/third_party/openssl/crypto/rsa/ |
D | rsa_ossl.c | 16 unsigned char *to, RSA *rsa, int padding); 18 unsigned char *to, RSA *rsa, int padding); 20 unsigned char *to, RSA *rsa, int padding); 22 unsigned char *to, RSA *rsa, int padding); 23 static int rsa_ossl_mod_exp(BIGNUM *r0, const BIGNUM *i, RSA *rsa, 25 static int rsa_ossl_init(RSA *rsa); 26 static int rsa_ossl_finish(RSA *rsa); 69 unsigned char *to, RSA *rsa, int padding) in rsa_ossl_public_encrypt() argument 76 if (BN_num_bits(rsa->n) > OPENSSL_RSA_MAX_MODULUS_BITS) { in rsa_ossl_public_encrypt() 81 if (BN_ucmp(rsa->n, rsa->e) <= 0) { in rsa_ossl_public_encrypt() [all …]
|
D | rsa_gen.c | 22 static int rsa_builtin_keygen(RSA *rsa, int bits, int primes, BIGNUM *e_value, 32 int RSA_generate_key_ex(RSA *rsa, int bits, BIGNUM *e_value, BN_GENCB *cb) in RSA_generate_key_ex() argument 34 if (rsa->meth->rsa_keygen != NULL) in RSA_generate_key_ex() 35 return rsa->meth->rsa_keygen(rsa, bits, e_value, cb); in RSA_generate_key_ex() 37 return RSA_generate_multi_prime_key(rsa, bits, RSA_DEFAULT_PRIME_NUM, in RSA_generate_key_ex() 41 int RSA_generate_multi_prime_key(RSA *rsa, int bits, int primes, in RSA_generate_multi_prime_key() argument 45 if (rsa->meth->rsa_multi_prime_keygen != NULL) { in RSA_generate_multi_prime_key() 46 return rsa->meth->rsa_multi_prime_keygen(rsa, bits, primes, in RSA_generate_multi_prime_key() 48 } else if (rsa->meth->rsa_keygen != NULL) { in RSA_generate_multi_prime_key() 56 return rsa->meth->rsa_keygen(rsa, bits, e_value, cb); in RSA_generate_multi_prime_key() [all …]
|
D | rsa_x931g.c | 19 int RSA_X931_derive_ex(RSA *rsa, BIGNUM *p1, BIGNUM *p2, BIGNUM *q1, in RSA_X931_derive_ex() argument 28 if (!rsa) in RSA_X931_derive_ex() 43 if (!rsa->e) { in RSA_X931_derive_ex() 44 rsa->e = BN_dup(e); in RSA_X931_derive_ex() 45 if (!rsa->e) in RSA_X931_derive_ex() 48 e = rsa->e; in RSA_X931_derive_ex() 56 if (Xp && rsa->p == NULL) { in RSA_X931_derive_ex() 57 rsa->p = BN_new(); in RSA_X931_derive_ex() 58 if (rsa->p == NULL) in RSA_X931_derive_ex() 61 if (!BN_X931_derive_prime_ex(rsa->p, p1, p2, in RSA_X931_derive_ex() [all …]
|
D | rsa_crpt.c | 28 RSA *rsa, int padding) in RSA_public_encrypt() argument 30 return rsa->meth->rsa_pub_enc(flen, from, to, rsa, padding); in RSA_public_encrypt() 34 unsigned char *to, RSA *rsa, int padding) in RSA_private_encrypt() argument 36 return rsa->meth->rsa_priv_enc(flen, from, to, rsa, padding); in RSA_private_encrypt() 40 unsigned char *to, RSA *rsa, int padding) in RSA_private_decrypt() argument 42 return rsa->meth->rsa_priv_dec(flen, from, to, rsa, padding); in RSA_private_decrypt() 46 RSA *rsa, int padding) in RSA_public_decrypt() argument 48 return rsa->meth->rsa_pub_dec(flen, from, to, rsa, padding); in RSA_public_decrypt() 56 void RSA_blinding_off(RSA *rsa) in RSA_blinding_off() argument 58 BN_BLINDING_free(rsa->blinding); in RSA_blinding_off() [all …]
