Home
last modified time | relevance | path

Searched refs:rsa (Results 1 – 25 of 222) sorted by relevance

123456789

/third_party/openssl/crypto/rsa/
Drsa_ossl.c16 unsigned char *to, RSA *rsa, int padding);
18 unsigned char *to, RSA *rsa, int padding);
20 unsigned char *to, RSA *rsa, int padding);
22 unsigned char *to, RSA *rsa, int padding);
23 static int rsa_ossl_mod_exp(BIGNUM *r0, const BIGNUM *i, RSA *rsa,
25 static int rsa_ossl_init(RSA *rsa);
26 static int rsa_ossl_finish(RSA *rsa);
69 unsigned char *to, RSA *rsa, int padding) in rsa_ossl_public_encrypt() argument
76 if (BN_num_bits(rsa->n) > OPENSSL_RSA_MAX_MODULUS_BITS) { in rsa_ossl_public_encrypt()
81 if (BN_ucmp(rsa->n, rsa->e) <= 0) { in rsa_ossl_public_encrypt()
[all …]
Drsa_gen.c22 static int rsa_builtin_keygen(RSA *rsa, int bits, int primes, BIGNUM *e_value,
32 int RSA_generate_key_ex(RSA *rsa, int bits, BIGNUM *e_value, BN_GENCB *cb) in RSA_generate_key_ex() argument
34 if (rsa->meth->rsa_keygen != NULL) in RSA_generate_key_ex()
35 return rsa->meth->rsa_keygen(rsa, bits, e_value, cb); in RSA_generate_key_ex()
37 return RSA_generate_multi_prime_key(rsa, bits, RSA_DEFAULT_PRIME_NUM, in RSA_generate_key_ex()
41 int RSA_generate_multi_prime_key(RSA *rsa, int bits, int primes, in RSA_generate_multi_prime_key() argument
45 if (rsa->meth->rsa_multi_prime_keygen != NULL) { in RSA_generate_multi_prime_key()
46 return rsa->meth->rsa_multi_prime_keygen(rsa, bits, primes, in RSA_generate_multi_prime_key()
48 } else if (rsa->meth->rsa_keygen != NULL) { in RSA_generate_multi_prime_key()
56 return rsa->meth->rsa_keygen(rsa, bits, e_value, cb); in RSA_generate_multi_prime_key()
[all …]
Drsa_x931g.c19 int RSA_X931_derive_ex(RSA *rsa, BIGNUM *p1, BIGNUM *p2, BIGNUM *q1, in RSA_X931_derive_ex() argument
28 if (!rsa) in RSA_X931_derive_ex()
43 if (!rsa->e) { in RSA_X931_derive_ex()
44 rsa->e = BN_dup(e); in RSA_X931_derive_ex()
45 if (!rsa->e) in RSA_X931_derive_ex()
48 e = rsa->e; in RSA_X931_derive_ex()
56 if (Xp && rsa->p == NULL) { in RSA_X931_derive_ex()
57 rsa->p = BN_new(); in RSA_X931_derive_ex()
58 if (rsa->p == NULL) in RSA_X931_derive_ex()
61 if (!BN_X931_derive_prime_ex(rsa->p, p1, p2, in RSA_X931_derive_ex()
[all …]
Drsa_crpt.c28 RSA *rsa, int padding) in RSA_public_encrypt() argument
30 return rsa->meth->rsa_pub_enc(flen, from, to, rsa, padding); in RSA_public_encrypt()
34 unsigned char *to, RSA *rsa, int padding) in RSA_private_encrypt() argument
36 return rsa->meth->rsa_priv_enc(flen, from, to, rsa, padding); in RSA_private_encrypt()
40 unsigned char *to, RSA *rsa, int padding) in RSA_private_decrypt() argument
42 return rsa->meth->rsa_priv_dec(flen, from, to, rsa, padding); in RSA_private_decrypt()
