/third_party/boringssl/src/crypto/err/ |
D | rsa.errordata | 1 RSA,100,BAD_ENCODING 2 RSA,101,BAD_E_VALUE 3 RSA,102,BAD_FIXED_HEADER_DECRYPT 4 RSA,103,BAD_PAD_BYTE_COUNT 5 RSA,104,BAD_RSA_PARAMETERS 6 RSA,105,BAD_SIGNATURE 7 RSA,106,BAD_VERSION 8 RSA,107,BLOCK_TYPE_IS_NOT_01 9 RSA,148,BLOCK_TYPE_IS_NOT_02 10 RSA,108,BN_NOT_INITIALIZED [all …]
|
/third_party/mbedtls/tests/suites/ |
D | test_suite_rsa.data | 1 RSA parameter validation 4 RSA init-free-free 7 RSA init-free-init-free 10 RSA PKCS1 Verify v1.5 CAVS #1 15 RSA PKCS1 Verify v1.5 CAVS #2 19 RSA PKCS1 Verify v1.5 CAVS #3 23 RSA PKCS1 Verify v1.5 CAVS #4 27 RSA PKCS1 Verify v1.5 CAVS #5 31 RSA PKCS1 Verify v1.5 CAVS #6 35 RSA PKCS1 Verify v1.5 CAVS #7 [all …]
|
D | test_suite_pkparse.data | 1 Parse RSA Key #1 (No password when required) 5 Parse RSA Key #2 (Correct password) 9 Parse RSA Key #3 (Wrong password) 13 Parse RSA Key #4 (DES Encrypted) 17 Parse RSA Key #5 (3DES Encrypted) 21 Parse RSA Key #6 (AES-128 Encrypted) 25 Parse RSA Key #7 (AES-192 Encrypted) 29 Parse RSA Key #8 (AES-256 Encrypted) 33 Parse RSA Key #9 (2048-bit, DES Encrypted) 37 Parse RSA Key #10 (2048-bit, 3DES Encrypted) [all …]
|
D | test_suite_pk.data | 11 PK utils: RSA 13 pk_utils:MBEDTLS_PK_RSA:512:64:"RSA" 27 RSA verify test vector #1 (good) 31 RSA verify test vector #2 (bad) 63 RSA sign-verify 67 RSA encrypt test vector 71 RSA decrypt test vector #1 75 RSA decrypt test vector #2 95 Verify ext RSA #1 (PKCS1 v2.1, salt_len = ANY, OK) 99 Verify ext RSA #2 (PKCS1 v2.1, salt_len = ANY, wrong message) [all …]
|
/third_party/openssl/test/ssl-tests/ |
D | 25-cipher.conf.in | 23 "CipherString" => "ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA256", 27 "CipherString" => "ECDHE-RSA-AES256-SHA384" 30 "ExpectedCipher" => "ECDHE-RSA-AES256-SHA384", 37 "CipherString" => "ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA256", 41 "CipherString" => "ECDHE-RSA-AES128-SHA256" 44 "ExpectedCipher" => "ECDHE-RSA-AES128-SHA256", 51 "CipherString" => "ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA256", 55 "CipherString" => "ECDHE-RSA-AES128-SHA256:ECDHE-RSA-AES256-SHA384", 58 "ExpectedCipher" => "ECDHE-RSA-AES128-SHA256", 65 "CipherString" => "ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA256", [all …]
|
D | 25-cipher.conf | 25 CipherString = ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA256 30 CipherString = ECDHE-RSA-AES256-SHA384 36 ExpectedCipher = ECDHE-RSA-AES256-SHA384 50 CipherString = ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA256 55 CipherString = ECDHE-RSA-AES128-SHA256 61 ExpectedCipher = ECDHE-RSA-AES128-SHA256 75 CipherString = ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA256 80 CipherString = ECDHE-RSA-AES128-SHA256:ECDHE-RSA-AES256-SHA384 86 ExpectedCipher = ECDHE-RSA-AES128-SHA256 100 CipherString = ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA256 [all …]
|