|
D | rsa_meth.c | 102 unsigned char *to, RSA *rsa, int padding) in RSA_meth_get_pub_enc() 109 unsigned char *to, RSA *rsa, in RSA_meth_set_pub_enc() argument 118 unsigned char *to, RSA *rsa, int padding) in RSA_meth_get_pub_dec() 125 unsigned char *to, RSA *rsa, in RSA_meth_set_pub_dec() argument 134 unsigned char *to, RSA *rsa, int padding) in RSA_meth_get_priv_enc() 141 unsigned char *to, RSA *rsa, in RSA_meth_set_priv_enc() argument 150 unsigned char *to, RSA *rsa, int padding) in RSA_meth_get_priv_dec() 157 unsigned char *to, RSA *rsa, in RSA_meth_set_priv_dec() argument 166 (BIGNUM *r0, const BIGNUM *i, RSA *rsa, BN_CTX *ctx) in RSA_meth_get_mod_exp() 172 int (*mod_exp) (BIGNUM *r0, const BIGNUM *i, RSA *rsa, in RSA_meth_set_mod_exp() argument [all …]
|
D | rsa_pmeth.c | 130 RSA *rsa = ctx->pkey->pkey.rsa; in pkey_rsa_sign() local 143 tbs, tbslen, sig, &sltmp, rsa); in pkey_rsa_sign() 160 sig, rsa, RSA_X931_PADDING); in pkey_rsa_sign() 164 tbs, tbslen, sig, &sltmp, rsa); in pkey_rsa_sign() 171 if (!RSA_padding_add_PKCS1_PSS_mgf1(rsa, in pkey_rsa_sign() 176 ret = RSA_private_encrypt(RSA_size(rsa), rctx->tbuf, in pkey_rsa_sign() 177 sig, rsa, RSA_NO_PADDING); in pkey_rsa_sign() 182 ret = RSA_private_encrypt(tbslen, tbs, sig, ctx->pkey->pkey.rsa, in pkey_rsa_sign() 203 rctx->tbuf, ctx->pkey->pkey.rsa, in pkey_rsa_verifyrecover() 224 sig, siglen, ctx->pkey->pkey.rsa); in pkey_rsa_verifyrecover() [all …]
|
D | rsa_local.h | 71 unsigned char *to, RSA *rsa, int padding); 73 unsigned char *to, RSA *rsa, int padding); 75 unsigned char *to, RSA *rsa, int padding); 77 unsigned char *to, RSA *rsa, int padding); 79 int (*rsa_mod_exp) (BIGNUM *r0, const BIGNUM *I, RSA *rsa, BN_CTX *ctx); 84 int (*init) (RSA *rsa); 86 int (*finish) (RSA *rsa); 100 const RSA *rsa); 103 unsigned int siglen, const RSA *rsa); 110 int (*rsa_keygen) (RSA *rsa, int bits, BIGNUM *e, BN_GENCB *cb); [all …]
|
D | rsa_sign.c | 70 unsigned char *sigret, unsigned int *siglen, RSA *rsa) in RSA_sign() argument 76 if (rsa->meth->rsa_sign) { in RSA_sign() 77 return rsa->meth->rsa_sign(type, m, m_len, sigret, siglen, rsa); in RSA_sign() 99 if (encoded_len > RSA_size(rsa) - RSA_PKCS1_PADDING_SIZE) { in RSA_sign() 103 encrypt_len = RSA_private_encrypt(encoded_len, encoded, sigret, rsa, in RSA_sign() 126 const unsigned char *sigbuf, size_t siglen, RSA *rsa) in int_rsa_verify() argument 131 if (siglen != (size_t)RSA_size(rsa)) { in int_rsa_verify() 143 decrypt_len = RSA_public_decrypt((int)siglen, sigbuf, decrypt_buf, rsa, in int_rsa_verify() 240 const unsigned char *sigbuf, unsigned int siglen, RSA *rsa) in RSA_verify() argument 243 if (rsa->meth->rsa_verify) { in RSA_verify() [all …]
