/external/boringssl/src/crypto/err/ |
D | rsa.errordata | 1 RSA,100,BAD_ENCODING 2 RSA,101,BAD_E_VALUE 3 RSA,102,BAD_FIXED_HEADER_DECRYPT 4 RSA,103,BAD_PAD_BYTE_COUNT 5 RSA,104,BAD_RSA_PARAMETERS 6 RSA,105,BAD_SIGNATURE 7 RSA,106,BAD_VERSION 8 RSA,107,BLOCK_TYPE_IS_NOT_01 9 RSA,148,BLOCK_TYPE_IS_NOT_02 10 RSA,108,BN_NOT_INITIALIZED [all …]
|
/external/rust/crates/quiche/deps/boringssl/src/include/openssl/ |
D | rsa.h | 83 OPENSSL_EXPORT RSA *RSA_new(void); 86 OPENSSL_EXPORT RSA *RSA_new_method(const ENGINE *engine); 90 OPENSSL_EXPORT void RSA_free(RSA *rsa); 94 OPENSSL_EXPORT int RSA_up_ref(RSA *rsa); 100 OPENSSL_EXPORT unsigned RSA_bits(const RSA *rsa); 103 OPENSSL_EXPORT const BIGNUM *RSA_get0_n(const RSA *rsa); 106 OPENSSL_EXPORT const BIGNUM *RSA_get0_e(const RSA *rsa); 110 OPENSSL_EXPORT const BIGNUM *RSA_get0_d(const RSA *rsa); 114 OPENSSL_EXPORT const BIGNUM *RSA_get0_p(const RSA *rsa); 118 OPENSSL_EXPORT const BIGNUM *RSA_get0_q(const RSA *rsa); [all …]
|
/external/boringssl/src/include/openssl/ |
D | rsa.h | 83 OPENSSL_EXPORT RSA *RSA_new(void); 86 OPENSSL_EXPORT RSA *RSA_new_method(const ENGINE *engine); 90 OPENSSL_EXPORT void RSA_free(RSA *rsa); 94 OPENSSL_EXPORT int RSA_up_ref(RSA *rsa); 100 OPENSSL_EXPORT unsigned RSA_bits(const RSA *rsa); 103 OPENSSL_EXPORT const BIGNUM *RSA_get0_n(const RSA *rsa); 106 OPENSSL_EXPORT const BIGNUM *RSA_get0_e(const RSA *rsa); 110 OPENSSL_EXPORT const BIGNUM *RSA_get0_d(const RSA *rsa); 114 OPENSSL_EXPORT const BIGNUM *RSA_get0_p(const RSA *rsa); 118 OPENSSL_EXPORT const BIGNUM *RSA_get0_q(const RSA *rsa); [all …]
|
/external/boringssl/src/crypto/evp/ |
D | evp_tests.txt | 5 # RSA 2048 bit key. 6 PrivateKey = RSA-2048 7 Type = RSA 13 PublicKey = RSA-2048-SPKI 14 Type = RSA 19 # The same key but with a negative RSA modulus. 20 PublicKey = RSA-2048-SPKI-Negative 25 PublicKey = RSA-2048-SPKI-Invalid 30 PublicKey = RSA-2048-SPKI-Invalid2 34 # RSA 512 bit key. [all …]
|
/external/boringssl/src/crypto/rsa_extra/ |
D | rsa_asn1.c | 84 OPENSSL_PUT_ERROR(RSA, RSA_R_VALUE_MISSING); in marshal_integer() 90 RSA *RSA_parse_public_key(CBS *cbs) { in RSA_parse_public_key() 91 RSA *ret = RSA_new(); in RSA_parse_public_key() 100 OPENSSL_PUT_ERROR(RSA, RSA_R_BAD_ENCODING); in RSA_parse_public_key() 107 OPENSSL_PUT_ERROR(RSA, RSA_R_BAD_RSA_PARAMETERS); in RSA_parse_public_key() 115 RSA *RSA_public_key_from_bytes(const uint8_t *in, size_t in_len) { in RSA_public_key_from_bytes() 118 RSA *ret = RSA_parse_public_key(&cbs); in RSA_public_key_from_bytes() 120 OPENSSL_PUT_ERROR(RSA, RSA_R_BAD_ENCODING); in RSA_public_key_from_bytes() 127 int RSA_marshal_public_key(CBB *cbb, const RSA *rsa) { in RSA_marshal_public_key() 133 OPENSSL_PUT_ERROR(RSA, RSA_R_ENCODE_ERROR); in RSA_marshal_public_key() [all …]