46 RSA *rsa, int padding) in RSA_public_decrypt() argument
48 return rsa->meth->rsa_pub_dec(flen, from, to, rsa, padding); in RSA_public_decrypt()
56 void RSA_blinding_off(RSA *rsa) in RSA_blinding_off() argument
58 BN_BLINDING_free(rsa->blinding); in RSA_blinding_off()
[all …]
Drsa_meth.c102 unsigned char *to, RSA *rsa, int padding) in RSA_meth_get_pub_enc()
109 unsigned char *to, RSA *rsa, in RSA_meth_set_pub_enc() argument
118 unsigned char *to, RSA *rsa, int padding) in RSA_meth_get_pub_dec()
125 unsigned char *to, RSA *rsa, in RSA_meth_set_pub_dec() argument
134 unsigned char *to, RSA *rsa, int padding) in RSA_meth_get_priv_enc()
141 unsigned char *to, RSA *rsa, in RSA_meth_set_priv_enc() argument
150 unsigned char *to, RSA *rsa, int padding) in RSA_meth_get_priv_dec()
157 unsigned char *to, RSA *rsa, in RSA_meth_set_priv_dec() argument
166 (BIGNUM *r0, const BIGNUM *i, RSA *rsa, BN_CTX *ctx) in RSA_meth_get_mod_exp()
172 int (*mod_exp) (BIGNUM *r0, const BIGNUM *i, RSA *rsa, in RSA_meth_set_mod_exp() argument
[all …]
Drsa_pmeth.c130 RSA *rsa = ctx->pkey->pkey.rsa; in pkey_rsa_sign() local
143 tbs, tbslen, sig, &sltmp, rsa); in pkey_rsa_sign()
160 sig, rsa, RSA_X931_PADDING); in pkey_rsa_sign()
164 tbs, tbslen, sig, &sltmp, rsa); in pkey_rsa_sign()
171 if (!RSA_padding_add_PKCS1_PSS_mgf1(rsa, in pkey_rsa_sign()
176 ret = RSA_private_encrypt(RSA_size(rsa), rctx->tbuf, in pkey_rsa_sign()
177 sig, rsa, RSA_NO_PADDING); in pkey_rsa_sign()
182 ret = RSA_private_encrypt(tbslen, tbs, sig, ctx->pkey->pkey.rsa, in pkey_rsa_sign()
203 rctx->tbuf, ctx->pkey->pkey.rsa, in pkey_rsa_verifyrecover()
224 sig, siglen, ctx->pkey->pkey.rsa); in pkey_rsa_verifyrecover()
[all …]
Drsa_local.h71 unsigned char *to, RSA *rsa, int padding);
73 unsigned char *to, RSA *rsa, int padding);
75 unsigned char *to, RSA *rsa, int padding);
77 unsigned char *to, RSA *rsa, int padding);
79 int (*rsa_mod_exp) (BIGNUM *r0, const BIGNUM *I, RSA *rsa, BN_CTX *ctx);
84 int (*init) (RSA *rsa);
86 int (*finish) (RSA *rsa);
100 const RSA *rsa);
103 unsigned int siglen, const RSA *rsa);
110 int (*rsa_keygen) (RSA *rsa, int bits, BIGNUM *e, BN_GENCB *cb);
[all …]
Drsa_sign.c70 unsigned char *sigret, unsigned int *siglen, RSA *rsa) in RSA_sign() argument
76 if (rsa->meth->rsa_sign) { in RSA_sign()
77 return rsa->meth->rsa_sign(type, m, m_len, sigret, siglen, rsa); in RSA_sign()
99 if (encoded_len > RSA_size(rsa) - RSA_PKCS1_PADDING_SIZE) { in RSA_sign()
103 encrypt_len = RSA_private_encrypt(encoded_len, encoded, sigret, rsa, in RSA_sign()
126 const unsigned char *sigbuf, size_t siglen, RSA *rsa) in int_rsa_verify() argument
131 if (siglen != (size_t)RSA_size(rsa)) { in int_rsa_verify()
143 decrypt_len = RSA_public_decrypt((int)siglen, sigbuf, decrypt_buf, rsa, in int_rsa_verify()