|
D | rsa_ameth.c | 33 const RSA *rsa = pkey->pkey.rsa; in rsa_param_encode() local 42 if (rsa->pss == NULL) { in rsa_param_encode() 47 if (ASN1_item_pack(rsa->pss, ASN1_ITEM_rptr(RSA_PSS_PARAMS), pstr) == NULL) in rsa_param_encode() 54 static int rsa_param_decode(RSA *rsa, const X509_ALGOR *alg) in rsa_param_decode() argument 69 rsa->pss = rsa_pss_decode(alg); in rsa_param_decode() 70 if (rsa->pss == NULL) in rsa_param_decode() 84 penclen = i2d_RSAPublicKey(pkey->pkey.rsa, &penc); in rsa_pub_encode() 100 RSA *rsa = NULL; in rsa_pub_decode() local 104 if ((rsa = d2i_RSAPublicKey(NULL, &p, pklen)) == NULL) { in rsa_pub_decode() 108 if (!rsa_param_decode(rsa, alg)) { in rsa_pub_decode() [all …]
|
D | rsa_depr.c | 32 RSA *rsa = RSA_new(); 35 if (cb == NULL || rsa == NULL || e == NULL) 50 if (RSA_generate_key_ex(rsa, bits, e, cb)) { 53 return rsa; 57 RSA_free(rsa);
|
/third_party/mbedtls/library/ |
D | psa_crypto_rsa.c | 57 const mbedtls_rsa_context *rsa ) in psa_check_rsa_key_byte_aligned() argument 63 mbedtls_rsa_export( rsa, &n, NULL, NULL, NULL, NULL ) ); in psa_check_rsa_key_byte_aligned() 140 mbedtls_rsa_context *rsa = NULL; in mbedtls_psa_rsa_import_key() local 146 &rsa ); in mbedtls_psa_rsa_import_key() 150 *bits = (psa_key_bits_t) PSA_BYTES_TO_BITS( mbedtls_rsa_get_len( rsa ) ); in mbedtls_psa_rsa_import_key() 157 rsa, in mbedtls_psa_rsa_import_key() 163 mbedtls_rsa_free( rsa ); in mbedtls_psa_rsa_import_key() 164 mbedtls_free( rsa ); in mbedtls_psa_rsa_import_key() 170 mbedtls_rsa_context *rsa, in mbedtls_psa_rsa_export_key() argument 182 pk.pk_ctx = rsa; in mbedtls_psa_rsa_export_key() [all …]
|
/third_party/openssl/include/openssl/ |
D | rsa.h | 200 int RSA_bits(const RSA *rsa); 201 int RSA_size(const RSA *rsa); 202 int RSA_security_bits(const RSA *rsa); 240 int RSA_generate_key_ex(RSA *rsa, int bits, BIGNUM *e, BN_GENCB *cb); 242 int RSA_generate_multi_prime_key(RSA *rsa, int bits, int primes, 245 int RSA_X931_derive_ex(RSA *rsa, BIGNUM *p1, BIGNUM *p2, BIGNUM *q1, 249 int RSA_X931_generate_key_ex(RSA *rsa, int bits, const BIGNUM *e, 256 unsigned char *to, RSA *rsa, int padding); 258 unsigned char *to, RSA *rsa, int padding); 260 unsigned char *to, RSA *rsa, int padding); [all …]
|
