/third_party/mbedtls/tests/suites/ |
D | test_suite_rsa.data | 1 RSA parameter validation 4 RSA init-free-free 7 RSA init-free-init-free 10 RSA PKCS1 Verify v1.5 CAVS #1 15 RSA PKCS1 Verify v1.5 CAVS #2 19 RSA PKCS1 Verify v1.5 CAVS #3 23 RSA PKCS1 Verify v1.5 CAVS #4 27 RSA PKCS1 Verify v1.5 CAVS #5 31 RSA PKCS1 Verify v1.5 CAVS #6 35 RSA PKCS1 Verify v1.5 CAVS #7 [all …]
|
D | test_suite_pkparse.data | 1 Parse RSA Key #1 (No password when required) 5 Parse RSA Key #2 (Correct password) 9 Parse RSA Key #3 (Wrong password) 13 Parse RSA Key #4 (DES Encrypted) 17 Parse RSA Key #5 (3DES Encrypted) 21 Parse RSA Key #6 (AES-128 Encrypted) 25 Parse RSA Key #7 (AES-192 Encrypted) 29 Parse RSA Key #8 (AES-256 Encrypted) 33 Parse RSA Key #9 (2048-bit, DES Encrypted) 37 Parse RSA Key #10 (2048-bit, 3DES Encrypted) [all …]
|
D | test_suite_pk.data | 8 PK utils: RSA 512-bit 10 pk_utils:MBEDTLS_PK_RSA:512:512:64:"RSA" 47 RSA verify test vector #1 (good) 51 RSA verify test vector #2 (bad) 135 RSA sign-verify 139 RSA encrypt test vector 143 RSA decrypt test vector #1 147 RSA decrypt test vector #2 167 Verify ext RSA #1 (PKCS1 v2.1, salt_len = ANY, OK) 171 Verify ext RSA #2 (PKCS1 v2.1, salt_len = ANY, wrong message) [all …]
|
D | test_suite_psa_crypto_persistent_key.data | 1 Format for storage: RSA private key 7 Parse storage: RSA private key 47 Persistent key import (RSA) 51 Persistent key import with restart (RSA) 55 Persistent key import (RSA) invalid key id (VENDOR_MIN) 59 Persistent key import (RSA) invalid key id (VOLATILE_MIN) 63 Persistent key import (RSA) invalid key id (VENDOR_MAX) 74 import/export persistent key RSA public key: good, 1024-bit 78 import/export persistent key RSA keypair: good, 1024-bit 85 import/export persistent key RSA public key file not exist: 1024-bit [all …]
|
/third_party/openssl/test/ssl-tests/ |
D | 25-cipher.conf.in | 23 "CipherString" => "ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA256", 27 "CipherString" => "ECDHE-RSA-AES256-SHA384" 30 "ExpectedCipher" => "ECDHE-RSA-AES256-SHA384", 37 "CipherString" => "ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA256", 41 "CipherString" => "ECDHE-RSA-AES128-SHA256" 44 "ExpectedCipher" => "ECDHE-RSA-AES128-SHA256", 51 "CipherString" => "ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA256", 55 "CipherString" => "ECDHE-RSA-AES128-SHA256:ECDHE-RSA-AES256-SHA384", 58 "ExpectedCipher" => "ECDHE-RSA-AES128-SHA256", 65 "CipherString" => "ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA256", [all …]
|