|
/external/rust/crates/quiche/deps/boringssl/src/crypto/rsa_extra/ |
D | rsa_asn1.c | 84 OPENSSL_PUT_ERROR(RSA, RSA_R_VALUE_MISSING); in marshal_integer() 90 RSA *RSA_parse_public_key(CBS *cbs) { in RSA_parse_public_key() 91 RSA *ret = RSA_new(); in RSA_parse_public_key() 100 OPENSSL_PUT_ERROR(RSA, RSA_R_BAD_ENCODING); in RSA_parse_public_key() 107 OPENSSL_PUT_ERROR(RSA, RSA_R_BAD_RSA_PARAMETERS); in RSA_parse_public_key() 115 RSA *RSA_public_key_from_bytes(const uint8_t *in, size_t in_len) { in RSA_public_key_from_bytes() 118 RSA *ret = RSA_parse_public_key(&cbs); in RSA_public_key_from_bytes() 120 OPENSSL_PUT_ERROR(RSA, RSA_R_BAD_ENCODING); in RSA_public_key_from_bytes() 127 int RSA_marshal_public_key(CBB *cbb, const RSA *rsa) { in RSA_marshal_public_key() 133 OPENSSL_PUT_ERROR(RSA, RSA_R_ENCODE_ERROR); in RSA_marshal_public_key() [all …]
|
/external/boringssl/src/crypto/fipsmodule/rsa/ |
D | rsa.c | 81 OPENSSL_DECLARE_ERROR_REASON(RSA, BLOCK_TYPE_IS_NOT_02) in OPENSSL_DECLARE_ERROR_REASON() argument 85 RSA *RSA_new(void) { return RSA_new_method(NULL); } in OPENSSL_DECLARE_ERROR_REASON() 87 RSA *RSA_new_method(const ENGINE *engine) { in RSA_new_method() 88 RSA *rsa = OPENSSL_malloc(sizeof(RSA)); in RSA_new_method() 90 OPENSSL_PUT_ERROR(RSA, ERR_R_MALLOC_FAILURE); in RSA_new_method() 94 OPENSSL_memset(rsa, 0, sizeof(RSA)); in RSA_new_method() 121 void RSA_free(RSA *rsa) { in RSA_free() 163 int RSA_up_ref(RSA *rsa) { in RSA_up_ref() 168 unsigned RSA_bits(const RSA *rsa) { return BN_num_bits(rsa->n); } in RSA_bits() 170 const BIGNUM *RSA_get0_n(const RSA *rsa) { return rsa->n; } in RSA_get0_n() [all …]
|
D | padding.c | 79 OPENSSL_PUT_ERROR(RSA, RSA_R_KEY_SIZE_TOO_SMALL); in RSA_padding_add_PKCS1_type_1() 84 OPENSSL_PUT_ERROR(RSA, RSA_R_DIGEST_TOO_BIG_FOR_RSA_KEY); in RSA_padding_add_PKCS1_type_1() 102 OPENSSL_PUT_ERROR(RSA, RSA_R_DATA_TOO_SMALL); in RSA_padding_check_PKCS1_type_1() 108 OPENSSL_PUT_ERROR(RSA, RSA_R_BLOCK_TYPE_IS_NOT_01); in RSA_padding_check_PKCS1_type_1() 120 OPENSSL_PUT_ERROR(RSA, RSA_R_BAD_FIXED_HEADER_DECRYPT); in RSA_padding_check_PKCS1_type_1() 126 OPENSSL_PUT_ERROR(RSA, RSA_R_NULL_BEFORE_BLOCK_MISSING); in RSA_padding_check_PKCS1_type_1() 131 OPENSSL_PUT_ERROR(RSA, RSA_R_BAD_PAD_BYTE_COUNT); in RSA_padding_check_PKCS1_type_1() 139 OPENSSL_PUT_ERROR(RSA, RSA_R_DATA_TOO_LARGE); in RSA_padding_check_PKCS1_type_1() 168 OPENSSL_PUT_ERROR(RSA, RSA_R_KEY_SIZE_TOO_SMALL); in RSA_padding_add_PKCS1_type_2() 173 OPENSSL_PUT_ERROR(RSA, RSA_R_DATA_TOO_LARGE_FOR_KEY_SIZE); in RSA_padding_add_PKCS1_type_2() [all …]