240 const unsigned char *sigbuf, unsigned int siglen, RSA *rsa) in RSA_verify() argument
243 if (rsa->meth->rsa_verify) { in RSA_verify()
[all …]
Drsa_ameth.c33 const RSA *rsa = pkey->pkey.rsa; in rsa_param_encode() local
42 if (rsa->pss == NULL) { in rsa_param_encode()
47 if (ASN1_item_pack(rsa->pss, ASN1_ITEM_rptr(RSA_PSS_PARAMS), pstr) == NULL) in rsa_param_encode()
54 static int rsa_param_decode(RSA *rsa, const X509_ALGOR *alg) in rsa_param_decode() argument
69 rsa->pss = rsa_pss_decode(alg); in rsa_param_decode()
70 if (rsa->pss == NULL) in rsa_param_decode()
84 penclen = i2d_RSAPublicKey(pkey->pkey.rsa, &penc); in rsa_pub_encode()
100 RSA *rsa = NULL; in rsa_pub_decode() local
104 if ((rsa = d2i_RSAPublicKey(NULL, &p, pklen)) == NULL) { in rsa_pub_decode()
108 if (!rsa_param_decode(rsa, alg)) { in rsa_pub_decode()
[all …]
Drsa_depr.c32 RSA *rsa = RSA_new();
35 if (cb == NULL || rsa == NULL || e == NULL)
50 if (RSA_generate_key_ex(rsa, bits, e, cb)) {
53 return rsa;
57 RSA_free(rsa);
/third_party/mbedtls/library/
Dpsa_crypto_rsa.c57 const mbedtls_rsa_context *rsa ) in psa_check_rsa_key_byte_aligned() argument
63 mbedtls_rsa_export( rsa, &n, NULL, NULL, NULL, NULL ) ); in psa_check_rsa_key_byte_aligned()
140 mbedtls_rsa_context *rsa = NULL; in mbedtls_psa_rsa_import_key() local
146 &rsa ); in mbedtls_psa_rsa_import_key()
150 *bits = (psa_key_bits_t) PSA_BYTES_TO_BITS( mbedtls_rsa_get_len( rsa ) ); in mbedtls_psa_rsa_import_key()
157 rsa, in mbedtls_psa_rsa_import_key()
163 mbedtls_rsa_free( rsa ); in mbedtls_psa_rsa_import_key()
164 mbedtls_free( rsa ); in mbedtls_psa_rsa_import_key()
170 mbedtls_rsa_context *rsa, in mbedtls_psa_rsa_export_key() argument
182 pk.pk_ctx = rsa; in mbedtls_psa_rsa_export_key()
[all …]
/third_party/openssl/include/openssl/
Drsa.h200 int RSA_bits(const RSA *rsa);
201 int RSA_size(const RSA *rsa);
202 int RSA_security_bits(const RSA *rsa);
240 int RSA_generate_key_ex(RSA *rsa, int bits, BIGNUM *e, BN_GENCB *cb);
242 int RSA_generate_multi_prime_key(RSA *rsa, int bits, int primes,
245 int RSA_X931_derive_ex(RSA *rsa, BIGNUM *p1, BIGNUM *p2, BIGNUM *q1,
249 int RSA_X931_generate_key_ex(RSA *rsa, int bits, const BIGNUM *e,
256 unsigned char *to, RSA *rsa, int padding);
258 unsigned char *to, RSA *rsa, int padding);
260 unsigned char *to, RSA *rsa, int padding);
[all …]
/third_party/libwebsockets/lib/tls/openssl/
Dlws-genrsa.c45 rsa_pkey_wrap(struct lws_genrsa_ctx *ctx, RSA *rsa) in rsa_pkey_wrap() argument
57 if (EVP_PKEY_assign_RSA(pkey, rsa) != 1) { in rsa_pkey_wrap()
109 ctx->rsa = RSA_new(); in lws_genrsa_create()
110 if (!ctx->rsa) { in lws_genrsa_create()
116 if (RSA_set0_key(ctx->rsa, ctx->bn[LWS_GENCRYPTO_RSA_KEYEL_N], in lws_genrsa_create()
