Home
last modified time | relevance | path

Searched refs:RSA (Results 1 – 25 of 480) sorted by relevance

12345678910>>...20

/external/boringssl/src/crypto/err/
Drsa.errordata1 RSA,100,BAD_ENCODING
2 RSA,101,BAD_E_VALUE
3 RSA,102,BAD_FIXED_HEADER_DECRYPT
4 RSA,103,BAD_PAD_BYTE_COUNT
5 RSA,104,BAD_RSA_PARAMETERS
6 RSA,105,BAD_SIGNATURE
7 RSA,106,BAD_VERSION
8 RSA,107,BLOCK_TYPE_IS_NOT_01
9 RSA,148,BLOCK_TYPE_IS_NOT_02
10 RSA,108,BN_NOT_INITIALIZED
[all …]
/external/rust/crates/quiche/deps/boringssl/src/include/openssl/
Drsa.h83 OPENSSL_EXPORT RSA *RSA_new(void);
86 OPENSSL_EXPORT RSA *RSA_new_method(const ENGINE *engine);
90 OPENSSL_EXPORT void RSA_free(RSA *rsa);
94 OPENSSL_EXPORT int RSA_up_ref(RSA *rsa);
100 OPENSSL_EXPORT unsigned RSA_bits(const RSA *rsa);
103 OPENSSL_EXPORT const BIGNUM *RSA_get0_n(const RSA *rsa);
106 OPENSSL_EXPORT const BIGNUM *RSA_get0_e(const RSA *rsa);
110 OPENSSL_EXPORT const BIGNUM *RSA_get0_d(const RSA *rsa);
114 OPENSSL_EXPORT const BIGNUM *RSA_get0_p(const RSA *rsa);
118 OPENSSL_EXPORT const BIGNUM *RSA_get0_q(const RSA *rsa);
[all …]
/external/boringssl/src/include/openssl/
Drsa.h83 OPENSSL_EXPORT RSA *RSA_new(void);
86 OPENSSL_EXPORT RSA *RSA_new_method(const ENGINE *engine);
90 OPENSSL_EXPORT void RSA_free(RSA *rsa);
94 OPENSSL_EXPORT int RSA_up_ref(RSA *rsa);
100 OPENSSL_EXPORT unsigned RSA_bits(const RSA *rsa);
103 OPENSSL_EXPORT const BIGNUM *RSA_get0_n(const RSA *rsa);
106 OPENSSL_EXPORT const BIGNUM *RSA_get0_e(const RSA *rsa);
110 OPENSSL_EXPORT const BIGNUM *RSA_get0_d(const RSA *rsa);
114 OPENSSL_EXPORT const BIGNUM *RSA_get0_p(const RSA *rsa);
118 OPENSSL_EXPORT const BIGNUM *RSA_get0_q(const RSA *rsa);
[all …]
/external/boringssl/src/crypto/evp/
Devp_tests.txt5 # RSA 2048 bit key.
6 PrivateKey = RSA-2048
7 Type = RSA
13 PublicKey = RSA-2048-SPKI
14 Type = RSA
19 # The same key but with a negative RSA modulus.
20 PublicKey = RSA-2048-SPKI-Negative
25 PublicKey = RSA-2048-SPKI-Invalid
30 PublicKey = RSA-2048-SPKI-Invalid2
34 # RSA 512 bit key.