|
D | rsa_impl.c | 76 int rsa_check_public_key(const RSA *rsa) { in rsa_check_public_key() 78 OPENSSL_PUT_ERROR(RSA, RSA_R_VALUE_MISSING); in rsa_check_public_key() 85 OPENSSL_PUT_ERROR(RSA, RSA_R_MODULUS_TOO_LARGE); in rsa_check_public_key() 101 OPENSSL_PUT_ERROR(RSA, RSA_R_BAD_E_VALUE); in rsa_check_public_key() 110 OPENSSL_PUT_ERROR(RSA, RSA_R_KEY_SIZE_TOO_SMALL); in rsa_check_public_key() 138 static int freeze_private_key(RSA *rsa, BN_CTX *ctx) { in freeze_private_key() 255 size_t rsa_default_size(const RSA *rsa) { in rsa_default_size() 259 int RSA_encrypt(RSA *rsa, size_t *out_len, uint8_t *out, size_t max_out, in RSA_encrypt() 272 OPENSSL_PUT_ERROR(RSA, RSA_R_OUTPUT_BUFFER_TOO_SMALL); in RSA_encrypt() 286 OPENSSL_PUT_ERROR(RSA, ERR_R_MALLOC_FAILURE); in RSA_encrypt() [all …]
|
D | internal.h | 74 size_t rsa_default_size(const RSA *rsa); 75 int rsa_default_sign_raw(RSA *rsa, size_t *out_len, uint8_t *out, 78 int rsa_default_decrypt(RSA *rsa, size_t *out_len, uint8_t *out, size_t max_out, 80 int rsa_default_private_transform(RSA *rsa, uint8_t *out, const uint8_t *in, 113 int rsa_check_public_key(const RSA *rsa); 118 int RSA_private_transform(RSA *rsa, uint8_t *out, const uint8_t *in,
|
/external/rust/crates/quiche/deps/boringssl/src/crypto/fipsmodule/rsa/ |
D | rsa.c | 81 OPENSSL_DECLARE_ERROR_REASON(RSA, BLOCK_TYPE_IS_NOT_02) in OPENSSL_DECLARE_ERROR_REASON() argument 85 RSA *RSA_new(void) { return RSA_new_method(NULL); } in OPENSSL_DECLARE_ERROR_REASON() 87 RSA *RSA_new_method(const ENGINE *engine) { in RSA_new_method() 88 RSA *rsa = OPENSSL_malloc(sizeof(RSA)); in RSA_new_method() 90 OPENSSL_PUT_ERROR(RSA, ERR_R_MALLOC_FAILURE); in RSA_new_method() 94 OPENSSL_memset(rsa, 0, sizeof(RSA)); in RSA_new_method() 121 void RSA_free(RSA *rsa) { in RSA_free() 163 int RSA_up_ref(RSA *rsa) { in RSA_up_ref() 168 unsigned RSA_bits(const RSA *rsa) { return BN_num_bits(rsa->n); } in RSA_bits() 170 const BIGNUM *RSA_get0_n(const RSA *rsa) { return rsa->n; } in RSA_get0_n() [all …]
|
