method 146 \& #include <openssl/rsa.h> 158 \& int RSA_set_method(RSA *rsa, const RSA_METHOD *meth); 160 \& const RSA_METHOD *RSA_get_method(const RSA *rsa); 164 \& int RSA_flags(const RSA *rsa); 166 \& RSA *RSA_new_method(ENGINE *engine); 173 An \fB\s-1RSA_METHOD\s0\fR specifies the functions that OpenSSL uses for \s-1RSA\s0 176 important information about how these \s-1RSA API\s0 functions are affected by the 182 \&\fBRSA_set_default_method()\fR makes \fBmeth\fR the default method for all \s-1RSA\s0 185 been set as a default for \s-1RSA,\s0 so this function is no longer recommended. [all …]
|
H A D | RSA_get0_key.3 | 148 \&\- Routines for getting and setting data in an RSA object 152 \& #include <openssl/rsa.h> 160 \& int RSA_set0_key(RSA *r, BIGNUM *n, BIGNUM *e, BIGNUM *d); 161 \& int RSA_set0_factors(RSA *r, BIGNUM *p, BIGNUM *q); 162 \& int RSA_set0_crt_params(RSA *r, BIGNUM *dmp1, BIGNUM *dmq1, BIGNUM *iqmp); 163 \& void RSA_get0_key(const RSA *r, 165 \& void RSA_get0_factors(const RSA *r, const BIGNUM **p, const BIGNUM **q); 166 \& void RSA_get0_crt_params(const RSA *r, 169 \& const BIGNUM *RSA_get0_n(const RSA *d); 170 \& const BIGNUM *RSA_get0_e(const RSA *d); [all …]
|
/freebsd/crypto/openssl/ssl/ |
H A D | ssl_rsa_legacy.c | 10 /* We need to use the deprecated RSA low level calls */ 14 #include <openssl/rsa.h> 17 int SSL_use_RSAPrivateKey(SSL *ssl, RSA *rsa) in SSL_use_RSAPrivateKey() argument 22 if (rsa == NULL) { in SSL_use_RSAPrivateKey() 31 RSA_up_ref(rsa); in SSL_use_RSAPrivateKey() 32 if (EVP_PKEY_assign_RSA(pkey, rsa) <= 0) { in SSL_use_RSAPrivateKey() 33 RSA_free(rsa); in SSL_use_RSAPrivateKey() 47 RSA *rsa = NULL; in SSL_use_RSAPrivateKey_file() local 61 rsa = d2i_RSAPrivateKey_bio(in, NULL); in SSL_use_RSAPrivateKey_file() 64 rsa = PEM_read_bio_RSAPrivateKey(in, NULL, in SSL_use_RSAPrivateKey_file() [all …]
|
/freebsd/lib/libbearssl/ |
H A D | Makefile | 99 rsa/rsa_default_keygen.c \ 100 rsa/rsa_default_modulus.c \ 101 rsa/rsa_default_pkcs1_sign.c \ 102 rsa/rsa_default_priv.c \ 103 rsa/rsa_default_privexp.c \ 104 rsa/rsa_default_pss_sign.c \ 105 rsa/rsa_default_pss_vrfy.c \ 106 rsa/rsa_default_pub.c \ 107 rsa/rsa_default_pubexp.c \ 108 rsa/rsa_i15_keygen.c \ [all …]
|
/freebsd/crypto/heimdal/doc/doxyout/hcrypto/html/ |
H A D | group__hcrypto__rsa.html | 3 <title>Heimdal crypto library: RSA functions</title> 22 <h1>RSA functions</h1><table border="0" cellpadding="0" cellspacing="0"> 25 <tr><td class="memItemLeft" nowrap align="right" valign="top">RSA * </td><td class="memItemRig… 27 <tr><td class="memItemLeft" nowrap align="right" valign="top">RSA * </td><td class="memItemRig… 29 …href="group__hcrypto__rsa.html#gf0fbfb9641abf52a10e47c789bbba777">RSA_free</a> (RSA *rsa)</td></tr> 31 …ef="group__hcrypto__rsa.html#gdb710b16e5e5616f0693801cc60aa943">RSA_up_ref</a> (RSA *rsa)</td></tr> 33 …_hcrypto__rsa.html#g8a0ab0eaf85ef01f1cc31329558fd37a">RSA_get_method</a> (const RSA *rsa)</td></tr> 35 …crypto__rsa.html#gee6501b3b0fe2917a2e40adce6862395">RSA_set_method</a> (RSA *rsa, const RSA_METHOD… 37 …ypto__rsa.html#ge2af4ebfadf6a1450b823dfc6ca50687">RSA_set_app_data</a> (RSA *rsa, void *arg)</td><… 39 …crypto__rsa.html#gfcdc9f15c7075cd8434f0c7e59d3db5c">RSA_get_app_data</a> (const RSA *rsa)</td></tr> [all …]
|