122 RSA_set0_factors(ctx->rsa, ctx->bn[LWS_GENCRYPTO_RSA_KEYEL_P], in lws_genrsa_create()
125 ctx->rsa->e = ctx->bn[LWS_GENCRYPTO_RSA_KEYEL_E]; in lws_genrsa_create()
126 ctx->rsa->n = ctx->bn[LWS_GENCRYPTO_RSA_KEYEL_N]; in lws_genrsa_create()
127 ctx->rsa->d = ctx->bn[LWS_GENCRYPTO_RSA_KEYEL_D]; in lws_genrsa_create()
128 ctx->rsa->p = ctx->bn[LWS_GENCRYPTO_RSA_KEYEL_P]; in lws_genrsa_create()
[all …]
/third_party/typescript/src/testRunner/unittests/tsserver/
DversionCache.ts185 let rsa: number[] = []; variable
214 rsa[j] = Math.floor(Math.random() * totalChars);
215 la[j] = Math.floor(Math.random() * (totalChars - rsa[j]));
237 rsa = undefined!;
251 const s2 = lineIndex.getText(rsa[i], la[i]);
252 const s1 = testContent.substring(rsa[i], rsa[i] + la[i]);
259 const s2 = lineIndex.getText(rsa[j], las[j]);
260 const s1 = testContent.substring(rsa[j], rsa[j] + las[j]);
267 … const insertString = testContent.substring(rsa[100000 - i], rsa[100000 - i] + las[100000 - i]);
268 const snapshot = lineIndex.edit(rsa[i], las[i], insertString);
[all …]
/third_party/mbedtls/programs/pkey/
Drsa_verify.c60 mbedtls_rsa_context rsa; in main() local
65 mbedtls_rsa_init( &rsa ); in main()
88 if( ( ret = mbedtls_mpi_read_file( &rsa.MBEDTLS_PRIVATE(N), 16, f ) ) != 0 || in main()
89 ( ret = mbedtls_mpi_read_file( &rsa.MBEDTLS_PRIVATE(E), 16, f ) ) != 0 ) in main()
96 rsa.MBEDTLS_PRIVATE(len) = ( mbedtls_mpi_bitlen( &rsa.MBEDTLS_PRIVATE(N) ) + 7 ) >> 3; in main()
118 if( i != rsa.MBEDTLS_PRIVATE(len) ) in main()
139 if( ( ret = mbedtls_rsa_pkcs1_verify( &rsa, MBEDTLS_MD_SHA256, in main()
152 mbedtls_rsa_free( &rsa ); in main()
Drsa_sign.c60 mbedtls_rsa_context rsa; in main() local
66 mbedtls_rsa_init( &rsa ); in main()
108 if( ( ret = mbedtls_rsa_import( &rsa, &N, &P, &Q, &D, &E ) ) != 0 ) in main()
115 if( ( ret = mbedtls_rsa_complete( &rsa ) ) != 0 ) in main()
124 if( ( ret = mbedtls_rsa_check_privkey( &rsa ) ) != 0 ) in main()
145 if( ( ret = mbedtls_rsa_pkcs1_sign( &rsa, NULL, NULL, MBEDTLS_MD_SHA256, in main()
163 for( i = 0; i < rsa.MBEDTLS_PRIVATE(len); i++ ) in main()
175 mbedtls_rsa_free( &rsa ); in main()
/third_party/openssl/doc/man3/
DRSA_meth_new.pod21 #include <openssl/rsa.h>
38 unsigned char *to, RSA *rsa, int padding);
39 int RSA_meth_set_pub_enc(RSA_METHOD *rsa,
41 unsigned char *to, RSA *rsa,
46 unsigned char *to, RSA *rsa, int padding);
47 int RSA_meth_set_pub_dec(RSA_METHOD *rsa,
49 unsigned char *to, RSA *rsa,
53 unsigned char *to, RSA *rsa,
55 int RSA_meth_set_priv_enc(RSA_METHOD *rsa,
57 unsigned char *to, RSA *rsa, int padding));
[all …]
DRSA_public_encrypt.pod9 #include <openssl/rsa.h>
12 unsigned char *to, RSA *rsa, int padding);
15 unsigned char *to, RSA *rsa, int padding);