[all …]
/external/boringssl/src/crypto/rsa_extra/
Drsa_asn1.c84 OPENSSL_PUT_ERROR(RSA, RSA_R_VALUE_MISSING); in marshal_integer()
90 RSA *RSA_parse_public_key(CBS *cbs) { in RSA_parse_public_key()
91 RSA *ret = RSA_new(); in RSA_parse_public_key()
100 OPENSSL_PUT_ERROR(RSA, RSA_R_BAD_ENCODING); in RSA_parse_public_key()
107 OPENSSL_PUT_ERROR(RSA, RSA_R_BAD_RSA_PARAMETERS); in RSA_parse_public_key()
115 RSA *RSA_public_key_from_bytes(const uint8_t *in, size_t in_len) { in RSA_public_key_from_bytes()
118 RSA *ret = RSA_parse_public_key(&cbs); in RSA_public_key_from_bytes()
120 OPENSSL_PUT_ERROR(RSA, RSA_R_BAD_ENCODING); in RSA_public_key_from_bytes()
127 int RSA_marshal_public_key(CBB *cbb, const RSA *rsa) { in RSA_marshal_public_key()
133 OPENSSL_PUT_ERROR(RSA, RSA_R_ENCODE_ERROR); in RSA_marshal_public_key()
[all …]
/external/rust/crates/quiche/deps/boringssl/src/crypto/rsa_extra/
Drsa_asn1.c84 OPENSSL_PUT_ERROR(RSA, RSA_R_VALUE_MISSING); in marshal_integer()
90 RSA *RSA_parse_public_key(CBS *cbs) { in RSA_parse_public_key()
91 RSA *ret = RSA_new(); in RSA_parse_public_key()
100 OPENSSL_PUT_ERROR(RSA, RSA_R_BAD_ENCODING); in RSA_parse_public_key()
107 OPENSSL_PUT_ERROR(RSA, RSA_R_BAD_RSA_PARAMETERS); in RSA_parse_public_key()
115 RSA *RSA_public_key_from_bytes(const uint8_t *in, size_t in_len) { in RSA_public_key_from_bytes()
118 RSA *ret = RSA_parse_public_key(&cbs); in RSA_public_key_from_bytes()
120 OPENSSL_PUT_ERROR(RSA, RSA_R_BAD_ENCODING); in RSA_public_key_from_bytes()
127 int RSA_marshal_public_key(CBB *cbb, const RSA *rsa) { in RSA_marshal_public_key()
133 OPENSSL_PUT_ERROR(RSA, RSA_R_ENCODE_ERROR); in RSA_marshal_public_key()
[all …]
/external/boringssl/src/crypto/fipsmodule/rsa/
Drsa.c81 OPENSSL_DECLARE_ERROR_REASON(RSA, BLOCK_TYPE_IS_NOT_02) in OPENSSL_DECLARE_ERROR_REASON() argument
85 RSA *RSA_new(void) { return RSA_new_method(NULL); } in OPENSSL_DECLARE_ERROR_REASON()
87 RSA *RSA_new_method(const ENGINE *engine) { in RSA_new_method()
88 RSA *rsa = OPENSSL_malloc(sizeof(RSA)); in RSA_new_method()
90 OPENSSL_PUT_ERROR(RSA, ERR_R_MALLOC_FAILURE); in RSA_new_method()
94 OPENSSL_memset(rsa, 0, sizeof(RSA)); in RSA_new_method()
121 void RSA_free(RSA *rsa) { in RSA_free()
163 int RSA_up_ref(RSA *rsa) { in RSA_up_ref()
168 unsigned RSA_bits(const RSA *rsa) { return BN_num_bits(rsa->n); } in RSA_bits()
170 const BIGNUM *RSA_get0_n(const RSA *rsa) { return rsa->n; } in RSA_get0_n()
[all …]
Dpadding.c79 OPENSSL_PUT_ERROR(RSA, RSA_R_KEY_SIZE_TOO_SMALL); in RSA_padding_add_PKCS1_type_1()
84 OPENSSL_PUT_ERROR(RSA, RSA_R_DIGEST_TOO_BIG_FOR_RSA_KEY); in RSA_padding_add_PKCS1_type_1()