D | 25-cipher.conf | 25 CipherString = ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA256 30 CipherString = ECDHE-RSA-AES256-SHA384 36 ExpectedCipher = ECDHE-RSA-AES256-SHA384 50 CipherString = ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA256 55 CipherString = ECDHE-RSA-AES128-SHA256 61 ExpectedCipher = ECDHE-RSA-AES128-SHA256 75 CipherString = ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA256 80 CipherString = ECDHE-RSA-AES128-SHA256:ECDHE-RSA-AES256-SHA384 86 ExpectedCipher = ECDHE-RSA-AES128-SHA256 100 CipherString = ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA256 [all …]
|
D | 20-cert-select.conf | 11 test-6 = 6-RSA CipherString Selection 12 test-7 = 7-RSA-PSS Certificate CipherString Selection 22 test-17 = 17-RSA Signature Algorithm Selection 23 test-18 = 18-RSA-PSS Signature Algorithm Selection 24 test-19 = 19-RSA-PSS Certificate Legacy Signature Algorithm Selection 25 test-20 = 20-RSA-PSS Certificate Unified Signature Algorithm Selection 26 test-21 = 21-Only RSA-PSS Certificate 27 test-22 = 22-Only RSA-PSS Certificate Valid Signature Algorithms 28 test-23 = 23-RSA-PSS Certificate, no PSS signature algorithms 29 test-24 = 24-Only RSA-PSS Restricted Certificate [all …]
|
D | 20-cert-select.conf.in | 171 name => "RSA CipherString Selection", 178 "ExpectedServerCertType" =>, "RSA", 179 "ExpectedServerSignType" =>, "RSA-PSS", 184 name => "RSA-PSS Certificate CipherString Selection", 191 "ExpectedServerCertType" =>, "RSA-PSS", 192 "ExpectedServerSignType" =>, "RSA-PSS", 328 name => "RSA Signature Algorithm Selection", 331 "SignatureAlgorithms" => "RSA+SHA256", 334 "ExpectedServerCertType" => "RSA", 336 "ExpectedServerSignType" => "RSA", [all …]
|
/third_party/openssl/include/openssl/ |
D | rsa.h | 198 RSA *RSA_new(void); 199 RSA *RSA_new_method(ENGINE *engine); 200 int RSA_bits(const RSA *rsa); 201 int RSA_size(const RSA *rsa); 202 int RSA_security_bits(const RSA *rsa); 204 int RSA_set0_key(RSA *r, BIGNUM *n, BIGNUM *e, BIGNUM *d); 205 int RSA_set0_factors(RSA *r, BIGNUM *p, BIGNUM *q); 206 int RSA_set0_crt_params(RSA *r,BIGNUM *dmp1, BIGNUM *dmq1, BIGNUM *iqmp); 207 int RSA_set0_multi_prime_params(RSA *r, BIGNUM *primes[], BIGNUM *exps[], 209 void RSA_get0_key(const RSA *r, [all …]
|
/third_party/openssl/crypto/rsa/ |
D | rsa_asn1.c | 31 RSA_free((RSA *)*pval); in rsa_cb() 35 if (((RSA *)*pval)->version != RSA_ASN1_VERSION_MULTI) { in rsa_cb() 39 return (rsa_multip_calc_product((RSA *)*pval) == 1) ? 2 : 0; in rsa_cb() 52 ASN1_EMBED(RSA, version, INT32), 53 ASN1_SIMPLE(RSA, n, BIGNUM), 54 ASN1_SIMPLE(RSA, e, BIGNUM), 55 ASN1_SIMPLE(RSA, d, CBIGNUM), 56 ASN1_SIMPLE(RSA, p, CBIGNUM), 57 ASN1_SIMPLE(RSA, q, CBIGNUM), 58 ASN1_SIMPLE(RSA, dmp1, CBIGNUM), [all …]
|
D | rsa_lib.c | 20 RSA *RSA_new(void) in RSA_new() 25 const RSA_METHOD *RSA_get_method(const RSA *rsa) in RSA_get_method() 30 int RSA_set_method(RSA *rsa, const RSA_METHOD *meth) in RSA_set_method() 50 RSA *RSA_new_method(ENGINE *engine) in RSA_new_method() 52 RSA *ret = OPENSSL_zalloc(sizeof(*ret)); in RSA_new_method() 105 void RSA_free(RSA *r) in RSA_free() 144 int RSA_up_ref(RSA *r) in RSA_up_ref() 156 int RSA_set_ex_data(RSA *r, int idx, void *arg) in RSA_set_ex_data() 161 void *RSA_get_ex_data(const RSA *r, int idx) in RSA_get_ex_data() 166 int RSA_security_bits(const RSA *rsa) in RSA_security_bits() [all …]
