summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto/rsa (follow)
Commit message (Expand)AuthorAgeFilesLines
* sort includestb2024-11-021-2/+2
* Only include cryptlib.h where it's neededtb2024-11-011-3/+9
* Remove the pkey_{,public_,param_}check() handlerstb2024-08-291-11/+1
* Implement X509_get_signature_info()tb2024-08-281-1/+55
* replace atoi(3) usage with strtonum(3); ok/tweaks tb@op2024-08-261-5/+25
* Hide global _it symbols in rsa.hbeck2024-07-081-1/+5
* libcrypto: constify most error string tablestb2024-06-241-5/+7
* remove prototypes with no matching functionjsg2024-05-191-3/+1
* Rewrite RSA_padding_add_PKCS1_type_{1,2}() with CBS/CBB.jsing2024-03-301-33/+99
* Unify *_up_ref() implementationstb2024-03-271-3/+2
* Clean up use of EVP_MD_CTX_{legacy_clear,cleanup} in PKCS1_MGF1joshua2024-03-261-9/+14
* Clean up use of EVP_MD_CTX_{legacy_clear,cleanup} injoshua2024-03-261-19/+22
* Annotate RSA-PSS SHA parameter encoding as wrongtb2024-03-171-1/+9
* Use EVP_MD_CTX_legacy_clear() internallytb2024-02-182-5/+5
* Inline rsa_is_pss() and rsa_pkey_is_pss()tb2024-01-101-11/+9
* Replace .pkey_base_id with a .base_method pointertb2024-01-041-4/+4
* Split ameth arrays into individual methodstb2024-01-041-33/+31
* pkey_is_pss() and pkey_ctx_is_pss() to rsa_ameth.ctb2024-01-012-6/+6
* Rework pkey_rsa_keygen()tb2023-12-281-17/+21
* Rework rsa_priv_decode()tb2023-12-281-14/+17
* Clean up old_rsa_priv_decode()tb2023-12-281-4/+13
* Ignore ENGINE at the API boundarytb2023-11-291-3/+1
* Unifdef OPENSSL_NO_ENGINE in libcryptotb2023-11-191-34/+1
* Fix X509_ALGOR_set0() usage in rsa_alg_set_oaep_padding()tb2023-11-091-4/+6
* Use X509_ALGOR_set0_by_nid() in rsa_mgf1md_to_maskGenAlgorithm()tb2023-11-091-5/+2
* More minor cleanup in rsa_alg_set_oaep_padding()tb2023-11-081-4/+3
* Prepare further fixes of X509_ALGOR_set0() misusetb2023-11-081-8/+7
* zap a stray spacetb2023-11-081-2/+2
* Rename os into astr in rsa_alg_set_oaep_padding()tb2023-11-081-6/+6
* Rename pkctx to pkey_ctx in rsa_alg_set_oaep_padding() and rsa_cms_encrypt()tb2023-11-081-9/+9
* Some simple cosmetics in rsa_alg_set_oaep_padding()tb2023-11-081-4/+8
* Split OAEP padding handling into a helper functiontb2023-11-081-53/+59
* Move CMS_RecipientInfo_ktri_get0_algs() down a few lines and fix itstb2023-11-071-3/+6
* Move CMS_RecipientInfo_get0_pkey_ctx() to first use of pkctxtb2023-11-071-3/+3
* Inline rsa_ctx_to_pss_string()tb2023-11-071-16/+6
* Rename pkctx to pkey_ctx in rsa_{cms,item}_sign()tb2023-11-071-26/+26
* Trivial cleanup in rsa_cms_sign()tb2023-11-071-5/+5
* Rework RSA_PKCS1_PSS_PADDING handling in rsa_item_sign()tb2023-11-071-14/+4
* Add a helper to set RSASSA-PSS padding parameterstb2023-11-071-10/+29
* Add a helper to set RSA PKCS #1 v1.5 padding OIDtb2023-11-071-12/+15
* Rework the MD setting in the RSA ASN.1 methodtb2023-10-261-45/+95
* RSA's _free and _size also lose their int_ prefixtb2023-08-121-7/+7
* Fix a leak in rsa_pub_encode()tb2023-08-101-12/+19
* rsa_priv_encode: plug leak on PKCS8_pkey_set0() failuretb2023-08-101-15/+19
* Rework BN_BLINDING to use pthread_t directlytb2023-08-093-28/+18
* Merge remainder of rsa_crpt.c into rsa_eay.ctb2023-08-092-128/+54
* Move RSA blinding API from rsa_crpt.c to rsa_blinding.ctb2023-08-092-102/+102
* Move RSA_blinding_{on,off}() to the bottom of the filetb2023-08-091-29/+29
* Move bn_blind.c to rsa_blinding.ctb2023-08-092-1/+269
* Merge BN_BLINDING_create_param() into BN_BLINDING_new()tb2023-08-091-2/+2