102 OPENSSL_PUT_ERROR(RSA, RSA_R_DATA_TOO_SMALL); in RSA_padding_check_PKCS1_type_1()
108 OPENSSL_PUT_ERROR(RSA, RSA_R_BLOCK_TYPE_IS_NOT_01); in RSA_padding_check_PKCS1_type_1()
120 OPENSSL_PUT_ERROR(RSA, RSA_R_BAD_FIXED_HEADER_DECRYPT); in RSA_padding_check_PKCS1_type_1()
126 OPENSSL_PUT_ERROR(RSA, RSA_R_NULL_BEFORE_BLOCK_MISSING); in RSA_padding_check_PKCS1_type_1()
131 OPENSSL_PUT_ERROR(RSA, RSA_R_BAD_PAD_BYTE_COUNT); in RSA_padding_check_PKCS1_type_1()
139 OPENSSL_PUT_ERROR(RSA, RSA_R_DATA_TOO_LARGE); in RSA_padding_check_PKCS1_type_1()
168 OPENSSL_PUT_ERROR(RSA, RSA_R_KEY_SIZE_TOO_SMALL); in RSA_padding_add_PKCS1_type_2()
173 OPENSSL_PUT_ERROR(RSA, RSA_R_DATA_TOO_LARGE_FOR_KEY_SIZE); in RSA_padding_add_PKCS1_type_2()
[all …]
Drsa_impl.c76 int rsa_check_public_key(const RSA *rsa) { in rsa_check_public_key()
78 OPENSSL_PUT_ERROR(RSA, RSA_R_VALUE_MISSING); in rsa_check_public_key()
85 OPENSSL_PUT_ERROR(RSA, RSA_R_MODULUS_TOO_LARGE); in rsa_check_public_key()
101 OPENSSL_PUT_ERROR(RSA, RSA_R_BAD_E_VALUE); in rsa_check_public_key()
110 OPENSSL_PUT_ERROR(RSA, RSA_R_KEY_SIZE_TOO_SMALL); in rsa_check_public_key()
138 static int freeze_private_key(RSA *rsa, BN_CTX *ctx) { in freeze_private_key()
255 size_t rsa_default_size(const RSA *rsa) { in rsa_default_size()
259 int RSA_encrypt(RSA *rsa, size_t *out_len, uint8_t *out, size_t max_out, in RSA_encrypt()
272 OPENSSL_PUT_ERROR(RSA, RSA_R_OUTPUT_BUFFER_TOO_SMALL); in RSA_encrypt()
286 OPENSSL_PUT_ERROR(RSA, ERR_R_MALLOC_FAILURE); in RSA_encrypt()
[all …]
Dinternal.h74 size_t rsa_default_size(const RSA *rsa);
75 int rsa_default_sign_raw(RSA *rsa, size_t *out_len, uint8_t *out,
78 int rsa_default_decrypt(RSA *rsa, size_t *out_len, uint8_t *out, size_t max_out,
80 int rsa_default_private_transform(RSA *rsa, uint8_t *out, const uint8_t *in,
113 int rsa_check_public_key(const RSA *rsa);
118 int RSA_private_transform(RSA *rsa, uint8_t *out, const uint8_t *in,
/external/rust/crates/quiche/deps/boringssl/src/crypto/fipsmodule/rsa/
Drsa.c81 OPENSSL_DECLARE_ERROR_REASON(RSA, BLOCK_TYPE_IS_NOT_02) in OPENSSL_DECLARE_ERROR_REASON() argument
85 RSA *RSA_new(void) { return RSA_new_method(NULL); } in OPENSSL_DECLARE_ERROR_REASON()
87 RSA *RSA_new_method(const ENGINE *engine) { in RSA_new_method()
88 RSA *rsa = OPENSSL_malloc(sizeof(RSA)); in RSA_new_method()
90 OPENSSL_PUT_ERROR(RSA, ERR_R_MALLOC_FAILURE); in RSA_new_method()
94 OPENSSL_memset(rsa, 0, sizeof(RSA)); in RSA_new_method()
121 void RSA_free(RSA *rsa) { in RSA_free()
163 int RSA_up_ref(RSA *rsa) { in RSA_up_ref()