/third_party/libwebsockets/lib/tls/openssl/ |
D | lws-genrsa.c | 45 rsa_pkey_wrap(struct lws_genrsa_ctx *ctx, RSA *rsa) in rsa_pkey_wrap() argument 57 if (EVP_PKEY_assign_RSA(pkey, rsa) != 1) { in rsa_pkey_wrap() 109 ctx->rsa = RSA_new(); in lws_genrsa_create() 110 if (!ctx->rsa) { in lws_genrsa_create() 116 if (RSA_set0_key(ctx->rsa, ctx->bn[LWS_GENCRYPTO_RSA_KEYEL_N], in lws_genrsa_create() 122 RSA_set0_factors(ctx->rsa, ctx->bn[LWS_GENCRYPTO_RSA_KEYEL_P], in lws_genrsa_create() 125 ctx->rsa->e = ctx->bn[LWS_GENCRYPTO_RSA_KEYEL_E]; in lws_genrsa_create() 126 ctx->rsa->n = ctx->bn[LWS_GENCRYPTO_RSA_KEYEL_N]; in lws_genrsa_create() 127 ctx->rsa->d = ctx->bn[LWS_GENCRYPTO_RSA_KEYEL_D]; in lws_genrsa_create() 128 ctx->rsa->p = ctx->bn[LWS_GENCRYPTO_RSA_KEYEL_P]; in lws_genrsa_create() [all …]
|
/third_party/typescript/src/testRunner/unittests/tsserver/ |
D | versionCache.ts | 185 let rsa: number[] = []; variable 214 rsa[j] = Math.floor(Math.random() * totalChars); 215 la[j] = Math.floor(Math.random() * (totalChars - rsa[j])); 237 rsa = undefined!; 251 const s2 = lineIndex.getText(rsa[i], la[i]); 252 const s1 = testContent.substring(rsa[i], rsa[i] + la[i]); 259 const s2 = lineIndex.getText(rsa[j], las[j]); 260 const s1 = testContent.substring(rsa[j], rsa[j] + las[j]); 267 … const insertString = testContent.substring(rsa[100000 - i], rsa[100000 - i] + las[100000 - i]); 268 const snapshot = lineIndex.edit(rsa[i], las[i], insertString); [all …]
|
/third_party/mbedtls/programs/pkey/ |
D | rsa_verify.c | 60 mbedtls_rsa_context rsa; in main() local 65 mbedtls_rsa_init( &rsa ); in main() 88 if( ( ret = mbedtls_mpi_read_file( &rsa.MBEDTLS_PRIVATE(N), 16, f ) ) != 0 || in main() 89 ( ret = mbedtls_mpi_read_file( &rsa.MBEDTLS_PRIVATE(E), 16, f ) ) != 0 ) in main() 96 rsa.MBEDTLS_PRIVATE(len) = ( mbedtls_mpi_bitlen( &rsa.MBEDTLS_PRIVATE(N) ) + 7 ) >> 3; in main() 118 if( i != rsa.MBEDTLS_PRIVATE(len) ) in main() 139 if( ( ret = mbedtls_rsa_pkcs1_verify( &rsa, MBEDTLS_MD_SHA256, in main() 152 mbedtls_rsa_free( &rsa ); in main()
|
D | rsa_sign.c | 60 mbedtls_rsa_context rsa; in main() local 66 mbedtls_rsa_init( &rsa ); in main() 108 if( ( ret = mbedtls_rsa_import( &rsa, &N, &P, &Q, &D, &E ) ) != 0 ) in main() 115 if( ( ret = mbedtls_rsa_complete( &rsa ) ) != 0 ) in main() 124 if( ( ret = mbedtls_rsa_check_privkey( &rsa ) ) != 0 ) in main() 145 if( ( ret = mbedtls_rsa_pkcs1_sign( &rsa, NULL, NULL, MBEDTLS_MD_SHA256, in main() 163 for( i = 0; i < rsa.MBEDTLS_PRIVATE(len); i++ ) in main() 175 mbedtls_rsa_free( &rsa ); in main()
|
/third_party/openssl/doc/man3/ |
