/openssl-master/crypto/rsa/ |
A D | rsa_ameth.c | 94 case EVP_PKEY_RSA_PSS: in rsa_pub_decode() 400 if (OBJ_obj2nid(sigalg->algorithm) == EVP_PKEY_RSA_PSS) { in rsa_sig_print() 528 if (OBJ_obj2nid(sigalg->algorithm) != EVP_PKEY_RSA_PSS) { in ossl_rsa_pss_to_ctx() 616 if (OBJ_obj2nid(sigalg->algorithm) != EVP_PKEY_RSA_PSS) { in rsa_item_verify() 650 X509_ALGOR_set0(alg2, OBJ_nid2obj(EVP_PKEY_RSA_PSS), in rsa_item_sign() 653 X509_ALGOR_set0(alg1, OBJ_nid2obj(EVP_PKEY_RSA_PSS), in rsa_item_sign() 671 if (OBJ_obj2nid(sigalg->algorithm) != EVP_PKEY_RSA_PSS) in rsa_sig_info_set() 706 X509_SIG_INFO_set(siginf, mdnid, EVP_PKEY_RSA_PSS, secbits, in rsa_sig_info_set() 846 ok = EVP_PKEY_assign(pkey, EVP_PKEY_RSA_PSS, rsa); in rsa_int_import_from() 950 EVP_PKEY_RSA_PSS, [all …]
|
A D | rsa_local.h | 151 #define pkey_is_pss(pkey) (pkey->ameth->pkey_id == EVP_PKEY_RSA_PSS) 152 #define pkey_ctx_is_pss(ctx) (ctx->pmeth->pkey_id == EVP_PKEY_RSA_PSS)
|
A D | rsa_lib.c | 735 && ctx->pmeth->pkey_id != EVP_PKEY_RSA_PSS) in RSA_pkey_ctx_ctrl() 979 return EVP_PKEY_CTX_ctrl(ctx, EVP_PKEY_RSA_PSS, EVP_PKEY_OP_KEYGEN, in EVP_PKEY_CTX_set_rsa_pss_keygen_md() 987 return int_set_rsa_md_name(ctx, EVP_PKEY_RSA_PSS, EVP_PKEY_OP_KEYGEN, in EVP_PKEY_CTX_set_rsa_pss_keygen_md_name() 1062 return EVP_PKEY_CTX_ctrl(ctx, EVP_PKEY_RSA_PSS, EVP_PKEY_OP_KEYGEN, in EVP_PKEY_CTX_set_rsa_pss_keygen_mgf1_md() 1069 return int_set_rsa_md_name(ctx, EVP_PKEY_RSA_PSS, EVP_PKEY_OP_KEYGEN, in EVP_PKEY_CTX_set_rsa_pss_keygen_mgf1_md_name()
|
A D | rsa_backend.c | 539 if (OBJ_obj2nid(algoid) != EVP_PKEY_RSA_PSS) in ossl_rsa_param_decode() 582 case EVP_PKEY_RSA_PSS: in ossl_rsa_key_from_pkcs8()
|
A D | rsa_pmeth.c | 870 EVP_PKEY_RSA_PSS,
|
/openssl-master/ssl/ |
A D | ssl_cert_table.h | 15 {EVP_PKEY_RSA_PSS, SSL_aRSA}, /* SSL_PKEY_RSA_PSS_SIGN */
|
A D | t1_lib.c | 1046 NID_sha256, SSL_MD_SHA256_IDX, EVP_PKEY_RSA_PSS, SSL_PKEY_RSA, 1049 NID_sha384, SSL_MD_SHA384_IDX, EVP_PKEY_RSA_PSS, SSL_PKEY_RSA, 1052 NID_sha512, SSL_MD_SHA512_IDX, EVP_PKEY_RSA_PSS, SSL_PKEY_RSA, 1055 NID_sha256, SSL_MD_SHA256_IDX, EVP_PKEY_RSA_PSS, SSL_PKEY_RSA_PSS_SIGN, 1058 NID_sha384, SSL_MD_SHA384_IDX, EVP_PKEY_RSA_PSS, SSL_PKEY_RSA_PSS_SIGN, 1480 pkeyid = EVP_PKEY_RSA_PSS; in tls12_check_peer_sigalg() 1490 && (lu->sig != EVP_PKEY_RSA_PSS || pkeyid != EVP_PKEY_RSA))) { in tls12_check_peer_sigalg() 2391 *psig = EVP_PKEY_RSA_PSS; in get_sigorhash() 3043 || (clu->nid == EVP_PKEY_RSA_PSS in tls12_get_cert_sigalg_idx() 3182 } else if (lu->sig == EVP_PKEY_RSA_PSS) { in find_sig_alg() [all …]
|
A D | ssl_local.h | 2185 s->s3.tmp.peer_sigalg->sig == EVP_PKEY_RSA_PSS)
|
/openssl-master/providers/implementations/encode_decode/ |