D | 20-cert-select.conf | 11 test-6 = 6-RSA CipherString Selection 12 test-7 = 7-RSA-PSS Certificate CipherString Selection 22 test-17 = 17-RSA Signature Algorithm Selection 23 test-18 = 18-RSA-PSS Signature Algorithm Selection 24 test-19 = 19-RSA-PSS Certificate Legacy Signature Algorithm Selection 25 test-20 = 20-RSA-PSS Certificate Unified Signature Algorithm Selection 26 test-21 = 21-Only RSA-PSS Certificate 27 test-22 = 22-Only RSA-PSS Certificate Valid Signature Algorithms 28 test-23 = 23-RSA-PSS Certificate, no PSS signature algorithms 29 test-24 = 24-Only RSA-PSS Restricted Certificate [all …]
|
D | 20-cert-select.conf.in | 171 name => "RSA CipherString Selection", 178 "ExpectedServerCertType" =>, "RSA", 179 "ExpectedServerSignType" =>, "RSA-PSS", 184 name => "RSA-PSS Certificate CipherString Selection", 191 "ExpectedServerCertType" =>, "RSA-PSS", 192 "ExpectedServerSignType" =>, "RSA-PSS", 328 name => "RSA Signature Algorithm Selection", 331 "SignatureAlgorithms" => "RSA+SHA256", 334 "ExpectedServerCertType" => "RSA", 336 "ExpectedServerSignType" => "RSA", [all …]
|
/third_party/boringssl/src/include/openssl/ |
D | rsa.h | 83 OPENSSL_EXPORT RSA *RSA_new(void); 86 OPENSSL_EXPORT RSA *RSA_new_method(const ENGINE *engine); 90 OPENSSL_EXPORT void RSA_free(RSA *rsa); 94 OPENSSL_EXPORT int RSA_up_ref(RSA *rsa); 100 OPENSSL_EXPORT unsigned RSA_bits(const RSA *rsa); 105 OPENSSL_EXPORT void RSA_get0_key(const RSA *rsa, const BIGNUM **out_n, 110 OPENSSL_EXPORT void RSA_get0_factors(const RSA *rsa, const BIGNUM **out_p, 117 OPENSSL_EXPORT void RSA_get0_crt_params(const RSA *rsa, const BIGNUM **out_dmp1, 130 OPENSSL_EXPORT int RSA_set0_key(RSA *rsa, BIGNUM *n, BIGNUM *e, BIGNUM *d); 140 OPENSSL_EXPORT int RSA_set0_factors(RSA *rsa, BIGNUM *p, BIGNUM *q); [all …]
|
/third_party/openssl/include/openssl/ |
D | rsa.h | 198 RSA *RSA_new(void); 199 RSA *RSA_new_method(ENGINE *engine); 200 int RSA_bits(const RSA *rsa); 201 int RSA_size(const RSA *rsa); 202 int RSA_security_bits(const RSA *rsa); 204 int RSA_set0_key(RSA *r, BIGNUM *n, BIGNUM *e, BIGNUM *d); 205 int RSA_set0_factors(RSA *r, BIGNUM *p, BIGNUM *q); 206 int RSA_set0_crt_params(RSA *r,BIGNUM *dmp1, BIGNUM *dmq1, BIGNUM *iqmp); 207 int RSA_set0_multi_prime_params(RSA *r, BIGNUM *primes[], BIGNUM *exps[], 209 void RSA_get0_key(const RSA *r, [all …]
|
/third_party/boringssl/src/crypto/evp/ |
D | evp_tests.txt | 5 # RSA 2048 bit key. 6 PrivateKey = RSA-2048 7 Type = RSA 13 PublicKey = RSA-2048-SPKI 14 Type = RSA 19 # The same key but with a negative RSA modulus. 20 PublicKey = RSA-2048-SPKI-Negative 25 PublicKey = RSA-2048-SPKI-Invalid 30 PublicKey = RSA-2048-SPKI-Invalid2 34 # RSA 512 bit key. [all …]
|
/third_party/boringssl/src/crypto/rsa_extra/ |