D | RSA_meth_new.pod | 21 #include <openssl/rsa.h> 38 unsigned char *to, RSA *rsa, int padding); 39 int RSA_meth_set_pub_enc(RSA_METHOD *rsa, 41 unsigned char *to, RSA *rsa, 46 unsigned char *to, RSA *rsa, int padding); 47 int RSA_meth_set_pub_dec(RSA_METHOD *rsa, 49 unsigned char *to, RSA *rsa, 53 unsigned char *to, RSA *rsa, 55 int RSA_meth_set_priv_enc(RSA_METHOD *rsa, 57 unsigned char *to, RSA *rsa, int padding)); [all …]
|
D | RSA_public_encrypt.pod | 9 #include <openssl/rsa.h> 12 unsigned char *to, RSA *rsa, int padding); 15 unsigned char *to, RSA *rsa, int padding); 20 session key) using the public key B<rsa> and stores the ciphertext in 21 B<to>. B<to> must point to RSA_size(B<rsa>) bytes of memory. 51 B<flen> must not be more than RSA_size(B<rsa>) - 11 for the PKCS #1 v1.5 52 based padding modes, not more than RSA_size(B<rsa>) - 42 for 53 RSA_PKCS1_OAEP_PADDING and exactly RSA_size(B<rsa>) for RSA_NO_PADDING. 59 RSA_size(B<rsa>) bytes. 63 private key B<rsa> and stores the plaintext in B<to>. B<flen> should [all …]
|
D | RSA_size.pod | 9 #include <openssl/rsa.h> 11 int RSA_size(const RSA *rsa); 13 int RSA_bits(const RSA *rsa); 15 int RSA_security_bits(const RSA *rsa) 25 B<rsa> and B<rsa-E<gt>n> must not be B<NULL>. 27 RSA_security_bits() returns the number of security bits of the given B<rsa>
|
/third_party/openssl/apps/ |
D | rsa.c | 67 RSA *rsa = NULL; in rsa_main() local 186 rsa = EVP_PKEY_get1_RSA(pkey); in rsa_main() 190 if (rsa == NULL) { in rsa_main() 201 if (!RSA_print(out, rsa, 0)) { in rsa_main() 210 RSA_get0_key(rsa, &n, NULL, NULL); in rsa_main() 217 int r = RSA_check_key_ex(rsa, NULL); in rsa_main() 246 i = i2d_RSAPublicKey_bio(out, rsa); in rsa_main() 248 i = i2d_RSA_PUBKEY_bio(out, rsa); in rsa_main() 251 i = i2d_RSAPrivateKey_bio(out, rsa); in rsa_main() 256 i = PEM_write_bio_RSAPublicKey(out, rsa); in rsa_main() [all …]
|
/third_party/openssl/crypto/x509/ |
D | x_all.c | 200 RSA *d2i_RSAPrivateKey_fp(FILE *fp, RSA **rsa) in d2i_RSAPrivateKey_fp() argument 202 return ASN1_item_d2i_fp(ASN1_ITEM_rptr(RSAPrivateKey), fp, rsa); in d2i_RSAPrivateKey_fp() 205 int i2d_RSAPrivateKey_fp(FILE *fp, RSA *rsa) in i2d_RSAPrivateKey_fp() argument 207 return ASN1_item_i2d_fp(ASN1_ITEM_rptr(RSAPrivateKey), fp, rsa); in i2d_RSAPrivateKey_fp() 210 RSA *d2i_RSAPublicKey_fp(FILE *fp, RSA **rsa) in d2i_RSAPublicKey_fp() argument 212 return ASN1_item_d2i_fp(ASN1_ITEM_rptr(RSAPublicKey), fp, rsa); in d2i_RSAPublicKey_fp() 215 RSA *d2i_RSA_PUBKEY_fp(FILE *fp, RSA **rsa) in d2i_RSA_PUBKEY_fp() argument 219 (void **)rsa); in d2i_RSA_PUBKEY_fp() 222 int i2d_RSAPublicKey_fp(FILE *fp, RSA *rsa) in i2d_RSAPublicKey_fp() argument 224 return ASN1_item_i2d_fp(ASN1_ITEM_rptr(RSAPublicKey), fp, rsa); in i2d_RSAPublicKey_fp() [all …]