D | padding.c | 79 OPENSSL_PUT_ERROR(RSA, RSA_R_KEY_SIZE_TOO_SMALL); in RSA_padding_add_PKCS1_type_1() 84 OPENSSL_PUT_ERROR(RSA, RSA_R_DIGEST_TOO_BIG_FOR_RSA_KEY); in RSA_padding_add_PKCS1_type_1() 102 OPENSSL_PUT_ERROR(RSA, RSA_R_DATA_TOO_SMALL); in RSA_padding_check_PKCS1_type_1() 108 OPENSSL_PUT_ERROR(RSA, RSA_R_BLOCK_TYPE_IS_NOT_01); in RSA_padding_check_PKCS1_type_1() 120 OPENSSL_PUT_ERROR(RSA, RSA_R_BAD_FIXED_HEADER_DECRYPT); in RSA_padding_check_PKCS1_type_1() 126 OPENSSL_PUT_ERROR(RSA, RSA_R_NULL_BEFORE_BLOCK_MISSING); in RSA_padding_check_PKCS1_type_1() 131 OPENSSL_PUT_ERROR(RSA, RSA_R_BAD_PAD_BYTE_COUNT); in RSA_padding_check_PKCS1_type_1() 139 OPENSSL_PUT_ERROR(RSA, RSA_R_DATA_TOO_LARGE); in RSA_padding_check_PKCS1_type_1() 168 OPENSSL_PUT_ERROR(RSA, RSA_R_KEY_SIZE_TOO_SMALL); in RSA_padding_add_PKCS1_type_2() 173 OPENSSL_PUT_ERROR(RSA, RSA_R_DATA_TOO_LARGE_FOR_KEY_SIZE); in RSA_padding_add_PKCS1_type_2() [all …]
|
D | rsa_impl.c | 76 static int check_modulus_and_exponent_sizes(const RSA *rsa) { in check_modulus_and_exponent_sizes() 80 OPENSSL_PUT_ERROR(RSA, RSA_R_MODULUS_TOO_LARGE); in check_modulus_and_exponent_sizes() 96 OPENSSL_PUT_ERROR(RSA, RSA_R_BAD_E_VALUE); in check_modulus_and_exponent_sizes() 105 OPENSSL_PUT_ERROR(RSA, RSA_R_KEY_SIZE_TOO_SMALL); in check_modulus_and_exponent_sizes() 133 static int freeze_private_key(RSA *rsa, BN_CTX *ctx) { in freeze_private_key() 250 size_t rsa_default_size(const RSA *rsa) { in rsa_default_size() 254 int RSA_encrypt(RSA *rsa, size_t *out_len, uint8_t *out, size_t max_out, in RSA_encrypt() 257 OPENSSL_PUT_ERROR(RSA, RSA_R_VALUE_MISSING); in RSA_encrypt() 268 OPENSSL_PUT_ERROR(RSA, RSA_R_OUTPUT_BUFFER_TOO_SMALL); in RSA_encrypt() 286 OPENSSL_PUT_ERROR(RSA, ERR_R_MALLOC_FAILURE); in RSA_encrypt() [all …]
|
D | internal.h | 74 size_t rsa_default_size(const RSA *rsa); 75 int rsa_default_sign_raw(RSA *rsa, size_t *out_len, uint8_t *out, 78 int rsa_default_decrypt(RSA *rsa, size_t *out_len, uint8_t *out, size_t max_out, 80 int rsa_default_private_transform(RSA *rsa, uint8_t *out, const uint8_t *in, 114 int RSA_private_transform(RSA *rsa, uint8_t *out, const uint8_t *in,
|
/external/curl/docs/ |
D | CIPHERS.md | 34 `DH-RSA-DES-CBC3-SHA` 36 `DHE-RSA-DES-CBC3-SHA` 49 `DHE-RSA-DES-CBC3-SHA` 59 `DH-RSA-AES128-SHA` 60 `DH-RSA-AES256-SHA` 63 `DHE-RSA-AES128-SHA` 64 `DHE-RSA-AES256-SHA` 72 `DH-RSA-SEED-SHA` 74 `DHE-RSA-SEED-SHA` 86 `ECDHE-RSA-NULL-SHA` [all …]
|
/external/rust/crates/quiche/deps/boringssl/src/crypto/pem/ |
