summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto/rsa (follow)
Commit message (Expand)AuthorAgeFilesLines
* Free pss in RSA_freeinoguchi2020-01-171-1/+2
* Fix rsa key output formatinoguchi2019-11-201-5/+12
* Reshuffle RSA_PSS_PARAMS and RSA_OAEP_PARAMS to avoid duplicate typedef.jsing2019-11-041-21/+19
* Bring back some icky buffer allocation code so that pkey_rsa_print()jsing2019-11-021-9/+41
* Provide RSA_PKCS1_OpenSSL().jsing2019-11-022-3/+9
* Make RSA_padding_{add,check}_PKCS1_OAEP_mgf1() public.jsing2019-11-022-9/+8
* Make RSA_OAEP_PARAMs public.jsing2019-11-022-17/+17
* Add RSA CMS support.jsing2019-11-013-5/+262
* Update RSA ASN.1 code to handle RSA-PSS.jsing2019-11-014-302/+389
* Clean up RSA_new_method().jsing2019-11-011-40/+24
* Add CMS controls for RSA.jsing2019-10-311-1/+8
* Add support for RSA-PSS.jsing2019-10-315-65/+370
* Move RSA min modulus to a define and increase from 256 to 512 bits.jsing2019-10-312-4/+6
* Fix indent and indent before labels.jsing2019-10-311-5/+5
* Use braces where a statement has both multi-line and single-line blocks.jsing2019-10-311-8/+13
* Add additional validation of key size, message digest size and publicjsing2019-10-311-3/+17
* Clean up some code.jsing2019-10-311-11/+13
* Avoid potentially leaking pub_exp in pkey_rsa_copy().jsing2019-10-311-4/+4
* Add two controls that were missed in the previous commit.jsing2019-10-291-1/+13
* Update RSA OAEP code.jsing2019-10-292-21/+124
* Free maskHash when RSA_PSS_PARAMS is freed.jsing2019-10-251-3/+23
* Provide RSA_OAEP_PARAMS along with ASN.1 encoding/decoding.jsing2019-10-242-2/+97
* Add RSA_PSS_PARAMS pointer to RSA struct.jsing2019-10-241-1/+8
* Add maskHash field to RSA_PSS_PARAMS.jsing2019-10-241-1/+4
* Provide RSA_pkey_ctx_ctrl().jsing2019-10-242-2/+19
* Sync RSA_padding_check_PKCS1_OAEP_mgf1().jsing2019-10-171-64/+111
* Use EVP_MAX_MD_SIZE instead of SHA_DIGEST_LENGTH and remove OPENSSL_NO_SHA*jsing2019-10-091-7/+2
* Provide internal RSA_padding_{add,check}_PKCS1_OAEP_mgf1() functions.jsing2019-10-042-10/+90
* Move towards making RSA OAEP functions handle arbitrary message digests.jsing2019-10-031-53/+59
* Provide EVP_PKEY_CTX_get_signature_md() macro and implement thejsing2019-09-091-1/+5
* provide getters and setters for the RSA_METHOD interfacegilles2019-06-052-2/+220
* Add some accessor functions:djm2018-09-122-2/+22
* use timing-safe compares for checking results in signature verificationdjm2018-09-054-9/+10
* Add consts to EVP_PKEY_asn1_set_private()tb2018-08-241-2/+2
* whitespace fixtb2018-08-191-2/+2
* Don't leak db on error in RSA_padding_check_PKCS1_OAEP().tb2018-08-191-7/+7
* In RSA_padding_add_PKCS1_OAEP, dbmask needs to be freed on failure.bcook2018-08-051-3/+7
* Implement RSASSA-PKCS1-v1_5 as specified in RFC 8017.tb2018-07-231-120/+148
* make ENGINE_finish() succeed on NULL and simplify callers as intb2018-04-141-12/+7
* Provide RSA_meth_{dup,free,new,set_{finish,priv_{dec,enc}}}()tb2018-03-172-1/+96
* Provide RSA_{clear,set,test}_flasg()tb2018-02-202-2/+23
* Provide RSA_{g,s}et0_crt_params()tb2018-02-182-2/+40
* Use usual order of RSA_{g,s}et0_key().tb2018-02-182-13/+14
* Provide RSA_{g,s}et0_factors()tb2018-02-182-2/+31
* Provide RSA_bits()tb2018-02-182-2/+9
* Provide further parts of the OpenSSL 1.1 API: {DH,DSA}_get0_{key,pqg}(),tb2018-02-172-2/+39
* Bring back the RSA_SSLV23_PADDING define.jsing2017-08-301-1/+2
* Remove RSA_padding_add_SSLv23()/RSA_padding_check_SSLv23() and relatedjsing2017-08-284-166/+3
* use freezero() instead of memset/explicit_bzero + free. Substantiallyderaadt2017-05-023-35/+13
* revert previous accidental commitbeck2017-04-283-21/+33