A D | encode_key2any.c | 915 return expected_type == EVP_PKEY_RSA_PSS; in rsa_check_key_type() 923 #define rsapss_evp_type EVP_PKEY_RSA_PSS 1353 MAKE_ENCODER(rsapss, rsa, EVP_PKEY_RSA_PSS, EncryptedPrivateKeyInfo, der); 1354 MAKE_ENCODER(rsapss, rsa, EVP_PKEY_RSA_PSS, EncryptedPrivateKeyInfo, pem); 1355 MAKE_ENCODER(rsapss, rsa, EVP_PKEY_RSA_PSS, PrivateKeyInfo, der); 1356 MAKE_ENCODER(rsapss, rsa, EVP_PKEY_RSA_PSS, PrivateKeyInfo, pem); 1357 MAKE_ENCODER(rsapss, rsa, EVP_PKEY_RSA_PSS, SubjectPublicKeyInfo, der); 1358 MAKE_ENCODER(rsapss, rsa, EVP_PKEY_RSA_PSS, SubjectPublicKeyInfo, pem); 1454 MAKE_ENCODER(rsapss, rsa, EVP_PKEY_RSA_PSS, PKCS1, der); 1455 MAKE_ENCODER(rsapss, rsa, EVP_PKEY_RSA_PSS, PKCS1, pem);
|
A D | decode_der2key.c | 506 return ctx->desc->evp_type == EVP_PKEY_RSA_PSS; in rsa_check() 518 #define rsapss_evp_type EVP_PKEY_RSA_PSS
|
/openssl-master/crypto/x509/ |
A D | x509type.c | 38 case EVP_PKEY_RSA_PSS: in X509_certificate_type()
|
A D | x_all.c | 463 if (pknid == EVP_PKEY_RSA_PSS) { in X509_digest_sig()
|
/openssl-master/crypto/cms/ |
A D | cms_rsa.c | 211 X509_ALGOR_set0(alg, OBJ_nid2obj(EVP_PKEY_RSA_PSS), V_ASN1_SEQUENCE, os); in rsa_cms_sign() 224 if (nid == EVP_PKEY_RSA_PSS) in rsa_cms_verify()
|
/openssl-master/crypto/evp/ |
A D | p_legacy.c | 36 if (pkey->type != EVP_PKEY_RSA && pkey->type != EVP_PKEY_RSA_PSS) { in evp_pkey_get0_RSA_int()
|
A D | ctrl_params_translate.c | 2113 { SET, EVP_PKEY_RSA, EVP_PKEY_RSA_PSS, 2117 { GET, EVP_PKEY_RSA, EVP_PKEY_RSA_PSS, 2122 { SET, EVP_PKEY_RSA, EVP_PKEY_RSA_PSS, 2126 { GET, EVP_PKEY_RSA, EVP_PKEY_RSA_PSS, 2137 { SET, EVP_PKEY_RSA, EVP_PKEY_RSA_PSS, EVP_PKEY_OP_TYPE_SIG, 2141 { GET, EVP_PKEY_RSA, EVP_PKEY_RSA_PSS, EVP_PKEY_OP_TYPE_SIG, 2165 { SET, EVP_PKEY_RSA_PSS, 0, EVP_PKEY_OP_TYPE_GEN, 2168 { SET, EVP_PKEY_RSA_PSS, 0, EVP_PKEY_OP_TYPE_GEN, 2171 { SET, EVP_PKEY_RSA_PSS, 0, EVP_PKEY_OP_TYPE_GEN, 2174 { SET, EVP_PKEY_RSA, EVP_PKEY_RSA_PSS, EVP_PKEY_OP_KEYGEN,
|
A D | p_lib.c | 1002 { EVP_PKEY_RSA_PSS, "RSA-PSS" },
|
/openssl-master/doc/man3/ |
A D | SSL_get_peer_signature_nid.pod | 26 where it is B<EVP_PKEY_RSA_PSS>. To differentiate between
|
A D | EVP_PKEY_CTX_set_rsa_pss_keygen_md.pod | 81 EVP_PKEY_CTX *pctx = EVP_PKEY_CTX_new_id(EVP_PKEY_RSA_PSS, NULL);
|
A D | SSL_CTX_set1_sigalgs.pod | 75 EVP_PKEY_RSA, EVP_PKEY_RSA_PSS, EVP_PKEY_DSA and EVP_PKEY_EC.
|
A D | EVP_PKEY_CTX_new.pod | 85 These are B<EVP_PKEY_RSA>, B<EVP_PKEY_RSA_PSS>, B<EVP_PKEY_DSA>,
|
/openssl-master/crypto/asn1/ |
A D | a_verify.c | 165 if (mdnid == NID_undef && pknid == EVP_PKEY_RSA_PSS) { in ASN1_item_verify_ctx()
|
/openssl-master/apps/lib/ |
A D | s_cb.c | 228 case EVP_PKEY_RSA_PSS: in get_sigtype()
|
/openssl-master/ssl/statem/ |
A D | statem_lib.c | 320 if (lu->sig == EVP_PKEY_RSA_PSS) { in tls_construct_cert_verify()
|
A D | statem_srvr.c | 2687 if (lu->sig == EVP_PKEY_RSA_PSS) { in tls_construct_server_key_exchange()
|
/openssl-master/include/openssl/ |
A D | evp.h | 61 # define EVP_PKEY_RSA_PSS NID_rsassaPss macro
|