D | pem_all.c | 120 static RSA *pkey_get_rsa(EVP_PKEY *key, RSA **rsa); 136 static RSA *pkey_get_rsa(EVP_PKEY *key, RSA **rsa) in IMPLEMENT_PEM_rw() 138 RSA *rtmp; in IMPLEMENT_PEM_rw() 152 RSA *PEM_read_bio_RSAPrivateKey(BIO *bp, RSA **rsa, pem_password_cb *cb, in PEM_read_bio_RSAPrivateKey() 162 RSA *PEM_read_RSAPrivateKey(FILE *fp, RSA **rsa, pem_password_cb *cb, void *u) in PEM_read_RSAPrivateKey() 171 IMPLEMENT_PEM_write_cb_const(RSAPrivateKey, RSA, PEM_STRING_RSA, in IMPLEMENT_PEM_write_cb_const() argument 175 IMPLEMENT_PEM_rw_const(RSAPublicKey, RSA, PEM_STRING_RSA_PUBLIC, in IMPLEMENT_PEM_write_cb_const() 176 RSAPublicKey) IMPLEMENT_PEM_rw(RSA_PUBKEY, RSA, in IMPLEMENT_PEM_write_cb_const()
|
/external/boringssl/src/crypto/pem/ |
D | pem_all.c | 120 static RSA *pkey_get_rsa(EVP_PKEY *key, RSA **rsa); 136 static RSA *pkey_get_rsa(EVP_PKEY *key, RSA **rsa) in IMPLEMENT_PEM_rw() 138 RSA *rtmp; in IMPLEMENT_PEM_rw() 152 RSA *PEM_read_bio_RSAPrivateKey(BIO *bp, RSA **rsa, pem_password_cb *cb, in PEM_read_bio_RSAPrivateKey() 162 RSA *PEM_read_RSAPrivateKey(FILE *fp, RSA **rsa, pem_password_cb *cb, void *u) in PEM_read_RSAPrivateKey() 171 IMPLEMENT_PEM_write_cb_const(RSAPrivateKey, RSA, PEM_STRING_RSA, in IMPLEMENT_PEM_write_cb_const() argument 175 IMPLEMENT_PEM_rw_const(RSAPublicKey, RSA, PEM_STRING_RSA_PUBLIC, in IMPLEMENT_PEM_write_cb_const() 176 RSAPublicKey) IMPLEMENT_PEM_rw(RSA_PUBKEY, RSA, in IMPLEMENT_PEM_write_cb_const()
|
/external/rust/crates/ring/tests/ |
D | rsa_from_pkcs8_tests.txt | 1 # RSA 2048-bit key with e == 65537. 8 # RSA 3072-bit key with e == 65537. 11 # RSA 2048-bit key with e == 65537 and p < q. 14 # RSA 3072-bit key with e == 65537 and p < q. 17 # RSA 2048-bit key with invalid e == 3. 21 # RSA 2040-bit key that is valid, but we reject it because it is too small and 26 # RSA 2046-bit key that is valid, but we reject it because it is too small and 31 # RSA 2047-bit key that is valid, but we reject it because the lengths of the 37 # RSA 2049-bit key that is valid, but we reject it because the lengths of the 43 # RSA 2050-bit key that is valid, but we reject it because the private modulus [all …]
|
/external/python/cryptography/vectors/cryptography_vectors/asymmetric/RSA/pkcs-1v2-1d2-vec/ |
D | readme.txt | 5 This directory contains test vectors for RSA-OAEP and RSA-PSS 11 oaep-vect.txt Test vectors for RSA-OAEP encryption. 12 oaep-int.txt Intermediate values for RSA-OAEP 13 encryption and RSA decryption with CRT. 16 pss-vect.txt Test vectors for RSA-PSS signing. 17 pss-int.txt Intermediate values for RSA-PSS signing.