168 unsigned RSA_bits(const RSA *rsa) { return BN_num_bits(rsa->n); } in RSA_bits()
170 const BIGNUM *RSA_get0_n(const RSA *rsa) { return rsa->n; } in RSA_get0_n()
[all …]
Dpadding.c79 OPENSSL_PUT_ERROR(RSA, RSA_R_KEY_SIZE_TOO_SMALL); in RSA_padding_add_PKCS1_type_1()
84 OPENSSL_PUT_ERROR(RSA, RSA_R_DIGEST_TOO_BIG_FOR_RSA_KEY); in RSA_padding_add_PKCS1_type_1()
102 OPENSSL_PUT_ERROR(RSA, RSA_R_DATA_TOO_SMALL); in RSA_padding_check_PKCS1_type_1()
108 OPENSSL_PUT_ERROR(RSA, RSA_R_BLOCK_TYPE_IS_NOT_01); in RSA_padding_check_PKCS1_type_1()
120 OPENSSL_PUT_ERROR(RSA, RSA_R_BAD_FIXED_HEADER_DECRYPT); in RSA_padding_check_PKCS1_type_1()
126 OPENSSL_PUT_ERROR(RSA, RSA_R_NULL_BEFORE_BLOCK_MISSING); in RSA_padding_check_PKCS1_type_1()
131 OPENSSL_PUT_ERROR(RSA, RSA_R_BAD_PAD_BYTE_COUNT); in RSA_padding_check_PKCS1_type_1()
139 OPENSSL_PUT_ERROR(RSA, RSA_R_DATA_TOO_LARGE); in RSA_padding_check_PKCS1_type_1()
168 OPENSSL_PUT_ERROR(RSA, RSA_R_KEY_SIZE_TOO_SMALL); in RSA_padding_add_PKCS1_type_2()
173 OPENSSL_PUT_ERROR(RSA, RSA_R_DATA_TOO_LARGE_FOR_KEY_SIZE); in RSA_padding_add_PKCS1_type_2()
[all …]
Drsa_impl.c76 static int check_modulus_and_exponent_sizes(const RSA *rsa) { in check_modulus_and_exponent_sizes()
80 OPENSSL_PUT_ERROR(RSA, RSA_R_MODULUS_TOO_LARGE); in check_modulus_and_exponent_sizes()
96 OPENSSL_PUT_ERROR(RSA, RSA_R_BAD_E_VALUE); in check_modulus_and_exponent_sizes()
105 OPENSSL_PUT_ERROR(RSA, RSA_R_KEY_SIZE_TOO_SMALL); in check_modulus_and_exponent_sizes()
133 static int freeze_private_key(RSA *rsa, BN_CTX *ctx) { in freeze_private_key()
250 size_t rsa_default_size(const RSA *rsa) { in rsa_default_size()
254 int RSA_encrypt(RSA *rsa, size_t *out_len, uint8_t *out, size_t max_out, in RSA_encrypt()
257 OPENSSL_PUT_ERROR(RSA, RSA_R_VALUE_MISSING); in RSA_encrypt()
268 OPENSSL_PUT_ERROR(RSA, RSA_R_OUTPUT_BUFFER_TOO_SMALL); in RSA_encrypt()
286 OPENSSL_PUT_ERROR(RSA, ERR_R_MALLOC_FAILURE); in RSA_encrypt()
[all …]
Dinternal.h74 size_t rsa_default_size(const RSA *rsa);
75 int rsa_default_sign_raw(RSA *rsa, size_t *out_len, uint8_t *out,
78 int rsa_default_decrypt(RSA *rsa, size_t *out_len, uint8_t *out, size_t max_out,
80 int rsa_default_private_transform(RSA *rsa, uint8_t *out, const uint8_t *in,
114 int RSA_private_transform(RSA *rsa, uint8_t *out, const uint8_t *in,
/external/curl/docs/
DCIPHERS.md34 `DH-RSA-DES-CBC3-SHA`
36 `DHE-RSA-DES-CBC3-SHA`
49 `DHE-RSA-DES-CBC3-SHA`
59 `DH-RSA-AES128-SHA`
60 `DH-RSA-AES256-SHA`
63 `DHE-RSA-AES128-SHA`
64 `DHE-RSA-AES256-SHA`
72 `DH-RSA-SEED-SHA`
74 `DHE-RSA-SEED-SHA`
86 `ECDHE-RSA-NULL-SHA`
[all …]