20 session key) using the public key B<rsa> and stores the ciphertext in
21 B<to>. B<to> must point to RSA_size(B<rsa>) bytes of memory.
51 B<flen> must not be more than RSA_size(B<rsa>) - 11 for the PKCS #1 v1.5
52 based padding modes, not more than RSA_size(B<rsa>) - 42 for
53 RSA_PKCS1_OAEP_PADDING and exactly RSA_size(B<rsa>) for RSA_NO_PADDING.
59 RSA_size(B<rsa>) bytes.
63 private key B<rsa> and stores the plaintext in B<to>. B<flen> should
[all …]
DRSA_size.pod9 #include <openssl/rsa.h>
11 int RSA_size(const RSA *rsa);
13 int RSA_bits(const RSA *rsa);
15 int RSA_security_bits(const RSA *rsa)
25 B<rsa> and B<rsa-E<gt>n> must not be B<NULL>.
27 RSA_security_bits() returns the number of security bits of the given B<rsa>
/third_party/openssl/apps/
Drsa.c67 RSA *rsa = NULL; in rsa_main() local
186 rsa = EVP_PKEY_get1_RSA(pkey); in rsa_main()
190 if (rsa == NULL) { in rsa_main()
201 if (!RSA_print(out, rsa, 0)) { in rsa_main()
210 RSA_get0_key(rsa, &n, NULL, NULL); in rsa_main()
217 int r = RSA_check_key_ex(rsa, NULL); in rsa_main()
246 i = i2d_RSAPublicKey_bio(out, rsa); in rsa_main()
248 i = i2d_RSA_PUBKEY_bio(out, rsa); in rsa_main()
251 i = i2d_RSAPrivateKey_bio(out, rsa); in rsa_main()
256 i = PEM_write_bio_RSAPublicKey(out, rsa); in rsa_main()
[all …]
/third_party/openssl/crypto/x509/
Dx_all.c200 RSA *d2i_RSAPrivateKey_fp(FILE *fp, RSA **rsa) in d2i_RSAPrivateKey_fp() argument
202 return ASN1_item_d2i_fp(ASN1_ITEM_rptr(RSAPrivateKey), fp, rsa); in d2i_RSAPrivateKey_fp()
205 int i2d_RSAPrivateKey_fp(FILE *fp, RSA *rsa) in i2d_RSAPrivateKey_fp() argument
207 return ASN1_item_i2d_fp(ASN1_ITEM_rptr(RSAPrivateKey), fp, rsa); in i2d_RSAPrivateKey_fp()
210 RSA *d2i_RSAPublicKey_fp(FILE *fp, RSA **rsa) in d2i_RSAPublicKey_fp() argument
212 return ASN1_item_d2i_fp(ASN1_ITEM_rptr(RSAPublicKey), fp, rsa); in d2i_RSAPublicKey_fp()
215 RSA *d2i_RSA_PUBKEY_fp(FILE *fp, RSA **rsa) in d2i_RSA_PUBKEY_fp() argument
219 (void **)rsa); in d2i_RSA_PUBKEY_fp()
222 int i2d_RSAPublicKey_fp(FILE *fp, RSA *rsa) in i2d_RSAPublicKey_fp() argument
224 return ASN1_item_i2d_fp(ASN1_ITEM_rptr(RSAPublicKey), fp, rsa); in i2d_RSAPublicKey_fp()
[all …]
/third_party/grpc/src/core/tsi/test_creds/
DREADME9 $ openssl req -x509 -newkey rsa:2048 -keyout badserver.key -out badserver.pem \