|
D | rsa_meth.c | 102 unsigned char *to, RSA *rsa, int padding) in RSA_meth_get_pub_enc() 109 unsigned char *to, RSA *rsa, in RSA_meth_set_pub_enc() 118 unsigned char *to, RSA *rsa, int padding) in RSA_meth_get_pub_dec() 125 unsigned char *to, RSA *rsa, in RSA_meth_set_pub_dec() 134 unsigned char *to, RSA *rsa, int padding) in RSA_meth_get_priv_enc() 141 unsigned char *to, RSA *rsa, in RSA_meth_set_priv_enc() 150 unsigned char *to, RSA *rsa, int padding) in RSA_meth_get_priv_dec() 157 unsigned char *to, RSA *rsa, in RSA_meth_set_priv_dec() 166 (BIGNUM *r0, const BIGNUM *i, RSA *rsa, BN_CTX *ctx) in RSA_meth_get_mod_exp() 172 int (*mod_exp) (BIGNUM *r0, const BIGNUM *i, RSA *rsa, in RSA_meth_set_mod_exp() [all …]
|
D | rsa_local.h | 71 unsigned char *to, RSA *rsa, int padding); 73 unsigned char *to, RSA *rsa, int padding); 75 unsigned char *to, RSA *rsa, int padding); 77 unsigned char *to, RSA *rsa, int padding); 79 int (*rsa_mod_exp) (BIGNUM *r0, const BIGNUM *I, RSA *rsa, BN_CTX *ctx); 84 int (*init) (RSA *rsa); 86 int (*finish) (RSA *rsa); 100 const RSA *rsa); 103 unsigned int siglen, const RSA *rsa); 110 int (*rsa_keygen) (RSA *rsa, int bits, BIGNUM *e, BN_GENCB *cb); [all …]
|
D | rsa_crpt.c | 17 int RSA_bits(const RSA *r) in RSA_bits() 22 int RSA_size(const RSA *r) in RSA_size() 28 RSA *rsa, int padding) in RSA_public_encrypt() 34 unsigned char *to, RSA *rsa, int padding) in RSA_private_encrypt() 40 unsigned char *to, RSA *rsa, int padding) in RSA_private_decrypt() 46 RSA *rsa, int padding) in RSA_public_decrypt() 51 int RSA_flags(const RSA *r) in RSA_flags() 56 void RSA_blinding_off(RSA *rsa) in RSA_blinding_off() 64 int RSA_blinding_on(RSA *rsa, BN_CTX *ctx) in RSA_blinding_on() 110 BN_BLINDING *RSA_setup_blinding(RSA *rsa, BN_CTX *in_ctx) in RSA_setup_blinding()
|
/third_party/curl/docs/ |
D | CIPHERS.md | 34 `DH-RSA-DES-CBC3-SHA` 36 `DHE-RSA-DES-CBC3-SHA` 49 `DHE-RSA-DES-CBC3-SHA` 59 `DH-RSA-AES128-SHA` 60 `DH-RSA-AES256-SHA` 63 `DHE-RSA-AES128-SHA` 64 `DHE-RSA-AES256-SHA` 72 `DH-RSA-SEED-SHA` 74 `DHE-RSA-SEED-SHA` 86 `ECDHE-RSA-NULL-SHA` [all …]
|
/third_party/openssl/doc/man3/ |
D | RSA_get0_key.pod | 13 - Routines for getting and setting data in an RSA object 19 int RSA_set0_key(RSA *r, BIGNUM *n, BIGNUM *e, BIGNUM *d); 20 int RSA_set0_factors(RSA *r, BIGNUM *p, BIGNUM *q); 21 int RSA_set0_crt_params(RSA *r, BIGNUM *dmp1, BIGNUM *dmq1, BIGNUM *iqmp); 22 void RSA_get0_key(const RSA *r, 24 void RSA_get0_factors(const RSA *r, const BIGNUM **p, const BIGNUM **q); 25 void RSA_get0_crt_params(const RSA *r, 28 const BIGNUM *RSA_get0_n(const RSA *d); 29 const BIGNUM *RSA_get0_e(const RSA *d); 30 const BIGNUM *RSA_get0_d(const RSA *d); [all …]