/external/rust/crates/quiche/deps/boringssl/src/crypto/pem/
Dpem_all.c120 static RSA *pkey_get_rsa(EVP_PKEY *key, RSA **rsa);
136 static RSA *pkey_get_rsa(EVP_PKEY *key, RSA **rsa) in IMPLEMENT_PEM_rw()
138 RSA *rtmp; in IMPLEMENT_PEM_rw()
152 RSA *PEM_read_bio_RSAPrivateKey(BIO *bp, RSA **rsa, pem_password_cb *cb, in PEM_read_bio_RSAPrivateKey()
162 RSA *PEM_read_RSAPrivateKey(FILE *fp, RSA **rsa, pem_password_cb *cb, void *u) in PEM_read_RSAPrivateKey()
171 IMPLEMENT_PEM_write_cb_const(RSAPrivateKey, RSA, PEM_STRING_RSA, in IMPLEMENT_PEM_write_cb_const() argument
175 IMPLEMENT_PEM_rw_const(RSAPublicKey, RSA, PEM_STRING_RSA_PUBLIC, in IMPLEMENT_PEM_write_cb_const()
176 RSAPublicKey) IMPLEMENT_PEM_rw(RSA_PUBKEY, RSA, in IMPLEMENT_PEM_write_cb_const()
/external/boringssl/src/crypto/pem/
Dpem_all.c120 static RSA *pkey_get_rsa(EVP_PKEY *key, RSA **rsa);
136 static RSA *pkey_get_rsa(EVP_PKEY *key, RSA **rsa) in IMPLEMENT_PEM_rw()
138 RSA *rtmp; in IMPLEMENT_PEM_rw()
152 RSA *PEM_read_bio_RSAPrivateKey(BIO *bp, RSA **rsa, pem_password_cb *cb, in PEM_read_bio_RSAPrivateKey()
162 RSA *PEM_read_RSAPrivateKey(FILE *fp, RSA **rsa, pem_password_cb *cb, void *u) in PEM_read_RSAPrivateKey()
171 IMPLEMENT_PEM_write_cb_const(RSAPrivateKey, RSA, PEM_STRING_RSA, in IMPLEMENT_PEM_write_cb_const() argument
175 IMPLEMENT_PEM_rw_const(RSAPublicKey, RSA, PEM_STRING_RSA_PUBLIC, in IMPLEMENT_PEM_write_cb_const()
176 RSAPublicKey) IMPLEMENT_PEM_rw(RSA_PUBKEY, RSA, in IMPLEMENT_PEM_write_cb_const()
/external/rust/crates/ring/tests/
Drsa_from_pkcs8_tests.txt1 # RSA 2048-bit key with e == 65537.
8 # RSA 3072-bit key with e == 65537.
11 # RSA 2048-bit key with e == 65537 and p < q.
14 # RSA 3072-bit key with e == 65537 and p < q.
17 # RSA 2048-bit key with invalid e == 3.
21 # RSA 2040-bit key that is valid, but we reject it because it is too small and
26 # RSA 2046-bit key that is valid, but we reject it because it is too small and
31 # RSA 2047-bit key that is valid, but we reject it because the lengths of the
37 # RSA 2049-bit key that is valid, but we reject it because the lengths of the
43 # RSA 2050-bit key that is valid, but we reject it because the private modulus
[all …]
/external/python/cryptography/vectors/cryptography_vectors/asymmetric/RSA/pkcs-1v2-1d2-vec/
Dreadme.txt5 This directory contains test vectors for RSA-OAEP and RSA-PSS
11 oaep-vect.txt Test vectors for RSA-OAEP encryption.
12 oaep-int.txt Intermediate values for RSA-OAEP
13 encryption and RSA decryption with CRT.
16 pss-vect.txt Test vectors for RSA-PSS signing.
17 pss-int.txt Intermediate values for RSA-PSS signing.