D | rsa_asn1.c | 84 OPENSSL_PUT_ERROR(RSA, RSA_R_VALUE_MISSING); in marshal_integer() 90 RSA *RSA_parse_public_key(CBS *cbs) { in RSA_parse_public_key() 91 RSA *ret = RSA_new(); in RSA_parse_public_key() 100 OPENSSL_PUT_ERROR(RSA, RSA_R_BAD_ENCODING); in RSA_parse_public_key() 107 OPENSSL_PUT_ERROR(RSA, RSA_R_BAD_RSA_PARAMETERS); in RSA_parse_public_key() 115 RSA *RSA_public_key_from_bytes(const uint8_t *in, size_t in_len) { in RSA_public_key_from_bytes() 118 RSA *ret = RSA_parse_public_key(&cbs); in RSA_public_key_from_bytes() 120 OPENSSL_PUT_ERROR(RSA, RSA_R_BAD_ENCODING); in RSA_public_key_from_bytes() 127 int RSA_marshal_public_key(CBB *cbb, const RSA *rsa) { in RSA_marshal_public_key() 133 OPENSSL_PUT_ERROR(RSA, RSA_R_ENCODE_ERROR); in RSA_marshal_public_key() [all …]
|
/third_party/openssl/crypto/rsa/ |
D | rsa_asn1.c | 31 RSA_free((RSA *)*pval); in rsa_cb() 35 if (((RSA *)*pval)->version != RSA_ASN1_VERSION_MULTI) { in rsa_cb() 39 return (rsa_multip_calc_product((RSA *)*pval) == 1) ? 2 : 0; in rsa_cb() 52 ASN1_EMBED(RSA, version, INT32), 53 ASN1_SIMPLE(RSA, n, BIGNUM), 54 ASN1_SIMPLE(RSA, e, BIGNUM), 55 ASN1_SIMPLE(RSA, d, CBIGNUM), 56 ASN1_SIMPLE(RSA, p, CBIGNUM), 57 ASN1_SIMPLE(RSA, q, CBIGNUM), 58 ASN1_SIMPLE(RSA, dmp1, CBIGNUM), [all …]
|
D | rsa_lib.c | 20 RSA *RSA_new(void) in RSA_new() 25 const RSA_METHOD *RSA_get_method(const RSA *rsa) in RSA_get_method() 30 int RSA_set_method(RSA *rsa, const RSA_METHOD *meth) in RSA_set_method() 50 RSA *RSA_new_method(ENGINE *engine) in RSA_new_method() 52 RSA *ret = OPENSSL_zalloc(sizeof(*ret)); in RSA_new_method() 105 void RSA_free(RSA *r) in RSA_free() 144 int RSA_up_ref(RSA *r) in RSA_up_ref() 156 int RSA_set_ex_data(RSA *r, int idx, void *arg) in RSA_set_ex_data() 161 void *RSA_get_ex_data(const RSA *r, int idx) in RSA_get_ex_data() 166 int RSA_security_bits(const RSA *rsa) in RSA_security_bits() [all …]
|
D | rsa_meth.c | 102 unsigned char *to, RSA *rsa, int padding) in RSA_meth_get_pub_enc() 109 unsigned char *to, RSA *rsa, in RSA_meth_set_pub_enc() 118 unsigned char *to, RSA *rsa, int padding) in RSA_meth_get_pub_dec() 125 unsigned char *to, RSA *rsa, in RSA_meth_set_pub_dec() 134 unsigned char *to, RSA *rsa, int padding) in RSA_meth_get_priv_enc() 141 unsigned char *to, RSA *rsa, in RSA_meth_set_priv_enc() 150 unsigned char *to, RSA *rsa, int padding) in RSA_meth_get_priv_dec() 157 unsigned char *to, RSA *rsa, in RSA_meth_set_priv_dec() 166 (BIGNUM *r0, const BIGNUM *i, RSA *rsa, BN_CTX *ctx) in RSA_meth_get_mod_exp() 172 int (*mod_exp) (BIGNUM *r0, const BIGNUM *i, RSA *rsa, in RSA_meth_set_mod_exp() [all …]
|
D | rsa_local.h | 71 unsigned char *to, RSA *rsa, int padding); 73 unsigned char *to, RSA *rsa, int padding); 75 unsigned char *to, RSA *rsa, int padding); 77 unsigned char *to, RSA *rsa, int padding); 79 int (*rsa_mod_exp) (BIGNUM *r0, const BIGNUM *I, RSA *rsa, BN_CTX *ctx); 84 int (*init) (RSA *rsa); 86 int (*finish) (RSA *rsa); 100 const RSA *rsa); 103 unsigned int siglen, const RSA *rsa); 110 int (*rsa_keygen) (RSA *rsa, int bits, BIGNUM *e, BN_GENCB *cb); [all …]
|
/third_party/boringssl/src/crypto/fipsmodule/rsa/ |