|
D | RSA_set_method.pod | 7 RSA_new_method - select RSA method 17 int RSA_set_method(RSA *rsa, const RSA_METHOD *meth); 19 RSA_METHOD *RSA_get_method(const RSA *rsa); 23 int RSA_flags(const RSA *rsa); 25 RSA *RSA_new_method(ENGINE *engine); 29 An B<RSA_METHOD> specifies the functions that OpenSSL uses for RSA 32 important information about how these RSA API functions are affected by the 38 RSA_set_default_method() makes B<meth> the default method for all RSA 41 been set as a default for RSA, so this function is no longer recommended. 51 B<rsa>. This will replace the RSA_METHOD used by the RSA key and if the [all …]
|
D | RSA_check_key.pod | 5 RSA_check_key_ex, RSA_check_key - validate private RSA keys 11 int RSA_check_key_ex(RSA *rsa, BN_GENCB *cb); 13 int RSA_check_key(RSA *rsa); 17 RSA_check_key_ex() function validates RSA keys. 21 It does not work on RSA public keys that have only the modulus 26 the RSA key material, so the RSA key structure must contain all the private 28 Therefore, it cannot be used with any arbitrary RSA key object, 29 even if it is otherwise fit for regular RSA operation. 39 return 1 if B<rsa> is a valid RSA key, and 0 otherwise. 47 Unlike most other RSA functions, this function does B<not> work [all …]
|
D | RSA_meth_new.pod | 17 - Routines to build up RSA methods 38 unsigned char *to, RSA *rsa, int padding); 41 unsigned char *to, RSA *rsa, 46 unsigned char *to, RSA *rsa, int padding); 49 unsigned char *to, RSA *rsa, 53 unsigned char *to, RSA *rsa, 57 unsigned char *to, RSA *rsa, int padding)); 60 unsigned char *to, RSA *rsa, 64 unsigned char *to, RSA *rsa, int padding)); 68 RSA *rsa, BN_CTX *ctx); [all …]
|
D | EVP_PKEY_CTX_set_rsa_pss_keygen_md.pod | 8 - EVP_PKEY RSA-PSS algorithm support functions 23 These are the functions that implement L<RSA-PSS(7)>. 29 than B<PSS>. It is otherwise similar to the B<RSA> version. 34 to the B<RSA> operation except detection of the salt length (using 42 similar to the B<RSA> versions. 46 As with RSA key generation the EVP_PKEY_CTX_set_rsa_keygen_bits() 47 and EVP_PKEY_CTX_set_rsa_keygen_pubexp() macros are supported for RSA-PSS: 48 they have exactly the same meaning as for the RSA algorithm. 68 A context for the B<RSA-PSS> algorithm can be obtained by calling: 80 L<RSA-PSS(7)>,
|
D | RSA_blinding_on.pod | 5 RSA_blinding_on, RSA_blinding_off - protect the RSA operation from timing attacks 11 int RSA_blinding_on(RSA *rsa, BN_CTX *ctx); 13 void RSA_blinding_off(RSA *rsa); 17 RSA is vulnerable to timing attacks. In a setup where attackers can 18 measure the time of RSA decryption or signature operations, blinding 19 must be used to protect the RSA operation from that attack.