|
/external/openssh/openbsd-compat/ |
D | openssl-compat.h | 126 void RSA_get0_key(const RSA *r, const BIGNUM **n, const BIGNUM **e, 131 int RSA_set0_key(RSA *r, BIGNUM *n, BIGNUM *e, BIGNUM *d); 135 void RSA_get0_crt_params(const RSA *r, const BIGNUM **dmp1, const BIGNUM **dmq1, 140 int RSA_set0_crt_params(RSA *r, BIGNUM *dmp1, BIGNUM *dmq1, BIGNUM *iqmp); 144 void RSA_get0_factors(const RSA *r, const BIGNUM **p, const BIGNUM **q); 148 int RSA_set0_factors(RSA *r, BIGNUM *p, BIGNUM *q); 203 int (*RSA_meth_get_finish(const RSA_METHOD *meth))(RSA *rsa); 208 const unsigned char *from, unsigned char *to, RSA *rsa, int padding)); 213 const unsigned char *from, unsigned char *to, RSA *rsa, int padding)); 217 int RSA_meth_set_finish(RSA_METHOD *meth, int (*finish)(RSA *rsa)); [all …]
|
/external/wycheproof/doc/ |
D | rsa.md | 1 # RSA chapter 5 ## RSA key generation 7 **Default size:** If a library supports a key default size for RSA keys then 13 suggests that 2048-bit RSA keys provide a security strength of about 112 bits, 15 bit RSA keys. [ECRYPT II], Section 13.3 suggests at least 2432 bits for new 20 size smaller than 2048 bits. If a user really wants a small RSA key then such a 25 every implementation of the Java platform is required to implement RSA with both 36 ## RSA PKCS #1 v1.5 encryption 71 ## RSA OAEP 73 Manger describes an chosen ciphertext attack against RSA in [M01]. There are [all …]
|
/external/python/cryptography/docs/development/ |
D | test-vectors.rst | 31 * RSA PKCS #1 from the RSA FTP site (ftp://ftp.rsasecurity.com/pub/pkcs/pkcs-1/ 33 * RSA FIPS 186-2 and PKCS1 v1.5 vulnerability test vectors from `NIST CAVP`_. 38 * OpenSSL PEM RSA serialization vectors from the `OpenSSL example key`_ and 52 * RSA OAEP with custom label from the `BoringSSL evp tests`_. 75 * ``asymmetric/PEM_Serialization/rsa_private_key.pem`` - Contains an RSA 2048 79 ``asymmetric/DER_Serialization/rsa_public_key.der``- Contains an RSA 2048 96 `OpenSSL example key`_ for RSA. 200 RSA with SHA1. 224 * ``invalid_version.pem`` - Contains an RSA 2048 bit certificate with the 226 * ``post2000utctime.pem`` - Contains an RSA 2048 bit certificate with the [all …]
|
/external/python/rsa/doc/ |
D | compatibility.rst | 7 Python-RSA implements encryption and signatures according to PKCS#1 8 version 1.5. This makes it compatible with the OpenSSL RSA module. 28 Deprecated in Python-RSA 3.4 and removed from Python-RSA 4.0. 29 Was Python-RSA only, not compatible with any other known application. 36 You can create a 512-bit RSA key in OpenSSL as follows:: 40 To get a Python-RSA-compatible public key from OpenSSL, you need the 57 v1.5 supported by Python-RSA. In order to extract a key from the
|
D | upgrading.rst | 4 From versions older than Python-RSA 4.0 9 Python-RSA 4.0. If you need this, or have ideas on how to do handle encryption 17 From versions older than Python-RSA 3.4 20 Previous versions of Python-RSA were less secure than the current 22 old versions will be available until Python-RSA 4.0. 48 of Python-RSA, and not as a way to keep using those old versions. 58 Version 3.0 introduced industrial standard RSA keys according to 60 older version of Python-RSA, use the following::
|
/external/conscrypt/ |
D | CAPABILITIES.md | 131 * `RSA/ECB/NoPadding` 132 * `RSA/ECB/OAEPPadding` 133 * `RSA/ECB/OAEPWithSHA-1AndMGF1Padding` 134 * `RSA/ECB/OAEPWithSHA-224AndMGF1Padding` 135 * `RSA/ECB/OAEPWithSHA-256AndMGF1Padding` 136 * `RSA/ECB/OAEPWithSHA-384AndMGF1Padding` 137 * `RSA/ECB/OAEPWithSHA-512AndMGF1Padding` 138 * `RSA/ECB/PKCS1Padding` 140 Conscrypt's OAEP ciphers (eg, `RSA/ECB/OAEPWithSHA-256AndMGF1Padding`) use the named digest for 143 For maximum compatibility, you should use `RSA/ECB/OAEPPadding` and initialize it with an [all …]
|