22 $ openssl req -x509 -new -newkey rsa:2048 -nodes -keyout ca.key -out ca.pem \
29 $ openssl genrsa -out client.key.rsa 2048
30 $ openssl pkcs8 -topk8 -in client.key.rsa -out client.key -nocrypt
42 $ openssl genrsa -out client1.key.rsa 2048
43 $ openssl pkcs8 -topk8 -in client1.key.rsa -out client1.key -nocrypt
55 $ openssl genrsa -out client2.key.rsa 2048
56 $ openssl pkcs8 -topk8 -in client2.key.rsa -out client2.key -nocrypt
68 $ openssl genrsa -out server0.key.rsa 2048
69 $ openssl pkcs8 -topk8 -in server0.key.rsa -out server0.key -nocrypt
[all …]
/third_party/openssl/crypto/pem/
Dpem_all.c22 static RSA *pkey_get_rsa(EVP_PKEY *key, RSA **rsa);
47 static RSA *pkey_get_rsa(EVP_PKEY *key, RSA **rsa) in IMPLEMENT_PEM_rw()
56 if (rsa) { in IMPLEMENT_PEM_rw()
57 RSA_free(*rsa); in IMPLEMENT_PEM_rw()
58 *rsa = rtmp; in IMPLEMENT_PEM_rw()
63 RSA *PEM_read_bio_RSAPrivateKey(BIO *bp, RSA **rsa, pem_password_cb *cb, in PEM_read_bio_RSAPrivateKey() argument
68 return pkey_get_rsa(pktmp, rsa); in PEM_read_bio_RSAPrivateKey()
73 RSA *PEM_read_RSAPrivateKey(FILE *fp, RSA **rsa, pem_password_cb *cb, void *u) in PEM_read_RSAPrivateKey() argument
77 return pkey_get_rsa(pktmp, rsa); in PEM_read_RSAPrivateKey()
/third_party/pulseaudio/src/modules/raop/
Draop-crypto.c81 RSA *rsa; in rsa_encrypt() local
89 rsa = RSA_new(); in rsa_encrypt()
90 if (!rsa) { in rsa_encrypt()
111 r = RSA_set0_key(rsa, n_bn, e_bn, NULL); in rsa_encrypt()
123 size = RSA_public_encrypt(len, data, str, rsa, RSA_PKCS1_OAEP_PADDING); in rsa_encrypt()
129 RSA_free(rsa); in rsa_encrypt()
139 if (rsa) in rsa_encrypt()
140 RSA_free(rsa); in rsa_encrypt()
/third_party/openssl/ssl/
Dssl_rsa.c101 int SSL_use_RSAPrivateKey(SSL *ssl, RSA *rsa) in SSL_use_RSAPrivateKey() argument
106 if (rsa == NULL) { in SSL_use_RSAPrivateKey()
115 RSA_up_ref(rsa); in SSL_use_RSAPrivateKey()
116 if (EVP_PKEY_assign_RSA(pkey, rsa) <= 0) { in SSL_use_RSAPrivateKey()
117 RSA_free(rsa); in SSL_use_RSAPrivateKey()
170 RSA *rsa = NULL; in SSL_use_RSAPrivateKey_file() local
184 rsa = d2i_RSAPrivateKey_bio(in, NULL); in SSL_use_RSAPrivateKey_file()
187 rsa = PEM_read_bio_RSAPrivateKey(in, NULL, in SSL_use_RSAPrivateKey_file()
194 if (rsa == NULL) { in SSL_use_RSAPrivateKey_file()
198 ret = SSL_use_RSAPrivateKey(ssl, rsa); in SSL_use_RSAPrivateKey_file()
[all …]

123456789