|
/third_party/openssl/crypto/pem/ |
D | pem_all.c | 22 static RSA *pkey_get_rsa(EVP_PKEY *key, RSA **rsa); 47 static RSA *pkey_get_rsa(EVP_PKEY *key, RSA **rsa) in IMPLEMENT_PEM_rw() 49 RSA *rtmp; in IMPLEMENT_PEM_rw() 63 RSA *PEM_read_bio_RSAPrivateKey(BIO *bp, RSA **rsa, pem_password_cb *cb, in PEM_read_bio_RSAPrivateKey() 73 RSA *PEM_read_RSAPrivateKey(FILE *fp, RSA **rsa, pem_password_cb *cb, void *u) in PEM_read_RSAPrivateKey() 82 IMPLEMENT_PEM_write_cb_const(RSAPrivateKey, RSA, PEM_STRING_RSA, in IMPLEMENT_PEM_write_cb_const() argument 86 IMPLEMENT_PEM_rw_const(RSAPublicKey, RSA, PEM_STRING_RSA_PUBLIC, in IMPLEMENT_PEM_write_cb_const() 88 IMPLEMENT_PEM_rw(RSA_PUBKEY, RSA, PEM_STRING_PUBLIC, RSA_PUBKEY) in IMPLEMENT_PEM_write_cb_const()
|
/third_party/openssl/doc/man1/ |
D | ciphers.pod | 221 =item B<kRSA>, B<aRSA>, B<RSA> 223 Cipher suites using RSA key exchange or authentication. B<RSA> is an alias for 229 with RSA and DSS keys or either respectively. 408 e.g. DES-CBC3-SHA. In these cases, RSA authentication is used. 420 SSL_DH_RSA_WITH_3DES_EDE_CBC_SHA DH-RSA-DES-CBC3-SHA 422 SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA DHE-RSA-DES-CBC3-SHA 443 TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA DHE-RSA-DES-CBC3-SHA 455 TLS_DH_RSA_WITH_AES_128_CBC_SHA DH-RSA-AES128-SHA 456 TLS_DH_RSA_WITH_AES_256_CBC_SHA DH-RSA-AES256-SHA 460 TLS_DHE_RSA_WITH_AES_128_CBC_SHA DHE-RSA-AES128-SHA [all …]
|
/third_party/openssl/crypto/x509/ |
D | x_all.c | 200 RSA *d2i_RSAPrivateKey_fp(FILE *fp, RSA **rsa) in d2i_RSAPrivateKey_fp() 205 int i2d_RSAPrivateKey_fp(FILE *fp, RSA *rsa) in i2d_RSAPrivateKey_fp() 210 RSA *d2i_RSAPublicKey_fp(FILE *fp, RSA **rsa) in d2i_RSAPublicKey_fp() 215 RSA *d2i_RSA_PUBKEY_fp(FILE *fp, RSA **rsa) in d2i_RSA_PUBKEY_fp() 222 int i2d_RSAPublicKey_fp(FILE *fp, RSA *rsa) in i2d_RSAPublicKey_fp() 227 int i2d_RSA_PUBKEY_fp(FILE *fp, RSA *rsa) in i2d_RSA_PUBKEY_fp() 233 RSA *d2i_RSAPrivateKey_bio(BIO *bp, RSA **rsa) in d2i_RSAPrivateKey_bio() 238 int i2d_RSAPrivateKey_bio(BIO *bp, RSA *rsa) in i2d_RSAPrivateKey_bio() 243 RSA *d2i_RSAPublicKey_bio(BIO *bp, RSA **rsa) in d2i_RSAPublicKey_bio() 248 RSA *d2i_RSA_PUBKEY_bio(BIO *bp, RSA **rsa) in d2i_RSA_PUBKEY_bio() [all …]
|
/third_party/openssl/doc/man7/ |
D | RSA-PSS.pod | 5 RSA-PSS - EVP_PKEY RSA-PSS algorithm support 9 The B<RSA-PSS> EVP_PKEY implementation is a restricted version of the RSA 15 This algorithm shares several control operations with the B<RSA> algorithm 20 Signing and verification is similar to the B<RSA> algorithm except the 35 The PKCS#8 private key format used for RSA-PSS keys is similar to the RSA
|