D | rsa.c | 81 OPENSSL_DECLARE_ERROR_REASON(RSA, BLOCK_TYPE_IS_NOT_02) in OPENSSL_DECLARE_ERROR_REASON() argument 85 RSA *RSA_new(void) { return RSA_new_method(NULL); } in OPENSSL_DECLARE_ERROR_REASON() 87 RSA *RSA_new_method(const ENGINE *engine) { in RSA_new_method() 88 RSA *rsa = OPENSSL_malloc(sizeof(RSA)); in RSA_new_method() 90 OPENSSL_PUT_ERROR(RSA, ERR_R_MALLOC_FAILURE); in RSA_new_method() 94 OPENSSL_memset(rsa, 0, sizeof(RSA)); in RSA_new_method() 121 void RSA_free(RSA *rsa) { in RSA_free() 163 int RSA_up_ref(RSA *rsa) { in RSA_up_ref() 168 unsigned RSA_bits(const RSA *rsa) { return BN_num_bits(rsa->n); } in RSA_bits() 170 void RSA_get0_key(const RSA *rsa, const BIGNUM **out_n, const BIGNUM **out_e, in RSA_get0_key() [all …]
|
D | padding.c | 79 OPENSSL_PUT_ERROR(RSA, RSA_R_KEY_SIZE_TOO_SMALL); in RSA_padding_add_PKCS1_type_1() 84 OPENSSL_PUT_ERROR(RSA, RSA_R_DIGEST_TOO_BIG_FOR_RSA_KEY); in RSA_padding_add_PKCS1_type_1() 102 OPENSSL_PUT_ERROR(RSA, RSA_R_DATA_TOO_SMALL); in RSA_padding_check_PKCS1_type_1() 108 OPENSSL_PUT_ERROR(RSA, RSA_R_BLOCK_TYPE_IS_NOT_01); in RSA_padding_check_PKCS1_type_1() 120 OPENSSL_PUT_ERROR(RSA, RSA_R_BAD_FIXED_HEADER_DECRYPT); in RSA_padding_check_PKCS1_type_1() 126 OPENSSL_PUT_ERROR(RSA, RSA_R_NULL_BEFORE_BLOCK_MISSING); in RSA_padding_check_PKCS1_type_1() 131 OPENSSL_PUT_ERROR(RSA, RSA_R_BAD_PAD_BYTE_COUNT); in RSA_padding_check_PKCS1_type_1() 139 OPENSSL_PUT_ERROR(RSA, RSA_R_DATA_TOO_LARGE); in RSA_padding_check_PKCS1_type_1() 168 OPENSSL_PUT_ERROR(RSA, RSA_R_KEY_SIZE_TOO_SMALL); in RSA_padding_add_PKCS1_type_2() 173 OPENSSL_PUT_ERROR(RSA, RSA_R_DATA_TOO_LARGE_FOR_KEY_SIZE); in RSA_padding_add_PKCS1_type_2() [all …]
|
D | rsa_impl.c | 75 static int check_modulus_and_exponent_sizes(const RSA *rsa) { in check_modulus_and_exponent_sizes() 79 OPENSSL_PUT_ERROR(RSA, RSA_R_MODULUS_TOO_LARGE); in check_modulus_and_exponent_sizes() 95 OPENSSL_PUT_ERROR(RSA, RSA_R_BAD_E_VALUE); in check_modulus_and_exponent_sizes() 104 OPENSSL_PUT_ERROR(RSA, RSA_R_KEY_SIZE_TOO_SMALL); in check_modulus_and_exponent_sizes() 132 static int freeze_private_key(RSA *rsa, BN_CTX *ctx) { in freeze_private_key() 249 size_t rsa_default_size(const RSA *rsa) { in rsa_default_size() 253 int RSA_encrypt(RSA *rsa, size_t *out_len, uint8_t *out, size_t max_out, in RSA_encrypt() 256 OPENSSL_PUT_ERROR(RSA, RSA_R_VALUE_MISSING); in RSA_encrypt() 267 OPENSSL_PUT_ERROR(RSA, RSA_R_OUTPUT_BUFFER_TOO_SMALL); in RSA_encrypt() 285 OPENSSL_PUT_ERROR(RSA, ERR_R_MALLOC_FAILURE); in RSA_encrypt() [all …]
|
/third_party/curl/docs/ |
D | CIPHERS.md | 34 `DH-RSA-DES-CBC3-SHA` 36 `DHE-RSA-DES-CBC3-SHA` 49 `DHE-RSA-DES-CBC3-SHA` 59 `DH-RSA-AES128-SHA` 60 `DH-RSA-AES256-SHA` 63 `DHE-RSA-AES128-SHA` 64 `DHE-RSA-AES256-SHA` 72 `DH-RSA-SEED-SHA` 74 `DHE-RSA-SEED-SHA` 86 `ECDHE-RSA-NULL-SHA` [all …]
|
/third_party/openssl/doc/man3/ |