|
/third_party/grpc/src/core/tsi/test_creds/ |
D | README | 9 $ openssl req -x509 -newkey rsa:2048 -keyout badserver.key -out badserver.pem \ 22 $ openssl req -x509 -new -newkey rsa:2048 -nodes -keyout ca.key -out ca.pem \ 29 $ openssl genrsa -out client.key.rsa 2048 30 $ openssl pkcs8 -topk8 -in client.key.rsa -out client.key -nocrypt 42 $ openssl genrsa -out client1.key.rsa 2048 43 $ openssl pkcs8 -topk8 -in client1.key.rsa -out client1.key -nocrypt 55 $ openssl genrsa -out client2.key.rsa 2048 56 $ openssl pkcs8 -topk8 -in client2.key.rsa -out client2.key -nocrypt 68 $ openssl genrsa -out server0.key.rsa 2048 69 $ openssl pkcs8 -topk8 -in server0.key.rsa -out server0.key -nocrypt [all …]
|
/third_party/openssl/crypto/pem/ |
D | pem_all.c | 22 static RSA *pkey_get_rsa(EVP_PKEY *key, RSA **rsa); 47 static RSA *pkey_get_rsa(EVP_PKEY *key, RSA **rsa) in IMPLEMENT_PEM_rw() 56 if (rsa) { in IMPLEMENT_PEM_rw() 57 RSA_free(*rsa); in IMPLEMENT_PEM_rw() 58 *rsa = rtmp; in IMPLEMENT_PEM_rw() 63 RSA *PEM_read_bio_RSAPrivateKey(BIO *bp, RSA **rsa, pem_password_cb *cb, in PEM_read_bio_RSAPrivateKey() argument 68 return pkey_get_rsa(pktmp, rsa); in PEM_read_bio_RSAPrivateKey() 73 RSA *PEM_read_RSAPrivateKey(FILE *fp, RSA **rsa, pem_password_cb *cb, void *u) in PEM_read_RSAPrivateKey() argument 77 return pkey_get_rsa(pktmp, rsa); in PEM_read_RSAPrivateKey()
|
/third_party/pulseaudio/src/modules/raop/ |
D | raop-crypto.c | 81 RSA *rsa; in rsa_encrypt() local 89 rsa = RSA_new(); in rsa_encrypt() 90 if (!rsa) { in rsa_encrypt() 111 r = RSA_set0_key(rsa, n_bn, e_bn, NULL); in rsa_encrypt() 123 size = RSA_public_encrypt(len, data, str, rsa, RSA_PKCS1_OAEP_PADDING); in rsa_encrypt() 129 RSA_free(rsa); in rsa_encrypt() 139 if (rsa) in rsa_encrypt() 140 RSA_free(rsa); in rsa_encrypt()
|
/third_party/openssl/ssl/ |
D | ssl_rsa.c | 101 int SSL_use_RSAPrivateKey(SSL *ssl, RSA *rsa) in SSL_use_RSAPrivateKey() argument 106 if (rsa == NULL) { in SSL_use_RSAPrivateKey() 115 RSA_up_ref(rsa); in SSL_use_RSAPrivateKey() 116 if (EVP_PKEY_assign_RSA(pkey, rsa) <= 0) { in SSL_use_RSAPrivateKey() 117 RSA_free(rsa); in SSL_use_RSAPrivateKey() 170 RSA *rsa = NULL; in SSL_use_RSAPrivateKey_file() local 184 rsa = d2i_RSAPrivateKey_bio(in, NULL); in SSL_use_RSAPrivateKey_file() 187 rsa = PEM_read_bio_RSAPrivateKey(in, NULL, in SSL_use_RSAPrivateKey_file() 194 if (rsa == NULL) { in SSL_use_RSAPrivateKey_file() 198 ret = SSL_use_RSAPrivateKey(ssl, rsa); in SSL_use_RSAPrivateKey_file() [all …]
|