summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto/rsa/rsa_ameth.c (follow)
Commit message (Expand)AuthorAgeFilesLines
* sort includestb2024-11-021-2/+2
* Only include cryptlib.h where it's neededtb2024-11-011-3/+9
* Remove the pkey_{,public_,param_}check() handlerstb2024-08-291-11/+1
* Implement X509_get_signature_info()tb2024-08-281-1/+55
* Annotate RSA-PSS SHA parameter encoding as wrongtb2024-03-171-1/+9
* Inline rsa_is_pss() and rsa_pkey_is_pss()tb2024-01-101-11/+9
* Replace .pkey_base_id with a .base_method pointertb2024-01-041-4/+4
* Split ameth arrays into individual methodstb2024-01-041-33/+31
* pkey_is_pss() and pkey_ctx_is_pss() to rsa_ameth.ctb2024-01-011-1/+5
* Rework rsa_priv_decode()tb2023-12-281-14/+17
* Clean up old_rsa_priv_decode()tb2023-12-281-4/+13
* Fix X509_ALGOR_set0() usage in rsa_alg_set_oaep_padding()tb2023-11-091-4/+6
* Use X509_ALGOR_set0_by_nid() in rsa_mgf1md_to_maskGenAlgorithm()tb2023-11-091-5/+2
* More minor cleanup in rsa_alg_set_oaep_padding()tb2023-11-081-4/+3
* Prepare further fixes of X509_ALGOR_set0() misusetb2023-11-081-8/+7
* zap a stray spacetb2023-11-081-2/+2
* Rename os into astr in rsa_alg_set_oaep_padding()tb2023-11-081-6/+6
* Rename pkctx to pkey_ctx in rsa_alg_set_oaep_padding() and rsa_cms_encrypt()tb2023-11-081-9/+9
* Some simple cosmetics in rsa_alg_set_oaep_padding()tb2023-11-081-4/+8
* Split OAEP padding handling into a helper functiontb2023-11-081-53/+59
* Move CMS_RecipientInfo_ktri_get0_algs() down a few lines and fix itstb2023-11-071-3/+6
* Move CMS_RecipientInfo_get0_pkey_ctx() to first use of pkctxtb2023-11-071-3/+3
* Inline rsa_ctx_to_pss_string()tb2023-11-071-16/+6
* Rename pkctx to pkey_ctx in rsa_{cms,item}_sign()tb2023-11-071-26/+26
* Trivial cleanup in rsa_cms_sign()tb2023-11-071-5/+5
* Rework RSA_PKCS1_PSS_PADDING handling in rsa_item_sign()tb2023-11-071-14/+4
* Add a helper to set RSASSA-PSS padding parameterstb2023-11-071-10/+29
* Add a helper to set RSA PKCS #1 v1.5 padding OIDtb2023-11-071-12/+15
* Rework the MD setting in the RSA ASN.1 methodtb2023-10-261-45/+95
* RSA's _free and _size also lose their int_ prefixtb2023-08-121-7/+7
* Fix a leak in rsa_pub_encode()tb2023-08-101-12/+19
* rsa_priv_encode: plug leak on PKCS8_pkey_set0() failuretb2023-08-101-15/+19
* Mop up remaining uses of ASN1_bn_print()tb2023-07-071-41/+10
* Add missing rsa_security_bit() handler to the RSA-PSS ASN1_METHODtb2023-05-191-1/+2
* Pull in <openssl/rsa.h> directlytb2023-03-251-1/+2
* Make internal header file names consistenttb2022-11-261-4/+4
* Prepare to provide EVP_PKEY_security_bits()tb2022-06-271-1/+8
* Prepare to provide EVP_PKEY_check()tb2022-01-101-4/+14
* Fix rsa key output formatinoguchi2019-11-201-5/+12
* Bring back some icky buffer allocation code so that pkey_rsa_print()jsing2019-11-021-9/+41
* Add RSA CMS support.jsing2019-11-011-3/+252
* Update RSA ASN.1 code to handle RSA-PSS.jsing2019-11-011-299/+380
* Add support for RSA-PSS.jsing2019-10-311-1/+119
* Add consts to EVP_PKEY_asn1_set_private()tb2018-08-241-2/+2
* Send the function codes from the error functions to the bit bucket,beck2017-01-291-18/+14
* Expand ASN1_ITEM_rptr macros - no change in generated assembly.jsing2016-12-301-3/+3
* unifdef OPENSSL_NO_CMSjsing2016-10-191-15/+1
* Fix for OpenSSL CVE-2015-3194beck2015-12-031-2/+2
* Guenther has plans for OPENSSL_NO_CMS, so revert this for the moment.beck2015-02-111-1/+15
* get rid of OPENSSL_NO_CMS code we do not use.beck2015-02-111-15/+1