D | RSA_get0_key.pod | 13 - Routines for getting and setting data in an RSA object 19 int RSA_set0_key(RSA *r, BIGNUM *n, BIGNUM *e, BIGNUM *d); 20 int RSA_set0_factors(RSA *r, BIGNUM *p, BIGNUM *q); 21 int RSA_set0_crt_params(RSA *r, BIGNUM *dmp1, BIGNUM *dmq1, BIGNUM *iqmp); 22 void RSA_get0_key(const RSA *r, 24 void RSA_get0_factors(const RSA *r, const BIGNUM **p, const BIGNUM **q); 25 void RSA_get0_crt_params(const RSA *r, 28 const BIGNUM *RSA_get0_n(const RSA *d); 29 const BIGNUM *RSA_get0_e(const RSA *d); 30 const BIGNUM *RSA_get0_d(const RSA *d); [all …]
|
D | RSA_set_method.pod | 7 RSA_new_method - select RSA method 17 int RSA_set_method(RSA *rsa, const RSA_METHOD *meth); 19 RSA_METHOD *RSA_get_method(const RSA *rsa); 23 int RSA_flags(const RSA *rsa); 25 RSA *RSA_new_method(ENGINE *engine); 29 An B<RSA_METHOD> specifies the functions that OpenSSL uses for RSA 32 important information about how these RSA API functions are affected by the 38 RSA_set_default_method() makes B<meth> the default method for all RSA 41 been set as a default for RSA, so this function is no longer recommended. 51 B<rsa>. This will replace the RSA_METHOD used by the RSA key and if the [all …]
|
D | RSA_check_key.pod | 5 RSA_check_key_ex, RSA_check_key - validate private RSA keys 11 int RSA_check_key_ex(RSA *rsa, BN_GENCB *cb); 13 int RSA_check_key(RSA *rsa); 17 RSA_check_key_ex() function validates RSA keys. 21 It does not work on RSA public keys that have only the modulus 26 the RSA key material, so the RSA key structure must contain all the private 28 Therefore, it cannot be used with any arbitrary RSA key object, 29 even if it is otherwise fit for regular RSA operation. 39 return 1 if B<rsa> is a valid RSA key, and 0 otherwise. 47 Unlike most other RSA functions, this function does B<not> work [all …]
|
/third_party/uboot/u-boot-2020.01/lib/rsa/ |
D | Kconfig | 1 config RSA config 2 bool "Use RSA Library" 6 RSA support. This enables the RSA algorithm used for FIT image 9 The Modular Exponentiation algorithm in RSA is implemented using 16 if RSA 19 bool "Use RSA Library within SPL" 22 bool "Enable driver for RSA Modular Exponentiation in software" 25 Enables driver for modular exponentiation in software. This is a RSA 26 algorithm used in FIT image verification. It required RSA Key as 31 bool "Enable RSA Modular Exponentiation with FSL crypto accelerator" [all …]
|
/third_party/boringssl/src/crypto/pem/ |
D | pem_all.c | 120 static RSA *pkey_get_rsa(EVP_PKEY *key, RSA **rsa); 136 static RSA *pkey_get_rsa(EVP_PKEY *key, RSA **rsa) in IMPLEMENT_PEM_rw() 138 RSA *rtmp; in IMPLEMENT_PEM_rw() 152 RSA *PEM_read_bio_RSAPrivateKey(BIO *bp, RSA **rsa, pem_password_cb *cb, in PEM_read_bio_RSAPrivateKey() 162 RSA *PEM_read_RSAPrivateKey(FILE *fp, RSA **rsa, pem_password_cb *cb, void *u) in PEM_read_RSAPrivateKey() 171 IMPLEMENT_PEM_write_cb_const(RSAPrivateKey, RSA, PEM_STRING_RSA, in IMPLEMENT_PEM_write_cb_const() argument 175 IMPLEMENT_PEM_rw_const(RSAPublicKey, RSA, PEM_STRING_RSA_PUBLIC, in IMPLEMENT_PEM_write_cb_const() 176 RSAPublicKey) IMPLEMENT_PEM_rw(RSA_PUBKEY, RSA, in IMPLEMENT_PEM_write_cb_const()
|