/external/openssh/openbsd-compat/
Dopenssl-compat.h126 void RSA_get0_key(const RSA *r, const BIGNUM **n, const BIGNUM **e,
131 int RSA_set0_key(RSA *r, BIGNUM *n, BIGNUM *e, BIGNUM *d);
135 void RSA_get0_crt_params(const RSA *r, const BIGNUM **dmp1, const BIGNUM **dmq1,
140 int RSA_set0_crt_params(RSA *r, BIGNUM *dmp1, BIGNUM *dmq1, BIGNUM *iqmp);
144 void RSA_get0_factors(const RSA *r, const BIGNUM **p, const BIGNUM **q);
148 int RSA_set0_factors(RSA *r, BIGNUM *p, BIGNUM *q);
203 int (*RSA_meth_get_finish(const RSA_METHOD *meth))(RSA *rsa);
208 const unsigned char *from, unsigned char *to, RSA *rsa, int padding));
213 const unsigned char *from, unsigned char *to, RSA *rsa, int padding));
217 int RSA_meth_set_finish(RSA_METHOD *meth, int (*finish)(RSA *rsa));
[all …]
/external/wycheproof/doc/
Drsa.md1 # RSA chapter
5 ## RSA key generation
7 **Default size:** If a library supports a key default size for RSA keys then
13 suggests that 2048-bit RSA keys provide a security strength of about 112 bits,
15 bit RSA keys. [ECRYPT II], Section 13.3 suggests at least 2432 bits for new
20 size smaller than 2048 bits. If a user really wants a small RSA key then such a
25 every implementation of the Java platform is required to implement RSA with both
36 ## RSA PKCS #1 v1.5 encryption
71 ## RSA OAEP
73 Manger describes an chosen ciphertext attack against RSA in [M01]. There are
[all …]
/external/python/cryptography/docs/development/
Dtest-vectors.rst31 * RSA PKCS #1 from the RSA FTP site (ftp://ftp.rsasecurity.com/pub/pkcs/pkcs-1/
33 * RSA FIPS 186-2 and PKCS1 v1.5 vulnerability test vectors from `NIST CAVP`_.
38 * OpenSSL PEM RSA serialization vectors from the `OpenSSL example key`_ and
52 * RSA OAEP with custom label from the `BoringSSL evp tests`_.
75 * ``asymmetric/PEM_Serialization/rsa_private_key.pem`` - Contains an RSA 2048
79 ``asymmetric/DER_Serialization/rsa_public_key.der``- Contains an RSA 2048
96 `OpenSSL example key`_ for RSA.
200 RSA with SHA1.
224 * ``invalid_version.pem`` - Contains an RSA 2048 bit certificate with the
226 * ``post2000utctime.pem`` - Contains an RSA 2048 bit certificate with the
[all …]
/external/python/rsa/doc/
Dcompatibility.rst7 Python-RSA implements encryption and signatures according to PKCS#1
8 version 1.5. This makes it compatible with the OpenSSL RSA module.
28 Deprecated in Python-RSA 3.4 and removed from Python-RSA 4.0.
29 Was Python-RSA only, not compatible with any other known application.
36 You can create a 512-bit RSA key in OpenSSL as follows::
40 To get a Python-RSA-compatible public key from OpenSSL, you need the
57 v1.5 supported by Python-RSA. In order to extract a key from the
Dupgrading.rst4 From versions older than Python-RSA 4.0
9 Python-RSA 4.0. If you need this, or have ideas on how to do handle encryption
17 From versions older than Python-RSA 3.4
20 Previous versions of Python-RSA were less secure than the current
22 old versions will be available until Python-RSA 4.0.
48 of Python-RSA, and not as a way to keep using those old versions.
58 Version 3.0 introduced industrial standard RSA keys according to
60 older version of Python-RSA, use the following::
/external/conscrypt/
DCAPABILITIES.md131 * `RSA/ECB/NoPadding`
132 * `RSA/ECB/OAEPPadding`
133 * `RSA/ECB/OAEPWithSHA-1AndMGF1Padding`
134 * `RSA/ECB/OAEPWithSHA-224AndMGF1Padding`
135 * `RSA/ECB/OAEPWithSHA-256AndMGF1Padding`
136 * `RSA/ECB/OAEPWithSHA-384AndMGF1Padding`
137 * `RSA/ECB/OAEPWithSHA-512AndMGF1Padding`
138 * `RSA/ECB/PKCS1Padding`
140 Conscrypt's OAEP ciphers (eg, `RSA/ECB/OAEPWithSHA-256AndMGF1Padding`) use the named digest for
143 For maximum compatibility, you should use `RSA/ECB/OAEPPadding` and initialize it with an
[all …]

12345678910>>...20